home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
network
/
nia72
< prev
next >
Wrap
Text File
|
1992-09-26
|
327KB
|
6,867 lines
_ _______
Release Date: __ N.I.A. _ ___ ___ Are you on any WAN? Are
08AUG91 ____ ___ ___ ___ ___ you on Bitnet, Internet
_____ ___ ___ ___ ___ Compuserve, MCI Mail,
Editors: ___ ___ ___ ___ ___________ Sprintmail, Applelink,
Judge Dredd ___ ___ ___ ___ ___________ Easynet, Usenet,
Lord Macduff ___ ______ ___ ___ ___ FidoNet, et al.?
Advisors: ___ _____ ___ ___ ___ If so please drop us a
Knight Lighting ____ _ __ ___ line at
Jim Thomas ___ _ ___ nia@nuchat.sccsi.com
__
_ Network Information Access
Ignorance, There's No Excuse.
Issue 072 :: Volume 02
"Do you know why there are so few sophisticated computer terrorists in the
United States? Because your hackers have so much mobility into the
Establishment. Here there is no such mobility. If you have the slightese bit
of intellectual integrity you cannot support the government... That's why
the best computer minds belong to the opposition."
- An anonymous member of the
Polish trade union Solitarity.
^*^
Greetings, avid readers! This issue marks a departure from our usual
pattern, in that we now have the beginnings of an advisory staff. We would
like to welcome Knight Lightning, Ex-editor of the now-late Phrack Inc.
magazine. We would also like to welcome Jim Thomas, Editor of the Computer
Underground Digest. If you feel you have certain qualities that could
improve NIA magazine, please write us at nia@nuchat.sccsi.com.
============================================================================
1. Index to NIA072 .............................................NIA Editors
2. The Renaissance of Hacking ...............................Mark Hittinger
3. The Hacker Manifesto ......................................Erik Bloodaxe
4. Foiling the Cracker [Dept. of Defense]......................Killing Joke
5. UNIX: JE Documentation ................................Terminal_Erection
6. Network Miscellany ......................................Various Sources
7. CyberTimes (Vox Populi) [1/4] ...............................Judge Dredd
8. CyberTimes (Vox Populi) [2/4] ...............................Judge Dredd
9. CyberTimes (Vox Populi) [3/4] ...............................Judge Dredd
10. CyberTimes (Vox Populi) [4/4] ...............................Judge Dredd
11. Editor's Comments ...........................................NIA Editors
============================================================================
/ /
/ NIA 072 / File 2 /
/ Hacking and Hackers: The Rise, Stagnation, and Renaissance. /
/ Copyright(C) 1991 By Mark Hittinger /
/ /
It doesn't take a rocket scientist to figure out that the publicity
afforded to hacking has risen to peak levels within the last year. As
one would expect, the political attention being paid to the subject of
hackers has also risen to peak levels. We are hearing more about
hackers each day. The newspapers have articles about alleged computer
crime and phone fraud almost weekly. The legal system is issuing
indictments, the secret service is running around with wildcard search
warrants, and captured naive hackers are turning on each other. Some
well known computer people have formed a lobby called the "Electronic
Frontier Foundation". Fox TV has news people on the scene during a
bust of an alleged "hacker" who was invading their own doofus system!
Non-computer "lay" people have been asking me a lot of questions.
So who am I? I'm just another computer bum. I got into computers in
the early seventies during high school. I've witnessed computing's
rise as something social outcasts did to something everybody wanted to
be a part of. Babes looked at us with disgust as we grabbed our data
on 110 baud teletypes and paper tape. Rolls of paper tape and access
to timeshared basic was so great that we didn't even think that it
could get better. Well guess what? Computers and our social position
kept getting better. It got so good that pretty soon everybody wanted
to ask us questions.
These days we are like doctors at a cocktail party, we are always
getting hit on for free computer consulting! Even from the babes!
You've come a long way baby! Later I got into the professional side,
that is, systems programming, systems management, and software
development. I've worked with GE, Xerox, IBM, Digital, CDC, HP,
Prime, anything I could get my hands on. I dearly loved the DEC-10,
learned to live with VAX/VMS, and now grit my teeth when I work with
Unix/MS-DOS. My hobby became my career, and they paid me money for
it. My chosen hacking name is "bugs bunny" and you can find me on some
bulletin boards as user "bugs". Bugs was always creating virtual
rabbit holes out of thin air and dodging in and out of them. True
hackers love to find and fix software "bugs". Yea!! I'm 34 now and a
dad.
Being involved in computers for a long time gives me a better
perspective than most. Over the years there would sometimes be a major
media coverage of some computer crime event. As a local computer
"heavy", there were always questions coming my way about what these
things were all about. Lately, the questions are more frequent and
more sophisticated. All these big highly publicized busts are opening
a lot of issues. I didn't have answers to some of these questions so
I sat down and did some thinking. Writing this article is an
outgrowth of that. I am not a writer so grant me some journalistic
slack.
Back in the early seventies hacking was quite free. Most of the
important stuff was running on batch mainframes that had no connection
to the outside world. The systems that we played with were not really
considered critical by anyone. We were allowed to play to our hearts
content, and nobody really worried about it at all. This period is
what I like to think of as the "rise of hacking". You can read about
some of it in the first section of Levy's book, "HACKERS". I love
that section and read it when current events depress me. In those
days the definition of hacker was clear and clean. It was fun, it was
hi-tech, it was a blast, and it was not a threat. There were no big
busts, very few people understood computing, and the public had no
interest in it.
We hacked for the sheer love of it. How can I describe the depth of
interest that we had? We were not concerned with our image or our
"identity". We wrote games, wrote neat hacks, and learned the
strengths or weaknesses of each system. We were able to obtain access
to a broad range of systems. Consider teenage boys comparing and
contrasting the systems designed by older engineers! We eventually
reached a point where we decided how a system should be set up. At
this point we began to make an annoyance of ourselves. In all
instances the various administrations considered us minor annoyances.
They had much more pressing problems!
New users began to show up in the labs. They reluctantly wanted to
get something done that absolutely had to be done on the computer. In
many cases they had no idea how to start, and were left to their own
devices. Centralized data processing management (MIS) didn't want to
deal with them. Often, they saw us playing around, joking, laughing,
carefree, and not at all intimidated by the computer. They, on the
other hand, were quite intimidated. We helped these people get
started, showed them were the documentation was, and explained
various error conditions to them. We quickly developed reputations as
knowing how to get something to work.
One of the people I helped made a remark to me that has stuck with me
for a long time. He said, "I am trained as a civil engineer, so I
don't have a feel for this. But you, you are pure bred. You've
gotten into this fresh and taught yourself from the ground up. You
haven't been trained into any set doctrine." Phar out man! This is
an important point. There were no rules, guidelines, or doctrines.
We made our own up as our experiences dictated.
As time wore on, the new user pool began to grow more rapidly. The
computers began to creak and groan under the work loads that were
being placed upon them. During the day time, we came to the computer
area to find it packed. We could no longer access the computers
during the day. After all, we were just playing! That was OK with
us. Soon we were there at night and on weekends. We obtained the
off-hour non-prime time access, but this put us further away from the
mainstream. These new guys liked the timeshared computers much more
than their mainframe batch machines. They started to move their darn
*important* crud from the mainframe machines to "our" timesharing
computers. Pretty soon the administrations started to think about
what it meant to have payroll or grades on the same computers that had
"star-trek version 8", "adventure", or "DECWAR version 2.2". They
were concerned about security on the timesharing systems, but due to
their budget constraints, most of the centralized MIS shops still had
to give priority to their batch mainframes. We continued to play, but
we cursed at the slow systems when the important stuff was running. I
got off "tuning" systems to make them run faster or more efficiently.
Interactive response time became the holy grail.
The "rise of hacking" was beginning to run out of steam. The
timesharing systems had been expanded as much as technology and
budgets would allow. We had learned the various systems internals
inside and out. We now knew much more about the systems than the
"official" maintainers did, and these maintainers perceived us as a
threat to their positions. The computers were still overloaded. The
nasty politics of access and resources began to rear their head. A
convenient scapegoat was to eliminate access to games. Eliminate the
people that were just playing. Examine all computing activity and bill
for it. This didn't solve any of the problems (we all knew payroll
and grades wouldn't fit in!) but it did raise the issue of the hackers
to the surface. All of a sudden we became defined as a problem! We
were soon getting shut out of various systems. New kids began to show
up and pretend to be hackers. They would do anything to show off, and
created large problems for "us".
At this point the "stagnation" period was beginning. These were hard
days for us. Many of my friends quit what they were doing. Many of
us got real jobs on the computers we played with as a dodge.
Centralized MIS departments began to be placed between the rock and
hard place of limited budgets and unlimited customers. The new kids,
the overloaded systems, the security concerns for the important
applications, and the political situation all resulted in the
stagnation of hacking.
"Hacker" took on a bad connotation. I saw all kind of debates over
what "hacker" meant. Some claimed it was a compliment, and should
only be awarded to those bit twiddlers that were truly awesome. Many
claimed that hackers were the scum of the earth and should be totally
decimated! What could you do but stay out of the way and let things
take their course? I realize now that it was in the MIS departments'
*VESTED INTEREST* to define the term "hacker". Centralized MIS did
not have the courage to fight for larger budgets. Upper level
administrators who just approved the budget would freak out when they
saw kids playing games on the computers in the library. MIS had to
define this as bad, had to say they would put a stop to it. MIS had
to look like they were managing the computer resources responsibly.
Any unusual or politically unacceptable computer event that couldn't
be covered up was caused by "hackers". It was a dodge for MIS! I am
not saying that some questionable stuff didn't go down, I am just
saying that it was logical to call anything "bad" by some sort of
easily accepted label - "hackers".
Of course, when the unusual computing event took place your budding
journalists were johnny on the spot. You don't climb that journalist
ladder by writing about boring stories. Wild computer stories about
hacking captured the public interest. I suppose the public liked to
hear that somebody could "beat" the system somehow. Journalists
picked up on this and wrote stories that even I found hard to believe.
The new kids, even when not asked, would blab all day long about the
great things that they were doing. And don't you know, they would blab
all day long about great hacks they heard that you pulled! Stories
get wilder with each re-telling. I realize now that it was in the
journalists' *VESTED INTEREST* to define the term "hacker". The public
loves robin hood, the journalists went out and found lots of
pseudo-robin hoods.
More and more stories began to hit the public. We heard stories of
military computers getting penetrated. We heard stories of big
financial rip-offs. We heard cute stories about guys who paid
themselves the round-off of millions of computer generated checks. We
heard stories of kids moving space satellites! We heard stories of old
ladies getting their phone bills in a heavy parcel box! As an old
timer, I found a lot of these stories far fetched. It was all
national inquirer type stuff to me. The public loved it, the
bureaucrats used it, and the politicians began to see an opportunity!
The end of the "stagnation" period coincides the arrival of the
politicians. Was it in the *VESTED INTEREST* of the politicians to
define the term "hacker"? You bet! Here was a safe and easy issue!
Who would stand up and say they were FOR hackers? What is more
politically esthetic than to be able to define a bad guy and then say
you are opposed to it? More resources began to flow into law
enforcement activities. When actual busts were made, the legal system
had problems coming up with charges. The legal system has never really
felt comfortable with the punishment side of hacking, however, they
LOVE the chase. We didn't have guns, we were not very dangerous, but
it is *neat* to tap lines and grab headlines!
What a dangerous time this was. It was like a feedback loop, getting
worse every week. When centralized MIS was unable to cover up a
hacking event, they exaggerated it instead. Shoddy design or poor
software workmanship was never an issue. Normally "skeptical"
journalists did not ask for proof, and thrilled at the claims of
multi-million dollar damages. Agents loved to be seen on TV (vote for
me when I run!) wheeling out junior's Christmas present from last
year, to be used as "evidence". The politicians were able to pass new
laws without constitutional considerations. New kids, when caught,
would rabidly turn on each other in their desperation to escape.
Worried older hackers learned to shut up and not give their side for
fear of the feeding frenzy. Hackers were socked with an identity
crisis and an image problem. Hackers debated the meaning of hacker
versus the meaning of cracker. We all considered the fundamental
question, "What is a true hacker?". Cool administrators tried to walk
the fine line of satisfying upper level security concerns without
squelching creativity and curiosity.
So what is this "renaissance" business? Am I expecting to see major
hacker attacks on important systems? No way, and by the way, if you
thought that, you would be using a definition created by someone with
a vested interest in it. When did we start to realize that hacker was
defined by somebody else and not us? I don't know, but it has only
been lately. Was it when people started to ask us about these
multi-million dollar damage claims? I really think this is an
important point in time. We saw BellSouth claim an electronically
published duplicate of an electronic document was worth nearly
$100,000 dollars!
We later saw reports that you could have called a 1-800 number and
purchased the same document for under twenty bucks. Regular
non-computer people began to express suspicion about the corporate
claims. They expressed suspicion about the government's position. And
generally, began to question the information the media gave them.
Just last month an article appear in the Wall Street Journal about
some hackers breaking in to electronic voice mail boxes (fancy
answering machines). They quoted some secret service agent as saying
the damages could run to the tens of millions of dollars. Somebody
asked me how in the world could screwing around with peoples answering
machines cause over 10 million dollars in damages? I responded, "I
don't know dude! Do you believe what you read?"
And when did the secret service get into this business? People say
to me, "I thought the secret service was supposed to protect the
president. How come the secret service is busting kids when the FBI
should be doing the busting?" What can I do but shrug? Maybe all the
Abu-Nidals are gone and the president is safe. Maybe the FBI is all
tied up with some new AB-SCAM or the S&L thing. Maybe the FBI is
damn tired of hackers and hacking!
In any event, the secret service showed it's heavy hand with the big
series of busts that was widely publicized recently. They even came
up with *NEAT* code names for it. "Operation SUNDEVIL", WOW! I
shoulda joined the secret service!!! Were they serious or was this
their own version of dungeons and dragons? In a very significant way,
they blew it. A lot of those old nasty constitutional issues surfaced.
They really should define clearly what they are looking for when they
get a search warrant. They shouldn't just show up, clean the place
out, haul it back to some warehouse, and let it sit for months while
they figure out if they got anything. This event freaked a lot of
lay people out. The creation of the Electronic Frontier Foundation is
a direct result of the blatantly illegal search and seizure by the
secret service. People are worried about what appears to be a police
state mentality, and generally feel that the state has gone to far. I
think the average American has a gut level feel for how far the state
should go, and the SS clearly went past that point. To be fair, there
aren't any good guidelines to go by in a technical electronic world,
so the secret service dudes had to decide what to do on their own. It
just turned out to be a significant mistake.
I saw Clifford Stoll, the author of the popular book "Cuckoos Egg"
testify on national C-SPAN TV before congress. His book is a very
good read, and entertaining as well. A lot of lay people have read
the book, and perceive the chaos within the legal system. Stoll's
book reveals that many systems are not properly designed or
maintained. He reveals that many well known "holes" in computer
security go unfixed due to the negligence of the owners. This book
generated two pervasive questions. One, why were there so many
different law enforcement agencies that could claim jurisdiction? Lay
people found it amazing that there were so many and that they could
not coordinate their efforts. Two, why were organizations that
publicly claimed to be worried about hackers not updating their
computer security to fix stale old well known problems? If indeed a
hacker were able to cause damage by exploiting such a well known
unfixed "hole", could the owner of the computer be somehow held
responsible for part of the damage? Should they?
We all watched in amazement as the media reported the progress of
Robert Morris's "internet worm". Does that sound neat or what?
Imagine all these lay people hearing about this and trying to judge if
it is a problem. The media did not do a very good job of covering
this, and the computing profession stayed away from it publicly. A
couple of guys wrote academic style papers on the worm, which says
something about how important it really was. This is the first time
that I can remember anyone examining a hacking event in such fine
detail. We started to hear about military interest in "worms" and
"viruses" that could be stuck into enemy computers. WOW! The media
accepted the damage estimates that were obviously inflated. Morris's
sentence got a lot of publicity, but his fine was very low compared to
the damage estimates. People began to see the official damage
estimates as not being very credible.
We are in the first stages of the hacking renaissance. This period
will allow the hackers to assess themselves and to re-define the term
"hacker". We know what it means, and it fits in with the cycle of
apprentice, journeyman, and master. Its also got a little artist,
intuition, and humor mixed in. Hackers have the chance to repudiate
the MISs', the journalists', and the politicians' definition! Average
people are questioning the government's role in this and fundamental
rights. Just exactly how far should the government go to protect
companies and their data? Exactly what are the responsibilities of a
company with sensitive, valuable data on their computer systems?
There is a distinct feeling that private sector companies should be
doing more to protect themselves. Hackers can give an important
viewpoint on these issues, and all of a sudden there are people
willing to listen.
What are the implications of the renaissance? There is a new public
awareness of the weakness in past and existing systems. People are
concerned about the privacy of their electronic mail or records on the
popular services. People are worried a little about hackers reading
their mail, but more profoundly worried about the services or the
government reading their stuff. I expect to see a very distinct public
interest in encrypted e-mail and electronic privacy. One of my
personal projects is an easy to use e-mail encrypter that is
compatible with all the major e-mail networks. I hope to have it
ready when the wave hits!
Personal computers are so darn powerful now. The centralized MIS
department is essentially dead. Companies are moving away from the
big data center and just letting the various departments role their
own with PCs. It is the wild west again! The new users are on their
own again! The guys who started the stagnation are going out of
business! The only thing they can cling to is the centralized data
base of information that a bunch of PCs might need to access. This
data will often be too expensive or out-of-date to justify, so even
that will die off. Scratch one of the vested definers! Without
centralized multi-million dollar computing there can't be any credible
claims for massive multi-million dollar damages.
Everyone will have their own machine that they can walk around with.
It is a vision that has been around for awhile, but only recently have
the prices, technology, and power brought decent implementations
available. Users can plug it into the e-mail network, and unplug it.
What is more safe than something you can pick up and lock up? It is
yours, and it is in your care. You are responsible for it. Without
the massive damage claims, and with clear responsibility, there will
no longer be any interest from the journalists. Everybody has a
computer, everybody knows how much the true costs of damage are. It
will be very difficult for the journalists to sensationalize about
hackers. Scratch the second tier of the vested definers! Without
media coverage, the hackers and their exploits will fade away from the
headlines.
Without public interest, the politicians will have to move on to
greener pastures. In fact, instead of public fear of hackers, we now
are seeing a public fear of police state mentality and abuse of power.
No politician is going to want to get involved with that! I expect to
see the politicians fade away from the "hacker" scene rapidly.
Scratch the third tier of the vested definers! The FBI and the secret
service will be pressured to spend time on some other "hot" political
issue.
So where the heck are we? We are now entering the era of truly
affordable REAL systems. What does REAL mean? Ask a hacker dude!
These boxes are popping up all over the place. People are buying them,
buying software, and trying to get their work done. More often than
not, they run into problems, and eventually find out that they can ask
some computer heavy about them. Its sort of come full circle, these
guys are like the new users of the old timesharing systems. They had
an idea of what they wanted to do, but didn't know how to get there.
There wasn't a very clear source of guidance, and sometimes they had
to ask for help. So it went!
The hackers are needed again. We can solve problems, get it done,
make it fun. The general public has the vested interest in this! The
public has a vested interest in electronic privacy, in secure personal
systems, and in secure e-mail. As everyone learns more, the glamour
and glitz of the mysterious hackers will fade. Lay people are getting
a clearer idea of whats going on. They are less willing to pay for
inferior products, and aren't keen about relying on centralized
organizations for support. Many know that the four digit passcode
some company gave them doesn't cut the mustard.
What should we hackers do during this renaissance? First we have to
discard and destroy the definition of "hacker" that was foisted upon
us. We need to come to grips with the fact that there were
individuals and groups with a self interest in creating a hysteria
and/or a bogeyman. The witch hunts are over and poorly designed
systems are going to become extinct. We have cheap personal portable
compatible powerful systems, but they do lack some security, and
definitely need to be more fun. We have fast and cheap e-mail, and
this needs to be made more secure. We have the concept of electronic
free speech, and electronic free press. I think about what I was able
to do with the limited systems of yesterday, and feel very positive
about what we can accomplish with the powerful personal systems of
today.
On the software side we do need to get our operating system house in
order. The Unix version wars need to be stopped. Bill Gates must
give us a DOS that will make an old operating system guy like me
smile, and soon! We need to stop creating and destroying languages
every three years and we need to avoid software fads (I won't mention
names due to personal safety concerns). Ken Olsen must overcome and
give us the cheap, fast, and elegantly unconstrained hardware platform
we've waited for all our lives. What we have now is workable (terrific
in terms of history), but it is a moral imperative to get it right.
What we have now just doesn't have the "spark" (I am not doing a pun
on sun either!!!). The hackers will know what I mean.
If we are able to deal with the challenges of the hacking
renaissance, then history will be able to record the hackers as
pioneers and not as vandals. This is the way I feel about it, and
frankly, I've been feeling pretty good lately. The stagnation has
been a rough time for a lot of us. The stock market guys always talk
about having a contrarian view of the market. When some company gets
in the news as a really hot stock, it is usually time to sell it.
When you hear about how terrible some investment is, by some perverse
and wonderful force it is time to buy it. So it may be for the
"hackers". We are hearing how terrible "hackers" are and the millions
of dollars of vandalism that is being perpetrated. At this historic
low are we in for a reversal in trend? Will the stock in "hackers"
rise during this hacking renaissance? I think so, and I'm bullish on
the 90's also! Party on d00des!
------------------------------------------------------------------------------
/ /
/ NIA072 / File 3 /
/ /
/ MANIFESTO OF THE AMERICAN COMPUTIST /
/ by Erik Bloodaxe /
/ /
/ /
A spectre is haunting the America--the spectre of
Computing. All the Powers of Western Capitalism have entered
into a holy alliance to exorcise this spectre: BOC and LDS,
lawyers and judges, corporate CEOs and federal law
enforcement officials.
Where is the person in quest of knowledge that has not
been decried as "hacker" by opponents in power? Where the
Opposition that has not hurled back the branding reproach of
Social Miscreant, against the more advanced opposition, as
well as against its techno-illiterate adversaries?
Two things result from this fact.
I. Computers are already acknowledged by all Western
Powers to be themselves a power.
II. It is high time that the Computists should openly,
in the face of the whole world, publish their views, their
aims, their tendencies, and meet this nursery tale of the
Spectre of Computing with a manifesto of the users
themselves.
To this end, Computists of various races, purposes, and
classes have voiced their opinions, and from these the
following Manifesto has been sketched.
I. BUSINESSMEN AND USERS
The history of all hitherto existing society is the
history of struggles. Freeman and slave, patrician and
plebeian, lord and serf, guild-master and journeyman, in a
word, oppressor and oppressed, stood in constant opposition
to one another, carried on an uninterrupted, now hidden, now
open fight, a fight that each time ended either in a
revolutionary re-constitution of society at large, or in the
common ruin of the contending classes.
In this, the era of epoch of Big Business, we are again
engaged in struggle. This era, however, possesses a
distinctive feature: the objective of increased profit masks
the reality of those that are truly threats, and those that
are merely perceived as such. Through this avaricious
vision, government is forced into becoming a pawn of the
corporate leaders who wish to stamp out any threat, real or
imaginary, upon their first instinct to do so.
Through this procedural paranoia, those who get caught
in the whirlwind of events stemming from business-induced
federal investigations often find their rights in serious
jeopardy.
The word of Business is taken as law. The colorful
portrait of a computer-based threat to the workings of
Business, thereby disrupting profit, and in turn the economy,
force the politicians to act in great haste in forcing orders
down the bureaucratic hierarchy to eliminate the threat.
This fact, accompanied by the threat of removal of corporate
contributions to political campaigns, increases the bias in
which the procedures of investigation are conducted.
Business today has achieved near deification. The reach
of corporations has become immeasurable. This influence has
stripped away the existence of the rights of individuals,
leaving behind only a few stray hemp fibers from a once full
Constitution.
This fact is intolerable. The Government was created
by and for the people that it would govern. Special influences
have no place in decision making on who is to be governed and
how. The corporate grasp must be loosened so that Democracy
can flourish in its natural course.
II. SOCIETY AND COMPUTISTS
To society as a whole, the Computist is an often
misunderstood entity. The media representation of the
Computist left the public with a jaded image. Stories of
Computer-based threats to National Security, to Emergency
Networks, and to Hospital Patients left the public enraged
by and frightened of the people possessing knowledge to
interface with today's electronic world.
Actual computer-related incidents that may have
adversely affected the nation can be counted on the fingers
of one hand, while more minor instances are played up by the
Corporations and sent to the media to stir up more unrest
against the Computist. The more often occurrence is an
action of benefit. Computists point out flaws, alert people
to problems in security, and in general assure that the
nation's computer networks remain safe from foreign
intrusions.
These actions are mutually beneficial for both parties.
The Computist gains the experience and knowledge, and the
Business owning the system gains further protection. For
this act of good faith, the Computist is not thanked, rather
he is threatened, investigated, fined and possibly jailed.
This is most often the case even when the Computist has made
himself known from the onset.
Computists have the power to do a great many things that
society as a whole is unaware of. This power is perceived as
a threat to Business, who has kept the mere existence of such
power quietly to themselves. It has long been agreed upon
that the public should never truly know the true extent of
the influence Business actually has over their individual
lives. Business, through the use of a computer, has ready
access to eavesdrop on any telephone call placed in this
country; to view any criminal record, sealed or unsealed; to
view and alter any financial and credit records; to seize and
transfer assets from any bank or other financial institution
and to view any medical or psychiatric records.
Business knows who you associate with, what you spend,
what you buy, where you go, and who and what you are.
Through these records they can designate how much you will
have to pay for the things you wish to purchase, and what
methods you will most easily succumb to in being forced to do
so.
To alert the public to these facts and to help in the
eradication of Business influence, the Computists call for
certain measures to be enacted.
1. The abolition of all current computer crime laws.
2. The re-evaluation of what encompasses computer crime
by legislature, by Computists, and by other legal counsel to
provide legal statutes that strictly outline progressive
guidelines to the crime and their respective punishments.
3. Full disclosure by Business of the powers they have
kept hidden from the public, so that all may know the
possibilities that exist today for Business to invade the
privacy of the society.
4. Extensive training for all federal and local law
enforcement officials who will be assigned to investigate
computer-related crime so that they will be skillful enough
in their duties to properly execute this task.
5. Computer education classes to be required of all
children enrolled in schools, public or otherwise, to begin
as early as the first year enrolled, and to continue up
through the completion of the end of their secondary
education.
6. Continuing education classes in computer instruction
to be provided free-of-charge to any willing adult through
local educational facilities.
7. Government published documents on all conceivable
aspects of computing to be provided free-of-charge through
the General Services Administration via the Consumer
Information Catalog.
III. COMPUTIST LITERATURE
In the past most Computist literature has been left as
underground newspapers, and selectively mailed electronic
digests. These were the first to attempt to expose the
untruths and to surface the hidden powers of Business. This
media, although provided at little or no cost, has always
received limited distribution due to Business-induced
governmental intrusions.
There have also been countless texts produced covering
the operations of softwares and of operating systems. These
texts have always had the potential to reach a great many
persons, but have been provided at a cost that may have
deterred the average person from their purchase.
Government publications have the potential to reach
every member of society, and can provide all people with
current, correct, and understandable information. This type
of distribution would greatly increase society's knowledge of
computers and reduce the tensions felt towards the subject.
With increased knowledge of computers, society as a whole
would prosper, allowing all members the potential to move
technology forward towards a better and more productive
future.
IV. POSITION OF THE COMPUTIST STRUGGLE IN RELATION TO THE
VARIOUS EXISTING OPPOSITION PARTIES
The struggle of the Computist against Big Business is a
microcosm of society as a whole. This struggle should be the
struggle of every man and woman in this country. We are all
being oppressed and suppressed by the powers of Big Business
influencing our government, making it work against the needs
of society. To end this atrocity that we have allowed to
imbed itself in our nation we must all work together.
PEOPLE OF THE NATION, UNITE!
-----------------------------------------------------------------------------
/ /
/ NIA 072 / File 4 /
/ /
/ `Foiling the Cracker' /
/ A Survey of, and Improvements to, Password Security /
/ This work was sponsored in part by the U.S. Department of Defense. /
/ /
/ Killing Joke /
/ /
Daniel V. Klein
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15217
dvk@sei.cmu.edu
+1 412 268 7791
With the rapid burgeoning of national and international networks, the
question of system security has become one of growing importance. High speed
inter-machine communication and even higher speed computational processors
have made the threats of system ``crackers,'' data theft, data corruption
very real. This paper outlines some of the problems of
current password security by demonstrating the ease by which individual
accounts may be broken. Various techniques used by crackers are outlined,
and finally one solution to this point of system vulnerability, a proactive
password checker, is proposed.
Introduction
The security of accounts and passwords has always been a concern for the
developers and users of Unix.
When Unix was younger, the password encryption algorithm was a simulation of
the M-209 cipher machine used by the U.S. Army during World War II.
%A Robert T. Morris
%A Ken Thompson
%T Password Security: A Case History
%J Communications of the ACM
%V 22
%N 11
%P 594-597
%D November 1979
%L Morris1979
This was
a fair encryption mechanism in that it was difficult to invert under the
proper circumstances, but suffered in that it was too fast an algorithm. On a
PDP-11/70, each encryption took approximately 1.25ms, so that it was possible
to check roughly 800 passwords/second. Armed with a dictionary of 250,000
words, a cracker could compare their encryptions with those all stored in the
password file in a little more than five minutes. Clearly, this was a
security hole worth filling.
In later (post-1976) versions of Unix, the DES algorithm
%T Proposed Federal Information Processing Data Encryption Standard
%J Federal Register (40FR12134)
%D March 17, 1975
%L DES1975
was used to encrypt
passwords. The user's password is used as the DES key, and the algorithm is
used to encrypt a constant. The algorithm is iterated 25 times, with the
result being an 11 character string plus a 2-character ``salt.'' This method
is similarly difficult to decrypt (further complicated through the
introduction of one of 4096 possible salt values) and had the added advantage
of being slow. On a (VAX-II (a machine substantially faster than a
PDP-11/70), a single encryption takes on the order of 280ms, so that a
determined cracker can only check approximately 3.6 encryptions a second.
Checking this same dictionary of 250,000 words would now take over 19
hours of CPU time. Although this is still not very much time to break
a single account, there is no guarantee that this account will use one of
these words as a password. Checking the passwords on a system with 50
accounts would take on average 40 CPU days (since the random selection
of salt values practically guarantees that each user's password will be
encrypted with a different salt), with no guarantee of success. If this new,
slow algorithm was combined with the user education needed to prevent the
selection of obvious passwords, the problem seemed solved.
Regrettably, two recent developments and the recurrence of an old one have
brought the problem of password security back to the fore.
CPU speeds have gotten increasingly faster since 1976, so much so that
processors that are 25-40 times faster than the PDP-11/70 (e.g., the
DECstation 3100 used in this research) are readily
available as desktop workstations. With inter-networking, many sites have
hundreds of the individual workstations connected together, and enterprising
crackers are discovering that the ``divide and conquer'' algorithm can
be extended to multiple processors, especially at night when those processors
are not otherwise being used. Literally thousands of times the computational
power of 10 years ago can be used to break passwords.
New implementations of the DES encryption algorithm have been developed, so
that the time it takes to encrypt a password and compare the encryption
against the value stored in the password file has dropped below the 1ms mark.
%A Matt Bishop
%T An Application of a Fast Data Encryption Standard Implementation
%J Computing Systems
%V 1
%N 3
%P 221-254
%D Summer 1988
%L Bishop1988
%A David C. Feldmeier
%A Philip R. Karn
%T UNIX Password Security - Ten Years Later
%J CRYPTO Proceedings
%D Summer 1989
%L Feldmeier1989
On a single workstation, the dictionary of 250,000 words can once
again be cracked in under five minutes. By dividing the work across multiple
workstations, the time required to encrypt these words against all 4096 salt
values could be no more than an hour or so. With a recently described
hardware implementation of the DES algorithm, the time for each encryption
can be reduced to approximately 6ms.
%A Philip Leong
%A Chris Tham
%T UNIX Password Encryption Considered Insecure
%J USENIX Winter Conference Proceedings
%D January 1991
%L Leong1991
This means that this same dictionary can be be cracked in only 1.5 seconds.
Users are rarely, if ever, educated as to what are wise choices for
passwords. If a password is in a dictionary, it is extremely vulnerable to
being cracked, and users are simply not coached as to ``safe'' choices for
passwords. Of those users who are so educated, many think that simply
because their password is not in /usr/dict/words, it is safe from
detection. Many users also say that because they do not have any private
files on-line, they are not concerned with the security of their account,
little realizing that by providing an entry point to the system they allow
damage to be wrought on their entire system by a malicious cracker.
Because the entirety of the password file is readable by all users, the
encrypted passwords are vulnerable to cracking, both on-site and off-site.
Many sites have responded to this threat with a reactive solution - they
scan their own password files and advise those users whose passwords they are
able to crack. The problem with this solution is that while the local site
is testing its security, the password file is still vulnerable from the
outside. The other problems, of course, are that the testing is very time
consuming and only reports on those passwords it is able to crack. It does
nothing to address user passwords which fall outside of the specific test
cases (e.g., it is possible for a user to use as a password the letters
``qwerty'' - if this combination is not in the in-house test dictionary, it
will not be detected, but there is nothing to stop an outside cracker from
having a more sophisticated dictionary!).
Clearly, one solution to this is to either make /etc/passwd unreadable,
or to make the encrypted password portion of the file unreadable. Splitting
the file into two pieces - a readable /etc/passwd with all but the
encrypted password present, and a ``shadow password'' file that is only
readable by Broot is the solution proposed by Sun Microsystems (and
others) that appears to be gaining popularity. It seems, however, that this
solution will not reach the majority of non-Sun systems for quite a while,
nor even, in fact, many Sun systems, due to many sites'
reluctance to install new releases of software.
The problem of lack of password security is not just endemic to Unix. A
recent Vax/VMS worm had great success by simply trying the username as the
password. Even though the VMS user authorization file is inaccessible to
ordinary users, the cracker simply tried a number of ``obvious'' password
choices - and easily gained access.
What I propose, therefore, is a publicly available proactive password
checker, which will enable users to change their passwords, and to
check a priori whether the new password is ``safe.'' The criteria for
safety should be tunable on a per-site basis, depending on the degree of
security desired. For example, it should be possible to specify a minimum
length password, a restriction that only lower case letters are not allowed,
that a password that looks like a license plate be illegal, and so on.
Because this proactive checker will deal with the pre-encrypted passwords, it
will be able to perform more sophisticated pattern matching on the password,
and will be able to test the safety without having to go through the effort of
cracking the encrypted version. Because the checking will be done
automatically, the process of education can be transferred to the machine,
which will instruct the user why a particular choice of password is bad.
Password Vulnerability
It has long been known that all a cracker need do to acquire access to a
Unix machine is to follow two simple steps, namely:
Acquire a copy of that site's /etc/passwd file, either through an
unprotected uucp link, well known holes in sendmail, or via
ftp or tftp.
Apply the standard (or a sped-up) version of the password encryption
algorithm to a collection of words, typically /usr/dict/words plus some
permutations on account and user names, and compare the encrypted results to
those found in the purloined /etc/passwd file.
If a match is found (and often at least one will be found), the
cracker has access to the targeted machine. Certainly, this mode of attack
has been known for some time,
%A Eugene H. Spafford
%T The Internet Worm Program: An Analysis
%R Purdue Technical Report CSD-TR-823
%I Purdue University
%D November 29, 1988
%L Spafford1988
and the defenses against this attack have also
long been known. What is lacking from the literature is an accounting of
just how vulnerable sites are to this mode of attack. In short, many people kno
w that there is a problem, but few people believe it applies to them.
``There is a fine line between helping
administrators protect their systems and providing a cookbook for bad guys.''
%A F. Grampp
%A R. Morris
%T Unix Operating System Security
%J AT&T Bell Labs Technical Journal
%V 63
%N 8
%P 1649-1672
%D October 1984
%L Grampp1984
The problem here, therefore, is how to divulge useful information on the
vulnerability of systems, without providing too much information, since
almost certainly this information could be used by a cracker to break into
some as-yet unviolated system.
Most of the work that I did was of a
general nature - I did not focus on a particular user or a
particular system, and I did not use any personal information that might be
at the disposal of a dedicated ``bad guy.'' Thus any results which I have
been able to garner indicate only general trends in password usage, and
cannot be used to great advantage when breaking into a particular system. This
generality notwithstanding, I am sure that any self-respecting cracker would
already have these techniques at their disposal, and so I am not bringing to
light any great secret. Rather, I hope to provide a basis for protection for
systems that can guard against future attempts at system invasion.
The Survey and Initial Results
In October and again in December of 1989, I asked a number of friends and
acquaintances around the United States and Great Britain to participate
in a survey. Essentially what I asked them to do was to mail me a copy of
their /etc/passwd file, and I would try to crack their passwords (and
as a side benefit, I would send them a report of the vulnerability of their
system, although at no time would I reveal individual passwords nor even of
their sites participation in this study). Not surprisingly, due to the
sensitive nature of this type of disclosure, I only received a small fraction
of the replies I hoped to get, but was nonetheless able to acquire a database
of nearly 15,000 account entries. This, I hoped, would provide a
representative cross section of the passwords used by users in the community.
Each of the account entries was tested by a number of intrusion strategies,
which will be covered in greater detail in the following section. The
possible passwords that were tried were based on the user's name or account
number, taken from numerous dictionaries (including some containing
foreign words, phrases, patterns of keys on the keyboard, and enumerations),
and from permutations and combinations of words in those dictionaries.
All in all, after nearly 12 CPU months of rather exhaustive testing,
approximately 25% of the passwords had been guessed. So that you do not
develop a false sense of security too early, I add that 21% (nearly 3,000
passwords) were guessed in the first week, and that in the first 15
minutes of testing, 368 passwords (or 2.7%) had been cracked using what
experience has shown
would be the most fruitful line of attack (i.e., using the user or
account names as passwords). These statistics are
frightening, and well they should be. On an average system with 50
accounts in the /etc/passwd file, one could expect the first account to
be cracked in under 2 minutes, with 5-15 accounts being cracked by the end of
the first day. Even though the Broot account may not be cracked, all it
takes is one account being compromised for a cracker to establish a toehold
in a system. Once that is done, any of a number of other well-known security
loopholes (many of which have been published on the network) can be used to
access or destroy any information on the machine.
It should be noted that the results of this testing do not give us any
indication as to what the uncracked passwords are. Rather, it only
tells us what was essentially already known - that users are likely to use
words that are familiar to them as their passwords.
%A Bruce L. Riddle
%A Murray S. Miron
%A Judith A. Semo
%T Passwords in Use in a University Timesharing Environment
%J Computers & Security
%V 8
%N 7
%P 569-579
%D November 1989
%L Riddle1989
What new information it did provide, however, was the degree of
vulnerability of the systems in question, as well as providing a basis for
developing a proactive password changer - a system which pre-checks a
password before it is entered into the system, to determine whether that
password will be vulnerable to this type of attack. Passwords which can be
derived from a dictionary are clearly a bad idea,
%A Ana Marie De Alvare
%A E. Eugene Schultz, Jr.
%T A Framework for Password Selection
%J USENIX UNIX Security Workshop Proceedings
%D August 1988
%L Alvare1988
and users should be
prevented from using them. Of course, as part of this censoring process,
users should also be told why their proposed password is not good, and
what a good class of password would be.
As to those passwords which remain unbroken, I can only conclude that these
are much more secure and ``safe'' than those to be found in my dictionaries.
One such class of passwords is word pairs, where a password consists of two
short words, separated by a punctuation character. Even if only words of
3 to 5 lower case characters are considered, /usr/dict/words provides
3000 words for pairing. When a single intermediary punctuation character is
introduced, the sample size of 90,000,000 possible passwords is rather
daunting. On a DECstation 3100, testing each of these passwords against that
of a single user would require over 25 CPU hours - and even then, no
guarantee exists that this is the type of password the user chose.
Introducing one or two upper case characters into the password raises the
search set size to such magnitude as to make cracking untenable.
Another ``safe'' password is one constructed from the initial letters of an
easily remembered, but not too common phrase. For example, the phrase ``Unix
is a trademark of Bell Laboratories'' could give rise to the password
``UiatoBL.'' This essentially creates a password which is a random string of
upper and lower case letters. Exhaustively searching this list at 1000 tests
per second with only 6 character passwords would take nearly 230 CPU
days. Increasing the phrase size to 7 character passwords makes the
testing time over 32 CPU years - a Herculean task that even the most
dedicated cracker with huge computational resources would shy away from.
Thus, although I don't know what passwords were chosen by those users I was
unable to crack, I can say with some surety that it is doubtful that anyone
else could crack them in a reasonable amount of time, either.
Method of Attack
A number of techniques were used on the accounts in order to determine if the
passwords used for them were able to be compromised. To speed up testing,
all passwords with the same salt value were grouped together. This way, one
encryption per password per salt value could be performed, with multiple
string comparisons to test for matches. Rather than considering 15,000
accounts, the problem was reduced to 4,000 salt values. The password tests
were as follows:
Try using the user's name, initials, account name, and other relevant
personal information as a possible password. All in all, up to 130 different
passwords were tried based on this information. For an account name
Bklone with a user named ``Daniel V. Klein,'' some of the passwords that
would be tried were: klone, klone0, klone1, klone123, dvk, dvkdvk, dklein,
DKlein, leinad, nielk, dvklein, danielk, DvkkvD, DANIEL-KLEIN, (klone),
KleinD, etc.
Try using words from various dictionaries. These included lists of men's and
women's names (some 16,000 in all); places (including permutations so that
``spain,'' ``spanish,'' and ``spaniard'' would all be considered); names of
famous people; cartoons and cartoon characters; titles, characters, and
locations from films and science fiction stories; mythical creatures
(garnered from Bulfinch's mythology and dictionaries of mythical beasts);
sports (including team names, nicknames, and specialized terms); numbers
(both as numerals - ``2001,'' and written out - ``twelve''); strings of
letters and numbers ( ``a,'' ``aa,'' ``aaa,'' ``aaaa,'' etc.); Chinese
syllables (from the Pinyin Romanization of Chinese, a international standard
system of writing Chinese on an English keyboard); the King James Bible;
biological terms; common and vulgar phrases (such as ``fuckyou,'' ``ibmsux,''
and ``deadhead''); keyboard patterns (such as ``qwerty,'' ``asdf,'' and
``zxcvbn''); abbreviations (such as ``roygbiv'' - the colors in the rainbow,
and ``ooottafagvah'' - a mnemonic for remembering the 12 cranial nerves);
machine names (acquired from /etc/hosts); characters, plays, and
locations from Shakespeare; common Yiddish words; the names of asteroids;
and a collection of words
from various technical papers I had previously published.
All told, more than 60,000 separate words were considered per user (with any
inter- and intra-dictionary duplicates being discarded).
Try various permutations on the words from step 2. This included making the
first letter upper case or a control character, making the entire word
upper case, reversing the word (with and without the aforementioned
capitalization), changing the letter `o' to the digit `0' (so that the word
``scholar'' would also be checked as ``sch0lar''), changing the letter `l' to
the digit `1' (so that ``scholar'' would also be checked as ``scho1ar,''
and also as ``sch01ar''), and performing similar manipulations to change the
letter `z' into the digit `2', and the letter `s' into the digit `5'.
Another test was to make the word into a plural (irrespective of whether the
word was actually a noun), with enough intelligence built in so that
``dress'' became ``dresses,'' ``house'' became ``houses,'' and ``daisy''
became ``daisies.'' We did not consider pluralization rules exhaustively,
though, so that ``datum'' forgivably became ``datums'' (not ``data''), while
``sphynx'' became ``sphynxs'' (and not ``sphynges''). Similarly, the suffixes
``-ed,'' ``-er,'' and ``-ing'' were added to transform words like ``phase''
into ``phased,'' ``phaser,'' and ``phasing.'' These 14 to 17 additional
tests per word added another 1,000,000 words to the list of possible
passwords that were tested for each user.
Try various capitalization permutations on the words from step 2 that were not
considered in step 3. This included all single letter capitalization
permutations (so that ``michael'' would also be checked as ``mIchael,''
``miChael,'' ``micHael,'' ``michAel,'' etc.), double letter capitalization
permutations (``MIchael,'' ``MiChael,'' ``MicHael,'' ... , ``mIChael,''
``mIcHael,'' etc.), triple letter permutations, and so on. The single letter
permutations added roughly another 400,000 words to be checked per user,
while the double letter permutations added another 1,500,000 words. Three
letter permutations would have added at least another 3,000,000 words per
user had there been enough time to complete the tests. Tests of 4, 5, and
6 letter permutations were deemed to be impracticable without much more
computational horsepower to carry them out.
Try foreign language words on foreign users. The specific test that was
performed was to try Chinese language passwords on users with Chinese names.
The Pinyin Romanization of Chinese syllables was used, combining syllables
together into one, two, and three syllable words. Because no tests were
done to determine whether the words actually made sense, an exhaustive search
was initiated. Since there are 398 Chinese syllables in the Pinyin system,
there are 158,404 two syllable words, and slightly more than 16,000,000 three
syllable words.
The astute reader will notice that 398\s-2\u3\d\s+2 is in fact 63,044,972.
Since Unix passwords are truncated after 8 characters, however, the number
of unique polysyllabic Chinese passwords is only around 16,000,000.
Even this reduced set was too large to complete under the imposed time
constraints.
A similar mode of attack could as easily be used with English, using rules
for building pronounceable nonsense words.
Try word pairs. The magnitude of an exhaustive test of this nature is
staggering. To simplify this test, only words of 3 or 4 characters in length
from /usr/dict/words were used. Even so, the number of word pairs is
BOR(10\s-3\u7\d\s+3) (multiplied by 4096 possible salt values), and as of
this writing, the test is only 10% complete.
For this study, I had access to four DECstation 3100's, each of which was
capable of checking approximately 750 passwords per second. Even with this
total peak processing horsepower of 3,000 tests per second (some machines were
only intermittently available), testing the BOR(10\s-3\u10\d\s+3)
password/salt pairs for the first four tests
required on the order of 12 CPU months of computations. The remaining
two tests are still ongoing after an additional 18 CPU months of computation.
Although for research purposes this is well within acceptable ranges, it is a
bit out of line for any but the most dedicated and resource-rich cracker.
Summary of Results
The problem with using passwords that are derived directly from obvious words
is that when a user thinks ``Hah, no one will guess this permutation,'' they
are almost invariably wrong. Who would ever suspect that I would find their
passwords when they chose ``fylgjas'' (guardian creatures from Norse
mythology), or the
Chinese word for ``hen-pecked husband''? No matter what words or permutations
thereon are chosen for a password, if they exist in some dictionary, they are
susceptible to directed cracking. The following table give an overview of
the types of passwords which were found through this research.
A note on the table is in order. The number of
matches given from a particular dictionary is the total number of matches,
irrespective of the permutations that a user may have applied to it. Thus, if
the word ``wombat'' were a particularly popular password from the biology
dictionary, the following table will not indicate whether it was entered as
``wombat,'' ``Wombat,'' ``TABMOW,'' ``w0mbat,'' or any of the other 71 possible
differences that this research checked. In this way,
detailed information can be divulged without providing much knowledge to
potential ``bad guys.''
Additionally, in order to reduce the total search time that was needed for
this research, the checking program eliminated both inter- and
intra-dictionary duplicate words. The dictionaries are listed in the order
tested, and the total size of the dictionary is given in addition to
the number of words that were eliminated due to duplication. For
example, the word ``georgia'' is both a female name and a place, and is only
considered once. A password which is identified as being found in the common
names dictionary might very well appear in other dictionaries. Additionally,
although ``duplicate,'' ``duplicated,'' ``duplicating'' and ``duplicative'' are
all distinct words, only the first eight characters of a password are used in
Unix, so all but the first word are discarded as redundant.
Passwords cracked from a sample set of 13,797 accounts
_
Type of:Size of:Duplicates:Search:# of:Pct.:Cost/Benefit
Password:Dictionary:Eliminated:Size:Matches:of Total:Ratio\s-2\u*\d\s+2
=
User/account name:130\s-3\u\(dg\d\s+3:\-:130:368:2.7%:2.830
Character sequences:866:0:866:22:0.2%:0.025
Numbers:450:23:427:9:0.1%:0.021
Chinese:398:6:392:56:0.4%\s-3\u\(dd\d\s+3:0.143
Place names:665:37:628:82:0.6%:0.131
Common names:2268:29:2239:548:4.0%:0.245
Female names:4955:675:4280:161:1.2%:0.038
Male names:3901:1035:2866:140:1.0%:0.049
Uncommon names:5559:604:4955:130:0.9%:0.026
Myths & legends:1357:111:1246:66:0.5%:0.053
Shakespearean:650:177:473:11:0.1%:0.023
Sports terms:247:9:238:32:0.2%:0.134
Science fiction:772:81:691:59:0.4%:0.085
Movies and actors:118:19:99:12:0.1%:0.121
Cartoons:133:41:92:9:0.1%:0.098
Famous people:509:219:290:55:0.4%:0.190
Phrases and patterns:998:65:933:253:1.8%:0.271
Surnames:160:127:33:9:0.1%:0.273
Biology:59:1:58:1:0.0%:0.017
/usr/dict/words:24474:4791:19683:1027:7.4%:0.052
Machine names:12983:3965:9018:132:1.0%:0.015
Mnemonics:14:0:14:2:0.0%:0.143
King James bible:13062:5537:7525:83:0.6%:0.011
Miscellaneous words:8146:4934:3212:54:0.4%:0.017
Yiddish words:69:13:56:0:0.0%:0.000
Asteroids:3459:1052:2407:19:0.1%:0.007
_
Total:86280:23553:62727:B3340:B24.2%:0.053
In all cases, the cost/benefit ratio is the number of matches divided by the
search size. The more words that needed to be tested for a match, the lower
the cost/benefit ratio.
The dictionary used for user/account name checks naturally changed
for each user. Up to 130 different permutations were tried for each.
While monosyllablic Chinese passwords were tried for all users (with 12
matches), polysyllabic Chinese passwords were tried only for users with
Chinese names. The percentage of matches for this subset of users is 8% -
a greater hit ratio than any other method. Because the dictionary size is
over 16\(mu10\s-2\u6\d\s+2, though, the cost/benefit ratio is infinitesimal.
The results are quite disheartening. The total size of the dictionary was
only 62,727 words (not counting various permutations). This is much smaller
than the 250,000 word dictionary postulated at the beginning of this paper,
yet armed even with this small dictionary, nearly 25% of the passwords were
cracked!
Length of Cracked Passwords
_
Length:Count:Percentage
=
1 character:4:0.1%
2 characters:5:0.2%
3 characters:66:2.0%
4 characters:188:5.7%
5 characters:317:9.5%
6 characters:1160:34.7%
7 characters:813:24.4%
8 characters:780:23.4%
The results of the word-pair tests are not included in either of the two
tables. However, at the time of this writing, the test was approximately 10%
completed, having found an additional 0.4% of the passwords in the sample
set. It is probably reasonable to guess that a total of 4% of the passwords
would be cracked by using word pairs.
Action, Reaction, and Proaction
What then, are we to do with the results presented in this paper? Clearly,
something needs to be done to safeguard the security of our systems from
attack. It was with intention of enhancing
security that this study was undertaken. By knowing what kind of passwords
users use, we are able to prevent them from using those that are easily
guessable (and thus thwart the cracker).
One approach to eliminating easy-to-guess passwords is to periodically run a
password checker - a program which scans /etc/passwd and tries to
break the passwords in it.
%A T. Raleigh
%A R. Underwood
%T CRACK: A Distributed Password Advisor
%J USENIX UNIX Security Workshop Proceedings
%D August 1988
%L Raleigh1988
This approach has two major drawbacks. The first
is that the checking is very time consuming. Even a system with only 100
accounts can take over a month to diligently check. A halfhearted check is
almost as bad as no check at all, since users will find it easy to circumvent
the easy checks and still have vulnerable passwords. The second drawback is
that it is very resource consuming. The machine which is being used for
password checking is not likely to be very useful for much else, since a
fast password checker is also extremely CPU intensive.
Another popular approach to eradicating easy-to-guess passwords is to force
users to change their passwords with some frequency. In theory, while this
does not actually eliminate any easy-to-guess passwords, it prevents the
cracker from dissecting /etc/passwd ``at leisure,'' since once an
account is broken, it is likely that that account will have had it's password
changed. This is of course, only theory. The biggest disadvantage is that
there is usually nothing to prevent a user from changing their password from
``Daniel'' to ``Victor'' to ``Klein'' and back again (to use myself as an
example) each time the system demands a new password. Experience has shown
that even when this type of password cycling is precluded, users are easily
able to circumvent simple tests by using easily remembered (and easily
guessed) passwords such as ``dvkJanuary,'' ``dvkFebruary,'' etc.
%A Dr. Brian K Reid
%D 1989
%I DEC Western Research Laboratory
%O Personal communication.
%L Reid1989
A good
password is one that is easily remembered, yet difficult to guess. When
confronted with a choice between remembering a password or creating one that
is hard to guess, users will almost always opt for the easy way out, and
throw security to the wind.
Which brings us to the third popular option, namely that of assigned
passwords. These are often words from a dictionary, pronounceable nonsense
words, or random strings of characters. The problems here are numerous and
manifest. Words from a dictionary are easily guessed, as we have seen.
Pronounceable nonsense words (such as ``trobacar'' or ``myclepate'') are
often difficult to remember, and random strings of characters (such as
``h3rT+aQz'') are even harder to commit to memory. Because these passwords
have no personal mnemonic association to the users, they will often write
them down to aid in their recollection. This immediately discards any
security that might exist, because now the password is visibly associated
with the system in question. It is akin to leaving the key under the door
mat, or writing the combination to a safe behind the picture that hides it.
A fourth method is the use of ``smart cards.'' These credit card sized
devices contain some form of encryption firmware which
will ``respond'' to an electronic ``challenge'' issued by the system onto
which the user is attempting to gain acccess. Without the smart card, the
user (or cracker) is unable to respond to the challenge, and is denied access
to the system. The problems with smart cards have nothing to do with
security, for in fact they are very good warders for your system. The
drawbacks are that they can be expensive and must be carried at all times
that access to the system is desired. They are also a bit of overkill for
research or educational systems, or systems with a high degree of user
turnover.
Clearly, then, since all of these systems have drawbacks in some
environments, an additional
way must be found to aid in password security.
A Proactive Password Checker
The best solution to the problem of having easily guessed passwords on a
system is to prevent them from getting on the system in the first place. If
a program such as a password checker reacts by detecting guessable
passwords already in place, then although the security hole is found, the hole
existed for as long as it took the program to detect it (and for the user to
again change the password). If, however, the program which changes user's
passwords (i.e., /bin/passwd) checks for the safety and guessability
before that password is associated with the user's account, then the
security hole is never put in place.
In an ideal world, the proactive password changer would require eight
character passwords which are not in any dictionary, with at least one
control character or punctuation character, and mixed upper and lower case
letters. Such a degree of security (and of accompanying inconvenience to the
users) might be too much for some sites, though. Therefore, the proactive
checker should be tuneable on a per-site basis. This tuning could be
accomplished either through recompilation of the passwd program, or
more preferably, through a site configuration file.
As distributed, the behavior of the proactive checker should be that of
attaining maximum password security - with the system administrator being
able to turn off certain checks. It would be desireable to be able to test
for and reject all password permutations that were detected in this research
(and others), including:
Passwords based on the user's account name
Passwords based on the user's initials or given name
Passwords which exactly match a word in a dictionary (not
just /usr/dict/words)
Passwords which match a word in the dictionary with some or all
letters capitalized
Passwords which match a reversed word in the dictionary
Passwords which match a reversed word in the dictionary with some or all
letters capitalized
Passwords which match a word in a dictionary with an arbitrary letter turned
into a control character
Passwords which match a dictionary word with the numbers `0', `1', `2', and
`5' substituted for the letters `o', 'l', 'z', and 's'
Passwords which are simple conjugations of a dictionary word (i.e., plurals,
adding ``ing'' or ``ed'' to the end of the word, etc.)
Passwords which are patterns from the keyboard (i.e., ``aaaaaa'' or ``qwerty'')
Passwords which are shorter than a specific length (i.e., nothing shorter than
six characters)
Passwords which consist solely of numeric characters (i.e., Social Security
numbers, telephone numbers, house addresses or office numbers)
Passwords which do not contain mixed upper and lower case, or mixed letters
and numbers, or mixed letters and punctuation
Passwords which look like a state-issued license plate number
The configuration file which specifies the level of checking need not be
readable by users. In fact, making this file unreadable by users (and by
potential crackers) enhances system security by hiding a valuable guide
to what passwords are acceptable (and conversely, which kind of
passwords simply cannot be found).
Of course, to make this proactive checker more effective, it woule be
necessary to provide the dictionaries that were used in this research
(perhaps augmented on a per-site basis). Even more importantly, in addition
to rejecting passwords which could be easily guessed, the proactive password
changer would also have to tell the user why a particular password was
unacceptable, and give the user suggestions as to what an acceptable password
looks like.
Conclusion (and Sermon)
It has often been said that ``good fences make good neighbors.'' On a
Unix system, many users also say that ``I don't care who reads my files, so I
don't need a good password.'' Regrettably, leaving an account vulnerable to
attack is not the same thing as leaving files unprotected. In the latter
case, all that is at risk is the data contained in the unprotected files,
while in the former, the whole system is at risk. Leaving the front door to
your house open, or even putting a flimsy lock on it, is an invitation to the
unfortunately ubiquitous people with poor morals. The same holds true for an
account that is vulnerable to attack by password cracking techniques.
While it may not be actually true that good fences make good neighbors, a
good fence at least helps keep out the bad neighbors. Good passwords are
equivalent to those good fences, and a proactive checker is one way to
ensure that those fences are in place before a breakin problem occurs.
-----------------------------------------------------------------------------
/ /
/ NIA 072 / File 5 /
/ /
/ JONAS & ERICKSON /
/ PRIME EXL-316 /
/ /
/ Terminal_Erection /
/ /
Differences between the C.T. & Prime EXL
- You Can't log in as root anywhere except the console.
(But you can log in as mars and then use the su command).
- The console port prompt is Console Login: and everyone else is
the standard login:
- You will not have to re-configure the kernel anymore. Three
kernels are provided by corporate services on a separate tape.
- The /etc/rc file is now /etc/rc2.
- There is a system administrator command that allows you to add
users, assign passwords, install additional hardware and a lot
more.
- On-line help facility call 'help', for most unix commands.
- No /etc/issue file, must use /etc/motd.
- No 'more' command, must use 'pg'.
- The <ESC> key is now the <DEL> key.
- You may not backspace while logging in.
(The system will ask for a password, press <RETURN> to get the
login prompt back.)
- To see the directories in column format you must use the ls -C
command.
- In the /etc/gettydefs file all the labels have an 'h' in front
except the 9600 label (eg. 1200 is now h1200, 300 is now h300)
- The Prime Exl does not support parallel printers.
- The STOP button on the front of the EXL is equal to the
shutdown command.
- All formatting and partitioning of the disks is done
automatically. (Explained later).
- tty device names are different.
(eg. /dev/tty01, /dev/console, /etc/ttyax)
- Tape device name is /dev/rct/c0d5. (Not /dev/rmt0).
- Configurable kernel is an extra cost add-on. Since we didn't
want to add the cost to every system, we obtained Prime's
permission to send out pre-configured kernels from corporate
services. Unfortunately this means you cannot reconfigure the
kernel in the field.
CHECKLIST
Page Check Description
4 _____ 1. Connect console terminal
5 _____ 2. Install operating system
6 _____ 3. Initial system setup
8 _____ 4. Restoring the kernel
9 _____ 5. Configuring terminals and ports
11 _____ 6. Edit /etc/gettydefs
12 _____ 7. Edit /etc/rc2
13 _____ 8. Edit /etc/profile
13 _____ 9. Create directories
14 _____10. Install Thoroughbred Basic
15 _____11. Install J & E programs
15 _____12. Edit IPLINPUT
16 _____13. Adjust terminal types
17 _____14. Add appropriate /mars /backup /fullback and
/printbu shell scripts.
18 _____15. Edit /etc/passwd to add mars login code and a
set of login codes specific to the client.
20 _____16. Create /etc/motd file for J&E welcome message at
login.
20 _____17. Reboot system, test client login.
21 _____18. Define all J&E data files as per client file
sizing.
21 _____19. Test as much as you can.
21 _____20. Label special ports at the rear of the system,
take a full backup, and repack it for shipping.
21 _____21. Disable / Enable lock.
22 Simplified System Administration.
23 Prime EXL-316 Cabling Information.
DETAILED DESCRIPTIONS
These instructions have been written by a programmer, to a
programmer. If you are not a programmer and you can't fake it,
then you really should go and get one. In many instances, we
have given very exacting detail, but things can go wrong. Also,
the instructions are given in a way that each step could be
performed separately. However, generally, you can get a lot of
overlap in by combining steps and not rebooting the system until
you have to in order to test something.
Below is a diagram showing you the port layout on the EXL. Please
note that the EXL ports are numbered in the octal number system.
Prime EXL-316
-------------------
| | Where:
| ( REAR VIEW ) |
| | A=ttyax
| | C=console
| | V=Voltage selector
| |
| V | Number=tty ports
| |
| A |
| C 00 10 20 |
| 01 11 21 |
| 02 12 22 |
| |
| 03 13 23 |
| 04 14 24 |
| 05 15 25 |
| 06 16 26 |
| 07 17 27 |
| |
--------------------
FIGURE 1-1
Caution:
Before doing anything set the voltage selector switch to 115V on
the rear on the EXL.
Step 1. (Getting the EXL ready)
Unpack the computer using the instruction in the Prime
installation and operation guide.
Check the following list before doing anything to make sure you
have all the tools you require to do the install.
_____ Delivery of Prime EXL & terminals.
_____ Jonas & Erickson software tape, (From Corporate Services).
_____ Jonas & Erickson kernels tape, (From Corporate Services).
_____ Prime EXL Operating Systems tape.
_____ Prime EXL Extended Diagnostic tape.
_____ Thoroughbred Basic tape.
_____ Thoroughbred Basic manual
_____ Thoroughbred Basic passport security device (small box).
_____ Prime terminal cables. ( RJ45 to RS232 )
_____ Prime EXL-316 power cable.
_____ Small Standard Screwdriver & 3/16" nut driver.
Five manuals supplied by Prime. They are:
_____ 1. Systems Administrator Reference Manual.
_____ 2. Systems Administrator Guide.
_____ 3. Users guide.
_____ 4. Users Reference Manual.
_____ 5. Installation and Operation Guide.
INSTRUCTIONS:
- Unpack and place the inserts for the Prime manuals in the
correct sequence.
- If you have not done so, set the voltage selector switch to 115
volts on the rear of the computer.
- Remove the shipping insert that should be in the tape drive.
- Connect the power cord & plug it in the wall.
- Unpack the terminal & plug it in to the wall.
- Connect the communications cable from the console port,
(see diagram 1-1) to the fixed female connection on the
passport. Notice that the cable has a removable sex-changer
that must be removed & connected separately using a 3/16" nut
driver. Connect the ribbon cable from the passport, (small box)
to the main port on the terminal.
- Set your terminal as follows:
Terminal settings
Baud rate : 9600
Data bits : 8
Stop bits : 1
Parity : none
Handshake : XON/XOFF
Communications : Full Duplex
Emulation : TVI925
- Press the power on switch at the rear on the computer.
(0 = Off, 1 = On)
- Make sure the control panel key is set to ENABLE.
Step 2. (Installing the Prime EXL UNIX operating system.)
- Insert the tape marked "PRIME EXL tm Operating System" supplied
by PRIME, into the tape drive. Make sure the indicator is in
the safe position. (Insert opening in the tape to the left,
metal plate face down.)
- Press the START switch. The EXL will do some diagnostics, play
some music, display some messages and after a few minutes will
come up to the # prompt.
- At the # prompt, enter:
# install (CR)
The system may display a date and time and ask if you wish to
change the time zone plus the date & time. You should reply no
since this is described later on.
Change the time zone? [y,n,?,q] n(CR)
Change the date and time? [y,n,?,q] n(CR)
Formatting will start and will take approximately 10 minutes.
You will see:
Formatting....
.
.
.
Partitioning the disk...
Creating empty root file system on /dev/dsk/c0d0s0.
Creating empty usr file system on /dev/dsk/c0d0s1..
Installing root file system on /dev/dsk/c0d0s1...
Installing usr file system on /dev/dsk/c0d0s1...
Rewinding tape...
Writing boot block...
When the installation is complete you will see:
The PRIME EXL Operating System is now installed.
Remove the cartridge tape and press STOP.
- Do what it said. (The STOP key in on the front of the EXL.)
Let the EXL power down completely. The operating system has
been installed and two partitions have been installed. They are
/root and /usr.
- Press the START key. This should now boot the operating system
off the disk.
- At the Console Login: prompt type
Console Login: root (CR)
- Insert the "PRIME EXL tm Extended Diagnostics Monitor" tape
provided by Prime. (Make sure the indicator is set to safe)
- At the # prompt type:
# cd /dedgmon (CR)
then type: (Note: The next command is in upper case)
# INSTALL (CR)
You will be prompted to "install" tape and press <RETURN> key
when ready. Do so. This will install the extended diagnostic on
to the Prime EXL's operating system. (Takes about 1 minute)
- Once you see "edmon installation complete" remove the tape from
the tape drive and put it back in the plastic cover.
Step 3 (Initial system setup)
At the # prompt type:
# cd / (CR)
# sysadm setup (CR)
You will be prompted to:
1. Set the time zone.
2. System date & time.
3. First user on the system. (mars)
4. To enter a root password
5. Naming the computer
Note: sysadm is a utility that allows you to do most of the
administrative work you would normally have to do by editing
files.
eg. Add users, delete user, add tty ports, change passwords etc
(See page 19 of this manual for further details)
For sysadm procedure most responses are:
y=Yes, n=No, ?=Display more info, q=Quit
Date and Time:
Current time and zone is : 15:55 EDT
Change the time zone? [y,n,?,q]
If the time zone is not correct then type y (CR)
You will be prompted to choose between 10 time zones.
Enter (1-10)
This will edit the /etc/TIMEZONE file.
Does your time zone use Daylight Savings Time during the year?
Answer y or n. (CR)
Change the date and time [y,n,q,?]
If you answer y (CR) then you will be prompted to enter the hour
and minute etc.
Setting up the first login:
You will prompted:
Enter user's full name [?,q]: mars (CR)
Enter user's login ID [?,q]: mars (CR)
Enter user ID number (default 100) [?,q]: (CR)
Enter group ID number or group name
(default 1) [?,q]: (CR)
Enter the user's login (home) directory name.
(default '/usr/mars') [?,q]: (CR)
This is the information for the new login:
User's name: mars
login ID: mars
user ID: 100
group ID: 1
home directory: /usr/mars
Do you want to install,edit, or skip this entry
[i,e,s,q]? i (CR)
Login installed.
Do you want to give the user a password? [y,n] n (CR)
Do you want to add another login? [y,n,q] n (CR)
Assigning a password to root
Do you want to give passwords to administrative logins
[y,n,?,q] n (CR)
Do you want to give password to system logins?
[y,n,q,?] n (CR)
Naming the machine
This machine is currently called "exl".
Do you want to change it? [y,n,q,?] n (CR)
Step 4. ( Restoring J & E kernels )
Restoring J & E kernels
The commands are as follows:
-put in the J&E EXL kernel tape into the tape drive.
# cd / (CR)
# cpio -icvdumaB < /dev/rct/c0d5 (CR)
... (restores the file ...
When complete remove the tape & return it to its plastic covering
(Note: Should restore three files)
You now have four versions of unix on the system disk, the system
that was distributed, as well as three new versions.
They are: /unix (Distributed version)
/je.unix.8 (Eight user version)
/je.unix.16 (Sixteen user version)
/je.unix.24 (Twenty-four user version)
/je.DOC (A copy of this manual)
Future use ---> /je.create.t1 (Makes nodes for tty20-tty27)
Future use ---> /je.create.t2 (Makes nodes for tty30-tty57)
Start by making a backup of the current kernel.
cp /unix /unix.save(CR)
If you have a 8 user system you simply copy /je.unix.8 to /unix.
If you have a 16 user system you copy /je.unix.16 to /unix etc.
In this example we are assuming you have a 24 user system, so we
would type:
Warning: If you don't have a 24 user system do not use the bigger
shell. There are memory restrictions.
mv /je.unix.24 /unix (CR)
Now sync the disks by typing:
sync;sync;sync (CR)
Now, press the STOP button (on the front of the machine). Ignore
warning messages which may appear. They appear because the
current "/unix" is not the same as the one which was booted.
Once the system is powered down completely, press the START
button. The new kernel you just installed is now being booted.
Step 5. ( Configuring terminals and printers )
The file /etc/inittab configures the terminal ports on the
system. Please note that this controls login terminals only.
Ports to be used for serial printers will have to be turned off
here and configured in /etc/rc2. Other ports that you would want
turned off would include transport ports, and ports for any
serial devices which are not login terminals such as point-of-
sale devices. Modems count as login terminals.
Our first task here is to determine the correspondence between
the physical port labels, and the unix terminal device names (tty
numbers). On EXL-316s Port tty00 is the port on the first
communications board labelled channel 1 (the first communications
board is the left most when viewed from the rear, labelled 1 to
8). It is important to know the ports are numbered in octal. They
go 0 to 7, 10 to 17, 20 to 27 etc. Also there are two ports that
Prime has installed that are called ttyax and console. The ttyax
will be used for the modem and console is the system console.
(See diagram 1-1). Port tty00 is the port labeled channel 1.
Ports tty00 through tty07 are on the first RS232 expansion board.
The second RS232 expansion board is further right consisting of
ports tty10 through tty17, and so on (Remember the ports are
numbered in octal). The RS232 expanders come in 8 port version.
All versions use 8-pin RJ45 connectors. (Big telephone jacks).
What we have to do, is determine which ports will physically be
connected to a login terminal, and make sure that the
corresponding lines in /etc/inittab are enabled. Take some time
at this point to decide which equipment you will be plugging into
which port. After you have determined which ports can physically
have terminals it is necessary to edit /etc/inittab to tell the
system what's what. J&E's standard is to always connect the
support modem to ttyax, and to assign ports to non-terminal
devices (such as printers) starting at the end and working back.
The format of a line in /etc/inittab is as follows:
nn:X:Y:/etc/getty T Z
where-nn is the port number (co=console, ta=ttyax, ##=number of
tty port, in octal.)
-X is the word off if the port is to be turned off. If
the port is to be turned on, then X will be a number
which must contain the digit 2.
-Y should be the word respawn. If it is the word off, then
the port is again turned off (Note: This is the preferred
way of turning off a port).
-T is the tty number
-Z is a label corresponding to an entry in the file
/etc/gettydefs. IT IS NOT the baud rate, although the
labels used usually correspond to a baud rate for
convenience. The usual values for Z are either 9600,
h1200, or h300 (for modems). You should only need to
change this to set modem ports.
There are three ways to turn a port off. The preferred way is to
change the word Y from respawn to off. The second way is to
change the number X to the word OFF. The third way is to place a
colon as the first character of the line making the entire line a
comment.
You should ensure that all the ports that the machine physically
will have login terminals connected to are turned on. Do not
turn on any ports that will not have a terminal connected, even
if the client will be adding terminals in a little while, as this
will slow down the system. If you turn on a port that the
machine does not physically have then T0 (console) will get
periodic error messages, messing up the screen displays.
After making changes to /etc/inittab, they will automatically go
into effect in about 5-10 minutes, or following a reboot. You
can also put them into effect immediately by the root command:
# telinit q(CR)
#
On a typical new system, only console will be turned on.
If you are not familiar with any Unix editor, then the following
is intended as a key by key guide for someone setting up
/etc/inittab for the first time, but this would be a good time to
learn the ed editor as its multi-line replacement will save you
some time.
Console Login: root(CR)
# ed /etc/inittab(CR) <-- invoke line editor
1227 <-- system responds with the # of chars (May differ)
/nn(CR) <--finds the definition line for ttynn
nn:X:Y:/etc/getty tttttt Z <--note X, Y and Z will
have some value that we will check
<-- make sure that X is 2 - if it isn't then change it by
s/3/2(CR) <-- eg. X was "3" but we wanted "2"
<-- make sure that Y is respawn - if it isn't then change it
s/off/respawn(CR) <-- eg. Y was "off" but we wanted
"respawn"
<-- make sure that Z is correct for the login device you are
using as follows: 9600 for normal 9600 baud login
terminal, h1200 for 1200 baud modem, h300 for 300 baud
modem
<-- if Z is incorrect, then change it by
s/9600/h1200(CR) <-- eg. Z was 9600 but we wanted h1200
<-- after each "s" for substitute command above, the system
will respond by echoing back the new line
Repeat the above sequence for each login port until all the ones
that you are going to use are turned on. Also, make sure that
any ports that you will use for special equipment such as serial
printers, cash registers, transport ports, etc. (anything that is
not a login terminal) are left turned off (ie. off instead of
respawn). When you are done editing, exit the editor as follows:
w <-- rewrite the file
1397 <-- responds with the new number of chars (May differ)
q <-- to quit the editor
On the EXL's we've seen so far, only the console port is turned
on by default. Also, you will probably want to change the baud
rate on the ttyax post to be h1200 (or h300).
Step 6. (Editing gettydefs)
You should change /etc/gettydefs on all EXL-316s. Basically,
this file contains the initial stty options for terminals
'respawn'ed by 'getty' as per 'inittab' (remember inittab?).
Each line in gettydefs starts with a label used in inittab, and
ends with another label to use if the user hits the break key
while logging in. This is how variable baud rates are handled on
a single port as the labels, by convention, correspond to baud
rates. The trouble with this is that autobaud detect modems get
confused, so its better to disable this.
Caution: as the file /etc/gettydefs contains lines that are more
than 200 characters long, we recommend that you do not use vi to
make the changes. The steps below, effect the change using the
ed editor.
Console Login: root(CR)
# ed /etc/gettydefs(CR) <-- invoke line editor
1002 <-- response is # of chars (May differ)
/B300(CR) <-- find the 300 baud label
...
s/9600/300(CR) <-- change it to loop to itself
...
/B1200(CR) <-- find the 1200 baud label
...
s/300/1200(CR) <-- change it to loop to itself
...
/B2400(CR) <-- find 2400 baud label
...
s/1200/2400(CR) <-- change it to loop to itself
... <-- response is new login line
w(CR) <-- rewrite the file
1002 <-- response is new # of chars (May differ)
q(CR) <-- quit to Unix
#
The new parameters will go into effect following the next
shutdown and reboot.
Step 7. (Editing rc2)
The file /etc/rc2 is a Unix shell script that runs every time the
system is rebooted. There are two things that we have had
occasion to change in this file. These are as follows:
a. Define communications parameters for serial printers.
Basically this involves getting a "sleep" command going on the
port and using "stty" to set the baud rate, etc. The following
key by key example adds the commands necessary to define a
printer on tty17 with 8-bits, no parity and x-on/x-off flow
control (our standard for serial printers on CT's).
Console Login: root(CR)
# ed /etc/rc2(CR) <-- invoke the line editor
1290 <-- system response is # of chars (May differ)
$a(CR) <-- editor command to append at the bottom
(there is no prompt in response)
sleep 2000000 > /dev/tty17 &(CR) <-- add sleep
command
stty 9600 cs8 -parenb ixon ixoff ixany -echo < /dev/tty17 &(CR)
.(CR) <-- editor command to get out of append mode
w(CR) <-- to rewrite the file
1379 <-- system response, is # of chars. (May differ)
q(CR) <-- to quit the editor
# <-- shutdown and reboot to get new stty parameters set
Note the ampersand (&) at the end of the sleep and stty commands.
It is critically important as the /etc/rc2 script file will never
finish executing if the cable is ever pulled out, and
consequently, the system will never finish booting! If this
happens, call for help. You'll need to boot from tape to get the
system going again (or plug the cable back in).
b. Start spooler if necessary. Since you should only do this
under very special circumstances the Unix spooler is not covered
here. Please refer to the separate document in the System
Administrator Reference manual and/or call for help.
Step 8. (Editing profile)
The file /etc/profile is executed for each terminal that logs in
to Unix in a standard manner. Please note that the way we set up
basic users does not pass through this, so it's not very useful
to J&E. You may have occasion to use it if you are setting up
logins for other Unix applications or using the help command in
unix.
The file /.profile is executed each time you login as root. The
default file sets the file creation parameters so that if root
creates a file, other login's cannot use it. We recommend
changing this in case any Basic work is ever done from root.
Console Login: root (CR)
# cd /etc(CR)
# ed profile(CR)
... <-- system response in number of chars
/umask(CR) <-- find umask line
umask 022 <-- response is current setting
s/22/00(CR) <-- change 022 to 000
umask 000 <-- response is changed line
/pt200 <-- find pt200 line
s/pt200/tvi925 <-- change terminal type to TVI925
export TERM; TERM=tvi925 #default terminal type <-- response
w(CR) <-- rewrite the file
887 <-- new number of chars (May differ)
q(CR) <-- quit the editor
Step 9. (Creating directories)
For Thoroughbred Basic (formerly SMC Basic), the J&E standard is
to set up a directory called "JE" on each file system on the
machine. This allows us to distinguish our stuff from other Unix
stuff, while still permitting Basic to get at all of the
available disk space. Before you create the directories, get
started with the following commands. They set the default
permissions on the files so that any user can have full access.
Console Login: root(CR)
# umask 0(CR) <-- set default full permissions
#
The next step is to get a list of the file systems on the
machine.
Type in:
# df -t(CR) <-- "disk free" command lists file systems
Each file system has a two line description. The first part is
the part which we need - the full pathname of the mount point
(directory) of the file system. Also, make note of the number of
free blocks (of 1024 bytes each) on each file system. On a
typical EXL-316 with one 258Mb drive, you will have the following
file systems; / and /usr, with /usr having the most free space.
(About 200 mb). Create an JE directory on each file system except
the root file system (/) with the mkdir command. (In this case we
would create a "JE" directory on /usr only.)
It is a bad idea to allow JE to create files on the root file
system. There's typically not a lot of space there and you could
create problems if a large file gets accidently created on this
file system and fills the root directory. For this reason, the
following installation procedure does NOT create a /JE directory.
In effect, your client's machine will have some "spare" disk
space that you could make available in the future if the system
gets close to being full. (on a 258 mb drive this is on 7 mb)
Using the EXL-316 example, the command would be:
# mkdir /usr/JE(CR)
Within the JE directory, we must now create sub-directories for
various uses by basic. There will be one "main working
directory" for basic where all the programs, all the work files
and the Thoroughbred Basic interpreter itself reside. The
remaining data files may be spread around as desired to make best
use of the available disk space.
To create the sub-directories for the main JE directory use:
# mkdir /usr/JE/WORK /usr/JE/DATA0 /usr/JE/PGM(CR)
(Note that the UTILS directory for the Basic utilities will be
created automatically when we install the interpreter).
Please number your data directories in order of preference of
using up space. Generally, number them in order from most
available space to least. In a later step, we will configure
Basic to assign a "logical disk" number to each JE sub-directory
(in IPLINPUT).
Step 10.(Installing Thoroughbred)
The installation steps are as follows:
- put the Thoroughbred tape in the drive (Openings in tape to
left, metal plate face down. Make sure safe indicator is to
safe position).
Console Login: root(CR)
# cd /usr/JE(CR) <-- change to the main directory for Basic
# cpio -icvdumaB < /dev/rct/c0d5(CR) <-- to restore tape
...... <-- will list the files as they're loaded
nn blocks
#
(Note: This takes about 1 minute to restore)
- When completed Remove the tape from the tape drive.
Step 11. (Installing J & E programs)
J&E's convention for programs is to install all programs on the
main working directory for Basic (/usr/JE always) under the
subdirectory PGM. If the systems that you require came on more
than one tape, then repeat these steps for each tape.
- put the tape in the drive (Openings in tape to left, metal
plate face down.)
Console Login: root(CR)
# cd /usr/JE/PGM(CR) <-- change to the main directory for
Basic - subdirectory PGM for programs
# cpio -icvdumaB < /dev/rct/c0d5(CR) <-- to restore tape
tape will list the files as they're
(and overwrite any previous programs with
the same name.
nn blocks
#
(Note: This takes about 2-5 minutes, depending on
the number of programs being restored).
- When completed Remove the tape from the tape drive.
Step 12. (Editing IPLINPUT)
The file IPLINPUT in the main working directory for Basic is the
interface configuration file between Basic and the unix operating
system. It is used to associate the names of system devices and
disk directories between what unix uses, and what Basic uses.
The IPLINPUT file as released requires at least the addition of
one or two disk directories. In addition, you would have to
change IPLINPUT for the following:
- serial printers
- transport ports
- foreign devices (eg. POS cash registers)
- a spooled printer
(Note: The EXL-316 does not support parallel printers)
It is possible to have several completely separate IPLINPUT files
on the same machine, thereby setting up individual working
environments that have no overlap (or even that do have some
overlap). While this is good for an in-house development
environment, we strongly advise against it on a client system.
The IPLINPUT file as released with the Thoroughbred Basic tape
contains the following:
CNF 1,5,1,18,CUTERR <-- 5 must match the # of DEV statements
PTN 1,60000
DEV D0,1,,,,,,UTILS
DEV D2,1,,,,,,WORK
DEV T0,1,,,,,,tty
DEV LP,4,,136,,,,lp
DEV P7,4,,,,,,null
IPL 1,2,T0,*JPSD
END
By now, you should be fairly familiar with the workings of the
editor, so the following descriptions will not give the key-by-
key commands to make changes to IPLINPUT.
Change IPLINPUT to look like the following:
CNF 1,6,1,18,CUTERR <-- Notice 6 matches number of DEV
PTN 1,60000
DEV D0,1,,,,,,UTILS
DEV D1,1,,,,,,WORK
DEV D2,1,,,,,,PGM
DEV D3,1,,,,,,DATA0
DEV T0,7,,,,,,tty
DEV LP,4,,136,,,,tty17
IPL 1,2,T0,GO <-- starts program GO on initial login
END
UPDATE: for all of these devices to be accessible to Basic users,
you will need to change the default permissions on the device
special files in the /dev directory. For example, for the above
mentioned device, the commands would be:
# chmod a+rwx /dev/tty17(CR) <-- for serial printing
Step 13.(Adding terminals to "TERMINAL" / Adjust terminal types)
There is a file called "TERMINAL" in the /usr/JE directory. This
file should contain one entry called console. TERMINAL is the
file that contains all the valid terminal that can access
Thoroughbred basic. So, you must add all the terminals that will
be used by Thoroughbred Basic. An example of what the file should
contain is listed below. Remember the terminal numbers are using
the octal number system. Also Thoroughbred has a limit to the
number of entries that can be in this file. The label on the
passport device will tell you how many terminals you can
configure.
Example of 16 user system:
console
ttyax
tty00
tty01
tty02
tty03
tty04
tty05
tty06
tty07
tty10
tty11
tty12
tty13
tty14
tty15
The TCONFIG file defines for Basic exactly what the
characteristics are of each terminal on the system. The TCONFIG
file can be modified using the *NPSD utility. The terminal names
are in the Basic format Tx. Run the utility program *NPSD to
change the terminal model codes to TVI950. If you have any old
MAI terminals on the system, you will have to use *NPSD to change
their model code to B4 7250 (Note the space in the name).
To access *NPSD directly type:
Console Login: root(CR)
cd /usr/JE(CR)
./b ./IPLINPUT.term(CR)
Note: The terminal numbering system starts at T0 thru T9 then TA,
TB, TC etc.
Warning: Do not use this method of getting into BASIC after the
system is in production as you always get T0 reguardless
of which terminal you really are.
Step 14. (Adding J & E utilities)
To each EXL machine, we add four utility shell scripts. Three of
these (/mars, /fullback and /printbu) are identical on every
system. The fourth and most important (/backup) depends on the
disk structure used in configuring the system. The contents of
the shell scripts and a description of their functions follows.
As you should be familiar with the operation of one of the
editors by now, the detail has been left out.
/mars shell script - this script is simply used by J&E staff to
get into Thoroughbred Basic if we have logged in as root instead
of the normal customer login. The contents are as follows:
echo '... and AWAY we go ...'
cd /usr/JE
./b
/fullback shell script - this script is used for performing a
full backup on the system. This will include everything on every
disk on the machine. The contents are as follows:
cd /
find . -print | cpio -ovcB > /dev/rct/c0d5
/printbu shell script - this script is used for listing the
contents of a backup tape on the parallel line printer. The
contents are as follows:
cpio -icvdumtaB < /dev/rct/c0d5 > /dev/tty17
Note:(/dev/tty17 is an example only.)
The fourth and final (and most important) shell script is the
/backup script. This is the script that the client will use for
their critical nightly backups. It is vitally important that you
get this one right, and that you carefully test it before
installing the machine. An example follows:
cd /
find usr/JE -print > /bulist
find u/JE -print >> /bulist (Note: only if /u exists)
cpio -ovcB < /bulist > /dev/rct/c0d5
Basically, this procedure is building up a list of all of the
files and sub-directories in all of the Basic disk directories.
This list is then passed as input to the cpio backup routine.
The differences between this example, and what you require for
your system would be only in the number of find commands. Note
the use of the Unix redirection symbols > and >> for sending the
output of the find command into the file /bulist. The first find
command in the script file has only one > which means to replace
any old /bulist file with the new list. The remaining find
commands have two >> which means to APPEND the output from the
find command to the target file /bulist.
To test the procedure, run the backup as documented in the user
startup/shutdown/backup procedures, and run a /printbu on the
tape. Carefully check the output and make sure that all JE
directories and files were backed up.
When a file is created by the ed or vi editors, the default
permissions exclude execute permission. Therefore, before these
four script files can be run, you need to use the chmod (change
mode) command to add execute permissions as follows:
# chmod a+rwx /mars /backup /fullback /printbu(CR)
Step 15. ( Adding users )
Change is required to the /usr/JE/.profile file so when a user
logs in, it will automatically take them to BASIC.
Console Login: root(CR)
cd /usr/JE(CR)
ed .profile(CR) <-- edit .profile file
1i(CR) <-- insert to top of file
stty -lcase(CR) <-- Set terminal to lower case
.(CR) <-- end append mode
w(CR) <-- write changes to file
21 <-- Displays number of char. in file
q(CR) <-- quit editor
The above file should now contain:
stty -lcase
./b
exit
The file /etc/passwd defines all the legal user's to the system
and (optionally) associates a password with each. Our purpose
here is to simply define several logins that automatically run
Basic on login, and automatically log-out when you RELEASE from
Basic. This protects the client from having to learn anything
about Unix. Please note that passwords are not covered here. If
your customer is concerned about security, and wants passwords on
the user logins, then you should refer them to the administrators
manual (sysadm modusr command. covered later in this document).
Suppose the client's company name is RCH Construction, and you
decide to pick the letters rch as the client login (must be lower
case), then you would add the following lines to /etc/passwd.
The first number is the 'user number' and must be different for
each login, so you should first look at the last line in
/etc/passwd and find the highest used number. Suppose its 105,
then the logins to add are:
mars::106:1:mars:/usr/JE:
rch::107:1:mars:/usr/JE:
rch1::108:1:mars:/usr/JE:
...
rch10::117:1:mars:/usr/JE:
Please note in step 3 you added a user called mars. The
"sysadm adduser" command will only let you create a home
directory if it does not exist. Therefore a directory was created
which is /usr/mars. In order to make mars working directory
correct you must change the user mars working directory from
/usr/mars to /usr/JE
IMPORTANT: Encourage the client to use a different login on each
terminal as some unix tables are maintained by the user name
instead of by terminal.
There are 6 fields in each line of the /etc/passwd file. They
are separated by colons (:) and are described as follows:
1) user name - this is what you type in response to the
login: prompt
2) password - always leave blank - passwords are added by
logging in and using the passwd command.
3) user number - just use the next available number in the file.
4) group number - always use 1 - groups may go away in a
future version of unix.
5) comment - memo field only, we usually put in the word mars.
6) home directory - this should be the main working directory
for Basic. (ie. /usr/JE).
If you'd like to be really friendly, you can setup logins to
match the names of the departments or people within the client's
organization.
Step 16. (Editing motd)
The file /etc/motd is printed on every screen during the login
process. If you wish, you can add a line similar to the
following:
Welcome to Jonas & Erickson Software Systems
Step 17. (Reboot)
The system reboot puts our changes (/etc/inittab, /etc/rc2, etc,
etc, etc) into effect. Be sure to do a proper shutdown first.
Refer to the user startup/shutdown/backup procedures
documentation for instructions on setting the system date and
time with the unix date command. These instructions should be
part of the client's J & E Primer. At the # prompt type:
# shutdown(CR)
or
Press the STOP button on the front of the Prime EXL.
Step 18. (define J & E files)
The first time you run Basic, mars will create a login password
J&E with only the security system defined. There may also exist
programs for automatically creating all of the data files for
each of the systems you are installing. At the time of this
writing, the initialization programs are being sent out with the
machines, but there is no documentation as yet. If there is no
initialization program for some of your systems, you will have to
create the files yourself from the file layouts.
NOTE: the initial login password may be mars instead of J&E.
Step 19. (Test)
Test as much as you can think of.
When testing printers, its a good idea to make sure they work
from unix first, before trying to access them from Basic. An
easy way to do this is to use the calendar command and redirect
the output to the device special file. For example, testing a
serial printer on tty17:
# cal > /dev/tty17(CR)
With serial printers, be sure to test for proper handling of
xon/xoff flow control by letting a large listing start, taking
the printer off-line, waiting long enough 'till you're sure the
buffer has filled, putting the printer back on-line, and making
sure the report is OK.
Step 20. (Label ports)
Label any ports that you have specially defined so that your
hardware installer knows where to plug things in. According to
Murphy's law, it is practically guaranteed that you will have a
hard disk crash during final shipping of the system to the
customer, unless you take a full backup at this point. For EXL
you should find a blank tape with the machine which you could use
for this backup.
Step 21. (Enable / Lock)
The switch on the front of the Prime EXL marked ENABLE/LOCK is
used for safety purposes. If the switch is in the LOCK position
then this disables all three buttons on the front. Therefore we
suggest that for normal day to day operations this switch should
be set to the LOCK position. This will prevent any accidental
shutdown of the machine.
Simplified System Administration
Within the Prime's EXL-316 operating system there is built in
commands to simplify operating functions, such as:
* Assigning passwords to administrative logins
* Assigning passwords to system logins
* Adding users to the system
* Performing system backups
* Installing optional add-on hardware
* Creating file systems
The sysadm command uses interactive software programs with menus,
subcommands, instructions, questions, and user input. As you
enter you responses, sysadm guides you step by step through a
system administration task. After you become familiar with
sysadm, you can bypass the menus and enter the subcommands
directly.
eg. sysadm modtty (Will allow you to modify port settings)
Below is a list of sysadm commands which we believe to be of help
to you. Refer to Prime EXL 316 Installation and Operation Guide
for a complete listing.
Description Command
Add a user adduser
Add user group addgroup
Assign root password admpasswd
Change root password admpasswd
Change port settings modtty
Change user information moduser
Change users password moduser
Delete a user deluser
List larger files filesize
List older files fileage
List users lsuser
Modify ports modtty
Modify users information moduser
Set date and time datetime
Shutdown powerdown
Note: adduser is of little use for adding basic users as it
cannot set the home directory to /usr/JE.
There is also a on-line help command to assist you with UNIX
commands. To start it up type:
help(CR)
For further information see Operating System Users Guide.
Cabling Information
The cable connection at the back of the EXL-316 use an RJ45
connection which is like a big modular telephone jack. Since this
is a none standard type of connection, we are including with
every order a 12 foot "adapter cables" which will convert from
the RJ45 connector to the standard DB25 connector. Note, however,
that these adapter cables end up "crossing pins 2 & 3". Therfore,
the pin specification for cables to terminals and printers is as
follows:
DB25 Male DB25 Male
1 - - - - - - - - - -1
2--------------------2
3--------------------3
4-| |-4
5-| |-5
6-| |-6
7--------------------7
8-| |-8
20-| |-20
Below is the cabling specs. of the cable supplied by Prime :
Pin positions for RJ45
|XX|
|XX| <------ Cable
|XX|
|XX|
-------------------------
| |
| FRONT VIEW |
| |
-+--+--+--+--+--+--+--+---
1 2 3 4 5 6 7 8
RJ45 Connector DB25 Connector Signal Name
| |
1 | 6 --> -| TO | Data Set Ready
2 | 5 --> | EXL | Clear To Send
3 | 3 --> -| 316 | Receive Data
4 | 7 | Ground
5 | 7 | Ground
6 | 2 <-- -| FROM | Send Data
7 | 4 <-- | EXL | Request to Send
8 | 20 <-- -| 316 | Data Terminal Ready
-----------------------------------------------------------------------------
/ /
/ NIA072 / File 6 /
/ /
/ NETWORK MISCELLANY /
/ /
/ File1: FEDIX by P.H.R.A.C.K. /
/ File2: Toll-Codes by David Leibold /
/ /
---
________________________________________________________
| |
| :-) FEDIX |
| On-Line Information Service |
| |
| Written by the people at FEDIX |
| |
| Submitted to NIA by |
| |
| Progressive Hegemony of Radical Activist Computer Kids |
| |
| "Supporting the Concept of Freedom of Information" |
|________________________________________________________|
What is FEDIX?
FEDIX is an on-line information service that links the higher education
community and the federal government to facilitate research, education, and
services. The system provides accurate and timely federal agency information
to colleges, universities, and other research organizations.
There are NO REGISTRATION FEES and NO ACCESS CHARGES for using FEDIX. The
only cost is for the phone call.
FEDIX provides daily information updates on:
- Federal EDUCATION and RESEARCH PROGRAMS (including descriptions,
eligibility, funding, deadlines).
- SCHOLARSHIPS, FELLOWSHIPS, and GRANTS
- Available used government RESEARCH EQUIPMENT
- New funding for specific research and education activities from
the COMMERCE BUSINESS DAILY, FEDERAL REGISTER, and other sources.
- MINORITY ASSISTANCE research and education programs
- NEWS & CURRENT EVENTS within participating agencies
- GENERAL INFORMATION such as agency history, budget, organizational
structure, mission statement, etc.
PARTICIPATING AGENCIES
Currently FEDIX provides information on 7 federal agencies broken down into 2
general categories:
1. Comprehensive Education and Research Related Agency Information
- The Department of Energy (DOE)
- Office of Naval Research (ONR)
- National Aeronautics and Space Administration (NASA)
- Federal Aviation Administration (FAA)
2. Minority Assistance Information
- National Science Foundation (NSF)
- Department of Housing and Urban Development (HUD)
- Department of Commerce (DOC)
Additional government agencies are expected to join FEDIX in the future.
REQUIRED HARDWARE AND SOFTWARE
Any microcomputer with communications software (or a dumb terminal) and a modem
operating at 1200 or 2400 baud can access the system.
HOURS OF OPERATION
The system operates 24 hours a day, 7 days a week. The only exceptions are for
periodic system updating or maintenance.
TELEPHONE NUMBERS
* Computer (data line): 301-258-0953 or 1-800-232-4879
* HELPLINE (technical assistance): 301-975-0103.
The HELPLINE (for problems or comments) is open Monday-Friday 8:30 AM-4:30 PM
Eastern Daylight Time, except on federal holidays.
SYSTEM FEATURES
Although FEDIX provides a broad range of features for searching, scanning, and
downloading, the system is easy to use. The following features will permit
quick and easy access to agency databases:
Menus
-- Information in the system is organized under a series of branching menus.
By selecting appropriate menu options (using either the OPTION NUMBER or the
two-character MENU CODE), you may begin at the FEDIX Main Menu and work your
way through various intermediate menus to a desired sub-menu. However, if you
already know the menu code of a desired menu, you may bypass the intermediate
menus and proceed directly to that menu by typing the menu code at the prompt.
Help screens are available for key menus and can be viewed by typing '?'
at the prompt.
Capturing Data
-- If you are using a microcomputer with communications software, it is likely
that your system is capable of storing or "capturing" information as it comes
across your screen. If you "turn capture on", you will be able to view
information from the databases and store it in a file on your system to be
printed later. This may be desirable at times when downloading is not
appropriate. Refer to your communications software documentation for
instructions on how to activate the capture feature.
Downloading
-- Throughout the system, options are available which allow you to search,
list, and/or download files containing information on specific topics. The
download feature can be used to deliver text files (ASCII) or compressed,
self-extracting ASCII files to your system very quickly for later use at your
convenience. Text files in ASCII format, tagged with a ".MAC" extension, are
downloadable by Macintosh users. Compressed ASCII files, tagged with an ".EXE"
extension, may be downloaded by users of IBM compatible computers. However,
your system must be capable of file transfers. (See the documentation on your
communication software).
Mail
-- An electronic bulletin board feature allows you to send and receive messages
to and from the SYSTEM OPERATOR ONLY. This feature will NOT send messages
between users. It can be used to inquire about operating the system, receive
helpful suggestions from the systems operator, etc.
Utility Menu
-- The Utility Menu, selected from the FEDIX Main Menu, enables you to modify
user information, prioritize agencies for viewing, search and download agency
information, set a default calling menu, and set the file transfer protocol for
downloading files.
INDEX OF KEY INFORMATION ON FEDIX
Key information for each agency is listed below with the code for the menu from
which the information can be accessed. Please be advised that this list is not
comprehensive and that a significant amount of information is available on
FEDIX in addition to what is listed here.
AGENCY/DATABASE MENU CODE
DEPARTMENT OF ENERGY (DOE)/DOEINFO
Available Used Research Equipment :EG:
Research Program Information :IX:
Education Program Information :GA:
Search/List/Download Program Information :IX:
Research and Training Reactors Information :RT:
Procurement Notices :MM:
Current Events :DN:
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION/NASINFO
Research Program Information :RP:
Education Program Information :EA:
Search/List/Download Program Information :NN:
Description/Activities of Space Centers :SC:
Procurement Notices :EV:
Proposal/Award Guidelines :NA:
OFFICE OF NAVAL RESEARCH/ONRINFO
Research Program Information :RY:,:AR:
Special Programs (Special Research and Education Initiatives) :ON:
Search/List/Download Program Information :NR:
Description/Activities of Laboratories and other ONR Facilities :LB:
Procurement Notices (Broad Agency Announcements, Requests for --
Proposals, etc. :NE:
Information on the Preparation and Administration of Contracts, --
Grants, Proposals :AD:
FEDERAL AVIATION ADMINISTRATION/FAAINFO
Education Program Information - Pre-College :FE:
Mio rity Aviation Education Programs :FY:
Search/List/Download Program Information :FF:
Aviation Education Resources (Newsletters, Films/Videos, --
Publications) :FR:
Aviation Education Contacts (Government, Industry, Academic, --
Associations) :FO:
College-Level Airway Science Curriculum Information :FC:
Procurement Notice :FP:
Planned Competitive and Noncompetitive Procurements for the --
Current Fiscal Year :F1:
Employment Information :FN:
Current Events :FV:
MINORITY/MININFO
U. S. Department of Commerce
Research/Education Minority Assistance Programs :CP:
Procurement Notices (ALL Notices for Agency) :M1:
Current Events :M1:
Minority Contacts :M1:
Department of Energy
Research/Education Minority Assistance Programs :EP:
Procurement Notices (ALL Notices for Agency) :M2:
Current Events :M2:
Minority Contacts :M2:
U.S. Department of Housing and Urban Development
Research/Education Minority Assistance Programs :HP:
Procurement Notices (ALL Notices for Agency) :M3:
Current Events :M3:
Minority Contacts :M3:
National Aeronautics and Space Administration
Research/Education Minority Assistance Programs :NP:
Procurement Notices (ALL Notices for Agency) :M4:
Current Events :M4:
Minority Contacts :M4:
National Science Foundation
Research/Education Minority AssisdaXce Programs :SP:
Procurement Notices (ALL Notices for Agency) :M5:
Budget Information :SB:
NSF Bulletin :M5:
Minority Contacts :M5:
_______________________________________________________________________________
---
[Here is the first edition of the toll-free/tolled codes list;
thanks to all who participated ... any followups, clarifications,
etc would be appreciated.]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Toll-free, local rated and specialty toll services 26 July 1991
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following indicates access codes and numbers used within various
countries for toll-free and special paid services. The dialing codes
shown represent how they would be dialed within the country involved.
Generally, it is not possible to access another country's domestic
toll-free or specialty network directly. Where an international access
is available, it is normally done by using the domestic services which
then forward the call to the destination country.
Where possible, the number of digits has been indicated with 'n'
(a number from 2 to 8) or 'x' (any number). An ellipsis (...)
indicates that there are a variable number of extra digits, or
possibly a conflict in the reports of numbers of digits used.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Toll-free or equivalent local charge services
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=================
A u s t r a l i a
=================
008 xxx xxx (that is how Telecom recomends it be written
to differentiate it from STD area codes
which are written with area codes (0x) thru
(0xxx) and numbers n xxxx through nxx xxxx.
0014 ttt xxx xxx International Toll free access from Australia
(ttt is reported as "800" or other toll-free
access code; or, ttt may not be present at all)
Brendan Jones:
"... I have dialled international toll free to the USA (Fred Pryor
Seminars) and I dialled verbatim: 0014 800 125 385."
(Canada Direct uses 0014 881 150 - djcl)
=============
B e l g i u m
=============
11 xxxx
=============
D e n m a r k
=============
800 xxxxx
8001 xxxx (charged as local call)
=============
F i n l a n d
=============
9800 xxxxx (...) PTT as local service provider
0800 xxxxx (...) Private phone company as local service provider
Kauto Huopio:
"(I _think_ that 0800 numbers are only for the local calling area."
haa:
"...but many service givers have more [digits than 5] in theis mnemonics)."
(haa also mentions 9800 costs the same as a local call (dialable from
all areas in Finland) while 0800 are truly toll-free and dialable
from all private telco areas)
===========
F r a n c e
===========
05 xxxxxx (Numero Vert)
[note: this is outside area code 1, so from Paris
16 05...]
05 19 xx xx these numbers terminate outside France
36 63 xx xx Local call rate (Numero Azur)
Allan G. Schrum:
"`11' is computer directory information (Minitel)
`12' is voice directory information (equivalent to 411)"
===========================
G e r m a n y ( w e s t )
===========================
0130 xxxx (...xx)
Mickey Ferguson:
"I was over in Germany for three months, and the number is 0130-...
To use ATT, it is 0130-0010, and U.S. Sprint is 0130-0013 (easy to
remember :) For general toll-free number listings, pick up a copy
of the International Herald newspaper (I think it is available in
the US as well as most places internationally) and in the sports
section is usually an ATT add for dialing the US from various countries.
Of course, chop off the exchange and only use the "area code" number."
=============
I r e l a n d
=============
1800 xxxxxx
1850 xxxxxx (local rate)
=========
I t a l y
=========
167 xxxxx (digits length?)
Colum Mylod:
"I'm not 100% sure about the length of digits for Italy. One way to
check these is to get a copy of an *international* edition of the
weekly magazines like TIME, all ads and little contents. But they do
goof up regularly, like printing Paris numbers as (01) xxxxxxxx when
they mean (1) xxxxxxxx."
===========
M e x i c o
===========
91 800 xxxxx....
=====================
N e t h e r l a n d s
=====================
06-0xxx
06-0xxxxxx
06-4xx(x)
Ralph Moonen:
"06-0229111 = AT&T USA direct
And also Sprint & MCI have operator services on 06-022xxxx
Side note: It used to be possible to call 06-022xxxx to Denmark, and then
use the CCITT no. 4 signalling system to phreak calls to anywhere in the
world."
Peter Knoppers:
"06-11 This is the Dutch equivalent of 911, it is free when dialled
from a phone company operated payphone, otherwise the charge
is one unit, DFL 0.15, about US $ 0.08. There were discussions
about making such calls free from any phone, but I haven't
followed them recently. Calling a toll-free number from a
payphone requires a deposit of one coin, which is returned
after the call.
The total length of the numbers varies from 4 to 10 digits.
The dash indicates the secondary dial tone.
It is not possible to reach 06 prefixed numbers from abroad."
=====================
N e w Z e a l a n d
=====================
0800 xxx xxx
clear@cavebbs.gen.nz:
"That is through the state telco, Telecom New Zealand. Clear Communications,
the recently started alternative LD carrier, does not offer a toll-free
service as yet."
When Clear offer one, it will more than likely be to the subscribers
existing number (eg Dial toll free 050-04-654-3210) as they are not
in control of number issue. 0800 is strictly Telecom at this stage."
=========================
N o r t h A m e r i c a
=========================
1 800 nxx xxxx Access to toll free numbers can vary according
to region, state or country ie. not all 800
numbers are accessible to all regions
The nxx prefix portion of the 800 number presently
determines which long distance carrier or 800
service company will handle the call (and in
some cases determine the geographical region)
=========
S p a i n
=========
900 xxxxxx
Michael Klein, BellSouth Telephone Operations:
"(N.B. The number for ATT direct in Spain is 900-99-00-11.
The payphones are all push-button but generate pulses.
It takes forever to get connected.)"
===========
S w e d e n
===========
020 xxxxxx (without dialtone after '020').
=====================
S w i t z e r l a n d
=====================
04605 xxxx (not toll-free but metered at lowest rate)
155 xx xx ("green number")
[also a new one something like 122...]
Jim Smithson:
"Here in Switzerland there is nothing exactly equivalent to US 800 service.
I see the PTT is now encouraging the use of "green numbers" beginning with
155.
The direct marketing ads on TV often give the order number for Switzerland
as a number such as 155 XX XX.
The access number for MCI Call USA is for example 155 02 22.
But there are two problems with this that I don't think MCI was aware of
when they asked the PTT for "a toll free" number.
1. When calling from a model AZ44(older model) payphone
All numbers which begin with a "1" are treated as "service"
numbers and the payphone begins to sound a "cuckoo clock
noise" once the 155 is entered. The "cuckoo clock noise"
is to alert operators on the "service numbers" that the caller
is using a payphone(fraud protection). This noise is quite a
distraction when calling someone in the USA using MCI Call USA.
This is one reason(not the biggest one) I cancelled my MCI Card.
2. The newer style TelcaStar phones are programmed to block the
keypad after 3 digits are dialed of a "service number".
It used to be that the only numbers beginning with "1" were
"service numbers" and all "service numbers" were 3 digits.
The PTT is aware of this problem and are said to be considering
what instructions to give the manufacturer of the payphones.
AT&T USA Direct has an access number of 046 05 00 11
This is not a free call, but the time is metered at the lowest rate.
This number does not suffer the "cuckoo clock noise" problem."
(Canada Direct uses 046 05 83 30 - djcl)
===========================
U n i t e d K i n g d o m
===========================
0800 xxx xxx Toll-free
0345 xxx xxx Local rate
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Tolled/Specialty Pay services
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=================
A u s t r a l i a
=================
0055 x yxxx where y=0-4,8 means the number is Australia
wide (and costs more),
y=5 means the number is only state wide,
y=6,7,9 means the number is for the
capital city only.
=============
F i n l a n d
=============
9700 xxxxx PTT-operated
0700 xxxxx Private telco-operated
haa:
"cost ranging from about 0.5 USD to 5 USD per minute."
===========
F r a n c e
===========
36 65 xx xx (5 message units each call for up to 140 seconds)
Olivier Giffard:
"These are for various information services as
well as chat lines and so on."
=====================
N e t h e r l a n d s
=====================
06-9 xx...
06-321 xx...
06-8 xx... (3 to 40ct/min)
Peter Knoppers:
"Other codes (such as 06-9) precede special tariff calls (similar to 900 in
the US). The highest special rate is (currently) DFL 0.50 / minute."
=========================
N o r t h A m e r i c a
=========================
1 900 nxx xxxx (various rates, depending on provider)
1 (npa) 976 xxxx (in many area codes, connected through regional telco;
in some areas, the call requires the area code where
depending on the intra-area dialing used)
(other exchange prefixes within area codes such as 540, 720 or 915
are used for other pay services such as group chat, other types of
recorded messages, etc. These vary depending on the area code within
North America, and not all regions in North America have these.)
===========
S w e d e n
===========
071 x xxxxx
Dan Sahlin:
"The "900"-numbers in Sweden all start with 071.
The charges are related to the next digit, as follows.
code SEK/minute
0712xxxxx 3,65
0713xxxxx 4,90
0714xxxxx 6,90
0715xxxxx 9,90
0716xxxxx 12,50
0717xxxxx 15,30
0719xx varying fees, cannot be dialled directly but needs operator
Numbers starting with 0713-0717 can only be dialled from phones connected
to AXE exchanges. At present about half of all phones in Sweden are
connected to such exchanges.
Another special toll number is domestic number information: 07975
(6,90 SEK/minute)."
===========================
U n i t e d K i n g d o m
===========================
0836 xxx xxx
0898 xxx xxx
J. Philip Miller:
"Rate seems to be uniform as 34p per minute cheap rate,
45p at all other times."
------------------------------------------------------------------------------
/ /
/ NIA072 / File 7 /
/ CyberTimes (Vox Populi) /
/ Judge Dredd /
/ /
The following 4 files of CyberTimes (Vox Populi) is telecom news since
01JAN91 to 01AUG91.
#O GRID News
#I Vol. 2, No. 6
#D February 22, 1991
#T Michigan to Overhaul Telecom Rules
#A Michael E. Marotta
On February 19 and 20, companion bills were introduced into the
state house and state senate of Michigan. "The Michigan
Telecommunications Act" is House Bill 4343 and Senate Bill 124.
The two versions are identical. HB4343 was introduced by Alma G.
Stallworth (D-Detroit), chair of the House Public Utilities
committee. SB124 was introduced by Mat J. Dunaskiss (R-Lake
Orion), chair of the newly-created Senate Technology and Energy
Committee. If passed by October 1, 1991, the bills become law on
that date and have sunset limits of four years, expiring on
September 30, 1995.
The Michigan Telecommunications Act would, if passed into law,
accomplish the following:
(*) establish a new regulator, the Michigan Telecommunications
Commission, removing telephone from the Public Service
Commission and bringing cable television under the new
agency's scope.
(*) de-regulate local exchange providers, allowing them
monopoly status and the right to sell other services,
including long distance, cable television and information.
(*) freeze local rates at the current level, allowing no
increase beyond the maximum rate as of Nov. 1, 1990.
(*) require 911 service to be provided to any county that
wants it. In fact, there are 48 separate provisions for
911 service, significantly more than any other section of
the act. (Mandatory service for the hearing impaired runs
a mere 42 lines.)
(*) Outlaw unsolicited advertising via fax. (This provision,
like many of the 911 rules, is already in place. It was
created in 1990 as an amendment to the Telephone Act of
1913 and is being carried over.)
The Michigan Telecommunications Act specifically seeks to overturn
the "Modified Final Judgement." Its goal is to allow Michigan
telecom providers the freedom to develop products and services.
Whether and to what extent it meets those goals will be determined
in part by what happens to the bills in committees and on the
floors.
#O NewsBytes
#D March 4, 1991
MIDDLE ISLAND, NEW YORK, U.S.A., 1991 MAR 4(NB) --
Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly, has
told Newsbytes that The Texas Department of Criminal Justice has prohibited
delivery delivery of the fall 1990 issue of 2600 to a subscriber
incarcerated in a Texas prison.
The official "Publication Denial Notification" form, dated January 9, 1991,
was received by Goldstein and published in the Winter 1990-91 issue that
was released on March 1st. The form indicates that the denial was
instituted because "Publication contains material on the setting up and
operation of criminal schemes or how to avoid detection of criminal schemes
by lawful authority charged with the responsibility for detected such
illegal activity."
The specific reasons for determining the basis for the ruling are listed as
"Pages 18, 19, 20, 21, 29, 42 and 43 contain information on misusing
telephone equipment to make telephone calls illegally and to obtain cash
and credit cards illegally."
Goldstein, commenting on the ban to Newsbytes, said "Inside of prison,
there is not much freedom so I guess it's not surprising that they do
things like this. What is surprising is that the article which they were
most concerned with was written by the Fraud Division of the U.S. Secret
Service and was clearly indicated to have been so authored."
Newsbytes examined the Fall issue of 2600 and found that the Secret Service
technical synopsis is contained on pages 18-21 while page 29 is part of the
letters from readers section and contains a letter from a prisoner in an
unnamed prison explaining how he or she makes unpaid telephone calls. Pages
42 and 43 contain an article by "Crazed Luddite & Murdering Thug", "An
Algorithm For Credit Cards", which explains the checksum verification of
credit card numbers.
Also contained in the same issue is an interview with security expert Dr.
Dorothy Denning, an explanation of caller-id and an article by Goldstein on
alleged BellSouth plans for monitoring telephone lines.
A supervisor at the Texas Department of Criminal Justice, Institutional
Division told Newsbytes that "Inmates may subscribe to any publication they
choose but they understand that the magazines are subject to review for
appropriateness. If they contain any material that does not meet or
standards, either the articles in question or the entire magazine will be
rejected." The supervisor, who could not speak for attribution, explained
that, if the objectionable passages were 5 pages or less, they would have
been removed and the remainder of the magazine delivered. She also said
that both the inmate and the publication have the right to appeal the
decision.
#O Associated Press Wire [herby refered to as APwire]
BALTIMORE (AP) -- A computer hacker pleaded guilty Friday to stealing
information from American Telephone & Telegraph and its subsidiary
Bell Laboratories.
Under an agreement with prosecutors, Leonard Rose pleaded guilty in
U.S. District Court to one count of sending AT&T source codes via
computer to Richard Andrews, an Illinois hacker, and a similar wire
fraud charge involving a Chicago hacker.
Prosecutors said they will ask that Rose be sentenced to two
concurrent one-year terms. Rose is expected to be sentenced in May.
Neither Rose nor his attorney could be immediately reached for comment
late Friday.
"Other computer hackers who choose to use their talents to interfere
with the security and privacy of computer systems can expect to be
prosecuted and to face similar penalties," said U.S. Attorney
Breckinridge L. Willcox.
"The sentence contemplated in the plea agreement reflects the serious
nature of this new form of theft," Willcox said.
Rose, 32, was charged in May 1990 in a five-count indictment following
an investigation by the Secret Service and the U.S. Attorney's offices
in Baltimore and Chicago.
He also had been charged with distributing "trojan horse" programs,
designed to gain unauthorized access to computer systems, to other
hackers.
Prosecutors said Rose and other hackers entered into a scheme to steal
computer source codes from AT&T's UNIX computer system.
The plea agreement stipulates that after he serves his sentence, Rose
must disclose his past conduct to potential employers that have
computers with similar source codes.
#O Washington Post
#I n/a
#D March 23, 1991 [pp A1, A10]
#T 'Hacker' Pleads Guilty in AT&T CASE: Sentence Urged for Md. Man
Among Stiffest Yet for Computer Crime
#A Mark Potts/Washington Post Staff Writer
BALTIMORE, March 22--A computer "hacker" who was trying to help others
steal electronic passwords guarding large corporate computer systems
around the country today pleaded guilty to wire fraud in a continuing
government crackdown on computer crime.
Federal prosecutors recommended that Leonard Rose Jr., 32, of
Middletown, Md., be sent to prison for one year and one day, which
would be one of the stiffest sentences imposed to date for computer
crime. Sentencing is scheduled for May before U.S. District Judge J.
Frederick Motz.
Cases such as those of Rose and a Cornell University graduate student
who was convicted last year of crippling a nationwide computer network
have shown that the formerly innocent pastime of hacking has
potentially extreme economic ramifications. Prosecutors, industry
officials and even some veteran hackers now question the once popular
and widely accepted practice of breaking into computer systems and
networks in search of information that can be shared with others.
"It's just like any other form of theft, except that it's more subtle
and it's more sophisticated," said Geoffrey R. Garinther, the
assistant U.S. attorney who prosecuted the Rose case.
Rose--once part of a group of maverick hackers who called themselves
the Legion of Doom--and his attorneys were not available for comment
after the guilty plea today. The single fraud count replaced a
five-count indictment of the computer programmer that was issued last
May after a raid on his home by Secret Service agents.
According to prosecutors, Rose illegally obtained information that
would permit him to secretly modify a widely used American Telephone &
(See HACKER, A10, Col 1)
Telegraph Co. Unix software program--the complex instructions that
tell computers what to do. The two former AT&T software employees who
provided these information "codes" have not yet been prosecuted.
Rose altered the AT&T software by inserting a "Trojan horse" program
that would allow a hacker to secretly gain access to the computer
systems using the AT&T Unix software and gather passwords used on the
system. The passwords could then be distributed to other hackers,
permitting them to use the system without the knowledge of its
rightful operators, prosecutors said.
Rose's modifications made corporate purchasers of the $77,000 AT&T
Unix program vulnerable to electronic break-ins and the theft of such
services as toll-free 800 numbers and other computer-based
telecommunications services.
After changing the software, Rose sent it to three other computer
hackers, including one in Chicago, where authorities learned of the
scheme through a Secret Service computer crime investigation called
Operation Sun Devil. Officials say they do not believe the hackers
ever broke into computer systems.
At the same time he pleaded guilty here, Rose pleaded guilty to a
similar charge in Chicago; the sentences are to be served
concurrently, and he will be eligible for parole after 10 months.
Rose and his associates in the Legion of Doom, whose nickname was
taken from a gang of comic-book villains, used names like Acid Phreak
Terminus--Rose's nickname--as their computer IDs. They connected their
computers by telephone to corporate and government computer networks,
outwitted security screens and passwords to sign onto the systems and
rummaged through the information files they found, prosecutors said.
Members of the group were constantly testing the boundaries of the
"hacker ethic," a code of conduct dating back to the early 1960s that
operates on the belief that computers and the information on them
should be free for everyone to share, and that such freedom would
accelerate the spread of computer technology, to society's benefit.
Corporate and government computer information managers and many law
enforcement officials have a different view of the hackers. To them,
the hackers are committing theft and computer fraud.
After the first federal law aimed at computer fraud was enacted in
1986, the Secret Service began the Operation Sun Devil investigation,
which has since swept up many members of the Legion of Doom, including
Rose. The investigation has resulted in the arrest and prosecution of
several hackers and led to the confiscation of dozens of computers,
thousands of computer disks and related items.
"We're authorized to enforce the computer fraud act, and we're doing
it to the best of our ability," Garry Jenkins, assistant director of
investigations for the Secret Service, said last summer. "We're not
interested in cases that are at the lowest threshold of violating the
law...They have to be major criminal violations before we get
involved."
The Secret Service crackdown closely followed the prosecution of the
most celebrated hacker case to date, that of Robert Tappan Morris
Cornell University computer science graduate student and son of a
computer sicentist at the National Security Agency. Morris was
convicted early last year of infecting a vast nationwide computer
network in 1988 with a hugely disruptive computer "virus," or rogue
instructions. Although he could have gone to jail for five years, Mo
$10,000, given three years probation and ordered to do 400 hours of
community service work.
Through Operation Sun Devil and the Morris case, law enforcement
authorities have begun to define the boundaries of computer law.
Officials are grappling with how best to punish hackers and how to
differentiate between mere computer pranks and serious computer
espionage.
"We're all trying to get a handle for what is appropriate behavior in
this new age, where we have computers and computer networks linked
together," said Lance Hoffman, a computer science professor at George
Washington University.
"There clearly are a bunch of people feeling their way in various
respects," said David R. Johnson, an attorney at Wilmer, Cutler &
Pickering and an expert on computer law. However, he said, "Things
are getting a lot clearer. It used to be a reasonably respectable
argument that people gaining unauthorized access to computer systems
and causing problems were just rambunctious youth." Now, however, the
feeling is that "operating in unauthorized computing spaces can be an
antisocial act," he said.
Although this view is increasingly shared by industry leaders, some
see the risk of the crackdown on hackers going to far. Among those
concerned is Mitch Kapor, the inventor of Lotus 1-2-3, the
best-selling computer "spreadsheet" program for carrying out
mathematical and accounting analysis. Kapor and several other
computer pioneers last year contributed several hundred thousands
dollars to set up the Electron Freedom Foundation, a defense fund for
computer hackers.
EFF has funded much of Rose's defense and filed a friend-of-the-court
brief protesting Rose's indictment.
From: The Washington Post, Tuesday March 26, 1991, Page A3.
CORRECTION [to Saturday March 23, 1991 article]
"Leonard Rose, Jr., the Maryland computer hacker who pleaded guilty
last week to two counts of wire fraud involving his illegal possession
of an American Telephone & Telegraph Co. computer program, was not a
member of the "Legion of Doom" computer hacker group, as was reported
Saturday, and did not participate in the group's alleged activities of
breaking into and rummaging through corporate and government computer
systems."
#O NewsBytes
#D April 1, 1991
PHOENIX, ARIZONA, U.S.A., 1991 APR 1(NB) -- The Maricopa County
Arizona County Attorney's Office has announced the arrest of Baron
Majette, 19, also known as "Doc Savage", for alleged crimes uncovered
in the joint federal / state "SunDevil" investigation in progress for
over a year.
Majette is charged with a number of felony crimes including the use
of a telephone lineman's handset in March 1990 to tap into a Toys 'R
Us telephone line to set up two conference calls between 15
participants. According to the charges, each call lasted
approximately 10 hours and cost $4,000. A spokesperson for the County
Attorney's office told Newsbytes that a Tucson resident, Anthony
Nusall, has previously pleaded guilty to being a participant in the
conference Majette is also accused of illegally accessing TRW's
credit data base to obtain personal credit information and account
numbers of persons in the TRW database. He is alleged to have then
used the information obtained to divert existing account mailings to
mail drops and post office boxes set up for this purpose. He is also
alleged to have additional credit cards issued based on the
information obtained from the database. He is further alleged to have
obtained cash, goods and services, such as airline tickets, in excess
of $50,000 by using cards and account information obtained through
entry into the TRW database.
It is further alleged that Majette stole credit cars from U.S. Mail
boxes and used them to obtain approximately $10,000 worth of cash,
goods and services.The allegations state that Majette acted either
alone or as part of a group to perform these actions. A County
Attorney spokesperson told Newsbytes that further arrests may be
expected as result of the ongoing investigation.
While bail was set on these charges at $4,900. Majette is being held
on a second warrant for probation violation and cannot be released on
bail until the probation hearing has been held.
Gail H. Thackeray, former Assistant Attorney General for the State of
Arizona, currently working with Maricopa County on the SunDevil
cases, told Newsbytes "The SunDevil project was started in response
to a high level of complaint of communications crimes, credit card
fraud and other incidents relating to large financial losses. These
were not cases of persons accessing computers 'just to look around'
or even cases like the Atlanta 'Legion of Doom' one in which the
individuals admitted obtaining information through illegal access.
They are rather cases in which the accused alleged used computers to
facilitate theft of substantial goods and services."
#O Newsweek Magazine
#T Cyberpunks and the Constitution
The fast-changing technologies of the late 20th century pose
a challenge to American laws and principles of ages past
#A Phillip Elmer-Dewitt
Armed with guns and search warrants, 150 Secret Service agents staged
surprise raids in 14 American cities one morning last May, seizing 42
computers and tens of thousands of floppy disks. Their target: a
loose-knit group of youthful computer enthusiasts suspected of
trafficking in stolen credit-card numbers, telephone access codes and
other contraband of the information age. The authorities intended to
send a sharp message to would-be digital desperadoes that computer
crime does not pay. But in their zeal, they sent a very different
message - one that chilled civil libertarians. By attempting to crack
down on telephone fraud, they shut down dozens of computer bulletin
boards that may be as fully protected by the U.S. Constitution as the
words on this page.
Do electronic bulletin boards that may list stolen access codes enjoy
protection under the First Amendment? That was one of the thorny
questions raised last week at an unusual gathering of computer
hackers, law-enforcement officials and legal scholars sponsored by
Computer Professionals for Social Responsibility. For four days in
California's Silicon Valley, 400 experts struggled to sort out the
implications of applying late-18th century laws and legal principles
to the fast-changing technologies of the late 20th century.
While the gathering was short on answers, it was long on tantalizing
questions. How can privacy be ensured when computers record every
phone call, cash withdrawal and credit-card transaction? What
"property rights" can be protected in digital electronic systems that
can create copies that are indistinguishable from the real thing?
What is a "place" in cyberspace, the universe occupied by audio and
video signals traveling across state and national borders at nearly
the speed of light? Or as Harvard law professor Laurence Tribe aptly
summarized, "When the lines along which our Constitution is drawn warp
or vanish, what happens to the Constitution itself?"
Tribe suggested that the Supreme Court may be incapable of keeping up
with the pace of technological change. He proposed what many will
consider a radical solution: a 27th Amendment that would make the
information-related freedoms guaranteed in the Bill of Rights fully
applicable "no matter what the technological method or medium" by
which that information is generated, stored or transmitted. While
such a proposal is unlikely to pass into law, the fact that one of the
country's leading constitutional scholars put it forward may persuade
the judiciary to focus on the issues it raises. In recent months,
several conflicts involving computer-related privacy and free speech
have surfaced:
-- When subscribers to Prodigy, a 700,000-member information system
owned by Sears and IBM, began posting messages protesting a rate hike,
Prodigy officials banned discussion of the topic in public forums on
the system. After protesters began sending private mail messages to
other members - and to advertisers - they were summarily kicked off
the network.
-- When Lotus Development Corp. of Cambridge, Mass., announced a joint
venture with Equifax, one of the country's largest credit-rating
bureaus, to sell a personal-computer product that would contain
information on the shopping habits of 120 million U.S. households, it
received 30,000 calls and letters from individuals asking that their
names be removed from the data base. The project was quietly canceled
in January.
-- When regional telephone companies began offering Caller ID, a
device that displays the phone numbers - including unlisted ones - of
incoming calls, many people viewed it as an invasion of privacy.
Several states have since passed laws requiring phone companies to
offer callers a "blocking" option so that they can choose whether or
not to disclose their numbers. Pennsylvania has banned the service.
But the hacker dragnets generated the most heat. Ten months after the
Secret Service shut down the bulletin boards, the government still has
not produced any indictments. And several similar cases that have
come before courts have been badly flawed. One Austin-based game
publisher whose bulletin-board system was seized last March is
expected soon to sue the government for violating his civil liberties.
There is certainly plenty of computer crime around. The Secret
Service claims that U.S. phone companies are losing $1.2 billion a
year anc credit-card providers another $1 billion, largely through
fraudulent use of stolen passwords and access codes. It is not clear,
however, that the cyberpunks rounded up in dragnets like last May's
are the ones committing the worst offenses. Those arrested were
mostly teenagers more intent on showing off their computer skills than
padding their bank accounts. One 14-year-old from New York City, for
instance, apparently specialized in taking over the operation of
remote computer systems and turning them into bulletin boards - for
his friends to play on. Among his targets, say police, was a Pentagon
computer belonging to the Secretary of the Air Force. "I regard
unauthorized entry into computer systems as wrong and deserving of
punishment," says Mitch Kapor, the former president of Lotus.
And yet Kapor has emerged as a leading watchdog for freedom in the
information age. He views the tiny bulletin-board systems as the
forerunners of a public computer network that will eventually connect
households across the country. Kapor is worried that legal precedents
set today may haunt all Americans in the 21st century. Thus he is
providing funds to fight for civil liberties in cyberspace the best
way he knows how - one case at a time.
#O Financial Post & Financial Times of London
#T Canada is Accused of Using Stolen Software
#A Eric Reguly & Alan Friedman
NEW YORK -- Government agencies in Canada and other countries are using
computer software that was stolen from a Washington-based company by the
U.S. Department of Justice, according to affidavits filed in a U.S.
court case.
In a complex case, several nations, as well as some well-known
Washington insiders - including the national security advisor to former
President Ronald Reagan, Robert McFarlane - are named as allegedly
playing a role.
The affidavits were filed in recent weeks in support of a
Washington-based computer company called Inslaw Inc., which claims that
its case-tracking software, known as Promis, was stolen by the U.S.
Department of Justice and eventually ended up in the hands of the
governments of Israel, Canada and Iraq.
NEW MOTION
Yesterday, lawyers for Inslaw filed a new motion in federal bankruptcy
court in Washington demanding the power to subpoena information from the
Canadian government on how Ottawa came to acquire Promis software. The
motion states, "The evidence continues to mount that Inslaw's
proprietary software is in Canada."
The affidavits allege that Promis - designed to keep track of cases and
criminals by government agencies - is in use by the RCMP and the
Canadian Security Intelligence Service.
The Canadian Department of Communications is referring calls on the
subject to the department's lawyer, John Lovell in Ottawa, while a CSIS
spokesman will not confirm or deny whether the agency uses the software.
"No one is aware of the program's existence here," Corporal DEnis
Deveau, Ottawa-based spokesman for the RCMP, said yesterday.
The case of Inslaw, which won a court victory against the Justice
Department in 1987, at first glance appears to be an obscure lawsuit by
a small business that was forced into bankruptcy because of the loss of
its proprietary software.
But several members of the Washington establishment are suggesting
Inslaw may have implications for U.S. foreign policy in the Middle East.
The Case already has some unusual aspects.
At least one judge has refused to handle it because of potential
conflicts of interest, and a key lawyer representing Inslaw is Elliot
Richardson, a former U.S. attorney general and ambassador to Britain who
is remembered for his role in standing up to Richard Nixon during the
Watergate scandal.
Richardson yesterday told the Financial Times of London and The
Financial Post that: "Evidence of the widespread ramifications of the
Inslaw case comes from many sources and keeps accumulating."
A curious development in the Inslaw case is that the Department of
Justice has refused to provide documents relating to Inslaw to Jack
Brook, chairman of the Judiciary Committee of the House of
Representatives.
Richardson said, "It remains inexplicable why the Justice Department
consistently refuses to pursue this evidence and resists co-operation
with the Judiciary Committee of the House of Representatives."
The Inslaw case began in 1982 when the company accepted a US $10-million
contract to install its Promis case management software at the
Department of Justice. In 1983 the government agency stopped paying
Inslaw and the firm went into Chapter 11 bankruptcy proceedings.
Inslaw sued Justice in 1986 and the trial took place a year later. The
result of the trial in 1987 was a ruling by a federal bankruptcy court
in Inslaw's favor.
The ruling said that the Justice Department "took, converted, stole"
Promis software through "trickery, fraud and deceit" and then conspired
to drive Inslaw out of business.
That ruling, which received little publicity at the time, was upheld by
the U.S. District Court in Washington in 1989, but Justice lodged an
appeal last year in an attempt to overturn the judgement that it must
pay Inslaw US $6.1 million (C $7.1 million) in damages and US $1.2
million in legal fees.
The affidavits filed in recent weeks relate to an imminent move by
Richardson on behalf of Inslaw to obtain subpoena power in order to
demand copies of the Promis software that the company alleges are
being used by the Central Intelligence Agency and other U.S.
intelligence services that did not purchase the technology from Inslaw.
In the affidavit relating to McFarlane that was filed on March 21, Ari
Ben-Menashe, a former Israeli intelligence officer, claims that
McFarlane had a "special" relationship with Israeli intelligence
officials. Ben-Menashe alleges that in a 1982 meeting in Tel Aviv, he
was told that Israeli intelligence received the software from McFarlane.
FLORIDA COMPANY
McFarlane has stated that he is "very puzzled" by the allegations that
he passed any of the software to Israel. He has termed the claims
"absolutely false".
Another strange development is the status of Michael Riconosciuto, a
potential witness for Inslaw who once worked with a Florida company that
sought to develop weapons, including fuel-air explosives and chemical
agents.
Riconosciuto claimed in his affidavit that in February he was called by
a former Justice Department official who warned him against co-op
with the House Judiciary Committee's investigation into Inslaw.
Riconosciuto was arrested last weekend on drug charges, but claimed he
had been "set up".
In his March 21 affidavit, Riconosciuto says he modified Promis software
for law enforcement and intelligence agencies. "Some of the
modifications that I made were specifically designed to facilitate the
implementation of Promis within two agencies of the government of
Canada... The propriety (sic) version of Promis, as modified by me,
was, in fact, implemented in both the RCMP and the CSIS in Canada."
On Monday, Richardson and other lawyers for Inslaw will file a motion in
court seeking the power to subpoena copies of the Promis software from
U.S. Intelligence agencies.
#O NewsByetes
#D April 3, 1991
SAN LUIS OBISPO, CALIFORNIA, U.S.A., 1991 APR 3 (NB) --Ron Hopson
got a call at work from his neighbor who informed him police broke
down his front door, and were confiscating his computer equipment.
The report, in the San Luis Obispo (SLO) Telegram-Tribune, quoted
Hopson as saying, "They took my stuff, they rummaged through my
house, and all the time I was trying to figure out what I did, what
this was about. I didn't have any idea."
According to the Telegram-Tribune, Hopson and three others were
accused by police of attempting to break into the bulletin board
system (BBS) containing patient records of SLO dermatologists
Longabaugh and Herton. District Attorney Stephen Brown told
Newsbytes that even though the suspects (two of which are Cal Poly
students) did not know each other, search warrants were issued after
their phone numbers were traced by police as numbers attempting
access to the dermatologists' system by modem "more than three times
in a single day."
Brown told Newsbytes the police wouldn't have been as concerned if
it had been the BBS of a non-medical related company, but faced with
people trying to obtaining illegal narcotics by calling pharmacies
with fraudulent information...
What the suspects had in common was the dermatologists' BBS phone
number programmed into their telecommunications software as the
Cygnus XI BBS. According to John Ewing, secretary of the SLO
Personal Computer Users Group (SLO PC UG), the Cygnus XI BBS was a
public BBS that operated in SLO, but the system operator (sysop)
moved less than a year ago and discontinued the board. It appears
the dermatologists inherited the number.
John Ewing, SLO PCUG editor, commented in the SLO PC UG newsletter,
"My personal opinion is that the phone number [for the Cygnus XI
BBS] is still listed in personal dialing directories as Cygnus XI,
and people are innocently calling to exchange information and
download files. These so-called hackers know that the password they
used worked in the past and attempt to connect several times. The
password may even be recorded as a script file [an automatic log-on
file]. If this is the case, my sympathies go out to those who have
had their hardware and software confiscated."
Bob Ward, secretary of the SLO PC UG, told Newsbytes, "The number
[for Cygnus XI] could have been passed around the world. And, as a
new user, it would be easy to make three mistaken calls. The board
has no opening screen, it just asks for a password. So, you call
once with your password, once more trying the word NEW, and again to
try GUEST."
#O California Computer News
#D April 1991 [p26]
#T Modem Mania: More Households Go Online Every Day
#A Dennis B. Collins
Get your scissors. Here come some statistics you'll want to save. I've
been doing a lot of research lately regarding computer bulletin board
systems (BBSs). Prodigy's research and development department said that
30 percent of American homes have some sort of PC. Of these homes, 20
percent have a modem. This means that six percent of all homes have the
capability to obtain computer data via phone line! The Information Age
is now in its infancy - it is here and it is real. It is also growing at
a rate of 400 percent a year.
CompuServe and Prodigy both claim 750,000 paying customers. Prodigy
stresses that their figures reflect modems at home only. They have no
count of businesses. Local system operators tell me a significant number
of calls originate from offices - their "guesstimate" is that office use
may increase the figures by another 20 percent.
(...)
The question keeps coming up: How many BBSs are there? Nobody knows.
In Sacramento, the best guess is about 200. Worldwide, the number is
quickly growing. About two years ago I obtained a list of BBS members of
FidoNet. At the time there were about 6,000 member systems. The
January 1991 Node lists over 11,000 BBSs worldwide! It is important to
note that there are several large networks, of which FidoNet is only
one. U.S. Robotics claims to have a list of 12,000 BBSs that use their
modems in this country alone. It is clear that millions of individuals
are using PC telecommunications and the numbers are getting larger.
#O LAN Times
#D March 18, 1991 [pp75-76]
#T Software Piracy Now Costs Industry Billions: But software authentication
devices can protect your investment from thieves
#A Charles P. Koontz
About a zillion years ago when I first read _Swiss Family Robinson_, I
always wondered why the Robinson family was so fearful of Malaysian
pirates. After all, I was accustomed to the proper civilized pirates in
all the Errol Flynn movies. But it turns out the Malaysian variety were
much worse. The same is true of the pirates that prey on the modern
software industry.
In the software industry, the civilized pirates are the ones who copy an
occasionally program from a friend without paying for it.. Most of us at
lest know someone who's done it. I've heard of places where none of the
software in an office is legal.
Civilized pirates are still thieves and they break the law, but they
have a better attitude. They should look into shareware as an
alternative source. It's almost as cheap and often every bit as good.
In the software industry, the crook who makes a living by making and
selling copied software is the modern equivalent of a Malaysian pirate.
The fact that a lot of them are located in the orient where piracy may
not be illegal helps the analogy. It seems however that the practice is
spreading to more local climates.
The process is fairly simple and requires only a small investment to get
started. At the simplest level, all the pirate needs is a copy of a
popular program, a PC, and a place to duplicate the distribution
diskettes. More sophisticated pirates have factories employing dozens
of workers running high-speed disk duplicators and copy machines so they
can include the manual in their shrink-wrapped counterfeit package. Some
even copy the silk screening on the manual covers. They then find a
legitimate outlet for the software. The customer only finds out that
the company is bogus when he calls for technical support, if the real
manufacturer tracks serial numbers.
Software piracy has become a part of the cost of doing business for
major software manufacturers. The Software Publishers Association (SPA)
estimates that piracy costs the software industry between 1.5 and 2
billion dollars annually in the USA alone. Worldwide estimates range
from 4 to 5 billion dollars. The legitimate domestic software market
accounts for only 3 billion dollars annually. The SPA estimates that
for every copy of legal software package, there is at least one illegal
copy. If you think this is an exaggeration, just consider all the
illegal copies you know about.
[rest of article discusses hardware anti-piracy devices]
#O New York Times
#D April 21, 1991
#T Dutch break into U.S. computers from 'hacker haven'
#A John Markoff
Beyond the reach of American law, a group of Dutch computer intruders
has been openly defying United States military, space and intelligence
authorities for almost six months.
Recently the intruders broke into a U.S. military computer while being
filmed by a Dutch television crew.
The intruders, working over local telephone lines that enable them to
tap American computer networks at almost no cost, have not done
serious damage and haven't penetrated the most secure government
computer systems, federal investigators say.
The group, however, has entered a wide range of computer systems with
unclassified information, including those at the Kennedy Space Center,
the Pentagon's Pacific Fleet Command, the Lawrence Livermore National
Laboratory and Stanford University.
U.S. government officials said they had been tracking the interlopers,
but no arrests have been made because there are no legal restrictions
in the Netherlands on unauthorized computer access.
"This has been a terrible problem," said Gail Thackeray, a former
Arizona assistant attorney general who has prosecuted computer crimes.
"Until recently there have been few countries that have computer crime
laws. These countries are acting as hacker havens."
American law-enforcement officials said they believed there were three
or four members of the Dutch group, but would not release any names.
A Dutch television news report in February showed a member of the
group at the University of Utrecht reading information off a computer
screen showing what he said was missile test information taken from a
U.S. military computer. His back was to the camera, and he was not
identified.
Because there are no computer crime laws in the Netherlands, American
investigators said the Dutch group boasts that it can enter computers
via international data networks with impunity.
One computer expert who has watched the electronic recordings made of
the group's activities said the intruders do not demonstrate any
particularly unusual computer skills, but instead appear to have
access to documents that contain recipes for breaking computer
security on many U.S. systems. These documents have been widely
circulated on underground systems.
The computer expert said he had seen several recordings of the
break-in sessions and that one of the members of the group used an
account named "Adrian" to break into computers at the Kennedy Space
Center and the Pentagon's commander in chief of the Pacific.
#O GRID News
#I vol. 2, No. 11x&12x
#D April 28, 1991
#T Libertarian Party Candidate Says Yes! to Hackers
#T Telecom Bills Move Forward, Meet Opposition
According to LP presidential hopeful, Andre Marrou, 35% of the
dues-paying members of his party are computer programmers. Despite
the fact that Marrou had never heard of Craig Neidorf or Operation
Sundevil, he had strong opinions on the issues. "A computer is a
printing press. You can churn out stuff on the printer." He did not
move away from the paradigms print gave him but at least he was at a
loss to understand how anyone could not see something so obvious, that
a computer is a printing press.
Then he defended a special kind of hacking. "If you mean hacking to
get into government computers to get the information, there is nothing
wrong with that. There is too much secrecy in government. There is a
principle that the information belongs to the people. 99% of the
classified material is not really important. With hackers most of the
stuff they want to get into should be public in the first place.
Anything the government owns belongs to all of us. Like in real
estate you can get information from the county and I'd extend that
rule of thumb. It would be a good thing if they could get into the
IRS data files."
In line with mainstream libertarian thought, both Andre Marrou his
campaign manager, Jim Lewis (also a former LP veep candidate), said
that they support the idea of government-granted patents. Marrou said
he had never heard of patents being granted for software but knew that
software can be copyrighted. Andre Marrou graduated from MIT.
(2) Telecom Bills Move Forward, Meet Opposition
"Competition and innovation will be stifled and consumers will pay
more for telephone service if the Legislature approves the
telecommunication legislation now before Senate and House committees,"
said 15 lobbyists speaking through the Marketing Resource Group.
Representatives from the AARP, AT&T, MCI, Michigan Cable Television
Association, and the Michigan Association of Realtors all agreed that
it would be wrong to let the local exchange carriers sell cable
television, long distance and information services and manufacture
equipment.
The AARP has opposed this legislation because they do not see a limit
on the cost of phone service. According to the bill BASIC phone rates
would be frozen forever at their November 1990 level. However, there
is no limit on charges for "enhanced services." There is also no
DEFINITION of "enhanced service" but most people involved in the bill
have cited call forwarding, call waiting, fax and computer.
Other provisions of the proposed law would regulate all "information
providers." Further, those who provide information from computers via
the telephone would receive their service "at cost." This provision
takes on new colors in light of a Wall Street Journal story from Jan.
9, 1991, issued along with press release materials from Marketing
Resources. That story outlines how NYNEX inflated its cost figures
selling itself services far in excess of the market rate.
Interestingly enough, increased competition is one of the goals cited
by the bill's key sponsor, Senate Mat Dunaskiss.
#O Telegram-Tribune Newspaper
#D March 23, 1991
#T Amature Hackers Tripped Up
#A Danna Dykstra Coy
San Luis Obispo police have cracked a case of computer hacking. Now
they've got to work out the bugs. Officers were still interviewing
suspects late Friday linked to a rare case of computer tampering that
involved at least four people, two of them computer science majors
from Cal Poly.
The hackers were obvious amateurs, according to police. They were
caught unknowingly tapping into the computer system in the office of
two local dermatologists. The only information they would have
obtained, had they cracked the system's entry code, was patient
billing records.
Police declined to name names because the investigation is on-going.
They don't expect any arrests, though technically, they say a crime
has been committed. Police believe the tampering was all in fun,
though at the expense of the skin doctors who spent money and time
fixing glitches caused by the electronic intrusion.
"Maybe it was a game for the suspects, but you have to look at the
bigger picture," said the officer assigned to the case, Gary Nemeth.
"The fact they were knowingly attempting to access a computer system
without permission is a crime." Because the case is rare in this
county, police are learning as they go along. "We will definitely
file complaints with the District Attorney's Office," said Nemeth.
"They can decide whether we've got enough of a case to go to trial."
Earlier this month San Luis dermatologists James Longabaugh and
Jeffrey Herten told police they suspected somebody was trying to
access the computer in the office they share at 15 Santa Rosa St. The
system, which contains patient records and billing information,
continually shut down. The doctors were unable to access their
patients' records, said Nemeth, and paid a computer technician at
least $1,500 to re-program their modem.
The modem is a device that allows computers to communicate through
telephone lines. It can only be accessed when an operator "dials" its
designated number by punching the numbers on a computer keyboard. The
"calling" computer then asks the operator to punch in a password to
enter the system. If the operator fails to type in the correct
password, the system may ask the caller to try again or simply hang
up. Because the doctors' modem has a built-in security system,
(cont' NIA072 File 8)
/ /
/ NIA072 / File 8 /
/ CyberTimes (Vox Populi) /
/ Judge Dredd /
/ /
(cont' NIA072 / File 7)
several failed attempts causes the system to shut down completely.
The technician who suspected the problems were more than mechanical,
advised the doctors to call the police. "We ordered a telephone tap
on the line, which showed in one day alone 200 calls were made to that
number," said Nemeth. "It was obvious someone was making a game of
trying to crack the code to enter the system." The tap showed four
residences that placed more than three calls a day to the doctors'
computer number. Three of the callers were from San Luis Obispo and
one was from Santa Margarita. From there police went to work.
"A lot of times I think police just tell somebody in a situation like
that to get a new phone number," said Nemeth, "and their problem is
resolved. But these doctors were really worried. They were afraid
someone really wanted to know what they had in their files. They
wondered if it was happening to them, maybe it was happening to
others. I was intrigued."
Nemeth, whose training is in police work and not computer crimes, was
soon breaking new ground for the department. "Here we had the
addresses, but no proper search warrant. We didn't know what to name
in a search warrant for a computer tampering case." A security
investigator for Pacific Bell gave Nemeth the information he needed:
disks, computer equipment, stereos and telephones, anything that could
be used in a computer crime.
Search warrants were served at the San Luis Obispo houses Thursday and
Friday. Residents at the Santa Margarita house have yet to be served.
But police are certain they've already cracked the case. At all three
residences that were searched police found a disk that incorrectly
gave the doctors' phone number as the key to a program called "Cygnus
XI". "It was a fluke," said Nemeth. "These people didn't know each
other, and yet they all had this same program". Apparently when the
suspects failed to gain access, they made a game of trying to crack
the password, he said. "They didn't know whose computer was hooked up
to the phone number the program gave them," said Nemeth. "So they
tried to find out."
Police confiscated hundreds of disks containing illegally obtained
copies of software at a residence where two Cal Poly students lived,
which will be turned over to a federal law enforcement agency, said
Nemeth.
Police Chief Jim Gardner said he doesn't expect this type of case to
be the department's last, given modern technology. "What got to be a
little strange is when I heard my officers talk in briefings this
week. It was like I need more information for the database'." "To
think 20 years ago when cops sat around and talked all you heard about
was 211' cases and dope dealers."
#O Telegram-Tribune Newspaper
#D March 29, 1991
#T Computer Case Takes A Twist
#A Danna Dykstra Coy
A suspected computer hacker says San Luis Obispo police overreacted
when they broke into his house and confiscated thousands of dollars of
equipment. "I feel violated and I'm angry" said 34-year-old engineer
Ron Hopson. All of Hopson's computer equipment was seized last week
by police who believed he may have illegally tried to "hack" his way
into an office computer belonging to two San Luis Obispo
dermatologists. Police also confiscated equipment belonging to three
others.
"If police had known more about what they were doing, I don't think it
would have gone this far," Hopson said. "They've treated me like a
criminal, and I was never aware I was doing anything wrong. It's like
a nightmare." Hopson, who has not been arrested in the case, was at
work last week when a neighbor called to tell him there were three
patrol cars and two detective cars at his house. Police broke into
the locked front door of his residence, said Officer Gary Nemeth, and
broke down a locked door to his study where he keeps his computer.
"They took my stuff, they rummaged through my house, and all the time
I was trying to figure out what I did, what this was about. I didn't
have any idea."
A police phone tap showed three calls were made from Hopson's
residence this month to a computer at an office shared by doctors
James Longabaugh and Jeffrey Herten. The doctors told police they
suspected somebody was trying to access the computer in their office
at 15 Santa Rosa St. Their system, which contains patient records and
billing information, kept shutting down. The doctors were unable to
access their patients' records, said Nemeth. They had to pay a
computer technician at least $1,500 to re-program their modem, a
device that allows computers to communicate through telephone lines.
Hopson said there is an easy explanation for the foul-up. He said he
was trying to log-on to a public bulletin board that incorrectly gave
the doctors number as the key to a system called "Cygnus XI". Cygnus
XI enabled people to send electronic messages to one another, but the
Cygnus XI system was apparently outdated. The person who started it
up moved from the San Luis Obispo area last year, and the phone
company gave the dermatologists his former number, according to
Officer Nemeth.
Hopson said he learned about Cygnus XI through a local computer club,
the SLO-BYTES User Group. "Any of the group's 250 members could have
been trying to tap into the same system", said Robert Ward, SLO-BYTES
club secretary and computer technician at Cal Poly. In addition, he
suspects members gave the phone number to fellow computer buffs and
could have been passed around the world through the computer
Bulletin-Board system. "I myself might have tried to access it three
or four times if I was a new user," he said. "I'd say if somebody
tried 50 times, fine, they should be checked out, but not just for
trying a couple of times."
Police said some 200 calls were made to the doctors modem during the
10 days the phone was tapped. "They say, therefore, its obvious
somebody is trying to make a game of trying to crack the computer
code", said Hopson. "The only thing obvious to me is a lot of people
have that published number. Nobody's trying to crack a code to gain
illegal access to a system. I only tried it three times and gave up,
figuring the phone was no longer in service."
Hopson said he tried to explain the situation to the police. "But
they took me to an interrogation room and said I was lying. They
treated me like a big-time criminal, and now they won't give me back
my stuff." Hopson admitted he owned several illegally obtained copies
of software confiscated by police. "But so does everybody," he said,
"and the police have ever right to keep them, but I want the rest of
my stuff."
Nemeth, whose training is in police work and not computer crimes, said
this is the first such case for the department and he learning as he
goes along. He said the matter has been turned over to the District
Attorney's Office, which will decide whether to bring charges against
Hopson and one other suspect.
The seized belongings could be sold to pay restitution to the doctors
who paid to re-program their system. Nemeth said the police are
waiting for a printout to show how many times the suspects tried to
gain access to the doctors' modem. "You can try to gain access as
many times as you want on one phone call. The fact a suspect only
called three times doesn't mean he only tried to gain access three
times."
Nemeth said he is aware of the bulletin board theory. "The problem is
we believe somebody out there intentionally got into the doctors'
system and shut it down so nobody could gain access, based on evidence
from the doctors' computer technician," said Nemeth. "I don't think
we have that person, because the guy would need a very sophisticated
system to shut somebody else's system down." At the same time, he
said, Hopson and the other suspects should have known to give up after
the first failed attempt. "The laws are funny. You don't have to
prove malicious intent when you're talking about computer tampering.
The first attempt you might say was an honest mistake. More than
once, you have to wonder."
Police this week filled reports with the District Attorney's Office
regarding their investigation of Hopson and another San Luis Obispo
man suspected of computer tampering. Police are waiting for Stephen
Brown, a deputy district attorney, to decide whether there is enough
evidence against the two to take court action. If so, Nemeth said he
will file reports involving two other suspects, both computer science
majors from Cal Poly. All computers, telephones, computer instruction
manuals, and program disks were seized from three houses in police
searches last week. Hundreds of disks containing about $5,000 worth
of illegally obtained software were also taken from the suspects'
residences.
Police and the District Attorney's Office are not naming the suspects
because the case is still under investigation. However, police
confirmed Hopson was one of the suspects in the case after he called
the Telegram-Tribune to give his side of the story.
#O Telegram-Tribune Newspaper
#D April 12, 1991
#T Hackers' Off Hook, Property Returned
#A Danna Dykstra Coy
Two San Luis Obispo men suspected of computer tampering will not be
charged with any crime. They will get back the computer equipment
that was seized from their homes, according to Stephen Brown, a deputy
district attorney who handled the case. "It appears to have been a
case of inadvertent access to a modem with no criminal intent," said
Brown. San Luis Obispo police were waiting on Brown's response to
decide whether to pursue an investigation that started last month.
They said they would drop the matter if Brown didn't file a case.
The officer heading the case, Gary Nemeth, admitted police were
learning as they went along because they rarely deal with computer
crimes. Brown said he doesn't believe police overreacted in their
investigation. "They had a legitimate concern."
In early March two dermatologists called police when the computer
system containing patient billing records in their San Luis Obispo
office kept shutting down. They paid a computer technician about
$1,500 to re-program their modem, a device that allows computers to
communicate through the telephone lines. The technician told the
doctors it appeared someone was trying to tap into their system. The
computer's security system caused the shutdown after several attempts
to gain access failed.
Police ordered a 10-day phone tap on the modem's line and, after
obtaining search warrants, searched four residences where calls were
made to the skin doctors' modem at least three times. One suspect,
Ron Hopson, said last week his calls were legitimate and claimed
police overreacted when they seized his computer, telephone, and
computer manuals. Hopson could not reached Thursday for comment.
Brown's investigation revealed Hopson, like the other suspects, was
trying to log-on to a computerized "bulletin-board" that incorrectly
gave the doctors' number as the key to a system called "Cygnus XI".
Cygnus XI enabled computer users to electronically send messages to
one another. Brown said while this may not be the county's first
computer crime, it was the first time the District Attorney's Office
authorized search warrants in a case of suspected computer fraud using
telephone lines. Police will not be returning several illegally
obtained copies of software also seized during the raids, he said.
#O Contingency Journal
#D May/June 1991
#T Restitution Ordered For Bell South Hackers
#D Michael H. Agranoff, Attorney
The law is beginning to respond effectively to the problem of computer
hacking. In September 1988, three young men began implementing a
scheme to steal proprietary data from Bell South Telephone Co.
computers. They illegally gained access to Bell South from a home
computer, downloaded the data and tried to disguise the fraud by using
the IDs of legitimate users.
The stolen data was transferred on an interstate computer network and
stored on a bulletin board system. It was made known to others in a
hacker's newsletter published by one of the schemers.
If the fraud had continued, it could have disrupted telecommunication
channels throughout the country, according to government prosecutors.
The hackers were in a position to retrieve and modify credit
information, eavesdrop on telephone conversations and worse.
Various charges of fraud, theft and conspiracy were lodged against the
trio. They attempted to get the charges dismissed on technical
grounds, were unsuccessful and pleaded guilty to a smaller number of
charges.
A federal judge in Georgia imposed sentences last November. One
hacker was given 21 months in prison and two years supervised
probation.
The other two hackers were each given 14 months in prison. Seven of
those months were to be served in a half-way house, where they must
assist colleges and businesses in computer work. Following release,
the hackers must each complete three years community service, to
include 120 hours each year of computer-related work, during which
time they may not own or access a computer, except for employment,
without supervision approved by the court.
Each of the three hackers was also ordered to pay restitution to Bell
South amounting to $233,880 per hacker. Readers may reflect upon this
sentence. In trying to protect the public interest and yet not be
vindictive, the judge rendered (in this writer's opinion) a wise and
thoughtful decision. Will it send the appropriate message to potential
hackers throughout the country? Let us see.
#O Unix Today
#D April 29, 1991
#T Internet Break-Ins
#A Dutch Cracker Easily Accessed U.S. Computers
Allegations that Dutch crackers have been operating with impunity for
months against U.S. computers has stirred a debate whether systems
administrators have been negligent in failing to close easy, obvious
security holes that have been well-known for years.
Dutch crackers have, since September, been using the Internet to
access computers, most of them Unix machines, at the Kennedy Space
Center, the Pentagon's Pacific meet Command, the Lawrence Livermore
National laboratories and Stanford University. The techniques they've
used have been simple, well-known and uncreative, and they've found
the job an easy one, say sources. "These are not skilled computer
geniuses like Robert Morris," said Cliff Stoll, author of The Cuckoo's
Egg, who said he's been in contact with some Dutch crackers who may
have committed the break-ins. "These are more like the kind of hacker
I caught, sort of plodding, boring people." Stoll's 1989 book
concerned his pursuit of a cracker.
Techniques include guessing at commonly used passwords, default
passwords that ship with Unix systems and that some users don't bother
to change, and using guest accounts, said Stoll.
The crackers managed to obtain superuser privileges at a system at
Stanford University, said Bill Bauridel, information security officer
at Stanford University Data Center. They used a bug in sendmail - the
same program exploited by Robert Morris to loose a worm on the
Internet in 1988, though Bauridel said the crackers did not use the
sendmail feature that Morris exploited.
The Lawrence Livermore Laboratories computers were only used as a
gateway to other systems, said Bob Borchers, associate director for
computation at the labs.
The crackers have been able to access only non-classified material,
such as routine memos say authorities. So far, no evidence has been
found that they did anything malicious once they broke into a U.S.
site.
The lack of laws governing computer crime in Holland allows crackers
to operate with relative impunity, said Martin de Lange, managing
director of ACE, and Amsterdam-based Unix systems software company.
The impunity combines with an anti-authoritarian atmosphere in Holland
to make cracking a thriving practice, said Stoll. "There's a national
sense of thumbing one's nose at the Establishment that's promoted and
appreciated in the Netherlands," he said. "Walk down the streets of
Amsterdam and you'll find a thriving population that delights in
finding ways around the Establishment's walls and barriers."
The break-ins became a subject of notoriety after a Dutch television
show called After the News ran film Feb. 2 purporting to be of an
actual cracker break-in, said Henk Bekket, a network manager at
Utrecht University.
Utrecht University in Holland was reported to be the first site broken
into. Bekker said he was able to detect two break-ins, one in October
and one again in January.
The crackers apparently dialed into a campus terminal network that
operates without a password, accessed the campus TCP/IP backbone, and
then accessed another machine on campus-a VAX 11/75-that hooks up to
SURFnet, a national X.25 network in Holland.
>From SURFnet, they were presumably able to crack into an Inter-net
computer somewhere, and from there access the computers in the United
States, said Bekker.
The dial-in to SURFnet gateway has been canceled since the January
attempt, he said. (Presumably, the break-in footage aired Feb. 2 was
either through another channel, or filmed earlier.)
Bekker said he manages a network consisting of a DECsystem 5500 server
and 40 to 50 Sun and VAX VMS workstations. He noted a break-in to
another machine on campus Jan. 16, and into a machine at the
University of Leyden in October.
A cracker was searching DECnet I password files for accounts with no
password. The cracker was also breaking into machines over DECnet,
said Bekker. The cracker had a rough idea of the pattern of DECnet
node addresses in Holland, and was trying to guess machine addresses
from there. Node addresses begin with the numerals 28, said Bekker,
and he found log files of the cracker searching for machines at 28.1,
28.2, 28.3 and so on. But the cracker did not know that the actual
sequence goes 28.100, 28.110, and so on.
"Hackers are organized to get together, discuss technologies, and they
openly demonstrate where there are installations prone to break-in,"
de Lange said. Computer crime in Holland can be prosecuted under laws
covering theft of resources, wiretapping and wire fraud, said Piet
Beertema, of the European Unix User Group, and network manager of the
Center for Mathematics and Computer Science in Amsterdam.
And finding someone to investigate can also be a problem, said Bekker.
"You cannot go to the police and say, 'Hey, someone has broken into my
computer.' They can't do anything about it," he said.
Stoll, the American author, said crackers appear firmly rooted in
Dutch soil.
"There is a history going back more than five years of people getting
together and breaking into computers over there," he said. "Hacker
clubs have been active there since 1985 or 1986."
But he said it's more than lack of law that has made cracking so
popular. Most industrialized nations have no cracking laws, and those
that have them find prosecution extremely difficult, he said. Dutch
citizens also have an anti-authoritarian spirit, he added.
But Stoll condemmed the crackers. "This is the sort of behavior that
wrecks the community, spreads paranoia and mistrust," he said. "It
brings a sense of paranoia to a community which is founded on trust."
Because no classified data was accessed, Mike Godwin, attorney for the
Electronic Frontiers Foundation (EFF), cautioned against making too
much of the incidents.
"What did these people do" he said. "There's no sense that they
vandalized systems or got ahold of any classified information." The
itself as an organization fighting to see civil rights guarantees
extended to information systems. The Cambridge, Mass., organization
has been involved in a number of cracker defenses.
The fact that the systems were breached means the data's integrity is
compromised, said Netunann. just because the data isn't classified
doesn't mean it isn't important, he noted. 'Just because you can't get
into classified systems doesn't mean you can't get sensitive
information," he said.
#O Network World
#D April 29, 1991
#T Long-haul carriers may offer toll-fraud monitoring: Services would
help shield customers from hackers
#A Anita Taff, Washington Bureau Chief
WASHINGTON D.C. -- Long-distance carriers are considering offering
services that would shield customers from toll fraud by monitoring
network activity for suspicious traffic patterns and tipping off
users before huge costs would be run up, Network World has
learned.
Hackers are defrauding corporations by dialing into their private
branch exchanges and using stolen authorization codes to dial out
of the switches to remote destinations, sticking the switch owners
with charges ranging from several thousand to, in one case, a
million dollars.
Users have been loathe to report toll fraud because they are
embarrassed about the security breaches or because they have entered
into private settlements with carriers that cannot be disclosed. But
earlier this year, Pacific Mutual Life Insurance Co., exasperated by
$200,000 in fraudulent charges run up during one weekend and lack of
progress in settling the issue with AT&T, turned to the Federal
Communications Commission for help.
The insurance company asked the FCC to open a proceeding in order to
establish guidelines that fairly distribute liability for toll fraud
among users, long distance carriers and customer premises equipment
manufacturers. The company questioned the validity of AT&T's claims
that its tarriffs place the liability for fraud on users' shoulders.
Both AT&T and MCI Communications Corp. oppose Pacific Mutual's
position.
But it is clear something has to be done. Customers lose $500 million
annually to toll fraud, according to the Communications Fraud
Control Association.
"There are two kinds of customers: those who have been victims of
toll fraud and those who are about to [become victims]," said Jim
Snyder, staff member of the systems integrity department at MCI.
According to Snyder, about 80% of the calls placed by hackers go to
one of three places: Columbia, Pakistan and area code 809, which
covers Caribbean countries including the Dominican Republic and
Jamaica. Often, the calls are placed at night or during weekends. It
is this thumbprint that would enable carriers to set up monitoring
services to identify unusual activity. He said MCI is considering
such a service but has not yet decided whether to offer it.
AT&T would also be interested in rolling out such a monitoring
service if customer demand exists, a spokesman said.
Henry Levine, a telecommunications attorney in Washington, D.C. who
helps customers put together Tariff 12 deals, said he knows of
several users that have requested toll-fraud monitoring from AT&T.
He said AT&T is currently beta-testing technology that gives users
real-time access to call detail data, a necessary capability for
real-time monitoring.
US Sprint Communications Co. offers a monitoring service for its
800, UltraWATS, Virtual Private Network, SprintNet and voice mail
customers free of charge, but it is not a daily, around-the-clock
monitoring service, and the typical lag time until user are notified
of problems is 24 hours.
In a filing on behalf of the Securities Industry Association, Visa
USA, Inc., the New York Clearinghouse Association and Pacific
Mutual, Levine urged the agency to require carriers to offer
monitoring services. Network equipment could monitor traffic
according to preset parameters for call volume, off-hour calling and
suspicious area or country codes, he said. If an anomaly is
detected, Levine's proposal suggests that carriers notify users
within 30 minutes. Therefore, users would be held liable for only a
nominal amount of fraudulent charges.
#O Houston Chronicle
#T Lawsuit alleges rights violations in computer crime crackdown
#A Joe Abernathy
An Austin game publisher has sued the U.S. Secret Service for alleged
civil rights violations in connection with a nationwide crackdown on
computer crime.
Steve Jackson Games, whose case has become a cause celebre in the
computer network community, alleges in the lawsuit that a raid
conducted during OperationSun Devil violated the rights of the company
and its customers to free speech, free association, and a free press.
The lawsuit in federal district court in Austin further claims the
raid was a violation of the protection against unreasonable search and
seizure, and violated the law restricting the government from
searching the office of publishers for work products and other
documents. It seeks unspecified damages.
"This is a lawsuit brought to establish the statutory rights of
businesses and individuals who use computers," said Jackson's
attorney, Sharon Beckman of Boston. "It's about the First Amendment,
it's about the right to privacy, and it's about unreasonable
government intrusion."
Defendants include the Secret Service; Assistant United States
Attorney William J. Cook in Chicago; Secret Service agents Timothy M.
Foley and Barbara Golden; and Henry M. Kluepfel of Bellcore, a
telephone company research consortium which assisted the agency in its
investigation.
Earl Devaney, special agent in charge of the Secret Service fraud
division, said that his agency was barred from responding to the
allegations contained in the lawsuit.
"Our side of the story can't be told because we're compelled by the
laws that govern us to remain mute," he said. "We'll have to let the
future indictments, if there are any, and the future trials speak for
themselves."
Devaney said the agency recently completed its review of evidence
seized during Operation Sun Devil and has sent it to federal
prosecutors. He couldn't predict how many indictments will result.
The Electronic Frontier Foundation, founded by computer industry
activists after questions arose regarding the legality of several Sun
Devil raids, is paying Jackson's legal fees. James R. George, an
Austin attorney with expertise in constitutional law, represents
Jackson in Texas.
Contending that civil rights normally taken for granted are often
denied to users of computer networks and bulletin boards, the EFF
attorneys designed Jackson's case as a test of how courts will treat
these issues.
"What happened was so clearly wrong," Beckman said. "Here we have a
completely innocent businessman, a publisher no less, whose
publications are seized, whose computers are seized, whose private
electronic mail is seized, and all for no good reason."
Jackson's firm was raided on March 1, 1990, along with 27 other homes
and businesses across the nation. The Secret Service confiscated
dozens of computers and tens of thousands of computer data disks in
the raids. After several months passed with no charges being filed,
the agency came under increasing fire for Sun Devil.
"They raided the office with no cause, confiscated equipment and data,
and seriously delayed the publication of one big book by confiscating
every current copy," Jackson said. "It very nearly put us out of
business, and we are still extremely shaky."
Seven months after the raid on Jackson's firm, the search warrant was
unsealed, revealing that the firm was not even suspected of
wrongdoing. An employee was suspected of using a company bulletin
board system to distribute a document stolen from the telephone
company.
Bulletin board systems, called BBSs in computer jargon, allow people
with common interests to share information using computers linked by
telephone. Jackson's bulletin board, Illuminati, was used to provide
product support for his games - which are played with dice, not
computers.
Beckman said the search warrant affidavit indicates investigators
thought the phone company document was stored on a bulletin board at
the employee's home, and therefore agents had no reason to search the
business.
"Computers or no computers, the government had no justification to
walk through that door," she said.
Beckman said that by seizing the BBS at Steve Jackson Games, the
Secret Service had denied customers the right to association.
"This board was not only a forum for discussion, it was a forum for a
virtual community of people with a common interest in the gaming
field," she said. "Especially for some people who live in a remote
location, this forum was particularly important, and the Secret
Service shut that down."
Jackson was joined in the lawsuit by three New Hampshire residents,
Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan, who used the
Illuminati BBS.
"Another right is privacy," Beckman said. "When the government seized
the Illuminati board, they also seized all of the private electronic
mail that (callers) had stored. There is nothing in the warrant to
suggest there was reason to think there was evidence of criminal
activity in the electronic mail - the warrant doesn't even state that
there was e-mail."
"That, we allege, is a gross violation of the Electronic
Communications Privacy Act," Beckman said.
Mitchell D. Kapor, creator of the popular Lotus spreadsheet program
and co-founder of the Electronic Frontier Foundation, said:
"The EFF believes that it is vital that government, private entities,
and individuals who have violated the Constitutional rights of
individuals be held accountable for their actions. We also hope this
case will help demystify the world of computer users to the general
public and inform them about the potential of computer communities."
#O Computerworld
#D Gary H. Anthes
#T Court Tosses Inslaw Appeal
#A Gary H. Anthes
Washington, D.C.- A three-judge panel of the US Court of Appeals throw
out two lower court rulings last week that said the US Department of
Justice had stolen software from Inslaw, Inc. and had conspired to
drive the firm out of business.
The Court of Appeals for the Washington, D.C., circuit did not
consider the validity of the lower court findings but said the
bankruptcy court that first upheld Inslaw's charges had exceeded its
authority.
This is a serious setback for Inslaw, which said it has spent five
years and $6 million in legal fees on the matter, but the company
vowed to fight on. It may ask the full court to reconsider, it may
appeal to the US Supreme Court, or it may go to more specialized
tribunals set up by the government to hear disputes over contracts,
trade secrets, and copyrights, Inslaw President William Hamilton said.
"Not many firms could have lasted this long, and now to have this
happen is just unbelievable. But there's no way in hell we will put up
with it," an obviously embittered Hamilton said. It may cost the tiny
firm "millions more" to reach the next major legal milestone, he said.
Double Trouble
Since the bankruptcy court trial in 1987, Inslaw has learned of
additional alleged wrongdoings by the Justice Department.
"The new evidence indicates that the motive of the [software theft]
was to put Inslaw's software in the hands of private sector friends of
the Reagan/Bush administration and then to award lucrative government
contracts to those political supporters," Hamiliton said.
He said that other evidence suggests that the software was illegally
sold to foreign intelligence agencies.
#O Computerworld
#D May 13, 1991
#T Systems Security Tips Go On-Line
#A Michael Alexander
Farifax, Va.-- Information systems security managers, electronic data
processing auditors and others involved in systems protection know
that it can often be difficult to keep on top of security technology
and fast-breaking news. This week, National Security Associates, Inc.,
will officially kick off an on-line service dedicated solely to
computer security.
The repository contains databases of such articles on computer
security that have appeared in 260 publications, computer security
incident reports and vendor security products. One database is devoted
to activity in the computer underground and to techniques used to
compromise systems security.
"This is a tough industry to keep up with," said Dennis Flanders, a
communications engineer with computer security responsibilities at
Boing Co. Flanders has been an alpha tester of National Security
Associates' systems for about six months. "Security information is now
being done piecemeal, and you have to go to many sources for
information. The appealing thing about this is [that] all of the
information is in one place."
The service costs $12.50 per hour. There is a onetime sign-up charge
of $30, which includes $15 worth of access time.
#O The LA Times
#D May 29, 1991 [p. B-3]
#T Writer Gets Probation in Sting at Fox
#A John Kendall
Free-lance writer Stuart Goldman pleaded no contest Tuesday to three
felony charges of illegally entering Fox Televisions computer system
and stealing story ideas planted by Los Angeles police in a sting
operation.
In a plea bargain presented by prosecutors and approved by Superior
Court Judge Richard Neidorf, the 45-year-old self-proclaimed muckraker
was placed on five years' probation and ordered to pay $90,000 in
restitution, reduced to $12,000 with Fox's approval.
The judge ordered Goldman to serve 120 days in County Jail but stayed
the sentence.
Deputy Dist. Atty. Richard Lowenstein moved for dismissal of four
additional counts of entry of a computer illegally. Goldman's
no-contest pleas were tantamount to admitting guilt, the prosecutor
said.
Despite the pleas, Goldman continued to insist outside the courtroom
Tuesday that Hollywood-based Fox had attempted to silence him.
"There's been an effort by Fox Television to silence me and, as far as
I'm concerned, that's what this case was all about," Goldman told
reporters.
Attorney James E. Hornstein, representing Fox Television, denied
Goldman's charge. He said his client had agreed to reduce the
court-ordered restitution from $90,000 to $12,000 on Goldman's "plea
and statement that he is indigent."
"Throughout these proceedings, Mr. Goldman has tried to argue that
someone was out to get him," Hornstein said. "The only victims in
these proceedings were the computers of "A Current Affair which Mr.
Goldman has admitted by the plea he accessed illegally."
Goldman was arrested at his Studio City apartment in March of last
year by Secret Service agents and Los Angeles police who confiscated a
personal computer, floppy disks, Rolodexes and a loaded .38 caliber
handgun.
Prosecutors accused Goldman of using a password apparently gained when
the journalist worked briefly for "A Current Affair" to enter the Fox
production's computer system. They charged that Goldman stole bogus
tips, including one involving "Ronald Reagan Jr.'s Lover," and
attempted to sell the items to a national tabloid magazine.
In an interview with The Times last year Goldman explained that he was
engaged in a free-lance undercover inquiry of gossip news-papers and
TV shows, and he claimed that his arrest was a setup to get him.
"These people will look very foolish when they get into court,"
Goldman insisted at the time. "I'm a good guy, and I'm going to prove
it. This is going to be the biggest soap opera you ever saw."
After his arrest, Goldman said he was writing a book about his
experience as a former gossip media insider who once attacked
feminists, gays and other targets in vitriolic columns in the National
Review.
After Tuesday's court session, Goldman vowed to publish his completed
book, "Snitch," as soon as possible.
Neidorf ordered authorities to return Goldman's computer.
"I'm sure you know now that computers will get you in trouble," the
judge said. "If you don't, I'll see you back in her again."
#O NewsBytes
#D June 12, 1991
#T Len Rose Sentenced To 1 Year
#A n/a
BALTIMORE, MARYLAND, U.S.A., 1991 JUNE 12 (NB) -- Leonard Rose, Jr., a
computer consultant also known as "Terminus", was sentenced to a year
and a day in prison for charges relating to unauthorized sending of
AT&T UNIX source code via telephone to another party. Rose is
scheduled to begin serving his sentence on July 10th.
The original indictment against Rose was for interstate transportation
of stolen property and violations of the Computer Fraud and Abuse Act
but those charges were dropped and replaced by a single charge of wire
fraud under a plea agreement entered into in March. The charges
involving the violation of the Computer Fraud and Abuse Act had been
challenged in a friend of the court brief filed in January by the
Electronic Frontier Foundation (EFF) who challenged the statute as
"unconstitutionally vague and overbroad and in violation of the First
Amendment guarantees of freedom of speech and association." The issues
raised by EFF were not resolved as the charges to which they objected
were dropped as part of the plea agreement.
In his plea, Rose admitted to receiving misappropriated UNIX source
code and modifying it to introduce a trojan horse into the login
procedures; the trojan horse would allow its developer to collect
passwords from unsuspecting persons logging on to a system containing
this code. Rose admitted that he transmitted the modified code via
telephone lines to a computer operator in Lockport, IL and a student
account at the University of Missouri. He also admitted putting
warnings in the transmitted code saying "Warning: This is AT&T
proprietary source code. DO NOT get caught with it."
U.S. District Judge J. Frederick Motz, in sentencing Rose, ordered him
to sell his computer equipment and to inform potential employers of
his conviction. Assistant United States Attorney Geoffrey Garinther,
who prosecuted Rose, explained these portions of the sentence to
Newsbytes, saying "The equipment was seized as evidence during the
investigation and was only returned to him as part of the agreement
when it became evident that he had no means of supporting his wife and
two children. It was returned to him for the sole purpose of selling
the equipment for this purpose and, although he has not yet sold it,
he has shown evidence of efforts to do so. The judge just formalized
the earlier agreement in his sentence. The duty to inform potential
employers puts the burden of proof on him to insure that he is not
granted "Root" privileges on a system without the employer's
knowledge."
Garinther added "I don't have knowledge of the outcome of all the
cases of this type in the country but I'm told that this is one of the
stiffest sentences a computer hacker has received. I'm satisfied
about the outcome."
Jane Macht, attorney for Rose, commenting to Newsbytes on the
sentence, said "The notification of potential employers was a
negotiated settlement to allow Len to work during the three years of
his supervised release while satisfying the government's concern that
employers be protected." Macht also pointed out that many reports of
the case had glossed over an important point,"This is not a computer
intrusion or security case; it was rather a case involving corporate
computer software property rights. There were no allegations that Len
broke into anyone's system. Further, there are no reported cases of
anyone installing his modified code on any system. It should be
understood that it would require a system manager or someone else with
'superuser' status to install this routine into the UNIX login
procedure. The publishing of the routine did not, as has been
reported, open the door to a marked increase in unauthorized computer
access."
Macht said that she believed that Rose had reached an agreement to
sell the computer equipment. He had been offering it through the
Internet for $6,000, the amount required to prepay his rent for the
length of his prison sentence. Because of his financial circumstances,
which Macht referred to as a "negative net worth", the judge did not
order any restitution payments from Rose to AT&T.
#O NewsRelease
#D May 31, 1991
#T Search Warrants Served in Computer "Hacking" Scheme
INDIANAPOLIS -- The Indianapolis Police Department, the Federal Bureau
of Investigation, and the United States Secret Service served search
warrants at five Indianapolis locations on Wednesday, May 29, 1991,
for computer-related equipment. The warrants were served by five teams
of law enforcement officials forming a group known as the Special
Computerized Attack Team (SCAT).
SCAT is a cooperative effort between the Indianapolis Police
Department the FBI, the Secret Service and other federal, state and
local law enforcement agencies aimed at tracking computer "hackers"
who illicitly enter the computer systems of companies in an attempt to
gain sensitive information, money, or company secrets.
The White Collar Crime Unit of IPD obtained information from the FBI
and Secret Service concerning illegal computer access to the PBX
system of an Indianapolis company. Armed with search warrants, SCAT
members confiscated computer equipment from fie Indianapolis residences
which linked several juveniles to the crime. The Indianapolis company
has experienced losses which approach $300,000. A search warrant was
served simultaneously by FBI agents, the Secret Service and Michigan
State Police in West Bloomfield, Michigan, in this same case.
Information gained from the search warrants has led police to continue
the investigation in other cities as well.
Suspects in the case are all juveniles and the investigation is
continuing to determine if the evidence collected will support
arrests. The SCAT unit is currently investigating other
computer-related crimes and hopes to send a strong message to computer
"hakers" that their illegal actions are being monitored closely bylaw
enforcement officials.
For further information, please contact Special Agent in Charge Roy
Yonkus, U.S. Secret Service (Indiana) at 317/ 639-3301; or John M.
Britt, Assistant to the Special Agent in Charge, U.S. Secret Service
(Detroit Office) at 313/ 226-6400.
#O NewsBytes
#D June 21, 1991
#T Norman & Thackeray Form Security Firm
DALLAS, TEXAS U.S.A., 1991 JUNE 21 (NB) -- Neal Norman, a veteran of
34 years with AT&T, has announced the formation of GateKeeper
Telecommunications Systems, Inc. The new firm will introduce a
product which it says "provides an airtight defenses against
unauthorized computer access."
Norman told Newsbytes "we think we have a product that will
revolutionize telecommunications by stopping unauthorized access to
computer systems." Norman said that the system, which is scheduled to
become available in the early fall, will provide protection for
terminals, mainframes, and PBXs.
Norman also told Newsbytes that Gail Thackeray, ex-Arizona assistant
attorney general known for her activities in the investigation of
computer crime, will be a vice president of the new firm. "I am
extremely happy to have someone of Gail's ability and presence
involved in this endeavor right from the beginning. Additionally,"
Norman said, "we have enlisted some of the industry's most well known
persons to serve on a board of advisors to our new company. These
respected individuals will provide guidance for us as we bring our
system to market. Among those who have agreed to serve in this group
are Donn Parker of SRI; Bill Murray, formerly of IBM; and Bob Snyder,
Chief Computer Crime Investigator for the Columbus, Ohio, police.
Synder told Newsbytes "I am excited about working with such bright
people on something of real importance and I hope to contribute to an
improvement in computer security."
#O The Wall Street Journal
#D June 6, 1991 [pp A-1, A-7]
#T Dialing For Free
#A John J. Keller
Robert Dewayne Sutton wants to help stop the tide of fraud sweeping the
cellular telephone industry. The 35-year old clearly knows plenty about
(cont' NIA072 / File 9)
/ /
/ NIA072 / File 9 /
/ CyberTimes (Vox Populi) /
/ Judge Dredd /
/ /
(cont' NIA072 / File 8)
fraud. After all, he helped spark the crime wave in the first place.
Mr. Sutton is a computer hacker, a technical whiz who used an
acquaintance's home-grown computer chip to tap into the local cellular
phone network and dial for free. Mr. Sutton went into business selling the
chips, authorities say, and soon fraudulent cellular phone calls were
soaring nationwide.
In February, 1989, police finally nabbed Mr. Sutton in his pick-up truck at
a small Van Nuys, Calif., gas station. He was about to sell five more of
the custom chips to a middleman. But by then it was too late. The wave of
fraud Mr. Sutton helped launch was rolling on without him.
((stuff deleted explaining that industry currently loosing about $200
million a year, "more than 4% of annual U.S. revenue" to cellular phone
fraud, and could rise to %600 million annually. Celluar system first
cracked in 1987, by Kenneth Steven Bailey an acquaintance of Sutton from
Laguna Niguel, Calif. Bailey used his PC to rewrite the software in the
phone's memory chi to change the electronic serial number. By replacing the
company chip with his own, Bailey could gain free access to the phone
system.))
((More stuff deleted, explaining how drug dealers use the phones, and small
businesses sprung up selling free calls to anyplace in the world for a few
dollars. Sutton denied selling the chips, but apparently sold his program
for a few hundred dollars, and anybody with a copy could duplicate it. This
is, according to the story, an international problem.))
When the dust settled in U.S. District Court in Los Angeles this April, Mr.
Sutton pleaded guilty to production of counterfeit access devices and, after
agreeing to cooperate with investigators, was sentenced to three years'
probation and a $2,500 fine.
((stuff deleted))
But in adversity there is opportunity, or so believes Mr. Sutton. He says
he's got a marketable expertise--his knowledge of weaknesses in cellular
phone security systems--and he wants to help phone companies crack down on
phone fraud. He'll do that, of course, for a fee.
#O Newsweek
#D June 3, 1991
#T How Did They Get My Name?
#A John Schwartz
When Pam Douglas dropped by Michelle Materres's apartment, Michelle
was on the phone--but Pam knew that already. She and her son, Brian,
had been playing with his new walkie-talkie and noticed the toy was
picking up Michelle's cordless-phone conversation next door. They had
come over to warn her that her conversation was anything but private.
Materres was stunned. It was as if her neighbors could peek through a
window into her bedroom-except that Michelle hadn't known that this
window was there. "It's like Nineteen Eighty-four ;" she says.
Well, not quite. In Orwell's oppressive world, Big Brother-the police
state-was watching. "We don't have to worry about Big Brother
anymore," says Evan Hendricks, publisher of the Washington-based
Privacy Times. "We have to worry about little brother." Until
recently, most privacy fears focused on the direct mail industry; now
people are finding plenty of other snoops. Today's little brothers
are our neighbors, bosses and merchants, and technology and modern
marketing techniques have given each a window into our lives.
Suddenly privacy is a very public issue. A 1990 Harris poll, conducted
for consumer-data giant Equifax, showed that 79 percent of respondents
were concerned with threats to their personal privacy-up from 47
percent in 1977. Privacy scare stories are becoming a staple of local
TV news; New York City's ABC affiliate showed journalist Jeffrey
Rothfeder poking into Vice President Dan Quayle's on-line credit
records-a trick he had performed a year before for a story he wrote
for Business Week. Now Congress is scrambling to bring some order to
the hodgepodge of privacy and technology laws, and the U.S. Office of
Consumer Affairs has targeted privacy as one of its prime concerns.
Advocacy groups like the Consumer Federation of America and the
American Civil Liberties Union are turning to privacy as one of the
hot-button issues for the '90s . "There's a tremendous groundswell of
support out there," says Janlori Goldman, who heads the ACLU Privacy
Project.
Snooping boss: Concern is on the rise because, like Materres,
consumers are finding that their lives are an open book. Workers who
use networked computers can be monitored by their bosses, who in some
cases can read electronic mail and could conceivably keep track of
every keystroke to check productivity. Alana Shoars, a former e-mail
administrator at Epson America, says she was fired after trying to
make her boss stop reading co-workers' e-mail. The company says
Shoars got the ax for in subordination; Shoars counters that the
evidence used against her was in her own e-mail--and was
misinterpreted. Other new technologies also pose threats: cordless and
cellular phones are fair game for anyone with the right receiver, be
it a $1,000 scanner or a baby monitor. Modern digital-telephone
networks allow tapping without ever placing a physical bug; talented
"phone phreaks" can monitor calls through phone companies or corporate
switchboards.
Such invasions may sound spooky, but privacy activists warn that the
bigger threat comes from business. Information given freely by
consumers to get credit or insurance is commonly sold for other uses
without the individual's knowledge or consent; the result is a flood
of junk mail and more. Banks study personal financial data to target
potential credit-card customers. Data sellers market lists of people
who have filed Worker Compensation claims or medical-malpractice
suits; such databases can be used to blackball prospective employees
or patients. Citicorp and other data merchants are even pilot testing
systems in supermarkets that will record your every purchase; folks
who buy Mennen's Speed Stick could get pitches and discount coupons to
buy Secret instead. "Everything we do, every transaction we engage in
goes into somebody's computer, " says Gary Culnan, a Georgetown
University associate professor of business administration.
How much others know about you can be unsettling. Architect David
Harrison got an evening call from a local cemetery offering him a deal
on a plot. The sales rep mentioned Harrison's profession, family size
and how long he had lived in Chappaqua, N.Y. Harrison gets several
sales calls a week, but rarely with so much detail: "This one was a
little bizarre."
High tech is not the only culprit. As databases grow in the '80s, the
controls were melting away, says Hendricks. "Reagan came in and said,
'We're going to get government off the backs of the American people.'
What he really meant was, 'We're going to get government regulators
off the i backs of business.' That sent signals to the private sector
that 'you can use people's personal information any way you want'"'
The advent of powerful PCs means that the field is primed for another
boom. Today companies can buy the results of the entire 1990 census
linked to a street-by-street map of the United States on several
CD-ROM disks.
Defenders of the direct-marketing industry point out that in most
cases companies are simply, trying to reach consumers efficiently-and
that well targeted mail is not "junk" to the recipient. Says Equifax
spokesman John Ford: "People like the kinds of mail they want to
receive." Targeting is now crucial, says Columbia University professor
Alan Westin: "If you can't recognize the people who are your better
prospects, you can't stay in business." Ronald Plesser, a lawyer who
represents the Direct Marketing Association, says activists could end
up hurting groups they support: "It's not just marketers. It's
nonprofit communication, it's political parties. It's environmental
groups. "
E-mail protest: Consumers are beginning to fight back. The watershed
event was a fight over a marketing aid with data on 80 million
households, Lotus MarketPlace: Households, proposed by the Cambridge,
Mass.- based Lotus Development Corp. Such information had been readily
available to large corporations for years, but MarketPlace would have
let anyone with the right PC tap in. Lotus received some 30,000
requests to be taken off the households list. Saying the product was
misunderstood, Lotus killed MarketPlace earlier this year. New York
Telephone got nearly 800,000 "opt out" requests when it wanted to
peddle its customer list; the plan was shelved.
With the MarketPlace revolt, a growing right-to-privacy underground
surfaced for the first time. Privacy has become one of the most
passionately argued issues on computer networks like the massive
Internet, which links thousands of academic, business nd military
computers. Protests against MarketPlace were broadcast on the Internet
and the WELL (an on-line service that has become a favorite electronic
hangout for privacy advocates and techie journalists), and many
anti-MarketPlace letters to Lotus were relayed by e-mail.
Consumers are also taking new steps to safeguard their own privacy
often by contacting the Direct Marketing Association, which can remove
names from many mailing lists. But compliance is voluntary, and relief
is slow. In one chilling case, an unknown enemy began flooding
business manager Michael Shapiro's Sherman Oaks, Calif., home with
hundreds of pieces of hate junk mail. Suddenly Shapiro, who is
Jewish, was receiving mail addressed to "Auschwitz Gene Research" and
"Belsen Fumigation Labs." Shapiro appealed to the DMA and the mailing
companies directly but got no responses to most of his calls and
letters. "They ignore you, throw your letter away and sell your name
to another generation of people with computers," he complains. Finally
one marketing executive publicized Shapiro's plight within the DM
industry. Eight months after the onslaught began, the letters have
slowed-though some companies still have not removed him from their
lists.
How else can privacy be protected? It doesn't have to mean living like
a hermit and only paying cash, but it does mean not saying anything
over cellular and cordless phones that you wouldn't want others to
overhear. Culnan of Georgetown uses her American Express card
exclusively, because while the company collects voluminous data on its
cardholders, it shares relatively little of it with other companies.
Some privacy activists look hopefully, across the Atlantic Ocean. The
European Community is pushing tough new data rules to take effect
after 1992. The Privacy Directive relies on consumer consent;
companies would have to notify consumers each time they intend to pass
along personal information. The direct-marketing industry claims the
regulations would be prohibitively expensive. The rules may be
softened but could still put pressure on U.S. marketers who do
business abroad.
U.S. firms might find another incentive to change. Companies don't
want to alienate privacy-minded customers. "We're in the relationship
business," says James Tobin, vice president for consumer affairs at
American Express. "We don't want to do anything to jeopardize that
relationship." Citicorp's supermarket plan makes privacy advocates
nervous; but Citicorp rewards customers for giving up their privacy
with incentives like discount coupons, and it reports that no
consumers have complained. Eventually, strong privacy-protection
policies could make companies more attractive to consumers, says
Columbia's Westin-and may even provide a competitive edge. Then
consumers might get some of their privacy back-not necessarily because
it's the law, or even because it's right, but because it's good
business.
#O Newsweek
#D June 3, 1991
#T Would New Laws Fix the Privacy Mess?
#A Annetta Miller & John Schwartz w/Michael Rogers
Congress is scrambling to catch up with its constituents in the battle
over privacy. It has a daunting task ahead: to make sense of the
jumble of laws that have been passed-or are currently under
consideration-to regulate privacy. Why, for example, is it legal to
listen in on someone's cordless phone conversation but illegal to
listen to a cellular call? Why are video-rental records protected but
records of health-insurance claims largely unprotected? (That one has
to do with an impertinent reporter revealing the video-renting habits
of Supreme Court nominee Robert Bork.)
The present foundations of privacy law have their roots in the U.S.
Constitution. Although the word "privacy" does not appear in the
document, the Supreme Court has interpreted the Constitution to grant
individuals a right of privacy based on the First, Fourth, Fifth,
Ninth and Fourteenth amendments. Since the mid-1960s, Congress has
enacted no fewer than 10 privacy laws-including the landmark 1974
Privacy Act. And yet a national right to privacy is far from firmly
established. On its face, for example, the Fair Credit Reporting Act
limits access to credit reports. But it also grants an exception to
anyone with a "legitimate business need." The Right to Financial
Privacy Act of 1978 severely restricts the federal government's
ability to snoop through bank-account records; but it exempts state
agencies, including law-enforcement agencies, and private employers.
"It's easy to preach about the glories of privacy," says Jim Warren,
who organized a recent "Computers, Freedom & Privacy" conference. But
it's hard to implement policies without messing things up."
That hasn't stopped people from trying. James Rule, a State University
of New York sociology professor, says that new legislation is
warranted "on the grounds that enough is enough . . . [Privacy
infringement] produces a world that almost nobody likes the look of."
Data board: The newest efforts to regulate privacy range from simple
fixes to a full-fledged constitutional amendment. Last week a Senate
task force recommended extending privacy laws to cover cordless
tele-phones. One bill, proposed by Rep. Robert Wise of West Virginia,
would create a federal "data-protection board" to oversee business and
gov-ernmental use of electronic information. Another, being prepared
by Sen. Patrick Leahy of Vermont, would apply the Freedom of
Informa-tion Act to electronic files as well as to paper. Rep. Andy
Jacobs of Indiana has held hearings on the misuse of social-security
numbers to link computerized information. And several bills have been
introduced to stop credit reporters from selling personal data to junk
mailers.
Possibly the most sweeping proposal for change comes from Harvard
University law professor Laurence Tribe. In March, Tribe proposed a
constitutional amendment that would, among other things protect
individuals from having their private data collected and shared
without approval. "Constitutional principles should not vary with
accidents of technology," Tribe said at the "Computers, Freedom &
Privacy" conference earlier this spring. He said an amendment is
needed because the letter of the Constitution can seem, at the very
least, "impossible to take seriously in the world as reconstituted by
the microchip."
But some experts argue that well-meaning reform could do more harm
than good. Requiring marketers to get permission every time they want
to add a name to a mailing list would make almost any kind of mass
mailing hopelessly expensive. "It's nice to talk about affirmative
consent, but it really will kill the industry," warns Ronald Plesser,
who represents the Direct Marketing Association. "And then people who
live out in the country won't have access to the L.L. Bean catalog and
the services they like." In this technological age, how much privacy
Americans enjoy will depend partly on how high a price they are
willing to pay to keep it.
#O NewsBytes
#D April 30, 1991
#T Secret Service: "No Comment" on Reported Siezure
TOLEDO, OHIO, U.S.A., 1991 APR 30 (NB) -- Anthony J. Carmona,
United States Secret Service Agent-in-Charge of the Toledo, Ohio
office, responding to Newsbytes questions, said that "there has been
no recent computer or credit card crime arrests by his office."
Newsbytes contacted Carmona after receiving two independent
notifications that the Secret Service agents from the Toledo office
have recently seized computer equipment from an individual
pursuant to a credit card fraud case. Carmona told Newsbytes that
his office "could no comment on any seizures or other incidents that
may be part of an on-going investigation. We can only speak of items
that are part of the public record."
MIke Godwin, staff counsel of the Electronic Frontier Foundation
(EFF), told Newsbytes that an unidentified individual had called his
office purporting to be a "friend" of the subject of a Secret Service
investigation and equipment seizure in the Toledo area. Godwin said
that the called asked for advice for his friend and "I told him to
consult an attorney." Godwin said the caller hung up without leaving
his name.
Gail Thackeray, former Arizona Assistant AttorneyGeneral, who
has worked for over a year with the Secret Service in the on-going
"Sundevil" credit card fraud case told Newsbytes "I don't know
whether there was any arrest or seizure in Ohio but, if there was, it
is not related to "Sundevil". Thackeray, now working with the
Maricopa Country Attorney's office to complete the Sundevil cases,
has recently brought the first two indictments related to the
investigation. In the most recent, Baron Majette, 19, also known as
"Doc Savage", was arrested and charged with a number of felony
crimes relating to computer system break-ins and misuse of credit
cards.
Newsbytes will continue to attempt to verify whether or not a seizure
of computer equipment actually occurred.
#O NewsBytes
#D July 2, 1991
#T Law Panel Recommends Computer Search Procedures
WASHINGTON, D.C., U.S.A., 1991 JULY 2 (NB) -- A panel of lawyers and
civil libertarians, meeting at the Computer Professionals for Social
Responsibility (CPSR) Washington roundtable, "Civilizing Cyberspace",
have proposed procedures for police searches and seizures which they
feel will both allow adequate investigations and protect the
constitutional rights of the subject of the investigation.
The panel, composed of Mike Godwin, staff counsel of Electronic
Frontier Foundation; Sharon Beckman attorney with Silverglate &
Good; David Sobel of CPSR, Jane Macht, attorney with Catterton, Kemp
and Mason; and Anne Branscomb of Harvard University, based its
proposals on the assumption that a person, in his use of computer
equipment, has protection under both the Fourth Amendment and the
free speech and association provisions of the first amendment.
The panel first addressed the requirements for a specific warrant
authorizing the search and recommended that the following guidelines
be observed:
1. The warrant must contain facts establishing probable cause to
believe that evidence of a particular crime or crimes will be found
in the computers or disks sought to be searched.
2. The warrant must describe with particularity both the data to be
seized and the place where it is to be found ("with particularity" is
underlined).
3. The search warrant must be executed so as to minimize the
intrusion of privacy, speech and association.
4. Officers may search for and seize only the data, software, and
equipment specified in the warrant.
5. The search should be conducted on-site.
6. Officers must employ available technology to minimize the
intrusive of data searches.
The panel then recommended limitations on the ability of officials to
actually seize equipment by recommending that "Officers may not seize
hardware unless there is probable cause to believe that the computer
is used primarily as an instrumentality of a crime or is the fruit of
a crime; or the hardware is unique and required to read the data; or
examination of hardware is otherwise required." The panel further
recommended that, in the event hardware or an original and only copy
of data has been seized, an adversary post-seizure hearing be held
before a judge within 72 hours of the seizure.
Panel member Sharon Beckman commented to Newsbytes on the
recommendations, saying "It is important that we move now to the
implementation of these guidelines. They may be implemented either by
the agencies themselves through self-regulation or through case law
or legislation. It would be a good thing for the agencies t o take
the initiative."
The panels recommendations come at a time in which procedures used in
computer investigations have come under criticism from computer and
civil liberties groups. The seizure of equipment by the United Secret
Service from Steve Jackson Games has become the subject of litigation
while the holding of equipment belonging to New York hacker "Phiber
Optic" for more than a year before his indictment has prompted calls
from law enforcement personnel as well as civil liberties for better
procedures and technologies.
#O Chicago Tribune
#D June 27, 1991 [Sec 2, p2]
#T Ex-Employee Guilty of Erasing Data
#A Joseph Sjostrom
A computer technician pleaded guilty Wednesday in Du Page County Court
to erasing portions of his former employer's database last November in
anger over the firing of his girlfriend.
Robert J. Stone, 30, of 505 W. Front St., Wheaton, entered the plea on
a charge of computer fraud to Associate Judge Ronald Mehling. In
exchange for the guilty plea, prosecutors dismissed a burglary charge.
Mehling scheduled sentencing for Aug. 8.
Defense lawyer Craig Randall said after the hearing that Stone still
has a 30-day appeal period during which he can seek to withdraw the
guilty plea.
"I don't think he erased anything as alleged, and I don't think the
{prosecution} would be able to prove that he did," Randall said.
Stone was indicted last January for one count of burglary and one
count of computer fraud for entering the office of his former
employer, RJN Environmental, 202 W. Front St., Wheaton, and deleting
eight programs from the company computer.
Assistant Du Page County State's Atty. David Bayer, who prosecuted the
case along with Assistant State's Atty. Brian Ruxton, said the progams
were part of a company project for the state of Florida in which RJN
was, in effect, redrawing maps in digital form and storing them in a
computer.
Bayer said Stone had left the company the previous April and that his
girlfriend, who was not identified, worked there too but was fired in
November.
Bayer said Stone entered the firm's office last Nov. 24, a Saturday
when nobody else was there.
Employees who came to work on Sunday discovered that data had been
erased and a quantity of data storage disks were missing.
Bayer said the disks contained several months' worth of work, but were
recovered. It took about a week to restore the rest of the missing
computer information, Bayer said.
Bayer said Wheaton police Detective Kenneth Watt interviewed Stone the
following Monday, and said Stone admitted to erasing data and taking
the disks. Bayer said Stone told the detective where to find the disks,
which he had left under a stairwell at RJN.
#O Wall Street Journal
#D April 25, 1991
#T Soon, ATMs May Take Your Photograph Too
#A Paul B. Carroll
*Smile* when you use that automated teller machine. Miniature cameras may soon
become widespread in ATMs and elsewhere.
At Edinburgh University in Scotland, researchers have produced a single
computer chip that incorporates all the circuitry needed for a video camera.
Even with a lens that fits right on top of the chip, it's still just the size
of a thumbnail. When they become available in a year or so, such cameras may
carry as little as a $40 price tag.
NCR thinks these tiny cameras could find their way into lots of ATMs in the
next few years. The computer maker already sells ATMs that include cameras,
allowing banks to doublecheck on people who contend their account was debited
even though they didn't use an ATM that day. But those cameras are expensive,
especially because the big box with the electronics has to be so far back in
the ATM that it requires a long, elaborate lens. The lens also gives away to
potential cheats the fact that the camera is there, whereas the new tiny
cameras will just need a pinhole to peep through.
"We see this as a breakthrough," says Greg Scott, an engineer with NCR in
Dunfermline, Scotland.
The Scottish Development Agency, which supplied some of the initial research
funds, says the tiny cameras may also find their way into baby monitors,
picture telephones, bar-code readers and robotic vision systems.
#O NewsBytes
#D July 1, 1991
#T Arrests In "Multi-Million" Cellular Phone Fraud
ALBANY, NEW YORK U.S.A., 1991 JUL 1 (NB) -- The New York State Attorney
General's office has announced the arrest and arraignment of four individuals
for allegedly illegally utilizing Metro One's cellular service for
calls totalling in excess of $1 million per month.
According to the charges, the arrested individuals duplicated a Metro
One customer's electronic serial number (ESN) -- the serial number
that facilitates customer billing -- and installed the chip in a
number of cellular phones. Th defendants then allegedly installed the
phones in cars which they parked in a location near a Metro One cell
site in the Elmhurst section of Queens in New York City.
>From these cars, the defendants allegedly sold long distance service
to individuals, typically charging $10 for a 20 minute call. Metro
One told investigators that many of the calls were made to South
American locations an that its records indicate that more than $1
million worth of calls were made in this manner in May 1991.
The arrests were made by a joint law enforcement force composed of
investigators from The New York State Police, New York City Police
Special Frauds Squad, United States Service, and New York State
Attorney General's office. The arrests were made after undercover
officers, posing as customers, made phone calls from the cellular
phones to out-of-state locations. The arrests were, according to a
release from the Attorney General's office, the culmination of an
investigation begun in September 1990 as the result of complaints
from Metro One.
The defendants, Carlos Portilla, 29, of Woodside, NY; Wilson
Villfane, 33, of Jackson Heights, NY; Jaime Renjio-Alvarez, 29, of
Jackson Heights, NY and Carlos Cardona, 40, of Jackson Heights, NY,
were charged with computer tampering in the first degree and
falsifying business records in the first degree, both Class E
felonies,- and theft of services, a Class A misdemeanor.
Additionally, Portilla and Villfane were charged were possession of
burglar tools, also a Class A misdemeanor. At the arraignment,
Portilla and Renjio-Alvarez pleaded guilty to computer tampering and
the additional charges against those individuals were dropped.
New York State Police Senior Investigator Donald Delaney, commenting
on the case to Newsbytes, said "This arrest is but the tip of the
iceberg. There is an on-going investigation in the area of cellular
phone fraud and we are looking for those that are organizing this
type of criminal activity."
#O NewsBytes
#D July 17, 1991
#T Sundevil Defendant "DOC SAVAGE" Sentenced 7/17/91
PHOENIX, ARIZONA, U.S.A., 1991 JUL 17(NB) -- The Maricopa County
Arizona County Attorney's Office has announced the sentencing Baron
Majette, 20 , also known as "Doc Savage", for computer-related crimes
uncovered in the joint federal / state investigation known as
"Sundevil".
Majette was arrested on March 27th of this year and charged with a
number of felony charges relating to unauthorized use of telephone
facilities of Toys 'R Us to make calls worth approximately $8,000,
illegal access of TRW's credit data base and use of information
obtained therein to obtain in excess of $50,000 in cash, goods, and
services, and stealing of credit cards from U.S. Mail boxes and use of
the cards to obtain approximately $10,000 in cash, goods and services.
If convicted of the charges, Majette faced a possible jail sentence of
15 years and the requirement to make restitution for the full amount
of the alleged losses endured by the firms and individuals.
In late May, Majette pleaded guilty to an amended charge of a single
count of computer fraud, felony third degree. The reduced charge was a
result of an agreement between Mark Berardoni, the public defender
assigned to Majette; Janet Black, Majette's probation officer and the
Maricopa County Arizona County Attorney's Office. Under the reduced
charges, Majette's maximum term of incarceration was reduced from the
aforementioned 15 years to 5.
On July 16th, when the actual sentence was to be imposed, a further
agreement between the prosecution, defense and parole service was
presented to the presiding judge, Justice Gottsfield, and, after
discussion, became the actual sentence. The court decision imposed the
following:
-- Majette will remain in jail for up to two months while he awaits
placement in a "Shock Incarceration" program (Majette has been in jail
since his March 27th arrest because of parole violation related to an
earlier crime). Assistant County Attorney Gail Thackeray told
Newsbytes that Shock Incarceration is a 120 day program which
"provides both intensive counseling and military-like discipline and
exercise."
-- Upon his release from Shock Incarceration, Majette will enter a 5
year period of "intensive probation". Under Arizona procedures, the
subject must provide the probation officer, on a weekly basis, a
schedule for the next week's activities. In the event that the
schedule has to be modified in any way, the probation office must be
called before the new schedule is acted on.
-- During the time of intensive probation, the probation officer may
visit or call the subject at any time of day or night to insure
compliance with the schedule.
-- If, at some point after a year of intensive probation, the
probation officer feels that the subject has followed the rules and
shown that intensive procedure is no longer warranted, the subject and
probation officer may recommend to the sentencing judge that the
subject be transferred to normal probation. In normal probation, the
subject advises the officer weekly of progress and problems. There is
not the hovering presence felt in intensive probation, according to
Thackeray. Additionally, the subject may be released from any form of
probation at the petition of the probation office and subject and
approval, after hearing, of the sentencing judge.
-- If, on the other hand, Majette violates the terms of his probation,
he is liable for incarceration in prison for the remainder of his
probationary period.
-- Majette was also ordered to make restitution to the parties
victimized by his activities by paying a sum of $19,774.03 to those
involved. The sum is to be paid on a monthly basis over the course of
his sentence. Additionally, he was ordered to make payments to help
defray the cost of his probationary supervision.
Under the terms of his probation, Majette is subject to the following
conditions said by Thackeray to be unique to his type of offense:
-- He may not use any computer connected to a modem or communications
network without the prior permission of his probation officer.
In the event that he takes a job that brings him into contact with
computer activities, he must notify someone in the employer's office
of the restrictions on his computer use and must discuss the planned
activities with his probation officer.
-- He is not to communicate or associate with "members of the computer
underground" (defined as persons such as those known to have or
reasonably believed to have been involved in theft of communications
services, computer fraud or related activities). In the event that any
such individuals contact him, he must report the contact to his
probation officer (According to Thackeray, this stipulation is
intended for Majette' s protection -- "In the event that the
contacting party is investigated or arrested and phone records show a
call to Majette, his notification to his probation officer of the call
will stand as proof that he was not involved in any conspiracy with the
other individual. His notification responsibility in no way requires
him to cooperate with authorities in the location or apprehension of
another individual and such cooperation is neither expected nor
desired.").
Transcripts of the sentencing hearing reportedly show that it was the
intention of Judge Gottsfield to sentence Majette to a straight five
years in prison but was dissuaded by the combined recommendations of
the prosecution, defense and probation office. Thackeray explained to
Newsbytes the rationale of the prosecution in recommending a lighter
sentence -- "Usually computer hackers who get into trouble for
activities of this nature are kids or young adults who are not the
type to be in trouble for any other criminal activities. The point of
sentencing in these cases should be rehabilitation. If we can break
the pattern of illegal behavior, society will benefit from Majette's
participation. If we simply locked him up for 5 years, neither he nor
society would benefit."
#O The Times (London)
#D July 1, 1991
#T Victin of computer hackers fights BT over \pounds 8,000 bill
A director of video films is embroiled in a dispute with British Telecom over
an \pounds 8,000 bill after becoming a victim of hackers -- people who steal
computer passwords to break into international data bases and use services
illegally.
George Snow says the bill will ruin him. Experts say the case highlights
increasing concern over one of Britain's most under-reported crimes. For
several years, Mr Snow has kept abreast of developments in 3-D computer
graphics by using access to an American information service called Compuserve.
To cut costs, he became a customer of BT's Dial Plus service, which allows
customers to connect their office or home computers to international data bases
for the price of a local rather than an international call.
Mr Snow, who has directed programmes for Channel 4 and the Arts Council, and
whose pop video credits include Howard Jones, had found the service useful and
inexpensive until recently. "My quarterly bill would be around \pounds 30,"
said the director whose company, WKBC TV, is based in west London. Mr Snow,
aged 42, now faces a big unscheduled bill for calls he never made. It appears
that hackers illegally obtained Mr Snow's password and BT agrees. The dispute
is about who pays the \pounds 5,500 and \pounds 2,500 bills which have been
run-up in recent months.
BT says that Mr Snow chose a password that hackers could easily borrow [sic].
He says that the company has a responsibility to ensure its networks are
secure. "To clock up \pounds 8,000 worth of bills you have to be talking about
someone using the service 24 hours-a-day day in day out," he said.
To break into a data base, hackers will generally first try obvious passwords
such as Christian names. They also use programmes that run randomly through
words in a dictionary until one opens a data base.
Customers with Dial Plus have to sign a disclaimer stating that they will not
use obvious passwords otherwise they might be liable for hackers' bills. A BT
spokesman admitted, however, that Mr Snow had joined the service before the
agreement came into force.
Mr Snow also says that it was BT which approved Superman, the password stolen
by the hackers. The company says that Mr Snow was warned that his account was
running up huge bills in early February but that it was sometime later that the
password was changed. Mr Snow says that it was changed within days and that by
the time BT contacted him the damage had been done with most of the bill having
been run up.
He believes that he, and possibly others, are being forced to pay the price for
the company's poor security and has called in the Computer Crime Unit at
Scotland Yard to investigate.
David Frost, a computer security expert with accountants Price Waterhouse, said
yesterday that the amount of hacking taking place in Britain was being
seriously undeerplayed by companies.
BT rejects suggestions that it is cavalier with security. A spokesman said the
company would write to Mr Snow this week. He says that he willfight BT in
court if it prosecutes him. "\pounds 8,000 is about 10 per cent of my
turnover," he said.
[I have a few comments, based solely on the report as printed. I do not know
what truly happened. I draw attention to the BT's apparent attitude to
password security. They used the term "borrow", rather than "steal" or "use
illegally". They vetted the password, implying that Mr Snow was asked to
reveal his password rather than keep it secret. Even so, they gave the OK to
a password which is of dubious security. It is generally agreed that proper
names, dictionary words, literay characters and the like are easily guessed.
More generally, it is interesting how British newspapers, and _The Times_ in
particular, are beginning to take an informed interest in he subject of
computer security and, indeed, in computer-related risks in general. Apart
from some quaint terminology ("programmes", "data bases") they seem
reasonably competent at understanding the issues and reporting them clearly
to a non-expert audience.
#O The Atlanta Journal
#D Friday, June 14,1991
#T GBI searching for byte-size evidence
#A By Rob Johnson and David Pendered
#B Typed for data by The Esoterrorist
Computers, floppy disks taken
from suspected teen hackers
Four suburban Atlanta teenagers, stripped of their home
computers, began a long wait Thursday for GBI agents to rummange
through huge libraries of floppy disks for evidence of criminal
invasion of perhaps hundreds of corporate and government computer
networks.
Georgia Bureau of Investigation agents confiscated 12 computers
and more than 1,400 disks from the north Fulton and Gwinnett county
homes of the four teens Wednesday. The youths - two 15-year-olds
and two 17-year-olds - have not been charged or identified publicly.
In an apparently related case six months ago, four Gwinnett
County teens were linked to an international network of about 70
computer hackers who were believed to have bilked the National
Aeronautics and Space Administration (NASA) of $12 million in
telephone services and an undetermined amout from BellSouth Inc.
"I understand that these four teens were part of that same
group that we investigated last year," said Jim Steele, assistant
superintendent of security for the Gwinnett County school
district. "We believe that this is a result of the same
investigation."
Until agents analyze the digital data in the newly confiscated
discs, they won't know exactly what the four teen hackers did or if
charges will be brought, said GBI spokesman John Bankhead. "There
is no indication yet that harm was done," he said, "but penetration
took place."
Emory, Tech were targets
Hackers apparently penetrated networks at Emory University,
Georgia Tech and WXIA-Channel 11, but BellSouth apparently was the
primary target, according to investigators.
In the earlier investigation, Gwinnett school officials
discovered in June 1990 that hackers had penetrated a school
teleconference system and launched from there into BellSouth's
system. Hackers in the U.S. and six or seven other countries avoided
telephone charges for their computer modems by billing them to the
school district, BellSouth and NASA, the investigation revealed.
School investigators stopped their probe in December and
delivered their records to the GBI and BellSouth investigators, Mr.
Steele said.
This following glossary was included in the article. heh...
...use this as a reference for filling out those super elite bbs
infoforms that you never know all the answers....
-------------------------------------------------------------------
| |
| Hacking: A short glossary |
| |
| |
| HACKER - What all computer hobbyists used to call themselves, but |
| the term has come to mean someone who breaks into computers for |
| fun or for profit |
| |
| MODEM - The device that lets computers talk over the telephone |
| lines. |
| |
| COMPUTER NETWORK - Where several computer terminals, or computers,|
| are connected so that information can be exchanged. |
| |
| WAR GAMES DIALER - A specialized computer program that dials |
| every number in an exchange and identifies lines connected to |
| modems. |
| |
| PASSWORD - The secret word or code, usually used in combination |
| with a name, that allows an individual to have access to a |
| computer's files. |
| |
| |
-------------------------------------------------------------------
Suspected hackers targeted BellSouth
By Rob Johnson
and Bill Husted
Phone companies offer 'interesting puzzle'
Investigators said Thursday that BellSouth apparently was the
primary target of suspected computer hackers being questioned by
GBI agents, and experts say phone companies usually are a favorite
target for young hackers wanting to cruise through a massive network.
"It's the oldest computer system known," said Mike Godwin of
Electronic Frontier Foundation, the Cambridge, Mass., organization
that monitors the legal quandries raised by the computer age.
"It's so huge and complex. That's why it's a particular
interesting puzzle."
BellSouth calls it a serious crime nevertheless.
"It's a break-in," said Scott Ticer, the company's operations
manager. "It doesn't matter whether it's grand theft auto or
joyriding, you're car is still not in the driveway. Same thing here.
We take it very seriously."
Trespassing or burglary?
Mr. Godwin agrees intrusions are a crime, but he says law
enforcement agencies and the courts rarely see the difference
between the curious teenager who pokes around inside a network and
the hacker who maliciously manipulates a company's computer
operations.
"It's really like the difference between trespassing and
burglary," Mr. Godwin said.
Darren McKeeman, 23, who was convicted in 1988 for breaking
into the Georgia World Congress Center's computers, said a GBI
investigation is a terrifying experience for the hacker and the
family.
"It's a total surprise," he said of a GBI raid.
Hackers bent on stealing information are like burglars who work
(cont' NIA072 / File 10)
/ /
/ NIA072 / File 10 /
/ CyberTimes (Vox Populi) /
/ Judge Dredd /
/ /
(cont' NIA072 / File 9)
from home, say experts.
Their targets are computer networks used by governments and
businesses. Breaking into one is as challenging for a hacker as a
well-locked door is for a burglar. Most computer networks have an
electronic doorway: the telephone line used by employees to connect
to the office computer from home. That door is locked with a
pasword. So, for burglar and hacker alike, the problem is: How do
you get in?
The first step is usually the easiest. According to experts,
finding the telephone number that connects the hacker to a computer
is often a simple matter of who you know. A company employee is
the most likely source. Maybe he tells a friend, that tells
someone else, and - somewhere down the chain - the number is passed
along to the hacker.
Ways to get in
Then, the ahcker has to convince the computer to open the
door. That means finding the name and password for someone who has
access to the computer system. Finding the name can be as simple
as calling a company and asking for the name of a key manager ("who
is your vice president of marketing?" for instance). Passwords are
more difficult to find. The easy way is through a talkative
employee. Failing that, things get complicated.
For instance, the passwords for computers that operate with the
Unix operating system are scrambled into meaningless numbers and
symbols using a mathematical formula. But, if an electronic
burglar can sneak into the system (some computers allow limited
access to a "guest" or "visitor") the file can sometimes be located
and copied.
Passwords are often ridiculously simple to guess. Since people
want passwords that are easy to remember, they often use the first
name often use the first name of a spouse, of a child, digits from
their telephone number, or vehicle license plate. That makes it
easy for hackers, too.
#O Philadelphia Inquirer
#D July 16 [editorial page]
#A Richard Pence
#T The Dat the Telephone Bug Bit
Those big phone outages of recent weeks have had me feeling a
bit guilty over what's been happening.
You see, I remember exactly how all this started. Back in
1950 I was a novice seahand aboard a cruiser based In Philadelphia,
barely six months out of high school and fresh from the plains of
South Dakota.
One Friday night in November, we were granted shore leave at
the end of a two week training cruise. Homesick and seasick,, I
headed immediately for the row of pay phones that lined the dock.
Depositing a carefully preserved nickel (remember?), I dialed
"O." The following is a roughly verbatim account of what transpired
after the Philadelphia operator answered:
"I'd like to place a station to station collect call to the Bob Pence
residence in Columbia, South Dakota," I said in my best telephone
voice.
The Philadelphia operator was sure she had heard wrong. "You mean
Columbia, South Carolina, don't you?"
"No, I mean Columbia, South Dakota." I had tried to call home once
before, and I was ready for that one.
"Certainly. What is the number, please?" I could tell she still
didn't't believe me.
"They don't have a number," I mumbled. I'd tried to call home before,
and I knew what was coming.
She was incredulous. "They don't have a number?"
"I don't think so."
"I can't complete the call without a number. Do you have it?" she
demanded.
I didn't relish seeming like even more of a bumpkin, but I was in the
Navy and I knew authority when I heard it. "Well ... the only thing I
know is ... two longs and a short."
I think that's the first time she snorted. "Never mind. I'll get the
number for you. One moment please."
There followed an audible click and a long period of silence while she
apparently first determined if, indeed, there was a Columbia, S D.,
and then if it was possible to call there.
When she returned to the line, she was armed with the not-insignificant
knowledge necessary complete her task.
In deliberate succession, she dialed an operator in Cleveland, asked
her to dial one in Chicago, asked Chicago to dial Minneapolis, and
Minneapolis to dial Sioux City, Iowa. Sioux City called Sioux Falls,
S.D., and the operator there dialed one in Aberdeen, S.D. At last,
Aberdeen dialed the operator in Columbia.
By this time, Philadelphia's patience was wearing thin, but when
Columbia answered, she knew what had to be done.
"The number for the Bob Pence residence, please," she said, now in
control.
Columbia didn't even hesitate. "Two longs and a short," she declared.
Philadelphia was set back for an instant but valiantly plowed on. "I
have a collect call from Philadelphia, Pennsylvania, for anyone at
that number. Will you please ring?"
"They're not home," said Columbia, again not missing a beat.
Philadelphia digested this and decided not to press the point.
Instead, she relayed the message I'd already heard. "There is no one
at that number, sir. Would you like to try again in later?"
Columbia quickly interrupted: "Is that you, Dick?"
"Yeah, Margaret ... Where are the folks?"
Philadelphia was baffled, but her instincts told her to look out for
the company. "Sir, madam ... you can't ..."
Margaret ignored her. "They're up at the school house at the
basketball game. Want me to ring?"
I knew I was pushing my luck with Philadelphia, so I said it likely
would be too much trouble to get them out of the game.
"No trouble at all," said Margaret. "It's halftime."
Philadelphia was still in there trying to protect the company. By this
time, though, she was out of words. "But ... but ... " she stammered.
I caved in to Margaret, mainly because I didn't want to have to start
over later. "All right."
Philadelphia made one last effort. Mustering her most official tone,
she insisted: "But this is a station to station collect call!"
"That's all right, honey," said Columbia, "I'll just put it on Bob's
bill."
Philadelphia was still protesting when the phone rang and was answered
at the school house.
"I have a station-to-station collect call for Bob Pence," Philadelphia
said, certain that Ma Bell had somehow been had.
"This is he," replied my father.
"Go ahead," whispered an astonished Philadelphia.
I'm glad couldn't'see her face when I began my end of the conversation
the way all Midwesterners do:
"Hi, Dad, how's the weather?"
"Jeez," said Philadelphia and clicked off.
Now comes the confession. I have it on good authority it was the next
Monday morning that AT&T began to automate phone service And now look
where we are.
[Richard Pence is a Washington, D.C., writer and editor. He wrote this
for the {Washington Post}.]
#O Chicago Sun-Times
#D July 16, 1991
#A Maureen O'Donnell, Staff Writer
#T Test In Two Wards WIll Make Public Calls Easy To Trace
Brison Poindexter says he knows when a motorist using the pay phone
outside his south side 7-Eleven store is up to no good.
"Someone pulls up in a fancy car in the middle of the night and asks
for change for $3 or $4. You don't ask for that kind of change to call
mom," said the 21-year old manager of the convenience store at 1800
East 87th Street.
Poindexter suspects the callers are using the payphones to conduct
drug deals or other illegal activity.
But as of Monday night (July 15), Illinois Bell is conducting an
unusual experiment aimed at payphone drug-dealing and other called-in
criminal activity in two city wards, including the one where
Poindexter's 7-Eleven is located.
More than 50 payphones in the 8th and 37th wards will no longer accept
coins between 6 PM and 6 AM.
All outgoing calls from those phones must be 'zero-plussed', meaning
the caller must use a calling card, call collect, or bill the call to
a third party, but quarters won't do them any good. Bell believes is
is the first such experiment in the country. It will not affect free
calls to 911 (emergency), 411 (inquiries) or 611 (repair bureau).
"The reason they (drug dealers) like payphones is they can put in
their quarter and no one knows who they are," said Illinois Bell
spokesman Geoff Potter. "That's going to change with this. If they
call collect, or with their calling card, they're going to leave a
paper trail. And billing to a third party is also going to be difficult,
since that links another person to that call. That'll discourage them.
The 90-day trial has the approval of Chicago Police Superintendent
LeRoy Martin and City Aldermen Lorraine L. Dixon (8th ward) and Percy
Giles, (37th ward), who praised the idea from Bell.
"We believe this restriction will help deter criminals from using
public phones to plan drug-dealing and other illegal activities,"
Martin said.
But the American Civil Liberties Union questions how it will affect
poor people who don't have phones. Illinois Bell requires a $500
deposit from people who do not have phones before it will issue a
calling card. Poor people cannot afford such a payment, according to
Harvey Grossman, legal director of the Illinois chapter of the ACLU.
"Basically, it will have a discriminatory effect on poor people and
African-Americans, and the drug-dealers will just move to other
telephones," Grossman said. "We question the appropriateness of that
kind of decision by a public utility."
"For people without phones, they'll have to call collect pretty much,"
Potter said. "Or, if it is not an emergency, wait until the next day."
The phones involved in the trial are only a portion of the total
Illinois Bell phones in the area. Independent payphone providers are
not participating in the experiment, Potter said.
Illinois Bell has received no opposition so far. Business groups,
including the 87th Street/Stony Island Avenue Business Association are
backing the experiment.
The neighborhood around 87th and Stony Island Avenue, called Calumet
Heights, is a thriving business community whose residents include
Police Superintendent Martin, said Sam Neely, owner of Neely Brothers
Shell Service Station, 8700 South Stony Island Avenue, and president
of the local business association. The payphones outside Neely's
gasoline service station are going to restrict night-time coin calls.
The experiment is intended to head off trouble in a good neighborhood,
Neely said. "It is preventive. We don't want things to happen," he
said.
"I think it is a great idea," Poindexter said. "Anything to cut down
on drugs."
#O APwire
#A Laurie Asseo
#T 'Baby Bells' Get OK to Join Electronic Information Industry
WASHINGTON (AP) _ A federal judge reluctantly gave the nation's seven
regional telephone companies permission Thursday to join the electronic
information industry by providing such services as home shopping and stock
market quotes.
U.S. District Judge Harold H. Greene said he believed that letting the
companies enter the information market ``would allow them quickly to
dominate that market and to eliminate both competition and the independents
which would make that competition possible.''
But the judge said an appellate court decision reversing his 1987
refusal to grant such permission created a higher standard _ whether the
judge could be certain that letting the so-called Baby Bells into the
market would lessen competition.
``The answer to that question is in the negative,'' Greene wrote.
His order delayed the effect of the ruling until it can be appealed by
the opponents of lifting the ban.
The Justice Department joined the regional phone companies in asking
Greene to allow them to use their phone lines to sell such services as
``electronic Yellow Pages,'' home shopping, stock quotes, banking and
classified advertising.
The seven companies were barred from selling such services as part of
the 1982 consent decree, which Greene oversaw, that broke up the AT&T phone
monopoly.
Opponents of letting the Baby Bells into the market said at an April
court hearing that the regional companies would use unfair practices to
squeeze out competitors. The opponents include consumer groups, long
distance carriers such as MCI Telecommunications Corp., and the American
Newspaper Publishers Association.
The regional companies and the Justice Department contended that
letting the seven provide information services would increase competition.
Greene wrote, however, that he believed ``the most probable
consequences of such entry by the regional companies into the sensitive
information services market will be the elimination of competition from
that market and the concentration of the sources of information of the
American people in just a few dominant, collaborative conglomerates, with
the captive local telephone monopolies as their base.
``Such a development would be inimical to the objective of a
competitive market, the purposes of the antitrust laws, and the economic
well-being of the American people,'' the judge said.
Greene dismissed as ``preposterous'' the regional companies' contention
that their input is needed to provide better information services and said
the claim that the Baby Bells' entry into the market would start a new era
of sophisticated information services was ``so much hype.''
But Greene said that because of the 1990 ruling by the U.S. Court of
Appeals for the District of Columbia Circuit, he was left with no choice
but to remove the restriction, ``albeit with considerable reluctance.''
He said the appellate court required him to give special deference to
the Justice Department's views in the case, and it required him to consider
economists' present-day forecasts rather than evidence of anti-competitive
behavior by local telephone companies before the AT&T breakup.
Greene said he decided not to let his ruling take effect immediately
because the Court of Appeals may decide he misinterpreted its decision.
If the regional phone companies were allowed to enter the information
market while the question is unsettled, they could wind up spending large
amounts of money on services they could later be barred from providing, the
judge said.
Ronald F. Stowe, vice president of Washington operations for Pacific
Telesis, one of the seven, said, ``This is a major step forward for
American consumers, American businesses and the American economy.''
Stowe said he was disappointed that Greene had delayed implementation
of the ruling and added, ``We are seriously considering asking the court to
vacate the stay.''
Stowe said the ruling means PacTel and other operating companies ``can
more fully meet the information services needs of our customers,'' who, he
said, have requested such offerings for years.
Opponents of lifting the ban contended that the Baby Bells would be
able to evade regulations that bar them from subsidizing non-regulated
services with money from their normal rate base.
But the regional companies said there was no sign they had used such
cross-subsidization in other competitive markets.
Gene Kimmelman, legislative director of the Consumer Federation of
America, called the decision ``terrible for consumers.''
``This really signals a beginning of a monopoly environment, which is
going to invite rate increases and inflated local telephone rates and a
litany of new lawsuits very similar to the antitrust litigation that led to
the breakup in the first place,'' he added.
Federal Communications Commission Chairman Alfred Sikes said the FCC
``will continue to provide full and effective public interest safeguards''
if the regional Bells enter the information services business.
Sikes hailed Greene's decision, saying, ``I believe the nation will
greatly benefit. ...''
The AT&T breakup decree also bars the regional operating companies from
offering long distance service and manufacturing telecommuncations
equipment.
The companies are pushing legislation in Congress to lift the
manufacturing ban. The bill was passed last month by the Senate and is
being considered by a House subcommittee.
In a response to a request from Sen. Paul Simon, D-Ill., for his views
on the bill, Greene wrote a May 29 letter in which he declined to give an
(here the writing blurs........)
--- * NIA * GrapeVine ---
CCC Update:
On Chaos Computer Club's last Congress 1990, a Dutch group and few other
phreaks reported on some techniques to "travel inexpensively on international
networks" (see my report in January 1991). Against their usually detailed
description of the content of the respective session, CCCs electronic Congress
newspaper describes the reports and discussion only in general terms; no
details regarding frequencies and computer programs (which meanwhile replaced
the "blue boxes" more flexibly) were given.
According to a report in the ("usually well-informed") German weekly magazine
Der SPIEGEL, the Dutch group HAC-TIC now published a detailed report on how to
"use" special methods, dial-tunes (with frequencies and sequences of operation)
and telephone numbers (in Germany: 0130) in diverse areas of the world to
establish toll-free phone connections via specific programs. As the magazine
reports, HAC-TIC aims with its detailed description to counterfeit some people
who sell (e.g. on AMIGA) such tune-dialing programs for up to 1,000 DM (about
520$ currently).
---
Electronic Frontier Foundation
Tracking The Steve Jackson Case
Our major case, the Steve Jackson Games case, is proceeding as expected.
The next stage in our ongoing effort in that case will be the
government's filing of a response to our complaint. As of the week of
June 21, the government has sought a 30-day extension of the deadline
for its response. Such extensions are routinely granted with the
agreement of the plaintiff, and we have agreed in this case. The
extended deadline will mean that the government's response will be due
the first week of August.
---
Computer Crime (Information Weekly, July 8, 1991, page 6)
A Computer Systems Protection Act went into effect last week in Georgia. The
Act provides the same punishment for computer thievery as for other types of
theft crimes. The bill calls for prison terms of up to 15 years for
"computer-assisted theft, trespass, invasion of privacy, and forgery." Under
the Act, stealing someone's computer password in Georgia can get you a $5,000
fine or one year behind bars.
---
Excerpts from an article headlined PHONE OUTAGES SHOW HAZARDS OF NEW TECHNOLOGY
by Jonathan Weber in the 28 June 1991 `Los Angeles Times':
"The massive telephone failures in the Los Angeles and Washington areas earlier
this week stemmed from glitches in ... a specialized computer network that
shuttles information about calls between telephone company switching
offices.... The inherent complexity of an increasingly software-based phone
system ... raises the prospect that the public telephone service may be
inherently less reliable in the future than it has been in the past. Pacific
Bell said Thursday that it had suspended further deployment of ... Signaling
System 7 until the exact cause of the problem could be identified. It appeared
... that the [LA and Washington] problems ... were not identical, but both
[were] attributed to breakdowns [in the] SS-7 equipment supplied by DSC
Communications of Dallas."
[Explanations of expected benefits from the SS-7, including improved
efficiency, capacity, speed, security, and new service possibilities such as
"the controversial Caller ID."]
"The flip side of all this ... is that if the SS-7 system malfunctions, it
begins sending incorrect information all over the network. Ross Ireland,
general manager for network services at Pacific Bell, said Wednsday's incident
was caused by a signaling system unit in downtown Los Angeles that inexplicably
began sending out a flurry of wrong information about problems in the network,
and ultimately shut itself down. Then there was a cascade effect, in which the
other signaling system units began acting on the incorrect information.
Finally, when people tried to make calls and couldn't, they kept trying, which
created an abnormally high level of calling traffic and thus further
exacerbated the problem.
"Because a phone network is so tightly integrated -- akin to one big computer
-- it's very hard to locate and fix problems...."
[See also `Los Angeles Times,' John Kendall and Paul Lieberman, 27 June 1991:
"By coincidence, service also was disrupted to 6.7 million telephone customers
Wednesday in the District of Columbia, Maryland, Virginia, and parts of West
Virginia.... [T]he trouble began in Baltimore during a routine modification of
equipment procedure." [sic]]
[Officials at Chesapeake and Potomac said the problems were probably
unrelated. Asked if hackers could have caused the problems, Ellen
Fitzgerald, a spokeswoman for Chesapeake and Potomac, said she she had been
assured that the system could not be penetrated. [!!!] But, she added, ``a
few days ago I would have told you that what happened yesterday wouldn't
happen.''
Terry Adams, a spokesman at the DSC Communications Corp., which made both
systems, said company officials also discounted any connection between the
failures. {From the NY Times article, 28 Jun 91. PGN}]
---
According to an AP story carried in the 18 June '91 `New York Times',
Mitsubishi is suing AT&T over a pbx system that was broken into by hackers who
made thousands of illegal calls worldwide.
Mitsubishi contends that AT&T's System 85 Private Branch Exchange is not secure
and that AT&T failed to warn Mitsubishi of the potential for unauthorized use.
Mitsubishi seeks $10 million in punitive damages and a dismissal of $430,000
billed for 30,000 phone calls which Mitsubishi attributes to unauthorized
users.
The pbx system, installed in 1988 and disconnected last year, permitted
Mitsubishi employees to make calls on the company lines no matter where they
were by using a 6-digit personal password. According to Mitsubishi, AT&T
failed to diagnose the problem, and it was New York Telephone which finally
told Mitsubishi of the possibility of system crackers.
Andrew Myers of AT&T declined to comment on the suit but said that under
federal communications law, "customers are clearly responsible for both
authorized and unauthorized service."
---
The old sell-illegal-calls-at-a-discount scam has reemerged in Elmhurst,
Queens, NY. High-tech mobile phone booths (cars) are very popular there, and
draw crowds of people standing in lines to make their calls, often to Colombia
or Peru. Each car has a doctored cellular phone chip containing an ID
illegally set to some poor sap's valid ID. "The swindle has become so popular
that legal cellular phone users in the area can rarely get access to an
available phone line." Law-enforcement officials say that many of the calls
are made to high-level drug dealers in Colombia. Many of the numbers dialed
from Elmhurst match up with Colombian phone numbers that investigators have on
file with the Federal Drug Enforcement Administration.
Metro One in Paramus, N.J., one of the two cellular carriers for New York City,
estimated that it has lost more than $1 million a month from illegal calls
transmitted from Elmhurst. Nationwide, such fraudulent calls cost the cellular
phone industry about $700 million in 1990, according to Donald Delaney, an
investigator for the NY state police. Industry officials put the figure much
lower, at $100 million. [Source: Cars Using Rigged Cellular Phones Sell
Illegal Overseas Calls, By Donatella Lorch, N.Y. Times News Service, 28 Jun 91]
---
In San Diego, the former General Dynamics Corp. computer programmer, Michael
John Lauffenburger, was arrested for allegedly planting a ``logic bomb,'' a
type of virus that would have destroyed vital rocket project data.
Lauffenburger's goal, according to a federal indictment, was to get rehired as
a high-priced consultant to fix the damage he created. He quit May 29.
A fellow General Dynamics worker defused the plot by accidentally stumbling
onto the logic bomb. Lauffenburger was charged with computer tampering and
attempted computer fraud. If convicted, he faces up to 10 years in prison and
a $500,000 fine. He pleaded innocent and was released on $10,000 bail.
[Source: Article by Laura Myers, AP Business Writer, 26 June 91]
---
In a 6/28 press release, US West announced they intend to make line-blocking
available on a "normal" basis, for the first time, in Iowa, where it's part of
a modified proposal to the Iowa PUC.
The company indicated this apparent switch in policy was in response to interest
expressed by some users in the Omaha and Boise trials.
There's a price, though. In the Iowa proposal, $3.50/mo. for res. and $4.00 for
bus.
In a related item, US West's Terri Ford, in 6/26 rebuttal testimony with the
Idaho PUC, also indicated USWC intended to offer line-blocking before the
completion date of the Boise market trial. Although no dates or prices were
mentioned in Ford's filed testimony, she did state that the feature offering
would be accompanied by a waived non-recurring charge.
---
"Outro"
Just a quick note to say Goodbye to many friends and compatriots.
I will be off the net for about a year I suppose. Many of you deserve
more than just "Thanks" and some of you deserve utter contempt.
Watch yourselves. It can happen to anyone.
Len [Rose]
---
: _
\ /
STILL GOING! NOTHING OUTLASTS THE UU __
ENERGIZER! THEY KEEP GOING AND GOING... ==/ \
/\__o :
:__\__/
boomp boomp boomp boomp boomp boomp boomp boomp /_ \_
[Editors Note: How'd that get in here?]
---
The U.S. National Commission on Libraries and Information Science is a
permanent, independent agency of the federal government charged with
advising both Congress and the President on matters relating to national
library and information policies and plans.
The commission has approved unanimously a major federal policy document,
``Principles of Public Information,'' and urged its use by all branches of
the federal government as well as state and local government, and the
private sector in the development of information policies. The document
was adopted by the commission at its June 29, 1990 meeting.
The full text of the ``Principles of Public Information'' follows:
Preamble
From the birth of our nation, open and uninhibited access to public
information has ensured good government and a free society. Public
information helps to educate our people, stimulate our progress and solve
our most complex economic, scientific and social problems. With the
coming of the Information Age and its many new technologies, however,
public information has expanded so quickly that basic principles regarding
its creation, use and dissemination are in danger of being neglected and
even forgotten.
The National Commission on LIbraries and Information Science, therefore,
reaffirms that the information policies of the U.S. government are based
on the freedoms guaranteed by the constitution, and on the recognition of
public information as a national resource to be developed and preserved in
the public interest. We define ``public information'' as information
created, compiled, and/or maintained by the Federal Government. We assert
that public information is information owned by the people, held in trust
by their government, and should be available to the people except where
restricted by law. It is this spirit of public ownership and public trust
that we offer the following Principles of Public Information.
1. The public has the right of access to public information.
Government agencies should guarantee open, timely and uninhibited access
to public information except where restricted by law. People should be
able to access public information, regardless of format, without any
special training or expertise.
2. The Federal Government should guarantee the integrity and preservation
of public information, regardless of its format.
By maintaining public information in the face of changing times and
technologies, government agencies assure the government's accountability
and the accessibility of the government's business to the public.
3. The Federal Government should guarantee the dissemination,
reproduction, and redistribution of public information.
Any restriction of dissemination or any other function dealing with public
information must be strictly defined by law.
4. The federal government should safeguard the privacy of persons who use
or request information, as well as persons about whom information exists
in government records.
5. The Federal Government should ensure a wide diversity of sources of
access, private as well as governmental, to public information.
Although sources of access may change over time and because of advances in
technology, government agencies have an obligation to public to encourage
diversity.
6. The Federal Government should not allow cost to obstruct the people's
access to public information.
Costs incurred by creating, collecting, and processing information for the
government's own purposes should not be passed on to people who wish to
utilize public information.
7. The Federal Government should ensure that information about government
information is easily available and in a single index accessible in a
variety of formats.
The government index of public information should be in addition to
inventories of information kept within individual government agencies.
8. The Federal Government should guarantee the public's access to public
information, regardless of where they live and work, through national
networks like the Depository Library Program.
Government agencies should periodically review such programs as well as
the emerging technology to ensure that access to public information
remains inexpensive and convenient to the public.
Conclusion
The National Commission on Libraries and Information Science offers these
Principles of Public Information as a foundation for the decisions made
throughout the Federal Government and the nation regarding issues of
public information. We urge all branches of the Federal Government, state
and local governments and the private sector to utilize these principles
in the development of information policies and in the creation, use,
dissemination and preservation of public information. We believe that in
so acting, they will serve the best interests of the nation and the people
in the Information Age.
---
[Note: H. Keith Henson is the same guy who circulated that letter to AT&T and
started the call for a general boycott against them.]
The long running Alcor/email case against the County and City of Riverside, CA
was settled out of court in April of this year. The announcement was delayed
until all parties had signed off, and the check had cleared the bank :-).
The Alcor Life Extension Foundation (a non-profit cryonics organization
--alcor@cup.portal.com) ran a BBS for members and prospective members from
early 1987 through January 12, 1988. On that day, the BBS computer was removed
under a warrant to take the computer (but no mention of any contained email) in
connection with the investigation into the death of 83-year-old Dora Kent.
(Mrs. Kent was placed into cryonic suspension by Alcor in December of 1987.
During and following the investigation, Alcor staff members were publicly
accused by county officials of murder, theft, and building code violations. No
charges were ever filed and the investigation was officially closed three years
later.)
In December of 1988 Keith Henson filed a civil suit to force an investigation
of the apparent violations of the Electronic Communication Privacy Act by the
FBI, but the case was dismissed by the now convicted Judge Aguilar.
In early 1990, just before the statute of limitations ran out, Henson and
14 others (of the roughly 50 people who had email on the system) filed a
civil action against a number of officials and the County and City of
Riverside, CA under Section 2707 of the Electronic Communication Privacy
Act which forbids inspecting or denying access to email without a warrant.
Some time after the case was filed, the Electronic Frontier Foundation came
into existence in response to law enforcement abuses involving a wide spectrum
of the online community. EFF considered this case an important one, and helped
the plaintiffs in the case by locating pro bono legal help. While the case was
being transferred, the County and City offered a settlement which was close to
the maximum damages which could have been obtained at trial. Although no
precedent was set because the case did not go to trial, considerable legal
research has been done, and one judgment issued in response to the Defendants'
Motion to Dismiss. The legal filings and the responses they generated from the
law firm representing the County/City and officials are available by email from
mnemonic@eff.org or (with delay) from hkhenson@cup.portal.com. (They are also
posted on Portal.)
The Plaintiffs were represented by Christopher Ashworth of Garfield, Tepper,
Ashworth and Epstein in Los Angeles (408-277-1981). The only significant item
in the settlement agreement was the $30k payment to the plaintiffs.
---
Title: TRW Accused of Exploiting Consumers
Six states have sued TRW Inc., charging that its credit bureau division
secretly grades consumers on their bill-paying ability -- sometimes with
inaccurate information -- and sells confidential mail to junk mailers. The NY
State suit also charges TRW with providing inaccurate information about
consumers to banks and other credit grantors, which often results in denied
credit. Texas, Alabama, Idaho, Michigan, and California have filed another
suit in State District Court in Dallas TX. (Reuters report in the San
Francisco Chronicle, 10Jul91, p.C1)
---
Subject: Houston City Hall voice-mail prank
Houston acquired an AT&T telephone system in 1986 for $28M, but configured it
with no passwords required for accessing voice mail. Thus, it should not
surprise any of you to hear that recently a "prankster intercepted and rerouted
confidential telephone messages from voice-mail machines in City Hall,
prompting officials to pull the plug on the telephone system." Messages were
being delivered to nonintended recipients. [Source: San Francisco Chronicle,
20Jul91, p.A5]
[Also noted by Steve Bellovin]
Subject: The voice-mail shuffle at City Hall
... A few stations even played quick snippets from one message, which appeared
to be a kind of verbal "love letter" left for someone. Needless to say, the
intended recipient was not the actual recipient. The perpetrator evidently
would somehow try to simlulate a message break tone before each misdirected
message by whistling a tone on the recording.
While some of the redirected messages were, in some people's opinion, harmless,
others were matters of City and State affairs, and the ramifications of these
messages not being received were more than trivial. Needless to say, the
service was down the next day for "upgrade modification".
As one newscast put it at the end of their story, "when you leave a message at
City Hall, don't leave one you wouldn't want repeated in public."
---
Title: "How Did They Get My Name?"
[From NEWSWEEK, 6/3/91, p.40]:
Consumers are growing more uneasy about threats to privacy -- and are fighting
back.
"We don't have to worry about Big Brother anymore," says Evan Hendricks,
publisher of Privacy Times. "We have to worry about little brother." Until
recently, most privacy fears focused on the direct-mail indistry; now people
are finding plenty of other snoops.
Suddenly privacy is a very public issue. Privacy scare stories are becoming
a staple of local TV news. Now Congress is scrambling to bring some order to
the hodepodge of privacy and technology laws, and the U.S. Office of
Consumer Affairs has targeted privacy as one of its prime concerns. Advocacy
groups like the Consumer Federation of America and the American Civil Liberties
cy as one the hot-button issues for the '90s.
Concern is on the rise because consumers are finding that their lives are an
open book.
Privacy activists warn that the bigger threat comes from business. Citicorp
and other data merchants are even pilot testing systems in supermarkets that
will record your every purchase. "Everything we do, every transaction we
engage in goes into somebody's computer," says Mary Culnan, a Georgetown
University associate professor of business administration.
How much others know about you can be unsettling.
In the '80s, the controls were melting away, says Hendricks.
"Reagan came in and said, 'We're going to get government regulators off
the backs of business.' That sent signals to the private sector that 'you
can use people's personal information any way you want.'"
Consumers are beginning to fight back. The watershed event was a fight
over Lotus MarketPlace: Households. New York Telephone got nearly
800,000 "opt out" requests when it wanted to peddle its customer list;
the plan was shelved.
With the MarketPlace revolt, a growing right-to-privacy underground
surfaced for the first time. Privacy has become one of the most
passionately argued issues on computer networks like the massive
Internet and the WELL (an on-line service that has become a favorite
electronic hangout for privacy advocates and techie journalists).
Some privacy activists look hopefully across the Atlantic. The
European Community is pushing tough new data rules to take effect after
1992. The Privacy Directive relies on consumer consent; companies would
have to notify consumers each time they intend to pass along personal
information. The direct-marketing industry claims the regulations would
be prohibitively expensive.
U.S. firms might find another incentive to change. Companies don't want
to alienate privacy-minded customers. Then consumers might get some of
their privacy back--not necessarily beacuse it's the law, or even because
it's right, but because it's good business.
"Would New Laws Fix the Privacy Mess?" (also from Newsweek in sidebar)
Since the mid-1960s, Congress has enacted no fewer than 10
privacy laws. And yet a national right to privacy is far from firmly
established. "It's easy to preach about the glories of privacy," says
Jim Warren, who organized a recent "Computers, Freedom & Privacy"
conference. "But it's hard to implement policies without messing things
up."
That hasn't stopped people from trying. James Rule, a State University
of New York sociology professor, says that new legislation is warranted
"on the grounds that enough is enough. Privacy infringement produces a
world that almost nobody likes the look of."
Last week a Senate task force recommended extending privacy laws to cover
cordless phones. One bill would create a federal "data-protection
board" to oversee business and governmental use of electronic
information. Another would apply the Freedom of Information Act to
electronic files as well as paper.
In this technological age, how much privacy Americans enjoy will depend
partly on how high a price they are willing to pay to keep it.
---
AT&T's announcement from the company's internal News Briefs describing
their victory in Harold Greene's courtroom:
AT&T NEWS BRIEFS
[All items are today's date unless otherwise noted]
Friday, July 26, 1991
FREEDOM -- Phone lines were cleared Thursday for the seven
regional phone companies to provide electronic information such as
stock quotes and sports scores. ... USA Today, 1A. [Judge Harold]
Greene simultaneously stayed his order, however, to permit all
appeals to be heard, which raised the possibility its effect could
be delayed for months. His decision is expected to draw fierce
opposition. ... Washington Post, A1. ... Today's ruling did not
change the restrictions that bar the Bell companies from entering
the long-distance telephone industry or manufacturing telephone
equipment, but the appeals court ruling that prompted today's
decision also recommended that Judge Greene apply more flexible
legal standards in considering these restrictions. ... Herb
Linnen, AT&T spokesman, said the company had never objected to the
Bell companies' entry into the information services market,
provided that they remained excluded from the equipment
manufacturing and long-distance industries. ... New York Times,
B1. ... [The] ruling also moves the regional phone companies a
step closer to being able to compete for cable television
customers. ... New York Newsday, p. 5. ... The 71-page opinion
noted that an appeals court decision last spring left no other
choice. ... Wall Street Journal, B1. Also all major newspapers.
Regardless of the legal maneuvering involving the regional
telephone companies, AT&T plans to offer what it calls a Smart
Phone, a telephone-and-video-screen device, as soon as next
summer, Ray Zardetto, a company spokesman, said yesterday. ...
"You can call up stock reports, for instance," Zardetto said about
one use for the Smart Phone. "Whatever part of the stock report
you want will run across the screen. Or you can preprogram your
pizza order from your favorite pizza parlor, push a button and it
goes across the network to his Smart Phone and it'll be
delivered." New York Newsday, p. 35.
---
THE COMPUTER SECURITY EVENT OF THE YEAR
It says, in part:
The 18th Annual Computer Security Conference and National Exhibition--
the largest ever--will be held in Miami at the Fontainebleau Hilton Hotel
on NOvember 11-14, 1991. With over 110 speakers, the Security Event of the
Year, sponsored by the Computer Security Institute, will address the full
range of issues facing computer security practitioners in business and
government.
...
Conference highlights include:
*Tom Peltier on "Information Security Approaches the Second Millenium."
*Scott Charney from the US Department of Justice with a practical look on
what the Department of Justice is doing to prosecute computer crime.
*Harry DeMaio from Deloitte & Touche, who will address the topic "Effective
Information Protection in a Complex Environment."
*Cameron Carey of Computer Security Placement Specialists, on the job
market outlook for computer security professionals.
*Dr. Lance Hoffman of George Washington University will address the topic
"Computer Security: We're Not Just Talking To Ourselves Anymore!"
Also, two of the industry's leading lights--Bill Murray of Deloitte &
Touce and Donn Parker of SRI International--will debate some of the key
issues in computer security.
Over a thousand computer security professionals are expected to attend
this premiere event, which also features the largest compiuter security
products trade show in the United States.
Contact is Philip Chapnick, (415)905-2267.
Computer Security Institute: (415)905-2200 voice, 905-2234 fax
[End of CyberTimes (Vox Populi) NIA072 01JAN91-01AUG91 Edition]
----------------------------------------------------------------------------
Greetings. Well, this completes issue number 72. Expect to see issue 73
in about 2 months or so. We do not have enough material to complete it yet,
so if you would like to contribute, please contact us at nia@nuchat.sccsi.com
or by getting ahold of one of our staff and/or contributors.
If you would like to write to Len Rose, he can be reached at:
Len Rose
Federal Prison Camp
Seymour Johnson AFB
Caller Box 8004
Goldsboro, NC 27531-5000
We're sure Len could use the mail. He can be reached there for oh, say, the
next ten months or so. Our sympathies go to him and his family.
Concerning the news, Cybertimes, we are always looking for submissions. If
you see an article in your local paper, please type it up and send it in.
We are also accepting donations of used and/or obsolete computer equipment.
We are willing to cover the cost of postage to ship it to Texas. As soon as we
can get the Kludge operating, we will set up an NIA home system where all the
issues will be online for downloading as well as reading.
With regards to the Hacker Manifeso file, Erik Bloodaxe is no longer in
the underground community. This is an old file that was dug up from the days
when he was still hacking. Best of luck to you and your associates in your new
endeavour, Erik.
Attention Internet Subscribers: Plese tell us when you are moving or
losing your account so that we may keep the maillist current. Back issues
may be found at the CuD Archive Server [ftp.sc.widener.edu /pub/cud/nia] and
the EFF Server [ftp.eff.org /cud/nia].
We will soon have an AE line (no shit!) running HST for those of you
without InterNet access.
Until next time...
JD & LMcD
"The New York Times is read by people who run the country.
The Washington Post is read by people who think they run the country.
The National Enquirer is read by people who think that Elvis is alive and
running the country..."
- Robert J. Woodhead
[End of issue NIA072]
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+