home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.17 (December 16, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- RESIDENT INSOMNIAC: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission.
- It is assumed that non-personal mail to the moderators may be reprinted
- unless otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: EFF Response to Atlanta Sentencing Memorandum
- File 4: Some Thoughts on the Atlanta Sentencing
- File 5: Earning your Stripes
- File 6: Playgrounds of the Mind: Cyberspace
- File 7: The CU in the News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.17: File 1 of 7: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: December 16, 1990
-
- ++++++++++
- In this file:
- 1. LEN ROSE UPDATE
- 2. FTP FILES
- ++++++++++
-
- +++++++++++++++++++++
- Len Rose Update
- +++++++++++++++++++++
-
- Len Rose will go to trial in Baltimore in late January barring any
- extensions. He asked us to pass on his thanks to the many, many people who
- responded to his request for witnesses. Len is still unemployed and is
- prevented from seeking menial work because his leg remains in a cast and he
- cannot stand for extended periods of time. He sends his thanks to those who
- have helped in financially and emotionally during this period. Those
- wishing to help him through the holidays are encouraged to send donations
- to:
-
-
- Len Rose Donation
- c/o Sheldon Zenner
- Katten, Muchin and Zavis
- 525 W. Monroe, Suite 1600
- Chicago, IL 60606
-
- Checks should be made out to either Sheldon Zenner or Len Rose.
-
- +++++++++++++++
- FTP Files
- +++++++++++++++
-
- A few more state statutes have been added to the ftp site along with a few
- legal papers. The complete NIA (Network Information Access, #s 1-67) will
- also be up by Christmas. DAVE BANISAR has been helpful in expanding the
- legal documents.
-
- The EFF NEWSLETTER, which just came out, will also be added. We encourage
- people to ftp it and upload it elsewhere. Their first issue is excellent
- (we reprint their response to the Riggs sentencing memo in file 3).
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various
- Subject: From the Mailbag
- Date: December 16, 1990
-
- ********************************************************************
- *** CuD #2.17: File 2 of 7: From the Mailbag ***
- ********************************************************************
-
- From: Robert McClenon <76476.337@COMPUSERVE.COM>
- Subject: Cowboys and Indians and the cyberfrontier
- Date: 11 Dec 90 00:54:55 EST
-
- The question was posed as to whether hackers are cowboys seeking new
- territory to stake out. Maybe. But I propose a different (electronic)
- frontier metaphor. Cowboys lived on the frontier in what they perceived to
- be freedom but did not understand the limits of the world and eventually
- wasted the commons. There were another group of people, living further out
- on the frontier, who in general did understand the limits of the world and
- the interdependency of all things, and who had their own tribal culture and
- ethic that was not well understood by outsiders. They were called by many
- names and called themselves by many names, but at the time most outsiders
- called them Indians. Their society was tribal, but most tribes had an
- organization that at the same time was mostly democratic and yet placed a
- great deal of authority and respect in a chief. They had a few enemies.
- Principal among their enemies were the federal cavalry. The objective of
- the cavalry was in general to herd the Indians onto reservations as a step
- toward fencing in the free range, and some of the cavalry had the secondary
- wish to massacre a few Indians in the process. The cavalry often waited
- for a provocation, which sometimes came from rogue Indians who interfered
- with the white man's property, by raiding his sheep, or with his
- communication, by cutting telegraph lines or harassing the pony express.
-
- I suggest that the BBS community are comparable to Indians, living
- peacefully on the frontier, in harmony with the world, and mostly
- respecting the authority of the chiefs (sysops), although not without
- complaining. Hackers are rogue Indians, who threaten communication and
- property. It does not take much of a provocation to bring on the feds.
- And the feds do not respect the Indian culture and have shown a willingness
- to slaughter Indian chiefs who tried to cooperate with the feds in
- controlling the rogue Indians.
-
- What are the conclusions? The rogue Indians threaten the continued
- existence of the Indians. The worse rogues are the feds, who do not seem
- to respect anyone's law, even their own. The only long-term hope for the
- Indians is to maintain their own discipline.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: wex@PWS.BULL.COM
- Subject: A Philosophical Reminder
- Date: Mon, 10 Dec 90 13:41:49 est
-
- Not to rain on Dark Adept's parade since I largely agree with him, but...
-
- The ancient wizards he refers to, and whom he credits with things such as
- Physics and Philosophy, were but pale imitations of their Greek, Babylonian,
- and Chinese forbears. It was these men (for women were systematically
- excluded) who -- as far as we know -- founded such things as Philosophy.
-
- The alchemists (and similar "wizards") were indeed similar to (some) hackers
- in that they were unsystematic dabblers in things that were supposed to be
- forbidden. But credit where credit is due, please. It was people like
- Descartes and Russell who systematized and made Western science what it
- became.
-
- --Alan Wexelblat phone: (508)294-7485
- Bull Worldwide Information Systems internet: wex@pws.bull.com
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Electronic Frontier Foundation
- Subject: EFF Response to Atlanta Sentencing Memorandum
- Date: December 10, 1990
-
- ********************************************************************
- *** CuD #2.17: File 3 of 7: EFF Response to Atlanta Sentencing ***
- ********************************************************************
-
- EFF News #1.00: Article 7 of 7:
- How Prosecutors Misrepresented the Atlanta Hackers
-
- Although the Electronic Frontier Foundation is opposed to unauthorized
- computer entry, we are deeply disturbed by the recent sentencing of Bell
- South hackers/crackers Riggs, Darden, and Grant. Not only are the sentences
- disproportionate to the nature of the offenses these young men committed,
- but, to the extent the judge's sentence was based on the prosecution's
- sentencing memorandum, it relied on a document filled with
- misrepresentations.
-
- Robert J. Riggs, Franklin E. Darden, Jr., and Adam E. Grant were sentenced
- Friday, November 16 in federal court in Atlanta. Darden and Riggs had each
- pled guilty to a conspiracy to commit computer fraud, wire fraud,
- access-code fraud, and interstate transportation of stolen property. Grant
- had pled guilty to a separate count of possession of access codes with
- intent to defraud.
-
- All received prison terms; Grant and Darden, according to a Department of
- Justice news release, "each received a sentence of 14 months incarceration
- (7 in a half-way house) with restitution payments of $233,000." Riggs, said
- the release, "received a sentence of 21 months incarceration and $233,000
- in restitution." In addition, each is forbidden to use a computer, except
- insofar as such use may be related to employment, during his
- post-incarceration supervision.
-
- The facts of the case, as related by the prosecution in its sentencing
- memorandum, indicate that the defendants gained free telephone service and
- unauthorized access to BellSouth computers, primarily in order to gain
- knowledge about the phone system. Damage to the systems was either minimal
- or nonexistent. Although it is well-documented that the typical motivation
- of phone-system hackers is curiosity and the desire to master complex
- systems (see, e.g., HACKERS: HEROES OF THE COMPUTER REVOLUTION, Steven
- Levy, 1984), the prosecution attempts to characterize the crackers as major
- criminals, and misrepresents facts in doing so.
-
- Examples of such misrepresentation include:
-
- 1) Misrepresenting the E911 file.
-
- The E911 file, an administrative document, was copied by Robert Riggs and
- eventually published by Craig Neidorf in the electronic magazine PHRACK.
- Says the prosecution: "This file, which is the subject of the Chicago
- [Craig Neidorf] indictment, is noteworthy because it contains the program
- for the emergency 911 dialing system. As the Court knows, any damage to
- that very sensitive system could result in a dangerous breakdown in police,
- fire, and ambulance services. The evidence indicates that Riggs stole the
- E911 program from BellSouth's centralized automation system (i.e., free run
- of the system). Bob Kibler of BellSouth Security estimates the value of the
- E911 file, based on R&D costs, is $24,639.05."
-
- This statement by prosecutors is clearly false. Defense witnesses in the
- Neidorf case were prepared to testify that the E911 document was not a
- program, that it could not be used to disrupt 911 service, and that the
- same information could be ordered from Bell South at a cost of less than
- $20. Under cross-examination, the prosecution's own witness admitted that
- the information in the E911 file was available in public documents, that
- the notice placed on the document stating that it was proprietary was
- placed on all Bell South documents (without any prior review to determine
- whether the notice was proper), and that the document did not pose a danger
- to the functioning of the 911 system.
-
- 2) Guilt by association.
-
- The prosecution begins its memorandum by detailing two crimes: 1) a plot
- to plant "logic bombs" that would disrupt phone service in several states,
- and 2) a prank involving the rerouting of calls from a probation office in
- Florida to "a New York Dial-A-Porn number."
-
- Only after going to some length describing these two crimes does the
- prosecution state, in passing, that *the defendants were not implicated in
- these crimes.*
-
- 3) Misrepresentation of motives.
-
- As we noted above, it has been documented that young phone-system hackers
- are typically motivated by the desire to understand and master large
- systems, not to inflict harm or to enrich themselves materially. Although
- the prosecution concedes that "[defendants claimed that they never
- personally profited from their hacking activities, with the exception of
- getting unauthorized long distance and data network service," the
- prosecutors nevertheless characterize the hackers' motives as similar to
- those of extortionists: "Their main motivation [was to] obtain power
- through information and intimidation." The prosecutors add that "In
- essence, stolen information equalled power, and by that definition, all
- three defendants were becoming frighteningly powerful."
-
- The prosecution goes to great lengths describing the crimes the defendants
- *could* have committed with the kind of knowledge they had gathered. The
- prosecution does not mention, however, that the mere possession of
- *dangerous* (and non-proprietary) information is not a crime, nor does it
- admit, explicitly, that the defendants never conspired to cause such damage
- to the phone system.
-
- Elsewhere in the memorandum, the prosecution attempts to suggest the
- defendants' responsibility in another person's crime. Because the
- defendants "freely and recklessly disseminated access information they had
- stolen," says the memorandum, a 15-year-old hacker committed $10,000 in
- electronic theft. Even though the prosecution does not say the defendants
- intended to facilitate that 15-year-old's alleged theft, the memorandum
- seeks to implicate the defendants in that theft.
-
- 4) Failure to acknowledge the outcome of the Craig Neidorf case.
-
- In evaluating defendants' cooperation in the prosecution of Craig Neidorf,
- the college student who was prosecuted for his publication of the E911
- text file in an electronic newsletter, the government singles out Riggs as
- being less helpful than the other two defendants, and recommends less
- leniency because of this. Says the memorandum: "The testimony was somewhat
- helpful, though the prosecutors felt defendant Riggs was holding back and
- not being as open as he had been in the earlier meeting." The memorandum
- fails to mention, however, that Riggs's testimony tended to support
- Neidorf's defense that he had never conspired with Riggs to engage in the
- interstate transportation of stolen property or that the case against
- Neidorf was dropped. Riggs's failure to implicate Neidorf in a crime he did
- not commit appears to have been taken by prosecutors as a lack of
- cooperation, even though Riggs was simply telling the truth.
-
- Sending a Message to Hackers?
-
- Perhaps the most egregious aspect of the government's memorandum is the
- argument that Riggs, Grant, and Darden should be imprisoned, not for what
- *they* have done, but send the right "message to the hacking community."
- The government focuses on the case of Robert J. Morris Jr., the
- computer-science graduate student who was sentenced to a term of probation
- in May of this year for his reckless release of the worm program that
- disrupted many computers connected to the Internet. Urging the court to
- imprison the three defendants, the government remarked that "hackers and
- computer experts recall general hacker jubilation when the judge imposed a
- probated sentence. Clearly, the sentence had little effect on defendants
- Grant, Riggs, and Darden."
-
- The government's criticism is particularly unfair in light of the fact
- that the Morris sentencing took place almost a year *after* the activities
- leading to the defendants' convictions! (To have been deterred by the
- Morris sentencing the Atlanta defendants would have to have been able to
- foretell the future.)
-
- The memorandum raises other questions besides those of the prosecutors'
- biased presentation of the facts. The most significant of these is the
- government's uncritical acceptance of BellSouth's statement of the damage
- the defendants did to its computer system. The memorandum states that "In
- all, [the defendants] stole approximately $233,880 worth of
- logins/passwords and connect addresses (i.e., access information) from
- BellSouth. BellSouth spend approximately $1.5 million in identifying the
- intruders into their system and has since then spent roughly $3 million
- more to further secure their network."
-
- It is unclear how these figures were derived. The stated cost of the
- passwords is highly questionable: What is the dollar value of a password?
- What is the dollar cost of replacing a password?
-
- And it's similarly unclear that the defendants caused BellSouth to spend
- $4.5 million more than they normally would have spent in a similar period
- to identify intruders and secure their network. Although the government's
- memorandum states that "[t]he defendants ... have literally caused
- BellSouth millions of dollars in expenses by their actions," the actual
- facts as presented in the memorandum suggest that BellSouth had *already
- embarked upon the expenditure of millions of dollars* before it had heard
- anything about the crimes the defendants ultimately were alleged to have
- committed. Moreover, if the network was insecure to begin with, wouldn't
- BellSouth have had to spend money to secure it regardless of whether the
- security flaws were exploited by defendants?
-
- The Neidorf case provides an instructive example of what happens when
- prosecutors fail to question the valuations a telephone company puts on its
- damages. But the example may not have been sufficiently instructive for the
- federal prosecutors in Atlanta.
-
- Not only are there questions about the justice of the restitution
- requirement in the sentencing of Riggs, Darden, and Grant, but there also
- are Constitutional issues raised by the prohibition of access to computers.
- The Court's sentencing suggests a belief that anything the defendants do
- with computers is likely to be illegal; it ignores the fact that computers
- are a communications medium, and that the prohibition goes beyond
- preventing future crimes by the defendants--it treads upon their rights to
- engage in lawful speech and association.
-
- EFF does not support the proposition that computer intrusion and
- long-distance theft should go unpunished. But we find highly disturbing the
- misrepresentations of facts in the prosecutors' sentencing memorandum as
- they seek disproportionate sentences for Riggs, Darden, and Grant--stiff
- sentences that supposedly will "send a message" to the hackers and
- crackers.
-
- The message this memorandum really sends is that the government's
- presentation of the facts of this case has been been heavily biased by its
- eagerness to appear to be deterring future computer crime.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: The Advocate / return deleted
- Subject: Some Thoughts on the Atlanta Sentencing
- Date: Tue, 11 Dec 90 15:37:23 -0500
-
- ********************************************************************
- *** CuD #2.17: File 4 of 7: Thoughts on the Atlanta Sentencing ***
- ********************************************************************
-
- I find the statement in the sentencing memo "these three had acquired
- tremendous information, enough to become frighteningly powerful" to be the
- key to the governments prosecution.
-
- The governemnt has always feared those who have gained power outside of the
- channels of normal authority, and sought to destroy all those who have
- gained this power.
-
- The FBI sought to destroy King and the SCLC, not because he was a bad man,
- but because he threatened the status quo. The Black Panthers threatened
- the status quo and they were destroyed. Read the history of organized
- labor. Every initial unionization attempt was met with violence and legal
- assault, until the unions became part of the establishment. Jesus was
- crucified because he threatened the order.
-
- Now hackers have started to seize information and power. That power is a
- potential force for good or evil. That power could shake the world as they
- know it. So now all forces of law enforcement have begun to turn on those
- who may threaten the order.
-
- I would recommend that all those who wish to hack, listen to "Ruby, an
- intergalactic gumshoe". It's a radio drama from the people who did the
- "fourth tower of Inverness"(best guess). There there is an organization
- called the digital circus, who build wrestling robots. THey wrestle
- against the rulers machines. They never win, but always come a little
- closer before throwing the match.
-
- I would suggest that the sentencing memo serve as a warning to all other
- hackers.
-
- SQUEALERS NEVER PROSPER.........
-
- John Doe the indiana stool pigeon, got for his troubles,
- a search warrant and indictment.
-
- The atlanta three got for their guilty plea and cooperation
- about 8 years and $250,000 in punishment.
-
- I have been around criminal lawyers and investigators, for the better part
- of my life. I cannot suggest any case where cooperation brings help. Now
- all of them are also vulnerable on civil charges.
-
- Had they all sat odwn, said prove the case and fought it out, they would
- have done no worse. and probably could have demolished the case with Dr
- Dennings testimony. But no, they squealed. Someone ought to slap around
- their attorneys.
-
- Craig Neidorf had it right with sheldon zenner. Fight all the way.
- Don't fight the good fight. Fight with every drop of blood you have.
- Fight constitutionality. fight civilly. fight in the press. fight in the
- legislature.
-
- If you are indicted, use your rights. Subpoena every document of the
- firms opposing you. They claim billions in damages, subpoena all their
- operating records. get their expense records of top officials. Use your
- subpoena rights to find dirt on their witnesses. It's there, you just
- have to look for it.
-
- IF there is going to be a computer underground, then it's going to have to
- learn how to fight and win in the courts and legislatures and public
- opinion. that means controlling our excesses. learning how to measure
- performance, and developing ethics.
-
- Ethics. The Dark adept wrote about these. Why break into yet another TSO
- machine? Don't damage data. Learn to respect privacy rights. IF you find
- a security bug, publish it, but learn how to offer your services to fix
- these. Learn to realize that trespassing via computer is no different then
- trespass by foot. Create playlands. The LOTS machine at stanford provided
- many a safe outlet. Get these machines going at the larger colleges. Why
- can't their still be LOTS?
-
- Learn to realize limits, as well. well best of luck for those of you out
- there.
-
- I remain, The Advocate.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Subject: Earning your Stripes
- From: Silver Surfer
- Date: Tue, 11 Dec 90 07:06 EDT
-
- ********************************************************************
- *** CuD #2.17: File 5 of 7: Earning your Stripes ***
- ********************************************************************
-
- In an article by Katie Hafner entitled "Morris Code", she describes a long
- standing tradition that computer security experts have earned their stripes
- by defeating the computer's barriers. But now instead of earning pin
- stripes, hackers are earning their prison stripes for defeating computer's
- barriers. What has happened to change the norms and values in the computer
- world in the last 10 to 15 years?
-
- Now it is a crime to pursue forbidden unlawful computer knowledge. Just
- recently the "Atlanta Three" (Robert Riggs, Adam Grant and Franklin Darden)
- have been sentenced to prison terms for breaking into the BellSouth
- computer systems. It is stated by the government that these individuals
- have a vast knowledge concerning computer and telecommunication services.
- So with this aptitude they are being sent to prison where they might learn
- a lesson. What lesson might they learn, I do not know. It is hard to
- believe that the government would not impose a fine on them and community
- service similar to what Morris received (but then again I bet none of their
- fathers are at the NSA..or could afford the lawyers Morris's family
- provided their son).
-
- I think the "Atlanta Three" should be viewed as technological clepto
- maniacs. They would pursue information and knowledge even though they knew
- the means were illegal. You could say that their value system of right and
- wrong was skewed. But is this a reason to imprison these young men? Their
- critics site the millions of dollars lost (just like the thousands of
- dollars for the 911 manuscript ....it's revised net value is under $20 now)
- and the threat to life they could have caused through network disruption.
- The key words are COULD HAVE CAUSED. They never actually caused loss of
- life or injury to anyone. If that was the case, I would drive them to
- prison myself.
-
- So the federal government has issued a message to hackers and phreaks, that
- the only stripes you can earn now are prison stripes.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Silicon Surfer / <address deleted>
- Subject: Playgrounds of the Mind: Cyberspace
- Date: Tue, 11 Dec 90 07:06 EDT
-
- ********************************************************************
- *** CuD #2.17: File 6 of 7: Playgrounds of the Mind: Cyberspace ***
- ********************************************************************
-
- Playgrounds Of The Mind: Cyberspace
- By
- Silicon Surfer
-
- Why do hackers hack? The majority seem to say it's a thrill or a challenge
- to get into a system. Others say that it's a means to learn about
- mainframe computers and their various communication networks.
-
- Every year the government and with donations from industry pour millions of
- dollars into athletic facilities for it's youth and adult citizens. There
- is even a President's Fitness Council to encourage Americans to exercise
- their bodies. The government and industry does spend millions of dollars
- to fight computer "hackers" and fix security holes. But where are the
- playgrounds for the mind?
-
- If the government and industry provided regionally located computer centers
- for the young and old computer enthusiasts to use or break into what would
- happen? Industry and the government would have a place to test it's new
- software and find security holes. It would also be developing a young crop
- of computer programmers and security experts. Imagine what it would be
- like to develop young adults with years of computer experience, we already
- see this result in sports every year during the various professional drafts
- and attempts by colleges to recruit players.
-
- And what of the crime of computer hackers? There would be no excuse if you
- were allowed to use or crack a specific computer system. There would still
- be the thrill, challenge and knowledge to achieve, BUT it would be legal.
- It would also teach ethics. Imagine a hacker defeating a system and gaining
- an account, then only weeks later to lose that account to another hacker
- (of course a large increase of computer expertise would be developed by
- hackers to defend their own accounts).
-
- And if a hacker broke into a system that was outside the allowed
- systems...there would be no excuse except for criminal mischief.
-
- There already exits a network called the Internet that would allow various
- playgrounds of cyberspace to be connected. Today, most high school
- districts have minicomputers or mainframe systems (imagine students staying
- after school to work and learn with a computer...they would most likely
- have to sign up for time...images of the old days of the old hackers of the
- 70's) that could connect to the Internet. And what of the computing
- resources of community colleges and state universities that could be opened
- up to the public. They already open up their gyms, athletic fields, and
- pools to the community, why not their computers? A perfect example is the
- Cleveland Free-Net by CASE Western. They have developed a computer city
- that exists on the Internet and is accessible to anyone at NO cost. The
- EFF wants to encourage the growth and inhabitance of cyberspace. Why not
- develop outposts at various academic sites to accommodate the "greenhorns"
- that are venturing out into this new and open frontier? The EFF does not
- need to spend vast amounts of money, instead it should provide
- encouragement. They could aid in the development of a program to bring
- computers to the people (..help establish a Community Memory
- Project...like the one that existed in the late 70's in California). It
- would be easier for the more famous of their members to get donations from
- industry of used or new equipment.
-
- But then again it is easier for the government and industry to spend
- resources of time and money to monitor and hunt hackers. It is better to
- foster the idea that computer access and knowledge should be the realm of
- the few. That it would be better to complain and wring their hands saying
- that the US should do something to regain it's technological edge and by
- the way, let's get rid of these dangerous and evil hackers.
-
- Of course the media is of no help. What profit is it to print news stories
- or support an initiative like this. There is no sensationalism in law and
- order. The bed time horror stories of 15 year olds breaking into military
- computers and emergency networks would disappear, leaving them instead with
- stories of a educated and ethical computer community.
-
- I believe we are at a turning point in the computer culture. We have
- reached the cross roads, we can encourage the open development of computer
- knowledge by providing open systems or we can make it a crime to pursue
- knowledge. After reading this you might ask what have I done to encourage
- computer knowledge? I have taught computer courses for elementary students
- while in college and later developed a course outline to use a state
- university's mainframe computer to provide accounts and instruction for
- high school students (the program although was shot down by the state
- university's bureaucracy plan to fight this decision). That is why I am
- posting this article under a handle, to protect any future projects of mine
- from misinterpretation.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various
- Subject: The CU in the News
- Date: 15 December, 1990
-
- ********************************************************************
- *** CuD #2.17: File 7 of 7: The CU in the News ***
- ********************************************************************
-
- From: someplace!anonymous@UUNET.UU.NET
- Subject: Well, did anything happen?
- Date: Wed, 12 Dec 90 02:59:59 -0500
-
- Or was it a case of hysterical or malicious rumor mongering?
-
- COMPUTER JOCKEYS THREATEN PHONE WAR
- SAN JOSE MERCURY NEWS (SJ) - Friday, November 16, 1990
- By: Associated Press
- Edition: Stock Final Section: Front Page: 16A
-
- Telephone companies are taking precautions today against a possible
- disruption of service somewhere in the country by computer vandals breaking
- into the phone network.
-
- Non-specific threats had been made to invade the massive computers that
- control the telephone network, but not to attack physical facilities,
- industry sources said.
-
- Sources who spoke on condition of anonymity said the threats apparently
- were in connection with a sentencing scheduled in Atlanta this afternoon
- for three members of a computer group called the Legion of Doom who had
- broken into BellSouth Corp. computers.
-
- Franklin E. Darden Jr. and Robert J. Riggs pleaded guilty earlier this
- year in federal court to one conspiracy count each. Adam E. Grant pleaded
- guilty to possessing 15 or more access devices with intent to defraud.
-
- 'Everyone is on alert'
-
- "We have not been able to assess the validity of the threats, but we
- certainly take any threats seriously, and we've taken precautions to
- minimize the risk of intrusion," BellSouth spokesman Bill McCloskey said.
-
- "We are aware of the purported threat to try and disrupt at least part of
- the nationwide network," said Herb Linnen, a spokesman for American
- Telephone and Telegraph Co. "Our corporate security organization has sent
- word around the country to make sure everyone is on alert in the coming
- days."
-
- Linnen said the purported threat was not against any single company. He
- said the rumor of the attempted disruption was discussed at a regular
- meeting Wednesday of technical executives of a number of phone companies.
-
- "We have no idea how widespread the threat might be, but it's our
- understanding that the group may be national," said Peter Goodale, a
- spokesman for Nynex Corp., parent of the New England Telephone and New York
- Telephone companies. "We've taken the appropriate security measures to
- ensure the integrity of our network."
-
- Copied 911 program
-
- FBI and Defense Department officials said they were unaware of any such
- threat.
-
- Federal prosecutors in Chicago last year charged that members of the
- Legion of Doom had used their computers in February 1989 to tap into the
- 911 system of Atlanta-based BellSouth and copy the program.
-
- The information then was published in an electronic newsletter in
- Chicago for hackers, but the 911 network was not disrupted.
-
- Charges against the Chicago publisher were dropped in July.
-
- Copyright 1990, San Jose Mercury News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: elroy!grian!alex@AMES.ARC.NASA.GOV(Alex Pournelle)
- Subject: Esquire Hacking Article
- Date: Wed, 5 Dec 90 09:55:23 GMT
-
- In the December Esquire magazine (with Michelle Pfeiffer on the cover),
- there is an article on "hacking" (system-cracking or password-stealing,
- really): "Terminal Delinquents", pp. 174ff, by Jack Hitt and Paul Tough,
- under the "Outlaws" banner. And it deserves some comments.
-
- I plan a rather lengthier commentary on this article, to be sent to the
- magazine, but thought it appropriate to tell the hacking community how they
- are portrayed. Certainly, all readers of cu-digest would do well to pick
- it up.
-
- The article is written about a small group of New York-based juvenile
- hackers (their term) who break into the Nynex billing and phone
- add/move/change system--to play around, look around, and just fiddle. A
- little time is spent on the background of phone phreaking (Draper
- discovering Cap'n Crunch whistles, blue boxes), essentially none on the
- history of actual hacking.
-
- The actions of these teenage trespassers are taken at face value; the only
- fact-checking appears to be one call for comment to the Nynex security
- office (they had no comment). Even when they are shown the "White House
- PROF system" (perhaps they meant PROFS?), they make no effort at
- independent corroboration.
-
- I find it even more disturbing that no editor at Esquire even suggested
- some fact-checking.
-
- The authors have not, to my eye, even done basic research like reading The
- Cuckoo's Egg. They talk about "The Internet Virus", not worm; their long
- treatise on "social-engineering of passwords" (getting people to tell
- them to you, or guessing them) only implicitly and offhandedly mentions the
- knife-edge balance between access and security. There is a lot of
- computer-as-electronic-phlogiston talk, some more successful than others.
- There is much scare talk about how any dam' fool can get your credit
- history from TRW. There's no direct discussion of how random
- system-breakins might endanger lives.
-
- There is essentially no talk about the morality, guidance or beliefs of the
- hackers--are we to presume that some Big Brother of government or school is
- supposed to teach the good and bad of computers? Or is this just a
- scary-but-true-to-life story about how any pimply-faced bag of teenage
- hormones with a modem can change your credit rating forever?
-
- I think the latter.
-
- In short, the piece is maddeningly obtuse in a magazine with a circulation
- of over 800,000. It is long on anecdote and very short on fact. It is a
- disservice to anyone who calls him/her/itself a hacker. The magazine
- deserves to be told this.
-
- Sincerely,
- Alex Pournelle
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: P.A.Taylor@EDINBURGH.AC.UK
- Subject: Virus Planters from Eastern Europe?
- Date: 27 Nov 90 17:22:04 gmt
-
- FEARS OF COMPUTER VIRUS ATTACK FROM EASTERN EUROPE GROW.
- From: The Independent, Sat 24.11.90, By Susan Watts, Science reporter.
-
- The computer industry in Britain is being warned against an influx of
- malicious viruses from eastern Europe.
-
- Governments and companies there use computers less widely than those in the
- West. The range of applications is limited and so programmers have time to
- write these destructive programs.
-
- Bryan Clough, a computer consultant based in Hove, East Sussex, returned
- last week from Bulgaria with 100 viruses unknown in the West.
-
- "People have been writing these as a form of protest against the
- authorities. Some are very good indeed...I am terrified of running them on
- my machine but until I do I will have no idea of what they are capable of",
- he says. Mr Clough predicts a wave of virus attacks on Britain, launched
- mainly through electronic message systems known as Bulletin boards. One
- bulletin board in Birmingham already believes it has been hit by Bulgarian
- viruses. These programs can corrupt or destroy data stored on a
- computer's hard disk. Jim Bates, who dismantles viruses for Scotland
- Yard's Computer Crime Unit,says "I'm having a hell of a job keeping up with
- the viruses coming through already. The problem is that we can only screen
- for viruses that we know about".
-
- He warns the computer industry against rogue software from eastern Europe,
- Bulgaria and Russia are thought to harbour the most virulent viruses. The
- small but legitimate software industry in Bulgaria complains that
- programming is one of the few skills that the industry can exploit. Recent
- concern is killing off even this slim chance of gaining hard currency from
- overseas.
-
- Part of the problem is that the authorities do not believe in copyright or
- patent protection for software. "Programmers are used to ripping off
- software" Mr Clough says, "so that they are expert at hacking into each
- others systems and planting viruses."
-
- He found at least 30 people producing viruses in Bulgaria. Most are known
- to the police who can do little to stop them since the country has no laws
- against computer crime. Even in Britain which introduced legislation
- against hacking this summer, virus writers can be arrested only if they
- enter a computer system without authority or cause damage once inside.
-
- Scotland Yard's anti-virus team can extradite foreign programmers who flout
- this law, if Britain has an extradition treaty with the country concerned.
- One of the most worrying of the virus-writers calls himself the "Dark
- Avenger". He has written a number of malicious programs, and Mr Clough
- believes he intends to plant these in Britain shortly. Virus detectives are
- dismantling one such program called "Nomenklatura", thought to have been
- written by this man.
-
- Security experts in Britain fear programmers in the Soviet Union may soon
- follow Bulgaria's lead. The Soviet Union has no copyright laws, and some
- sections of the software industry are already using viruses as a way to
- punish those who steal programs. One such virus displays the message
- "Lovechild in "Lovechild:in reward for stealing software" on the screen.
-
- Less than two years ago there were only 20 or so virus programs around, now
- there are hundreds. In Bulgaria a new virus appears once a week, Mr Clough
- says.
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.17**
- *********************************************************************
-
-