home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.19 (December 31, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- RESIDENT RAPMASTER: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission.
- It is assumed that non-personal mail to the moderators may be reprinted
- unless otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Telecoms Ripping off BBSs?
- File 4: Michigan Bell vs BBSs
- File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
- File 6: a.k.a. freedom of expression
- File 7: Z-modem Virus Alert
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.19: File 1 of 7: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: December 31, 1990
-
- ++++++++++
- In this file:
- 1. NEW FTP SITE
- 2. RESOURCE CORRECTIONS
- 3. LEN ROSE UPDATE
- ++++++++++
-
- +++++++++++
- New FTP Site
- +++++++++++
-
- A second FTP archive has been set up at the University of Chicago, to help
- distribute the load. It'll be an exact shadow of the
- ftp.cs.widener.edu site. The info you'll need is:
-
- ftp to chsun1.uchicago.edu [128.135.12.60]
- login as anonymous
- send your email address as the password
- the stuff's in pub/cud
-
- The Mail-server is also up and runing. People need to send mail to:
- archive-server@chsun1.uchicago.edu with the word "help" on a line by itself
- in the body of the letter. This will send them the help file for the email
- server. Also, adding the word "index" on a line by itself will send the
- general Index for all files on the email server (includes other things
- besides the CuD archives). Basically, the sections are broken down to the
- various directories contained in ^^/pub/cud on the ftp archives. So if
- someone wanted to get specific index by a section, they would put the
- phrase:
-
- index cud
-
- on a line by itself and get the cud index file. Since there are quite a
- few large files contained in the archives, the arc-master will have to
- personally make special requests to split the files up and make them
- available to whoever asks (the email and ftp servers are linked together to
- save space). This puts more delay for email requesters but it's probably
- the best way to go for the time being.
-
- +++++++++++++++++
- Resource Corrections
- +++++++++++++++++
-
- The cost of TAP has increased a bit. They are now $2 for single issues or
- $10 for ten.
-
- NIA's correct address is: elisem@nuchat.sccsi.com
-
- +++++++++++++
- Len Rose Update
- +++++++++++++
-
- Len Rose's trial in Baltimore remains scheduled for January 28 in the
- Federal District Court before judge J. Frederick Motz. Len's public
- defender has been replaced with Jane Macht, described by those who know her
- as highly competent and responsive. Len faces a five-count indictment
- alleging "crimes" under 18 USC s1030(a)(6), 18 USC s2314, and 18 USC s2,
- which, as written, charge him with interstate transportation of AT&T source
- code and with transfering a "trojan horse login program." The indictment
- also links Len to the Legion of Doom, which it describes in a highly
- prejudicial narrative. Previous issues of CuD have provided in-depth
- details of the case, including a copy of the indictment. A large (1650
- line) file with complete background is available from the CuD ftp sites.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- From: Various
- Subject: From the Mailbag
- Date: December 31, 1990
-
- ********************************************************************
- *** CuD #2.19: File 2 of 7: From the Mailbag ***
- ********************************************************************
-
- From: Wes Morgan <morgan@ENGR.UKY.EDU>
- Subject: security checks from outside (In CuD 2.18)
- Date: Fri, 28 Dec 90 10:12:09 EST
-
- >From: gnu@TOAD.COM
- >Subject: Re: "strangers probing for security flaws" -- another view
- >
- >Suppose there was a free program, available in source code and scrutinized
- >by wizards all over the net, that you could run to test your security. If
- >you had the time, you might run it and fix up the things it found. If you
- >didn't have the time, those things would probably go unfixed.
-
- There are several packages available for UNIX sites. Two that come to
- mind are:
-
- - The suite of programs included in "UNIX System Security", by
- Kochan and Wood (published by Hayden Books). These programs
- will audit your system for such things as world-writable home
- directories, world-writable .profiles, and the like. They will
- also track down any setuid/setgid files outside of regular sys-
- tem directories. I've seen this package on several archive sites,
- but I don't know if it's legal to distribute them. If someone
- can contact Kochan, Wood, or Hayden Books, and check on this, I'll
- gladly get them into the CuD archive.
-
- - COPS, written by Dan Farmer of CERT. This package is EXCELLENT.
- The best feature of COPS is an expert system that pseudo-exploits
- any holes it finds. It uses /etc/passwd and /etc/group to learn
- what the users are capable of. It then looks for a way to assume
- the identity of a particular user. It then checks /etc/group to
- see what it can access as the new uid. The chain continues until
- it either becomes root or runs into a dead end. The output looks
- something like this:
- write /usr2/admin/morgan/.profile become morgan group staff
- write /bin become bin write /etc become root DO ANYTHING
- <This output was caused by my .profile being left world-writable>
- This is a SUPERIOR package for UNIX sites. It's available from
- cert.sei.cmu.edu.
-
-
- Both of these can be run via cron. I've been running them for several
- months now, with excellent results.
-
- >Sites all over the Internet *are* being probed by people who want to do
- >them harm. We know this as a fact. I would prefer if we had some
- >volunteer "cop on the beat"s who would walk by periodically and rattle the
- >door to make sure it's locked.
-
- I have no problems with this at all, *as long as* I know about it in
- advance. With the advent of sophisticated security tools such as those
- probably used by the group in Italy, it is awfully easy to claim "cop
- on the beat" status after being discovered. There was sufficient concern
- about the Italians for CERT to issue a Security Advisory about their
- activities. I'm not trying to make any allegations against the folks
- in Italy; as far as I know, they are exactly what they claim to be. In
- the future, however, I'm going to be EXTREMELY wary of people coming in
- "out of nowhere" claiming to be "remote security checkers". An ounce of
- paranoia, you know........
-
- Wes Morgan
-
- *******************************
-
- From: Thomas Neudecker <tn07+@ANDREW.CMU.EDU>
- Subject: Re: Cu Digest, #2.18
- Date: Fri, 28 Dec 90 22:56:16 -0500 (EST)
-
- In a recent CuDigest it was argued copyright protection of user interface
- code should be eliminated. The author wrote in part:
-
- >While source code should generally be protected, there are times when it
- >may be more profitable to a company to release either the source code or
- >important information pertaining to it. A prime example is IBM and Apple.
- >Apple chose to keep their operating system under close wraps. IBM, in their
- >usual wisdom, chose to let some of it fly. This caused the market to be
- >flooded with "clone" PC's. Given a choice, most people bought PC's or
- >PC-compatibles.
-
- In fact IBM does not own DOS, ask Mr. Gates at Micro Soft he _sells_
- licenses to the clones and sues those who try to steal his code (so does
- AT&T/U*ix) Bye the way the first series IBM-PCs came with PC-DOS and CP/M.
- IBM wanted Gates to write CP/M for the new machine but he said it was
- *owned* by Gary Kildall of Digital Research but he try to write something
- else just as good. IBM covered all of the bases and licensed both.
-
- Regarding Apple; the ][+ I bought came with copyrighted O/S in ROM. And a
- version of BASIC licensed from Micro Soft. (my 1979 version came with a
- complete listing of the code for the ROM). For the LISA and the Macintosh
- Apple licensed concepts from PARC for the GUI. They then licensed parts of
- their developments to Micro Soft for use in Windows.
-
- For more background on these I suggest a good book on the history of the
- personal computer written by Paul Freiberger and Michael Swain. It is
- "Fire in the Valley" ISBN# 0-88134-121-5.
-
- *****************************************
-
- From: netcom!onymouse@APPLE.COM(John Debert)
- Subject: Encryption dangers in Seizures
- Date: Sat, 29 Dec 90 11:20 PST
-
- With all the concern about government seizure of someone's computer
- equipment for the purported intention of looking for some kind of criminal
- activity, encryption is being seriously considered in order to protect
- confidential information from Big Brother's prying eyes.
-
- There are various ways, of course, to encrypt files but one particularly
- comes to mind as being at least as much hazard as protection.
-
- The use of the "one-time" method of encryption has been considered the best
- way to keep information from those not entitled to it but it seems to me a
- two-edged sword, if you will, that can cause harm to whomever uses such a
- method to keep the government out of their business.
-
- The one time method uses a unique random key of equal length to the data to
- be encrypted which is then XOR'ed with the data to produce the encrypted
- result. Without the original key, the plaintext is not recoverable. Or is
- it?
-
- Now, suppose that someone has used this method to encrypt files on his/her
- system and then suppose that Big Brother comes waltzing in with a seizure
- warrant, taking the system along with all the files but does not take the
- code keys with them. Knowing Big Brother, he will really be determined to
- find evidence of a crime and is not necessarily beneath (or above) fudging
- just a bit to get that evidence. What's to keep him from fabricating such
- evidence by creating code keys that produce precisely the results that they
- want-evidence of a crime? Would it not be a relatively simple procedure to
- create false evidence by creating a new key using the encrypted files and a
- plaintext file that says what they want it to? Using that new key, they
- could, in court, decrypt the files and produce the desired result, however
- false it may be. How can one defend oneself against such a thing? By
- producing the original keys? Whom do you think a court would believe in
- such a case?
-
- One should have little trouble seeing the risks posed by encryption.
-
- jd / onymouse@netcom.UUCP netcom!onymouse@apple.com
-
- ********************************
-
- From: Andy Jacobson <IZZYAS1@UCLAMVS.BITNET>
- Subject: Hackers as a software development tool
- Date: Wed, 02 Jan 91 03:49 PST
-
- I received one of those packs of postcards you get with comp. subscription
- magazines (Communications Week) that had an unbelievable claim in one of
- the ads. I quote from the advertisement, but I in no way promote,
- recommend, or endorse this.
-
- "GET DEFENSIVE!
- YOU CAN'S SEE THEM BUT YOU KNOW THEY'RE THERE.
- Hackers pose an invisible but serious threat to your information system.
- Let LeeMah DataCom protect your data with the only data security system
- proven impenetrable by over 10,000 hackers in LeeMah Hacker Challenges I
- and II. For more information on how to secure your dial-up networks send
- this card or call, today!" (Phone number and address deleted.)
-
- So it seems they're claiming that 10,000 hackers (assuming there are that
- many!) have hacked their system and failed. Somehow I doubt it. Maybe they
- got 10,000 attempts by a team of dedicated hackers, (perhaps employees?)
- but has anyone out there heard of the LeeMah Hacker Challenges I and II?
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: "Michael H. Riddle" <riddle@CRCHPUX.UNL.EDU>
- Subject: Telecoms Ripping off BBSs?
- Date: Thu, 27 Dec 90 05:59:11 cst
-
- ********************************************************************
- *** CuD #2.19: File 3 of 7: Telecoms Ripping off BBSs? ***
- ********************************************************************
-
- %Moderators' note: A number of states have already begun charging BBSs with
- business rates. In some states, this may be a nuisance but not prohibitive.
- In Illinois, for example, our own base rate in DeKalb of $24.02 would
- increase to $34 were we to run a BBS. In other states (see following
- file), the charges could be prohibitive if multi-line charges required
- deposits and other fees. A representative from GTE in Indiana indicated
- that they had no formal means of enforcing the charges other than to
- investigate if they received reports of an unregistered BBS operating in
- their jurisdiction. We have heard of no hobbyist in the U.S. paying for a
- business line to run a non-commercial BBS, but the implications, if the
- practice is allowed to spread unchecked, are serious. Enforced charges
- could be the end of the local or regional Bulletin Board as they currently
- exist.
-
- The issue, according to the Indiana spokesperson, is alleged to be one of
- fairness and equity in billing. Why, they, ask, should someone whose phone
- is in constant use pay the same as somebody who uses their phone only a
- fraction of the time? Our response is that there is little, if any, added
- expense to telecom operations whether a phone is used for 20 minutes or 20
- hours during a given day. Further, the user is already paying an added
- charge simply for the receipt of calls. If one adds in toll charges for the
- hundreds of thousands of those who call long distance, BBSs generate
- considerable revenue for telecom companies. Classifying BBSs as business
- lines and increasing the charges strikes us as unabashed greed. Why not
- *REDUCE* the rates for BBS lines, which only receive calls and generate
- considerable revenue in long distance charges?
-
- This is not a trivial concern. Telephone rates, like all utilities, tend to
- rise. The policies identified in the following two files should motivate
- all of us to become involved by
- 1) Writing letters to local telecom companies
- 2) Writing to elected officials
- 3) Introducing these campaigns in local and regional elections
- 4) Writing to state utililty commissions
- 5) Attending and participating in hearings
-
- ************************************************
-
-
- --- original post on alt.cosuard as reposted on comp.dcom.telecom---
-
- The following cross-posted information is extracted from alt.cosuard.
- Can anyone in Indiana or a closely neighboring state provide any
- details on this?
-
- >From: BILL BLOMGREN - Sysop: St. Pete Programmers Exchange RIME: PETEX
-
- Well ... thought I would pass this tidbit of bad news along ... GTE
- Indiana prevailed against the BBS systems there ... ALL BBS's in GTE's
- area there are now at BUSINESS RATES. Which means $50 per month base
- rates, plus MUCH higher long distance charges.
-
- Indiana Bell ... has filed the same tariff with the PUC (Public
- Utilities Commission) there, making it state wide.
-
- Needless to say, GTE has a history of going after the little guy, so
- you can expect it here in the REAL near future! I expect it nation-
- wide in the near future. In Indiana, they decided that THE PHONE
- COMPANY can decide that your residence is a business, and charge high
- rates to all service incoming.
-
- Unfortunately, the courts agreed with them.
-
- Ain't Monopolies Nice???
-
- -----
-
- Not a nice situation huh? We didn't need a precedent to be set like
- this ... now this paves the way for other companies to follow suit.
- It'll be interesting to watch the nodelist to see if the nets in
- Indiana (201 in Lafayette, 227 in South Bend, 230 in the Gary Area,
- 231 in Indy, 236 in Ft. Wayne/NE IN and 2230 in Terre Haute and 11/15
- in Evansville) start shrinking.
-
-
- Paul
-
- UUCP: crash!pro-lep!shiva
- ARPA: crash!pro-lep!shiva@nosc.mil
- INET: shiva@pro-lep.cts.com
-
- --- End of Cross Posting ---
-
- <<<< insert standard disclaimer here >>>>
- riddle@hoss.unl.edu | University of Nebraska
- postmaster%inns@iugate.unomaha.edu | College of Law
- mike.riddle@f27.n285.z1.fidonet.org | Lincoln, Nebraska, USA
-
-
- ---- my own responses to comments in the Omaha Sysops echo ----
-
-
- In a message to M. RIDDLE, JACK WINSLADE writes as of 25-DEC-90 14:30:26
-
- >Since you are the closest to being a real lawyer of any of us, and since
- >you were the one who 'broke' the story to Tel_Dig, would you be willing to
- >give an educated opinion on specifically what, when, and how much the
- >Indiana decision will affect us here in Omaha.
-
- See the previous response to Joan for what news there is.
-
- >I'm sure that this will result in Yet Another round of 'The Sky Is
- >Falling' <tm> messages in every sysops' conference just as soon as it hits
- >Arfnews, etc. and enters the distortion-prone person-to-person-to-person
- >chain of communication.
-
- The only thing faster than the speed of light is the manner is which
- disinformation about BBS law propagates across the net.
-
- >Is this decision effective immediately, or will a higher court (or
- >something else) intervene ?? How might this affect the situation in
- >Nebraska (where Clink is about to buy the farm) and in the other states
- >such as Texas ??
-
- Since the limited information we have suggests this is a PUC decision, it is
- still appealable to the courts. If appealed, it will probably not go into
- effect until final judgment. It's direct effect would only be in Indiana.
-
- The Nebraska PUC might not care a great deal what Indiana did, or it might
- give them some value as "persuasive precedent." The arguments GTE used
- might have some value. They might not. It all depends on how the
- Indiana statutes are worded. My guess is the fight is over "what is a
- business for the purpose of telephone rates?", which will in turn include
- "why do businesses pay higher rates than residences?"
-
- The answer to the second is generally "because they use the phone more."
- The answer to the first has usually been "some kind of organization that
- either makes a profit or has formal nonprofit status."
-
- We all know that successful BBSes use telephone resources more than a
- residence, perhaps more than many businesses. That supports GTEs position.
- The fact that they are hobby operations is what complicates the picture,
- and the PUC reaction is difficult to predict.
-
- >Comments, suggestions ??
-
- Keep calm and wait for a better report on what happened.
-
- >Good (??) Day! JSW
-
- G'Day back to you, mate! MHR
-
- --- end of quoted messages ---
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Ed Hopper <ehopper@ehpcb.wlk.com>
- Subject: Michigan Bell vs BBSs
- Date: Mon, 31 Dec 90 23:49:03 CST
- Organization: Ed Hopper's BBS - Houston, Texas 713-997-7575
-
- ********************************************************************
- *** CuD #2.19: File 4 of 7: Michigan Bell vs. BBSs ***
- ********************************************************************
-
- From: TELECOM Digest Tue, 1 Jan 91 03:46:40 CST Volume 11 : Issue 1
-
- (Note: I am sending this on behalf of Bruce Wilson.)
-
- From the FACTS BBS in Flint, Michigan, by way of the Vehicle City BBS in
- Davison, Michigan:
-
- On January 15, 1991, an administrative hearing will be held before the
- Michigan Public Service Commission to discuss a complaint filed against
- Michigan Bell Telephone Company.
-
- Early this year, a private bulletin board in Grosse Point, called the
- Variety and Spice BBS, was ordered to pay an increased charge for phone
- service because it was discovered he was accepting donations for use of his
- BBS.
-
- This BBS ran on an IBM, and supports sixteen separate lines. Although a
- portion of the BBS was open to the public, most of the BBS (including an
- "adult file" area, were restricted to those who sent a donation to the BBS.
- The money collected didn't even come close to the actual cost of running
- such a BBS.
-
- Michigan Bell claims that placing any condition on the use of a BBS
- constitutes a business, and that the sysop must pay a business rate for his
- phone line, plus pay a $100 deposit for EACH LINE in use. This means the
- Variety and Spice sysop would have to pay a $1600 deposit, plus about $50
- additional each month if he wanted to continue his BBS.
-
- The sysop refused to pay this fee, so Michigan Bell disconnect his lines.
- The sysop filed a complaint with the MPSC. Until this case was heard, he
- decided to re-install the phone lines (at a considerable cost to himself).
-
- If Michigan Bell wins this case, they will require every BBS sysop to pay
- business rates for each of their lines, if it is determined that the BBS is
- accepting fees or donations. The Variety and Spice sysop claims that MBT
- considers requiring users to upload files or post messages (ie
- upload/download ratios) the same as a donation, and will require the sysop
- to upgrade his line to a business line whether money was exchanged or not.
- However, in an interview I did in March, I talked to the chief spokesman of
- MBT, who claimed that this was not the case. Only if money is accepted
- will MBT demand the sysop pay business rate.
-
- The important thing here is that AT THIS TIME, these are the rules that MBT
- believes is in the tariff. If Variety and Spice loses this case, it is
- conceivable that MBT can request further restrictions to be placed.
-
- At this hearing, the public will be allowed to voice their opinions and
- comments. This applies to both sysops and users. If MBT wins this case it
- can cause serious restrictions to be place on BBS's, and will set a
- precedence for other phone companies around the country to follow.
-
- Your help is urgently needed!! Please try to attend this hearing. It will
- be held at the Public Service Building, 6545 Merchant Way, Lansing,
- Michigan. The date is January 15. I do not have the exact time but I
- assume this hearing will last most of the day. You do not have to testify,
- but it would really be helpful if you can attend as a show of support. The
- MPSC does not think the Michigan public even cares about BBS's. But we can
- certainly jar their thinking if we can pack the room with sysops and users!
-
- For more information, please contact Jerry Cross at 313-736-4544 (voice) or
- 313-736-3920 (bbs). You can also contact the sysop of the Variety & Spice
- BBS at 313-885-8377.
-
- Please! We need your support.
-
- Notes from Ed Hopper:
-
- In our case against Southwestern Bell, the same cockeyed logic was applied.
- For a brief period, Southwestern Bell also maintained that the requirement
- of file uploads was, in and of itself, cause for them to declare a BBS to
- be a business because it required something "of value" for access. We were
- able to force Southwestern Bell to see things in a more moderate tone.
-
- Recently, I had the opportunity to testify before the Texas PUC regarding
- the Texas BBS case. In that testimony, I stated that the telcos draw all
- sorts of extreme scenarios in which the provision of residential service to
- BBS systems is against the public good. Their argument goes: "If we allow
- them to have residential service, it will upset the equations and raise the
- cost of telecommunications services to everyone." However, there is not a
- BBS on every block, or even one in every subdivision, and no rational
- observer would ever expect that to be the case. There is, however, cause
- for most rational observers to believe that the increased cost of business
- service, including it's increased burden in the area of deposits and
- installation charges, could cause the closing of many BBS outlets. This,
- truly, would not be in the public good.
-
- Ed Hopper
-
- President
- The Coalition of Sysops and Users Against Rate Discrimination
-
- BBS: 713-997-7575 ehopper@attmail.com ehopper@ehpcb.wlk.com
-
- ****************************
-
- [%Telecom Digest% Moderator's Note: The problem of course is that the
- telephone company only has two basic rates: a rate for residence/personal
- communications and a rate for all else, which they term 'business phones'.
- Where Ed's counter-argument fails is that while there are not BBS's on
- every block, neither are there churches and charities on every block -- yet
- they pay full business rates, as do social service hotline, information and
- referral services. Are BBS information providers to be treated differently
- than dial-a-prayer lines which run on business phones, or the proverbial
- "Battered Women's Shelter outgoing phone line where the calls can't be
- traced" which also pays business rates?
-
- Here are some questions you may wish to give response to: Should there be a
- third rate category made available, covering charitable and religious
- organizations? Should this third rate category be available to all
- not-for-profit phone services such as BBS lines and social service referral
- numbers or hotlines? If BBS operators who charge money got such a rate,
- should Compuserve or GEnie also be allowed to use the same rate? Should
- telco be the one to audit the revenues and decide which computer sites
- should be treated as 'business' and which should be 'charitable
- organization'? Is it the fault of telco if the BBS operator does not
- charge enough money to make a profit? Where is the line to be drawn?
- Answers? PAT]
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: well!jwarren@APPLE.COM(Jim Warren)
- Subject: Clarification of Gail Thackeray's Comment on Modem Licensing
- Date: Sun, 30 Dec 90 12:59:54 pst
-
- ********************************************************************
- *** CuD #2.19: File 5 of 7: Gail Thackeray Clarification ***
- ********************************************************************
-
- GAIL THACKERAY RE LICENSING MODEMS & RESTRICTING MODEM USE
- On 12/21, as a postscript on e-mail to Gail Thackeray, I asked:
- +++++++++++++++++++++++++
- Been meanin' to check this *rumor* for months (I rarely trust what I
- haven't checked, personally): Have you said that modems should be licensed
- and their use restricted? (It's been widely quoted/paraphrased and is a
- common [mis?]perception of your views.) If you ever said it, do you now
- hold that view?
- I'm not challenging it; just tryin' to verify or refute a provocative
- rumor.
- +++++++++++++++++++++++++
- To which, Gail responded:
- +++++++++++++++++++++++++
- Date: Sat, 22 Dec 90 10:04:05 pst
- From: gailt (Gail Thackeray)
- To: jwarren
- No, I never said so -- when talking about the lack of parental
- supervision of computer use for beginning youngsters, I have pointed
- out that in other instances involving driving, guns, etc. we
- recognize that kids don't have good judgment and we insist on training,
- supervision, licensing, etc. to minimize the risk to the rest of
- society. I have specifically said that I DON'T want to see licensing
- of modems, or FCC regulation, etc. -- but that if we look at historic
- parallels involving new technology (driving, airplanes, etc.) when
- society grows annoyed/concerned enough with abuses, damage, risk to
- others, "entry requirements" such as licensing have been imposed.
- I have recommended that to avoid such a trend in electronic technology,
- we should put a lot of effort into developing "rules of the road"
- that we all agree on and abide by & teach youngsters -- or the back-
- lash may cause formal regulation (just think about the regulations
- controlling ham radio, etc. -- and the potential for similar rules
- is quite real, computer-wise.)
- Regulation usually comes about as a reaction to complaints of
- enough people to attract the interest of legislators. We are
- rapidly approaching that "critical mass" stage with computer
- communications, and if we don't want to see licensing of BBS's, we
- need to do whatever will curb the abuses (interference with other
- people's rights). I have recommended that parents check into what
- their kids are doing with their modems, set rules, ans if need be,
- "ground" their kids just as they do for other kinds of rules-
- violations, like being reckless with the family car....
- --------------------------------------------
- This prompted my 12/24 comments and request:
- --------------------------------------------
- & mail gailt
- Subject: licensing etc.
- Gail,
- This is important:
- If you have not yet posted exactly those comments, in detail, regarding
- licensing and regulation of modem users, I *urge* you to post them
- immediately and completely to the eff Conference, and explicitly add a note
- encouraging their widespread duplication (without editing, of course)
- across the nets.
- You are more than welcome to preface it with a comment that I urged you to
- post the comments (if that has any value :-).
- I absolutely agree with your observations and think we have *much* to fear
- from overzealous legislators/regulators responding to the miniscule
- minority who are abusive of our tremendously productive cooperative anarchy.
- ...
- ------------------
- I also urged her to send it to jthomas for the Computer Underground Digest
- and emmanuel for 2600, and sent mail to both of them urging them to publish
- it, if Gail sent it, saying, in part:
- ------------------
- Her explanation of what she had and had not said related to such matters
- was both reasonable and **illustrated a very real threat** (from legislators
- and regulators; *not* from Gail T) against all of us. Her comments were
- very realistic; her prognosis highly likely, if we cannot exercise adequate
- discipline within our ranks.
- I have urged her to post her comments on the WELL, and forward them to
- Cud and 2600 for publication (and release them for general posting around
- the nets).
- ---------------------------------------------------------------
- I hope you will help do so, because we now have her permission:
- ---------------------------------------------------------------
- From gailt Mon Dec 24 19:51:53 1990
- Date: Mon, 24 Dec 90 19:51:51 pst
- From: gailt (Gail Thackeray)
- To: jwarren
- Subject: Re: licensing etc.
- Willing, but ignorant: so how do I DO that? I thought whatever
- was sent in E-mail went into the cosmic winds.... is there a way I
- can retrieve what I sent you, & post it? Can you retireve & upload
- it? I'm (definitely) still stumblin' around here, and help would be
- great/grate/fully accepted....
- &
- Date: Mon, 24 Dec 90 19:55:02 pst
- From: gailt (Gail Thackeray)
- To: emmanuel, jthomas, jwarren
- Subject: Re: Thacvkeray and licensing
- By the by -- feel free to use it -- I just don't know (after scanning%
- the manual -- how to retrieve what I sent Jim, and publish it out of
- e-mail. ...
- **************
- For those who don't know of Ms. Thackeray, she is an Assistant State
- Attorney General for the State of Arizona, active in pursuing computer
- crime, and controversial for some of her public statements and/or
- statements that.some press *allege* she said. In some cases, she may have
- been as misleadingly quoted-out-of-context -- or flat-out abusively
- misquoted -- as has been the case with some reports about Mitch Kapor, John
- Perry Barlow and the Electronic Frontier Foundation.
- --Jim Warren [permission herewith granted to circulate this-in-full]
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: balkan!dogface!bei@CS.UTEXAS.EDU(Bob Izenberg)
- Subject: a.k.a. freedom of expression
- Date: Tue, 18 Dec 90 08:21:26 CST
-
- ********************************************************************
- *** CuD #2.19: File 6 of 7: a.k.a. Freedom of Expression ***
- ********************************************************************
-
- I read this in issue 2.16 of the Computer Underground Digest:
-
- [ quoted text follows ]
-
- IN THE UNITED STATES DISTRICT COURT
-
- FOR THE NORTHERN DISTRICT OF GEORGIA
-
- ATLANTA DIVISION
-
- UNITED STATES OF AMERICA :
- : CRIMINAL ACTION
- v. :
- : NO. 1:90-CR-31
- :
- ADAM E. GRANT, a/k/a The :
- Urvile, and a/k/a Necron 99, :
- FRANKLIN E. DARDEN, JR., a/k/a :
- The Leftist, and :
- ROBERT J. RIGGS, a/k/a :
- The Prophet :
-
- GOVERNMENT'S SENTENCING MEMORANDUM AND S.G. SS 5K1.1 MOTION
- [ quoted text ends ]
-
- The assumption here, that an alias employed in computer communications is
- the same as an alias used to avoid identification or prosecution, doesn't
- reflect an awareness of the context within which such communications
- exist. The very nature of some computer operating systems demands some
- form of alias from their users. Management policy also affects how you
- can identify yourself to a computer, and to anyone who interacts with you
- through that computer. Look at some of the monikers that were assigned
- to me to allow me to use various computer systems:
-
- Izenberg_Bob (pretty straightforward)
- bei
- 76615,1413
- BIZENBERG
- 3935gbt
- root ;-)
-
- Some of those account names identify me personally with me the computer
- user easily, some not at all. Is it accurate to say that I'm Bob Izenberg,
- a.k.a. one of the above account names? Sure, between you and me, outside
- of a court of law. In the context of that court of law, that a.k.a. is an
- accusation in itself. If we strip the implication from those three letters
- that the party of the leftmost part is calling themselves the party of the
- rightmost part to avoid getting nabbed with the goods, what's left? I am
- known by another name when I use a computer? Where's the surprise in that?
- Maybe I'm Bob the person a.k.a. Bob the user ID. For another slant on
- this, let's borrow from my days covering town meetings. I might also be
- Bob, trading as Bob the user ID, as in: Bob Izenberg, t/a Bob's Bar and
- Grill. There's no criminal intent there, not in the kinda bar I run.
-
- In using a computer communications medium, particularly an informal one
- like a BBS, the name you choose can set the tone for the aspect of your
- personality that you're going to present (or exaggerate.) Are radio
- announcers using their "air names" to avoid the law? How about people with
- CB handles? Movie actors and crew members? Fashion designers? Society
- contains enough instances of people who, for creative reasons, choose
- another name by which they're known to the public. I certainly hope that
- somebody mentions that Len Rose calling himself Terminus (which springs
- from his correct perception of himself as somebody who kept the wheels of
- comunication between legitimate users of AT&T's products moving, or from
- the Foundation series by author Isaac Asimov) is fair use of a pseudonym,
- well in line with community standards set by his peers. Whenever somebody
- uses a.k.a., correct them!
-
- Bob Izenberg (512) 346 7019 [ ] cs.utexas.edu!%kvue,balkan%!dogface!bei
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Bob Mahoney (Sysop, PC-Exec)
- Subject: Z-modem Virus Alert
- Date: December 5, 1990
-
- ********************************************************************
- *** CuD #2.19: File 7 of 7: Z-Modem Virus Alert ***
- ********************************************************************
-
- %The following was downloaded from Bob Mahoney's BBS%
-
- * * * * * W A R N I N G ! ! ! * * * * *
-
- On December 3rd, 1990 a group called RABID National Development Corp.
- released hacked version of Chuck Foresburg's DSZ Z-Modem Protocol dated
- 12-03-90. This is really the 11-19-90 version with the dates edited and a
- virus added to the program. *** THIS VIRUS IS DESTRUCTIVE!!! ***
-
- I obtained the virused version early this week and worked quickly to
- provide this program to you. The information I provide here may not be all
- there is t know about the virus, but it is sufficient to determine that the
- virus is not what you want to have.
-
- RABID Virus Information
-
- Preliminary testing has revealed these facts about the virus:
-
- * The virus is not memory resident.
-
- * The virus infects .COM files only, including COMMAND.COM.
- (There was one report that it infected and .EXE file and
- several text files but this could not be confirmed or
- duplicated.)
-
- * Infected files increase in size by 5,302 bytes.
-
- * The virus infects other .COM files at execution time.
-
- * The virus will activate on 12-25-90 (Christmas) or any date
- thereafter.
-
- * When activated the boot sector, FATs and root directory will
- be overwritten with garbage. Recovery is impossible unless
- you use a program such as PcTools Mirror to make backup copies
- of the system areas.
-
-
- As far as programming goes the virus is poorly written, but it does
- accomplish what it was designed to do. The actual virus code is about
- 1,300 bytes with a 4,000 byte ansi screen that is supposed to be displayed
- upon activation. I sa "supposed to" because on every test I performed the
- screen displayed as a bunc of video garbage. This occurs when loading the
- screen data starting at the wrong location.
-
- The virus has been passed along to John McAfee and he will have a fix in
- his next release. However, this release is not due until February and that
- is too late for those infected already. The information has also been
- passed along t Chuck Foresburg and he is aware of the situation.
-
- VirusFix Instructions
-
- The operation of VirusFix is simple.
-
- To scan entire disk(s), just specify the disk(s) you wish to scan.
- Examples:
- VIRUSFIX C:
- VIRUSFIX C: D:
- VIRUSFIX A:
-
- To scan a single directory, specify the directory to scan.
- Examples:
-
- VirusFix will notify you if the RABID virus is found and ask if you wish to remove the virus. Every file that I infected and removed
- the virus from has worked properly so VirusFix should work with most files. If you remove a viru from a file and it doesn't work,
- delete the file and replace it with and uninfected copy. If you suspect a file other that .COM files is infected, use text search
- program and search for the string "RABID" in the suspect file.
-
- If you have questions or comments about VirusFix or need help with removing a virus from a file I can be reached through the following
- sources:
-
- CompuServe - User ID: 76645,3446
- Home Phone - (313) 937-xxxx
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.19**
- -> END OF VOLUME 2 -- VOLUME 3 BEGINS NEXT ISSUE <-
- ********************************************************************
-
-