home *** CD-ROM | disk | FTP | other *** search
-
- Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25)
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- Today's Contents:
- Moderators' Corner
- Spaf's Response to Bill Vajk
- Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach)
- LOD Members for Comsec Computer Security (News Reprint)
- Alcor Email (ECPA) Case Settled (Keith Henson)
- NIST announces public-key digital signature standard (gnu)
- Secret Service Pays Hacker Call (Reprint from Newsbytes)
-
- Administratia:
-
- ARCHIVISTS: ROB KRAUSE, BOB KUSUMOTO, AND BRENDAN KEHOE
-
- CuD is available via electronic mail at no cost. Printed copies are
- available by subscription. Single copies are available for the costs
- of reproduction and mailing.
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, by FidoNet file request from 1:100/345,
- on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp
- from ftp.cs.widener.edu, chsun1.uchicago.edu, and
- dagon.acc.stolaf.edu. To use the U. of Chicago email server, send
- mail with the subject "help" (without the quotes) to
- archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: July 13, 1991
- From: From the Moderators
- Subject: Moderators' Corner
-
- We're experimenting with a new format to conform with RFC-1153 that we
- hope will allow CuD to explode in most mailers. Thanks to John
- Stanley for his suggestions, and especially to an anonymous Texas
- sysop (whose initials are BI and can be reached at
- bei@dogface.austin.tx.us) for the patience to lead us by the hand in
- explaining the procedure. Please let us know if it works (or if it
- doesn't). If we can get it working properly, we will maintain both the
- original format for files and the new one for mailers. So pass back
- your suggestions and criticisms.
-
- ------------------------------
-
- Date: Tue, 09 Jul 91 15:05:10 EST
- From: Gene Spafford <spaf@CS.PURDUE.EDU>
- Subject: Response to Bill Vajk
-
- In an earlier digest, Bill Vajk responded to one of my messages with
- lengthy commentary.
-
- I agree with some of his points, disagree with others, and have no
- opinion about most. Most deserve and/or need no comment. However,
- there were a few of his statements (and his overall attitude) I feel I
- should respond to somewhat; I won't dignify the obvious personal
- insults with commentary, however.
-
- He says: "I am concerned that Spafford's comments can be read to be
- forgiving and conciliatory in nature where it regards errors made by
- professional law enforcement." He then goes on to criticize the case
- in California described in CUD 3.15. That juxtaposition was unfair,
- and implied that I was in some way trying to excuse the actions of
- Office Nemeth & company -- and that is most definitely not the case.
- From what I have heard of that incident, the law enforcement personnel
- acted like idiots.
-
- As to being conciliatory and forgiving, I do not believe law
- enforcement personnel are basically evil or out to deprive us of our
- rights; I believe most law enforcement personnel are poorly educated
- in the area and overworked. I wish to improve that understanding, not
- seek to portray law enforcement personnel as "the enemy." I don't
- approve of or agree with some of their actions, but neither do I feel
- it inappropriate to try to see things from their point of view.
-
-
- Later, he says:
- >Yes, Gene. In article 5462@accuvax.nwu.edu you misspoke [sic] and assisted
- >in proliferation of such incorrect reports :
- >
- > "The information I have available from various sources
- > indicates that the investigation is continuing, others
- > are likely to be charged, and there MAY be some national
- > security aspects to parts of the discussion that have
- > yet to be disclosed."
- >
- >Need I voice the obvious and ask how any "responsible" individual should
- >handle errors they have made? Need I voice the obvious and ask a simple
- >question. What has Gene Spafford done to correct errors he has made? Has
- >his behavior in these matters met the criteria for responsibility he demands
- >from others?
-
- Mr. Vajk (and others) appears to misunderstand my usage of words. My
- comment was not a misstatement. I very carefully qualified it to
- indicate that it was based on information available to me, and that it
- was an indication, not a certainty. The investigation did continue.
- At the time, it seemed likely to my sources that others would be
- charged. And my use of the word MAY was to indicate that it was far
- from certain.
-
- I don't view this statement on this issue as erroneous, nor do I
- believe I have anything to apologize for when making it. Had I said
- "The investigation shows these guys to be traitors and part of a
- larger group that will all be arrested and charged." -- that would be
- an incorrect statement and something I would need to retract.
- However, I didn't make that statement. I also "demand(s)" nothing of
- others. I admit errors when I make them.
-
- Mr. Vajk then says a great deal about my statement that we should not
- believe that everyone charged with computer offenses is innocent. He
- points out (correctly) that *in US law* people are innocent until
- proven guilty. HOWEVER, that does not make them innocent of having
- committed an act. If Joe Random were to shoot someone in front of a
- crowd of witnesses, he would be innocent under the law until a jury
- returned a verdict in a trial, but he would NOT be innocent of the
- act. Would any witness to the crime, or anyone who spoke to a
- witness, then be equally condemned by Mr. Vajk for saying "Joe was not
- innocent of murder" before the conclusion of a trial?
-
- My point remains that claiming innocence (in the non-law sense) for
- all individuals accused of computer-related crimes is obviously
- incorrect and counter-productive. It may be technically correct to
- point out that a court has not convicted them yet, but that does not
- mean we should trumpet their innocence. Furthermore, implying that
- law enforcement personnel are all pursuing power-trips and vendettas
- against computer users is paranoid. The law is important, and I
- respect it, but I do not need a jury to verify that the sun rose this
- morning. Most people are able to distinguish between convicted and
- guily; when too many people believe that the guilty are not being
- convicted, repressive measures may get instituted. If we intend to
- fight for appropriate application of the laws to computing, we need to
- keep this distinction in mind.
-
- Following more insulting comments, Mr. Vajk then makes some mistaken
- comments on copyright and trade secret (proprietary) rights. Some of
- these errors have been addressed already in a previous CUD: copyright
- and trade secret rights may both be expressed on a document.
-
- One thing that was not mentioned in the previous comments on copyright
- is that there is, indeed, a Federal statute governing copyright
- infringement. 2319 USC 18 provides for criminal penalties when a
- copyright is infringed. The copyright must be formally registered and
- deposited with the Superintendent of Documents for this to take
- effect, however, and the infringement must be willful. I have heard
- directly from Federal attorneys that this law can be used (and has
- been used) against people copying source code or documentation (or
- chip masks) they do not own. Copyright is not always strictly a civil
- issue.
-
- Mr. Vajk then makes extensive comments on how he thinks copyright
- should work, how source code should be valued, and how Federal law
- should be applied in cases of interstate traffic in copyrighted
- material. This may or may not be of some interest to some readers,
- but it does nothing to change the fact that Len Rose was charged with,
- and plead guilty to, an offense based on his trafficking in
- proprietary source code. His attacks on my statement (and me, to some
- extent) to that effect are directed at the wrong parties: he seems to
- disagree with the way the law is written and/or applied, and that is
- not my fault.
-
- He is certainly correct, however, in his observation that the laws are
- not adequate for our current technology: this is historically the case
- with a great deal of technology, and certainly not restricted to
- telecommunications and computing. I have never disputed this point,
- and have often propounded it.
-
- Mr. Vajk continues by criticizing me for (in so many words) "making
- statements without knowing the full background." Interestingly
- enough, he does this by assuming he knows what documentation and
- information I have accessed, and by assuming that he knows the one,
- full truth of the matter of Len Rose's actions and trial.
- Furthermore, he then goes on to imply things about AT&T, Tim Foley,
- the Illinois (?) prosecutor in the case, and potential witnesses to
- the case based on circumstantial evidence. Am I the only one who
- finds such hypocrisy curious?
-
- In the end, there is a fundamental difference of opinion between our
- views and our approaches. Mr. Vajk chose to personally insult me with
- remarks in his commentary rather than address that difference. For
- instance, he states: "There has been movement by all branches at the
- federal level of law enforcement to assume guilt before investigation
- and to trample rights freely utilizing the immunity originally granted
- in order to protect officers making honest mistakes as a standard
- operating procedure instead of an exceptional circumstance." I
- believe there have been some misguided and ill-informed investigations
- and prosecutions; I do not believe it an organized movement as does
- (presumably) Mr. Vajk.
-
- I still believe that the common person is not going to find the story
- of Robert Morris or Len Rose to be particularly indicative of threats
- to their freedoms. Certainly some of the things done to Len were
- inappropriate (the search, for instance). However, the over-broad
- search does not negate his guilty plea to a criminal act. Although we
- wish to guarantee the same Constitutional rights to everyone, we
- should be somewhat cautious about the examples we pick to hold as
- standards, and I do not believe Len is a particular good standard for
- us to raise.
-
- I also believe that rude behavior and insults directed towards people
- with different opinions than one's own is counterproductive to having
- one's own views respected and listened to with attentiveness. Appeals
- to reason are more likely to sway people to one's views. That was the
- central thesis of my original comments, and still is.
-
- For us to secure a reasonable set of rights for all computer users, we
- must realize that the issue is complex and has many different
- perspectives, the legal community is not well-equipped to deal with
- the issues based on prior experience, and that not everyone on the
- electronic frontier is heroic in stature. Most of us are still
- learning as the situation changes. (My views on many things have
- changed in the last few years, thankfully, and continues to evolve as
- I learn more; we shouldn't criticize someone for developing new
- attitudes with experience.).
-
- Sometimes we will make mistakes as we go along, but some mistakes we
- can avoid if we think about them first. One common mistake in such
- highly-charged issues is attributing to malice what may be caused by
- ignorance. Another is being abusive to others for having a different
- set of views; one cannot champion the legal right to free speech
- without also embracing the responsibility to respect others who choose
- to exercise that right -- disagreement with views should not become
- contempt for the people who (appear to) espouse them.
-
- ------------------------------
-
- Date: Fri, 5 Jul 91 13:10 GMT
- From: "Thomas J. Klotzbach" <0003751365@MCIMAIL.COM>
- Subject: Comments to Bill Vajk's posting in CuD #3.22
-
- I am posting to the CuD to address factual and other errors that Bill
- Vajk made in his original posting to CuD #3.22. I had hoped to avoid
- this course of action, but feel it necessary due to the puzzling
- actions of Mr Vajk.
-
- I originally replied directly to Mr. Vajk with my concerns about his
- posting. He replied back to send him specific information or "retire
- from the conversation". I sent back the information he requested and
- Mr. Vajk never responded. I also sent two follow-up letters with
- again, no response. I came to the conclusion that Mr. Vajk was going
- to make no attempt in the foreseeable future to address the errors in
- his original posting to the CuD, so now I present them to the
- readership. My attempt is not to "bash" Mr. Vajk, but to hopefully
- correct some of the disinformation that Mr. Vajk has posted to the
- CuD.
-
- Bill writes:
-
- >If this is the case, then possession is not illegal, because
- >the text is protected by commercial exploitation by the
- copyright >laws and Len should have not been charged with
- criminal. Copyright is a >matter for civil suit...
-
- This is misleading, as it implies that copyright infringement may
- not be remedied in criminal court. There are also provisions for
- criminal proceedings if a person willfully infringes a copyright for
- among other things, private financial gain (17 USC 506 et seq.; 18 USC
- 2319). This half-truth (copyright law only allows remedy in civil
- court) seems to be circulating about the net with great frequency. A
- knowledgeable netter wrote to me and stated that the reason that the
- government does not pursue more cases with the aforementioned statute
- is that the criminal penalties are not as large as the interstate
- transportation of stolen property and wire fraud statutes provide for
- violators.
-
- Bill goes on:
-
- >...It seems that AT&T source code (according to one of the Foley
- >affidavits) bears legends which claim both proprietary rights and a
- >copyright. You stipulate proprietary. The dual labeling of the
- >original software should do a lot to remove it from consideration as
- >truly proprietary information. The laws regarding copyrights require
- >that all copyright material is subject to deposit at the Library of
- >Congress, where any citizen has a right to read and review.
-
- The ownership of copyright is distinct from the ownership of
- the object in which the work is embodied (17 USC 101 et seq.; 17 USC
- 202). You imply that the dual labeling of the source code suggests
- that the work is not truly proprietary information, by stating that
- "the dual labeling of the original software should do a lot to remove
- it from consideration as truly proprietary information". Rubbish.
- AT&T is within their rights to do what they did. The notice of
- copyright MAY be placed on publicly distributed copies of a work (17
- USC 401). Labeling a work as copyrighted does not imply a forfeiture
- of any proprietary rights (17 USC 202 et seq.; 17 USC 401, also please
- see Douglas v. Taylor, Tex.Civ.App. 497 S.W. 2d 308, 310 and Green v.
- Lewis, 221 Va. 547, 272 S.E. 2d 181, 185). In effect, proprietary
- declares that you are the owner of the work. You may also copyright
- the work as well. And what does the bit about "copyright material is
- subject to deposit and any citizen has the right to review" about?
- Are you implying that somehow Len Rose was within his rights to copy
- the source code in an attempt to review it? If you are, you are
- incorrect. Copyright law is fairly specific on the limitation of
- exclusive rights as they pertain to computer programs (it is the
- section that software makers refer to when they allow the owner of a
- copy of software to make backup copies - 17 USC 117).
-
- Bill also writes:
-
- >Twice now, regarding the resultants of the E-911 case you've been long
- >on assumptions, short on proof. Twice now, regarding the resultants of
- >the E-911 case you've been long on promises, short on results. Given
- >this history, I ask, would a "responsible" man now seek truth and
- >publish it, or retire from this discussion.
-
- But Bill then states:
-
- >Thus far, it seems most computer laws have been written at the behest
- >of special interests instead of the public interest. The laws already
- >inflict restrictions contrary to generally understood and accepted
- >constitutional provisions.
-
- Well, Bill, would you please provide some "proof" for the
- readership on the aforementioned statement? YOU imply much while
- proving little.
-
- There are other errors in Mr Vajk's article to the CuD and I am
- still in the process of researching them. Again, I am not attempting
- to split hairs, but Mr. Vajk has a responsibility to not put "spin" on
- what the laws/statues/etc mean, a spin that distorts the facts at hand
- and does a disservice to you and I, the readers of the CuD.
-
- In closing:
-
- Bill Vajk writes:
-
- >...What has Gene Spafford done to correct errors he has made? Has his
- >behavior in these matters met the criteria for responsibility he demands
- >from others?
-
- I ask the same question of Bill Vajk. What has he done to correct
- the errors he has made in his posting to the CuD #3.22?
-
- ------------------------------
-
- Date: Fri, 5 Jul 1991 13:52 CDT
- From: "ROBERT G. HEARN" <9999AH02@UHDBIT.BITNET>
- Subject: LOD Members for Comsec COmputer Security (News Reprint)
-
- Reprint from Sunday, June 23, 1991 Houston Chronicle (1A, 15A)
- By Joe Abernathy
-
- FORMER HACKERS OFFER SERVICES IN COMPUTER SECURITY
-
- The most notorious force of computer hacking's heyday is asking
- forgiveness and joining the forces of good.
-
- The storied Legion of Doom, nemesis to the Secret Service, is forming
- a computer security consulting firm in Houston.
-
- Drawing members from around the nation and its name from comic book
- villains, the youthful hackers' group dominated the underground
- electronic landscape of the middle and late 1980s. Finally, a
- controversial penetration of phone company computers landed several
- members in jail. According to documents, activities of the Legion of
- Doom were a primary motivation for Operation Sun Devil, a nationwide
- crackdown on computer crime coordinated by the U.S. Secret Service.
-
- But remaining members in Austin and Houston, who disavowed any
- connection with the phone company incident, now say they are on the
- right side of the law and are offering their expertise on computer
- security.
-
- "People need us. We're the best," said Scott Chasin, known in his
- hacking days by the computer handle Doc Holliday. "Ten years from now
- we'll be the leaders in data security."
-
- Computer security is a burgeoning field, but one that is almost
- impossible to define in terms of dollars lost to penetrations or
- dollars spent on security. Tales are plentiful among police of losses
- in the six-figure range that went unprosecuted in order to spare the
- affected firms embarrassment. Estimates of the yearly loss to
- industry from computer break-ins range from $500 million to more than
- $2 billion -- much of it lost to long-distance phone service theft or
- credit card fraud.
-
- Some industry observers welcomed the creation of Comsec Computer
- Security, as the new company will be known, while others derided it as
- a new twist on a familiar theme.
-
- "There's lots of precedent for that," said Richard A. Schaffer of New
- York, editor of the industry publication ComputerLetter. "Crooks of
- all types try to hire themselves out after the fact."
-
- "So these guys are purporting to tell you how to protect against folks
- like them," he mused. "It strikes me that people should refuse to hire
- them just on principle...although from what I've seen they're
- qualified."
-
- But Linda Laskey of the Computer Security Institute in San Francisco
- said she believes the firm will provide a valuable service.
- "They know what they're doing as far as doing as far as security
- systems go," she said.
-
- Laskey said the Computer Security Institute, a worldwide organization
- of computer security professionals from business and government will
- be among the first clients of Comsec.
-
- The value of computer security is pitched now by those associated with
- particular security products. Accounting firms also provide security
- consulting.
-
- By contrast, Comsec is banking on its past association with the
- Legion, which gained a high profile from run-ins with the Secret
- Service and BellSouth, one of the regional phone companies.
-
- Robert J. Riggs, Franklin E. Dardin Jr. and Adam E. Grant were
- sentenced on Nov. 16, 1990, in federal court in Atlanta for breaking
- into the computers of BellSouth and stealing a document on the
- administration of the emergency 911 system.
-
- Hacking grew up around the Legion, which wasn't content merely to
- penetrate computer systems and networks. The deed wasn't finished
- until the intimate details of each system were written up and
- electronically published.
-
- Legion followers became associated with tutorials on obscure subjects,
- such things as how to make nitroglycerin and drugs, and with
- electronic documents on "social engineering," the fine art of the
- scam.
-
- Born in the swirling computer underground of the 1980s and named after
- the minions of Superman archrival Lex Luthor, the Legion's
- "educational services" ultimately helped reshape the online community
- and gave the group a stature beyond its nominal activities.
-
- But the best summary may have been written by Comsec principal Chris
- Goggans, the historian of the Legion and only member associated with
- it from its official founding in 1984 until it was disbanded late last
- year.
-
- "The Legion of Doom has been called everything from 'Organized Crime'
- to 'a communist threat to national security' to 'an international
- conspiracy of computer terrorists bent on destroying the nation's 911
- service,'" he wrote under his pseudonym, Eric Bloodaxe. "Nothing comes
- closer to the actual truth than 'bored adolescents with too much spare
- time.'"
-
- Now Sun Devil has put an end to hacking's innocence and perception of
- among computer enthusiasts that it is a noble pursuit.
-
- As for the Legion members, a few got busted, a few got bored, and the
- rest are pondering a direction for their lives as young adults.
-
- "I didn't want to be 30 years old and still breaking into systems,"
- said Chasin, who is 21. "I want to be securing systems."
-
- Chasin and Goggans, 22, will be joined in the firm by Ken Shulman, 21,
- the son of Houston socialite Carolyn Farb, who is providing discounted
- office space and other assistance.
-
- Comsec will be managed by Robert Cupps, 24, a graduate of Emory
- University and former securities trader. Chasin and Goggans are
- pursuing degrees at the University of Houston.
-
- "From a marketing standpoint, we've got a real strong presentation,"
- said Cupps, a Baytown native who does not consider himself a computer
- expert. "What we will do is a brief demonstration. When you can walk
- into someone's office and get root (administrative privileges) on
- their system, that says something in itself, that maybe you're the
- person they should be talking to about securing their systems."
-
- The only member of Comsec who has faced criminal charges is Shulman,
- known vicariously on computer networks as Malefactor, The Mentor, and
- Jack the Ripper. He pleaded no contest in 1989 to misdemeanor charges
- of credit card fraud, paid nearly $20,000 in restitution and was put
- on a year's deferred adjudication -- meaning he emerged from probation
- without a final conviction on his record.
-
- "It was telephones, long distance calls," he said. "I quit everything
- after that, and that was years ago."
-
- Goggans has also had a run-in with the law, however. His Austin home
- was raided on March 1, 1990, because he allegedly possessed the 911
- document. No charges have been filed.
-
- Originally held forth as a life-threatening penetration of the 911
- system, the document theft is now viewed by computer enthusiasts and
- others as having been considerably overblown.
-
- "The fact of the matter is that there was no damage to the system,"
- acknowledged Scott Ticer, operations manager for BellSouth and
- spokesman for the security team that lead the investigation. "But the
- potential for damage was there."
-
- "You just can't have people playing around in your network -- it's not
- some high-tech toyland. This is the telecommunications system."
-
- Would BellSouth hire the former hackers whose associates caused it so
- much grief -- proving their expertise along the way?
-
- "We don't use hackers as consultants, period," Ticer said. "Thanks but
- no thanks."
-
- ------------------------------
-
-
- ------------------------------
-
- Date: 5 Jul 91 07:10:45 GMT
- From: hkhenson@cup.portal.com
- Subject: Alcor Email (ECPA) Case Settled
-
- The long running Alcor/email case against the County and City of
- Riverside, CA was settled out of court in April of this year. The
- announcement was delayed until all parties had signed off, and the
- check (for $30k) had cleared the bank :-).
-
- The Alcor Life Extension Foundation (a non-profit cryonics
- organization -- alcor@cup.portal.com) ran a BBS for members and
- prospective members from early 1987 through January 12, 1988. On that
- day, the BBS computer was removed under a warrant to take the computer
- (but no mention of any contained email) in connection with the
- investigation into the death of 83-year-old Dora Kent. (Mrs. Kent
- was placed into cryonic suspension by Alcor in December of 1987.
- During and following the investigation, Alcor staff members were
- publicly accused by county officials of murder, theft, and building
- code violations. No charges were ever filed and the investigation was
- officially closed three years later.)
-
- In December, 1988 Keith Henson filed a civil suit to force an
- investigation of the apparent violations of the Electronic
- Communication Privacy Act by the FBI, but the case was dismissed by
- the now convicted Judge Aguilar.
-
- In early 1990, just before the statute of limitations ran out, Henson
- and 14 others (of the roughly 50 people who had email on the system)
- filed a civil action against a number of officials and the County and
- City of Riverside, CA under Section 2707 of the Electronic
- Communication Privacy Act.
-
- Some time after the case was filed, the Electronic Frontier Foundation
- came into existence in response to law enforcement abuses involving a
- wide spectrum of the online community. EFF considered this case an
- important one, and helped the plaintiffs in the case by locating pro
- bono legal help. While the case was being transferred, the County and
- City offered a settlement which was close to the maximum damages which
- could have been obtained at trial. Although no precedent was set
- because the case did not go to trial, considerable legal research has
- been done, and one judgment issued in response to the Defendants'
- Motion to Dismiss. The legal filings and the responses they generated
- from the law firm representing the County/City and officials are
- available by email from mnemonic@eff.org or (with delay) from
- hkhenson@cup.portal.com. (They are also posted on Portal.)
-
- The Plaintiffs were represented by Christopher Ashworth of Garfield,
- Tepper, Ashworth and Epstein in Los Angeles (408-277-1981). A summary
- of the settlement agreement is attached.
-
-
- SETTLEMENT AGREEMENT
-
- This agreement is made and entered into in Riverside, California,
- this _____ day of ______ by and between [long list of defendants and
- plaintiffs]
-
- I.
-
- FACTUAL RECITALS
-
- 1. This Agreement is executed with reference to the following
- facts for purpose of this Agreement only.
-
- 2. On January 12, 1998, some of the Defendants, pursuant to a
- search warrant, entered into the premises of Alcor Life Extension
- Foundation in Riverside, California.
-
- 3. Upon entry into the property, some of the Defendants seized
- various items, including electronic media containing E-mail owned by
- the plaintiffs.
-
- 4. On or about January 11, 1990, plaintiffs commenced civil action
- No. SAC 90-021js in the United States District Court, Santa Ana ("the
- Action"), against the defendants for injuries and damages allegedly
- suffered as a result of the defendants' seizure of plaintiff's E-mail.
-
- 5 It is now the desire and intention of plaintiffs, on the one
- part, and defendants on the other part, to settle, compromise, and
- resolve all the differences, disagreements, and disputes, which exist
- and may exist, including those which are the subject matter of,
- referred to, related to, or mentioned in the Action. Pursuant to this
- desire, and in consideration of the mutual promises contained herein,
- the parties agree as follows.
-
- II CONSIDERATION
-
- 6. Upon the execution of this Agreement, defendants County of
- Riverside shall pay to plaintiffs, by check, the total sum of Thirty
- Thousand Dollars ($30,000), inclusive of attorney fees and cost.
-
- ------------------------------
-
- Date: Thu, 27 Jun 91 11:39:59 -0700
- From: gnu@TOAD.COM
- Subject: NIST announces public-key digital signature standard
-
- Statement of Raymond G. Kammer, Deputy Director
- National Institute of Standards and Technology
- Before the Subcommittee on Technology and Competitiveness
- of the Committee on Science, Space, and Technology
- On Computer Security Implementation
- House of Representatives
- June 27, 1991
-
- Digital Signature Standard
-
- I know that you are interested in our progress in developing a federal
- digital signature standard based upon the principles of public-key
- cryptography. I am pleased to tell you that we are working out the
- final arrangements on the planned standard, and hope to announce later
- this summer our selection of a digital signature standard based on a
- variant of the ElGamal signature technique.
-
- Our efforts in this area have been slow, difficult, and complex. We
- evaluated a number of alternative digital signature techniques, and
- considered a variety of factors in this review: the level of security
- provided, the ease of implementation in both hardware and software,
- the ease of export from the U.S., the applicability of patents and the
- level of efficiency in both the signature and verification functions
- that the technique performs.
-
- In selecting digital signature technique method [sic], we followed the
- mandate contained in section 2 of the Computer Security Act of 1987 to
- develop standards and guidelines that ". . . assure the cost-effective
- security and privacy of sensitive information in Federal systems." We
- placed primary emphasis on selecting the technology that best assures
- the appropriate security of Federal information. We were also
- concerned with selecting the technique with the most desirable
- operating and use characteristics.
-
- In terms of operating characteristics, the digital signature technique
- provides for a less computational-intensive signing function than
- verification function. This matches up well with anticipated Federal
- uses of the standard. The signing function is expected to be
- performed in a relatively computationally modest environment such as
- with smart cards. The verification process, however, is expected to
- be implemented in a computationally rich environment such as on
- mainframe systems or super-minicomputers.
-
- With respect to use characteristics, the digital signature technique
- is expected to be available on a royalty-free basis in the public
- interest world-wide. This should result in broader use by both
- government and the private sector, and bring economic benefits to both
- sectors.
-
- A few details related to the selection of this technique remain to be
- worked out. The government is applying to the U.S. Patent Office for
- a patent, and will also seek foreign protection as appropriate. As I
- stated, we intend to make the technique available world-wide on a
- royalty-free basis in the public interest.
-
- A hashing function has not been specified by NIST for use with the
- digital signature standard. NIST has been reviewing various candidate
- hashing functions; however, we are not satisfied with any of the
- functions we have studied thus far. We will provide a hashing
- function that is complementary to the standard.
-
- I want to speak to two issues that have been raised in the public
- debate over digital signature techniques. One is the allegation that
- a "trap door", a method for the surreptitious defeat of the security
- of this system, has been built into the technique that we are
- selecting. I state categorically that no trap door has been designed
- into this standard nor does the U.S. Government know of any which is
- inherent in the ElGamal signature method that is the foundation of our
- technique.
-
- Another issue raised is the lack of public key exchange capabilities.
- I believe that, to avoid capricious activity, Public Key Exchange
- under control of a certifying authority is required for government
- applications. The details of such a process will be developed for
- government/industry use.
-
- NIST/NSA Technical Working Group
-
- Aspects of digital signature standard were discussed by the NIST/NSA
- Technical Working Group, established under the NIST/NSA Memorandum of
- Understanding. The Working Group also discussed issues involving the
- applicability of the digital signature algorithm to the classified
- community, cryptographic key management techniques, and the hashing
- function to be used in conjunction with the digital signature
- standard. Progress on these items has taken place; however, as with
- the digital signature standard, non-technical issues such as patents
- and exportability require examination, and this can be a lengthy
- process. We have found that working with NSA is productive. The
- Technical Working Group provides an essential mechanism by which NIST
- and NSA can conduct the technical discussions and exchange
- contemplated by the Computer Security Act and also allows us to
- address important issues drawing upon NSA's expertise.
-
- ------------------------------
-
- Date: July 8, 1991
- From: Barbara E. McMullen & John F. McMullen
- Subject: Secret Service Pays Hacker Call (Reprint from Newsbytes)
-
- SECRET SERVICE PAYS HACKER CALL 07/08/91
-
- NEW YORK, NEW YORK U.S.A., 1991 JULY 8 (NB) -- According to a
- Pennsylvania teenage "hacker" known as "Wing", agents of the United
- States Secret Service visited his home and that of some friends
- asking questions about rumors they had allegedly received about the
- planting of "July 4th logic bombs".
-
- Wing told Newsbytes that the agents arrived at his home and requested
- to talk to him about "rumors that he had planted logic bombs or
- viruses to go off on the 4th of July." Wing said that, on the advise
- of his father, he refused to discuss the matter with the agents, "The
- last time that the Secret Service was here my father told them not to
- come back again without a warrant so, when they did, I didn't talk to
- them. The whole thing is ridiculous anyhow. There was obviously no
- July 4th bombs and I certainly didn't plant any."
-
- Wing also said that agents visited friends of his and "made one who
- is new to computers feel that he was doing something wrong by trying
- to log onto bulletin boards."
-
- A Secret Service official, speaking to Newsbytes, confirmed that
- agents had attempted to interview Wing in relation to rumors of a
- July 4th attack on computer systems. The official also said that,
- because of Wing's juneville status, his parents have the right to
- deny the agents' request for an interview. The agent further said
- that, to his knowledge, there were no cases of computer attack on the
- 4th of July.
-
- Other law enforcement officials had told Newsbytes, previous to the
- July 4th holiday, that they had received rumors of such a planned
- attack but that they had little substantive material upon which to
- base an investigation. There have also been recent reports to
- Newsbytes from sysops of university and foundation computer systems
- in the Boston, MA area of attempted unauthorized access by an
- individual purporting to be Wing.
-
- ------------------------------
-
- Date: Tue, 09 Jul 91 05:56:11 CDT
- From: Anonymous
- Subject: Calling the kettle black
-
- In an article in comp.org.eff.talk, David Turrell wrote,
-
- > Anyone caught using illegal copies of 1-2-3 who keeps on doing it
- > after being asked not to and at the same time expresses "utter
- > contempt" for Lotus' right should be made to wash lots and lots of
- > cars, and wax those that need it.
-
- You'd be surprised who would have to come clean. There's a very big
- company that has provided technical opinions, albeit with a few
- decimal places added, to Federal officials. Would those Federal
- officials turn on such a technical resource and accuse it of software
- piracy? Would they take the word of an ex-employee that the very big
- company kept megabytes of pirated software on company computers? That
- managers within the company knew of those computers and used that
- unlicensed software in furtherance of the company's business? Would
- it matter that a now-dead division of that very big company kept
- archives of pilfered copies of (among other titles) Harvard Project
- Manager, Microsoft Word, Procomm Plus, Lotus 1-2-3, and Word Perfect
- for company use? Within twenty feet of an ADAPSO/SPA anti-piracy
- poster? If there's one law enforcement official who wouldn't hesitate
- to ask some hard questions of this very big company, I'd hope that
- they'd come out of the electronic shadows in this forum, and declare
- in front of all of us that Justice is for the Big as well as the
- Small.
-
- Sign me,
- A Belated Whistle Blower
-
- P.S. Bothered by my anonymity? I am, too. Truth is, I think that the
- LE people who I'd hope to hear from will try and kick MY butt before
- they'll go after the employer of so many "expert witnesses". Wait and
- see.
-
-
- ------------------------------
-
- End of Computer Underground Digest #3.25
- ************************************
-
-