home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Sat July 11, 1992 Volume 4 : Issue 30
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Copy Editor: Etaion Shrdlu, Jr.
- Archivist: Brendan Kehoe
- Archivist in spirit: Bob Kusumoto
- Shadow-Archivist: Dan Carosone
-
- CONTENTS, #4.30 (July 11, 1992)
- File 1--MOD Busts in New York
- File 2--New York Computer Crime Indictments
- File 3--MOD Bust
- File 4--EFF responds to MOD Indictments...
- File 5--LoD t-shirts
- File 6--AT&T's fight against toll fraud continues
- File 7--Boston BBS Shutdowns
- File 8--OMB A130 REVISION
-
- Back issues of CuD can be found in the Usenet alt.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from American Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
- anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 10 Jul 92 18:33:32 EDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--MOD Busts in New York
-
- Federal Agents indicted five members of MOD, a group of computer
- crackers, last week on 11 counts that included conspiracy, wire fraud,
- unauthorized access to computers, unauthorized possession of access
- devices, and interception of electronic communications. Julio
- Fernandez (Outlaw), John Lee (Corrupt), Mark Abene (Phiber Optik),
- Elias Ladopoulos (Acid Phreak), and Paul Stira (Scorpion) were
- indicted under various provisions of Title 18, including 18 USC S.
- 1029(a)(3); 18 USC S. 371; 18 USC S. 2511(1)(a) and 2); and 18 USC S.
- 1343. The charges allege that the defendants broke into
- telephone switching computers of several Bell systems, engaged in
- "phreaking," and computer tampering.
-
- Phiber Optik, perhaps the best-known of the group, Scorpion, and Acid
- Phreak were raided by federal agents in January, 1990. Felony charges
- against Phiber Optik were dropped in January, 1991, when he pled
- guilty to misdemeanor offenses. The bulk of the allegations listed
- in last week's indictment occured in November, 1991.
-
- Members of MOD received national attention in 1990 as the result of an
- article on "hackers" in the Village Voice (Dibbell, Julian. 1990.
- "On Line and Out of Bounds," Voice, 35(July 24): 27-32.) Phiber Optik,
- an occasional active participant in The Well's "Hacker's conference,"
- demonstrated his abilities to other members by obtaining credit and
- and similar private information, and by defending "hacking" and
- computer intrusion (see Harper's Forum. 1990. "Is Computer Hacking a
- Crime? A Debate from the Electronic Underground." Harper's,
- 280(March): 45-57).
-
- Among some "hackers," MOD was considered the "bad boys" of the
- computer underground because of alleged disruptiveness and harassment
- that was perceived to be their trademark. According to some, MOD had a
- reputation for arrogance and for vindictive retaliation against those
- who "crossed" them that ran counter to the "hacker ethic." A few,
- however, saw MOD as skilled teenagers whose apparent eccentricities
- should be tolerated because of their skill.
-
- Prosecution of malicious behavior is appropriate, but as the articles
- below suggest, much of the evidence against the group derives from
- wiretap information. As the NEWSBYTES article suggests, the case may
- be raised as an example of the importance of passing proposed
- legislation to expand the wire-tapping capability of law enforcement
- agents. One need not support alleged destructive behavior to be
- suspicious of law enforcement methods and attempts to expand intrusive
- powers that have been demonstrably abused in the past.
-
- ------------------------------
-
- Date: 10 Jul 92 21:14:29 EDT
- From: mcmullen@well.sf.ca.us
- Subject: File 2--New York Computer Crime Indictments
-
- NEW YORK, N.Y., U.S.A., 1992 JULY 9 (NB) -- Otto G. Obermaier, United
- States Attorney for the Southern District of New York, has announced
- the indictment of five "computer hackers" on charges of computer
- tampering, computer fraud, wire fraud, illegal wire tapping and
- conspiracy. The announcement was made at a press conference at 2:00 PM
- on Wednesday, July 8th at the Federal Court hose in Manhattan
-
- Named in the indictment were Julio Fernandez, 18, known as the
- "Outlaw"; John Lee, 21, a/k/a "Corrupt"; Mark Abene, 20, a/k/a "Phiber
- Optik"; Elias Ladopoulos, 22, a/k/a "Acid Phreak"; and "Paul Stira,
- 22, a/k/a "Scorpion". In addition to alleged specific illegal acts
- involving computers, the five individuals were also charged with
- conspiracy.
-
- According to the indictment, the five were members of a group known as
- MOD (standing for either "Masters of Disaster" or "Masters of
- Deception") and the goal of the conspiracy was "that the members of
- MOD would gain access to and control of computer systems in order to
- enhance their image and prestige among other computer hackers; to
- harass and intimidate rival hackers and people they did not like; to
- obtain telephone, credit, information, and other services without
- paying for them; and to obtain. passwords, account numbers and other
- things of value which they could sell to others."
-
- The indictment defines computer hacker as "someone who uses a computer
- or a telephone to obtain unauthorized access to other computers."
-
- Obermaier stated that this investigation was "the first investigative
- use of court-authorized wiretaps to obtain conversations and data
- transmissions of computer hackers." He said that this procedure was
- essential to the investigation and that "It demonstrates, I think, the
- federal government's ability to deal with criminal conduct as it moves
- into new technological areas." He added that the interception of data
- was possible only because the material was in analog form and added
- "Most of the new technology is in digital form and there is a pending
- statute in the Congress which seeks the support of telecommunications
- companies to allow the federal government, under court authorization,
- to intercept digital transmission. Many of you may have read the
- newspaper about the laser transmission which go through fiber optics
- as ernment needs the help of Congress and, indeed, the
- telecommunications companies to able to intercept digital While all of
- those indicted were charged with some type of unlawful access to one
- or more of computer systems belonging to the following: Southwestern
- Bell, BT North America, New York Telephone, ITT, Information America,
- TRW, Trans Union, Pacific Bell, the University of Washington, New York
- University, U.S. West, Learning Link, Tymnet and Martin Marietta
- Electronics Information and Missile Group, Fernandez and Lee were also
- charged with selling illegally obtained credit information to a person
- that later re-sold the information to private detectives.
-
- Assistant United States Attorney Stephen Fishbein announced that
- Morton Rosenfeld has been indicted and pled guilty to purchasing
- credit information and access codes from persons named "Julio" and
- "John". Fishbein said that Rosenfeld, at the time of his arrest on
- December 6, 1991, has approximately 176 TRW credit reports in his
- possession. Rosenfeld, 21, pled guilty on June 24, 1992 and is
- scheduled to be sentenced on September 9th. He faces a maximum of five
- years imprisonment and a fine of the greater of $250,000 or twice the
- gross gain or loss incurred.
-
- Fishbein also announced the outcome of a "separate but related court
- action, Alfredo De La Fe, 18, pled guilty on June 19, 1992 to the use
- and sale of telephone numbers and codes for Private Branch Exchanges
- (PBX's). De La Fe said that he had sold PBX numbers belonging to Bugle
- Boy Industries to a co-conspirator who used the numbers in a
- call-selling operation. He also said that he and a person that he knew
- as "Corrupt" had made illegal long difference conference calls. De La
- Fe faces the same maximum penalty as Rosenfeld and is scheduled for
- sentencing on August 31st.
-
- Among the charges against the five charged as conspirators is the
- allegation that Fernandez, Lee, Abene and "others whom they aided and
- abetted" performed various computer activities "that caused losses to
- Southwestern Bell of approximately $370,000. When asked by Newsbytes
- how the losses were calculated, Fishbein said that there was no
- breakdown beyond that stated in the indictment -- "expenses to locate
- and replace computer programs and other information that had been
- modified or otherwise corrupted, expenses to determine the source of
- the unauthorized intrusions, and expenses for new computers and
- security devices that were necessary to prevent continued unauthorized
- access by the defendants and others whom they aided and abetted."
-
- In answer to a Newsbytes question concerning the appropriateness of
- making an intruder into a computer system totally responsible for the
- cost of adding security features "which possibly should have been
- there to begin with", Obermaier said "That theory would make the
- burglar the safety expert since one can't have people going around
- fooling around with other people's relatively private information and
- then claiming that I'm doing it for their good."
-
- Paul Tough of Harper's Magazine followed up on the same topic by
- saying "In the Craig Neidorf case a regional telephone company claimed
- that a document was worth over $100,000. When it was found to be worth
- only $12, the case was thrown out. In view of that, are you concerned
- that they (Southwestern Bell) may have overreported? In response,
- Obermaier "No, we are not concerned. It's a matter of proof and, if
- the accused stand trial and have a similar experience to as happened
- the case you cite, not in this district, then the results predictably
- will be the same." Fishbein said that the conspiracy change carries a
- maximum sentence of five years imprisonment while each of the other
- counts (there are 10 additional counts) carries a maximum of five
- years imprisonment and a fine of the greater of $250,000 or twice the
- gross gain or loss incurred. A single exception is a count charging
- Fernandez with possessing fifteen or more unauthorized access devices.
- That count carries a maximum penalty of ten years imprisonment.
-
- In response to a statement by Alex Michelini of the New York Daily
- News that "What you've outlined, basically, except for the sales of
- credit information, this sounds like a big prank, most of it",
- Obermaier said "Really, Well, I suppose, if you can characterize that
- as a prank but it's really a federal crime allowing people without
- authorization to rummage through the data of other people to which
- they do not have access and, as I point out to you again, the burglar
- cannot be your safety expert. He may be inside and laugh at you when
- you come home and say that your lock is not particularly good but I
- think you, if you were affected by that contact, would be somewhat
- miffed"
-
- Obermaier also said that "The message that ought to be delivered with
- this indictment is that such conduct will not be tolerated,
- irrespective of tensible purpose."
-
-
- Obermaier also said that "The message that ought to be delivered with
- this indictment is that such conduct will not be tolerated,
- irrespective of the ag of the particular accused or their ostensible
- purpose."
-
- Others participating in the news conference were Raymond Shaddick,
- United States Secret Service assistant director - Office of
- Investigations; William Y. Doran, FBI special agent in charge, New
- York criminal division; Scott Charney, United States Dept. of Justice
- chief of computer crime unit. All stressed the cooperation that had
- gone on between the various law enforcement agencies during the
- investigation.
-
- Charney told Newsbytes that, in spite of the fact that the search
- warrants executed on Stira and Ladopoulos preceded those executed on
- Lee and Fernandez by almost two years and that the last specific
- allegation against Stira proceeds the first against Lee by 16 months
- and the first against Fernandez by 21 months, there is evidence that
- links them together in the conspiracy. Charney also told Newsbytes
- that the counts against Abene were not related to a misdemeanor
- conviction in early 1991 for which he served community service. Those
- indicted have been asked to present themselves at New York Service
- Services headquarters at 9:00 AM on July 8th for fingerprinting.
- Arraignment for the indicted is scheduled for Thursday, July 16th.
-
- Abene told Newsbytes that while he couldn't comment on anything
- related to the indictment until he obtained legal counsel, "I've been
- participating i conferences with law enforcement personnel and guest
- lecturing to college classes for the last year and a half. In every
- case, I have said how those responsible for information about us have
- the responsibility to protect that data. I have also tried to explain
- the great difference between a true hacker and a person who uses
- computers for criminal profit. I hope that I have increased
- understanding with these efforts."
-
- (Barbara E. McMullen & John F. McMullen/Press Contacts:Federico E.
- Virella, Jr., United States Attorney's Office, 212 791-1955; Betty
- Conkling, United States Secret Service, 212 466-4400; Joseph Valiquette,
- Jr, Federal Bureau of Investigation, 212 335-2715/19920709)
-
- ------------------------------
-
- Date: 09 Jul 92 21:14:29 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 3--MOD Bust
-
- From-- J.MCNEELY6 Jack C. Mcneely
- To-- GRMEYER Gordon R. Meyer
-
- Sub: MOD Bust
-
- Group of "Computer Hackers" Indicted;
- First Use of Wiretaps in Such a Case
-
- To: National Desk
- Contact: Federico E. Virella Jr., 212-791-1955, or
- Stephen Fishbein, 212-791-1978, of the Office of
- the U.S. Attorney, Southern District of New York; or
- Betty Conkling of the U.S. Secret Service, 212-466-4400; or
- Joseph Valiquette Jr. of the Federal Bureau of
- Investigation, 212-335-2715
-
- NEW YORK, July 8 /U.S. Newswire/ -- A group of five "computer hackers"
- has been indicted on charges of computer tampering, computer fraud,
- wire fraud, illegal wiretapping, and conspiracy, by a federal grand
- jury in Manhattan, resulting from the first investigative use of
- court-authorized wiretaps to obtain conversations and data
- transmissions of computer hackers.
-
- A computer hacker is someone who uses a computer or a telephone to
- obtain unauthorized access to other computers.
-
- The indictment, which was filed today, alleges that Julio Fernandez,
- a/k/a "Outlaw," John Lee, a/k/a "Corrupt," Mark Abene, a/k/a "Phiber
- Optik," Elias Ladopoulos, a/k/a "Acid Phreak," and Paul Stira, a/k/a
- "Scorpion," infiltrated a wide variety of computer systems, including
- systems operated by telephone companies, credit reporting services,
- and educational institutions.
-
- According to Otto G. Obermaier, United States Attorney for the
- Southern District of New York, James E. Heavey, special agent in
- charge, New York Field Division, United States Secret Service, William
- Y. Doran, special agent in charge, Criminal Division, New York Field
- Division, Federal Bureau of Investigation, and Scott Charney, chief of
- the Computer Crime Unit of the Department of Justice, the indictment
- charges that the defendants were part of a closely knit group of
- computer hackers self-styled "MOD," an acronym used variously for
- "Masters of Disaster" and "Masters of Deception" among other things.
-
- The indictment alleges that the defendants broke into computers "to
- enhance their image and prestige among other computer hackers; to
- harass and intimidate rival hackers and other people they did not
- like; to obtain telephone, credit, information and other services
- without paying for them; and to obtain passwords, account numbers and
- other things of value which they could sell to others."
-
- The defendants are also alleged to have used unauthorized passwords
- and billing codes to make long distance telephone calls and to be able
- to communicate with other computers for free.
-
- Some of the computers that the defendants allegedly broke into were
- telephone switching computers operated by Southwestern Bell, New York
- Telephone, Pacific Bell, U.S. West and Martin Marietta Electronics
- Information and Missile Group. According to the indictment, such
- switching computers each control telephone service for tens of
- thousands of telephone lines.
-
- In some instances, the defendants allegedly tampered with the
- computers by adding and altering calling features. In some cases, the
- defendants allegedly call forwarded local numbers to long distance
- numbers and thereby obtained long distance services for the price of a
- local call.
-
- Southwestern Bell is alleged to have incurred losses of approximately
- $ 370,000 in 1991 as a result of computer tampering by defendants
- Fernandez, Lee, and Abene.
-
- The indictment also alleges that the defendants gained access to
- computers operated by BT North America, a company that operates the
- Tymnet data transfer ne twork. The defendants were allegedly able to
- use their access to Tymnet computers to intercept data communications
- while being transmitted through the network, including computer
- passwords of Tymnet employees. On one occasion, Fernandez and Lee
- allegedly intercepted data communications on a network operated by the
- Bank of America.
-
- The charges also allege that the defendants gained access to credit
- and information services including TRW, Trans Union and Information
- America.
-
- The defendants allegedly were able to obtain personal information on
- people including credit reports, telephone numbers, addresses,
- neighbor listings and social security numbers by virtue of their
- access to these services.
-
- On one occasion Lee and another member of the group are alleged to
- have discussed obtaining information from another hacker that would
- allow them to alter credit reports on TRW. As quoted in the
- indictment, Lee said that the information he wanted would permit them
- "to destroy people's lives... or make them look like saints."
-
- The indictment further charges that in November 1991, Fernandez and
- Lee sold information to Morton Rosenfeld concerning how to access
- credit services. The indictment further alleges that Fernandez later
- provided Rosenfeld's associates with a TRW account number and password
- that Rosenfeld and his associates used to obtain approximately 176 TRW
- credit reports on various individuals. (In a separate but related
- court action, Rosenfeld pleaded guilty to conspiracy to use and
- traffic in account numbers of TRW. See below).
-
- According to Stephen Fishbein, the assistant United States attorney in
- charge of the prosecution, the indictment also alleges that members of
- MOD wiped out almost all of the information contained within the
- Learning Link computer operated by the Educational Broadcasting Corp.
- (WNET Channel 13) in New York City.
-
- The Learning Link computer provided educational and instructional
- information to hundreds of schools and teachers in New York, New
- Jersey and Connecticut.
-
- Specifically, the indictment charges that on Nov. 28, 1989, the
- information on the Learning Link was destroyed and a message was left
- on the computer that said: "Happy Thanksgiving you turkeys, from all
- of us at MOD" and which was signed with the aliases "Acid Phreak,"
- "Phiber Optik," and "Scorpion."
-
- During an NBC News broadcast on Nov. 14, 1990, two computer hackers
- identified only by the aliases "Acid Phreak" and "Phiber Optik" took
- responsibility for sending the "Happy Thanksgiving" message.
-
- Obermaier stated that the charges filed today resulted from a joint
- investigation by the United States Secret Service and the Federal
- Bureau of Investigation.
-
- "This is the first federal investigation ever to use court-authorized
- wiretaps to obtain conversations and data transmissions of computer
- hackers," said Obermaier.
-
- He praised both the Secret Service and the FBI for their extensive
- efforts in this case. Obermaier also thanked the Department of Justice
- Computer Crime Unit for their important assistance in the
- investigation. Additionally, Obermaier thanked the companies and
- institutions whose computer systems were affected by the defendants'
- activities, all of whom cooperated fully in the investigation.
-
- Fernandez, age 18, resides at 3448 Steenwick Ave., Bronx, New York.
- Lee (also known as John Farrington), age 21, resides at 64A Kosciusco
- St. Brooklyn, New York. Abene, age 20, resides at 94-42 Alstyne Ave.,
- Queens, New York. Elias Ladopoulos, age 22, resides at 85-21 159th
- St., Queens, New York. Paul Stira, age 22 , resides at 114-90 227th
- St., Queens, New York. The defendants' arraignment has been scheduled
- for July 16, at 10 a.m. in Manhattan federal court.
-
- The charges contained in the indictment are accusations only and the
- defendants are presumed innocent unless and until proven guilty.
- Fishbein stated that if convicted, each of the defendants may be
- sentenced to a maximum of five years imprisonment on the conspiracy
- count. Each of the additional counts also carries a maximum of five
- years imprisonment, except for the count charging Fernandez with
- possession of access devices, which carries a maximum of ten years
- imprisonment. Additionally, each of the counts carries a maximum fine
- of the greater of $ 250,000, or twice the gross gain or loss incurred.
-
- ++++++++++++
-
- In separate but related court actions, it was announced that Rosenfeld
- and Alfredo De La Fe have each pleaded guilty in Manhattan Federal
- District Court to conspiracy to use and to traffic in unauthorized
- access devices in connection with activities that also involved
- members of MOD.
-
- Rosenfeld pled guilty on June 24 before Shirley Wohl Kram, United
- States District Judge.
-
- At his guilty plea, Rosenfeld admitted that he purchased account
- numbers and passwords for TRW and other credit reporting services from
- computer hackers and then used the information to obtain credit
- reports, credit card numbers, social security numbers and other
- personal information which he sold to private investigators.
-
- Rosenfeld added in his guilty plea that on or about Nov. 25, 1991, he
- purchased information from persons named "Julio" and "John" concerning
- how to obtain unauthorized access to credit services.
-
- Rosenfeld stated that he and his associates later obtained additional
- information from "Julio" which they used to pull numerous credit
- reports. According to the information to which Rosenfeld pleaded
- guilty, he had approximately 176 TRW credit reports at his residence
- on Dec. 6, 1991.
-
- De La Fe pled guilty on June 19 before Kenneth Conboy, United States
- District Judge.
-
- At his guilty plea, De La Fe stated that he used and sold telephone
- numbers and codes for Private Branch Exchanges ("PBXs").
-
- According to the information to which De La Fe pleaded guilty, a PBX
- is a privately operated computerized telephone system that routes
- calls, handles billing, and in some cases permits persons calling into
- the PBX to obtain outdial services by entering a code.
-
- De La Fe admitted that he sold PBX numbers belonging to Bugle Boy
- Industries and others to a co-conspirator who used the numbers in a
- call sell operation, in which the co-conspirator charged others to
- make long distance telephone calls using the PBX numbers.
-
- De La Fe further admitted that he and his associates used the PBX
- numbers to obtain free long distance services for themselves. De La Fe
- said that one of the people with whom he frequently made free long
- distance conference calls was a person named John Farrington, who he
- also knew as "Corrupt."
-
- Rosenfeld, age 21, resides at 2161 Bedford Ave., Brooklyn, N.Y.
- Alfredo De La Fe, age 18, resides at 17 West 90th St., N.Y. Rosenfeld
- and De La Fe each face maximum sentences of five years, imprisonment
- and maximum fines of the greater of $250,000, or twice the gross gain
- or loss incurred. Both defendants have been released pending sentence
- on $20,000 appearance bonds. Rosenfeld's sentencing is scheduled for
- Sept. 9, before Shirley Wohl Kram. De La Fe's sentencing is scheduled
- for Aug. 31, before Conboy.
-
- /U.S. Newswire 202-347-2770/
-
- ------------------------------
-
- Date: Fri, 10 Jul 1992 17:26:52 -0500
- From: Craig Neidorf <knight@EFF.ORG>
- Subject: File 4--EFF responds to MOD Indictments...
-
- +=========+=================================================+===========+
- | F.Y.I. |Newsnote from the Electronic Frontier Foundation |July 9,1992|
- +=========+=================================================+===========+
-
- FEDERAL HACKING INDICTMENTS ISSUED AGAINST FIVE IN NEW YORK CITY
-
- Yesterday, Federal officials indicted five people in New York City for
- computer crime. The indictments name Mark Abene (Phiber Optik), Julio
- Fernandez (Outlaw), John Lee (Corrupt), Elias Ladopoulos (Acid
- Phreak), and Paul Stria (Scorpion). The indictments charge that the
- accused used their computers to access credit bureaus, other computer
- systems, and make free long-distance calls.
-
- Prosecutors revealed they relied on court-approved wiretaps to obtain
- much of the evidence for their multiple-count indictment for wire
- fraud, illegal wiretapping and conspiracy. Each count is punishable by
- up to 5 years in prison. The defendants are scheduled to be arraigned
- in Manhattan Federal Court on July 16. If found guilty on all counts
- the defendants could face a maximum term of 50 years in prison and
- fines of $2.5 million.
-
- Otto Obermaier, U.S. Attorney, discounted suggestions that the acts
- alleged in the indictment were only "pranks" and asserted that they
- represented "the crime of the future." He also stated that one purpose
- of the indictment was to send a message that "this kind of conduct
- will not be tolerated."
-
- Mark Abene, known to the computer community as Phiber Optik, denied
- any wrongdoing.
-
- The Electronic Frontier Foundation's staff counsel in Cambridge, Mike
- Godwin is carefully reviewing the indictments. Mitchell Kapor, EFF
- President, stated today that: "EFF's position on unauthorized access
- to computer systems is, and has always been, that it is wrong."
-
- "Nevertheless," Kapor continued, "we have on previous occasions
- discovered that allegations contained in Federal indictments can also
- be wrong, and that civil liberties can be easily infringed in the
- information age. Because of this, we will be examining this case
- closely to establish the facts."
-
- +=====+===================================================+=============+
- | EFF |155 Second Street, Cambridge MA 02141 (617)864-0665| eff@eff.org |
-
- ------------------------------
-
- Date: 25 Jun 92 17:38:55 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 5--LoD t-shirts
-
-
- ++++ Original post follows ++++
- Date-- Wed, 24 Jun 92 19--35--36 -0500
- From-- amartin@ccwf.cc.utexas.edu (Aston Martin)
-
- Net Denizens:
-
- With all the amazing hullabaloo going on in several newsgroups and
- throughout the electronic community as a whole, I have decided to go
- ahead and make one more, FINAL, print run on the LOD t-shirts.
-
- Please, if anyone is interested, have your mail sent by the end of
- July, so everyone who wants one can get one this time. I thought that
- in the 6 print orders I made previously "Everyone" who wanted one got
- one, but from the requests I have received apparently not.
-
- I was amazed at the orders that came in from locations such as Hong
- Kong, England, Netherlands and Australia. The list of luminaries who
- came out of the woodwork with an interest in such item was equally as
- impressive, security types at LLNL, government employees, hackers from
- the golden days, and even a certain regular contributor to a few "not
- for normal distribution" mail lists.
-
- This run is for those of you who got left out. Again, I urge that you
- respond before July 31, as that is when it the opportunity ends
- forever.
-
- Blatant promotion follows:
-
- "LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS!
-
- Now you too can own an official Legion of Doom T-shirt. This is the
- same shirt that sold-out rapidly at the "Cyberview" hackers conference
- in St. Louis. Join the other proud owners such as Lotus founder Mitch
- Kapor and award-winning author Bruce Sterling by adding this
- collector's item to your wardrobe. This professionally made, 100
- percent cotton shirt is printed on both front and back. The front
- displays "Legion of Doom Internet World Tour" as well as a sword and
- telephone intersecting the planet earth, skull-and-crossbones style.
- The back displays the words "Hacking for Jesus" as well as a
- substantial list of "tour-stops" (internet sites) and a quote from
- Aleister Crowley. This T-shirt is sold only as a novelty item, and is
- in no way attempting to glorify computer crime.
-
- Shirts are only $15.00, postage included! Overseas add an
- additional $5.00. Send check or money-order (No CODs, cash or
- credit cards--even if it's really your card) made payable to
- Chris Goggans to:
-
- Chris Goggans
- 5620 Glenmont #P-17
- Houston, TX 77081
-
- ------------------------------
-
- Date: Tue, 30 Jun 1992 16:57:47 -0400
- From: Brendan Kehoe <brendan@CS.WIDENER.EDU>
- Subject: File 6--AT&T's fight against toll fraud continues
-
- AT&T is giving businesses a new way to fight telephone fraud and
- abuse. The long-distance carrier is offering a calling card that
- allows corporate customers to preselect specific phone numbers, area
- codes, or countries that can be called by the card's user.
- Non-designated calling areas cannot be accessed. The card, which
- allows managers to designate up to 50 possible calling combinations,
- will be available for free this year. Beginning next year, AT&T will
- charge a service fee for the card.
-
- Information Week, June 29, 1992.
-
- ------------------------------
-
- Date: Tue, 30 Jun 92 21:22:00 PDT
- From: Mark Coats <mcoats@IGC.ORG>
- Subject: File 7--Boston BBS Shutdowns
-
- Has anyone heard about several BBSs being shutdown in the Boston area?
- I recently talked to Bob Chatelle, who told me that three boards, all
- gay oriented, have ceased operation recently. The first was well
- known, the Eagle's Nest, and was seized in conjunction with a raid on
- a rowdy party. The second, the Boston Connection, ceased operation
- and Bob has no info on it. The last, Doug's Den, was embroiled in a
- sale of the BBS itself, when it is rumoured to have been seized by the
- feds on child pornography charges.
-
- If you know anyone tracking Cyberbusts and/or suspicious BBS shutdowns
- please forward this to them.
-
- Bob is not on the net but can be reached at 617-497-7193 or at:
-
- Bob Chatelle
- 296 Western Ave.
- Cambridge, MA 02139
-
- Thanks,
-
- ------------------------------
-
- Date: Tue, 30 Jun 1992 18:19:13 EDT
- From: James P Love <LOVE@PUCC.BITNET>
- Subject: File 8--OMB A130 REVISION
-
- Taxpayer Assets Project
- Information Policy Note
- June 23, 1992
-
- THE APRIL 29, 1992 PROPOSED REVISION TO OMB CIRCULAR A-130.
-
-
- SUMMARY AND INTRODUCTION
-
- - Important policy advisory for all federal agencies
- concerning the management of federal information resources.
-
- - Proposed Revision is an improvement over the existing A-130,
- but needs considerable work. Your comments are needed.
-
- - Public comments due by August 27, 1992
-
- - Comments can be filed at any time before the deadline by
- email. Send to (Internet): omba130@nist.gov
-
-
- INTRODUCTION
-
- On April 29, 1992 OMB published a notice in the Federal Register
- asking for public comments on proposed revisions of its OMB
- Circular A-130. This important circular is a policy advisory
- from OMB to all federal agencies concerning the management of
- government information resources.
-
- Since it was first issued in 1985 A-130 has been a controversial
- document. In its earlier versions A-130 was used to eliminate or
- raise prices on many free publications, and to promote the
- privatization of the dissemination of government information.
-
- The April 29, 1992 draft is a major improvement from the 1985
- circular or any of the previous attempts to revise it. There are
- also a number of problems with A-130.
-
-
- GOOD NEWS
-
- The best new features of the Circular are its decreased emphasis
- on privatization, the much more generous mandate to use computer
- technologies to disseminate government information (its ok for a
- government agency to "add value"), and OMB's very good statement
- on pricing of government information (no more than the cost of
- dissemination).
-
- BAD NEWS
-
- DEPOSITORY LIBRARIES
-
- OMB contends that federal agencies do not have to give electronic
- information products and services to the federal depository
- library program. There are 1,400 federal depository libraries,
- including most major research libraries. They provide free
- access to thousands of federal publications. By law all federal
- agencies are required to provide copies of paper productions to
- this program, which was organized in the middle of the 19th
- century. OMB's proposal, which may not be legal, is a major
- change of philosophy, and it should be criticized strongly. We
- don't need a technological sunset of this important program which
- provides universal access to federal information resources.
-
-
- WHAT'S MISSING FROM THE CIRCULAR
-
- CONFLICTS OF INTEREST
-
- A surprisingly large number of agencies have contracts with
- private firms to carry out data processing or information
- dissemination tasks, when the contractor is also a potential
- competing outlet for the information. The conflicts of interest,
- both real and potential, are huge, and of great importance.
- Consider the following examples:
-
- SEC's Insider trading data. The SEC hires InvestNet to data
- punch its insider trading reports. InvestNet provides a
- copy of its work to the National Archives, missing the field
- of the shareholder's address. This makes the government's
- copy of the data worthless for many users. InvestNet then
- the public sells access to the complete data for very high
- fees.
-
- SEC's EDGAR system. The SEC hires Mead Data Central to
- disseminate the electronic records for EDGAR. Meanwhile,
- Mead wants to sell the public access to those same records.
- The result is one of the most restrictive systems for public
- access that one could imagine.
-
- LANDSAT. GM and GE are given a monopoly on the sale of
- LANDSAT data. Forget GM's conflict of interest in making
- data on air pollution and climate available to environmental
- groups. GM, through its Hughes subsidiary, wants to force
- people to buy its value added services, "enhancing" the
- LANDSAT data, before its disseminated.
-
- JURIS. The Department of Justice hires Westlaw to key punch
- federal court decisions. Westlaw, of course, is one of two
- commercial sources (with Mead Data Central) of legal
- information online. West provides the government with its
- headnotes, which West copyrights. West then can exercise a
- copyright over the entire database, which otherwise consists
- of the LAW itself. West has used this to prevent the public
- from having access to the JURIS online system and from
- preventing potential competitors from obtaining the records
- under FOIA.
-
- There are dozens of other cases of conflicts of interest. OMB
- should address this issue in A-130.
-
-
- PUBLIC NOTICE
-
- OMB is still acting as though the only reason for public notice
- is if there is a major decision on the creation or termination of
- an information product or service. We believe the public should
- have regular opportunities to comment on agency policies and
- practices. For example, since JURIS has never been available to
- the public, there hasn't been any public notice. Or, the SEC's
- public notice of EDGAR was years and years ago, before anyone
- knew what it was really going to do. What if the public wants
- something new that doesn't exist, or wants to criticize an agency
- choice of standards? Some of the most important issues concern
- the types of incremental adjustments that agencies need to make.
-
- We support the extensive public comment provisions that are
- described in Representative Owens' Improvement of Information
- Access Act (IIA Act, HR 3459). Let's do it right in A-130, and
- pay more attention to data users problems.
-
-
- NTIS
-
- Ever since Congress required NTIS to operate without taxpayer
- funds (funded entirely on user fees), it has used electronic
- products and services to subsidize its money losing paper
- products. Agencies now sell electronic products through NTIS,
- splitting fees. The records are no longer available through
- FOIA, and A-130's policy on pricing (no more than dissemination
- costs) is completely undermined. NTIS charges huge prices for
- its data in electronic formats. (As much as $1,000 or more for a
- single real of magnetic tape). This loophole is causing immense
- problems, and should be addressed in A-130.
-
-
- STANDARDS
-
- If the three most important things about information in a
- networked environment are standards, standards, and standards,
- then A-130 should talk more about standards. And when you talk
- about standards, you have to talk about *regular* public comment.
- Users have to be involved. Again, we support the Owens bill (HR
- 3459) approach on this.
-
- CONCLUSION
-
- Omb Circular A-130 is a pivotal federal document, and it will be
- important to file your comments by the August 27, 1992 deadline.
- OMB is making this very easy by allowing comments to be filed by
- email any time before the deadline, at omba130@nist.gov.
-
- For more information, contact OMB's Office of Information and
- Regulatory Affairs.
-
- Information Policy Branch internet: ombA130@nist.gov
- Office of Information and voice: 202/395-3785
- Regulatory Affairs
- OMB
- Room 3235
- New Executive Office Building
- Washington, DC 20503
-
- ============================================================
- James Love voice: 609/683-0534
- Director, Taxpayer fax: 202/234-5176
- Assets Project internet: love@essential.org
- P.O. Box 19367
- Washington, DC 20036%
-
- ------------------------------
-
- End of Computer Underground Digest #4.30
- ************************************
-
-