mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1830 lines
81 KiB
Text
1830 lines
81 KiB
Text
---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 16 of 17
|
|
|
|
|
|
-------------------------[ P H R A C K W O R L D N E W S
|
|
|
|
|
|
--------[ Issue 51
|
|
|
|
|
|
0x1: Illinois man arrested after threatening Bill Gates
|
|
0x2: Man Arrested In Tokyo On Hacker Charges
|
|
0x3: FBI says hacker sold 100,000 credit card numbers
|
|
0x4: MS Security Plugs Not Airtight
|
|
0x5: BSA slams DTI's Encryption Plans
|
|
0x6: Teen bypasses blocking software
|
|
0x7: The Power to Moderate is the Power to Censor
|
|
0x8: AOL Users in Britain Warned of Surveillance
|
|
0x9: Georgia Expands the "Instruments of Crime"
|
|
0xa: NASA Nabs Teen Computer Hacker
|
|
0xb: Agriculture Dept. Web Site Closed after Security Breach
|
|
0xc: Hackers Smash US Government Encryption Standard
|
|
0xd: Hacker May Stolen JonBenet computer Documents
|
|
0xe: Hacker Vows 'Terror' for Pornographers
|
|
0xf: Mitnick Gets 22 Month Sentence
|
|
0x10: New York Judge Prohibits State Regulation of Internet
|
|
0x11: Breaking the Crypto Barrier
|
|
0x12: Setback in Efforts to Secure Online Privacy
|
|
0x13: Captain Crunch Web Site Now Moved
|
|
0x14: US Justive Dept. Investigating Network Solutions
|
|
0x15: Cyber Patrol Bans Crypt Newsletter
|
|
0x16: Some humor on media hacks and hackers
|
|
0x17: Court Mixes Internet Smut Provision
|
|
|
|
0x1: Book Title: Underground
|
|
0x2: Book Title: "Hackers"
|
|
|
|
0x1: Convention: Cybercrime Conference Announcement
|
|
0x2: Convention: Computers & The Law IV Symposium
|
|
|
|
|
|
0x1>-------------------------------------------------------------------------
|
|
|
|
|
|
Title: Illinois man arrested after threatening Bill Gates
|
|
Source: Reuter
|
|
Author: unknown
|
|
|
|
SEATTLE (Reuter) - An Illinois man has been arrested and charged with
|
|
threatening to kill Microsoft Corp. Chairman Bill Gates in a $5
|
|
million extortion plot, authorities said on Friday.
|
|
|
|
Adam Pletcher was arrested on May 9 in the Chicago suburb of Long
|
|
Grove, where he lives with his parents, and charged with extortion,
|
|
federal prosecutors said. He was freed on $100,000 bond and is due to
|
|
appear in U.S. District Court in Seattle on Thursday for arraignment.
|
|
|
|
According to court documents, Pletcher sent four letters to Gates,
|
|
beginning in March, threatening to kill the software company founder
|
|
and his wife, Melinda, unless payment of at least $5 million was made.
|
|
|
|
The first letter was intercepted at the company's headquarters in
|
|
Redmond, Washington, by corporate security officers, who contacted the
|
|
FBI.
|
|
|
|
Agents then used an America Online dating service specified by the
|
|
author of the letters to track down Pletcher, described as a loner in
|
|
his early 20s who spends much of his time in front of the computer.
|
|
|
|
Authorities said they treated the threats seriously but did not
|
|
believe Gates' life was ever in danger.
|
|
|
|
"We generally think this was a kid with a rich fantasy life, just
|
|
living that out," said Tom Ziemba, a spokesman for U.S. Attorney
|
|
Katrina Pflaumer.
|
|
|
|
"This was handled in a fairly routine fashion by Microsoft security
|
|
and law enforcement agencies," Microsoft spokesman Mark Murray said.
|
|
"At some point in the investigation Microsoft did make Bill aware of
|
|
the situation."
|
|
|
|
Pletcher's online activities have landed him in trouble before.
|
|
|
|
In February the Illinois attorney general sued Pletcher, accusing him
|
|
of defrauding consumers of thousands of dollars in an alleged Internet
|
|
scam, according to a story in the Chicago Tribune. Several consumers
|
|
complained they sent Pletcher up to $5,500 to find them a car deal and
|
|
never got their money back.
|
|
|
|
Despite his status as richest man in America, with a Microsoft stake
|
|
valued at more than $30 billion, Gates is still known to travel alone
|
|
on regularly scheduled flights. But Murray said the executive was
|
|
well-protected.
|
|
|
|
"We don't comment at all on Bill's security other than to say that
|
|
there are extensive and appropriate security measures in place for
|
|
Bill, for his family and for Microsoft facilities and personnel,"
|
|
Murray said.
|
|
|
|
0x2>-------------------------------------------------------------------------
|
|
|
|
Title: Man Arrested In Tokyo On Hacker Charges
|
|
Source: unknown
|
|
Author: unknown
|
|
|
|
TOKYO (May 23, 1997 10:31 a.m. EDT) - A 27-year-old Japanese man was
|
|
arrested Friday on suspicion of breaking into an Internet home page of
|
|
Asahi Broadcasting Corp. and replacing it with pornography, a police
|
|
spokesman said.
|
|
|
|
Koichi Kuboshima, a communications equipment firm employee from Saitama
|
|
Prefecture, north of Tokyo, was arrested on charges of interrupting
|
|
business by destroying a computer network.
|
|
|
|
It was the first arrest related to illegal access to the information
|
|
network, the police spokesman said, adding Kuboshima was also charged
|
|
with displaying obscene pictures, the spokesman said.
|
|
|
|
The suspect admitted to the crime, telling police he had done it for
|
|
fun, police officials said.
|
|
|
|
The Osaka-based broadcasting network blocked access to all of its home
|
|
pages on Sunday immediately after it was notified of the offense by an
|
|
Internet user.
|
|
|
|
The Asahi home page is designed to allow users to download and upload
|
|
information, which allowed Kuboshima to rewrite the contents, the
|
|
spokesman said.
|
|
|
|
0x3>-------------------------------------------------------------------------
|
|
|
|
Title: FBI says hacker sold 100,000 credit card numbers
|
|
Source: unknown
|
|
Author: unknown
|
|
|
|
SAN FRANCISCO (May 23, 1997 10:13 a.m. EDT) -- A clever hacker slipped
|
|
into a major Internet provider and gathered 100,000 credit card
|
|
numbers along with enough information to use them, the FBI said
|
|
Thursday.
|
|
|
|
Carlos Felipe Salgado, Jr., 36, who used the online name "Smak,"
|
|
allegedly inserted a program that gathered the credit information from
|
|
a dozen companies selling products over the Internet, said FBI
|
|
spokesman George Grotz.
|
|
|
|
[Secure electronic commerce is a novel idea.]
|
|
|
|
Salgado allegedly tried to sell the credit information to an
|
|
undercover agent for $260,000. He was arrested Wednesday and faces a
|
|
maximum 15 years in prison and $500,000 in fines if convicted on
|
|
charges of unauthorized access of computers and trafficking in stolen
|
|
credit card numbers.
|
|
|
|
"What is unique about this case is that this individual was able to
|
|
hack into this third party, copy this information and encrypt it to be
|
|
sold," Grotz said.
|
|
|
|
[Since we know others have hacked in and stolen credit cards before,
|
|
the unique part is him trying to sell them. That isn't in keeping
|
|
with what federal agents love to say about hackers and credit card
|
|
incidents. Convenient how they change things like that.]
|
|
|
|
Had it succeeded, "at minimum we'd have 100,000 customers whose
|
|
accounts could have been compromised and would not have known it until
|
|
they got their bill at the end of the month," the FBI spokesman said.
|
|
|
|
The scheme was discovered by the unidentified San Diego-based Internet
|
|
provider during routine maintenance. Technicians found an intruder had
|
|
placed a program in their server called a "packet sniffer," which
|
|
locates specified blocks of information, such as credit card numbers.
|
|
|
|
[Uh...more like they kept a nice ascii database full of the numbers
|
|
that was copied with expert technique like "cp ccdb"...]
|
|
|
|
The FBI traced the intruder program to Salgado, who was using an
|
|
account with the University of California-San Francisco.
|
|
|
|
A school spokeswoman said officials have not yet determined whether
|
|
Salgado attended or worked at the school, or how he got access to the
|
|
account.
|
|
|
|
With the cooperation of a civilian computer user who was in
|
|
communication with Salgado, the FBI arranged to have an undercover
|
|
agent buy the stolen credit card information.
|
|
|
|
After making two small buys, the FBI agents arranged to meet Salgado
|
|
on Wednesday at San Francisco International Airport to pay $260,000
|
|
for 100,000 credit card numbers with credit limits that ranged up to
|
|
$25,000 each.
|
|
|
|
After decrypting and checking that the information was valid, Salgado
|
|
was taken into custody at his parents' house in Daly City. Salgado
|
|
waived his rights and acknowledged breaking into computers, including
|
|
the San Diego company, according to the affidavit.
|
|
|
|
The FBI has not found any evidence Salgado made any purchases with the
|
|
numbers himself, the spokesman said, but the investigation is
|
|
continuing.
|
|
|
|
Salgado appeared before a federal magistrate Thursday and was released
|
|
on a $100,000 personal bond. Grotz said that as a condition of bail,
|
|
"the judge forbids him to come anywhere near a computer."
|
|
|
|
|
|
0x4>-------------------------------------------------------------------------
|
|
|
|
Title: MS Security Plugs Not Airtight
|
|
Source: unknown
|
|
Author: Nick Wingfield
|
|
|
|
(May 22, 1997, 12:45 p.m. PT) Microsoft (MSFT) is still struggling to
|
|
completely patch Windows 95 and NT against Internet hacker attacks.
|
|
|
|
The company has posted a software patch that protects Windows 95 users
|
|
from an attack that can crash their computers. The company issued a
|
|
similar patch for Windows NT last week.
|
|
|
|
But both the Windows NT and 95 patches aren't complete prophylactics for
|
|
so-called out-of-band data attacks since both platforms can still be
|
|
crashed by hackers with Macintosh and Linux computers. Microsoft said
|
|
today that it hopes to post new patches by tonight that remedy the
|
|
vulnerability to Mac- and Linux-based attacks.
|
|
|
|
The current Windows 95 patch--without protection for Mac and Linux
|
|
attacks--can be downloaded for free from Microsoft's Web site.
|
|
|
|
This year, Microsoft programmers have been forced to create a medicine
|
|
chest of software remedies to fix potential security risks in everything
|
|
from the Internet Explorer browser to PowerPoint to Windows itself. Some
|
|
security experts believe the company is struggling with deep-rooted
|
|
vulnerabilities in its OS and Internet technologies.
|
|
|
|
It's clear that the Internet has made it much easier for enterprising
|
|
bug-finders to broadcast their discoveries to the press and public over
|
|
email lists and Web pages. This has put intense pressure on
|
|
Microsoft's engineering groups to quickly come up with patches.
|
|
|
|
Other companies, such as Sun Microsystems, have also had to release a
|
|
number of patches for their technologies, but Microsoft has been
|
|
especially hard-hit.
|
|
|
|
A number of security experts believe that Microsoft would have had a
|
|
hard time avoiding these security problems.
|
|
|
|
"As a professional programmer, I have a real hard time saying that
|
|
Microsoft should have seen this coming," said David LeBlanc, senior
|
|
Windows NT security manager at Internet Security Systems, a developer of
|
|
security software. "I get hit with this stuff too. With 20/20 hindsight,
|
|
it's really obvious to see what we did wrong. Trying to take into
|
|
account all the possibilities that can occur beforehand is not
|
|
realistic."
|
|
|
|
In order to exploit the latest vulnerability, Web sites must send a
|
|
special TCP/IP command known as "out of band data" to port 139 of a
|
|
computer running Windows 95 or NT. Hackers could also target users' PCs
|
|
by using one of several programs for Windows, Unix, and Macintosh now
|
|
circulating on the Net. With one program, called WinNuke, a hacker
|
|
simply types a user's Internet protocol address and then clicks the
|
|
program's "nuke" button in order to crash a PC over the Net.
|
|
|
|
The company's original patch for Windows NT prevents attacks from Unix
|
|
and other Windows computers. But because of a difference in the way
|
|
Mac and Linux computers handle the TCP protocol, Microsoft's patch
|
|
didn't squelch attacks from those operating systems.
|
|
|
|
[Bullshit meter: ****- - In actuality, Microsoft just decided to
|
|
filter hits on that port looking for a keyword included in the
|
|
first 'winuke' script. By changing that word, 95 was once again
|
|
vulnerable to these attacks. Good work Microsoft.]
|
|
|
|
A number of users have sent email to CNET's NEWS.COM complaining that
|
|
their computers were repeatedly crashed as they chatted in Internet
|
|
relay chat groups. When users are nuked by a hacker, their computer
|
|
screens often display an error message loosely known as the "blue screen
|
|
of death."
|
|
|
|
"The worst part about it is that the delinquents playing with this toy
|
|
really like to play with it and keep on doing it," said Martin A.
|
|
Childs, a law student at Louisiana State University in Baton Rouge. "The
|
|
first time I got hit, I logged on six times before I managed to figure
|
|
out what was going on."
|
|
|
|
The original patches for Windows NT versions 4.0 and 3.51 are available
|
|
on Microsoft's Web site. Last Thursday, the company also posted a
|
|
collection of software patches, called service pack 3, that contains the
|
|
NT out-of-band fix.
|
|
|
|
The out-of-band data attacks also affect users of Windows 3.11, but a
|
|
company spokeswoman said that Microsoft will not prepare a fix for that
|
|
platform unless users request one.
|
|
|
|
0x5>-------------------------------------------------------------------------
|
|
|
|
Title: BSA slams DTI's Encryption Plans
|
|
Source: The IT Newspaper
|
|
Author: unknown
|
|
Date: 26th June 1997
|
|
|
|
|
|
Government Proposals on encryption are 'unworkable, unfar, unweildy,
|
|
un-needed and frankly unacceptable', according to the British Software
|
|
Alliance (BSA) and the British Interactive Multimedia Association (Bima),
|
|
writes Tim Stammers.
|
|
|
|
In a joint statement, the organizations claimed that encryption
|
|
proposals from the DTI could 'cripple the growth of electronic comerce in
|
|
the UK'.
|
|
|
|
Tod Cohen, lawyer at Covington & Berling, council to the BSA, said:
|
|
'These proposals could be a disaster for both users and vendors'.
|
|
|
|
The DTI's plan calls for UK organisations which want to encrypt email
|
|
and data to supply copies of their encryption keys to third parties.
|
|
|
|
Government agencies will then be able to demand access to copies of the
|
|
keys. The DTI says the scheme aims to prevent criminal use of encryption
|
|
by drug dealers and terrorists.
|
|
|
|
But the BSA and BIMA claim that the proposed tystem will create a
|
|
massive bureaucratic structure will criminals will ignore.
|
|
|
|
'The sheer number of electronic communications could easily overwhelm
|
|
the system, without inreasing security or safety within the UK', their
|
|
statement said.
|
|
|
|
Sean Nye, executive member of Bima, said : 'In an age where personal
|
|
data and information is increasingly threatened with unwarranted
|
|
exposure, the DTI's proposals are a major step backwards'.
|
|
|
|
Opposition to the so-called key escrow system suggested by the DTI has
|
|
been widespread. Public opponents include Brian Gladman, former deputy
|
|
director at Nato's labratories.
|
|
|
|
The proposals where formulated under the last government, and a
|
|
decision on their future is expected next month.
|
|
|
|
The US government is easing encryption export controls for software
|
|
companies which are prepared to back key escrow, but has met Senate
|
|
opposition to its plans.
|
|
|
|
0x6>-------------------------------------------------------------------------
|
|
|
|
Title: Teen bypasses blocking software
|
|
Sounce: www.news.com
|
|
Author: Courtney Macavinta
|
|
Date: April 22, 1997, 5:30 p.m. PT
|
|
|
|
A teenager is using his Web site to help others bypass one brand
|
|
of filtering software intended to protect minors from illicit Net
|
|
material.
|
|
|
|
Using the "CYBERsitter codebreaker" from 18-year-old Bennett
|
|
Haselton, surfers can now decode the list of all Net sites
|
|
blocked by Solid Oak's Cybersitter software.
|
|
|
|
Haselton--the founder of a teen organization called Peacefire
|
|
that fights Net censorship--contends that the software violates
|
|
free speech rights for adults and teen-agers. He claims the
|
|
software is also falsely advertised because it promises parents
|
|
the "ability to limit their children's access to objectionable
|
|
material on the Internet," but also blocks other content on the
|
|
Net.
|
|
|
|
Haselton's campaign to get around Cybersitter has Solid Oak's
|
|
president seeing red.
|
|
|
|
Solid Oak denies Haselton's charges and is investigating the
|
|
legality of the code-breaking program. "He doesn't know anything,
|
|
and he's just a kid," Solid Oak President Brian Milburn said
|
|
today. "We have never misrepresented our product--ever."
|
|
|
|
Haselton's Cybersitter codebreaker can be used to crack a coded
|
|
list of the sites that CYBERsitter blocks. The list is
|
|
distributed to subscribers to notify users what sites are being
|
|
blocked. Subscribers pay $39.95 for the software.
|
|
|
|
The software blocks sites containing any words describing
|
|
genitals, sex, nudity, porn, bombs, guns, suicide, racial slurs
|
|
and other violent, sexual and derogatory terms.
|
|
|
|
The list also blocks an array of sites about gay and lesbian
|
|
issues, including PlanetOut and the International Gay and Lesbian
|
|
Human Rights Commission . Cybersitter even blocks the National
|
|
Organization for Women because it contains information about
|
|
lesbianism, Solid Oak stated. "The NOW site has a bunch of
|
|
lesbian stuff on it, and our users don't want it," said Milburn.
|
|
|
|
The software also filters any site that contains the phrase
|
|
"Don't buy CYBERsitter" as well as Haselton's own site and any
|
|
reference to his name.
|
|
|
|
Milburn says Haselton's campaign is hurting the product's
|
|
marketability and hinted that the company will stop him, but
|
|
wouldn't say exactly how.
|
|
|
|
"We have users who think they purchased a secure product. This is
|
|
costing us considerably," Milburn said. "But we're not going to
|
|
let Bennett break the law."
|
|
|
|
He did point out that Haselton's program to decode the software
|
|
may violate its licensing agreement, which states: "Unauthorized
|
|
reverse engineering of the Software, whether for educational,
|
|
fair use, or other reason is expressly forbidden. Unauthorized
|
|
disclosure of CYBERsitter operational details, hacks, work around
|
|
methods, blocked sites, and blocked words or phrases are
|
|
expressly prohibited."
|
|
|
|
Haselton is undaunted by the suggestion of legal reprecussions.
|
|
"I've talked to a lawyer who offered to represent me in the event
|
|
that Cybersitter goes after me," he added.
|
|
|
|
Haselton, a junior at Vanderbuilt University, argues that the
|
|
software doesn't protect kids from smut, but just keeps them from
|
|
learning new ideas.
|
|
|
|
"Blocking software is not the solution to all of our problems.
|
|
What's dangerous is not protecting [teenagers' free] speech on
|
|
the Net as well," he said. "This is the age, when you form your
|
|
opinions about social issues, human rights, and religion. We need
|
|
to keep free ideas on the Net for people under 18."
|
|
|
|
Haselton's organization is also a plaintiff in a lawsuit being
|
|
argued today in New York, the American Library Association vs.
|
|
Governor George Pataki. The case was filed to strike down a state
|
|
law similar to the Communications Decency Act that prohibits
|
|
making indecent material available to minors over the Net.
|
|
|
|
0x7>-------------------------------------------------------------------------
|
|
|
|
Title: The Power to Moderate is the Power to Censor
|
|
Source: unknown
|
|
Author: Paul Kneisel
|
|
|
|
Some 200+ new news groups have just been created on the UseNet part of the
|
|
Internet. They are grouped under a new <gov.*> hierarchy.
|
|
|
|
<gov.*> promises to "take democracy into cyberspace," according to the
|
|
press release from the National Science Foundation.[1] "The U.S.
|
|
government," said U.S. Vice President Al Gore of the GovNews project, "is
|
|
taking a leadership role in providing technology that could change the face
|
|
of democracy around the world."[2]
|
|
|
|
The GovNews project repeatedly stresses how it will support and promote
|
|
feedback between governments and citizens. "Millions of people will now be
|
|
able to follow and comment on government activity in selected areas of
|
|
interest...," the release stated, promising "a wide, cost-effective
|
|
electronic dissemination and discussion...."
|
|
|
|
Preston Rich, the National Science Foundation's leader of the International
|
|
GovNews Project, described GovNews as "newsgroups logically organized by
|
|
topic from privatization, procurements and emergency alerts to toxic waste
|
|
and marine resources and include[s] the capability to discuss such
|
|
information."[1]
|
|
|
|
The vast majority of the new <gov.*> groups are moderated.
|
|
|
|
The idea of the moderated news
|
|
group is increasingly accepted on UseNet. Off-topic posts, flames, and spam
|
|
have made many non-moderated groups effectively unreadable by most users.
|
|
Moderated groups are one effective way around these problems. New groups
|
|
created in the non-<gov.*> "Big 8" UseNet hierarchy have formal charters
|
|
defining the group. If the group is moderated then the powers, identity,
|
|
and qualifications of the moderators are also listed. Unmoderated groups
|
|
might be likened to informal free-for-all debates where there is no check
|
|
on who can participate or on the form or content of what is said. Moderated
|
|
groups are far closer to a specially-defined meeting of citizens with a
|
|
formal Chair, empowered to declare certain topics off-limits for
|
|
discussion, and to call unruly participants to order.
|
|
|
|
An unmoderated UseNet group dedicated to baking cookies might be flooded
|
|
with posts advertising bunion cures, reports of flying saucers sighted over
|
|
Buckingham Palace, or articles denouncing Hillary Clinton as a Satanist. A
|
|
moderator for the group has the power to block all of these posts, ensuring
|
|
that they are not sent to the UseNet feed and do not appear among the
|
|
on-topic discussion of cookies.
|
|
|
|
Certainly some moderators on UseNet groups abuse their powers (as do some
|
|
Chairs at non-Internet meetings.) But reports of such abuse are relatively
|
|
rare given the number of moderated groups. And, of course, many complaints
|
|
come from the proverbial "net.kooks" or those who oppose moderation in
|
|
general.
|
|
|
|
Moderators in the "Big 8" UseNet hierarchy are "civilians," not government
|
|
employees moderating government-related groups while collecting government
|
|
paychecks.
|
|
|
|
The <gov.*> hierarchy inferentially changes this. I write "inferentially"
|
|
because the charters, names and qualifications of the moderators in the
|
|
200+ groups has not been formally announced. Nor do routine queries to
|
|
members of the <gov.*> leading Hierarchial Coordinating Committee result in
|
|
such detailed information.
|
|
|
|
UseNet is not the entire Internet. Net-based technology like the World Wide
|
|
Web and the "File Transfer Protocol" or FTP are designed for the one-way
|
|
transmission of data. Few object to the _Congressional Record_ on-line or
|
|
crop reports posted by the U.S. Department of Agriculture available on the
|
|
Web or via FTP. But the news groups of UseNet are designed for two-way
|
|
discussions, not spam-like one-way info-floods of data carefully selected
|
|
by government bureaucrats.
|
|
|
|
That creates an enormous problem when government employees moderate the
|
|
discussion, regardless of how well, appropriately, or fairly the moderation
|
|
is conducted.
|
|
|
|
For government moderation of any discussion is censorship and it is wrong.
|
|
|
|
Initial reports also indicate that most of the <gov.*> groups will be "robo
|
|
[t]-moderated." In other words, specialized software programs will handle
|
|
the bulk of the moderator's tasks. Robo-moderation, however, alters
|
|
nothing. A good robo program may catch and eliminate 99% of the spam sent
|
|
to the group or identify notorious flame-artists. But the power to
|
|
robo-moderate remains the power to censor; the power to select one
|
|
robo-moderator is the power to select another; the power to automatically
|
|
remove bunion ads is simultaneously the power to eliminate all posts from
|
|
Iraq in a political discussion or any message containing the string
|
|
"Whitewater."
|
|
|
|
In short, moderation on <gov.*> groups by government employees remains
|
|
censorship whether conducted by software or humans, whether posts are
|
|
approriately banned or the moderation places severe limits on free
|
|
political speech. *Any* limitation of posts from any citizen by any
|
|
government employee is censorship.
|
|
|
|
It is also forbidden by law.
|
|
|
|
FOOTNOTES
|
|
[1] "GOVNEWS: N[ational] S[cience] F[oundation] Press Release for GovNews,"
|
|
17 Mar 1997, <http://www.govnews.org/govnews/info/press.html>, accessed 21
|
|
Mar 1997.
|
|
|
|
[2] One wonders what technology Gore believes GovNews is providing.
|
|
Certainly neither the Internet or UseNet is part of that technology for
|
|
both existed long before GovNews.^Z
|
|
|
|
0x8>-------------------------------------------------------------------------
|
|
|
|
Title: AOL Users in Britain Warned of Surveillance
|
|
Source: unknown
|
|
Author: CHristopher Johnston
|
|
|
|
LONDON - Subscribers logging onto AOL Ltd. in Britain this week
|
|
were greeted with news that the Internet-service provider was
|
|
imposing a tough new contract giving it wide latitude to disclose
|
|
subscribers' private E-mail and on-line activities to law
|
|
enforcement and security agencies.
|
|
|
|
The new contract also requires users to comply with both British
|
|
and U.S. export laws governing encryption. AOL Ltd. is a
|
|
subsidiary of AOL Europe, which is a joint venture between
|
|
America Online Inc. of the United States and Germany's
|
|
Bertelsmann GmbH.
|
|
|
|
The contract notes in part that AOL ''reserves the right to
|
|
monitor or disclose the contents of private communication over
|
|
AOL and your data to the extent permitted or required by law.''
|
|
|
|
''It's bad news,'' said Marc Rotenberg, director of the
|
|
Electronic Privacy Information Center, a Washington-based civil
|
|
liberties organization. ''I think AOL is putting up a red flag
|
|
that their commitment to privacy is on the decline. It puts
|
|
their users on notice that to the extent permitted by law, they
|
|
can do anything they want.''
|
|
|
|
The contract also prohibits subscribers from posting or
|
|
transmitting any content that is ''unlawful, harmful,
|
|
threatening, abusive, harassing, defamatory, vulgar, obscene,
|
|
seditious, blasphemous, hateful, racially, ethnically or
|
|
otherwise objectionable.''
|
|
|
|
AOL and its competitors called the move part of a trend to
|
|
protect on-line service providers from suits by users in case
|
|
they are required to disclose subscribers' activities to law
|
|
enforcement agencies.
|
|
|
|
The contract also beefed up the legal wording relating to
|
|
sensitive content such as pornography, and prohibiting the
|
|
maintenance of links to obscene Web sites.
|
|
|
|
The updated contract is also the first to inform subscribers that
|
|
they are required to comply with both British and U.S. export
|
|
laws governing encryption, or coding, a hot topic of debate
|
|
recently between software publishers and security agencies.
|
|
|
|
AOL Europe will provide similar contracts, which vary according
|
|
to local law in each of the seven European countries in which the
|
|
network operates.
|
|
|
|
AOL executives denied any government pressure in updating the
|
|
contract.
|
|
|
|
0x9>-------------------------------------------------------------------------
|
|
|
|
Title: Georgia Expands the "Instruments of Crime"
|
|
Source: fight-censorship@vorlon.mit.edu
|
|
|
|
In Georgia it is a crime, punishable by $30K and four years to use in
|
|
furtherance of a crime:
|
|
|
|
* a telephone
|
|
* a fax machine
|
|
* a beeper
|
|
* email
|
|
|
|
The actual use of the law, I think, is that when a person is selling drugs
|
|
and either is in possession of a beeper, or admits to using the phone to
|
|
facilitate a meeting, he is charged with the additional felony of using a
|
|
phone. This allows for selective enforcement of additional penalties for
|
|
some people.
|
|
|
|
O.C.G.A. 16-13-32.3.
|
|
|
|
(a) It shall be unlawful for any person knowingly or intentionally to
|
|
use any communication facility in committing or in causing or
|
|
facilitating the commission of any act or acts constituting a felony
|
|
under this chapter. Each separate use of a communication facility
|
|
shall be a separate offense under this Code section. For purposes of
|
|
this Code section, the term "communication facility" means any and all
|
|
public and private instrumentalities used or useful in the
|
|
transmission of writing, signs, signals, pictures, or sounds of all
|
|
kinds and includes mail, telephone, wire, radio, computer or computer
|
|
network, and all other means of communication.
|
|
|
|
(b) Any person who violates subsection (a) of this Code section shall
|
|
be punished by a fine of not more than $30,000.00 or by imprisonment
|
|
for not less than one nor more than four years, or both.
|
|
|
|
0xa>-------------------------------------------------------------------------
|
|
|
|
Title: NASA Nabs Teen Computer Hacker
|
|
Source: Associated Press
|
|
Author: unknown
|
|
Date: Monday, June 2, 1997
|
|
|
|
WASHINGTON (AP) - A Delaware teen-ager who hacked his way into a
|
|
NASA web site on the Internet and left a message berating U.S.
|
|
officials is being investigated by federal authorities, agency
|
|
officials said Monday.
|
|
|
|
NASA Inspector General Robert Gross cited the incident - the most
|
|
recent example of a computer invasion of a NASA web site - as an
|
|
example of how the space agency has become ``vulnerable via the
|
|
Internet.''
|
|
|
|
"We live in an information environment vastly different than 20
|
|
years ago," Gross said in a written statement. "Hackers are
|
|
increasing in number and in frequency of attack."
|
|
|
|
In the latest case, the Delaware teen, whose name, age and
|
|
hometown were not released, altered the Internet web site for the
|
|
Marshall Space Flight Center in Huntsville, Ala., according to
|
|
the statement from the computer crimes division of NASA's
|
|
Inspector General Office.
|
|
|
|
"We own you. Oh, what a tangled web we weave, when we practice to
|
|
deceive," the teen's message said, adding that the government
|
|
systems administrators who manage the site were "extremely
|
|
stupid."
|
|
|
|
The message also encouraged sympathizers of Kevin Mitnick, a
|
|
notorious computer hacker, to respond to the site. Mitnick was
|
|
indicted last year on charges stemming from a multimillion-dollar
|
|
crime wave in cyberspace.
|
|
|
|
The altered message was noticed by the computer security team in
|
|
Huntsville but the NASA statement did not mention how long the
|
|
message was available to the public or exactly when it was
|
|
discovered. NASA officials weren't made available to answer
|
|
questions about the event.
|
|
|
|
In the statement, NASA called the teen's hacking "a cracking
|
|
spree" and said it was stopped May 26 when his personal computer
|
|
was seized.
|
|
|
|
Prosecutors from the U.S. Attorney's office in Delaware and
|
|
Alabama are handling the case with NASA's computer crimes
|
|
division.
|
|
|
|
Last March, cyberspace invaders made their way into another NASA
|
|
web site and threatened an electronic terrorist attack against
|
|
corporate America. The group, which called itself ``H4G1S'' in
|
|
one message and ``HAGIS'' in another, also called for some
|
|
well-known hackers to be released from jail.
|
|
|
|
Engineers at the Goddard Space Flight Center in Greenbelt, Md.,
|
|
quickly noticed the change and took the page off the Internet
|
|
within 30 minutes. NASA officials said the agency installed
|
|
electronic security measures designed to prevent a recurrence.
|
|
|
|
0xb>-------------------------------------------------------------------------
|
|
|
|
Title: Agriculture Dept. Web Site Closed after Security Breach
|
|
Source: Reuter
|
|
Author: unknown
|
|
|
|
WASHINGTON (June 11, 1997 00:08 a.m. EDT) - The U.S. Agriculture
|
|
Department's Foreign Agricultural Service shut down access to its
|
|
internet home page Tuesday after a major security breach was
|
|
discovered, a department aide said.
|
|
|
|
"It's a big, huge problem," Ed Desrosiers, a computer specialist
|
|
in USDA's Farm Service Agency, told Reuters. "We can't guarantee
|
|
anything's clean anymore."
|
|
|
|
Someone broke into system and began "sending out a lot of
|
|
messages" to other "machines" on the internet, Desrosiers said.
|
|
|
|
The volume of traffic was so great, "we were taking down machines"
|
|
and began receiving complaints, he said.
|
|
|
|
"It's not worth our time to try to track down" the culprit,
|
|
Desrosiers said. "Instead, we're just going to massively increase
|
|
security."
|
|
|
|
A popular feature on the FAS home page is the search function for
|
|
"attache reports," which are filed by overseas personnel and
|
|
provide assessments on crop conditions around the world. Although
|
|
not official data, the reports provide key information that goes
|
|
into USDA's monthly world supply-and-demand forecasts.
|
|
|
|
It could be next week before the page is open to outside users
|
|
again, Desrosiers said.
|
|
|
|
0xc>-------------------------------------------------------------------------
|
|
|
|
Title: Hackers Smash US Government Encryption Standard
|
|
Source: fight-censorship@vorlon.mit.edu
|
|
|
|
Oakland, California (June 18, 1997)-The 56-bit DES encryption
|
|
standard, long claimed "adequate" by the U.S. Government, was
|
|
shattered yesterday using an ordinary Pentium personal computer
|
|
operated by Michael K. Sanders, an employee of iNetZ, a Salt Lake
|
|
City, Utah-based online commerce provider. Sanders was part of a
|
|
loosely organized group of computer users responding to the "RSA
|
|
$10,000 DES Challenge." The code-breaking group distributed computer
|
|
software over the Internet for harnessing idle moments of computers
|
|
around the world to perform a 'brute force' attack on the encrypted
|
|
data.
|
|
|
|
"That DES can be broken so quickly should send a chill through the
|
|
heart of anyone relying on it for secure communications," said Sameer
|
|
Parekh, one of the group's participants and president of C2Net
|
|
Software, an Internet encryption provider headquartered in Oakland,
|
|
California (http://www.c2.net/). "Unfortunately, most people today
|
|
using the Internet assume the browser software is performing secure
|
|
communications when an image of a lock or a key appears on the
|
|
screen. Obviously, that is not true when the encryption scheme is
|
|
56-bit DES," he said.
|
|
|
|
INetZ vice president Jon Gay said "We hope that this will encourage
|
|
people to demand the highest available encryption security, such as
|
|
the 128-bit security provided by C2Net's Stronghold product, rather
|
|
than the weak 56-bit ciphers used in many other platforms."
|
|
|
|
Many browser programs have been crippled to use an even weaker, 40-bit
|
|
cipher, because that is the maximum encryption level the
|
|
U.S. government has approved for export. "People located within the US
|
|
can obtain more secure browser software, but that usually involves
|
|
submitting an affidavit of eligibility, which many people have not
|
|
done," said Parekh. "Strong encryption is not allowed to be exported
|
|
from the U.S., making it harder for people and businesses in
|
|
international locations to communicate securely," he explained.
|
|
|
|
According to computer security expert Ian Goldberg, "This effort
|
|
emphasizes that security systems based on 56-bit DES or
|
|
"export-quality" cryptography are out-of-date, and should be phased
|
|
out. Certainly no new systems should be designed with such weak
|
|
encryption.'' Goldberg is a member of the University of California at
|
|
Berkeley's ISAAC group, which discovered a serious security flaw in
|
|
the popular Netscape Navigator web browser software.
|
|
|
|
The 56-bit DES cipher was broken in 5 months, significantly faster
|
|
than the hundreds of years thought to be required when DES was adopted
|
|
as a national standard in 1977. The weakness of DES can be traced to
|
|
its "key length," the number of binary digits (or "bits") used in its
|
|
encryption algorithm. "Export grade" 40-bit encryption schemes can be
|
|
broken in less than an hour, presenting serious security risks for
|
|
companies seeking to protect sensitive information, especially those
|
|
whose competitors might receive code-breaking assistance from foreign
|
|
governments.
|
|
|
|
According to Parekh, today's common desktop computers are tremendously
|
|
more powerful than any computer that existed when DES was
|
|
created. "Using inexpensive (under $1000) computers, the group was
|
|
able to crack DES in a very short time," he noted. "Anyone with the
|
|
resources and motivation to employ modern "massively parallel"
|
|
supercomputers for the task can break 56-bit DES ciphers even faster,
|
|
and those types of advanced technologies will soon be present in
|
|
common desktop systems, providing the keys to DES to virtually
|
|
everyone in just a few more years."
|
|
|
|
56-bit DES uses a 56-bit key, but most security experts today consider
|
|
a minimum key length of 128 bits to be necessary for secure
|
|
encryption. Mathematically, breaking a 56-bit cipher requires just
|
|
65,000 times more work than breaking a 40-bit cipher. Breaking a
|
|
128-bit cipher requires 4.7 trillion billion times as much work as one
|
|
using 56 bits, providing considerable protection against brute-force
|
|
attacks and technical progress.
|
|
|
|
C2Net is the leading worldwide provider of uncompromised Internet
|
|
security software. C2Net's encryption products are developed entirely
|
|
outside the United States, allowing the firm to offer full-strength
|
|
cryptography solutions for international communications and
|
|
commerce. "Our products offer the highest levels of security available
|
|
today. We refuse to sell weak products that might provide a false
|
|
sense of security and create easy targets for foreign governments,
|
|
criminals, and bored college students," said Parekh. "We also oppose
|
|
so-called "key escrow" plans that would put everyone's cryptography
|
|
keys in a few centralized locations where they can be stolen and sold
|
|
to the highest bidder," he added. C2Net's products include the
|
|
Stronghold secure web server and SafePassage Web Proxy, an enhancement
|
|
that adds full-strength encryption to any security-crippled "export
|
|
grade" web browser software.
|
|
|
|
0xd>-------------------------------------------------------------------------
|
|
|
|
Title: Hacker May Stolen JonBenet computer Documents
|
|
Source: Associated Press
|
|
Author: Jennifer Mears
|
|
|
|
BOULDER, Colo. (June 13, 1997 07:38 a.m. EDT) -- A computer hacker has
|
|
infiltrated the system set aside for authorities investigating the slaying
|
|
of JonBenet Ramsey, the latest blow to a heavily criticized inquiry.
|
|
|
|
[...despite the computer not being online or connected to other computers..]
|
|
|
|
Boulder police spokeswoman Leslie Aaholm said the computer was "hacked"
|
|
sometime early Saturday. The incident was announced by police Thursday.
|
|
|
|
"We don't believe anything has been lost, but we don't know what, if
|
|
anything, has been copied," said Detective John Eller, who is leading the
|
|
investigation into the slaying of the 6-year-old girl nearly six months ago.
|
|
|
|
The computer is in a room at the district attorney's office that police
|
|
share with the prosecutor's investigators. The room apparently had not been
|
|
broken into. Computer experts with the Colorado Bureau of Investigations
|
|
were examining equipment to determine what had been done.
|
|
|
|
[Bullshit. It was later found out that the machine was not hacked at all.]
|
|
|
|
0xe>-------------------------------------------------------------------------
|
|
|
|
Title: Hacker Vows 'Terror' for Pornographers
|
|
Source: Wired
|
|
Author: Steve Silberman
|
|
|
|
After 17 years in the hacker underground, Christian Valor - well known
|
|
among old-school hackers and phone phreaks as "Se7en" - was convinced
|
|
that most of what gets written in the papers about computers and hacking
|
|
is sensationalistic jive. For years, Valor says, he sneered at reports
|
|
of the incidence of child pornography on the Net as
|
|
"exaggerated/over-hyped/fearmongered/bullshit."
|
|
|
|
Now making his living as a lecturer on computer security, Se7en claims
|
|
he combed the Net for child pornography for eight weeks last year
|
|
without finding a single image.
|
|
|
|
That changed a couple of weeks ago, he says, when a JPEG mailed by an
|
|
anonymous prankster sent him on an odyssey through a different kind of
|
|
underground: IRC chat rooms with names like #littlegirlsex, ftp
|
|
directories crammed with filenames like 6yoanal.jpg and 8&dad.jpg, and
|
|
newsgroups like alt.binaries.pictures.erotica.pre-teen. The anonymous
|
|
file, he says, contained a "very graphic" image of a girl "no older
|
|
than 4 years old."
|
|
|
|
On 8 June, Se7en vowed on a hacker's mailing list to deliver a dose of
|
|
"genuine hacker terror" to those who upload and distribute such images
|
|
on the Net. The debate over his methods has stirred up tough questions
|
|
among his peers about civil liberties, property rights, and the ethics
|
|
of vigilante justice.
|
|
|
|
A declaration of war
|
|
|
|
What Se7en tapped into, he says, was a "very paranoid" network of
|
|
traders of preteen erotica. In his declaration of "public war" -
|
|
posted to a mailing list devoted to an annual hacker's convention
|
|
called DefCon - Se7en explains that the protocol on most child-porn
|
|
servers is to upload selections from your own stash, in exchange for
|
|
credits for more images.
|
|
|
|
What he saw on those servers made him physically sick, he says. "For
|
|
someone who took a virtual tour of the kiddie-porn world for only one
|
|
day," he writes, "I had the opportunity to fully max out an Iomega
|
|
100-MB Zip disc."
|
|
|
|
Se7en's plan to "eradicate" child-porn traders from the Net is
|
|
"advocating malicious, destructive hacking against these people." He
|
|
has enlisted the expertise of two fellow hackers for the first wave of
|
|
attacks, which are under way.
|
|
|
|
Se7en feels confident that legal authorities will look the other way
|
|
when the victims of hacks are child pornographers - and he claims that
|
|
a Secret Service agent told him so explicitly. Referring to a command
|
|
to wipe out a hard drive by remote access, Se7en boasted, "Who are
|
|
they going to run to? The police? 'They hacked my kiddie-porn server
|
|
and rm -rf'd my computer!' Right."
|
|
|
|
Se7en claims to have already "taken down" a "major player" - an
|
|
employee of Southwestern Bell who Se7en says was "posting ads all over
|
|
the place." Se7en told Wired News that he covertly watched the man's
|
|
activities for days, gathering evidence that he emailed to the
|
|
president of Southwestern Bell. Pseudonymous remailers like
|
|
hotmail.com and juno.com, Se7en insists, provide no security blanket
|
|
for traders against hackers uncovering their true identities by
|
|
cracking server logs. Se7en admits the process of gaining access to
|
|
the logs is time consuming, however. Even with three hackers on the
|
|
case, it "can take two or three days. We don't want to hit the wrong
|
|
person."
|
|
|
|
A couple of days after submitting message headers and logs to the
|
|
president and network administrators of Southwestern Bell, Se7en says,
|
|
he got a letter saying the employee was "no longer on the payroll."
|
|
|
|
The hacker search for acceptance
|
|
|
|
Se7en's declaration of war received support on the original mailing
|
|
list. "I am all for freedom of speech/expression," wrote one poster,
|
|
"but there are some things that are just wrong.... I feel a certain
|
|
moral obligation to the human race to do my part in cleaning up the
|
|
evil."
|
|
|
|
Federal crackdowns targeting child pornographers are ineffective, many
|
|
argued. In April, FBI director Louis Freeh testified to the Senate
|
|
that the bureau operation dubbed "Innocent Images" had gathered the
|
|
names of nearly 4,000 suspected child-porn traffickers into its
|
|
database. Freeh admitted, however, that only 83 of those cases
|
|
resulted in convictions. (The Washington Times reports that there have
|
|
also been two suicides.)
|
|
|
|
The director's plan? Ask for more federal money to fight the "dark
|
|
side of the Internet" - US$10 million.
|
|
|
|
Pitching in to assist the Feds just isn't the hacker way. As one
|
|
poster to the DefCon list put it, "The government can't enforce laws
|
|
on the Internet. We all know that. We can enforce laws on the
|
|
Internet. We all know that too."
|
|
|
|
The DefCon list was not a unanimous chorus of praise for Se7en's plan
|
|
to give the pornographers a taste of hacker terror, however. The most
|
|
vocal dissenter has been Declan McCullagh, Washington correspondent
|
|
for the Netly News. McCullagh is an outspoken champion of
|
|
constitutional rights, and a former hacker himself. He says he was
|
|
disturbed by hackers on the list affirming the validity of laws
|
|
against child porn that he condemns as blatantly unconstitutional.
|
|
|
|
"Few people seem to realize that the long-standing federal child-porn
|
|
law outlawed pictures of dancing girls wearing leotards," McCullagh
|
|
wrote - alluding to the conviction of Stephen Knox, a graduate student
|
|
sentenced to five years in prison for possession of three videotapes
|
|
of young girls in bathing suits. The camera, the US attorney general
|
|
pointed out, lingered on the girls' genitals, though they remained
|
|
clothed. "The sexual implications of certain modes of dress, posture,
|
|
or movement may readily put the genitals on exhibition in a lascivious
|
|
manner, without revealing them in a nude display," the Feds argued -
|
|
and won.
|
|
|
|
It's decisions like Knox v. US, and a law criminalizing completely
|
|
synthetic digital images "presented as" child porn, McCullagh says,
|
|
that are making the definition of child pornography unacceptably
|
|
broad: a "thought crime."
|
|
|
|
The menace of child porn is being exploited by "censor-happy"
|
|
legislators to "rein in this unruly cyberspace," McCullagh says. The
|
|
rush to revile child porn on the DefCon list, McCullagh told Wired
|
|
News, reminded him of the "loyalty oaths" of the McCarthy era.
|
|
|
|
"These are hackers in need of social acceptance," he says. "They've
|
|
been marginalized for so long, they want to be embraced for stamping
|
|
out a social evil." McCullagh knows his position is a difficult one to
|
|
put across to an audience of hackers. In arguing that hackers respect
|
|
the property rights of pornographers, and ponder the constitutionality
|
|
of the laws they're affirming, McCullagh says, "I'm trying to convince
|
|
hackers to respect the rule of law, when hacking systems is the
|
|
opposite of that."
|
|
|
|
But McCullagh is not alone. As the debate over Se7en's declaration
|
|
spread to the cypherpunks mailing list and alt.cypherpunks -
|
|
frequented by an older crowd than the DefCon list - others expressed
|
|
similar reservations over Se7en's plan.
|
|
|
|
"Basically, we're talking about a Dirty Harry attitude," one network
|
|
technician/cypherpunk told Wired News. Though he senses "real feeling"
|
|
behind Se7en's battle cry, he feels that the best way to deal with
|
|
pornographers is to "turn the police loose on them." Another
|
|
participant in the discussion says that while he condemns child porn
|
|
as "terrible, intrinsically a crime against innocence," he questions
|
|
the effectiveness of Se7en's strategy.
|
|
|
|
"Killing their computer isn't going to do anything," he says,
|
|
cautioning that the vigilante approach could be taken up by others.
|
|
"What happens if you have somebody who doesn't like abortion? At what
|
|
point are you supposed to be enforcing your personal beliefs?"
|
|
|
|
Raising the paranoia level
|
|
|
|
Se7en's loathing for aficionados of newsgroups like
|
|
alt.sex.pedophilia.swaps runs deeper than "belief." "I myself was
|
|
abused when I was a kid," Se7en told Wired News. "Luckily, I wasn't a
|
|
victim of child pornography, but I know what these kids are going
|
|
through."
|
|
|
|
With just a few hackers working independently to crack server logs,
|
|
sniff IP addresses, and sound the alarm to network administrators, he
|
|
says, "We can take out one or two people a week ... and get the
|
|
paranoia level up," so that "casual traders" will be frightened away
|
|
from IRC rooms like "#100%preteensexfuckpics."
|
|
|
|
It's not JPEGs of clothed ballerinas that raise his ire, Se7en says.
|
|
It's "the 4-year-olds being raped, the 6-year-old forced to have oral
|
|
sex with cum running down themselves." Such images, Se7en admits, are
|
|
very rare - even in online spaces dedicated to trading sexual imagery
|
|
of children.
|
|
|
|
"I know what I'm doing is wrong. I'm trampling on the rights of these
|
|
guys," he says. "But somewhere in the chain, someone is putting these
|
|
images on paper before they get uploaded. Your freedom ends when you
|
|
start hurting other people."
|
|
|
|
0xf>-------------------------------------------------------------------------
|
|
|
|
Title: Mitnick Gets 22 Month Sentence
|
|
Source: LA Times
|
|
Author: Julie Tamaki
|
|
Date: Tuesday, June 17, 1997
|
|
|
|
A federal judge indicated Monday that she plans to sentence famed computer
|
|
hacker Kevin Mitnick to 22 months in prison for cellular phone fraud and
|
|
violating his probation from an earlier computer crime conviction.
|
|
|
|
The sentencing Monday is only a small part of Mitnick's legal problems.
|
|
Still pending against him is a 25-count federal indictment accusing him of
|
|
stealing millions of dollars in software during an elaborate hacking spree
|
|
while he was a fugitive. A trial date in that case has yet to be set.
|
|
|
|
U.S. District Judge Mariana R. Pfaelzer on Monday held off on formally
|
|
sentencing Mitnick for a week in order to give her time to draft conditions
|
|
for Mitnick's probation after he serves the prison term.
|
|
|
|
Pfaelzer said she plans to sentence Mitnick to eight months on the cellular
|
|
phone fraud charge and 14 months for violating his probation from a 1988
|
|
computer-hacking conviction, Assistant U.S. Atty. Christopher Painter said.
|
|
The sentences will run consecutively.
|
|
|
|
Mitnick faces the sentence for violating terms of his probation when he
|
|
broke into Pac Bell voice mail computers in 1992 and used stolen passwords
|
|
of Pac Bell security employees to listen to voice mail, Painter said. At the
|
|
time, Mitnick was employed by Teltec Communications, which was under
|
|
investigation by Pac Bell.
|
|
|
|
0x10>-------------------------------------------------------------------------
|
|
|
|
Title: New York Judge Prohibits State Regulation of Internet
|
|
Source: unknown
|
|
Author: unknown
|
|
Date: Friday, June 20, 1997
|
|
|
|
NEW YORK -- As the nation awaits a Supreme Court decision on
|
|
Internet censorship, a federal district judge here today blocked
|
|
New York State from enforcing its version of the federal
|
|
Communications Decency Act (CDA).
|
|
|
|
Ruling simultaneously in ACLU v. Miller, another ACLU challenge to
|
|
state Internet regulation, a Federal District Judge in Georgia
|
|
today struck down a law criminalizing online anonymous speech and
|
|
the use of trademarked logos as links on the World Wide Web.
|
|
|
|
In ALA v. Pataki, Federal District Judge Loretta A. Preska issued
|
|
a preliminary injunction against the New York law, calling the
|
|
Internet an area of commerce that should be marked off as a
|
|
"national preserve" to protect online speakers from inconsistent
|
|
laws that could "paralyze development of the Internet altogether."
|
|
|
|
Judge Preska, acknowledging that the New York act was "clearly
|
|
modeled on the CDA," did not address the First Amendment issues
|
|
raised by the ACLU's federal challenge, saying that the Commerce
|
|
Clause provides "fully adequate support" for the injunction and
|
|
that the Supreme Court would address the other issues in its
|
|
widely anticipated decision in Reno v. ACLU. (The Court's next
|
|
scheduled decision days are June 23, 25 and 26.)
|
|
|
|
"Today's decisions in New York and Georgia say that, whatever
|
|
limits the Supreme Court sets on Congress's power to regulate the
|
|
Internet, states are prohibited from acting to censor online
|
|
expression," said Ann Beeson, an ACLU national staff attorney who
|
|
argued the case before Judge Preska and is a member of the ACLU v.
|
|
Miller and Reno v. ACLU legal teams.
|
|
|
|
"Taken together, these decisions send a very important and
|
|
powerful message to legislators in the other 48 states that they
|
|
should keep their hands off the Internet," Beeson added.
|
|
|
|
In a carefully reasoned, 62-page opinion, Judge Preska warned of
|
|
the extreme danger that state regulation would pose to the
|
|
Internet, rejecting the state's argument that the statute would
|
|
even be effective in preventing so-called "indecency" from
|
|
reaching minors. Further, Judge Preska observed, the state can
|
|
already protect children through the vigorous enforcement of
|
|
existing criminal laws.
|
|
|
|
"In many ways, this decision is more important for the business
|
|
community than for the civil liberties community," said Chris
|
|
Hansen, a senior ACLU attorney on the ALA v. Pataki legal team and
|
|
lead counsel in Reno v. ACLU. "Legislatures are just about done
|
|
with their efforts to regulate the business of Internet 'sin,' and
|
|
have begun turning to the business of the Internet itself. Today's
|
|
decision ought to stop that trend in its tracks."
|
|
|
|
Saying that the law would reduce all speech on the Internet to a
|
|
level suitable for a six-year-old, the American Civil Liberties
|
|
Union, the New York Civil Liberties Union, the American Library
|
|
Association and others filed the challenge in January of this
|
|
year.
|
|
|
|
The law, which was passed by the New York legislature late last
|
|
year, provides criminal sanctions of up to four years in jail for
|
|
communicating so-called "indecent" words or images to a minor.
|
|
|
|
In a courtroom hearing before Judge Preska in April, the ACLU
|
|
presented a live Internet demonstration and testimony from
|
|
plaintiffs who said that their speech had already been "chilled"
|
|
by the threat of criminal prosecution.
|
|
|
|
"This is a big win for the people of the state of New York," said
|
|
Norman Siegel, Executive Director of the New York Civil Liberties
|
|
Union. "Today's ruling vindicates what we have been saying all
|
|
along to Governor Pataki and legislators, that they cannot legally
|
|
prevent New Yorkers from engaging in uninhibited, open and robust
|
|
freedom of expression on the Internet."
|
|
|
|
The ALA v. Pataki plaintiffs are: the American Library
|
|
Association, the Freedom to Read Foundation, the New York Library
|
|
Association, the American Booksellers Foundation for Free
|
|
Expression, Westchester Library System, BiblioBytes, Association
|
|
of American Publishers, Interactive Digital Software Association,
|
|
Magazine Publishers of America, Public Access Networks Corp.
|
|
(PANIX), ECHO, NYC Net, Art on the Net, Peacefire and the American
|
|
Civil Liberties Union.
|
|
|
|
Michael Hertz and others of the New York firm Latham & Watkins
|
|
provided pro-bono assistance to the ACLU and NYCLU; Michael
|
|
Bamberger of Sonnenschein Nath & Rosenthal in New York is also
|
|
co-counsel in the case. Lawyers from the ACLU are Christopher
|
|
Hansen, Ann Beeson and Art Eisenberg, legal director of the NYCLU.
|
|
|
|
0x11>-------------------------------------------------------------------------
|
|
|
|
Title: Breaking the Crypto Barrier
|
|
Source: Wired
|
|
Author: Chris Oakes
|
|
Date: 5:03am 20.Jun.97.PDT
|
|
|
|
Amid a striking convergence of events bearing on
|
|
US encryption policy this week, one development underlined what many see
|
|
as the futility of the Clinton administration's continuing effort to
|
|
block the export of strong encryption: The nearly instantaneous movement
|
|
of PGP's 128-bit software from its authorized home on a Web server at
|
|
MIT to at least one unauthorized server in Europe.
|
|
|
|
Shortly after Pretty Good Privacy's PGP 5.0 freeware was made available
|
|
at MIT on Monday, the university's network manager, Jeffrey Schiller,
|
|
says he read on Usenet that the software had already been transmitted to
|
|
a foreign FTP server. Ban or no ban, someone on the Net had effected the
|
|
instant export of a very strong piece of code. On Wednesday, Wired News
|
|
FTP'd the software from a Dutch server, just like anyone with a
|
|
connection could have.
|
|
|
|
A Commerce Department spokesman said his office was unaware of the
|
|
breach.
|
|
|
|
The event neatly coincided with the appearance of a new Senate bill that
|
|
seeks to codify the administration's crypto policy, and an announcement
|
|
Wednesday that an academic/corporate team had succeeded in breaking the
|
|
government's standard 56-bit code.
|
|
|
|
The software's quick, unauthorized spread to foreign users might have an
|
|
unexpected effect on US law, legal sources noted.
|
|
|
|
"If [Phil] Zimmermann's [original PGP] software hadn't gotten out on the
|
|
Internet and been distributed worldwide, unquestionably we wouldn't have
|
|
strong encryption today," said lawyer Charles Merrill, who chairs his
|
|
firm's computer and high-tech law-practice group. Actions like the PGP
|
|
leak, he speculated, may further the legal flow of such software across
|
|
international borders.
|
|
|
|
Said Robert Kohn, PGP vice president and general counsel: "We're
|
|
optimistic that no longer will PGP or companies like us have to do
|
|
anything special to export encryption products."
|
|
|
|
The Web release merely sped up a process already taking place using a
|
|
paper copy of the PGP 5.0 source code and a scanner - reflecting the
|
|
fact it is legal to export printed versions of encryption code.
|
|
|
|
On Wednesday, the operator of the International PGP Home Page announced
|
|
that he had gotten his hands on the 6,000-plus-page source code, had
|
|
begun scanning it, and that a newly compiled version of the software
|
|
will be available in a few months.
|
|
|
|
Norwegian Stale Schumaker, who maintains the site, said several people
|
|
emailed and uploaded copies of the program to an anonymous FTP server he
|
|
maintains. But he said he deleted the files as soon as he was aware of
|
|
them, because he wants to "produce a version that is 100 percent legal"
|
|
by scanning the printed code.
|
|
|
|
The paper copy came from a California publisher of technical manuals and
|
|
was printed with the cooperation of PGP Inc. and its founder, Phil
|
|
Zimmermann. Schumaker says he does not know who mailed his copy.
|
|
|
|
"The reason why we publish the source code is to encourage peer review,"
|
|
said PGP's Kohn, "so independent cryptographers can tell other people
|
|
that there are no back doors and that it is truly strong encryption."
|
|
|
|
Schumaker says his intentions are farther-reaching.
|
|
|
|
"We are a handful of activists who would like to see PGP spread to the
|
|
whole world," his site reads, alongside pictures of Schumaker readying
|
|
pages for scanning. "You're not allowed to download the program from
|
|
MIT's Web server because of the archaic laws in the US. That's why we
|
|
exported the source-code books."
|
|
|
|
0x12>-------------------------------------------------------------------------
|
|
|
|
Title: Setback in Efforts to Secure Online Privacy
|
|
Source: unknown
|
|
Author: unknown
|
|
Date: Thursday, June 19, 1997
|
|
|
|
WASHINGTON -- A Senate committee today setback legislative efforts to
|
|
secure online privacy, approving legislation that would restrict the right
|
|
of businesses and individuals both to use encryption domestically and to
|
|
export it.
|
|
|
|
On a voice vote, the Senate Commerce Committee adopted legislation that
|
|
essentially reflects the Clinton Administration's anti-encryption policies.
|
|
|
|
The legislation approved today on a voice vote by the Senate Commerce
|
|
Committee was introduced this week by Senate Commerce Committee Chairman
|
|
John McCain, Republican of Arizona, and co-sponsored by Democrats Fritz
|
|
Hollings of South Carolina; Robert Kerry of Nebraska and John Kerry of
|
|
Massachusetts.
|
|
|
|
Encryption programs scramble information so that it can only be read
|
|
with a "key" -- a code the recipient uses to unlock the scrambled
|
|
electronic data. Programs that use more than 40 bits of data to encode
|
|
information are considered "strong" encryption. Currently, unless these
|
|
keys are made available to the government, the Clinton Administration bans
|
|
export of hardware or software containing strong encryption, treating
|
|
these products as "munitions."
|
|
|
|
Privacy advocates continue to criticize the Administration's
|
|
stance, saying that the anti-cryptography ban has considerably
|
|
weakened U.S. participation in the global marketplace, in addition
|
|
to curtailing freedom of speech by denying users the right to "speak"
|
|
using encryption. The ban also violates the right to privacy by
|
|
limiting the ability to protect sensitive information in the new
|
|
computerized world.
|
|
|
|
Today's committee action knocked out of consideration the so-called
|
|
"Pro-CODE" legislation, a pro-encryption bill introduced by Senator
|
|
Conrad Burns, Republican of Montana. Although the Burns legislation
|
|
raised some civil liberties concerns, it would have lifted export
|
|
controls on encryption programs and generally protected individual
|
|
privacy.
|
|
|
|
"Privacy, anonymity and security in the digital world depend on
|
|
encryption," said Donald Haines, legislative counsel on privacy and
|
|
cyberspace issues for the ACLU's Washington National Office. "The aim
|
|
of the Pro-CODE bill was to allow U.S. companies to compete with
|
|
industries abroad and lift restrictions on the fundamental right to
|
|
free speech, the hallmark of American democracy."
|
|
|
|
"Sadly, no one on the Commerce Committee, not even Senator Burns,
|
|
stood up and defended the pro-privacy, pro-encryption effort," Haines
|
|
added.
|
|
|
|
In the House, however, strong encryption legislation that would add
|
|
new privacy protections for millions of Internet users in this country and
|
|
around the world has been approved by two subcommittees.
|
|
|
|
The legislation -- H.R. 695, the "Security and Freedom Through
|
|
Encryption Act" or SAFE -- would make stronger encryption products
|
|
available to American citizens and users of the Internet around the
|
|
world. It was introduced by Representative Robert W. Goodlatte, Republican
|
|
of Virginia.
|
|
|
|
"We continue to work toward the goal of protecting the privacy of all
|
|
Internet users by overturning the Clinton Administration's unreasonable
|
|
encryption policy," Haines concluded
|
|
|
|
0x13>-------------------------------------------------------------------------
|
|
|
|
Title: Captain Crunch Web Site Now Moved
|
|
Source: Telecom Digest 17.164
|
|
|
|
The Cap'n Crunch home page URL has been changed. The new URL is now
|
|
http://crunch.woz.org/crunch
|
|
|
|
I've made significant changes to the site, added a FAQ based on a lot
|
|
of people asking me many questions about blue boxing, legal stuff, and
|
|
hacking in general. The FAQ will be growing all the time, as I go
|
|
through all the requests for information that many people have sent.
|
|
"Email me" if you want to add more questions.
|
|
|
|
Our new server is now available to host web sites for anyone who wants
|
|
to use it for interesting projects. This is for Elite people only,
|
|
and you have to send me a proposal on what you plan to use it for.
|
|
|
|
[So now old John gets to decide who is elite and who isn't.]
|
|
|
|
I'm open for suggestions, and when you go up to the WebCrunchers web
|
|
site: http://crunch.woz.org
|
|
|
|
You'll get more details on that. Our server is a Mac Power PC,
|
|
running WebStar web server, connected through a T-1 link to the
|
|
backbone. I know that the Mac Webserver might be slower, but I had
|
|
security in mind when I picked it. Besides, I didn't pick it, Steve
|
|
Wozniak did... :-) So please don't flame me for using a Mac.
|
|
|
|
I know that Mac's are hated by hackers, but what the heck ... at least
|
|
we got our OWN server now.
|
|
|
|
I also removed all the blatant commercial hipe from the home page and
|
|
put it elsewhere. But what the heck ... I should disserve to make
|
|
SOME amount of money selling things like T-shirts and mix tapes.
|
|
|
|
We plan to use it for interesting projects, and I want to put up some
|
|
Audio files of Phone tones. For instance, the sound of a blue box
|
|
call going through, or some old sounds of tandom stacking. If there
|
|
are any of you old-timers out there that might have some interesting
|
|
audio clips of these sounds, please get in touch with me.
|
|
|
|
[There is already a page out there with those sounds and a lot more..
|
|
done by someone who discovered phreaking on their own. Little known
|
|
fact because of all the obscurement: John Draper did not discover
|
|
blue boxing. It was all taught to him.]
|
|
|
|
Our new Domain name registration will soon be activated, and at that
|
|
time our URL will be:
|
|
|
|
http://www.webcrunchers.com - Our Web hosting server
|
|
http://www.webcrunchers.com/crunch - Official Cap'n Crunch home page
|
|
|
|
Regards,
|
|
Cap'n Crunch
|
|
|
|
0x14>-------------------------------------------------------------------------
|
|
|
|
Title: US Justive Dept. Investigating Network Solutions
|
|
Source: New York Times
|
|
Author: Agis Salpukas
|
|
Date: 7 July '97
|
|
|
|
The Justice Department has begun an investigation into the
|
|
practice of assigning Internet addresses to determine if the
|
|
control that Network Solutions Inc. exercises over the process
|
|
amounts to a violation of antitrust laws.
|
|
|
|
The investigation was disclosed by the company Thursday in
|
|
documents filed with the Securities and Exchange Commission. The
|
|
filing came as part of a proposed initial stock offering that is
|
|
intended to raise $35 million.
|
|
|
|
The investigation was first reported in The Washington Post on
|
|
Sunday.
|
|
|
|
Network Solutions, which is based in Herndon, Va., and is a
|
|
subsidiary of Science Applications International Corp., has been
|
|
the target of a growing chorus of complaints and two dozen
|
|
lawsuits as the Internet has expanded and the competition for
|
|
these addresses, or domain names, has grown more intense.
|
|
|
|
0x15>-------------------------------------------------------------------------
|
|
|
|
Title: Cyber Patrol Bans Crypt Newsletter
|
|
Source: Crypt Newsletter
|
|
Author: George Smith
|
|
Date: June 19, 1997
|
|
|
|
Hey, buddy, did you know I'm a militant extremist? Cyber Patrol, the
|
|
Net filtering software designed to protect your children from
|
|
cyberfilth, says so. Toss me in with those who sleep with a copy of
|
|
"The Turner Diaries" under their pillows and those who file nuisance
|
|
liens against officials of the IRS. Seems my Web site is dangerous
|
|
viewing.
|
|
|
|
I discovered I was a putative militant extremist while reading a
|
|
story on Net censorship posted on Bennett Haselton's PeaceFire
|
|
Web site. Haselton is strongly critical of Net filtering software and
|
|
he's had his share of dustups with vendors like Cyber Patrol, who
|
|
intermittently ban his site for having the temerity to be a naysayer.
|
|
|
|
Haselton's page included some links so readers could determine what
|
|
other Web pages were banned by various Net filters. On a lark, I typed
|
|
in the URL of the Crypt Newsletter, the publication I edit. Much to my
|
|
surprise, I had been banned by Cyber Patrol. The charge? Militant
|
|
extremism. Cyber Patrol also has its own facility for checking if a
|
|
site is banned, called the CyberNOT list. Just to be sure, I
|
|
double-checked. Sure enough, I was a CyberNOT.
|
|
|
|
Now you can call me Ray or you can call me Joe, but don't ever call me
|
|
a militant extremist! I've never even seen one black helicopter
|
|
transporting U.N. troops to annex a national park.
|
|
|
|
However, nothing is ever quite as it seems on the Web and before I
|
|
went into high dudgeon over political censorship--the Crypt Newsletter
|
|
has been accused of being "leftist" for exposing various
|
|
government, academic, and software industry charlatans--I told some of
|
|
my readership. Some of them wrote polite--well, almost polite--letters
|
|
to Debra Greaves, Cyber Patrol's head of Internet research. And
|
|
Greaves wrote back almost immediately, indicating it had all been a
|
|
mistake.
|
|
|
|
My Web site was blocked as a byproduct of a ban on another page on the
|
|
same server. "We do have a [blocked] site off of that server with a
|
|
similar directory. I have modified the site on our list to be more
|
|
unique so as to not affect [your site] any longer," she wrote.
|
|
|
|
Perhaps I should have been reassured that Cyber Patrol wasn't banning
|
|
sites for simply ridiculing authority figures, a favorite American
|
|
past time. But if anything, I was even more astonished to discover th
|
|
company's scattershot approach to blocking. It doesn't include precise
|
|
URLs in its database. Instead, it prefers incomplete addresses that
|
|
block everything near the offending page. The one that struck down
|
|
Crypt News was "soci.niu.edu/~cr," a truncated version of my complete
|
|
URL. In other words: any page on the machine that fell under "~cr" was
|
|
toast.
|
|
|
|
Jim Thomas, a sociology professor at Northern Illinois University,
|
|
runs this particular server, and it was hard to imagine what would be
|
|
militantly extreme on it. Nevertheless, I ran the news by Thomas. It
|
|
turns out that the official home page of the American Society of
|
|
Criminology's Critical Criminology Division, an academic resource,
|
|
was the target. It features articles from a scholarly criminology
|
|
journal and has the hubris to be on record as opposing the death
|
|
penalty but didn't appear to have anything that would link it with
|
|
bomb-throwing anarchists, pedophiles, and pornographers.
|
|
|
|
There was, however, a copy of the Unabomber Manifesto on the page.
|
|
|
|
I told Thomas I was willing to bet $1,000 cash money that Ted
|
|
Kaczynski's rant was at the root of Cyber Patrol's block.
|
|
Thomas confirmed it, but I can't tell you his exact words. It
|
|
might get this page blocked, too.
|
|
|
|
What this boils down to is that Cyber Patrol is banning writing on the
|
|
Web that's been previously published in a daily newspaper: The
|
|
Washington Post. It can also be said the Unabomber Manifesto already
|
|
has been delivered to every corner of American society.
|
|
|
|
If the ludicrous quality of this situation isn't glaring enough,
|
|
consider that one of Cyber Patrol's partners, CompuServe, promoted the
|
|
acquisition of electronic copies of the Unabomber Manifesto after it
|
|
published by the Post. And these copies weren't subject to any
|
|
restrictions that would hinder children from reading them. In fact,
|
|
I've never met anyone from middle-class America who said, "Darn those
|
|
irresponsible fiends at the Post! Now my children will be inspired to
|
|
retreat to the woods, write cryptic essays attacking techno-society,
|
|
and send exploding parcels to complete strangers."
|
|
|
|
Have you?
|
|
|
|
So, will somebody explain to me how banning the Unabomber Manifesto,
|
|
the ASC's Critical Criminology home page, and Crypt Newsletter
|
|
protects children from smut and indecency? That's a rhetorical
|
|
question.
|
|
|
|
Cyber Patrol is strongly marketed to public libraries, and has been
|
|
acquired by some, in the name of protecting children from Net
|
|
depravity.
|
|
|
|
Funny, I thought a public library would be one of the places you'd be
|
|
more likely to find a copy of the Unabomber Manifesto.
|
|
|
|
0x16>-------------------------------------------------------------------------
|
|
|
|
Title: Some humor on media hacks and hackers
|
|
Source: Defcon Mailing List
|
|
Author: George Smith / Crypt Newsletter
|
|
|
|
In as fine a collection of stereotypes as can be found, the
|
|
Associated Press furnished a story on July 14 covering the annual
|
|
DefCon hacker get together in Las Vegas. It compressed at least
|
|
one hoary cliche into each paragraph.
|
|
|
|
Here is a summary of them.
|
|
|
|
The lead sentence: "They're self-described nerds . . . "
|
|
|
|
Then, in the next sentence, "These mostly gawky, mostly male
|
|
teen-agers . . . also are the country's smartest and slyest computer
|
|
hackers."
|
|
|
|
After another fifty words, "These are the guys that got beat up in
|
|
high school and this is their chance to get back . . . "
|
|
|
|
Add a sprinkling of the obvious: "This is a subculture of
|
|
computer technology . . ."
|
|
|
|
Stir in a paraphrased hacker slogan: "Hacking comes from an
|
|
intellectual desire to figure out how things work . . ."
|
|
|
|
A whiff of crime and the outlaw weirdo: "Few of these wizards will
|
|
identify themselves because they fear criminal prosecution . . . a
|
|
25-year-old security analyst who sports a dog collar and nose ring, is
|
|
cautious about personal information."
|
|
|
|
Close with two bromides that reintroduce the stereotype:
|
|
|
|
"Hackers are not evil people. Hackers are kids."
|
|
|
|
As a simple satirical exercise, Crypt News rewrote the Associated
|
|
Press story as media coverage of a convention of newspaper editors.
|
|
|
|
It looked like this:
|
|
|
|
LAS VEGAS -- They're self-described nerds, dressing in starched
|
|
white shirts and ties.
|
|
|
|
These mostly overweight, mostly male thirty, forty and
|
|
fiftysomethings are the country's best known political pundits,
|
|
gossip columnists and managing editors. On Friday, more than 1,500 of
|
|
them gathered in a stuffy convention hall to swap news and network.
|
|
|
|
"These are the guys who ate goldfish and dog biscuits at frat parties
|
|
in college and this is their time to strut," said Drew Williams,
|
|
whose company, Hill & Knowlton, wants to enlist the best editors
|
|
and writers to do corporate p.r.
|
|
|
|
"This is a subculture of corporate communicators," said Williams.
|
|
|
|
Journalism comes from an intellectual desire to be the town crier
|
|
and a desire to show off how much you know, convention-goers said.
|
|
Circulation numbers and ad revenue count for more than elegant prose
|
|
and an expose on the President's peccadillos gains more esteem from
|
|
ones' peers than klutzy jeremiads about corporate welfare and
|
|
white-collar crime.
|
|
|
|
One group of paunchy editors and TV pundits were overheard
|
|
joking about breaking into the lecture circuit, where one
|
|
well-placed talk to a group of influential CEOs or military
|
|
leaders could earn more than many Americans make in a year.
|
|
|
|
Few of these editors would talk on the record for fear of
|
|
professional retribution. Even E.J., a normally voluble
|
|
45-year-old Washington, D.C., editorial writer, was reticent.
|
|
|
|
"Columnists aren't just people who write about the political
|
|
scandal of the day," E.J. said cautiously. "I like to think of
|
|
columnists as people who take something apart that, perhaps,
|
|
didn't need taking apart."
|
|
|
|
"We are not evil people. We're middle-aged, professional
|
|
entertainers in gray flannel suits."
|
|
|
|
0x17>-------------------------------------------------------------------------
|
|
|
|
Title: Cellular Tracking Technologies
|
|
Source: unknown
|
|
Author: unknown
|
|
|
|
A recent article from the San Jose Mercury News by Berry Witt ("Squabble
|
|
puts non-emergency phone number on hold") raises several important
|
|
questions -- questions I think are relavant to the CUD's readership...
|
|
|
|
Does anybody remember the FBI's request that cell phone companies must
|
|
build in tracking technology to their systems that allows a person's
|
|
position to be pin pointed by authorities? That suggested policy resulted
|
|
in a flurry of privacy questions and protests from the industry, suggesting
|
|
such requirements would force them to be uncompetitive in the global
|
|
marketplace. The article, dated July 20, (which was focused on 911
|
|
cellular liability issues) suggests federal authorities may have worked out
|
|
an end run around the controversy. The article states:
|
|
|
|
"The cellular industry is working to meet a federal requirement that by
|
|
next spring, 911 calls from cellular phones provide dispatchers the
|
|
location of the nearest cell site and that within five years, cellular
|
|
calls provide dispatchers the location of the caller within a 125-meter
|
|
radius. "
|
|
|
|
On its face, this seems reasonable and it is a far cry from the real time
|
|
tracking requirements of any cell phone that is turned on (The FBI's
|
|
original request). But by next spring, this tracking system will be in
|
|
place and on line. I have heard no public debate about the privacy
|
|
implications regarding this "Federal Requirement", nor has there been any
|
|
indication that this information will be restricted to 911 operators.
|
|
|
|
Will this information be available to law enforcement officials if they
|
|
have a warrant? If they don't have a warrant? Will this information be
|
|
secured so enterprising criminals won't have access to it? Exactly WHAT
|
|
kind of security is being implemented so it WON'T be accessible to the
|
|
general public.
|
|
|
|
This smacks of subterfuge. By cloaking the cellular tracking issue in the
|
|
very real issue of the 911 location system, the federal government and law
|
|
enforcement agencies have circumvented the legitimate privacy questions
|
|
that arose from their initial Cellular tracking request.
|
|
|
|
0x18>-------------------------------------------------------------------------
|
|
|
|
Title: Court Mixes Internet Smut Provision
|
|
Source: Associated Press
|
|
Author: unknown
|
|
Date: June 26, 1997
|
|
|
|
WASHINGTON (AP) -- Congress violated free-speech rights when it
|
|
tried to curb smut on the Internet, the Supreme Court ruled today.
|
|
In its first venture into cyberspace law, the court invalidated a
|
|
key provision of the 1996 Communications Decency Act.
|
|
|
|
Congress' effort to protect children from sexually explicit
|
|
material goes too far because it also would keep such material
|
|
from adults who have a right to see it, the justices unanimously
|
|
said.
|
|
|
|
The law made it a crime to put adult-oriented material online
|
|
where children can find it. The measure has never taken effect
|
|
because it was blocked last year by a three-judge court in
|
|
Philadelphia.
|
|
|
|
``We agree with the three-judge district court that the statute
|
|
abridges the freedom of speech protected by the First Amendment,''
|
|
Justice John Paul Stevens wrote for the court.
|
|
|
|
``The (Communications Decency Act) is a content-based regulation
|
|
of speech,'' he wrote. ``The vagueness of such a regulation raises
|
|
special First Amendment concerns because of its obvious chilling
|
|
effect on free speech.''
|
|
|
|
``As a matter of constitutional tradition ... we presume that
|
|
governmental regulation of the content of speech is more likely to
|
|
interfere with the free exchange of ideas than to encourage it,''
|
|
Stevens wrote.
|
|
|
|
Sexually explicit words and pictures are protected by the
|
|
Constitution's First Amendment if they are deemed indecent but not
|
|
obscene.
|
|
|
|
|
|
|
|
|
|
0x1>-------------------------------------------------------------------------
|
|
|
|
Book Title: Underground
|
|
Poster: Darren Reed
|
|
|
|
A few people will have heard me mention this book already, but I think
|
|
there are bits and pieces of this book which will surprise quite a few
|
|
people. Most of us are used to reading stories about hacking by the
|
|
people who did the catching of the hackers...this one is an ongoing
|
|
story of the local hacker scene...with not so local contacts and exploits.
|
|
|
|
Some of the important things to note are just how well they do work
|
|
together, as well as competing with each other and what they do when
|
|
they get pissed off with each other. Meanwhile most of the white hats
|
|
are too busy trying to hoard information from the other white hats...
|
|
|
|
Having been on the "victim" side in the past, it is quite frustrating
|
|
when someone you've worked to have arrested gets off with a fine. Most
|
|
of us would agree that they should be locked up somewhere, but
|
|
according to what's in the book, most of them are suffering from either
|
|
problems at home or other mental disorders (including one claim in court
|
|
to being addicted to hacking). Anyone for a "Hackers Anonymous Association"
|
|
for help in drying out from this nefarious activity ? At least in one
|
|
case documented within the perpetrators get sentenced to time behind bars.
|
|
|
|
It's somewhat comforting to read that people have actually broken into
|
|
the machines which belong to security experts such as Gene Spafford and
|
|
Matt Bishop, although I'd have preferred to have not read how they
|
|
successfully broke into the NIC :-/ Don't know about you, but I don't
|
|
care what motives they have, I'd prefer for them to not be getting inside
|
|
machines which provide integral services for the Internet.
|
|
|
|
For all of you who like to hide behind firewalls, in one instance a hacker
|
|
comes in through X.25 and out onto the Internet. Nice and easy 'cause
|
|
we don't need to firewall our X.25 connection do we ? :-)
|
|
|
|
Oh, and just for all those VMS weenies who like to say "We're secure,
|
|
we run VMS not Unix" - the first chapter of the book is on a VMS worm
|
|
called "WANK" that came close to taking the NASA VMS network completely
|
|
off air. I wonder how long it will take for an NT equivalent to surface...
|
|
|
|
All in all, a pretty good read (one from which I'm sure hackers will learn
|
|
just as much from as the rest of us).
|
|
|
|
The book's details are:
|
|
Title: UNDERGROUND - Tales of Hacking, madness and obsession on the
|
|
Electronic Frontier
|
|
ISBN 1-86330-595-5
|
|
Author: Suelette Dreyfus
|
|
Publisher: Random House
|
|
Publisher's address: 20 Alfred St, Milsons Point, NSW 2061, Australia
|
|
Price: AUS$19.95
|
|
|
|
before I forget, the best URL for the book I've found is:
|
|
|
|
http://www.underground-book.com (http://underground.org/book is a mirror)
|
|
|
|
0x2>-------------------------------------------------------------------------
|
|
|
|
Book Title: "Hackers"
|
|
Poster: Paul Taylor P.A.Taylor@sociology.salford.ac.uk
|
|
|
|
There's an open invite for people to contact me and discuss the
|
|
above and/or anything else that they think is relevant/important.
|
|
|
|
Below is a brief overview of
|
|
the eventual book's rationale and proposed structure.
|
|
|
|
Hackers: a study of a technoculture
|
|
|
|
Background
|
|
|
|
"Hackers" is based upon 4 years PhD research conducted from
|
|
1989-1993 at the University of Edinburgh. The research focussed
|
|
upon 3 main groups: the Computer Underground (CU); the Computer
|
|
Security Industry (CSI); and the academic community. Additional
|
|
information was obtained from government officials, journalists
|
|
etc.
|
|
|
|
The face-to-face interview work was conducted in the UK and the
|
|
Netherlands. It included figures such as Rop Gongrijp of
|
|
Hack-Tic magazine, Prof Hirschberg of Delft University, and
|
|
Robert Schifreen. E-mail/phone interviews were conducted in
|
|
Europe and the US with figures such as Prof Eugene Spafford of
|
|
Purdue Technical University, Kevin Mitnick, Chris Goggans and
|
|
John Draper.
|
|
|
|
Rationale
|
|
|
|
This book sets out to be an academic study of the social
|
|
processes behind hacking that is nevertheless accessible to a
|
|
general audience. It seeks to compensate for the "Gee-whiz"
|
|
approach of many of the journalistic accounts of hacking. The
|
|
tone of these books tends to be set by their titles: The Fugitive
|
|
Game; Takedown; The Cyberthief and the Samurai; Masters of
|
|
Deception - and so on ...
|
|
|
|
The basic argument in this book is that, despite the media
|
|
portrayal, hacking is not, and never has been, a simple case of
|
|
"electronic vandals" versus the good guys: the truth is much more
|
|
complex. The boundaries between hacking, the security industry
|
|
and academia, for example, are often relatively fluid. In
|
|
addition, hacking has a significance outside of its immediate
|
|
environment: the disputes that surround it symbolise society's
|
|
attempts to shape the values of the informational environments we
|
|
will inhabit tomorrow.
|
|
|
|
|
|
Book Outline
|
|
|
|
Introduction - the background of the study and the range of
|
|
contributors
|
|
|
|
Chapter 1 - The cultural significance of hacking: non-fiction and
|
|
fictional portrayals of hacking.
|
|
|
|
Chapter 2 - Hacking the system: hackers and theories of technological change.
|
|
|
|
Chapter 3 - Hackers: their culture.
|
|
|
|
Chapter 4 - Hackers: their motivations
|
|
|
|
Chapter 5 - The State of the (Cyber)Nation: computer security weaknesses.
|
|
|
|
Chapter 6- Them and Us: boundary formation and constructing "the other".
|
|
|
|
Chapter 7 - Hacking and Legislation.
|
|
|
|
Conclusion
|
|
|
|
|
|
0x1>-------------------------------------------------------------------------
|
|
|
|
Convention: Cybercrime Conference Announcement
|
|
Date: Oct 29 - 31
|
|
|
|
Cybercrime; E-Commerce & Banking; Corporate, Bank & Computer
|
|
Security; Financial Crimes and Information Warfare Conference
|
|
will be held October 29, 30, & 31, 1997 (Washington, D.C.) and
|
|
November 17 & 18 (New York City) for bankers, lawyers,
|
|
information security directors, law enforcement, regulators,
|
|
technology developers/providers.
|
|
|
|
Responding to the global threat posed by advancing technology,
|
|
senior level decision makers will join together to share remedies
|
|
and solutions towards the ultimate protection of financial and
|
|
intellectual property; and against competitive espionage and
|
|
electronic warfare. An international faculty of 30 experts will
|
|
help you protect your business assets, as well as the information
|
|
infrastructure at large.
|
|
|
|
There will also be a small technology vendor exhibition.
|
|
|
|
Sponsored by Oceana Publications Inc. 50 year publisher of
|
|
international law, in cooperation with the Centre for
|
|
International Financial Crimes Studies, College of Law,
|
|
University of Florida, and Kroll Associates, a leading
|
|
investigative firm. For more information call
|
|
800/831-0758 or
|
|
914/693-8100; or e-mail: Oceana@panix.com.
|
|
|
|
http://www.oceanalaw.com/seminar/sem_calendar.htm
|
|
|
|
0x2>-------------------------------------------------------------------------
|
|
|
|
Convention: Computers & The Law IV Symposium
|
|
Date: October 6-9, Boston
|
|
|
|
Computers & The Law IV is the only event to bring together corporate
|
|
decision-makers, computer professionals and legal experts to discuss
|
|
Internet
|
|
and Web technology in the eyes of the law. This conference provides a
|
|
forum and educational opportunities for all those interested in
|
|
keeping their system investment safe and within the law.
|
|
Topics will include:
|
|
* Corporate liablity on the Internet
|
|
* Internet risk management in the enterprise
|
|
* Hiring a SysAdmin you can trust
|
|
* Legal risks of Internet commerce
|
|
* Establishing a fair-use policy
|
|
* Prosecuting system intruders
|
|
* Communicating with your SysAdmin
|
|
* Understanding copyright law
|
|
* Assessing your exposure to hackers
|
|
* Employee privacy vs. owner rights
|
|
... and much more!
|
|
|
|
FOR MORE INFORMATION CONTACT
|
|
The Sun User Group * 14 Harvard Ave, 2nd Floor * Allston, MA 02134
|
|
(617)787-2301 * conference@sug.org * http://www.sug.org/CL4
|
|
|
|
|
|
----[ EOF
|