| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXVII / Part Four of Four PWN |
| PWN PWN |
| PWN Compiled by Dispater & Spirit Walker PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Computer Espionage: Can We Be Compromised By The Internet? December 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Extracted from Security Awareness Bulletin |
|
|
| The advent of computer networks linking scientists and their research |
| institutions vastly complicates any effort to identify Soviet scientific |
| espionage. For example, foreign travel may become less important, as computers |
| become more directly interconnected, allowing scientists anywhere in the world |
| to talk to each other -- and, in some cases to access information in data bases |
| at Western academic and defense-related institutions. |
|
|
| This capability has been available for some time, but in 1989 the USSR took an |
| important step toward increasing the breadth and availability of access, by |
| applying (with Poland, Czechoslovakia, Hungary, and Bulgaria) to be connected |
| to the European Academic Research Network (EARN). Approval of the application |
| in April 1990 provided Soviet and East European users access far beyond simply |
| a link to computers throughout Western Europe. Through EARN, the Soviets would |
| be connected to Internet, a US network serving defense, research, and academic |
| organizations worldwide. |
|
|
| A number of threats are inherent in the trend toward computer linkage. The |
| most obvious is the increased ease with which a Soviet can discuss professional |
| matters with Westerners working on similar projects. A user also can put out a |
| blanket request for information on any subject, and it may not always be |
| obvious that the requestor is working for the USSR. In addition, the Soviet |
| Academy of Sciences can use a computer network to issue general invitations to |
| conferences -- in hopes that the responses will identify untapped research |
| institutions or individual scientists that later can be targeted for specific |
| information. |
|
|
| Access to data in the computers connected to a network normally is controlled, |
| so that specific files can be read only by authorized users. However, the |
| Soviets have demonstrated that an innovative "hacker" connected to computers |
| containing sensitive information can evade the access controls in order to read |
| that information. In the "Hannover Hacker" case, for example, the Soviet |
| intelligence services used West German computer experts to access US restricted |
| data bases, obtaining both software and defense-related information. |
| _______________________________________________________________________________ |
|
|
| Waging War Against War Dialing November 27, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Edmund L. Andrews (New York Times) |
| Special Thanks: Dark Overlord |
|
|
| WASHINGTON -- Riding a wave of popular annoyance over telephone sales calls, |
| Congress approved and sent to President Bush a bill that would ban the use of |
| automated dialing devices that deliver pre-recorded messages to the home. The |
| measure would also allow consumers to block calls from human sales-people by |
| placing their names on a "do not call" list. |
|
|
| The bill, which passed on voice votes in both the House and Senate, was |
| supported by both Democrats and Republicans, some of whom have recounted their |
| own aggravations with unsolicited sales calls. |
|
|
| Although the White House has expressed concerns about what it views as |
| unnecessary regulation, the President has not threatened to veto the bill. |
|
|
| The measure, which combines provisions from several separate measures passed |
| previously by both chambers of Congress, bans the use of autodialers for |
| calling most individual homes. The few exceptions would be when a person has |
| explicitly agreed to receive such a call or when the autodialer is being used |
| to notify people of an emergency. |
|
|
| When autodialers are used to call businesses, they would be prohibited from |
| reaching more than two numbers at a single business. |
|
|
| Many states have already passed laws that restrict autodialers, including about |
| a dozen states that ban them altogether and about two dozen others that |
| restrict their use in various ways. |
|
|
| The state laws, however, do not stop a company from using an autodialer in an |
| unregulated state to call homes in state with regulations. |
|
|
| In an attempt to curb telemarketing by human sales representatives, the measure |
| would instruct the Federal Communications Commission to either oversee the |
| creation of a nationwide "do not call" list or issue rules ordering companies |
| to maintain their own lists. |
|
|
| The bill would allow people who placed their names on such a list to file suits |
| is small claims courts against companies that persisted in calling. The suits |
| could seek up to $500 for each unwanted call, up to a maximum of three calls |
| >from a single company. |
|
|
| Finally, the bill would ban unsolicited "junk fax" messages, which are |
| advertisements transmitted to facsimile machines. |
|
|
| "This is a victory for beleaguered consumers, who in this piece of legislation |
| have their declaration of independence from junk faxes and junk calls," said |
| Rep. Edward J. Markey, D-Mass., the measure's principal sponsor in the House. |
|
|
| Companies that make or use autodialers glumly predicted that the measure would |
| put them out of business and would hurt small advertisers the most. |
|
|
| "I think it will put us out of business," said Mark Anderson, owner of the |
| Leshoppe Corp., a New Orleans concern that uses about 160 machines for clients |
| who sell everything from tanning products to health insurance. "What people |
| don't understand is that a lot of mom-and-pop operations use electronic |
| marketing, and use it successfully." |
|
|
| Ray Kolker, president of Kolker Systems, the largest maker of autodialers, |
| echoed those views. "Passage of this bill demonstrates that Congress just |
| isn't as concerned about the economy as they think they are," he said. "This |
| will destroy a multibillion-dollar business." |
|
|
| Telemarketing has surged in recent years, as the cost of long-distance |
| telephone service has plunged and as consumers have become deluged by floods of |
| catalogues they do not read and envelopes they do not open. |
|
|
| According to congressional estimates, the volume of goods and services sold |
| through all forms of telephone marketing has increased from about $72 billion |
| in 1982 to $435 billion in 1990. Over all, an estimated 300,000 people are |
| employed in some facet of telephone marketing. |
|
|
| Autodialers, which can each make about 1,500 calls a day, have become one of |
| the most efficient but disliked forms of telemarketing. By one estimate, |
| 20,000 autodialers are in operation at one time, with the capacity of making |
| more than 20 million calls in a single day. |
|
|
| During hearings on the issue earlier this year, Sen. Daniel K. Inouye, |
| D-Hawaii, noted irritably that he had been summoned to the telephone only to |
| hear a recorded sales message about winning a trip to Hawaii. |
|
|
| The legislation was not opposed by all companies involved in telephone sales. |
| Many marketing experts have long deplored the use of autodialers as a sales |
| tool, arguing that they are counter-productive because they generate more |
| irritation than sales interest. |
|
|
| The Direct Marketing Association, a trade group, has expressed cautious support |
| for the legislation and already maintains its own, voluntary "do not call" |
| list. |
|
|
| Beyond simply annoying people at home, the autodialers have been known to tie |
| up telephone paging networks and the switchboards of hospitals and |
| universities, and to call people on their cellular telephones. |
|
|
| But it remains unclear how effective the "do not call" lists would be in |
| practice, because the two options available to the FCC differ greatly. |
|
|
| A national list maintained by the government would effectively protect |
| consumers from all unwanted sales calls. But a requirement that each company |
| maintain its own list would be much more limited, because people might have to |
| call each company to be placed on its individual list. |
|
|
| Congressional aides noted that the measure passed Wednesday strongly implied |
| that the FCC should set up its own list, because it provides two pages of |
| detail on just how such a list should be created. |
| _______________________________________________________________________________ |
|
|
| Foreign Guests Learn America Is Land Of The Free December 2, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Excerpted from the Orlando Sentinel |
|
|
| "Merry Christmas From BellSouth!" |
|
|
| A telephone computer glitch gave dozens of foreign travelers at downtown |
| Orlando hotel early Christmas presents Saturday and Sunday. |
|
|
| The giving began when a guest at the Plantation Manor, an international youth |
| hotel across from Lake Eola, discovered that pay phones were allowing free |
| long-distance calls to virtually anywhere in the world. |
|
|
| As the news spread, the four public phones, which are normally deserted at the |
| hotel, were busy non-stop until Sunday afternoon,when Southern Bell discovered |
| the problem and dispatched technicians to shut off long-distance service. |
|
|
| Roger Swain, a clerk at Plantation Manor, said the discovery was made by |
| accident. |
|
|
| "One of our guests said he tried to call Houston, Texas, from the second |
| floor," Swain said. The operator told him he didn't need to use coins because |
| the phone was not listed as a public phone. He was on the phone for 40 |
| minutes, and they didn't charge him.' |
|
|
| A spokesman for AT&T, which handles long distance for some of Southern Bell's |
| phones, said the problem seemed to be with a Southern Bell computer. |
|
|
| "Our equipment is working fine," said Randy Berridge, AT&T spokesman. "If it's |
| a Southern Bell problem, they would bear the costs.' |
|
|
| It's possible Southern Bell recouped some money: It still cost 25 cents for a |
| local call. |
|
|
| "This is a drop in the ocean to them," one English traveler said of the phone |
| company, which had just covered the cost of his call home at the Sunday rate of |
| $21.74 for each half hour." |
| _______________________________________________________________________________ |
|
|
| 8th Chaos Computer Congress December 27-29, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Klaus Brunnstein |
|
|
| Special Thanks: Terra of CCC |
|
|
| On occasion of the 10th anniversary of its foundation, Chaos Computer Club |
| (CCC) organized its 8th Congress in Hamburg. To more than 400 participants |
| (largest participation ever, with growing number of students rather than |
| teen-age scholars), a rich diversity of PC and network related themes was |
| offered, with significantly less sessions than before devoted to critical |
| themes, such as phreaking, hacking or malware construction. Changes in the |
| European hacker scene became evident as only few people from Netherlands |
| (e.g. Hack-Tic) and Italy had come to this former hackers' Mecca. |
|
|
| Consequently, Congress news are only documented in German. As CCC's founding |
| members develop in age and experience, reflection of CCC's role and growing |
| diversity of opinions indicates that teen-age CCC may produce less spectacular |
| events than ever before. |
|
|
| This year's dominating theme covered presentations of communication techniques |
| for PCs, Ataris, Amigas and Unix, the development of a local net as well as |
| description of regional and international networks, including a survey. In |
| comparison, CCC '90 documents are more detailed on architectures while sessions |
| and demonstrations in CCC '91 (in "Hacker Center" and other rooms) were more |
| concerned with practical navigation in such nets. |
|
|
| Phreaking was covered by the Dutch group HACK-TIC which updated its CCC '90 |
| presentation of how to "minimize expenditures for telephone conversations" by |
| using blue boxes and red boxes, and describing available software and recent |
| events. Detailed information on phreaking methods in specific countries and |
| bugs in some telecom systems were discussed. More information (in Dutch) was |
| available, including charts of electronic circuits, in several volumes of Dutch |
| "HACKTIC: Tidschrift voor Techno-Anarchisten" (news for techno-anarchists). |
|
|
| Remark #1: Recent events (e.g. "Gulf hacks") and material presented on Chaos |
| Congress '91 indicate that the Netherlands emerges as a new |
| European center of malicious attacks on systems and networks. |
|
|
| Among other potentially harmful information, HACKTIC #14/15 |
| publishes code of computer viruses (a BAT-virus which does not work |
| properly. |
|
|
| Remark #2: While few Netherland universities devote research and teaching to |
| security, Delft university at least offers introductory courses |
| into data protection. |
|
|
| Different from recent years, a seminar on Computer viruses (presented by Morton |
| Swimmer of Virus Test Center, University of Hamburg) as deliberately devoted to |
| disseminate non-destructive information (avoiding any presentation of virus |
| programming). A survey of legal aspects of inadequate software quality |
| (including viruses and program errors) was presented by lawyer Freiherr von |
| Gravenreuth. |
|
|
| Some public attention was drawn to the fact that the "city-call" telephone |
| system radio-transmits information essentially as ASCII. A demonstration |
| proved that such transmitted texts may easily be intercepted, analyzed and |
| even manipulated on a PC. CCC publicly warned that "profiles" of such texts |
| (and those addressed) may easily be collected, and asked Telecom to inform |
| users about this insecurity; German Telecom did not follow this advice. |
|
|
| Besides discussions of emerging voice mailboxes, an interesting session |
| presented a C64-based chipcard analysis systems. Two students have built a |
| simple mechanism to analyze (from systematic IO analysis) the protocol of a |
|
|
| German telephone card communicating with the public telephone box; they |
| described, in some detail (including an electronmicroscopic photo) the |
| architecture and the system behavior, including 100 bytes of communication |
| data stored in a central German Telecom computer. Asked for legal implications |
| of their work, they argued that they just wanted to understand this technology, |
| and they were not aware of any legal constraint. They have not analyzed |
| possibilities to reload the telephone account (which is generally possible, |
| due to the architecture), and they did not analyze architectures or procedures |
| of other chipcards (bank cards etc). |
|
|
| Following CCC's (10-year old charter), essential discussions were devoted to |
| social themes. The "Feminine computer handling" workshop deliberately |
| excluded men (about 25 women participating), to avoid last year's experience |
| of male dominance in related discussions. A session (mainly attended by |
| informatics students) was devoted to "Informatics and Ethics", introducing the |
| international state-of-discussion, and discussing the value of professional |
| standards in the German case. |
|
|
| A discussion about "techno-terrorism" became somewhat symptomatic for CCC's |
| actual state. While external participants (von Gravenreuth, Brunnstein) |
| were invited to this theme, CCC-internal controversies presented the panel |
| discussion under the technical title "definition questions". While one |
| fraction wanted to discuss possibilities, examples and dangers of techno- |
| terrorism openly, others (CCC "ol'man" Wau Holland) wanted to generally define |
| "terrorism" somehow academically, and some undertook to describe "government |
| repression" as some sort of terrorism. In the controversial debate, a few |
| examples of technoterrorism (WANK worm, development of virus techniques for |
| economic competition and warfare) were given. |
| _______________________________________________________________________________ |
|
|
| Another AT&T 800-Number Outage December 16, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Dana Blankenhorn (Newsbytes) |
|
|
| BASKING RIDGE, NEW JERSEY -- AT&T suffered another embarrassing outage on its |
| toll-free "800" number lines over the weekend, right in the middle of the |
| Christmas catalog shopping season. |
|
|
| Andrew Myers, an AT&T spokesman, said the problem hit at 7:20 PM on December 13 |
| as technicians loaded new software into computers in Alabama, Georgia, and New |
| York. The software identifies and transfers 800 calls, he said. A total of |
| 1.8 million calls originating in parts of the eastern U.S. were impacted, the |
| company said. |
|
|
| Service was restored after about one hour when technicians "backed off" the |
| patch and went back to using the old software. Programmers are now working on |
| the software, trying to stamp out the bugs before it's reloaded. "Obviously we |
| don't like it when a single call doesn't get through, but I wouldn't consider |
| this a serious problem," Myers said. The problem was reported to the Federal |
| Communications Commission over the weekend, and to the press the next day. |
|
|
| The latest problem continues a disturbing trend of AT&T service outages in the |
| Northeast. Worse, all the problems have had different causes -- power |
| problems, switch software problems, and cable cuts caused previous outages. |
| _______________________________________________________________________________ |
|
|
| US Congress Sets Up BBS For Whistle Blowers December 16, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Dana Blankenhorn (Newsbytes) |
|
|
| WASHINGTON, D.C. -- U.S. Congressman Bob Wise and his House Government |
| Operations subcommittee on government information, justice and agriculture have |
| opened a bulletin board service for government whistle-blowers. |
|
|
| Wise himself is the system operator, or sysop, of the new board. Newsbytes |
| contacted the board and found it accepts parameters of 8 bit words, no parity, |
| and 1 stop bit, known as 8-N-1 in the trade, and will take calls from a |
| standard 2400 bit/second Hayes- compatible modem. |
|
|
| Whistle-blowers are employees who tell investigators about wrong- doing at |
| their companies or agencies, or "blow the whistle" on wrong-doing. Wise said |
| that pseudonyms will be accepted on the BBS -- most private systems demand |
| real names so as to avoid infiltration by computer crackers or other abusive |
| users. Passwords will keep other users from reading return messages from the |
| subcommittee, Wise added. The committee will check the board daily and get |
| back to callers about their charges. The board is using RBBS software, a |
| "freeware" package available without license fee. |
|
|
| The executive branch of the U.S. government uses a system of inspectors |
| general to police its offices, most of whom have telephone hotlines for |
| whistle-blowers and accept mail as well. But the inspectors expect whistle- |
| blowers to collect evidence at work, which could get them in trouble. And |
| efforts to contact the whistle-blower by an inspector general representative |
| can identify them to wrongdoers. Theoretically, calls from Congressional |
| staffers will be seen by the bad guys as typical annoying oversight calls. |
|
|
| Press Contact: Rep. Bob Wise |
| 202-224-3121 |
| 202-225-5527 BBS |
| _______________________________________________________________________________ |
|
|
| NIST Extends Review Deadline for Digital Signature December 16, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John McCormick (Newsbytes) |
|
|
| WASHINGTON, DC -- NIST, the National Institute of Standards and Technology |
| (formerly the Bureau of Standards) has taken the unusual step of extending the |
| review period for the controversial digital signature standard which the agency |
| proposed at the end of August. |
|
|
| The normal 90-day comment period would already have ended, but the NIST has |
| extended that deadline until the end of February - some say because the agency |
| wishes to tighten the standard. |
|
|
| NIST spokespersons deny that there was any need to modify the proposed standard |
| to increase its level of security, but James Bidzos, whose RSA Data Security |
| markets a rival standard, says that the NIST's ElGamal algorithm is too weak |
| and is being promoted by the government because the National Security Agency |
| feels that it can easily break the code when necessary. |
|
|
| The new standard is not a way of encrypting messages themselves; that is |
| covered by the existing DES or Data Encryption Standard. Rather, the DSS or |
| Digital Signature Standard is the method used to verify the "signature" of the |
| person sending the message, i.e., to make certain that the message, which |
| might be an order to transfer money or some other important item, is really |
| >from the person who is authorized to send such instructions. |
|
|
| As Newsbytes reported back in July, the NSA and NIS had been charged with |
| developing a security system nearly four years ago. The recently announced |
| ElGamal algorithm was previously due to be released last fall, and in the |
| meantime the RSA encryption scheme has become quite popular. |
|
|
| At that time, NIST's deputy director, Raymond G. Kammer, told the Technology |
| and Competitiveness Subcommittee of the House (U.S. House of Representatives) |
| Science, Space and Technology Committee that the ElGamal encryption scheme, |
| patented by the federal government, was chosen because it would save federal |
| agencies money over the private RSA encryption and signature verification |
| scheme. |
|
|
| Interestingly enough, the only company that currently markets an ElGamal DS |
| system is Information Security Corp., 1141 Lake Cook Rd., Ste. D, Deerfield, |
| IL 60015, a company that fought and won a bitter court battle with RSA over |
| the right to market RSA-based encryption software to the federal government. |
| That was possible because RSA was developed at MIT by mathematicians working |
| under federal grants. |
|
|
| ISC's $249.95 Secret Agent, which uses the ElGamal algorithm, was released at |
| last year's Federal Office Systems Expo in Washington. ElGamal is a public key |
| system that can be used just like the RSA system but differs from it in |
| significant theoretical ways. |
|
|
| ISC's CEO and president, Thomas J. Venn, has told Newsbytes that the ElGamal |
| system is highly secure, but the ElGamal algorithm is quite different from |
| that of the RSA system, deriving its security from the difficulty of computing |
| discrete logarithms, in finite field, instead of using RSA's very different |
| method of factoring the products of two prime numbers. |
|
|
| RSA has fought back by posting a prize for anyone who can crack the RSA scheme. |
| To take a stab at it, send a self-addressed stamped envelope to RSA Data |
| Security, Inc., 10 Twin Dolphin Dr., Redwood City, CA 94065, for the RSA list |
| and the rules. Those with access to Internet e-mail can send a request to |
| challenge-info@rsa.com. |
| _______________________________________________________________________________ |
|
|
| PWN Quicknotes |
| ~~~~~~~~~~~~~~ |
| 1. Computer bulletin boards aren't just for dweeby cyberpunks anymore -- at |
| least not in San Francisco. Entrepreneur Wayne Gregori has created SF Net, |
| a decidedly socialble computer network that links up patrons of the city's |
| dangerously hip cafe's. From the Lower Haight to south of Market Street, |
| high-tech trendies are interfacing over cappuccino. All you have to do is |
| buy a ticket from the cafe>, enter a number into an on-site computer and |
| begin your techno-chat at $1 per 15 minutes. The next Gregori test site is |
| Seattle, Washington. (Newsweek, December 2, 1991) |
| _______________________________________________________________________________ |
|
|
| 2. The (November 29, 1991 issue of) San Jose Mercury News reported that the |
| San Mateo, California 911 system was brought to it's knees because of a |
| prank <but not by any computer hacker or phone phreak>. |
|
|
| It seems that a disc jockey at KSOL decided to play a recent MC Hammer |
| record over and over and over... as a prank. Listeners were concerned that |
| something had happened to the personnel at the station, so they called 911 |
| (and the police department business line). It seems that a few hundred |
| calls in forty five minutes or an hour was enough to jam up the system. |
| There was no report in the newspaper of any deaths or injuries to the |
| overloaded system. |
|
|
| The DJ didn't want to stop playing the record (claiming First Amendment |
| rights), but did insert an announcement to not call the police. |
| _____________________________________________________________________________ |
| |
| 3. Jean Paul Barrett, a convict serving 33 years for forgery and fraud in the |
| Pima County jail in Tuscon, Arizona, was released on December 13, 1991 |
| after receipt of a forged fax ordering his release. It appears that a copy |
| of a legitimate release order was altered to bear HIS name. Apparently no |
| one noticed that the faxed document lacked an originating phone number or |
| that there was no "formal" cover sheet. The "error" was discovered when |
| Barrett failed to show up for a court hearing. |
|
|
| The jail releases about 60 people each day, and faxes have become standard |
| procedure. Sheriff's Sergeant Rick Kastigar said "procedures are being |
| changed so the error will not occur again." (San Francisco Chronicle, |
| December 18, 1991, Page A3) |
| _______________________________________________________________________________ |
|
|
| 4. AT&T will boosted it's rates on direct-dial, out-of-state calls on January |
| 2, 1992. The increase, to affect weekday and evening calls, would add |
| about 8 cents to the average monthly long-distance bill of $17 and about |
| $60 million to AT&T'd annual revenue. (USA Today, December 23, 1991, Page |
| B1) |
| _______________________________________________________________________________ |
|
|
| 5. The following was in the AT&T shareholders quarterly, and is submitted not |
| as a commercial solicitation but because somebody might be interested. |
|
|
| A colorful 22-by-28-inch poster that traces the development of the |
| telephone from Bell's first model to the latest high-technology feature |
| phone can be purchased for $12. To order, send a check to Poster, AT&T |
| Archives, WV A102, 5 Reinman Road, Warren, NJ 07059-0647. |
| (Telephone 908-756-1590.)" |
|
|
| (Special Thanks: The Tone Surfer) |
| _______________________________________________________________________________ |
|
|
| 6. Word has it that the normal toll-free number blue-box is now DEAD in |
| Norway. According to some information received by Phrack, the toll-free |
| numbers got switched onto the regular phone network in the United States, |
| which you can't phreak the same way. (Special Thanks: Nosferatu) |
| _______________________________________________________________________________ |
|
|
| 7. In case you've been trying to call Blitzkreig BBS and been unable to |
| connect with it, Predat0r is moving his board into the basement. He |
| said the board would be back up as of February 1st. He also said that |
| master copy of TAP #106 is finished, but he is a year behind on updating |
| his mailing list. Predat0r said that making the copies was no problem but |
| that with the influx of subscribers he was going to have to enlist local |
| help to get the database updated. He also said that if someone paid for |
| ten issues they will get ten issues. (Special Thanks: Roy the Tarantula) |
| _______________________________________________________________________________ |
|
|
| 8. There is a new science fiction book about called "Fallen Angels" by Larry |
| Niven. The basis for the book is this: The United States government has |
| been taken over by religious fanatics and militant environmentalists. |
| Soon the United States is an Anti-Technological police state. Two |
| astronauts are shot down over the United States and are on the run. They |
| are on the run from various government agencies such as the (Secret |
| Service like) Environmental Protection Agency. Nivin's wild imagination |
| provides for a great deal of humor as well as some things that are not |
| funny at all, due to the fact that they hit just a little to close to home. |
|
|
| The story also mentions the Legion of Doom and The Steve Jackson Games |
| raids. In the "acknowledgments" section at the rear of the book the author |
| has this to say, "As to the society portrayed here, of course much of it is |
| satirical. Alas, many of the incidents --- such as the Steve Jackson case |
| in which a business was searched by Secret Service Agents displaying an |
| unsigned search warrant --- are quite real. So are many of the anti- |
| technological arguments given in the book. There really is an anti- |
| intellectual on-campus movement to denounce 'materialistic science' in |
| favor of something considerably more 'cold and unforgiving.' So watch it." |
| (Special Thanks: The Mad Alchemist) |
| _______________________________________________________________________________ |
|
|
| 9. Bell Atlantic Shoots Themselves in the Foot (February 5, 1992) -- Newsbytes |
| reports that Bell Atlantic admits having funded an advocacy group "Small |
| Businesses for Advertising Choice" to oppose HR 3515, a bill regulating |
| the RBOCs' entry into info services. Tennessee Democrat Jim Cooper, the |
| sponsor, called it a "clumsy Astroturf campaign," meaning fake grass roots. |
|
|
| Republican co-sponsor Dan Schaeffer was a target of a similar campaign by US |
| West, in which telephone company employees were encouraged to call their |
| representatives on company time to oppose the measure. |
|
|
| The bill is HR 3515. To get a copy, call the House Documents Room at |
| (202)225 3456 and ask for a copy. It's free (more accurately, you have |
| already paid for it). |
| _______________________________________________________________________________ |
|
|
| 10. Computer Hackers Get Into Private Credit Records (Columbus Dispatch, |
| February 24, 1992) -- DAYTON - Computer hackers obtained confidential |
| credit reports of Midwest consumers from a credit reporting firm in |
| Atlanta. Atlanta-based Equifax said a ring of 30 hackers in Dayton [Ohio] |
| stole credit card numbers and bill-paying histories of the consumers by |
| using an Equifax customer's password. |
|
|
| Ronald J. Horst, security consultant for the company said the break-in |
| apparently began in January. Police don't know if the password was stolen |
| or if an employee of the client company cooperated with the hackers. Horst |
| said the hackers were apparently doing it just for fun. No charges have |
| been filed. Equifax will notify customers whose credit reports were taken. |
| _______________________________________________________________________________ |
|
|
| 11. Fingerprints And Connected Databases (Summary of an article by Stephen |
| Schwartz, San Francisco Chronicle, February 22, 1992, Page A16) -- A |
| fingerprint found in an unsolved 1984 murder of an 84-year-old woman was |
| kept in the San Francisco police database all these years. Recently the |
| San Francisco fingerprint database was linked with the Alameda County |
| fingerprint database. The old print matched a new one taken in connection |
| with a petty theft case, and so eight years later the police were able to |
| solve the old case (burglary, arson, homicide). The two girls implicated |
| were 12 and 15 at the time. (Special Thanks: Peter G. Neumann of RISKS) |
|
|