| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 16 of 17 |
|
|
|
|
| -------------------------[ P H R A C K W O R L D N E W S |
|
|
|
|
| --------[ Issue 51 |
|
|
|
|
| 0x1: Illinois man arrested after threatening Bill Gates |
| 0x2: Man Arrested In Tokyo On Hacker Charges |
| 0x3: FBI says hacker sold 100,000 credit card numbers |
| 0x4: MS Security Plugs Not Airtight |
| 0x5: BSA slams DTI's Encryption Plans |
| 0x6: Teen bypasses blocking software |
| 0x7: The Power to Moderate is the Power to Censor |
| 0x8: AOL Users in Britain Warned of Surveillance |
| 0x9: Georgia Expands the "Instruments of Crime" |
| 0xa: NASA Nabs Teen Computer Hacker |
| 0xb: Agriculture Dept. Web Site Closed after Security Breach |
| 0xc: Hackers Smash US Government Encryption Standard |
| 0xd: Hacker May Stolen JonBenet computer Documents |
| 0xe: Hacker Vows 'Terror' for Pornographers |
| 0xf: Mitnick Gets 22 Month Sentence |
| 0x10: New York Judge Prohibits State Regulation of Internet |
| 0x11: Breaking the Crypto Barrier |
| 0x12: Setback in Efforts to Secure Online Privacy |
| 0x13: Captain Crunch Web Site Now Moved |
| 0x14: US Justive Dept. Investigating Network Solutions |
| 0x15: Cyber Patrol Bans Crypt Newsletter |
| 0x16: Some humor on media hacks and hackers |
| 0x17: Court Mixes Internet Smut Provision |
|
|
| 0x1: Book Title: Underground |
| 0x2: Book Title: "Hackers" |
|
|
| 0x1: Convention: Cybercrime Conference Announcement |
| 0x2: Convention: Computers & The Law IV Symposium |
|
|
|
|
| 0x1>------------------------------------------------------------------------- |
| |
|
|
| Title: Illinois man arrested after threatening Bill Gates |
| Source: Reuter |
| Author: unknown |
|
|
| SEATTLE (Reuter) - An Illinois man has been arrested and charged with |
| threatening to kill Microsoft Corp. Chairman Bill Gates in a $5 |
| million extortion plot, authorities said on Friday. |
| |
| Adam Pletcher was arrested on May 9 in the Chicago suburb of Long |
| Grove, where he lives with his parents, and charged with extortion, |
| federal prosecutors said. He was freed on $100,000 bond and is due to |
| appear in U.S. District Court in Seattle on Thursday for arraignment. |
| |
| According to court documents, Pletcher sent four letters to Gates, |
| beginning in March, threatening to kill the software company founder |
| and his wife, Melinda, unless payment of at least $5 million was made. |
| |
| The first letter was intercepted at the company's headquarters in |
| Redmond, Washington, by corporate security officers, who contacted the |
| FBI. |
| |
| Agents then used an America Online dating service specified by the |
| author of the letters to track down Pletcher, described as a loner in |
| his early 20s who spends much of his time in front of the computer. |
| |
| Authorities said they treated the threats seriously but did not |
| believe Gates' life was ever in danger. |
| |
| "We generally think this was a kid with a rich fantasy life, just |
| living that out," said Tom Ziemba, a spokesman for U.S. Attorney |
| Katrina Pflaumer. |
| |
| "This was handled in a fairly routine fashion by Microsoft security |
| and law enforcement agencies," Microsoft spokesman Mark Murray said. |
| "At some point in the investigation Microsoft did make Bill aware of |
| the situation." |
| |
| Pletcher's online activities have landed him in trouble before. |
| |
| In February the Illinois attorney general sued Pletcher, accusing him |
| of defrauding consumers of thousands of dollars in an alleged Internet |
| scam, according to a story in the Chicago Tribune. Several consumers |
| complained they sent Pletcher up to $5,500 to find them a car deal and |
| never got their money back. |
| |
| Despite his status as richest man in America, with a Microsoft stake |
| valued at more than $30 billion, Gates is still known to travel alone |
| on regularly scheduled flights. But Murray said the executive was |
| well-protected. |
| |
| "We don't comment at all on Bill's security other than to say that |
| there are extensive and appropriate security measures in place for |
| Bill, for his family and for Microsoft facilities and personnel," |
| Murray said. |
| |
| 0x2>------------------------------------------------------------------------- |
|
|
| Title: Man Arrested In Tokyo On Hacker Charges |
| Source: unknown |
| Author: unknown |
|
|
| TOKYO (May 23, 1997 10:31 a.m. EDT) - A 27-year-old Japanese man was |
| arrested Friday on suspicion of breaking into an Internet home page of |
| Asahi Broadcasting Corp. and replacing it with pornography, a police |
| spokesman said. |
|
|
| Koichi Kuboshima, a communications equipment firm employee from Saitama |
| Prefecture, north of Tokyo, was arrested on charges of interrupting |
| business by destroying a computer network. |
|
|
| It was the first arrest related to illegal access to the information |
| network, the police spokesman said, adding Kuboshima was also charged |
| with displaying obscene pictures, the spokesman said. |
|
|
| The suspect admitted to the crime, telling police he had done it for |
| fun, police officials said. |
|
|
| The Osaka-based broadcasting network blocked access to all of its home |
| pages on Sunday immediately after it was notified of the offense by an |
| Internet user. |
|
|
| The Asahi home page is designed to allow users to download and upload |
| information, which allowed Kuboshima to rewrite the contents, the |
| spokesman said. |
|
|
| 0x3>------------------------------------------------------------------------- |
| |
| Title: FBI says hacker sold 100,000 credit card numbers |
| Source: unknown |
| Author: unknown |
|
|
| SAN FRANCISCO (May 23, 1997 10:13 a.m. EDT) -- A clever hacker slipped |
| into a major Internet provider and gathered 100,000 credit card |
| numbers along with enough information to use them, the FBI said |
| Thursday. |
|
|
| Carlos Felipe Salgado, Jr., 36, who used the online name "Smak," |
| allegedly inserted a program that gathered the credit information from |
| a dozen companies selling products over the Internet, said FBI |
| spokesman George Grotz. |
|
|
| [Secure electronic commerce is a novel idea.] |
| |
| Salgado allegedly tried to sell the credit information to an |
| undercover agent for $260,000. He was arrested Wednesday and faces a |
| maximum 15 years in prison and $500,000 in fines if convicted on |
| charges of unauthorized access of computers and trafficking in stolen |
| credit card numbers. |
| |
| "What is unique about this case is that this individual was able to |
| hack into this third party, copy this information and encrypt it to be |
| sold," Grotz said. |
|
|
| [Since we know others have hacked in and stolen credit cards before, |
| the unique part is him trying to sell them. That isn't in keeping |
| with what federal agents love to say about hackers and credit card |
| incidents. Convenient how they change things like that.] |
| |
| Had it succeeded, "at minimum we'd have 100,000 customers whose |
| accounts could have been compromised and would not have known it until |
| they got their bill at the end of the month," the FBI spokesman said. |
|
|
| The scheme was discovered by the unidentified San Diego-based Internet |
| provider during routine maintenance. Technicians found an intruder had |
| placed a program in their server called a "packet sniffer," which |
| locates specified blocks of information, such as credit card numbers. |
|
|
| [Uh...more like they kept a nice ascii database full of the numbers |
| that was copied with expert technique like "cp ccdb"...] |
|
|
| The FBI traced the intruder program to Salgado, who was using an |
| account with the University of California-San Francisco. |
| |
| A school spokeswoman said officials have not yet determined whether |
| Salgado attended or worked at the school, or how he got access to the |
| account. |
| |
| With the cooperation of a civilian computer user who was in |
| communication with Salgado, the FBI arranged to have an undercover |
| agent buy the stolen credit card information. |
| |
| After making two small buys, the FBI agents arranged to meet Salgado |
| on Wednesday at San Francisco International Airport to pay $260,000 |
| for 100,000 credit card numbers with credit limits that ranged up to |
| $25,000 each. |
| |
| After decrypting and checking that the information was valid, Salgado |
| was taken into custody at his parents' house in Daly City. Salgado |
| waived his rights and acknowledged breaking into computers, including |
| the San Diego company, according to the affidavit. |
| |
| The FBI has not found any evidence Salgado made any purchases with the |
| numbers himself, the spokesman said, but the investigation is |
| continuing. |
| |
| Salgado appeared before a federal magistrate Thursday and was released |
| on a $100,000 personal bond. Grotz said that as a condition of bail, |
| "the judge forbids him to come anywhere near a computer." |
| |
|
|
| 0x4>------------------------------------------------------------------------- |
| |
| Title: MS Security Plugs Not Airtight |
| Source: unknown |
| Author: Nick Wingfield |
|
|
| (May 22, 1997, 12:45 p.m. PT) Microsoft (MSFT) is still struggling to |
| completely patch Windows 95 and NT against Internet hacker attacks. |
|
|
| The company has posted a software patch that protects Windows 95 users |
| from an attack that can crash their computers. The company issued a |
| similar patch for Windows NT last week. |
|
|
| But both the Windows NT and 95 patches aren't complete prophylactics for |
| so-called out-of-band data attacks since both platforms can still be |
| crashed by hackers with Macintosh and Linux computers. Microsoft said |
| today that it hopes to post new patches by tonight that remedy the |
| vulnerability to Mac- and Linux-based attacks. |
|
|
| The current Windows 95 patch--without protection for Mac and Linux |
| attacks--can be downloaded for free from Microsoft's Web site. |
|
|
| This year, Microsoft programmers have been forced to create a medicine |
| chest of software remedies to fix potential security risks in everything |
| from the Internet Explorer browser to PowerPoint to Windows itself. Some |
| security experts believe the company is struggling with deep-rooted |
| vulnerabilities in its OS and Internet technologies. |
|
|
| It's clear that the Internet has made it much easier for enterprising |
| bug-finders to broadcast their discoveries to the press and public over |
| email lists and Web pages. This has put intense pressure on |
| Microsoft's engineering groups to quickly come up with patches. |
|
|
| Other companies, such as Sun Microsystems, have also had to release a |
| number of patches for their technologies, but Microsoft has been |
| especially hard-hit. |
|
|
| A number of security experts believe that Microsoft would have had a |
| hard time avoiding these security problems. |
|
|
| "As a professional programmer, I have a real hard time saying that |
| Microsoft should have seen this coming," said David LeBlanc, senior |
| Windows NT security manager at Internet Security Systems, a developer of |
| security software. "I get hit with this stuff too. With 20/20 hindsight, |
| it's really obvious to see what we did wrong. Trying to take into |
| account all the possibilities that can occur beforehand is not |
| realistic." |
|
|
| In order to exploit the latest vulnerability, Web sites must send a |
| special TCP/IP command known as "out of band data" to port 139 of a |
| computer running Windows 95 or NT. Hackers could also target users' PCs |
| by using one of several programs for Windows, Unix, and Macintosh now |
| circulating on the Net. With one program, called WinNuke, a hacker |
| simply types a user's Internet protocol address and then clicks the |
| program's "nuke" button in order to crash a PC over the Net. |
|
|
| The company's original patch for Windows NT prevents attacks from Unix |
| and other Windows computers. But because of a difference in the way |
| Mac and Linux computers handle the TCP protocol, Microsoft's patch |
| didn't squelch attacks from those operating systems. |
|
|
| [Bullshit meter: ****- - In actuality, Microsoft just decided to |
| filter hits on that port looking for a keyword included in the |
| first 'winuke' script. By changing that word, 95 was once again |
| vulnerable to these attacks. Good work Microsoft.] |
|
|
| A number of users have sent email to CNET's NEWS.COM complaining that |
| their computers were repeatedly crashed as they chatted in Internet |
| relay chat groups. When users are nuked by a hacker, their computer |
| screens often display an error message loosely known as the "blue screen |
| of death." |
|
|
| "The worst part about it is that the delinquents playing with this toy |
| really like to play with it and keep on doing it," said Martin A. |
| Childs, a law student at Louisiana State University in Baton Rouge. "The |
| first time I got hit, I logged on six times before I managed to figure |
| out what was going on." |
|
|
| The original patches for Windows NT versions 4.0 and 3.51 are available |
| on Microsoft's Web site. Last Thursday, the company also posted a |
| collection of software patches, called service pack 3, that contains the |
| NT out-of-band fix. |
|
|
| The out-of-band data attacks also affect users of Windows 3.11, but a |
| company spokeswoman said that Microsoft will not prepare a fix for that |
| platform unless users request one. |
|
|
| 0x5>------------------------------------------------------------------------- |
| |
| Title: BSA slams DTI's Encryption Plans |
| Source: The IT Newspaper |
| Author: unknown |
| Date: 26th June 1997 |
|
|
| |
| Government Proposals on encryption are 'unworkable, unfar, unweildy, |
| un-needed and frankly unacceptable', according to the British Software |
| Alliance (BSA) and the British Interactive Multimedia Association (Bima), |
| writes Tim Stammers. |
| |
| In a joint statement, the organizations claimed that encryption |
| proposals from the DTI could 'cripple the growth of electronic comerce in |
| the UK'. |
| |
| Tod Cohen, lawyer at Covington & Berling, council to the BSA, said: |
| 'These proposals could be a disaster for both users and vendors'. |
| |
| The DTI's plan calls for UK organisations which want to encrypt email |
| and data to supply copies of their encryption keys to third parties. |
| |
| Government agencies will then be able to demand access to copies of the |
| keys. The DTI says the scheme aims to prevent criminal use of encryption |
| by drug dealers and terrorists. |
| |
| But the BSA and BIMA claim that the proposed tystem will create a |
| massive bureaucratic structure will criminals will ignore. |
| |
| 'The sheer number of electronic communications could easily overwhelm |
| the system, without inreasing security or safety within the UK', their |
| statement said. |
| |
| Sean Nye, executive member of Bima, said : 'In an age where personal |
| data and information is increasingly threatened with unwarranted |
| exposure, the DTI's proposals are a major step backwards'. |
| |
| Opposition to the so-called key escrow system suggested by the DTI has |
| been widespread. Public opponents include Brian Gladman, former deputy |
| director at Nato's labratories. |
| |
| The proposals where formulated under the last government, and a |
| decision on their future is expected next month. |
| |
| The US government is easing encryption export controls for software |
| companies which are prepared to back key escrow, but has met Senate |
| opposition to its plans. |
| |
| 0x6>------------------------------------------------------------------------- |
| |
| Title: Teen bypasses blocking software |
| Sounce: www.news.com |
| Author: Courtney Macavinta |
| Date: April 22, 1997, 5:30 p.m. PT |
|
|
| A teenager is using his Web site to help others bypass one brand |
| of filtering software intended to protect minors from illicit Net |
| material. |
|
|
| Using the "CYBERsitter codebreaker" from 18-year-old Bennett |
| Haselton, surfers can now decode the list of all Net sites |
| blocked by Solid Oak's Cybersitter software. |
|
|
| Haselton--the founder of a teen organization called Peacefire |
| that fights Net censorship--contends that the software violates |
| free speech rights for adults and teen-agers. He claims the |
| software is also falsely advertised because it promises parents |
| the "ability to limit their children's access to objectionable |
| material on the Internet," but also blocks other content on the |
| Net. |
|
|
| Haselton's campaign to get around Cybersitter has Solid Oak's |
| president seeing red. |
|
|
| Solid Oak denies Haselton's charges and is investigating the |
| legality of the code-breaking program. "He doesn't know anything, |
| and he's just a kid," Solid Oak President Brian Milburn said |
| today. "We have never misrepresented our product--ever." |
|
|
| Haselton's Cybersitter codebreaker can be used to crack a coded |
| list of the sites that CYBERsitter blocks. The list is |
| distributed to subscribers to notify users what sites are being |
| blocked. Subscribers pay $39.95 for the software. |
|
|
| The software blocks sites containing any words describing |
| genitals, sex, nudity, porn, bombs, guns, suicide, racial slurs |
| and other violent, sexual and derogatory terms. |
|
|
| The list also blocks an array of sites about gay and lesbian |
| issues, including PlanetOut and the International Gay and Lesbian |
| Human Rights Commission . Cybersitter even blocks the National |
| Organization for Women because it contains information about |
| lesbianism, Solid Oak stated. "The NOW site has a bunch of |
| lesbian stuff on it, and our users don't want it," said Milburn. |
|
|
| The software also filters any site that contains the phrase |
| "Don't buy CYBERsitter" as well as Haselton's own site and any |
| reference to his name. |
|
|
| Milburn says Haselton's campaign is hurting the product's |
| marketability and hinted that the company will stop him, but |
| wouldn't say exactly how. |
|
|
| "We have users who think they purchased a secure product. This is |
| costing us considerably," Milburn said. "But we're not going to |
| let Bennett break the law." |
|
|
| He did point out that Haselton's program to decode the software |
| may violate its licensing agreement, which states: "Unauthorized |
| reverse engineering of the Software, whether for educational, |
| fair use, or other reason is expressly forbidden. Unauthorized |
| disclosure of CYBERsitter operational details, hacks, work around |
| methods, blocked sites, and blocked words or phrases are |
| expressly prohibited." |
|
|
| Haselton is undaunted by the suggestion of legal reprecussions. |
| "I've talked to a lawyer who offered to represent me in the event |
| that Cybersitter goes after me," he added. |
|
|
| Haselton, a junior at Vanderbuilt University, argues that the |
| software doesn't protect kids from smut, but just keeps them from |
| learning new ideas. |
|
|
| "Blocking software is not the solution to all of our problems. |
| What's dangerous is not protecting [teenagers' free] speech on |
| the Net as well," he said. "This is the age, when you form your |
| opinions about social issues, human rights, and religion. We need |
| to keep free ideas on the Net for people under 18." |
|
|
| Haselton's organization is also a plaintiff in a lawsuit being |
| argued today in New York, the American Library Association vs. |
| Governor George Pataki. The case was filed to strike down a state |
| law similar to the Communications Decency Act that prohibits |
| making indecent material available to minors over the Net. |
|
|
| 0x7>------------------------------------------------------------------------- |
| |
| Title: The Power to Moderate is the Power to Censor |
| Source: unknown |
| Author: Paul Kneisel |
|
|
| Some 200+ new news groups have just been created on the UseNet part of the |
| Internet. They are grouped under a new <gov.*> hierarchy. |
|
|
| <gov.*> promises to "take democracy into cyberspace," according to the |
| press release from the National Science Foundation.[1] "The U.S. |
| government," said U.S. Vice President Al Gore of the GovNews project, "is |
| taking a leadership role in providing technology that could change the face |
| of democracy around the world."[2] |
|
|
| The GovNews project repeatedly stresses how it will support and promote |
| feedback between governments and citizens. "Millions of people will now be |
| able to follow and comment on government activity in selected areas of |
| interest...," the release stated, promising "a wide, cost-effective |
| electronic dissemination and discussion...." |
|
|
| Preston Rich, the National Science Foundation's leader of the International |
| GovNews Project, described GovNews as "newsgroups logically organized by |
| topic from privatization, procurements and emergency alerts to toxic waste |
| and marine resources and include[s] the capability to discuss such |
| information."[1] |
|
|
| The vast majority of the new <gov.*> groups are moderated. |
|
|
| The idea of the moderated news |
| group is increasingly accepted on UseNet. Off-topic posts, flames, and spam |
| have made many non-moderated groups effectively unreadable by most users. |
| Moderated groups are one effective way around these problems. New groups |
| created in the non-<gov.*> "Big 8" UseNet hierarchy have formal charters |
| defining the group. If the group is moderated then the powers, identity, |
| and qualifications of the moderators are also listed. Unmoderated groups |
| might be likened to informal free-for-all debates where there is no check |
| on who can participate or on the form or content of what is said. Moderated |
| groups are far closer to a specially-defined meeting of citizens with a |
| formal Chair, empowered to declare certain topics off-limits for |
| discussion, and to call unruly participants to order. |
|
|
| An unmoderated UseNet group dedicated to baking cookies might be flooded |
| with posts advertising bunion cures, reports of flying saucers sighted over |
| Buckingham Palace, or articles denouncing Hillary Clinton as a Satanist. A |
| moderator for the group has the power to block all of these posts, ensuring |
| that they are not sent to the UseNet feed and do not appear among the |
| on-topic discussion of cookies. |
|
|
| Certainly some moderators on UseNet groups abuse their powers (as do some |
| Chairs at non-Internet meetings.) But reports of such abuse are relatively |
| rare given the number of moderated groups. And, of course, many complaints |
| come from the proverbial "net.kooks" or those who oppose moderation in |
| general. |
|
|
| Moderators in the "Big 8" UseNet hierarchy are "civilians," not government |
| employees moderating government-related groups while collecting government |
| paychecks. |
|
|
| The <gov.*> hierarchy inferentially changes this. I write "inferentially" |
| because the charters, names and qualifications of the moderators in the |
| 200+ groups has not been formally announced. Nor do routine queries to |
| members of the <gov.*> leading Hierarchial Coordinating Committee result in |
| such detailed information. |
|
|
| UseNet is not the entire Internet. Net-based technology like the World Wide |
| Web and the "File Transfer Protocol" or FTP are designed for the one-way |
| transmission of data. Few object to the _Congressional Record_ on-line or |
| crop reports posted by the U.S. Department of Agriculture available on the |
| Web or via FTP. But the news groups of UseNet are designed for two-way |
| discussions, not spam-like one-way info-floods of data carefully selected |
| by government bureaucrats. |
|
|
| That creates an enormous problem when government employees moderate the |
| discussion, regardless of how well, appropriately, or fairly the moderation |
| is conducted. |
|
|
| For government moderation of any discussion is censorship and it is wrong. |
|
|
| Initial reports also indicate that most of the <gov.*> groups will be "robo |
| [t]-moderated." In other words, specialized software programs will handle |
| the bulk of the moderator's tasks. Robo-moderation, however, alters |
| nothing. A good robo program may catch and eliminate 99% of the spam sent |
| to the group or identify notorious flame-artists. But the power to |
| robo-moderate remains the power to censor; the power to select one |
| robo-moderator is the power to select another; the power to automatically |
| remove bunion ads is simultaneously the power to eliminate all posts from |
| Iraq in a political discussion or any message containing the string |
| "Whitewater." |
|
|
| In short, moderation on <gov.*> groups by government employees remains |
| censorship whether conducted by software or humans, whether posts are |
| approriately banned or the moderation places severe limits on free |
| political speech. *Any* limitation of posts from any citizen by any |
| government employee is censorship. |
|
|
| It is also forbidden by law. |
|
|
| FOOTNOTES |
| [1] "GOVNEWS: N[ational] S[cience] F[oundation] Press Release for GovNews," |
| 17 Mar 1997, <http://www.govnews.org/govnews/info/press.html>, accessed 21 |
| Mar 1997. |
|
|
| [2] One wonders what technology Gore believes GovNews is providing. |
| Certainly neither the Internet or UseNet is part of that technology for |
| both existed long before GovNews.^Z |
|
|
| 0x8>------------------------------------------------------------------------- |
|
|
| Title: AOL Users in Britain Warned of Surveillance |
| Source: unknown |
| Author: CHristopher Johnston |
|
|
| LONDON - Subscribers logging onto AOL Ltd. in Britain this week |
| were greeted with news that the Internet-service provider was |
| imposing a tough new contract giving it wide latitude to disclose |
| subscribers' private E-mail and on-line activities to law |
| enforcement and security agencies. |
|
|
| The new contract also requires users to comply with both British |
| and U.S. export laws governing encryption. AOL Ltd. is a |
| subsidiary of AOL Europe, which is a joint venture between |
| America Online Inc. of the United States and Germany's |
| Bertelsmann GmbH. |
|
|
| The contract notes in part that AOL ''reserves the right to |
| monitor or disclose the contents of private communication over |
| AOL and your data to the extent permitted or required by law.'' |
|
|
| ''It's bad news,'' said Marc Rotenberg, director of the |
| Electronic Privacy Information Center, a Washington-based civil |
| liberties organization. ''I think AOL is putting up a red flag |
| that their commitment to privacy is on the decline. It puts |
| their users on notice that to the extent permitted by law, they |
| can do anything they want.'' |
|
|
| The contract also prohibits subscribers from posting or |
| transmitting any content that is ''unlawful, harmful, |
| threatening, abusive, harassing, defamatory, vulgar, obscene, |
| seditious, blasphemous, hateful, racially, ethnically or |
| otherwise objectionable.'' |
|
|
| AOL and its competitors called the move part of a trend to |
| protect on-line service providers from suits by users in case |
| they are required to disclose subscribers' activities to law |
| enforcement agencies. |
|
|
| The contract also beefed up the legal wording relating to |
| sensitive content such as pornography, and prohibiting the |
| maintenance of links to obscene Web sites. |
|
|
| The updated contract is also the first to inform subscribers that |
| they are required to comply with both British and U.S. export |
| laws governing encryption, or coding, a hot topic of debate |
| recently between software publishers and security agencies. |
|
|
| AOL Europe will provide similar contracts, which vary according |
| to local law in each of the seven European countries in which the |
| network operates. |
|
|
| AOL executives denied any government pressure in updating the |
| contract. |
|
|
| 0x9>------------------------------------------------------------------------- |
| |
| Title: Georgia Expands the "Instruments of Crime" |
| Source: fight-censorship@vorlon.mit.edu |
|
|
| In Georgia it is a crime, punishable by $30K and four years to use in |
| furtherance of a crime: |
|
|
| * a telephone |
| * a fax machine |
| * a beeper |
| * email |
|
|
| The actual use of the law, I think, is that when a person is selling drugs |
| and either is in possession of a beeper, or admits to using the phone to |
| facilitate a meeting, he is charged with the additional felony of using a |
| phone. This allows for selective enforcement of additional penalties for |
| some people. |
|
|
| O.C.G.A. 16-13-32.3. |
|
|
| (a) It shall be unlawful for any person knowingly or intentionally to |
| use any communication facility in committing or in causing or |
| facilitating the commission of any act or acts constituting a felony |
| under this chapter. Each separate use of a communication facility |
| shall be a separate offense under this Code section. For purposes of |
| this Code section, the term "communication facility" means any and all |
| public and private instrumentalities used or useful in the |
| transmission of writing, signs, signals, pictures, or sounds of all |
| kinds and includes mail, telephone, wire, radio, computer or computer |
| network, and all other means of communication. |
|
|
| (b) Any person who violates subsection (a) of this Code section shall |
| be punished by a fine of not more than $30,000.00 or by imprisonment |
| for not less than one nor more than four years, or both. |
|
|
| 0xa>------------------------------------------------------------------------- |
| |
| Title: NASA Nabs Teen Computer Hacker |
| Source: Associated Press |
| Author: unknown |
| Date: Monday, June 2, 1997 |
|
|
| WASHINGTON (AP) - A Delaware teen-ager who hacked his way into a |
| NASA web site on the Internet and left a message berating U.S. |
| officials is being investigated by federal authorities, agency |
| officials said Monday. |
|
|
| NASA Inspector General Robert Gross cited the incident - the most |
| recent example of a computer invasion of a NASA web site - as an |
| example of how the space agency has become ``vulnerable via the |
| Internet.'' |
|
|
| "We live in an information environment vastly different than 20 |
| years ago," Gross said in a written statement. "Hackers are |
| increasing in number and in frequency of attack." |
|
|
| In the latest case, the Delaware teen, whose name, age and |
| hometown were not released, altered the Internet web site for the |
| Marshall Space Flight Center in Huntsville, Ala., according to |
| the statement from the computer crimes division of NASA's |
| Inspector General Office. |
|
|
| "We own you. Oh, what a tangled web we weave, when we practice to |
| deceive," the teen's message said, adding that the government |
| systems administrators who manage the site were "extremely |
| stupid." |
|
|
| The message also encouraged sympathizers of Kevin Mitnick, a |
| notorious computer hacker, to respond to the site. Mitnick was |
| indicted last year on charges stemming from a multimillion-dollar |
| crime wave in cyberspace. |
|
|
| The altered message was noticed by the computer security team in |
| Huntsville but the NASA statement did not mention how long the |
| message was available to the public or exactly when it was |
| discovered. NASA officials weren't made available to answer |
| questions about the event. |
|
|
| In the statement, NASA called the teen's hacking "a cracking |
| spree" and said it was stopped May 26 when his personal computer |
| was seized. |
|
|
| Prosecutors from the U.S. Attorney's office in Delaware and |
| Alabama are handling the case with NASA's computer crimes |
| division. |
|
|
| Last March, cyberspace invaders made their way into another NASA |
| web site and threatened an electronic terrorist attack against |
| corporate America. The group, which called itself ``H4G1S'' in |
| one message and ``HAGIS'' in another, also called for some |
| well-known hackers to be released from jail. |
|
|
| Engineers at the Goddard Space Flight Center in Greenbelt, Md., |
| quickly noticed the change and took the page off the Internet |
| within 30 minutes. NASA officials said the agency installed |
| electronic security measures designed to prevent a recurrence. |
|
|
| 0xb>------------------------------------------------------------------------- |
| |
| Title: Agriculture Dept. Web Site Closed after Security Breach |
| Source: Reuter |
| Author: unknown |
|
|
| WASHINGTON (June 11, 1997 00:08 a.m. EDT) - The U.S. Agriculture |
| Department's Foreign Agricultural Service shut down access to its |
| internet home page Tuesday after a major security breach was |
| discovered, a department aide said. |
|
|
| "It's a big, huge problem," Ed Desrosiers, a computer specialist |
| in USDA's Farm Service Agency, told Reuters. "We can't guarantee |
| anything's clean anymore." |
|
|
| Someone broke into system and began "sending out a lot of |
| messages" to other "machines" on the internet, Desrosiers said. |
|
|
| The volume of traffic was so great, "we were taking down machines" |
| and began receiving complaints, he said. |
|
|
| "It's not worth our time to try to track down" the culprit, |
| Desrosiers said. "Instead, we're just going to massively increase |
| security." |
|
|
| A popular feature on the FAS home page is the search function for |
| "attache reports," which are filed by overseas personnel and |
| provide assessments on crop conditions around the world. Although |
| not official data, the reports provide key information that goes |
| into USDA's monthly world supply-and-demand forecasts. |
|
|
| It could be next week before the page is open to outside users |
| again, Desrosiers said. |
|
|
| 0xc>------------------------------------------------------------------------- |
| |
| Title: Hackers Smash US Government Encryption Standard |
| Source: fight-censorship@vorlon.mit.edu |
|
|
| Oakland, California (June 18, 1997)-The 56-bit DES encryption |
| standard, long claimed "adequate" by the U.S. Government, was |
| shattered yesterday using an ordinary Pentium personal computer |
| operated by Michael K. Sanders, an employee of iNetZ, a Salt Lake |
| City, Utah-based online commerce provider. Sanders was part of a |
| loosely organized group of computer users responding to the "RSA |
| $10,000 DES Challenge." The code-breaking group distributed computer |
| software over the Internet for harnessing idle moments of computers |
| around the world to perform a 'brute force' attack on the encrypted |
| data. |
|
|
| "That DES can be broken so quickly should send a chill through the |
| heart of anyone relying on it for secure communications," said Sameer |
| Parekh, one of the group's participants and president of C2Net |
| Software, an Internet encryption provider headquartered in Oakland, |
| California (http://www.c2.net/). "Unfortunately, most people today |
| using the Internet assume the browser software is performing secure |
| communications when an image of a lock or a key appears on the |
| screen. Obviously, that is not true when the encryption scheme is |
| 56-bit DES," he said. |
|
|
| INetZ vice president Jon Gay said "We hope that this will encourage |
| people to demand the highest available encryption security, such as |
| the 128-bit security provided by C2Net's Stronghold product, rather |
| than the weak 56-bit ciphers used in many other platforms." |
|
|
| Many browser programs have been crippled to use an even weaker, 40-bit |
| cipher, because that is the maximum encryption level the |
| U.S. government has approved for export. "People located within the US |
| can obtain more secure browser software, but that usually involves |
| submitting an affidavit of eligibility, which many people have not |
| done," said Parekh. "Strong encryption is not allowed to be exported |
| from the U.S., making it harder for people and businesses in |
| international locations to communicate securely," he explained. |
|
|
| According to computer security expert Ian Goldberg, "This effort |
| emphasizes that security systems based on 56-bit DES or |
| "export-quality" cryptography are out-of-date, and should be phased |
| out. Certainly no new systems should be designed with such weak |
| encryption.'' Goldberg is a member of the University of California at |
| Berkeley's ISAAC group, which discovered a serious security flaw in |
| the popular Netscape Navigator web browser software. |
|
|
| The 56-bit DES cipher was broken in 5 months, significantly faster |
| than the hundreds of years thought to be required when DES was adopted |
| as a national standard in 1977. The weakness of DES can be traced to |
| its "key length," the number of binary digits (or "bits") used in its |
| encryption algorithm. "Export grade" 40-bit encryption schemes can be |
| broken in less than an hour, presenting serious security risks for |
| companies seeking to protect sensitive information, especially those |
| whose competitors might receive code-breaking assistance from foreign |
| governments. |
|
|
| According to Parekh, today's common desktop computers are tremendously |
| more powerful than any computer that existed when DES was |
| created. "Using inexpensive (under $1000) computers, the group was |
| able to crack DES in a very short time," he noted. "Anyone with the |
| resources and motivation to employ modern "massively parallel" |
| supercomputers for the task can break 56-bit DES ciphers even faster, |
| and those types of advanced technologies will soon be present in |
| common desktop systems, providing the keys to DES to virtually |
| everyone in just a few more years." |
|
|
| 56-bit DES uses a 56-bit key, but most security experts today consider |
| a minimum key length of 128 bits to be necessary for secure |
| encryption. Mathematically, breaking a 56-bit cipher requires just |
| 65,000 times more work than breaking a 40-bit cipher. Breaking a |
| 128-bit cipher requires 4.7 trillion billion times as much work as one |
| using 56 bits, providing considerable protection against brute-force |
| attacks and technical progress. |
|
|
| C2Net is the leading worldwide provider of uncompromised Internet |
| security software. C2Net's encryption products are developed entirely |
| outside the United States, allowing the firm to offer full-strength |
| cryptography solutions for international communications and |
| commerce. "Our products offer the highest levels of security available |
| today. We refuse to sell weak products that might provide a false |
| sense of security and create easy targets for foreign governments, |
| criminals, and bored college students," said Parekh. "We also oppose |
| so-called "key escrow" plans that would put everyone's cryptography |
| keys in a few centralized locations where they can be stolen and sold |
| to the highest bidder," he added. C2Net's products include the |
| Stronghold secure web server and SafePassage Web Proxy, an enhancement |
| that adds full-strength encryption to any security-crippled "export |
| grade" web browser software. |
|
|
| 0xd>------------------------------------------------------------------------- |
| |
| Title: Hacker May Stolen JonBenet computer Documents |
| Source: Associated Press |
| Author: Jennifer Mears |
|
|
| BOULDER, Colo. (June 13, 1997 07:38 a.m. EDT) -- A computer hacker has |
| infiltrated the system set aside for authorities investigating the slaying |
| of JonBenet Ramsey, the latest blow to a heavily criticized inquiry. |
|
|
| [...despite the computer not being online or connected to other computers..] |
|
|
| Boulder police spokeswoman Leslie Aaholm said the computer was "hacked" |
| sometime early Saturday. The incident was announced by police Thursday. |
|
|
| "We don't believe anything has been lost, but we don't know what, if |
| anything, has been copied," said Detective John Eller, who is leading the |
| investigation into the slaying of the 6-year-old girl nearly six months ago. |
|
|
| The computer is in a room at the district attorney's office that police |
| share with the prosecutor's investigators. The room apparently had not been |
| broken into. Computer experts with the Colorado Bureau of Investigations |
| were examining equipment to determine what had been done. |
|
|
| [Bullshit. It was later found out that the machine was not hacked at all.] |
|
|
| 0xe>------------------------------------------------------------------------- |
|
|
| Title: Hacker Vows 'Terror' for Pornographers |
| Source: Wired |
| Author: Steve Silberman |
|
|
| After 17 years in the hacker underground, Christian Valor - well known |
| among old-school hackers and phone phreaks as "Se7en" - was convinced |
| that most of what gets written in the papers about computers and hacking |
| is sensationalistic jive. For years, Valor says, he sneered at reports |
| of the incidence of child pornography on the Net as |
| "exaggerated/over-hyped/fearmongered/bullshit." |
|
|
| Now making his living as a lecturer on computer security, Se7en claims |
| he combed the Net for child pornography for eight weeks last year |
| without finding a single image. |
|
|
| That changed a couple of weeks ago, he says, when a JPEG mailed by an |
| anonymous prankster sent him on an odyssey through a different kind of |
| underground: IRC chat rooms with names like #littlegirlsex, ftp |
| directories crammed with filenames like 6yoanal.jpg and 8&dad.jpg, and |
| newsgroups like alt.binaries.pictures.erotica.pre-teen. The anonymous |
| file, he says, contained a "very graphic" image of a girl "no older |
| than 4 years old." |
|
|
| On 8 June, Se7en vowed on a hacker's mailing list to deliver a dose of |
| "genuine hacker terror" to those who upload and distribute such images |
| on the Net. The debate over his methods has stirred up tough questions |
| among his peers about civil liberties, property rights, and the ethics |
| of vigilante justice. |
|
|
| A declaration of war |
|
|
| What Se7en tapped into, he says, was a "very paranoid" network of |
| traders of preteen erotica. In his declaration of "public war" - |
| posted to a mailing list devoted to an annual hacker's convention |
| called DefCon - Se7en explains that the protocol on most child-porn |
| servers is to upload selections from your own stash, in exchange for |
| credits for more images. |
|
|
| What he saw on those servers made him physically sick, he says. "For |
| someone who took a virtual tour of the kiddie-porn world for only one |
| day," he writes, "I had the opportunity to fully max out an Iomega |
| 100-MB Zip disc." |
|
|
| Se7en's plan to "eradicate" child-porn traders from the Net is |
| "advocating malicious, destructive hacking against these people." He |
| has enlisted the expertise of two fellow hackers for the first wave of |
| attacks, which are under way. |
|
|
| Se7en feels confident that legal authorities will look the other way |
| when the victims of hacks are child pornographers - and he claims that |
| a Secret Service agent told him so explicitly. Referring to a command |
| to wipe out a hard drive by remote access, Se7en boasted, "Who are |
| they going to run to? The police? 'They hacked my kiddie-porn server |
| and rm -rf'd my computer!' Right." |
|
|
| Se7en claims to have already "taken down" a "major player" - an |
| employee of Southwestern Bell who Se7en says was "posting ads all over |
| the place." Se7en told Wired News that he covertly watched the man's |
| activities for days, gathering evidence that he emailed to the |
| president of Southwestern Bell. Pseudonymous remailers like |
| hotmail.com and juno.com, Se7en insists, provide no security blanket |
| for traders against hackers uncovering their true identities by |
| cracking server logs. Se7en admits the process of gaining access to |
| the logs is time consuming, however. Even with three hackers on the |
| case, it "can take two or three days. We don't want to hit the wrong |
| person." |
|
|
| A couple of days after submitting message headers and logs to the |
| president and network administrators of Southwestern Bell, Se7en says, |
| he got a letter saying the employee was "no longer on the payroll." |
|
|
| The hacker search for acceptance |
|
|
| Se7en's declaration of war received support on the original mailing |
| list. "I am all for freedom of speech/expression," wrote one poster, |
| "but there are some things that are just wrong.... I feel a certain |
| moral obligation to the human race to do my part in cleaning up the |
| evil." |
|
|
| Federal crackdowns targeting child pornographers are ineffective, many |
| argued. In April, FBI director Louis Freeh testified to the Senate |
| that the bureau operation dubbed "Innocent Images" had gathered the |
| names of nearly 4,000 suspected child-porn traffickers into its |
| database. Freeh admitted, however, that only 83 of those cases |
| resulted in convictions. (The Washington Times reports that there have |
| also been two suicides.) |
|
|
| The director's plan? Ask for more federal money to fight the "dark |
| side of the Internet" - US$10 million. |
|
|
| Pitching in to assist the Feds just isn't the hacker way. As one |
| poster to the DefCon list put it, "The government can't enforce laws |
| on the Internet. We all know that. We can enforce laws on the |
| Internet. We all know that too." |
|
|
| The DefCon list was not a unanimous chorus of praise for Se7en's plan |
| to give the pornographers a taste of hacker terror, however. The most |
| vocal dissenter has been Declan McCullagh, Washington correspondent |
| for the Netly News. McCullagh is an outspoken champion of |
| constitutional rights, and a former hacker himself. He says he was |
| disturbed by hackers on the list affirming the validity of laws |
| against child porn that he condemns as blatantly unconstitutional. |
|
|
| "Few people seem to realize that the long-standing federal child-porn |
| law outlawed pictures of dancing girls wearing leotards," McCullagh |
| wrote - alluding to the conviction of Stephen Knox, a graduate student |
| sentenced to five years in prison for possession of three videotapes |
| of young girls in bathing suits. The camera, the US attorney general |
| pointed out, lingered on the girls' genitals, though they remained |
| clothed. "The sexual implications of certain modes of dress, posture, |
| or movement may readily put the genitals on exhibition in a lascivious |
| manner, without revealing them in a nude display," the Feds argued - |
| and won. |
|
|
| It's decisions like Knox v. US, and a law criminalizing completely |
| synthetic digital images "presented as" child porn, McCullagh says, |
| that are making the definition of child pornography unacceptably |
| broad: a "thought crime." |
|
|
| The menace of child porn is being exploited by "censor-happy" |
| legislators to "rein in this unruly cyberspace," McCullagh says. The |
| rush to revile child porn on the DefCon list, McCullagh told Wired |
| News, reminded him of the "loyalty oaths" of the McCarthy era. |
|
|
| "These are hackers in need of social acceptance," he says. "They've |
| been marginalized for so long, they want to be embraced for stamping |
| out a social evil." McCullagh knows his position is a difficult one to |
| put across to an audience of hackers. In arguing that hackers respect |
| the property rights of pornographers, and ponder the constitutionality |
| of the laws they're affirming, McCullagh says, "I'm trying to convince |
| hackers to respect the rule of law, when hacking systems is the |
| opposite of that." |
|
|
| But McCullagh is not alone. As the debate over Se7en's declaration |
| spread to the cypherpunks mailing list and alt.cypherpunks - |
| frequented by an older crowd than the DefCon list - others expressed |
| similar reservations over Se7en's plan. |
|
|
| "Basically, we're talking about a Dirty Harry attitude," one network |
| technician/cypherpunk told Wired News. Though he senses "real feeling" |
| behind Se7en's battle cry, he feels that the best way to deal with |
| pornographers is to "turn the police loose on them." Another |
| participant in the discussion says that while he condemns child porn |
| as "terrible, intrinsically a crime against innocence," he questions |
| the effectiveness of Se7en's strategy. |
|
|
| "Killing their computer isn't going to do anything," he says, |
| cautioning that the vigilante approach could be taken up by others. |
| "What happens if you have somebody who doesn't like abortion? At what |
| point are you supposed to be enforcing your personal beliefs?" |
|
|
| Raising the paranoia level |
|
|
| Se7en's loathing for aficionados of newsgroups like |
| alt.sex.pedophilia.swaps runs deeper than "belief." "I myself was |
| abused when I was a kid," Se7en told Wired News. "Luckily, I wasn't a |
| victim of child pornography, but I know what these kids are going |
| through." |
|
|
| With just a few hackers working independently to crack server logs, |
| sniff IP addresses, and sound the alarm to network administrators, he |
| says, "We can take out one or two people a week ... and get the |
| paranoia level up," so that "casual traders" will be frightened away |
| from IRC rooms like "#100%preteensexfuckpics." |
|
|
| It's not JPEGs of clothed ballerinas that raise his ire, Se7en says. |
| It's "the 4-year-olds being raped, the 6-year-old forced to have oral |
| sex with cum running down themselves." Such images, Se7en admits, are |
| very rare - even in online spaces dedicated to trading sexual imagery |
| of children. |
|
|
| "I know what I'm doing is wrong. I'm trampling on the rights of these |
| guys," he says. "But somewhere in the chain, someone is putting these |
| images on paper before they get uploaded. Your freedom ends when you |
| start hurting other people." |
|
|
| 0xf>------------------------------------------------------------------------- |
| |
| Title: Mitnick Gets 22 Month Sentence |
| Source: LA Times |
| Author: Julie Tamaki |
| Date: Tuesday, June 17, 1997 |
|
|
| A federal judge indicated Monday that she plans to sentence famed computer |
| hacker Kevin Mitnick to 22 months in prison for cellular phone fraud and |
| violating his probation from an earlier computer crime conviction. |
|
|
| The sentencing Monday is only a small part of Mitnick's legal problems. |
| Still pending against him is a 25-count federal indictment accusing him of |
| stealing millions of dollars in software during an elaborate hacking spree |
| while he was a fugitive. A trial date in that case has yet to be set. |
|
|
| U.S. District Judge Mariana R. Pfaelzer on Monday held off on formally |
| sentencing Mitnick for a week in order to give her time to draft conditions |
| for Mitnick's probation after he serves the prison term. |
|
|
| Pfaelzer said she plans to sentence Mitnick to eight months on the cellular |
| phone fraud charge and 14 months for violating his probation from a 1988 |
| computer-hacking conviction, Assistant U.S. Atty. Christopher Painter said. |
| The sentences will run consecutively. |
|
|
| Mitnick faces the sentence for violating terms of his probation when he |
| broke into Pac Bell voice mail computers in 1992 and used stolen passwords |
| of Pac Bell security employees to listen to voice mail, Painter said. At the |
| time, Mitnick was employed by Teltec Communications, which was under |
| investigation by Pac Bell. |
|
|
| 0x10>------------------------------------------------------------------------- |
| |
| Title: New York Judge Prohibits State Regulation of Internet |
| Source: unknown |
| Author: unknown |
| Date: Friday, June 20, 1997 |
|
|
| NEW YORK -- As the nation awaits a Supreme Court decision on |
| Internet censorship, a federal district judge here today blocked |
| New York State from enforcing its version of the federal |
| Communications Decency Act (CDA). |
|
|
| Ruling simultaneously in ACLU v. Miller, another ACLU challenge to |
| state Internet regulation, a Federal District Judge in Georgia |
| today struck down a law criminalizing online anonymous speech and |
| the use of trademarked logos as links on the World Wide Web. |
|
|
| In ALA v. Pataki, Federal District Judge Loretta A. Preska issued |
| a preliminary injunction against the New York law, calling the |
| Internet an area of commerce that should be marked off as a |
| "national preserve" to protect online speakers from inconsistent |
| laws that could "paralyze development of the Internet altogether." |
|
|
| Judge Preska, acknowledging that the New York act was "clearly |
| modeled on the CDA," did not address the First Amendment issues |
| raised by the ACLU's federal challenge, saying that the Commerce |
| Clause provides "fully adequate support" for the injunction and |
| that the Supreme Court would address the other issues in its |
| widely anticipated decision in Reno v. ACLU. (The Court's next |
| scheduled decision days are June 23, 25 and 26.) |
|
|
| "Today's decisions in New York and Georgia say that, whatever |
| limits the Supreme Court sets on Congress's power to regulate the |
| Internet, states are prohibited from acting to censor online |
| expression," said Ann Beeson, an ACLU national staff attorney who |
| argued the case before Judge Preska and is a member of the ACLU v. |
| Miller and Reno v. ACLU legal teams. |
|
|
| "Taken together, these decisions send a very important and |
| powerful message to legislators in the other 48 states that they |
| should keep their hands off the Internet," Beeson added. |
|
|
| In a carefully reasoned, 62-page opinion, Judge Preska warned of |
| the extreme danger that state regulation would pose to the |
| Internet, rejecting the state's argument that the statute would |
| even be effective in preventing so-called "indecency" from |
| reaching minors. Further, Judge Preska observed, the state can |
| already protect children through the vigorous enforcement of |
| existing criminal laws. |
|
|
| "In many ways, this decision is more important for the business |
| community than for the civil liberties community," said Chris |
| Hansen, a senior ACLU attorney on the ALA v. Pataki legal team and |
| lead counsel in Reno v. ACLU. "Legislatures are just about done |
| with their efforts to regulate the business of Internet 'sin,' and |
| have begun turning to the business of the Internet itself. Today's |
| decision ought to stop that trend in its tracks." |
|
|
| Saying that the law would reduce all speech on the Internet to a |
| level suitable for a six-year-old, the American Civil Liberties |
| Union, the New York Civil Liberties Union, the American Library |
| Association and others filed the challenge in January of this |
| year. |
|
|
| The law, which was passed by the New York legislature late last |
| year, provides criminal sanctions of up to four years in jail for |
| communicating so-called "indecent" words or images to a minor. |
|
|
| In a courtroom hearing before Judge Preska in April, the ACLU |
| presented a live Internet demonstration and testimony from |
| plaintiffs who said that their speech had already been "chilled" |
| by the threat of criminal prosecution. |
|
|
| "This is a big win for the people of the state of New York," said |
| Norman Siegel, Executive Director of the New York Civil Liberties |
| Union. "Today's ruling vindicates what we have been saying all |
| along to Governor Pataki and legislators, that they cannot legally |
| prevent New Yorkers from engaging in uninhibited, open and robust |
| freedom of expression on the Internet." |
|
|
| The ALA v. Pataki plaintiffs are: the American Library |
| Association, the Freedom to Read Foundation, the New York Library |
| Association, the American Booksellers Foundation for Free |
| Expression, Westchester Library System, BiblioBytes, Association |
| of American Publishers, Interactive Digital Software Association, |
| Magazine Publishers of America, Public Access Networks Corp. |
| (PANIX), ECHO, NYC Net, Art on the Net, Peacefire and the American |
| Civil Liberties Union. |
|
|
| Michael Hertz and others of the New York firm Latham & Watkins |
| provided pro-bono assistance to the ACLU and NYCLU; Michael |
| Bamberger of Sonnenschein Nath & Rosenthal in New York is also |
| co-counsel in the case. Lawyers from the ACLU are Christopher |
| Hansen, Ann Beeson and Art Eisenberg, legal director of the NYCLU. |
|
|
| 0x11>------------------------------------------------------------------------- |
| |
| Title: Breaking the Crypto Barrier |
| Source: Wired |
| Author: Chris Oakes |
| Date: 5:03am 20.Jun.97.PDT |
|
|
| Amid a striking convergence of events bearing on |
| US encryption policy this week, one development underlined what many see |
| as the futility of the Clinton administration's continuing effort to |
| block the export of strong encryption: The nearly instantaneous movement |
| of PGP's 128-bit software from its authorized home on a Web server at |
| MIT to at least one unauthorized server in Europe. |
|
|
| Shortly after Pretty Good Privacy's PGP 5.0 freeware was made available |
| at MIT on Monday, the university's network manager, Jeffrey Schiller, |
| says he read on Usenet that the software had already been transmitted to |
| a foreign FTP server. Ban or no ban, someone on the Net had effected the |
| instant export of a very strong piece of code. On Wednesday, Wired News |
| FTP'd the software from a Dutch server, just like anyone with a |
| connection could have. |
|
|
| A Commerce Department spokesman said his office was unaware of the |
| breach. |
|
|
| The event neatly coincided with the appearance of a new Senate bill that |
| seeks to codify the administration's crypto policy, and an announcement |
| Wednesday that an academic/corporate team had succeeded in breaking the |
| government's standard 56-bit code. |
|
|
| The software's quick, unauthorized spread to foreign users might have an |
| unexpected effect on US law, legal sources noted. |
|
|
| "If [Phil] Zimmermann's [original PGP] software hadn't gotten out on the |
| Internet and been distributed worldwide, unquestionably we wouldn't have |
| strong encryption today," said lawyer Charles Merrill, who chairs his |
| firm's computer and high-tech law-practice group. Actions like the PGP |
| leak, he speculated, may further the legal flow of such software across |
| international borders. |
|
|
| Said Robert Kohn, PGP vice president and general counsel: "We're |
| optimistic that no longer will PGP or companies like us have to do |
| anything special to export encryption products." |
|
|
| The Web release merely sped up a process already taking place using a |
| paper copy of the PGP 5.0 source code and a scanner - reflecting the |
| fact it is legal to export printed versions of encryption code. |
|
|
| On Wednesday, the operator of the International PGP Home Page announced |
| that he had gotten his hands on the 6,000-plus-page source code, had |
| begun scanning it, and that a newly compiled version of the software |
| will be available in a few months. |
|
|
| Norwegian Stale Schumaker, who maintains the site, said several people |
| emailed and uploaded copies of the program to an anonymous FTP server he |
| maintains. But he said he deleted the files as soon as he was aware of |
| them, because he wants to "produce a version that is 100 percent legal" |
| by scanning the printed code. |
|
|
| The paper copy came from a California publisher of technical manuals and |
| was printed with the cooperation of PGP Inc. and its founder, Phil |
| Zimmermann. Schumaker says he does not know who mailed his copy. |
|
|
| "The reason why we publish the source code is to encourage peer review," |
| said PGP's Kohn, "so independent cryptographers can tell other people |
| that there are no back doors and that it is truly strong encryption." |
|
|
| Schumaker says his intentions are farther-reaching. |
|
|
| "We are a handful of activists who would like to see PGP spread to the |
| whole world," his site reads, alongside pictures of Schumaker readying |
| pages for scanning. "You're not allowed to download the program from |
| MIT's Web server because of the archaic laws in the US. That's why we |
| exported the source-code books." |
|
|
| 0x12>------------------------------------------------------------------------- |
|
|
| Title: Setback in Efforts to Secure Online Privacy |
| Source: unknown |
| Author: unknown |
| Date: Thursday, June 19, 1997 |
|
|
| WASHINGTON -- A Senate committee today setback legislative efforts to |
| secure online privacy, approving legislation that would restrict the right |
| of businesses and individuals both to use encryption domestically and to |
| export it. |
|
|
| On a voice vote, the Senate Commerce Committee adopted legislation that |
| essentially reflects the Clinton Administration's anti-encryption policies. |
|
|
| The legislation approved today on a voice vote by the Senate Commerce |
| Committee was introduced this week by Senate Commerce Committee Chairman |
| John McCain, Republican of Arizona, and co-sponsored by Democrats Fritz |
| Hollings of South Carolina; Robert Kerry of Nebraska and John Kerry of |
| Massachusetts. |
|
|
| Encryption programs scramble information so that it can only be read |
| with a "key" -- a code the recipient uses to unlock the scrambled |
| electronic data. Programs that use more than 40 bits of data to encode |
| information are considered "strong" encryption. Currently, unless these |
| keys are made available to the government, the Clinton Administration bans |
| export of hardware or software containing strong encryption, treating |
| these products as "munitions." |
|
|
| Privacy advocates continue to criticize the Administration's |
| stance, saying that the anti-cryptography ban has considerably |
| weakened U.S. participation in the global marketplace, in addition |
| to curtailing freedom of speech by denying users the right to "speak" |
| using encryption. The ban also violates the right to privacy by |
| limiting the ability to protect sensitive information in the new |
| computerized world. |
|
|
| Today's committee action knocked out of consideration the so-called |
| "Pro-CODE" legislation, a pro-encryption bill introduced by Senator |
| Conrad Burns, Republican of Montana. Although the Burns legislation |
| raised some civil liberties concerns, it would have lifted export |
| controls on encryption programs and generally protected individual |
| privacy. |
|
|
| "Privacy, anonymity and security in the digital world depend on |
| encryption," said Donald Haines, legislative counsel on privacy and |
| cyberspace issues for the ACLU's Washington National Office. "The aim |
| of the Pro-CODE bill was to allow U.S. companies to compete with |
| industries abroad and lift restrictions on the fundamental right to |
| free speech, the hallmark of American democracy." |
|
|
| "Sadly, no one on the Commerce Committee, not even Senator Burns, |
| stood up and defended the pro-privacy, pro-encryption effort," Haines |
| added. |
|
|
| In the House, however, strong encryption legislation that would add |
| new privacy protections for millions of Internet users in this country and |
| around the world has been approved by two subcommittees. |
|
|
| The legislation -- H.R. 695, the "Security and Freedom Through |
| Encryption Act" or SAFE -- would make stronger encryption products |
| available to American citizens and users of the Internet around the |
| world. It was introduced by Representative Robert W. Goodlatte, Republican |
| of Virginia. |
|
|
| "We continue to work toward the goal of protecting the privacy of all |
| Internet users by overturning the Clinton Administration's unreasonable |
| encryption policy," Haines concluded |
|
|
| 0x13>------------------------------------------------------------------------- |
|
|
| Title: Captain Crunch Web Site Now Moved |
| Source: Telecom Digest 17.164 |
|
|
| The Cap'n Crunch home page URL has been changed. The new URL is now |
| http://crunch.woz.org/crunch |
|
|
| I've made significant changes to the site, added a FAQ based on a lot |
| of people asking me many questions about blue boxing, legal stuff, and |
| hacking in general. The FAQ will be growing all the time, as I go |
| through all the requests for information that many people have sent. |
| "Email me" if you want to add more questions. |
|
|
| Our new server is now available to host web sites for anyone who wants |
| to use it for interesting projects. This is for Elite people only, |
| and you have to send me a proposal on what you plan to use it for. |
|
|
| [So now old John gets to decide who is elite and who isn't.] |
|
|
| I'm open for suggestions, and when you go up to the WebCrunchers web |
| site: http://crunch.woz.org |
|
|
| You'll get more details on that. Our server is a Mac Power PC, |
| running WebStar web server, connected through a T-1 link to the |
| backbone. I know that the Mac Webserver might be slower, but I had |
| security in mind when I picked it. Besides, I didn't pick it, Steve |
| Wozniak did... :-) So please don't flame me for using a Mac. |
|
|
| I know that Mac's are hated by hackers, but what the heck ... at least |
| we got our OWN server now. |
|
|
| I also removed all the blatant commercial hipe from the home page and |
| put it elsewhere. But what the heck ... I should disserve to make |
| SOME amount of money selling things like T-shirts and mix tapes. |
|
|
| We plan to use it for interesting projects, and I want to put up some |
| Audio files of Phone tones. For instance, the sound of a blue box |
| call going through, or some old sounds of tandom stacking. If there |
| are any of you old-timers out there that might have some interesting |
| audio clips of these sounds, please get in touch with me. |
|
|
| [There is already a page out there with those sounds and a lot more.. |
| done by someone who discovered phreaking on their own. Little known |
| fact because of all the obscurement: John Draper did not discover |
| blue boxing. It was all taught to him.] |
|
|
| Our new Domain name registration will soon be activated, and at that |
| time our URL will be: |
|
|
| http://www.webcrunchers.com - Our Web hosting server |
| http://www.webcrunchers.com/crunch - Official Cap'n Crunch home page |
|
|
| Regards, |
| Cap'n Crunch |
|
|
| 0x14>------------------------------------------------------------------------- |
|
|
| Title: US Justive Dept. Investigating Network Solutions |
| Source: New York Times |
| Author: Agis Salpukas |
| Date: 7 July '97 |
|
|
| The Justice Department has begun an investigation into the |
| practice of assigning Internet addresses to determine if the |
| control that Network Solutions Inc. exercises over the process |
| amounts to a violation of antitrust laws. |
|
|
| The investigation was disclosed by the company Thursday in |
| documents filed with the Securities and Exchange Commission. The |
| filing came as part of a proposed initial stock offering that is |
| intended to raise $35 million. |
|
|
| The investigation was first reported in The Washington Post on |
| Sunday. |
|
|
| Network Solutions, which is based in Herndon, Va., and is a |
| subsidiary of Science Applications International Corp., has been |
| the target of a growing chorus of complaints and two dozen |
| lawsuits as the Internet has expanded and the competition for |
| these addresses, or domain names, has grown more intense. |
|
|
| 0x15>------------------------------------------------------------------------- |
|
|
| Title: Cyber Patrol Bans Crypt Newsletter |
| Source: Crypt Newsletter |
| Author: George Smith |
| Date: June 19, 1997 |
|
|
| Hey, buddy, did you know I'm a militant extremist? Cyber Patrol, the |
| Net filtering software designed to protect your children from |
| cyberfilth, says so. Toss me in with those who sleep with a copy of |
| "The Turner Diaries" under their pillows and those who file nuisance |
| liens against officials of the IRS. Seems my Web site is dangerous |
| viewing. |
|
|
| I discovered I was a putative militant extremist while reading a |
| story on Net censorship posted on Bennett Haselton's PeaceFire |
| Web site. Haselton is strongly critical of Net filtering software and |
| he's had his share of dustups with vendors like Cyber Patrol, who |
| intermittently ban his site for having the temerity to be a naysayer. |
|
|
| Haselton's page included some links so readers could determine what |
| other Web pages were banned by various Net filters. On a lark, I typed |
| in the URL of the Crypt Newsletter, the publication I edit. Much to my |
| surprise, I had been banned by Cyber Patrol. The charge? Militant |
| extremism. Cyber Patrol also has its own facility for checking if a |
| site is banned, called the CyberNOT list. Just to be sure, I |
| double-checked. Sure enough, I was a CyberNOT. |
|
|
| Now you can call me Ray or you can call me Joe, but don't ever call me |
| a militant extremist! I've never even seen one black helicopter |
| transporting U.N. troops to annex a national park. |
|
|
| However, nothing is ever quite as it seems on the Web and before I |
| went into high dudgeon over political censorship--the Crypt Newsletter |
| has been accused of being "leftist" for exposing various |
| government, academic, and software industry charlatans--I told some of |
| my readership. Some of them wrote polite--well, almost polite--letters |
| to Debra Greaves, Cyber Patrol's head of Internet research. And |
| Greaves wrote back almost immediately, indicating it had all been a |
| mistake. |
|
|
| My Web site was blocked as a byproduct of a ban on another page on the |
| same server. "We do have a [blocked] site off of that server with a |
| similar directory. I have modified the site on our list to be more |
| unique so as to not affect [your site] any longer," she wrote. |
|
|
| Perhaps I should have been reassured that Cyber Patrol wasn't banning |
| sites for simply ridiculing authority figures, a favorite American |
| past time. But if anything, I was even more astonished to discover th |
| company's scattershot approach to blocking. It doesn't include precise |
| URLs in its database. Instead, it prefers incomplete addresses that |
| block everything near the offending page. The one that struck down |
| Crypt News was "soci.niu.edu/~cr," a truncated version of my complete |
| URL. In other words: any page on the machine that fell under "~cr" was |
| toast. |
|
|
| Jim Thomas, a sociology professor at Northern Illinois University, |
| runs this particular server, and it was hard to imagine what would be |
| militantly extreme on it. Nevertheless, I ran the news by Thomas. It |
| turns out that the official home page of the American Society of |
| Criminology's Critical Criminology Division, an academic resource, |
| was the target. It features articles from a scholarly criminology |
| journal and has the hubris to be on record as opposing the death |
| penalty but didn't appear to have anything that would link it with |
| bomb-throwing anarchists, pedophiles, and pornographers. |
|
|
| There was, however, a copy of the Unabomber Manifesto on the page. |
|
|
| I told Thomas I was willing to bet $1,000 cash money that Ted |
| Kaczynski's rant was at the root of Cyber Patrol's block. |
| Thomas confirmed it, but I can't tell you his exact words. It |
| might get this page blocked, too. |
|
|
| What this boils down to is that Cyber Patrol is banning writing on the |
| Web that's been previously published in a daily newspaper: The |
| Washington Post. It can also be said the Unabomber Manifesto already |
| has been delivered to every corner of American society. |
|
|
| If the ludicrous quality of this situation isn't glaring enough, |
| consider that one of Cyber Patrol's partners, CompuServe, promoted the |
| acquisition of electronic copies of the Unabomber Manifesto after it |
| published by the Post. And these copies weren't subject to any |
| restrictions that would hinder children from reading them. In fact, |
| I've never met anyone from middle-class America who said, "Darn those |
| irresponsible fiends at the Post! Now my children will be inspired to |
| retreat to the woods, write cryptic essays attacking techno-society, |
| and send exploding parcels to complete strangers." |
|
|
| Have you? |
|
|
| So, will somebody explain to me how banning the Unabomber Manifesto, |
| the ASC's Critical Criminology home page, and Crypt Newsletter |
| protects children from smut and indecency? That's a rhetorical |
| question. |
|
|
| Cyber Patrol is strongly marketed to public libraries, and has been |
| acquired by some, in the name of protecting children from Net |
| depravity. |
|
|
| Funny, I thought a public library would be one of the places you'd be |
| more likely to find a copy of the Unabomber Manifesto. |
|
|
| 0x16>------------------------------------------------------------------------- |
| |
| Title: Some humor on media hacks and hackers |
| Source: Defcon Mailing List |
| Author: George Smith / Crypt Newsletter |
|
|
| In as fine a collection of stereotypes as can be found, the |
| Associated Press furnished a story on July 14 covering the annual |
| DefCon hacker get together in Las Vegas. It compressed at least |
| one hoary cliche into each paragraph. |
|
|
| Here is a summary of them. |
|
|
| The lead sentence: "They're self-described nerds . . . " |
|
|
| Then, in the next sentence, "These mostly gawky, mostly male |
| teen-agers . . . also are the country's smartest and slyest computer |
| hackers." |
|
|
| After another fifty words, "These are the guys that got beat up in |
| high school and this is their chance to get back . . . " |
|
|
| Add a sprinkling of the obvious: "This is a subculture of |
| computer technology . . ." |
|
|
| Stir in a paraphrased hacker slogan: "Hacking comes from an |
| intellectual desire to figure out how things work . . ." |
|
|
| A whiff of crime and the outlaw weirdo: "Few of these wizards will |
| identify themselves because they fear criminal prosecution . . . a |
| 25-year-old security analyst who sports a dog collar and nose ring, is |
| cautious about personal information." |
|
|
| Close with two bromides that reintroduce the stereotype: |
|
|
| "Hackers are not evil people. Hackers are kids." |
|
|
| As a simple satirical exercise, Crypt News rewrote the Associated |
| Press story as media coverage of a convention of newspaper editors. |
|
|
| It looked like this: |
|
|
| LAS VEGAS -- They're self-described nerds, dressing in starched |
| white shirts and ties. |
|
|
| These mostly overweight, mostly male thirty, forty and |
| fiftysomethings are the country's best known political pundits, |
| gossip columnists and managing editors. On Friday, more than 1,500 of |
| them gathered in a stuffy convention hall to swap news and network. |
|
|
| "These are the guys who ate goldfish and dog biscuits at frat parties |
| in college and this is their time to strut," said Drew Williams, |
| whose company, Hill & Knowlton, wants to enlist the best editors |
| and writers to do corporate p.r. |
|
|
| "This is a subculture of corporate communicators," said Williams. |
|
|
| Journalism comes from an intellectual desire to be the town crier |
| and a desire to show off how much you know, convention-goers said. |
| Circulation numbers and ad revenue count for more than elegant prose |
| and an expose on the President's peccadillos gains more esteem from |
| ones' peers than klutzy jeremiads about corporate welfare and |
| white-collar crime. |
|
|
| One group of paunchy editors and TV pundits were overheard |
| joking about breaking into the lecture circuit, where one |
| well-placed talk to a group of influential CEOs or military |
| leaders could earn more than many Americans make in a year. |
|
|
| Few of these editors would talk on the record for fear of |
| professional retribution. Even E.J., a normally voluble |
| 45-year-old Washington, D.C., editorial writer, was reticent. |
|
|
| "Columnists aren't just people who write about the political |
| scandal of the day," E.J. said cautiously. "I like to think of |
| columnists as people who take something apart that, perhaps, |
| didn't need taking apart." |
|
|
| "We are not evil people. We're middle-aged, professional |
| entertainers in gray flannel suits." |
|
|
| 0x17>------------------------------------------------------------------------- |
|
|
| Title: Cellular Tracking Technologies |
| Source: unknown |
| Author: unknown |
|
|
| A recent article from the San Jose Mercury News by Berry Witt ("Squabble |
| puts non-emergency phone number on hold") raises several important |
| questions -- questions I think are relavant to the CUD's readership... |
|
|
| Does anybody remember the FBI's request that cell phone companies must |
| build in tracking technology to their systems that allows a person's |
| position to be pin pointed by authorities? That suggested policy resulted |
| in a flurry of privacy questions and protests from the industry, suggesting |
| such requirements would force them to be uncompetitive in the global |
| marketplace. The article, dated July 20, (which was focused on 911 |
| cellular liability issues) suggests federal authorities may have worked out |
| an end run around the controversy. The article states: |
|
|
| "The cellular industry is working to meet a federal requirement that by |
| next spring, 911 calls from cellular phones provide dispatchers the |
| location of the nearest cell site and that within five years, cellular |
| calls provide dispatchers the location of the caller within a 125-meter |
| radius. " |
|
|
| On its face, this seems reasonable and it is a far cry from the real time |
| tracking requirements of any cell phone that is turned on (The FBI's |
| original request). But by next spring, this tracking system will be in |
| place and on line. I have heard no public debate about the privacy |
| implications regarding this "Federal Requirement", nor has there been any |
| indication that this information will be restricted to 911 operators. |
|
|
| Will this information be available to law enforcement officials if they |
| have a warrant? If they don't have a warrant? Will this information be |
| secured so enterprising criminals won't have access to it? Exactly WHAT |
| kind of security is being implemented so it WON'T be accessible to the |
| general public. |
|
|
| This smacks of subterfuge. By cloaking the cellular tracking issue in the |
| very real issue of the 911 location system, the federal government and law |
| enforcement agencies have circumvented the legitimate privacy questions |
| that arose from their initial Cellular tracking request. |
|
|
| 0x18>------------------------------------------------------------------------- |
|
|
| Title: Court Mixes Internet Smut Provision |
| Source: Associated Press |
| Author: unknown |
| Date: June 26, 1997 |
|
|
| WASHINGTON (AP) -- Congress violated free-speech rights when it |
| tried to curb smut on the Internet, the Supreme Court ruled today. |
| In its first venture into cyberspace law, the court invalidated a |
| key provision of the 1996 Communications Decency Act. |
|
|
| Congress' effort to protect children from sexually explicit |
| material goes too far because it also would keep such material |
| from adults who have a right to see it, the justices unanimously |
| said. |
|
|
| The law made it a crime to put adult-oriented material online |
| where children can find it. The measure has never taken effect |
| because it was blocked last year by a three-judge court in |
| Philadelphia. |
|
|
| ``We agree with the three-judge district court that the statute |
| abridges the freedom of speech protected by the First Amendment,'' |
| Justice John Paul Stevens wrote for the court. |
|
|
| ``The (Communications Decency Act) is a content-based regulation |
| of speech,'' he wrote. ``The vagueness of such a regulation raises |
| special First Amendment concerns because of its obvious chilling |
| effect on free speech.'' |
|
|
| ``As a matter of constitutional tradition ... we presume that |
| governmental regulation of the content of speech is more likely to |
| interfere with the free exchange of ideas than to encourage it,'' |
| Stevens wrote. |
|
|
| Sexually explicit words and pictures are protected by the |
| Constitution's First Amendment if they are deemed indecent but not |
| obscene. |
|
|
|
|
|
|
|
|
| 0x1>------------------------------------------------------------------------- |
|
|
| Book Title: Underground |
| Poster: Darren Reed |
|
|
| A few people will have heard me mention this book already, but I think |
| there are bits and pieces of this book which will surprise quite a few |
| people. Most of us are used to reading stories about hacking by the |
| people who did the catching of the hackers...this one is an ongoing |
| story of the local hacker scene...with not so local contacts and exploits. |
|
|
| Some of the important things to note are just how well they do work |
| together, as well as competing with each other and what they do when |
| they get pissed off with each other. Meanwhile most of the white hats |
| are too busy trying to hoard information from the other white hats... |
|
|
| Having been on the "victim" side in the past, it is quite frustrating |
| when someone you've worked to have arrested gets off with a fine. Most |
| of us would agree that they should be locked up somewhere, but |
| according to what's in the book, most of them are suffering from either |
| problems at home or other mental disorders (including one claim in court |
| to being addicted to hacking). Anyone for a "Hackers Anonymous Association" |
| for help in drying out from this nefarious activity ? At least in one |
| case documented within the perpetrators get sentenced to time behind bars. |
|
|
| It's somewhat comforting to read that people have actually broken into |
| the machines which belong to security experts such as Gene Spafford and |
| Matt Bishop, although I'd have preferred to have not read how they |
| successfully broke into the NIC :-/ Don't know about you, but I don't |
| care what motives they have, I'd prefer for them to not be getting inside |
| machines which provide integral services for the Internet. |
|
|
| For all of you who like to hide behind firewalls, in one instance a hacker |
| comes in through X.25 and out onto the Internet. Nice and easy 'cause |
| we don't need to firewall our X.25 connection do we ? :-) |
|
|
| Oh, and just for all those VMS weenies who like to say "We're secure, |
| we run VMS not Unix" - the first chapter of the book is on a VMS worm |
| called "WANK" that came close to taking the NASA VMS network completely |
| off air. I wonder how long it will take for an NT equivalent to surface... |
|
|
| All in all, a pretty good read (one from which I'm sure hackers will learn |
| just as much from as the rest of us). |
|
|
| The book's details are: |
| Title: UNDERGROUND - Tales of Hacking, madness and obsession on the |
| Electronic Frontier |
| ISBN 1-86330-595-5 |
| Author: Suelette Dreyfus |
| Publisher: Random House |
| Publisher's address: 20 Alfred St, Milsons Point, NSW 2061, Australia |
| Price: AUS$19.95 |
|
|
| before I forget, the best URL for the book I've found is: |
|
|
| http://www.underground-book.com (http://underground.org/book is a mirror) |
|
|
| 0x2>------------------------------------------------------------------------- |
| |
| Book Title: "Hackers" |
| Poster: Paul Taylor P.A.Taylor@sociology.salford.ac.uk |
|
|
| There's an open invite for people to contact me and discuss the |
| above and/or anything else that they think is relevant/important. |
|
|
| Below is a brief overview of |
| the eventual book's rationale and proposed structure. |
|
|
| Hackers: a study of a technoculture |
|
|
| Background |
|
|
| "Hackers" is based upon 4 years PhD research conducted from |
| 1989-1993 at the University of Edinburgh. The research focussed |
| upon 3 main groups: the Computer Underground (CU); the Computer |
| Security Industry (CSI); and the academic community. Additional |
| information was obtained from government officials, journalists |
| etc. |
|
|
| The face-to-face interview work was conducted in the UK and the |
| Netherlands. It included figures such as Rop Gongrijp of |
| Hack-Tic magazine, Prof Hirschberg of Delft University, and |
| Robert Schifreen. E-mail/phone interviews were conducted in |
| Europe and the US with figures such as Prof Eugene Spafford of |
| Purdue Technical University, Kevin Mitnick, Chris Goggans and |
| John Draper. |
|
|
| Rationale |
|
|
| This book sets out to be an academic study of the social |
| processes behind hacking that is nevertheless accessible to a |
| general audience. It seeks to compensate for the "Gee-whiz" |
| approach of many of the journalistic accounts of hacking. The |
| tone of these books tends to be set by their titles: The Fugitive |
| Game; Takedown; The Cyberthief and the Samurai; Masters of |
| Deception - and so on ... |
|
|
| The basic argument in this book is that, despite the media |
| portrayal, hacking is not, and never has been, a simple case of |
| "electronic vandals" versus the good guys: the truth is much more |
| complex. The boundaries between hacking, the security industry |
| and academia, for example, are often relatively fluid. In |
| addition, hacking has a significance outside of its immediate |
| environment: the disputes that surround it symbolise society's |
| attempts to shape the values of the informational environments we |
| will inhabit tomorrow. |
|
|
|
|
| Book Outline |
|
|
| Introduction - the background of the study and the range of |
| contributors |
|
|
| Chapter 1 - The cultural significance of hacking: non-fiction and |
| fictional portrayals of hacking. |
|
|
| Chapter 2 - Hacking the system: hackers and theories of technological change. |
|
|
| Chapter 3 - Hackers: their culture. |
|
|
| Chapter 4 - Hackers: their motivations |
|
|
| Chapter 5 - The State of the (Cyber)Nation: computer security weaknesses. |
|
|
| Chapter 6- Them and Us: boundary formation and constructing "the other". |
|
|
| Chapter 7 - Hacking and Legislation. |
|
|
| Conclusion |
|
|
|
|
| 0x1>------------------------------------------------------------------------- |
| |
| Convention: Cybercrime Conference Announcement |
| Date: Oct 29 - 31 |
|
|
| Cybercrime; E-Commerce & Banking; Corporate, Bank & Computer |
| Security; Financial Crimes and Information Warfare Conference |
| will be held October 29, 30, & 31, 1997 (Washington, D.C.) and |
| November 17 & 18 (New York City) for bankers, lawyers, |
| information security directors, law enforcement, regulators, |
| technology developers/providers. |
|
|
| Responding to the global threat posed by advancing technology, |
| senior level decision makers will join together to share remedies |
| and solutions towards the ultimate protection of financial and |
| intellectual property; and against competitive espionage and |
| electronic warfare. An international faculty of 30 experts will |
| help you protect your business assets, as well as the information |
| infrastructure at large. |
|
|
| There will also be a small technology vendor exhibition. |
|
|
| Sponsored by Oceana Publications Inc. 50 year publisher of |
| international law, in cooperation with the Centre for |
| International Financial Crimes Studies, College of Law, |
| University of Florida, and Kroll Associates, a leading |
| investigative firm. For more information call |
| 800/831-0758 or |
| 914/693-8100; or e-mail: Oceana@panix.com. |
|
|
| http://www.oceanalaw.com/seminar/sem_calendar.htm |
|
|
| 0x2>------------------------------------------------------------------------- |
|
|
| Convention: Computers & The Law IV Symposium |
| Date: October 6-9, Boston |
|
|
| Computers & The Law IV is the only event to bring together corporate |
| decision-makers, computer professionals and legal experts to discuss |
| Internet |
| and Web technology in the eyes of the law. This conference provides a |
| forum and educational opportunities for all those interested in |
| keeping their system investment safe and within the law. |
| Topics will include: |
| * Corporate liablity on the Internet |
| * Internet risk management in the enterprise |
| * Hiring a SysAdmin you can trust |
| * Legal risks of Internet commerce |
| * Establishing a fair-use policy |
| * Prosecuting system intruders |
| * Communicating with your SysAdmin |
| * Understanding copyright law |
| * Assessing your exposure to hackers |
| * Employee privacy vs. owner rights |
| ... and much more! |
|
|
| FOR MORE INFORMATION CONTACT |
| The Sun User Group * 14 Harvard Ave, 2nd Floor * Allston, MA 02134 |
| (617)787-2301 * conference@sug.org * http://www.sug.org/CL4 |
|
|
|
|
| ----[ EOF |
|
|