| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 19 of 20 |
|
|
|
|
| -------------------------[ P H R A C K W O R L D N E W S |
|
|
| Phrack World News - 52 |
|
|
| New categorization: |
| -[ Stories |
| -[ Book Releases |
| -[ Conventions |
| -[ Other Headlines of Interest |
|
|
| --------[ Issue 52 |
|
|
|
|
| 0x1: Hacker Acquitted & Iraq Computerises |
| 0x2: The Impact of Encryption on Public Safety |
| 0x3: Urban Ka0s -- 26 Indonesian Servers Haxed |
| 0x4: Hacker accused of sabotaging Forbes computers |
| 0x5: Privacy, Inc. Unveils its Internet Background Check |
| 0x6: Commerce Dept encryption rules declared unconstitutional |
| 0x7: The Million Dollar Challenge |
| 0x8: High Profile Detainee Seeks Legal Help |
| 0x9: Kevin Mitnick Press Release |
| 0xa: SAFE crypto bill cracked again |
| 0xb: RC5 Cracked - The unknown message is... |
| 0xc: Kashpureff in custody. |
| 0xd: XS4ALL refuses Internet tap |
| 0xe: The FCC Wants V-Chip in PCs too |
|
|
| 1x1: Book Title: Underground (review) |
| 1x2: Book Title: The Electronic Privacy Papers |
| 1x3: Book Title: "Computer Security and Privacy: An Information Sourcebook.. |
|
|
| 2x0: Convention: <none> |
|
|
| 3x1: Misc: Civil Liberties Groups ask FCC to Block FBI Proposal |
| 3x2: Misc: Anti-Spam Bills in Congress |
| 3x3: Misc: Justice Dept Charges Microsoft.. |
| 3x4: Misc: Small Minds Think Alike |
| 3x5: Misc: Cyber Promotions tossed offline |
|
|
| 0x1>------------------------------------------------------------------------- |
|
|
| [submitted by: the wizard of id] |
|
|
| Phrack, |
|
|
| I thought that you guys may be able to make use of these articles which I |
| found in my newspaper's IT section. Perhaps you should pass them on to the |
| editors of Phrack World News. |
|
|
| <start article 1> |
|
|
| Hacker Acquitted |
| ================ |
| Extract from The Age, Victoria, Australia. -Tuesday |
| 11/25/97 |
|
|
| The US Air Force failed last Friday to convince Woolwich Crown Court in |
| the UK that Matthew Bevan, 23, hacked into its secret files with his home |
| computer. Computer guru Bevan was cleared of all accusations, which led to |
| fears of US national security risk. He was charged with three offences of |
| "unauthorised access and modification" into sensitive research and |
| development files at New York's Griffiss Air Force Base and Lockheed Space |
| and Missle Company in California via the Internet. |
|
|
|
|
| <end article 1> |
|
|
| The article is accompanied by a very cool picture of Bevan in a black |
| suit, wearing mirrored sunglasses. :) |
|
|
| <start article 2> |
|
|
| Iraq Computerises |
| ================= |
| Extract from The Age, Victoria, Australia. -Tuesday |
| 11/25/97 |
|
|
| To conceal its deadliest arms from U.N. weapons inspectors, Iraq increasingly |
| has turned to computers, including American brands sold to Baghdad since |
| the end of the 1991 Persian Gulf War in violation of international sanctions, |
| according to US officials and U.N. diplomats. |
|
|
| Iraq is using mostly Western-made computers for two cirtical functions: To |
| transfer data from bulky paper to small disks that they can easilly |
| disperse, making the information difficult for U.N. weapons inspection |
| teams to track. |
|
|
| For research and development in all four categories of weapons Iraq has |
| been forbidden from keeping under terms of the U.N. resolution ending the |
| war - nuclear, chemical and biological weapons and long-rnge missiles. |
|
|
| Because of shifting tactics, computer specialists have become an ever more |
| important component of the weapons inspections teams, US and U.N. sources |
| say. |
|
|
| Their work often involves digging into hard drives and unearthing material |
| that was erased after being transferred to disks. |
|
|
| <end article 2> |
|
|
| 0x2>------------------------------------------------------------------------- |
|
|
| [submitted by: Mike Kretsch] |
|
|
| Statement of Louis J. Freeh, Director |
| Federal Bureau of Investigation |
|
|
| Before the Permanent Select Committee on |
| Intelligence, United States House of Representatives |
| Washington, D. C. |
| September 9, 1997 |
|
|
| This man must be stopped. For other fun reading, |
| check out his statements about the FBI's International |
| Crime fighting efforts. Errrr. Wasnt international |
| supposed to be CIA and domestic FBI? |
|
|
|
|
| The Impact of Encryption |
| on Public Safety |
|
|
|
|
| Statement of Louis J. Freeh, Director |
| Federal Bureau of Investigation |
|
|
| Before the Permanent Select Committee on Intelligence |
| United States House of Representatives |
|
|
| Washington, D. C. |
| September 9, 1997 |
|
|
| Mr. Chairman and members of the committee, I appreciate the opportunity to |
| discuss the issue of encryption and I applaud your willingness to deal with |
| this vital public safety issue. |
|
|
| The looming spectre of the widespread use of robust, virtually unbreakable |
| encryption is one of the most difficult problems confronting law enforcement |
| as the next century approaches. At stake are some of our most valuable and |
| reliable investigative techniques, and the public safety of our citizens. |
| We believe that unless a balanced approach to encryption is adopted that |
| includes a viable key management infrastructure that supports immediate |
| decryption capabilities for lawful purposes, our ability to investigate |
| and sometimes prevent the most serious crimes and terrorism will be severely |
| impaired. Our national security will also be jeopardized. |
|
|
| For law enforcement, framing the issue is simple. In this time of dazzling |
| telecommunications and computer technology where information can have |
| extraordinary value, the ready availability of robust encryption is |
| essential. No one in law enforcement disputes that. Clearly, in today's |
| world and more so in the future, the ability to encrypt both contemporaneous |
| communications and stored data is a vital component of information security. |
|
|
| As is so often the case, however, there is another aspect to the encryption |
| issue that if left unaddressed will have severe public safety and national |
| security ramifications. Law enforcement is in unanimous agreement that the |
| widespread use of robust unbreakable encryption ultimately will devastate |
| our ability to fight crime and prevent terrorism. Unbreakable encryption |
| will allow drug lords, spies, terrorists and even violent gangs to |
| communicate about their crimes and their conspiracies with impunity. We wll |
| lose one of the few remaining vulnerabilities of the worst criminals and |
| terrorists upon which law enforcement depends to successfully investigate |
| and often prevent the worst crimes. |
|
|
| For this reason, the law enforcement community is unanimous in calling for |
| a balanced solution to this problem. Such a solution must satisfy both the |
| commercial needs of industry for strong encryption and law enforcement's |
| public safety decryption needs. In our view, any legislative approach that |
| does not achieve such a balanced approach seriously jeopardizes the |
| long-term viability and usefulness of court-authorized access to transmitted |
| as well as stored evidence and information. Electronic surveillance and |
| search and seizure are techniques upon which law enforcement depends to |
| ensure public safety and maintain national security. |
|
|
| One such balanced solution to this problem is key recovery encryption. |
| Under this approach, a decryption "key" for a given encryption product is |
| deposited with a trustworthy key recovery agent for safe keeping. The key |
| recovery agent could be a private company, a bank, or other commercial or |
| government entity that meets established trustworthiness criteria. Should |
| encryption users need access to their encrypted information, they could |
| obtain the decryption key from the key recovery agent. Additionally, when |
| law enforcement needs to decrypt criminal-related communications or computer |
| files lawfully seized under established legal authorities, they too, under |
| conditions prescribed by law and with the presentation of proper legal |
| process, could obtain the decryption key from the key recovery agent. This |
| is the only viable way to permit the timely decryption of lawfully seized |
| communications or computer files that are in furtherance of criminal |
| activity. |
|
|
| The decryption key or information would be provided to the law enforcement |
| agency under very strict controls and would be used only for its intended |
| public safety purpose. Under this approach, the law-abiding would gain the |
| benefits of strong, robust encryption products and services with emergency |
| decryption capabilities and public safety and national security would be |
| maintained--as manufacturers produce and sell encryption products that |
| include features that allow for the immediate decryption of criminal-related |
| encrypted communications or electronic information. |
|
|
| This solution meets industry's information security and communications |
| privacy needs for strong encryption while addressing law enforcement's |
| public safety needs for immediate decryption when such products are used |
| to conceal crimes or impending acts of terrorism or espionage. |
|
|
| Some have argued that government policy makers should step aside and let |
| market forces solely determine the direction of key recovery encryption, |
| letting market forces determine the type of technologies that will be used |
| and under what circumstances. They argue that most corporations that see |
| the need for encryption will also recognize the need for, and even insist |
| on, key recovery encryption products to secure their electronically stored |
| information and to protect their corporate interests should an encryption |
| key be lost, stolen or used by a rogue employee for extortion purposes. |
|
|
| We agree that rational thinking corporations will act in a prudent manner |
| and will insist on using key recovery encryption for electronically stored |
| information. However, law enforcement has a unique public safety requirement |
| in the area of perishable communications which are in transit (telephone |
| calls, e-mail, etc.). It is law enforcement, not corporations, that |
| has a need for the immediate decryption of communications in transit. There |
| is extraordinary risk in trusting public safety and national security to |
| market forces that rightfully are protecting important but unrelated |
| interests. Law enforcement's needs will not be adequately addressed by |
| this type of an approach. |
|
|
| It is for this reason that government policy makers and Congress should |
| play a direct role in shaping our national encryption policy and adopt a |
| balanced approach that addresses both the commercial and the public safety |
| needs. The adverse impact to public safety and national security associated |
| with any type of "wait and see" or voluntary market force approach would |
| be far too great of a price for the American public to pay. |
|
|
| Several bills have recently been introduced which address encryption. |
| Language in some of the proposed bills makes it unlawful to use encryption |
| in the furtherance of criminal activity and set out procedures for law |
| enforcement access to stored decryption keys in those instances where |
| key recovery encryption was voluntarily used. Only one of these bills, |
| S. 909, comes close to meeting our core public safety, effective law |
| enforcement, and national security needs. S. 909 takes significant strides |
| in the direction of protecting public safety by encouraging the use of key |
| recovery encryption through market based incentives and other inducements. |
| All of the other bills currently under consideration by the Congress, to |
| include S. 376, S. 377 , and H.R. 695, would have a significant negative |
| impact on public safety and national security and would risk great harm |
| to our ability to enforce the laws and protect our citizens if enacted. |
|
|
| Unfortunately, S. 909 still does not contain sufficient assurances that |
| the impact on public safety and effective law enforcement caused by the |
| widespread availability of encryption will be adequately addressed. We look |
| forward to working with you to develop legislative accommodations that |
| adequately address the public safety needs of law enforcement and a balanced |
| encryption policy. |
|
|
| Further, some argue the encryption "Genie is out of the bottle," and that |
| attempts to influence the future use of encryption are futile. I do not |
| believe that to be the case. Strong encryption products that include |
| decryption features for lawful purposes can, with government and industry |
| support, become the standard for use in the global information |
| infrastructure. |
|
|
| No one contends that the adoption of a balanced encryption policy will |
| prevent all criminals, spies and terrorists from gaining access to and |
| using unbreakable encryption. But if we, as a nation, act responsibly |
| and only build systems and encryption products that support and include |
| appropriate decryption features, all facets of the public's interest can |
| be served. |
|
|
| And as this committee knows, export controls on encryption products exist |
| primarily to protect national security and foreign policy interests. |
| However, law enforcement is more concerned about the significant and |
| growing threat to public safety and effective law enforcement that would |
| be caused by the proliferation and use within the United States of a |
| communications infrastructure that supports the use of strong encryption |
| products but that does not support law enforcement's immediate decryption |
| needs. Without question, such an infrastructure will be used by dangerous |
| criminals and terrorists to conceal their illegal plans and activities |
| from law enforcement, thus inhibiting our ability to enforce the laws |
| and prevent terrorism. |
|
|
| Congress has on many occasions accepted the premise that the use of |
| electronic surveillance is a tool of utmost importance in terrorism cases |
| and in many criminal investigations, especially those involving serious |
| and violent crime, terrorism, espionage, organized crime, drug-trafficking, |
| corruption and fraud. There have been numerous cases where law enforcement, |
| through the use of electronic surveillance, has not only solved and |
| successfully prosecuted serious crimes and dangerous criminals, but has |
| also been able to prevent serious and life-threatening criminal acts. For |
| example, terrorists in New York were plotting to bomb the United Nations |
| building, the Lincoln and Holland tunnels, and 26 Federal Plaza as well as |
| conduct assassinations of political figures. Court-authorized electronic |
| surveillance enabled the FBI to disrupt the plot as explosives were being |
| mixed. Ultimately, the evidence obtained was used to convict the |
| conspirators. In another example, electronic surveillance was used to |
| prevent and then convict two men who intended to kidnap, molest and then |
| kill a male child. |
|
|
| Most encryption products manufactured today do not contain features that |
| provide for immediate law enforcement decryption. Widespread use of |
| unbreakable encryption or communications infrastructure that supports the |
| use of unbreakable encryption clearly will undermine law enforcement's |
| ability to effectively carry out its public safety mission and to combat |
| dangerous criminals and terrorists. |
|
|
| This is not a problem that will begin sometime in the future. Law |
| enforcement is already encountering the harmful effects of encryption |
| in many important investigations today. For example: |
|
|
| convicted spy Aldrich Ames was told by the Russian Intelligence |
| Service to encrypt computer file information that was to be passed |
| to them. an international terrorist was plotting to blow up 11 |
| U.S.-owned commercial airliners in the Far East. His laptop computer |
| which was seized during his arrest in Manilla contained encrypted |
| files concerning this terrorist plot. a subject in a child pornography |
| case used encryption in transmitting obscene and pornographic images |
| of children over the Internet. a major international drug trafficking |
| subject recently used a telephone encryption device to frustrate |
| court-approved electronic surveillance. |
|
|
| Requests for cryptographic support pertaining to electronic surveillance |
| interceptions from FBI field offices and other law enforcement agencies |
| have steadily risen over the past several years. For example, from 1995 |
| to 1996, there was a two-fold increase (from 5 to 12) in the number of |
| instances where the FBI's court-authorized electronic efforts were frustrated |
| by the use of encryption products that did not allow for lawful law |
| enforcement decryption. |
|
|
| Over the last three (3) years, the FBI has also seen the number of |
| computer-related cases utilizing encryption and/or password protection |
| increase from 20 or two (2) percent of the cases involving electronically |
| stored information to 140 or seven (7) percent. These included the use of |
| 56-bit data encryption standard (DES) and 128-bit "pretty good privacy" |
| (PGP) encryption. |
|
|
| Just as when the Congress so boldly addressed the digital telephony issue |
| in 1994, the government and the nation are again at an historic crossroad |
| on this issue. The Attorney General and the heads of federal law enforcement |
| agencies as well as the presidents of several state and local law enforcement |
| associations recently sent letters to every member of Congress urging the |
| adoption of a balanced encryption policy. In addition, the International |
| Association of Chiefs of Police, the National Sheriff's Association and |
| the National District Attorneys Association have all enacted resolutions |
| supporting a balanced encryption policy and opposing any legislation that |
| undercuts or falls short such a balanced policy. |
|
|
| If public policy makers act wisely, the safety of all Americans will be |
| enhanced for decades to come. But if narrow interests prevail, then law |
| enforcement will be unable to provide the level of protection that people |
| in a democracy properly expect and deserve. |
|
|
| Conclusion |
|
|
| We are not asking that the magnificent advances in encryption technology |
| be abandoned. We are the strongest proponents of robust, reliable encryption |
| manufactured and sold by American companies all over the world. Our position |
| is simple and, we believe, vital. Encryption is certainly a commercial |
| interest of great importance to this great nation. But it's not merely a |
| commercial or business issue. To those of us charged with the protection of |
| public safety and national security, encryption technology and its |
| application in the information age--here at the dawn of the 21st century |
| and thereafter--will become a matter of life and death in many instances |
| which will directly impact on our safety and freedoms. Good and sound |
| public policy decisions about encryption must be made now by the Congress |
| and not be left to private enterprise. Legislation which carefully balances |
| public safety and private enterprise must be established with respect to |
| encryption. |
|
|
| Would we allow a car to be driven with features which would evade and outrun |
| police cars? Would we build houses or buildings which firefighters could not |
| enter to save people? |
|
|
| Most importantly, we are not advocating that the privacy rights or personal |
| security of any person or enterprise be compromised or threatened. You can't |
| yell "fire" in a crowded theater. You can't with impunity commit libel or |
| slander. You can't use common law honored privileges to commit crimes. |
|
|
| In support of our position for a rational encryption policy which balances |
| public safety with the right to secure communications, we rely on the Fourth |
| Amendment to the Constitution. There the framers established a delicate |
| balance between "the right of the people to be secure in their persons, |
| houses, papers, and effects (today we might add personal computers, modems, |
| data streams, discs, etc.) against unreasonable searches and seizures." |
| Those precious rights, however, were balanced against the legitimate right |
| and necessity of the police, acting through strict legal process, to gain |
| access by lawful search and seizure to the conversations and stored evidence |
| of criminals, spies and terrorists. |
|
|
| The precepts and balance of the Fourth Amendment have not changed or altered. |
| What has changed from the late eighteenth to the late twentieth century is |
| technology and telecommunications well beyond the contemplation of the |
| framers. |
|
|
| The unchecked proliferation of unbreakable encryption will drastically |
| change the balance of the Fourth Amendment in a way which would shock its |
| original proponents. Police soon may be unable through legal process and |
| with sufficient probable cause to conduct a reasonable and lawful search |
| or seizure, because they cannot gain access to evidence being channeled or |
| stored by criminals, terrorists and spies. Significantly, their lack of |
| future access may be in part due to policy decisions about encryption made |
| or not made by the United States. This would be a terrible upset of the |
| balance so wisely set forth in the Fourth Amendment on December 15, 1791. |
| I urge you to maintain that balance and allow your police departments, |
| district attorneys, sheriffs and federal law enforcement authorities to |
| continue to use their most effective techniques to fight crime and |
| terrorism--techniques well understood and authorized by the framers and |
| Congress for over two hundred years. |
|
|
| I look forward to working with you on this matter and at this time would |
| be pleased to answer any questions. |
|
|
|
|
| 0x3>------------------------------------------------------------------------- |
|
|
| Subject: Urban Ka0s -- 26 Indonesian Servers Haxed |
|
|
|
|
| Greetings Phrack, |
|
|
| Today, our group (Urban Ka0s) and several portuguese Hackers attacked |
| several Indonesian servers, in order to defend East Timor rights! |
|
|
| We are Portuguese Hackers Agaisnt Indonesian Tirany. |
|
|
| "Thix Site Was Haxed & Deleted by PHAiT. This attack is not |
| against indonesian people but against its government and their |
| opression towards the republic of timor. These actions were |
| made to honour and remember all the 250 people killed in Dili |
| on the 12 november 1991. |
|
|
| As a result all sites belonging to indonesia's goverment were |
| erased, the rest only had their webpages changed." |
|
|
| East Timor, One People, One Nation |
|
|
| "Whether it is in Tibet or Poland, the Baltics or the |
| South Pacific, Africa or the Caribbean, it has been shown |
| that force and repression can never totally suffocate the |
| reasons underlying the existence of a people: pride in its |
| own identity, capacity to preserve, without restriction, |
| everything that identifies it as such, freedom to pass all |
| this on to future generations, in brief, the right to manage |
| its own destiny." |
|
|
| Xanana Gusmo |
| October 5, 1989 |
|
|
| Please inform all ciber citizens of this action. |
|
|
| Our contact is at: |
| -- Urban Ka0s -- |
| http://urbankaos.org |
| irc: PT-Net irc.urbankaos.org |
|
|
| 0x4>------------------------------------------------------------------------- |
|
|
| Title: Hacker accused of sabotaging Forbes computers |
| Source: Infobeat News |
| Author: unknown |
| Date: unknown |
|
|
| A former temporary computer technician at business publisher Forbes |
| Inc has been charged with sabotage and causing a massive crash of the |
| firm's computer network, prosecutors said. According to the complaint |
| filed in Manhattan Federal Court and unsealed Monday, George Mario |
| Parente, 30, of Howard Beach in the borough of Queens was accused of |
| hacking his way into the Forbes' network in April from his home, |
| using an unauthorized password. Prosecutors alleged he erased vital |
| information including budgets and salary from Forbes' computers |
| because he was angry with the company after he was fired. |
|
|
| 0x5>------------------------------------------------------------------------- |
|
|
| Title: Privacy, Inc. Unveils its Internet Background Check |
| Source: |
| Author: unknown |
| Date: August 1, 1997 |
|
|
| Aurora, Colorado |
|
|
| Privacy, Inc. (www.privacyinc.com) today released its Internet Background |
| Check, a utility that empowers users to determine if they are at risk from |
| the plethora of databases that are being placed on the Internet. Searches |
| quickly scan through hundreds of databases beng placed on-line by state and |
| local governments and law enforcement angencies in categories such as: |
|
|
| * Registered Sex Offenders and Predators |
| * Deadbeat Parents |
| * Wanted Persons |
| * Missing Persons |
| * Arrest/Prison |
|
|
| 'The Computer Is Never Wrong' |
|
|
| "Errors and risks of mistaken identity in this data are a key concern," says |
| Edward Allburn, founder and president of Privacy, Inc. The recent flurry of |
| activity by government and law enforcement agencies to distribute such |
| volatile information on the Internet creates an environment that potentially |
| places innocent people at risk, especially for mistaken identity. |
|
|
| Advanced technology was incorporated into the development of the Internet |
| Background Check with this risk in mind. This technology allows users to |
| also search for names that look and/or sound similar to their own while still |
| delivering highly focused results that standard Internet search engines |
| (such as Yahoo! and Lycos) are incapable of producing. |
|
|
| One More Tool |
|
|
| The release provides one more tool for consumers to protect themselves in the |
| Information Age. Additional resources provided by Privacy, Inc. include: |
| * Consumer Privacy Guide |
| * Government Database Guide |
| * Government Dossier Service |
| * David Sobel's Legal FAQ |
| * Privacy News Archive, updated weekly |
|
|
| Guido, the Cyber-Bodyguard is another utility planned to be released in the |
| coming months. Guido will interface with the Internet Background Check to |
| automatically alert users via e-mail if/when their name appears in a new or |
| updated database, in effect monitoring the Internet so users don't have to. |
|
|
| 0x6>------------------------------------------------------------------------- |
|
|
| Title: Commerce Dept encryption rules declared unconstitutional |
| Source: fight-censorship@vorlon.mit.edu |
| Author: unknown |
| Date: unknown |
|
|
| A Federal judge in San Francisco ruled today that the Commerce |
| Department's export controls on encryption products violate the |
| First Amendment's guarantees of freedom of speech. |
|
|
| In a 35-page decision, U.S. District Judge Marilyn Patel said the |
| Clinton administration's rules violate "the First Amendment on the |
| grounds of prior restraint and are, therefore, unconstitutional." |
| Patel reaffirmed her December 1996 decision against the State |
| Department regulations, saying that the newer Commerce Department |
| rules suffer from similar constitutional infirmities. |
|
|
| Patel barred the government from "threatening, detaining, |
| prosecuting, discouraging, or otherwise interfering with" anyone |
| "who uses, discusses, or publishes or seeks to use, discuss or |
| publish plaintiff's encryption programs and related materials." |
| Daniel Bernstein, now a math professor at the University of |
| Illinois, filed the lawsuit with the help of the Electronic |
| Frontier Foundation. |
|
|
| Patel dismissed the State, Energy, and Justice departments and |
| CIA as defendants. President Clinton transferred jurisdiction over |
| encryption exports from the State to the Commerce department on |
| December 30, 1996. |
|
|
| The Justice Department seems likely to appeal the ruling to the |
| Ninth Circuit, which could rule on the case in the near future. |
|
|
| 0x7>------------------------------------------------------------------------- |
|
|
| Title: The Million Dollar Challenge |
| Source: unknown mail list |
|
|
| Ultimate Privacy, the e-mail encryption program combining ease |
| of use with unbreakability. |
|
|
| Ultimate Privacy is serious cryptography. On the Links page we |
| have links to other Internet sites that discuss One-Time Pad |
| cryptography and why it is unbreakable when properly |
| implemented. |
|
|
| Nevertheless, should you wish to try, the first person to be able |
| to discern the original message within a year (following the |
| simple requirements of the Challenge) will actually receive the |
| million dollar prize as specified in the Rules page. The prize |
| is backed by the full faith and credit of Crypto-Logic |
| Corporation and its insurors. |
|
|
| You might be interested in to know how the Challenge was done. We |
| used a clean, non-network-connected computer. After installing |
| Ultimate Privacy, one person alone entered the Challenge message |
| and encrypted it. After making a copy of the encrypted message, |
| we removed the hard disk from the computer and it was |
| immediately transported to a vault for a year. |
|
|
| Therefore, the original message is not known by Crypto-Logic |
| Corporation staff (other than the first few characters for |
| screening purposes), nor are there any clues to the original |
| message on any media in our offices. |
|
|
| 0x8>------------------------------------------------------------------------- |
|
|
| Title: High Profile Detainee Seeks Legal Help |
| Source: fight-censorship@vorlon.mit.edu |
| Author: unknown |
| Date: September 3, 1997 |
|
|
|
|
| Mr. Kevin Mitnick has been detained in Federal custody without |
| bail on computer "hacking" allegations for over thirty months. |
| Having no financial resources, Mr. Mitnick has been appointed |
| counsel from the Federal Indigent Defense Panel. As such, Mr. |
| Mitnick's representation is limited; his attorney is not permitted |
| to assist with civil actions, such as filing a Writ of Habeas |
| Corpus. |
|
|
| For the past two years, Mr. Mitnick has attempted to assist in his |
| own defense by conducting legal research in the inmate law library |
| at the Metropolitan Detention Center (hereinafter "MDC") in Los |
| Angeles, California. Mr. Mitnick's research includes reviewing |
| court decisions for similar factual circumstances which have |
| occurred in his case. MDC prison officials have been consistently |
| hampering Mr. Mitnick's efforts by denying him reasonable access |
| to law library materials. Earlier this year, Mr. Mitnick's lawyer |
| submitted a formal request to Mr. Wayne Siefert, MDC Warden, |
| seeking permission to allow his client access to the law library |
| on the days set aside for inmates needing extra law library time. |
| The Warden refused. |
|
|
| In August 1995, Mr. Mitnick filed an administrative remedy request |
| with the Bureau of Prisons complaining that MDC policy in |
| connection with inmate access to law library materials does not |
| comply with Federal rules and regulations. Specifically, the |
| Warden established a policy for MDC inmates that detracts from |
| Bureau of Prison's policy codified in the Code of Federal |
| Regulations. |
|
|
| Briefly, Federal law requires the Warden to grant additional law |
| library time to an inmate who has an "imminent court deadline". |
| The MDC's policy circumvents this law by erroneously interpreting |
| the phrase "imminent court deadline" to include other factors, |
| such as, whether an inmate exercises his right to assistance of |
| counsel, or the type of imminent court deadline. |
| For example, MDC policy does not consider detention (bail), |
| motion, status conference, or sentencing hearings as imminent |
| court deadlines for represented inmates. MDC officials use this |
| policy as a tool to subject inmates to arbitrary and capricious |
| treatment. It appears MDC policy in connection with inmate legal |
| activities is inconsistent with Federal law and thereby affects |
| the substantial rights of detainees which involve substantial |
| liberty interests. |
|
|
| In June 1997, Mr. Mitnick finally exhausted administrative |
| remedies with the Bureau of Prisons. Mr. Mitnick's only avenue of |
| vindication is to seek judicial review in a Court of Law. Mr. |
| Mitnick wishes to file a Writ of Habeas Corpus challenging his |
| conditions of detention, and a motion to compel Federal |
| authorities to follow their own rules and regulations. |
|
|
| Mr. Mitnick is hoping to find someone with legal experience, such |
| as an attorney or a law student willing to donate some time to |
| this cause to insure fair treatment for everyone, and to allow |
| detainees to effectively assist in their own defense without |
| "Government" interference. Mr. Mitnick needs help drafting a |
| Habeas Corpus petition with points and authorities to be submitted |
| by him pro-se. His objective is to be granted reasonable access |
| to law library materials to assist in his own defense. |
|
|
| If you would like to help Kevin, please contact him at the |
| following address: |
|
|
| Mr. Kevin Mitnick |
| Reg. No. 89950-012 |
| P.O. Box 1500 |
| Los Angeles, CA 90053-1500 |
|
|
| 0x9>------------------------------------------------------------------------- |
|
|
| Title: Kevin Mitnick Press Release |
| Source: Press Release |
| Author: Donald C. Randolph |
| Date: August 7, 1997 |
|
|
| THE UNITED STATES V. KEVIN DAVID MITNICK |
|
|
| I. Proceedings to Date |
|
|
| With 25 counts of alleged federal computer and wire fraud violations still |
| pending against him, the criminal prosecution of Kevin Mitnick is |
| approaching its most crucial hour. The trial is anticipated to begin in |
| January, 1998. In reaching this point, however, Kevin has already |
| experienced years of legal battles over alleged violations of the |
| conditions of his supervised release and for possession of unauthorized |
| cellular access codes. |
|
|
| A. Settling the "Fugitive" Question |
|
|
| The seemingly unexceptional charges relating to supervised release |
| violations resulted in months of litigation when the government attempted |
| to tack on additional allegations for conduct occurring nearly three years |
| after the scheduled expiration of Kevin's term of supervised release in |
| December, 1992. The government claimed that Kevin had become a fugitive |
| prior to the expiration of his term, thereby "tolling" the term and |
| allowing for the inclusion of additional charges. After months of |
| increasingly bold assertions concerning Kevin's "fugitive" status, |
| evidentiary hearings were held in which the government was forced to |
| concede that its original position in this matter was unsupported by the |
| facts. |
|
|
| B. Sentencing |
|
|
| In June of this year Kevin was sentenced for certain admitted violations of |
| his supervised release and for possession of unauthorized access codes. |
| The court imposed a sentence of 22 months instead of the 32 months sought |
| by the government. Since Kevin has been in custody since his arrest in |
| February 1995, this sentence has been satisfied. We are currently |
| preparing a request for release on bail. |
|
|
| During this stage of the proceedings, the government sought to impose |
| restrictions on Kevin's access to computers which were so severe as to |
| virtually prohibit him from functioning altogether in today's society. The |
| proposed restrictions sought to completely prohibit Kevin from "using or |
| possessing" all computer hardware equipment, software programs, and |
| wireless communications equipment. After arguments that such restrictions |
| unduly burdened Kevin's freedom to associate with the on-line computer |
| community and were not reasonably necessary to ensure the protection of the |
| public, the court modified its restrictions by allowing for computer access |
| with the consent of the Probation Office. Nonetheless, the defense |
| believes that the severe restrictions imposed upon Mr. Mitnick are |
| unwarranted in this case and is, therefore, pursuing an appeal to the Ninth |
| Circuit. |
|
|
| II. The Government Seeks to make an Example of Mr. Mitnick |
|
|
| One of the strongest motivating factors for the government in the |
| prosecution of Kevin Mitnick is a desire to send a message to other |
| would-be "hackers". The government has hyped this prosecution by |
| exaggerating the value of loss in the case, seeking unreasonably stiff |
| sentences, and by painting a portrait of Kevin which conjures the likeness |
| of a cyber-boogie man. |
|
|
| There are a number of objectives prompting the government's tactics in this |
| respect. First, by dramatically exaggerating the amount of loss at issue |
| in the case (the government arbitrarily claims losses exceed some $80 |
| million) the government can seek a longer sentence and create a |
| high-profile image for the prosecution. Second, through a long sentence |
| for Kevin, the government hopes to encourage more guilty pleas in future |
| cases against other hackers. For example, a prosecutor offering a moderate |
| sentence in exchange for a guilty plea would be able to use Kevin Mitnick's |
| sentence as an example of what "could happen" if the accused decides to go |
| to trial. Third, by striking fear into the hearts of the public over the |
| dangers of computer hackers, the government hopes to divert scrutiny away |
| from its own game-plan regarding the control and regulation of the Internet |
| and other telecommunications systems. |
|
|
| III. Crime of Curiosity |
|
|
| The greatest injustice in the prosecution of Kevin Mitnick is revealed when |
| one examines the actual harm to society (or lack thereof) which resulted |
| from Kevin's actions. To the extent that Kevin is a "hacker" he must be |
| considered a purist. The simple truth is that Kevin never sought monetary |
| gain from his hacking, though it could have proven extremely profitable. |
| Nor did he hack with the malicious intent to damage or destroy other |
| people's property. Rather, Kevin pursued his hacking as a means of |
| satisfying his intellectual curiosity and applying Yankee ingenuity. These |
| attributes are more frequently promoted rather than punished by society. |
|
|
| The ongoing case of Kevin Mitnick is gaining increased attention as the |
| various issues and competing interests are played out in the arena of the |
| courtroom. Exactly who Kevin Mitnick is and what he represents, however, |
| is ultimately subject to personal interpretation and to the legacy which |
| will be left by "The United States v. Kevin David Mitnick". |
|
|
| 0xa>------------------------------------------------------------------------- |
|
|
| Title: SAFE crypto bill cracked again |
| Source: |
| Author: By Alex Lash and Dan Goodin |
| Date: September 12, 1997, 8:40 a.m. PT |
|
|
| For the second time in a week, a House committee has made significant |
| changes to the Security and Freedom through Encryption (SAFE) Act to |
| mandate that domestic encryption products give law enforcement agencies |
| access to users' messages. |
|
|
| The changes by the Intelligence Committee, which were passed as a |
| "substitute" to SAFE, turn the legislation on its head. The amendment |
| follows similar changes two days ago in the House National Security |
| Committee. |
|
|
| Initially drafted as a way to loosen U.S. export controls on encryption, |
| legislators have instead "marked up" the bill, or amended it at the |
| committee level, to reflect the wishes of the Federal Bureau of |
| Investigation and other law enforcement agencies that want "wiretap" |
| access to all encrypted email and other digital files. |
|
|
| Both the Intelligence and the National Security committees tend to favor |
| export controls, because they view encryption as a threat to |
| information-gathering activities by U.S. military and law enforcement |
| officials. |
|
|
| The Intelligence Committee cited those concerns today when announcing |
| the substitute legislation. "Terrorist groups...drug cartels...and those |
| who proliferate in deadly chemical and biological weapons are all |
| formidable opponents of peace and security in the global society," said |
| committee chairman Porter Goss (R-Florida) in a statement. "These bad |
| actors must know that the U.S. law enforcement and national security |
| agencies, working under proper oversight, will have the tools to |
| frustrate illegal and deadly activity and bring international criminals |
| to justice." |
|
|
| Opponents of government attempts to regulate encryption, including a |
| leading panel of cryptographers, have argued that built-in access to |
| encrypted files would in fact threaten national and individual security |
| and be prohibitively expensive to implement. |
|
|
| The amended legislation calls for all imported or U.S.-made encryption |
| products that are manufactured or distributed after January 31, 2000, to |
| provide "immediate access" to the decrypted text if the law officials |
| present a court order. "Law enforcement will specifically be required to |
| obtain a separate court order to have the data, including |
| communications, decrypted." |
|
|
| A markup of the same bill in the House Commerce Committee was postponed |
| today for two weeks. It will be the fifth such committee vote on the |
| bill since its introduction. |
|
|
| The Intelligence and National Security amendments this week are by no |
| means a defeat of the bill. Instead, they would have to be reconciled |
| with versions of the bill already approved by the House Judiciary and |
| International Relations committees. That reconciliation most likely |
| would have to happen on the House floor. The rapidly fragmenting bill |
| still has several layers of procedure to wend through before it reaches |
| a potential floor vote, but people on both sides of the encryption |
| debate openly question if the bill--in any form--will make it that far |
| this year. |
|
|
| The legislation has 252 cosponsors, more than half of the House |
| membership. |
|
|
| 0xb>------------------------------------------------------------------------- |
|
|
| Title: RC5 Cracked - The unknown message is... |
| Source: |
| Author: David McNett <nugget@slacker.com>[:] |
| Date: Mon, 27 Oct 1997 08:43:38 -0500 |
|
|
|
|
| -----BEGIN PGP SIGNED MESSAGE----- |
| Hash: SHA1 |
|
|
| It is a great privilege and we are excited to announce that at 13:25 |
| GMT on 19-Oct-1997, we found the correct solution for RSA Labs' RC5- |
| 32/12/7 56-bit secret-key challenge. Confirmed by RSA Labs, the key |
| 0x532B744CC20999 presented us with the plaintext message for which we |
| have been searching these past 250 days. |
|
|
| The unknown message is: It's time to move to a longer key length |
|
|
| In undeniably the largest distributed-computing effort ever, the |
| Bovine RC5 Cooperative (http://www.distributed.net/), under the |
| leadership of distributed.net, managed to evaluate 47% of the |
| keyspace, or 34 quadrillion keys, before finding the winning key. At |
| the close of this contest our 4000 active teams were processing over |
| 7 billion keys each second at an aggregate computing power equivalent |
| to more than 26 thousand Pentium 200's or over 11 thousand PowerPC |
| 604e/200's. Over the course of the project, we received block |
| submissions from over 500 thousand unique IP addresses. |
|
|
| The winning key was found by Peter Stuer <peter@dinf.vub.ac.be> with |
| an Intel Pentium Pro 200 running Windows NT Workstation, working for |
| the STARLab Bovine Team coordinated by Jo Hermans |
| <Jo.Hermans@vub.ac.be> and centered in the Computer Science |
| Department (DINF) of the Vrije Universiteit (VUB) in Brussels, |
| Belgium. (http://dinf.vub.ac.be/bovine.html/). Jo's only comments |
| were that "$1000 will buy a lot of beer" and that he wished that the |
| solution had been found by a Macintosh, the platform that represented |
| the largest portion of his team's cracking power. Congratulations |
| Peter and Jo! |
|
|
| Of the US$10000 prize from RSA Labs, they will receive US$1000 and |
| plan to host an unforgettable party in celebration of our collective |
| victory. If you're anywhere near Brussels, you might want to find |
| out when the party will be held. US$8000, of course, is being |
| donated to Project Gutenberg (http://www.promo.net/pg/) to assist |
| them in their continuing efforts in converting literature into |
| electronic format for the public use. The remaining US$1000 is being |
| retained by distributed.net to assist in funding future projects. |
|
|
| Equally important are the thanks, accolades, and congratulations due |
| to all who participated and contributed to the Bovine RC5-56 Effort! |
| The thousands of teams and tens of thousands of individuals who have |
| diligently tested key after key are the reason we are so successful. |
|
|
| The thrill of finding the key more than compensates for the sleep, |
| food, and free time that we've sacrificed! |
|
|
| Special thanks go to all the coders and developers, especially Tim |
| Charron, who has graciously given his time and expertise since the |
| earliest days of the Bovine effort. Thanks to all the coordinators |
| and keyserver operators: Chris Chiapusio, Paul Chvostek, Peter |
| Denitto, Peter Doubt, Mishari Muqbil, Steve Sether, and Chris |
| Yarnell. Thanks to Andrew Meggs, Roderick Mann, and Kevyn Shortell |
| for showing us the true power of the Macintosh and the strength of |
| its users. We'd also like to thank Dave Avery for attempting to |
| bridge the gap between Bovine and the other RC5 efforts. |
|
|
| Once again, a heartfelt clap on the back goes out to all of us who |
| have run the client. Celebrations are in order. I'd like to invite |
| any and all to join us on the EFNet IRC network channel #rc5 for |
| celebrations as we regroup and set our sights on the next task. Now |
| that we've proven the limitations of a 56-bit key length, let's go |
| one further and demonstrate the power of distributed computing! We |
| are, all of us, the future of computing. Join the excitement as the |
| world is forced to take notice of the power we've harnessed. |
|
|
| Moo and a good hearty laugh. |
|
|
| Adam L. Beberg - Client design and overall visionary |
| Jeff Lawson - keymaster/server network design and morale booster |
| David McNett - stats development and general busybody |
|
|
| 0xc>------------------------------------------------------------------------- |
|
|
| Title: Kashpureff in custody. |
| Source: Marc Hurst <mhurst@fastlane.ca> |
| Author: Marc Hurst <mhurst@fastlane.ca> |
| Date: Fri, 31 Oct 1997 10:40:20 -0500 (EST) |
|
|
|
|
| Eugene Kashpureff, known for his redirect of the NSI web page, |
| was apprehended this morning in Toronto by undercover RCMP |
| detectives. |
|
|
| Pending a deportation hearing, he will be returned to New York to |
| face Felony Wire Fraud charges that were sworn out against him |
| after he had settled out of court with NSI in regard to their |
| civil suit. |
|
|
| Early in the week Eugene relinquished control of the Alternic to |
| an adhoc industry group and that group will be making an |
| announcement in the next few days. |
|
|
| A this time I have no further information to volunteer. |
|
|
| Sincerely |
| Marc Hurst |
|
|
| 0xd>------------------------------------------------------------------------- |
|
|
| Title: XS4ALL refuses Internet tap |
| Source: Press Release |
| Author: Maurice Wessling |
| Date: November 13th 1997, Amsterdam, Netherlands. |
|
|
|
|
| XS4ALL Internet is refusing to comply with an instruction from the |
| Dutch Ministry of Justice that it should tap the Internet traffic |
| of one of its users as part of an investigation. XS4ALL has |
| informed the Ministry that in its view the instruction lacks any |
| adequate legal basis. The company's refusal makes it liable for a |
| penalty but XS4ALL is hoping for a trial case to be brought in the |
| near future so that a court can make a pronouncement. |
|
|
| On Friday October 31st, a detective and a computer expert from the |
| Forensic Science Laboratory issued the instruction to XS4ALL. The |
| Ministry of Justice wants XS4ALL to tap for a month all Internet |
| traffic to and from this user and then supply the information to |
| the police. This covers e-mail, the World Wide Web, news groups, |
| IRC and all Internet services that this person uses. XS4ALL would |
| have to make all the technical arrangements itself. |
|
|
| As far as we are aware, there is no precedent in the Netherlands |
| for the Ministry of Justice issuing such a far-reaching |
| instruction to an Internet provider. The detectives involved also |
| acknowledge as much. Considering that a national meeting of |
| Examining judges convened to discuss the instruction, one may |
| appreciate just how unprecedented this situation is. Hitherto, |
| instructions have mainly been confined to requests for personal |
| information on the basis of an e-mail address. |
|
|
| XS4ALL feels obliged in principle to protect its users and their |
| privacy. Furthermore, XS4ALL has a commercial interest, since it |
| must not run the risk of action being brought by users under Civil |
| Law on account of unlawful deeds. This could happen with such an |
| intervention by the provider which is not based in law. Finally, |
| it is important from the social point of view that means of |
| investigation have adequate statutory basis. To comply with the |
| instruction could act as an undesirable precedent which could have |
| a major impact on the privacy of all Internet users in the |
| Netherlands. |
|
|
| XS4ALL has no view on the nature of the investigation itself or |
| the alleged crimes. It is happy to leave the court to decide that. |
| Nor will XS4ALL make any comment on the content of the study or |
| the region in which this is occurring for it is not its intention |
| that the investigation should founder. XS4ALL has proposed in vain |
| to the examining judge that the instruction be recast in terms |
| which ensures the legal objections are catered for. |
|
|
| The Ministry of Justice based its claim on Article 125i of the |
| Penal Code. This article was introduced in 1993 as part of the |
| Computer Crime Act. It gives the examining judge the option of |
| advising third parties during statutory preliminary investigations |
| to provide data stored in computers in the interest of |
| establishing the truth. According to legal history, it was never |
| the intention to apply this provision to an instruction focused on |
| the future. Legislators are still working to fill this gap in the |
| arsenal of detection methods, by analogy with the Ministry of |
| Justice tapping phone lines (125g of the Penal Code). The Dutch |
| Constitution and the European Convention on the Protection of |
| Human Rights demand a precise statutory basis for violating basic |
| rights such as privacy and confidentiality of correspondence. The |
| Ministry clearly does not wish to wait for this and is now |
| attempting to use Article 125i of the Penal Code, which is not |
| intended for this purpose, to compel providers themselves to start |
| tapping suspect users. The Ministry of Justice is taking the risk |
| of the prosecution of X, in the context of which the instruction |
| was issued to XS4ALL, running aground on account of using illegal |
| detection methods. Here, again, XS4ALL does not wish to be liable |
| in any respect in this matter. |
|
|
| For information please contact: |
|
|
| XS4ALL |
| Maurice Wessling |
| email: maurice@xs4all.nl |
| http://www.xs4all.nl/ |
|
|
| 0xf>------------------------------------------------------------------------- |
|
|
| Title: The FCC Wants V-Chip in PCs too |
| Source: Cyber-Liberties Update |
| Author: |
| Date: Monday, November 3, 1997 |
|
|
|
|
| Mandating that all new televisions have built-in censorship technology |
| is not the only thing that the Federal Communications Commission (FCC) |
| is seeking, said ACLU Associate Director Barry Steinhardt, it is also |
| looking to require that the same technology be added to all new personal |
| computers. |
|
|
| Last year, culminating a protracted campaign against TV violence, |
| Congress passed the Telecommunications Act of 1996, a law requiring that |
| new televisions be equipped with the so-called V-chip. The V-chip is a |
| computerized chip capable of detecting program ratings and blocking |
| adversely rated programs from view. |
|
|
| Now, the FCC has announced that it is soliciting public comments through |
| November 24, on the idea of placing V-chips inside personal computers |
| since some are capable of delivering television programming. |
|
|
| ^SAt the time the V-chip was being considered we warned that with the |
| growing convergence between traditional television (broadcast and cable) |
| and the Internet, it was only a matter of time before the government |
| would move to require that the V-chip be placed in PC's. Now that has |
| happened,^T Steinhardt said. |
|
|
| ^SHardwiring censorship technology into the PC is part of the headlong |
| rush to |
| a scheme of rating and blocking Internet content that will turn the |
| Internet into a bland homogenized medium in which only large corporate |
| interest will have truly free speech,^T Steinhardt said. |
|
|
| The ACLU has criticized the mandatory requirement of V-chip arguing that |
| it is a form of censorship clearly forbidden by the First Amendment. |
|
|
| ^SAlthough its supporters claim the V-chip gives parents control over |
| their |
| children's viewing habits, in fact it will function as a governmental |
| usurpation of parental control,^T said Solange Bitol, Legislative Counsel |
| for the ACLU^Rs Washington National Office. |
|
|
| ^SUnder the legislation, it is the government (either directly or by |
| coercing private industry), and not the parents, that will determine how |
| programs will be rated. If a parent activates the V-chip, all programs |
| with a "violent" rating will be blocked. What kind of violence will be |
| censored? Football games? War movies? News reports?^T she added. |
|
|
| The ACLU is opposed to mandatory addition or use of censoring |
| technologies and we will be filing comments with the FCC later this |
| month. We believe people are smart enough to turn off their television |
| sets or PCs on their own if they don^Rt like what they see. |
|
|
| Tell the FCC what you think. Submit comments to them online at |
| <http://www.fcc.gov/vchip/>, and send us a copy as well so that we make |
| sure your voice is heard. E-mail them to CSehgal@aclu.org. |
|
|
| =-= |
|
|
| To subscribe to the ACLU Cyber-Liberties Update, send a message to |
| majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your |
| message. To terminate your subscription, send a message to |
| majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body. |
|
|
|
|
| 1x1>------------------------------------------------------------------------- |
|
|
| Book Title: Underground |
| Poster: George Smith via Crypt Newsletter |
|
|
| Date: 27 Aug 97 00:36:12 EDT |
| From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM> |
| Subject: File 5--An "Underground" Book on Australian Hackers Burns the Mind |
|
|
| Source - CRYPT NEWSLETTER 44 |
|
|
| AN "UNDERGROUND" BOOK ON AUSTRALIAN HACKERS BURNS THE MIND |
|
|
| Crypt News reads so many bad books, reports and news pieces on |
| hacking and the computing underground that it's a real pleasure to |
| find a writer who brings genuine perception to the subject. |
| Suelette Dreyfus is such a writer, and "Underground," published by |
| the Australian imprint, Mandarin, is such a book. |
|
|
| The hacker stereotypes perpetrated by the mainstream media include |
| descriptions which barely even fit any class of real homo sapiens |
| Crypt News has met. The constant regurgitation of idiot slogans |
| -- "Information wants to be free," "Hackers are just people who |
| want to find out how things work" -- insults the intelligence. |
| After all, have you ever met anyone who wouldn't want their access |
| to information to be free or who didn't admit to some curiosity |
| about how the world works? No -- of course not. Dreyfus' |
| "Underground" is utterly devoid of this manner of patronizing |
| garbage and the reader is the better for it. |
|
|
| "Underground" is, however, quite a tale of human frailty. It's |
| strength comes not from the feats of hacking it portrays --and |
| there are plenty of them -- but in the emotional and physical cost |
| to the players. It's painful to read about people like Anthrax, an |
| Australian 17-year old trapped in a dysfunctional family. |
| Anthrax's father is abusive and racist, so the son --paradoxically |
| -- winds up being a little to much like him for comfort, |
| delighting in victimizing complete strangers with mean jokes and |
| absorbing the anti-Semitic tracts of Louis Farrakhan. For no |
| discernible reason, the hacker repetitively baits an old man |
| living in the United States with harassing telephone calls. |
| Anthrax spends months of his time engaged in completely pointless, |
| obsessed hacking of a sensitive U.S. military system. Inevitably, |
| Anthrax becomes entangled in the Australian courts and his life |
| collapses. |
|
|
| Equally harrowing is the story of Electron whose hacking pales in |
| comparison to his duel with mental illness. Crypt News challenges |
| the readers of "Underground" not to squirm at the image of |
| Electron, his face distorted into a fright mask of rolling eyes |
| and open mouth due to tardive dyskinesia, a side-effect of being |
| put on anti-schizophrenic medication. |
|
|
| Dreyfus expends a great deal of effort exploring what happens when |
| obsession becomes the only driving force behind her subjects' |
| hacking. In some instances, "Underground's" characters degenerate |
| into mental illness, others try to find solace in drugs. This is |
| not a book in which the hackers declaim at any great length upon |
| contorted philosophies in which the hacker positions himself as |
| someone whose function is a betterment to society, a lubricant of |
| information flow, or a noble scourge of bureaucrats and tyrants. |
| Mostly, they hack because they're good at it, it affords a measure |
| of recognition and respect -- and it develops a grip upon them |
| which goes beyond anything definable by words. |
|
|
| Since this is the case, "Underground" won't be popular with the |
| goon squad contingent of the police corp and computer security |
| industry. Dreyfus' subjects aren't the kind that come neatly |
| packaged in the |
| "throw-'em-in-jail-for-a-few-years-while-awaiting-trial" |
| phenomenon that's associated with America's Kevin Mitnick-types. |
| However, the state of these hackers -- sometimes destitute, |
| unemployable or in therapy -- at the end of their travails is |
| seemingly quite sufficient punishment. |
|
|
| Some things, however, never change. Apparently, much of |
| Australia's mainstream media is as dreadful at covering this type |
| of story as America's. Throughout "Underground," Dreyfus includes |
| clippings from Australian newspapers featuring fabrications and |
| exaggeration that bare almost no relationship to reality. Indeed, |
| in one prosecution conducted within the United Kingdom, the |
| tabloid press whipped the populace into a blood frenzy by |
| suggesting a hacker under trial could have affected the outcome of |
| the Gulf War in his trips through U.S. computers. |
|
|
| Those inclined to seek the unvarnished truth will find |
| "Underground" an excellent read. Before each chapter, Dreyfus |
| presents a snippet of lyric chosen from the music of Midnight Oil. |
| It's an elegant touch, but I'll suggest a lyric from another |
| Australian band, a bit more obscure, to describe the spirit of |
| "Underground." From Radio Birdman's second album: "Burned my eye, |
| burned my mind, I couldn't believe it . . . " |
| +++++++++ |
|
|
| ["Underground: Tales of Hacking, Madness and Obsession on the |
| Electronic Frontier" by Suelette Dreyfus with research by Julian |
| Assange, Mandarin, 475 pp.] |
|
|
| Excerpts and ordering information for "Underground" can be found |
| on the Web at http://www.underground-book.com . |
|
|
| George Smith, Ph.D., edits the Crypt Newsletter from Pasadena, |
| CA. |
|
|
| 1x2>------------------------------------------------------------------------- |
|
|
| Book Title: The Electronic Privacy Papers |
| : Documents on the Battle for Privacy in the Age of Surveillance |
| by: Bruce Schneier + David Banisar |
| publisher: John Wiley 1997 |
| other: 747 pages, index, US$59.99 |
|
|
| _The Privacy Papers_ is not about electronic privacy in general: it covers |
| only United States Federal politics, and only the areas of wiretapping |
| and cryptography. The three topics covered are wiretapping and the |
| Digital Telephony proposals, the Clipper Chip, and other controls on |
| cryptography (such as export controls and software key escrow proposals). |
|
|
| The documents included fall into several categories. There are broad |
| overviews of the issues, some of them written just for this volume. |
| There are public pronouncements and documents from various government |
| bodies: legislation, legal judgements, policy statements, and so forth. |
| There are government documents obtained under Freedom of Information |
| requests (some of them partially declassified documents complete with |
| blacked out sections and scrawled marginal annotations), which tell |
| the story of what happened behind the scenes. And there are newspaper |
| editorials, opinion pieces, submissions to government enquiries, and |
| policy statements from corporations and non-government organisations, |
| presenting the response from the public. |
|
|
| Some of the material included in _The Privacy Papers_ is available |
| online, none of it is breaking news (the cut-off for material appears |
| to be mid-to-late 1996), and some of the government documents included |
| are rather long-winded (no surprise there). It is not intended to be a |
| "current affairs" study, however; nor is it aimed at a popular audience. |
| _The Privacy Papers_ will be a valuable reference sourcebook for anyone |
| involved with recent government attempts to control the technology |
| necessary for privacy -- for historians, activists, journalists, |
| lobbyists, researchers, and maybe even politicians. |
|
|
| -- |
|
|
| %T The Electronic Privacy Papers |
| %S Documents on the Battle for Privacy in the Age of Surveillance |
| %A Bruce Schneier |
| %A David Banisar |
| %I John Wiley |
| %C New York |
| %D 1997 |
| %O hardcover, bibliography, index |
| %G ISBN 0-471-12297-1 |
| %P xvi,747pp |
| %K crime, politics, computing |
|
|
|
|
| 1x3>------------------------------------------------------------------------- |
|
|
| Book Title: "Computer Security and Privacy: An Information Sourcebook: |
| Topics and Issues for the 21st Century" |
|
|
|
|
| by Mark W. Greenia |
| List: $29.95 |
| Publisher: Lexikon Services |
| Win/Disk Edition |
| Binding: Software |
| Expected publication date: 1998 |
| ISBN: 0944601154 |
|
|
|
|
| [PWN: I haven't seen this one in stores, and no further information or |
| reviews have been found.] |
|
|
| 3x1>------------------------------------------------------------------------- |
|
|
| CDT POLICY POST Volume 3, Number 12 August 11, 1997 |
|
|
| (1) CIVIL LIBERTIES GROUPS ASK FCC TO BLOCK FBI ELECTRONIC SURVEILLANCE |
| PROPOSAL |
|
|
| The Center for Democracy and Technology and the Electronic Frontier |
| Foundation today filed a petition with the Federal Communications |
| Commission to block the FBI from using the 1994 "Digital Telephony" law to |
| expand government surveillance powers. |
|
|
| The law, officially known as the "Communications Assistance for Law |
| Enforcement Act" (CALEA), was intended to preserve law enforcement |
| wiretapping ability in the face of changes in communications technologies. |
| In their filing, CDT and EFF argue that the FBI has tried to use CALEA to |
| expand its surveillance capabilities by forcing telephone companies to |
| install intrusive and expensive surveillance features that threaten privacy |
| and violate the scope of the law. |
|
|
| 3x2>------------------------------------------------------------------------- |
|
|
| Anti-Spam Bills in Congress |
|
|
| Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997 |
|
|
| Unsolicited e-mail advertisement, or "spam," has few fans on the |
| net. Court battles have been waged between service providers, such |
| as AOL and Compuserve, and spam advertisers, including Cyber |
| Promotions, over whether the thousands of messages sent to user |
| e-mails can be blocked. Congress and several state legislatures |
| have also stepped into the debate and have introduced some bills |
| fraught with First Amendment problems because they ban commercial |
| speech altogether or are content specific. |
|
|
| [Laws against spam.. oh neat. So, how do they plan on enforcing it?] |
|
|
| 3x3>------------------------------------------------------------------------- |
|
|
| JUSTICE DEPARTMENT CHARGES MICROSOFT WITH VIOLATING 1995 COURT ORDER |
|
|
| Asks Court to Impose $1 Million a Day Fine if Violation Continues |
|
|
| WASHINGTON, D.C. -- The Department of Justice asked a |
| federal court today to hold Microsoft Corporation--the world's |
| dominant personal computer software company--in civil contempt |
| for violating terms of a 1995 court order barring it from |
| imposing anticompetitive licensing terms on manufacturers of |
| personal computers. |
|
|
| [PWN: Hey Bill.. nah nah nah, thptptptptptptp, nanny nanny boo boo] |
|
|
| 3x4>------------------------------------------------------------------------- |
|
|
| Small Minds Think Alike |
| Source - : fight-censorship@vorlon.mit.edu |
|
|
| CyberWire Dispatch Bulletin |
|
|
| Washington --In this boneyard of Washington, DC it doesn't take |
| long for big dawgs and small alike to bark. A couple of small |
| ones yipped it up today. |
|
|
| Rep. Marge (no relation to Homer) Roukema, R-N.J. and Sen. Lauch |
| (??) Faircloth, R-N.C. introduced a bill to amend the |
| Communications Act that would ban convicted sex offenders from |
| using the Internet. |
|
|
| [PWN: Oh yeah.. that will be easy to enforce.] |
|
|
| 3x5>------------------------------------------------------------------------- |
|
|
| Cyber Promotions tossed offline |
|
|
| Cyber Promotions tossed offline |
| By Janet Kornblum |
| September 19, 1997, 1:25 p.m. PT |
|
|
| Cyber Promotions, antispammers' enemy No. 1 on the Net, has once again |
| been dumped by its access provider. |
|
|
| Backbone provider AGIS cut off Cyber Promotions Wednesday, and the |
| company has been scrambling for another ISP since. |
|
|
| [PWN: Hey Samford.. ha ha ha, nanny nanny, thptptptptp.] |
|
|
| "Ping-flood attacks observed originating from the West Coast into AGIS |
| and directed to the Washington and Philadelphia routers severely |
| degraded AGIS network performance to [an] unacceptable level...AGIS |
| had no alternative but to shut off services to Cyber Promotions," |
| reads a statement that Wallace put on his page. He alleged that the |
| statement came from an AGIS engineer. |
|
|
| [PWN: If a ping flood took them down this time...] |
|
|
|
|
|
|
| ----[ EOF |
|
|
|
|