Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 04 Issue 09

  



Computer underground Digest Fri, Feb 28, 1992 Volume 4 : Issue 09

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Associate Editor: Etaion Shrdlu

CONTENTS, #4.09 (Feb 28, 1992)
File 1: Message related to craig's problem (RE to CuD 4.08)
File 2: Legal Costs, Attys, and why $60 doesn't go far
File 3: Response to Craig Neidorf's Legal Expenditures
File 4: TV station and BBS registration
File 5: Review of INTERTEK MAGAZINE (Newsbytes Reprint)
File 6: Bury Usenet (Intertek Reprint)
File 7: Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)
File 8: A Comment on Amateur Action BBS
File 9: 'Michelangelo' Scare (Washington Post abstract)

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.
NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
FURTHER NOTICE.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Mon, 17 Feb 92 22:25:07 -0500
From: an288@CLEVELAND.FREENET.EDU(Mark Hittinger)
Subject: File 1--Message related to craig's problem (RE to CuD 4.08)

A poster in CuD 4.08 wrote:

>Craig needs our help in defraying the costs of a battle from which we
>all benefited. Even $5 would help. Just a 29 cent stamp and a $5
>check.

Mine is on its way. Thanks to the CuD guys for making us aware of
this. Those of us that can (and would) help can't unless we are made
aware of the need. Many of us are older and draw good incomes from
the cyberchaos. Lets not call it cyberspace yet!

Debates over issues and principles are fine but they need to occur
after the practical matters of life are dealt with. In our less than
ideal world we still need to get the rent paid (and even the lawyers'
fees *DAMN*). I have been somewhat disillusioned by the activities of
various new frontier organizations. Lets fix the practical matters
first in real time and then debate the principles later in virtual
time.

> ... Ironically, if the
>principle of honor were not so important, Craig arguably would have
>been better off to plead guilty rather than defend his honor. It would
>have saved him time, money, and bother. When the costs of pleading
>guilty to crimes of which one is innocent becomes the best way of
>avoiding devastating consequences, we cannot agree that the system
>"works."

Lets not forget than Len Rose caved in and took the plea bargain
route. We can argue about what he did or didn't do, but he still
needs to get his rent paid, feed his kids, and rebuild his life when
he gets out (soon).

I'm sure that there will be similar needs in the upcoming cases that
have been discussed in recent CuD articles. I wish that it was as
easy to send a $5 check as it is to argue - but I know that it is not.

------------------------------

Date: Thu, 20 Feb 1992 11:25:31 -0500
From: Craig Neidorf <knight@EFF.ORG>
Subject: File 2--Legal Costs, Attys, and why $60 doesn't go far

The readers should remember that my case was one of first instance.
In most court cases, the law or precedent is much more clear and
understood. Usually cases that go to court deal a lot with
determining the facts instead of determining the law.

Katten, Muchin, & Zavis bills Sheldon Zenner's time at $210/hour. In
addition to Zenner, they had Ken Kliebard (an associate) and two law
students working on my case over a 7 month period.

There were multiple court appearances including two arraignments and
the submission of all sorts of motions (for discovery, for release of
beneficial evidence, for all sorts of things).

There were all sorts of meetings -- with the government and with our
witnesses. There were flights to Atlanta to have meetings with Robert
Riggs and to St. Louis to meet with me (for a while I was not allowed
to leave the State other than for court appearances). There was a lot
of time spent in finding experts, interviewing them, and then learning
from what they had to say.

There was a vast abundance of evidence that had to be read, cataloged,
and understood (stacks of email printouts, Phrack issues, other
similar publications, and magazines about the telephone industry). My
attorneys had to learn about computers and Unix systems).

The fact that they first indicted me on one set of charges and then
turned around and re-indicted me on another set of charges added a lot
more time and money to my expenses. Every item of evidence that the
government photocopied for us cost tons of money (since they bill
photocopies at a very high rate (like $.15 per copy) and there were
thousands of pages.

The main problem was that the government had brought me up on charges
that had never been used before in a computer case like this one.
That meant there had to be a lot more research than perhaps would have
been ordinarily needed.

Finally there was the actual five full days of trial. This does not
imply the hours of 9 to 5, it was more like 5 am to 11pm. Hours like
these were not uncommon for Zenner during the entire 7 month period.

The bottom line here is that I am a bit outraged by the questions
posed by Mr. Moore of where the money was spent. I happen to know
that certain steps were taken to keep my bill a lot lower than it
might have been. I have learned for example that by referring a lot
of the work to the summer associates, KMZ was able to bill those hours
at a considerably lower rate. Furthermore, experts like John Nagle
and Dorothy Denning refused to accept payment for their testimony.
Ordinarially, expert witnesses like them would receive several
thousand dollars each + expenses in return for their testimony.

Don't you think my family and I scrutinized the bill ourselves to find
some errors that would bring the total down?

Finally, I feel that I received the absolute finest representation and
counseling from Sheldon Zenner. The legal expenses were checked and
re-checked by us and by him. I consider him a true friend and I trust
him without any hesitation or doubts whatsoever.

I'd rather checks be sent to Zenner because:

A. I don't want the money being sent to my name because I don't want a
stream of deposits in my bank accounts to irk IRS or anybody else.

B. I'd rather not net-broadcast my home address.

C. I tend to move around a lot since I live in rented housing and the
US Post Office is not the greatest at forwarding mail. The KMZ
address is the most reliable.

Mr. Moore writes that "The high price of legal help is arguably as
much of the problem as the reckless disregard for law and due process
demonstrated by the government." I don't disagree, but don't make me
responsible for the flaws in the system. Letters like yours victimize
me all over again.

Craig Neidorf


ps- The net total of donations based on my most recent public notice
stands at $60. $10 from one person, $20 from one person, and $30 from
one person. All of whom were people I generally knew before and were
not really among the 26,000 readers of CUD. People talk a good game,
but the money is not where their mouths are. The grand total of
donations received overall since day one (and excluding Kapor)
doesn't even hit the $1,000 mark.

------------------------------

Date: Mon, 24 Feb 1992 16:47:38 -0500
From: Mike Godwin <mnemonic@EFF.ORG>
Subject: File 3--Response to Craig Neidorf's Legal Expenditures

In article <1992Feb21.083926.16788@chinacat.unicom.com> Keith Moore
writes:

>I have read repeated pleas on various networked discussion groups for
>readers to help defray Craig's legal expenses. While I sympathize
>with his position and am in fact willing to help, I'm sure many of the
>readers would like to know what all of that money was spent for. I
>want to help Craig, but I don't like the idea of giving over money to
>lawyers. The high price of legal help is arguably as much of the
>problem as the reckless disregard for law and due process demonstrated
>by the government.

Most of the cost of Craig's defense is attributed to preparation for
trial. This means researching the law relevant to the charges,
understanding the evidence, and finding out what the government's
witnesses are likely to say as well as preparing your own witnesses.

I cannot dispute that legal help is costly. But it seems to me that a
failure to help Craig because legal help is costly promotes any
lowering of the cost of legal help. It does, however, increase the
personal burden on Craig.

It is a fact that when one sets out to fight the federal government in
court, legal expenses tend to skyrocket. But this is not Craig's
fault.

>Also, why are we asked to send money directly to the law firm that
>defended Craig, and not to Craig himself?

Because that's where the money is owed. If the money were solicited
for Craig himself, countless net.critics would be calling it a scam on
Craig's part, and they'd be demanding guarantees that the money go to
his legal bills. One of the things that becomes apparent when you
spend enough time on the Net is that some people will be critical of
you no matter what you do.

>Perhaps the computer underground, realizing how
>much we are at the mercy of both lawyers and the government, would
>find it in its interest to act to curtail their powers.

It is certainly in everybody's interest to lower the cost of legal
representation. It is unclear to me how failing to help Craig Neidorf
does this. Do you really suppose that defense lawyers will watch Craig
go bankrupt and conclude "Ah, well, guess we set our fees too high"?
Isn't it asking a lot of Craig that he go bankrupt in order to
articulate your criticism of the legal system?

I believe there are plenty of reasons to be critical of the system,
but it seems heartless to me to ask Craig to bear the burden while we
sit back and pontificate about it. That's why I contributed money to
Craig's legal expenses, and I hope you do too.

------------------------------

Date: Thu, 30 Jan 92 3:32:05 CST
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
Subject: File 4--TV station and BBS registration

Here's something that you might find interesting... from
misc.legal.computing. I've enclosed (most of) my reply to the
article's author.

Bob

[ start ]

A local television reporter did a report on the 10pm news about
teenagers getting access to adult .gif files on computer bulletin
boards.

He explains how many sites with adult gifs require proof-of-age (e.g.,
copies of driver's license) for registration, but some merely print a
"you must be over 21 to register" message before on-line registration.

No problem, except he then claims you can lie and still become
registered -- which he proceeds to do on camera.

Isn't this a violation of Federal law regarding computer access? The
sysop of the BBS clearly requested identifying information, as is his
right before granting system access, which the reporter deliberately
refused to provide yet accepted system access?

This TV station is getting a bad reputation for overzealous reporters--
a few years ago one star reporter actually paid for pit-bull fights
that she subsequently reported on. She was ultimately fired from the
station and charged with a felony.

I don't expect things to go this far in this situation -- but neither
do I want to sit by as the TV station implies it's okay to lie during
on-line registration for BBSes.

Any comments or suggestions?

BTW, the reporter was Jim Benemann of KCNC in Denver. I can post the
Station Manager's name if other people wish to contact the station.

Bear Giles
bear@fsl.noaa.gov

[ and my reply: ]

>To: bear@spike.ucar.edu
>Subject: Re: Stupid TV reporter tricks

In article <15091@ncar.ucar.edu> you write:

>Any comments or suggestions?

Work with the station on producing an editorial. Ask them what
criteria they use to authenticate news sources, and what their policy
is on providing air time to an individual who is immediately or
eventually proven to have faked their identity. Mention that access
rules for on-line systems, large or small, are often more strict than
those legally required of adult magazines: A signed statement that
you're over a certain age. The system's owner was complying with a
tradition of law that applies to similar adult-oriented media. The
question of whether the reporter's misrepresentation of their
identity, which treads close to the phone company's definition of
fraud, was justified is one that the station's news management is
invited to discuss publicly. After all, they were presented with a
policy for authentication that matches legal proof employed by related
media, and they bypassed it. If the station's position is that people
must be honest for a system of age-oriented access restriction to
work, they're right. If the station insists on providing a clear
example of how to defeat the owner's intent to comply with the law, it
is hardly the system owner that is in the wrong. Take the editorial
to competing stations if you need to. Of course, this is a lot of
swimming upstream for people to do, and there may be a better way that
I haven't thought of... In any case, I'm interested in hearing what,
if anything, comes of this.

------------------------------

From: John F. McMullen (mcmullen@well.sf.ca.us)
Date: Mon, 17 Feb 1992 10:39:11 PST
Subject: File 5--Review of INTERTEK MAGAZINE (Newsbytes Reprint)

REVIEW OF: Intertek

From: Intertek, 325 Elwood Beach #3, Goleta, CA 93117; Telephone:
805 685-6557; Online - steve@cs.ucsb.edu

Price: Current issue (Volume 3.3) ---- $4.00; Back issues (Volumes
3.1 & 3.2) - $5.00 ea; Subscription (4 issues) - $14,00

PUMA Rating 3.6 on a scale 1=lowest to 4=highest

Reviewed by Newsbytes by Barbara E. McMullen & John F. McMullen

Summary: Intertek is a semi-annual magazine that explores the social,
legal, ethical and technological issues confronting those in the on-line
community..

======

REVIEW

======

Intertek is a surprisingly professional semi-annual glossy magazine
dealing with issues relating to telecommunications, computer crime
and first amendment concerns. We say "surprisingly professional"
because the editor and publisher, Steve Steinberg, is still an
undergraduate at the University of California, Santa Barbara. The
current issue, Volume 3.3 - Winter 1992, is, in our judgement, of a
quality that one would expect to find in a more commercial
publication.

While the publication has developed a following among those lucky
enough to know of its existence (generally those who have already
been actively interested in the issues dealt with by Intertek), it
does not have the widespread newsstand distribution that it deserves
--although Steinberg informed us that it is distributed in Europe and
should be appearing domestically in Tower Books locations. The only
way, however, at this time to be sure of obtaining a copy is to
subscribe ($14 for 2 years - 4 issues).

After reading every available Intertek (Volumes 3.1, 3.2, & 3.3), we
think that Steinberg has hit on a extremely good pattern in his
production of the publication:
- each issue is narrowly focused on a specific topic (3.1 - "The Hacker
Issue"; 3.2 - "The Ethics Issue"; 3.3 - "Virtual Communities").
- Steinberg has attracted a well-known group of experts who also have
a fine command of language and style top either write specifically
for Intertek or to allow republication of previously material that is
germane to the topic under discussion. The three issues mentioned
include pieces by (or interviews with) John Perry Barlow, Bruce
Sterling, Brenda Laurel, Mitch Kapor, Peter Denning, Katie Hafner,
John Quarterman, Gail Thackeray, John Markoff, and Gordon Meyer. Each
of these writers bring a perspective to the topic that is both well
thought out and well presented.
- Steinberg himself writes well. He is also skillful enough as an
editor to put together pieces on provocative topics with responses
from knowledgeable individuals on the same topic -- a superior
method in our judgement than publishing the piece in one issue and
the responses in subsequent one, particular when speaking of a
semi-annual publication. An example of this technique is found in
the current issue where Steinberg has written a piece entitled "Bury
Usenet" and packaged it with responses from Mitch Kapor, Electronic
Frontier Foundation co-founder; John S. Quarterman, author of The
Matrix (Digital Press) and publisher of the Matrix News; Peter J.
Denning, computer science chair at George Mason University and
former president of the ACM; and Bruce Sterling, journalist author.

Other articles in the Winter 1992 issue include "Electropolis:
Communication and Community on Internet Relay Chat" by Elizabeth
M. Reid; "Social Organization of the Computer Underground" by
Gordon R. Meyer; "Real World Kerberos: Authentication and Privacy
on a Physically Insecure Network"; and "Mudding: Social Phenomena
in Text-Based Virtual Realities" by Pavel Curtis.
There is also a 3 page section entitled "Newsflash" that does, despite
the difficulties of providing real news in a semi-annual publication,
contain some interesting items that we had not seen elsewhere.

The centerfold of the publication presents a snapshot of both stock
prices in the technology industries and prices of hardware, new and
used. Although the information is dated (almost 2 months old when
we got it), it is presented nicely with graphs and charts and is
accompanied by a short piece by New York Times technology writer
John Markoff. While this two-page section presents nothing that is
really new, Markoff's piece is well-done, the display is attractive and
there are certainly worse things that can be put in a centerfold.

If you have any interest in acquiring a greater understanding of the
issues surrounding global telecommunications (and, in our
judgement, everyone should have such interest - particularly
Newsbytes readers!), Intertek is worth your investment. It is lively,
informative, and well-written. In short, buy the magazine!
============

PUMA RATINGS

============

PERFORMANCE/PRICE: 4. Intertek sets out to fill a niche not found in
other publications relating to on-line life. Not as folksy as Boardwatch or
as "techie" as 2600, Intertek deals with issues normally only discussed at
conferences like CFP-1 or on an on-line service such as the WELL. In our
judgement, it fulfills its mission well. At $14, for people with these
interests, it's a bargain.

USEFULNESS: 4. In an informal survey that we did with a number of
readers, the only complaints that we heard were that it should have more
pages or come out more often. That seems to be heady praise from a
demanding group.

MANUAL: N/A

AVAILABILITY: 3. Tough to get if you don't subscribe. You won't find
Intertek in your local B. Dalton or Walden sitting next to Computer
Shopper or Byte. Although the problem is easy to solve by subscribing,
many won't because they haven't actually seen a copy .. and they'll be
missing out on a good thing.

(Barbara E. McMullen & John F. McMullen/19920218)

------------------------------

Date: Sat, 15 Feb 92 17:33:29 PST
From: G.Steinberg <steve@CS.UCSB.EDU>
Subject: File 6--Bury Usenet (Intertek Reprint)

(Reprinted from _Intertek_, Winter (Vol 3.3), Winter, 1992. Pp 1-3.)

Bury USENET by Steve Steinberg

The concept of USENET, a global electronic bulletin board on which any
person can post messages on topics ranging from nanotechnology to
weightlifting and reach other interested people, sounds terrific. It
seems like a step towards the magical future which we are all brought
up to believe is right around the corner; the future of Hugo Gernsback
in which the entire bustling globe is united in productivity and
prosperity. But, just as genetic engineering and nuclear power have
turned out to cause more problems than they solve, we now see that
USENET improves productivity and our quality of life about as much as
TV does. True, there are thousands of people who enjoy reading
USENET, just as there are millions who enjoy watching TV; however this
is not proof of the quaility of the medium but instead is indicative
of the lack of alternatives. It is therefore important to understand
why USENET fails as a medium so that we can avoid further blunders in
this direction.

The three general uses that a medium such as USENET should facilitate
are: directed information seeking, browsing, and collaboration.
Directed information seeking is when someone is trying to find out a
specific piece of information. Browsing is an exploratory
information-seeking strategy that is used when the problem is
ill-defined or when the user simply wants to become more familiar with
an area of knowledge. Lastly, collaboration, for the purposes of this
paper, refers to a group of people sharing what they know and posing
questions to each other about a particular subject so as to increase
the knowledge and ability of everyone involved.

USENET fails at all of these uses, and we can lump the reasons for the
failures into three main categories: USENET's asynchronous nature, its
small bandwidth, and the large amount of noise.

By asynchronous nature I simply mean that communications on USENET is
not in real time as it is with a telephone but instead is more like
conventional mail. Being asynchronous is not a problem with mail
because we communicate with relatively few people, so there are only a
small number of letters we need to remember and keep track of.
However, when we read hundreds of different messages by different
people on different subjects, we quickly get lost and forget what the
status is of all the various topic threads. A technique people use on
USENET to minimize the drawbacks of asynchronous communications is to
begin each message with the relevant portion of the message to which
they are replying. This repetition helps to some degree however each
message will still only contain some subset of the previous messages
(depending on which earlier messages caught the current writer's
attention) and so does not give a complete picture of what has been
determined on a particular topic. The asynchronous nature of USENET
makes collaboration very difficult. A topic will often start with a
question and then receive several messages in reply, each of which in
turn will spawn several replies. The topic will then quickly
degenerate into discussions of trivial points and multiple digressions
leaving the poster of the original question, and other readers, more
confused than helped. It is the sheer size of USENET, where a topic
thread can last for thousands of messages and many months, that makes
this problem so intractable.

In these post-MTV proto-multimedia days the idea of people writing to
each other seems almost quaint. Indeed one often hears professional
writers lament that the death of writing has occurred now that the
telephone has supplanted the letter. Hence, it might seem at first
blush that USENET is a good thing and will cause the rebirth of the
written letter. Unfortunately, as someone who has waded through tens
of thousands of USENET messages, I can say with some certitude that
this rebirth has not occurred, nor does it appear likely. To write
clearly and concisely requires skill as well as time. Because most
people lack one or the other of these requirements, messages posted to
USENET are usually confusingly worded, difficult to read, and prone to
misinterpretation. This is what I was referring to when I said in the
beginning that one of the fundamental problems with USENET is its
small bandwidth. When we express our feelings on a subject or explain
a detailed technical matter, we usually use many cues and tools in
order to make ourselves understood. These include tone of voice, body
language, and pictures or diagrams. When we try instead to compress
our thoughts into 80-column ASCII, we leave behind many of the
nuances. This makes any use of USENET--whether it be searching or
collaborating--difficult since we often do not understand what a
message is really trying to say.

One solution to the problem of small bandwidth that seems likely to
catch on in a big way soon (it already has to some degree) is to allow
graphics to be viewed over USENET. This would allow a user to include
a drawn or digitized picture inside the message he or she posts.
Multimedia messages seem like a good idea, and you can easily imagine
the good uses possible such as diagrams to clearly indicate how
something works. However, I have no doubts, based on how people have
used USENET so far, that the main results would be an outbreak of
pornography and a rash of garish signatures.

Reading USENET is like drinking from a firehose, you'll get very wet
but you probably will still be thirsty. The problem is that there are
thousands of messages posted each day, but only a few of these will be
of interest to any one reader. Searching through this haystack of
messages is a tedious and laborious task with no sure method of
success. Many people end up spending (some would say wasting) several
hours a day reading USENET in order to find the few items of interest
and importance to them. What further complicates the task of searching
for information, making it near impossible as well as unpleasant, is
the huge amount of noise -- lengthy messages which say nothing useful,
messages that are personal attacks on someone, and messages that are
plain wrong.

Anyone with access to a UNIX machine that has a USENET feed can post a
message on any subject, no matter how unqualified the author may be.
The result is usually chaotic and unenlightening. Even when the poster
is humble enough to prefix his or her message with "I'm no lawyer
/scientist /doctor but...", a clear signal that we may save time and
skip this message, we only continue on to ten more messages by other
unqualified people berating the first poster for inaccuracies. The
dichotomy which is being exposed here is between a medium which
informs and a medium for general discussion. If we think USENET should
be the former, then there is no place for messages by unqualified
people. If USENET should be for discussion, then indeed anyone should
be allowed to offer their opinion. Unfortunately USENET isn't very
good at this either due to the phenomena known as "flaming" in which
users attack other persons' views far more quickly and violently than
would occur with any other medium. Because users are safely hidden
behind their terminal, and can not see who they are talking to,
standard social customs concerning conversation do not seem to apply.
The result is that even the most innocent comment can provoke typed
vitriol from someone who feels offended. Flaming is undoubtedly the
most virulent form of noise, and there is nothing more unpleasant than
having to wade through messages of infantile bickering. So, although
USENET tries to be both a medium for informing as well as discussion,
it succeeds at neither.

The concept of a moderated newsgroup is a simple solution to the noise
problem, but it leads to a problem of a different kind. In a
moderated newsgroup a user sends messages to the person in charge of
the newsgroup, and this moderator then picks only the messages he or
she feels are relevant. Sometimes this works well as in the often
cited example of Peter Neumann's RISK digest. However, there is the
insidious danger of moderator bias. The specter of this problem has
risen in conjunction with the TELECOM digest which is moderated by the
rather opinionated Patrick Townsend. Whether Townsend actually censors
messages he disagrees with is not important. The perception--and the
possibility--are there.

To summarize, USENET's asynchronous nature makes collaboration
difficult, its small bandwidth makes messages difficult to understand
and easy to misinterpret, and the high amount of noise makes searching
for interesting messages time consuming and unpleasant.

I wish I could end by presenting five easy steps to improve USENET.
Unfortunately, the only ones which seem feasible, such as news readers
which use artificial intelligence techniques to filter out noise, are
merely stopgap measures which do not address all of the fundamental
problems. Before we can fix USENET we must first understand how we
learn and how groups work together. Until this has been determined our
tools are as likely to hinder our productivity as they are to help us.
As has been amply demonstrated by television over the last fifty
years, some mediums, no matter how much of a good idea they may seem,
just don't work. I hope we quickly learn to see USENET as a noble but
failed experiment so that we can research other directions in order to
find new mediums that really do enhance our communications and our
quality of life.

------------------------------

Date: Sat, 15 Feb 92 17:33:29 PST
From: Mitch Kapor <mkapor@well.sf.ca.us>
Subject: File 7--Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)

Somewhere between the intimacy of island universe conferencing systems
like the WELL (an electronic bulletin board in California) and the
anarchic ocean of USENET lies the future of computer conferencing.
USENET's problems are legion and unlikely to go away. What may succeed
are new generations of software and conferencing systems built upon
the lessons and experience, both positive and negative, of a
multiplicity of existing systems.

The WELL works much better than USENET as a source of informed
discourse for several reasons:

o It's hosted on a single system, avoiding the lag of distributed
systems.
o People pay to be there. This weeds out the single largest source
of noise.
o Conferences are all hosted, which acts as a loose control
mechanism.
o The management of the system realizes it's running a digital
gathering place.

The WELL has problems too. It's insular, its user interface is nothing
to be proud of and its telecommunications access cost is excessive if
you don't live in the Bay Area.

If these problems were addressed, there's no reason in principle why
the example of the WELL couldn't be more widely applied. It wouldn't
be USENET, but maybe that's OK.

I envision a system which is on the Internet and thus reachable from
anywhere on the Internet, a system which has a graphical user
interface (in addition to whatever the hardcore users want), whose
conferences are hosted, and which charges a nominal--say a dollar an
hour--usage charge. This software may have many separate
instantiations, in different locations, serving different needs and
interests.

In fact, this is a brief sketch of a design idea for a development
project we hope to begin within the Electronic Frontier Foundation
(EFF) in 1992.

Mitch Kapor
EFF co-founder

------------------------------

Date: Mon, 24 Feb 1992 11:31:22 PST
From: Ann O'Nonymous <baybridg@vesuvios.edu>
Subject: File 8--A Comment on Amateur Action BBS

Bob Thomas has been having trouble with his kids. They are
experiencing emotional and behavior problems they've never had before.
The police officers they had learned in school to trust came to their
house one morning and unceremoniously took away their computer. The
police were rude. They offered no explanation for why they took the
kids' games and schoolwork. The half-dozen plain-clothes cops were not
related to Officer Friendly, and the children were confused,
frightened, and hurt. These police weren't THEIR friends!

So was Bob Thomas. He ran AMATEUR ACTION BBS in San Jose, Calif.,
which specialized in adult gif files. Local police (no federal agents)
burst in at 7:30 a.m. on Monday, January 20 with a search warrant
alleging grand theft, trafficking in obscene material, and child
pornography. Bob doesn't recall if the officers had their guns drawn.
The affidavit supporting the warrant is sealed, so the justification
for the raid may never be known. Bob was stunned by the accusations,
and he and his family watched in horror as the police carted away his
486, three 386s, videos, and all the tools he needed to run his two
electronics businesses and BBS business. The police also took all
hardcopy business records and other materials.

The raid resulted in seizure of over $30,000 worth of equipment. Bob
estimated that he also lost over $15,000 in lost business revenue and
legal fees. He also missed a major trade show. His children lost
their innocence. Society lost another round in the battle to maintain
a semblance of civil liberties in cyberspace.

Bob's attorney communicated with EFF and the officers were made aware
of federal and other laws relating to seizure. No charges have been
filed, and there is no indication that any will be. When I spoke with
Bob on February 24, he was expecting the return of most, hopefully
all, of the equipment by that evening, or within a day or two. He has
no explanation for why the police raided him, but suspected it might
be connected to the problems of America Online, which faced a similar
investigation.

Amateur Action (408-263-3393) specialized in adult gif files (over
4,600) using amateur rather than commercial models. Bob also used it
to distribute adult videos. There were no action or other files. It
was simply an adult BBS with a modest message base. Bob has
established a reputation for aggressively attempting to keep children
off his adult BBS, and we have neither heard nor seen any evidence
that his board contained child pornography. The different levels of
access cost from $29 to $69 a year.

Amateur Action is back up, running Wildcat. The $69 annual rate will
earn you a meg-a-day download privilege with no upload obligation.
A Visa/Mastercard sub gives immediate access.

Unless evidence appears to the contrary, this is another instance of
police mishandling a seizure, confiscating first and asking questions
later, and not being quite sure of what they're doing. What do Steve
Jackson, Bob Thomas, and deja vous have in common?

------------------------------

Date: Tue, 18 Feb 92 15:36:33 EST
From: "garbled header" <eaten.by.our@program>
Subject: File 9--'Michelangelo' Scare (Washington Post abstract)

"'Michelangelo' Scare Stirs Fears About Computer Viruses"
Author: John Burgess
Source: Washington Post, Feb 17, 1992, p. A1

A new and unusually destructive type of computer "virus" -- a
software program that enters a computer surreptitiously and destroys
data there en masse -- has reignited concern over these electronic
saboteurs.

Security experts have dubbed the virus "Michelangelo," because after
entering a computer it lies dormant until March 6, the Italian
Renaissance artist's birthday. Then it springs to life and wipes out
data stored on the computer's memory disk.

In November, a copy of Michelangelo turned up at the Gaithersburg
offices of the National Institute of Standards and Technology, hiding
on the data disk of a computer that had been returned after being on
loan to another federal agency.

Using special software, institute technicians found the virus and
removed it after receiving a tip from the other agency. That agency
had found the virus on its computers and warned the institute to
make sure its computers hadn't been infected too.

Michelangelo got national attention last month after Leading Edge
Products Inc., a manufacturer of personal computers compatible with
those of International Business Machines Corp., confirmed that it had
shipped about 500 machines that contained the virus. The manufacturer
sent customers special software designed to neutralize it.

Because the triggering date lies in the future, no one is known to
have lost data due to the virus, which was created by an unknown
programmer and has spread from computer to computer through the
exchange of infected floppy disks.

But security experts, using special software that scans computer
disks to detect viruses, have been finding copies of Michelangelo
since last summer and removing them before they activate.

It remains unclear whether large numbers of computers contain
undetected copies of the virus, though estimates of millions of
machines have been published in the news media. Michelangelo affects
only IBM-compatible personal computers, but there are about 60
million of these in existence.

Past scares about viruses often have proven to be overblown. But due
to Michelangelo's unusually destructive nature, as well as the
potential presence of other viruses, some computer experts are
suggesting that personal computer users take no chances over getting
caught by a virus.

"When it hits, it's dramatic," said Lance Hoffman, a professor of
computer science at George Washington University.

Computer users can protect themselves by making additional electronic
copies of information they cannot afford to lose, by reducing the
exchange of floppy disks and the transmission of software over phone
lines, and by obtaining special software that detects viruses.

Viruses are a surprise byproduct of the computer age. Complex sets
of computer instructions, they are usually written by anonymous
programmers as pranks, or in the case of Michelangelo, in a deliberate
effort to destroy the information of people the programmer has never
met.

Fighting the virus writers is a coalition of software companies,
academics, researchers and users of personal computers. The two play
a constant cat-and-mouse game -- virus writers sometimes send their
creations to the experts as a challenge.

If an infected floppy disk is put into a computer, the virus orders
the machine to copy it onto any other disk that the computer
contains, generally without the operator knowing that this is taking
place. Or a virus may enter a computer when its operator receives
infected software programs from a computer "bulletin board" reached
by phone.

Many viruses are considered benign, doing little more than flashing
whimsical messages on the screen or playing a tune. But others, like
Michelangelo, are engineered to seek out stored data and destroy it,
sometimes on a specific date.

That can be devastating. Companies might lose all of their account
records, for instance, or an author using a home computer might lose
the entire manuscript of a novel.

To dissect Michelangelo and find out how it works, security experts
have deliberately introduced the virus into test computers and
advanced their internal clocks to March 6 to trigger the virus.

Michelangelo-infected machines that are not functioning on March 6
will not activate the virus, according to experts. By the same
token, the virus can be kept dormant by shifting the clock on the
machine so that it never reads March 6.

Computer experts agree that getting hit by a virus -- more than
1,000 types have been identified over the years -- can be devastating
as society progressively puts more and more reliance on computers.
But there is continuing debate as to how prevalent the programs really
are.

"I'm finding virus catastrophes everywhere," said Martin Tibor, a
data recovery consultant in San Rafael, Calif., whose repeated calls
to the media after the Leading Edge incident helped publicize
Michelangelo. "These things are replicating like crazy."

David Stang, director of research at the National Computer Security
Association, offers a more conservative assessment. While stressing
the danger of viruses, he puts the probability of a virus residing in
a given computer at a large company at about 1 in 1,000.
Michelangelo constitutes a tiny fraction of those viruses, he said.

The National Institute of Standards and Technology has 5,000 personal
computers and has detected about one to three viruses a month since
last summer.

In contrast, Total Control Inc., an Alexandria computer security
firm, said that about 70 percent of the 300 personal computers at one
unnamed federal agency have been found to have Michelangelo.

San Jose research firm Dataquest Inc. surveyed 600 large U.S.
companies late last year and found that 63 percent had found a virus
on at least one company computer. However, it noted that these
companies often operated hundreds of computers.

Antiviral software has created a thriving new niche for the personal
computer software industry. Such products can be purchased in
software stores or obtained for free or at a nominal cost through
on-line computer networks.

Antiviral software is not foolproof, however. "You can't write a
generic program that detects every virus, " said Hoffman, noting that
new strains are always appearing.

Some computer users suggest that the antiviral software companies
want to stoke fear to build a market for their products.

Consultant Tibor conceded that the calls he made to the media about
Michelangelo were in part motivated by hopes of bringing business his
way -- it in fact brought in only one client, he said. But his main
motivation, Tibor said, was to get the word out about a serious
computer danger.

"I see the victims of viruses all the time," he said. He calls viruses
"the digital equivalent of germ warfare."%

------------------------------


------------------------------

End of Computer Underground Digest #4.09
************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT