Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 08

  



Computer underground Digest Thu Jan 28, 1993 Volume 5 : Issue 08
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Editor: Etaion Shrdlu, Junoir

CONTENTS, #5.08 (Jan 28, 1993)
File 1--Response to "Resistance at Shopping Mall" (CuD 5.07)
File 2--Offworld BBS Raided (StLPD
File 3--Colonel Guilty of Sending Computer Porn
File 4--ISPTS Organizing Information
File 5--New case for EFF, ACLU, and CPSR
File 6--Public Service for Cornell Hackers
File 7--CFP Special Issue on Security [Change in Due Date]
File 8--Talking with the Underground

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
466893; and using anonymous FTP on the Internet from ftp.eff.org
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
Back issues also may be obtained from the mail server at
mailserv@batpad.lgb.ca.us.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Wed, 27 Jan 93 16:59:26 EST
From: ims@beach.kalamazoo.mi.us
Subject: File 1--Response to "Resistance at Shopping Mall" (CuD 5.07)

Overall, this was a well-written and accurate article. As Ron stated,
his article gives suggestions on how to deal with private individuals;
my stance will be on how to deal with gov't agents. I promise to keep
the quoting to a minimum.

>You may be able to fight city hall and win, but fighting with people
>in uniforms (even on a verbal level) is almost always a disaster.

This is 100% true. Gov't cannot break the law, by definition, for in
Brookfield Co. v Stuart, 234 F. Supp. 94, it was recognized that
"an...officer who acts in violation of the Constitution ceases to
represent the government." However, individual representatives of
gov't can and do break the laws pertaining to them, which is nothing
less than treason, being a violation of their oath of office.
Remember, though, as Mr. Carolina has stated, that this applies to
gov't, and not to anyone else. If at all possible, you should always
avoid confrontations with officers low on the totem pole.

>...guards, cops, and other "uniforms" get really nervous around
>organized groups. The more inexperienced the uniform, the more
>nervous they get. Second, when a uniformed person starts a
>confrontation with anyone, he or she is trained to assert control
>over the situation as quickly as possible. Any perceived challenge
>to his authority, including "mouthing off", will produce a harmonic
>disturbance at least double in intensity to the perceived
>non-acquiescence.

That's why we have the three rules for dealing with gov't officials:
Don't say anything, be quiet, and SHUT UP! There's plenty of time to
talk later in court, where it counts.

>Money awarded by a court is a poor substitute for missing teeth.

Perhaps, but it may be the only substitute possible in some cases.
Ideally, we would never be assaulted by gov't. But when we are, it is
our right and duty to extract compensation for damages.

>Third, recognize that a mall IS private property and the mall
>operators can throw you out for little or no reason.

To be totally accurate, they can throw you out for NO REASON AT ALL.
It may sound cruel and unfair, but without the concept of private
property, we'd still be scratching in the dirt just worrying about
bare survival. If you really want to have a secure meeting, order
takeout and meet at someone's house -- which is also private property,
and cannot be lawfully entered without a valid 4th Amendment warrant.

Now when a gov't agent violates your rights, he loses his immunity
from prosecution -- IF IT'S HANDLED CORRECTLY. Of course, you have to
know what those rights are, or you'll never know if they're being
violated.

When a gov't agent is stepping outside the bounds wherein he would be
protected by "sovereign immunity", and he is violating your right, you
ARE REQUIRED to tell him, to give him "constructive notice" of his
violation of law, just as he would inform YOU of some of your rights
if he were to arrest YOU. If you don't do that, the courts will not
entertain your lawsuit for damages later. You have to tell him what
rights he is violating, what laws he is breaking, what the penalties
are that he is risking, and what action is open to him so that he
doesn't break the law. If on giving him notice, he corrects his
error, then there is no need to take him to court over any damages.
We all are required to behave so as to minimize damages to ANYONE,
including ourselves.

>Fourth, mall cops are not gov't agents, and as such, their
>conduct is (mostly) not governed by the Constitution.

Their conduct is not governed AT ALL by the Constitution, since it only
applies to the gov't and its agents.

>If you are confronted by a group of threatening looking mall cops and
>they hassle you, ask if you are being ejected from the mall.

When dealing with gov't agents, NEVER ask, "Am I under arrest?".
Rather, ask, "Am I free to go?".

>If the mall cop tries to detain you, ask if you are under arrest.

See above. This is a preferable strategy no matter who you are dealing
with.

>If you are physically blocked from leaving (no scuffles please), OR if
>they have the guts to claim that you are under arrest, then YOU ask for
>the police on the grounds that you wish to file a criminal complaint
>for wrongful imprisonment. The strategy here is to escalate by
>demanding the presence of lawful authority.

Again, this is the preferable method of handling gov't officials as
well. The lower an officer is in the hierarchy, the more likely he is
to violate the laws which restrain him from rights violations, usually
because he is more likely to be ignorant of them. It's always a good
idea to politely request that he call for a superior officer, and not
bother trying to explain yourself until the superior arrives.

>if the real cops actually do show up, you are once again fully
>protected by the Constitution. For this reason, real cops tend to be
>a little more cautious in these encounters and can often defuse
>problems like this.

Even "real cops" are usually ignorant of the laws which govern their
conduct. You may be "protected by the Constitution", but that won't do
you any good if you're not willing to fight to the last to defend those
rights. You are the only one who can protect your rights, in the end.
See my comments below regarding lawyers.

>If the mall cops look like they might get physical, tell them that
>anything silly on their part will draw a complaint of criminal assault,
>and will force your father, the lawyer, to sue everyone in sight.

The minute you rely on a lawyer, you've pissed away your rights. You
lose your powers as a sovereign over government. You can't claim all
rights at all times. For example, a lawyer cannot claim your right to
remain silent:

"The right of a person under the 5th Amendment to refuse to incriminate
himself is purely a personal privilege of the witness. It was never
intended to permit him to plead the fact that some third person might
be incriminated by his tesimony, even though he were the agent of
such person." Hale v. Henkel, 201 U.S. 43.

Not only that, but if you allow anyone to "represent you", instead of
being "the belligerent claimant in person" (Hale v Henkel, i.s.c.), you
become a "ward of the court". Why? Because obviously, if someone else
has to defend your rights for you, you must be incompetent! Clients are
called "wards" of the court in regard to their relationship with their
attorneys. See a copy of "Regarding Lawyer Discipline & Other Rules",
as well as Canons 1 through 9.

Also, see Corpus Juris Secundum (CJS), Volume 7, Section 4, Attorney
& client: "The attorney's first duty is to the courts and the public,
NOT TO THE CLIENT, and wherever the duties to his client conflict with
those he owes as an officer of the court in the administration of
justice, THE FORMER MUST YIELD TO THE LATTER." (emphasis mine) I trust
this needs no further explanation.

Corpus Juris Secundum assumes courts will operate in a lawful manner. If
you make this assumption, you may learn, to your detriment, through
experience, that certain questions of law, including the question of
personal jurisdiction, may never be raised and addressed, especially if
you are represented by the bar. (Sometimes "licensed counsel" appears to
take on the characteristics of a fox guarding the hen house. Send me
e-mail if you would like more info regarding "licenses to practice
law".)

Lawyers will NEVER do the necessary things before arraignment to get a
case dismissed. They will guarantee that you are locked into a criminal
proceeding from the start by entering a "not-guilty" plea for you, and
will give the government all the time it needs to win the case by
waiving the speedy-trial time limits. With a lawyer as a friend, you
don't need any enemies!

>first make it clear that you protest the action, and then let them
>take it from you. The trick here is to make sure that you have not
>"consented" to the search -- however, you must give in to a claim of
>authority from a police officer.

An officer has no authority until he proves it. If you let this strange
person do whatever they want without having determined their lawful
authority and their true identity, you have "consented", no matter how
much you may verbally protest.

>(And no, you do not get to argue the Fourth Amendment search and
>seizure issue right there on the spot. Your lawyer will do that later
>at your criminal trial...

No lawyers, unless you want to lose.

>A really smart cop might say to the guard, "I will not make the search,
>but I won't stop you if you search." Stand your ground at this point.
>Tell the real cop that you REFUSE to allow the search unless the real
>cop orders the search to take place.

Excellent suggestion, but be sure to take the above precautions
regarding true identity and lawful authority before you think about
"consenting".

>The only words you should utter after being arrested are "I want to
>speak with a lawyer."

Change this to, "I demand counsel of my choice." The 6th Amendment
is your authority. If the court tries to force you to use a "licensed
lawyer" or a "public defender", it is not counsel of your choice.

>ROBERT A. CAROLINA
>Member, Illinois State Bar Association

Your advice is surprisingly good, for a member of the bar. :-) Not all
lawyers are ignorant and lawless, but the 99% that are give the other
1% a bad name. I'm glad to see we have a few of the good ones reading
CuD.

Finally, let me leave you with one of the most eloquent statements
ever by the Supreme Court:

"Decency, security and liberty alike demand that government officials
shall be subjected to the same rules of conduct that are commands to
the citizen. In a government of laws, existence of the government will
be imperiled if it fails to observe the law scrupulously. Our
government is the potent, the omnipresent teacher. For good or for ill,
it teaches the whole people by its example. If the government becomes a
lawbreaker, it breeds contempt for the law; it invites every man to
become a law unto himself; it invites anarchy. To declare that in the
administration of the criminal law the end justifies the means...would
bring terrible retribution...[and] against that pernicious doctrine,
this court should resolutely set its face."
Olmstead v U.S., 277 U.S. 348 (1928)
Justice Brandeis, dissenting

------------------------------

Date: 20 Jan 93 16:31:22 GMT
From: mc/G=Brad/S=Hicks/OU=0205925@MHS.ATTMAIL.COM
Subject: File 2--Offworld BBS Raided (StLPD

St. Louis Post-Dispatch
Tuesday, January 19, 1993
Pages 1A, 10A

COMPUTER OPERATOR DENIES PORN MENU
By Christine Bertelson
Of the Post-Dispatch Staff

The owner of a St. Louis computer bulletin board that was shut down
by the FBI last week denied Monday that he is responsible for the
pornographic images seen by some users.

On Friday night, the FBI confiscated more than $40,000 worth of
computer equipment at Offworld, a computer company owned and operated
by Joey Jay. Jay, 28, ran the business from his residence in the
basement of his father's house on Tecumseh Drive in Chesterfield.

Jay was not arrested, and no charges have been filed against him.
Jay said his father threw him out of the house after the raid.

"Everyone assumes we are some kiddie porn ring," Jay said. "We are
not. We are a nonprofit community service."

A spokesman for the FBI said that someone had reported that Offworld
had images available showing bestiality, as well as child pornography.
It is a federal offense to have child pornography, and any property
used to promote it is subject to being seized and forfeited to law
enforcement authorities, an FBI spokesman said.

"We get all kinds of files across the system, and one or two at most
showed up in terms of a private conversation," Jay said. "When I
found them, I deleted them immediately."

Offworld began operating in St. Louis last June, and is free to its
4,300 users. Jay said it cost him $1,800 a month to operate the
system, using money from family inheritance.

About 100 people showed up Monday morning in Chesterfield at a rally
in support of Offworld, Jay said. He said he was soliciting
contributions of computer hardware, or cash, to get his system up and
running again.

Computer bulletin board systems, or BBSs, as they are known, allow
users to chat electronically, and share information on a variety of
subjects. Offworld has bulletin boards that feature job listings,
book and movie reviews, restaurants and clubs, and discussion groups
for people with "diverse lifestyles."

Jay said that any time illegal material appears on a bulletin board
--whether it is child pornography, offers of sex for sale, or drugs
--it is purged and the people who posted such messages are kicked off
the system.

"Unfortunately, that doesn't prevent them from coming back and using
another fictitious name," Jay said.

FBI seizures of electronic bulletin board systems are "quite common,"
said Mike Godwin, a lawyer at the Electronic Frontier Foundation. The
foundation is a civil liberties group based in Washington for those in
computer communications.

Godwin said that pornography is widely available on the thousands of
electronic bulletin boards in use across the country. New computer
users often use their scanners to recreate sexy pictures, much the
same as children who delight in using a newly acquired dirty word.

"Usually the novelty wears off," Godwin said.

Child pornography is relatively rare, Godwin said. When it shows up,
the operator of the system is faced with a choice: delete it
immediately, or keep it on the system and report it to the police.

The FBI finds raids effective because they are punitive in and of
themselves, whether or not a computer systems operator is ever charged
with a crime.

But even the most conscientious systems operator cannot keep all
pornography off a bulletin board, Godwin agreed.

Jay had previous conversations with the St. Louis County Police about
his system, he said.

"I told them I would simply try to use responsibility and common
sense and ... keep the system legal," Jay said. "I extend the First
Amendment right to all aspects of the system, unless it violates the
law."

Jay said he was seeking legal advice to help him get his computer
equipment back.

+++++++++++++++

St. Louis Post-Dispatch
Tuesday, January 19, 1993
Page 10A

GIF GETS BULLETIN BOARD IN A JIFF
'We Celebrate Human As Art Forum,' One Manager Says of Nude Issue
By Daniel R. Browning (Of the Post-Dispatch Staff)

Dirty pictures transmitted over the telephone to your home computer?
It had to happen.

Computer bulletin board systems, called BBSs, proliferate not only
locally, but nationally and internationally. The biggest ones call
themselves "information services," and the granddaddy is CompuServe.
It has nearly 1.2 million members from China to Chile.

St. Louis Computing, a free monthly computing newspaper, publishes a
list of local bulletin boards and their phone numbers.

Within these bulletin boards people interested in particular topics
go to chat, share information, and yes, show their favorite slides.
The pictures are transmitted in a special computer code called GIF
(pronounced jif), which is short for Graphics Interchange Format. To
see them, you need the special "viewers" included in some
communications software.

To capture an image, you have your computer's modem dial the bulletin
board, then search for whatever you find interesting.

In the giant databases, that means logging on to a special-interest
section within the information service or bulletin board. CompuServe
calls these "forums."

A forum exists for just about any professional interest or hobby.
Journalists, lawyers, doctors, aerospace workers, artists,
photographers, beer and wine enthusiasts, automobile buffs -- you'll
find them all in the forums.

Within these, you can find thousands of pictures ranging from NASA
space shots, to great works of art, to travel photos, to The Girl (or
Boy) Next Door in a birthday suit.

A wary technician overseeing the forum warns members that they had to
be older than 18 to get nude images.

But practically speaking, there's no way to prevent a minor from
capturing a nude photo on CompuServe, said Dave Kishler, a company
spokesman. The Federal Communications Commission does not regulate
BBSs, he said. So the BBSs have worked up their own sets of rules and
regulations.

Dave Shaver, operations manager of CompuServe's Fine Arts Forum, said
all the images are screened for content before they are made available
to the members. That's why you'll find hundreds of nudes under a
category called "Plain Brown Wrapper," but no XXX-rated pictures, he
said. "We celebrate the human as an art form."

Some bulletin boards are free. The big ones charge a flat monthly
fee of $5 to $8. Certain activities within the databases may also
include hourly surcharges, which vary in price to about $15 an hour.
Joining a special interest forum and capturing pictures would fit in
that category on most information services.

That cost -- and the requirement that members have a credit card or a
checking account -- helps limit memberships to adults, Shaver said.

------------------------------

Date: Wed, 27 Jan 1993 00:32:04 -0600 (CST)
From: joe@DOGFACE.AUSTIN.TX.US(Joe Zitt)
Subject: File 3--Colonel Guilty of Sending Computer Porn

Colonel guilty of sending porn over computer

Associated Press

SAN ANGELO -- The former commander of Goodfellow Air Force Base was
convicted in a court martial Monday of sending obscene material via
his home computer.

A jury of four men and one woman, all Air Force colonels, deliberated
about two hours before returning guilty verdicts on all counts again
Col. James Maxwell.

He was convicted of transmitting obscene material via home computer,
of transmitting child pornography through his computer and using
indecent language with a junior Air Force officer.

Maxwell, a 26-year Air Force veteran, now faces a possible 16-year
prison sentence and loss of his military retirement benefits.

Charges were filed against Maxwell after the FBI found his name among
users of an on-line computer network who accessed computer-generated
pornographic images of children.

Maxwell also was said to have used the computer network to inquire
about the location of homosexual meeting places.

Maxwell's attorney had sought to have the charges dropped on grounds
his transmissions on the computer from the privacy of his home were
protected under the constitution.

But the trial judge, Col. Donald Weir of Randolph Air Force Base,
allowed the charges to stand last week, ruling that freedom of speech
can be limited when it involves conduct unbecoming an officer.

"That the writings were private between consenting adults, that they
may have been welcome doesn't place them under the judicial umbrella
of a constitutional protected condition," Weir had ruled.

Weir dismissed a count alleging Maxwell had disgraced the Air Force by
allegedly using electronic mail to ask about homosexual bars and child
pornography.

Maxwell, 48, was removed from command at the Goodfellow Air Force Base
training center last summer after the charges were filed.

+++++++++++++++++++++

COMMENT: Looks to me like this thing is full of red flags. Isn't it
coincidental that the story breaks just as there's a flap over gays in
the military?!

And where it says "the FBI found his name among users of an on-line
computer network who accessed computer-generated pornographic images
of children", one might ask what network? what was the FBI doing
there? how did the images get there? how did the FBI think to track
them? who else is getting snared? civilians? were the images really
"computer-generated" or just scanned?

It's enough to restore one's healthy paranoia...

------------------------------

Date: Wed, 13 Jan 93 21:09:00 -0600
From: cylinder@news.weeg.uiowa.edu (Cylinder)
Subject: File 4--ISPTS Organizing Information

The International Society for the Philosophy of Tools & Space

We are an interdisciplinary organization, small but growing, dedicated
to thoughtful discussion about and research into issues concerning
tools and space. Currently, we maintain a membership list and
circulate a short newsletter. Our future plans call for expansion - a
regular journal and a number of conferences are possible in the coming
year.

Our membership list includes philosophers, artists, computer
programmers, scientists, graphic designers, architects, teachers - as
well as those whose professions are still unnamed. We are not a
school or a sect or party because we are not in agreement over
particular doctrines. Our society is bound by an implicit faith in
the silent potency of tools, space, meaning and metaphor, in a wide
range of seemingly unrelated fields. Within the scope of our talks to
date, members have raised diverse and fascinating issues for
consideration:

- A phenomenology of humor, tools and toys
- Space and the banality of cause and effect
- Rhetoric and metaphor: language as tool/toy
- The iconology of computers
- Speed and annihilation
- Victimless crimes and crimes of trespass
- The mechanics of the dreamwork in psycho-analysis
- Architectural theory and practice
- Political theories of reterritorialization
- Viruses: information systems and genetic engineering
- Media theory
- Virtual Reality: the emergence of simulacra in social space
- Transit technology and urban planning
- Infrastructure catastrophes

The thematic study of tools and space forces us to reconsider and
sharpen the boundaries separating the various specialties of our
members. Many of us are involved in concrete and ongoing projects
which undo customary lines of inquiry and uncover fruitful new
questions in what was formerly considered "obvious" and explained. We
seek to move beyond conventional genres without abandoning meaning and
beauty for the sake of novelty.

For more information about Cylinder, including membership materials,
please write us with your name and address.


CYLINDER
c/o Graham Harman, Secretary
Philosophy Dept., DePaul University
Chicago, IL 60614 USA
email: cylinder@uiowa.edu

(If you have already written to Cylinder, please refrain from doing so
a second time. Your name and address have been added to our mailing
list and you should be expecting membership materials in the coming
months.)

------------------------------

Date: Fri, 22 Jan 1993 13:52:48 -0500
From: Shari Steele <ssteele@EFF.ORG>
Subject: File 5--New case for EFF, ACLU, and CPSR

On the evening of November 6, 1992, approximately 30 computer
enthusiasts, who had gathered for a meeting of 2600 magazine readers
at the food court at Pentagon City Mall in Arlington, VA, were
detained and searched and had some of their possessions seized by
about half a dozen mall security guards acting under the direction of
the Secret Service. Somewhere between two and five officers from the
Arlington County Police were there, as well, having responded to a
call about fraud.

Several of the attendees are interested in suing the mall, police and
Secret Service, and EFF and CPSR have done some preliminary research
into the case to determine what, if any, civil liberties violations
were involved. After interviewing about a dozen people who were
there, we have determined that the Secret Service does seem to have
been involved (a county police officer on the scene confirmed that),
and we are ready to proceed with the case.

We contacted the Virginia ACLU, which has found a litigator in
Northern Virginia who wants to litigate the case. EFF, the ACLU and
CPSR are currently doing research on the legal theories we will need
to pursue. EFF is very committed to standing up for the civil
liberties of those who attended this open, publicized and
nondisruptive meeting.

Shari Steele, Staff Attorney, Electronic Frontier Foundation

------------------------------

Date: 14 Jan 93 22:19:52 PST
From: Kpro-Madness <unknown@domain>
Subject: File 6--Public Service for Cornell Hackers

The following should be of interest to CuD readers. It originally
appeared in RISKS Digest ( V. 14 #27).
++++

Date--Wed, 13 Jan 93 09:56:50 -0700
From--dclawson@clipr.colorado.edu
Subject--Public Service for Cornell Hackers

"Public Service for Hackers" by John Marcham
_Cornell_Alumni_News_ magazine

Two former [Cornell] students will develop a computer program to make
it easier for a quadraplegic man in Tennessee to use a computer he
owns, as part of their punishment for launching a computer virus that
damaged programs and caused hard drive crashes last February.

David Blumenthal '96 and Mark A. Pilgrim '94 were sentenced by a
Tompkins County Court judge to pay restitution to users whose
computers were jammed by the men's virus, at and near Stanford
University and in Japan, and to perform ten hours of community service
per week for a year.

A computer buff who knew the quadraplegic and heard of the Cornell
virus case wrote the judge in Ithaca, and asked if the students'
public service could be worked off developing a less expensive and
cumbersome program for the disabled man, who uses a mouthstick and
outdated software to operate his McIntosh computer.

The judge and the former students agreed to the proposal: the students
start work in November. A third former student, found guilty of a
lesser infraction, was asked by not required to do public service, and
declined.

------------------------------

Date: Mon, 18 Jan 93 08:04:30 -0500
From: Matt Bishop <bishop@WINDSOR.DARTMOUTH.EDU>
Subject: File 7--CFP Special Issue on Security [Change in Due Date]

[NOTE CHANGE IN SUBMISSIONS DUE DATE: IT IS NOW JUNE 1, 1993]

Matt Bishop will be Guest Editor of a special issue of the journal
"Computing Systems" to be published in 1993. The issue will be
devoted to "Security and Integrity of Open Systems." Papers on all
aspects of policy, issues, theory, design, implementation, and
experiences with security and integrity in open systems are solicited
for the issue. The deadline for submissions is June 1, 1993; papers
submitted after this deadline will not be considered. Prospective
authors should send five copies of their papers to:

Professor Matt Bishop
Mathematics and Computer Science
Dartmouth College
6188 Bradley Hall
Hanover, NH 03755-3551
(603) 646-3267
Matt.Bishop@dartmouth.edu

Submissions should not have appeared in other archival publications
prior to their submission. Papers developed from earlier conference,
symposia and workshop presentations are welcome.

"Computing Systems" is a journal dedicated to the analysis and
understanding of the theory, design, art, engineering and
implementation of advanced computing systems, with an emphasis on
systems inspired or influenced by the UNIX tradition. The journal's
content includes coverage of topics in operating systems,
architecture, networking, interfaces, programming languages, and
sophisticated applications.

"Computing Systems" (ISSN 0895-6340) is a refereed, quarterly journal
published by the University of California Press for the USENIX
Association. Usenix is a professional and technical association of
individuals and institutions concerned with breeding innovation in the
UNIX tradition.

Now in its fifth year of publication, "Computing Systems" is regularly
distributed to 4900 individual subscribers and over 600 institutional
subscribers (libraries, research labs, etc.) around the world. Some
special-topic issues are often distributed more widely.

The editor-in-chief of "Computing Systems" is Mike O'Dell of Bellcore.
Gene Spafford of Purdue University is Associate Editor, and Peter
Salus of the Sun User Group is the Managing Editor.

------------------------------

Date: 23 Jan 1993 16:14:31 -0700 (MST)
From: <KAPLAN%UABPA@ARIZVMS.BITNET>
Subject: File 8--Talking with the Underground

(Previously published in the Computer Security Institute's newsletter
- The Alert - and the French Chaos Computer Club's Chaos Digest)

Talking with the underground
by Ray Kaplan and Joe Kovara

Information about system and network vulnerabilities is sparse, not
readily available and carefully guarded by those segments of the
security community that collect and control it. Given that the
legitimate security community won't share information about
vulnerabilities with us, isn't it logical that we include outsiders
(the computer underground or ex-computer criminals) in these
discussions. Amid criticism, we decided to let the community ask the
advice of experts the crackers who have successfully cracked computer
networks.

Exploring the details of vulnerabilities

Over 300 participants at 25 sites in US, Canada, Europe and Mexico
joined law enforcement, members of the security community, and former
members of the computer underground as we explored these questions in
the November 24, 1992, audio teleconference entitled System and
Network Security: How You Will Be Attacked and What to do About It.

Our guests included Kevin Mitnick and Lenny DiCicco, who successfully
penetrated a range of networks and telephone systems. They were both
sentenced in federal court after successfully penetrating Digital
Equipment Corporation's computer network in 1988. They stole the
source code to VMS, Digital's widely used operating system. Their
exploits were profiled in the book Cyberpunk: Outlaws and Hackers on
the Computer Frontier, by Katie Hafner and John Markoff (1991, Simon
and Schuster).

Our panelists included Hal Hendershot, head of the FBI Computer Crime
Unit in Washington D.C.; Don Delaney, Senior Investigator with the New
York State Police; Computer security consultant Dave Johnson of Talon
Systems (Los Alto, CA); Robert Clyde, V.P. of the Security Products
Group, RAXCO, Inc.; and Lew, the organizational director of automation
for a medium size company a former cracker.

The panelists shared their considerable experience and discussed
techniques used to break in to computer networks. Among the
penetration techniques discussed were the uses of psychological
subversion, telecommunications monitoring techniques, and the
exploitation of known system and network bugs. Despite the popularity
of these attack techniques, they are little known outside of the
computer underground and the computer security community.

Panelists issue stern warnings about telecommunications security

Don Delaney stated that tremendous loss of money from both toll and
Private Branch eXchange (PBX) fraud is whats happening in the telecom
area. Since the security of a PBX is the responsibility of its owner,
such losses are not being absorbed by the telephone companies
involved. These losses have been known to force the owners of
compromised PBXs into bankruptcy. Delaney joins us in saying that its
not a matter of if you will be hit, but when.

According to DiCicco, compromising the telephone system gave he and
Kevin the ability to attack systems without the fear of discovery -
telco tracebacks were simply ineffective. They could attack networks
at many different points of entry all over the country. This is why
no one could keep them out, even though their victims knew their
systems and networks had been compromised. If all of this does not
scare you, consider Lenny's admission that at one point he and Kevin
had compromised over 50 telco switches in the United States, including
all of California, parts of New Jersey, New York and New Hampshire.
At one point they even controlled all three of the switches that
provided phone service to Manhattan.

Yes, the law is ready to help - but the threat is a tough,
sophisticated, international one.

Threats from abroad? Yes, the threat does exist according to Hal
Hendershot of the FBI. Robert Clyde reports getting many calls from
people trying to solve security problems. In keeping with what we
know of reported computer crimes, most sites see problems from
insiders: employees, consultants and vendors. Robert reports that
two companies publicly spoke of being approached by former East German
agents for hire for as little as $10,000 at a September conference in
Sweden where he spoke in 1992. We appear to be seeing the
criminalization of hacker activity that many have long feared: hackers
and ex-foreign intelligence agents for hire.

James Bond is alive and well, thank you

In late 1992 Don Delaney reported the first case he's seen of James
Bond techniques. Remote surveillance can be done by intercepting,
decoding and displaying the Radio Frequency (RF) emanations of various
computing devices such as terminals and network cabling. Delaney
reports that in late 1992, an antenna was put up on the balcony of a
19th floor room in New York's Helmsley building pointing at Chemical
Bank. He indicated that it was being very carefully adjusted before
being locked into position. By the time they were able to
investigate, the antenna and its manipulator had vanished - presumably
having successfully gathered the intelligence that they were after.
This is no longer gee, we knew it was possible, but holy shit, it's
happening now. Imagine someone reading your terminal screen from
across the street.

Management's show me attitude

Dave Johnson insists that his biggest problem when he was at Lockheed
was getting corporate management to understand that there is a
problem. One of the areas in which this type of conference can really
help is understanding the enemy. Management simply doesn't understand
the thinking of hackers. Since it makes no sense to them, they tend
to deny its existence until theres proof. Of course, the proof is
usually very expensive: once a system has been compromised the work of
cleaning it up is a long, hard and complicated. A well-connected
system or network makes an excellent platform from which to launch
attacks on other hosts or on other networks.

A major problem for Digital in securing their network against Kevin
Mitnick and Lenny DiCicco was that only one vulnerable system on
Digitals EASYnet was needed. From there, they were able to penetrate
other systems. Even nodes that were known to have been penetrated and
were secured were penetrated repeatedly by using other vulnerable
nodes to monitor either users or network traffic accessing the secured
nodes. While at Lockheed, Dave Johnson implemented policies,
awareness training and widescale authentication for all external
access, including dialup lines and telnet connections using
challenge-response tokens or smart cards. He does not trust the phone
system and assumes that it has been compromised. Kevin Mitnick and
Lenny DiCicco illustrated just how vulnerable the phone system was in
1988 and the MOD bust in July 1992 shows that things have not
improved. Kevin reminds us that you must assume the telephone system
is insecure: even robust challenge-response systems can be compromised.
You simply have to play the telecommunications game for real. Kevin
reminds us that unless you use encryption, all bets are off. As an
example of how deep, long lived and dedicated a serious attack can be,
consider that Kevin and Lenny were in DEC's network for years. They
knew exactly what DEC and telco security were doing in their efforts
to catch them since they were reading the security personnel's email.
They evaded the security forces for over 12 months and they had a
pervasive, all powerful, privileged presence on DEC's internal
network. I've seen the enemy and them is us (this is a quote from
Pogo).

Mitnick insists that people are the weakest link. According to his
considerable experience, you don't even need to penetrate a system if
you can talk someone on the inside into doing it for you. Why bother
breaking in to a computer system if you can talk someone in accounts
payable into cutting you a check? Using the finely tuned tools of
psychological subversion, practiced social manipulators can get most
anything that they want from the ranks of the generally unsuspecting
(uncaring?) employees that inhabit most of our organizations today.
The only cure is a massive and complete educational program that
fosters loyalty, awareness and proper skepticism in every employee.

In the end

Perhaps the strongest message from everyone was that you can't trust
the phone system. Telephone companies have been, and continue to be,
compromised. While Mitnick & DiCicco's penetration of DEC's internal
network happened in 1988, the 1992 MOD bust showed us that the same
techniques are still being used successfully today. Data and voice,
including FAX transmissions, are subject to eavesdropping and
spoofing. Encryption is absolutely required for secure, trustworthy
communications.

The coupling of social engineering and technical skills is a potent
threat. Most sites that have addressed technical security are still
wide open to penetration from people who have well-practiced social
engineering skills. However, in all, you don't even need social
engineering skills to get into most systems.

Are your systems and networks secure? Are your systems and networks
at risk? What will you do if you are attacked? Although the
questions seem simple, they are not. Future teleconferences will
explore both the questions and the answers in more detail.

++++

Ray Kaplan and Joe Kovara have been independent computer consultants
for more than a decade. They specialize in operating systems, networks
and solving system and network security problems. Ray Kaplan is also
a well known writer and lecturer. He is a regular contributor to
Digital News and Review and other computer trade publications.

Tapes and handout materials for the System and Network Security
teleconference series are available from Ray Kaplan, P.O. Box 42650,
Tucson, AZ USA 85733 FAX (602) 791-3325 Phone (602) 323-4606.

------------------------------

End of Computer Underground Digest #5.08
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT