Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 61

  



Computer underground Digest Sun Aug 15 1993 Volume 5 : Issue 61
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copie Editor: Etaoin Shrdlu, Senior

CONTENTS, #5.61 (Aug 15 1993)
File 1--ERRATA in CuD #5.60
File 2--EFF Job Opening for ONLINE ACTIVIST
File 3--NSA Seeks Delay in Clipper
File 4--CPSR and the Nat'l Info Infrastructure
File 5--Call for Papers IFIP SEC'94 Caribbean
File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING
File 7--Illinois BBS Sysop Busted for "porn-to-minors"
File 8--In response to E-fingerprinting in Calif
File 9--Re--NIRVANAnet (A View from Brazil)
File 10--Public Domain Internet Information for Teachers <fwd>
File 11--Gory details about texsun (breakin) (fwd)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Sat, 14 Aug 1993 22:51:01 CDT
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 1--ERRATA in CuD #5.60

Ooops---In thanking our NIU folk in CuD 5.60, we misspelled the
name of the Director of our Academic Computing Service. Michael
Prais, not "Preis." Sorry 'bout that, Michael.

We also indicated that WYLBUR was our operating system. Neil Rickert
gently corrected us:

Actually WYLBUR is not an operating system at all. It is
just a multi-user interactive text editor which runs under
the operating system MVS-XA.

The computer center is finally taking the plunge and getting
a Unix system for those university users who need Unix.
We've been pushing them in this direction. I don't yet know
what the arrangements and policies will be for this system.

------------------------------

From: Shari Steele <ssteele@EFF.ORG>
Date: Thu, 5 Aug 1993 17:04:14 -0400
Subject: File 2--EFF Job Opening for ONLINE ACTIVIST

The Electronic Frontier Foundation (EFF), a nonprofit organization
dedicated to protecting civil liberties for users of newly emerging
technologies, is looking to hire an Online Activist.

The Online Activist will actively participate in and organize EFF's
sites on CompuServe, America Online, GEnie, Usenet and the WELL and
will distribute feedback from the various networks to EFF staff and
board through regular online summaries. This person will provide
leadership to groups of members and will possibly set up and maintain
an EFF BBS. The Online Activist will help to maintain EFF's ftp
library. This person will train new EFF staff members on online
communications. S/he will collect and solicit articles for, write
articles for, edit and assemble our biweekly electronic newsletter,
EFFector Online. The Online Activist will work with the System
Administrator to distribute and post EFFector Online and other EFF
electronic publications and to maintain a database of form answers for
commonly asked questions, along with the Membership Coordinator. This
person must be willing to work out of EFF's offices in Washington, DC.

The Electronic Frontier Foundation offers a competitive salary with
excellent benefits. For immediate consideration, please forward a
resume, along with a cover letter describing your online experience
and reason for applying for this job by August 23, 1993, to:

Online Activist Search
Electronic Frontier Foundation
1001 G Street, NW
Suite 950 East
Washington, DC 20001
fax (202) 393-5509
e-mail ssteele@eff.org (ASCII only, please)

------------------------------

Date: Wed, 11 Aug 1993 16:05:14 EST
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
Subject: File 3--NSA Seeks Delay in Clipper

NSA Seeks Delay in Clipper Case


The National Security Agency (NSA) has asked a federal court for
a one-year delay in a lawsuit challenging the secrecy of the
government's "Clipper Chip" encryption proposal. The suit was filed
by Computer Professionals for Social Responsibility (CPSR) on May 28
and seeks the disclosure of all information concerning the
controversial plan.

In an affidavit submitted to the United States District Court for
the District of Columbia on August 9, NSA Director of Policy Michael
A. Smith states that

NSA's search for records responsive to [CPSR's] request is under
way, but is not yet complete. Because the Clipper Chip program
is a significant one involving the participation of organizations
in four of NSA's five Directorates and the Director's staff, the
volume of responsive documents is likely to be quite large.
Moreover, because the Clipper Chip program is highly complex and
technical and is, in substantial part, classified for national
security purposes, the review process cannot be accomplished
quickly.

CPSR called for the disclosure of all relevant information and
full public debate on the proposal on April 16, the day it was
announced. While NSA has insisted from the outset that the "Skipjack"
encryption algorithm, which underlies the Clipper proposal, must
remain secret, the Smith affidavit contains the first suggestion that
the entire federal program is classified "in substantial part." In
the interest of obtaining timely judicial review of the agency's broad
classification claim, CPSR intends to oppose NSA's request for delay
in the court proceedings.

In another case involving government cryptography policy, CPSR
has challenged NSA's classification of information concerning the
development of the Digital Signature Standard (DSS). The court is
currently considering the issue and a decision is expected soon.

CPSR is a national public-interest alliance of computer industry
professionals dedicated to examining the impact of technology on
society. CPSR has 21 chapters in the U.S. and maintains offices in
Palo Alto, California, and Washington, DC. For additional information
on CPSR, call (415) 322-3778 or e-mail <cpsr@cpsr.org>.

David L. Sobel
CPSR Legal Counsel
<sobel@washofc.cpsr.org>

------------------------------

Date: Tue, 10 Aug 1993 09:43:40 PDT
From: Nikki Draper <draper@CSLI.STANFORD.EDU>
Subject: File 4--CPSR and the Nat'l Info Infrastructure

COMPUTER PROFESSIONALS ADD SOCIAL CONSCIENCE
TO NATIONAL NETWORK DEBATE

Palo Alto, Calif., August 6, 1993 -- At a recent meeting in
Washington D.C., board members from Computer Professionals for Social
Responsibility (CPSR) were challenged by top level telecommunications
policy experts to craft a public interest vision of the National
Information Infrastructure (NII). The experts at the roundtable
discussion included Mike Nelson from the President's Office of Science
and Technology, Vint Cerf from the Internet Society, Jamie Love from
the Taxpayer's Assets Project, Ken Kay from Computer Systems Policy
Project, and Laura Breeden from FARnet.

"We were excited to discover that CPSR is in a position to play a key
role in shaping NII policy," said CPSR Board President, Eric Roberts.
"The commercial sector is already in the thick of the debate, but
there has been little coordinated response from the noncommercial
constituencies. After talking about the issues and CPSR's role, the
Board committed to meeting this challenge."

So far, the debate about the NII has centered around fiber versus
ISDN, cable companies versus telephone companies, research versus
commercialization, and so on. These are real questions with
important implications. However, CPSR believes that a better
starting point is a set of guiding principles as the context for all these
more detailed questions about "architecture," technical standards,
and prime contractor. Before arguing over bits and bytes, it is crucial
to clarify the vision and values that underlie a major endeavor like
the NII.

As individuals in the computing profession, CPSR's membership
knows that new technologies bring enormous social change.
CPSR's goal is to help shape this change in an informed manner.
Key issues discussed in the paper will include:

o ensuring that the design remains both open and flexible so
that it can evolve with changing technology.

o ensuring that all citizens have affordable network access and
the training necessary to use these resources.

o ensuring that risks of network failure and the concomitant
social costs are carefully considered in the NII design.

o protecting privacy and First Amendment principles in
electronic communication.

o guaranteeing that the public sector, and particularly schools
and libraries, have access to public data at a reasonable cost.

o seeking ways in which the network can strengthen democratic
participation and community development at all levels.

o ensuring that the network continues to be a medium for
experimentation and non commercial sharing of resources,
where individual citizens are producers as well as consumers.

o extending the vision of an information infrastructure beyond
its current focus of a national network, to include a global
perspective.

The national membership of CPSR brings a unique perspective to the
overall conception of the NII. Throughout CPSR's history, the
organization has worked to encourage public discussion of decisions
involving the use of computers in systems critical to society and to
challenge the assumption that technology alone can solve political and
social problems. This past year, CPSR's staff, national and chapter
leadership have worked on privacy guidelines for the National Research
and Education Network (NREN), conducted a successful conference on
participatory design, created local community networks, organized
on-line discussion groups on intellectual property, and much more.

To ensure that its position paper is broadly representative, CPSR will
work in concert with other public interest groups concerned about the
NII, such as the newly established coalition in Washington D.C., the
Telecommunications Policy Roundtable. CPSR chapters are will be
conducting a broad based public campaign to reach out beyond the
technical experts and producers -- to people who will be affected by
the NII even if they never directly log on.

CPSR will begin distributing its completed paper to policy makers on
October 16th at its annual meeting in Seattle, Washington. The
meeting will bring together local, regional and national decision
makers to take a critical look at the NII.

Founded in 1981, CPSR is a national, non-profit, public interest
organization of computer scientists and other professionals concerned
with the impact of computer technology on society. With offices in
Palo Alto, California, and Washington D.C., CPSR works to dispel
popular myths about technological systems and to encourage the use of
computer technology to improve the quality of life.

For more information on CPSR's position paper , contact Todd Newman,
CPSR board member, at 415-390-1614 .

For more information about CPSR, contact Nikki Draper, Communications
Director, at 415-322-3778 or draper@csli.stanford.edu.

------------------------------

Date: Thu, 12 Aug 1993 01:43 +0100
From: fortrie@CIPHER.NL
Subject: File 5--Call for Papers IFIP SEC'94 Caribbean

Call for Papers IFIP SEC'94 - updated information August 1993

Technical Committee 11 - Security and Protection in Information
Processing Systems - of the UNESCO affiliated INTERNATIONAL
FEDERATION FOR INFORMATION PROCESSING - IFIP,

announces:

Its TENTH INTERNATIONAL INFORMATION SECURITY CONFERENCE, IFIP SEC'94
TO BE HELD IN THE NETHERLANDS ANTILLES (CARIBBEAN), FROM MAY 23
THROUGH MAY 27, 1994.

Organized by Technical Committee 11 of IFIP, in close cooperation with
the Special Interest Group on Information Security of the Dutch
Computer Society and hosted by the Caribbean Computer Society, the
TENTH International Information Security Conference IFIP SEC'94 will be
devoted to advances in data, computer and communications security
management, planning and control. The conference will encompass
developments in both theory and practise, envisioning a broad perspective of
the future of information security.
The event will be lead by its main theme "Dynamic Views on
Information Security in Progress".


Papers are invited and may be practical, conceptual, theoretical, tutorial
or descriptive in nature, addressing any issue, aspect or topic of
information security. Submitted papers will be refereed, and those presented
at the conference, will be included in the formal conference proceedings.
Submissions must not have been previously published and must be the
original work of the author(s). Both the conference and the five
tutorial expert workshops are open for refereed presentations.

The purpose of IFIP SEC'94 is to provide the most comprehensive international
forum and platform, sharing experiences and interchanging ideas, research
results, development activities and applications amongst academics,
practitioners, manufacturers and other professionals, directly or indirectly
involved with information security. The conference is intended for computer
security researchers, security managers, advisors, consultants, accountants,
lawyers, edp auditors, IT, administration and system managers from
government, industry and the academia, as well as individuals interested and/or
involved in information security and protection.

IFIP SEC'94 will consist of a FIVE DAY - FIVE PARALLEL STREAM - enhanced
conference, including a cluster of SIX FULL DAY expert tutorial workshops.

In total over 120 presentations will be held. During the event the second
Kristian Beckman award will be presented. The conference will address
virtually all aspects of computer and communications security, ranging
from viruses to cryptology, legislation to military trusted systems,
safety critical systems to network security, etc.

The six expert tutorial workshops, each a full day, will cover the
following issues:

Tutorial A: Medical Information Security
Tutorial B: Information Security in Developing Nations
Tutorial C: Modern Cryptology
Tutorial D: IT Security Evaluation Criteria
Tutorial E: Information Security in the Banking and Financial Industry
Tutorial F: Security of Open/Distributed Systems

Each of the tutorials will be chaired by a most senior and internationally
respected expert.

The formal proceedings will be published by Elsevier North Holland
Publishers, including all presentations, accepted papers, key-note talks,
and invited speeches.

The Venue for IFIP SEC'94 is the ITC World Trade Center Convention
Facility at Piscadera Bay, Willemstad, Curacao, Netherlands Antilles.

A unique social program, including formal banquet, giant 'all you can eat'
beach BBQ, island Carnival night, and much more will take care of leisure
and relax time.

A vast partners program is available, ranging from island hopping, boating,
snorkeling and diving to trips to Bonaire, St. Maarten, and Caracas.
A special explorers trip up the Venezuela jungle and the Orinoco River
is also available.
For families a full service kindergarten can take care of youngsters.

The conference will be held in the English language. Spanish translation
for Latin American delegates will be available.

Special arrangements with a wide range of hotels and apartments complexes
in all rate categories have been made to accommodate the delegates and
accompanying guests. (*)
The host organizer has made special exclusive arrangements with KLM Royal
Dutch Airlines and ALM Antillean Airlines for worldwide promotional fares
in both business and tourist class. (**)

(*)(**) Our own IFIP TC11 inhouse TRAVEL DESK will serve from any city on
the globe.

All authors of papers submitted for the referee process will enjoy special
benefits.

Authors of papers accepted by the International Referee Committee will enjoy
extra benefits.

If sufficient proof (written) is provided, students of colleges, universities
and science institutes within the academic community, may opt for
student enrollment. These include special airfares, apartment accommodations,
discounted participation, all in a one packet prepaid price.
(Authors' benefits will not be affected)

**************************

INSTRUCTIONS FOR AUTHORS

**************************

Five copies of the EXTENDED ABSTRACT, consisting of no more than 25 double
spaced typewritten pages, including diagrams and illustrations, of
approximately 5000 words, must be received by the Program Committee no
later than November 15th, 1993.

We regret that electronically transmitted papers, papers on diskettes,
papers transmitted by fax and handwritten papers are not accepted.

Each paper must have a title page, which includes the title of the paper,
full names of all author(s) and their title(s), complete address(es),
including affiliation(s), employer(s), telephone/fax number(s) and
email address(es).
To facilitate the blind refereeing process the author(s)' particulars
should only appear on the separate title page. The language of the
conference papers is English.
The first page of the manuscript should include the title, a keyword list
and a 50 word introduction. The last page of the manuscript should include
the reference work (if any).

Authors are invited to express their interest in participating in the
contest, providing the Program Committee with the subject or issue that
the authors intend to address (e.g. crypto, viruses, legal, privacy, design,
access control, etc.) This should be done preferably by email to
< TC11@CIPHER.NL >, or alternately sending a faxmessage to
+31 43 619449 (Program Committee IFIP SEC'94)

The extended abstracts must be received by the Program Committee on or
before November 15th, 1993.

Notification of acceptance will be mailed to contestants on or before
December 31, 1993. This notification will hold particular detailed
instructions for the presentation and the preparation of camera ready
manuscripts of the full paper.

Camera ready manuscripts must be ready and received by the Program Committee
on or before February 28, 1994.

If you want to submit a paper, or you want particular information on
the event, including participation, please write to:

IFIP SEC'94 Secretariat
Postoffice Box 1555
6201 BN MAASTRICHT
THE NETHERLANDS - EUROPE

or fax to:

IFIP SEC'94 Secretariat: +31 43 619449 (Netherlands)

or email to:

< TC11@CIPHER.NL >

***************************************************************

Special request to all electronic mail readers:

Please forward this Call for Papers to all networks and listservices
that you have access to, or otherwise know of.

****************************************************************

Sincerely

IFIP TC 11 Secretariat

Call for Papers - updated information August 1993

------------------------------

Date: Mon, 9 Aug 1993 16:49:06 -0700
From: Jim Warren <jwarren@WELL.SF.CA.US>
Subject: File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING

*** PLEASE WRITE, NOW!*** PLEASE, DON'T STOP NOW!

Assembly Bill 1624, mandating online public access to public
legislative information via the public networks (i.e., the Internet
and all the nets connected to it - including wherever you are
receiving this msg), will either pass the Legislature by Sept. 10th,
or will die - and we have to re-fight the whole battle, year after
year.

LETTERS & FAXES ARE *NEEDED*!. THEY *WILL* DETERMINE THE OUTCOME.

REMAINING 1993 LEGISLATION SCHEDULE
Jul 16th, the Legislature went into remission - uh, recess.
Aug 16th, the Legislature reconvenes to diddle remaining 1993 business.
Sep 10th, the Legislature quits working in Sacramento for the year.
Oct 10th, the Governor must veto legislatively-approved bills he opposes.
On AUGUST 18TH, the Senate Rules Committee run by Sen. Dave Roberti
(D-Van Nuys area) will hear AB1624. If Roberti doesn't like it, he can and
will kill it. If Roberti passes it, it will almost-certainly pass the
Senate. Then we need for the Assembly to "concur in amendments" and the
Governor to not veto it.


Address letters/faxes to "State Capitol, Sacremanto CA 95814."

AS SOON AS POSSIBLE, send a one-page letter supporting AB1624 to the
Senate Rules Committee - who have seen essentially *no* support for it:
Sen. David Roberti, Chair, Room 400; fax/916-323-7224; voice/916-445-8390.
and to the other four members (tiny, *powerful* committee!):
Sen. Ruben Ayala (D-Chino area), Room 5108; f/916-445-0128; v/916-445-6868.
Sen. Robert Beverly (R-Long Bch), Room 5082; f/not avail.; v/916-445-6447.
Sen. William Craven (R-Oceanside), Room 3070; f/not avail.; v/916-445-3731.
Sen. Nick Petris (D-Alameda), Room 5080; fax/916-327-1997; v/916-445-6577.

Important: Please send COPIES of ALL letters to the AB1624 author:
Hon. Debra Bowen, Room 3126; voice/916-445-8528; fax/916-327-2201.


CAN EMAIL VIA ME, IF YA CAN'T FIND TIME FOR SNAIL-MAIL
If you don't have time to send snail-mail, you can email your message via
jwarren@well.sf.ca.us.
Write it exactly as you would snail-mail, but be SURE TO INCLUDE
your name, address and phone #s for legislators' independent
verification. Upon receipt by email, I will print and/or fax the
entire message to Bowen and to the legislator(s) to whom you address
it. (Please allow for that delay.)

LEGI-TECH'S OLDER BROTHER DONE GOOD!
The McClatchy organization is the owner of Legi-Tech, one of the two
largest online distributors of California legislative information. They are
also owner of a number of newspapers - their flagship being the powerful
Sacramento Bee.
On Jul 26th, the Bee ran an editorial *strongly* supportive of AB1624 -
laudable, principled action by The Bee, McClatchy, and presumably by
Legi-Tech in the face of a difficult trade-off between the public's
interests versus their business interests.
Applause! Applause!


CALIFORNIA LEGISPEAK: "AUTHOR" VS. "SPONSOR" VS. "SUPPORTER"
In California legislative circles:
A bill's AUTHOR is a legislator who introduced the bill.
A bill's SPONSOR(S) is a person or organization, if any, that requested that
the bill be introduced by the bill's author.
A bill's SUPPORTER(S) is a person or organization that is officially listed
as being in favor of the bill, usually including its sponsor(s), if any.
All bills have one or more authors. Some bills do NOT have sponsors.
AB1624's author was Assembly Member Debra Bowen. It had no sponsors, but
has a growing number of supporters.


PROGRAMMERS: SAMPLE LEGISLATIVE DATA-FILES ALSO AVAILABLE AT CPSR.ORG
AB1624 Update #19 detailed a set of sample data-files for review and
test-programming, available from Tim Pozar's KUMR.LNS.COM by anonymous ftp.
As of Jul 22nd, those Legislative Data Center sample files were/are also
online at cpsr.org in /ftp/cpsr/states/california/ab1624/sample_data
for binary ftp access. For questions about accessing them there, contact:
Al Whaley al@sunnyside.com +1-415 322-5411(Tel), -6481 (Fax)
Sunnyside Computing, Inc., PO Box 60, Palo Alto, CA 94302

We have a voice. Use it or loose it.

------------------------------

Date: Fri, 6 Aug 93 09:28:12 CDT
From: anonymous@name.deleted
Subject: File 7--Illinois BBS Sysop Busted for "porn-to-minors"

"Kids, Computers, and Porn:
For Many, Adult Material just a Keystroke away"
Chicago Tribune, 6 Aug, 1993, p. 1, 16
By Susan Kuczka

Steven's mother described her 12-year old son as a "computer
nerd," and she believed he spent all his time engaged in
good, clean digital fun.

.......

What she didn't know was that her son also was using his
computer to watch hard-core pornography delivered to his
northwest suburban home by modem from a computer bulletin
board service.

.......

The discovery led to the arrest of a Des Plaines bulletin
board operator in the first prosecution of its kind in state
history.

.......

Nancy Clausen, spokeswoman for the National Coalition Against
Pornography, said, "Kids are getting this all the time, but
it's hard for parents to know it's happening because it's
easy for a child to hide. You think your kid's a computer
genius when he's spending hours at a computer, but when he
has a modem, he has access to a different world, and kids
are very curious."

<The story cites Lisa Palac, 29, editor of the quarterly magazine
FUTURE SEX, who calls it "cybersex:porn of the next generation."
According to the story, computer porn is becoming big business
with users being charged $25 to $50 year for file access, and
some of the larger services have toll-free 800 numbers.
It indicates that 13 million computer users are connected to
55,000 commercial bulletin boards nationwide, although less than
5 percent, according to the author, are "adult bulletin boards.">

There is nothing illegal about distributing most forms of
pornography to adults. Transmission of pornographic
materials to a minor--whether in print or by computer--is a
crime, though.

But the computer pornography industry is so new that law
enforcement authorities are only now beginning to investigate
it as more and more bulletin board services begin to operate
throughout the country.

<The story notes that Steven's mother spent weeks trying to interest
law enforcement officials to pursue the case, including her local PD,
the Illinois State Police, the Cook County sheriff, and the FBI.
Finally, the Cook County state's attorney accepted her complaint,
which resulted in a grant jury indictment. The BBS sysop is Raymond
F. Netupski, 30, of 10106 Holly Lane, Des Plaines (Ill.), who began
operating his board in 1987. Netupski's attorney is John J. Seno.
Netupski was indicted for distributing harmful materials to a minor
and obscenity, both misdemeanors. He was also charged with "unlawful
use of sound or audio visual recordings," because some of the
transmitted material was copyright-protected. The "piracy" charge, a
felony, carries a potential sentence of up to 3 years imprisonment and
a $100,000 fine.

The remainder of the story cites a several law enforcement agents,
sysops, and others, for their comments.

------------------------------

Date: Mon, 2 Aug 1993 17:17:38 CST
From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
Subject: File 8--In response to E-fingerprinting in Calif

In comp.society.cu-digest, sfs0@PHPMTS1.EM.CDC.GOV writes:

[in regard to e-fingerprinting as a condition of public assistance]

> I fail to see this as a "Big Brother" issue. After all, isn't
> the goal of social services in a majority of the cases to provide
> assistance temporarily? Once the assistance is no longer needed, the
> recipient is no longer tracked.

Government and law enforcement agencies have shown a dismal track record
in the area of civil liberties of late. I have a very hard time
believing, even for a minute, that this vast amount of personal
information will be discarded.

Furthermore, once some kind of 'evidence of benefit' can be wrested from
the selective interpretation of the program's operational record,
pressure will be brought to expand the system to more and more areas.
I've seen mention in this very forum that L.A. intends to expand to GA
and Food Stamp recipients. California now has a magnetic stripe on
their drivers' licenses. Will that soon contain your e-fingerprint, as
well?

Don't you agree that this is perhaps a bit too much information to be
collecting on anyone?

Or perhaps you don't see any reason to stop with fingerprints. Coded
transponders carrying a unique identification number could easily be
implanted, say, at the base of the right thumb. That would be even
harder to spoof than e-fingerprints. So why not have all AFDC
recipients implanted with serial numbers? Hey, we could even make that
number tie in to your credit card numbers, so you'd be safe from fraud.
Make it your ATM card number, and you'd be safe from the shoulder
surfers at the ATM. And I'm sure you wouldn't mind the occasional
doorknob noting the exact time of your passage. After all, you're an
honest man with nothing to hide, so it doesn't matter that someone could
effortlessly track your every move.

You see, once this trend gets started, it will grow to envelop us all.
Don't know about you, but I don't want that transponder. And I'd rather
not be e-fingerprinted, either.

------------------------------

Date: Wed, 11 Aug 93 18:27:00 -0300
From: luiz.marques@BBS816.MANDIC.ONSP.BR(Luiz Marques)
Subject: File 9--Re--NIRVANAnet (A View from Brazil)

Dear CUD,

I'd like to thank you for your wonderful journal,and
tell you that it's enjoyed even in Brazil.

Reading the Time article on CuD 5.59,I couldn't help but
laugh after reading the following:

>One bulletin board, Burn This Flag, requires callers to fill out an
>application before gaining access to an adults-only section that
>contains files describing "bizarre sexual behavior." But in a written
>message, Burn This Flag's system operator, known as "Zardoz,"
>acknowledges there is no foolproof way to ensure all users of the
>adult section are at least 18.

Does paper adults magazines have any way to "unsure that all
users" of it will be at least 18?To the best of my knowledge,
this magazines are sold openly without directly checking ages(this
"checking" stops at appearance analysis).And that does not consider
what will happen to the magazine AFTER it's sold...

About this kind of assault on BBS reputation,I'd like to say that
it's probably international.Recently,here in Brazil,one of the
biggest newspapers of the country published a article with wild
remarks like these:
"BBS are little stores which sell pirated programs"
"There are 120 pirate BBSs in Sao Paulo"(there aren't even
120 BBS in Sao Paulo!!!)

These remarks are totally absurd,and most BBS around here
are completely legal(there is a small amount of "underground
BBS"here too),and hurt the BBS community as a whole.

And the effect of such remarks are much worse here,since
the computer community (and BBSs) are greatly underdeveloped
(taking the USA as a standard).

luiz.marques@bbs816.mandic.onsp.br

------------------------------

Date: Wed, 11 Aug 1993 05:26:41 -0500
From: CuD moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 10--Public Domain Internet Information for Teachers <fwd>

From--"samizdat@world.std.com" "B.R. Samizdat Express"

PLEASE COPY THIS DISK -- UPDATE 8/1/93
The B&R Samizdat Express
PO Box 161
West Roxbury, MA 02132
samizdat@world.std.com

(Reminder -- We're the folks who are making public-domain Internet
information available on disk, primarily for teachers who have no
access or limited access to the Internet. We encourage you to make as
many copies of these texts as you need to share with your colleagues
and students. If you would like to receive a list of our current
offerings, please send us email requesting it. If you didn't see our
initial message, where we explain what we're doing and why, and who we
are, just let us know and we'll send you a copy of that as well.)

It's been a busy week:
1) All our offerings are now available for Macintosh as well as IBM
PCs.
2) The United Nations Department of Public Information has given its
support to Global Education Motivators (GEM) in our joint project
to make on-line U.N. information available in our PLEASE COPY THIS
DISK format.
3) Your suggestions and requests pointed us to the Educational
Resources Information Center (ERIC) as a possible source for a whole
series of disks about teaching techniques and educational issues, as
well as lesson plans. 4) One of you let us know the importance of
books on disks for the blind, many of whom have equipment which can
"read" such material aloud to them.
5) We've added six new disks.
6) We've learned that in the summer, with people away, obtaining
permissions from sources can take a while.
7) We've been delighted by the enthusiastic response we received.
8) We learned that there simply isn't enough time in the
day to personally respond to everyone. (Please accept
our apologies, and our thanks for your helpful suggestions.)

We'd appreciate your help in finding sources of information to meet
the particular needs of people who have responded to us. We are
looking for public-domain on-line sources for: 1) Chaucer, 2) current
information on Africa, and 3) history c. 1850 of importation into the
U.S. of castorbean plants (source of the toxin Ricin, which is
possibly linked to Lou Gehrig's disease) and its use in fertilizer.

The information resources available on the Internet and from the
United Nations are immense. We need to target our efforts to provide
maximum benefit. For now, we're basing our decisions on the assumption
that some of you would like to use these like textbooks (having
students make their own copies), that others would like to assemble
your own anthologies, and that still others are interested in
government reference tools to encourage students to become informed
and active citizens. Please let us know as specifically as you can
what information would be most useful for you and your colleagues to
have on disk.

Please send your suggestions as well as your requests to be added to
our distribution list to: samizdat@world.std.com

------------------------------

Date: Fri, 6 Aug 1993 22:16:59 -0500 (CDT)
From: vswr!bobi@SPSGATE.SPS.MOT.COM(Bob Izenberg)
Subject: File 11--Gory details about texsun (breakin) (fwd)

# Date--Fri, 6 Aug 93 11:55:45 CDT
# From--William.Reeder@adhara.Central.Sun.COM (William Reeder)
(Sun Central Area Network Support)

# Subject--Gory details about texsun

# Eric Schnoebelen (eric@cirr.com) writes:
# > What I heard was that texsun got cracked, so SUN changed
# > policies to require call back on all connections. This means that
# > SUN/texsun has to originate all calls. I recently converted the UUCP
# > link between convex and texsun to route mail via smtp, to get "around"
# > this problem..
# >
# > Personal thought? texsun is now out of the news providing
# > business. And quite likely out of the general UUCP providing business.
# > Perhaps its time for another connectivity meeting. (just what _I_ need,
# > another meeting!)

# I think I can speak authoritatively about what happened to texsun :-(

# Actually, we have no evidence that anyone broke in through any of the
# modems in Sun's Dallas office (hosts texsun or dallas). What did
# happen was that one or more people (most likely more) broke in via
# modem to a number of Sun sites around the world (must've had a good
# calling card). We think that the initial entries were due to the most
# brain-dead of actions on our part: the intruders called us on the phone
# and asked for accounts, and we provided them. The callers would
# identify themselves as Sun employees on vacation near the local Sun
# office (visiting parents or such) and say that they wanted to login to
# read their email. They were able to provide enough credible
# information to convince over-worked and under-brained part-time
# sys-admins to create the accounts. Any one of you who reads USENET
# news can probably gather enough such information from headers and
# signatures (name, title, personal workstation, office phone number,
# etc.) to make the same claims.

# Anyway, once they were in we were totally compromised. We hadn't done
# much to keep up with security patches. And we had lots of machines
# with "+" in /etc/hosts.equiv. And lots of quickly crackable passwords
# on accounts (and NIS accessible password files). In other words, no
# internal security. The intruders almost instantly had bunches of other
# accounts to use, and seemed able to find other modem numbers (can you
# say, "directory assistance"? I thought you could.)

# The next question is, did they damage anything? Yes. At the very
# least they stole source code, which is a valuable product. They also
# deleted stuff, but I don't know what, and may have modified some
# things. They also crashed machines or in other ways denied service to
# legitimate users. All of those things are illegal, and damaging. We
# are doing our best to track the intruders, but it is very difficult, as
# any of you who have tracked intruders knows.

# What we can do is secure our network. That is why we are removing
# modems from all sales offices and setting up a small number of regional
# modem pools for employee dialup access (with three different and
# non-crackable passwords and dialback).

# I have spent the better part of the last week rebuilding texsun from
# the ground up and doing everything possible to secure it (all security
# patches applied, many services disabled, nothing trusted, security
# monitoring programs running, dialback software installed, etc.). I
# have finally convinced my management that there is no security risk in
# restoring the UUCP accounts for a short time, allowing our connections
# to make other arrangements and smoothly move over. The reason it is
# only temporary is that management doesn't want my UUCP modems to be the
# proverbial camel sticking its nose under the tent. They are very
# serious about strictly limiting the number of entry points into the
# company.

# So there you have it. Another one bites the dust. I'm sorry to have
# to pull out of the regional UUCP community, but I can understand Sun's
# needs to maintain a secure environment. While I agree that a properly
# configured machine running UUCP is not a security risk, Sun's employees
# have repeatedly demonstrated that they will not always properly
# configure machines or employ proper security procedures when creating
# accounts. The only way for Sun to maintain security is to strictly
# limit access, and that is what we are now doing. I have enjoyed being
# able to provide what I hope has been a useful service to the community,
# and will miss being a participant. I will show up to this Month's
# lunch-bunch meeting in case anyone wants to verbally abuse Sun through
# me.
#
# -- Wills

------------------------------

End of Computer Underground Digest #5.61
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT