Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 49

  


Computer underground Digest Wed Jun 14, 1995 Volume 7 : Issue 49
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Triviata: How many Spams have C&S Done since April '94?

CONTENTS, #7.49 (Wed, Jun 14, 1995)

File 1--INFO: Senate passes Decency Act 84-16; House is the next battle
File 2--Repost: EPIC Files Brief in 2600 Case
File 3--Media Feeding Frenzy on "runaway internet teens"
File 4-- Tutorial: Social Engineering vs Psychological Subversion (fwd)
File 5--Tutorial: Social Engineering vs Psychological Subversion
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 14 Jun 1995 18:33:53 -0400
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
Subject: 1--INFO: Senate passes Decency Act 84-16; House is the next battle

=================================================================
CAMPAIGN TO STOP THE EXON/GORTON COMMUNICATIONS DECENCY ACT
(SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END)

Update: -The Latest News: The Senate voted to attach the
Communications Decency Act to the Telecom Reform bill.
Leahy's alternative was not attached to the Telecom
Reform bill.
-What You Can Do Now


CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT
June 14, 1995

PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
REDISTRIBUTE ONLY UNTIL June 25, 1995
REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS

Distributed by the Voters Telecommunications Watch (vtw@vtw.org)

___________________________________________________________________
CONTENTS
Background
The Latest News
What You Can Do Now
For More Information
List Of Participating Organizations

_________________________________________________________________
BACKGROUND

The Communications Decency Act (sponsored by Sen. Exon and Gorton) would
criminalize many forms of expression on online systems. Many believe
it to be unconstitutional, and a fight to oppose it has been waged
since its introduction. It was recently attached to the fast-tracked
Telecommunications Deregulation bill, which is moving quickly through
Congress.

_________________________________________________________________
THE LATEST NEWS

Right up until the last minute, callers reported weary Senatorial
staffers continued to report a deluge of incoming calls, almost all
against the Exon/Coats bill and supporting the Leahy alternative. The
Senate debated the Exon/Coats/Gorton Communications Decency Act and the
Leahy alternative today (June 14, 1995) starting at about 3:30pm EST
for 90 minutes.

The debate was opened by Senator Exon who read a prayer to protect
against computer pornography. Senators Exon (D-NE) and Coats (R-IN)
spoke in favor of their position. Senator Gorton (R-WA) was
mysteriously absent from the debate.

Exon referred those that signed the petition to prevent his censorship
bill as "selfish". Exon presented letters from many groups in support
of his bill, including the Christian Coalition, the Family Research
Council, the National Law Center for Families. He also stated that
75% of computer owners have refused the join the Internet because the
obscene material they feared on the Internet.

Senators Byrd (D-WV) and Heflin (D-AL) cosponsored the Exon bill at
the last minute.

Senators Leahy (D-VT) and Feingold (D-WI) spoke passionately about the
First Amendment and the Internet. Feingold warned against the dangers
of chilling free speech. Leahy brought out the monster petition in
support of his alternative (it looks pretty impressive on television)
and proceeded to try to debunk the myths Exon promulgated about the
Internet. He also trumpeted the success of the Internet, and pointed
out it wouldn't have been nearly as successful if the US government had
tried to micro-manage it.

Both Exon and Leahy then gave back extra debating time and went to a vote
on the bill. The Exon bill was successfully attached to the Telecomm
Reform bill (84-16). The Leahy alternative was not attached to the
Telecom Reform bill.

Questions and answers:

Q: What does this mean?
A: It means we lost this round. The unconstitutional Exon Communications
Decency Act was attached to the Telecomm Reform bill.

Q: What's the next step?
A: Next, we need to ensure that a House equivalent to the Exon
Communications Decency Act is not attached to the House Telecomm Reform
bill.

Q: Where can I find more information about the bill?
A: Check below.

___________________________________________________________________
WHAT YOU CAN DO NOW -- U.S. and non-U.S. citizens

1. Familiarize yourself with the version of the bill that passed,
and the transcript of the Senate debate. (directions to obtain
these are below)

2. Check the voting list below. It wouldn't hurt to send a nice
letter, email, or fax to the Senators that voted to defeat the
Communications Decency Act. Hateful mail to Senators who did
not vote your way is not only *bad form*, but likely to become illegal
soon anyway, under the Communications Decency Act.

In other words, take some time to cool off.

3. If you don't receive Coalition alerts reliably through mail or news,
join the mailing list by sending mail to listproc@vtw.org with
"subscribe vtw-announce Firstname Lastname". We'll have to fight
this battle in the House soon and you should be informed.

4. Relax, it's not the end of the world. We still have this battle to
fight in the House of Representatives and then in the conference
committee. This is a setback, but we haven't lost yet.

__________________________________________________________________
RESULTS OF THE SENATE VOTE

Senators who voted to defeat the Communications Decency Act
(A polite letter to congratulate them for defending your free speech
rights would be appropriate.)

D ST Name (Party) Phone Fax
= == ================== ============== ==============
D CT Lieberman, Joseph I. 1-202-224-4041 1-202-224-9750
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
D IL Simon, Paul 1-202-224-2152 1-202-224-0868
senator@simon.senate.gov
D IL Moseley-Braun, Carol 1-202-224-2854 1-202-224-2626
D MA Kennedy, Edward M. 1-202-224-4543 1-202-224-2417
senator@kennedy.senate.gov
D MI Levin, Carl 1-202-224-6221 na
D MN Wellstone, Paul 1-202-224-5641 1-202-224-8438
D NM Bingaman, Jeff 1-202-224-5521 na
Senator_Bingaman@bingaman.senate.gov
D NY Moynihan, Daniel P. 1-202-224-4451 na
D OH Glenn, John 1-202-224-3353 1-202-224-7983
R RI Chafee, John H. 1-202-224-2921 na
D VA Robb, Charles S. 1-202-224-4024 1-202-224-8689
Senator_Robb@robb.senate.gov
vascr@CapAccess.org
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
senator_leahy@leahy.senate.gov
R VT Jeffords, James M. 1-202-224-5141 na
D WA Murray, Patty 1-202-224-2621 1-202-224-0238
D WI Feingold, Russell 1-202-224-5323 na
russell_feingold@feingold.senate.gov


Senators who voted to support the (CDA) Communications Decency Act
(They voted for the CDA and to curtail your free speech rights.
Writing them an impolite and nasty letter would be a bad idea, and
may soon be illegal under the CDA anyway. Take some time to cool down.)

D ST Name (Party) Phone Fax
= == ================== ============== ==============
R AK Murkowski, Frank H. 1-202-224-6665 1-202-224-5301
R AK Stevens, Ted 1-202-224-3004 1-202-224-1044
D AL Heflin, Howell T. 1-202-224-4124 1-202-224-3149
R AL Shelby, Richard C. 1-202-224-5744 1-202-224-3416
D AR Bumpers, Dale 1-202-224-4843 1-202-224-6435
D AR Pryor, David 1-202-224-2353 1-202-224-8261
R AZ Kyl, Jon 1-202-224-4521 1-202-228-1239
R AZ McCain, John 1-202-224-2235 1-602-952-8702
D CA Boxer, Barbara 1-202-224-3553 na
D CA Feinstein, Dianne 1-202-224-3841 1-202-228-3954
R CO Campbell, Ben N. 1-202-224-5852 1-202-225-0228
R CO Brown, Henry 1-202-224-5941 1-202-224-6471
D CT Dodd, Christopher J. 1-202-224-2823 na
R DE Roth Jr. William V. 1-202-224-2441 1-202-224-2805
D FL Graham, Robert 1-202-224-3041 1-202-224-2237
R FL Mack, Connie 1-202-224-5274 1-202-224-8022
D GA Nunn, Samuel 1-202-224-3521 1-202-224-0072
R GA Coverdell, Paul 1-202-224-3643 1-202-228-3783
D HI Akaka, Daniel K. 1-202-224-6361 1-202-224-2126
D HI Inouye, Daniel K. 1-202-224-3934 1-202-224-6747
D IA Harkin, Thomas 1-202-224-3254 1-202-224-7431
R IA Grassley, Charles E. 1-202-224-3744 1-202-224-6020
R ID Craig, Larry E. 1-202-224-2752 1-202-224-2573
R ID Kempthorne, Dirk 1-202-224-6142 1-202-224-5893
R IN Coats, Daniel R. 1-202-224-5623 1-202-224-8964
R IN Lugar, Richard G. 1-202-224-4814 1-202-224-7877
R KS Dole, Robert 1-202-224-6521 1-202-224-8952
R KS Kassebaum, Nancy L. 1-202-224-4774 1-202-224-3514
D KY Ford, Wendell H. 1-202-224-4343 1-202-224-0046
R KY McConnell, Mitch 1-202-224-2541 1-202-224-2499
D LA Breaux, John B. 1-202-224-4623 na
D LA Johnston, J. Bennett 1-202-224-5824 1-202-224-2952
D MA Kerry, John F. 1-202-224-2742 1-202-224-8525
D MD Mikulski, Barbara A. 1-202-224-4654 1-202-224-8858
D MD Sarbanes, Paul S. 1-202-224-4524 1-202-224-1651
R ME Snowe, Olympia 1-202-224-5344 1-202-224-6853
R ME Cohen, William S. 1-202-224-2523 1-202-224-2693
R MI Abraham, Spencer 1-202-224-4822 1-202-224-8834
R MN Grams, Rod 1-202-224-3244 na
R MO Bond, Christopher S. 1-202-224-5721 1-202-224-8149
R MO Ashcroft, John 1-202-224-6154 na
R MS Cochran, Thad 1-202-224-5054 1-202-224-3576
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
D MT Baucus, Max 1-202-224-2651 na
R MT Burns, Conrad R. 1-202-224-2644 1-202-224-8594
R NC Faircloth, D. M. 1-202-224-3154 1-202-224-7406
R NC Helms, Jesse 1-202-224-6342 1-202-224-7588
D ND Conrad, Kent 1-202-224-2043 1-202-224-7776
D ND Dorgan, Byron L. 1-202-224-2551 1-202-224-1193
D NE Kerrey, Bob 1-202-224-6551 1-202-224-7645
D NE Exon, J. J. 1-202-224-4224 1-202-224-5213
R NH Gregg, Judd 1-202-224-3324 1-202-224-4952
R NH Smith, Robert 1-202-224-2841 1-202-224-1353
D NJ Bradley, William 1-202-224-3224 1-202-224-8567
D NJ Lautenberg, Frank R. 1-202-224-4744 1-202-224-9707
R NM Domenici, Pete V. 1-202-224-6621 1-202-224-7371
D NV Bryan, Richard H. 1-202-224-6244 1-202-224-1867
D NV Reid, Harry 1-202-224-3542 1-202-224-7327
R NY D'Amato, Alfonse M. 1-202-224-6542 1-202-224-5871
R OH Dewine, Michael 1-202-224-2315 1-202-224-6519
R OK Inhofe, James 1-202-224-4721
R OK Nickles, Donald 1-202-224-5754 1-202-224-6008
R OR Hatfield, Mark O. 1-202-224-3753 1-202-224-0276
R OR Packwood, Robert 1-202-224-5244 1-202-228-3576
R PA Santorum, Rick 1-202-224-6324 na
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
D RI Pell, Claiborne 1-202-224-4642 1-202-224-4680
D SC Hollings, Ernest F. 1-202-224-6121 1-202-224-4293
R SC Thurmond, Strom 1-202-224-5972 1-202-224-1300
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
R SD Pressler, Larry 1-202-224-5842 1-202-224-1259*
R TN Thompson, Fred 1-202-224-4944 1-202-228-3679
R TN Frist, Bill 1-202-224-3344 1-202-224-8062
R TX Hutchison, Kay Bailey 1-202-224-5922 1-202-224-0776
R TX Gramm, Phil 1-202-224-2934 1-202-228-2856
R UT Bennett, Robert 1-202-224-5444 1-202-224-6717
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
R VA Warner, John W. 1-202-224-2023 1-202-224-6295
R WA Gorton, Slade 1-202-224-3441 1-202-224-9393
D WI Kohl, Herbert H. 1-202-224-5653 1-202-224-9787
D WV Byrd, Robert C. 1-202-224-3954 1-202-224-4025
D WV Rockefeller, John D. 1-202-224-6472 na
R WY Simpson, Alan K. 1-202-224-3424 1-202-224-1315
R WY Thomas, Craig 1-202-224-6441 1-202-224-3230

__________________________________________________________________
FOR MORE INFORMATION

We will be archiving the version of the Communications Decency Act
that passed, the roll call vote that went with it, and the transcript
of the Senate debate.

We will make these available through the methods below as soon as
they are available through the Government Printing Office (this usually
takes about 24 hours). Please try to use the Web or Gopher sites first
before using our email server.

Web Sites
URL:http://www.panix.com/vtw/exon/
URL:http://epic.org/
URL:http://www.eff.org/pub/Alerts/
URL:http://www.cdt.org/cda.html

FTP Archives
URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
URL:ftp://ftp.eff.org/pub/Alerts/

Gopher Archives:
URL:gopher://gopher.panix.com/11/vtw/exon
URL:gopher://gopher.eff.org/11/Alerts

Email:
vtw@vtw.org (put "send help" in the subject line)
cda-info@cdt.org (General CDA information)
cda-stat@cdt.org (Current status of the CDA)

___________________________________________________________________
LIST OF PARTICIPATING ORGANIZATIONS

In order to use the net more effectively, several organizations have
joined forces on a single Congressional net campaign to stop the
Communications Decency Act.


American Civil Liberties Union * American Communication Association *
American Council for the Arts * Arts & Technology Society * Association
of Alternative Newsweeklies * biancaTroll productions * Californians
Against Censorship Together * Center For Democracy And Technology *
Centre for Democratic Communications * Center for Public Representation
* Citizen's Voice - New Zealand * Computer Communicators Association *
Computer Professionals for Social Responsibility * Cross Connection *
Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens'
Movement * Electronic Frontier Canada * Electronic Frontier Foundation
* Electronic Frontier Foundation - Austin * Electronic Frontiers
Australia * Electronic Frontiers Houston * Electronic Frontiers New
Hampshire * Electronic Privacy Information Center * Feminists For Free
Expression * First Amendment Teach-In * Florida Coalition Against
Censorship * Friendly Anti-Censorship Taskforce for Students * Hands
Off! The Net * Human Rights Watch * Inland Book Company * Inner Circle
Technologies, Inc. * Inst. for Global Communications * Internet
On-Ramp, Inc. * The Libertarian Party * Marijuana Policy Project *
Metropolitan Data Networks Ltd. * MindVox * National Bicycle Greenway *
National Coalition Against Censorship * National Public Telecomputing
Network * National Writers Union * Oregon Coast RISC * Panix Public
Access Internet * People for the American Way * Rock Out Censorship *
Society for Electronic Access * The Thing International BBS Network *
The WELL * Voters Telecommunications Watch

(Note: All 'Electronic Frontier' organizations are independent entities,
not EFF chapters or divisions.)

------------------------------

From: sobel@epic.org (David L. Sobel)
Subject: 2--Repost: EPIC Files Brief in 2600 Case
Date: Mon, 12 Jun 1995 16:14:28 -0500

The Electronic Privacy Information Center (EPIC), on behalf of
Computer Professionals for Social Responsibility (CPSR), has filed
an appellate brief seeking to uphold a lower court decision
ordering the release of information on a controversial "hacker"
investigation. At issue are documents detailing the Secret
Service's role in the so-called "Pentagon City Mall Raid."

In November 1992, a group of young people affiliated with the
computer magazine "2600" were confronted by mall security
personnel, local police officers and several unidentified
individuals. The group members were ordered to identify
themselves and to submit to searches of their personal property.
Their names were recorded and some of their property was
confiscated. However, no charges were ever brought against any of
the individuals. Although the Secret Service has never formally
acknowledged its role in the incident, it eventually conceded that
it did possess relevant information.

CPSR filed suit in federal court in early 1993 seeking the release
of relevant Secret Service records under the Freedom of
Information Act. In July 1994, U.S. District Judge Louis
Oberdorfer ordered the Secret Service to release the vast majority
of documents it maintains on the incident. The government
appealed that decision and EPIC is litigating the appeal that is
now pending. In the recently filed brief, EPIC and CPSR argue
that the withheld documents demonstrate Secret Service misconduct
and that the FOIA exemptions cited by the agency do not apply.

The Secret Service has maintained that the disputed records were
collected during the course of an investigation of telephone toll
fraud. In its appellate brief, the agency asserts that
"obviously, a meeting of individuals 'affiliated with 2600
Magazine' would be of interest to such an investigation since
those individuals have, by their conduct, evidenced an interest in
the technical intricacies of the telephone system." The
government has revealed for the first time that the underlying
investigation was closed on March 14 of this year.

The Pentagon City incident has been described as an example of
over-zealous law enforcement activities directed against so-called
computer "hackers." The case raises significant issues of free
speech and assembly, privacy and government accountability. Oral
argument before the federal appeals court is scheduled for mid-
September.

The EPIC/CPSR brief can be accessed via WWW at:

http://epic.org/computer_crime/2600/

or by FTP/Gopher at:

cpsr.org/cpsr/computer_crime/2600_brief_6_95.txt

------------------------------

Date: Mon, 12 Jun 1995 23:45:02 -0400 (EDT)
From: craftman <craftman@IGLOU.COM>
Subject: 3--Media Feeding Frenzy on "runaway internet teens"

St. Matthews Teenager "Lured" Away By Computer Pal
Richard D. Meadows - craftman@iglou.com

WRITERS NOTE: I have used ALLCAPS for my added emphasis and placed a
few editorial/social comments in brackets [] in the article. At the
end there will additional editorializing.

The media feeding frenzy, about teens being lured away by people
they have met online, in both Washington state and Kentucky has pro-
vided more fuel for the Exon fire currently burning in the Senate.

I live in Louisville, KY., and have been following the Tara Noble
runaway closely since it was first reported in the Courier-Journal (C-
J) on Tuesday June 6, a week after MS Noble left her home in St. Mat-
thews an upper middle class suburb of Louisville. Tara, 13, ran away
sometime on May 30, and yesterday she called the FBI from Hollywood
Boulevard in Los Angeles, CA., to say she wanted to go back home.
[How many teens have run away to California and ended up on Hollywood
Boulevard, where they call home or the police?]

What makes this runaway case different is the fact that Tara's
personal computer and AOL are involved. The headline on the front
page story of the C-J on June 6....WOMAN FEARS COMPUTER PAL LURED AWAY
DAUGHTER, 13....sets the tone for the entire article. The staff
writer, John Voskuhl, calls cyberspace a "shadowy frontier", in a
story that appears one full week after MS Noble ran away from home.
Tara's mother Lisa Noble tells the writer that she thinks her daughter
boarded a Greyhound bus headed west to rendezvous with someone she met
through a ' "chat room" ' on America Online.

Voskuhl writes in the story that it is not certain that Tara's
computer connections played a role in her disappearance. In the next
paragraph however:

"The computer - that's what started this problem," said Norm
Mayer, chief of the St. Matthews Police Department, which is
investigating the case. "And that's the only real lead we
have."

[Excuse me? What about the Greyhound bus? Is that not a lead? Did
Mrs. Noble just pick that out of the air?]

The article goes on to tell of her divorced parents turning
Tara's room upside down in search of information. They found tele-
phone numbers from all across the country of people Tara had met
during the DOZENS OF HOURS SHE SPENT CHATTING ON COMPUTER NETWORKS.
[What networks are interfaced with AOL?] The article has the obliga-
tory mention of "...a series of sexually explicit images that found
their way across the Noble family's modem during the DOZENS OF HOURS
her daughter spent online since April." Mrs. Noble is quoted in the
article about the images: "I'm like, 'How can this stuff be on a
computer?"'

During her trip across the country Tara stopped and used the
computer to communicate with computer acquaintances through AOL. Pam
McGraw of AOL Fame, indicated that AOL was cooperating with authori-
ties investigating the Noble case. McGraw also pointed out that AOL
provides "parental controls" that allow parents to prevent their
children from using chat rooms. Mrs. Noble said she did not know
about them before her daughter disappeared.

Tara spent so much time on the computer her mother eventually
removed the telephone jack Tara was using. Her father, Sam Noble, was
quoted in the story: "We encouraged her. We didn't know she was
talking to MEN all across the country." He further indicated, "People
talk about the information superhighway - in my opinion, it ought to
be regulated." The article then goes on to tell about the Exon bill
and how one of Kentucky's Senators, Wendell Ford, voted for it in
committee and would vote for it on the floor.

The end of the article the writer talks about the image appearing
on the screen to signal the computer was busy -- an hourglass, as Mrs.
Noble sat waiting for word of her daughter's whereabouts.



SCUM IN CYBERSPACE

Op-Ed Page Editorial - The Courier-Journal - Wednesday June 7, 1995

The volume and content of information that reaches children in
their own homes makes parenthood ever more challenging. Movies,
television, printed matter -- they can all influence values and deci-
sions.
Every major advance in information technology, from the printing
press to the cellular phone, has been blamed for misleading the young.
Ideas open up new possibilities, The results are often trying.
Now comes the computer, with its awesome power to bring likemind-
ed folks together in a strange realm of cyberspace. And, regrettably,
to serve as a medium for purveyors of pornography.
The recent disappearance of 13-year-old Tara Noble could, her
parents believe, be connected to contact she made in a computer net-
work "chat room". It's a realistic -- and frightening -- possibility.
But the larger society must not let such occurrences stampede it
into blaming the technology -- which, like every other, is hurtful as
well as beneficial -- or resorting to censorship. Such efforts can't
work. And they run counter to the laws and traditions of a free
nation.
A better idea is to manage the machine better -- by using
electronic wizardry to help parents decide what their children have
access to. That's no guarantee of safety, but it's preferable to
controls on what all citizens read and see.
UNSIGNED



The Courier-Journal -- Wednesday June 7, 1995
DANGER MAY LURK FOR CHILDREN IN ANONYMOUS ONLINE WORLD
By Ric Manning, Business Writer

WRITERS NOTE: Ric Manning is a friend of mine and writes for other
computer publications besides the C-J, where you may have seen his
byline. Doesn't mean I won't take him to task when I feel he is
wrong, just ask him. ricman@iglou.com


This article is a general overview of what can happen and some of
the techno-wizardry which can be used by parents to help prevent
children going where no parent wants them going. There is also men-
tion of both the Washington state and Kentucky runaways.

The most interesting to me is SURFWATCH a new $49.95 screening
program which prevents access to more than 1000 internet sites that
contain sexually oriented material. <800-458-6600> When my son gets
older and begins to surf around a program like that on his computer
seems reasonable to me.

Again we get the comment, this time from Tara's mother that
online services should be regulated. The services respond that par-
ents must assume most of the responsibility for their children's
activities online. (See editorial comments at end.) The National
Center for Missing and Exploited Children along with online services
have produced a brochure called "Child Safety on the Information
Superhighway", which is available online on Compu$erve or through the
center's hotline: 800-THE-LOST. [What is their online address?] If a
CI$ reader would be so kind as to get this and send it in to CuD, it
would be nice.



MISSING GIRL, 13, FOUND UNHARMED IN LOS ANGELES
Monday June 12, 1995 The Courier-Journal
Bill Pike, Staff Writer


WRITERS NOTE: I am going to do excerpts from this article, but, not
the entire thing.

Teen's Flight Linked To Online Contacts

Unharmed but frightened after being away from home for two weeks,
13-year-old Tara Noble call the FBI in Los Angeles yesterday from a
phone booth on Hollywood Boulevard to say she wanted to return home.
[Was it Hollywood & Vine?]
Tara had been missing since May 30, when authorities feared that
she had been lured to California through contacts over her home com-
puter -- perhaps by a man identified only as George in San Francisco.
Tara was in "excellent health and apparently unharmed," said Dave
Kohl, the agent in charge of FBI operations in Kentucky.
(Lisa) Noble and her ex-husband, Sam Noble of Pleasure Ridge Park, found
telephone numbers from across the country for people Tara had met
while chatting on computer networks. They also turned up sexually
explicit material and a message from George, who wrote, "We can run
around our room naked all day and all night."
Kohl declined to give details of Tara's whereabouts or activities
during the past two weeks, although he said she had been in "several
locations".
He acknowledged that the computer played a role in Tara's
disappearance, and he said the case shows the need for parents to
supervise their children's use of computers.
Kohl said that TARA DOES NOT FACE ANY CHARGES AND THAT THE FBI
WILL CONTINUE INVESTIGATING.
He added that "significant media coverage" of Tara's disappear-
ance, as well as an extensive investigation, prompted Tara to call
authorities.
A story in yesterday's [Sunday June 11, 1995. I would like to
have a complete hard copy of this article if someone in l.a. could
send it via snail mail to me.] Los Angeles Times featured Tara and a
15-year-old Washington state boy who was reunited with his parents
after making an unannounced trip to San Francisco to visit a friend he
had met through his computer. [What happened to the MAN who had lured
this boy to San Francisco for gay sex? Now it is an unannounced trip
to visit a friend. Can you say media hype?]
Five FBI field offices worked on Tara's case, interviewing numer-
ous contacts she had made via computer, Kohl said.
HE ALSO SAID A "COOPERATIVE CITIZEN" IN SAN FRANCISCO NOTIFIED
THE FBI THERE YESTERDAY THAT TARA WAS IN LOS ANGELES. [I guess you
would be cooperative if Special Agents of the FBI came knocking on
your door and asking you questions about a 13-year-old runaway girl]



EDITORIALIZING

Without exception everyone in the community here, both online and
offline, that I have discussed the Tara Nobles case with have said the
same things. There are bigger problems in the family than a 13 y.o.
running away because of a friend on AOL. Kids have been running
away to California for as long as I can remember reading newspapers
and that is a few years now, and the fact that Tara met this person
via computer makes it different, but certainly not unique.

How come a parent lets a bright student suddenly spend dozens of hours
online? They got the computer in April and Tara ran away in May. She
was on AOL. Lets see 30 days worth of online fees get charged to the
old credit card. The credit card bill comes in. Mom nearly has a
heart attack. Mom unplugs the telephone line from the computer.
Daughter gets seriously upset. Daughter decides to go join her online
friend(s) so she can stay online. I dunno maybe my thinking here is
off.

I am consistently and constantly disappointed in the reporting of the
C-J on most computer stories. This is no exception. Voskuhl shows a
lack of understanding of the Information Superhighway when he writes
about Tara chatting on computer networks, after identifying AOL as the
service provider. The final paragraph dealing with a mother waiting
to find out about her runaway daughter and the hourglass was just too
sticky for my taste. The Facts, Just the Facts, in a NEWS article.

I appreciate the C-J's support of personal freedom. I wish they would
just go further with it. If the Op-Ed page editorial writers were as
doggedly determined on protecting all of us from censorship as they
are on open records or preventing the building of an interstate bridge
near the home of the editor of the opinion pages, Keith Runyon, per-
haps my two senators would get a clue and vote no on Exon's bill.

We are getting the same government needs to provide control relative
to the internet that has come and gone for years on controlling TV,
Movies, Music, et.al., vices that children can come in contact with if
not supervised. The key is parenting. My son does not watch Beavis
and Butthead, although he would love too, nor MTV, nor violent movies
on TV. He does not listen to music I find offensive. He has never
had a toy gun, although he has made several with his erector set, or
sticks, or whatever is convenient and looks close enough to suit his
needs at the moment. The point is I control his socio-environment.
That is parenting. That is the responsibility you take on when you
decide to bring a life into this world. When he is older and skilled
enough I will get him online. But, he is not gonna be reading the
alt.sex. news groups. Well certainly not until he figures out how to
get around how I have his system set up. It is not up to Sen. Exon,
or the guvmint, to control the internet, it is up to the parent to
take back control of their family and instill the morals and values
that they believe in, not the values of a senator or a president
wannabe or even a vice-presidents wife.

End of Editorial Comments

------------------------------

Date: Sat, 10 Jun 1995 12:46:06 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: 4-- Tutorial: Social Engineering vs Psychological Subversion (fwd)

Note: Susan Thunder has also promised to write "her side of the story" as
opposed to what is chronicled in Cyberpunk, (Katie Hafner and John Markoff)

David Smith * "Where children dare to tread, the footsteps
bladex@bga.com * of censorship are sure to follow"
President, EFF-Austin * Fight the Communications Decency Act.
Board of Directors, CTCLU * Send e-mail to vtw@vtw.org w/ "send info"

---------- Forwarded message ----------
From: thunders@ix.netcom.com (Susan Thunder )
Newsgroups: alt.2600,alt.fan.kevin-mitnick
Subject: 5--Tutorial: Social Engineering vs Psychological Subversion
Date: 3 Jun 1995 06:56:25 GMT


What is the difference between "social engineering" vs "psychological
subversion"???

I will be offering a series of tutorials on these subjects, starting
below, but first I would like to post a challenge to all you REAL
superhackers out there:

Back in the days of 8BBS and other early '80's boards, the hacker ethic
was such that one who imagined him/herself to be a superhacker would
PROVE him/herself by the QUALITY of the posts (s)he left. If a novice
hacker asked a question, those of us who were of the elite pantheon
would all try to outdo each other in a game of one-upsmanship to see
who could post the most informative and/or useful reply! We
demonstrated our ability by the reliabiltity of the information we
provided to these newcomer queries, and it made for one HELLUVA
competitive and informative BBS.

So here's my challenge: Instead of all you so-called experts out there
falling all over each other trying to outflame the novices, let's see
you SHOW YOUR STUFF! Let's let the cream rise to the top, guys/gals!
Let's get this newsgroup back on track--it's a simple fact of life that
there will be a continuing flood of newcomers to the net, so let's work
together instead of against each other!

Let's face it: If *WE* don't keep an eye on Big Brother, nobody will.
One of the main goals of communism in its efforts to subvert capitalist
society was to sow dissention and mistrust among the more inquisitive
political organizations--could it be that the feds are trying to do the
same to us, a potentially VERY POWERFUL segment of today's cutting-edge
theorists? ***>DON'T LET THEM WIN!<*** Let's join together and
disseminate information freely rather than withhold it!

-------[Stepping down from the soapbox...]-------

Tutorial: Social Engineering vs Psychological Subversion Part 1

Social Engineering has been defined as the art of manipulating
information out of a given person with a view towards learning
information about or from a given EDP system. The techniques are
relatively simple, and I will go into greater detail and provide
examples in a future tutorial. Essentially, the methodology consists
of pulling off a telephone ruse to get the persona at the other end of
the line to give you passwords or read you data off of their computer
screen. Sometimes the techniques involve intimidation or blackmail.
Again, I will explore these techniques further in my next tutorial, but
first I want to address the differences between Social Engineering (a
lousy, non-descriptive term IMHO) and Psychological Subversion.

Psychological Subversion (PsySub) is a very advanced technique that
employs neural linguistic programming (nlp), subconscious suggestions,
hypnotic suggestions, and subliminal persuasion. Essentially, you want
to plant the idea in the subject's mind that it's okay to provide you
with the information you seek to obtain. the precise methods vary
according to the environment, but I will use the Miliary as an example
since they are very easily manipulated as a result of their inherent
compulsion to obey any directive emanating from a higher-ranking
officer.

If you would like to bypass a tempested system housed inside a SCIF
that employs multi-level/multi-keyed encryption methodology, the most
productive method I have ever encountered is to call inot the SCIF on
the appropriate autovon line (DMS-100, what a joke anyway), and firmly
inform the corporal or sergeant that answers the phone that you are
Specialist So-and-so calling on behalf of General such-and-such (the
base commandant is a good choice to use but be sure you use his
secretary's/("Specialist's) real name) and state that the General would
like to know WHY HE CANNOT ACCESS HIS ACCOUNT! Naturally, the
low-ranking dupe on the other end of the phone line will be much more
concerned about getting into potential trouble by pissing off the
general than he will be concerned about the established security
procedures.

Often-times, it will be necessary to take him step-by-step through the
already obvious (to you) process of explaining WHY the account isn't
"working..." (The real reason, FYI, is because Top Secret and higher
systems are not supposed to have any external connections to phone
lines outside the SCIF). What you need to do is talk the dupe through
the process of creating/enabling a remote access line (i.e. dialup),a
nd it helps to have a definable STU-III dataset to exchange encryption
keys with him. Failing passession of such a device, you just pretend
that you've tried to access the system anyway, and for some reason the
encryption devices aren't handshaking properly. At this point you
either convince him that he could be in very big trouble for
insubordination if he doesn't cooperate and give the "general"
immediate access, albeit unencrypted, or you can simply have the poor
sod READ you the data off of his screen! Oftentimes, you can even get
the fool to print out various materials that you would like to view,
and have him mail/deliver/ftp etc these items via another system.

In other words, to bypass encryption, just have a legitimate user read
and print the data you wish to acquire--intimidation works with some
people. With others you need to flirt. Some are simply the helpful
type of person who will accomodate your request with very little
fanfare. In a couple of cases, I have had to play a subliminal tape
over the phone line as I spoke to the subject. The tape would embed
instructions and reasurrance into the subject's mind on a subconscious
level that they were not even aware of.

Ususally, if there is something you want very badly, it may take
several contacts to build up rapport and level of trust before you
begin to lay the guilt trips on them about "haven't I been a friend to
you? I might get in BIG trouble if I don't remember the "general's"
password and username. Please, help me out of this mess..." You'd be
surprised at how many people fall for this ruse!

Now I have a comment about how certain persons chose to utilize these
very powerful nlp techniques. For instance, there is a well-known
hacker who is selling (or trying to, anyway) these awesomely powerful
techniques to men who desire to simply get-laid! What a fucking waste
of time, effort, and talent. Evidently the man in question has nothing
better to do with this remarkable knowlegde that compromise an already
vulnerable and probably lonely woman...

If this hacker would apply his substantial knowledge on this subject to
a socially useful endeavor, instead of efforts that lead to nothing
more than brief personal satisfaction at the lonely woman's emotional
expense, then HE could be a force to reckon with!

Pleae address questions and comments to the newsgroup and NOT my email
(unless it's very personal) because I would like to see an intelligent
exchange of useful information in this newsgroup again!

Are any of you so-called superhackers up to the challenge of proving
your knowledge and "pedigree" in a public forum where all can see the
results of your effots? Let's get this group back on track...after
all, we all started somewhere! Now this flood of aolers and ixers kind
of makes it necessary to slog though alot of crap, but there ARE useful
and informative posts buried within threads that have long since
migrated away from thier origianl intents.

I will post more specific hacks in my next "tutorial!"

REGARDS,
THUNDER (Susan)


Hey guys: Please pray for Kevin's early release from jail, and write
to him too if you can!

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: Bits against the Empire BBS: +39-464-435189
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.49
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT