Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 02 Issue 05

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.05 (September 30, 1990) **
****************************************************************************

MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS:
File 1: Moderators' Corner
File 2: Re: The CU in the News (Mail reading)
File 3: Anarchist Times, Inc. (ATI)--background
File 4: The status of the electronic forum (BBS)
File 5: Another experience with the law
File 6: Some views on what to do if questioned by LE agents
File 7: The CU in the News

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
*** CuD #2.05, File 1 of 7: Moderator's corner ***
********************************************************************

Date: September 30, 1990
From: Moderators
Subject: Moderators' Corner

++++++++++
In this file:
1. CuD SURVEY
2. CuD FORMAT
3. EURO-AMERICAN BBS
4. RIGGS SENTENCING

++++++++++++++++++
CuD Survey
++++++++++++++++++

Bob Krause has sent out the CuD survey, and the responses have been
excellent. We thank all those who are cooperating, and urge you to return
the survey if you have not yet done so. If you have misplaced it, drop Bob
a note at:
KRAUSER@SNYSYRV1
We will publish the results as soon as they are coded and analyzed.

++++++++++++
CuD Format
++++++++++++

Most people seem relatively unconcerned with our format, but those who are are
quite adamant. The overwhelming majority of responses indicate that the
current style should remain, so we will stick with it until opinion shifts the
other way.

+++++++++++
Euro-American Connection
+++++++++++

For those wondering what has happened to Euro-American Connection, and why
there is a voice message instead of Hot Mix's familiar logon logo: We are told
that the disconnection is temporary, and he is simply moving. Word is that he
will be back up and running when he's settled in a few weeks, and will try to
get the same familiar number.

++++++++++++
Riggs Sentencing
++++++++++++

For those wondering what happened in the sentencing of the "Atlanta Three"
who pled guilty a few months ago, we are told that the sentencing has been
delayed for at least a few weeks. No reason was given for the delay.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: Mon, 24 Sep 90 19:17:18 EDT
From: David Waitzman <djw@BBN.COM>
Subject: Re: The CU in the News (Mail reading)

********************************************************************
*** CuD #2.05: File 2 of 7: From the Mailbag ***
********************************************************************

In CUD Volume 2, Issue #2.04, you talk about email being intercepted
intentionally. In some Internet email systems, the postmaster may receive
email messages that were unable to be properly delivered by the email
system. It is difficult for a person acting as the postmaster not to read
such email, since some portions of the email messages may contain delivery
error reports. This differs from the usual case in the US Post Office,
where the address and actual message text are clearly separated by an
opaque envelope (except, for instance, on postcards).

Any laws passed regarding email interception must take this matter into
account, I believe.

-david


********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: Thu, 27 Sep 90 02:36 EDT
From: groundzero@TRONSBOX.XEI.COM
Subject: Anarchist Times, Inc. (ATI)--background

********************************************************************
*** CuD #2.05: File 3 of 7: Anarchist Times, Inc.- Background ***
********************************************************************



Underground Electronic Newspaper For Your E-Reading Pleasure.
E-Written by PA and GZ.

WARNING: The story following may contain explicit thoughts descriptive
of, advocating, or encouraging one or more of the following:

television
sadomasochism
folk music
freedom
democracy
nudity
drinking or eating healthfood
satanism
guitar playing
antidisestablishmentarianism
tobacco chewing
use of COBOL for object-oriented programming
cross-dressing
peace
murder
nose hair
insanity
morbid violence
rock n roll
the illegal use of drugs
the use of alcohol
new ideas
or the use of hi-fi stereo equipment.

The writers of ATI oppose censorship of any kind.

ATI is going on its third year as your first source of underground news.

ATI is Activist Times Inc., an underground online newsletter with a
mission: to present information and opinion in a socially relevant and
stimulating context. ATI features articles about and for the computer
underground, telecom, BBSing, anarchy, current events, social issues, humor ,
entertainment and more. ATI is into Politics, the environment, technology,
the telephone, and mostly the First Amendment.

Prime Anarchist is the originator of ATI and its co-editor along with
Ground Zero, who is also its publisher. Prime began ATI around February,
1988 as an online newsletter on bulletin boards in Rhode Island and New
York, in addition to producing a few issues on hard copy. Soon ATI spread
to the downloading sections of bulletin boards across the country, most
notably The Phoenix Project and P-80 Systems.

ATI has a long list of present and past contributors, and has been known
to present articles that conveyed a unique twist of humor. The titles speak
for themselves: "Terrorism of a 976 Phone Sex Line", "Quantum Mix-Up", "Mall
Terrorism", "Fun in Rich Rural Towns", and many others.

In fact, some of the originators of YIPL/TAP magazine ghostwrote some
articles in 88 and 89. Some of the ghosts' initials (for you yipsters) were
RF, norfolk Virginia; CC, NYC; AH, Penn; FS, NYC; FS, Rhode Island; & A1,
NYC.

Issues of ATI may be obtained from many bulletin boards in the US, Europe
and around the world, including Ripco BBS at 312-528-5020. You may also be
added to ATI's net distribution list by e-mailing Ground Zero at:
> uunet!tronsbox!akcs.groundzero or akcs.groundzero@tronsbox.xei.com if you <
have a smart mailer.

To receive back issues of ATI, email Ground Zero or access the ftp
distribution site at 128.95.136.2 and enter 'cd tmp/ftp/ATI'. Details are
available in ATI #49 on how to receive back issues on disk.

So demand ATI on your nearest BBS, inside your favorite mainframe, or right
to your modem. But whatever you do, demand it. =)

The makers of ATI would like to thank: Brother Jack, Dr. Timothy Leary,
Jello Biafra, Johanna Lawrenson, Spin Magazine, Spy Magazine, Ronald and
Nancy Reagan, Dirk Hitler, Manuel Noriega, Saddam "sodom" Hussein, The 1910
FruitGum Company, Samuel Clemens, Jim and Tammy Baker, Oliver North,
Ferdinand and Imelda and her shoes, and all the little people Leona
Helmsley talked about.

++++++++++++++++++++++++++++

%Moderators' comment: ATI is a nice antidote to those who see no political
consciousness amongst the CU. Like most e-mail mags, the substance has slowly
changed and matured over the years, and it is becoming a nice mix of
political, technical, and other information of relevance to computerists.
Thanks to Ground Zero and Prime Anarchist for putting out a nifty publication.


********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: brad@LOOKING.ON.CA(Brad Templeton)
Subject: The status of the electronic forum (BBS)
Date: 27 Sep 90 00:57:23 GMT

********************************************************************
*** CuD #2.05: File 4 of 7: The Status of the BBS ***
********************************************************************


People keep trying to figure out what an electronic forum (or bulletin
board) is in traditional terms -- common carrier or publication.

I think that it is not analogous to any of the old forms, and a new type of
law has to be created to apply to it.

There are 4 types of BB today:
A) The completely open BB with no supervision (USENET newsgroup,
some BBS operations)
B) The supervised open BB. (most BBS, GEnie, CIS forums, etc.) C) The
heavily supervised BB. (Prodigy, moderated USENET group) D) The fully
edited electronic publication

D is a direct analog of the traditional publication. C is very close, but
not quite. A is close to the "common carrier" model, but does not match
it exactly. B has little analog in traditional publishing.

All four are of course(*) deserving of constitutional protection of free
speech. For all are published forms of expression.

The closest thing to A is common carrier or enhanced service provider
status, where the carrier is not liable for what is transmitted. However
there are many differences. For one, I have not heard of a "public
broadcast" common carrier, where messages are sent to arbitrary members of
the public who request the material. The closest analog might be Ham
radio, although Hams are licenced and thus not classed as general public.
They are also restricted in use. Of course "Ham radio" is a thing, not an
organization.

In addition, most type A systems do have some controls and checks and
balances. They do not have the "service to anybody who asks is mandatory"
rule of common carriers.

I would view each individual author as the publisher, and the system owner
as a tool in this case. On the other hand, I would support the right of
system owners to restrict *who* has access, if not necessarily what they
say.

Type B is also a new animal. Such systems are supervised, but supervised
after-the-fact. ie. any user can post any message, but the
SYSOP/supervisor/moderator can delete things after the fact. The amount of
this deletion ranges from almost none to moderate. Sometimes it is there
as an option, but never actually practiced. This needs a new type of law.

Type C is very close to a publication, and may not need a new type of law.
In this case, all messages must be approved before they go out -- ie. they
pass through a human being first. This is not too different from a
classical publication. However, in most such cases, the editors do not
truly act as editors. They merely select material based on
appropriateness to a forum. Only because the law requires it do they also
sometimes attempt to remove libel and criminal activity. The editors
almost never select material to match their own views, and it is not
assumed that postings reflect the editor's views.

Thus in A and B it is clear that the author is the publisher and the system
is the medium. In C the author and system operator are jointly involved in
publication. In D the system operator is the publisher, and the author is
just the author.

What new types of law? This we can discuss.

Type A:
Authors fully responsible for their postings. No liability for SYSOP
unless illegal activity deliberately encouraged. (ie. "The Phone Phreak
BBS" might have a liable SYSOP, but "Joe's Amiga BBS" would not be liable
if somebody posts a phone credit card number.)

NO complete anonymity. Author's names need not be revealed in the forum
itself, but a record should exist for the authorities in case of libel or
other illegal activity by an author. The sysop must maintain this list in
return for the limit of SYSOP's liability.

(Note SYSOPS still have the right to delete material, but not the
obligation.)

Type B:
Authors continue to be responsible for their postings. SYSOPS responsible
for illegal material which they are aware of but do not delete in a timely
fashion. Anonymity possible, if desired.

Type C:
Authors responsible together with SYSOPS for postings. If Author warrants
to SYSOP that material is legit, most liability goes to Author. SYSOP
must not permit any obviously illegal material, and delete any material
found to be illegal ASAP.

Type D:
Standard publication. No new law.

Brad Templeton, ClariNet Communications Corp. -- Waterloo, Ontario 519/884-7473

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

Subject: Another experience with the law
From: mailrus!iuvax!ndcheg!ndmath!nstar!watcher@UUNET.UU.NET(watcher)
Date: Thu, 27 Sep 90 04:01:01 EST
------------------------------

********************************************************************
*** CuD #2.05: File 5 of 7: Another Experience with the Law ***
********************************************************************


regarding the fbi investigation of the nuprometheus source theft:

i was a victim of this investigation. i lost my position at apple for
"mysterious reasons" that neither my agency nor my supervisor could
clarify. i was not "fired", as i was able to collect unemployment
following the incident. however, exactly what happened remains a mystery to
me. my story:

in approximately mid-to-late february of 1990, the feds (steven e cook and
his unnamed partner who didn't say much) went to one of apple's cupertino
facilities (vg6 to be precise) to visit my (now ex-) roommate. as he was at
home with the flu, they were not able to question him. two days later (this
would be a friday), they paid a visit to our house after not having found
him at work earlier that day. they proceeded to ask him many questions,
mostly about who he knew and how he knew them, and whether he had visited
certain individuals, such as henry s dakin. (dakin, as in dakin plush toys,
who operated an endeavour known as the 3220 gallery in san francisco, where
many interesting parties are known to take place.) they then asked him to
come to their office in s.f. for a polygraph examination. he told them he
would get back to them about this after consulting an attorney. attorney
said such examination was meant to trip him up, that they had no hard
evidence, and that he should decline and give them his (attorney's) phone
number if they had any questions. the following week, they called on each
of monday, wednesday, and friday (friday being the day he was to have gone
in) to make sure he didn't miss his appointment; all three times they were
given that "on the advice of my attorney..." he would not be there.

following monday at 8 am, the county sheriff appeared at the door to
arrest him on a four year old bench warrant. (county sheriff was required
instead of the city police as we lived in an unincorporated section at the
time, where city police would not have had jurisdiction.) he was arrested
and left to sit in a holding cell for many hours while paperwork was done.
it is interesting to note that the sheriff had a form with him with all
the pertinent information (name/address, etc), which noted steven e cook of
the fbi should be called (included phone number) if there were any
problems. the officer was not too pleased when he found that he was "doing
the fbi's work for them". i, however, stayed home (i guess this means i had
no warrants). the next day, at around three in the afternoon, i was told
that "some friends of mine were here to see me" and that i should get down
to the lobby immediately. lo and behold, steven e cook had appeared in my
building, having first determined my whereabouts from questioning my
roommate. i was questioned for about 45 minutes, mostly on the same
subjects as my roommate, along with several new and interesting twists
indicating that they had done very thorough homework, including examining
all the sign-in logs. i went back to my desk. i called my roommate.
someone answered his phone (whom i knew) and told me "i guess he doesn't
work here anymore." shortly after that, i went home for dinner, and as we
(some friends had appeared by this time) were all standing around just
about to leave, the phone rang, i answered it, and it was my agency
explaining that i was to go in TONIGHT and finish my project, and i was not
to go back tomorrow or thereafter. when asked from whom these orders had
come, the agency was unable to provide any details. this was tuesday, march
13th, nearly ten months after the nuprometheus incident.

some of the questions they asked me during my "interview" (the details are
fuzzy and i have forgotten most of the questions): do you know john draper?
how do you know him? how did you meet him? do you know henry dakin? how do
you know him? how did you meet him? who owns the house you live in? (we
were renting at the time, through an agency, i had no idea) since the phone
bill wasn't rightfully in anybody's name (phone company's mistake) it was
implied that we might be trying to defraud the phone company by providing
false billing information (never mind that we had always paid it in the
previous months).

after the incident and its resultant newspaper article (see san jose
mercury news, 15-march-1990, business section, front page), i found it
extremely difficult to obtain work, since any agency that heard about the
incident would "misplace" my resume and never call me again, and any
attempts to secure employment at apple resulted in purchasing and cch
telling the agency that i was "not allowed back", even before i had gotten
an interview. all this seems to have been started by an old, vicious,
enemy of my then-roommate's, who (it is assumed) claimed to the fbi that he
had overheard my roommate bragging about his involvement in nuprometheus at
a party. which amounts to heresay and witch-hunts.

one thing's for sure: if the fbi later determines it was wrong, i know damn
well that they're not going to go back and undo the damage. as of this
time, no charges have ever been filed, nor any search warrants served, nor
any equipment confiscated. perhaps i should consider myself lucky...? after
all, all i lost was my job ($52K/year) and my credibility.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: September 30, 1990
From: Assorted
Subject: Some views on what to do if questioned by LE agents

********************************************************************
*** CuD #2.05: File 6 of 7: Responses to "When the Law Comes..."***
********************************************************************

%A recent discussion on a newsnet (efftalk@netsys.com) covered the problem
of how to respond if questioned by law enforcement. The following synopsis
was distilled to cover only a few of the main points. The consensus there,
and from other sources, seems to be "don't volunteer anything" and to be
cautious when implied promises are made in turn for pre-Miranda
cooperation.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

My general impression was "call your lawyer first, talk later." You aren't
incriminating yourself by refusing to say anything without a lawyer
present.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Actually, some good simple rules that apply to any adversary or
investigator (press or police) are:

a) Don't talk if you have any reason to believe that they *think* or
suspect you of any wrongdoing. (Wrongdoing by their definitions, not
yours.)

b) If you must talk, *ask* questions, do not answer. And take care to make
sure your own questions do not contain answers. If you remember to always
ask a question, you put them on the defensive and confuse them, because
they think they are there to ask the questions. They may not be fazed,
but sometimes this is more fun than "no comment."

c) Be "fully" cooperative, but insist that everything take place in
writing. Say, "If you would be prepared to give a *complete* list of your
questions in writing, I will give them due consideration." This makes
them stop and think. (With the press, it also can add a delay which makes
them go away. If they insist on speed, tell them to fax the questions.
You are under no obligation to fax the answers back, even if you do
answer.) In this situation, you can't be accused of refusing to comment.
You are just being careful and getting documentation -- an admirable trait.

Get a complete list of questions -- make them understand they don't get to
ask any more -- that way you can sometimes figure their intent.

d) If you can slow it down, slow it down. Using writing is just one
example of this. Slowing it down is almost always in your advantage, and
not in theirs.

e) Scare 'em. It may not work, but tell them you are turning on your
camcorder or tape recorder while they do what they do -- for your records.
It may have no weight in evidence, and they may tell you to shut it down
(legally or not) but it will scare 'em. And it looks bad if they refuse
you your right to document events. These guys live by documentation and
paperwork. But they don't like it if they are stepping over the line.

And of course, if you think you are in serious shit, call your lawyer. Ask
if you are under arrest, and under what charge. If you are under arrest,
you have a right to call a lawyer (eventually). If you are not, you are
free to call a lawyer.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Best advice. *NEVER* volunteer *ANYTHING*. When they show up, you'll
probably be under stress -- and your mistakes will count against you. Get
A Lawyer.

|> b) If you must talk, *ask* questions, do not answer. And take care to make
|> sure your own questions do not contain answers. If you remember to always
|> ask a question, you put them on the defensive and confuse them, because they
|> think they are there to ask the questions. They may not be fazed, but
|> sometimes this is more fun than "no comment."

This won't last long; they think they are there to ask the questions and
will usually enforce this concept. This might work if you are not a
suspect.

|> c) Be "fully" cooperative, but insist that everything take place in writing.
|> Say, "If you would be prepared to give a *complete* list of your questions
|> in writing, I will give them due consideration." This makes them stop and

This will only work if you are not a suspect.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The first thing to do when talking with the police/SS/etc, is DON'T LET
THEM INTO THE HOUSE! Do your talking on the porch, sidewalk, their office,
etc. The SC has held that once the police are in your home, they are free
to walk through the house. Bring a lawyer if the questions are
questionable (so to speak).

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

> camcorder or tape recorder while they do what they do -- for your records.

If you're really desperate, you can get one of those home security systems
that (among other things) continuously films various rooms from hidden
cameras. Then you'll have a videotape of them telling you to turn off your
tape recorder. :-)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

A funny thing happened to me one day when I came home from school! There's
this car in my driveway a Crown Victoria with a siren in the front seat.
Well I speak from my own experience. Say Nothing unless you are confident of
your abilities to handle yourself. 90% of police work is done because
people rat on each other, and 10% is done cause the police (pick one)
harass, coerce, trick, etc people into admitting what they did. In my case
I talked the whole time rather threateningly too. The cop said "We know
you did it so why don't you admit it it will make it easier on you, your
parents, a nd us and if you make it easier on us the Judge will go easy on
you. Well I stood up and said you dont know Sh*t. And all of this was
infront of my parents and the cop wanted a lie detector and everything when
he said this my dad went crazy. "A Lie Detector?!!!" Well anyway to make a
long story short I didn't take a lie detector I didn't go to jail (I was
18) and I got an apology out of it...So If you didn't do anything don't say
anything or else say something unpolite! It will make you feel beter!

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: 30 September, 1990
From: Various Contributors
Subject: The CU in the News

********************************************************************
*** CuD #2.05: File 7 of 7: The CU in the News ***
********************************************************************

%"The items for CU in the news come from various contributors. We
especially thank Mike Rosen, who draws our attention to various items, and
Brian Kehoe. We also appreciate all of those contributors who submit
articles that we cannot print because of space constraints, duplication, or
other reasons. Even if they do not appear, they are beneficial and keep us
informed (moderators)%.

------------------------------

From: chron!magic703!edtjda@UUNET.UU.NET(Joe Abernathy)

"Computer Network gets Overseer"
(9/24/90, Houston Chronicle, Business Page 1)

By JOE ABERNATHY
Copyright 1990, Houston Chronicle

A newly formed non-profit corporation will bring Fortune 500 management
talent to the nation's increasingly troubled computer network matrix,
according to government and industry sources.

The corporation, Advanced Network & Services, is designed to bring order to
the vast Internet data telecommunications system, which has become a
frequent companion to controversy while enjoying a six-fold increase in use
since January.

The action is expected to pave the way for congressional approval of the
Federal High-Performance Computing Act, a comprehensive law that would,
among other things, pay to vastly expand the communications capacity of the
system. The legislation bogged down after the Houston Chronicle disclosed
the controversial aspects of Internet.

"We have a very valuable tool in the network and if we use it properly, it
can be a very valuable asset to the country," said Allan H. Weis, chief
executive officer of Advanced Network and a 30-year veteran of IBM, one of
three corporate partners in the new management firm.

Weis said that Advanced Network will provide day-to-day management and
monitoring of the Internet, which connects thousands of military,
educational and private computer networks. It also will serve as a model
for other such partnerships that could help develop and promote the
network's services.

The company was formed by IBM, MCI Communications, and Merit Inc. Merit is
a Michigan consortium that previously has managed the network under the
supervision of the National Science Foundation and will continue to fill
this role under the supervision of American Network.

There are still questions to be answered about the roles the various groups
will play in managing this system.

IBM and MCI, both of which sell equipment and services vital to networking,
provided $5 million each in seed money for the new corporation. It will
actively seek further investment by industry, and will impose the first
formal fee structure on the network, which only recently evolved from an
elite communications tool for scientists.

"Just as private contractors helped build the interstate highway system,
this new corporation will help build the national information superhighways
that today's information age demands," said Sen. Albert Gore Jr., D-Tenn.,
the sponsor of the legislation.

The heart of the computing act is the expansion of Internet into a "data
superhighway" that would link researchers, educators, homes and businesses
into a vast network of computing resources. The expanded Internet would be
called the National Research and Education Network, or NREN. It has been
likened to the telephone in terms of its expected impact on American life.

Internet first gained notoriety as the vehicle for the infamous Morris
Worm, a destructive program that paralyzed many of the nation's
high-performance computers in November 1988.

Pieced together over the course of 20 years on the tradition of trust
within the research community, the network is a tempting target for abuse
and the favored arena for hackers. At least 5 million people have access to
Internet, which links dozens of nations and which is scheduled to be
brought into the secondary schools of Texas.

In June, the Chronicle reported that the network was being used widely and
openly for purposes well outside its research mandate, such as political
activism and the distribution of pornographic art and literature.

Despite an investigation by the science foundation - which has been the
primary distributor of federal dollars for networking - the controversial
use continues, although reduced in scope.

"We observed the growth over the past few years and we looked at the
structure that we had ... and decided that a more formal structure on the
national level" should be put into place, said Weis. "Something this big
moves slowly, but it moves." The science foundation's future role in the
network is one of the few remaining aspects of the legislation that must be
decided. The NSF is well-respected for its leveraging of funds, and the
network infrastructure it molded is reliable and capable. But the
foundation has given scant attention to content, bringing it under fire for
the network's current state of virtual anarchy.

The Department of Energy wants future control of the network, but the
agency's viewpoint is considered too narrow, according to congressional
sources.

The vision of the Science Foundation combined with the IBM-style management
of Advanced Network is expected to satisfy critics.

"The NREN is such a big effort that the government can't do it by itself,
industry can't do it by itself, and academia can't do it by itself," said
Weis. "To make it successful it's going to take the joint effort of
government, industry and academia."

Advance Network will draw management expertise from MCI, IBM, Merit,
McGraw-Hill, and Merck, the pharmaceutical company known for its ability to
find practicality in cutting-edge research. McGraw-Hill, best known as the
owner of Business Week, is also in the textbook and information services
businesses.

"Wouldn't it be nice if we were able to provide, over the network, the
newest physics textbook, but the textbook was a living textbook in that you
could watch what happened when you applied additional weight to a fulcrum?"
said Weis, offering one example of an educational use for the superhighway.

Advanced Network will have an eight-person board of directors, initially
consisting of: Weis; Joe Dionne, president of McGraw-Hill; Joe Wyatt,
president of Vanderbilt University; Myra Williams of Merck; Richard West,
University of California system; Dr. John Armstrong, chief scientist of
IBM; Richard Leibhaber, executive vice president of MCI; and Dr. Douglas
Van Houweling of Merit.

Gore's computing act, which has the support of the Bush administration,
would allocate $2 billion over the course of five years to ensure the
nation's continued dominance in the field of high-performance computing.
The National Research and Education Network would receive $400 million of
this amount, with the rest going for related infrastructure.

"The interstate highway system would not have been built without a federal
commitment," said Gore in behalf of the package. "The federal government is
an essential catalyst for developing and demonstrating this technology."

The Federal High-Performance Computing Act is scheduled to be considered by
the full Senate before it adjourns in October.

A companion House bill, which was suspended following the Chronicle's
disclosure of Internet's misuse, will be returned to consideration after
approval of the Senate plan.

------------------------------

HACKER'S HOLIDAY ENDS


The Computer Misuse Act is now law, bringing into force three new criminal
offences.

Michael Colvin, the Conservative MP for Romsey whose successful Private
Member's Bill brought about the new Act has added his own stern warnings to
the computer world.

" The Act can only complement and not replace security procedures", he
said. "Users will have to examine their existing security procedures and
possibly redefine the authority of users of their systems if they are to
receive the full support of the law.

" My message to computer users is that Parliament has done its bit - now it
is up to you to do yours. It will provide a coherent regime for the
prosecution of those who misuse computers.

" This legislation has been framed specifically to deal with the new
mischiefs that modern technology has brought and the police now have the
power to prosecute computer misuse without the need, in some cases, to try
and stretch the existing criminal law.

" The legal position is plain. The Act gives a clear signal to the future
generations of would-be hackers that computer misuse is no longer tolerated
by society".

The new offences which came into force on August 29 are one of basic
unauthorised access with a penalty of up to six months imprisonment and
fines of up to two thousand pounds; unauthorised access with the intention
of committing a more serious crime and unauthorised modification of
computer data, both of which carry up to five years imprisonment with
unlimited fines.

Slightly modified from the original Law Commission Report on computer
misuse, the Act includes new jurisdiction rules to cover international
hacking.

Any offence will be prosecutable if it is conducted from or directed
against any system in the UK.

------------------------------

From: Computerworld, September 17, 1990, p. 150, Inside Lines:

"Steal this Modem"

Leemah Datacom Security Corp. recently wrapped up its second annual
challenge to hackers, who were given the chance to retrieve a secret
message stored in two PCs protected with a Leemah callback modem. While
hackers failed to break in, the challenge was not as big a success as
officials predicted. Even though the company added a second PC and
challenge site to accommodate what they thought would be a mass hacker
attack, only 2,009 hackers tried and failed to hack into the PCs compared
with nearly 8,000 failed attempts last year. Apparently, many hackers
feared that the company was cooperating with the government in a sting
operation.

********************************************************************

------------------------------

**END OF CuD #2.05**
********************************************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT