Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 25

  



Computer underground Digest Sun Apr 4 1993 Volume 5 : Issue 25
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copp Editor: Etaoin Shrdlu, Senior

CONTENTS, #5.25 (Apr 4 1993)
File 1--CPSR Wins SSN Privacy Case
File 2--Re: Debating the Virus contest - 1 (#5.23)
File 3--Re: Debating the Virus contest - 2 (#5.23)
File 4--Re: Debating the Virus contest - 3 (#5.23)
File 5--USPS Freedom of Information Act Requests
File 6--Collecting Cu Files (From "LOD")
File 7--CU in the news
File 8--Comments on SJG Decision (GRID News)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210;
in Europe from the ComNet in Luxembourg BBS (++352) 466893;

ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)

Back issues also may be obtained through mailservers at:
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Fri, 26 Mar 1993 17:03:43 EST
From: Marc Rotenberg <Marc_Rotenberg@WASHOFC.CPSR.ORG>
Subject: File 1--CPSR Wins SSN Privacy Case

CPSR Wins SSN Privacy Case

PRESS RELEASE

March 26, 1993

"FEDERAL APPEALS COURT UPHOLDS PRIVACY:
USE OF SOCIAL SECURITY NUMBER LIMITED
- - - -
CPSR Expresses Support for Decision"

A federal court of appeals has ruled that Virginia's divulgence of the
Social Security numbers of registered voters violates the
Constitution. The Court said that Virginia's registration scheme
places an "intolerable burden" on the right to vote.

The result comes nearly two years after Marc Greidinger, a
resident of Falmouth, Virginia, first tried to register to vote. Mr.
Greidinger said that he found it nearly impossible to obtain a
driver's license, open accounts with local utilities or even rent a
video without encountering demands for his Social Security number.

Mr. Greidinger told the New York Times this week that when the
State of Virginia refused to register him as a voter unless he
provided his Social Security number he decided to take action. He
brought suit against the state, and argued that Virginia should stop
publishing the Social Security numbers of voters.

This week a federal appeals court in Richmond, Virginia ruled
that the state's practice constituted "a profound invasion of privacy"
and emphasized the "egregiousness of the harm" that could result from
dissemination of an individual's SSN.

Computer Professionals for Social Responsibility (CPSR), a
national membership organization of professionals in the computing
field, joined with Mr. Greidinger in the effort to change the Virginia
system. CPSR, which had testified before the U.S. Congress and the
state legislature in Virginia about growing problems with the misuse
of the SSN, provided both technical and legal support to Mr.
Greidinger. CPSR also worked with Paul Wolfson of the Public Citizen
Litigation Group, who argued the case for Mr. Greidinger.

In an amicus brief filed with the court, CPSR noted the
long-standing interest of the computing profession in the design of
safe information systems and the particular concerns about the misuse
of the SSN. The CPSR brief traced the history of the SSN provisions
in the 1974 Privacy Act. The brief also described how the widespread
use of SSNs had led to a proliferation of banking and credit crime and
how SSNs were used to fraudulently obtain credit records and federal
benefits.

CPSR argued that the privacy risk created by Virginia's
collection and disclosure of Social Security numbers was unnecessary
and that other procedures could address the State's concerns about
records management.

This week the court of appeals ruled that the state of
Virginia must discontinue the publication of the Social Security
numbers of registered voters. The
court noted that when Congress passed the Privacy Act of 1974 to
restrict the use of the Social Security number, the misuse of the SSN
was "one of the most serious manifestations of privacy concerns in the
Nation."

The Court then said that since 1974, concerns about SSN
confidentiality have "become significantly more compelling. For
example, armed with one's SSN, an unscrupulous individual could obtain
a person's welfare benefits, or Social Security benefits, order new
checks at a new address, obtain credit cards, or even obtain the
person's paycheck."

The Court said that Virginia's voter registration scheme would
"compel a would-be voter in Virginia to consent to the possibility of
a profound invasion of privacy when exercising the fundamental right
to vote."

The Court held that Virginia must either stop collecting the
SSN or stop publicly disclosing it.

Marc Rotenberg, director of the CPSR Washington office said,
"We are extremely pleased with the Court's decision. It is a
remarkable case, and a real tribute to Marc Greidinger's efforts.
Still, there are many concerns remaining about the misuse of the
Social Security number. We would like to see public and private
organizations find other forms of identification for their computing
systems. As the federal court made clear, there are real risks in the
misuse of the Social Security number."

Mr. Rotenberg also said that he hoped the White House task
force currently studying plans for a national health care claims
payment system would develop an identification scheme that did not
rely on the Social Security Number. "The privacy concerns with
medical records are particularly acute. It would be a serious design
error to use the SSN," said Mr. Rotenberg.

Cable News Network (CNN) will run a special segment on the
Social Security number and the significance of the Greidinger case on
Sunday evening, March 28, 1993. The Court's opinion is available from
the CPSR Internet Library via Gopher/ftp/WAIS. The file name is
"cpsr/ssn/greidinger_opinion.txt". The CPSR amicus brief is available
as "cpsr/ssn/greidinger_brief.txt".

CPSR is a national membership organization, based in Palo
Alto, California. CPSR conducts many activities to protect privacy
and civil liberties. Membership is open to the public and support is
welcome. For more information about CPSR, please contact, CPSR, P.O.
Box 717, Palo Alto, CA 94302, call 415/322-3778 or email
cpsr@csli.stanford.edu.

------------------------------

Date: Mon, 29 Mar 1993 13:29:18 -0500 (CST)
From: THe ADvocate <anon@unix.ville.geo>
Subject: File 2--Re: Debating the Virus contest - 1 (#5.23)

In CuD #5.23, roy%burnflag.ati.com@HARVUNXW.BITNET(Roy) writes:

> Let's just say I decided to have a bomb making contest. This is for
> the purely scientific purpose of studying how bombs work, and allowing
> people to study different ways to defuse bombs. I am going to award
> some cash to the winner and publish the plans for making the bomb in
> my soon-to-be-released book called "The Little Black Book of Bomb
> Making Techniques".

This man has obviously never heard of the Anarchists cookbook.
The poor Mans James Bond or even Army Pub NN-XX Unconventional Munitions.
All available at a bookstore near you:-)

> So, the book gets published and sells lots of copies. Mark Ludwig
> arrives home one day to find that his place of residence has been
> destroyed by a huge bomb. It just so happens that the type of bomb
> used is the same award winning explosive device as I published in my
> book.

Kinda like the peoples whose homes get blown up by White supremacists
or clinics bombed by anti-abortion fanatics?

> Surely, Mr. Ludwig would not hold me responsible for the destruction
> of his home caused by someone who decided to implement the plans I
> presented purely for "scientific research purposes".

Too date, no case has been carried against a publisher for this
kind of material. Soldier of fortune magazine was struck in a
case for libel regarding publishing an ad for Murder for Hire
services. I am not sure of the status of the case.

> Roy Batchelor / Burn This Flag BBS / San Jose, CA / 408-363-9766 /

Apparently mr Batchelor is not aware of the first amendment of this
country. Publishing of ideas, is encouraged, even when they can lead to
harmful activities. After all the founding fathers were
publishing materials on how to overturn an empire and slaughter
Government soldiers.

Todays revolutionary is often times tomorrows government leader. Look
at Begin in Israel or Mandela in South Africa. Our own government
gets plenty cozy with numerous Armed revolutionaries.

If something is a crime, the justice system will cope. And if it
can't why am I paying taxes? Men like mr Batchelor would like to
destroy the first amendment on the basis of protecting society.

Drugs are a serious problem. Mnay of them are easily synthesized.
Would you prohibit publication of books that show how to synthesize
organic molecules because someone might make some drugs that some
addict may get hooked on and later burglarize your home looking for
cash?

Solid police work and solid education are the methods of a civilized
society. Not puritanical methods.

THe ADvocate.

------------------------------

Date: Mon, 29 Mar 93 11:15:00 PST
From: erikn@BOA.MITRON.TEK.COM(Erik Nilsson)
Subject: File 3--Re: Debating the Virus contest - 2 (#5.23)

Roy Batchelor Writes:

> Surely, Mr. Ludwig would not hold me responsible for the
> destruction of his home caused by someone who decided to implement
> the plans I presented purely for "scientific research purposes".

And Mr. Ludwig would be right. In fact, there are lots of Little
Black Books of Bomb Making Techniques in existence, and a News
conference (Alt.rec.fireworks) that could also fairly be named
Alt.rec.explosives.manufacture or Alt.rec.bombs. Yes, people do blow
things up for the fun of it, and it turns out that we live in some
facsimile of a free society where you can say and think a pretty wide
range of things, and even do a pretty wide range of things, without
much more than applying for a permit without drooling on yourself.

If I write a book on gravity, and someone tries to drop a piano on
you, do you think you have a case for some reason?

For me, the analogy with viri is imperfect, because I can't imagine
why someone would waste their time writing one. Of course, people
could fairly wonder why I get several dozen of my friends together at
least once a year to burn, detonate, and obliterate objects of varying
artistic value.

In any case, I consider credit databases, CNID, and the FBI wiretap
proposal far more dangerous to my way of life than computer viri.

Oh yes, here's a simple bomb:

1. Apply for an explosives handling permit from your state Fire
Marshall. Tell them you have a few stumps that you need to get rid
of.

2. Take the permit and your driver's license to your local farm supply
store, and buy the following:
- Explosive of your choice. Dynamite has a quaint charm, but the
plastic stuff is better.
- A blasting cap.
- A firing kit.
- Several pounds of concrete anchors.
- A roll of duct tape.

3. If it isn't obvious what to do from here, you shouldn't be making
bombs.

4. Modern explosives are probably a lot more powerful than you think.
Start with small amounts, a LONG WAYS away from where you are.
Wear ear and eye protection. Be careful, etc, etc.

A friendly warning: this is not a good way to make a bomb that is
really going to upset anyone, since commercial explosives are widely
reputed to have impurities imbedded in them for tracing.


Here's the infamous "Dry Ice Bomb," this version off of
Alt.Rec.Fireworks (posted by Eric Donaldson):

- dry ice
- water
- container
- a cap that fits tightly on the container

- Mix in an open environment.
- [apply the cap & run like hell (always "like hell" on
principle, you never "run laconically" from an imminent
explosion)]
- Wait somewhere btw 1-30 minutes.
- and do not go near unless you want to risk your life.

I'd like to emphasize this last point. It's a good idea to have some
sort of firearm handy to trigger the thing if it fails to go off by
itself, so you don't spend all afternoon throwing rocks at it (you can
NOT just leave it for someone to find.). I personally would not do
this with a glass container, 2 liter plastic bottles work just fine.
Dry ice bombs are pretty safe, unless you have a short attention span.

Do not handle dry ice with your bare hands.

You might want to check local laws before making one of these, as they
are major illegal in some places.

For more info, try Alt.Rec.Fireworks, Protechnic Guild International
(18021 Baseline Avenue, Jordan, MN 55352), or American Fireworks News
(Star Route Box 30, Dingmans Ferry, PA 18328).

Here's an older list of pyro BBSs:

Name Phone Number Location
Evergreen Micro (206)452-2012 Port Angles, WA
Exchange of Byte(206)692-7301 Silverdale, WA
Jimby BBS (206)698-1044 Brownsville, WA
West Coast Pyro (209)661-5355 Madera, CA
Sundial (509)545-1789 Pasco, WA
Spokane Data (509)747-5199 Spokane, WA
The Hideaway (509)586-0104 Kennewick, WA
Strikezone (509)586-6803 Kennewick, WA
FOG-Line (515)964-7937 Des Moines, IA
Empire BBS (516)325-0827 Eastport, NY
VAXCat (603)424-0923 Merrimack, NH
Babble Board (603)267-5921 Belmont, NH
Nuke-Zone (603)474-8915 Seabrook, NH
jBBS (619)221-0311 San Diego, CA
Starhelm (619)479-3006 San Diego, CA

Maybe somebody has a newer list, I'm not sure how many of these are
still up. I fergit who I got most of this info from, but thanks
anyway.

I hope this helps.

------------------------------

Date: Mon, 29 Mar 1993 18:12:35 -0500
From: Mike McNally <mcnally@EECS.UMICH.EDU>
Subject: File 4--Re: Debating the Virus contest - 3 (#5.23)

In article <1993Mar28.222658.9625@chinacat.unicom.com> "Roy Batchelor" writes:

>This note is in reference to the current issue of CuD and the all the
>discussion of Mark Ludwigs' virus writing contest.
>
[...]
>
>So, the book gets published and sells lots of copies. Mark Ludwig
>arrives home one day to find that his place of residence has been
>destroyed by a huge bomb. It just so happens that the type of bomb
>used is the same award winning explosive device as I published in my
>book.
>
>Surely, Mr. Ludwig would not hold me responsible for the destruction
>of his home caused by someone who decided to implement the plans I
>presented purely for "scientific research purposes".

Though I'm sure you meant this sarcastically, I'll take it at face
value. In such a situation *I* wouldn't blame you, I'd blame the
person responsible for setting the bomb. If you were run over by a
drunk driver, who would you blame? Henry Ford? Jack Daniels? Mobil
Oil, for selling the driver the gas the car needed to run?

The responsibility for such an action belongs completely to the
person who initiates the action, not the thousands of people involved
in making the whole situation possible. Why not blame the authors of
MS-DOS for writing an OS that's such an easy host for viruses?

------------------------------

Date: Fri, 2 Apr 93 21:28:37 MST
From: mrosen@NYX.CS.DU.EDU(Michael Rosen)
Subject: File 5--USPS Freedom of Information Act Requests

In issue #42 of Phrack there was an article about the USPS' practice
of selling change of address information without consumer consent. I
sent the supplied form letter and carbon copied my congressman and
senators. Today I received a reply from the USPS Records Office.

April 1, 1993

Dear Mr. Rosen:

This concerns your recent Privacy Act request for accountings of
disclosure of mail forwarding information you have provided to
the Postal Service.

Disclosure of your forwarding address might have been made to
individual requesters by post offices or to subscribers to the
National Change of Address File (NCOA) by an NCOA licensee. The
NCOA is a consolidated file of all forwarding information
provided by postal customers and stored on automated media.
Listholders may subscribe to NCOA to obtain the new addresses of
individuals for whom they already have in their possession the
old address.

For disclosures made by post offices, we are in the process of
querying the Washington, DC postmaster for any accountings.

For disclosures made from the NCOA system, we will begin querying
NCOA licensees all of which keep logs identifying the particular
subscribers to whom they have given NCOA information. This
accounting will not identify with certainty the subscribers who
have in fact received your new address, but will give you a list
of all subscribers receiving NCOA service for the relevant time
period and thus might have received your address.

Because a large number of requests like yours are being received,
there will be a delay in responding. Requests are being
processed in order of receipt and you will be sent the
accountings as soon as possible. Your patience is appreciated.

------------------------------

Date: Tue, 30 Mar 93 22:39:29 EST
From: lodcom@MINDVOX.PHANTOM.COM(LOD Communications)
Subject: File 6--Collecting Cu Files (From "LOD")

Thank you for requesting information about the Hack/Phreak
Underground BBS Message Base Files. The first Price Listing of
completed message base Files will be sent to you via email in early to
mid April 1993. Until then, the following background information
should provide you with a better picture of this undertaking.

A significant portion of now retired computer underground
participants (hackers and phone phreaks) have expressed an interest in
seeing all of those old messages they posted on various underground
hacker bulletin boards during their respective 'careers'. This is
especially the case for those who never downloaded the messages; sold,
gave away, or chucked their disks; and those who were visited by law
enforcement officials who TOOK EVERYTHING including that suspicious
looking toaster 8-/. In addition to this crowd, those who have come to
the 'scene' relatively recently are keenly interested in what their
'forefathers' talked about and what computer systems and networks they
were into. This interest, and the growing curiosity of corporations,
security professionals, and the general public to know what all those
'hacker kids' were REALLY up to (starting World War III of course!) is
the reasoning behind this undertaking.

Basically, LOD Communications is creating a Historical Library of
the dark portion of Cyberspace. Throughout history physical objects
have been preserved for posterity for the benefit of the next
generation of humans. Cyberspace however, isn't very physical; data
contained on floppy diskettes has a finite lifetime as does the
technology to retrieve that data. Most of the underground systems
operated at a time when TRS80's, VIC-20's, Commodore 64's, and
Apple //'s were state of the art. Today, it's difficult to find
anyone who has one of these machines in operating condition not to
mention the brain cells left to recall how to operate them. :(

The aim of the project is to acquire as much information as
possible which was contained on the underground hack/phreak bulletin
boards that were in operation during a decade long period dating from
the beginnings (1979, 80 - MOM: Modem Over Manhattan and 8BBS) to the
legendary OSUNY, Plovernet, Legion of Doom!, Metal Shop, etc. up
through the Phoenix Project circa 1989. Currently messages from over
40 different BBS's have been dug up although very few message bases
are 100% complete. Not having a complete 'set' does not diminish their
value however.

As happens with most projects, the effort and monetary investment
turned out to be substantially more than originally anticipated.
Literally hundreds of man-hours have been spent copying dusty apple ][
disks, transferring them to IBM (or typing in hard copy versions when
electronic versions were unavailable), organizing the over one
thousand individual files according to what BBS the messages were
originally posted on, and splicing the files together. Also, after
consulting with the appropriate civil liberties organizations and
actual legal counsel, a very slight editing of the messages restricted
to long distance access codes, phone numbers, and computer passwords
had to be made to ensure that there is nothing illegal contained
within the messages. Every effort was made to keep the messages in
their pristine condition: 40 columns, ALL CAPS, spelling errors,
inaccuracies of various kinds, and ALL.

In order to at least break even, a dollar value has been attached
to each set of message bases. The dollar values were determined based
on the following conglomeration: the number of years ago the BBS
operated, its popularity and message content, whether the BBS or
portions thereof were deemed 'Elite' (and therefore restricted access
to but a small number of users), and the total number of messages
compiled. The prices were kept as low as possible and range from $1.00
to $9.00 for each Copyrighted (c) 1993 by LOD Communications, H/P BBS
message base set. Most sets include [in addition to the messages
themselves]: a historical background and description of the BBS, any
tutorials aka "G-Philes" that were online as well as downloaded
userlists if available. Due to the economics involved in diskettes,
snail mail costs, and filling orders, a minimum order of $20.00 is
required. Corporations and Government agencies must order the complete
set and pay a moderately higher rate. The files will be available in
IBM (5.25 or 3.5 inch), Amiga, and Apple MacIntosh formats and orders
are expected to arrive at the requestors' physical mail box in 2-4
weeks upon receipt of the order. Paper versions can be ordered but
cost double (many messages are of 40 column format and therefore
wastes lots of paper) and take twice the time to deliver.

These Files will hopefully provide those who were not part of the
underground experience to learn what it was all about instead of
relying on those often slanted (negatively) accounts found in the
press. How much did the hackers and phone phreaks who used these
bulletin boards know and how did they find it out? Did they have the
capability to shut down phone service of Area Code proportions, could
they ruin someone's credit, could they 'move satellites in the
heavens', could they monitor packet switching network conversations?
The answers lay within the messages which were painstakingly collected
and are currently being organized into Files. Your patience is
appreciated.

LOD Communications: Leaders in Engineering, Social and Otherwise

Email: lodcom@mindvox.phantom.com
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
603 W. 13th
Suite 1A-278
Austin, Texas 78701

------------------------------

Date: 28 Mar 93 15:37:16 EST
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 7--CU in the news

Virus Advert Censored
=====================
The British Advertising Standards Authority has asked Total Control
Ltd (U.K.) to stop running a particular ad for the VIS Anti Virus
Utilities package. The ad appeared in a March 1992 edition of PC
Week. ((Moderators' note: yes, 1992)

The ad features two diskettes lying on pillows next to each other
in bed. The headline read ''Before you put it in...make sure you
know where it's been!''. The Authority found this to be offensive.
(Infosecurity News. March/April 1993. Page 8)

Tiger Team Penetrate IRS Computers
===================================
A so-called ''Tiger Team'' of internal security agents has successfully
penetrated two IRS computers, and were active in the system for seven
days without being detected, according to a Knight-Ridder report.

Agents posed as IRS employees ((not too difficult, considering they
were! just kidding. - Moderators')) and entered facilities at Memphis,
Tenn. and Ogden, Utah locations. Once inside they installed programs
to steal passwords by capturing keystrokes. Later they used the
stolen passwords to infiltrate the systems.
(Infosecurity News. March/April 1993. Page 8)

Computer Sabotage By Employees
==============================
The March 8, 1993 issue of Information Week has a lengthy excerpt from
_Sabotage In The American Workplace_. (Pressure Drop Press, San
Francisco) Although the book has anecdotes from all types of workers,
the Information Week extracts focus on those involving the use of
computers.
The following five stories are featured:
- A programmer who planted a logic bomb.
- A technician who undermined sales efforts.
- A technical writer who works on outside projects during
throughout the day.
- A system designer who resolves problems by erasing data.
- A stockbroker who generates random buy/sell transactions
to see how the market will react.

For more information see "Sabotage: They're Mad, They're Bad, They
Just Don't Care. Workers Tell How They Use Computers to Strike
Back". Pages 34-48

Price Waterhouse's Hackers For Hire
===================================
The Big Six accounting firm of Price Waterhouse is offering clients
a "Security Penetration Study" in which former hackers and computer
security experts will assess a systems security by attempting to
break into it. Other services, such as employee awareness programs,
are also offered.
(Information Week. March 15, 1993. Page 8)

PC's and Households
===================
A Software Publishers Association (SPA) survey of 672 US households
found that college graduates were twice as likely to have personal
computers as non-graduates. Of the homes that had PC's, 56% boasted
a household income in excess of $50,000. The survey also found that
75% of home computers are MS-DOS based, with more than half of those
being 386 or 486 machines. Respondents also admitted that 40% of
their entertainment software had been copied from friends, work, or
school.
%Moderators' Note: We'd speculate that much more than 40% of business
software used at home is copied from others.%
(Information Week. March 15, 1993. Page 66)

AT&T Collects from Jiffy Lube
=============================
A US District Judge in Maryland has ruled that the automobile service
company Jiffy Lube is responsible for fifty thousand dollars in
unauthorized phone calls placed on its 800-number. Jiffy Lube had
argued that it shouldn't be held liable for calls it did not authorize
nor place, but the judge found that AT&T's tarrifs specify that
customers are responsible for all calls.
(Information Week. March 22, 1993. Page ??)

Piracy Down, Jobs Still Lost
============================
Windows Magazine (March 1993, pg 32) reports that although the SPA
says business software piracy fell by 41% in 1992, it still represents
a $1.2 Billion loss to the industry. That money is great than the
cumulative revenue of 81 of the top 100 independent software developers.
The SPA also estimates that stolen software cost 60,000 jobs in the
industry.

------------------------------

Date: Tue, 30 Mar 93 08:53 EST
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
Subject: File 8--Comments on SJG Decision (GRID News)

GRID News. March 30, 1993.
ISSN 1054-9315. vol 4 nu 2.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
(74 lines) Reflections of an Author and Publisher
on Judge Sam Sparks' Decision
by Michael E. Marotta mercury@well.sf.ca.us

Grid News was launched in 1989. While Jolnet and PHRACK were
being busted, I was a participant in the White House Conference on
Library and Information Services. As a result of that bust, I
applied for and received the ISSN designator from the Library of
Congress. I wanted it perfectly clear that Grid News is a
publication. (After its first volume, I obtained an ISSN for
HERMES, a cybercast periodical for economic topics.)

What disturbs me about Judge Sparks's ruling are these words:

In any event, the Court declines to find from a
preponderance of the evidence that on March 1, 1990,
Agent Foley or any other employee or agent of the United
States had reason to believe that property seized would
be the work product materials of a person believed to
have a purpose to disseminate to the public a newspaper,
book, broadcast or other similar form of public
communication.

Foley and Kluepfel were recognized by the court to be experts in
computers. Yet, the court did not expect them to recognize a BBS
as a "form of public communication." This is disturbing. Earlier
this week, I received a file from Bitnic about the "Clinton-Gore
Initiative." That we can link everyone in America to the same
fiberoptic network and not have "public communication" is beyond
reason.

I wrote a book about codes and ciphers (available from Loompanics,
P. O. Box 1197, Port Townsend, WA 98368. $13.95 w/s&h). This
week, I have the proceedings from Crypto 85 and Crypto 86 and I
enjoyed reading Adleman's attack on Shamir's quadratics. However,
these guys should be warned that merely attempting to break
someone else's cipher is suspect in the eyes of the law.

Judge Sparks said: "Kluepfel had legitimate concerns, both about
the 911 document stolen from Bell South and the possibility of a
decryption system which could utilize passwords in rapid fashion
and could result in intrusions of computer systems, including those
of the Bell System." And later, he ruled: "If the Secret Service,
in the performance of executing Court order, had only obtained and
taken the 911 document or alleged decryption materials,
application of the definitions of "documentary materials" and
"work product materials" would logically result in no violation of
the statute under the circumstances of this case."

It seems that merely attempting decryption can make you the target
of a Secret Service bust. Someone better warn the SETI folks and
maybe Dr. Lilly ... (:-)

The darkest shadow is cast by these words from the conclusion of
the ruling: "It may well be, as the Government Defendants contend,
these statutes relied upon by the Plaintiffs should not apply to
the facts of this case, as these holdings may result in the
government having great difficulties in obtaining information or
computer documents representing illegal activities. But this Court
cannot amend or rewrite the statutes involved. The Secret Service
must go to the Congress for relief. Until that time, this Court
recommends better education, investigation and strict compliance
with the statutes as written."

I suggest that the Secret Service and the telcos will in fact
devote their resources to lobbying Congress for tougher laws and
will not spend much effort on education within their ranks.
Caveat computor.

------------------------------

End of Computer Underground Digest #5.25
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT