Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 05 Issue 51
Computer underground Digest Sun July 11 1993 Volume 5 : Issue 51
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Editor: Etaoin Shrdlu, Seniur
CONTENTS, #5.51 (July 11 1993)
File 1--Introduction to the AIS BBS Controversy
File 2--Response to RISKS' Anonymous Post attacking AIS BBS
File 3--Response to Anonymous: AIS BBS
File 4--A User's View of AIS BBS
File 5--Fear and Loathing: On the Virus Code Trail at AIS
File 6--Media, Anti-virus personnel, Ethics, and AIS
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Thu, 8 July 1993 21:39:01 CDT
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--Introduction to the AIS BBS Controversy
A recent (Vol 14, #58) issue of Risks Digest contained an anonymous
post that attacked AIS BBS and it's sysop, Kim Clancy. The AIS board
is a service of the U.S. Department of Treasury's Bureau of Public
Debt. "AIS' is an acronym for "Automated Information System," and the
board provides security-related information to its users.
AIS downloadable files included a broad range of texts files related
to computer security, "hacker" culture, and computer technology, along
with other files readily available on any public access system. A few
anti-virus folk complained about the virus source code that was
available on the board. According to CuD sources, at least one British
anti-virus specialist publicly condemned the board and urged
colleagues to voice complaints.
An "anonymous" poster, later revealed to be Paul Ferguson, an
anti-virus specialist, wrote the anonymous Risks post. The story was
picked up by Joel Garreau of the Washington Post a few weeks later,
and on July 6 prompted Edward J. Markey, Chair of the House
Subcommittee on Telecommunications and Finance, to contact Lloyd
Bentsen, Secretary of the Department of the Treasury, to voice
concerns (see forthcoming CuD 5.52 for comments from Rep. Markey's
office) about the AIS BBS.
In my view, this incident has been blown out of proportion by some of
the anti-virus crowd and their supporters, by the media, and
especially by Rep. Markey. In this issue, we examine the background
of the incident as it began in Risks, and include some commentary.
------------------------------
Date: Mon, 21 Jun 93 22:54:12 CDT
From: Jim Thomas <cudigest@mindvox.phantom.com>
Subject: File 2--Response to RISKS' Anonymous Post attacking AIS BBS
((The following appeared in Risks Digest, #14.68, ten issues after
the original post appeared)).
In Risks (Vol 14 #58) appeared a post, part of which is reprinted
below, that makes us appreciate freedom of speech and information
exchange we enjoy in the U.S. The primary risk I've learned after
reading the post is that anonymous posters with an axe to grind are
potential threats to freedom of expression.
Two anonymous posters falsely depict AIS BBS, a bulletin board run by
Dept of Treasury/Office of Public Debt personnel as a public
information service, as a board engaged in "unethical, immoral, and
possibly illegal activities:"
>Date: Fri, 7 May 93 11:18:17 -0500
>From: Anonymous <nowhere@bsu-cs.bsu.edu>
>X-Notice: This message was forwarded by a software-
> automated anonymous remailing service.
>
>This text was forwarded to me by a friend and professional colleague
>in the UK. I am dismayed that this type of activity is being condoned
>by an American Governmental Agency. I can only hope that this
>operation is shut down and the responsible parties are reprimanded. I
>am extremely disturbed by the thought that my tax money is being used
>for, what I consider, unethical, immoral and possibly illegal
>activities.
>
> ---- begin forwarded message -------------
>
>AIS BBS Capture log.
>
>To: all interested parties, especially Americans who may wish to ask
>relevant questions of relevant people.
>
>Capture log from a BBS that claims to be run by the US Treasury
>Department, Bureau of the Public Debt. Notice - I have not verified
>that the US government is actually running this BBS, only that the BBS
>claims that it is.
The remainder of the anonymous post presents screen captures of
directories and files to which the poster objects. Especially
troublesome for the anonymous accusers are virus-oriented files.
AIS is a reputable and professionally run open-access BBS.
It has one of most extensive collections of text and other files
related to all aspects of security in the country. Some may object
to some of the materials, just as some might object to RISKS DIGEST or
CuD being "funded" with taxpayers money. It strikes me as
reprehensible to take selected material out of context and piece
together an image of immorality or worse by presenting a misleading
image of the materials on the BBS and the purposes for which those
materials are intended. That the accusers make their claims while
hiding behind the cloak of anonymity strikes me as the type of
cowardice associated with witch hunts.
The anonymous posters seem to be bothered by the existence of virus
source code on the board. I wager one would learn far more about virus
writing and distribution tactics from VIRUS-L than from the AIS files,
but the two anonymous posters seem to be part of a handful of strident
pseudo-moral entrepreneurs who feel that only the information they
judge as appropriate for public consumption should be made available.
I'm surprised that the anonymous critics did not also include a demand
that public libraries also be closed.
It is one thing to disagree with the position of another and raise the
contentious issues as a matter of public debate. It is quite another
to engage in the cowardly act of anonymously distorting the function
of a legitimate and widely-used BBS by insinuating "unethical,
immoral, and possibly illegal activities."
CuD ran an interview with the AIS BBS personnel (CuD 4.37, 1992), and
a few excerpts may put the purposes of AIS BBS in perspective:
*** begin excerpts ***
Q: What is this Board? (name, number, who runs it (dept & sysop).
What kind of software are you using? When did the Board go
on-line?
A: The Bulletin Board System (BBS) is run by the Bureau of the
Public Debt's, Office of Automated Information System's Security
Branch. The mission of the Bureau is to administer Treasury's
debt finance operations and account for the resulting debt. The
OAIS security branch is responsible for managing Public Debt's
computer systems security. The AIS BBS is open to the public and
the phone number for the Board is (304) 420-6083. There are
three sysops, who manage the Remote Access software. The BBS
operates on a stand-alone pc and is not connected to any of other
Public Debt systems. The Board is not used to disseminate
sensitive information, and has been up operating for the past 15
months. <<This interview was as of mid-1992 - jt>>
Q: What are the goals and purposes of the Board?
A: The BBS was established to help manage Public Debt's security
program. Security managers are located throughout Public Debt's
offices in Parkersburg, WV and Washington DC. The security
programmers saw a need to disseminate large amounts of
information and provide for communication between program
participants in different locations. Because the Board was
established for internal purposes, the phone number was not
published. However, the number was provided to others in the
computer security community who could provide information and
make suggestions to help improve the bureau's security program.
Gradually, others became aware of the Board's existence.
Q: What kinds of files and/or programs do you have on the Board?
Why/how do you choose the files you have on-line?
A: There is a wide variety of files posted. In the beginning, we
posted policy documents, newsletter articles from our internal
security newsletter, bulletins issued by CERT, such as virus
warnings, and others for internal use. I located some
"underground" files that described techniques for circumventing
security on one of the systems we manage. The information, from
Phrack magazine, was posted for our security managers to use to
strengthen security. When we were called by others with the same
systems, we would direct them to those files as well.
Unexpectedly, the "hacker" that had written the file contacted me
through our BBS. In his article he mentioned several automated
tools that had helped him take advantage of the system. I
requested that he pass on copies of the programs for our use. He
agreed. This is how our "hacker file areas" came to be. Other
hackers have done the same, and have we also received many files
that may be useful. It is, indeed, an unusual situation when
hackers and security professionals work together to help secure
systems. However, this communication has been beneficial in
strengthening an already secure system.
Q: How did you get the idea to set it up?
A: The security branch accesses many BBSs on a daily basis for
research purposes, information retrieval and to communicate with
others. Since our security program is decentralized, the BBS
seemed to be an effective way of communicating with program
participants in diverse locations.
<end excerpts>
Perhaps the anonymous accusers are correct: Some types of information
may pose a risk if abused. But, in an open democracy, the potential
for abuse has been neither a necessary nor a sufficient justification
to silence those with whom we disagree. If potential for abuse were a
primary criterion for suppressing the flow of information and freedom
of expression, we would live in a rather silent world, and there would
likely be no RISKS digest (which arguably subverts the national
interest by undermining faith in computers and in government, all of
which is largely done with public funding).
Hiding behind anonymity to reduce the risks of accounting for their
accusations, the anonymous posters call not only for silencing, but
for sanctions against the sysops.
This suggests several risks:
1) Posters who are unwilling to accept responsibility for their
claims are more able to distort information in ways that
leave the target vulnerable and unable to face their accusers.
2) Anonymous posters who call for silencing and sanctions on the
basis of unexamined and questionable claims create a chilling
effect on freedom of expression.
3) Anonymous posters with an apparent axe to grind contribute to
poisoning the well of free information and reduce the opportunity to
openly discuss and debate issues.
Our society can far more readily tolerate the existence of information
that some may find inappropriate than we can risk the censorship of
information because it offends a few zealots engaged in a form of
cyber-guerilla warfare by making anonymous claims.
Jim Thomas
Cu-Digest
Sociology/Criminal Justice
Northern Illinois University
DeKalb, IL 60115
------------------------------
Date: Thu, 13 May 93 12:46:19 EDT
From: Frank Tirado <SYSADMIN@ERS.BITNET>
Subject: File 3--Response to Anonymous: AIS BBS
I'm concerned about the implications of message contributed by
"Anonymous" on the AIS BBS. The message implies that surely any
"right-thinking" person would agree with the statements presented. So
sorry! I have a totally different opinion as regards the conclusions
presented by "Anonymous".
First, lets get a few things out in the open:
a. The AIS BBS is a real BBS run by the Bureau of Public Debt.
b. Its phone number is (304)420-6083
c. While the BBS does post virus source code, these comprise at most
about 40 files, a minute fraction of the files available on the
board. (In fact, I have several HUNDRED virus sources in my
collection, none of them acquired from the AIS BBS)
Both "Anonymous" and his/her UK colleague decry the fact that virus
source code is available from the BBS and label it a virus exchange
board. The truth is that the board provides these and other files to
individuals who are for the most part security professionals who have
a very real interest in the workings of viruses and other types of
underground activities.
"But", you say, "there's no security! Anyone could get on the board
and get access to all that nasty source code!" Well, its possible but
so what? What about all those underground boards where it is possible
to leech entire file bases of virus source code AND live viruses?! By
comparison, attacking a board which serves mainly security
professionals is a purely picayune endeavor. Besides, almost to a one
those who frequent virus exchange boards are leery of the AIS BBS
because its a FEDERAL BOARD! It just HAS to be a sting!
"Anonymous" expresses concern about what he/she considers "unethical,
immoral and possibly illegal activities". This is simply an opinion;
obviously, my opinion is diametrically opposite, and just as strongly
held as that of "Anonymous". Who's to say who's right, who's wrong?
Besides, the law that says viruses are illegal has yet to be passed,
not to mention formulated, here in the US. In addition, "Anonymous"
neglects to point out in what way virus source code is immoral and
unethical. I imagine that falls under the category of what every
right-thinking person "knows".
"Anonymous" and his/her colleague pretend to remain anonymous for
reasons of privacy and fear of reprisals. Let's be real here! Is the
Bureau of Public Debt going to send the BBS police to their homes to
rip out their PC's?; hire a squad of Palestinian hitmen to shoot them
full of holes? For having simply expressed their opinions? Not at
all. The only possible reason for anonymity is that they have some
kind of vested interest in shutting down this BBS. The original
message was forwarded to "Anonymous" by his/her colleague in the UK.
The UK? Gee, that's odd. At a recent conference in New York, Alan
Solomon specifically targeted the AIS BBS. Could it be these two
individuals are one and the same?....... Perhaps if "Anonymous" and
colleague reveal their real names we'll have a better idea of their
true motives.
Then again, maybe I'm the one who's wrong. I should join them and
after we shut down the AIS BBS we can shut down the boards which carry
hacker files. We can follow that up by shutting down the ones which
provide information on how to build explosive devices. We can
continue with the libraries, because they're bound to have something
offensive, too.
Knowledge is not going to go away just because we don't like it or
because we don't want it in someone else's hands. Shutting down a BBS
simply because it carries source code is, in this case, at best petty.
Shutting down the AIS BBS for this reason will deny security
professionals a valuable resource. Most importantly, shutting down the
AIS BBS will do nothing to stop the proliferation of virus source and
live viruses. "Anonymous" and his/her colleague will have achieved
nothing, no one will have benefited.
------------------------------
Date: Thu, 20 May 93 11:52:18 EDT
From: Paul Melka <no.net@address>
Subject: File 4--A User's View of AIS BBS
After reading the Risks 14.58 issue concerning the US Treasury
Department's Bureau of Public Debt BBS, AIS BBS, I feel like I must
respond to some of the claims of the anonymous writer. First, as a
security professional, I have found the information on the AIS BBS
extremely helpful to me in the performance of my job. This
information is provided primarily for the use of the BPD, and is made
available upon request to other interested parties. This board is not
the only security-related board in the country. There are a number of
other boards, such as ComSec, that provide similar information to
security professionals.
Second, although the board does provide virus disassemblies and hacker
files, this information is for the use of security professionals to
help in their understanding of the inner workings of viruses, or to
see possible security holes in their systems that are common knowledge
to crackers and phreakers. This information is of little or no use to
budding virus writers or hackers because there already are a plethora
of virus exchange boards or hacking boards that are very easy to get
access to. In fact you can go to your local book store and order a
copy of Mark Ludwig's Little Black Book of Computer Viruses. This
book would be much more helpful in learning about how to write a
computer virus, than any disassembly could possibly be. Maybe we
should go back to book burnings too!
Third, the board provides a neutral area for security professionals
and "hackers" to have the opportunity to exchange view points. All
someone has to do is scan the user list to see the number of security
professionals and anti-virus professionals that have been on the
board. If this board is so tainted, what are all these respected
professionals doing on the board?
Finally, the anonymous writer's fear of reprisal is ridiculous. The
last thing that the FBI or Secret Service or anyone else is going to
worry about is a board that is legitimately helping to increase the
level of security awareness among professionals. What is the Treasury
Department going to do to this individual - raise his taxes?
This board is very professionally run and is one of the most positive
benefits of my tax dollars that I have seen. The anonymous sender
ends by asking, "Who watches the watchers?" and I can only respond,
each and every one of us. If this board were as evil as we are led to
believe, there would be such an outcry from security professionals all
over the country to shut it down. But when hundreds of people are
getting positive benefits from it and only a handful of people have a
problem with it, I say leave it alone. The AIS BSS was designed to be
used by security professionals and security professionals are
benefiting from it. Certainly the anonymous sender is entitled to his
opinion and feelings, but so are the rest of us.
------------------------------
Date: Mon, 21 Jun 93 21:18:31 EDT
From: Urnst Kouch <70743.1711@COMPUSERVE.COM>
Subject: File 5--Fear and Loathing: On the Virus Code Trail at AIS
((Urnst Kouch is editor of CRYPT NEWSLETTER. Additional details on the
background of the incident and those involved can be found
in CRYPT NEWSLETTER #16)).
FEAR AND LOATHING: ON THE VIRUS CODE TRAIL AT AIS
On Saturday, June 19, the national press suddenly reared up and
without warning, mangled the reputation of one of the finest, most
professional security experts I know, Kim Clancy of the Bureau of
Public Debt's Security Branch.
I rolled out of bed Saturday morning, plugged into Compuserve's
Today's News and was promptly crushed by the brazen stupidity of
reporter Charles Bowen's newspiece, "GOVERNMENT BBS SAID TO HAVE AIDED
COMPUTER INTRUDERS AND VANDALS".
Bowen plagiarized the lead, "A government spokesman says an obscure
bulletin board system run by a federal agency apparently helped
computer vandals commit electronic sabotage," directly from a same-day
Associated Press story called "Dial-A-Virus".
But neither Bowen nor the AP offered a solitary shred of proof, other
than this outrageously leading statement, loosely attributed to Public
Debt spokesman Peter Hollenbach, that Kim Clancy's AIS BBS has ever
been responsible for abetting documented cases of hacker intrusion or
computer vandalism by virus.
Further, Bowen reported, "The [Washington] Post says that among the
visitors to the system were computerists using handles such as 'The
Internet Worm,' 'Satan's Little Helper' and 'Dark Avenger's Mutation
Engine.'" The Washington Post story, reported by Joel Garreau, said
nothing of the kind, leading me to believe Bowen is either a
functional illiterate or willfully slack. Indeed, anyone who has
visited AIS knows beyond a shadow of a doubt that the system NEVER
supported handles of such nature. [Of course, Bowen can respond by
blaming it on a copy editor and/or tight deadline, the last, best
defense of lazy, inaccurate newsmen the country over.]
These vague insinuations, however, were as nothing compared to the
wellspring of the controversy, Garreau's "Treasury Exposed Computer
Virus Info; Whistleblowers Halted Display Available To Anyone With A
Modem" which brought into the public glare the chain of events that
resulted in the removal of hacker tools, text files and commented
virus source code from AIS.
Although Garreau's story attempted to present a number of sides it was
packaged so that a general reader would get a picture of a mad-dog
government agency, finally "muzzled" after distributing dangerous code
to "every maladjusted sociopath with Coke-bottle-bottom glasses." More
savagely irresponsible was the sideborn statement that treasury
officials had neglected to "discipline" Clancy, instead merely
removing the dangerous information from her system.
It was a real rabbit punch; a cheapjack, ham-handed slam on Kim
Clancy, successful in portraying her as someone who spends her
worktime beta-testing intrusion software against her own department so
that hackers might optimize their methods for computer subversion and
vandalism. This is hair-raising stuff, to be sure, for a general
readership, but not the real truth. It is my understanding, and
something I've seen Kim Clancy make clear in lectures to many computer
workers, that the whole point of working with hackers on the
development of "Tone-Loc" software was so that it COULD and WOULD be
supplied to interested security personnel who would use it to gain an
understanding of how to harden their systems against tools employing
similar technology.
This is emphatically not the handiwork of someone who should be
disciplined or professionally tarred, but the work of someone who
Bruce Sterling, not me, says is "probably THE BEST THERE IS [emphasis
mine] in the federal government who's not military or NSA. Probably
better than most CIA."
Unfortunately, Sterling's appraisal was buried near the end of the
story, after all the cracked shouting about aiding hackers and
computer criminals.
But I've walked away from the real nut of the matter: the presence of
commented virus source code at AIS. The significance of this is, in
my opinion, beyond the current ability of mainstream journalists to
evaluate simply because the vast majority of them have little
technical grasp of the byzantine reality of computer security, what
viruses are, how they work and don't work and where you find virus
source code. Certainly, The Washington Post story did nothing to
convince otherwise.
Consider these statements from The Post and some stony facts:
>>According to software writers, with the AIS information
"relative amateurs, could create new viruses."
This is dangerously misleading. As point of fact, relative amateurs
DO, not could, create new viruses from source code and they've done so
for a long time before the advent of AIS. That AIS would be
responsible for such a development, which is already fact, is frankly
idiotic.
>>Virus source code at AIS "is worse than making live
viruses available. A person without the skill to write
a brand new virus could nonetheless produce a variation
on an existing one . . . If sufficiently mutated, the
virus might slip past anti-virus programs designed to
look for known products."
This presumes that most virus-writers, would-be virus-writers and
"Coke-bottle glasses-variety sociopaths" have little access to source
code. This is not even close to being true. Virus source code is now
commonplace on professional, semi-professional and amateur BBS's run
by every stripe of user across the country. In fact, it is almost as
common as pirated software and pornography in some locales.
Surprisingly, the higher quality virus disassemblies stocked on such
BBS's are often the handiwork of anti-virus researchers and software
developers. Strangely, this has never been reported by a mainstream
newsman, perhaps because "designated experts" often come from the same
pool of researchers and developers.
". . . some computer professionals minimize the risk, saying
the software on [AIS] was acquired through the computer
underground in the first place, and thus has always been
available to miscreants with sufficient contacts, tenacity and
skill."
This is a particularly nasty one because its presented as
justification by those attacked and seems true. It's not. It
requires NO tenacity or particular skill to get hundreds of viruses
and assorted source code listings. Unlike the stunt of hacking a
mainframe from a dial-up, which often requires great patience, a
brute-force approach or some technical skill as substitute, from
teenagers to middle-age men, anyone with a PC and a modem can dig up a
BBS devoted to virus code in almost no time. Yes, they are that
common.
Why should this be? Where have all those live viruses come from?
Paradoxically, many of the virus files on these BBS's bear the
electronic mark of software developers like Certus International, S&S
International and security organizations such as the National Computer
Security Association. Damn. How DO "relative amateurs" get ahold of
those samples? Of course, they could all be forgeries, the work of
some dangerous psychopath. Yeah, right.
In any case, the only people who can't access the hacker files anymore
are the security people. And the real story may boil down to what I
call the "You dunno this information, it's too dangerous and and you
don't have any business knowing about viruses and hacker files so
leave it to us anonymous security experts and anti-virus researchers
because we're here to serve and protect and we'll take care of all
that stuff, thank you" explanation. It is the very essence of
professional arrogance and hubris, in my estimation.
There is, obviously, much more which should have been addressed by the
mainstream media. Why hasn't it, then? Because it's not as sexy a
story as the visceral blurt of noble civil servant whistleblowers
bringing down a renegade government security BBS pursuing new ways to
pervert the public trust out on the rim of cyberspace. And it would
take time; it's a story that couldn't be researched and rushed into
print in a week. It's complex, you see, and would be a great deal
longer than the piece which ran in America's finest newspaper, The
Washington Post. So maybe we should all forget about fairness,
because if it can't get into print at The Post, where will it?
I hope Kim can continue her fine work and I'm angry at the stupid
treatment this controversy has received at the hands of the newsmedia,
so I'm writing to you about it because if I don't, I just might have
to scream.
------------------------------
Date: Thu, 9 July 1993 23:11:17 CDT
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
Subject: File 6--Media, Anti-virus personnel, Ethics, and AIS
There are no winners in the AIS BBS incident. The sysop, considered an
exceptionally professional and helpful security specialist, is known
for attempting to bridge barriers between competing groups, such as
law enforcement and "hackers," in the belief that one way to reduce
abuses by all sides is through education. The anonymous poster(s) won
a short-term victory in that the "underground" files were removed from
the board. Peter Hollenbeck, Department of Treasury spokesperson for
the incident, indicated that there were no plans to take the board
down. However, he explained that after a review of the board's
mission, it was decided that "underground" files, which included Cu
Digest, would be removed. As of 11 July, AIS was still functioning,
and the following log-in screen appeared:
+++ begin login screen +++
immmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm<
> U.S. Department of the Treasury >
mmmmmmmmmm9 Bureau of the Public Debt lmmmmmmmmmm
> Office of Automated Information Systems >
mmmmmmmmmm9 A.I.S. Security Branch lmmmmmmmmmm
> On-Line Information System >
mmmmmmmmmm9 (call 304-480-6083 after 6/21/93) lmmmmmmmmmm
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm#
We recently reviewed the information posted on this bulletin board. As a
result of this review we have decided to remove the "underground" files and
will not post similar information in the future.
We concluded that making this type of information available through this
facility is not in the best interest of the Bureau of the Public Debt.
+++ end login screen +++
Should the AIS BBS have made available to the public so-called
"underground" files that included virus source code? Persuasive
arguments can be made on both sides. My intent here isn't to recreate
those arguments, but to briefly examine the process by which the
incident evolved. Here are a few points overlooked by the media and
others.
First, according to CuD sources, attacks on the AIS BBS began as early
as March, 1993, at the IEEE Computer Security seminar in New York
City. One vocal participant, believed by many to be one of the
anonymous Risks Digest posters, encouraged his listeners to "do
something" about AIS BBS. The tandem "anonymous" posts were less than
honest to the extent that, according to one AIS BBS user who did
periodic log captures, the name of at least one of the posters, Paul
Ferguson, had been listed in user files well before the anonymous
post. Assuming that the "Paul Ferguson" on AIS BBS and the Paul
Ferguson of the anonymous post are the same, the cryptic posturing of
the anonymous Risks posts would seem dramatically deceptive. The
feigned ignorance about aspects of the BBS, the professed fear of
"retaliation," and the vengeful (and anonymous) call for punitive
sanctions against the sysop seem more in line with an intentionally
planned assault than with an ethical attempt to raise issues and
generate debate.
No doubt that Paul Ferguson is sincere in his concerns about the
"ethics" of making certain types of files available on a government
BBS. However, it should also be noted that Paul Ferguson may stretch
the ethical boundaries of truth when it suits him. For example, CuD
has been informed that a letter over the sig of "Paul Ferguson" in
which "reply" reached the same Paul Ferguson who acknowledged writing
the anonymous Risks post, appeared to misrepresent himself in
attempting to solicit information from a government employee. To
establish credibility, he allegedly claimed to be working with the EFF
and CPSR on issues that affect the computer and networking public at
large. CuD contacted officials in both organizations, and the
responses ranged form "we don't know him" to "it's news to us."
Anonymous postings calling for retributive sanctions and seemlying false
misrepresentation of affiliations do not generally give one
credibility.
A Fidonet reader forwarded a post that we find interesting. In a FIDO
Virus_Info post under Paul Ferguson's header, the following appeared
in response to a CRYPT NEWSLETTER article:
Date: 12:38 pm Sun Jun 27, 1993 Number : 408 of 418 From:
Paul Ferguson Base : FIDO - VIRUS_INFO To :
All Refer #: None Subj: AIS debate
(part 1) Replies: None Stat: Sent
Origin : 26 Jun 93 00:45:00
Mr. Corey Tucker sent an "advance" copy article written by George
Smith (aka Urnst Kouch) which implied several items which were
conjectured and seemingly allusions. I posted a prior response,
but additionally, I'd like to post an article also written by
Kouch which outlines Clancy in the CRYPT newsletter #13, in which
more altruistic mentalities are discussed. I believe this is
valid; it reflects the entirety in which this whole fiasco
existed.
Additionally, I am also posting the Washington Post article, in
its entirety, for information purposes.
If the truth be known, Mr. Smith did the most damage to Kim
Clancy's underground organiztion (and BBS) than anyone who maay
have followed, by the publication of this very article.
No need to call this number, it ain't there anymore. Not only did
Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
so on his behalf.
Several questions arise, including the following:
First, what is the "underground organization" that Kim Clancy
allegedly "has"? From law enforcement indictments, search/seizure
affidavits and warrants, and press releases that we have seen in the
past, such a phrase could, for the clueless, constitute felonious
conspiracy. This is neither neutral nor innocent wording. It is the
type of irresponsible accusation that (as we've seen from media
accounts such as the Washington Post or Rep. Markey's letter to
Secretary Bentsen) assumes a reality of its own. Is Paul Ferguson
suggesting, as the post implies, that Kim Clancy runs an "underground"
organization? Does Paul Ferguson actually believe that Kim Clancy is
involved with illegal activity? Judging from his anonymous post, he
actually so-believes. If so, perhaps he could present evidence of
illegal activity or "underground" leadership as he implies. If he
cannot, then he owes Kim Clancy a public apology for subjecting her to
the type of innuendo that has tarnished the reputation and threatened
the career of a dedicated civil servant.
Second, Paul Ferguson strongly suggests that the board is no longer in
service. Consider this wording:
No need to call this number, it ain't there anymore. Not only did
Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
so on his behalf.
Let's keep some facts straight. "Mr. Smith (Kouch)" did *not* "nail
Clancy's coffin." Paul Ferguson and his friends did with anonymous
inflammatory posts and with other posts that irresponsibly suggest
illegal and "underground" activity. Contrary to Paul Ferguson's
claim, the board remains operative. Notices, announcements, and other
information sources over the past few months alerted callers to the
Parkersburg Bureau of Public Debt offices that the old prefix would
be changed to "480." One CuD informant indicated that Ferguson knew of
this change prior to the date listed on the above post. If so, the
wording of the passage cited above is duplicitous. If Paul Ferguson
did not know of the change, then his professed knowledge of AIS BBS is
less than credible.
Now, let's examine the Washington Post article (June 19, P. 1) that
covered the story. Joel Garreau, the author, is reputable and has
established his credentials as a fair journalist. We have no doubt
that he tried to present a balanced view of what he considered a
newsworthy story. However, there are several troubling aspects of the
story.
The story begins:
*Treasury* Told Computer Virus Secrets Whistleblowers Halted
Display Available to Anyone With a Modem.
The Washington Post, June 19, 1993, FINAL Edition
By: Joel Garreau, Washington Post Staff Writer
Section: A SECTION, p. a01
For more than a year, computer virus programs that can
wreak havoc with computer systems throughout the world
were made available by a U.S. government agency to
anyone with a home computer and a modem, officials
acknowledged this week.
At least 1,000 computer users called a Treasury
Department telephone number, spokesmen said, and had
access to the virus codes by tapping into the department's
Automated Information System bulletin board before it was
muzzled last month.
The bulletin board, run by a security branch of the
Bureau of Public Debt in Parkersburg, W.Va., is aimed at
professionals whose job it is to combat such malicious
destroyers of computer files as "The Internet Worm,"
"Satan's Little Helper" and "Dark Avenger's Mutation
Engine." But nothing blocked anyone else from gaining access
to the information.
Let's look at just a few issues. First, there is considerable room for
legitimate disagreement over whether this is a newsworthy story.
However, if it is deemed newsworthy that one government agency
provides information that some see as "dangerous," then the same
standards of newsworthyness ought be applied to all other government
agencies that release "sensitive" information in a variety of
documents that is equally "dangerous." In fact, what the reporter
completely ignored in the story is the issue of accessibility to all
types of information. If we are going to "muzzle" a single information
source, then why not "muzzle" government-funded libraries as well?
Where does the "muzzling" line end? Who makes the decisions and by
what criteria?
Second, the story emphasizes the concerns of AIS critics and
despite interviews with persons who minimized the dangers and
significance of the AIS BBS files, the counter interpretation was
considerably downplayed.
Third, this was not a "whistleblowing" incident any more than would be
a similar incident when an irate member of the public complains
anonymously about the local public library carrying Playboy.
Framing it as such distorts events.
Fourth, and although minor but not insignificant, the wording of the
article is less than neutral. Exaggerating the "virus" dangers,
framing the incident as "whistleblowing," referring to "hacker tools"
without also explaining their relatively innocuous nature and public
availability of these specific "tools," and other rhetorical ploys
seemed to pander to public virus hysteria. Further, although a small
point, it is not insignificant that a major quote was wrong. The
anonymous post in the Post article was reprinted as follows:
"I am dismayed that this type of activity
is being condoned by an American governmental
agency. I am extremely disturbed by the thought that
my tax money is being used for what I consider
unethical, immoral and possibly illegal
activities...."
The original post read:
I am dismayed that this type of activity is being condoned
by an American Governmental Agency. I can only hope that
this operation is shut down and the responsible parties are
reprimanded. I am extremely disturbed by the thought that
my tax money is being used for, what I consider, unethical,
immoral and possibly illegal activities.
A seemingly minor alteration, but the elimination of the second
sentence (without an elide or other indication) that calls for
silencing and sanctions against the sysop omits a crucial bit of
information.
It's also worth noting that the story refers to CuD as The magazine
"...followed by those interested in the murky world of
"hackers, crackers and phone phreaks. It is edited by Jim
Thomas, of the sociology and criminal justice department of
Northern Illinois University."
This would be akin to saying that The Washington Post is the preferred
paper of drug kingpins interested in following the predatory exploits
of their competition....while perhaps true in some vague sense, it
conveys a grossly inaccurate image of both publications. CuD, as I
carefully explained to the reporter, is read by a conservatively
estimated readership of 80,000, most of whom are computer
professionals, journalists, attorneys, academics, law enforcement, and
others who are primarily interested in computer culture. CuD is read,
as near as I can determine, by those looking for news, book reviews,
conference information, research articles, debates, computer-related
legislation, and information on virtually *all* aspects of computer
culture. And, "Jim Thomas" and not simply "of" the sociology/criminal
justice department at NIU, but a full professor with a credible list
of books and articles on his vita, which I explicitly told the
reporter. I'm normally quite modest about such things. However, the
wording of the Post article is deceptively glib and irresponsibly
distorts both the editorial purpose and content of CuD and the
editor's status. This might sound picky. Sadly, we've seen the Post
article cited in Rep. Markey's letter to Treasury Secretary Bentsen,
and I'd hate to have some "whistleblower" come unglued thinking that
NIU is making hacker information (or worse) available to the public.
The story also errs (despite information the reporter was given) in
claiming that the AIS BBS revealed its number in CuD last November.
This is simply wrong. CuD possessed the number and contacted board
personnel for an interview. The interview was cleared through the
appropriate supervisors and spokespersons prior to publishing, and it
was *NOT* revealed at the initiative of AIS personnel as the story
claims. The reporter presumably had this information.
Another small error, but one recreated in Rep. Markey's letter to
Treasury Secretary Bentsen with a demand for accountability for the
act, which in fact did not occur.
These are not the only errors or problems with the story.
Individually, they are relatively minor. But, in the
aggregate, they create an inaccurate image of events and exaggerate
the significance of the "story." Because of the visibility of the
Post, the story became national news and was carried on, among other
outlets, CNN and the Associated Press wires. For some, appearance of
"facts" in national media are sufficient to verify accuracy, and
little attempt is made to dig below the surface. Although the Post
reporter was far more conscientious than most media folk, and although
he was sincere in his attempt to present a balanced story, the final
product was questionable. To my mind, this may say more about the
nature of media and the emphasis on a "sexy" slant and the appropriate
discourse for such a slant than on the abilities of the reporter, Joel
Garreau, for whom I have considerable personal and professional
respect.
A final point is worth noting. The Post article quotes the anonymous
risk poster (Paul Ferguson) early in the story. Then, in the paragraph
immediately following, it quotes Paul Ferguson to give credibility to
and elaborate on the anonymous post without mentioning that Paul
Ferguson was the anonymous poster. The reporter was told by voice and
by e-mail *prior* to the story that Ferguson and the anonymous poster
were the same. Yet, no mention was made, and the two quotes were
sequenced as if they were separate voices. Others can judge the
ethical implications of this for themselves.
Because of the Risks post and the Post story, the AIS BBS incident
has assumed a significance beyond any reasonable reality.
One writer of "cyberspace" fiction and non-fiction reportedly called
Kim Clancy the "Cyber Joan of Arc." It fits. Ms. Clancy is not a
politician, not a political activist, and not a trouble-making
bureaucrat. She is a sensitive, dedicated government official who
believes that sharing legal information and engaging in dialogue is
the best way to curtail computer abuse. Her "crime" was in
over-estimating the good-will of others and in assuming that her
critics preferred dialogue to mean-spirited action. This incident is
not one of a "victimized" class resisting the tyrany of a powerful
government official. Instead, it reflects a sad situation in which
some persons, both intentionally and inadvertently, combined to create
a nasty situation based on innuendo and misinformation to create a
drama in which there are only losers.
Sadly, I must make one final comment. It's said that some people,
angered at this affair, are planning to retaliate against those judged
responsible. This would be an ethically bankrupt response. Predatory
behavior decivilizes cyberspace just as it does the "real world." The
best response to cyber-conflict usually is to air disputes in public
and debate them aggressively and honestly. We need fewer, not more,
razorblades in the sand if we're to create a civilized environment.
------------------------------
End of Computer Underground Digest #5.51
************************************