Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 32

  



Computer underground Digest Sun May 2 1993 Volume 5 : Issue 32
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cyop Editor: Etaoin Shrdlu, Senior

CONTENTS, #5.32 (May 2 1993)
File 1--If you missed the Galactic Hacker Party of 1989....
File 2--SPA Needs A Different Direction
File 3--Some thoughts on Clipper and the Constitution (1)
File 4--Some thoughts on Clipper and the Constitution (2)
File 5--Clinton Administration Freedom of Information Policy
File 6--Hacker Accused of Rigging Radio Contests
File 7--"Hacker" Executed in China
File 8--Electronic Privacy Conf w/Oliver North & Chris Goggans

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) 203-832-8441 NUP:Conspiracy
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;

ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)

Back issues also may be obtained through mailserver at:
server@blackwlf.mese.com

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Wed, 28 Apr 1993 04:12:57 -0700
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
Subject: File 1--If you missed the Galactic Hacker Party of 1989....

Hack-Tic presents:

-------------------------------------------------------------------
H A C K I N G A T T H E E N D O F T H E U N I V E R S E
-------------------------------------------------------------------

An 'in-tents' summer congress



H U H?
+-------

Remember the Galactic Hacker Party back in 1989? Ever wondered what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!

That's right. On august 4th, 5th and 6th 1993, we're organising a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers, hardware
freaks, techno-anarchists, communications junkies, cyberpunks, system
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
dudes, law enforcement officers (appropriate undercover dress required),
guerilla heating engineers and other assorted bald, long-haired and/or
unshaven scum. And all this in the middle of nowhere (well, the middle
of Holland, actually, but that's the same thing) at the Larserbos
campground four metres below sea level.

The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking,
viruses, paranoia, legal sanctions against hacking in Holland and
elsewhere and much, much more. English will be the lingua franca for
this event, although some workshops may take place in Dutch. There
will be an Internet connection, an intertent ethernet and social
interaction (both electronic and live). Included in the price are four
nights in your own tent. Also included are inspiration, transpiration,
a shortage of showers (but a lake to swim in), good weather
(guaranteed by god), campfires and plenty of wide open space and fresh
air. All of this for only 100 dutch guilders (currently around US$70).

We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.


H O W ?
+-------

Payment: In advance only. Even poor techno-freaks like us would like
to get to the Bahamas at least once, and if enough cash comes in we
may just decide to go. So pay today, or tomorrow, or yesterday, or in
any case before Friday, June 25th 1993. Since the banks still haven't
figured out why the Any key doesn't work for private international
money transfers, you should call, fax or e-mail us for the best way to
launder your currency into our account. We accept American Express,
even if they do not accept us. But we are more understanding than they
are. Foreign cheques go directly into the toilet paper recycling bin
for the summer camp, which is about all they're good for here.


H A !
+-----

Very Important: Bring many guitars and laptops.


M E ?
+-----

Yes, you! Busloads of alternative techno-freaks from all over the
planet will descend on this event. You wouldn't want to miss that,
now, would you?

Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organising your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize this during the
congress.

In whatever way you wish to participate, call, write, e-mail or fax us
soon, and make sure your money gets here on time. Space is limited.


S O :
+-----

> 4th, 5th and 6th of August

> Hacking at the End of the Universe
(a hacker summer congress)

> ANWB groepsterrein Larserbos
(Flevopolder, Netherlands)

> Cost: fl. 100,- (+/- 70 US$) per person
(including 4 nights in your own tent)


M O R E I N F O :
+-------------------

Hack-Tic
Postbus 22953
1100 DL Amsterdam
The Netherlands

tel : +31 20 6001480
fax : +31 20 6900968
E-mail : heu@hacktic.nl

V I R U S :
+-----------

If you know a forum or network that you feel this message belongs on,
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
WP.BAT, you name it. Spread the worm, uh, word.

------------------------------

Date: 29 Apr 93 21:31:10 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 2--SPA Needs A Different Direction

Michael Alexander, Editor in Chief and Associate Publisher of
INFOSECURITY NEWS had some interesting comments about the SPA in his
May/June editorial. Here are excerpts, for the full remarks refer to
page 7.

Several years ago I attended the first meeting of the Software
Publishers Association, which was being held during the Winter
Consumer Electronics Show in Las Vegas... I recall little about that
initial meeting other than the fact that it was not particularly well
organized. Based on the low turnout, ... I wrote a small article about
the meeting and I think I suggested that the software industry had
little need for the proposed association.

Obviously I was wrong. The SPA has grown to more than 1,000 members
in the past eight years and has become a powerful force in the
industry. The SPA has also be come known as the "Software Police" as a
result of is raids against copyright infringers and software pirates.

...

Few people would argue with the fact that all software publishers
should be compensated fairly for their products and that copyright
laws must be protected on ethical and financial grounds.

However, I believe that the SPA's much-publicized raids on businesses
whose users are allegedly making unauthorized copies of software do
little to advance the cause of information systems security. Any
infosecurity practitioner will tell you that fear, intimidation and
threats do not make for better security. What works is education,
communication and cooperation.

The vast majority of infosecurity professionals are aware of the
pitfalls of copyright infringement and are working diligently to
control the problem within their organizations. The SPA itself
confirms that the problem of copyright in the US is declining. Thus
it is time for the SPA to put its clout to more productive use.

...

One of the first things the SPA should do is to withdraw its current
print ads, such as the ones depicting users behind bars. These ads are
in poor taste and insulting both to infosecurity professionals and to
the people who provide the billions in revenues that the SPA's members
receive.

------------------------------

Date: Wed, 28 Apr 93 12:57:01 PDT
From: Spartan@CUP.PORTAL.COM
Subject: File 3--Some thoughts on Clipper and the Constitution (1)

Date--Mon, 26 Apr 93 17:55:36 -0500
From--mnemonic@eff.org (Mike Godwin)
Newsgroups--austin.eff
Subject--Some thoughts on Clipper and the Constitution

Note: These notes were a response to a question during Saturday's
Cypherpunks meeting about the possible implications of the Clipper
Chip initiative on Fourth Amendment rights. Forward to anyone else who
might think these interesting.

--Mike


Notes on Cryptography, Digital Telephony, and the Bill of Rights
By Mike Godwin

I. Introduction

A. The recent announcement of the federal government's "Clipper
Chip" has started me thinking again about what the principled "pure
Constitutional" arguments a) opposed to Digital Telephony and b) in favor
of the continuing legality of widespread powerful public-key encryption.
B. These notes do *not* include many of the complaints that have
already been raised about the Clipper Chip initiative, such as:
1. Failure of the Administration to conduct an inquiry before
embracing a standard,
2. Refusal to allow public scrutiny of the chosen encryption
algorithm(s), which is the normal procedure for testing a cryptographic
scheme, and
3. Failure of the administration to address the policy questions
raised by the Clipper Chip, such as whether the right balance between
privacy and law-enforcement needs has been struck.
C. In other words, they do not address complaints about the federal
government's *process* in embracing the Clipper Chip system. They do,
however, attempt to address some of the substantive legal and
Constitutional questions raised by the Clipper Chip and Digital Telephony
initiatives.

II. Hard Questions from Law Enforcement

A. In trying to clarify my own thinking about the possible
Constitutional issues raised by the government's efforts to guarantee
access to public communications between individuals, I have spoken and
argued with a number of individuals who are on the other side of the
issues from me, including Dorothy Denning and various respresentatives of
the FBI, including Alan McDonald.
B. McDonald, like Denning and other proponents both of Digital
Telephony and of a standard key-escrow system for cryptography, is fond of
asking hard questions: What if FBI had a wiretap authorization order and
couldn't implement it, either because it was impossible to extract the
right bits from a digital-telephony data stream, or because the
communication was encrypted? Doesn't it make sense to have a law that
requires the phone companies to be able to comply with a wiretap order?
C. Rather than respond to these questions, for now at least let's
ask a different question. Suppose the FBI had an authorization order for a
secret microphone at a public restaurant. Now suppose it planted the bug,
but couldn't make out the conversation it was authorized to "seize"
because of background noise at the restaurant. Wouldn't it make sense to
have a law requiring everyone to speak more softly in restaurants and not
to clatter the dishes so much?
D. This response is not entirely facetious. The Department of
Justice and the FBI have consistently insisted that they are not seeking
new authority under the federal wiretap statutes ("Title III"). The same
statute that was drafted to outline the authority for law enforcement to
tap telephonic conversations was also drafted to outline law enforcement's
authority to capture normal spoken conversations with secret or remote
microphones. (The statute was amended in the middle '80s by the Electronic
Communications Privacy Act to protect "electronic communications," which
includes e-mail, and a new chapter protecting _stored_ electronic
communications was also added.)
E. Should we understand the law the way Digital Telephony
proponents insist we do--as a law designed to mandate that the FBI (for
example) be guaranteed access to telephonic communications? Digital
Telephony supporters insist that it merely "clarifies" phone company
obligations and governmental rights under Title III. If they're right,
then I think we have to understand the provisions regarding "oral
communications" the same way. Which is to say, it would make perfect sense
to have a law requiring that people speak quietly in public places, so as
to guarantee that the government can bug an oral conversation if it needs
to.
F. But of course I don't really take Digital Telephony as an
initiative to "clarify" governmental prerogatives. It seems clear to me
that Digital Telephony, together with the "Clipper" initiative, prefigure
a government strategy to set up an information regime that precludes truly
private communications between individuals who are speaking in any way
other than face-to-face. This I think is an expansion of government
authority by almost any analysis.

III. Digital Telephony, Cryptography, and the Fourth Amendment

A. In talking with law enforcement representatives such as Gail
Thackeray, one occasionally encounters the view that the Fourth Amendment
is actually a _grant_ of a Constitutional entitlement to searches and
seizures. This interpretation is jolting to those who have studied the
history of the Fourth Amendment and who recognize that it was drafted as a
limitation on government power, not as a grant of government power. But
even if one doesn't know the history of this amendment, one can look at
its language and draw certain conclusions.
B. The Fourth Amendment reads: "The right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall issue,
but upon probable cause, supported by Oath or affirmation, and
particularly describing the place to be searched, and the persons or
things to be seized."
C. Conspicuously missing from the language of this amendment is any
guarantee that the government, with properly obtained warrant in hand,
will be _successful_ in finding the right place to be searched or persons
or things to be seized. What the Fourth Amendment is about is _obtaining
warrants_--similarly, what the wiretap statutes are about is _obtaining
authorization_ for wiretaps and other interceptions. Neither the Fourth
Amendment nor Title III nor the other protections of the ECPA constitute
an law-enforcement _entitlement_ for law enforcement.
D. It follows, then, that if digital telephony or widespread
encryption were to create new burdens for law enforcement, this would not,
as some law-enforcement representatives have argued, constitute an
"effective repeal" of Title III. What it would constitute is a change in
the environment in which law enforcement, along with the rest of us, has
to work. Technology often creates changes in our social environment--some,
such as the original innovation of the wiretap, may aid law enforcement,
while others, such as powerful public-key cryptography, pose the risk of
inhibiting law enforcement. Historically, law enforcement has responded to
technological change by adapting. (Indeed, the original wiretaps were an
adaptation to the widespread use of the telephone.) Does it make sense for
law enforcement suddenly to be able to require that the rest of society
adapt to its perceived needs?

IV. Cryptography and the First Amendment

A. Increasingly, I have come to see two strong links between the
the use of cryptography and the First Amendment. The two links are freedom
of expression and freedom of association.
B. By "freedom of expression" I mean the traditionally understood
freedoms of speech and the press, as well as freedom of inquiry, which has
also long been understood to be protected by the First Amendment. It is
hard to see how saying or publishing something that happens to be
encrypted could not be protected under the First Amendment. It would be a
very poor freedom of speech indeed that dictated that we could *never*
choose the form in which we speak. Even the traditional limitations on
freedom of speech have never reached so far. My decision to encrypt a
communication should be no more illegal than my decision to speak in code.
To take one example, suppose my mother and I agree that the code "777",
when sent to me through my pager, means "I want you to call me and tell me
how my grandchild is doing." Does the FBI have a right to complain because
they don't know what "777" means? Should the FBI require pager services
never to allow such codes to be used? The First Amendment, it seems to me,
requires that both questions be answered "No."
C. "Freedom of association" is a First Amendment right that was
first clearly articulated in a Supreme Court case in 1958: NAACP v.
Alabama ex rel. Patterson. In that case, the Court held that Alabama could
not require the NAACP to disclose a list of its members residing in
Alabama. The Court accepted the NAACP's argument that disclosure of its
list would lead to reprisals on its members; it held such forced
disclosures, by placing an undue burden on NAACP members' exercise of
their freedoms of association and expression, effectively negate those
freedoms. (It is also important to note here that the Supreme Court in
effect recognized that anonymity might be closely associated with First
Amendment rights.)
D. If a law guaranteeing disclosure of one's name is sufficiently
"chilling" of First Amendment rights to be unconstitutional, surely a law
requiring that the government be able to read any communications is also
"chilling," not only of my right to speak, but also of my decisions on
whom to speak to. Knowing that I cannot guarantee the privacy of my
communications may mean that I don't conspire to arrange any drug deals or
kidnapping-murders (or that I'll be detected if do), but it also may mean
that I choose not to use this medium to speak to a loved one, or my
lawyer, or to my psychiatrist, or to an outspoken political activist.
Given that computer-based communications are likely to become the dominant
communications medium in the next century, isn't this chilling effect an
awfully high price to pay in order to keep law enforcement from having to
devise new solutions to new problems?

V. Rereading the Clipper Chip announcements

A. It is important to recognize that the Clipper Chip represents,
among other things, an effort by the government to pre-empt certain
criticisms. The language of announcements makes clear that the government
wants us to believe it has recognized all needs and come up with a
credible solution to the dilemma many believe is posed by the ubiquity of
powerful cryptography.
B. Because the government is attempting to appear to take a
"moderate" or "balanced" position to the issue, its initiative will tend
to pre-empt criticisms of the government's proposal on the grounds of
*process* alone.
C. But there is more to complain about here than bad process. My
rereading of the Clipper Chip announcements will reveal that the
government hopes to develop a national policy that includes limitations on
some kinds of cryptography. Take the following two statements, for
example:
D. 'We need the "Clipper Chip" and other approaches that can both
provide law-abiding citizens with access to the encryption they need and
prevent criminals from using it to hide their illegal activities.'
E. 'The Administration is not saying, "since encryption threatens
the public safety and effective law enforcement, we will prohibit it
outright" (as some countries have effectively done); nor is the U.S.
saying that "every American, as a matter of right, is entitled to an
unbreakable commercial encryption product." '
F. It is clear that neither Digital Telephony nor the Clipper Chip
make any sense without restrictions on other kinds of encryption.
Widespread powerful public-key encryption, for example, would render
useless any improved wiretappability in the communications
infrastructure, and would render superfluous any key-escrow scheme.
G. It follows, then, that we should anticipate, consistent with
these two initiatives, an eventual effort to prevent or inhibit the use of
powerful private encryption schemes in private hands.
H. Together with the Digital Telephony and Clipper Chip
initiatives, this effort would, in my opinion, constitute an attempt to
shift the Constitutional balance of rights and responsibilities against
private entities and individuals and in favor of law enforcement. They
would, in effect, create _entitlements_ for law enforcement where none
existed before.
I. As my notes here suggest, these initiatives may be, in their
essence, inconsistent with Constitutional guarantees of expression,
association, and privacy.

------------------------------

Date: Wed, 28 Apr 93 10:21:16 PDT
From: Spartan@CUP.PORTAL.COM
Subject: File 4--Some thoughts on Clipper and the Constitution (2)

Mike Godwin's recent essay on the Clipper Chip (reprinted above),
Digital Telephony and the Constitution raises several interesting
points. I'll confine my response to those points relating to the
"chilling effect" that encryption may have on the use of emerging
communications technology.

Firstly, I have to admit my philosophical bias against the
crippled-security scheme employed in the Clipper Chip. I do not have
any better reason (better than the government's reason) for wanting a
snoop-proof communications system; however, I acknowledge that the
government believes that it has a good reason for desiring it. As in
most civil liberties cases, the issue comes down to a balance of
"good" reasons by both parties.

How much will the crippled encryption scheme really "chill" our use of
emergent communications technology, i.e., threaten our free speech
protection to the point that we may opt (if possible) to use other
communication media? My understanding is that law enforcement
officials will still need to procure a warrant prior to decrypting
encoded communication. If this is the case, will not encrypted
communication enjoy the same expectation of privacy as standard
telephone communications and postal mail? It seems that the warrant
is the best device we have to protect us from illegal search and
seizure. The threat of a warrant does not seem to have a wide
chilling effect on the use of standard telephones and postal
mail--yet, the possibility of interception is still ever-present.

We have created and authorized government to see to our mutual
protection, among other things. This protection involves the
execution of duly legislated laws and the prosecution of alleged
criminals. In order that government may carry out this charge we have
empowered it with the ability to investigate crimes by seizing
evidence and arresting suspects. It is in this area that we seek a
balance: evidence is often someone's valuable (and private) property
and suspects are innocent until proven guilty.

Does not the warrant sufficiently address this balance? It protects
suspects and property from frivolous seizure. It allows law
enforcement officers to investigate cases for which there appears
sufficient probable cause and supporting evidence. If the protection
that a warrant offers is not sufficient to alleviate our fears of
unwarranted search, seizure, and arrest, then perhaps there are bigger
problems to deal with other than encryption schemes.

I'm nowhere near as qualified as Mike to offer an opinion on this
issue, but it seems to me that the "process" is exactly where we
should be focusing--the Constitutional issues are fascinating, but
distracting. I have to believe that the warrant is an acceptable
safeguard to both sides of the balance. Given that, it appears that
the balance has been disturbed by an unilateral decision with respect
to the Clipper Chip. The plan presented by the Clinton
Administration, as far as attempting to balance the concerns of
government and the people, seems sound. The fact that the people (and
its organized interest groups) were not consulted has attracted undue
criticism to a feasible plan that is actually wanting of process.

This is a political problem in that a practical solution is available,
but cannot be agreed upon because the process leading to that solution
did not allow for the necessary consultation and input to insure its
acceptability. I'm certain that once bruised egos are attended to and
future assurances of consultation are gained, that the solution
settled upon will be very much like the one that stands.

Rich MacKinnon
Department of Government
University of Texas-Austin

------------------------------

Date: Fri, 30 Apr 1993 11:23:41 EDT
From: Paul Hyland <phyland@ESSENTIAL.ORG>
Subject: File 5--Clinton Administration Freedom of Information Policy

>Originally From--rich@pencil.cs.missouri.edu (Rich Winkel)

/* Written 2:09 am Apr 14, 1993 by nigel.allen@canrem.com in
igc:alt.news-media */
/* ---------- "White House Official Outlines Freed" ---------- */

White House Official Outlines Freedom of Information Strategy
at 'Information Summit'
To: National Desk, Media Writer
Contact: Ellen Nelson of The Freedom Forum First Amendment Center,
615-321-9588

NASHVILLE, Tenn., April 13 -- A White House official today outlined
a broad open government strategy for the Clinton administration,
throwing support behind legislation to apply the Freedom of
Information Act to electronic records.

"At the Clinton White House, most of the debate over the E-mail
system is about how we can interconnect it to public services rather
than how we can destroy the records or tear out the hard drives before
the subpoenas come to reach us," said John Podesta, assistant to the
president and staff secretary.

Podesta made his comments in front of 70 participants in the
nation's first Freedom of Information Summit, sponsored by The Freedom
Forum First Amendment Center at Vanderbilt University.

Though the economy dominates the headlines, Podesta said the new
administration was quietly working across a broad front to open
government. His "predictions for the first year," included:

-- Working with Sen. Patrick Leahy (D-Vermont) to win approval
this session for a bill allowing access to dozens of electronic
databases in the federal government.

-- Developing an electronic mail system within the federal
government to improve citizen participation in government.

-- Making the government's archives available on the nation's
"information highway," and appointing a national archivist "who cares
more about preserving history than about preserving his job."

--Creating a "mood of declassification" with new executive orders
from the president outlining what government may keep secret.

-- "Reinventing government" under initiatives developed by the fall
by Vice President Gore to require more openness on the part of civil
servants throughout the bureaucracy.

Podesta also pledged lobbying reform and political reform to "get
rid of the soft money in campaigns." The Freedom of Information Act
may need strengthening in addition to electronic access, he said.

Pinched by a dozen years of tight information policy, news
organizations have sent President Clinton a freedom of information
policy paper calling for wholesale personnel changes in FOIA-related
jobs, junking the secrecy classifications of President Reagan's
Executive Order 12356, overhauling the Freedom of Information Act and
ending military censorship of war reporting.

"People working on behalf of the public on more openness in
government at all levels are heartened by the prospect of the White
House taking the lead in this area," said Paul McMasters, executive
director of The Freedom Forum First Amendment Center at Vanderbilt
University.

The conference, sponsored by The Freedom Forum First Amendment
Center at Vanderbilt University, is focusing on issues ranging from
the Clinton administration's policies on open government to
restrictions on public access to crime, accident and disaster scenes.
The conference, open to the public, is at the Stouffer Hotel in
downtown Nashville.

Speakers on the Clinton FOI Agenda included Richard Schmidt Jr.,
general counsel to the American Society of Newspaper Editors and
partner in the law firm of Cohn & Marks in Washington, D.C.; Theresa
Amato, the director of the FOI Clearinghouse in Washington, D.C. and
staff counsel for Public Citizens Litigation Group in Washington,
D.C.; and Quinlan Shea, former Carter administration official who
discussed problems of access to government. Former American hostage
Terry Anderson will give the keynote address at the dinner tonight.

The Freedom Forum First Amendment Center at Vanderbilt University is
an independent operating program of The Freedom Forum. The Center's
mission is to foster a better public understanding of and appreciation
for First Amendment rights and values, including freedom of religion,
free speech and press, the right to petition government and peaceful
assembly.

The Freedom Forum is a nonpartisan, international organization
dedicated to free press, free speech and free spirit for all people.
It is supported entirely by an endowment established by Frank E.
Gannett in 1935 that has grown to more than $700 million in
diversified managed assets. Its headquarters is The Freedom Forum
World Center in Arlington, Va.

------------------------------

Date: Fri, 23 Apr 1993 13:25:21 -0700
From: Peter shipley <shipley@merde.dis.org>
Subject: File 6--Hacker Accused of Rigging Radio Contests

(Reprinted from RISKS DIGEST, #14.55)

Hacker Accused of Rigging Radio Contests
By Don Clark Chronicle staff writer
San Francisco Chronicle 22 Apr 1993

A notorious hacker was charged yesterday with using computers to
rig promotional contest at three Los Angeles radio stations, in a
scheme that allegedly netted two Porsches, $20,000 in cash and at
least two trips to Hawaii.

Kevin Lee Poulsen, now awaiting trial on earlier federal charges, is
accused of conspiring with two other hackers to seize control of
incoming phone lines at the radio stations. By making sure that only
their calls got through, the conspirators were assured of winning the
contests, federal prosecutors said. A new 19-count federal indictment
filed in Los Angeles charges that Poulsen also set up his own wire
taps and hacked into computers owned by California Department of Motor
Vehicles and Pacific Bell. Through the latter, he obtained
information about the undercover businesses and wiretaps run by the
FBI, the indictment states.

Poulsen, 27, is accused of committing the crimes during 17 months on
the lam from earlier charges of telecommunications and computers fraud
filed in San Jose. He was arrested in April 1991 and is now in the
federal Correctional Institution in Dublin. In December, prosecutors
added an espionage charge against him for his alleged theft of a
classified military document. The indictment announced yesterday adds
additional charges of computer and mail fraud, money laundering,
interception of wire communications and obstruction of justice.

Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty to
conspiracy and violating computer crime laws and have agreed to help
against Poulsen. Both are Los Angeles residents. Poulsen and Austin
have made headlines together before. As teenagers in Los Angeles, the
two computer prodigies allegedly broke into a Pentagon-organized
computer network that links researchers and defense contractors around
the country. Between 1985 and 1988, after taking a job at Menlo
Park-based SRI International, Poulsen allegedly burglarized or used
phony identification to sneak into several Pacific Bell offices to
steal equipment and confidential access codes that helped him change
records and monitor calls. After being indicted on these charges in
1989, Poulsen skipped bail and fled to Los Angeles where he was
eventually arrested at a suburban grocery store. One of the
unanswered mysteries about the case is how he supported himself as a
fugitive. The new indictment suggests that radio stations KIIS-FM,
KRTH-FM and KPWR-FM unwittingly helped out.

Poulsen and his conspirators are accused of hacking into Pacific Bell
computers to block out other callers seeking to respond to contests at
the stations. The conspirators allegedly used the scheme to let
Poulsen and Austin win Porsches from KIIS and let a confederate win
$20,000 from KPWR. Poulsen created aliases and phony identification
to retrieve and sell one of his Porsches and launder the proceeds of
the sale, the indictment states. In February 1989, they arranged for
Poulsen's sister to win a trip to Hawaii and $1,000 from KRTH, the
indictment states.
[Included in RISKS with permission of the author]

------------------------------

Date: 28 Apr 93 22:24:19 EDT
From: Anonymous <nowhere@unix.anon>
Subject: File 7--"Hacker" Executed in China

(Associated Press, April 26)-- A man accused of invading a computer
and embezzling some $192,000 has been executed in China. The French
Agence France-Press International News Service says Shi Biao, an
accountant at the Agricultural Bank of China's Jilin branch, was
accused of forging deposit slips from Aug. 1 to Nov. 18, 1991. AFP,
reporting from Beijing, quoted the Xinhua news agency as saying the
crime was "the first case of bank embezzlement via computer" in China,
adding it came to light when Shi and his alleged accomplice, Yu Lixin,
tried to wire part of the money to Shenzhen in southern China.
--Charles Bowen

------------------------------

Date: Fri, 30 Apr 1993 22:25:12
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 8--Electronic Privacy Conf w/Oliver North & Chris Goggans

Systems Technology Services, Inc., of Newton, N.J., is sponsoring the
ELECTRONIC PRIVACY IN THE 90'S conferenceon May 13-14, 1993 in
Washington, D.C. Billed as "A management Awareness Program, the stated
intent is to "present an array of guest speakers with a diversity of
backgrounds." According to the conference brochure:

This presentation has been designed to introduce the threat of
loss of assets due to the growing changes in electronic
technologies. Participants are experienced professionals, each
of who offers years of real time experiences within his own realm
of expertise.

Featured participants include Stansfield Turner, former director of
the CIA, Oliver North, described as:

...CEO of Guardian Technologies, which manufactures protective
equipment for law enforcement, serves as Prsident of Freedom
Alliance, a non-profit foundation dedicated to promoting the
principles of liberty, strong defense and traditional morality
in national policy.

Other featured speakers include Jim Ross of Ross Engineering, Tobey B.
Marzouk, an partner at the Washington, D.C. law firm of Marzouk &
Perry, and Donald P. Delany, a computer crime investigator with the
New York State Police.

Chris Goggans is the final featured speaker.

------------------------------

End of Computer Underground Digest #5.32
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT