Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 06 Issue 49
Computer underground Digest Sun June 5, 1994 Volume 6 : Issue 49
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Dittoer: Etaoian Shrdlu
CONTENTS, #6.49 (June 5, 1994)
File 1--AT&T Lab Scientist Discovers Flaw in Clipper Chip
File 2--Jacking in from the SNAFU Port (Clipper Snafu update)
File 3--Jacking in from the "We Knew It All Along" Port (Clipper)
File 4--Crackdown on Italian BBSes Continues
File 5--Norwegian BBS Busts / BitPeace
File 6--BSA: Software Piracy Problem Shows no Sign of Easing
File 7--Re: "Problems at TCOE" (CuD 6.47)
File 8--Is there an MIT/NSA link-up for PGP 2.6? Some Info
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Thu, 2 June, 1994 23:54:21 EDT
From: anon <cudigest@mindvox.phantom.com>
Subject: File 1--AT&T Lab Scientist Discovers Flaw in Clipper Chip
(The government's proposed encryption technology may not be as
secure as proponents want us to think. This might be of interest
to you--anon).
Scientist Insists U.S. Computer Chip has Big Flaw
By John Markoff
Extracted from the New York Times, June 2, 1994
Technology that the Clinton administration has been promoting for use
by law enforcement officials to eavesdrop on electronically scrambled
telephone and computer conversations is flawed and can be defeated, a
computer scientist says.
Someone with sufficient computer skills can defeat the government's
technology by using it to encode messages so that not even the
government can crack them, according to AT&T Bell Laboratories
researcher Matthew Blaze.
(The article explains the background to the fight to implement
Clipper by the Clinton Adminstration as a means to help
law enforcment, and notes that the technolgoy has been
widely criticized by communications executives and others)
The industry also fears foreign customers might shun equipment if
Washington keeps a set of electronic keys. But now Blaze. as a result
of his independent testing of Clipper, is putting forth perhaps the
most compelling criticism yet: The technology simply doesn't work as
advertised.
Blaze spelled out his findings in a draft report that he has been
ciculat-ing quietly among computer researchers and federal agencies in
recent weeks.
"The government is fighting an uphill battle," said Martin Hellman. a
Stanford University computer scientist who has read Blaze's paper and
who is an expert in data encryption. "People who want to work around
Clipper will be able to do it."
But the National Security Agency. the government's electronic spying
agency, said Wednesday that Clipper remained useful, despite the flaw
uncovered by Blaze.
"Anyone interested in circumventing law enforcement access would most
likely choose simpler alternatives," Michael Smith, the agency's
director of policy. said in a written statement.
"More difficult and time consuming efforts. like those discussed in
the Blaze paper, are very unlikely to be employed."
(The article summarizes the government's defense for Clipper)
But industry executives have resisted adopting Clipper. Because the
underlying mathematics of the technology remain a classified
government secret, industry officials say there is no way to be
certain that it is as secure as encoding techniques already on the
market.
They also fear that Clipper's electronic back door, which is designed
for legal wiretapping of communications. could make it subject to
abuse by the government or civilian computer experts. Privacy-rights
advocates have cited similar concerns.
Industry executives also have worried that making Clipper a fed-eral
government standard would be a first step toward prescribing the
technology for private industry or requiring that it be included in
sophisticated computing and communications devices that are to be
exported.
Blaze said that the flaw he discovered in the Clipper design would not
permit a third party to break a coded computer conversation.
But it would enable two people to have a secret conversation that law
enforcement officials could not unscramble. And that could render
Clipper no more useful to the government than encryption technology
already on the market to which it does not hold the mathematical keys.
"Nothing I've found affects the security of the Clipper system from
the point of view of people who might want to break the system." Blaze
said. "This does quite the opposite. Somebody can use it to circumvent
the law enforcement surveillance mechanism."
The article concludes by noting that Blaze said that several
simple changes to the Clipper design could fix the flow, but that
this might be difficult because the changes would require the
government to start over in designing clipper. The governmetn has
already started ordering telephones containing the Clipper chip
for federal agencies.
------------------------------
Date: Thu, Jun 2 1994 17:33:21 PDT
From: Brock Meeks <brock@well.sf.ca.us>
Subject: File 2--Jacking in from the SNAFU Port (Clipper Snafu update)
((Moderators' Note: The following article may not be reprinted or
reproduced without the explicit consent of the author)).
CyberWire Dispatch // Copyright (c) 1994 //
Jacking in from the SNAFU Port:
Washington, DC -- Matthew Blaze never intended to make the front page
of the New York Times. He was just doing his job: Nose around inside
the government's most secret, most revered encryption code to see if
he could "break it." Blaze, a researcher for AT&T Bell Labs, was good
at this particular job. Maybe a bit too good. Although he didn't
actually "break" the code, he did bend the fuck out of it. That feat
landed him a front page story in the June 2 issue of the New York
Times.
What Blaze found -- and quietly distributed among colleagues and
federal agencies in a draft paper -- was that design bugs in Skipjack,
the computer code that underlies the Clipper Chip encryption scheme,
can be jacked around, and re-scrambled so that not even the Feds can
crack it. This of course defeats the whole purpose of the Clipper
Chip, which is to allow ONLY the government the ability to eavesdrop
on Clipper encoded conversations, faxes, data transmissions, etc.
What Blaze's research attacks is something called the LEAF, short for
"Law Enforcement Access Field." The LEAF contains the secret access
code needed by law enforcement agents to decode the scrambled
messages. Blaze discovered that the LEAF uses only a 16- bit
checksum, which is a kind of self-checking mathematical equation.
When the checksum equations match up, the code is valid and
everything's golden. The cops get to unscramble the conversations and
another kiddie porn ring is brought to justice. (This is what the FBI
will tell you... again and again and again and... ) But you can
generate a valid 16-bit checksum in about 20 minutes, according to
those crypto-rebels that traffic the Internet's Cypherpunks mailing
list. "A 16-bit checksum is fucking joke," one cryptographic expert
from the list told Dispatch. "If it weren't so laughable, I'd be
insulted that all this tax payer money has gone into the R&D of
something so flawed."
But the New York Times got the story *wrong* or at least it gave only
part of the story. "What the New York Times story didn't say was that
the findings... had nothing to do with the Government standard, which
covers voice, facsimile and low-speed data transmission," said an AT&T
spokesman. AT&T was the first company to publicly support the Clipper
Chip. A stance that was essentially bought and paid for by the U.S.
government with the promise it would get big government contracts to
sell Clipper equipped phones to Uncle Sam, according to documents
previously obtained by Dispatch.
The AT&T spokesman said the "frailty" that Blaze discovered doesn't
actually exist in the Clipper Chip applications. "Our scientists,
working with National Security Agency (NSA) scientists, were
conducting research on proposed future extensions of the standard," he
said.
Those "future extensions" are the so-called Tessera chip, intended to
be embedded in a PCMCIA credit card sized device that fits into a slot
in your computer.
When the NSA trotted out its Tessera card, it invited Blaze, among
others, to review the technology, essentially becoming a beta-tester
for the NSA. No formal contract was signed, no money changed hands.
Blaze took on the job in a volunteer role. Using a prototype Tessera
chip installed on a PCMCIA card, he broke the damn thing.
AT&T claims the whole scenario is different from the Clipper because
the LEAF generated by Clipper "is a real time application... with
Tessera it's static," the spokesman said. He said Tessera would be
used to encrypt stored communications or Email. "And with Tessera,
the user has the ability to get at the LEAF," he said, "with Clipper,
you don't."
Blaze will deliver his paper, titled "Protocol Failure in the Escrowed
Encryption Standard," this fall during the Fairfax Conference. His
findings "should be helpful" to the government "as it explores future
applications," of its new encryption technology the AT&T spokesman
said. In our view, it's better to learn a technology's limitations
while there's time to make revisions before the Government spends
large sums to fund development programs."
This is an important, if subtle statement. The Clipper Chip never
underwent this type of "beta-testing," a fact that's drawn the ire of
groups such as Computer Professionals for Social Responsibility (CPSR)
and the Electronic Frontier Foundation (EFF). When the White House
began to take hits over this ugly situation, it agreed to have an
independent panel of experts review the classified code to check for
any trapdoors.
Those experts claim they found nothing fishy, but their report -- alas
--has also been classified, leading to further demands for openness
and accountability. The White House is stalling, naturally.
But in an apparent about face, the NSA allowed an "open" beta- testing
for Tess and -- surprise -- we find out there are bugs in the design.
Okay, Pop Quiz time: Does the existence of "Blaze Bug" make you feel:
(A) More secure about the government's claim that Clipper will only be
used to catch criminals and not spy on the citizenry. (B) Less secure
about everything you've ever been told about privacy and encryption by
the Clinton Administration. (C) Like this entire episode is really
an extended "Stupid Pet Tricks" gag being pulled by David Letterman.
If you're still unsure about Clipper, check this quote from the AT&T
spokesman: "It's worth noting that Clipper Chip wasn't subjected to
this type of testing." Ah-huh... any questions?
The NSA is trying to downplay the news. "Anyone interested in
circumventing law enforcement access would most likely choose simpler
alternatives," said Michael Smith, the agency's planning director, as
quoted by the New York Times. "More difficult and time-consuming
efforts, like those discussed in the Blaze paper, are very unlikely to
be employed."
He's right. Those "simpler alternatives" include everything from
private encryption methods to not using a Clipper equipped phone or
fax in the first place. (Of course, the FBI keeps insisting that
criminals won't use any of this "simpler" knowledge because they are
"dumb.")
Despite the NSA's attempt to blow off these findings, the agency is
grinding its gears. One NSA source told Dispatch that the Blaze paper
is "a major embarrassment for the program." But the situation is
"containable" he said. "There will be a fix." Dispatch asked if there
would be a similar review of the Clipper protocols to see if it could
be jacked around like Tess. "No comment," was all he said.
Meeks out...
------------------------------
Date: Thu, Jun 2 1994 17:33:21 PDT
From: Brock Meeks <brock@well.sf.ca.us>
Subject: File 3--Jacking in from the "We Knew It All Along" Port (Clipper)
((Moderators' Note: The following article may not be reprinted or
reproduced without the explicit consent of the author)).
CyberWire Dispatch // Copyright (c) 1994 //
Jacking in from the "We Knew It All Along" Port:
Washington, DC -- The key technology underlying the Administration's
Tessera "Crypto Card" was fatally flawed from its inception, Dispatch has
learned. Government researchers working for the National Security Agency
have known for months about the flaw, but purposefully withheld that
information from the public, a government official acknowledged today to
Dispatch.
Cryptographic researchers at the super-secret NSA have known all along that
the program used to scramble a key part of the government's Clipper system
could be thwarted by a computer savvy user with 28 minutes of free time,
according to an NSA cryptographic expert that spoke to Dispatch under the
condition he not be identified.
"Everyone here knew that the LEAF (Law Enforcement Access Field) could be
fucked with if someone knew what they were doing," the NSA expert said.
"We knew about the flaw well before it became public knowledge. What we
didn't know is how long it would take an outside source to discover the
flaw."
In essence, the NSA decided to play a kind of high-tech cat and mouse game
with a technology being hailed as the most secure in the world. So secure,
the White House is asking the public to give up a degree of privacy because
there's no chance it can be abused.
"We figured [the presense of the flaw] was an acceptable risk," the NSA
expert said. "If no one found out, we probably would have fixed it sooner
or later," he said. "I can't imagine that we would have let that one slip
through."
But someone spoiled the end game. A 33-year-old AT&T scientist Matthew
Blaze discovered the crack in the White House's increasingly crumbling spy
vs. citizen technology.
Acting as a kind of beta-tester, Blaze found several techniques that could
be used to successfully thwart the LEAF, the encrypted data stream needed
by law enforcement officers in order to identify what amounts to a social
security number for each Clipper or Tessera chip.
Once the LEAF is in hand, law enforcement agents then submit it to the
"key escrow agents." These escrow agents are two government authorized
agencies that keep watch over all the keys needed to descramble Clipper
or Tessera encoded conversations, faxes or data transmissions. Without the
keys from these two agencies, the law enforcement agents hear nothing but
static. Without the LEAF, the agencies won't cough up the keys.
Bottom line: If the LEAF is fucked, so is access to the scrambled
communications.
What Blaze so eloquently discovered is that someone with a modicum of
knowledge could do was jack around with the LEAF, rendering it unusable.
What Blaze didn't realize is that he was merely acting as an NSA stooge.
But the methods discovered by Blaze, and outlined in a draft paper he'll
later present this month during a high brow security shindig known as the
Fairfax conference, are cumbersome. "The techniques used to implement
(the work arounds) carry enough of a performance penalty, however, to limit
their usefulness in real-time voice telephony, which is perhaps the
government's richest source of wiretap-based intelligence," Blaze writes in
his paper.
Notice he says "limit" not "completely render useless." Important
distinction. Are there other, faster, more clever ways to circumvent the
LEAF? "If there are, I wouldn't tell you," the NSA crypto expert said.
Shut Up and Chill Out
=====================
The National Institute of Standards and Technology (NIST), the agency
walking point for the White House on the Clipper issue, takes these
revelations all in stride. Sort of a "shut up and chill out" attitude.
The techniques described by Blaze "are very unlikely to be used in actual
communications," a NIST spokeswoman said. Does that mean they could never
be used? "It's very unlikely."
NIST, when confronted with the fact that NSA researchers knew all along
that the technology was broken, was unapologetic. "All sound cryptographic
designs and products consider tradeoffs of one sort or another when design
complexities, costs, time and risks are assessed," the NIST spokeswoman
said. The Clipper family of encryption technologies "is no exception,"
she said.
NIST said that the Tessera card "isn't a standard yet, so the process of
testing it's integrity is ongoing." The technology in Tess is known as
the Capstone chip, which, unlike the Clipper Chip, hasn't yet been accepted
as a standard, NIST said.
Flaws, therefore, are assumably just part of an ongoing game.
The fact that the NSA knew about this flaw when it asked people like Blaze
to test it was "just part of the ongoing testing procedure," the
spokeswoman said. And if Blaze or some other idea hamster hadn't
discovered the flaw? You make the call.
What about Clipper? Are there such flaws in it? NIST says "no" because
it has already been through "independent testing" and accepted as a
standard. If there are flaws there, they stay put, or so it seems.
Clipper's My Baby
=================
Beyond the high risk crypto games the NSA has decided to play, there's
another disturbing circumstance that could torpedo the Clipper before it's
given its full sailing orders. This obstacle comes in the form of a patent
dispute.
Silvio Micali, a scientist at the massachusetts Institute of Technology
says the Clipper is his baby. He claims to hold two crucial patents that
make the Clipper tick.
"We are currently in discussions with Mr. Micali," NIST said. "We are
aware of his patent claims and we're in the process of addressing those
concerns now," a NIST spokeswoman said.
She wouldn't go into details about as to the extent of the talks, but
obviously, the government is worried. They haven't flatly denied Micali's
claims.
If this all sounds like a bad nightmare, you're right. NIST ran into the
same problems with its Digital Signature Standard, the technology they've
adopted as a means to "sign" and verify the validly of electronic mail
messages. Others jumped on the government's DSS standard, claiming they
were owed royalties because they held patents on the technology. These
discussions are still "ongoing" despite the government's adoption of the
standard.
The same situation is now happening with Clipper. One could make a case
that Yogi Berra is the policy wonk for the Clipper program: "It's like
deja vu all over again," Berra once said.
So it is, Yogi... so it is.
Meeks out...
------------------------------
Date: Sat, 4 Jun 1994 00:02:27 -0700
From: Bernardo Parrella <berny@WELL.SF.CA.US>
Subject: File 4--Crackdown on Italian BBSes Continues
Twenty-four days after the first major crackdown on Fidonet Italia
BBSes, on Friday June 3, the Taranto Finance Police visited Taras
Communications BBS, the main National Peacelink node and data-bank.
Acting after a warrant issued by the Prosecutor of the same city,
Giovanni Pugliese and his wife were charged for the possession of
"illegally copied software and electronic equipment suitable to
falsification." After searching their apartment for more than 5 hours
(from 5 pm to 10.30 pm), Finance officials sealed off the PC on which
the BBS run and seized 174 floppy disks - leaving behind the monitor
and the only available modem. Because the Taranto node hosts most of
the network archives and all the email traffic, at the moment the
entire national Peacelink net is down. Giovanni Pugliese is currently
working to start again his system as soon as possible - probably in
the next 48 hours.
With more than 30 nodes throughout the country, several Fidonet
gateways, and a project currently underway to connect directly to
Comlink and the other APC Networks, Peacelink is completely dedicated
to peace, human rights and ecology issues. Founded in1992 as a
specialized conference of Fidonet Italia network, Peacelink became
quickly independent and well known even outside Italy. Recently the
network hosted a national conference on peace-related matters,
becoming also the only communication link for people in the
former-Yugoslavia and the outside world.
"Taras Communications BBS has never had anything to do with software
piracy and is well know for its activities related to humanitarian,
peace, social issues," Giovanni Pugliese said. "Peacelink and its
sister Fidonet Italia network had always pursued a very restrictive
policy against any illegally copied software on their systems. Because
Taras Communications BBS is the main National node of Peacelink
network, its forced closure, hopefully very short, will result in a
great damage for those hundreds of people - including journalists,
activists, volunteers - that were widely relying upon its everyday
services."
The first phase of the crackdown (May 11-13) targeted Fidonet Italia
network in several cities in the northern and cental regions of the
country. While a still inaccurate number of BBSes (probably from 30 to
60) were searched and dozens were closed down, on May 25 an official
press-release of the Finance Police in Torino claimed a seizure "for a
value of more than 4 billion of Italian lire (about US $2,5 million),
including 17 personal computers; 13,690 floppy disks of illegally
copied software," dozens of modems and electronic devices.14 people
were charged with "conspiracy with unknown for the crime of software
piracy" - but no arrests were made.
The new raid hit the online community at the exact moment when sysops,
users, media and citizens were waiting for a relaxing and clarifier
signal from investigators, including the first decisions about the
seized hardware scheduled in these days.
Right now, activists are coordinating a series of quick answers,
including the foundation of a National association dedicated to the
protection of civil rights for Electronic Citizens.
- Bernardo Parrella
<berny@well.sf.ca.us>
<b.parrella@agora.stm.it>
< - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - >
electronic distribution of this posting is greatly encouraged,
preserving its original version, including the header and this notice
< - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - >
------------------------------
Date: Sat, 4 Jun 1994 00:02:27 -0700
From: Bernardo Parrella <berny@WELL.SF.CA.US>
Subject: File 5--Norwegian BBS Busts / BitPeace
Norwegian Bust
==== fwd msg ====
>From svaar@math.uio.no Fri Jun 3 12:40:21 1994
General Briefing from BitPeace - the Norwegian BBS Scene
--------------------------------------------------------
The Norwegian police acting on initiative from the Ministry of Cultural
Affairs has been exasperatingly aggressive since May 25th. Since
Tuesday, 3 bulletin boards have been busted, named Zilent BBS,
Byte BBS and Scheen BBS.
The operator of Zilent BBS is 12 years old, and got busted for a receipe
on making your own firecrackers. The police stormed his house, took his
equipment and left..:-)
Byte BBS got busted for having one (ONE) illegal pornographic picture.
Rumours go that this was planted there by a Norwegian computer firm that
collaborates with the Oslo District Attorney - as his "experts". Anyway,
the SysOp in question was on a 14-day vacation when some luna uploaded
the illegal picture to his BBS. Then some other luna (or was it the same
guy??) tipped off the Norwegian police, which waited for the poor SysOp
when he returned home. He winded up in police custody, and is due to
appear before a local magistrate in a few weeks time. These legal
proceedings are going to constitute a case of paramount importance - and
if the SysOp is acquitted, this law suit would set legal precedence
and of course be a great victory for us all. A legal success would lay
down precedence for that a Sysop is not responsible for what the users
upload, at least not when he's not home, but that the USER has to take
this responsibility. Currently one takes a great risk putting up a board
up, you may risk loosing all your equipment, which may or may not be
returned with or without the whole or parts of the software intact; all
according to the free discretion of the local police. (That is, if you
can't afford having someone watching the system 24 hours a day.)
We are trying to organize some kind of association to protect SysOp rights.
We also produce software to reduce the damage for the sysop if he or she
gets busted. We are also to organize political protests, and many
Sysops have requested political asylum in the Italian embassy. (Because
that was the only embassy that even allowed us to TALK with them.)
Politicians in Norway have moved a law proposal that would make Norwegian
sysops editorially responsible to the law for whatever software or
messages happening to be present at his / her board at any time.
Preventing this bill from being passed is our main objective - and we
have a hard fight ahead if we are to avoid this. That's what we've got
to do, and I hope that you organize and work against the same type of
political sencorship and random ransacking and confiscations at the
free will and discretion of any local police attorney. We would also
be extremely glad if you helped us - if you're an Italian citizen,
please address your letter of protest to the Royal Norwegian Embassy
in Rome. If writing from outside Italy, you may direct your letters
to the Royal Norwegian Foreign Office in Oslo. The adresses are as
follows:
Reale Ambasciata di Norvegia
Via delle Terme Deciane 7
I-00153 Roma
ITALY
Royal Norwegian Foreign Office
Haakon VII's plass
Oslo 1
NORWAY
The authors of this briefing is availiable through mail;
Peter Svaar <svaar@math.uio.no>
Jac. Aallsgt.21
0364 Oslo 3
BBS: +47 22 567 008 (Bulletronics BBS)
Voice: +47 22 69 59 94 (Between 15:00 and 23:00 CET)
Ingar Holst
Niels Juelsgt. 41a
0257 Oslo
------------------------------
Date: Thu, 2 Jun 1994 21:18:43 PDT
From: Anonymous <cudigest@mindvox.phantom.com>
Subject: File 6--BSA: Software Piracy Problem Shows no Sign of Easing
This came across the nets and should be of interested to CuD
readers -- anon
======================
From: Computer Age
New worldwide piracy estimates just released by the Business Software
Alliance show that massive global theft of software continues unabated
with annual losses to publishers and distributors of at least $12
billion.
Use of pirated software ranges in some Asian countries up to 99
percent. In Europe, estimates run as high as 86 percent. They are 85
percent in some parts of Latin America.
To help fight the problem, the Washington, D.C.based trade group has
just expanded its European Regional Program to offer membership -- at
no cost for the first year -- to small European software publishers
with less than $10 million in worldwide revenues.
The new program offers publishers BSA's help through public policy
proposals to strengthen copyright protection for software, legal
action to enforce copyright laws against infringers, and market
projects to promote use of original software.
The following chart provides a country-by-country breakdown of the
estimated percentage of software in use that is pirated, and the
dollar losses this represents to software makers:
Percentage Dollar
Country of Piracy Losses
Australia/New Zealand 45% 160 million
Benelux 66% 419 million
France 73% 1.2 billion
Germany 62% 1 billion
Italy 86% 550 million
Japan 92% 3 billion
Korea 82% 648 million
Singapore 41% 24 million
Spain 86% 362 million
Sweden 60% 171 million
Taiwan 93% 585 million
Thailand 99% 181 million
UK 54% 685 million
United States 35% 1.9 billion
Argentina 80% 38 million
Brazil 80% 91 million
Chile 75% 28 million
Colombia 85% 18 million
Mexico 85% 206 million
Venezuela 85% 91 million
Other Latin American
Countries 72 million
------------------------------
Date: Thu, 02 Jun 1994 07:07:36 -0700 (MST)
From: Joel M Snyder <Joel_M_Snyder@OPUS1.COM>
Subject: File 7--Re: "Problems at TCOE" (CuD 6.47)
I'm writing to respond to the message by Jim Maroon, forwarded by Stanton
McCandlish (mech@eff.org).
This sort of conjecture and hearsay really does the cause of electronic
freedom (if there is such a thing) more harm than good. It's obvious that
there's some sort of problem going on at the Tulare County Office of
Education, but posting this one-sided diatribe probably won't help the
situation there or anywhere.
In any case, the larger problem with this post is a dive into "amateur
lawyer" which seems to happen so often in USENET news. This paragraph
begins with "TCOE is bound by the First Amendment" (which we know not to be
true), stomps through a whole series of very complex issues involving use
of public facilities, with a variety of incorrect statements, ending with
"The courts have found that publicly funded universities could not remove
Internet listservs based on objection the content of those listservs..."
(which we know not to be true) and coming to the conclusion that:
> A BBS is just a bunch of folks sitting around talking. You can't
> dictate what speech is allowed and what speech is not allowed on a BBS
> run by a government institution.
This final statement is specifically unsupportable in this context.
My response is simple: this is not a legal issue. It is a political issue.
If you truly believe that the TCOE is obligated to offer an unfettered
forum (if it offers a forum at all), then the way to fight for your beliefs
is using exactly the same technique you found objectionable in the first
place: political pressure. Threatening legal action where none can be
brought forward will only bring you the jeers and annoyance of the system
operators. However, using the traditional political weapons of publicity,
public meetings, and "going over your head" will most likely create one of
two results:
1- the system will be shut down, as no one wants to be in such a
mess, or,
2- some obscure set of conditions where the sysop erred will be
found and he will be appropriately wrist-slapped -- with
that example serving to draw the line at what is
appropriate and what is inappropriate behavior.
Without knowing anything about the particulars, I suspect that (1) is the
most likely candidate.
------------------------------
Date: Mon, 30 May 1994 18:04:50 -0500 (CDT)
From: tlawless@WHALE.ST.USM.EDU(Timothy Mark Lawless)
Subject: File 8--Is there an MIT/NSA link-up for PGP 2.6? Some Info
For the past week our Unix machine has been down (Might have gotten
some mail bounces) because of a security violation. Durring that week
i re-discovered bbs's. One peice of info i found (And also got the
authors's permission to reprint (At the end) relevent to pgp I thought
i would pass on.
D Area: CypherMail DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Msg#: 19 Date: 05-24-94 19:47
From: Leland Ray Read: Yes Replied: No
To: All Mark:
Subj: More on PGP 2.5 & 2.6
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
-----BEGIN PGP SIGNED MESSAGE-----
The following is the complete, unedited plaintext of a message I
received via CompuServe from Christopher W. Geib, a software developer
who spent several years as a military intelligence officer. Chris has
written a very fine Windows interface for PGP which I'll be uploading
as soon as I get the newest release (with Chris's permission, of
course). I trust his judgment on this one.
~~~ =====(Begin plaintext)=====
Leland,
I sent this to Mich Kabay of the NCSA Forum. Thought you might find it of
interest. Note that 2.5 is also a MIT/NSA concoction.
Chris
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Mich,
As I reflected on more and more on this posting, it occurred to me
that I was smelling a rat. The NCSA Forum members and others who
visit here should give thought to this issue. A puzzle of sorts seems
to be developing regarding PGP in general, and private possession of
crypto in particular. Let me provide some pieces to this puzzle, and
perhaps you and others may begin to see the bigger picture that seems
to be unfolding.
Piece #1: As you may already know, MIT is the single largest ($'s)
outside contractor to the NSA.
Piece #2: MIT is frustrated they feel that they have been somehow
cheated financially by the proliferation of PGP 2.3a as freeware. (I
still think that is insane as RSA was developed using public funding)
Piece #3: NSA is frustrated because of the apparent strength of the
imported Idea(tm) cipher.
Piece #4: NSA is pushing the Clipper crypto technology so that Big
Brother can have a free and easy backdoor to violate the privacy of
Americans. Note too, that Clipper technology was assisted along by
MIT.
Piece #5: PGP 2.6 will *not* be compatible with 2.3a after Sept 1994
for 2-way encryption. This accomplishes reduced international secure
traffic by private individuals and businesses. This is exactly the
same problem that Clipper has.
Have you begun to see the big Puzzle Palace picture yet? Unless my
eyes deceive me, I would say this, MIT and NSA have teamed up together
on PGP 2.6! This version, until proven otherwise (through examination
of the source code, etc.), is likely to contain a backdoor big enough
to drive a Mack truck through it. The back door is likely similar to
Clipper and for the same intent. Given how much flak NSA has gotten
over Clipper, NSA will very likely stay very mum about the whole
issue. The big winners are NSA and MIT. They both get exactly what
each has wanted all along. MIT gets royalties they think they
deserve, NSA gets what they intend to have anyway, a means to continue
listening into citizens private conversations. NSA also wins on the
international front by reducing it's workload of analyzing
international encrypted traffic. Business and the citizens lose
because it isolates the US from Europe and the international
marketplace.
I strongly recommend that anyone who acquires PGP 2.6 do so with a
jaundiced eye. Until the private sector can review, and analyze this
new MIT/NSA system, one *must* assume that it is as if it contained a
virus, one you may never know it has. I for one will continue with
the present version as it's inventors have no reason to capture
private communications.
If you think appropriate, please upload to Internet Risks with my
blessings.
Respectfully,
Christopher W. Geib
~~~ =====(End of plaintext)=====
So you decide, guys. Is it worth the risk? Again, just some
thoughts, but remember this: if you go to either ver. 2.5 or 2.6,
you'll probably have to revoke your ver. 2.3 keys and start afresh
with new ones, which might not be secure in the first place.
LR
... If the Pope's phones weren't secure, PGP would be a sacrament.
((Post obtaining reprint permission deleted))
------------------------------
End of Computer Underground Digest #6.49
************************************