Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 08 Issue 76
Computer underground Digest Sun Oct 27, 1996 Volume 8 : Issue 76
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.76 (Sun, Oct 27, 1996)
File 1--Hacker posts nudes on court's Web pages (fwd)
File 2--Internet Anti-Piracy Campaign Launched
File 3--COMMUNITY CONNEXION SUED IN FRIVOLOUS LAWSUIT
File 4--Dropping of the SPA Suit against CCC
File 5--LAWSUIT DROPPED; SPA STILL DEMANDS MONITORING
File 6-- International Release: Internet Piracy Case
File 7--The "Kiddie-Porn" Spam
File 8--AOL - Breaking Spam News
File 9--More on AOL "child porn" spam
File 10--Flaw in Solaris 2.4 Daylight Savings Time Calculation (fwd)
File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 25 Oct 1996 21:16:56 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 1--Hacker posts nudes on court's Web pages (fwd)
From -Noah
---------- Forwarded message ----------
Date--Fri, 25 Oct 1996 16:47:39 -0500
C Y B E R - S P A C E P R O J E C T Email List / Instructions at the end
----------------------------------------------------------------
PHAETHON :::
10/25/96 -- 12:43 AM
Hacker posts nudes on court's Web pages
By ROB CHEPAK of The Tampa Tribune
TALLAHASSEE - The Internet home of the Florida Supreme Court isn't
the kind of place you'd expect to find nudity.
But that's what happened Wednesday morning when a judge in
Tallahassee found a pornographic photo while he was looking for
the latest legal news.
A computer hacker broke into the high court's cyberhome, placing
at least three pornographic photos and a stream of obscenities on
its Web pages.
.............
The Florida Court's Web site is used to post information about
court opinions, state law and legal aid. Thousands of people,
including children, use the court system's more than 500 Internet
pages each month, Waters said.
.............
Officials aren't sure how the culprit broke in, and FDLE had no
suspects Thursday afternoon. But court officials long have
suspected their Web site could be a target for hackers armed with
the computer equipment to impose photos on the Web. The Florida
Supreme Court became the first state Supreme Court in the nation
to create its own Internet pages two years ago.
.............
Without a clear motive or obvious physical evidence, FDLE
investigators, who also investigate child pornography on the
Internet, hope to retrace the culprit's steps in cyberspace.
However, Ponder said cases of Internet tampering are "very
difficult to solve."
Thursday, the state's top legal minds, who are used to handing out
justice, seemed unaccustomed to being cast as victims.
"No damage was done," Kogan said in a statement. "But this episode
did send a message that there was a flaw in our security that we
now are fixing."
* sotmesc@datasync.com aka ---* Frosty, ilKhan of the SotMESC
* To send a submission, use this address with 'CSP' in the Subject line
* Thanks to: Voyager, 2600, LOD, Knight Lightning, the Unabomber, etc
* Visit us at: http://www.datasync.com/sotmesc/gcms
* Or our convention at: http://www.datasync.com/sotmesc/ic-con
------------------------------
Date: Thu, 17 Oct 1996 22:44:41 -0500
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 2--Internet Anti-Piracy Campaign Launched
FOR IMMEDIATE RELEASE
Contact: David Phelps, (202) 452-1600, ext. 320, dphelps@spa.org
SPA Files Copyright Suits Against ISPs and End Users
Internet Anti-Piracy Campaign Launched
_________________________________________________________________
(Oct.10, 1996 --Washington, D.C.) -- The Software Publishers
Association (SPA) announced today that it has filed five civil
lawsuits for copyright infringement occurring on the Internet. Three
of the lawsuits were filed against Internet service providers (ISPs),
and the remaining two were filed against individual end users.
Additionally, SPA launched its Internet Anti-Piracy Campaign, which
includes education and enforcement components, in an effort to educate
and work cooperatively with ISPs regarding copyright infringement.
ISP lawsuits were filed on Oct. 7 and 8 against Community ConneXion of
Oakland, Calif.; GeoCities of Beverly Hills, Calif.; and Tripod Inc.
of Williamstown, Mass. The SPA members named as plaintiffs in all
three suits were Adobe Systems Inc., Claris Corp. and Traveling
Software Inc. In each case, SPA first contacted the ISP and requested
that the infringing material be removed, but the ISP failed to respond
and cooperate.
SPA also filed suit against Jeffrey Workman of Auburn, W. V., and
Patricia Kropff of Scottsdale, Pa, on behalf of Adobe Systems Inc.,
Claris Corp., Corel Corp., Datastorm Technologies Inc. and Novell,
Inc. In each of these instances, SPA received reports of alleged
copyright infringement on certain Web sites, and with the assistance
of the ISPs, tracked the individuals responsible for posting the
infringing material.
"These lawsuits send a clear signal to ISPs and end users that neither
direct nor contributory copyright infringement will be tolerated. The
Internet does not provide a safe haven for these types of activities,"
said Ken Wasch, SPA president.
SPA's Internet Anti-Piracy Campaign (IAPC), which is outlined at
http://www.spa.org/piracy/iapc.htm, contains information explaining
why ISPs may be liable for copyright infringement, the risks involved
and seven warning signs that infringing activity may be taking place
on the ISP's server. Additionally, ISPs may sign an ISP Code of
Conduct to show they have adopted the operating practices encouraged
under the copyright law.
Upon receiving a report of alleged copyright infringement on the
Internet, SPA confirms the unlawful activity and sends a letter to the
ISP servicing the infringing user. In most cases, the ISP cooperates
and remedies the situation. If the infringing user can be identified
-- as alleged in the Workman and Kropff cases -- SPA may then choose
to seek action against the end user. If the ISP is unwilling to stop
the unlawful activity, SPA may choose to file suit against the ISP.
"Our intentions are to work cooperatively with ISPs. A key element of
the IAPC is the ISP Education Program devoted to alerting ISPs to
their potential liability and providing them with the tools and
guidance to protect themselves," said Joshua Bauchner, SPA's
Litigation Coordinator.
"The IAPC maintains SPA's traditional balance between education and
enforcement. We first make contact in an effort to amicably resolve
the matter, and only when absolutely necessary do we turn to
litigation."
An integral part of the cooperative effort between SPA and ISPs is the
ISP Code of Conduct. This simple agreement asks that ISPs protect
themselves from liability by stopping pirate activity on their
systems. In return, SPA will attempt to contact the ISP if it receives
a piracy report concerning it -- before initiating other action.
Piracy has taken many forms on the Internet. These include making
unauthorized copies of software available for download, the posting of
serial numbers, cracker and hacker utilities and links to pirate FTP
sites. Although many believe piracy is limited to "warez" or illegal
copies of software, it extends beyond that narrow definition. Under
the law, anyone who knows -- or should have known -- of the
infringement and who assists, encourages or induces the infringement
is liable for indirect infringement. In each of the actions SPA filed,
at least two of the above infringements were present.
For additional information please visit the Internet Anti-Piracy
Campaign site at http://www.spa.org/piracy/iapc.htm. The ISP Education
Program information is available at
http://www.spa.org/piracy/ispinfo.htm. To report a case of piracy
please contact SPA's hotline at (800) 388-7478, piracy@spa.org or
complete an on-line intake form at
http://www.spa.org/piracy/pirreprt.htm.
SPA is the leading trade association of the desktop software industry,
representing the leading publishers as well as many start-up firms in
the business, home office, consumer, education and entertainment
markets. Its 1,200 members account for 85 percent of the sales of the
U.S. packaged software industry. SPA press releases are available
through fax on demand at (800) 637-6823.
------------------------------
Date: Mon, 14 Oct 1996 11:24:01 -0700 (PDT)
From: sameer@c2.net
Subject: File 3--COMMUNITY CONNEXION SUED IN FRIVOLOUS LAWSUIT
Fwd from: fight-censorship@vorlon.mit.edu
COMMUNITY CONNEXION SUED IN FRIVOLOUS LAWSUIT
For release: October 14, 1996
Contact: Sameer Parekh 510-986-8770
Oakland, CA - Community ConneXion, Inc, dba C2Net, condemns the
lawsuit served by Adobe Systems, Inc., Claris Corporation, and
Traveling Software, Inc. as a frivolous lawsuit. "As near as we can
tell," said C2Net President Sameer Parekh, "we are being sued for
being an Internet Service Provider."
C2Net is an ISP, providing shell accounts and web hosting
services. But the company is primarily a software vendor, selling
Stronghold, one of the most popular secure web servers on the
market. "We were looking into joining the Software Publisher's
Association, who filed the suit on behalf of the plaintiffs," said
Parekh, "but it's not very likely to happen at this point."
The lawsuit appears to charge C2Net with liability based upon
allegations that C2Net's customers provide links to pirated software
on other machines and "cracker tools" that allow users to beat
copy-protection mechanisms like software serial numbers.
"It's completely outrageous that the SPA has nothing better to do
than to file frivolous lawsuits against hard-working Internet Service
Providers," said Parekh. "We are not aware of any such links on our
pages or our customer's pages, and if our customers are breaking any
laws, we want to know about it so we can terminate their accounts."
(The lawsuit provides no specific examples.)
The lawsuit was apparently filed after a single attempt to contact the
company with a form-letter e-mail. The copy of the alleged e-mail
included as an attachment to the suit shows the SPA's real
motive. "They want us to sign a 'Code of Conduct'," said
Parekh. "Among other things, we'd have to agree to routinely monitor
our customer's web pages, which we won't do. We deal with complaints
about our customers on a case by case basis, and we have a firm and
clear policy against illegal activity of any sort. We've shut down
accounts for less than what they're alleging in this lawsuit."
"This is clearly a frivolous lawsuit," said Terry Gross, counsel for
C2Net. "The plaintiffs know that an ISP can only be liable if it
participates in and has knowledge of the improper activity, and it is
clear that they have no such basis."
Although the lawsuit does not mention the "Code of Conduct", it
appears that most ISPs who received the e-mail ended up signing it,
largely to avoid legal action from the much-feared SPA. Those that
didn't kowtow got sued.
"The terms of the 'Code of Conduct' are completely unacceptable," said
Parekh. "It basically gives the SPA the right to go on an ongoing
fishing expedition through our customer's files, and requires us to do
the same as their agent on a regular basis. The Code would classify
us as 'publishers', and we would become responsible for everything our
customers do. We've built this business on a solid foundation of
respect for our customer's privacy. Monitoring their activities
without grounds for suspicion is completely inconsistent with
maintaining their privacy."
"This lawsuit is grossly unfair, and it's going to cost us a lot of
time and money, but we don't have any choice but to fight it," said
Parekh. "What we have here is three giant software companies and their
well-funded bag of lawyers trying to bully a smaller software company
into adopting costly policies that invade customers' privacy."
A coalition is currently being formed to fight this case and make sure
that this form of legal terrorism does not occur in the future against
internet providers. The coalition will probably include the three companies
that have been served in the suit and other organizations with a stake
in creating a rational legal enviroment for ISPs and their customers.
C2Net provides high-security encryption solutions for the Internet
worldwide. More information about C2Net's products are available at
https://stronghold.c2.net/. Information about the forming coalition
may be found at https://www.c2.net/ispdc/.
------------------------------
Date: Sat, 26 Oct 1996 00:32:11 -0500
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 4--Dropping of the SPA Suit against CCC
ORIGINAL
ROBERT L. MAINES, State Bar No. 39977 FILED
ANDREW L. FAGAN, State Bar No. 121445
BRYANT, CLOHAN, OTT, MAINES & BARUH Oct 22 '96
550 Hamilton Avenue, Suite 220
Palo Alto, California 94301 Richard W. Wieking
Telephone: (415) 324-1606 CLERK
Facsimile: (415) 324-4613 U.S. DISTRICT COURT
NO. DIST. OF CA. S.J.
GEOFFREY G. GILBERT
ANTONIA S. PRITCHARD
McBRIDE BAKER & COLES
500 West Madison St., 40th Floor
Chicago, IL 60661-2511
Telephone: (312) 715-5700
Attorneys for Plaintiffs ADOBE SYSTEMS,
INCORPORATED, CLARIS CORPORATION, and
TRAVELLING SOFTWARE, INC.
IN THE UNITED STATES DISTRICT COURT
FOR THE NORTHERN DISTRICT OF CALIFORNIA
SAN JOSE DIVISION
ADOBE SYSTEMS, INCORPORATED, ) NO. C-96 20833 (SW EAI)
CLARIS CORPORTATION, )
and TRAVELLING SOFTWARE, INC. ) NOTICE OF VOLUNTARY
) DISMISSAL
)
Plaintiffs, )
)
v. )
COMMUNITY CONNEXION, INC. and )
SAMEER PAREKH, )
)
Defendants. )
_________________________________)
NOTICE IS HEREBY GIVEN that pursuant to Rule 41(a)(1) of the Federal
Rules of Civil Procedure plaintiffs voluntariily dismiss this action without
prejudice.
Dated: October 22, 1996. BRYANT, CLOHAN, OTT, MAINES
& BARUH, LLP
McBRIDE BAKER & COLES
By:____[signature]_________
ROBERT L. MAINES
Attorneys for Plaintiffs
ADOBE SYSTEMS, INCORPORATED,
CLARIS CORPORATION, and
TRAVELLING SOFTWARE, INC.
------------------------------
Date: Thu, 24 Oct 1996 12:34:48 -0700 (PDT)
From: sameer <sameer@c2.net>
Subject: File 5--LAWSUIT DROPPED; SPA STILL DEMANDS MONITORING
For Release October 24, 1996
Contact: Sameer Parekh 510-986-8770
LAWSUIT DROPPED; SPA STILL DEMANDS MONITORING
Oakland, CA - In an ongoing attempt to force Internet Service
Providers (ISPs) to monitor their customers' web pages, the Software
Publisher's Association (SPA), acting on behalf of three member
software companies, dropped a lawsuit against Community ConneXion,
Inc., dba C2Net, but reserved the right to bring the suit again if
C2Net failed to adopt a policy of monitoring their users' web pages
for copyright infringement.
The three plaintiffs, Adobe Systems, Inc., Claris Corporation, and
Traveling Software, Inc., seemed surprised to find that they had filed
the lawsuit, and sought to distance themselves from the action. For
instance, Adobe's PR department maintained that Adobe has definitely
not filed any such lawsuiT. (Contact Carol Sacks -- (408) 536-4033)
C2Net, a small, Oakland-based ISP and software company, has always
forbidden illegal activity on its servers. This includes copyright
infringement and contributory copyright infringement. "We're very
aware of the problems that software companies face from piracy; most
of our revenue comes from software and we have our own problems with
people pirating our software," said C2Net President Sameer Parekh. "I
just don't think that bullying hard-working ISPs into embracing a
highly questionable set of policies does anything constructive about
the problem of piracy."
The Software Publishers Association wants ISPs to sign a 'Code of
Conduct' which would force ISPs to actively monitor users. Under
current case law, this greatly increases the ISP's liability, in
addition to being extremely expensive, time-consuming, and distasteful
to users.
"The telephone company isn't required to monitor all their users to
make sure they're not saying illegal things," said Parekh. "How can we
be expected to do that for our customers' use of the Internet?"
Of the over twenty ISPs contacted by the SPA, many caved in and signed
the 'Code of Conduct', fearing a lawsuit from the SPA more than the
future expense and liability problems that result from ongoing
monitoring. A coalition of ISPs and other concerned parties, the ISP
Defense Coalition, has formed to oppose these bullying tactics by the
SPA.
"The SPA thought they could bully small ISPs, but they didn't
realize we had principles and couldn't be cowed," said Parekh.
Mike Godwin, Staff Counsel for the Electronic Frontier Foundation
said, "My personal view is that the Software Publishers Association
has forgotten that it is the legislature, not the courts, that is the
primary avenue for seeking changes in copyright policy. What we see
here is a perversion of the notion that the courts should be used to
seek justice -- SPA seems to have picked defendants in the hope that
they'd be too weak to resist. I find that decision morally
objectionable. Speaking as a lawyer, I have to say that this is the
kind of tactic that justifiably confirms in people's minds whatever
low opinions they may have of lawyers."
The suit alleged that C2Net users were providing tools to get around
copy protection in the plaintiffs' software, and were providing
pointers to other sites that actually contained pirated software. The
SPA provided no examples, and did not allege any direct copyright
infringement on C2Net machines.
"Despite our best efforts to get specific information," said Parekh,
"the SPA did not provide us with any specifics about our customers
engaging in infringing activity. We suspect that they had no evidence
of infringement, but acted merely on vague reports of questionable
conduct on the part of a few users."
C2Net provides high-security encryption solutions for the Internet
worldwide. More information about C2Net's products are available at
https://stronghold.c2.net/. Information about the forming coalition
may be found at https://www.c2.net/ispdc/.
------------------------------
From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
Date: Wed, 23 Oct 1996 13:34:40 CDT
Subject: File 6-- International Release: Internet Piracy Case
If you don't already have a copy of this, I thought you might found
it intestesting. Gee. Bomb-making recepies. How nice. And $60k worth
of Novell products is hardly anything at all...
These were from a private list server, so the header has been modified.
------- Forwarded Message Follows -------
Date sent-- Wed, 23 Oct 1996 11:30:47 -0600
Send reply to-- "xxxxxxxxxxxxxxxxx" <xxxxxxxx@NOVELL.COM>
From-- "xxxxxxxxxxxxxxxxx" <xxxxxxxx@NOVELL.COM>
Subject-- International Release--Internet Piracy Case
To-- Multiple recipients of list xxxxxx <xxxxxxxx@xxxxxxx.xxx.EDU>
Note: Attached is a press release on an anti-piracy raid in Switzerland.
This release was distributed internationally.
FOR IMMEDIATE RELEASE ---- October 23, 1996
Novell Brings Largest Ever Internet Piracy Case
Swiss Police Swoop On Internet Pirate In Dawn Raid
Following months of undercover investigation by Novell's
Anti-Piracy Group, on 15th October 1996, Swiss Police executed an
early morning raid in Zurich on the home of a 27 year old computer
technician calling himself *The Pirate'.
*The Pirate' was offering $60,000 of unlicensed Novell products,
along with commercial software from other Business Software Alliance
(BSA) members, to anyone with a connection to the Internet. During the
enquiry, Novell Anti-Piracy investigators also found files containing bomb
making recipes and instructions for defrauding credit cards.
During the raid officers from the Swiss Police Commercial Crime
Unit seized an extensive collection of computer hardware and software.
*The Pirate' who was taken into custody, could face a maximum prison
sentence of 3 years and/or a fine of up to SFR 100,000 (USD80,000) if
convicted.
In a related action on the same day, the Swiss police raided the
M-E-M-O Bulletin Board System (BBS) run by a systems operator calling
himself *The Shadow'. The M-E-M-O BBS was believed to have close
connections with *The Pirate' and in addition to making available
unlicensed Novell software via the telephone network, also offered a CD
and DAT tape writing service.
Martin Smith Novell's Licensing Manager for Europe Middle East
and Africa says, *This is a landmark case for the software industry. For
the first time today, individuals and organisations distributing unlicensed
software on the Internet know that they can be caught and prosecuted.
This case is the first of a series of Internet related actions which will be
brought by Novell and the BSA in Europe in the coming months.*
Smith continued *Novell is committed to working with law
enforcement groups throughout Europe to halt the supply of illegal
products on the Internet. Electronic distribution of illegally duplicated
software poses a threat both to the industry and consumers. In many
cases the software available from such sites has been passed around
the world, each transfer exposing it to potential corruption and viruses.
For the end-user this inevitably leads to system down time or loss of
data.*
Novell's Anti-Piracy Group can be contacted directly on dedicated
hotlines, a list of which accompany this release.
Founded in 1983, Novell (NASDAQ:NOVL) is the world's leading
provider of network software. The company offers a wide range of
network solutions for distributed network, Internet, intranet and
small-business markets. Novell education and technical support
programs are the most comprehensive in the network computing
industry. Information about Novell's complete range of products and
services can be accessed on the World Wide Web at
http://www.novell.com.. Novell is a member of the Business Software
Alliance (BSA).
###
Press Contact:
Sarah Williams
+44-(0)1344-724042
Internet: sarah_williams@novell.com
------------------------------
Date: Thu, 24 Oct 1996 22:51:01 CDT
From: Jim Thomas <jthomas@well.com>
Subject: File 7--The "Kiddie-Porn" Spam
((The following spam was received by thousands of people,
including me. It was received on an address that is rarely
used for external mail or Net posting, so it's unclear how or
why that account was selected. Following this post are
several responses to it - jt))
---------- Forwarded message ----------
Date--Mon, 21 Oct 1996 04:12:17 -0400
From--R9ch@aol.com
Subject--Child XXX
Hi! I sent you this letter because your email address was on a list that fit
this category. I am a fan of child pornography and for the past 4 years, I
have been able to gather quite a collection of it. I have pictures, VHS
tapes, posters, audio recordings, and games based on child pornography. I am
now selling my products (or trading for other child pornography). I have a
complete color catalog of all my products now available. You can purchase
pictures, both normal kodak, and computer GIF or JPG's. You can purchase
posters, the VHS tapes, and Audio recordings. If you send your picture, I
can morph your face into one of the action shots to make it appear that you
are the one having anal sex with a young boy. There are many preferences
you can choose from. Hair color, weight, age, height. Age of the young
boys range from 7 yrs to 17. Young girls, age 4 to 19. For $2.99 we can
send you a personalized audio cassette of a little boy moaning and groaning
your name. There are many other products and services.
If you were not supposed to receive this letter, please delete it
immediately. I send out these advertisements to this mailing list once a
week. If you you want to get off this mailing list, please send a letter to
my address below. Do not write to this email address because I will delete
it after I mail these letters. The only way to get off this mailing list is
to write to my address below.
Here are some prices:
Complete Color Catalog (160 pages)...........................$5.00
100 Pictures young boys age 7-12..............................$9.95
120 Pictures young boys age 13-17............................$11.95
VHS tape, young boys "Bath Time".............................$49.95
VHS tape, young boys "Happy B-day, Timmy".............$49.95
VHS tape, young boys "Bobby and His Friends"...........$49.95
VHS tape, young boys "Kid Loves Candy"....................$39.95
VHS tape, "Mister's Sin (Tale of an Alter Boy)".............$39.95
Personalized Audio tape.............................................$2.99
Personalized morphed action pic................................$14.95
(be sure to include your picture)
If you have any child pornography yourself, preferably young boys ages 7-9,
I will trade or buy them from you. If they are action shots, of an adult
with the young boy having sex, I am willing to trade big, or pay a lot.
Please write to me for more details. Thanks.
You can send a cash, check, or money order. Make it out to my company :
"Kwo UN"
Send your order to:
Child Fun
<name and address of presumably innocent target deleted>
Jackson Heights, NY 11372
You can also send your credit card numbers. I do not accept American Express
cards.
------------------------------
Date: Wed, 23 Oct 1996 15:49:54 -0700 (PDT)
From: David Cassel <destiny@wco.com>
Subject: File 8--AOL - Breaking Spam News
CNN is reporting that today the FBI "hinted" they were close to making an
arrest in the child pornography spam.
Stories have appeared in Reuters, the Associated Press, CNN, and the
Washington Post. Reuters reported that AOL was "deluged" with complaints,
and said the FBI observed tips came to their offices "around the country".
More interesting, an AOL officer told Reuters the account holders were not
the ones who sent the mail.
Hackers have been boasting about the capability to access any AOL
account--without a password--since last spring. Some speculate hackers
had moles in AOL's customer service department--when the editor of
Internet Underground magazine contacted hackers for a story, they offered
to recite his credit card number as proof. In July the Florida Times-
Union reported AOL's Florida customer service building housed an employee
who helped "hijack" customer credit card numbers. When arrested and
convicted, he implicated two other employees [7/7/96]. AOL caught 38 of
their own staffers in a June raid on the Warez chat room. And to this
day, one hacker's web page contains screen shots of AOL's internal
software. (http://www.netvirtual.com/blank/aol/)
Even Reuters has picked up on AOL's low-security climate. Their story
noted that "Hackers have in the past established bogus America Online
accounts using stolen credit card numbers and the signup disks the service
widely distributes..." The Washington Post reported 370,000 fake accounts
were created between March and June [9/16/96]).
That lends an odd context to the child pornography spam. Earlier this
year AOL's postmaster collected the tens of thousands of messages
Cyberpromotions sent to invalid addresses--then bounced them back, all at
once. Cyberpromotions saw this as a vindictive prank, and took AOL to
court, but some netizens lauded AOL for their effective retaliation.
But today a University of Maryland graduate student told the San Francisco
Examiner he received ten pieces of spam advertising a program called
AKIMA--giving the same address in Jackson Heights. The student said he
believes the child pornography mail was retaliation for the earlier spams
advertising AKIMA--a program which, ironically, allows mass e-mailing to
AOL subscribers.
This raises the question: was the child pornography spam a variation of
the postmaster's prank, perpetrated by someone within AOL? Their customer
service department's ties to the hacker community beg the question. In
September, speaking about unwanted spam, Steve Case said "this is the
number one complaint we hear from our members."
Either way, the event is being used to push pre-existing agendas. In an
interview with the San Francisco Examiner, a federal law enforcement
official "said it is apparently not against the law to pull a hoax on the
Internet." And CNN took this opportunity to link to their "related"
story, "Pedophiles stalk internet for victims". In September they had
interviewed two customs agents, reporting that the two "said they become
suspicious when someone offers pictures of celebrities--often a code word
for child pornography."
Coincidentally, CNN cites them as the agents who arrested Robert Green and
Richard Russell--the school teachers running the child pornography ring on
America Online (mentioned in a previous update). The Customs agents told
CNN the teachers had "used computers to lure children to a certain
location, where they would be molested." The Phoenix Gazette reported the
men would then produce videotapes of the children they met on America
Online. One of the boys was 11, the other 15; they were paid $15 each.
Ironically, news of the account breach came from AOL's public affairs
officer William Burrington, who was last seen at the Philadelphia trial
for the Communications Decency Act, where Declan McCullagh's dispatch said
he characterized AOL "as a 'resort pool with lifeguards' next to the wild,
untamed ocean of the Internet". Current events don't bear that out. Part
of the problem is their resort pool offers an unlimited supply of fake
screen names--and apparently, the security on them isn't foolproof. (Even
with the "lifeguards"...)
In 1995 Burrington also testified before Congress about AOL's child
pornography problems. He attributed the trafficking to "a very small
percentage of its customers." An article in the Boston Phoenix, noting
Burrington's "wind-tunnel-resistant hair", suggested the obvious follow-up
question would be, "what percentage of members who traffic in child
pornography is acceptable to AOL?"
Watch for a story about this in tomorrow's Netly News
(http://www.netlynews.com)
------------------------------
Date: Wed, 18 Mar 1953 04:13:11 -0500
From: Declan McCullagh <declan@well.com>
Subject: File 9--More on AOL "child porn" spam
*******
Date--Mon, 21 Oct 1996 06:58:08
From--atropos@aol.net (David O'Donnell at America Online)
Please note that if you received unsolicited mail from "r9ch@aol.com" or
"tiptoe0001@aol.com" yesterday (Sunday 20 October 1996), both accounts
were closed early this morning. Copies of the messages have been
forwarded to our legal department. Please do not send in more reports of
this abuse.
--
__ David B. O'Donnell (atropos@aol.net, PMDAtropos@aol.com)
\/ AOL Internet Development Outreach and Technology Manager
Tel.: 703/453-4000 x4255; FAX: 703/453-4102 "Spammum
WWW: http://www.idot.aol.com/atropos/ Delendum Est"
********
[Thanks to Dave Cassel for this. --Declan]
http://www.wco.com/~destiny/kidspam.htm
Earlier today an AOL user e-mailed hundreds of people, announcing "I
have pictures, VHS tapes, posters, audio recordings, and games
based on child pornography."
The notorious mail included a price-list and an address in Jackson
Heights, New York. Several hundred students at the University of
Oslo reportedly received copies, as did students at Yale. The
message was e-mailed to Oregon, Georgia, Illinois, and New York, as
well as England, Australia, Holland, Finland, Germany, and Canada
(according to Usenet posts). The Royal Canadian Mounted Police
received several calls, as did Interpol. One ISP reported 10 of
their 1,000 users received copies--close to 1%.
Even some net personalities received copies. Ron Newman, formerly
of the MIT Media Lab, received the e-mail at five different
accounts. Joe Shea, editor of the American Reporter, received a
copy; Philip Elmer-DeWitt, author of Time magazine's "Cyberporn"
cover story, received two. The authors of "The Stalker's Home
Page," and "Why AOL Sucks" also received the e-mail.
Responding to complaints, AOL stated "we have closed the accounts
involved, and our legal department is taking action." Postmaster
David O'Donnell posted to Usenet, "Please do not send in more
reports of this abuse". Over 50 people complained to the New York
police department, who investigated the location--a P.O. Box--with
the FBI. (On a mailing list Brock Meeks noted that AOL has a
"working relationship" with the FBI.)
A reporter for the New York-based Newsday says the newspaper will
probably carry a story about the event in Tuesday's edition.
(http://www.newsday.com) According to one Usenet post, the
address belongs to one of AOL's "disk dancers". The mailing address
of the (presumably-framed) New Yorker is for sales of a program
that lets AOL users spend time on the system without being charged.
This is not the first time AOL's hacker community has cross swords
with child pornography. The documentation for AOHell contains a
section called "Why I made AOHell." "I'm sick of all the God damn
pedophiles," the program's author states. "AOL constantly closed
the 'Hackers' Member room, but refuses to do anything about all the
pedophilia rooms...If AOL is going to do nothing about this type of
sick behavior then I will do everything I can to screw AOL up."
Instead, users signing onto AOL tonight received an advertisement
for hardware that can "grab color images right from your camcorder,
VCR, or TV." This December marks the five-year anniversary of the
first child pornography scandal on AOL. In 1991 Newsweek reported
that one subscriber posing as a child "received pictures of what
appear to be youngsters involved in sexual acts." AOL's members
didn't find out about the incident until the story turned up on
CNN. (Mainly because the outraged user went straight to the
network.)
In 1993, ten-year-old George Burdynski disappeared from Brentwood,
Virginia. He was never seen again--but his disappearance launched
the largest child pornography investigation in FBI history. In
September of 1995, the FBI raided the homes of 120 AOL users, and
in July the FBI raided 100 homes just in Cincinnati. Days before,
one agent told the Cincinnati Enquirer "there are new people being
identified daily." The FBI had information on more than 3,000
users--which at the time constituted one out of every 1,200 AOL
subscribers; "FBI and America Online records revealed that during
one 25-minute span when an illegal photograph was made available on
the computer service, about 400 people nationwide downloaded the
picture to their computers." Jean Villanueva stated that AOL
contacted the FBI "upon receiving the material, and verifying that
it was in all likelihood illegal". (At least one children's rights
activist questioned the legality of the delays "verification" added
to AOL's response.)
Earlier that year U.S. Customs Officials cracked a child
pornography ring operating on America Online. In February of 1995
two teachers in Florida were charged, and a third suspect arrested
in Salt Lake City. A Customs official said photographs were being
downloaded directly from AOL's shareware section, which apparently
wasn't monitored round-the-clock. The first guilty verdict from
that investigation was handed down in February of 1996--for
photographs a user transmitted in July of 1994. In August an AOL
user in San Francisco was indicted for his involvement in a
13-year-old Kentucky girl's 2-week disappearance; in November of
1995, a New Jersey man was sentenced for actions with a young boy
in July of 1994.
The San Francisco Chronicle suggested problems were exacerbated by
AOL's fully-anonymous screen names. In fact, up until September of
1995, AOL wasn't even verifying the full authenticity of the credit
card information users input. That created an entrenched subculture
of disk dancers that persists to this day. The Washington Post
reported that between March and June, over 370,000 fake accounts
were created with bogus credit card information.
Ironically, the ten-year-old boy who disappeared lived just miles
from AOL's headquarters in Vienna, Virginia. One children's rights
advocate is considering setting up a fund in the boy's name.
------------------------------
Date: Fri, 25 Oct 96 07:35:25 CDT
From: Eric Behr <behr@math.niu.edu>
Subject: File 10--Flaw in Solaris 2.4 Daylight Savings Time Calculation (fwd)
FYI, in case you missed this:
>Date--Thu, 24 Oct 1996 23:47:01 -0700
>From--mark.graff@Eng.Sun.COM (Mark Graff)
>Subject--URGENT--Flaw in Solaris 2.4 Daylight Savings Time Calculation
>
>I have been asked to announce here an anomaly in timezone calculation
>which will affect some Solaris 2.4 customers this weekend. The bug:
>log entries will not accurately reflect the upcoming transition from
>Daylight Time back to Standard Time. You'll find details below.
>
>The only customers who will be affected are those who:
>
> * Run Solaris 2.4 systems, with kernel patch 101945-37 or later
> (for x86 systems, that's kernel patch 101946-35 or later); and
>
> * Are in locales which are reverting to Standard Time this
> weekend, such as most of the U.S., Canada, Mexico, and parts of
> Europe (but not Japan and many parts of Asia, Australasia, and
> Africa); and
>
> * Use (as most do) non-POSIX /usr/share/lib/zoneinfo
> representation to designate system timezones; and
>
> * Require accurate timestamps for system log entries and events
> this weekend.
>
>Since the problem will occur over a weekend evening, only lasts for a
>matter of hours, and doesn't affect the system clock, we expect that
>relatively few customers will even notice the effects of this bug.
>
>Note that this is *not* a security bulletin. We are sending this
>advisory out along the channels we usually reserve for security bugs
>because we wanted to get the information into our customers' hands as
>quickly as possible. We actually discovered the complication only this
>morning, while analyzing a related problem reported by a European
>customer a few weeks ago.
>
>The bug involves the C library calls which translate system time into a
>human-readable format, such as "Thu Oct 24 21:33:21 PDT 1996". The
>exact effect of the bug is that localtime(3)-format strings will revert
>to "Standard Time" at a moment indicated by GMT, not local time. This
>means, for example, that starting at 0200 hours GMT, Sunday, 27
>October, system logs and other timestamps recorded in local time will
>be off by one hour. The system will continue to record bad timestamps
>until 0200 hours local time, when the real world and the computer's
>calculations will once again agree.
>
>In the Pacific time zone, then, the problem will start at 1800 hours
>PDT and last for eight hours. In the Eastern time zone, the problem
>will start at the same moment (which is 2100 EDT) but only last for
>five hours--0200 comes earlier there! Affected systems in the European
>MET zone will experience the problem only for one hour--and the
>erroneous time will be one hour later than the real time, not earlier,
>as in the U.S.
>
>Note that it is in fact possible to avoid the problem behavior, by
>re-specifying the system's time locale in POSIX representation. The
>adjustment, however, is fairly complex; it involves re-booting the
>system; and describing the workaround completely would require telling
>you what to do for all 459 or so time locales around the world. We're
>not prepared to do that tonight.
>
>Of course we will fix the bug in subsequent kernel patches. But the
>patches won't be ready for some time, and certainly not before this
>weekend. So please, if you believe your system is one of those
>affected and would like help, now or later, contact your local Sun
>Solution Center.
>
>-mg-
>
>Mark Graff
>SunSoft
------------------------------
Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 11--Cu Digest Header Info (unchanged since 7 Apr, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #8.76
************************************