Computer Underground Digest Volume 2, Issue #2.05 (September 30, 1990)

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.05 (September 30, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: Re: The CU in the News (Mail reading) File 3: Anarchist Times, Inc. (ATI)--background File 4: The status of the electronic forum (BBS) File 5: Another experience with the law File 6: Some views on what to do if questioned by LE agents File 7: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.05, File 1 of 7: Moderator's corner *** ******************************************************************** Date: September 30, 1990 From: Moderators Subject: Moderators' Corner ++++++++++ In this file: 1. CuD SURVEY 2. CuD FORMAT 3. EURO-AMERICAN BBS 4. RIGGS SENTENCING ++++++++++++++++++ CuD Survey ++++++++++++++++++ Bob Krause has sent out the CuD survey, and the responses have been excellent. We thank all those who are cooperating, and urge you to return the survey if you have not yet done so. If you have misplaced it, drop Bob a note at: KRAUSER@SNYSYRV1 We will publish the results as soon as they are coded and analyzed. ++++++++++++ CuD Format ++++++++++++ Most people seem relatively unconcerned with our format, but those who are are quite adamant. The overwhelming majority of responses indicate that the current style should remain, so we will stick with it until opinion shifts the other way. +++++++++++ Euro-American Connection +++++++++++ For those wondering what has happened to Euro-American Connection, and why there is a voice message instead of Hot Mix's familiar logon logo: We are told that the disconnection is temporary, and he is simply moving. Word is that he will be back up and running when he's settled in a few weeks, and will try to get the same familiar number. ++++++++++++ Riggs Sentencing ++++++++++++ For those wondering what happened in the sentencing of the "Atlanta Three" who pled guilty a few months ago, we are told that the sentencing has been delayed for at least a few weeks. No reason was given for the delay. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Mon, 24 Sep 90 19:17:18 EDT From: David Waitzman Subject: Re: The CU in the News (Mail reading) ******************************************************************** *** CuD #2.05: File 2 of 7: From the Mailbag *** ******************************************************************** In CUD Volume 2, Issue #2.04, you talk about email being intercepted intentionally. In some Internet email systems, the postmaster may receive email messages that were unable to be properly delivered by the email system. It is difficult for a person acting as the postmaster not to read such email, since some portions of the email messages may contain delivery error reports. This differs from the usual case in the US Post Office, where the address and actual message text are clearly separated by an opaque envelope (except, for instance, on postcards). Any laws passed regarding email interception must take this matter into account, I believe. -david ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Thu, 27 Sep 90 02:36 EDT From: groundzero@TRONSBOX.XEI.COM Subject: Anarchist Times, Inc. (ATI)--background ******************************************************************** *** CuD #2.05: File 3 of 7: Anarchist Times, Inc.- Background *** ******************************************************************** Underground Electronic Newspaper For Your E-Reading Pleasure. E-Written by PA and GZ. WARNING: The story following may contain explicit thoughts descriptive of, advocating, or encouraging one or more of the following: television sadomasochism folk music freedom democracy nudity drinking or eating healthfood satanism guitar playing antidisestablishmentarianism tobacco chewing use of COBOL for object-oriented programming cross-dressing peace murder nose hair insanity morbid violence rock n roll the illegal use of drugs the use of alcohol new ideas or the use of hi-fi stereo equipment. The writers of ATI oppose censorship of any kind. ATI is going on its third year as your first source of underground news. ATI is Activist Times Inc., an underground online newsletter with a mission: to present information and opinion in a socially relevant and stimulating context. ATI features articles about and for the computer underground, telecom, BBSing, anarchy, current events, social issues, humor , entertainment and more. ATI is into Politics, the environment, technology, the telephone, and mostly the First Amendment. Prime Anarchist is the originator of ATI and its co-editor along with Ground Zero, who is also its publisher. Prime began ATI around February, 1988 as an online newsletter on bulletin boards in Rhode Island and New York, in addition to producing a few issues on hard copy. Soon ATI spread to the downloading sections of bulletin boards across the country, most notably The Phoenix Project and P-80 Systems. ATI has a long list of present and past contributors, and has been known to present articles that conveyed a unique twist of humor. The titles speak for themselves: "Terrorism of a 976 Phone Sex Line", "Quantum Mix-Up", "Mall Terrorism", "Fun in Rich Rural Towns", and many others. In fact, some of the originators of YIPL/TAP magazine ghostwrote some articles in 88 and 89. Some of the ghosts' initials (for you yipsters) were RF, norfolk Virginia; CC, NYC; AH, Penn; FS, NYC; FS, Rhode Island; & A1, NYC. Issues of ATI may be obtained from many bulletin boards in the US, Europe and around the world, including Ripco BBS at 312-528-5020. You may also be added to ATI's net distribution list by e-mailing Ground Zero at: > uunet!tronsbox!akcs.groundzero or akcs.groundzero@tronsbox.xei.com if you < have a smart mailer. To receive back issues of ATI, email Ground Zero or access the ftp distribution site at 128.95.136.2 and enter 'cd tmp/ftp/ATI'. Details are available in ATI #49 on how to receive back issues on disk. So demand ATI on your nearest BBS, inside your favorite mainframe, or right to your modem. But whatever you do, demand it. =) The makers of ATI would like to thank: Brother Jack, Dr. Timothy Leary, Jello Biafra, Johanna Lawrenson, Spin Magazine, Spy Magazine, Ronald and Nancy Reagan, Dirk Hitler, Manuel Noriega, Saddam "sodom" Hussein, The 1910 FruitGum Company, Samuel Clemens, Jim and Tammy Baker, Oliver North, Ferdinand and Imelda and her shoes, and all the little people Leona Helmsley talked about. ++++++++++++++++++++++++++++ {Moderators' comment: ATI is a nice antidote to those who see no political consciousness amongst the CU. Like most e-mail mags, the substance has slowly changed and matured over the years, and it is becoming a nice mix of political, technical, and other information of relevance to computerists. Thanks to Ground Zero and Prime Anarchist for putting out a nifty publication. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: brad@LOOKING.ON.CA(Brad Templeton) Subject: The status of the electronic forum (BBS) Date: 27 Sep 90 00:57:23 GMT ******************************************************************** *** CuD #2.05: File 4 of 7: The Status of the BBS *** ******************************************************************** People keep trying to figure out what an electronic forum (or bulletin board) is in traditional terms -- common carrier or publication. I think that it is not analogous to any of the old forms, and a new type of law has to be created to apply to it. There are 4 types of BB today: A) The completely open BB with no supervision (USENET newsgroup, some BBS operations) B) The supervised open BB. (most BBS, GEnie, CIS forums, etc.) C) The heavily supervised BB. (Prodigy, moderated USENET group) D) The fully edited electronic publication D is a direct analog of the traditional publication. C is very close, but not quite. A is close to the "common carrier" model, but does not match it exactly. B has little analog in traditional publishing. All four are of course(*) deserving of constitutional protection of free speech. For all are published forms of expression. The closest thing to A is common carrier or enhanced service provider status, where the carrier is not liable for what is transmitted. However there are many differences. For one, I have not heard of a "public broadcast" common carrier, where messages are sent to arbitrary members of the public who request the material. The closest analog might be Ham radio, although Hams are licenced and thus not classed as general public. They are also restricted in use. Of course "Ham radio" is a thing, not an organization. In addition, most type A systems do have some controls and checks and balances. They do not have the "service to anybody who asks is mandatory" rule of common carriers. I would view each individual author as the publisher, and the system owner as a tool in this case. On the other hand, I would support the right of system owners to restrict *who* has access, if not necessarily what they say. Type B is also a new animal. Such systems are supervised, but supervised after-the-fact. ie. any user can post any message, but the SYSOP/supervisor/moderator can delete things after the fact. The amount of this deletion ranges from almost none to moderate. Sometimes it is there as an option, but never actually practiced. This needs a new type of law. Type C is very close to a publication, and may not need a new type of law. In this case, all messages must be approved before they go out -- ie. they pass through a human being first. This is not too different from a classical publication. However, in most such cases, the editors do not truly act as editors. They merely select material based on appropriateness to a forum. Only because the law requires it do they also sometimes attempt to remove libel and criminal activity. The editors almost never select material to match their own views, and it is not assumed that postings reflect the editor's views. Thus in A and B it is clear that the author is the publisher and the system is the medium. In C the author and system operator are jointly involved in publication. In D the system operator is the publisher, and the author is just the author. What new types of law? This we can discuss. Type A: Authors fully responsible for their postings. No liability for SYSOP unless illegal activity deliberately encouraged. (ie. "The Phone Phreak BBS" might have a liable SYSOP, but "Joe's Amiga BBS" would not be liable if somebody posts a phone credit card number.) NO complete anonymity. Author's names need not be revealed in the forum itself, but a record should exist for the authorities in case of libel or other illegal activity by an author. The sysop must maintain this list in return for the limit of SYSOP's liability. (Note SYSOPS still have the right to delete material, but not the obligation.) Type B: Authors continue to be responsible for their postings. SYSOPS responsible for illegal material which they are aware of but do not delete in a timely fashion. Anonymity possible, if desired. Type C: Authors responsible together with SYSOPS for postings. If Author warrants to SYSOP that material is legit, most liability goes to Author. SYSOP must not permit any obviously illegal material, and delete any material found to be illegal ASAP. Type D: Standard publication. No new law. Brad Templeton, ClariNet Communications Corp. -- Waterloo, Ontario 519/884-7473 ******************************************************************** >> END OF THIS FILE << *************************************************************************** Subject: Another experience with the law From: mailrus!iuvax!ndcheg!ndmath!nstar!watcher@UUNET.UU.NET(watcher) Date: Thu, 27 Sep 90 04:01:01 EST ------------------------------ ******************************************************************** *** CuD #2.05: File 5 of 7: Another Experience with the Law *** ******************************************************************** regarding the fbi investigation of the nuprometheus source theft: i was a victim of this investigation. i lost my position at apple for "mysterious reasons" that neither my agency nor my supervisor could clarify. i was not "fired", as i was able to collect unemployment following the incident. however, exactly what happened remains a mystery to me. my story: in approximately mid-to-late february of 1990, the feds (steven e cook and his unnamed partner who didn't say much) went to one of apple's cupertino facilities (vg6 to be precise) to visit my (now ex-) roommate. as he was at home with the flu, they were not able to question him. two days later (this would be a friday), they paid a visit to our house after not having found him at work earlier that day. they proceeded to ask him many questions, mostly about who he knew and how he knew them, and whether he had visited certain individuals, such as henry s dakin. (dakin, as in dakin plush toys, who operated an endeavour known as the 3220 gallery in san francisco, where many interesting parties are known to take place.) they then asked him to come to their office in s.f. for a polygraph examination. he told them he would get back to them about this after consulting an attorney. attorney said such examination was meant to trip him up, that they had no hard evidence, and that he should decline and give them his (attorney's) phone number if they had any questions. the following week, they called on each of monday, wednesday, and friday (friday being the day he was to have gone in) to make sure he didn't miss his appointment; all three times they were given that "on the advice of my attorney..." he would not be there. following monday at 8 am, the county sheriff appeared at the door to arrest him on a four year old bench warrant. (county sheriff was required instead of the city police as we lived in an unincorporated section at the time, where city police would not have had jurisdiction.) he was arrested and left to sit in a holding cell for many hours while paperwork was done. it is interesting to note that the sheriff had a form with him with all the pertinent information (name/address, etc), which noted steven e cook of the fbi should be called (included phone number) if there were any problems. the officer was not too pleased when he found that he was "doing the fbi's work for them". i, however, stayed home (i guess this means i had no warrants). the next day, at around three in the afternoon, i was told that "some friends of mine were here to see me" and that i should get down to the lobby immediately. lo and behold, steven e cook had appeared in my building, having first determined my whereabouts from questioning my roommate. i was questioned for about 45 minutes, mostly on the same subjects as my roommate, along with several new and interesting twists indicating that they had done very thorough homework, including examining all the sign-in logs. i went back to my desk. i called my roommate. someone answered his phone (whom i knew) and told me "i guess he doesn't work here anymore." shortly after that, i went home for dinner, and as we (some friends had appeared by this time) were all standing around just about to leave, the phone rang, i answered it, and it was my agency explaining that i was to go in TONIGHT and finish my project, and i was not to go back tomorrow or thereafter. when asked from whom these orders had come, the agency was unable to provide any details. this was tuesday, march 13th, nearly ten months after the nuprometheus incident. some of the questions they asked me during my "interview" (the details are fuzzy and i have forgotten most of the questions): do you know john draper? how do you know him? how did you meet him? do you know henry dakin? how do you know him? how did you meet him? who owns the house you live in? (we were renting at the time, through an agency, i had no idea) since the phone bill wasn't rightfully in anybody's name (phone company's mistake) it was implied that we might be trying to defraud the phone company by providing false billing information (never mind that we had always paid it in the previous months). after the incident and its resultant newspaper article (see san jose mercury news, 15-march-1990, business section, front page), i found it extremely difficult to obtain work, since any agency that heard about the incident would "misplace" my resume and never call me again, and any attempts to secure employment at apple resulted in purchasing and cch telling the agency that i was "not allowed back", even before i had gotten an interview. all this seems to have been started by an old, vicious, enemy of my then-roommate's, who (it is assumed) claimed to the fbi that he had overheard my roommate bragging about his involvement in nuprometheus at a party. which amounts to heresay and witch-hunts. one thing's for sure: if the fbi later determines it was wrong, i know damn well that they're not going to go back and undo the damage. as of this time, no charges have ever been filed, nor any search warrants served, nor any equipment confiscated. perhaps i should consider myself lucky...? after all, all i lost was my job ($52K/year) and my credibility. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: September 30, 1990 From: Assorted Subject: Some views on what to do if questioned by LE agents ******************************************************************** *** CuD #2.05: File 6 of 7: Responses to "When the Law Comes..."*** ******************************************************************** {A recent discussion on a newsnet (efftalk@netsys.com) covered the problem of how to respond if questioned by law enforcement. The following synopsis was distilled to cover only a few of the main points. The consensus there, and from other sources, seems to be "don't volunteer anything" and to be cautious when implied promises are made in turn for pre-Miranda cooperation. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ My general impression was "call your lawyer first, talk later." You aren't incriminating yourself by refusing to say anything without a lawyer present. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Actually, some good simple rules that apply to any adversary or investigator (press or police) are: a) Don't talk if you have any reason to believe that they *think* or suspect you of any wrongdoing. (Wrongdoing by their definitions, not yours.) b) If you must talk, *ask* questions, do not answer. And take care to make sure your own questions do not contain answers. If you remember to always ask a question, you put them on the defensive and confuse them, because they think they are there to ask the questions. They may not be fazed, but sometimes this is more fun than "no comment." c) Be "fully" cooperative, but insist that everything take place in writing. Say, "If you would be prepared to give a *complete* list of your questions in writing, I will give them due consideration." This makes them stop and think. (With the press, it also can add a delay which makes them go away. If they insist on speed, tell them to fax the questions. You are under no obligation to fax the answers back, even if you do answer.) In this situation, you can't be accused of refusing to comment. You are just being careful and getting documentation -- an admirable trait. Get a complete list of questions -- make them understand they don't get to ask any more -- that way you can sometimes figure their intent. d) If you can slow it down, slow it down. Using writing is just one example of this. Slowing it down is almost always in your advantage, and not in theirs. e) Scare 'em. It may not work, but tell them you are turning on your camcorder or tape recorder while they do what they do -- for your records. It may have no weight in evidence, and they may tell you to shut it down (legally or not) but it will scare 'em. And it looks bad if they refuse you your right to document events. These guys live by documentation and paperwork. But they don't like it if they are stepping over the line. And of course, if you think you are in serious shit, call your lawyer. Ask if you are under arrest, and under what charge. If you are under arrest, you have a right to call a lawyer (eventually). If you are not, you are free to call a lawyer. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Best advice. *NEVER* volunteer *ANYTHING*. When they show up, you'll probably be under stress -- and your mistakes will count against you. Get A Lawyer. |> b) If you must talk, *ask* questions, do not answer. And take care to make |> sure your own questions do not contain answers. If you remember to always |> ask a question, you put them on the defensive and confuse them, because they |> think they are there to ask the questions. They may not be fazed, but |> sometimes this is more fun than "no comment." This won't last long; they think they are there to ask the questions and will usually enforce this concept. This might work if you are not a suspect. |> c) Be "fully" cooperative, but insist that everything take place in writing. |> Say, "If you would be prepared to give a *complete* list of your questions |> in writing, I will give them due consideration." This makes them stop and This will only work if you are not a suspect. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The first thing to do when talking with the police/SS/etc, is DON'T LET THEM INTO THE HOUSE! Do your talking on the porch, sidewalk, their office, etc. The SC has held that once the police are in your home, they are free to walk through the house. Bring a lawyer if the questions are questionable (so to speak). +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > camcorder or tape recorder while they do what they do -- for your records. If you're really desperate, you can get one of those home security systems that (among other things) continuously films various rooms from hidden cameras. Then you'll have a videotape of them telling you to turn off your tape recorder. :-) +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ A funny thing happened to me one day when I came home from school! There's this car in my driveway a Crown Victoria with a siren in the front seat. Well I speak from my own experience. Say Nothing unless you are confident of your abilities to handle yourself. 90% of police work is done because people rat on each other, and 10% is done cause the police (pick one) harass, coerce, trick, etc people into admitting what they did. In my case I talked the whole time rather threateningly too. The cop said "We know you did it so why don't you admit it it will make it easier on you, your parents, a nd us and if you make it easier on us the Judge will go easy on you. Well I stood up and said you dont know Sh*t. And all of this was infront of my parents and the cop wanted a lie detector and everything when he said this my dad went crazy. "A Lie Detector?!!!" Well anyway to make a long story short I didn't take a lie detector I didn't go to jail (I was 18) and I got an apology out of it...So If you didn't do anything don't say anything or else say something unpolite! It will make you feel beter! ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: 30 September, 1990 From: Various Contributors Subject: The CU in the News ******************************************************************** *** CuD #2.05: File 7 of 7: The CU in the News *** ******************************************************************** {"The items for CU in the news come from various contributors. We especially thank Mike Rosen, who draws our attention to various items, and Brian Kehoe. We also appreciate all of those contributors who submit articles that we cannot print because of space constraints, duplication, or other reasons. Even if they do not appear, they are beneficial and keep us informed (moderators)}. ------------------------------ From: chron!magic703!edtjda@UUNET.UU.NET(Joe Abernathy) "Computer Network gets Overseer" (9/24/90, Houston Chronicle, Business Page 1) By JOE ABERNATHY Copyright 1990, Houston Chronicle A newly formed non-profit corporation will bring Fortune 500 management talent to the nation's increasingly troubled computer network matrix, according to government and industry sources. The corporation, Advanced Network & Services, is designed to bring order to the vast Internet data telecommunications system, which has become a frequent companion to controversy while enjoying a six-fold increase in use since January. The action is expected to pave the way for congressional approval of the Federal High-Performance Computing Act, a comprehensive law that would, among other things, pay to vastly expand the communications capacity of the system. The legislation bogged down after the Houston Chronicle disclosed the controversial aspects of Internet. "We have a very valuable tool in the network and if we use it properly, it can be a very valuable asset to the country," said Allan H. Weis, chief executive officer of Advanced Network and a 30-year veteran of IBM, one of three corporate partners in the new management firm. Weis said that Advanced Network will provide day-to-day management and monitoring of the Internet, which connects thousands of military, educational and private computer networks. It also will serve as a model for other such partnerships that could help develop and promote the network's services. The company was formed by IBM, MCI Communications, and Merit Inc. Merit is a Michigan consortium that previously has managed the network under the supervision of the National Science Foundation and will continue to fill this role under the supervision of American Network. There are still questions to be answered about the roles the various groups will play in managing this system. IBM and MCI, both of which sell equipment and services vital to networking, provided $5 million each in seed money for the new corporation. It will actively seek further investment by industry, and will impose the first formal fee structure on the network, which only recently evolved from an elite communications tool for scientists. "Just as private contractors helped build the interstate highway system, this new corporation will help build the national information superhighways that today's information age demands," said Sen. Albert Gore Jr., D-Tenn., the sponsor of the legislation. The heart of the computing act is the expansion of Internet into a "data superhighway" that would link researchers, educators, homes and businesses into a vast network of computing resources. The expanded Internet would be called the National Research and Education Network, or NREN. It has been likened to the telephone in terms of its expected impact on American life. Internet first gained notoriety as the vehicle for the infamous Morris Worm, a destructive program that paralyzed many of the nation's high-performance computers in November 1988. Pieced together over the course of 20 years on the tradition of trust within the research community, the network is a tempting target for abuse and the favored arena for hackers. At least 5 million people have access to Internet, which links dozens of nations and which is scheduled to be brought into the secondary schools of Texas. In June, the Chronicle reported that the network was being used widely and openly for purposes well outside its research mandate, such as political activism and the distribution of pornographic art and literature. Despite an investigation by the science foundation - which has been the primary distributor of federal dollars for networking - the controversial use continues, although reduced in scope. "We observed the growth over the past few years and we looked at the structure that we had ... and decided that a more formal structure on the national level" should be put into place, said Weis. "Something this big moves slowly, but it moves." The science foundation's future role in the network is one of the few remaining aspects of the legislation that must be decided. The NSF is well-respected for its leveraging of funds, and the network infrastructure it molded is reliable and capable. But the foundation has given scant attention to content, bringing it under fire for the network's current state of virtual anarchy. The Department of Energy wants future control of the network, but the agency's viewpoint is considered too narrow, according to congressional sources. The vision of the Science Foundation combined with the IBM-style management of Advanced Network is expected to satisfy critics. "The NREN is such a big effort that the government can't do it by itself, industry can't do it by itself, and academia can't do it by itself," said Weis. "To make it successful it's going to take the joint effort of government, industry and academia." Advance Network will draw management expertise from MCI, IBM, Merit, McGraw-Hill, and Merck, the pharmaceutical company known for its ability to find practicality in cutting-edge research. McGraw-Hill, best known as the owner of Business Week, is also in the textbook and information services businesses. "Wouldn't it be nice if we were able to provide, over the network, the newest physics textbook, but the textbook was a living textbook in that you could watch what happened when you applied additional weight to a fulcrum?" said Weis, offering one example of an educational use for the superhighway. Advanced Network will have an eight-person board of directors, initially consisting of: Weis; Joe Dionne, president of McGraw-Hill; Joe Wyatt, president of Vanderbilt University; Myra Williams of Merck; Richard West, University of California system; Dr. John Armstrong, chief scientist of IBM; Richard Leibhaber, executive vice president of MCI; and Dr. Douglas Van Houweling of Merit. Gore's computing act, which has the support of the Bush administration, would allocate $2 billion over the course of five years to ensure the nation's continued dominance in the field of high-performance computing. The National Research and Education Network would receive $400 million of this amount, with the rest going for related infrastructure. "The interstate highway system would not have been built without a federal commitment," said Gore in behalf of the package. "The federal government is an essential catalyst for developing and demonstrating this technology." The Federal High-Performance Computing Act is scheduled to be considered by the full Senate before it adjourns in October. A companion House bill, which was suspended following the Chronicle's disclosure of Internet's misuse, will be returned to consideration after approval of the Senate plan. ------------------------------ HACKER'S HOLIDAY ENDS The Computer Misuse Act is now law, bringing into force three new criminal offences. Michael Colvin, the Conservative MP for Romsey whose successful Private Member's Bill brought about the new Act has added his own stern warnings to the computer world. " The Act can only complement and not replace security procedures", he said. "Users will have to examine their existing security procedures and possibly redefine the authority of users of their systems if they are to receive the full support of the law. " My message to computer users is that Parliament has done its bit - now it is up to you to do yours. It will provide a coherent regime for the prosecution of those who misuse computers. " This legislation has been framed specifically to deal with the new mischiefs that modern technology has brought and the police now have the power to prosecute computer misuse without the need, in some cases, to try and stretch the existing criminal law. " The legal position is plain. The Act gives a clear signal to the future generations of would-be hackers that computer misuse is no longer tolerated by society". The new offences which came into force on August 29 are one of basic unauthorised access with a penalty of up to six months imprisonment and fines of up to two thousand pounds; unauthorised access with the intention of committing a more serious crime and unauthorised modification of computer data, both of which carry up to five years imprisonment with unlimited fines. Slightly modified from the original Law Commission Report on computer misuse, the Act includes new jurisdiction rules to cover international hacking. Any offence will be prosecutable if it is conducted from or directed against any system in the UK. ------------------------------ From: Computerworld, September 17, 1990, p. 150, Inside Lines: "Steal this Modem" Leemah Datacom Security Corp. recently wrapped up its second annual challenge to hackers, who were given the chance to retrieve a secret message stored in two PCs protected with a Leemah callback modem. While hackers failed to break in, the challenge was not as big a success as officials predicted. Even though the company added a second PC and challenge site to accommodate what they thought would be a mass hacker attack, only 2,009 hackers tried and failed to hack into the PCs compared with nearly 8,000 failed attempts last year. Apparently, many hackers feared that the company was cooperating with the government in a sting operation. ******************************************************************** ------------------------------ **END OF CuD #2.05** ********************************************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank