Computer Underground Digest Volume 2, Issue #2.12 (November 17 1990)

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.12 (November 17 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: PhD Candidate Seeks information on the CU File 3: Riggs, Darden, and Grant Sentenced File 4: Prodigy Saga Continues File 5: Re: Response to Mars "Censoring" File 6: Response to SJG Affidavit (part 1) File 7: Warrants schmarrants! The SS is Crazy! File 8: More guidelines on what to do if busted File 9: CU in the News--England and Emma Nicholson; VOGON News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.12: File 1 of 9: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: November 17 1990 ++++++++++ In this file: 1. PHRACK CLASSIC #32 AND CHRISTMAS-CON 2. FACE-TO-FACE BBS ++++++++++ +++++++++++++++++++++ Phrack Classic #32 and Christmas-Con +++++++++++++++++++++ Five years ago today (November 17, 1985), the first issue of Phrack appeared. Today, November 17, 1990, Phrack Classic #32 will be released. Information about Christmas-Con will be provided. it will be held in HOuston, December 28-30, and law enforcement and security personnel are encouraged to attend. Video cameras will not be provided. As a bit of nostalgia for the old folks, here is the original header from the first issue of Phrack: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ _ _ _______ | %/ | / _____/ |_||_|etal/ /hop _________/ / /__________/ (314)432-0756 24 Hours A Day, 300/1200 Baud Presents.... ==Phrack Inc.== Volume One, Issue One, Phile 1 of 8 Introduction... Welcome to the Phrack Inc. Philes. Basically, we are a group of phile writers who have combined our philes and are distributing them in a group. This newsletter-type project is home-based at Metal Shop. If you or your group are interested in writing philes for Phrack Inc. you, your group, your BBS, or any other credits will be included. These philes may include articles on telcom (phreaking/hacking), anarchy (guns and death & destruction) or kracking. Othe topics will be allowed also to an certain extent. If you feel you have some material that's original, please call and we'll include it in the next issue possible. Also, you are welcomed to put up these philes on your BBS/AE/Catfur Etc. The philes will be regularly available on Metal Shop. If you wish to sa in the philes that your BBS will also be sponsoring Phrack Inc., please leave feedback to me, Taran King stating you'd like your BBS in the credits. Later on. TARAN KING 2600 CLUB! METAL SHOP SYSOP This issue is Volume One, Issue One, released on November 17, 1985. Included are: 1 This Introduction to Phrack Inc. by Taran King 2 SAM Security Article by Spitfire Hacker 3 Boot Tracing on Apple by Cheap Shades 4 The Fone Phreak's Revenge by Iron Soldier 5 MCI International Cards by Knight Lightning 6 How to Pick Master Locks by Gin Fizz and Ninja NYC 7 How to Make an Acetylene Bomb by The Clashmaster 8 School/College Computer Dial-Ups by Phantom Phreaker Call Metal Shop and leave feedback saying the phile topic and where you got these philes to get your article in Phrack Inc. (end Phrack header) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++ FACE-TO-FACE BBS ++++++++++++ A number of electronic digests exist, such as this one, that attempt to raise the issues of computer security, ethics, law, or policy. Few BBSs exist for the same purpose. However, a new BBS has been set up for the discussion of hacking, and unlike conventional "hacker" BBSs, this one is designed for discussions between law enforcement and security specialists and hackers. The goal of the board is to provide serious, intelligent dialogue between various groups. It's called FACE-TO-FACE, and the number is 713-242-6853. Here is the introductory log-in message: All Hackers, Federal Agents, and Journalists Welcome to a new concept in underground bulletin boards! IDEA: The idea first came to me when I was mourning over the fact that Phoenix Project went down. I thought, now gee, that was a good board. Ever since then I've been searching for a place to "Hang-out"; A place where users were not only productive but mature. Well, out of all those BBS's out there, I could not locate one that met my standards of "a good board". So, I came to the conclusion: There are no decent BBS's in the underground still running. Then it hit me-- Why not make one ? Sounds logical. Well, here it is. FACE to FACE: This BBS is devoted to having an intelligent, mature, communication link from the Computer Underground to the Press and back to the Security Agencies around the nation. WARNING: Although this BBS allows "hackers" access, The Management of this BBS demands that all users refrain from posting illegal material in nature. If any such material is posted, that user and the message(s) shall be deleted. I can't stress this enough. You have called a BBS where security agents are scanning the messages also-- It's for OUR and YOUR saftey. We do not advocate "hacking" in any way. We are the MODERATORS of this BBS, while you are the USERS. It's a pure communications link between the two sides. One side seeing white, the other black. We see grey. Access is guaranteed to any user who wishes to call. This is an open system for the "phree" world. (End Face-2-Face header) ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Subject: PhD Candidate Seeks information on the CU From: P.A. Taylor Date: 02 Nov 90 15:25:32 gmt ******************************************************************** *** CuD #2.12: File 2 of 9: PhD Students Seeks Info on CU *** ******************************************************************** I'm in the second year of a PhD on the subject of hacking/viruses and the politics behind them, and I was wondering whether any of you are prepared to enter into a dialogue on the subject. At the moment, I'm preparing the theory section and literature review. In January or thereabouts I want to start field-work (or modem-work, if it turns out that way) with both hackers and their computer security industry counterparts, and anyone who would consider themselves neither one nor the other, but nevertheless interested in the field and the issues raised by it. Theoretically, so far I've concentrated on the notion put forward in various quarters that hackers are surfers on a technological wave that is carrying the rest of us away, or in a similar vein, cowboys staking out new territory in the new frontier world of computer technology. Looking at hackers in this way has made me concentrate on the whole issue of technological determinism and the "information revolution" and also the idea of hackers being perhaps an extension or most recent development of an alternative culture, hippies with modems perhaps. It also raises the whole issue of the exact nature of cyberspace and the implications it holds... are we entering a new realm of informational colonialism? What is information? Who has rights over it, and are hackers/the computer underground fighting a battle of principle the importance of which has passed most people by? On a more practical level I'm interested in the following points... 1. To what extent has the advent of hacking/viruses fed back into and affected the development of computer science? (e.g. the conceptualisation of genetic algorithms) 2. Information and reference material relating to the formation of the computer security industry. Ideally I'd like to write a short history of it and trace the ways in which it has developed and been shaped by its adversarial relationship with the computer industry. 3. The subject of the changing nature of information illustrated by such episodes as the "look and feel lawsuits" and an increasingly proprietal attitude towards information that is now evident. To what extent are hackers/computer underground concerned with the type of opposition to information control that people such as Richard Stallman and his Gnu project represent? Thanks for taking the time to read all this,and hopefully some of you can give me feedback/suggestions/reference material. Cheers, P.A.T. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: Riggs, Darden, and Grant Sentenced Date: 17 November, 1990 ******************************************************************** *** CuD #2.12: File 3 of 9: Riggs, Darden and Grant Sentenced *** ******************************************************************** Robert J. Riggs (The Prophet), Franklin E. Darden, Jr. (The Leftist), and Adam E. Grant (The Urville) were sentenced in Atlanta Friday, November 16. All were given prison terms. Riggs was sentenced to 21 months. Grant and Darden were given 14 months each, half of which may be served in a half-way house. Additional provisions include supervision and prohibitions on computer use. In addition, each was ordered to repay $230,000 restitution. Darden and Grant report for sentencing on January 4, 1991, and Riggs on February 15. According to previous news reports, under the plea arrangement Riggs could have been sentences to 15 years and a fine of up to $500,000. Grant and Darden could have received up to 5 years in prison and fines of up to $250,000. Because the three pled guilty, the evidence against them is not public. Yet, the both the prison sentence and the restitution seem harsh. Riggs, presumably, received a heavier sentence because of a prior offense and because the charge to which he pled guilty carried a more severe sentence. But, according to reports, his cooperation with law enforcement and his testimony against Craig Neidorf would be taken into consideration during the testimony. Did the actions of the three cause $700,000 worth of damages, or is the figure intended to be a "message" to others? If the former, one wonders what they possible could have done to create such mischief, because the original indictment mentions nothing about concrete damages, and we have already seem how Bell is willing to inflate costs. If the amount of restitution was intended as a message, it is successful. But, it sends an inintended message: The judicial system is wacky! If each repays $4,000 a year, they may be paying out of their social security well into their 70s. If each repays it within 25 years ($9,300 a year), they are effectively saddled with a "second mortgage" before even launching their lives. They will emerge from prison faced with obstacles that even the most hardened criminals do not endure. Prison time also seems inappropriate. The so-called "tough on crime" mentality of the past decade has created an explosion in the nation's prison population. Since 1980, the nation's prison population has more than doubled, increasing from about 329,821 in 1980 to almost 800,000 in November of 1990. Tossing people in prison is not, for non-violent crimes, particularly cost-effective, and there is no agreement on the deterrent effect of prisons. For relatively minor white collar crimes, such as those commited by the "Atlanta Three," prison seems both unnecessary and unjust, and tax-payers foot the bill. There is apparently little the three can do about the sentence. But the rest of us can join in the tasks of lobbying for saner laws and sentences that better fit the "crime" than does incarceration, while simultaneously working to curtail computer abuse. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Adam Gaffin Subject: Prodigy Saga Continues Date: November 14, 1990 ******************************************************************** *** CuD #2.12: File 4 of 9: The Prodigy Saga Continues *** ******************************************************************** (The Prodigy saga continues. Adam Gaffin, who has been following the story for the Middlesex News in Framingham, Mass, reports that after a couple of days, Prodigy restored the account of the "Prodigy Nine" and then, a few days after that, pulled them again! The total number is actually now up to about 15. Prodigy has been receiving lots of bad press in the media, and Henry Niman, a prodigy victim, has been interviewed about his experiences by several TV stations and newspapers. Adam recently wrote the following stories--moderators). +++++++++++++ From: "Conversations with Fred," Middlesex News, Framingham, 11/6/90. The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the network run as a joint venture by Sears and IBM, wouldn't let somebody post a message in a coin-collecting forum that he was looking for a particular Roosevelt dime for his collection. Upset, the man called "member services." The representative told him the message violated a Prodigy rule against mentioning another user in a public message. "What user?" the man asked. "Roosevelt Dime," the rep replied. "That's not a person!" the man said. "Yes he is, he's a halfback for the Chicago Bears," the rep shot back. Rothman is one of those alleged compu-terrorists Prodigy claims is harassing other users and companies that advertise on the service by sending out thousands upon thousands of increasingly hostile messages in protest of a Prodigy plan to begin charging users who send more than 30 e-mail messages a month. Rothman and the others say they sent very polite messages to people (Penny Hay of Los Angeles says her messages were even approved by the Prodigy legal department) telling them about the new fees and urging them to protest. What's really happening is that Prodigy is proving its complete arrogance and total lack of understanding of the dynamics of on-line communication. They just don't get it. People are NOT going to spend nearly $130 a year just to see the weather in Oregon or order trips to Hawaii. Even the computerphobes Prodigy wants to attract quickly learn the real value of the service is in finding new friends and holding intelligent "discussions" with others across the country. But Prodigy blithely goes on censoring everything meant for public consumption, unlike other nationwide services (or even bulletin-board systems run out of some teenager's bedroom). Rothman's story is not the only one about capricious or just plain stupid censoring. Dog fanciers can't use the word "bitch" when talking about their pets, yet the service recently ran an advice column all about oral sex. One user who complained Law" was not allowed on was told that "queen b***h" would be acceptable, because adults would know what it meant but the kiddies would be saved. So when the supposed technology illiterates Prodigy thinks make up its user base managed to get around this through the creation of private mail "lists" (and, in fact, many did so at the urging of Prodigy itself!), Prodigy started complaining of "e-mail hogs," quietly announced plans to levy charges for more than a minute number of e-mail messages each month and finally, simply canceled the accounts of those who protested the loudest! And now we are watching history in the making, with the nation's first nationwide protest movement organized almost entirely by electronic mail (now don't tell Prodigy this, but all those people they kicked off quickly got back onto the system -- Prodogy allows up to six users per household account, and friends simply loaned their empty slots to the protest leaders). It's truly amazing how little faith Prodigy has in the ability of users to behave themselves. Other systems have "sysops" to keep things in line, but rarely do they have to pull messages. Plus, Prodigy is just being plain dumb. Rothman now has a mailing list of about 1,500. That means every time he sends out one of his newsletters on collectibles, he sends 1,500 e-mail messages, which, yes, costs more for Prodigy to send over long-distance lines and store in its central computers. But if they realized their users are generally mature, rather than treating them as 4-year-olds, Rothman could post just one message in a public area, that everybody could see. Is this any way to run an on-line system? Does Prodigy really want to drive away the people most inclined to use the service -- and see all those ads that pop up at the bottom of the screen? Prodigy may soon have to do some accounting to the folks at IBM and Sears, who by most accounts have already poured at least $750 million into "this thing." (With your computer and modem, you can reach Fred the Middlesex News Computer anytime, day or night, at (508) 872-8461. Set your parameters to 8-1-N and up to 2400 baud.) +++++++++++++ "Prodigy Pulls Plug on Electronic Mail Service for Some" From: Middlesex News, Framingham, Mass., 11/2/90 By Adam Gaffin (News staff writer) Users of a national computer network vow to continue a protest against censorship and a new charge for electronic mail even though the company kicked them off-line this week. Brian Ek, spokesman for the network, Prodigy, said the "handful" of users had begun harassing other users and advertisers on the service and that some had even created programs "to flood members' `mailboxes' with (thousands of) repeated and increasingly strident harangues," he said. But leaders of the protest say they sent only polite letters - approved by the company's legal department - using techniques taught by the company itself. Up to nine of them had their accounts pulled this week. Protests began in September when the company said it would cut unlimited electronic mail from its monthly fee -- which includes such services as on-line airline reservations, weather and games -- and would charge 25 cents for every message above a monthly quota of 30. Ek says the design of the Prodigy network makes "e-mail" very expensive and that few users send more than 30 messages a month. But Penny Hay, the only organizer of the "Cooperative Defense Committee" whose account was not shut this week, said she and others are upset with Prodigy's "bait and switch" tactics: the company continues to promote "free" electronic mail as a major feature. She said Prodigy itself had spurred use of e-mail by encouraging subscribers to set up private e-mail "lists" rather than use public forums and that the charges will especially hurt families, because the quota is per household, not person. Ek said relatively few members protested the rate change. Gary Arlen, who publishes a newsletter about on-line services, called the controversy "a tempest in a teapot." Hay, however, said the group now has the backing of nearly 19,000 Prodigy users - the ones advertisers would want to see on-line because they are the most active ones on the system and so more likely to see their ads. The group is also upset with the way the company screens messages meant for public conferences. Other services allow users to see "postings" immediately. "They are infamous for this unpredictable and unfathomable censorship," Hay said. "We feel what we are doing is not censoring because what we are essentially doing is electronic publishing," Ek said, comparing the public messages to letters to the editor of a family newspaper. Neil Harris, marketing director at the competing GEnie service, said many people would feel intimidated knowing that what they write is being screened. He said GEnie only rarely has to deleted messages. And he said GEnie has picked up several thousand new customers from among disgruntled Prodigy users. del 85 86; ch eol to')' in 89; m 87 ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: laird@SLUM.MV.COM(Laird Heal) Subject: Re: Response to Mars "Censoring" Date: 7 Nov 90 10:45:18 EST (Wed) ******************************************************************** *** CuD #2.12: File 5 of 9: Mars *was* Censored *** ******************************************************************** In article , dan-hankins@cup.portal.com (Dan Hankins) write: >In article , Karl Lehenbauer writes, >>I used Prodigy several times, and it is a heavily censored system,... >This is inaccurate. Prodigy is not censored, it is _edited_. There is a >significant difference. When newspaper articles are removed by government >order, that's censorship. When the newspaper owners decide to not run an >article because it is counter to their editorial policies (or personal >prejudices), then that's editing. >In article >In the MARS incident, the NSF flexed its fiscal muscles (according to those >>on the receiving end). >This is again not censorship. The NSF pays for the Internet, and has the >right to say how those monies are spent. Since MARS resided on an Internet >node, the NSF had the right to refuse to pay for those files to be transmitted >across its network. In fact, the NSF has the right to refuse to pay for >network connections for any site for any reason whatsoever, unless it has made >a contract to the contrary. If this is "flexing its fiscal muscles", then so >be it. You have gotten caught up in an emotional response to the word "censorship". If you are going to mince words, do not use a meat tenderizer or your argument will be mush. The first comment is correct. Censorship is when a governmental body edits a writing based upon its perceived content. The fundamental point that has not been brought up by those approving of the action (removing access and storage of the pictures) is that a governmental body must grant First Amendment protection to all speech. The sole exception where censorship is generally allowable is when that speech would shock the general public, and this is normally restricted to materials in public view. The GIF archives are not in public view - even when sent as net-news they are encoded - but they were/are in a location where there is general public access of whatever files have been submitted to the archiver or to the network. Particularly with netnews, there is no specific editing done whatsoever after the author posts the article, and moderators serve only at the whim of a majority of voters. Wherever speech is allowed, even if the governmental body is paying for it, the content of that speech may not be regulated by the governmental body. These pictures might be accessed by immature youths who should be protected from carnal knowledge Moreover, once it is established, that arm of the government may not simply discontinue the service if the reason is to suppress the speech that is being communicated. The First Amendment is guarded zealously by the Federal courts and such an action should not withstand the "strict scrutiny" that it should be examined under. I wish the Second Amendment received such guardianship; I have never owned a gun, but I think everyone should have the right to own one while the government has lots of guns and seems to think nobody else should ever have any. Obscenity may be censored - when it might otherwise shock the unsuspecting public. A brown paper bag can never attract the prurient interest; do not tear the bag open unless you do want to see what is inside. I never have looked at any of the alt.sex hierarchy. Once a public forum exists, it may not be censored, although the participants may agree to self-regulation. I remember once wondering what was really in alt.flame, and the first article convinced me that I had read enough. Those guys are serious about their roasting there, not their vocabulary (damned if they do not just grab for the nearest word). The alt.flame group is there with a good reason - otherwise people who do not want to read that material might have to read the same articles, but in their news group. I personally can see no great benefit to maintaining an archive of sexually explicit GIF images, except that archives exist to keep network transmission to the most suitable paths; otherwise the private messages sent back and forth are unmanaged and unmanageable, and we wind up with the situation as described where Australians ftp'd files from Finland because they were not archived at a more convenient site. Archives reduce network load. Netnews reduces network load. I can also personally see no great benefit to every person having a gun or two except that we would all either be much more polite or on the way to an ambulance. I am not an absolutist, and everyone does not act the way I think everyone should. I do not act the way I think I should sometimes either. I am a pragmatist when it comes to dealing with other people's business: you send my files along, I will send yours along too. >Complete the following: Pro is to Con as Progress is to ________. That is a nice .signature. Laird Heal laird@slum.MV.COM The Usenet is dead! NA:USA:NH:Salem +1 603 898 1406 Long live the Usenet! ******************************************************************** ******************************************************************* >> END OF THIS FILE << *************************************************************************** ------------------------------ Subject: Response to SJG Affidavit (part 1) From: David G. Cantor Date: Wed, 14 Nov 90 22:48:06 -0800 ******************************************************************** *** CuD #2.12: File 6 of 9: Response to SJG Affidavit (part 1) *** ******************************************************************** I just received the special issue CUD on the search affidavit for Steve Jackson. Thank you for publishing it. Perhaps you could discuss how transferring a document can be a crime, other than possibly a (relatively minor) copyright violation? If it truly is a crime, as stated in the affidavit, then anyone, by calling a document proprietary and attaching a large value to it, can, in effect, create a classified document and have this classification enforced by the US Government. As the Pentagon Papers case (dismissed against Daniel Ellsburg) showed, it's extremely difficult to prosecute such cases, even when they are real! Note that in Ellsburg's case there was no doubt that the documents in question were government documents. classified SECRET (mostly). Yet the case against Ellsburg was dismissed. Of course, Ellsburg had powerful allies: The New York Times and the Washington Post, among others. You pointed out, "It should also be remembered that the "$79,449.00" document in question was shown to contain nothing of substance that is not available to the general public for under $14. Further, to our knowledge, there is no evidence, contrary to suggestions, that E911 software was obtained". I find it troubling that these considerations are even relevant. What was transferred were a few electrons forming information, not classified, or otherwise secret. Even if it were 911 software, so what? No criminal charges were made concerning copyright or patent violations I also wonder, considering the generally tight budgets in our government, why the "Feds" are so interested in this case? Why are they investing so much effort? In my limited experience, this occurs when some party has an ax to grind or something special to gain. For example, in one of the first such cases, against Ronald Mark Austin (who in 1983 was convicted of a felony, primarily for accessing the (then) Arpanet), Los Angeles District Attorney Phillibosian (appointed by the Governor) was running in his first election. Presumably for publicity to help his re-election campaign, he fried Austin in a MAJOR PRESS CONFERENCE (this DA also gave us the infamous McMartin child molestation case). Who stands to gain in the current prosecution? Is it Bell South, trying to protect its turf in some way, or cover up something it has done? Is it having problems with its 911 system it would like to blame on someone else? Clearly it has the clout to cause such a prosecution. But WHY? This whole case STINKS. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Anonymous Subject: Warrants schmarrants! The SS is Crazy! Date: Fri, 16 Nov 90 17:12 CST ******************************************************************** *** CuD #2.12: File 7 of 9: Warrants Schmarrants (SJG, part 2) *** ******************************************************************** I've read the Steve Jackson Games warrant in CuD 2.11 and it makes me want to move to Russia. It is crazy, just plain crazy. It reminds me of essay tests when I wasn't prepared for a question and tried a snow-job hoping the prof wouldn't notice. I usually got an F, but Foley gets rewarded and Steve Jackson gets raided. Foley and his crowd have taken a few logs and blown them out of context. They claim that Erik Bloodaxe's post on Jan 23 is some kind of conspiracy, and that it proves that there's an encryption service, and it says no such thing. The following posts don't add anything to that post, so it seems it's just a silly attempt to fake evidence. Bloodaxe's post may have been ill considered and in bad taste, but that's not a crime. Heck, if bad taste were a crime, federal agents would be doing 30 years for their wingtips. The Phoenix Project had Phrack 24 on the board with a few pages of a document. So what? Foley keeps talking about "my investigation." Well, if he'd really investigated, he'd have known that the document in Phrack #24 was more than slightly edited and that the information in it was public. Everything I've read says that the information that was published costs about 13 dollars, not the 79,000 Foley claimed. Was he having a nap when he claims to be investigating? Phrack is on a lot of boards, not just the Phoenix Project, so what's the big deal? They make it sound like it was a great conspiracy. Doesn't the first amendment allow posting legal magazines?? Foley claims to be a lawyer; some lawyer! His lack of concern for constitutional rights makes me wonder if his law degree isn't mail order. Foley also claims that Mentor's post on Jan 26 links him to some encryption service. All he did was explain what Kermit is. Is that a crime? Explaining a protocol? Christ, would anybody else who explained Kermit have been busted? Beware when somebody asks about the difference between Puma and Lynx. They might be feds and your boss might be raided. Since when are encryption and decryption devices illegal? I can get them off any good PD board in the country. Did Foley rewrite the law on his own? The list of stuff to be searched boggles the mind. Books, notes, tapes, and everything but the computerized micro-wave oven could be snatched (oh-oh! Better keep quiet on that one or they'll get that next). >From this they justify their raid on Steve Jackson's company and nearly destroy it. I guess you have to be prosecuted before you can charge malicious prosecution, but I hope there is some way that those involved in this total travesty of justice can get their due. It is frightening to think that this could happen in America, and if Foley and his lackey's can be sued, hopefully somebody will nail him. This isn't legitimate law enforcement, it's a witch hunt. And if Foley is sued, I hope he gets more justice than he is willing to give others. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: The Conflict Subject: More guidelines on what to do if busted Date: Tue, 13 Nov 90 12:26 CST ******************************************************************** *** CuD #2.12: File 8 of 9: More tips on Reacting to a Raid *** ******************************************************************** %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %% %% %% Simple Guidelines To Follow If You Encounter %% %% Law Enforcement Agents In An Unfriendly Situation %% %% %% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The current state of the Computer Underground is an extreme turmoil. The recent threat of another series of witchhunt raids has put many people into a state of paranoia, and rightfully so. Noone needs to deal with all the bullshit associated with a bust. I am offering a few guidelines to follow if you are placed in a precarious situation instigated by a law enforcement agent; of course, it is up to you to decide what you want to do. Of the people who I have spoken with, these will be some of the best steps to follow if you receive an unexpected visit. Probably the first thing you would want to do if you receive an unfriendly visit from Joe Fed is to READ the fucking warrant. Find out why you have been chosen, and what they are looking for. Also, remember that if they have only a search and seizure warrant, they are warranted only to confiscate items on your premises; however, if they are serving a subpoena, they may take what they need, on or off your premises. So, in essence, the clean-house preventive measure may or may not be useful to you. An important thing to do when Agent Foley (or one of his lesser evil counterparts) comes knocking on your door is to cooperate fully. Drop a lot of "Yes sir"/"No sir" answers; respond politely. You're in no position to be a smart ass, and being friendly surely can not hurt you. Another important thing to remember, although it is almost opposite of the aforementioned, has to do with what to say. In essence, do not say a fucking thing if you are questioned! Remember, anything you say or do can and WILL be used AGAINST you in a court of law. Simply reply, "I can not answer any questions without counsel", or "I first must contact my attorney." You need not answer a damn thing they ask of you without an attorney present, and it would most probably be very detrimental to do so. This hint parallels the previous one. No matter what you do, do not reply to any question with "I don't know anything", or any simple derivation of that phrase. If you do, and you are indicted, you will be reamed in court. The presence of that statement could greatly damage your defense, unless you are conditionally mental or something. In essence, those are all you should need. What I have outlined is very simple, but logical. You need to keep a level head at least while they are on site with you; get pissed off/psycho later, after they leave. If you are currently an active member of the Computer Underground, you may wish to lose anything that is important to you, at least temporarily. Why? Well, the analogy I was given follows that: if you were suspected of racketeering, the feds could execute a search and seizure on your property. If they can prove by 51% that ANY of the confiscated material COULD have been used in your suspected racketeering, it is forfeited (i.e. you lost it, for good). The forfeiture stands whether or not you are indicted or convicted! So, you would be entirely screwed. All of the aforementioned steps are important. Those are all I really have to offer. I suggest that you get clean before the sweep occurs, and that you stay clean until after the sweep clears. Exercise extreme caution. Keep your head high, and keep your back to the wall (otherwise, it would be quite possible to find a knife lodged in it). Stay safe, and good luck! The Conflict (11-13-1990) ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: P.A. Taylor@EDINBURGH.AC.UK Subject: CU in the News--England and Emma Nicholson; VOGON News Date: 04 Nov 90 16:07:16 gmt ******************************************************************** *** CuD #2.12: File 9 of 9: The CU in the News *** ******************************************************************** "A Bug In The Machine" By Tom Dewe Matthews. From: Sunday Correspondent, 17th Dec, 1989. "Adrian Vole " looked on helplessly as the words on his computer terminal began to drift down to the bottom of the screen. Soon, all that was left were skeleton lines of meaningless text. "Oh God", cursed Vole, "I've been hit by Cascade". There was nothing he could do to stop the computer virus from running amok. In less than ten seconds, Adrian Vole's computer had been turned into a useless piece of junk. Vole the hacker had been hacked. Adrian Vole is typical of his breed. By day he works at a computer console for a financial research company and by night he hacks away in a computer- filled den off his bedroom. Self-sufficient, with his terminal and telephone modem which connects him to the rest of the computerised world, Vole is typical in that he himself is open to attack. Hackers see themselves as fighting for freedom of information, as trying to break the control which big corporations such as IBM hold over computerised information, in order to disseminate it freely. "Hackers", says George Stone, the man who gave birth to Max Headroom, " want to be able to look into a computer system and say `I understand you and therefore can question you. You can no longer threaten me. I've beaten you". This curiosity and sometimes paranoia, is provoked by the sheer power of computers. "On one computer disc" says Stone,"you can put every address in the UK, including postcodes, and on another you can put every name from every electoral role in the country.You correlate those two discs, whack in a few parameters and you can start up your own credit company, or your own poll tax." Hackers may say they want to demystify computers,not to rob them, but they are nevertheless constantly destroying each other's systems by off- loading sabotaged computer games on to the electronic notice-boards where they swap software programs with each other. "Lounge Suit Larry" is only one in a long line of these tainted computer games which in their pure commercial state are harmless, but if you run an adulterated copy of "Larry" through your computer, it will wipe out your hard disc, which in human terms is the equivalent of removing your spine. Computer companies have been known to put bugs into the programmes that they're trying to sell to stop the customer from copying the programme- which is illegal under copyright law. The computer companies also blur the battle lines by adopting an attitude of: "If we can't beat them, let's exploit them". It is now common practice among managers of computer networks to put the telephone access number and password of a proposed system on to an electronic notice-board and then sit back and watch hackers wander around their system. In the mock battle that follows, the systems designer will even put up barriers which the hackers will try to knock down or evade. At the end of this phoney war, the system is dismantled and the manager redesigns it according to what he has learnt. The real system, with a secret telephone number and password, is then put in place and if that is hacked into it is likely that the hacker will be traced and confronted- only to be employed by the company on the theory that it takes a thief to keep one out. For the politicians who want to introduce legislation into the computer industry, such double standards are largely ignored in their pursuit of the hacker. The Conservative M.P. Emma Nicholson tried unsuccessfully to introduce a bill last summer which called for a loosening of Home Office restrictions on phone taps and up to 10 years imprisonment for those who gain unauthorised access into a computer system. If the government fails to introduce its own hacking law in the next parliamentary session, Ms Nicholson promises to be back soon with a repeat of her Private Members Bill. Hackers according to Nicholson, "are malevolent, nasty evil doers' who fill the screens of amateur users with pornography". She believes that "hacking has now become a regular terrorist action... The European Green Movement hacks into large companies", she says,"and picks out sensitive information. It could be pharmaceutical industries; it could be the oil industry, and they justify it on the grounds of environmental or racial fairness". According to Emma Nicholson, the hacked information is then used to carry out bombing and fires". The Greens may storm American air bases, but do they really invade computers? "Yes," replies Nicholson, "The Green movement in Europe is the most aggressive on this. They are akin to the Animal Liberation movement here." So the Greens are trying to destabilize society through computers? "Yes, without any doubt at all," she replies, adding that she has " a lot of validated information" to confirm this fact. The validation turns out to be a back copy of an anarchist magazine called *insurrection*, in which a communique from the Dutch anti-Apartheid movement Ra Ra lists 40 acts of sabotage against Shell in the Netherlands. A separate article asks its readers to start fires and also lists various computer viruses but doesn't tell the reader how to create them. The link between the hackers and the European Greens still seems unclear. "That", Nicholson replies, "is buried deep in my files". But what's the source? She then becomes as enigmatic as she was previously emphatic. "You could call it unofficial secret-service trackers close to the Dutch government. They're very close to the hackers and if they're named they could be put in terrible jeopardy. These hackers are very nasty people". (That's the first approx 1/4 of the article, the rest goes on to describe a German hacker "Mike Blip" of the Chaos Club). ******************************************************************* From: fitz@WANG.COM(Tom Fitzgerald) Date: Thu, 15 Nov 90 18:42:06 EST <><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><> Edition : 2193 Monday 12-Nov-1990 Circulation : 8447 VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk] ================== [Nashua, NH, USA ] Massachusetts - Considering computer-crime bill hailed as a model for others {The Wall Street Journal, 9-Nov-90, p. B1} The legislation "is the first to properly balance property and free speech interests," says Mitchell Kapor, founder and chairman of Lotus Development. The bill, which has the support of the governor and is expected to be approved by the Legislature, declares that new forms of communication such as computer bulletin boards and paperless electronic publications "are protected by fundamental rights, including freedom of speech and association and freedom from unreasonable government intrusion." The bill orders jail terms and stiff fines for those who break into computers without authorization or let loose software viruses that disrupt systems or destroy data. Hackers caught causing damage of $10,000 or more are subject to as much as 2 1/2 years in prison, a fine of up to $25,000, or both. European Community - Protecting computer software against piracy {The Wall Street Journal, 9-Nov-90, p. A6} European Community internal-market ministers gave broad-based support to proposals aimed at protecting computer software against piracy. Among the topics touched on was "reverse engineering," which allows a manufacturer to write compatible software or produce compatible equipment. The EC proposals would allow reverse engineering if the purpose was to create compatible, or "inoperable" products, although strict limits on the process would be set. <><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><> Edition : 2194 Tuesday 13-Nov-1990 Circulation : 8450 VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk] ================== [Nashua, NH, USA ] Security - Two teens charged with sabotaging voice-mail system {The Wall Street Journal, 12-Nov-90, p. B7C} Daniel Rosenbaum, 17, and a 14-year-old juvenile, both from Staten Island, allegedly gained unauthorized entry to a computerized voice-mail system owned by International Data Group, Framingham, Mass., then changed recorded greetings to lewd messages, made bomb threats and erased customers' messages, said John Keary, a New York state police investigator. The tampering occurred between May and September at the company's Peterborough, N.H. office, at which eight computer magazines published by the concern are based, said IDG telecommunications director Jane Creighton. She estimated the disruptions cost the company $2.4 million in lost revenue from advertisers and other expenses. Mr. Rosenbaum said the two broke into the company's system because they didn't get a free poster they had expected to receive with "Gamepro," one of its computer magazines, said Mr. Keary. Mr. Keary said the teen-agers were charged with computer tampering, unauthorized use of a computer and aggravated harassment. They gained entry to the voice-mail system by entering "certain codes" into it through telephones, after calling the company's toll-free number, he added. By experimentation or luck, outsiders can learn passwords needed to break into voice-mail systems, enabling them to change outgoing messages and otherwise disrupt operations. Voice-mail break-ins, however, are declining as security aspects of the systems are beefed up, asserts David Ladd, executive vice president of VMX Inc., a San Jose, Calif., seller of voice-mail systems. IDG's Ms. Creighton said that gaining access to the company's phone mail system required use of multiple passwords. The teen-agers "are subscribers and readers of ours, therefore they are very computer-knowledgeable," she added. <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Permission to copy material from this VNS is granted (per DIGITAL PP&P) provided that the message header for the issue and credit lines for the VNS correspondent and original source are retained in the copy. <><><><><><><> VNS Edition : 2194 Tuesday 13-Nov-1990 <><><><><><><> ******************************************************************** ------------------------------ **END OF CuD #2.12** ********************************************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank