Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29) Moderators: Jim Thomas and Gordon

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer Underground Digest--Thu Aug 9, 1991 (Vol #3.29) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.29 (AUGUST 9, 1991) Subject: File 1--Moderators' Corner Subject: File 2--Say Goodbye to FOIA? Subject: File 3--Hackers Challenged to Break In Subject: File 4--Reciprocity in Cyberspace, by Robert Jacobson Subject: File 5--text of chron-spacemail Subject: File 6--Reply to Gene Spafford Subject: File 7--Estimates on virus activity Subject: File 8--Research Analysis Subject: File 9--comp.patents, misc.legal.computing and misc.int-property Administratia: ARCHIVIST: BRENDAN KEHOE RESIDENT CONVALESCENT: BOB KUSUMOTO ULTRA-SCANMEISTER: BOB KRAUSE CuD is available via electronic mail at no cost. Printed copies are available by subscription. Single copies are available for the costs of reproduction and mailing. Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.cs.widener.edu, chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: August 9, 1991 From: "The Moderators" Subject: Moderators' Corner +++++++++++++ LEN ROSE ADDRESS +++++++++++++ For those who missed the last blurb, Len Rose has begun his sojourn in a Level-1 federal institution in North Carolina. He reports that the hardest part of incarceration is the separation from wife and children (it's a long way from Naperville, Ill., to Goldsboro, N.C.), and the intense loneliness of the first few weeks. He is assigned to menial labor, and spends his "leisure" time playing cards, writing letters, and trying to cope with his new environment. He *does not* have a computer or a typewriter. Prisons should be the stop of last resort for violent predators or for those who demonstrate pattern of career criminality. Nothing is served by imprisoning Len or others like him. Why not drop him a humorous postcard just to say "hi?" Sheldon Zenner will continue to serve as as a conduit for funds send to help Len's family. Checks made out to Len Rose or money orders (*no cash*) may be sent to: Sheldon T. Zenner RE: Len Rose Katten, Muchin, and Zavis 525 West Monroe Street (Suite 1600) Chicago, IL 60606-3693 Len's address for those who've missed it: Len Rose (27154-037) FPC Seymour Johnson AFB Caller Box 8004 PMB 187 Goldsboro, NC 27531-5000 +++++++++++++ 'Zines +++++++++++++ The latest MONDO has been out, and from all accounts is first-rate. Info on ordering can be obtained from RUSIRIOUS@WELL.SF.CA.US INTERTEK (Summer, '91) also is lookin' good. Of special interest are the pieces by EFF's John Gilmore on "Preserving Privacy in America" and the interview with sci-fi author Bruce Sterling. The snippets of news and reviews cover the new-hitek gamut, and where else could you find a financial report that includes street prices of computers *and* drugs? (The price of cocaine is down 25 pct--so much for the war on drugs). +++++++++ FTP SITE INFO +++++++++ The U of Chicago ftp site address as changed: The machine is now offically known as chsun1.spc.uchicago.edu although chsun1.uchicago.edu is a valid alias. The ip address is 128.135.252.7 The archivist, Bob Kusumoto, will be unavailable for a few weeks while recovering from a sports injury, so don't send email to him for awhile. He should be able to throw the bull...uh, ball....with his previous velocity. A number of new files have been added, mostly 'zines, academic, and legal papers. Bill Cook's opening statement in the Craig Neidorf trial is also up. ------------------------------ Date: Sat, 27 Jul 91 09:56 EST From: "Michael E. Marotta" Subject: Say Goodbye to FOIA? GRID News. ISSN 1054-9315. vol 2 nu 19e (Bitnet) July 26, 1991. World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA +++++++++++++++++++++ LIBRARIANS SUPPORT NREN, DECLINE TRIBE AMENDMENT; CALLS FOR ACCESS TO INFORMATION FAIL (c) Copyright 1991 by Michael E. Marotta (86 lines) The White House Conference on Library and Information Services was conceived in 1957 by Channing Bete, a library trustee >from Greenfield, Massachusetts. Lyndon Johnson created the National Advisory Commission on Libraries in 1965. In 1974 Gerald Ford authorized the first White House Conference on Library and Information Systems which was convened in 1979 under Jimmy Carter. The second WHCLIS opened on July 9, 1991. On July 10, WHCLIS was address by three representitives from the White House. Barbara Bush, Marilyn Quayle and George Bush said that libraries are really very important. Support from the White House is based on the historically pro-active nature of the 65 conferences that have been called since 1908 when Roosevelt ordered two to discuss Conservation and Children. The general tendency is for various advocacy groups to arrange acceptable wording for their agendas. The conference passes these and up to 80% are incorporated into laws. Productivity, Literacy and Democracy defined WHCLIS when it was first announced. In Michigan, we began meeting in 1989, to discuss censorship, technology, special services, funding and literacy. Michigan's library supporters gave much thought to literacy across generations and technologies beyond books. By 1991, we drafted 15 proposals in the format recommended by the national leaders. For instance, the issue statement for CENSORSHIP was: "A variety of impediments censor or restrict open access to information." Background material, questions for discussion and paths for solution were outlined. Two specific recommendations were developed: "Federal legislation is needed to mandate open access to public information"; and "Federal legislation is needed to mandate protection of patron privacy." These were followed by implementation strategies and recommended programs. Finally, the impact on LITERACY, DEMOCRACY and PRODUCTIVITY were identified. WHCLIS delegates (and alterates) assembled according to nine issue areas: Access, Governance, Marketing, National Information Policy, Networking, Personnel, Preservation, Services, Technology and Training. These plenaries were divided into subgroups to facilitate discussion. Within a plenary, each subgroup received the same set of issues and recommendations. These were discussed and editorial suggestions were forwarded. This went on for two days. Then it was repeated in the plenary sessions. These final recommendations were voted on by the entire conference on the last day. These were among the recommendations which were approved by the entire WHCLIS body: (1) "Establish an office within the US Department of Education responsible for providing leadership to school library media programs across the nation." (2) "Congress shall enact legislation creating and funding the National Research and Education Network that will serve an information super-highway and will allow educational institutions, including libraries, to capitalize on the advantages of technology for resource sharing and the creation and exchange of information." The second WHCLIS opened on July 9, 1991. In all, over 120 calls for federal funding were approved. Of the major recommendations, only one was defeated: "Congress and the states shall recognize the right of the American public to access works of all authors, artists, scholars, politicians and other public figures." Another call for open access, farther down the list, was also defeated. In addition to the officially sanctioned recommendations, eleven petitions made their way to the agenda. A call for the funding of special literacy programs targeted to African-Americans was accepted. A similar proposal to fund Native American libraries was defeated. On Saturday, July 13, 1991, the White House Conference on Libraries and Information Systems (WHCLIS) gave its overwhelming support to the Nation Research and Education Network (NREN). NREN is said to be a multi-gigabit-per-second fiber optic network that will link 1,000 colleges and other facilities. When proposed to the WHCLIS conference, NREN came to the floor with endorsements from over 200 delegates. Speaking against the proposal, I was hissed and the chair reprimanded the offenders. Later, the 27th Amendment suggested by Dr. Lawrence Tribe was moved for acceptance by Andrew Spano of New York. Feeling that the present Bill of Rights is adequate, the delegates rejected the proposal. (GRID News is FREQable from FidoNet 1:159/450, the Beam Rider BBS) ------------------------------ Date: 06 Aug 91 19:29:34 EDT From: "m.lolich%briggs.stad@mich.al" Subject: Hackers Challenged to Break In Company Dares Computer Intruders to Hack Away (From The Detroit News, Sunday, Aug. 4, p. 3A). It's a little like inviting robbers to knock over your bank. To prove its computer programs are secure from electronic intruders, Unix System Laboratories wants hackers to try to break in. The company set up an unattended test computer at its headquarters in Summit, N.J., and bets that unauthorized users can't get into its mock payroll accounts, can't cut phony checks and can't breach private files. Initially, the challenge was issued to corporate security experts--and none has been able to sneak in during the past few months, said spokesman D. Scott Belin. Now, in a bold publicity stunt, the company will offer a toll-free phone number to let any whiz kid or mischief maker log onto a computer and hack away. "There's probably 10,000 computer hackers out there," Belin said. "We're trying to figure out a way tohandle all the phone calls once we make the number available." He said the company, which makes a computer operating system widely used by phone companies, has yet to decide how to publicize the toll-free access number. Marilyn Partel, an operating systems manager at the company, said the software has been redesigned so that no one--even if authorized--has unlimited access to the system. {Moderator's note: We called D. Scott Belin, and he informed us that challenge is not yet open to the general public. There are three pha to the challenge. Beta SV5 was first released to source code customers of 4.1 ES (Enhanced Security). The second phase, currently underway, is to all UNIX SVR4 customers. The final phase, in which it will be to the public, is still in planning stage, and they will release the phone number as soon as all the kinks are worked out. User restrict are built into the operating system. There will be regular user perm and superuser permissions.sions. No single user will have superuser permissions. ------------------------------ Date: August 9, 1991 From: Comp.org.eff.talk (usenet) Subject: Reciprocity in Cyberspace, by Robert Jacobson The following paper was prepared for the "Civilizing Cyberspace" meeting on law and cyberspace hosted by the CPSR and ACLU (with support from the EFF, I believe), to be held in Washington, DC, on June 26-27, 1991. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Reciprocity in Cyberspace Robert Jacobson June 1991 Cyberspace is the term used to express the evolving and expanding electronic/photonic/neuronic network of computers and similar communication devices that encircles the globe. In cyberspace, one or many persons can exchange ideas, in many forms, with correspondents around the world. But despite the appearance of autonomous action that such communications, on their face, might suggest, in fact cyberspace is a designed medium -- and the designers' criteria may differ substantially and significantly from the expectations of those who travel cyberspace. In this short paper, I argue that the concept of "reciprocity," which Webster's defines as "a mutual or cooperative exchange of favors or priviliges," must become the rallying cry of those who hold for personal and collective freedom in cyberspace. An analogy can be suggested by air travel. One can plan to visit anyplace, at any time, to conduct whatever business or take whatever pleasure one has in mind. But in fact, one's plans are literally at the mercy of those who build aircraft and those who operate them. What appears at first to be a tremendous freedom, the ability to jet off to distant realms, is in fact highly constrained by the offerings of aircraft manufacturers and airlines. These purveyors of air travel are organized into oligopolies and the operations of the individual firms are largely determined by the formal and informal codes of the oligopolies. Prices for travel, selection of destinations, and modes of transport are less at the command of the traveller than of the sellers of travel. These factors select who can travel by air, at what time, and to where. The permutations of these factors can appear manifold, but in fact there are a relatively few combinations and the air traveler must accept them, buy his or her own plane, or take a bus. So it may be with cyberspace. Large entities, manufacturers of computer and communications equipment, network operators, and information-service vendors pretty well define the possibilities for travelers in this new ether. It doesn't always appear so -- the rogue traveler, whom some would call a bandit, makes his or her presence known, or is revealed, to a wide public. This is the cracker/hacker phenomenon, aided and abetted by the forces of law and order, including the press, in the service of those who otherwise control the means of telecomputing. We mistake the occasional lapse in the order as a sign of freedom. But the lapse is very infrequent and usually gets turned around, one way or another (as law or calls for "ethics") into a defense of the order. The notion that "interactivity," which simply means (again according to Webster) "the ability to act on each other," somehow equates with freedom is nonsense. I can interact with the U.S. government, Exxon, or more to the point, an ATM terminal standing in for my bank, but no one believes that our dealings are in any way equal or that I am necessarily going to get a square deal. Moreover, if I am wronged, my chances of righting that wrong are slim to none. It is an ill-founded idea, too freely propagated on the nets and in the press, that interactive media are also equitable media. As Vincent Mosco has illustrated in The Pay-Per Society (Ablex, 1989), my interaction with the electronic machinery of domination is act of submission. In contrast, I would like to propose that _reciprocity_ is an essential criterion that should be incorporated into cyberspace, and the sooner the better. Reciprocity requires that not only can I interact with and through the network, but that I be fully apprised of the who operates the network and how it functions Q and that I, or we (including my correspondents), be involved in its design and be able to alter its workings. I know this is a tall order in a social order that values (perhaps too greatly) the role of the entrepreneur and the entrepreneur's inheritor, the corporate manager, in making design decisions unilaterally. Unilateral power to design, we are taught, fosters originality and system alternatives. Autonomous decision making, otherwise known as democracy, gets lip service in our schools but is seldom acted on in the real world of economic and political power. Those who enjoy the freedom to design for others seldom give it away. The more enlightened among the owners may make token offerings of involvement: they have learned that there is greater power (as, for example, the Pacific Northwest Indian chief knew) in appearing to surrender power in a way that ultimately buys compliance. But genuinely sharing design responsibilities? This is a real threat to the hegemony that determines our cyberspace possibilities, and the owners of the means know it. Still, this principal is one that the rest of us, who do not own the networks and the technology (machinery and organization) behind the networks, cannot cease to invoke. It is our one way out of a technological trap that otherwise binds us tighter and tighter to the prerogatives of the already powerful. If we have to sing the song, at least let us write the lyrics. ------------------------------ Date: Wed, 7 Aug 91 20:11:05 CDT From: edtjda@MAGIC322.CHRON.COM(Joe Abernathy) Subject: text of chron-spacemail Electronic mail beams shuttle's message home 8/5/91, Houston Chronicle, Page 1A By JOE ABERNATHY and MARK CARREAU Copyright 1991, Houston Chronicle Electronic mail networks, the message medium of the information age, made their debut in the space age Sunday aboard the shuttle Atlantis as part of an effort to develop a communications system for a future space station. Details of the test were being closely guarded because of concerns over a possible hacker incident or "public free-for-all'' on the nation's computer networks, according to one engineer involved with the project. Privacy and medical ethics also loom large as issues. Astronauts Shannon Lucid and James Adamson conducted the first experiment with the e-mail system on Sunday afternoon, exchanging a test message with Marcia Ivins, the shuttle communicator at Johnston Space Center. The connection flickered out of focus after only a few minutes because of alignment problems with one of the satellites in the communications link, according to the flight director at JSC. The messages follow a winding path from the shuttle, to a satellite in NASA's Tracking Data Relay Satellite System, to the main TDRSS ground station in White Sands, New Mexico, back up to a commercial communications satellite, then down to Houston, where they enter one or more computer networks. Further tests of the system will be conducted on each remaining day of the flight, which continues through Sunday. The shuttle tests are part of a larger project to develop computer and communications systems for the space station Freedom, which the agency plans to assemble during the late 1990s. "These are all steps toward that goal, how we work in space,'' said Byron Han of Apple Computer, whose machines are being used for this stage of the experiment. Electronic mail offers a new way for astronauts to stay in touch with their families, Mission Control, and potentially, the millions of people who use the nation's interlinked computer networks. It could produce far-reaching change in the way scientists and others interact with the space program. Currently, only the shuttle communicator is allowed to talk with the astronauts during a flight, except for a private medical conference each day. E-mail could change that by letting any number of people exchange information, while scientists and engineers on the ground could assume direct control over their experiments in space. One drawback is the potential for NASA to impose a virtual reign of silence regarding sensitive information without anyone realizing that such had been done. E-mail, which is becoming commonplace in offices, is simply the transmission of messages via computers to one or more people, using electronic addresses. Users linked to the right networks can send electronic messages or other data to specific recipients nearly anywhere in the world ^-and now to space. Han and fellow Apple employees Michael Silver and James Beninghaus have donated their time to the project. They are using low-cost, commercially available products, rather than the costly custom products often used in science. The e-mail will play a role in controlling experiments, electronic flight information, and transfer of experiment results to the ground, Han said, as well as sending data up to the shuttle. In the future, the system might be used to transmit and manipulate information from the many medical experiments NASA conducts. But this raises a number of problems regarding privacy and medical ethics. For example, one experiment in this flight seeks to correct a blood-flow problem associated with weightlessness that causes some astronauts to faint upon their return to Earth. But this experiment is being monitored with the same Apple computer that is playing host to the e-mail system. Even though the results aren't being transmitted over computer networks this time, they might be next time ^-and computer networks are notoriously insecure. Inquisitive computer enthusiasts -- hackers -- are in fact one of NASA's chief concerns in regard to the use of electronic mail. The space agency initially sought to conduct the tests without publicity, but word quickly percolated around the nation's computer networks -- perhaps indicating that the concerns were justified. A chorus of calls was heard requesting the e-mail address of the astronauts -- but that raised another problem more pressing than any threat from malicious hacking, that of capacity. "We have things we need to accomplish with the limited amount of time we have, and we do have a very limited amount of data we can move between Mission Control and the orbiter,'' said Deborah Muratore, an engineer in the space station support office at Johnson Space Center and the experiment manager. In addition to voice communication, the shuttles are equipped with Teletype and fax machines for the transmission and reception of printed material and even photo graphs. "Conceivably, everything they move that way could be moved from computer to computer,'' Muratore said. "From a space station standpoint it would be much preferable to transfer the information electronically without paper in the loop the way we do today on the shuttle.'' "Paper is going to be a limited resource, something that has to be thrown away or reused on the space station,'' she said. "It becomes trash. So the more we can eliminate on the space station the better off we are.'' The current experiment does not represent the first time that civilians have had a direct communications link with those in space. Since January, the Soviet space station Mir has maintained a "mail drop'' for ham radio operators to use in leaving messages for the cosmonauts. "It's very similar'' in function, said Gary Morris, a former member of the Johnson Space Center Amateur Radio Club who now lives in San Diego. "The packet bulletin board system on Mir allows an amateur (ham radio operator) on the ground to leave mail messages. "What they're doing with the Mac is different in that they're going through the whole (electronic mail) network. It's much more complex.'' Sidebar: Send mail to Atlantis Computer users who presently have an electronic mail address of their own can send electronic mail to the crew of the shuttle Atlantis. The address to which your comments should be sent is: atlantis@applelink.apple.com If you don't understand how to use this address, ask the administrator of your online system to explain the proce dure and etiquette for sending Internet-style mail. Because of concerns over security, privacy and capacity, NASA has not revealed the specifics of the Atlantis e-mail experiment, but the information leaked out on the nation's computer networks. The e-mail address is being provided unofficially to accommodate the resulting flurry of inquiries. Using it sends mail to an earthbound network, not Atlantis itself, so capacity is not a concern. It is not known whether the astronauts will read their electronic mail while they are in space, or wait until they return. Atlantis is commanded by Air Force Col. John Blaha. His crew includes pilot Mike Baker, a Navy commander; flight engineer David Low; biochemist Shannon Lucid; and Army Col. James Adamson. Joe Abernathy ((Moderator's note: We send a message to the listed address and have not yet received a response)) ------------------------------ Date: Sun, 4 Aug 91 23:26:21 cdt From: sjackson@TIC.COM(Steve Jackson) Subject: Reply to Gene Spafford I was sorry to see Gene Spafford's comments in CuD 3.24. Can anything be more divisive, more likely to widen the gulf between the talented outlaw and the rest of the electronic community, than to say that the ex-cracker will NEVER be allowed to use his skills honestly? What happened to "paying your debt" and re-entering society? Never mind that some of these people have never been charged with any crime, let alone convicted! Spafford says that "to prefer confessed crackers over honorable professionals is quite an insult." It can't possibly be an insult unless the so-called professionals have equal or better skills. And perhaps they don't! Given their backgrounds, there's every reason to think that Comsec can provide valuable advice to those who will listen. If not, they'll soon vanish from the marketplace. But Dr. Spafford would deny them the chance to compete. He thinks that Comsec's attempt to use their skills honestly is an "insult," regardless of how great those skills might be, and anyone utilizing them is a traitor to the legitimate establishment. Spafford's argument can just as easily embrace the proposition that NO ex-criminal should ever be hired for ANY job. To his credit, he expressly denies that he'd go that far. But it follows from his logic. Why not just brand their foreheads with a big red H, and cut off their thumbs so they can't type? By contrast, Gail Thackeray, who has talked on both sides of the Evil Hacker issue, now takes a stand in the clearest possible way. I applaud her part in the Majette sentencing. She didn't ask for revenge; she didn't try to "make an example"; she didn't exaggerate Majette's exploits and grab press. She calmly pointed out that he wasn't dangerous and wasn't the criminal type outside of this particular behavior, and asked for a rehabilitative sentence. And the judge agreed with her. Thanks, Gail. I hope your peers notice, too. ------------------------------ From: The Moderators' Subject: Estimates on virus activity Date: 16 Apr 91 23:52:15 EDT This newspaper clipping was recently submitted to CuD. Despite the lack of source or date, it is interesting as an illustration of "industry" estimates of virus infection rates, an activity that is often blamed on the CU. If the estimates presented as fact in this article are correct, we should see 104 new viruses introduced in 1991. The assertions made in this article are not unlike those often made by so-called "hacker experts". While we make no claim as to the accuracy, or inaccuracy, of the information discussed in this article it does raise some questions concerning methodology, results, and definitions of terms when conducting research on marginal activities. +++++++++++++++++++++++++++++++++++++++++++++++++ "Computer virus infections continue to grow, multiply" From: _Compute-It_ Bart Ziegler AP business writer [This appears to be a syndicated AP column, although no date is given on the clipping we were sent it is thought to be from Feb-April 1991.] NEW YORK - The threat of computer viruses continues to grow as existing viruses multiply and computer marauders introduce new varieties at the rate of two a week, computer experts say. The destructive invaders infect more than one-quarter of major U.S. personal computer users each month, according to a survey released...in conjunction with a computer virus conference. Viruses are multiplying so rapidly that by the end of the year, nearly every major U.S. company that is a heavy user of personal computers will experience a virus infection once a month, predicted Peter Tippett, a computer virus consultant. The attacks are growing because viruses are multiplying exponentially as they spread among computer networks and shared software, Tippett said. In addition, he told a news conference, "There are more and more people writing more and more viruses all the time." [stuff omitted about viruses, bulletin boards, and the Jerusalem virus] "People write computer viruses mainly for sport, I believe," said Tippett, who released a survey of major personal computer users conducted by his software company, Certus International Corp. of Cleveland, Ohio. The telephone survey was conducted earlier this month, aimed at computer security and support employees at 150 companies and government agencies with more than 400 personal computers installed. Half the respondents said they had had a virus infection at least once, 26 percent had an infection during January 1991, and 13 percent said they had had at least one attack so severe it crippled at least 25 computers at once, Tippett said. (...) Tippett, a former biological researcher with a medical degree, said viruses mimic the growth of their biological namesakes. He projects that by the end of this year, most companies with 400 or more personal computers will have a virus attack once a month. (...) Among preventive measures are special anti-viral programs that inoculate computers from known viruses or alert computer users to the presence of these invaders. But Tippett says that does little to block the spread of new viruses, which he says are created all the time. What is more important is greater control over the sharing of software, he said. International Business Machines Corp., the largest personal computer maker, disputed Tippett's dire forecasts. ... IBM said...that using atni-viral programs to detect known viruses is more effective than Tippett asserts. It also said that the rate viruses spread is slower than Tippett claims because the sharing of software is not as widespread as Tippett assumed for his projections. ------------------------------ Date: 28 May 91 12:19:12 bst From: P.A.Taylor Subject: Research Analysis Here is a selective and very rough analysis of the questionnaire you \ answered. It is from the first 50 responses out of a total of just under 200. A full analysis will be distributed when the target of 3-400 responses is achieved. Q1. Gender: 1 female respondent out of 50 (2 out of 200). Q7. Security of respondent's computer environment: Too strict - 0% Adequate -62% Lax -26% Q9. Length of professional experience: 38% - over 10 years. Q11. Serious interest in computing: 68% - over 10 years. Q12. Nature of interest: mainly professional 28% Professional and Recreational 72% Q13. Experience of: Malicious hack/harmless browse/viral incident. All of these 26% None 16% Q14. Number of times: 0-5 - 60% 6-10- 6% 10 -> 20% Q15. What was it? : virus - 38% worm - 16% Trojan- 18% Q16. How serious? : very - 6% not very - 42% not at all serious - 38% combination of these -14% Q18. Non-destructive access to data - crime? yes - 42% no - 20% don't know 38% Q19. Happy with current legislation? yes, about right - 12% no, it's too draconian - 38% Not strong enough - 18% Don't know - 32% Q20. More professional structure to computing industry needed? yes -30% no -40% don't know -30% Q21. Greatest threat to security? insiders -70% outsiders -8% about the same - 18% don't know -4% Q22. Viruses - potentially useful? yes -40% no -42% don't know 18% Q23. Benefits to System Breaking? yes -60% no -28% don't know -12% Q24. Knowledge of Cyberpunk? yes -64% no -36% Q25. Future trends of viruses? increase -64% decrease -10% stay the same -26% A complete analysis will be coming soon. ------------------------------ Date: Sun, 04 Aug 91 12:22:57 -0400 From: emv@MSEN.COM Subject: CFV: comp.patents, misc.legal.computing and misc.int-property For those of who don't read news.announce.newgroups, here's a set of proposal for some new newsgroups. Voting continues to the end of the month. A group for the discussion of issues related to patents and their relationship to computer technology (hardware and software); Peter Treloar, University of Sydney, is moderator. A group for the discussion of the legal aspects of computers, or places where computers or computer users bump into the law. This charter is very broad, and the group is unmoderated. A group for the discussion of intellectual property rights, that is to say the field clustering around the notions of patents, copyrights, trade secrets, or other rights and benefits retained by the original producer of a creative work. The group is unmoderated. To vote you may reply to this message. Using this suggested text will let the votes be counted quickly and painlessly. To: patents-vote@msen.com Subject: vote vote yes/no/abstain comp.patents vote yes/no/abstain misc.legal.computing vote yes/no/abstain misc.int-property quit Vote early and often! (But be sure to vote either yes, or no, or abstain; votes for "yes/no/abstain" will be sent back...) Early returns have been generally positive. -- Edward Vielmetti, vice president for research, MSEN Inc. emv@msen.com MSEN Inc., 628 Brooks, Ann Arbor MI 48103 +1 313 741 1120 for more information on MSEN products and services contact info@msen.com ------------------------------ End of Computer Underground Digest #3.29 ************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank