Computer underground Digest Wed Oct 7, 1992 Volume 4 : Issue 49 Editors: Jim Thomas and Go

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Wed Oct 7, 1992 Volume 4 : Issue 49 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivist: Dan Carosone Copy Editor: Etaion Jhrdleau, Sr. CONTENTS, #4.49 (Oct 7, 1992) File 1--Viruses--Facts and Myths File 2--Defense Conversion Hearing File 3--FBI Wiretap Scheme Examined File 4--Intl. Piracy File 5--SysLaw Announcement File 6--Cu News: Dept Store Fraud / "MY PC PAL" File 7--Brazilian Politics in Need of Encryption? File 8--Police Charge Toronto Teenager in 911 Case Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT libraries; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by anonymous ftp from ( and Back issues also may be obtained from the mail server at European distributor: ComNet in Luxembourg BBS (++352) 466893. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: 25 Sep 92 00:57:29 From: The Dark Adept Subject: File 1--Viruses--Facts and Myths Viruses--Facts and Myths by The Dark Adept This whole virus thing is a joke. Let me tell you why: What is a virus? ---------------- A virus is a tiny program that attaches itself to other programs. It does in fact operate as a biological virus does. It finds a victim program and infects it with a copy of itself. Then when the victim program is unsuspectingly run, the virus now inside it is activated. At this point, it can do one of two things: infect another program, or cause mischief. What do viruses do? ------------------- Well, a number of things. Some erase your disks. Others print silly messages to your screen. In any case, a virus is not written like other programs are. It uses things that other programs normally don't. If your computer is infected by a virus, whenever you turn on the machine that virus is in the memory, and even if all it does is print "I want a cookie," it can still interfere with other programs since they don't expect it to be there. How do people catch viruses? ---------------------------- Yikes! Here's where all the rumors are! You cannot get a virus from a modem, a printer, a CRT, etc. Viruses only come from other programs. So, whenever you add a program to your hard disk or run one off of a floppy, you stand a chance of catching a virus. Data files (files that are not programs, like text for your wordprocessor) cannot contain viruses. Only programs can contain viruses. On IBM PC's, programs usually end in ".exe" or ".com" and are the files that you run. The programs are the only ones that can contain viruses. The only way to activate the virus is to run the program. Say for example you got a new program called "game.exe". You put it on your hard drive, but you never run it (i.e., you never tried it). Even if game.exe has a virus in it, you WILL NOT catch it. The program has to be run at least once to make the virus active. Another thing is batch files. These are files on IBM PC's that end in ".bat". These DO NOT contain viruses. However, .bat files run other programs. So if the .bat file runs a program that has a virus, the virus WILL be activated. The cause is NOT the .bat file, but the program that was run BY the .bat file. Tell me more about these things... ---------------------------------- Ok. Viruses can only be made for specific machines. By this I mean that a virus that infects IBM PC's will NOT be able to infect Macs. There may be a tiny tiny chance if your Mac is running something like an IBM Emulator that a virus may cause problems, but in general, if you have a non-IBM compatible computer, and you can't run IBM software, then you can't catch IBM viruses and vice-versa. For the most part, only personal computers (i.e., IBM PC's and Macs) are affected by viruses. On IBM's, they are usually limited to DOS, so if you are running Unix on a 386 you don't really need to worry (yet). However, various flaws in NFS security and other technical aspects of computers mean that viruses could someday appear in other types of computers. The reason why personal computers have this problem and others don't is because of how they are designed. Personal computers of the past were designed for one user running only one program. So, they could use all the memory since it wouldn't hurt anyone else. On a mainframe or a Unix system, the hardware (and software) know that many people will be using it, so they are only allowed to use the memory given to them, and if they try and use another section of memory, the computer stops them. Viruses need access to memory that they shouldn't have, and on a personal computer, there is nothing to stop them from getting it. How do I *avoid* viruses? ------------------------- That's like asking "how do I avoid VD?" The answer is "don't stick it in your slot unless you know where it's been." If you buy the software from a computer store, you don't have to worry. Once in a million there might be some type of problem, but in general, store purchased software will NEVER have a virus. If you copy a program from a buddy, then you might have to think twice. Where did he get it from? How many times has it been in someone else's computer? The same goes for software you download with a modem. The only way to complete ensure you never get a virus with 100% certainty is to allow no outside contact with your computer. This is called a "sterile environment" or a "Kosher komputer". This means that you cannot use disks in your computer that have been in other computers, and you cannot put any type of software in your computer that has not been purchased from a store. In other words, the only "safe software" is "no software". If you noticed, computer viruses operate a lot like biological viruses. In fact, they mostly operate like venereal disease. So look at viruses the same way as you would at VD. The only 100% assurance you have against infection is abstinence (from using outside programs and disks). If for some reason you cannot do this, then you must protect yourself. How do I protect myself? Is there a "computer condom"? ------------------------------------------------------- In a nutshell, the answer is NO NO NO!! Do not believe those ads for anti-virus this and that. It's crap. Like a condom, they *help* protect against infection, but there are no guarantees. Whenever you put something in your (disk) slot, you still run a chance of being infected - the "condom" may break or be infected itself. Well, what are the different types of protection available? ----------------------------------------------------------- There are 3 main types of "anti-virus" software available: o Scanners o Detectors o Removers +++Scanners+++ -------------- Each virus has what the anti-virus geeks call a "footprint". What this means is that there is a sequence of "characters" that uniquely identify the virus. For example, say someone gave you a book with no title or description or whatnot and said, "Can you tell me if this is Hamlet by Billy Shakespeare?" Being a virus wizard, you would say "Sure!" What you would do is then look at all the text for the words "to be or not to be". If you found them, then the book would be Hamlet. This is what virus scanners do. They are programmed with an identifying "phrase" or footprint for all known viruses. Then they look at each of your programs. If one of them contains "to be or not to be" then it means that the Hamlet virus has infected your program. Those of you who have drank your coffee this morning might realize that this doesn't help an awful lot. For one thing, what if the text isn't Hamlet but a review of Hamlet that has a sentence "Hamlet's soliloquy which begins with 'to be or not to be' is the most moving part of the play." Well, the virus scanner would see "to be or not to be" and think it is a virus! Of course, it would be wrong. Another thing is say I write a new virus, and the anti-virus cronies haven't seen it yet. Its footprint wouldn't be in the scanner. So the scanner wouldn't know it was a virus. A final problem is that the scanner will only really protect you if it scans the program *correctly* before you ever run it. Once you run it, if you haven't scanned it or the scanner didn't pick anything up, and there is a virus inside, you're toast. After you run the program, if you then run the scanner, sure it will pick it up, but that's like going to the doctor who tells you that you have the clap after you've got it. The scanner is most effective when used before ever running the program. It is also useful for giving your system a "check-up" every once in a while to make sure something didn't slip by. However, again, now you already have contracted the virus and now must worry about getting rid of it. So, if you're going to use a scanner, remember this: + You must have a current version so that the new footprints are in there. + It works best when you scan programs *BEFORE* they are run for the first time. + It might miss some or give you false results, so don't rely on it completely. +++Detectors+++ --------------- What the detectors do is watch for virus activity. For example, some viruses try and erase your hard disk. What a detector does is sit in the background and watches for an illegal or abnormal attempt to do something to the hard disk. Then all sorts of alarms and bells go off ("Warning Will Robinson! Warning!") and the detector tries to stop the virus from doing it. Some will also ask you if you want to allow whatever action is taking place since you might actually be trying to format your hard disk. Another thing that some detectors do is a checksum/byte count check on your files. Remember that a virus *adds* itself to another program. So what the detector does is make a list of all the programs on your drive and remembers what they look like. Then, when a virus changes one, the detector notices this, and gives you a warning like "Program games.exe failed checksum!" and asks you if you still want to run it. You must know that the detector only checks program files. It would be a real pain if every time you changed your term paper the detector went off. However, this is not a weakness since only program files can contain the viruses. It may seem that detectors are the answer, but they are not. Remember, the detector only detects virus activity. This means that you already have a virus running around in your system. It will help stop the damage, but the infection is already there. Another problem is that you must remember that the detector is hiding in the background watching. Some programs don't expect the detector to be there, and freak out (just like they don't expect the viruses to be there either). So the detector might interfere with other programs. The better detectors are well-written so as to avoid this, but even then there might be problems. So, if you are going to use a detector, remember this: + Detectors help stop damage caused by viruses. + If it detects virus activity, you are already infected. + You must buy a good one so that all types of virus activity are detected. + The detector may interfere with other programs. +++Removers+++ -------------- Also called "disinfectors." What these programs do is get rid of the virus infection in your computer. Once you have detected an infection, you have to get rid of it. However, like with cancer, that means cutting something out usually. Nine times out of ten, a disinfector will have to delete *ALL* the programs that are infected. Gone. Erased. Never to come back. Some can get out the virus without deleting files, but this is rare. It depends on how good the disinfector is and what type of virus it is. The remover is probably the most crucial piece of anti-virus software. So, if you are going to use a remover (and you should), remember this; + Files (maybe important ones) will be deleted, so you need backup copies of your software at all times (you should have this anyhow). Who makes this and where can I get it? What do *you* use? ---------------------------------------------------------- There are a lot of companies who make this type of software. I've tried a bunch, and my *personal* favorite is made by Central Point Software. It comes in two types of packages: + PC Tools Deluxe + Central Point Anti-Virus PC Tools deluxe has 2 main anti-virus items: PCBackup and VDefend. What PCBackup does is backup your hard drive. You should be doing this anyhow. What it also does, however, is there is an option to scan as it backs up. What this means is before it backs up the program, it checks it for a virus like a scanner would. This is important. Say you backup your disk every month. Then like 3 weeks later you find that your word processor and some other programs are infected by a virus. You disinfect your disk, and go to install the back up copies. What if the backups are infected? You're back to square one. PCBackup helps to ensure that your backups are virus-free. And, like I said under scanners, you need the current version. Well, good news. The data file where all the footprints are is updated regularly and can be obtained at no cost (last time I checked) from Central Point via modem. So you don't need to buy a new copy of PC Tools every month, just get the new footprint file. VDefend is a virus detector with a lot of neat options. It is also part of the PC Tools Deluxe package. PC Tools deluxe is a nice product and well written and I like it. If you like Norton's software, that is good, too, and so are many others. I just happen to prefer PC Tools. So, you get a lot more for your money than virus detection. Check it out at your software store. Now, the mother of all anti-virus software is Central Point Anti-Virus. This is a killer package. All you could want and more. I've used it a couple of times, but it is more than I need. Either I'm not paranoid or I'm too trusting. However, if you want state-of-the-art TopGrade A-1 anti-virus protection, this is it. It also has a disinfector built in and a lot of other goodies. Now, why do I prefer these packages? I'll be honest with you. A lot of the other anti-virus companies are in it strictly for the money. The bigger the virus scare, the more money they make. Remember the Michaelangelo virus? That was a load of crap. It was a simple virus. There are a lot more dangerous ones out there, and they are more widespread. These companies make *only* anti-virus packages, so they need the hype to survive. Central Point and a few others are not in the anti-virus industry per se. They are regular software companies who also offer anti-virus software. Their programming experience is more widespread than those who concentrate on viruses alone, and this means that their software should be better in general. Why? Well, look at it this way: Say you want to add an equalizer to your stereo. Now, do you want the salesperson to know about stereos in general, or just about equalizers? Shouldn't he know how equalizers interact with the rest of the system? A software company that creates various pieces of software will know how they interact and perform. Further, an investigation into the history of some of these companies, like McAfee and Associates, brings up questions about their competence in this type of work. I ask you to draw your own conclusions, but as a hint as to what I am referring, try and see what type of work McAfee was involved in before viruses. However, since I took a shot at McAfee, I must also state this: I have known people to use McAfee's software and be 100% satisfied with no complaints. They like McAfee's software and continue to use it. It works for them and meets their needs. I hate both McAfee and his software, and I refuse to use it ever, so you must decide for yourself. Out of the general software houses, I like Central Point's goods. So those are my reasons for why I chose it: 1) It is one of the reputable companies, and, 2) Out of those reputable companies, this software has what I want. Some people will say "You are picking on the little guys trying to start out." Maybe. I wouldn't if this were a word processor where if something is screwy in version 1, you can live til version 2. But this is for your protection. Would you rather buy a gun made by Smith and Wesson or Uncle Bob's Bullet Co.? When it comes down to protection, you don't want any misfirings, and you must rely on reputation. So, if you are going to buy "anti-virus" software, remember this: + Well-known, reputable, and experienced companies with good user support like Central Point, Norton, etc. are preferred. + Out of those companies, pick the one that best suits *your* needs. Everyone's system differs. You might love using Norton's backup program, so you just want virus protection and not the full PCTools. Etc., etc., etc. Look at all the software and see what you need and want. Myths ----- Finally, I would like to expose some myths and misconceptions about viruses: "They threaten net connectivity" -------------------------------- If by "net" you mean the Internet, this is 100% false. The machines connected to the net do NOT run programs from other machines, so cannot be infected by them. They merely store programs from other machines. It would be like if a friend asked you to put that game.exe program on your disk and hold it for him until he had space on his. As long as you don't use it, you won't be injured by just storing it. Another thing to remember is that most viruses are for personal computers and most machines on the Internet are NOT personal computers, so the viruses won't affect them anyhow. The only role that the Internet plays in virus propagation (the spreading of viruses) is that if someone gets a program from the Internet for his PC and runs it he might get infected. But remember that you could also get infected by getting a program from a friend. The Internet, therefore, is not threatened by nor the cause of virus contamination. However, if by "net" you mean the LAN at work, then this is true. A lot of viruses spread rapidly through LAN networks, so if one machine gets infected, all of them can. This is because all the personal computers on the LAN run the same programs. Again, the cause here is the running of the program by computers on the net. Internet computers generally do not run the programs that contain viruses. If some idiot says that their Internet connection should be severed due to virus propagation, that would be like saying we should shut down Lake Shore Drive in Chicago since a bank robber might drive down it to get away. Sure it provides a path for viruses (bank robbers), but 99% of the time it is providing a path for legitimate purposes (law abiding citizens). "BBS's are the major cause of virus spreading" ---------------------------------------------- FALSE FALSE FALSE!! The major cause of virus spreading is LAN's and also copying from friends. BBS's merely store programs that you can copy and most people who run BBS's try and make sure none of them have viruses. A BBS is just copying from a friend over a modem. BBS's do not need to be shut down or restricted because of viruses. It is up to *you* to protect yourself from *any* program contamination no matter where you copy the program from (i.e., a friend or BBS). Some of you may have heard of Virus Exchange BBS's. Let me explain what this is: Any type of program ever written starts out as a "source file". This is a regular text file made by a word processor that contains instructions for a computer. This source file must be fed into either an "assembler" or a "compiler" to become a program that can run. This is true whether the program is a spreadsheet or a virus (viruses are programs, just very very tiny ones). Now the source file can have all of the program in it, or just part. The rest would be in other source files. So, for example, if you look at your wordprocessor in two parts you might see that one thing it does is let you type stuff in, and the other part is it lets you print things out. So it might have 2 source files: 1) tells the computer how to let you type things in, and 2) tells the computer how to print things out. A virus is made up of two basic parts: an infector and a destructor. The INFECTOR is the part of the program which hides the virus and makes it spread. The DESTRUCTOR is the mischief maker. This is the part that draws crazy pictures on your screen or erases a file on you. Now on these virus exchange BBS's, they 99% of the time just have virus SOURCE FILES not virus programs. The source files CANNOT cause infection. They must be fed to an assembler or a compiler first to become a program. Remember that for a virus to become active it must be run as a program. These BBS's do not distribute virus programs, but virus source files. Furthermore, most of the source code for viruses on these BBS's is just the INFECTOR part. This is what the programmers are interested in. This is where the innovation and creativity and "wow! Nice piece of code!" happens. The DESTRUCTOR is very basic and any idiot can do one: "del *.*". People who run VXB's (Virus eXchange Boards) are interested in code for the INFECTOR and the DESTRUCTOR is worthless. In other words, they are merely giving out the blueprints and not the bomb itself. Some jerks argue that this in itself should be illegal. Well, another article will deal with that, so please hold comments on this aspect until after I have presented my position. For right now, let me just say that in a nutshell, Virus Exchange BBS's do NOT DIRECTLY cause infections. I think even the so-called "experts" would agree with that. "The first virus was written by..." ----------------------------------- No one knows. However, if you were to ask me, I will say the first virus was written by the first person who made copy-protection. Why? Having the benefit of looking at both copy-protection and virus source code, I can tell you that they do things the same way. The infector part of the virus wants to hide itself and so does the copy-protection. They both use the same types of methods to do so. Both also make programs unusable if certain conditions are met. If it is a copy, the copy-protection stops it from working properly. If it is an infected program that meets the criteria for the destructor part of the virus to start, the virus kicks in the destructor and does its job. Again, please notice I am comparing the copy-protection with the infector, and not the word processor with the destructor. The copy-protection and the infector only differ in that the infector affects more than one program and that the actual reason for both being there (the word-processor vs. the destructor) are different. They both perform the same job - protection and sustenance of the main program. >From this idea of small programs that operate to protect a piece of software known as copy-protection sprang forth the first viruses. So next time you buy a piece of copy protected software you know who to thank for your screwed up harddrive ("wah! but we don't write them!" no, but you gave them the idea and techniques! Plus, copy protection is for loser companies that don't give decent support to registered users thereby creating a huge incentive to register a product. Enuff said.). Another important similarity is that the techniques for removing copy protection from a program and removing a virus from an infected file while retaining the file are very similar (I've done both a few times). "We're all doomed!! It's Michaelangelo!!" ----------------------------------------- Yeah, eat me. I have been using computers for about 11 years. I have been on everything from a Timex Sinclair to a Cray. I've had things on my system you wouldn't feed to your dog. How many times have I been infected by a virus? ZERO I deal with over 100 computer-related people per day (I'm a graduate student in Computer Science). Here is what contact I've had with virus infection: When I was an undergrad at the University of Illinois at Champaign-Urbana (I started out in Electrical Engineering), the Mac labs got infected by a virus. Rumor has it that it was caused by someone using an infected copy of MacPlaymate (an X-rated video game for Macs) on one of the computers. Last year, the PC-LAN at Loyola University of Chicago was slightly infected by Michaelangelo, and one of the professors' PC's caught it because a student handed in his infected programming assignment (it got infected because he wrote it on the LAN). So, everyone who handed in their program got infected if they reran the program when it was returned. Like 2 more people got infected this way. A friend of mine got infected by using an infected copy of a pirated video game (serves him right hehehe!). So, for someone who uses a computer every day and knows mostly computer people, I have personally know 4 people and 2 sites that were infected by viruses, and this is over 11 years. Total damage? Not much. Nothing Anti-Virus and equivalent type software couldn't fix and a quick restore from some backups. So next time they yell "The sky is falling," tell them to line their pockets somewhere else. You should protect yourself, but it's not the end of the world. In fact the only time my harddrive got erased on accident was when I was installing OS/2. It was my fault for not reading the directions. Oops! "They endanger National Security and the military!" --------------------------------------------------- Hahahahahahaha! All I have to say is that most viruses (like 99.9%) attack only personal computers, and any military or government that depends on personal computers for national security and weaponry has more problems than viruses. And furthermore, what are they doing letting missile officers run MacPlaymate on the missile control computer anyhow? Conclusion ---------- I just hoped I made this virus thing clearer. This is not based on any virus "expertise" I have, just a thorough knowledge of computers and my experience with them (which is extensive). I am not a "virus expert" nor am I a virus author. But next time someone tries to scare you or calls themselves a "virus professional" call them an idiot. Just use common sense, make backups, and maybe get a piece of software from a good company. No one is "out to get you". Most of the virus authors are teenagers and are actually nice guys who just like to write intricate programs -- they don't even spread them around! PHALCON/SKISM is a good example. They don't even want to format a hard drive, just have a little fun programming. Once in a while one of their "projects" might get out of hand, but they're not there to make your life miserable. Sure I'd be pissed at em if Flight Simulator got infected, but no biggie. Just clean up and reinstall. Don't blame someone else if you don't make backups. So have phun, and: "Don't worry; be happy!" P.S. Sara(h) Gordon: Your rebuttal to Phrack touched me. Right about... ...there. NOT! (thanks Sarlo) Tiny Bibliography ----------------- 40HEX - the Journal of viruses published by PHALCON/SKISM. Contains new viruses by P/S and a lot of source code. Great reading for programmers, virus authors, and copy-protection people. I've used some of their disk access tricks for utilities I've written for my 386 system that bypass the device drivers. They also provide an excellent and professional analysis of virus code with commented source code from time to time. Tells ya how the varmints really tick. 4 stars! (When's the next issue, guys?!?) Hell Pit BBS - Of Sara(h) Gordon fame. If you want to see what a Virus Exchange BBS is like and why all the screaming, bitching, and whining that Sara(h) and the other people who call themselves "anti-virus" people is for nothing, give it a call. Just don't run anything you download. Most of it is source code, anyhow. Some of it is Sara(h) Gordon's source code. I wonder if ACM would approve of her "research" in virus propagation? I hope Hell Pit is still up. Sarah(s) crap caused Kato a lot of trouble including making people think it was a Fed sting operation (lie). Various hacker nets - like DarkStar, CyberCrime, etc. A lot of virus authors can be contacted on these FidoNet type BBS's. Most of them will answer any question about viruses you have unless you get too specific like "Duh, what did you write?" or too idiotic like "Viruses are terrible! Look at what Michaelangelo did!" (not much). That's just a start, but if you're curious about what viruses really are, don't ask those "anti-virus" goobers, ask the authors. ------------------------------ Date: Mon, 28 Sep 1992 13:29:05 -0400 From: "(Gary Chapman)" Subject: File 2--Defense Conversion Hearing The Department of Defense has set up a Defense Conversion Commission, which is traveling around the country to conduct hearings on local conversion requirements. So far there have been hearings in Atlanta; Long Beach, California; St. Louis; Dallas; Groton, Connecticut; and Seattle. The public hearings last one day, and the commission also visits sites of major defense contractors and speaks to the local press about defense conversion. The commission is scheduled to release a report on its findings no later than December 31. On September 24th, the commission held its hearing in Seattle and testifying on behalf of CPSR and The 21st Century Project was Professor Philip Bereano, professor of technology and public policy at the University of Washington. Phil spoke for ten minutes -- the alloted time for each hearing witness -- about The 21st Century Project and its program of democratizing U.S. technology policy and redirecting research and development programs to peaceful and environmentally responsible goals. There were eighteen other hearing witnesses testifying, representing a broad range of public interest and business organizations, including Washington State SANE/Freeze, Seattle Women Act for Peace, and the Washington Association of Churches. Professional organizations represented included the Seattle Professional Engineering Employees Association and the IEEE Engineering Manpower Committee. There was also testimony from the King County Diversification Committee, the local commission on economic conversion. There are six members of the commission, most of them Pentagon officials; there is one representative from the Department of Labor, and one from the President's Council of Economic Advisers. It is chaired by David J. Berteau, Deputy Assistant Secretary of Defense for Production and Logistics, and former director of the DoD's Office of Economic Adjustment. The representative from the Department of Labor (and the only woman on the panel) is Robin Higgins, Assistant Secretary of Labor for Veteran's Employment and Training, a former Marine officer, and widow of Colonel William R. Higgns, the Marine officer captured and executed by Lebanese terrorists in 1988. For more information about the commission and its work, contact the Commission on Defense Conversion, 1825 K Street, N.W., Suite 310, Washington, D.C. 20006, or call (202) 653-1664. ------------------------------ Date: Wed, 30 Sep 1992 17:05:06 PDT From: "(Nikki Draper)" Subject: File 3--FBI Wiretap Scheme Examined FOR IMMEDIATE RELEASE Contact: Nikki Draper (415) 322-3778 Computer Public Advocacy Group To Examine FBI Wiretap Scheme at October Annual Meeting. Palo Alto, Calif., October 1, 1992 -- Computer Professionals for Social Responsibility (CPSR), the national public interest organization based here, will take an in-depth look at its recent suit against the Federal Bureau of Investigation (FBI) during CPSR's 1992 Annual Meeting, October 17th and 18th at Stanford University in Palo Alto, Calif. CPSR Legal Counsel, David Sobel, will talk about the FBI suit for the first time since it was filed and moderate a panel discussion on the politics of cryptography at the annual meeting. The CPSR annual meeting is a provocative two-day conference that addresses critical issues facing society as a result of information technology. CPSR filed suit against the FBI in September, after the Bureau failed to make public documents that would justify the need for its new wiretap proposal. The FBI proposal would redesign the telephone network to make wiretapping easier. Recognizing the importance of cryptography policy, CPSR catalyzed a national debate earlier this year, as to whether or not the FBI and National Security Agency (NSA) should be involved in setting the technical standards for the computer and communications industry. The panel discussion will include a screening and discussion of film clips from the movie, Sneakers. Panelists include, Joan Feigenbaum, Technical Staff, Computing Principles Research, ATT Bell Labs, John Gilmore, founder of Cygnus Support, and Dave Banisar, CPSR Policy Analyst. CPSR's annual meeting will bring together computer scientists from across the country to examine the relationship between politics and technology. Other topics include: * Teledemocracy & Citizen Participation: Beyond the Electronic Town Meeting, This session is an election year look at the dangers and the opportunities of electronic democracy. Speaker, Susan G. Hadden, professor in the LBJ School of Public Affairs, University of Texas at Austin, an expert on telecommunications and citizen participation. * Everything's Digital! Media Convergence: Hope, Hype or Hell? This session examines the social implications of multimedia convergence which is the merging of computer, telephone, and video technology. Panel discussion with David Bunnell, Editor, New Media, Denise Caruso, Editor, Digital Media, and Howard Rheingold, Whole Earth Review * Envisioning Technology Policy in a Democratic Society; A panel of technologists looks at the development of American technology policy. Panelists include, Gary Chapman, The 21st Century Project, Judy Stern, CPSR/Berkeley, Claire Zvanski, SEIU Local 790. President of Interval Research, Dave Liddle, will be the keynote speaker at CPSR's awards banquet Saturday evening. Liddle will be speaking on the Computing in the 21st Century. IBM researcher, Barbara Simons will be presented with the 1992 Norbert Wiener Award for Social and Professional Responsibility in Computing. Founded in 1981, CPSR is a national, non-profit, public interest ------------------------------ Date: 05 Oct 92 19:05:29 EDT From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 4--Intl. Piracy Congress Urged to Strengthen International Intellectual Property Laws Foreign copyright piracy of computer software, as well as movies, books, and music and audio recordings costs U.S. firms between $12 billion and $15 billion in trade losses each year, says the International Intellectual Property Alliance. The Alliance told a Senate Judiciary subcommittee on patents, copyrights and trademarks that losses in Mexico alone -- which were not included in the international study -- topped $150 million annually. Eric Smith, director of the Alliance, said that although Mexico has new intellectual property laws, "the situation in Mexico is still quite serious." He urged Congress to increase U.S. anti-piracy teams to crack down on foreign copying operations and aid to foreign nations to help them write tougher laws and enforce them. Countries where piracy is particularly prevalent include Italy, Taiwan, Eastern Europe, Russia, China, Paraguay, Peru, El Salvador, Guatemala and Honduras. Brazil and Venezuela are considered problem nations especially for software piracy. ------------------------------ Date: 02 Oct 92 11:13:46 EDT From: Lance Rose <72230.2044@COMPUSERVE.COM> Subject: File 5--SysLaw Announcement NEW SYSLAW BOOK! MASSIVELY REVISED AND EXPANDED! SysLaw, Second Edition: The Legal Guide for Online Service Providers by Lance Rose, Esq., and Jonathan Wallace, Esq. SysLaw provides BBS sysops, network moderators and other online service providers with basic information on their rights and responsibilities, in a form that non-lawyers can easily understand. Subjects covered include the First Amendment, copyrights and trademarks, the user agreement, negligence, privacy, criminal law, searches and seizures, viruses and adult materials. SysLaw not only explains the laws, it gives detailed advice enabling system operators to create the desired balance of user services, freedom, and protection from risk on their systems. SysLaw is available from PC Information Group, 800-321-8285 or 507-452-2824, and located at 1126 East Broadway, Winona, MN 55987. You may order by credit card or by mail. Price is $34.95 plus $3.00 shipping and (if applicable) sales tax. Price is subject to change after January 1, 1993. For additional information, please contact publisher Brian Blackledge at 800-321-8285. ------------------------------ Date: 03 Oct 92 11:54:38 EDT From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 6--Cu News: Dept Store Fraud / "MY PC PAL" DEPARTMENT STORE COMPUTER FRAUD The US Attorney's Office in Sacramento, California has announced an indictment against a Fresno department store for using a 'special computer program' to alter its financial records. The store, Gottschalks, has pled guilty to three criminal counts and has agreed to pay 1.5 million dollars in fines for taking illegal tax deductions and violating securities exchange laws. The store reportedly developed the program to overstate sales, supposedly by nearly half a million dollars in one quarter, allowing it to claim a profit when it was really operating at a loss. (Information Week, August 3, 1992: 10). MY COMPUTER, MY FRIEND. Logitech, Inc recently completed a "PC's and People" survey in which 98% of the 300 computer users surveyed indicated that they feel they have personal relationships with their machines. In addition, 13% said they ascribe personalities to their machines, while 9% admitted that they have named them. At least 50% said they consider their computers to be extensions of themselves. (CompuServe Magazine, October 1992: 8) ------------------------------ Date: 7 Oct 92 15:24:01 From: Moderators Subject: File 7--Brazilian Politics in Need of Encryption? Sometimes those suspected of massive offenses should either learn to use computers properly or else not commit crimes. The current Brazilian political scandals, which threaten to topple President Fernando Collor de Mello, escalated this week when Brazilian investigators began exploring the computer files of a man reportedly at the center of the political corruption, Paulo Cesar ("PC") Farias. According to an article in England's GUARDIAN WEEKLY (Oct 4, 1992 - thanks to Bruce Sterling for sending it over), unencrypted data files may provide considerable information describing the extent of his involvement in Brazilian corruption. According to the article: Under the filename "Collor", they ((the investigators)) had found a list of several of the biggest government ministries, beneath each of which were listed in methodical fashion the main projects in that ministry, the value of the contracts allocated and the commissions charged. One of the most interesting entries concerned the Xingo hydro-electric power station--the only large development project undertaken by the Collor government. This project, involving a consortium of large Brazilian construction companies, including Mendes Junior and Odebrecht, has long aroused suspicion, largely because its costs soared $1.5 billion over budget. Now, thanks to PC's meticulous accounting, the federal police, working with the tax inspectors, believe they will be able to find out where most of the extra money went. One aspect of the listing remains baffling. At the end of each entry PC wrote the name of a star or constellation: the Southern Cross, the Great Bear, the Milky Way, Orion. These heavenly bodies, the accountants guess but cannot yet demonstrate, are probably codenames for sensitive information that PC did not want to entrust to his computer--the names of the powerful economic groups paying the commissions. ........... Though part of the computer files are damaged, the inspectors say they are finding enough evidence to establish the size of the corruption network and the president's close involvement in it. Perhaps somebody could send Brazilian crooks a copy of Phil's Pretty Good Encryption program and the investigators a registered version of Norton Utilities. ------------------------------ Date: Wed, 7 Oct 92 17:54:07 EDT From: Subject: File 8--Police Charge Toronto Teenager in 911 Case Here is a press release that I received from the Metropolitan Toronto Police. The Toronto Star ran a story (based on the press release) on its front page today. 1992 October 06, 1950 hours Teenage Computer Hacker Nabbed by Police Detectives from the Major Crime Squad at Police Headquarters have arrested a 15-year-old North York boy and charged him with a number of computer-related crimes. Investigations have revealed that on some occasions his pranks paralyzed the Metropolitan Toronto 911 emergency telephone system. Last July, a young man called the 911 emergency number from a location in the west end of Metropolitan Toronto and reported a number of medical emergencies which caused units from the Metropolitan Toronto Police, ambulance services and local fire departments to respond. All of these calls were determined to be false. On one occasion, he totally monopolized the 911 system and rendered it inoperable thereby denying citizens access to the 911 lifeline throughout the Metropolitan Toronto area. Bell Canada security officers assisted police in their search for the source of the calls. Acting on a Criminal Code search warrant, police today entered a North York home, seized a quantity of computers and arrested a teen-age boy. He is to appear in Youth Court, 47 Sheppard Avenue East, North York, Friday, November 6, 1992, charged with theft of telecommunications, 24 counts of mischief and 10 counts of convey false message. Investigations are continuing. (end of press release) Note from NDA: More information may be available from the public affairs office of the Metropolitan Toronto Police at (416) 324-2222 or from Detective W. Johnston of the Major Crime Squad at (416) 324-6245. ------------------------------ End of Computer Underground Digest #4.49 ************************************


E-Mail Fredric L. Rice / The Skeptic Tank