Computer underground Digest Sun Jan 10, 1992 Volume 5 : Issue 02 ISSN 1002-022X Editors: J

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Sun Jan 10, 1992 Volume 5 : Issue 02 ISSN 1002-022X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Copy Editor: Etaion Shrdlu, Junior CONTENTS, #5.02 (Jan 10, 1992) File 1--DoJ Has NOT "Authorized" Keystroke Monitoring File 2--Re: Dorm Room Raid (CuD #4.67) File 3--Reports on Ames Raid Available File 4--Hysteria from Forbes via NPR File 5--OECD Security Guidelines File 6--CU IN THE NEWS File 7--"Any one Who Owns a Scanner is a Hacker, or..." File 8--FYI: 3rd Computers, Freedom and Privacy Conference Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352) 466893; and using anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. European readers can access the ftp site at: nic.funet.fi pub/doc/cud. Back issues also may be obtained from the mail server at mailserv@batpad.lgb.ca.us. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Fri, 18 Dec 1992 02:35:52 EDT From: Dorothy Denning Subject: DoJ Has NOT "Authorized" Keystroke Monitoring Dave Banisar posted a message a while back with the headline "DOJ Authorizes Keystroke Monitoring." The following article by Dennis Steinauer of NIST clarifies just what exactly the DOJ really said. Dorothy Denning denning@cs.georgetown.edu +++++++ from PRIVACY Forum Digest, Vol. 01:Issue 28 Date--Fri, 11 Dec 92 16:14:09 EST From--dds@csmes.ncsl.nist.gov (Dennis D. Steinauer) Subject--DoJ Has NOT "Authorized" Keystroke Monitoring The Subject line on the recent reposting by David Banisar of the 7 Dec 92 advisory from CERT/CC is highly misleading and inappropriate. As with some newspapers, it is important that people read more than just the headlines. The Department of Justice hasn't "authorized" anything. Rather, they are advising system administrators that certain activities, namely the monitoring or recording of user-to-computer session transmissions (hence "keystroke monitoring") MAY be found illegal in certain circumstances and that notice should be given to users. The CERT advisory was extracted from a letter to the National Institute of Standards and Technology (NIST) from DoJ. Justice asked NIST in its role of providing computer security guidance to Government to circulate the letter and provide appropriate guidance. We have made the letter available, without comment, through several government and other channels (including CERT, I4, etc.). The letter is intended to advise system administrators of an ambiguity in U.S. law that makes it unclear whether session monitoring, often conducted by system administrators who suspect unauthorized activity, is basically the same as an unauthorized telephone wiretap. I repeat, the law is *unclear* -- and the fact that one can argue either way on the issue does not clarify the law as currently written. DoJ advises, therefore, that if system adminstrators are conducting session monitoring or anticipate the need for such monitoring, they should ensure that all system users be notified that such monitoring may be undertaken. The DoJ advice, therefore, is not "authorizing" anything -- even implicitly. They have simply observed the types of activities that diligent system managers often undertake (a la Cliff Stoll in "The Cuckoo's Egg") in an attempt to protect their systems from unauthorized users, and they have rendered some prudent legal advice. Clearly, there are lots of issues here -- technical and otherwise -- that will need to be discussed and sorted out. Indeed, changes in agency/organizational policies and even the law are probably needed. However, none of this changes the fact that system administrators need now to be aware of the potential impact of their activities, and the DoJ advice attempts to do this. We (NIST) are developing additional guidance for system administrators to assist them in implementing the DoJ recommendations. I expect that others will be doing likewise. We also hope to encourage discussion of the related technical and other issues. In the meantime, system adminstrators are well advised to read the basic DoJ advice and examine their systems and agency policies to determine if, where, and how notices should be provided to users. We welcome comments and suggestions, particularly regarding approaches that various organizations take in dealing with this issue. ===== Dennis D. Steinauer National Institute of Standards and Technology A-216 Technology Gaithersburg, MD 20899 USA (301) 975-3359 (301) 948-0279 Facsimile DSteinauer@nist.gov (e-mail) NIST Security BBS: 301-948-5717 (cs-bbs.nist.gov) ------------------------------ Date: Tue, 29 Dec 92 12:32:09 CST From: rio!canary!chris@UUNET.UU.NET(Chris Johnson) Subject: Re: Dorm Room Raid (CuD #4.67) In a recent issue of CuD, an article described a raid on a dorm room to confiscate computer equipment which allegedly contained copies of copyrighted software. The claim was made that the software was obtained via Internet. This reminded me of a conversation I had with my brother over the Christmas holiday. He was recently a student at a university which has Internet access (I do not, or I'd verify the following). He mentioned that the White Sands Missile Range (an obvious DoD installation) had one of the largest collections of ftp accessible computer files. He said they had everything imaginable. Now, it's true I haven't looked myself, nor did I specifically ask him at the time if they had copies of copyrighted images, data or programs as the conversation was about other topics. But I have seen other ftp sites "libraries", and there's next to no doubt in my mind the White Sands site must have megabytes of copyrighted materials. Perhaps someone out there would like to take a look and see just how legal they are. Of course, the federal government seems more interested in busting college students and other individuals than say, cleaning up its own act. ------------------------------ Date: Tue, 22 Dec 1992 13:47:06 EDT From: David Sobel Subject: Reports on Ames Raid Available Last month I posted a NASA statement concerning the unannounced "security review" conducted at the Ames Research Center this past summer. The CPSR Washington Office recently obtained electronic copies of two NASA reports on the incident, which are now available through the listserver. To obtain these files, send the following message to : GET using the following filenames and filetypes: Filename Filetype Lines Description ++++++++ ++++++++ +++++ +++++++++++ AMES-MR REPORT 861 MANAGEMENT REVIEW OF THE AMES RESEARCH CENTER - August, 1992 AMES-MR ASSESSMT 565 ASSESSMENT PANEL REPORT ON THE NASA AMES MANAGEMENT REVIEW - November 6, 1992 ******************************************************* David Sobel Legal Counsel CPSR Washington Office ------------------------------ Date: Mon, 21 Dec 92 09:08 EST From: "Michael E. Marotta" Subject: Hysteria from Forbes via NPR GRID News. December 22, 1992. ISSN 1054-9315. vol 3 nu 9. ++++++++++++++++++++++++ "Morning Edition and Hackers" by Michael E. Marotta On December 21, NPR's "Morning Edition" repeated the highlights of a cover story in FORBES Magazine about so-called "hackers." These computer criminals siphon money from the EFT networks and they steal telephone time. The NPR piece would have been silly except that it feeds the hysteria directed against people who love to work with computers. Stories like these validate the witch hunts carried out by the Secret Service and FBI against hackers. Instead of HACKERS, substitute AUTOMOBILE DRIVERS. Automobile drivers aid organized crime. The mafia learns to drive cars. Sometimes people rent cars to crime lords. And when there aren't enough cars, the underworld steals them. But isn't this silly? We are talking about DRIVING A CAR... Yes, some CRIMINALS can use a computer. Singing about Pretty Boy Floyd, Woody Guthrie said, "some men will rob you with a six gun, some with a fountain pen." That was the 1930s. This is the 1990s. There is a word for people who canNOT program a computer: the word is ILLITERATE. Perhaps these crooks are doing the electronic equivalent of making incorrect change and pocketing the difference. As the clericals of the multinationals, these workers have the best opportunity to siphon money. The Federal Reserve clearing house alone runs a TRILLION dollars EACH DAY. NPR and Forbes worried about "a quarter of a million" dollars. The ratio of 250,000 to one trillion is like an urchin coming upon two men pushing a skid down the street with $4 million in loose bundles and plucking ONE DOLLAR for herself. There is a wider issue, however. EFT is supposed to be protected by the Data Encryption Algorithm created by IBM for the Department of Commerce. People who steal EFT money may be hacking the DEA. Back in 1984, a paperback novel, The Big Byte, told about just such an event. The entire banking system was shut down by a group of religious terrorists who cracked the DES. Only a small fraction of our money is in cash. Without checking and plastic, the economy would slam shut in a few hours. Fear of these possibilities drives the law enforcement community to dog hackers. However, the cops have a poor track record at technology. Fifty years ago, the Feds harassed J. Robert Oppenheimer because he was a communist. The plans for the atom bomb were stolen by Klaus Fuchs, a Briton working at Los Alamos. In retaliation, Julius and Ethel Rosenberg of New York were executed. Today the Feds harass "hackers" while the crooks like Senator Lloyd Bentsen line up on the Clinton gravy train and con men like Newt Gingrich get rich by complaining about not being there themselves. On December 19, CNN Headline News announced that new rules now require banks to have $2 in capital for every $100 in loans. The new regulations will limit bank failures to "only 23" in 1993. You don't need a computer to put two and two together. (GRID News is FREQable from 1:159/450, the Beam Rider BBS) ------------------------------ Date: Tue, 22 Dec 1992 14:19:51 EDT From: Marc Rotenberg Subject: OECD Security Guidelines OECD SECURITY GUIDELINES The Organization for Economic Cooperation and Development (OECD) has adopted international Guidelines for the Security of Information Systems. The Guidelines are intended to raise awareness of the risks in the use of information systems and to establish a policy framework to address public concerns. A copy of the press release and an excerpt from the Guidelines follows. For additional information or for a copy of the guidelines, contact Ms. Deborah Hurley, OECD, 2, rue Andre-Pascal, 75775 Paris Cedex 16, 33-1-45-24-93-71 (fax) 33-1-45-24-93-32 (fax). Marc Rotenberg, Director CPSR Washington office and Member, OECD Expert Group on Information System Security rotenberg@washoc.cpsr.org ============================================================= "OECD ADOPTS GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS "The 24 OECD Member countries on 26th November 1992 adopted Guidelines for the Security of Information Systems, culminating almost two years' work by an OECD expert group composed of governmental delegates, scholars in the fields of law, mathematics and computer science, and representatives of the private sector, including computer and communication goods and services providers and users. "The term information systems includes computers, communication facilities, computer and communication networks and the information that they process. These systems play an increasingly significant and pervasive role in a multitude of activities, including national economies, international trade, government and business operation, health care, energy, transport, communications and education. "Security of information systems means the protection of the availability, integrity, and confidentiality of information systems. It is an international issue because information systems frequently cross national boundaries. "While growing use of information systems has generated many benefits, it has also shown up a widening gap between the need to protect systems and the degree of protection currently in place. Society has become very dependent on technologies that are not yet sufficiently dependable. All individuals and organizations have a need for proper information system operations (e.g. in hospitals, air traffic control and nuclear power plants). "Users must have confidence that information systems will be available and operate as expected without unanticipated failures or problems. Otherwise, the systems and their underlying technologies may not be used to their full potential and further growth and innovation may be prohibited. "The Guidelines for the Security of Information Systems will provide the required foundation on which to construct a framework for security of information systems. They are addressed to the public and private sectors and apply to all information systems. The framework will include policies, laws, codes of conduct, technical measures, management and user practices, ad public education and awareness activities at both national and international levels. "Several OECD Member countries have been forerunners in the field of security of information systems. Certain laws and organizational and technical rules are already in place. Most other countries are much farther behind in their efforts. The Guidelines will play a normative role and assist governments and the private sector in meeting the challenges of these worldwide systems. The Guidelines bring guidance and a real value-added to work in this area, from a national and international perspective." PRINCIPLES "1. Accountability Principle The responsibilities and accountability of owners, providers and users of information systems and other parties concerned with the security of information systems should be explicit. "2. Awareness Principle "In order to foster confidence in information systems, owners, providers and users of information systems and other parties should readily be able, consistent with maintaining security, to gain appropriate knowledge of and be informed about the existence and general extent of measures, practices and procedures for the security of information systems. "3. Ethics Principle "Information systems and the security of information systems should be provided and used in such a manner that the rights and legitimate interests of others are respected. "4. Multidisciplinary Principle "Measures practices and procedures for the security of information systems should take into account of and address all relevant consideration and viewpoints, including technical, administrative, organizational, operational, commercial, educational and legal. "5. Proportionality Principle "Security levels, costs, measures, practices and procedures should be appropriate and proportionate to the value of and degree of reliance on the information systems and to the severity, probability and extent of potential harm, as the requirements for security vary depending upon the particular information systems. "6. Integration Principle "Measures, practices and procedures for the security of information systems should be co-ordinated and integrated with each other and with other measures, practices and procedures of the organization so as to create a coherent system of security. "7. Timeliness Principle "Public and private parties, at both national and international levels, should act in a timely co-ordinated manner to prevent and to respond to breaches of information systems." "8. Reassessment Principle "The security information systems should be reassessed periodically, as information systems and the requirements for their security vary over time. "9. Democracy Principle "The security of information systems should be compatible with the legitimate use and flow of data ad information in a democratic society." [Source: OECD Guidelines for the Security of Information Systems (1992)] ------------------------------ Date: 16 Dec 92 22:41:38 EST From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: CU IN THE NEWS The US Government has filed espionage charges against Kevin Poulsen, age 28, for entering Pacific Bell's computers and allegedly obtaining 'high-level' military secrets. Observers say the charge is overblown since damage to 'national security' has not been established and no secrets were passed to any foreign power. (As reported in Information Week, Dec 14, 1992. pg 10) ++++++ The Business Software Alliance (BSA), an industry coalition against software piracy, has filed 37 lawsuits against firms in 10 European countries, Thirteen of the lawsuits are against BBS' in Germany. The BSA says this is only a preview of how aggressive it will be in 1993. (Information Week, Dec 14, 1992. pg 8) ++++++ The September Inc. magazine Fax Poll shows some interesting numbers regarding business ethics, and a peek at software piracy as well. The results indicate that ethical business practices vary by the age of the businessman and the size and age of the firm. Over half the respondents said they would obey ethical rules, but felt free to bend them to their own advantage when possible. In response to another question, a quarter of the respondents felt the pirating computer software was an acceptable business practice, just a fraction more than those who wouldn't hesitate to violate the privacy rights of a job applicant. The non-scientific poll are conducted monthly. Readers fill out a one-page 'survey' and fax or mail it to Inc. for tabulation. See the December 1992 issue for the details on the September poll on business ethics. (page 16) The results include: Q. Which of the following statements most closely approximates your view of ethics in business? 52% - I play by the rules, but I'll bend them to my company's advantage whenever I can. 46% - I tell the whole truth, all the time. 2% - All's fair in love and business, as long as you don't get caught. When cross-tabulated with the age of the respondent, Inc. reports that 34% of respondents under 35 years old tell the whole truth, compared with 54% of those over 45 years old. When it comes to bending the rules, 62% of under 35s do so, but only 40% of those over 45 indicated that answer. Q. Which of the following would you consider to be an acceptable business practice? 43% - Paying suppliers net 60 days but expecting net 30 on your accounts receivable. 37% - Pretending your company has divisions to make it look bigger to clients and suppliers. 35% - Stealing clients from your current employer when you break off on your own. 25% - Pirating software. 23% - Getting around privacy rights in job interviews. 17% - Using a copier machine on a 30-day trial basis without intending to purchase it. (other responses not included in CuD summary) ------------------------------ Date: Thu, 24 Dec 92 23:46:31 -0500 From: carterm@SPARTAN.AC.BROCKU.CA(Mark Carter) Subject: "Any one Who Owns a Scanner is a Hacker, or..." Canadian Paper Blames BBSes for Porn ((MODERATORS' NOTE: For those not familiar with Canadian geography, we asked a Canadian correspondent to provide some background for the following story. S/he wrote: "St. Catharines is a city of about 125,000 people in southern Ontario, Canada. It is about 1.5 (only 110 kilometers, but traffic slows ya down) hours from Toronto, and about 30 minutes from Niagara Falls. The Standard is "St. Catharines' only local newspaper, with an (unofficially, but optimistically) estimated circulation of about 80,000 subscribers." Although these stories date back to July, the illustrate that Canadian media, like their U.S. counterparts, are prone to exaggerate a "hacker menace.")) ++++++ The following newspaper stories were featured on the front page of the St. Catharines Standard on July 25, 1992, and continued on the third page. They were aimed at a specific "slant" of local bulletin boards, that of pornographic Gifs, and consequently ended up portraying local BBS's as sinister distributors of hard-core pornography that "frightens" both parents and legislators, two groups who it is constantly pointed out do not understand even the most rudimentary basics of operating a computer. Yet these same people are encouraged to form legislation governing bulletin boards. These articles continually emphasized the "frighteningly" rampant availability of pornography through BBSs to young users. However, the young user angle exposes one of the article's greatest fallacies, which is the assumption that there are hordes of nine-year-olds downloading megabytes upon megabytes of extremely hard-core pornographic files. This is simply not the case. I personally know of no user of local boards under the age of 12, and think that such an occurance would be rare at best, since below 12, most kids simply don't know how to use their computers, or think of them along the same lines as dedicated game machines such as Nintendo and Sega. In fact, only a small minority of teenagers will possess the computer know-how to join the online community, and these teenagers are not the little children the Standard is so frightened for. Further, the Standard totally ignores the fact that only a small number of boards carry the hard-core material that they found, and those that carry gifs have the gifs as a small minority compared to the rest of the files they carry. Not to mention that in their portrayal of boards as sinister syndicates, the Standard ignores the existence of the Fidonet message network(in which nearly all local boards take part), which parents would no doubt like their teenagers to take part in. The Standard also ignores the availability of files which are not pornographic, let alone Gifs. It should be noted that all three articles were written by the same authors, presenting the same views. Neither of the authors is known in the local online community. Though five months old, these articles are relevant in relation to the recent Munroe Falls case, where a sysop was arrested for having pornographic material on his board. Below are verbatim transcripts of the three articles. The front page article comes first, and is followed by the two others that were on the third page. KIDS CAN SEE HARD-CORE PORN AT TOUCH OF A BUTTON ++++++++++++++++++++++++++++++++++++++++++++++++ by Paul Forsyth and Andrew Lundy (Standard Staff) Computer wise kids in Canada may be getting an education their parents never dreamed of. At this moment, children are firing up their computers and using telephones to patch into a vast network of files available for free. What's at their fingertips would shock even hardened purveyors of pornography. Computer sex has arrived. Throughout Niagara dozens of public access bulletin boards are thriving. Across Canada there are thousands more. Anyone with a modem and phone line can connect with the boards and access files for their own use. Many of the boards, operated by hobbyists through their home computers, offer explicit photographs and stories ranging from topless women to bondage and bestiality. Most of it is easily accessible to kids who are as comfortable with computers as their parents are uneasy. The phenomenon has lawmakers, police and even Ma Bell feeling helpless. Tony Brandon, who runs Towne Crier-- of of St. Catharines' oldest bulletin boards dating back to 1984-- now bans porn on his system. He decided to restrict what users could send to his board when soft-core images of the mid-1980's became increasingly graphic. He said the number of adult files are "escalating in all the weird areas ... Some of them are pretty hard, heavy-duty stuff." After he banned the porn, the average age of his board users jumped several years, from 12-14 to 19-20. Brandon sees that as proof the main consumers are young teens. Some boards try to screen users accessing adult files, but Brandon found kids simply lied about their ages. Many system operators offer instant access to their programs with few age or identification checks. On a recent weekday, for example, two Standard reporters easily accessed a spate of adult files on local boards-- images ranging from soft-core centrefolds to hard-core images pushing the legal limits of obscenity. Police say it is difficult to lay charges because most of the files--other than bestiality, child porn or dehumanizing, violent or degrading material --- are legal under the Criminal Code. And federal law does not restrict kids' access to porn of any kind. St. Catharines has no bylaw covering availability of pornography, said city clerk Tom Derreck. Even if it did, local bylaws wouldn't apply to bulletin boards because telecommunications is a federal jurisdiction. Police are hesitant to charge the thousands of board operators across the country, despite the fact many carry material clearly obscene under the Criminal Code. That is because it is difficult to nail down where the files-- many originating in the U.S.-- come from, said Inspector Ray Johns, in charge of the vice unit of the Winnipeg police force. The rapid advancement of computer technology has caught police, lawmakers and anti-porn organizations off guard. Some women's groups which have taken hard-line stands against pornography are not even aware bulletin board porn exists. "I wouldn't even understand how this thing operates," St. Catharines, anti-porn crusader Diane Eby said of the bulletin boards. Project P, a joint Ontario Provincial Police/Metro Toronto Police unit which investigates pornography and hate literature, says there is nothing the unit can do about computer porn available to kids. "There's thousands of them, they're all over the place," Detective-Sergeant Bob Matthews, head of the unit, said of the bulletin boards. "You can almost find anything you're looking for." That's what frightens St. Catharines resident Mark Jefferies, who was shocked recently to find a colour photo, depicting two women engaged in bestiality, on a local bulletin board his 15-year-old son connects with. "That's going too far," said Jeffries. "That's where it's got to be stopped. Nine-year-old boys will see that. It sickens me." Fearful parents can forget about complaining to Bell Canada. The phone company has been told by the Canadian Radio-Television and Telecommunications Commision that censorship won't be tolerated. A recent attempt by Bell to axe its 976 service-- after heat from parents over phone sex services-- was shot down by the CRTC. "We're the medium, not the message," said Bell spokeswoman Ruth Foster. "We're not supposed to influence that communication at all or control it in any way." Meantime, kids are using computers in ways their parents never imagined. For example, one St. Catharines board run by a high school student has photos of naked women among those of Goofy, Mickey Mouse and Roger Rabbit. The student, who operates Hogan's Alley, a three-year-old bulletin board, is trying to clear all the adult files from his computer after complaints from female users. But the teen, who didn't want his name used, can't keep pace with users who keep sending pornographic files. Hugh Mitchell, a St. Catharines physician who runs another board, is fed up with the trend to porn files. "There is a big demand(for porn)," he said. "Unfortunately, too much. I just went on my board last night and I couldn't believe what was going on." Problems like that prompt Towne Crier's Brandon to say legislation requiring boards to be licensed might be necessary to stem kids' access to porn. But Matthews of Project P said local computer owners could simply phone Texas or Australia or anywhere else in the world and download porn. "It can come from any place," he said. "This is getting to be a problem throughout North America and the world." It's the global nature of telecommunications which is causing headaches for Canadian universities wrestling with pornography on their computer systems. The University of Manitoba recently yanked offensive files from a computer network it is connected to after word got out about stories and photographs that included child pornography and women hanging from chains. Johns, of the Winnipeg police, said the stories were "how-to" manuals involving incest and torture for sexual gratification. Other universities across the country, including Brock University, still carry the files. "There's a whole lot of legal questions because of the computer. It's a grey area," said Johns, who is waiting for clarification on the issue in the courts. Don Adams, director of computing and information services at Brock, said universities are in a quandary about what to do with offensive files. "You can't really censor the damn network, but on the other hand you don't want to carry all this junk, either." Anti-porn activist and feminist Emilie Fowler, with the Social Justice Committee of Niagara Falls, fears young males have unlimited access to hard-core porn in Niagara. "This is out there, and most people are really not aware of it. Parents go merrily off to work and their young sons are accessing it. What kinds of opinion are they going to form about women?" She had few kind words for those creating the adult computer files. "It's a chilling thought that some of these guys would do this for a hobby. Sit around and think of rape scenes for a hobby? That really frightens me." Jefferies, the concerned father who bought a home computer nearly seven years ago, said his son has assured him he doesn't view the porn on local bulletin boards. Bt he admits that, when he was that age, he probably would have through sheer curiosity. An adult can see whatever they want, as long as it's not hurting anyone. It's the kids I'm worried about." Matthews and Forster at Bell say they've received virtually no complaints about porn on bulletin boards. Matthews figures that is because parents simply don't know it is out there. Kids are "certainly not going to complain." SEEING COMPUTER FILES EASY ++++++++++++++++++++++++++ by Paul Forsyth and Andrew Lundy (Standard Staff) Phone lines aren't just for chatty humans any more. The computer revolution that transformed the world in the '80s has also changed Ma Bell. Today telephones buzz with digital chatter, gibberish to the human ear but the heart and soul of computer lingo. At this moment, probably hundreds of phone lines in St. Catharines are hooked to modems-- small electronic devices that are translators for computers. THey make it possible to transmit not only text, as fax machines do, but also programs like word processing, spreadsheets, games and high-quality graphics. For less than $100, computer owners can buy a modem and unlock the door to a little-known sub-culture of public access bulletin boards that has been growing throughout North America for more than a decade. By running a program which displays text and graphics from other computers on the screen, users can become members of bulletin boards anywhere in the world. The boards are electronic meeting places where users can talk to other computer enthusiasts, play games and exchange messages or files. They are usually set up on home computers by hobbyists who spend hours a day maintaining the boards, updating files and enforcing whatever rules they have established-- like no swearing, or racist jokes. Practically every board-- there are dozens in Niagara alone-- has an area for graphics files, often labelled GIFs. The photos find their way into computers by anonymous hackers using scanners, an electronic device similar to a photocopier. But instead of paper, what's produced is an on-screen image that's often as vivid as the real thing. Accessing these files is as easy as typing a few instructions: telling the board what file you want, the way you want to transmit it-- called downloading-- then simply hitting the return key. Once files are transferred, they can be viewed on-screen or printed out. They can be sent to other computer just as easily as they were received. That's how photo files that violate Canadian obscenity laws have ended up in the Garden City. Passed on from user to user via anonymous phone lines, they've wound their way from the original hacker, through many other bulletin boards, to computer screens of curious children throughout Niagara. IMAGES SHOCK JUSTICE ASSISTANT ++++++++++++++++++++++++++++++ by Paul Forsyth and Andrew Lundy (Standard Staff) Rob Nicholson's face grew grim as the computer image flashed on the screen. Two words escaped from his mouth: "My God." The Niagara Falls MP and assistant to federal Justice Minister Kim Campbell was getting a crash course on computer pornography and its availability to children in Niagara. It scared him. "This is news to me," he admitted in his riding office, as a photo of bestiality appeared. "I have to believe this is news to most Canadians." Two reporters dropped by yesterday to show him a cross-section of hundreds of porn files easily available on local computer bulletin boards-- files even board operators admit are big draws for computer-literate young teens. Nicholson promised to make Campbell aware of the issue, but admitted the wheels of legislative change move slowly. As an example, as recently as two years ago a person would be charged if caught setting fire to someone's garden. But burning a car wasn't considered arson, because cars had not been invented when the Criminal Code was written. Nicholson pointed out that the combination of pornography-- a thorny political issue-- and rapidly changing computer technology makes drafting effective legislation a daunting task. "I don't know what the ... solution is to this. It bothers me that we don't have a magic bullet. This wonderful new technology is being perverted. It scares me as a parent." ------------------------------ Date: Fri, 8 Jan 1993 17:34:58 -0500 From: Gerard Van der Leun Subject: FYI: 3rd Computers, Freedom and Privacy Conference CFP'93 The Third Conference on Computers, Freedom and Privacy 9-12 March 1993 San Francisco Airport Marriott Hotel, Burlingame, CA The CFP'93 will assemble experts, advocates and interested people from a broad spectrum of disciplines and backgrounds in a balanced public forum to address the impact of computer and telecommunications technologies on freedom and privacy in society. Participants will include people from the fields of computer science, law, business, research, information, library science, health, public policy, government, law enforcement, public advocacy and many others. Some of the topics in the wide-ranging CFP'93 program will include: ELECTRONIC DEMOCRACY - looking at how computers and networks are changing democratic institutions and processes. ELECTRONIC VOTING - addressing the security, reliability, practicality and legality of automated vote tallying systems and their increasing use. CENSORSHIP AND FREE SPEECH ON THE NET - discussing the problems of maintaining freedom of electronic speech across communities and cultures. PORTRAIT OF THE ARTIST ON THE NET - probing the problems and potential of new forms of artistic expression enabled by computers and networks. DIGITAL TELEPHONY AND CRYPTOGRAPHY - debating the ability of technology to protect the privacy of personal communications versus the needs of law enforcement and government agencies to tap in. HEALTH RECORDS AND CONFIDENTIALITY - examining the threats to the privacy of medical records as health care reform moves towards increasing automation. THE MANY FACES OF PRIVACY - evaluating the benefits and costs of the use of personal information by business and government. THE DIGITAL INDIVIDUAL - exploring the increasing capabilities of technology to track and profile us. GENDER ISSUES IN COMPUTING AND TELECOMMUNICATIONS - reviewing the issues surrounding gender and online interaction. THE HAND THAT WIELDS THE GAVEL - a moot court dealing with legal liability, responsibility, security and ethics of computer and network use. THE POWER, POLITICS AND PROMISE OF INTERNETWORKING - covering the development of networking infrastructures, domestically and worldwide. INTERNATIONAL DATA FLOW - analyzing the issues in the flow of information over the global matrix of computer networks and attempts to regulate it. The conference will also offer a number of in-depth tutorials on subjects including: * Information use in the private sector * Constitutional law and civil liberties * Investigating telecom fraud * Practical data inferencing * Privacy in the public and private workplace * Legal issues for sysops * Access to government information * Navigating the Internet INFORMATION For more information on the CFP'93 program and advance registration call, write or email to: CFP'93 INFORMATION 2210 SIXTH STREET BERKELEY, CA 94710 (510) 845-1350 cfp93@well.sf.ca.us A complete electronic version of the conference brochure with more detailed descriptions of the sessions, tutorials, and registration information is also available via anonymous ftp from sail.stanford.edu in the file: pub/les/cfp-93 ------------------------------ End of Computer Underground Digest #5.02 ************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank