Computer underground Digest Sun Apr 25 1993 Volume 5 : Issue 30
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Cyop Editor: Etaoin Shrdlu, Senior
CONTENTS, #5.30 (Apr 25 1993)
File 1--New disclosures in 2600 case
File 2--Press release on "Clipper Chip" encryption initiative
File 3--THE CLIPPER CHIP: A TECHNICAL SUMMARY
File 4--Sysop jailed in Georgia (article by Lance Rose)
File 5--Phone Fraud in the Telecom Industry
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from firstname.lastname@example.org. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) 203-832-8441 NUP:Conspiracy
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (126.96.36.199) in /pub/cud
uglymouse.css.itd.umich.edu (188.8.131.52) in /pub/CuD/cud
halcyon.com( 184.108.40.206) in /pub/mirror/cud
AUSTRALIA: ftp.ee.mu.oz.au (220.127.116.11) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)
Back issues also may be obtained through mailserver at:
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
From: David Sobel
Date: Wed, 21 Apr 1993 22:19:29 EST
Subject: File 1--New disclosures in 2600 case
As you may recall, last November at a shopping mall outside of
Washington, DC, a group of people affiliated with the computer
magazine "2600" was confronted by mall security personnel, local
police officers and several unidentified individuals. The group
members were ordered to identify themselves and to submit to searches
of their personal property. Their names were recorded by mall
security personnel and some of their property was confiscated.
However, no charges were ever brought against any of the individuals
at the meeting.
Computer Professionals for Social Responsibility ("CPSR") filed suit
under the Freedom of Information Act and today received the Secret
Service's response to the FOIA lawsuit, in which we are seeking agency
records concerning the break-up of the meeting. I think it's safe to
say that our suspicions have now been confirmed -- the Secret Service
*did* obtain a list of names from mall security identifying the people
in attendance at the meeting.
There are three main points contained in the Secret Service's court
papers that are significant:
1) The agency states that the information it possesses concerning the
incident was obtained "in the course of a criminal investigation that
is being conducted pursuant to the Secret Service's authority to
investigate access device and computer fraud."
2) The agency possesses two relevant documents and the information in
those documents "consists solely of information identifying
3) The information was obtained from a "confidential source," and the
agency emphasizes that the FOIA's definition of such a source includes
"any private institution which provided information on a confidential
Taken together, these facts seem to prove that the Secret Service
wanted names, they had the mall security people collect them, and they
came away from the incident with the list they wanted.
The agency asserts that "[t]he premature release of the identities of
the individual(s) at issue could easily result in interference to the
Secret Service's investigation by alerting these individual(s) that
they are under investigation and thus allowing the individual(s) to
alter their behavior and/or evidence."
CPSR, in conjunction with EFF and the ACLU, is planning to challenge
the actions of the mall security personnel, the local police and the
Secret Service on the ground that the incident amounted to a
warrantless search and seizure conducted at the behest of the Secret
CPSR Legal Counsel
Date: Mon, 19 Apr 93 19:12:48 PDT
From: ross@QCKTRN.COM(Gary Ross)
Subject: File 2--Press release on "Clipper Chip" encryption initiative
Date - Mon, 19 Apr 1993 16:44-0400
>From - The White House
Subject - Press release on "Clipper Chip" encryption initiative
THE WHITE HOUSE
Office of the Press Secretary
For Immediate Release April 16, 1993
STATEMENT BY THE PRESS SECRETARY
The President today announced a new initiative that will bring the
Federal Government together with industry in a voluntary program to
improve the security and privacy of telephone communications while
meeting the legitimate needs of law enforcement.
The initiative will involve the creation of new products to accelerate
the development and use of advanced and secure telecommunications
networks and wireless communications links.
For too long, there has been little or no dialogue between our private
sector and the law enforcement community to resolve the tension
between economic vitality and the real challenges of protecting
Americans. Rather than use technology to accommodate the sometimes
competing interests of economic growth, privacy and law enforcement,
previous policies have pitted government against industry and the
rights of privacy against law enforcement.
Sophisticated encryption technology has been used for years to protect
electronic funds transfer. It is now being used to protect electronic
mail and computer files. While encryption technology can help
Americans protect business secrets and the unauthorized release of
personal information, it also can be used by terrorists, drug dealers,
and other criminals.
A state-of-the-art microcircuit called the "Clipper Chip" has been
developed by government engineers. The chip represents a new approach
to encryption technology. It can be used in new, relatively
inexpensive encryption devices that can be attached to an ordinary
telephone. It scrambles telephone communications using an encryption
algorithm that is more powerful than many in commercial use today.
This new technology will help companies protect proprietary
information, protect the privacy of personal phone conversations and
prevent unauthorized release of data transmitted electronically. At
the same time this technology preserves the ability of federal, state
and local law enforcement agencies to intercept lawfully the phone
conversations of criminals.
A "key-escrow" system will be established to ensure that the "Clipper
Chip" is used to protect the privacy of law-abiding Americans. Each
device containing the chip will have two unique
"keys," numbers that will be needed by authorized government agencies
to decode messages encoded by the device. When the device is
manufactured, the two keys will be deposited separately in two
"key-escrow" data bases that will be established by the Attorney
General. Access to these keys will be limited to government officials
with legal authorization to conduct a wiretap.
The "Clipper Chip" technology provides law enforcement with no new
authorities to access the content of the private conversations of
To demonstrate the effectiveness of this new technology, the Attorney
General will soon purchase several thousand of the new devices. In
addition, respected experts from outside the government will be
offered access to the confidential details of the algorithm to assess
its capabilities and publicly report their findings.
The chip is an important step in addressing the problem of
encryption's dual-edge sword: encryption helps to protect the privacy
of individuals and industry, but it also can shield criminals and
terrorists. We need the "Clipper Chip" and other approaches that can
both provide law-abiding citizens with access to the encryption they
need and prevent criminals from using it to hide their illegal
activities. In order to assess technology trends and explore new
approaches (like the key-escrow system), the President has directed
government agencies to develop a comprehensive policy on encryption
the privacy of our citizens, including the need to employ
voice or data encryption for business purposes;
the ability of authorized officials to access telephone
calls and data, under proper court or other legal order,
when necessary to protect our citizens;
the effective and timely use of the most modern technology
to build the National Information Infrastructure needed to
promote economic growth and the competitiveness of American
industry in the global marketplace; and
the need of U.S. companies to manufacture and export high
The President has directed early and frequent consultations with
affected industries, the Congress and groups that advocate the privacy
rights of individuals as policy options are developed.
The Administration is committed to working with the private sector to
spur the development of a National Information Infrastructure which
will use new telecommunications and computer technologies to give
Americans unprecedented access to information. This infrastructure of
high-speed networks ("information superhighways") will transmit video,
images, HDTV programming, and huge data files as easily as today's
telephone system transmits voice.
Since encryption technology will play an increasingly important role
in that infrastructure, the Federal Government must act quickly to
develop consistent, comprehensive policies regarding its use. The
Administration is committed to policies that protect all American's
right to privacy while also protecting them from those who break the
Further information is provided in an accompanying fact sheet. The
provisions of the President's directive to acquire the new encryption
technology are also available.
For additional details, call Mat Heyman, National Institute of
Standards and Technology, (301) 975-2758.
----- End Included Message -----
Date: Wed, 21 Apr 93 19:21:48 EDT
From: email@example.com (Dorothy Denning)
Subject: File 3--THE CLIPPER CHIP: A TECHNICAL SUMMARY
((REPRINTED FROM RISKS DIGEST, #14.52))
THE CLIPPER CHIP: A TECHNICAL SUMMARY
Revised, April 21, 1993
On April 16, the President announced a new initiative that will bring
together the Federal Government and industry in a voluntary program to
provide secure communications while meeting the legitimate needs of
law enforcement. At the heart of the plan is a new tamper-proof
encryption chip called the "Clipper Chip" together with a split-key
approach to escrowing keys. Two escrow agencies are used, and the key
parts from both are needed to reconstruct a key.
The Clipper Chip contains a classified single-key 64-bit block
encryption algorithm called "Skipjack." The algorithm uses 80 bit
keys (compared with 56 for the DES) and has 32 rounds of scrambling
(compared with 16 for the DES). It supports all 4 DES modes of
operation. The algorithm takes 32 clock ticks, and in Electronic
Codebook (ECB) mode runs at 12 Mbits per second.
Each chip includes the following components:
the Skipjack encryption algorithm
F, an 80-bit family key that is common to all chips
N, a 30-bit serial number (this length is subject to change)
U, an 80-bit secret key that unlocks all messages encrypted with the chip
The chips are programmed by Mykotronx, Inc., which calls them the
"MYK-78." The silicon is supplied by VLSI Technology Inc. They are
implemented in 1 micron technology and will initially sell for about
$30 each in quantities of 10,000 or more. The price should drop as the
technology is shrunk to .8 micron.
ENCRYPTING WITH THE CHIP
To see how the chip is used, imagine that it is embedded in the AT&T
telephone security device (as it will be). Suppose I call someone and
we both have such a device. After pushing a button to start a secure
conversation, my security device will negotiate an 80-bit session key K
with the device at the other end. This key negotiation takes place
without the Clipper Chip. In general, any method of key exchange can
be used such as the Diffie-Hellman public-key distribution method.
Once the session key K is established, the Clipper Chip is used to
encrypt the conversation or message stream M (digitized voice). The
telephone security device feeds K and M into the chip to produce two
E[M; K], the encrypted message stream, and
E[E[K; U] + N; F], a law enforcement field ,
which are transmitted over the telephone line. The law enforcement
field thus contains the session key K encrypted under the unit key U
concatenated with the serial number N, all encrypted under the family
key F. The law enforcement field is decrypted by law enforcement after
an authorized wiretap has been installed.
The ciphertext E[M; K] is decrypted by the receiver's device using the
D[E[M; K]; K] = M .
CHIP PROGRAMMING AND ESCROW
All Clipper Chips are programmed inside a SCIF (Secure Compartmented
Information Facility), which is essentially a vault. The SCIF contains
a laptop computer and equipment to program the chips. About 300 chips
are programmed during a single session. The SCIF is located at
At the beginning of a session, a trusted agent from each of the two key
escrow agencies enters the vault. Agent 1 enters a secret, random
80-bit value S1 into the laptop and agent 2 enters a secret, random
80-bit value S2. These random values serve as seeds to generate unit
keys for a sequence of serial numbers. Thus, the unit keys are a
function of 160 secret, random bits, where each agent knows only 80.
To generate the unit key for a serial number N, the 30-bit value N is
first padded with a fixed 34-bit block to produce a 64-bit block N1.
S1 and S2 are then used as keys to triple-encrypt N1, producing a
64-bit block R1:
R1 = E[D[E[N1; S1]; S2]; S1] .
Similarly, N is padded with two other 34-bit blocks to produce N2 and
N3, and two additional 64-bit blocks R2 and R3 are computed:
R2 = E[D[E[N2; S1]; S2]; S1]
R3 = E[D[E[N3; S1]; S2]; S1] .
R1, R2, and R3 are then concatenated together, giving 192 bits. The
first 80 bits are assigned to U1 and the second 80 bits to U2. The
rest are discarded. The unit key U is the XOR of U1 and U2. U1 and U2
are the key parts that are separately escrowed with the two escrow
As a sequence of values for U1, U2, and U are generated, they are
written onto three separate floppy disks. The first disk contains a
file for each serial number that contains the corresponding key part
U1. The second disk is similar but contains the U2 values. The third
disk contains the unit keys U. Agent 1 takes the first disk and agent
2 takes the second disk. Thus each agent walks away knowing
an 80-bit seed and the 80-bit key parts. However, the agent does not
know the other 80 bits used to generate the keys or the other 80-bit
The third disk is used to program the chips. After the chips are
programmed, all information is discarded from the vault and the agents
leave. The laptop may be destroyed for additional assurance that no
information is left behind.
The protocol may be changed slightly so that four people are in the
room instead of two. The first two would provide the seeds S1 and S2,
and the second two (the escrow agents) would take the disks back to
the escrow agencies.
The escrow agencies have as yet to be determined, but they will not
be the NSA, CIA, FBI, or any other law enforcement agency. One or
both may be independent from the government.
LAW ENFORCEMENT USE
When law enforcement has been authorized to tap an encrypted line, they
will first take the warrant to the service provider in order to get
access to the communications line. Let us assume that the tap is in
place and that they have determined that the line is encrypted with the
Clipper Chip. The law enforcement field is first decrypted with the
family key F, giving E[K; U] + N. Documentation certifying that a tap
has been authorized for the party associated with serial number N is
then sent (e.g., via secure FAX) to each of the key escrow agents, who
return (e.g., also via secure FAX) U1 and U2. U1 and U2 are XORed
together to produce the unit key U, and E[K; U] is decrypted to get the
session key K. Finally the message stream is decrypted. All this will
be accomplished through a special black box decoder.
CAPSTONE: THE NEXT GENERATION
A successor to the Clipper Chip, called "Capstone" by the government
and "MYK-80" by Mykotronx, has already been developed. It will include
the Skipjack algorithm, the Digital Signature Standard (DSS), the
Secure Hash Algorithm (SHA), a method of key exchange, a fast
exponentiator, and a randomizer. A prototoype will be available for
testing on April 22, and the chips are expected to be ready for
delivery in June or July.
ACKNOWLEDGMENT AND DISTRIBUTION NOTICE. This article is based on
information provided by NSA, NIST, FBI, and Mykotronx. Permission to
distribute this document is granted.
Date: Wed, 14 Apr 93 12:02:29 GMT
From: firstname.lastname@example.org (Russell Webb)
Subject: File 4--Sysop jailed in Georgia (article by Lance Rose)
((MODERATOR'S NOTE: The following article comes from BOARDWATCH
Magazine, a monthly hardcopy summary of news and features devoted to
the BBS world. Subs are $36 for one year or $59 for two. Information
about BOARDWATCH can be obtained from Jack Rickard (editor) at
email@example.com or by writing: BOARDWATCH; 7586 West Jewell Ave.,
Suite 200; Lakewood CO (80232)).
I ran into this article on a local NYC BBS. Lance Rose, the author,
has kindly granted permission for the article to be posted to
I haven't seen any discussions about this event on this newsgroup.
If I've missed any sort of prior discussion on this in comp.org.eff.talk,
then I offer my apologizes in advance for the use of bandwidth.
SYSOP JAILED IN GEORGIA
by Lance Rose
Adult BBS' continue to spread across the country. Many of them openly
carry industrial-strength hardcore materials, without much apparent
concern for legal reprisals. One might wonder if the sysops of these
BBS' are fools to proceed so fearlessly, or perhaps the vanguard of a
new era of online sexual liberation. More likely, they simply assume
the coast is clear. There is virtually no hard news about adult BBS'
or their operators getting into trouble. Murky rumors abound
(including some retold in this column several months ago), but they're
easy to shrug off in their vagueness.
The suspense is over. A man named Robert Houston is currently doing
time in a jail in Jackson, Georgia, based on the presence of sexually
oriented materials on the BBS he owned and operated. Ironically, he
seems to be one of the guys who took all the right precautions. In the
end, his prudent measures lost out to a repressive local cultural
climate and petty personal vengeance.
For over two years, Mr. Houston's quiet incarceration did not raise
even a murmur. Then suddenly, he showed up briefly in a segment of the
CNN news show Technology Week as an example of a sysop who got popped.
An interview with Mr. Houston was hastily arranged afterward, just in
time for this issue of Boardwatch. In a collect call from the Georgia
Diagnostic Center, Robert Houston described how he went from sysop of
an adult BBS to convicted felon:
Houston owned and operated a video store and repair shop in Georgia.
His BBS, a Wildcat system called the Stonewall BBS, was a hobby, and
did not net him any money. There was a sister BBS called "Stonewall
West" in California, but the two operations shared little but their
The Stonewall BBS contained sexually-oriented adult materials, both
straight and gay varieties. Different types of adult materials were
separated from each other by security levels defined on the BBS. The
materials were relatively mild by adult BBS standards. According to
Houston, nothing on the BBS was racier than what one might find in
Hustler, a popular magazine nationally distributed on newsstands.
There were no files with extreme material such as child pornography or
bestiality. There was also a popular chat area, which Houston
describes as the BBS version of a 900 sex talk line. using computers
to converse instead of our voices.
These areas and materials were closed to casual visitors. Anyone
wishing access to the adult materials on Stonewall BBS first had to
pass through Houston's hair-raisingly exhaustive verification
procedures. On the first call to Stonewall, each caller had to fill in
a standard questionnaire of personal information - name, address, age,
phone number, and so on. Upon completion, the caller was asked if he
desired access to any of the adult areas of the BBS. If the answer was
yes, the caller was asked which category of materials interested him,
and what kind of lifestyle he led. Houston says he used this
classification to try and group together people of similar interests
within the system. Houston himself was gay, and had a fair amount of
gay-oriented materials on the system.
Next, all callers, regardless of whether they filled out both
questionnaires or only the first one, were placed in the "new users
romper room" area of Stonewall. Callers still wishing to proceed with
registration were then led into an automated callback verification
sequence, where the BBS software called back the number submitted by
the caller. After callback verification, new callers were still
restricted to the new users romper room. In this area, callers could
sample limited, non-adult-oriented sections of the BBS, but could not
upload or download any files.
In the evenings, Houston read through all new applications for the
day. He called back all applicants personally the next day, and
verified their applications by voice. In certain cases, such as
borderline-age applicants stating they were college students, he
checked their references to make sure they were genuine. All callers
who passed this verification step then had to send Houston photocopies
of their driver's licenses, after which they were finally given access
to the adult areas. Houston's verification process was quite an
extended routine, but he says he fully verified over 600 callers using
Houston's troubles started when he fired a teenage employee of his
video store business for basic laziness. According to Houston,
directly upon being fired the ex-employee went to Sheriff Earle Lee of
Douglas County, Georgia, the county in which Stonewall BBS operated.
He told Sheriff Lee that Houston was running a nationwide network for
the distribution of homosexual materials from the Stonewall BBS. The
police moved like lightning on these charges. The employee was fired
Saturday, September 8, 1990. Two days later, on Monday, September 10,
Sheriff Lee and his deputies hauled Houston off to jail and
confiscated his computer equipment.
The arrest and seizure warrant, and the indictment that followed,
contained four counts against Houston: 2 counts of distribution of
obscene materials; 1 count of solicitation of sodomy; and 1 count that
Houston "provided a medium as to which sexually explicit materials
containing children could be found". The counts in the indictment
were based on the testimony of two of Houston's ex-employees: the one
who started the legal process against Houston, and another who had
been fired some months earlier.
The second ex-employee, according to Houston, was a computer hacker
whom Houston had suspected of stealing some money from his business,
then altering his business computer records to cover it up. For the
indictment, both ex-employees testified that Houston had created sex
videos with them (another allegation he entirely denies), and that he
had given them both access to the adult areas of his BBS while they
were his employees, even though they were 17- year-old minors. Houston
thought they were 18 years old until then. Houston entirely denies
After sitting in jail for a couple of months, Houston went to trial
and lost. The prosecuting attorney was D.A. David McDade of Douglas
County. Houston paid his own lawyer $10,000, and had no money left to
pay for an appeal after the trial.
Houston says the trial against him was filled with misconduct. Perhaps
his most shocking charge is that the State did not use a police expert
or independent expert to evaluate the materials contained in his
confiscated BBS. Instead, they put his own ex-employee, the computer
hacker who testified against him for the indictment, in charge of
investigating the computer to conduct the State's own inspection of
the evidence! This amazing approach bore no resemblance to normal
procedure, which was to send seized evidence requiring technical
examination to the Georgia Crime Lab. If Houston's charge is true,
this is fatal contamination of the evidence - placing key evidence
against the accused in the hands of a hostile and complaining witness!
Further, Houston says the hacker/ex-employee made the most of his
opportunity, tampering with the BBS computer files to create damning
evidence against Houston. Specifically, Houston says that computer
files were altered before trial to make it look like he had been using
his BBS to solicit two 17-year-olds. There were indeed two
17-year-olds on Stonewall BBS, but Houston had given them access only
to a special "teen board" area he set especially up for them. Houston
believes his ex-employee, while he had control of BBS computer, raised
the 17 year olds' security level to make it look like they had access
to the adult materials, and added suggestive messages addressed from
Houston to these callers.
Houston moved for inspection of the computer prior to trial, but the
judge denied his motion. Houston also lined up 3 different computer
experts to check the BBS system for tampering using software tools for
inspecting the computer's hard disk, and to testify to the tampering
at trial. For reasons that are unclear, his lawyer refused to use the
experts. Finally, Houston wanted to show the judge at trial how his
BBS worked and how he maintained system security and age verification,
but the judge would not permit the demonstration.
In the end, Houston was convicted of a single count of sexual
exploitation of children, under Georgia Statute 16-12-100-B6. This
conviction classifies him as a craven sex offender, equivalent to a
rapist. The only evidence supporting his conviction were the computer
records regarding the 17-year-olds submitted by the ex-employee
hacker. As mentioned above, Houston's lawyer failed to offer expert
testimony disputing the authenticity and accuracy of the computer
records regarding the 17-year-olds' status on the system. Houston's
lawyer further failed to obtain testimony from the 17-year-olds
themselves, which could have shown the computer evidence to be false.
Houston seems bewildered at the approach taken by his lawyer. The only
reasoning the lawyer seems to have given him for these seeming
enormous strategic lapses is that such attempts to discredit the
state's case would only make Houston look worse in the eyes of the
Houston says there is no law against precisely what he's been
imprisoned for, and says the prosecuting D.A. said the same thing
publicly after his conviction. Despite the unanimous confusion over
whether Houston is actually guilty of any wrongdoing, he remains in
jail for the time being. Houston is due to be released in September,
1993, and says he plans to head out of Georgia as soon as he is
permitted to do so. Douglas County has not been very kind to Robert
Houston. It is hard to say exactly what role local intolerance of his
sexual preferences might have played in the insulting abridgement of
personal rights Mr. Houston has suffered through, but it would explain
the shocking manner in which his prosecution was carried out.
The story above is based solely on the interview with Mr. Houston.
Clearly there are some areas in which it would be useful to know the
other side of the story. Nonetheless, we can make some useful
observations looking at things just from his side of the cell bars.
First, here is a sysop in jail for running an adult bulletin board.
For those who refused caution up to now for lack of evidence that
people are getting in trouble: here is your evidence. Take note that
Houston was not convicted of having any obscene or child pornography
materials on his BBS. Those carrying such materials could end up in
hotter water than he did if they are ever exposed to the court
Second, sysops reading this may be comforting themselves that the
exact freakish course of events Houston suffered through will not
likely be repeated. However, Houston's case is also illustrative of
the way things can break down and land you in a heap of trouble. In
his case, canning a lazy employee ended up landing him in jail,
convicted of being a sleazy, child-molesting BBS sysop. Future sysop
convictions, whenever and wherever they occur, can easily follow
similarly tortuous paths from precipitating cause to miserable result.
Those who think they are clever enough to stay out of trouble while
running a hardcore porn board may see their whole scheme unravel due
to one forgotten loose end.
Third, Houston's situation provides yet another example of the
institutional amnesia still inflicting far too many law enforcement
authorities and agents: they forget all about the Constitution,
especially the First Amendment, when they seize a BBS. Houston's BBS
was not adjudged to have any illegal materials falling outside the
First Amendment's protection of freedom of speech and of the press.
His conviction, contrived though it may have been, was only for
certain conduct. Yet his BBS was taken down, and likely will never be
resurrected, at least in Georgia.
There is a danger of reading too much into what happened to Robert
Houston (except for sysops knowingly running hardcore porn boards, who
should pay very careful attention to his plight). His peculiar
treatment at the hands of the Douglas County legal system does not
mean that all BBS' have suddenly become unsafe. Running a BBS carries
about the same risk as it always has. If you are reasonable in how you
run your BBS, and don't knowingly get involved with anything illegal,
your chances of legal trouble are next to nothing. Think of Robert
Houston as a sysop who tried very hard to be careful while running a
BBS with contents that were riskier than average, and one day got hit
Just as this column was being readied for submission, WNBC's "News at
Eleven" showed the first installment of a news series to be aired all
week called "Software: Hard Porn." This astonishing piece of
television journalism starts off with a surveillance film showing two
men on a couch discussing a snuff movie they'd like to make using a
little kid. The narrator's voice-over informs us that this time, the
snuff guys are talking about procuring their dispensable prey using a
computer bulletin board . . .
The segment segues into much milder territory, next featuring the
talking head of Bruce Fancher of MindVox (a NYC Unix-based BBS system
and Internet access site) discussing the easy availability of adult
GIF image files on BBS'. Several shots of files supposedly taken from
BBS' are shown, mostly just girlie pictures almost too tame for
Playboy. Surprisingly, the voice-over informs us that such pictures
are all quite legal. They are legal, of course. The surprising part is
that the TV folks got it right.
But don't relax yet. In the very next breath, we are told that the
same BBS' carrying the adult image files also play host to pedophiles,
who seek out youngsters and attempt to arrange illicit meetings for
sexual purposes. Through the magic of TV sequencing, those cute
girlie shots are instantly converted from admittedly protected free
speech to cheesecake posters on the walls of dens of sin inhabited by
sleazy, lecherous old men. The dens of sin, of course, are the BBS' in
which they prowl.
So ends the first short episode of "Software: Hard Porn", with the
promise of more rating-boosting tidbits about the sleazy world of BBS'
in tomorrow's news report.
This is a good postscript to the Houston piece. It shows that not only
did someone with an adult board get nailed, but the anti-BBS porn
drumbeat is steadily swelling in the public consciousness. This is not
the first news show covering the BBS porn angle. Last year, WOR in New
York ran a story with a similar theme. But as Howard Stern likes to
remind his listeners (after his show on WOR ended), no one watches
WOR, while WNBC is one of the real TV stations in the New York market.
Those who are committed to running hard core porn BBS' should watch
(Copyright 1993, Lance Rose)
[Lance Rose is an attorney practicing high-tech, computer and
intellectual property law in Montclair New Jersey, and is available on
the Internet at firstname.lastname@example.org and on CompuServe at 72230,2044.
He works with shareware publishers, software authors, system
operators, technology buyers, interactive media developers, on-line
database services and others in the high technology area. He is also
author of the book SYSLAW, a legal guide for bulletin board system
operators, available from PC Information Group (800)321-8285. -
Date: 16 Apr 93 21:55:03 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 5--Phone Fraud in the Telecom Industry
Information Week (4/12/93 pg 68) cites an article that appeared in the
San Francisco Chronicle (4/7/93 pg D1)... Of the nations 700 largest
telecommunications customers, 70% reported toll fraud losses that
averaged $125,000 in the past five years.
The April 12, 1993 edition of Information Week has a cover story on
'network insecurity'. Refer to "Are Your Networks Secure?" (pgs 30 -
35) for the full details. One amusing quote from an unnamed security
analyst..."Companies would rather admit their CEO is an alcoholic
than acknowledge a security break."
Webster's Adds Nerdspeak
The next edition of Merriam-Webster's Collegiate Dictionary, due out
May 3, 1993, will add several computer-related words. The company
says these words have become common enough that people outside of the
computer industry may need to look up their meaning. Some of the words
added include "computerphobe", "technobabble", "vaporware", and
(Information Week. April 12, 1993 pg 60)
End of Computer Underground Digest #5.30