Computer underground Digest Wed Nov 30, 1994 Volume 6 : Issue 101 ISSN 1004-042X Editors:
Computer underground Digest Wed Nov 30, 1994 Volume 6 : Issue 101
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Fruit-loop editor: Carnegie Melon
CONTENTS, #6.101 (Wed, Nov 30, 1994)
File 1--Holocaust revisionism goes up in flame wars
File 2--Addition to alt.revisionism story
File 3--USSC Rules "Defendants must Know" in Child Porn Cases
File 4--Law, Science and Society Conference
File 5--CPSR Discounted Membership
File 6--CU in the News
File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)
File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
Date: Mon, 14 Nov 1994 00:01:47 -0500
From: eye@INTERLOG.COM(eye WEEKLY)
Subject: File 1--Holocaust revisionism goes up in flame wars
eye WEEKLY November 10 1994
Toronto's arts newspaper .....free every Thursday
Holocaust revisionism goes up in flame wars
It was 56 years ago today that Germans awoke to find the Nazis had
spent the night terrorizing Jews and destroying property in something
called "Crystal Night." It was a test-run pogrom for the Holocaust to
Once upon a time, net.news (the Internet's public discussion forums)
was swamped with flame wars about the Holocaust. They'd be found
anywhere -- in newsgroups like alt.conspiracy, soc.history,
soc.culture.canada, misc.headlines, alt.individualism etc.
One of the most persistent Nazi-apologists, Dan Gannon
(firstname.lastname@example.org), wildly spammed Holocaust-denying material,
either not understanding or not caring about netiquette -- that is, you
post appropriate material to appropriate groups. Thousands, from dozens
of newsgroups, complained. Gannon's posts were bad enough, but they
always brought rebuttal and endlessly repeated arguments.
Today, most of these debates are found in one newsgroup:
alt.revisionism -- dedicated to discussing "Holocaust revisionism," the
claim that the Nazi extermination of Jews and other distinct peoples is
a "hoax" exacted upon millions of unwary non-Jews.
Anti-racist and anti-fascist online activists continue to track Gannon
and his pals around the 9,000-odd newsgroups. One such hunter is
Canada's Ken McVay (email@example.com). McVay, 53, came to
Canada in 1967 from the U.S. and is now a Canadian citizen (holds dual
citizenship). He's Canada's foremost online anti-revisionist warrior.
I've been reading his stuff for years.
"When I first got started on this, everyone was sort of out there on
their own," McVay told eye in a phone interview from his Vancouver
Island home. "Almost by accident, working groups started coordinating
their efforts." McVay works closely with Danny Keren (firstname.lastname@example.org)
and Jamie McCarthy (email@example.com), among others.
The goal is not censorship. "I am absolutely, unequivocally opposed to
any kind of censorship," McVay says.
This is a real shift in McVay's thinking. I vividly recall reading
McVay his posts from about two years ago, where he'd vehemently defend
Canadian anti-hate speech laws.
"I don't anymore. I think it's the biggest possible mistake." What
changed his mind? "Dealing with these guys on a daily basis for over
two years. Seeing how easy it is to shoot them down. And it is. The
most intellectual among them are stupid and completely inept when it
comes to historical research. And, of course, they are liars. That
being the case, why on Earth would anyone want to shut them up or force
them underground? I want to know who I'm dealing with. I want to know
where they are. And I want to know how their minds work."
To see their true colors, McVay and compatriots badger and prod
revisionists until they drop the scholarly pretense by, say, calling
McVay a "Jew-lover" or complaining Hitler unfortunately missed the
parents of some Jewish netter. It happens regularly.
"These online discussions are not aimed at getting Gannon and his pals
to change their minds," McVay says. "That ain't gonna happen. It's to
reach the rest - - such as the new users that pop up every September in
universities and stumble on this stuff. Many don't know how Nazis
operate. Most racists don't go around with a little patch on their
shoulder proclaiming: `I hate Jews, or blacks, or natives.' But it's
there. We work to bring it out in the open."
A.R. AS TESTING GROUND
McVay and company are working on putting together a book, a primer on
Holocaust-denial techniques. (He hasn't approached a publisher yet.)
You often see the results of this ongoing research in alt.revisionism .
McVay chuckles about having rabid anti-Semites ever at hand to help
"We throw out a chapter when we think it's done, content-wise. If the
revisionists ignore it completely, then we know it's finished. If they
respond, we say, `Ah! We missed that trick, calling a maple tree a
Porsche.' So we add that argument in." A month later, they upload the
McVay says the "classic" revisionist tactic is misrepresentation of
text. Outright lies.
"They'll cite a historical text: `K.K. Campbell says on page 82 of his
famous book that nobody died at Auschwitz.' Then you go to the Library
of Congress and look up K.K. Campbell, page 82, and what you find he
really said was, `It was a nice day at Dachau.' They get away with this
because they know goddamn well most people don't have time to rush off
to the Library of Congress. But people read that and say to themselves,
`Who would lie about such a thing when it's so easy to prove them
wrong? They must be telling the truth.' "
The years of refutation have resulted in anti-revisionists transcribing
mass amounts of death camp evidence and testimony into computer text
files. McVay saved them. Soon netters requested the material. It began
to take up so much time, he automated the process. You send an email
request, the computer sends you back the file(s).
The archive is now maybe 60 megs and may swell to over a gig in 1995.
Write email to ADDRESS TK with the message GET HOLOCAUST/INDEX --
you'll be sent a huge index of Holocaust files (other files, too, on
fascist racist-right groups). If you like the convenience of gopher,
check out jerusalem1.datasrv.co.il .
Revisionists often assert McVay secretly gets operating funds from
"I don't," McVay says. "The hard-drives are spread out on a table with
a Canadian Tire fan blowing right at them. I can't afford to replace
things, if it breaks, it's gone. However, I'm upfront -- if I get
support money, I'll take it, Jewish or not. The fact that a Jewish
organization would offer several grand to help wouldn't change the
value of the historical data." He'd like to put it all on CD-ROM.
"The Internet has to be a revisionist's worst communications
nightmare," McVay says. "They can't ignore it, because, as you and I
know, in 10-15 years everyone in North America is going to read stuff
through the Internet.
"And that's the beauty of the Internet: once it's refuted in an honest
and academic fashion, you can't run away from it," McVay says.
When the latest revisionist recruit charges in with the same old
pamphlets, it's almost effortless for anyone to request a file and
reply: "We covered this two years ago. Here is the massive refutation
of that so-called scholarly report."
It's there. For everyone. Forever.
Retransmit freely in cyberspace Author holds standard copyright
Full issues of eye in archive gopher://interlog.com
Coupla Mailing lists available http://www.interlog.com/eye
firstname.lastname@example.org "Break the Gutenberg Lock..." 416-971-8421
From: eye@INTERLOG.COM(eye WEEKLY)
Subject: File 2--Addition to alt.revisionism story
Date: Sun, 20 Nov 1994 00:10:25 -0500
eye WEEKLY November 17 1994
Toronto's arts newspaper .....free every Thursday
RANKING THE ALT.REVISIONISTS
Last week, eye Net focused on Ken McVay, battle-hardened
anti-revisionist warrior against net.Nazis and holocaust deniers alike
who cruise the net.
McVay and cohorts endeavor to demonstrate that under every single
Holocaust denier you find an anti-Semite/racist/fascist -- no matter
how "scholarly" a front may be presented.
Newsgroup alt.revisionism has housed a changing cast of Holocaust
deniers over the years. To help guide the newcomer through the raging
flame wars, eye presents the current crew rated for denial motivations
and cyberspace posting style.
eye surveyed two dozen contributors who wage war with Holocaust deniers
on a regular or semi-regular basis. While some polled were inclined to
just give all revisionists 1 in smarts, it was understood this wouldn't
be very useful to newcomers. More importantly, if all rated 1, then
it's impossible to measure the intelligence of Tim McCarthy.
This chart will be posted permanently in eye's online Web site --
http://www.interlog.com/eye/Misc/Alt.revisionism/Rev.html . The chart
can be updated, ratings recalculated, as new net.nazis and kin wander
in. Useful tool for a.r newcomers.
(McVay suggests eye add a new category -- the BSI or Berg Spittle
Index. Using Friedrich Berg as a perfect 10 in spluttering vitriol, he
says Gannon would come in at 9.9 and Hoffman at 7.5. These are, of
course, but the most preliminary of ratings...)
TOP TEN NET.HOLOCAUST-DENIERS
| A | B | C | D || E | F | G | H |
Friedrich Berg | 7 | 9 | 9 | 9 || 5 | 7 | 3 | 5 |
Dan Gannon | 7 | 8 | 7 | 9 || 2 | 4 | 4 | 3 |
Michael A Hoffman | 7 | 8 | 8 | 8 || 4 | 4 | 4 | 3 |
Milton Kleim | 9 | 9 |10a| 9 || 4 | 7 | 3 | 2 |
Tim McCarthy | 9 | 9 | 8 |10 || 1b| 3 | 1 | 1 |
? | 7 | 8 | 8 | 9 || 2 | 3 | 2 | 1 |
Greg Raven | 4 | 5 | 5 | 5 || 5 | 8 | 8 | 4 |
Rick Savage | 9 |10 | 8 | 9 || 2 | 2 | 2 | 1 |
Bradley R. Smith | 5 | 5 | 5 | 5 || 6 | 7 | 7 | 4 |
Ross Vicksell | 3 | 4 | 5 | 5 || 6 | 7 | 8 | 3 |
Ratings are from 1-10 --10 high. (All rounded to nearest whole number.)
A = RACISM (10 = Christian Identity; 1 = indifferent)
B = ANTI-SEMITISM (10 = pure visceral hate; 1 = dispassionate)
C = FASCISM/NAZISM (10 = Sieg Heil; 1 = politically clueless)
D = CONSPIRACISM (10 = "I have PROOF Jew-controlled Robot
Icebergs sank the Titanic!!!!!!"; 1 = ya right, like any of them
E = INTELLIGENCE (10 = snort, as if; 1 = "Bend over?! Jawohl, Mein
F = COMPOSITION (10 = properly formatted paragraphs; 1 = forget
computers, yet to master holding pencil)
G = CIVILITY (10 = courteous; 1 = "FUKKK YOUU JOOOO!!!!111")
H = ACADEMIC RESOURCES (10 = constant citations; 1 = "My dad told
me that ...")
a = Kleim rated 10 from all respondents; only one to achieve a perfect
score in any category.
b = McCarthy only person to receive several ZERO ratings for
intelligence; these registered as 1 in computation.
KILL (FILE) THE NAZIS
Deborah Lipstadt argues in her recent book Denying The Holocaust
(Penguin, $13.99, paper) that anti-revisionists should not just yell,
but should refute revisionists --and then ridicule will issue forth
from that. This is particularly relevant to cyberspace, which has no
Netters who simply don't wanna see net.Nazi shit can use the all-
important kill files. You'll find a copy of the Kill File FAQ
(Frequently Asked Questions) in eye archives to help explain to you how
to use them. (Use gopher or Web and look in eye's Miscellaneous
A kill file "tells" your news reader (the software that organizes all
those net.news/Usenet posts) to filter out specific articles. You can
kill all posts coming from a particular person, or a particular site,
or on a particular subject.
To help you ascertain which net.personalities are common kill file
bait, eye introduces its series of KILL FILE TRADING CARDS! Instant
collector's item! Trade with friends! Collect the set!
Retransmit freely in cyberspace Author holds standard copyright
Issues of eye in archive gopher://interlog.com
Coupla Mailing lists available http://www.interlog.com/eye
email@example.com "Break the Gutenberg Lock..." 416-971-8421
Date: Wed, 30 Nov 1994 18:22:43 PST
Subject: File 3--USSC Rules "Defendants must Know" in Child Porn Cases
((MODERATORS' Note: The following USSC decision should make sysops
breathe a bit easier, because it requires that prosecutors show that
defendants in "child pornography" cases know that the subjects are
Source: Chicago Tribune, Nov 30 1994 (p. 10)
CHILD PORNOGRAPHY LAW UPHELD
IN 7-2 RULING, SUPREME COURT EDITS INEXACT PHRASING
The Supreme Court salvaged the federal law against child
pornography Tuesday by editing it to make clear that the government
must prove that a defendant knew that the performers in sexually
explicit photographs or films were under the age of 18.
Congress almost certainly intended to include a knowledge
requirement even though "the most natural grammatical reading" of the
densely written law does not find one, Chief Justice William
Rehnquist said in a 7-2 decision. The chief justice said that when
Congress wrote the law in 1977 and amended it in 1984, it was aware of
((The story notes that USSC precedents have held that
obscenity laws are unconstitutional unless they require
proof that defendants know the nature of the material.
Justice Scalia, joined by Justice Thomas, dissented)).
The decision overturned a 1992 ruling by a federal appeals court in
San Francisco, which had declared the law, the Protection of Children
Against Sexual Exploitation Act, unconstitutional on its face because
it omitted a knowledge requirement.
The statute's linguistic problem is the placement of the word
"knowingly." The law provides that anyone who "knowingly transports or
ships" or who "knowingly receives or distributes" visual depictions of
a minor engaged in sexually explicit conduct has committed a federal
Taken literally, the law requires only that the transporting,
shipping, receiving or distributing be intentional, without reference
to the sexually explicit contents or to the age of the performers.
((Rehnquist noted that a literal interpretation of the law
would produce off, even absurd results)):
Among the examples he gave of innocent violators of the law's
literal meaning was "a retail druggist who returns an uninspected roll
of developed film to a customer" and who thereby "knowingly
distributes" a "visual depiction" that might turn out to show children
engaged in sexually explicit conduct.
Date: Wed, 30 Nov 1994 12:26:44 -0600
From: Stephen Smith
Subject: File 4--Law, Science and Society Conference
LAW, SCIENCE AND SOCIETY
the 11th annual higher education conference
sponsored by the
American Bar Associaton
Commission on College and University Legal Studies
WHERE: Detroit, Michigan
[at The Atheneum Suite Hotel, a new hotel located in the
revitalized Greektown area of Detroit, near Renaissance
WHEN: April 28-30, 1995 (Friday - Sunday)
THEMES: The conference will explore a variety of relationships
between law and science, including law's contribution to
medical and ethical debates (e.g., reproduction, death and
dying, genetics), the role of scientific and forensic
evidence in the courtroom, environmental regulation, law
and psychiatry, and the impact of technology on legal
concepts and ideas of justice. Workshops will provide an
opportunity to discuss curriculum, teaching, and learning
within the context of law/science perspectives.
WHO: This is an invitational conference. We seek a diverse
group of about 75 faculty and other educators from the
social sciences, humanities, and professional fields --
e.g., philosophy, sociology, history, political science,
psychology, mental health, criminal justice, law, medicine,
nursing and the health sciences, etc.
COSTS: The ABA will pay for two nights of lodging at the Hotel for
40 invitees. As many as 30 additional applicants will be
invited without a lodging subsidy. Preference for
subsidies will be given to faculty whose interests bear
most directly upon conference themes and who have not
previously been subsidized at a Commission conference. A
$75 registration fee ($40 for commuters) includes a
complete set of conference materials, receptions, and group
TO APPLY: College and university faculty, deans, and organization-
based educators wishing to apply should send a c.v. and a
cover letter describing their interests by January 31, 1995
to: John Ryan, ABA Commission on College & University Legal
Studies, 541 N. Fairbanks Ct., Chicago, IL 60611-3314;
fax: 312/988-5032; or email: firstname.lastname@example.org
Please direct any questions or applications to this conference to the
email@example.com address, not the mailing list. Thanks.
American Bar Asssociation, Commission on College and University Legal Studies
541 N. Fairbanks Court, Chicago, IL 60611-3314; 312/988-5736
firstname.lastname@example.org (work); email@example.com (home)
Date: Thu, 10 Nov 1994 13:40:47 -0800
From: email list server
Subject: File 5--CPSR Discounted Membership
Second in a series of clever come-ons to entice you to join CPSR
Take advantage of this SPECIAL OFFER. Join before Janurary 1st.
Approved for distribution by The Cyberian Winds... Feel free!
COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
As you know, CPSR is an organization that is dedicated to understanding
and influencing the implications of computer technology. We have
devised a short test below (estimated time to complete: 19.3 seconds) to
help you determine (in the privacy of your own home) whether you have
what it takes to join this effort.
If you choose the *correct* answer for all four true / false statements
below, then you are eligible to join CPSR! It's that EASY!
Simply answer T (for True) or False (for False) for each
1. It is important for citizens to become involved in the development
of the "Information Superhighway" to ensure that it addresses
educational and other critical needs.
2. Privacy considerations might be overlooked in the next-generation
computing systems if organizations like CPSR aren't especially
3. I am concerned that the "Information Superhighway" might become an
"Information Supertollway" - a shopping mall rather than a public
commons. I'm concerned about first amendment rights in cyberspace!
4. I would like to help support Computer Professionals for Social
Responsibility and help support the development of democratic
and responsible technology.
[If you answered T to all four questions, you are eligible to join CPSR!]
CPSR Isn't Just for Computer Scientists!
CPSR was started in 1981 by computer scientists and, to this day, has
many computer scientists within its ranks. At that time, CPSR's
mission - that of informing the people as to the risks of using
computers in automated nuclear weapons systems - was quite complex.
Times have changed considerably since 1981. Computers are much more
prevalent. Also as computing technology becomes more an integral part
of modern life, the voice of the computer scientist - although
important - becomes one voice among many others that needs to enter
into the discussion on the future of computing technology.
While computers offer great opportunities for enhanced communication
with community and civic networks, they also offer grave threats.
Computers allow privacy violations to occur virtually unchecked
as transfer of personal information can occur almost instantaneously.
Prospects of the Clipper Chip, National ID cards, and unchecked
collecting and sharing of millions of K-12 records are looming
omininously in the future unless we act now to prevent them.
Today, in 1994, with computers playing vital roles in virtually all
areas of society, it is important that educators, students, librarians,
policy makers, engineers, social workers, activists, and business
people, among many others with important viewpoints participate in
these vital discussions. For that reason we are currently making a
special effort to introduce all of these groups to CPSR.
*********** SPECIAL DISCOUNT ON FIRST TIME MEMBERSHIPS **************
To help people participate, We are lowering our membership fees by $10
for both our regular and and our contributing membership categories
(first time members only please) for the remainder of 1994! Take
advantage of this special offer today and join the discussion!
If your interest is the National Information Infrastructure, privacy,
civil liberties, national identification cards, privacy of student
records, community networking, computers in the workplace, or any
number of important issues, please consider joining us.
******************** CPSR Membership Form *************************
Here are my membership dues to help support Computer Professionals for
Social Responsibility and bring the message of socially responsible
computing to the profession, policymakers, and the public.
Home phone _____________________ Work phone ______________________
Company / Institution ________________________________________________
Type of work ______________________________________________________
E-mail address _____________________________________________________
__ Acadiana __ Austin __ Berkeley
__ Boston __ Chicago __ Denver/Boulder
__ Los Angeles __ Loyola/New Orleans
__ Madison __ Maine __ Milwaukee
__ Minnesota __ New Haven __ New York
__ Palo Alto __ Philadelphia __ Pittsburgh
__ Portland __ San Diego __ Santa Cruz
__ Seattle __ Washington, DC __ No chapter in my area
CPSR Membership Categories
[Note SPECIAL Discounts!]
>From now until the end of 1994, CPSR is offering a $10.00 DISCOUNT
on their Regular and Basic membership levels for new members.
__ $ 20 Student/Low income membership
WAS $50 Now just ==>> __$40 (for first time members)
WAS $75 Now just ==>> __$65 (for first time members) (receive a mousepad)
__ $200 Supporting membership (receive totebag)
__ $500 Sponsoring membership (receive mousepad and totebag)
__ $1000 Lifetime membership (receive book, totebag, and mousepad)
__ Electronic Funds Transfer Membership $__ per month
Please consider a donation to help expand the CPSR program.
__ $50 __ $75 __ $100 __ $250 __ $500 __ $1000 __ Other
Total Enclosed: $ ________
__ National Information Infrastructure
__ Privacy & Civil Liberties __ Participatory Design
__ Working in Industry __ Community Networks
__ Social Action __ Weapons & Peace
__ Intellectual Property __ Computer & Environment
__ Education __ Workplace
__ International __ K-12 Student Privacy
Please make check out to CPSR.
Mail form with check to: CPSR, P.O. Box 717, Palo Alto, CA 94302-9917
We welcome comments that you have about the CPSR Program.
Privacy Notice. The CPSR membership database is never sold, rented,
loaned, exchanged, or put to use for anything other than official CPSR
activity. CPSR may elect to send members mailings with information from
other groups, but the mailings will always originate with CPSR.
**************** JOIN CPSR'S ELECTRONIC MAILING LIST **************
Placing yourself on CPSR's list server gives you access to a
library of materials dealing with CPSR issues and CPSR
documents. It is accessible via Internet and anyone can join.
To subscribe, send email to:
Your message needs to contain only one line:
You will get a return message that confirms your subscription.
The message also explains how to use the list server to request
materials and how to use the index of CPSR's archives.
If you have a problem with the list server, please contact
CPSR also maintains a number of email lists that focus on
various issues and projects. To find out what email lists are
available and how to join them, send an email containing the
message LIST to firstname.lastname@example.org
You can also request assistance by using the HELP command. If
you have trouble contact email@example.com
We hope you enjoy this new service.
If you didn't answer correctly, please feel free to study the materials
and try again. Good luck!
Date: 30 Nov 94 15:44:29 EST
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 6--CU in the News
Online Libel Lawsuits
ComputerWorld reports that the flame wars of the electronic frontier
have finally spilled over into the courts. Prodigy has been sued for
$200 million over a message that called a stock offering a criminal
fraud. There is speculation that Prodigy's zealous control of its
message boards, especially in terms of obscenity and topic control,
may result in the company being held to a standard higher than
services who don't so tightly monitor user activity. The article also
discusses Kodak's policy of not allowing employees to post on
discussion groups when using a Kodak address.
(ComputerWorld. Nov. 21, 1994 pg 1+)
Sounding Off about Business Use of Internet
Two cogent and articulate writers "sound off" about the
commercialization of the 'net in the Nov. 21, 1994 issue of
ComputerWorld. One writer is a researcher/academic, the other a
business consultant. Their arguments have been heard before, but
having both side-by-side makes for a though-provoking piece.
(ComputerWorld. Nov. 21, 1994. pg 116+)
Cyberspace and The Law reviewed
Datamation offers a short blurb about _Cyberspace and The Law: Your
Rights and Duties in the Online World_. The reviewer found it to be a
"well-written, well-organized primer meant for people who have more
experience with he Internet then with the law." The book is by Edward
Carvazos and Gavino Morin, MIT Press.
(Datamation. Nov. 15, 1994 pg 100)
Date: Wed, 30 Nov 1994 18:19:20 PST
Subject: File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)
((MODERATORS' Comment: File this one under "another clueless reporter
discovers the Internet." The opening paragraph says it all. We invite
Privacy under siege in the heart of the Internet
By Nathaniel Sheppard Jr. Tribune Staff Writer
Source: The Chicago Tribune, Nov. 30, '94 (p. 1, 12)
WASHINGTON--They're terrorists with names such as the Legion of Doom
and Masters of Deception. But unlike the Red Guard or Symbionese
Liberation Army of a previous era, their weapon of choice is a
keyboard, not an assault rifle.
They're among the subversives launching sporadic attacks on the
information superhighway and raising troubling questions about
security and privacy for individuals, corporations and federal law
((The article notes that electronic invaders compromised
passwords, stole data, and are increasingly able to monitor
Perhaps most alarming are the attacks against Internet, a global grid
of computer networks, and the widespread distribution over the
internet of intrusion tool kits, the hacker's equivalent of the
burglar's black bag. The tool kits contain "sniffer" programs that
attach themselves to the hub of computer networks and copy user
passwords and other log-in data.
((The story quotes a computer security expert, Earl Boebert
in Roseville, Minn, as saying that there's a convergence of
traditional areas of concern--protecing individuals' personal
data from organizations and protecting intellectual property
from theft, and some individuals are going after organizatins
that keep personal data records. The story notes that sniffer
programs are used by intruders, and recent targets this year
A Defense Department spokeswoman said intruders captured the
identification codes of about 100,000 users and were able to "steal,
alter or erase information on the affected computers and to shut
computers down or alter them in such a way as to allow further
undetected access to the compromised systems."
"Attacks on the infrastructure are becoming increasingly more
significant," said Barbara Fraser, manager of product development for
the Computer Emergency Response Team, a federally funded project based
at Carnegie Mellon University in Pittsburgh that helps computer users
cope with intrusion problems.
The agency was set up in 1988 after a young hacker named Robert Morris
Jr. introduced a "worm" into Internet, compromising an estimated
6,000 "host" or primary systems.
((Cert handled more than 1,300 incidents last year, the story
says. It alludes to the MCI calling card scheme, and repeats
the questionable facts reported by earlier media sources))
The incidents are part of a rash of attacks by underground groups of
hackers with names such as the Legion of Doom, groups made up largely
of college students.
Crackers, as the more malevolent hackers are called, have become very
sophisticated. They focus their attacks on known weaknesses in systems
or probe for back doors, said Scott Charney, director of the Justice
Department's computer crimes unit.
"Cases involving the Legion of Doom and the Masters of Deception
really went to the heart of the system," he said.
The legion is a group of about 20 hackers spread around the country.
Beginning in 1987 three members of the group in Atlanta used pilfered
passwords and old identification cards to gain access to computers at
BellSouth, the regional phone company serving southeastern states.
The three men, who subsequently pleaded guilty to computer fraud
charges, eavesdropped on telephone conversations, re-routed calls, and
are believed by authorities to have planted electronic messages in
telephone facilities in Atlanta, Denver and New Jersey that could have
knocked out 911 emergency and long distance service.
In July 1992, members of a rival group of crackers, the Masters of
Deception, allegedly broke into computers at BellSouth, TRW
Information Services, Timenet, Nynex and other data carriers and stole
credit reports and other confidential information that was sold to
The increase in attacks may be in part due to the proliferation of
intrusion kits, Fraser said. "Tool kits for intruding on systems are
being posted to bulletin boards all over the world," he said. "This
allows even novices to enter network systems."
((The article notes that electronic theft of software is also
increasing. It gives the exaple of TIE Fighter, based on Star
Wars movies, that an employee made available to "software
pirates" two weeks before the scheduled release. The article
notes that some companies are hiring ex-hackers for security
advice. The article also finds great significance in the "finger"
command on Unix as a means of aiding to stalking or harassment of
Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators
Subject: File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +126.96.36.199.77 (ringdown)
UNITED STATES: etext.archive.umich.edu (188.8.131.52) in /pub/CuD/
ftp.eff.org (184.108.40.206) in /pub/Publications/CuD/
aql.gatech.edu (220.127.116.11) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
End of Computer Underground Digest #6.101
E-Mail Fredric L. Rice / The Skeptic Tank