Computer underground Digest wed Nov 1, 1995 Volume 7 : Issue 86 ISSN 1004-042X Editors: Ji

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest wed Nov 1, 1995 Volume 7 : Issue 86 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: CONTENTS, #7.86 (Wed, Nov 1, 1995) File 1--CyberAngels FAQ file File 2--Re: Attention Spammer: The War Has Started File 3--Scientology Attacks Carnegie Mellon University File 4--Head of the French hackers group was a secret service agent... File 5--Cu Digest Header Info (unchanged since 18 Oct, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Mon, 30 Oct 1995 11:54:48 -0600 From: bladex@BGA.COM(David Smith) Subject: 1--CyberAngels FAQ file CYBERANGELS: FAQ The Guardian Angels "CyberAngels" project is an all-volunteer Internet patrol and monitoring project started by senior members of the world famous "International Alliance of Guardian Angels", whose HQ is in New York City. We are a worldwide informal group of volunteers, whose mission is to be a Cyberspace "Neighborhood Watch". THE INTERNET IS OUR NEIGHBORHOOD - LET'S LOOK AFTER IT! 1) How did the CyberAngels project start? The Cyberangels project was born in June 1995, after a discussion between senior Guardian Angels about the apparent lawlessness of the Internet world CyberCity. Guardian Angels leaders on the West Coast of the USA (Los Angeles and San Francisco) had been online for the previous 2 years, and when Guardian Angels Founder and President Curtis Sliwa himself went online in New York City and got his email address, we began a serious discussion about CyberCrime and how the Guardian Angels might respond to it. Curtis Sliwa has a daily talk radio show on WABC in the New York state area. Once he had an email address, he made the announcement over the radio, and his email box immediately started to receive letters telling stories of online harassment (stalking), hate mail, pedophiles trying to seduce children in live chat areas, and complaints from worried parents about the easy access their children had to hard core pornographic images. Realizing that there was a big issue at stake here, Curtis began discussing the Internet issues on his talk show, and as the debate raged daily, and the letters kept pouring in, we realized that perhaps we were being asked to DO SOMETHING. We sat down and discussed what we the Guardian Angels could do to help reassure parents and to make the Net a safer place for kids and others. The answer was simple - we should do what we do in the streets. The Internet is like a vast city: there are some rough neighborhoods in it, including "red light" areas. Why not patrol the Internet, particularly in these "rough neighborhoods" just like a Neighborhood Watch? Just like our own Guardian Angels Community Safety Patrols. And why not recruit our volunteers from the very people who inhabited this vast world CyberCity? Who better than to cruise the Net watching out for people's safety than members of the Internet community themselves? After all, who else could do it? Never an organization to blame it on, or leave it to the government, we decided to do something ourselves. So the CyberAngels program was set up - an all volunteer team, providing a CyberSpace Community Safety Patrol and an Internet monitoring service. Current CyberAngels Chief Coordinator is Colin "Gabriel" Hatcher. 2) What is the purpose of the CyberAngels project? The purpose of the project is a) To promote and protect the idea that the same laws of decency and respect for others that apply in our streets should apply also to the Internet. b) To protect our children from online abuse. c) To pressurize service providers to enforce their Terms of Service. d) To give advice and assistance to victims of hate mail, harassment and sexual abuse online. e) To watch out for users violating terms of service by committing cybercrimes and to report them to relevant authorities (Sysadmins, or even Police). f) To help to make unnecessary Government legislation by showing Government that the World Net Community takes the safety of our children and the well being of all its members seriously. 3) How does the project work? Volunteers send their information to Gabriel at and we send them a copy of our FAQ. Each volunteer volunteers to spend a minimum of 2 hours per week cruising the Net and looking for places where they believe there may be unacceptable activity. It is up to each member where they go and what they look for, although sometimes we may send a bulletin to all members advising them to search a particular area. If a volunteer finds criminal activity on the Net, GANetWatch functions as a clearing house for information. We do encourage members to report violations themselves, but we ask that copies of all actions taken are forwarded to us. Members may choose instead to simply report the problem to us and leave it to our more experienced members to deal with. We keep our members informed via email, with a regular update on what's going on. 4) Why do we need volunteers? The Internet Community is huge - around 40-50 million people, and growing every day. There are hundreds of new Web sites each week. The more volunteers we have, the more effective we can be. And by giving a little of your time to looking after the welfare of the Net, you can make a real difference! WE NEED MORE VOLUNTEERS! Anyone can be a CyberAngel. The only requirement is that you commit a minimum of 2 hours per week to the project. No previous experience or special skills are necessary...although a computer and an Internet account would be useful! :) JOIN US NOW! LOOK AFTER YOUR CYBERCITY! We are anonymous in cyberspace. Noone cruises with a Cyberangels badge. And we do not encourage our volunteers to identify themselves online. We DO NOT advise our volunteers to challenge cybercriminals directly, neither by arguing in live areas, nor by flaming in emails, nor by counter-postings on message boards / newsgroups. Being a CyberAngel involves no risk or danger. You are volunteering only to be eyes watching the Net. 5) What should volunteers be looking out for? We are searching to uncover and prevent: a) Child abuse and pedophilia; b) The trading in images of child pornography; b) Sexual harassment; c) Hate crimes, including harassment; d) Fraud schemes operating on the Net (particularly credit card fraud); e) Software piracy; f) Computer virus developments; g) Terrorism, bomb-making, weapons trading etc. Activities between consenting adults (providing they are within the law) are not our concern. Searching for the above violations our volunteers are encouraged to visit: a) Live talk sites (Chat Rooms, IRC areas, MUDs etc); b) Kids and Teens sites of all types; c) Message boards, where visitors can leave postings; d) Newsgroups (particularly "alt." newsgroups); e) Any sites providing material / discussions / images / contacts of a sexually explicit nature (there are thousands!) These are unsupervised areas of the Net where children may roam. For example, parts of the World Wide Web are online porno stores with the doors wide open, and with no staff inside. Kids can easily surf by.... The only warning says "Don't come in here if you are under 18". But there is noone there to check what is happening. And naturally enough kids are wandering in and looking at the merchandise. This is not acceptable on the streets of our cities, and yet we are allowing this on the Net. When discovering suspicious or criminal activity, CyberAngels should record the date, time and place and nature of the violation and write down the user's full ID and InterNet address. Mail can be forwarded to, or volunteers may copy and paste information to send. Please follow our advice and DO NOT attempt to challenge cybercriminals directly. Simply report the violations to us at Netwatch, and also to the System Administrators, or Service Providers, of the cybercriminal. Email can usually be sent to "Postmaster@..." or "Sysop@..." or "Sysadmin@...", or find out by writing to/calling the company (the cybercriminal's Service Provider) and asking them who you contact to report a violation. As far as Web Sites are concerned, w e are encouraging parents to use some of the new filtering software, that can screen out chosen areas of the WWW. Organizations like **"Safesurf"** are campaigning for Websites to register as "child friendly", and are on the cutting edge in helping to develop new software for parents to regulate their children's access to the Internet. We fully support Safesurf and are working together with them. Together we believe that CyberAngels and Safesurf will form an irresistible alliance for Good on the Net! 6) How will the project develop? The first stage of our project is to involve volunteers in pressurizing Internet Providers to enforce their terms of service. This involves the accumulation of information and the reporting of violations to Service Providers. The second stage of our project involves the Police. Information about crimes will be passed to the relevant Police authorities, particularly Sex Crime departments and Fraud departments. For the third stage of our project we will have a section on our Web Site where we will be offering rewards for information about various cybercriminals. There will be the equivalent of "Wanted" posters, asking for further information about people who have already been reported to us, and whom we have verified as cybercriminals. 7) Is this a US First Amendment Issue? What about Freedom of Speech? Don't people have a right on the Internet to express their views freely? Are the CyberAngels proposing censorship? CyberAngels support the First Amendment of the US Constitution. We are not trying to abolish free speech, but we believe that freedom of speech should not be exercised if by exercising it you are violating someone else's basic rights. For example I could claim freedom of speech to justify talking sexually and obscenely to a young child - but we all know that that is wrong. This is not a First Amendment issue. Breaking the law takes precedence over "freedom of speech". We are all granted our freedom, but not the freedom to hurt, corrupt, abuse or harass innocent people. The First Amendment was not written to protect pedophiles. No criminal can claim "freedom of expression" to justify a crime. Child pornographers on the Net are criminals and should be brought to justice. 8) The Internet is huge and unregulated. Surely such a project is an impossible task? The fact that the Net is impossible to maintain crime-free is no reason for us to do nothing. Each person does their part. If everyone picked up their own trash, there would be no need for garbage collectors. The same could be said of our streets. We are not naively hoping to eliminate crime from the Net, only to play our part in protecting the innocent majority from the violations of the tiny tiny minority. The Internet Community consists of millions of people. That is millions of potential CyberAngels. TOGETHER WE CAN MAKE A DIFFERENCE! 9) What kinds of changes would the Guardian Angels / CyberAngels like to see? a) We would like to see an improvement in User identification. User ID is impossible to verify or trace back. The very anonymity of Users is itself causing an increase in rudeness, sexual abuse, flaming, and crimes like pedophile activity. We the Net Users must take responsibility for the problem ourselves. One of our demands is for more accountable User IDs on the Net. When people are anonymous they are also free to be criminals. In a riot you see rioters wearing masks to disguise their true identity. The same thing is happening online. We would like to see User ID much more thoroughly checked by Internet Service Providers. b) We would like to see Websites registering as "Child Safe" or "Child Friendly", so that parents can use the new software to restrict children's access. We support Safesurf in their campaign on this issue. c) We would like to see Internet Service Providers enforcing their Terms of Service. d) We would like to see a worldwide blacklist of known cybercriminals, circulated to all Providers and regularly updated, so that these people could be denied access to Internet accounts. e) We would like to see the whole Internet Community united together to protect the Net from all crimes and violations. JOIN US, NOW! ------------------------------ Date: Fri, 27 Oct 95 11:43:28 PDT From: Barry Gold Subject: 2--Re: Attention Spammer: The War Has Started Instead of using the extra-legal methods so heavily hinted-at in Patrick Townson's comments, I think we should look at technological methods to defend ourselves against Spammers. I don't think we can stop them althogether, but we can probably make their life more difficult and get rid of all but two classes: (A) First-time offenders that don't know enough to cover their tracks (B) A very few, really dedicated and net-wise spammers who won't give a damn about the law. Class (A), of course, can be dealt with by traditional methods: e-mail the ISP and get their account cancelled. Class (B) will probably require resort to the law, but I think we can push them to the point where they will have to commit actual crimes in order to get their spam through - which is why only a very few of them will remain. Let me (try to) explain: The latest round of spam (the "Magazine subscription service") came from an obviously forged address. In general, the more experienced spam artists forge the headers of their spam to make themselves harder to track down. (Which means it takes longer before we can get their account cancelled.) So, we make this a little harder: Definitions: "real site": something with an IP address that is up 24-hours a day (more or less, allowing for possible down time due to telecomm problems, software bugs, hardware faults, etc.). To qualify as a "real site", you must be able to ping it and open an SMTP connection to it on the standard port (25). "hop": something that shows up in "received:" headers. Each "hop" therefore causes either one "received: from... by..." header or a single pair of "Received: from" and "Received: by" headers, depending on the mailer daemons involved. Note that this isn't the same as the IP "hop" involved in the "hop count", "time-to-live", etc. fields. Assumption: A legitimate e-mail address is no more than "n" (say 2) hops away from a "real site". If it appears to be further away than that, the probability is that one or more "received:" headers have been forged to conceal the true origin of the message. 1 hop would be even better, because then we can at least verify the site names for every message (see below). 1. Mailing lists: two steps: a) Improve majordomo and listserv to recognize obviously forged headers and dump the messages. This is a simple change. If the supposedly "verified" From: line is non-conforming, trash the message. Some examples include: . more than one "from" address . totally ridiculous site names, especially where the top-level domain (the last one) isn't one of the "standard" three-letter names or a two-letter country code. b) A further improvement involves actually verifying the From: line before sending the message out again. This would be more work, but would make the spammer's job much more difficult. When processing a message, majordomo/listserv should open an SMTP connection to the site shown in the "From:" header. If that can't be done, the Return-Path and/or Received: headers should be parsed to find a system that _can_ be connected to. If the From: site is "real", majordomo/listserv should go further and verify that a RCPT-TO: will be accepted by the smtpd at that site. If it isn't real, at least verify that the next-site in the return-path is acceptable (RCPT-TO: postmaster@site). 2. News: similar two steps a) a daemon that runs periodically and trashes anything in the spool directories that has a bad From: line. b) verify From: lines as above. This might be done when the message is accepted by nntpd (or uucp, for sites that still use it). Or the above daemon might do the verify for each message it scans. Note that step b) can be improved by cacheing site names known to be good and possibly even user names at those sites. So, I can hear you asking, what does all this get us? The spammers will just put "real" site names and real usernames in their "From:" headers, right? Then when the software checks it out, the supposed "From:" site will say "sure, I exist and I've got a user with that name". And the message will be posted/remailed, and the spam will go on. BUT, if we fix things so the spammer can only get a message in with a real username, then those messages will be much closer to "forgeries" in the legal sense: a document issued by person B, and purporting to issue from person A. I'm not a lawyer, so I'm not sure if an ordinary letter qualifies for this purpose (as opposed to a check, deed, contract, etc.) but it sure brings them a lot closer to a prosecutable offense. And if it isn't currently unlawful, I think we can get the legal definition expanded without getting the government into constitutionally questionable areas of regulating free speech. We don't need the govt telling people what's "on-topic" for a given newsgroup or mailing list. No regulation of "commercial" speech in areas dedicated to "non-commercial" use -- and just try getting such a law through a Congress dominated by commercial interests anyway. Just a simple rule that makes it a crime to claim to be someone else. Note that this doesn't outlaw pseudonyms per se. Using an anonymous account, or one where you've used "chfn" or equivalent to change the name to something other than what you use for other purposes, wouldn't be unlawful -- the basic rule still applies: you can use any name you like, as long as the purpose isn't to defraud others. But pretending to be some other _real_ person would be a crime -- if not under current law, then under rules that could be enacted, would be defensible under constitutional challenge, and wouldn't be excessively intrusive in our freedoms on the net. In fact, such a law needn't (and _shouldn't_) mention the network, computers, etc. at all. It would be unlawful to sign someone else's name to a letter sent via snailmail, e-mail, netnews, posted on a supermarket bulletin board, or carved in the bark of a tree (S.K. -heart- J.S.). Of course, this still leaves the dedicated few who don't care about the law, but they will be few and very much on the fringes, _not_ the big companies that we usually worry about. Just as existing rules (and social controls) help keep down the number and intrusiveness of crackers, I think this scheme would keep down the number and volume of the spam artists. So, whatdya think? ------------------------------ Date: Wed, 1 Nov 1995 00:34:11 -0800 (PST) From: Declan McCullagh Subject: 3--Scientology Attacks Carnegie Mellon University Reprinted from FOCUS, vol. 25, no. 1, October 1995, page 4: SCIENTOLOGY ATTACKS CARNEGIE MELLON UNIVERSITY by Declan McCullagh ( A flame-war raging on the Internet over the Church of Scientology's attempts to halt the distribution of its bizarre secret scriptures has spread to Carnegie Mellon University. When SCS senior research scientist Dave Touretzky placed a copy of a Scientology tract on the World Wide Web in August, the church immediately moved to cancel his netnews posts that mentioned the web pages. It also faxed printouts of the pages to CMU's attorneys and threatened a lawsuit over "trade secret violations." The same day, University Attorney Walter DeForest called Touretzky, who agreed to remove the 136-page tract from his web site. "DeForest didn"t know what the legal status was of the court records and copyrighted documents. He was going to research this. In order to spare CMU and myself an unnecessary lawsuit, I voluntarily took the materials down," says Touretzky. Complicating the problem for CMU was the files' origin. Touretzky's web site contained documents that were then available to anyone who walked into the federal court building in Los Angeles. The court documents were later sealed after attorneys for Scientology successfully argued that copyright laws prohibiting unauthorized republication apply to the documents. "This is not an easy area of the law since it combines the Internet with controversial subjects," DeForest says. "It's normal and appropriate for a university to respect copyright -- if it exists. It's consistent with academic freedom." The threats against CMU are the most recent in a series of lawsuits the church has filed against Internet service providers, newspapers, magazines -- and especially against its critics, who argue Scientology is a cult that brainwashes and blackmails its members and harasses defectors and critics. "The Church of Scientology has made a practice of suing people who have been critics of their practices or their tactics. The fact is that these lawsuits are not meritorious," says Mike Godwin, staff counsel for the Electronic Frontier Foundation, an online civil liberties group based in San Francisco. In August the church sued one of its former members for posting anti-church information to the Internet and persuaded a federal judge to permit the seizure of his computer. The church then sued The Washington Post for reporting on the computer seizure and quoting from public court records. Ironically, the court documents were generated by Scientology's previous lawsuit against TIME magazine, which in 1991 ran a cover story calling the church a "thriving cult of greed and power." Despite Scientology's best efforts, its religious teachings remain publicly available on the Internet -- not just because of the efforts of critics and free-speech advocates, but because network users delight in passing around the excerpts, which read like one of Scientology founder L. Ron Hubbard's pulp science fiction novels. Hubbard's scriptures claim that 75 million years ago an evil galactic overlord named Xenu solved the galaxy's overpopulation problem by freezing the excess population and transporting the bodies to Teegeeack, now called Earth. After the hapless travelers were defrosted, they were chained to volcanoes that were blown up by hydrogen bombs. Then, Hubbard writes in Operating Thetan 7: "The Pacific area ones were taken in boxes to Hawaii and the Atlantic area ones to Las Palmas and there "packaged." His name was Xenu. He used renegades." Elsewhere in the scriptures, Hubbard requires church acolytes to go to a park or a zoo "with many types of life and communicate with each of them until you know the communication is received and, if possible, returned." The disembodied spirits of the dead are called "thetans" and supposedly still haunt mankind, but Scientology offers ways to "audit" them away -- for a price. Church members pay tens of thousands of dollars and wait years before they"re "cleared" for this "Operating Thetan" (OT) knowledge. (They"re required to wait this long. The tracts threaten pneumonia if the mentally unprepared read the OT texts.) Now, to the church's dismay, any of the Internet's 35 million users can peruse the most private -- and lucrative -- teachings of Scientology. The band of online dissidents understands this. Many are former church members who became disaffected and left. Some have used a private anti-cult bulletin board system in Colorado to distribute news on the activities of the church. Others have relied on netnews.alt.religion.scientology, a Usenet newsgroup, to disseminate information about Scientology tactics. If alt.religion.scientology is the front line of the war on the Internet, then the newsgroup is the Internet's equivalent of a food fight in a school cafeteria. The attacks on the church flowing through alt.religion.scientology once prompted a church attorney to try and delete the newsgroup from every computer on the Internet via an "rmgroup" control message. That raised the netiquette hackles of many Internet users and escalated the online fight from a small-scale battle into a full-scale war. It's one the church can"t win, says EFF's Godwin. "The church is going to lose. They"re making so many people angry that they"re succeeding in motivating people to become critics," says Godwin. On the WELL, a computer conferencing system in California, Godwin posted: "If the Church wanted the records sealed, it could have sought that. In the meantime, copyright interests do not normally trump the public's right to know the details of court proceedings." Another participant in the discussion, Jerod Pore, wrote that alt.religion.scientology is "the site of the most vicious flame-war on the Net: a flame-war that includes forged cancels of articles, with the forgeries coming from sites such as the Department of Energy, real lawsuits being filed to shut people up, death threats, midnight phone calls and the like." Other net-skirmishes have touched upon Scientology's attempts to censor anti-church netnews posts by deleting them from Usenet servers; the church's threats to sue people who posted the above-quoted lines about communicating with animals at the zoo; the church's attempt to file university disciplinary charges against a California college student; the church's attempt to force Caltech to reveal the identity of one of its alumni users; and the church's attempt to remove the contents of a web page maintained by an MIT user. But perhaps what riled online "netizens" the most was the church's raids on Finland's anonymous remailer and on the Colorado anti-cult bulletin board system. In both cases, the church was able to seize information to protect its "trade secrets" under international law. The secrets in question? Xenu and the galactic conspiracy. On the Internet, thousands of users every day rely on Julf Helsingus' server to communicate anonymously with other users or post to controversial netnews bboards under a numerical pseudonym automatically assigned by his computer. When Scientology and the Finnish police forced Helsingus to reveal the true name of one of his users, his subscribers on the Internet realized how vulnerable their identities were. And more sparks started flying on alt.religion.scientology. Recently, the 41-year-old church has experienced setbacks in its attempts to stifle its critics. Last month, a federal judge in Colorado upheld free speech claims and ordered Scientology to return the computers and files seized from two men who ran an anti-Scientology bulletin board. An ad-hoc group of network users formed and successfully fought the church's attempts to cancel netnews posts. On September 15, the judge in The Washington Post case said she thought the newspaper had acted appropriately in printing the Xenu excerpts and that Scientology had gone too far in snooping through the computer they seized in August. She ordered the church to "immediately return and restore to [the defendant] all seized materials in their exact original condition." The uproar from the church's raids on computers worldwide is why CMU's Touretzky became involved. "I realized there was a great interest in this material and I knew about the forged cancels. I wanted to further an educational purpose in a way that would be protected from vandals," says Touretzky. Even though Touretzky has removed the court records from his site, he maintains a list of their current locations on the Internet. After Scientology threatened an Internet service provider in the Netherlands, Dutch collections of the United States documents sprouted overnight. "Many of the Dutch sites are copies of my site. My site's still up, but with hyperlinks to the Dutch sites," Touretzky says. A member of the Dutch House of Commons has put the materials on his home page, and the materials are popping up elsewhere. Once Xenu is out of the bottle, there's no putting him back. DECLAN MCCULLAGH For more information, look at: on the World Wide Web. [ screen dump of a Netscape display of the 1991 TIME Magazine volcano cover, "The Cult of Greed", showing the URL for the Fishman web site. ] ................ FOCUS -- in seven issues a year -- is a publication of the faculty and staff of Carnegie Mellon University. Many of the articles in FOCUS express the opinions of individual members of the CMU community; unless so indicated, they should not be construed as reflecting university policy. ------------------------------ Date: 28 Oct 1995 18:56:54 GMT From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat) Subject: 4--Head of the French hackers group was a secret service agent... Bonjour, In the October 12th issue of "Intelligence Newsletter", I note the following text that the editor accept to put at the end of this email. Don't hesitate to send me all your comments related at this fact... The _Chaos Digest_ from the CCCF was build in this mission by me! Regards, -- Jean-Bernard Condat 47 rue des Rosiers, 93400 Saint-Ouen, France Phone: +33 141238807, portable phone: +33 07238628 JeanBernard_Condat@eMail.FranceNet.FR ======================================================== A Computer Spy Unmasked For years Jean-Bernard Condat has undoubtedly been France's best-known computer hacker. Appearing on television talk shows, launching provocative operations and attending computer seminars, he founded the Chaos Computer Club France (CCCF) in 1989 as France's answer to the renowned Chaos Computer Club in Germany. French journalist Jean Guisnel revealed this week in a book entitled Guerres dans le Cyberespace, Internet et les Services Secrets (Cyberspace War, Internet and Secret Services) published by the Editions La Decouverte (ISBN 2-7071-2502-4) that Condat has been controlled from the outset by the Direction de la Surveillance du Territoire. A student in Lyons where he followed music and information technology courses, Condat was taken in hand by the local branch of the DST in 1983 after committing some "minor misdemeanor." The DST organized his participation in hacker meetings abroad. Guisnel said that from 1989 onwards "Jean-Luc Delacour, Condat's handler at the DST, decided that his proteg was ready for bigger and better things." He asked Condat to start up CCCF, then worked to promote his public image in order that the largest number of hackers would gravitate towards him. The DST printed hundreds of T-shirts and thousands of post cards for him. When Thomson and Pechiney found that hackers were trying to break into their systems Condat enabled the French counter-espionage service to trace the intruders. When he was taking part in a television program in 1991 in which he was to demonstrate how to hack into a system his handler dictated what he should say in his earphones. Questioned by Intelligence Newsletter, Condat admitted he had worked for the DST over a 52 month period and written up 1,032 reports during that time. He claims, however, that he broke with the DST in 1991 and that he intends to shortly publish an account of what he calls his "turpitude." Whether true or not, Condat worked for several years for the SVP company before leaving it a few months ago to take over a key function: he is now system operator for the France forum on Compuserve. Guisnel cites any number of cases of how "Internet is controlled to the bone" by such measures as turning around hackers, systematically bugging computer networks and manipulating newsgroups. "If no serious company should confide its correspondence to the network and if no government should use it to transmit sensitive information the reason is that the NSA is watching and that all the network's communications physically travel through the U.S., and very probably through computer filters at its installations at Fort Meade, Maryland," Guisnel said. He said the conclusion was that advanced encryption programs like PGP needed to be used if one wants to communicate in a secure manner on the Internet. Citing the debate raging in the U.S. over computer security which has made little impact in Europe, Guisnel called on France to authorize the use of encryption by everyone and criticized the country's reactionary policy in that score. He said the attitude, while defensive in nature, was all the harder to understand because its first consequence was to increase the vulnerability of French companies, to the benefit of NSA. ------ Copyright 1995 Indigo Publications. All rights reserved. This news report may not be republished or redistributed, in whole or in part, without the prior written consent of Indigo Publications. For more information and sample issues, please mail to ------------------------------ Date: Sun, 18 Oct 1995 22:51:01 CDT From: CuD Moderators Subject: 5--Cu Digest Header Info (unchanged since 18 Oct, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/ In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: ( in /pub/CuD/ ( in /pub/Publications/CuD/ ( in /pub/eff/cud/ in /src/wuarchive/doc/EFF/Publications/CuD/ in /doc/EFF/Publications/CuD/ EUROPE: in pub/doc/cud/ (Finland) in pub/cud/ (United Kingdom) JAPAN: The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.86 ************************************


E-Mail Fredric L. Rice / The Skeptic Tank