Dec 102017
 
Computer Underground Digest Volume 5 - Issue #2.
File CUD502.ZIP from The Programmer’s Corner in
Category Various Text files
Computer Underground Digest Volume 5 – Issue #2.
File Name File Size Zip Size Zip Type
CUD502.TXT 40477 16479 deflated

Download File CUD502.ZIP Here

Contents of the CUD502.TXT file




Computer underground Digest Sun Jan 10, 1992 Volume 5 : Issue 02
ISSN 1002-022X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Editor: Etaion Shrdlu, Junior

CONTENTS, #5.02 (Jan 10, 1992)
File 1--DoJ Has NOT "Authorized" Keystroke Monitoring
File 2--Re: Dorm Room Raid (CuD #4.67)
File 3--Reports on Ames Raid Available
File 4--Hysteria from Forbes via NPR
File 5--OECD Security Guidelines
File 6--CU IN THE NEWS
File 7--"Any one Who Owns a Scanner is a Hacker, or..."
File 8--FYI: 3rd Computers, Freedom and Privacy Conference

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from [email protected] The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
466893; and using anonymous FTP on the Internet from ftp.eff.org
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
Back issues also may be obtained from the mail
server at [email protected]

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Fri, 18 Dec 1992 02:35:52 EDT
From: Dorothy Denning
Subject: DoJ Has NOT "Authorized" Keystroke Monitoring

Dave Banisar posted a message a while back with the headline "DOJ
Authorizes Keystroke Monitoring." The following article by Dennis
Steinauer of NIST clarifies just what exactly the DOJ really said.

Dorothy Denning
[email protected]
+++++++
from PRIVACY Forum Digest, Vol. 01:Issue 28

Date--Fri, 11 Dec 92 16:14:09 EST
[email protected] (Dennis D. Steinauer)
Subject--DoJ Has NOT "Authorized" Keystroke Monitoring

The Subject line on the recent reposting by David Banisar of the 7 Dec
92 advisory from CERT/CC is highly misleading and inappropriate. As
with some newspapers, it is important that people read more than just
the headlines.

The Department of Justice hasn't "authorized" anything. Rather, they
are advising system administrators that certain activities, namely the
monitoring or recording of user-to-computer session transmissions
(hence "keystroke monitoring") MAY be found illegal in certain
circumstances and that notice should be given to users.

The CERT advisory was extracted from a letter to the National
Institute of Standards and Technology (NIST) from DoJ. Justice asked
NIST in its role of providing computer security guidance to Government
to circulate the letter and provide appropriate guidance. We have
made the letter available, without comment, through several government
and other channels (including CERT, I4, etc.).

The letter is intended to advise system administrators of an ambiguity
in U.S. law that makes it unclear whether session monitoring, often
conducted by system administrators who suspect unauthorized activity,
is basically the same as an unauthorized telephone wiretap. I repeat,
the law is *unclear* -- and the fact that one can argue either way on
the issue does not clarify the law as currently written. DoJ advises,
therefore, that if system adminstrators are conducting session
monitoring or anticipate the need for such monitoring, they should
ensure that all system users be notified that such monitoring may be
undertaken.

The DoJ advice, therefore, is not "authorizing" anything -- even
implicitly. They have simply observed the types of activities that
diligent system managers often undertake (a la Cliff Stoll in "The
Cuckoo's Egg") in an attempt to protect their systems from
unauthorized users, and they have rendered some prudent legal advice.

Clearly, there are lots of issues here -- technical and otherwise --
that will need to be discussed and sorted out. Indeed, changes in
agency/organizational policies and even the law are probably needed.
However, none of this changes the fact that system administrators need
now to be aware of the potential impact of their activities, and the
DoJ advice attempts to do this.

We (NIST) are developing additional guidance for system administrators
to assist them in implementing the DoJ recommendations. I expect that
others will be doing likewise. We also hope to encourage discussion
of the related technical and other issues. In the meantime, system
adminstrators are well advised to read the basic DoJ advice and
examine their systems and agency policies to determine if, where, and
how notices should be provided to users. We welcome comments and
suggestions, particularly regarding approaches that various
organizations take in dealing with this issue.

=====
Dennis D. Steinauer
National Institute of Standards and Technology
A-216 Technology
Gaithersburg, MD 20899 USA
(301) 975-3359
(301) 948-0279 Facsimile
[email protected] (e-mail)
NIST Security BBS: 301-948-5717 (cs-bbs.nist.gov)

------------------------------

Date: Tue, 29 Dec 92 12:32:09 CST
From: [email protected](Chris Johnson)
Subject: Re: Dorm Room Raid (CuD #4.67)

In a recent issue of CuD, an article described a raid on a dorm room
to confiscate computer equipment which allegedly contained copies of
copyrighted software. The claim was made that the software was
obtained via Internet.

This reminded me of a conversation I had with my brother over the
Christmas holiday. He was recently a student at a university which
has Internet access (I do not, or I'd verify the following). He
mentioned that the White Sands Missile Range (an obvious DoD
installation) had one of the largest collections of ftp accessible
computer files. He said they had everything imaginable.

Now, it's true I haven't looked myself, nor did I specifically ask him
at the time if they had copies of copyrighted images, data or programs
as the conversation was about other topics. But I have seen other ftp
sites "libraries", and there's next to no doubt in my mind the White
Sands site must have megabytes of copyrighted materials.

Perhaps someone out there would like to take a look and see just how
legal they are.

Of course, the federal government seems more interested in busting
college students and other individuals than say, cleaning up its own
act.

------------------------------

Date: Tue, 22 Dec 1992 13:47:06 EDT
From: David Sobel
Subject: Reports on Ames Raid Available

Last month I posted a NASA statement concerning the unannounced
"security review" conducted at the Ames Research Center this past
summer. The CPSR Washington Office recently obtained electronic
copies of two NASA reports on the incident, which are now available
through the listserver. To obtain these files, send the following
message to :

GET

using the following filenames and filetypes:

Filename Filetype Lines Description
++++++++ ++++++++ +++++ +++++++++++
AMES-MR REPORT 861 MANAGEMENT REVIEW OF THE AMES RESEARCH
CENTER - August, 1992

AMES-MR ASSESSMT 565 ASSESSMENT PANEL REPORT ON THE NASA AMES
MANAGEMENT REVIEW - November 6, 1992

*******************************************************

David Sobel
Legal Counsel
CPSR Washington Office

------------------------------

Date: Mon, 21 Dec 92 09:08 EST
From: "Michael E. Marotta"
Subject: Hysteria from Forbes via NPR

GRID News. December 22, 1992.
ISSN 1054-9315. vol 3 nu 9.
++++++++++++++++++++++++
"Morning Edition and Hackers" by Michael E. Marotta

On December 21, NPR's "Morning Edition" repeated the highlights of a
cover story in FORBES Magazine about so-called "hackers." These
computer criminals siphon money from the EFT networks and they steal
telephone time. The NPR piece would have been silly except that it
feeds the hysteria directed against people who love to work with
computers. Stories like these validate the witch hunts carried out by
the Secret Service and FBI against hackers.

Instead of HACKERS, substitute AUTOMOBILE DRIVERS. Automobile drivers
aid organized crime. The mafia learns to drive cars. Sometimes
people rent cars to crime lords. And when there aren't enough cars,
the underworld steals them. But isn't this silly? We are talking
about DRIVING A CAR...

Yes, some CRIMINALS can use a computer. Singing about Pretty Boy
Floyd, Woody Guthrie said, "some men will rob you with a six gun, some
with a fountain pen." That was the 1930s. This is the 1990s. There
is a word for people who canNOT program a computer: the word is
ILLITERATE.

Perhaps these crooks are doing the electronic equivalent of making
incorrect change and pocketing the difference. As the clericals of
the multinationals, these workers have the best opportunity to siphon
money. The Federal Reserve clearing house alone runs a TRILLION
dollars EACH DAY. NPR and Forbes worried about "a quarter of a
million" dollars. The ratio of 250,000 to one trillion is like an
urchin coming upon two men pushing a skid down the street with $4
million in loose bundles and plucking ONE DOLLAR for herself.

There is a wider issue, however. EFT is supposed to be protected by
the Data Encryption Algorithm created by IBM for the Department of
Commerce. People who steal EFT money may be hacking the DEA. Back in
1984, a paperback novel, The Big Byte, told about just such an event.
The entire banking system was shut down by a group of religious
terrorists who cracked the DES. Only a small fraction of our money is
in cash. Without checking and plastic, the economy would slam shut in
a few hours.

Fear of these possibilities drives the law enforcement community to
dog hackers. However, the cops have a poor track record at
technology. Fifty years ago, the Feds harassed J. Robert
Oppenheimer because he was a communist. The plans for the atom bomb
were stolen by Klaus Fuchs, a Briton working at Los Alamos. In
retaliation, Julius and Ethel Rosenberg of New York were executed.
Today the Feds harass "hackers" while the crooks like Senator Lloyd
Bentsen line up on the Clinton gravy train and con men like Newt
Gingrich get rich by complaining about not being there themselves.

On December 19, CNN Headline News announced that new rules now require
banks to have $2 in capital for every $100 in loans. The new
regulations will limit bank failures to "only 23" in 1993.

You don't need a computer to put two and two together.

(GRID News is FREQable from 1:159/450, the Beam Rider BBS)

------------------------------

Date: Tue, 22 Dec 1992 14:19:51 EDT
From: Marc Rotenberg
Subject: OECD Security Guidelines

OECD SECURITY GUIDELINES

The Organization for Economic Cooperation and Development
(OECD) has adopted international Guidelines for the Security of
Information Systems. The Guidelines are intended to raise awareness
of the risks in the use of information systems and to establish a
policy framework to address public concerns.

A copy of the press release and an excerpt from the Guidelines
follows. For additional information or for a copy of the guidelines,
contact Ms. Deborah Hurley, OECD, 2, rue Andre-Pascal, 75775 Paris
Cedex 16, 33-1-45-24-93-71 (fax) 33-1-45-24-93-32 (fax).

Marc Rotenberg, Director
CPSR Washington office and Member,
OECD Expert Group on Information System Security
[email protected]

=============================================================

"OECD ADOPTS GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS

"The 24 OECD Member countries on 26th November 1992 adopted
Guidelines for the Security of Information Systems, culminating almost
two years' work by an OECD expert group composed of governmental
delegates, scholars in the fields of law, mathematics and computer
science, and representatives of the private sector, including computer
and communication goods and services providers and users.

"The term information systems includes computers,
communication facilities, computer and communication networks and the
information that they process. These systems play an increasingly
significant and pervasive role in a multitude of activities, including
national economies, international trade, government and business
operation, health care, energy, transport, communications and
education.

"Security of information systems means the protection of the
availability, integrity, and confidentiality of information systems.
It is an international issue because information systems frequently
cross national boundaries.

"While growing use of information systems has generated many
benefits, it has also shown up a widening gap between the need to
protect systems and the degree of protection currently in place.
Society has become very dependent on technologies that are not yet
sufficiently dependable. All individuals and organizations have a
need for proper information system operations (e.g. in hospitals, air
traffic control and nuclear power plants).

"Users must have confidence that information systems will be
available and operate as expected without unanticipated failures or
problems. Otherwise, the systems and their underlying technologies
may not be used to their full potential and further growth and
innovation may be prohibited.

"The Guidelines for the Security of Information Systems will
provide the required foundation on which to construct a framework for
security of information systems. They are addressed to the public and
private sectors and apply to all information systems. The framework
will include policies, laws, codes of conduct, technical measures,
management and user practices, ad public education and awareness
activities at both national and international levels.

"Several OECD Member countries have been forerunners in the
field of security of information systems. Certain laws and
organizational and technical rules are already in place. Most other
countries are much farther behind in their efforts. The Guidelines
will play a normative role and assist governments and the private
sector in meeting the challenges of these worldwide systems. The
Guidelines bring guidance and a real value-added to work in this
area, from a national and international perspective."

PRINCIPLES

"1. Accountability Principle

The responsibilities and accountability of owners, providers
and users of information systems and other parties concerned with the
security of information systems should be explicit.

"2. Awareness Principle

"In order to foster confidence in information systems, owners,
providers and users of information systems and other parties should
readily be able, consistent with maintaining security, to gain
appropriate knowledge of and be informed about the existence and
general extent of measures, practices and procedures for the security
of information systems.

"3. Ethics Principle

"Information systems and the security of information systems
should be provided and used in such a manner that the rights and
legitimate interests of others are respected.

"4. Multidisciplinary Principle

"Measures practices and procedures for the security of
information systems should take into account of and address all
relevant consideration and viewpoints, including technical,
administrative, organizational, operational, commercial, educational
and legal.

"5. Proportionality Principle

"Security levels, costs, measures, practices and procedures
should be appropriate and proportionate to the value of and degree of
reliance on the information systems and to the severity, probability
and extent of potential harm, as the requirements for security vary
depending upon the particular information systems.

"6. Integration Principle

"Measures, practices and procedures for the security of
information systems should be co-ordinated and integrated with each
other and with other measures, practices and procedures of the
organization so as to create a coherent system of security.

"7. Timeliness Principle

"Public and private parties, at both national and
international levels, should act in a timely co-ordinated manner to
prevent and to respond to breaches of information systems."

"8. Reassessment Principle

"The security information systems should be reassessed
periodically, as information systems and the requirements for their
security vary over time.

"9. Democracy Principle

"The security of information systems should be compatible with
the legitimate use and flow of data ad information in a democratic
society."

[Source: OECD Guidelines for the Security of Information Systems
(1992)]

------------------------------

Date: 16 Dec 92 22:41:38 EST
From: Gordon Meyer <[email protected]>
Subject: CU IN THE NEWS

The US Government has filed espionage charges against Kevin Poulsen,
age 28, for entering Pacific Bell's computers and allegedly obtaining
'high-level' military secrets. Observers say the charge is overblown
since damage to 'national security' has not been established and no
secrets were passed to any foreign power. (As reported in Information
Week, Dec 14, 1992. pg 10)

++++++

The Business Software Alliance (BSA), an industry coalition against
software piracy, has filed 37 lawsuits against firms in 10 European
countries, Thirteen of the lawsuits are against BBS' in Germany. The
BSA says this is only a preview of how aggressive it will be in 1993.
(Information Week, Dec 14, 1992. pg 8)

++++++

The September Inc. magazine Fax Poll shows some interesting numbers
regarding business ethics, and a peek at software piracy as well. The
results indicate that ethical business practices vary by the age of
the businessman and the size and age of the firm. Over half the
respondents said they would obey ethical rules, but felt free to
bend them to their own advantage when possible. In response to
another question, a quarter of the respondents felt the pirating
computer software was an acceptable business practice, just a fraction
more than those who wouldn't hesitate to violate the privacy rights
of a job applicant.

The non-scientific poll are conducted monthly. Readers fill out a
one-page 'survey' and fax or mail it to Inc. for tabulation. See
the December 1992 issue for the details on the September poll on
business ethics. (page 16)

The results include:
Q. Which of the following statements most closely approximates your
view of ethics in business?
52% - I play by the rules, but I'll bend them to my
company's advantage whenever I can.
46% - I tell the whole truth, all the time.
2% - All's fair in love and business, as long as you
don't get caught.
When cross-tabulated with the age of the respondent, Inc. reports
that 34% of respondents under 35 years old tell the whole truth,
compared with 54% of those over 45 years old. When it comes to
bending the rules, 62% of under 35s do so, but only 40% of those
over 45 indicated that answer.

Q. Which of the following would you consider to be an acceptable
business practice?
43% - Paying suppliers net 60 days but expecting net 30
on your accounts receivable.
37% - Pretending your company has divisions to make it look
bigger to clients and suppliers.
35% - Stealing clients from your current employer when you
break off on your own.
25% - Pirating software.
23% - Getting around privacy rights in job interviews.
17% - Using a copier machine on a 30-day trial basis without
intending to purchase it.

(other responses not included in CuD summary)

------------------------------

Date: Thu, 24 Dec 92 23:46:31 -0500
From: [email protected](Mark Carter)
Subject: "Any one Who Owns a Scanner is a Hacker, or..."

Canadian Paper Blames BBSes for Porn

((MODERATORS' NOTE: For those not familiar with Canadian geography, we
asked a Canadian correspondent to provide some background for the
following story. S/he wrote: "St. Catharines is a city of about
125,000 people in southern Ontario, Canada. It is about 1.5 (only 110
kilometers, but traffic slows ya down) hours from Toronto, and about
30 minutes from Niagara Falls. The Standard is "St. Catharines' only
local newspaper, with an (unofficially, but optimistically) estimated
circulation of about 80,000 subscribers."

Although these stories date back to July, the illustrate that Canadian
media, like their U.S. counterparts, are prone to exaggerate a "hacker
menace."))

++++++

The following newspaper stories were featured on the front page of the
St. Catharines Standard on July 25, 1992, and continued on the third
page. They were aimed at a specific "slant" of local bulletin boards,
that of pornographic Gifs, and consequently ended up portraying local
BBS's as sinister distributors of hard-core pornography that
"frightens" both parents and legislators, two groups who it is
constantly pointed out do not understand even the most rudimentary
basics of operating a computer. Yet these same people are encouraged
to form legislation governing bulletin boards.

These articles continually emphasized the "frighteningly" rampant
availability of pornography through BBSs to young users. However, the
young user angle exposes one of the article's greatest fallacies,
which is the assumption that there are hordes of nine-year-olds
downloading megabytes upon megabytes of extremely hard-core
pornographic files. This is simply not the case.

I personally know of no user of local boards under the age of 12, and
think that such an occurance would be rare at best, since below 12,
most kids simply don't know how to use their computers, or think of
them along the same lines as dedicated game machines such as Nintendo
and Sega. In fact, only a small minority of teenagers will possess
the computer know-how to join the online community, and these
teenagers are not the little children the Standard is so frightened
for.

Further, the Standard totally ignores the fact that only a small
number of boards carry the hard-core material that they found, and
those that carry gifs have the gifs as a small minority compared to
the rest of the files they carry. Not to mention that in their
portrayal of boards as sinister syndicates, the Standard ignores the
existence of the Fidonet message network(in which nearly all local
boards take part), which parents would no doubt like their teenagers
to take part in. The Standard also ignores the availability of files
which are not pornographic, let alone Gifs.

It should be noted that all three articles were written by the same
authors, presenting the same views. Neither of the authors is known
in the local online community. Though five months old, these articles
are relevant in relation to the recent Munroe Falls case, where a
sysop was arrested for having pornographic material on his board.

Below are verbatim transcripts of the three articles. The front page
article comes first, and is followed by the two others that were on
the third page.

KIDS CAN SEE HARD-CORE PORN AT TOUCH OF A BUTTON
++++++++++++++++++++++++++++++++++++++++++++++++
by Paul Forsyth and Andrew Lundy (Standard Staff)


Computer wise kids in Canada may be getting an education their parents
never dreamed of.

At this moment, children are firing up their computers and using
telephones to patch into a vast network of files available for free.
What's at their fingertips would shock even hardened purveyors of
pornography.

Computer sex has arrived. Throughout Niagara dozens of public access
bulletin boards are thriving. Across Canada there are thousands more.
Anyone with a modem and phone line can connect with the boards and
access files for their own use. Many of the boards, operated by
hobbyists through their home computers, offer explicit photographs and
stories ranging from topless women to bondage and bestiality.

Most of it is easily accessible to kids who are as comfortable with
computers as their parents are uneasy. The phenomenon has lawmakers,
police and even Ma Bell feeling helpless.

Tony Brandon, who runs Towne Crier-- of of St. Catharines' oldest
bulletin boards dating back to 1984-- now bans porn on his system. He
decided to restrict what users could send to his board when soft-core
images of the mid-1980's became increasingly graphic.

He said the number of adult files are "escalating in all the weird
areas ... Some of them are pretty hard, heavy-duty stuff." After he
banned the porn, the average age of his board users jumped several
years, from 12-14 to 19-20. Brandon sees that as proof the main
consumers are young teens.

Some boards try to screen users accessing adult files, but Brandon
found kids simply lied about their ages. Many system operators offer
instant access to their programs with few age or identification
checks.

On a recent weekday, for example, two Standard reporters easily
accessed a spate of adult files on local boards-- images ranging from
soft-core centrefolds to hard-core images pushing the legal limits of
obscenity. Police say it is difficult to lay charges because most of
the files--other than bestiality, child porn or dehumanizing, violent
or degrading material --- are legal under the Criminal Code. And
federal law does not restrict kids' access to porn of any kind.

St. Catharines has no bylaw covering availability of pornography, said
city clerk Tom Derreck. Even if it did, local bylaws wouldn't apply
to bulletin boards because telecommunications is a federal
jurisdiction.

Police are hesitant to charge the thousands of board operators across
the country, despite the fact many carry material clearly obscene
under the Criminal Code. That is because it is difficult to nail down
where the files-- many originating in the U.S.-- come from, said
Inspector Ray Johns, in charge of the vice unit of the Winnipeg police
force.

The rapid advancement of computer technology has caught police,
lawmakers and anti-porn organizations off guard. Some women's groups
which have taken hard-line stands against pornography are not even
aware bulletin board porn exists.

"I wouldn't even understand how this thing operates," St. Catharines,
anti-porn crusader Diane Eby said of the bulletin boards. Project P,
a joint Ontario Provincial Police/Metro Toronto Police unit which
investigates pornography and hate literature, says there is nothing
the unit can do about computer porn available to kids.

"There's thousands of them, they're all over the place,"
Detective-Sergeant Bob Matthews, head of the unit, said of the
bulletin boards. "You can almost find anything you're looking for."

That's what frightens St. Catharines resident Mark Jefferies, who was
shocked recently to find a colour photo, depicting two women engaged
in bestiality, on a local bulletin board his 15-year-old son connects
with. "That's going too far," said Jeffries. "That's where it's got
to be stopped. Nine-year-old boys will see that. It sickens me."

Fearful parents can forget about complaining to Bell Canada. The
phone company has been told by the Canadian Radio-Television and
Telecommunications Commision that censorship won't be tolerated.

A recent attempt by Bell to axe its 976 service-- after heat from
parents over phone sex services-- was shot down by the CRTC. "We're
the medium, not the message," said Bell spokeswoman Ruth Foster.
"We're not supposed to influence that communication at all or control
it in any way."

Meantime, kids are using computers in ways their parents never
imagined. For example, one St. Catharines board run by a high school
student has photos of naked women among those of Goofy, Mickey Mouse
and Roger Rabbit.

The student, who operates Hogan's Alley, a three-year-old bulletin
board, is trying to clear all the adult files from his computer after
complaints from female users. But the teen, who didn't want his name
used, can't keep pace with users who keep sending pornographic files.

Hugh Mitchell, a St. Catharines physician who runs another board, is
fed up with the trend to porn files. "There is a big demand(for
porn)," he said. "Unfortunately, too much. I just went on my board
last night and I couldn't believe what was going on."

Problems like that prompt Towne Crier's Brandon to say legislation
requiring boards to be licensed might be necessary to stem kids'
access to porn. But Matthews of Project P said local computer owners
could simply phone Texas or Australia or anywhere else in the world
and download porn. "It can come from any place," he said. "This is

getting to be a problem throughout North America and the world."

It's the global nature of telecommunications which is causing
headaches for Canadian universities wrestling with pornography on
their computer systems. The University of Manitoba recently yanked
offensive files from a computer network it is connected to after word
got out about stories and photographs that included child pornography
and women hanging from chains.

Johns, of the Winnipeg police, said the stories were "how-to" manuals
involving incest and torture for sexual gratification. Other
universities across the country, including Brock University, still
carry the files.

"There's a whole lot of legal questions because of the computer. It's
a grey area," said Johns, who is waiting for clarification on the
issue in the courts. Don Adams, director of computing and information
services at Brock, said universities are in a quandary about what to
do with offensive files. "You can't really censor the damn network,
but on the other hand you don't want to carry all this junk, either."

Anti-porn activist and feminist Emilie Fowler, with the Social Justice
Committee of Niagara Falls, fears young males have unlimited access to
hard-core porn in Niagara. "This is out there, and most people are
really not aware of it. Parents go merrily off to work and their
young sons are accessing it. What kinds of opinion are they going to
form about women?"

She had few kind words for those creating the adult computer files.
"It's a chilling thought that some of these guys would do this for a
hobby. Sit around and think of rape scenes for a hobby? That really
frightens me."

Jefferies, the concerned father who bought a home computer nearly
seven years ago, said his son has assured him he doesn't view the porn
on local bulletin boards. Bt he admits that, when he was that age, he
probably would have through sheer curiosity. An adult can see
whatever they want, as long as it's not hurting anyone. It's the kids
I'm worried about."

Matthews and Forster at Bell say they've received virtually no
complaints about porn on bulletin boards. Matthews figures that is
because parents simply don't know it is out there. Kids are
"certainly not going to complain."


SEEING COMPUTER FILES EASY
++++++++++++++++++++++++++
by Paul Forsyth and Andrew Lundy (Standard Staff)

Phone lines aren't just for chatty humans any more. The computer
revolution that transformed the world in the '80s has also changed Ma
Bell. Today telephones buzz with digital chatter, gibberish to the
human ear but the heart and soul of computer lingo.

At this moment, probably hundreds of phone lines in St. Catharines are
hooked to modems-- small electronic devices that are translators for
computers. THey make it possible to transmit not only text, as fax
machines do, but also programs like word processing, spreadsheets,
games and high-quality graphics.

For less than $100, computer owners can buy a modem and unlock the
door to a little-known sub-culture of public access bulletin boards
that has been growing throughout North America for more than a decade.

By running a program which displays text and graphics from other
computers on the screen, users can become members of bulletin boards
anywhere in the world. The boards are electronic meeting places where
users can talk to other computer enthusiasts, play games and exchange
messages or files. They are usually set up on home computers by
hobbyists who spend hours a day maintaining the boards, updating files
and enforcing whatever rules they have established-- like no swearing,
or racist jokes.

Practically every board-- there are dozens in Niagara alone-- has an
area for graphics files, often labelled GIFs. The photos find their
way into computers by anonymous hackers using scanners, an electronic
device similar to a photocopier. But instead of paper, what's
produced is an on-screen image that's often as vivid as the real
thing. Accessing these files is as easy as typing a few instructions:
telling the board what file you want, the way you want to transmit
it-- called downloading-- then simply hitting the return key.

Once files are transferred, they can be viewed on-screen or printed
out. They can be sent to other computer just as easily as they were
received.

That's how photo files that violate Canadian obscenity laws have ended
up in the Garden City. Passed on from user to user via anonymous
phone lines, they've wound their way from the original hacker, through
many other bulletin boards, to computer screens of curious children
throughout Niagara.

IMAGES SHOCK JUSTICE ASSISTANT
++++++++++++++++++++++++++++++
by Paul Forsyth and Andrew Lundy (Standard Staff)

Rob Nicholson's face grew grim as the computer image flashed on the
screen. Two words escaped from his mouth: "My God."

The Niagara Falls MP and assistant to federal Justice Minister Kim
Campbell was getting a crash course on computer pornography and its
availability to children in Niagara. It scared him.

"This is news to me," he admitted in his riding office, as a photo of
bestiality appeared. "I have to believe this is news to most
Canadians."

Two reporters dropped by yesterday to show him a cross-section of
hundreds of porn files easily available on local computer bulletin
boards-- files even board operators admit are big draws for
computer-literate young teens.

Nicholson promised to make Campbell aware of the issue, but admitted
the wheels of legislative change move slowly. As an example, as
recently as two years ago a person would be charged if caught setting
fire to someone's garden. But burning a car wasn't considered arson,
because cars had not been invented when the Criminal Code was written.

Nicholson pointed out that the combination of pornography-- a thorny
political issue-- and rapidly changing computer technology makes
drafting effective legislation a daunting task.

"I don't know what the ... solution is to this. It bothers me that we
don't have a magic bullet. This wonderful new technology is being
perverted. It scares me as a parent."

------------------------------

Date: Fri, 8 Jan 1993 17:34:58 -0500
From: Gerard Van der Leun
Subject: FYI: 3rd Computers, Freedom and Privacy Conference

CFP'93
The Third Conference on Computers, Freedom and Privacy
9-12 March 1993
San Francisco Airport Marriott Hotel, Burlingame, CA

The CFP'93 will assemble experts, advocates and interested people from
a broad spectrum of disciplines and backgrounds in a balanced public
forum to address the impact of computer and telecommunications
technologies on freedom and privacy in society.

Participants will include people from the fields of computer science,
law, business, research, information, library science, health, public
policy, government, law enforcement, public advocacy and many others.
Some of the topics in the wide-ranging CFP'93 program will include:

ELECTRONIC DEMOCRACY - looking at how computers and networks are
changing democratic institutions and processes.

ELECTRONIC VOTING - addressing the security, reliability, practicality
and legality of automated vote tallying systems and their increasing
use.

CENSORSHIP AND FREE SPEECH ON THE NET - discussing the problems of
maintaining freedom of electronic speech across communities and
cultures.

PORTRAIT OF THE ARTIST ON THE NET - probing the problems and potential
of new forms of artistic expression enabled by computers and networks.

DIGITAL TELEPHONY AND CRYPTOGRAPHY - debating the ability of
technology to protect the privacy of personal communications versus
the needs of law enforcement and government agencies to tap in.

HEALTH RECORDS AND CONFIDENTIALITY - examining the threats to the
privacy of medical records as health care reform moves towards
increasing automation.

THE MANY FACES OF PRIVACY - evaluating the benefits and costs of the
use of personal information by business and government.

THE DIGITAL INDIVIDUAL - exploring the increasing capabilities of
technology to track and profile us.

GENDER ISSUES IN COMPUTING AND TELECOMMUNICATIONS - reviewing the
issues surrounding gender and online interaction.

THE HAND THAT WIELDS THE GAVEL - a moot court dealing with legal
liability, responsibility, security and ethics of computer and network
use.

THE POWER, POLITICS AND PROMISE OF INTERNETWORKING - covering the
development of networking infrastructures, domestically and worldwide.

INTERNATIONAL DATA FLOW - analyzing the issues in the flow of
information over the global matrix of computer networks and attempts
to regulate it.

The conference will also offer a number of in-depth tutorials on
subjects
including:

* Information use in the private sector * Constitutional law and civil
liberties * Investigating telecom fraud * Practical data inferencing *
Privacy in the public and private workplace * Legal issues for sysops *
Access to government information * Navigating the Internet

INFORMATION For more information on the CFP'93 program and advance
registration call, write or email to:

CFP'93 INFORMATION 2210 SIXTH STREET BERKELEY, CA 94710 (510) 845-1350
[email protected]

A complete electronic version of the conference brochure with more
detailed descriptions of the sessions, tutorials, and registration
information is also available via anonymous ftp from sail.stanford.edu in
the file: pub/les/cfp-93

------------------------------

End of Computer Underground Digest #5.02
************************************



 December 10, 2017  Add comments

Leave a Reply