Computer underground Digest Sun Oct 17 1993 Volume 5 : Issue 81
Editors: Jim Thomas and Gordon Meyer ([email protected]
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Copy Eidtor: Etaoin Shrdlu, III
CONTENTS, #5.81 (Oct 17 1993)
File 1--Another BBS/Bombing Connection (Ill.)
File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
File 4--Fourth Annual HOHOCON
File 5--"Hacker" Documentary Proposed
File 7--Student Pugwash Conference
File 8--Response to CuD 5.80 - Itar article
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from [email protected]
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
AUSTRALIA: ftp.ee.mu.oz.au (126.96.36.199) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
aql.gatech.edu (188.8.131.52) in /pub/eff/cud
etext.archive.umich.edu (184.108.40.206) in /pub/CuD/cud
ftp.eff.org (220.127.116.11) in /pub/cud
halcyon.com( 18.104.22.168) in /pub/mirror/cud
ftp.warwick.ac.uk in pub/cud (United Kingdom)
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
Date: Thu, 14 Oct 1993 21:18:43 CDT
From: CuD Moderators
Subject: File 1--Another BBS/Bombing Connection (Ill.)
Another incident of an alleged BBS/bombing connection has occurred,
this time in Cook County (Illinois). WILLIAM PRESECKY, "6 Youth's
Hobby was Bombs, Police Say," (Chicago Tribute, 8 October, 1993:
Section 2,pp1, 4) summarizes six 15 and 16 year-old highschool
students' escapades in blowing up over 70 mailboxes in Lyons Township,
Ill., in Cook County near Chicago. The story begins:
Armed with potentially deadly materials and some
computer-generated know-how, six west suburban teenagers
allegedly formed the nucleus of a bomb-making club broken up
by authorities this week.
At least two of the suspected teens could be charged as
adults, pending a review of the juvenile petitions next week
by the Cook County state's attorney's office, authorities
"These are A and students, honor roll students. They come
from well-to-do families," but appear to have no other
activities to keep themselves busy, according to ((a police
As many as 10 more teenagers from the same area are
suspected of being involved in the manufacture and
detonation of assorted homemade bombs that police said may
have damaged or destroyed as many as 70 mailboxes in the
west and southwest suburbs over the past several months,
according to ((a police spokesperson)).
A search of two of the teens' homes yielded a large cache of
bomb-making material, including pipes, chemicals, black
powder and detonating devices as well as eight to 10
partially made bombs. Also found were several ready-to-use
bombs that were rendered harmless by members of the Cook
County Bomb Squad and sent for analysis to the federal ATF's
laboratory in Maryland.
Also confiscated from one of the homes were three computer
didks containing recorded information that, despite its
disclaimers, ((the police spokesperson)) said could be used
to create an assortment of mayhem, with titles such as "22
Ways to Kill a Human Being With your Bare Hands." The disks
contained information on advanced bomb-making technology,
including the use of remote-control and time delay
detonation, ((the spokesperson)said.
Whether the teens accused of making and using the bombs
actually used the computer-generated information to
manfacture the devices isn't certain.
"It's a frightening thing that kids have this kind ov
access, that anyone with access to this kind of material
would be this irresponsible," said Burr Ridge Police Chief
Chicago's Channel 2 tv, a CBS affiliate, also covered the story on
it's evening news. "The SHOCKING part of it is where they learned" the
information, intoned the story (original emphasis). In a substantial
(by news standards) segment, Channel 2 reporters interviewed what
appeared to be a computer store owner who claimed that most BBS sysops
are "kids from 8 to 14" and that there are even a few adults who run
BBSes. The reporters informed the audience that most "hackers" are
under 14, and that there are "thousands of BBSes in the Chicago area
and elsewhere." Although the intent to inform parents of their
responsibility in monitoring juveniles and instilling a social ethic
is laudable, the factual errors and superficial hyperbole are not.
Date: Thu, 14 Oct 1993 18:22:21 CDT
From: CuD Moderators
Subject: File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
((MODERATORS' NOTE: A number of posters forwarded the following,
apparently originally posted on Usenet, to us. We have edited the
stories down to conform to "fair use."
>From The Dialy Oklahoman Newspaper, September 27, 1993, Page 1:
COMPUTER PORN CASE TRIGGERS LEGAL QUESTIONS
By David Zizzo, Staff Writer
Is talking to Anthony Davis hazardous to your health?
In a manner of speaking, that's what numerous people with computers and
modems apparently have been worrying about since late July. That's
when Oklahoma City police raided Davis' software publishing firm and
confiscated his sophisticated commercial computer bulletin board
system. Authorities allege Davis was selling pornographic computerized
materials on CD-ROM and through files downloaded over phone lines.
Names of everyone who signed onto Davis' bulletin board service, those
who downloaded or uploaded graphic files depicting sexual acts and
those who didn't are in the hands of investigators.
The Davis bust sent a chill throughout the national computer community,
said Jack Rickard, editor and publisher of Boardwatch magazine, a
bulletin board newsletter published in Littleton, Colo. "It's causing
chaos," he said. Rickard said Oklahoma City is being viewed "a little
bit like clown city" in computer circles, since the explicit material
Davis offered can be purchased in nearly every computer magazine and is
carried by numerous bulletin boards. "This is off the shelf," he said.
"It's considered pretty mundane stuff."
The bust will test Oklahoma laws on "community standards" regarding
pornography, said Mike Godwin, attorney for the Electronic Frontier
Foundation. The Washington, D.C., advocacy group is funded by donors
that include large software companies. "When you talk about community
standards, who's the real community?" Godwin wonders. "Is it the city
or ... the community of people on-line?"
Holmes, a former Cleveland County prosecutor, calls Oklahoma's
pornography law "an extremely broad statute." "I'm not sure it wouldn't
include Playboy or Penthouse type publications," he said.
Critics also say police over reached in grabbing Davis' entire system,
shutting down his pay-for-play computer service, because of four CDs.
Prosecutors are seeking forfeiture of the system, which includes a 13
gigabyte memory unit and 10 high speed modems. "They don't have to
seize it any more than they have to seize the building when they
confiscate a bookstore," said Godwin of the Electronic Frontier
>From Boardwatch Magazine / September, 1993. Under the byline of
Lance Rose:"BBS BURNINGS" in the Legally Online column, p. 62
OKLAHOMA BBS RAIDED ON PORNOGRAPHY CHARGES
The legal assault on bulletin boards continues this month with a raid
by Oklahoma City Police Department Vice Division on Tony Davis's
OKLAHOMA INFORMATION EXCHANGE BBS and his associated Mid-America
Digital Publishing Company.
About 4:00 PM on July 20, four officers of the Oklahoma City Police
Department arrived at the offices of Mid-America Digital Publishing
with a search warrant for "pornographic CD-ROMs." Davis was arrested
on suspicion of the sale and distribution of pornographic CD-ROM
disks. Of the 2000 CD ROM disks available on site, they confiscated
about 50 disks, and an estimated $75,000 worth of equipment Davis runs
his 10-line OKLAHOMA INFORMATION EXCHANGE BBS on. The equipment
including two computers with gigabyte hard drives, two Pioneer 6-disk
drives, four single CD ROM drives, 10 High Speed Hayes modems, Novell
network software and associated hardware, etc.
Apparently, an undercover agent had contacted Mid-America Digital
Publishing on two occasions and purchased CD-ROM disks containing
adult material from the company. At the raid, Davis cooperated with
the police showing them whatever they wanted to see, and even removing
four disks from CD-ROMS on the BBS machine and showing them to the
police. Curiously, these were standard off-the-shelf CD ROM
collections NOT published by Davis, including "Busty Babes", "For
Adults Only #2," "For Adults Only #3", and "Storm II". More
curiously, the police themselves put the disks BACK into the BBS in
order to video tape callers accessing the files on the disks.
Despite Davis' notification, none of the specific procedures required
by federal law (Privacy Protection Act) when serving search warrants
on publishers was followed, and no acknowledgement or even apparent
cognizance of the Electronic Communications Privacy Act made when
notified of the electronic mail for some 2000 BBS users available on
the system. OKLAHOMA INFORMATION EXCHANGE carries some 750 FidoNet
conferences, an additional 750 Usenet Newsgroups, and offers callers
private FidoNet mail and Internet mail and actually hubs mail for
other bulletin board systems as well.
All possible charges relate to Oklahoma State statutes against
obscenity. Located in the heart of the Bible Belt, this could be
serious. A penalty of up to $5000 and 5 years in prison per infraction
is possible. If you count each file on a CD-ROM as an infraction, Mr.
Davis could in theory be facing over a 100,000 years in jail and
nearly a $100 million in fines - another contrast between
technological reality and our legal system. From what we understand,
in Oklahoma, it is technically illegal to actually BE naked at any
time when not actually getting wet somehow, and some legal theorists
posit that HBO and Showtime cable television channels are actually
infractions under the state laws as written.
((MODERATORS' NOTE: BOARDWATCH Magazine, chalked full of information
and news, can be obtained for $36/year (12 issues) from:
Boardwatch Magazine / 8500 W. Bowles Ave. / Suite 210 / Littleton,
Date: Sun, 17 Oct 1993 17:22:11 CDT
From: CuD Moderators
Subject: File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
--JULIAN DIBBELL'S "Code Warriors: Battling for the Keys to Privacy in
the Info Age," (The Village Voice, 28 July, 1993: pp 33-37) summarizes
the debates in encryption and privacy. It includes snippets from John
Gilmore, Tim May, and Eric Hughes, and cleanly and concisely explains
in simple (but not simplistic) lay terms the nature of the debates
underlying Clipper, Moby Crypto, and other issues in the encryption
--ERIC DEXHEIMER, in Denver Westord (Vol.17, #6, 29 Sept '93), "Secrets
gend: The Government wants to Breakhim,but Boulder's Prince of Privacy
remains Cryptic" summarizes the issues in the Phil Zimmerman/PGP
encryption controversy. The story inludes an indepth analysis and a
strong profile of Zimmerman (in CuD archives).
--JONATHAN LITTMAN, "The Last Hacker," in Los Angeles Times Magazine (p
18), 12 September, '93, focuses on Kevin Poulsen and his recent legal
While not unsympathetic to Paulsen, the story concludes:
Born in a time when hacking was an innocent rite of
boyhood, when laws were as unclear as the boundaries of the
Arpanet, Kevin Poulsen had outlived his era.
Date: Tue, 12 Oct 93 2:46:47 CDT
Subject: File 4--Fourth Annual HOHOCON
[Official Announcement / Call For Participation - October 11, 1993]
dFx, Phrack Magazine and cDc - Cult Of The Dead Cow proudly present :
The Fourth Annual
H O H O C O N
"Cliff Stoll My [email protected]$#!"
Who: All Hackers, Journalists, Security Personnel, Federal Agents,
Lawyers, Authors, Cypherpunks, Virtual Realists, Modem Geeks,
Telco Employees, and Other Interested Parties.
Where: Austin North Hilton & Towers and Super 8 Motel
6000 Middle Fiskville Road
Austin, Texas 78752
Hilton : (800) 347-0330 / (512) 451-5757
Super 8: (800) 800-8000 / (512) 467-8163
When: Friday December 17 through Sunday December 19, 1993
What is HoHoCon?
HoHoCon is the largest annual gathering of those in, related to, or
wishing to know more about the computer underground. Attendees
generally include some of the most notable members of the "hacking"
and "telecom" community, journalists, authors, security professionals,
lawyers, and a host of others. Previous speakers include John Draper
(Cap'n Crunch), Ray Kaplan, Chris Goggans (Erik Bloodaxe), Bruce
Sterling, and many more. The conference is also one of the very few
that is completely open to the public and we encourage anyone who is
interested to attend.
Hotel Information -----------------
The Austin North Hilton recently split its complex into two separate
hotels; the Hilton and the newly added Super 8. HoHoCon guests have
the choice of staying in either hotel. Group rates are as followed :
Super 8: Single - $46.50, Double - $49.50, Triple - $52.50, Quad -
$55.50 Hilton : Single - $69.00, Double - $79.00, Triple - $89.00,
Quad - $99.00
Once again, the hotel has set aside a block of rooms for the
conference and we recommend making your reservations as early as
possible to guarantee a room within the block, if not to just
guarantee a room period. Rooms for the handicapped are available upon
request. To make your reservations, call the the number listed above
that corresponds with where you are and where you want to stay and
make sure you tell them you are with the HoHoCon conference or else
you'll end up throwing more money away. The hotel accepts American
Express, Visa, Master Card, Discover, Diner's Club, and Carte Blanche
Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
available if there are unoccupied rooms available. Please note that in
order for the hotel to hold a room past 6:00 p.m. on the date of
arrival, the individual reservation must be secured by a deposit or
guaranteed with one of the credit cards listed above. Also, any
cancellations of guaranteed reservations must be made prior to 6:00
p.m. on the date of arrival. You will be responsible for full payment
of any guaranteed reservations which are not cancelled by this time.
The hotel provides transportation to and from the airport and will give
you full information when you make your reservations.
For those of you who will be driving to the conference, the following
is a list of directions provided by the hotel (so, if they're wrong,
don't blame me):
Dallas : Take IH 35 south to exit 238-B, the Houston exit. At the
first stop light, turn right on to 2222. Turn off of 2222
onto Clayton Lane (by the Greyhound Station). At the stop
sign, turn right onto Middle Fiskville, the hotel is on the
San Antonio : Take IH 35 north to exit 238-B, the Houston exit. At the
second stop light, turn left onto 2222. Turn off 2222 onto
Clayton Lane (by the Greyhound Station). At the stop sign,
turn right onto Middle Fiskville, the hotel is on the left.
Houston (on 290) : Take 290 west into Austin. Exit off of 290 at the IH35
exit (do not get on 35). Stay on the access road
heading west, you will pass two stop lights. Turn off
the access road onto Clayton Lane (by the Greyhound
Station). At the stop sign, turn right onto Middle
Fiskville, the hotel is on the left.
Houston (on 71) : Take 71 west into Austin. Exit onto 183 north. Take
183 north to 290 west. Take 290 west to the IH 35 exit.
Exit off of 290 at the IH 35 exit (do not get on 35).
Stay on the access road heading west, you will pass two
stop lights. Turn off the access road onto Clayton Lane
(by the Greyhound Station). At the stop sign, turn
right onto Middle Fiskville, the hotel in on the left.
Airport : Exit the airport parking lot and turn right onto Manor Road.
Take Manor Road to Airport Boulevard and turn right. Take
Airport Boulevard to IH 35 north. Take IH 35 to exit 238-B. At
the second stop light, turn left onto 2222. Turn off of 2222
onto Clayton Lane (by the Greyhound Station). At the stop sign,
turn right onto Middle Fiskville, the hotel is on the left.
Call the hotel if these directions aren't complete enough or if you need
HoHoCon will last 3 days, with the actual conference being held on
Saturday, December 18 starting at 11:00 a.m. and continuing until 5 p.m.
or earlier depending on the number of speakers. Although a few speakers
have confirmed their attendance, we are still in the planning stages and
will wait until the next update to release a speaking schedule. We welcome
any speaker or topic recommendations you might have (except for, say, "Why
I Luv Baked Potatoes On A Stik!"), or, if you would like to speak yourself,
please contact us as soon as possible and let us know who you are, who you
represent (if anyone), the topic you wish to speak on, a rough estimate of
how long you will need, and whether or not you will be needing any
We would like to have people bring interesting items and videos again this
year. If you have anything you think people would enjoy having the chance
to see, please let us know ahead of time, and tell us if you will need any
help getting it to the conference. If all else fails, just bring it to the
con and give it to us when you arrive. Any organization or individual that
wants to bring flyers to distribute during the conference may do so. You
may also send your flyers to us ahead of time if you can not make it to
the conference and we will distribute them for you. Left over flyers are
included with information packets and orders that we send out, so if you
want to send extras, go ahead.
Unlike smaller, less informative conferences, we do not ask you to shell
out hundreds of dollars just to get in the door, nor do we take your money
and then make you sleep in a tent. We are maintaining the motto of "give
$5 if you can", but due to the incredibly high conference room rate this
year, we may step up to "$5 minimum required donation" or "give us $5 or
we'll smash your head in". Five dollars is an outrageously low price
compared to the suit infested industry conferences or even the new "Cons
are k00l and trendy, I gotta do one too!" conferences that are charging
up to $50 for admission alone.
To encourage people to donate, we will once again be having our wonderless
"Raffle For The Elite" during the conference. We will issue a prize list
in a future update, but we can guarantee that this year there will be a
lot more (and better) prizes than last year, including a full system (and,
no, it's not a c64 or 286). Anyone who wishes to donate worthwhile items
to the raffle, please let us know ahead of time, or if it's a last minute
acquirement, just bring it to the conference.
To save myself some time by mailing responses to a lot of the same
questions I expect to get, I'll answer a few of them here.
Although I have not talked to him myself yet, Steve Ryan has told me that
Bruce Sterling will indeed be in attendance and may say a few words.
As far as I know, there will not be any visitors from any other planets
at the conference. Scot Chasin is still on Earth and will be making an
Video cameras will *not* be allowed inside the conference room without
prior consent due to previous agreements made with speakers who do not
wish for certain parts of their speech to be rebroadcast. Still cameras
and Etch-A-Sketch's are fine and tape recorders are too easily hidden
for us to be able to control.
Videos and T-Shirts from last year's conference are still available, and
will also be on hand during the conference. We do not handle the LoD World
Tour shirts, but I can tell you that that the old ones are gone and a
*new* LoD shirt will be unveiled at the conference. The HoHoCon shirts are
$15 plus $3 shipping ($4.00 for two shirts). At this time, they only come
in extra large. We may add additional sizes if there is a demand for them.
The front of the shirt has the following in a white strip across the
I LOVE FEDS
(Where LOVE = a red heart, very similar to the I LOVE NY logo)
And this on the back:
dFx & cDc Present
Allen Park Inn
There is another version of the shirt available with the following:
I LOVE WAREZ
The video includes footage from all three days, is six hours long and
costs $18 plus $3 shipping ($4.00 if purchasing another item also). Please
note that if you are purchasing multiple items, you only need to pay one
shipping charge of $4.00, not a charge for each item. If you wish to send
an order in now, make all checks or money orders payable to O.I.S.,
include your phone number and mail it to the street address listed below.
Allow a few weeks for arrival.
There will be new HoHoCon '93 shirts available at the conference and a
video of the festivities will be out early next year.
If anyone requires any additional information, needs to ask any questions,
wants to RSVP, wants to order anything, or would like to be added to the
mailing list to receive the HoHoCon updates, you may mail us at:
[email protected] (WWIV Net)
or via sluggo mail at:
1310 Tulane, Box 2
We also have a VMB which includes all the conference information and is
probably the fastest way to get updated reports. The number is:
You can download any of the conference announcements and related
materials by calling Metalland Southwest at 713-468-5802, which is the
official HoHoCon BBS. The board is up 24 hours a day and all baud rates
Those of you with net access can ftp to cypher.com and find all the
HoHoCon information available in /pub/hohocon. The .gifs from previous
cons are *not* currently online.
Conference information and updates will most likely also be found in most
computer underground related publications and mailing lists, including
CuD, CSP, Mondo 2000, 2600, Phrack, TUC, phn0rd, cypherpunks, etc. They
should also appear in a number of newsgroups including comp.dcom.telecom,
alt.security, comp.org.eff.talk, and sci.crypt. We completely encourage
people to use, reprint, and distribute any information in this file.
Same stupid ending statement from last year to make us look good
HoHoCon '93 will be a priceless learning experience for professionals
and gives journalists a chance to gather information and ideas direct
from the source. It is also one of the very few times when all the
members of the computer underground can come together for a realistic
purpose. We urge people not to miss out on an event of this caliber,
which doesn't happen very often. If you've ever wanted to meet some of
the most famous people from the hacking community, this may be your
one and only chance. Don't wait to read about it in all the magazines
and then wish you had been there, make your plans to attend now! Be a
part of what we hope to be our largest and greatest conference ever.
Date: Mon, 27 Sep 93 21:36:59 -0700
From: [email protected] (Annaliza T. Orquamada)
Subject: File 5--"Hacker" Documentary Proposed
((MODERATORS' NOTE: Annaliza Orquamada, a film-school graduate from
London, intends to challenge conventional media myths about "hackers"
in a proposed documentary. Below, we print a summary of her project.
We will post a substantial version in about a week. From our
conversations and e-mail interaction with her, we find her a highly
informed and competent observer and a refreshing change from most
conventional media folk)).
UNAUTHORIZED ACCESS ONLY
Computers are becoming an integral part of our everyday existence.
They are used to store a multitude of information, from credit reports
and bank withdrawals to personal letters and highly sensitive military
documents. So how secure are our computer systems?
The computer hacker is an expert at infiltrating secured systems, such
as those at AT&T, TRW, NASA and the DMV. Most computer systems that
have a telephone connection have been under siege at one time or
another, many without their owner's knowledge. The really good
hackers can re-route the telephone system, obtain highly sensitive
coporate and government documents, download individuals credit
reports, make free phone calls globally, read private electronic mail
and corporate bulletins and get away without ever leaving a trace.
So who are these hackers? Just exactly WHAT do they DO, and WHY do
they do it? Are they really a threat? What do they do with the
information they obtain? Are hackers simply playing an intellectual
game of chess or are hackers using technology to effectively take
control of corporate and government systems that have previously
Our group is in the course of filming "Unauthorized Access", a
documentary that will demystify the hype and propaganda surrounding
the computer hacker.
We will expose the truths of this sub-culture focusing on the hackers
themselves. This will be a view from inside the global underground.
We intend to shoot in the United States, Holland and Germany.
This documentary will be of the highest broadcast quality and is
intended for international television, festival and theatrical
We are currently looking for additional financial backers interested
in this project. For more information about "Unauthorized Access" or
if you are intrested in providing any information or support, please
contact [email protected]
From: [email protected]
Date: Sun, 10 Oct 93 22:32:00 BST
Subject: File 6--CuNews
Extortion at AT&T
Two men, one a former computer support services employee at AT&T, have
pleaded guilty to conspiring to extort one million dollars from the
company. The US Attorney in Newark, NJ reports that Lou Pacich and
Richard Vignevic sent AT&T a tape-recorded message claiming sensitive
information about commercial accounts was being leaked to competitors.
The two offered to plug the leak in exchange for the money. To bolster
the claim they sent copies of account information on 4,000 AT&T
commercial customers. The information has been obtained, w/out
authorization, from AT&T computer systems. Each man faces 20 years and
$250,000 in fines.
(Information Week. Sept 20, 1993 pg8)
Piracy Around the Globe
The Oct 1993 issue of Technology Training reports on software piracy
in various countries. In Cuba, there is a National Software
Interchange Center where all types of software is available to any
Cuban at no charge. The estimated piracy rate in China and South
Korea is about 90%. Italy checks in at 80%.
(Information Week. Sept 20, 1993 pg62)
How do I love thee...
In "Hard Drives" (Los Angeles Times Magazine, Sept 12, 1993 pg26)
author James Fallows says that we value computers for the ways they
increase our efficiency and productivity. But we love them for the way
they undermine productivity (games, BBSing, etc) and satisfy our
craving for new possessions. Computers play on one of our basic needs,
the compulsion to figure something out and make it work.
(Information Week. Sept 20, 1993 pg62)
IW Security Survey Results
Information Week magazine and Ernst and Young conducted an extensive
security survey and found, to their surprise, that a _minority_ of
organizations polled considered security to be an important issue.
They also found that one in four companies had last money over last
two years due to security breaches in their networks. Most
organizations don't even have full time security staffs. CuD
encourages you to refer to "Tempting Fate", pgs42-52, October 4, 1993
for complete details.
P&G Consultant Indicted
A Procter & Gamble consultant, Matthew Daughtery, has been charged
with three felony counts for using P&G computers to access a company
bulletin board without authorization. The BBS is identified as
"Regulatory and Clinical Development Network". Ohio prosecutors have
not said what information Daughtery could have obtained from the
(Information Week. pg8. Oct 4, 1993)
Consumer Privacy Survey ======================= A Harris poll,
sponsored by the non-profit Center for Social and Legal Research
(Washington, DC), found that 53% OF American adults are very concerned
about threats to their privacy from corporations. This is a
substantial increase over results in previous years. Respondents were
most concerned about financial services and health industries (72%),
with mail-order consumer goods businesses rating 48%. For complete
results refer to the Privacy & American Business newsletter. For more
summary information refer to Information Week, pg58, Oct 4, 1993.
Internet Access in NJ
New Jersey Bell and Bellcore are sponsoring a two-year experiment to
allow people free access to the Internet in three dozen public
libraries in the Garden State. Anyone with a modem can also tap into
portions of the Internet from home by calling the project's dial-up at
(201) 989-5999. Plans are in the works to have fiber-optic cable
installed in every home and business throughout NJ by 2010. Officials
will monitor this experiment to see how pedestrians interact with the
worldwide network and hope the project will become a model for the
(Communications of the ACM, pg11, Oct 1993. Reprinted with permission)
Sex and Violence Nipper Chip
For as little as $5 parents may soon be able to implement a computer
chip in televisions to monitor programs their children watch. With the
growing concern over TV sex and violence comes the debate whether
"lock out" technologies are the solution. Under pressure from
Congress, networks and stations may eventually be forced to rate shows
-- "V" for violence, "N" for nudity, for instance -- and broadcast a
code along with the show which could then be read by the "V-chip"
installed in the set or cable box. The same technology is already used
for broadcasting closed captioned information for the hearing impaired
and will be used to transmit and display information such as the title
and time remaining of shows in progress. Broadcasters and program
producers are no fans of this idea, arguing the technology will take
away viewers and frighten advertisers. (Communications of the ACM,
pg12, Oct 1993. Reprinted with permission)
Nightline on Security/Privacy?
According to James Daly ("Security Watch") the folks at NBC's
Nightline have been talking to folks in the computer security industry
over the past few weeks. A show on security/privacy can't be far
behind. Keep an eye out for it.
(Computerworld, pg56, Oct 4, 1993.)
Date: Fri, 15 Oct 1993 01:45:35 EDT
From: Nikki Draper
Subject: File 7--Student Pugwash Conference
ANNOUNCING: Student Pugwash USA's Eight International Conference
"SCIENCE AND TECHNOLOGY FOR THE 21ST CENTURY
MEETING THE NEEDS OF THE GLOBAL COMMUNITY"
JOIN: 100 talented students from over 25 countries to meet with
accomplished professionals from science, government, industry,
non-governmental organizations, and academe for a week-long
educational forum to explore the impacts of technology on society and
* Resource Stewardship for Environmental Sustainability
* Preventive Diplomacy and Conflict Resolution for a Secure Future
* The Social Costs and Medical Benefits of Human Genetic Information
* Overcoming Barriers to Health Care Education and Delivery
* Designing the Future--From Corporations to Communities
* Communications and Information Technologies
ELIGIBILITY: ALL students (undergraduate, graduate and professional)
from any and all disciplines. Student Pugwash USA encourages
participation that represents a diversity of race, age, gender, sexual
orientation, and national origin.
APPLICATION INFORMATION:Participants will be chosen through a
competitive, merit-based application process based, in part, upon
applicants' submission of a brief 'issue paper' on one of the topics
listed above. For an application or additional information, please
CONTACT: Nicky Short Student Pugwash USA 1638 R Street NW, Suite 32
Washington, D.C., 20009 phone:(202) 328-6555 email:[email protected]
PRELIMINARY APPLICATION DEADLINE: December 15, 1993
Date: Thu, 14 Oct 93 04:55:32 PDT
From: Fredrick B. Cohen
Subject: File 8--Response to CuD 5.80 - Itar article
((MODERATORS' NOTE: The following post was originally less than 25
percent substance, the remainder cascading citations and headers. At
the poster's request, we edited out the superfluous citing while
leaving the poster's comments intact.
We remind readers that CuD is *not* a Usenet discussion group in which
cascades are accepted)).
In CuD 5.80, [email protected](Bruce Jones) writes:
> Please note that the posting site for Mr. Cohen's message is
> the Science Applications International Corporation, a La Jolla
> California based think tank that has deep ties to the U.S. Gov't and
> does lots of work for the DoD. Given his ties to the DoD, it comes
> as small surprise that he was able to get export permission for his
> RSA cryptosystem.
Wrongo - This application was made by ASP, my company (then) in
Pittsburgh, PA and with no government contracts whatsoever. This is a
typical assumptive response from someone who doesn't understand that
poor people like me get access to computers by the grace of others.
Perhaps you think I was previously a professor at Duquesne University,
and before that an employee of the NSA, and before that an employee of
wherever my previous mail account came from. This kind of response
from someone who appears from his mailing address to be from a person
at a major university who is almost certainly getting government
grants is certainly the pot calling the kettle black.
> Why should a software manufacturer or a private citizen have to ask
> permission in the first place, from the DoD (operating under the
> guise of the Dept of Commerce) to export software that uses
> encryption algorithms freely available in the country to which the
> product is being exported?
Interesting question, and one that I have asked, but then why should I
need any permission from the government for anything? Perhaps I
shouldn't, but the fact is, they have the power, and if you work
within the structure, you may find that it is not as oppressive as you
> >IBM has been exporting DES for quite a few years according to sources
> >I have in EC who have seen IBM chips with DES on them in EC computers.
> >I believe they simply asked for permission and got it.
> Again, it's likely quite simple for someone who does business with
> the DoD and the U.S. Gov't to get permission to export.
The point is that even ASP, a tiny company with no government ties got
permission by simply following the rules. Should IBM be treated
> >I applaud the EFF for helping defend people in this area, but maybe if
> >they tried to work within the law in the first place, they would have
> >found it was easier to obey the law than break it.
> Serious charges without foundation. Whom within the EFF has been
> accused of breaking the law?
Try reading more closely. The EFF is defending those who may have
broken the law. Sorry if I mixed my pronouns, I am a human being.
> >Maybe if they apply now, they will end up with a no-case (assuming
> >they get permission).
> A dodge of the issue, which is not about whether or not one can get
> permission to do something specific, but whether or not the
> government has a right to require permission in the first place.
The government certainly has the right to require it, but perhaps it
won't have that right as a result of the PGP case. The issue is that
if they didn't want to go to federal court, why were they trying to
play it so close to the edge? If I walk up to you and swing a
baseball bat within a few inches of your head, are you going to ignore
me because I didn't hit you?
> One of the founding tenets of the Unites States of America is the
> idea that its citizens may do whatever they like, so long as their
> chosen activity is not proscribed by law and doesn't violate the
> rights of their neighbors. The opposite is ostensibly true for
> the government, which may only do what has been permitted it under
> the law. We live in a society where those distinctions apparently
> collapsed some time ago.
Where does the constitution say this? I agree that I would prefer it that
way, but I don't think there is any basis in law for your statement.
End of Computer Underground Digest #581