**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.14 (April 26, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto GAELIC GURU: Brendan Kehoe +++++ +++++ +++++ +++++ +++++ CONTENTS THIS ISSUE: File 1; Moderators' Corner File 2; Comments on your comments on Len Rose File 3; Moving toward Common Ground? Reply to Gene Spafford File 4; CERT Advisory - Social Engineering File 5; And Fox is after the Hollywood Hacker? File 6; MONDO -- GREAT NEW 'ZINE! +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132); (2) cudarch@chsun1.uchicago.edu; (3) dagon.acc.stolaf.edu (130.71.192.18). E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: Moderators' Corner Date: 26 April, 1991 ******************************************************************** *** CuD #3.14: File 1 of 6: Moderators Corner *** ******************************************************************** ++++++++++++++++++++ Mail and Corrupted Issues ++++++++++++++++++++ We received a number of notes asking about the resend of CuD 3.13. Our system is an IBM clone, and the mailer is patched in. When we have mail problems, we are not able to determine the status of any mail we send out because of the limited capabilities of the patch. On occasion, especially during net-jams, this leads to some readers receiving duplicate files. If a number of files are corrupted, as sometimes happens when the nets are jammed or a gateway is not operating properly, it is sometimes necessary to resend a file or, in the case 3.13, the entire list. Optimal size is about 40K, and the last issue ran well over that. To facilitate mailing, we deleted the single file that brought us to the 40 K file size and re-sent. If people are experiencing problems receiving CuD, drop us a note. We have also received on 23 April a horde of email posts dated between 30 March-2 April. The bulk of it seemed to originate from the west and southwest. We generally reply to posts on the same day they are received, so if you do not receive a reply, let us know. ++++++++++++ LET US KNOW IF YOUR ACCOUNT EXPIRES ++++++++++++ If your account is about to expire, please drop a note simply saying "unsub," and be sure to include at the bottom your account number. ++++++++++++++++ Information on subversive software wanted ++++++++++++++++ Gordon is in the beginning stages of research for a technical paper on 'subversive' software. The article will discuss software that has been written for unusual purposes and circumstances, not all of which may be legal. Examples in this "genre" would be 'Fuckin' Hacker', 'Code Thief', and 'Receipt Writer'. It would be helpful to gather as many examples as possible, from many different computer platforms. He is *not* seeking executable copies, but just the name and description of the program. Any additional historical information, such as author name, date, innovative features, etc would be a bonus. If you can recall having seen, used, or heard of any unusual software that you feel fits in this category He would appreciate it if you'd drop me a line. The article has not, as of yet, been slated for publication, but he will supply a finished copy to anyone who responds or requests one. The finished work may also appear in a future issue of CuD. Thanks for your time and assistance! Gordon Meyer 72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at tk0jut2@niu.bitnet +++++++++++++++++++++ PhD Seeks info on Computer Security +++++++++++++++++++++ Paul Taylor, a PhD candidate in England, sent the following note along. He is doing some interesting research, and is trying to obtain additional data. +++++++ From: P.A.Taylor@EDINBURGH.AC.UK Subject: PhD Seeks Info on Computer Security Date: 18 Apr 91 14:17:16 bst I'm into the second year of a PhD looking at the rise of the computer security industry and the concomitant rise of cracking/browsing and viruses, here at the University of Edinburgh. Part of my research involves e-mail interviews and questionnaires. If you would be willing to take part in it, then please get in touch. I'll send you a yes/no type questionnaire and after that if you are willing, a set of questions designed more to start a dialogue about some of the issues surrounding computer security, which could form the basis of an on-going e-mail interview to be acknowledged or kept anonymous in my final thesis, depending on the wishes of the respondent. ALL MY WORK IS FOR PURELY ACADEMIC PURPOSES AND TOTAL CONFIDENTIALITY IS GUARANTEED. IF IN DOUBT AS TO MY ACADEMIC STATUS PLEASE CONTACT ME AND INDEPENDENT VERIFICATION CAN BE SUPPLIED. Thank you in advance, Paul A. Taylor, Depts of Economics and Politics, Edinburgh University. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Gene Spafford <spaf@CS.PURDUE.EDU> Subject: Comments on your comments on Len Rose Date: Sat, 30 Mar 91 14:41:02 EST ******************************************************************** *** CuD #3.14: File 2 of 6: Comments on Len Rose Articles *** ******************************************************************** %Moderators' comment: Spaf just sent his latest book, PRACTICAL UNIX SECURITY, co-authored with Simson Garfinkel to the publishers (O'Reilly and Associates ((the Nutshell Handbook people). It's approximately 475 pages and will available in mid-May. From our reading of the table of contents, and from preview comments ("definitive," destined to be the "standard reference"), it looks like something well-worth the $29.95 investment.% There is little doubt that law enforcement has sometimes been overzealous or based on ignorance. That is especially true as concerns computer-related crimes, although it is not unique to that arena. Reporting of some of these incidents has also been incorrect. Obviously, we all wish to act to prevent future such abuses, especially as they apply to computers. However, that being the case does not mean that everyone accused under the law is really innocent and the target of "political" persecution. That is certainly not reality; in some cases the individuals charged are clearly at fault. By representing all of them as innocents and victims, you further alienate the moderates who would otherwise be sympathetic to the underlying problems. By trying to represent every individual charged with computer abuse as an innocent victim, you are guilty of the same thing you condemn law enforcement of when they paint all "hackers" as criminals. In particular, you portray Len Rose as an innocent whose life has been ruined through no fault of his own, and who did nothing to warrant Federal prosecution. That is clearly not the case. Len has acknowledged that he was in possession of, and trafficing in, source code he knew was proprietary. He even put multiple comments in the code he modified stating that, and warning others not to get caught with it. The patch he made would surreptitiously collect passwords and store them in a hidden file in a public directory for later use. The argument that this patch could be used for system security is obviously bogus; a system admin would log these passwords to a protected, private file, not a hidden file in a public directory. Further, your comments about having root access are not appropriate, either, for a number of reasons -- sometimes, root access can be gained temporarily without the password, so a quick backdoor is all that can be planted. Usually, crackers like to find other ways on that aren't as likely to be monitored as "root", so getting many user passwords is a good idea. Finally, if passwords got changed, this change would still allow them to find new ways in, as long as the trojan wasn't found. The login changes were the source of the fraud charge. It is certainly security-related, and the application of the law appears to be appropriate. By the comments Len made in the code, he certainly knew what he was doing, and he knew how the code was likely to be used: certainly not as a security aid. As somebody with claimed expertise in Unix as a consultant, he surely knew the consequences of distributing this patched code. An obvious claim when trying to portray accused individuals as victims is that their guilty pleas are made under duress to avoid further difficulties for their family or some other third party. You made that claim about Len in your posting. However, a different explanation is just as valid -- Len and his lawyers realized that he was guilty and the evidence was too substantial, and it would be more beneficial to Len to plead guilty to one charge than take a chance against five in court. I am inclined to believe that both views are true in this case. Your comments about Len's family and career are true enough, but they don't mean anything about his guilt or innocence, do they? Are bank robbers or arsonists innocent because they are the sole means of support for their family? Should we conclude they are "political" victims because of their targets? Just because the arena of the offenses involves computers does not automatically mean the accused is innocent of the charges. Just because the accused has a family which is inconvenienced by the accused serving a possible jail term does not mean the sentence should be suspended. Consider that Len was under Federal indictment for the login.c stuff, then got the job in Illinois and knowingly downloaded more source code he was not authorized to access (so he has confessed). Does this sound like someone who is using good judgement to look out for his family and himself? It is a pity that Len's family is likely to suffer because of Len's actions. However, I think it inappropriate to try and paint Len as a victim of the system. He is a victim of his own poor judgement. Unfortunately, his family has been victimized by Len, too. I share a concern of many computer professionals about the application of law to computing, and the possible erosion of our freedoms. However, I also have a concern about the people who are attempting to abuse the electronic frontier and who are contributing to the decline in our freedoms. Trying to defend the abusers is likely to result in a loss of sympathy for the calls to protect the innocent, too. I believe that one reason the EFF is still viewed by some people as a "hacker defense fund" is because little publicity has been given to the statements about appropriate laws punishing computer abusers; instead, all the publicity has been given to their statements about defending the accused "hackers." In the long term, the only way we will get the overall support we need to protect innocent pursuits is to also be sure that we don't condone or encourage clearly illegal activities. Groups and causes are judged by their icons, and attempts to lionize everyone accused of computer abuse is not a good way to build credibility -- especially if those people are clearly guilty of those abuses. The Neidorf case is probably going to be a rallying point in the future. The Steve Jackson Games case might be, once the case is completed (if it ever is). However, I certainly do not want to ask people to rally around the cases of Robert Morris or Len Rose as examples of government excess, because I don't think they were, and neither would a significant number of reasonable people who examine the cases. I agree that free speech should not be criminalized. However, I also think we should not hide criminal and unethical behavior behind the cry of "free speech." Promoting freedoms without equal promotion of the responsibility behind those freedoms does not lead to a greater good. If you cry "wolf" too often, people ignore you when the wolf is really there. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators (Jim Thomas) Subject: Moving toward Common Ground? Reply to Gene Spafford Date: April 26, 1991 ******************************************************************** *** CuD #3.14: File 3 of 6: Moving toward Common Ground? *** ******************************************************************** Gene Spafford's comments raise a number of issues, and my guess is that he and other "moderates" are not that far apart from those of us considered "extremists." His post was sent in March, but we received it on April 24, so some of his comments about Len Rose have already received sufficient response (see Mike Godwin in CuD 3.13). We are more concerned with the potential points of converenge on which "moderates" and "radicals" might agree. Gene raises several issues: 1) The tone of some critics of recent "hacker" cases tends to be divisive and inhibits coming together on common ground; 2) There exists a danger in "crying wolf" in that cases in which legitimate abuses may have occured or that directly raise important issues about civil liberties will be ignored because of excessive concern with cases that are perceived as less meritorious or in which the defendants may not seem sympathetic; c) An aggressive social response is required to reverse the apparent trend in computer abuse. We disagree with none of these issues. There is, however, room for legitimate disagreement on how these issues should be addressed, and there is room for conciliation and compromise. Although many cases of law enforcement response to alleged computer abuse have been reported, only a few have generated any significant attention. These cases have not generally centered around issues of guilt or innocence, but on broader concerns. Other than general reporting of cases, CuDs own attention has been limited to: STEVE JACKSON GAMES: Few, if any, think the search of Steve Jackson's company and seizure of his equipment was acceptable. The seizure affidavit indicated that the justification for the raid was grossly exaggerated and its implementation extreme. There have been no arrests resulting from that raid, but the questions it raised have not yet been resolved. LEN ROSE: Whatever one thinks of Len Rose's behavior, the actions of AT&T and law enforcement raise too many issues to be ignored whatever Len's own culpability (or lack of it). The initial indictments, press releases, and prosecutor media comments connected Len to E911, the Legion of Doom, and computer security when the case was actually about possesion of unlicensed proprietary software. We have never denied the importance of either issue. Our concern continues to be the misconceptions about the nature of the case, what we see as an extreme response to a relatively minor incident, and the way the laws were used to inflate charges. These are all debatable issues, but the nets were buzzing with claims of Len's guilt, the need to "send a message to hackers," and other claims that reinforced the legitimacy of charges and sanctions that still seem inappropriate. The fact that some still see it as a security case, others as a piracy case, others as justice-run-amok, and still others as a signal to examine the limits of criminalization illustrates the significance of the events: If we can't agree on the issues involved without yelling at each other, then how can we even begin to address the issues? CRAIG NEIDORF/PHRACK: When the prosecution dropped the case against Craig Neidorf for publishing alleged proprietary information valued at nearly $80,000 when it was found that the information was available to the public for under $14, most people thought it was a victory. However, the logic that impelled prosecution did not stop with Craig, and our concern continues to be over the apparent unwillingness of some law enforcement agents to recognize that this was not just a prosecutorial "mistake," but part of a pattern in which excessive claims are made to justify raids, indictments, or prosecution. THE HOLLYWOOD HACKER: Again, this is not a case of guilt or innocence, but one in which existing laws are sufficiently vague to over-criminalize relatively minor alleged acts. The apparent philosophy of prosecutors to "send a message" to "hackers" in a case that is not a hacker case but the sting of an investigative journalist seems another use of over-prosecution. There is also the possibility of a vindictive set-up by Fox of a freelance reporter who is alleged to have done what may be a common practice at Fox (see the post, this issue, citing Murray Povich). RIPCO: Dr. Ripco's equipment was seized and his BBS shut down, but no charges have been filed against him. He remains in limbo, his equipment has not been returned, and he still does not know why. Here, the issue of sysop liability, the reliability of informants, and the legal status of private e-mail are raised. THE "ATLANTA THREE:" The Riggs, Darden, and Grant case became an issue after the guilty verdict. We can think of no instance of anybody ever defending their actions for which they were indicted or in proclaiming them innocent after (or even before) their plea. At state in the debates was not that of guilt or a defense of intrusions, but of sentencing and the manner in which it was done. OPERATION SUN DEVIL: Operation Sun Devil, according to those participating in it, began in response to complaints of fraudulent credit card use and other forms of theft. The "hacking community" especially has been adamant in its opposition to "carding" and rip-off. Here, the issue was the intrusive nature of searches and seizures and the initial hyperbole of law enforcement in highly visible press releases in their initial euphoria following the raids. In an investigation that began "nearly two years" prior to the May 8, 1990 raids, and in the subsequent 12 months of "analysis of evidence," only two indictments have been issued. Both of those were relegated to state court, and the charges are, in the scheme of white collar crime, are relatively minor. There have also been questions raised about whether the evidence for prosecution might not have either already existed prior to Sun Devil or that it could have readily been obtained without Sun Devil. The key to the indictment seems to be a ubiquitous informant who was paid to dig out dirt on folks. For some, Sun Devil raises the issue of use of informants, over-zealousness of prosecutors, and lack of accountability in seizures. We fully agree that if there is evidence of felonious activity, there should be a response. The question, however, is how such evidence is obtained and at what social and other costs. Many may disagree with our perspective on these cases, but several points remain: 1) Each of them raises significant issues about the methods of the criminal justice system in a new area of law; 2) Each of them serves as an icon for specific problems (privacy, evidence, ethics, language of law, media images, sysop liability to name just a few); and 3) In each of them, whatever the culpable status of the suspects, there exists an avenue to debate the broader issue of the distinction between criminal and simply unethical behavior. Among the issues that, if discussed and debated, would move the level of discussion from personalities to common concerns are: 1. Overzealous law enforcement action: Prosecutors are faced with the difficult task of enforcing laws that are outstripped by technological change. Barriers to this enforcement include lack of resources and technical expertise, ambiguity of definitions, and vague laws that allow some groups (such as AT&T) who seem to have a history of themselves attempting to use their formidable economic and corporate power to jockey for legal privilege. Legal definitions of and responses to perceived inappropriate behavior today will shape how cyberspace is controlled in the coming decades. Questionable actions set bad precedents. That is why we refer to specific cases as ICONS that symbolize the dangers of over-control and the problems accompanying it. 2. Media distortions: This will be addressed in more detail in a future CuD, because it is a critically important factor in the perpetuation of public and law enforcements' misconceptions about the CU. However, concern for distortion should be expanded to include how we all (CuD included) portray images of events, groups, and individuals. Some law enforcers have complained about irresponsible media accuracy when the alleged inaccuracies have in fact come from law enforcement sources. But, media (and other) distortions of CU news is not simply a matter of "getting the facts straight." It also requires that we all reflect on how we ourselves create images that reinforce erroneous stereotypes and myths that in turn perpetuate the "facts" by recursive rounds of citing the errors rather than the reality. CuD AS PRO HACKER: The CuD moderators are seen by some as defending cybercrime of all kinds, and as opposing *any* prosecution of "computer criminals. Why must we constantly repeat that a) we have *never* said that computer intrusion is acceptable, and b) we fully believe that laws protecting the public against computer abuse are necessary. This, so I am told, "turns many people off." We have been clear about our position. There are occasions when discussion can reflect a variety of rhetorical strategies, ranging from reason to hyperbole. As long as the issues remain forefront, there seems nothing wrong with expressing outrage as a legitimate response to outrageous acts. 4. Crime and ethics in the cyber-frontier: These issues, although separate, raise the same question. Which behaviors should be sanctioned by criminal or civil penalties, and which sanctioned by collective norms and peer pressure? Unwise acts are not necessarily criminal acts, and adducing one's lack of wisdom as "proof" of criminality, and therefore sanctionable, is equally unwise. There are degrees of abuse, some of which require criminal penalties, others of which do not. The CU has changed largely because the number of computer users has dramatically increased make the "bozo factor" (the point at which critical mass of abusing bozos has been reached making them a group unto themselves) has a significant impact on others. There are also more opportunities not only to abuse, but to identify and apprehend abusers, which increases the visibility of the bozos. We can, as we did with the problems of crime, poverty, drugs, and other ills, declare a "war" on it (which most certainly means that we've lost before we've begun). Or, we can peruse a more proactive course and push for equitable laws and just responses to computer abuse while simultaneously emphasizing ethics. We fully agree that netethics should occur in schools, on the nets, in articles, and every other place where cybernauts obtain models and images of their new world. But, just as we should identify and work toward ethical behavior within the CU, we must also demand that others, such as AT&T, some law enforcement agents, BellSouth, et. al., do the same. It is hardly ethical to claim that a commodity valued at under $14 is worth over $79,000, and it is hardly ethical to compare possession of proprietary software with index crimes such as theft, arson, or embezzlement. Whether our own perspective is correct or not, the point is that what does or does not count as ethical behavior can no longer be assumed, but requires a level of debate the extends beyond netlynchings of individual suspects. Gene Spafford, like many others who share his view, is a productive and competent computer specialist who sees the dark side of computer abuse because he defends against it. I, like many others who share my view, see the dark side of law enforcement because, as a criminologist, I have been immersed in the abuses and fight against them. Our different experiences give us different demons to fight, an occasional windmill or two with which to joust, and a dissimilar arsenal that we use in our battles. Nonetheless, even though there is not total agreement on precisely which is a windmill and which a monster, Gene suggests that there is shared agreement on a minimal common reality and some common goals for making it more manageable. I fully, absolutely, and unequivocally agree with Gene: I agree that free speech should not be criminalized. However, I also think we should not hide criminal and unethical behavior behind the cry of "free speech. Promoting freedoms without equal promotion of the responsibility behind those freedoms does not lead to a greater good. If you cry "wolf" too often, people ignore you when the wolf is really there. I would only respond that his observation be taken to heart by all sides. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Thu, 18 Apr 91 16:57:35 EDT From: CERT Advisory <cert-advisory-request@CERT.SEI.CMU.EDU> Subject: CERT Advisory - Social Engineering ******************************************************************** *** CuD #3.14: File 4 of 6: CERT Advisory *** ******************************************************************** CA-91:04 CERT Advisory April 18, 1991 Social Engineering DESCRIPTION: The Computer Emergency Response Team/Coordination Center (CERT/CC) has received several incident reports concerning users receiving requests to take an action that results in the capturing of their password. The request could come in the form of an e-mail message, a broadcast, or a telephone call. The latest ploy instructs the user to run a "test" program, previously installed by the intruder, which will prompt the user for his or her password. When the user executes the program, the user's name and password are e-mailed to a remote site. We are including an example message at the end of this advisory. These messages can appear to be from a site administrator or root. In reality, they may have been sent by an individual at a remote site, who is trying to gain access or additional access to the local machine via the user's account. While this advisory may seem very trivial to some experienced users, the fact remains that MANY users have fallen for these tricks (refer to CERT Advisory CA-91:03). IMPACT: An intruder can gain access to a system through the unauthorized use of the (possibly privileged) accounts whose passwords have been compromised. This problem could affect all systems, not just UNIX systems or systems on the Internet. SOLUTION: The CERT/CC recommends the following actions: 1) Any users receiving such a request should verify its authenticity with their system administrator before acting on the instructions within the message. If a user has received this type of request and actually entered a password, he/she should immediately change his/her password to a new one and alert the system administrator. 2) System administrators should check with their user communities to ensure that no user has followed the instructions in such a message. Further, the system should be carefully examined for damage or changes that the intruder may have caused. We also ask that you contact the CERT/CC. 3) The CERT/CC urges system administrators to educate their users so that they will not fall prey to such tricks. SAMPLE MESSAGE as received by the CERT (including spelling errors, etc.) OmniCore is experimenting in online - high resolution graphics display on the UNIX BSD 4.3 system and it's derivatives [sic]. But, we need you're help in testing our new product - TurboTetris. So, if you are not to busy, please try out the ttetris game in your machine's /tmp directory. just type: /tmp/ttetris Because of the graphics handling and screen-reinitialization [sic], you will be prompted to log on again. Please do so, and use your real password. Thanks you for your support. You'll be hearing from us soon! OmniCore END OF SAMPLE MESSAGE If you believe that your system has been compromised, contact CERT/CC via telephone or e-mail. Computer Emergency Response Team/Coordination Center (CERT/CC), Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890 412-268-7090 24-hour hotline: CERT/CC personnel answer 7:30a.m.-6:00p.m. EST, on call for emergencies during other hours. E-mail: cert@cert.sei.cmu.edu Past advisories and other computer security related information are available for anonymous ftp from the cert.sei.cmu.edu (128.237.253.5) system. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Anonymous <xxx.xxxx.COMPUSERVE.COM>M> Subject: And Fox is after the Hollywood Hacker? Date: 23 Apr 91 05:12:22 CDT ******************************************************************** *** CuD #3.14: File 5 of 6: Fox and the Hollywood Hacker *** ******************************************************************** Fox's assault on the Hollywood Hacker gets even more bizarre. First one of their camera people is busted with a weapon by the Secret Service when they found him near President Bush, and now Murray Povich has come out with his book that makes us wonder what goes on inside the corporate board rooms, bedrooms, and computer rooms. If what Povich says is true, it seems that some of these tabloid tv types routinely bustle around spying and snooping, but when somebody turns the tables the scream and yell. Consider this from "Current Affairs: A Life on the Edge" by Maury Povich with Ken Gross. Published 1991 by GP Putnam's Sons. Chapter 14, pgss 207-208. "The launch date for 'Inside Edition' was January of 1989 and we went shopping around the satellites, trying to find out what stories they were going to do. That's how shows worked--they fiddled around with frequencies and latched onto the communications channels and listened in on the shop talk. It was spying. We all did it, switching around the dials, trying to pick up their satellite, pointing the transponders to find their bird so we could listen to their teleconferences and their stations, trying to winkle out what stories they were after. They were also doing the same thing to us, because they knew how we worked and it was part of the game. Young and Tomlin were not there for nothing. I knew 'Inside Edition' was into our computer because that's the way it is. Maybe it's illegal, but that's the 'Front Page' mentality." Throughout the entire book, Povich brags about the many and sundry ploys, devious tactics, and outright lies used by Current Affair staffers to get material (tapes and/or interviews) for their show. He constantly puts down the stuffed-shirt/establishment news types and makes he and his minions out to be heroic characters-- pioneers of a newer, braver school of journalism. "Killer journalists of the nineties," he calls them. Their battle cry: "Maybe it's not ethical, mate, but it's legal." (pg 254). I thought that maybe inquiring minds would want to know. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: MONDO -- GREAT NEW 'ZINE! Date: 10 Apr 91 01:24:08 EDT ******************************************************************** *** CuD #3.14: File 6 of 6: MONDO -- Great new 'Zine! *** ******************************************************************** After hearing many good things about a magazine called "Mondo 2000" we were pleased to finally locate a copy on a SF Bay area newsstand. In the interest of helping to spread the word about this very interesting publication we pres-ent a brief overview of the Winter 1991 issue. "Mondo 2000" (issue 3), from Fun City MegaMedia, is a sort of cyper-punk/PoMo/Discordian publication covering diverse (and fascinating) topics such as designer drugs, a Congressional assault on the Constitution, growth hormones, cybernetic jewelry, House Music, computer graphics, Frank Zappa's political ambitions, interviews with Debbie Harry, Tina Weymouth & Chris Franz, and cracking Macintosh software. There is a lot of material here (about 175 pages all total) and there is sure to be something to interest most anyone. The "reader mail" column indicates that past issues have covered vir-tual reality, UFO's, and The Church of the Sub-Genius. In addition the above topics, issue three also contains a number of articles of direct relevance to CuD. Namely, articles on the LoD, EFF, and the CU in general. [How's that for a plethora of acronyms in one sentence?! -GRM] In the "Hackers and Crackers" section we find the following selections: * "Do G-Men Dream of Electric Sheep?" by R.U. Sirius and George Gleason (pp 40-43) This article essentially presents a time line of CU related events beginning with Hackers' 4.0 misrepresentation by CBS, thru the Internet worm, NuPrometheus, Operation Sun Devil, and Zod's bust. In all, 22 of some of the most significant events are chronicled and the article serve as a handy, and disturbing, summary of the last couple of years. * "Civilizing the Electronic Frontier: an interview with Mitch Kapor and John Barlow of the Electronic Frontier Foundation" by David Gans and R.U. Sirius (pp45-49) Kapor and Barlow discuss the FBI's investigation of the NuPrometheus League, the origin of the EFF, and the future of the law and cyberspace. * "Synergy Speaks: Goodbye Banks, Goodbye Telephones, Goodbye Welfare Checks" by Michael Synergy (pp 51-54) A self-professed cyberpunk offers brief comments on a variety of topics such as viruses, blackmail, the EFF, modern justice, criminal evidence, and many more. Synergy's comments aren't in depth, but present views on a wide enough selection of topics for someone un-familiar with the movement to get an idea of the cyberpunk philosophy. * "Freaked by Phrack: an interview with Craig Neidorf" by John Perry Barlow (pp 55-56) An extract from on online interview with Neidorf, former publisher of Phrack, Inc. Neidorf discusses the nature of Phrack, his trial, and effect it has had on his life. * "A Message to You From Legion of Doom Member 'The Mentor'" by The Mentor (p 58) An edited version of "The Conscience of a Hacker" or "Hacker Manifesto" as widely published in Phrack, CuD, Thrasher, and a number of other places. * "On the Road to Chaos in East Berlin" by Morgan Russell (pp 60-63) A gonzo-esque account of the Chaos Computer Club Kongress in East Berlin. Also mentions the squatters' movement and The Foundation for the Advancement of Il-legal Knowledge (AKILKNO). * "The Worlds Oldest Secret Conspiracy: Fronted by Steve Jackson Games, Inc." by Gareth Branwyn (pp 64-67) An interview with Steve Jackson, concern-ing his business and Secret Service raids brought about by _GURPS Cyberpunk_. An excerpt from the book is included. * "Guess Work: an interview with August Bequai" by Gareth Branwyn (pp 70-71) This is a particularly enlightening interview with Bequai, a well-published expert of computer crime. Although brief, Bequai has some 'inter-esting' things to say. Here are some excerpts, in the same question/answer format found in the original article: Mondo: ...what do you think about the criticism that, with Operation Sun Devil, they've [the feds] unconstitutionally confiscated equipment such as public bulletin boards? This sort of thing has struck fear in the hearts of many systems operators. The seizure of the Steve Jackson Games BBS is a case in point. They were, by the admission of the Secret Service, not the target of the investigation. And yet their BBS was confiscated. Bequai: Then they have the option to go to court and challenge it. We have laws and legal system, and they work! Mondo: If you have the resources! Bequai: You don't necessarily need a lot of resources. It doesn't take a heck of a lot of money to go to court and challenge some of these things. Mondo: You're telling me it doesn't take a lot of time and money to challenge the US Secret Service!? Bequai: No sir, it does not. If you hire a small firm, no. [...] Mondo: What sort of groups do you lecture to: Bequai: Computer professionals, security professionals, executive-types, management-types, supervisors, lawyers, government officials. Mondo: In a recent speech, you stated that "Millions of Americans find themselves the victims of computer crimes" and "The public is called upon to pick up the tab for billions of dollars in annual losses...at the hands of computer criminals, hackers, and pranksters." [...] Where did you get those figures? Bequai: Oh, that's just guess work. White collar crime runs in excess of a hundred billion dollars. My sympathy goes to the public. I'm not so in-terested in technophiles who think they have an inherent right to do whatever they feel. I'm concerned for the average Joe Blow American. Bequai is an oft-quoted expert when anti-CU types discuss the hacker underground. This article was particularly insightful, and in many ways makes the pursuit of MONDO 2000 worthwhile in and of itself. * "Phreaks R Us: an interview with hacker publishers Emmanuel Goldstein of 2600 and Rop Gonggrijp of Hack-Tic" by R.U. Sirius and George Gleason (pp 74-76) Goldstein and Gonggrijp discuss their journals, the CU movement, and freedom of information. In conclusion, MONDO 2000 (issue 3) is worth searching out. It is a more than worthy successor to Reality Hackers, and offers many articles of interest. It is one of the most fascinating and refreshing publications to hit the stands, and will be very enjoyable to any CU-attentive individual. Mondo 2000 (published quarterly) (subscriptions) Fun City MegaMedia PO Box 10171 Berkeley, CA 94709-5171 USA (correspondence) PO Box 40271 Berkeley, CA 94704 Fax: 415.649.9630 MCI Mail: MONDO2000 $24.00 (US) for 5 issues ******************************************************************** ------------------------------ **END OF CuD #3.14** ********************************************************************