Computer underground Digest Sun Aug 9, 1992 Volume 4 : Issue 35 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Copy Editor: Etaion Shrdlu, III Archivist: Brendan Kehoe Shadow-Archivist: Dan Carosone CONTENTS, #4.35 (Aug 9, 1992) File 1--Pack your bags -- Cud's moving! File 2--What's a "CuD?" File 3--Re: Another View of Bellcore vs. 2600 File 4--Re: SURVEY: Is Big Brother Watching You? File 5--BellSouth Shareholders Note File 6--'Pirate' is PC? File 7--"Piracy:" Overstated? (Chic Tribune summary) File 8--'Zine Watch - 2600 and Boardwatch File 9--*NO MORE CHICAGO TRIBUNE ARTICLES* Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT libraries; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au European distributor: ComNet in Luxembourg BBS (++352) 466893. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Sat, 8 Aug 1992 02:47:19 -0500 (CDT) From: chip@CHINACAT.UNICOM.COM(Chip Rosenthal) Subject: File 1--Pack your bags -- Cud's moving! Those who receive CuD via Usenet probably know the news by now: the %comp.society.cu-digest' vote is over and the newsgroup has been approved. This is good news -- even to the non-Usenet readers. Moving CuD out of the anarchistic %alt' hierarchy and into the mainstream %comp' distribution potentially brings a lot of new readers into the fray. (It also somehow gives an added air of legitimacy to the CuD.) A summary of the voting results appears towards the end of this message. There will be another week or two for the voting results to be reviewed before comp.society.cu-digest is actually created. If you are a Usenet reader who could not receive the CuD via alt.society.cu-digest, I urge you to drop your mailing list subscription once comp.society.cu-digest is operational. Yes, you will receive your CuD in the handy, easy-to-read Usenet format, without a single word edited, modified, or expunged! By switching over to Usenet you will save wear and tear on both our network bandwidth and our esteemed editors. If you are a Usenet administrator -- or know somebody who is a Usenet administrator or aspire to someday become a Usenet administrator :-) please note the following: * The name of the new newsgroup will be %comp.society.cu-digest'. * The newsgroup will be moderated, and the address for submissions will be the CuD editors at <tk0jut2@mvs.cso.niu.edu>. * If you maintain a %mailpaths' file, please ensure you update it properly. * Once the new newsgroup is operational, the CuD will be cross-posted into both %comp.society.cu-digest' and %alt.society.cu-digest' for a period of approximately one month. This will give Usenet administrators and CuD readers a chance to switch over. * After that one month period, the %alt.society.cu-digest' newsgroup will be decommissioned. * Please do NOT alias the old name to the new name. The proposed changeover strategy should alleviate any such need. Thanks to all who participated in the vote. If you have any questions or concerns about the newsgroup vote or the Usenet gateway, feel free to drop me a line. Here are the final voting results: PROPOSAL: comp.society.cu-digest CHARTER: The Computer Underground Digest (moderated) SUMMARY: This newsgroup will be used to distribute the Computer Underground Digest. The CuD is an open forum for issues relating to the phenomena of computer cracking. It has been in publication since 1990, and is widely distributed in a number of electronic forms. The CuD has been distributed via alt.society.cu-digest. The alt.society.cu-digest newsgroup will be decommissioned once the new newsgroup is stable. === OFFICIAL VOTE TALLY === Total Votes Cast: 263 Valid Votes Cast: 260 Ambiguous Votes: 3 (excluded from count) Yes Votes: 247 (95.00% of valid votes) No Votes: 13 (5.00% of valid votes) Yes-No Margin: 234 Percentage Test: pass (is yes/valid >= 66.67%?) Margin Test: pass (is yes-no >= 100?) VOTE RESULT: PASS (do both tests pass?) === TOP TEN VOTING DOMAINS === 6 ac.uk 5 umd.edu 5 orst.edu 4 syr.edu 4 mit.edu 4 il.us 4 eff.org 4 cmu.edu 3 upenn.edu 3 uio.no === DISTRIBUTION OF VOTES RECEIVED === 7/13 9 ***** 7/14 86 **************************************** 7/15 29 ************** 7/16 10 ***** 7/17 6 *** 7/18 5 *** 7/19 5 *** 7/20 8 **** 7/21 23 *********** 7/22 17 ******** 7/23 5 *** 7/24 3 ** 7/25 3 ** 7/26 0 * 7/27 1 * 7/28 6 *** 7/29 18 ********* 7/30 10 ***** 7/31 8 **** 8/01 2 * 8/02 5 *** 8/03 2 * 8/04 2 * -- Chip Rosenthal 512-482-8260 | Let the wayward children play. Let the wicked Unicom Systems Development | have their day. Let the chips fall where they <chip@chinacat.Unicom.COM> | may. I'm going to Disneyland. -Timbuk 3 ------------------------------ Date: Sat, 8 Aug 1992 09:23:01 (CDT) From: CuD Moderators <tk0jut2@mvs.cso.niu.edu) Subject: File 2--What's a "CuD?" With the change to comp.society.cu-digest, we assume that newcomers may not know what a "CuD' is. This seems like a good time to respond to the FAQs (for newbies, "frequently asked questions"). We've ignored some of the irrelevant ones (like "why doesn't Thomas cut his ponytail" --he did, sort of), and "Yo, d00dz, got any good codez?" (sigh). If we've missed any serious questions, let us know and we'll try again. WHAT IS CuD? Cu-Digest, or CuD, is a weekly on-line electronic journal/news forum. CuD began at the suggestion and encouragement of Pat Townson (moderator of Telecomm Digest) in March 1990. The federal indictments of Craig Neidorf (in the "PHRACK case" in Chicago) and Len Rose (in Baltimore) generated more posts than Pat could manage, and the nature of posts exceeded his Digest's Usenet charter. Jim Thomas and Gordon Meyer volunteered to collect the surplus posts, and Pat helped get it started. It was originally conceived as an interim forum that would quietly depart after a few months. Volume 1, in fact, was originally intended as the first and final volume in August '92, but a week later Volume 2 appeared because of the continuous material. As of this writing, CuD is publishing Volume 4. Each issue is about 40 K. WHAT IS THE GOAL OF CuD? The broad goal of CuD is to provide a forum for discussion and debate of the computer telecommunications culture. This culture especially includes, but is not limited to, the unique world of BBSes, Internet, and public access systems. We focus especially on alternative gropus that exist outside of the conventional net community. We try to focus on a broad range of issues that include news, debates of legal, ethical, and technical issues, and scholarly research of relevance to a broad audience of professionals and lay persons. Other than providing a context for an article if necessary, the moderators *do not* add commentary of agreement or disagreement. We see our role as one of facilitating debate, although we will do take part in discussions in separate articles. WHO EDITS CUD? Gordon Meyer and Jim Thomas publish CuD from Northern Illinois University. Gordon Meyer's MA thesis, "The Social Organization of the Computer Underground", was the first systematic attempt to place the social world of "phreaks, hackers, and pirates" in a context that looked at the culture, rather than the "deviance", of alternative uses of computer use. Gordon is currently a system engineer with a large national firm in the Chicago area. Jim Thomas, a professor of sociology/criminology at Northern Illinois University, is a prison researcher and qualitative methodologist. Gordon lured him into the "underground" world 1987, and he has since become interested in the legal and cultural issues of computer use. WHY THE LABEL *UNDERGROUND*? For some, the term underground connotes malice and a dark side of human activity. For others, including the CuD editors, it denotes alternative or unconventional activity. Like the "underground," or "alternative" press of the counterculture of the 1960s, the "computer underground" refers to types of behavior or characteristics of a subculture that are unique, cohesively identifiable, possessing norms, roles, and social expectations that define participants, and are considered socially marginal by the dominant culture. Like the term "hacker," there were originally no negative connotations associated with "underground" when the term was first used. The name "Computer underground Digest" was suggested with a bit of irony prior to the first issue (how, after all, can a conventional digest that is publicly accessible be "underground?"), and the name stayed. Early discussions to change the name seemed impractical once the "CuD" monogram was established, and the name stands. IS CuD "PRO-HACKER?" The term "hacker" has been grossly distorted by the media and law enforcement personnel, who use it synonymously with "computer intruders." CuD editors have repeatedly stated their own opposition to all forms of predatory and malicious behavior, including malicious computer intrusion. We accept Bob Bickford's definition of a "hacker" as someone who derives joy from discovering ways to exceed limitations. Hackers, in the original sense, referred to explorers who solved problems and exceeded conventional limits through trial and error in situations in which there were no formal guidelines or previous models from which to draw. In this sense, CuD is quite "pro-hacker," and we prefer the term "cracker" for malicious practitioners of the hacking craft. Exploration is good, predation is not. However, CuD encourages articles from all perspectives and attempts to provide a forum for reasoned discussion on all sides of an issue. CuD is against predatory behavior by any group, whether computer enthusiasts or those who oppose them. CuD is for civil liberties and for civilizing the electronic frontier by securing rights assumed in other social realms and by advocating protection from all forms of abuse. Like rock 'n Roll and Richard Nixon, the computer underground culture has not, and will not likely soon, go away. It has become an entrenched part of computer culture. CuD attempts to document the computer culture and ease the transition as the culture moves toward the mainstream with articles that bridge the cultural gaps as telecomputing becomes an increasingly important part of daily life. The political, legal, economic, and social impact of changes in the new technology is poorly covered elsewhere. We see our goal as addressing the impact of these changes and providing alternative interpretations to events. WHAT KINDS OF THINGS DOES CuD PUBLISH? We encourage submissions on a broad range of topics, from articulate short responses and longer opinion pieces to book reviews, summaries of research, and academic papers. We especially encourage: 1. Reasoned and thoughtful debates about economic, ethical, legal, and other issues related to the computer underground. 2. Verbatim printed newspaper or magazine articles containing relevant stories. If you send a transcription of an article, be sure it contains the source *and* the page numbers so references can be checked. Also be sure that no copyright protections are infringed. 3. Public domain legal documents (affidavits, indictments, court records) that pertain to relevant topics. 4. General discussion of news, problems, or other issues that contributors feel should be aired. 5. Unpublished academic papers, "think pieces," or research results are strongly encouraged. These would presumably be long, and we would limit the size to about 800 lines (or 40 K). Longer articles appropriate for distribution would be sent as a single file and so-marked in the header. 6. Book reviews that address the social implications of computer technology. 7. Bibliographies (especially annotated), transcripts of relevant radio or television programs (it is the poster's responsibility to assure that copyrights are not violated), and announcements and reports of relevant conferences and conference papers are strongly encouraged. 8. Announcements for conferences, meetings, and other events as well as summaries after they've occured. 9. Suggestions for improvement, general comments or criticisms of CuD, and ideas for articles are especially helpful. Although we encourage debate, we stress that ad hominem attacks or personal squabbles will not be printed. Although we encourage different opinion, we suggest that these be well-reasoned and substantiated with facts, citations, or other "evidence" that would bolster claims. Although CuD is a Usenet group, it does not, except in the rarest of cases, print post-response-counterresponse in the style common among most other groups. HOW CAN I PUBLISH IN CUD? To submit an article, simply send it to the editors at tk0jut2@mvs.cso.niu.edu. If you receive CuD on Usenet, you can reply (using the F or f commands) and your response will come directly to the editors and will not be distributed across the nets. If you do not have an article, but know of people who do, encourage them to send their work along. Although CuD is a forum for opposing points of view, we do prefer that articles a) be written in English, b) make sense, and c) are not out-dated. Submissions should be formatted at 70 characters per line and should include a blank space separating individual paragraphs. Submissions may be edited for spelling and format, but no other changes are ever intentionally made without permission. Sigs are also removed to save bandwidth. WHO READS CuD? As a conservative estimate, CuD reaches about 30,000 to 35,000 readers each issue. According to monthly Usenet statistics, CuD averaged about 23,000 readers a month on alt.society.cu-digest. We estimate another 3,000 from the mailing list and feeds into various systems. BBS readership, judging from non-scientific sysop feedback, constitutes at least another 5,000, and public access systems (Peacenet, America Online, GEnie, CompuServe) constitutes the rest of domestic readership. Our figures do not include substantial European, Australian, or ftp distribution. Judging from a survey we took in 1990 and from the feedback we receive from readers, CuD readers cut across occupational, ideological, and age lines. The overwhelming majority (about 80 percent) of the readership is college graduates About half is computer professionals or in related fields. The remaining half is distributed among a variety of professions (attorneys, journalists, academicians, law enforcement, students) and territory (the mailing list includes every continent except Asia and all west European countries). HOW DO I RECEIVE CuD? If you're reading this, you've already received it, and most likely you can just keep doing whatever you did to get it. If you aren't sure what you did, you can do any of the following: CuD is *FREE*. It costs nothing. The editors make no profit, we take no money, we accept no gifts (but we drink Jack Daniels and lots of it, should you run into us in a pub). To receive CuD, you can access it from many BBSes and most public access systems. Or, if you have Usenet access, you can obtain it by subscribing through your local system to comp.society.cu-digest. If you do not have Usenet access, you can be placed on a mailing list by dropping a short note to: tk0jut2@mvs.cso.niu.edu with the subject header: SUB CuD and a message that says: SUB CuD my name my.full.internet@address ------------------------------ Date: Sun, 2 Aug 92 23:43 PDT From: john@ZYGOT.ATI.COM(John Higdon) Subject: File 3--Re: Another View of Bellcore vs. 2600 In Digest #4.34, Thomas Klotzbach gives a reasoned and rational view of the responsibility of a free press as it relates to the computer underground and specifically to the matter of recent publications by 2600 of Bellcore material. I could agree with every point except for the fact that Mr. Klotzbach makes an invalid assumption upon which hangs the balance of his piece. His assertion (and I assume his belief) is that Bellcore has conducted its business in good faith and corrected "holes" and shortcomings in a timely manner. Nothing could be further from the truth. Since the days of "The Bell System", AT&T and the Bell Operating Companies have been grossly negligent in the matter of security. It would be my guess that the term, "Security Through Obscurity", originated with Ma Bell. Rather than create systems that used password security or handshaking protocols, "the phone company" merely relied on the (mistaken) idea that the public was too removed from the technical workings of the nationwide telephone network to be a "threat" to the billing or privacy integrity of the system as a hole. The classic example is the use of inband signaling which provided hundreds, if not thousands of enthusiasts (for want of a better euphemism) the ability to travel around the world on Ma Bell's dime. These people could literally control the network because of a serious, inherent flaw built into the system. The band-aid fixes were too little, too late and network security was severely compromised until the inband signaling was replaced with CCIS and its progeny. The Busy Verify Trunk and No. Test Trunk holes, which are the focus of the 2600 fracas, are just a portion of dozens of similar such vulnerabilities in our national telephone network. Those of us who are intimately familiar (for legitimate reasons) with this network have known about these things for a long, long time. I, for one, would like to see them plugged. If the 2600 article manages to get one of them out of the way, more power to it. But the policy of "The Bell System" and now Bellcore and the RBOCs seems to be to do nothing about any such problems and wait for some phreak to get caught with a hand in the cookie jar. After all, why bother to fix something if it is not a problem (yet)? It can become a problem (or an embarrassment) in one of two ways. A publication such as 2600 can publicize the vulnerability situation; or someone can be caught taking advantage of it. In either case, Bellcore swings into action. For the former, threats of civil action for the publication of "proprietary" data does the trick. In the latter case, it simply hauls the perpetrator into court and garners as much publicity as possible. This has the dual purpose of intimidating others who may follow suit, and it obscures the fact that the whole problem was caused by Bellcore's own negligence. It has been my experience in cases brought against accused phreaks that the prosecutors have not a clue what constitutes sensitive material. Bellcore exploits this to the hilt when it uses the long arm of the law in lieu of properly imbedded security features. Just ask Craig Neidorf. In all fairness, that particular incident involved an RBOC trying to fry Craig for something Bellcore was readily selling over the counter. And Bellcore is certainly not the only entity in the nation, or perhaps the world, that gives security less than prime consideration, just "hoping" that whatever is slapped together will be good enough. But just because a practice may be widespread does not make it legitimate. The press has the right, nay the responsibility, to put these issues before the public eye. We as a society have long since progressed beyond the notion that there are just some things about which people should not know, care, or ask. Security through obscurity no longer can work in an enlightened society. A system or network is not safe if the only thing keeping people out is the fact that a trivial entry procedure is not widely known. Unfortunately, much of the nation's telephone network can still be thusly described. If the only way to get these holes plugged is to publicize them and literally force Bellcore and the RBOCs to do their duty, then so be it. If prestigious organizations such as Bellcore suffer a little embarrassment along the way, just consider that the market force at work. ------------------------------ Date: Tue, 04 Aug 92 07:25:55 -0400 From: (Lorrayne Schaefer) <lorrayne@SMILEY.MITRE.ORG> Subject: File 4--Re: SURVEY: Is Big Brother Watching You? ((MODERATORS' NOTE: As previous posts in CuD demonstrate, computer privacy in the workplace has become an important issue in the past year. Lorrayne Schaefer has been active in collecting data to enable a specific assessment of the types of policies currently in place in the public and private sectors. CuD will summarize the results of her findings when completed.)) The purpose of this survey is to collect data for a presentation that I will give at this year's National Computer Security Conference in October. I would like to thank you for taking the time to fill out this survey. If you have any questions, you can call me at 703-883-5301 or send me email at lorrayne@smiley.mitre.org. Please send your completed survey to: Lorrayne Schaefer The MITRE Corporation M/S Z213 7525 Colshire Drive McLean, VA 22102 lorrayne@smiley.mitre.org This survey has been posted on some newsgroups a few months ago. This survey has also been distributed to various conferences over the past few months. All results will be in the form of statistical information and keywords. All participants will remain anonymous. If you have responded to this survey, I give you my thanks. I cannot get a realistic enough picture without those who have spent some time answering these questions. For those who are responding to this survey now, thank you. SURVEY: MONITORING IN THE WORKPLACE 1. What is your title? 2. What type of work does your organization do? 3. Does your organization currently monitor computer activity? (Yes/No) a. If yes, what type of monitoring does your company do (e.g., electronic mail, bulletin boards, telephone, system activity, network activity)? b. Why does your company choose to monitor these things and how is it done? 4. If you are considering (or are currently) using a monitoring tool, what exactly would you monitor? How would you protect this information? 5. Are you for or against monitoring? Why/why not? Think in terms of whether it is ethical or unethical ("ethical" meaning that it is right and "unethical" meaning it is wrong) for an employer to monitor an employee's computer usage. In your response, consider that the employee is allowed by the company to use the computer and the company currently monitors computer activity. 6. If your company monitors employees, is it clearly defined in your company policy? 7. In your opinion, does the employee have rights in terms of being monitored? 8. In your opinion, does the company have rights to protect its assets by using a form of monitoring tool? 9. If you are being monitored, do you take offense? Managers: How do you handle situations in which the employee takes offense at being monitored? 10. What measures does your company use to prevent misuse of monitoring in the workplace? 11. If an employee is caught abusing the monitoring tool, what would happen to that individual? If your company is not using any form of monitoring, what do you think should happen to an individual who abused the tool? 12. Is it unethical to monitor electronic mail to determine if the employee is not abusing this company resource (e.g., suppose the employee sends personal notes via a network to others that are not work related)? Why or why not? ------------------------------ Date: Mon, 3 Aug 92 21:03:26 PDT From: Anonymous@CUP.PORTAL.COM Subject: File 5--BellSouth Shareholders Note ((Thought you might be interested in the following text from the BellSouth shareholder report. -ANON-)) Urgent Appeal To BellSouth Shareholders The range of consumer choices, along with the future growth opportunities of BellSouth and the other Bell holding companies, would be sharply limited by H. R. 5096 - the "Brooks bill." This legislation is being pushed through Congress by giant media corporations as a means of keeping competition out of their lines of business. PLEASE WRITE YOUR REPRESENTATIVE TODAY, EXPRESSING YOUR OPPOSITION TO H. R. 5096. KEY POINTS TO MAKE WITH YOUR REPRESENTATIVE: The Brooks bill must be stopped because it would: 1. deny consumers access to a rich array of information services 2. hurt domestic employment and 3. stifle competition. To obtain the name of your representative, call the U. S. Capitol at 202-224-3121. Mail your letter to your representative at U. S. House of Representatives, Washington, DC 20515. For more about the Brooks bill, see pages 1 and 7 of this newsletter, and/or mail the enclosed card. You may also call 1-800-522-2355, ext. 44. Thank you for helping BellSouth preserve its right to compete. Dear Shareholders: We had a strong second quarter. Earnings increased 26 percent, driven by growth in both our telephone and cellular businesses, and by continued cost control. But the good quarterly results were clouded by a discriminatory bill that is moving through the U.S. House of Representatives this summer. And we need your help to defeat it. BILL WOULD HURT CONSUMERS H.R. 5096, also known as the "Brooks bill," would effectively legislate BellSouth and the other Bell holding companies (BHCs) out of promising areas of growth in the industry we know best. It would do this by enacting into law three of the line of business restrictions imposed by the courts at divestiture - including information services, which the courts already have allowed us to enter. The bill is bad for customers, shareholders and employees. Customers would be deprived of many new services that could improve their quality of life. In fact, because BellSouth already has information services in operation, our customers stand to have the door slammed in their faces when it comes to enhancing and expanding existing services. The Brooks bill would hurt shareholders, primarily because it severely limits our ability to increase the uses - and, therefore, the value - of the sophisticated network your capital has helped build. LET CONGRESS KNOW WHERE YOU STAND What can you do? Write or call your Representative in the U.S. House. Tell him or her that you. as someone with a substantial stake in BellSouth. oppose H.R. 5096 because the bill is anti-jobs, anti-consumer and anti-competitive. I know many of you already have written to Congress because you sent me copies of your letters. But this issue is so critical to you, our owners. that I am asking you to write again. You can affect what Congress does. and you can take action to protect your investment in BellSouth. Please add your voice to that of the Communications Workers of America (CWA) and hundreds of other groups who oppose the Brooks bill. Write your Representative now. and if you would also like to receive a briefing package on this legislation, please return the enclosed postcard. or call 1-800-522-2355, ext. 44. BellSouth and the CWA aren't afraid to compete for the customer's business.and we shouldn't be denied the opportunity to do so. ======================================================================= Positioning BellSouth for the Future Excerpts from Chairman John Clendenin's remarks at the annual shareholder's meeting in April. "1991 was an extraordinary year in terms of positioning BellSouth for the future. What we're seeing is the natural evolution of a totally flexible new generation of telecommunications technology, and the freeing of people from the communication umbilical cord that has tied them to the office or the home." "It's our conviction that the ability to combine wireless and wireline skills - often in partnership with others - will serve our customers, and hence our owners best." "We're looking at our core telephone network in new ways, including the philosophy of how we use it. We aim to grow our business by making our core telephone intelligent network attractive for other information providers to use. We're looking at ways to deliver more services in joint efforts with others." "RAM Mobile Data puts us on the forefront of another promising market - wireless data transmission. Ultimately, this new technology's growth is expected to parallel the explosive growth of cellular. There are an estimated 10 million potential mobile data users in the U. S. alone." "We are on the leading edge of technology, and we are absolutely committed to staying there. Overseas and here in the U. S. we're setting the pace in developing all the technical and other skills it takes to give customers whatever it takes to communicate, whenever and wherever they want to." "As competitors take local exchange business from us, we have to regain the freedom to get into other areas. Keeping our freedom to provide sophisticated information services, such as distance learning, is our top priority. Eventually, these will be very important markets for us. But some powerful interests, particularly some big media companies that own newspapers and cable TV operations don't want us in information services, and they're lobbying Congress to take away the freedom we've gained from the courts. If they have their way, BellSouth will be kept away from a big portion of the growing telecommunications pie in this exploding Age of Information." "I've got a request: Write your U. S. Representative and your U. S. Senators. Let them know that BellSouth, the other Bell holding companies and America's consumers, shouldn't be denied information services to protect the financial interests of those big media companies. Tell them you oppose H. R. 5096, called the Brooks bill." ------------------------------ Date: 28 Jul 92 16:54:14 EDT From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 6--'Pirate' is PC? "Texas and the Pirates" With all the publicity computer pirates have been getting lately - what with teenagers nonchalantly tapping into credit-card databases from their bedrooms and bands of foreign technophiles looking for vulnerable spots in computer networks that require high-level clearance to access - security firms are going all out to market their expertise to the nervous masses. % info about the June Computer Security Institute conference deleted.% The two-day conference includes seminars on topics such as "Securing the Simple Network Management Protocol" and "Protecting Against LAN Viruses." To the astute security observer, however, the title of one session - "Hackers and Your Network" - would certainly cause a gasp. As all politically correct technophiles know, hackers are legitimate computer enthusiasts; "computer pirates," by contrast, are those involved in technothievery. Excerpted from the June 1, 1992 issue of INFORMATION WEEK, who should know better. ------------------------------ Date: Sun, 9 Aug 1992 10:05:58 (CDT) From: CuD Moderators <tk0jut2@mvs.cso.niu.edu) Subject: File 7--"Piracy:" Overstated? (Chic Tribune summary) Summary from: "Yes, Piracy's Illegal, But not the Scourge it's Cracked up to be" Chicago Tribune, August 9, 1992 (Section 7, p. 7) By T.R. Reid and Brit Hume Sunday Tribune computer columnists Reid and Hume challenged what they call one of the software industry's "periodic public relations campaigns to get people to believe it's being robbed blind by software pirates." They poked a bit of fun at a New York Time's front page story dramatizing the "scourge," noting that the industry's claim that pirates steal up to half of the annual total sales of $5.7 billion is "almost certainly rot. The $2.4 billion estimate of purloined software apparently comes from a figure given out by the SPA (Software Publisher's Association) in 1990. The SPA has increased this figure dramatically in 1992 (see next issue of CuD). As Reid and Hume correctly comment, "there is simply no way the software industry can estimate accurately how many illegal copies there are, and even if it could, it couldn't possibly determine how many of them represent lost sales." Reid and Hume continue, making several points that pirates would agree with: 1. If you use a program, you should pay for it. Reid and Hume are a bit more adamant in their claim that that it's *not* ok to pirate software (a point on which pirates take exception). But, there is strong consensus among "elite" pirates that, as Reid and Hume argue, "it's particularly dishonest to use a stolen program for commercial purposes." Elite pirates might phrase it a bit differently: "Bootleggers are scum." 2. Sharing software can enhance sales. Reid and Hume argue that those who obtain an unpurchased copy of software that they like and use may find updates, instructions, and on-line help well worth the purchase. They also note that the shareware concept, based on free distribution of programs, has thrived and has made programmers quite successful. (See the September, '92, issue of Boardwatch Magazine, for a story on software industry awards). 3. They, as do most elite pirates, strongly condemn the practice of copying an authorized program in a business and sharing it around to avoid the site license fees. 4. The pre-purchase use of software is "not such a bad thing" because it can help sales. It also provides users a chance to compare the most expensive programs, such as word processors, databases, spread sheets, and graphics programs, all of which are major expenditures for most users. It makes no sense to spend $480 to purchase dBase when Foxbase may be more suited to one's needs. The columnists fall short of advocating responsible piracy, and they make it clear that they oppose unauthorized copying for profit or "free use" simply to avoid paying for a product that will be used. But it is refreshing to see the mainstream press begin to challenge the claims, and hopefully eventually the practices, of the SPA and others who associate "piracy" with "theft" and would rather criminalize the practice rather than take a more prudent approach to creative software sharing. ------------------------------ Date: Sat, 8 Aug 1992 19:41:09 (CDT) From: CuD Moderators <tk0jut2@mvs.cso.niu.edu) Subject: File 8--'Zine Watch - 2600 and Boardwatch 2600: The Hacker Quarterly--The Summer, '92 (Vol 9, #2) issue is out and includes articles on defeating *69 (automatic return call), a summary of the recent MOD indictments and a critique of its media coverage, Bellcore's plans for caller ID, a demon dialer review, and much more. Perhaps the best piece is by an anonymous government official who, while not in any way justifying or glorifying "hacking," makes a strong case that if security and law enforcement personal would attempt to understand, rather than demonize, their "enemy," they would be far better at their jobs and reduce some of the tensions that exist between the two communities. Information on 2600 can be obtained at 2600@well.sf.ca.us Boardwatch: It gets slicker and better each issue. It's moving from simply "very good" to "dynamite!" At $36 for 12 issues, it's a bargain for serious modemers. The September issue includes the usual "Tele-bits" and "Internet News" features, along with the BBS numbers, ads that are actually fun to read, and a summary of the SIA Industry Awards for best software in the past year. In our view, attorney Lance Rose's monthly contributions alone are worth the price. Rose, a specialist in copyright law and author of SYSLAW (a guide to legal issues affecting sysops), focuses this month on the rumor that Apogee's game, Wolfenstien, is illegal because it may violate German law by including images of swastikas and other Nazi symbols, which some feel may violate a German statute that prohibits the perpetuation of their Nazi past. Rose addresses this in the broader context of censorship and sysop legal liabilities. He also notes that the rumor may have greatly enhanced the game's sales. Information on Boardwatch can be obtained from: jrickard@teal.csn.org ------------------------------ Date: Sun, 9 Aug 1992 11:51:31 (CDT) From: CuD Moderators <tk0jut2@mvs.cso.niu.edu) Subject: File 9--*NO MORE CHICAGO TRIBUNE ARTICLES* Even though we require posters to assure they have copyright permission for reposts they submit, this is not always done. We rely on posters, because we have no reasonable way of checking permissions. In the past year, we have received a disproportionate number of Chicago Tribune articles, so we called Joe Leonard, associate editor of operations in charge of granting copyright permission, to be sure electronic reprinting of Tribune articles was kosher. His three word response: "IT IS NOT!" Leonard indicated that the Tribune has contracts with services for electronic copying services, and allowing others to electronically reprint Tribune articles would be a violation of their contract. He contended that he perceives himself as in the information business, not the newspaper business, and he will under no conditions give permission to reproduce a Tribune article electronically, because it puts him at risk with other information service providers. He indicated, however, that permission for hardcopy reproduction is more flexible. CuD will *NOT* accept reproductions from the Chicago Tribune. If there is any doubt about the copyright of a news story, the best rule of thumb is to err on the side of caution and summarize it, quoting only enough material that falls on the safe side of "fair use." When submitting a reproduced article (whether summarized or intact), be sure to include the entire reference (source, date, page, author). ------------------------------ End of Computer Underground Digest #4.35 ************************************