Computer underground Digest Wed May 12 1993 Volume 5 : Issue 35 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Editor: Etaoin Shrdlu, Senrio CONTENTS, #5.35 (May 12 1993) File 1--My Thoughts/questions on the "Clipper" chip. File 2--Response to Jerry Leichter on Clipper Chip File 3--Response to Rich Mackinnon on Clipper File 4--Another Letter of Concern to "Hate Speech" Inquiry File 5--FBI Raids Telco Manager's Home (TELECOM DIGEST SPECIAL) File 6--DEF CON I Update Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in Luxembourg BBS (++352) 466893; ANONYMOUS FTP SITES: UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud halcyon.com( 202.135.191.2) in /pub/mirror/cud AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: nic.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) Back issues also may be obtained through mailserver at: server@blackwlf.mese.com COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Mon, 10 May 1993 22:10:03 CDT From: Eric Schnoebelen <eric%cirr.com@HARVUNXW.BITNET> Subject: File 1--My Thoughts/questions on the "Clipper" chip. I've seen a lot of hoopla on the "Clipper" chip that the (U.S.) government recently announced, and I am not entirely certain what to make of it. I'm a little suspicious of the intent, as well as those who created it (who exactly did?). But, what I am more concerned about is the exportability of it, and how it is going to become a "world-wide" standard, which it will need to do, if it is to become accepted at all. The U.S. is no longer the center of the universe, and U.S. companies cannot afford to make two products, one for distribution in the U.S., and one outside. If forced to choose, many will choose to build the "international" version exclusively. Another concern is the lack of a description of the algorithm. The algorithm is needed if there are to be software implementations, and software implementations are sorely needed. I ask because I have been struggling with trying to get the NSA's last encryption algorithm, the Data Encryption Standard, exported when used for authentication. Our interpretation is that we cannot export any form of user accessible routine that implements DES, not even a crippled edition of crypt(3), which can do only password authentication. Needless to say, this has caused much concern amongst our European distributors and customers. We have spent the last two years trying to get an answer from the Department of Commerce about the legality of exporting a crippled version of crypt(3), which can do only authentication, and gotten basically no where. We were finally given the names of a couple of folks inside the NSA, but we're almost afraid to talk to them... If the "Clipper" chip is to be viable, it cannot have these sorts of problems hanging over it. The algorithms need to be publicly know, and implemented, and no export restrictions placed upon either the chip or the software. Otherwise, it is worse than useless. ------------------------------ Date: Tue, 11 May 93 17:11:42 -0700 From: Russell Brand <brand@REASONING.COM> Subject: File 2--Response to Jerry Leichter on Clipper Chip In CU Digest 5.34, Jerry Leichter <leichter@LRW.COM> attacked Mike Godwin's position on the open design principle. While Leichter is correct that in certain environments, an %open design' is fact neither partical nor appropriate. CLIPPER is doesn't present an instance of this. One of the reasons that an open design is important is so that you don't have to worry what advantage someone can get by stealing it. Because the a well tested is system is supposedly intrinsically strong, you are unlikely to have to replace MILLIONS of them in the field because of a person being single bribed to betray some of the secrets. [Of course in the CLIPPER system there are other people to bribe instead and even if CLIPPER had open design there would be other strong reasons to oppose it.] If CLIPPER is commonly used to protect corporate secrets what is the logical bribe price? I bet it is more than enough to buy a mere government secret but that it isn't enough to quickly factor an product of a pair of well chosen 1000 digit primes. Date: Tue, 11 May 1993 11:13:41 -0400 From: Mike Godwin <mnemonic@EFF.ORG> Subject: File 3--Response to Rich Mackinnon on Clipper In article <1993Apr27.232320.7422@tic.com> Spartan@cup.portal.com (Rich Mackinnon of the University of Texas government department )writes: >How much will the crippled encryption scheme really "chill" our use of >emergent communications technology, i.e., threaten our free speech protection >to the point that we may opt (if possible) to use other communication >media? The fact that it's an emergent medium increases the risk that it can be chilled. But note that the risk of a "chilling effect" is only one small part of my argument, and not a necessary part. Far more disturbing is the increase in the government's power to tell me what *general* forms I'm allowed to use when I communicate. >The threat of a warrant does not seem to have a wide chilling >effect on the use of standard telephones and postal mail--yet, the possibility >of interception is still ever-present. The use of telephones and mail was already a fait accompli when wiretapping became widespread. There was no chance that wiretapping would chill an emerging technology. Moreover, the character of e-mail is somewhat different from that of telephonic communications--it's less ephemeral and more "broadcastable." That is, it's easier to store and echo to large groups of people. (In comparison, it's somewhat more difficult to tape a voice conversation and echo it to the world.) What's more, encryption is likely to increase the expectation of privacy with regard to e-mail and all other communications that are encrypted. >Does not the warrant sufficiently address this balance? If you are asking whether we should rely on the search-warrant process to protect our privacy when we have access to encryption, my answer is "Why rely on the government to do what you can do yourself?" >If the protection that a warrant offers is not >sufficient to alleviate our fears of unwarranted search, seizure, and arrest, >then perhaps there are bigger problems to deal with other than encryption >schemes. Perhaps there are, but an individual does not have to ask the legislature for permission to use encryption. Not yet, at any rate. So, encryption enables an individual to tackle his own privacy problem without having to lobby for a change in the warrant process. Most theorists would regard this as empowering to the individual. >I'm nowhere near as qualified as Mike to offer an opinion on this issue, >but it seems to me that the "process" is exactly where we should be >focusing--the Constitutional issues are fascinating, but distracting. Sigh. The Constitutional issues will be the only ones we are left with. Imagine that we have improved the process and had lots of dialog with the Administration, and the Clipper initiative remains the result. If the process is wonderful and the result is bad, does this mean we have nothing to criticize the government about? >I have to believe that the warrant is an acceptable safeguard to both >sides of the balance. Given that, it appears that the balance has been >disturbed by an unilateral decision with respect to the Clipper Chip. This is a very charitable picture of the government's mistake, Rich. You seem to be saying that if the decision had been other than "unilateral," the government's decision would be unimpeachable. I beg to differ. The whole point of the Bill of Rights is to remove certain rights from political debate. As Melville Nimmer comments, a "balancing" test is never adequate to protect freedom of speech. As it stands, we have the freedom to say things to each other in secret (through encryption). Must we surrender this right to the government once the process gets better? > The >plan presented by the Clinton Administration, as far as attempting to >balance the concerns of government and the people, seems sound. The problem is that the plan "balances" the concerns of government in the direction of government. Many people have been critical of the government's insistence that being able to guarantee access to private communications is the cornerstone of law enforcement. No study of law enforcement I know of supports this view. >This is a political problem in that a practical solution is available, but >cannot be agreed upon because the process leading to that solution did >not allow for the necessary consultation and input to insure its acceptability. >I'm certain that once bruised egos are attended to and future assurances >of consultation are gained, that the solution settled upon will be very >much like the one that stands. This is the kind of myopia I expect from the University of Texas Department of Government, a department that privileges process over substance. I hope I may be forgiven for being cynical about the willingness of government professors to sign our rights away in the name of "good process." It's true that, historically, government has been able to compel a "balance" between our privacy rights and the government's often-legitimate interests. But now we have a technology that enables us to remove our privacy from the balancing calculation--a technology that restores the status quo ante of the last century, when sophisticated bugging and wiretapping technologies did not exist. I don't think the 19th-century standard of private interpersonal communications is so threatening to government stability as to justify mandatory government access to our communications through Digital Telephony and Clipper. ------------------------------ Date: Mon, 10 May 1993 02:33:12 -0500 From: Dave.Harnett@F68.N272.Z1.FIDONET.ORG(Dave Harnett) Subject: File 4--Another Letter of Concern to "Hate Speech" Inquiry 23 Apr 93 Office of Policy Analysis and Development NTIA, US Dept of Commerce 14th St and Constitution Ave NW Washington, DC 20230 In response to Notice of Inquiry, Docket No. 930349-3049: I stand qualified to respond to this inquiry by virtue of my three years experience as the operator of a computer bulletin board and my status as a member of three computer bulletin board networks. In the five years before I established my computer bulletin board, I participated in discussion groups on other computer bulletin boards and networks. I harbor grave concerns regarding your inquiry, particularly your scrutiny of a relationship between computer bulletin boards and "hate crimes." I can summarize my position with a response to one of the questions you pose in IV.A.13 of the Supplementary Information section. Governments, specifically telecommunications regulators, have *no* proper role with respect to the content of messages carried over telecommunications channels. Computer bulletin boards are a truly democratic medium. Unlike traditional broadcast and print media, few barriers exist to preclude an individual from exchanging ideas via computer-based telecommunications. The medium is a great equalizer. In the absence of visual and aural cues that might reveal race, religion, gender, age, education, or disabilities, ideas become more important than the person expressing the ideas. Individuals are free to migrate among discussion areas, bulletin boards, and networks, even to start their own bulletin boards and networks in pursuit of a comfortable niche. This community without boundaries, sometimes known as cyberspace, is self-regulating. I participate in a network of computer bulletin boards that was forced to expunge a participant. This individual repeatedly engaged in offensive behavior. The community treated this individual with respect and tolerance, in the hope that our positive attitudes could deter anti-social behavior. Through informal means, the community reached an consensus for action. Sadly, some members withdrew from the community, to protest what they perceived as authoritarian censorship. However, this situation keenly illustrates that people are capable of resolving problems without interference from government statutes and regulations. My greatest fear is people who fear ideas, people who would use the force of government to stifle the expression of ideas. The legitimate role of government is to punish not ideas, but only actions that violate the rights of another person to life, liberty, and property. It matters not that some groups or individuals find some ideas hateful or offensive, or that ideas can prompt some sociopaths to commit violent criminal acts. Political speech can be highly offensive and even hateful to some people. The rhetoric of politician David Duke comes to mind. Historically though, the courts offer the greatest protection to political speech. Let us not allow the hysteria of political correctness to compromise the principles of a free society. If we have confidence in ourselves and our beliefs, we have nothing to fear from the forces of intolerance and hate. Sincerely, David A. Harnett Computer bulletin board - 914 452 4753 Electronic mail address - Dave.Harnett@f68.n272.z1.fidonet.org USPS - PO Box 188, Poughkeepsie, NY 12602-0188 ------------------------------ Date: Sun, 9 May 1993 14:59:47 -0500 From: TELECOM Moderator <telecom@DELTA.EECS.NWU.EDU> Subject: File 5--FBI Raids Telco Manager's Home (TELECOM DIGEST SPECIAL) ((MODERATORS' NOTE: The following is reprinted from Telecom Digest, available as a mailing list or a Usenet Group. For those who forget, Pat Townson, the TD moderator, was the original impetus in the founding of CuD)). This news report from the May 9, 1993 %Omaha World Herald% arrived in my mail just a few minutes ago. PAT From--jsaker@cwis.unomaha.edu (James R. Saker Jr.) Subject--FBI Raid on Curtis Nebr. Telco, Family Organization--University of Nebraska at Omaha Date--Sun, 9 May 1993 16:34:53 GMT The following article detailing a FBI raid on a small-town family and local exchange carrier was printed in this morning's Sunday %Omaha World Herald%: "FBI Probe, Raid Anger Curtis Man" Stephen Buttry, %Omaha World Herald%, Sunday May 9, 1993 Curtis Neb. -- The evening was winding down for the Cole family. Ed Cole, general manager of the Curtis Telephone Co., had dozed off on the living room couch. His wife, Carol, was running water for her bath. The 10-year-old identical twins, Stephanie and Jennifer, had gone to bed. Amanda, 14, was watching "48 Hours" on television in the living room. "It had something to do with fingerprints and catching criminals," Amanda remembers of the TV show. At 9:40 p.m., Amanda heard a knock and answered the door. In marched the FBI. Thus began a year of fear, anger and uncertainty for the Coles. Mrs. Cole, 40, still has nightmares about the night of May 13, 1992, when federal agents stormed into her bedroom, startling her as she was undressing for her bath, naked from the waist up. "I used to go to bed and sleep the whole night," she said last week. "I can't anymore." Federal agents did not find the illegal wiretapping equipment they were seeking, and a year later no one has been charged. The agents seized nothing from the house and later returned the cassette tapes they took from the phone company office. Ronald Rawalt, the FBI agent in North Platte who headed the investigation that led to the raid, declined to comment, referring questions to the Omaha office. "It's still a pending investigation, and we're not allowed to make a statement," said agent Doug Hokenstad of the FBI's Omaha office. If the investigation comes up empty, he said "we normally don't make a statement at the end of the investigation." That infuriates Cole, 39, who says the raid cast suspicion on him and the phone company and left them with no way to clear their names. "Either file charges or say there's nothing there," he said. "This was done in a highly visible manner, and there was no finality to it." Request for Help Cole has asked Sen. Bob Kerrey, D-Neb., to investigate. Beth Gonzales, Kerrey's press secretary, said the senator received Cole's letter and is assessing the situation. The case that brought FBI agents from Washington, Denver, Houston and Omaha, as well as nearby North Platte, to this tiny southwest Nebraska town in the Medicine Creek valley apparently started with a personnel squabble in the phone company office. Cole said two women complained of their treatment by two other workers. The women who complained threatened to quit if the company did not take action against the other women, he said. Cole and his assistant manager, Steve Cole, who is not related, observed the office workers for a while. "We found the same two making the ultimatum were the aggressors," Ed Cole said. He gave the complaining employees written reprimands, and they quit Jan 16, 1992. The two women contended in a hearing concerning state unemployment benefits that personality differences with Ed Cole led to the reprimands and their resignations. Both women declined to comment on the matter. 300-Hertz Tone In an affidavit filed to obtain the search warrants, agent Rawalt said one of the two, Carol Zak, contacted the FBI in March 1992 and told them of "unusual electronic noises (tapping noises) on her telephone line at the inception of a call received." Later in the affidavit, the noise is described not as tapping, but as a 300-hertz tone. Steve and Ed Cole demonstrated the tone last week on phone company equipment. It is caused, they said, by a defective 5-by-7 circuit board, or card. The defect is common, and the company replaces the card if a customer complains. The tone is not heard if a customer answers between rings, but if the customer answers during a ring, the tone blares into the earpiece for an instant, about the duration of the ring. Ed Cole, who has placed wiretaps for law officers with warrants, said wiretaps don't cause such a sound. "Most wiretaps, don't they have a loud, blasting noise to announce there's an illegal wiretap?" he asked sarcastically. Surveillance After Mrs. Zak told agent Rawalt of the noise on her line, the FBI began recording her calls, the affidavit says. On April 30, the affidavit says, the FBI began surveillance of Ed Cole -- not an easy task in a town of 791 people. During the weeks before the raid, phone company employees noticed a stranger watching the office and workers' houses. They guessed that a private investigator was watching, possibly gathering information for the former workers. "When somebody sits around in a car in a small-town Curtis, especially at 3:30 when grade school lets out, people take notice," Steve Cole said. "We had a suspicion that we were under surveillance." The affidavit says agent Robert Howan, an electrical engineer from FBI headquarters, analyzed tapes of Mrs. Zak's phone calls and concluded that a wiretap on the line "is controlled from the residence of Eddie Cole Jr. and is facilitated through a device or computer program at the Curtis Telephone Company." Based on Rawalt's affidavit, U.S. Magistrate Kathleen Jaudzemis in Omaha issued warrants to search Cole's house and company offices. Federal agents gathered in North Platte and headed south to Curtis for the late-evening raid. Flashlights, Commotion When Amanda Cole opened the door, she said "The first people that came in went past me." They rushed through the living room into the kitchen to let more agents in the back door. The agents wore black jackets and raincoats, with large, yellow letters proclaiming "FBI." Neighbors and passersby began to notice the commotion as other agents searched the outside with flashlights. The agents showed Cole the search warrant and told him and Amanda to stay in the living room. The agents asked where the other girls were, and Cole replied that it was a school night and they were in bed. Rather than flipping the hall light switch, the agents went down the darkened hall with flashlights, "like they think my kids are going to jump up and shoot them," Cole said. The twins recalled that they were puzzled, then scared, to wake up as FBI agents shined flashlights on them. The intruders did not enter gently, either. "After they left, our doorknob was broken," Jennifer said. Farther down the hall, the agents found the embarrassed and angry Mrs. Cole. "They didn't knock or anything, and I was undressing," she said. "They told me to get a T-shirt on." After Mrs. Cole put her clothes back on, agents allowed her to go with them to get the frightened twins out of bed. Mrs. Cole and the twins also were instructed to stay in the living room. Interrogation As agents searched the house, Cole said, Rawalt told him to step out on the porch. While he was outside, Mrs. Cole decided to call the phone company's attorney. "They told me I couldn't do that," she said. "I worked at the Sheriff's Office for several years, and I know no matter what you're accused of, you're entitled to an attorney." She called anyway. Meanwhile, according to Cole, Rawalt was interrogating and berating him loudly on the front porch, creating what Cole considered a "public spectacle." "I've lived here 15 years. I've built up a reputation," said Cole, who is president of the Curtis Housing Authority, chairman of the Nebraska Telephone Association, and coach of the twins' softball team. "And there's cars going by real slow. Here Rawalt brings me out on the front porch, turn on the light for everyone to see and starts interrogating me." Cole said Rawalt tried to pressure him to admit he was wiretapping and tell him where the equipment was. "He pointed at my wife and kids and said, 'Look at what you're putting them through,'" Cole said. Three-Hour Search Cole said it would take about 20 minutes for an expert to examine the phones in the house -- a teen line, the main line plus two extensions, a 24-hour repair prone that rings at his home as well as the main office, and an alarm that rings in from the central office. "The search continued for more than three hours, as agents looked in closets, cabinets and drawers. The family could hear Garth Brooks singing as agents played the children's tapes, apparently hunting for recorded phone conversations. At the same time the Coles' house was being searched, agents visited Steve Cole and Roger Bryant, a phone company employee who is a neighbor of Mrs. Zak's. "They insinuated I had broken into my neighbor's house to put in a wiretap," he said. The agents "asked me if I knew if Ed was making electrical devices in his basement." (Cole said he wasn't. Agents found no such devices.) The agents told Steve Cole to take them to the phone company office so they could search the switch room. Number of Agents The Coles were not sure how many agents participated in the raid. They saw at least five at the house but thought they heard others outside and entering the back door and going into the basement. They said seven agents were at the office, but they weren't sure which agents searched both sites. When the agents said they were looking for wiretap equipment, Steve Cole said "I told them it just couldn't be right. If Ed were to do something or I were to do something, the other one would know." Steve Cole said agents searching the phone company, including Howan, did not appear to understand the equipment very well. They would not tell him why they suspected a wiretap. After 1 a.m., Ed Cole said, the search of his house ended, with agents empty-handed and taking him to the office. About 4 a.m., the agents told Steve Cole about the 300-hertz tone. "The minute they told me, I knew what it was," he said. He said he quickly found the defective card for Mrs. Zak's line, demonstrated the sound for the agents, then replaced it and showed that the sound was gone. "I demonstrated it, and then they both got white," Steve Cole said. Card Analyzed Howan then went to Rawalt, who was with Ed Cole outside the switch room and explained what had caused the tone, Ed and Steve Cole said. "I'm jubilant," Ed Cole recalled thinking. "I've been exonerated." But he said Rawalt told him: "I've investigated this for two months. I've flown agents in from around the country ... I may charge you on circumstantial evidence." "My heart just sunk," Cole said, "because that means they're not here to find the truth. They're just trying to support their pre- conceived ideas." He said Rawalt told him he would take the card for analysis. Cole said the searches could have, and should have, been conducted without the embarrassing fanfare -- during normal business hours, while the children were in school and his wife was at work. Because of the highly public nature of the raid, Cole said, the company has hired a lawyer to investigate the investigation. The company is trying, with little success, Cole said, to get information from the FBI so it can reassure regulators, lenders, stockholders and customers of the company's integrity. Tapes of Calls Rawalt visited the Cole's house again in January. Although this time it wasn't a raid, his presence upset the family. He returned tapes seized in the raid but told Cole that the circuit card was still at the FBI lab being analyzed. It still has not been returned, Cole said. "The FBI, the most respected law enforcement agency in the world, has had this card in their laboratory in Washington, D.C., for almost one year, and they still cannot determine if it has a tape recorder strapped to it," Cole said. The bureau also has refused to give the phone company of its tapes of Mrs. Zak's phone calls, which could show whether the sound on her line was the tone from the defective card, Cole said. "It makes one wonder if they'd put a family and a company through this just because they don't want to admit a mistake," he said. "If they'll just give me my life back by making a public statement, it would be over." (End of article forwarded to TELECOM Digest.) Jamie Saker jsaker@cwis.unomaha.edu Systems Engineer Business/MIS Major Telenational Communications Univ. Nebraska at Omaha (402) 392-7548 [Moderator's Note: Thank you very much for sending along this report. This is just another example of the clumsy, oafish and unprofessional organization which has become such a big joke in recent years in the USA: The Federal Bureau of Inquisition. Imagine: a telephone line out of order which turns into a massive FBI assault on a private family. And of course there will be no apology; no reparations; nothing like that. The FBI is too arrogant and powerful to bother with making amends for the damage they have done. I hope Ed Cole and his telco demand and obtain revenge on everyone concerned, including first and foremost Mrs. Zak, the scorned woman who set the whole thing in motion when she got fired for her bad attitude at work. I know if it was myself, I would not be content until I had turned the screws very hard on all of them, especially her. PAT] ------------------------------ Date: Wed, 12 May 1993 17:00:53 PDT From: "The Dark Tangent" <dtangent@DTANGENT.WA.COM> Subject: File 6--DEF CON I Update D E F C O N I C O N V E N T I O N >> READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUTE << Finalized Announcement: 5/08/1993 We are proud to announce the 1st annual Def Con. If you are at all familiar with any of the previous Con's, then you will have a good idea of what DEF CON I will be like. If you don't have any experience with Con's, they are an event on the order of a pilgrimage to Mecca for the underground. They are a mind-blowing orgy of information exchange, viewpoints, speeches, education, enlightenment... And most of all sheer, unchecked PARTYING. It is an event that you must experience at least once in your lifetime. The partying aside, it is a wonderful opportunity to met some of the celebrities of the underground computer scene. And those that shape its destiny - the lawyers, libertarians, and most of all the other There will be plenty of open-ended discussion on security, telephones and other topics. As well as what TIME magazine calls the "Cyberpunk Movement". Las Vegas, is as you might have guessed a great choice for the Con. Gambling, loads of hotels and facilities, cheap air fare and room rates. It's also in the West Coast making it more available to a different crowd than the former Cons have been. Your foray into the scene and your life will be forever incomplete if by some chance you miss out on DEF CON I. Plan to be there! WHO: You know who you are. WHAT: Super Blowout Party Fest, with Speakers and Activities. WHERE: Las Vegas, Nevada WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993 WHY: To meet all the other people out there you've been talking to for months and months, and get some solid information instead of rumors. DESCRIPTION: So you're bored, and have never gone to a convention? You want to meet all the other members of the so called 'computer underground'? You've been calling BBS systems for a long time now, and you definitely have been interacting on the national networks. You've bullshitted with the best, and now it's time to meet them in Vegas! For me I've been networking for years, and now I'll get a chance to meet everyone in the flesh. Get together with a group of your friends and make the journey. We cordially invite all hackers/phreaks, techno-rats, programmers, writers, activists, lawyers, philosophers, politicians, security officials, cyberpunks and all network sysops and users to attend. DEF CON I will be over the weekend in the middle of down town Las Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had a good Convention that I can remember, and Las Vegas is the place to do it. Cheap food, alcohol, lots of entertainment and, like us, it never sleeps. We will have a convention room open 24 hours so everyone can meet and plan and scheme till they pass out. Events and speakers will be there to provide distraction and some actual information and experiences from this loosely knit community. This is an initial announcement. It is meant only to alert you to the time, dates and location of the convention. Future announcements will inform you about specific speakers and events. An information pack is FTPable off of the internet at nwnexus.wa.com, in the cd/pub/dtangent directory. The IP# is 192.135.191.1 Information updates will be posted there in the future as well as scanned map images and updated speaker lists. FINAL NOTES: COST: How you get there is up to you, but United Airlines will be the official carrier (meaning if you fly you get a 5% to 10% price reduction off the cheapest available fare at the time of ticket purchase) When buying airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii. Hotel Rooms will cost $62 per night for a double occupancy room. Get your friends together and split the cost to $31. Food is inexpensive. The entertainment is free inside the hotel. Reference the DEF CON I convention when registering, as we have a block of rooms locked out, but once they go it will be first come, fist serve. Call 1-800-634-6901 for the reservations desk. The convention itself will cost $30 at the door, or $15 in advance. It pays to register in advance! Also it helps us plan and cover expenses! Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison Street, #102, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not tring to make money, we will be tring to cover costs of the conference room and hotel plus air fair for the speakers who require it. Don't bother mailing it a week in andvance, that just won't happen. Advanced registration gets you a groovy 24 bit color pre-generated name tag. Include with your payment the name you want listed, your association/group affiliation/bbs/whatever, email address, and/or bbs number for sysops. Last day for the registrations to reach me will be July 1st. SPEAKERS: We have solicited speakers from all aspects of the computer underground and associated culture (Law, Media, Software Companies, Cracking Groups, Hacking Groups, Magazine Editors, Etc.) If you know of someone interested in speaking on a self selected topic, please contact The Dark Tangent to discuss it. FOR MORE INFORMATION: For initial comments, requests for more information, information about speaking at the event, or maps to the section where prostitution is legal outside Las Vegas (Just Kidding) Contact The Dark Tangent by leaving me mail at: dtangent@dtangent.wa.com on the InterNet. Or call: 0-700-TANGENT for conference information/updates and to leave questions or comments. Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison Street, #102, Seattle, WA, 98112. Future information updates will pertain to the speaking agenda. ++++++++++++++++++++++ Updates since the last announcement: >> The Secret Service is too busy to attend. >> New Media Magazine, Unix World and Robert X. Cringly have stated they will attend. >> We got a voice mail system working (I think) for comments and questions. >> We don't have enough $$$ to fly out the EFF or Phillip Zimmerman (Author of PGP) or Loyd Blankenship. >> Judy Clark will be representing the CPSR and a few other organizations Don't forget to bring a poster / banner representing any of the groups you belong to. I want to cover the conference room walls with a display of all the various groups / people attending. (Break out the crayons and markers) +++++++++++++++++++++++++++++= DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE 5.08.1993] Saturday the 10th of July 10am, Sands Hotel, Las Vegas INTRODUCTION Welcome to the convention *The Dark Tangent (CON Organizer) Keynote speaker Cyberspace, Society, crime and the future. To hack or not to hack, that is not the question *Ray Kaplan Civil Libertarians -CPSR Computer Privacy/1st Amendment/Encryption *Judy Clark -USC Comp. Law Legalities of BBS Operation, message content laws and network concerns. *Allen Grogan, Editor of Computer Lawyer 'The Underworld' -Networking Concerns of National Networking of CCi Net. *Midnight Sorrow. Corporations -Packet Switching SPRINT Concerns/security and the future MCI of packet switching. (*Jim Black, MCI Systems Integrity) System 75 Common misbeliefs and rumors of the underground *Scott Simpson -Virtual Reality The law, and it's intersection with VR *Karnow -System Administrator Security Concerns of an Administrator *Terminus The 'Underworld' -Internet The security problems with Internet/Networks Overview of hacking *Dark Druid -Getting Busted The process of getting "busted" *Count Zero -How to be a nobody Hiding your identity in the high-tech future, or The payphone is your friend. *Anonymous -The Prosecutors Their concerns/problems and Hacker Hunters suggestions for the 'underworld'/Q&A -The Media The effect of the media on public perceptions *Erik Bloodaxe / Phrack Magazine CONCLUSION General Q&A This itinerary is proposed, and topics and speakers will be marked as permanent once a confirmation is recieved. This is by no means the exact format of DEF CON I. Any Questions / Comments Contact: dtangent@dtangent.wa.com Voice Mail 0-700-TANGENT ++++++++++++++++++++++++ Sorry for the huge signature, but I like privacy on sensitive matters. +-----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.2 mQCNAiviMB8AAAEEANO4XmnggG8h8XWtfxShMvRUarlpj2OBSPMrzUNRAKEjupUj f/FfszMk0G60GSiCfiosw/m2JcKPQ6OZgQCxfElFUcYkKx/rYjgU3viEmNasjAwN jR/9l0WSXlv4CjCUtH/t4rm1C1bs8i6iznmu/dCeuUEZQoRm0Lrdt/10TGt3AAUT tCtUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkdGFuZ2VudC53YS5jb20+ =DxKN +-----END PGP PUBLIC KEY BLOCK----- ------------------------------ End of Computer Underground Digest #5.35 ************************************