Computer underground Digest Wed Apr 27, 1994 Volume 6 : Issue 38 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Suspercollater: Shrdlu Nooseman CONTENTS, #6.38 (Apr 27, 1994) File 1--Public Morality, Civil Disobedience, and Piracy File 2--White House tech & Crime File 3--Comment on the Lamacchia case File 4--hacking congress File 5--I hope this saves someone's buttons ("Dstry your data") Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Tue, 19 Apr 1994 15:19:50 -0400 (EDT) From: Dennis Shayne Weyker <weyker@WAM.UMD.EDU> Subject: File 1--Public Morality, Civil Disobedience, and Piracy I wanted to pass along some email responses I received that made factual corrections or additions to my article (on the social ethics of piracy, hacking, and phreaking) which might be of interest to CuD readers. Since I didn't ask all these people for permission to repost I've removed their names from their comments. I would also like to respond to some of public comments about my article. Hopefully the content of these responses is of broad enough interest to make them worth publishing in CuD. I have attempted to keep quoting to minimum in the two articles I respond to. +>email message 1 >One point that you didn't make regarding pay-phones. - Manufacturing, >installing and maintaIning payphones is not an inexpensive task. >Apparently in some areas the payphone companies are getting out of the >payphone business because they can't make money at it. +>email message 2 >I detected one definite factual error. Dir. asst. calls from payphones >are not necessarily free. They may be in MD, and in DC as well as I >learned, but they are not in all areas. Before relocating out here, I'd >never gotten a free dir asst. call in my life. In New Mexico, these >calls are 50 cents or so (more than the actual phone call in most case, >as E.G. pointed out.) I tend to suspect that NM is the norm not the >exception. I've also been charged for such calling is AZ, CO, TX and Miss. +>email message 3 > You mentioned a much heard argument > that by pirating WP (or whatever) by indivduals, such companies > gain market acceptance in the long term. > That's undeniably true. But, if WP was not pirated, say it was not > possible, people have to buy it. WP is expensive (that's one > reason to pirate it), so they are going to buy some cheaper > package, likely a shareware one or so. They won't have done this > if it was possible to pirate WP. > Therefore, pirating software not only `hurts' the pirated company > (pirating by indiduals very likely does not hurt, but other > pirating does), but also shareware authors or other competitors. And now for the two responses. +>From: chris.hind@MAVERICKBBS.COM(Chris Hind) >You gave an example about if phreakers printed and article in Phrack >about how to hack such-and-such equipment then that might change a >telco's mind about which brand of equipment they should buy. Now that this >information is released, there's a whole new ball game! Now phreakers >will use this as power over the market. They could use reverse >psychology to screw up the telco's and then that would open up a huge >window for phreakers to hack into a telco and pick it's bones clean. True. And by your message you've just warned telco engineers to beware of such reverse psychology attacks on their procurement decisions. What was more interesting to me about this scenario was not so much the net effect on the telco's security but rather Phrack's power to almost unilaterally take wealth (sales) away from one company and give it to another. Doesn't this strike anybody as unfair? And how long will it be before Northern Telecom or Fujitsu start *paying* hackers to find and report in phrack on the security weaknesses of their competitor's products? Next you'll tell me I've hurt the telcos again by showing hackers there's money to be made in hacking. It was going to happen sooner or later, and unless *all* companies make a practice of using hackers to analyze and attack their rivals' products in the above-ground hacker-media, those few companies who choose to do this are doing something which distorts the market in their favor (because their competitors' stuff gets torture-tested by ingenious hackers while their own stuff doesn't) and probably should be punished either through the judicial system or their business community. And we have to know this threat of illict behavior is there before we can think of ways to counter it. But there's another way to look at this. Telco's may *want* to buy the 'compromised' switch over the uncompromised one since they know what's wrong with the 'compromised' one and can (try to) fix those holes before installing them while they can't fix the holes in the 'uncompromised' switch until they discover them the hard way. +>From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM> >If you live in a society where there are absolute moral standards, >you're probably pretty well off, because you can use those standards like >theorem and hypothesis to draw some conclusions. That isn't the United >States, though. In our society there are no absolute morals anymore. >. . . The point is simple: in a world without absolutes, >power is the only rule, and all men do what they can get away with. I think your first error is saying that just because christian morality has been widely devalued (has lost its ability to control the behavior of the masses) there are no longer *any* standards of behavior worth following. I disagree. Perhaps I'm unusual because I've had more exposure to secular moral philosophy than most folks, but I can think of several of moral standards one could choose to live by which would give one's life meaning and prevent the conclusion that I should only do what's good for me without considering the effects on other people. A few of the better known ones: Utilitiarianism, which says you should always try to bring the greatest good to the greatest number, either on a case by case basis or by creating rules to serve that purpose. Kantian/Deontological ethics, which say you should only act in ways that you would approve of every acting in the same way. Also, that you should never treat other persons as merely a means to some end, that every person has rights to be treated with the respect due a human being and your own desires and rights have to take account of those other persons' rights. Virtue ethics say you should try to live a life of excellence. Try to live up to the big ideals; honesty, fairness, industriousness, charity, self-reflection, etc. etc. And nobody said just because society and the government have abandoned Christian morality that you have to. It may require more willpower and effort on your part to be a good christian when you have to live under a government and society that offends some of your values, but that's no excuse for giving up. The same goes for Buddhist, Hindu, Muslim, etc. believers. I'm sure most of even the hardcore libertarians out there think there are some moral principles (respecting other people's freedom and property?) that one ought to follow in the absence of pressure to be nice. >The founding fathers plainly appealed to God in >the Declaration of Independence and many less noticed writings. Yet >any such claims are patently false, in as much as our government now >subverts the constitution and the original intent of the fathers at >will. . . . Historical trivia: I've heard Thomas Paine was a fire-breathing atheist. I would say the government has acquired lots of power, but that this alone does not mean it is unrestrained. You seem to feel that since government no longer plays by the moral rules laid down in the Bible or the original interpretation of the constitution that it has become an amoral power-grabbing monster. I think that while govt. has regulated our lives more, and in doing so offended the values of both traditionalists like you (who think officeholders' sexual ethics and welfare-state mindset will be the death of mankind) and liberals (who would like to see a lot more government action on bigotry, economic/racial inequality, corporations' abuse of people/animals/the environment, reproductive freedom, and so on). But I don't think it mindlessly stomps on *everybody's* values in some monomaniacal lust for power. The power of the vote would have to come in and halt this somewhere, right? As for original intent interpretations of the constitution being morally authoritative. . . Think how the world has changed since 1776: industrial corporate capitalism with huge disparities of income has replaced the Jeffersonian community of relatively-equal small-landholders, we've adopted equality-in-theory for women and minorities, and so on. I don't think there's anything morally compelling or desireable about living in a society regulated by original-intent ideas favoring very restricted taxation, property qualifications for voting, second-class citizenship for women and minorities, etc. >Furthermore, our government >is the chief purveyor of immorality. [because it supports condom >distribution, doesn't discriminate against homerotic art in federal >funding of the arts, uses deadly force against those it arbitrarily >determines to be a threat to the public, and permits white-collar >criminals, philanderers, and homosexuals to hold office.] One of these things (white collar criminals in govt.) is a pet peeve of mine too and makes me anxious about the government's integrity (ex. Ed Meese, INSLAW). I try to keep in mind though that separation of powers and a bloodthristy free press supposedly act as a check on corrupt officials. But for sexual ethics, I think you are confusing government's devaluation of *your* sexual ethics in its pursuit of equal treatment for homosexuals (NEA funding, civil rights protections) and a means of protecting teenagers and the poor from AIDS (condom distribution) as a broad denial of *any* ethical standards. I think both of these policies are compatible with the secular moral standards (utilitarianism, etc.) I provided above. As for arbitrary govt. use of deadly force (too much in Waco, too little in LA riots, you seemed to feel) I can only say that I don't yet see a pattern where govt. is crushing all religious minorities and is indifferent to riots in the cities. Waco was probably too much, and the early police response in LA too little. But like the line goes, "Never attribute to malice what can adequately be explained by stupidity". Lack of prepartion in LA and bad judgement in Waco may explain them better than a conspiracy theory about the government gunning for religious groups while coddling rioters and looters. And also regarding Waco, I heard the siege was costing the government a million or two *every day*. How many millions have to be spent paying 50 FBI agents overtime to sit around Waco rather than using that money to provide other much-needed police services (catching serial killers, dope dealers, bank robbers, kidnappers, etc.) before the government is entitled to take a calculated risk in order to end the siege? The risk in Waco was miscalculated, but the idea of riskily ending sieges because of the huge costs to the taxpayers of letting them continue indefinitely has to be considered. >As such, the law as a statement of prevailing morality is purely the >tool of the powerful. If you have power, you consolidate it into law >and give it the name of morality. Machiavelli. I sometimes fear (like you) that money and the power associated with it dominate lawmaking. But this feeling comes and goes. I believe a fair number of laws get passed that seem to conform as much to secular ideas of the good as they do to the interests/desires of those with the most cash. I don't see the moral void out there that you do, in which it's O.K. to do anything and only the power of others prevents you from abusing them. >There are two sources of power: first, there's power where the money >is: e.g. the software developers. Second, there's power where the >technology is. And the technology favors the pirates. Yep. You've hit on a pretty accurate description of why piracy is so common. But as the philosophers like to say, "you can't derive what you ought to do from what is". We don't live in a moral void. Just because piracy is easy and common doesn't make it right. You have to have some kind of abstract moral standard (or maybe a Christian one) that tells you *why* piracy is ok. You yourself appeal to the Bible, indicating it's lack of mention of intellectual property, I could counter that respect for intellectual property is implied in respect for physical property since the underlying idea is that one should be able to enjoy the fruits of their labor. And why were you so forceful about noting that you pay for the software you use and noting the necessity of violating copyright to supporting your customers' obsolete software? I suspect its not because you feared the SPA but rather because you felt there was something wrong about not paying for software you use. >Money has made the law. Technology has made a farce of the law. Good line. The rise of social power of the technology elite at the expense of money elite gives the world an opportunity to fix some of the injustices inherent in a money-controlled system. But in doing so we really need to figure out which of those legal and moral laws that "money" made are bogus and which are worth keeping. Your techno-nihilism, if widely adopted, could lead to the institutionalized exploitation of the people by the techno-elite just as the industrial revolution saw the exploitation of the people by the business-elite. That would be bad. >Now, the essence of tyranny is to put everyone in violation of a >draconian law at all times . . . Our software piracy law seems to fit >well in line here. Indeed, the current penalties are harsh, and the expectation that they'd only be used to attack big-scale pirates-for-profit (i.e. DOS and Windows counterfeiters) has been destroyed by the SPA. Piracy penalties should be proportional to the real damage done to the copyright holder (see my prior post, and the email comment above about harming competing shareware authors) and should take account of the social good that the piracy in each case is associated with (allowing the testing/comparison of software before buying, allowing the support of obsolete/unsupported programs, shorter development times for new applications, etc.). >Mr. Weyker [said] . . . "We are all morally bound to obey >the law" except in a public protest [except in extreme >cases like Nazi Germany]. >I'll plainly disagree. . . . I mean, whose morals are we talking about >here? America's? Then might makes right, and you can do what you like. I've already pointed out that I think you're confused society's divergence from your Christian values with the U.S. being an amoral place in which might and the pursuit of one's own desires are the only relevant guides to behavior. The former may be true, the latter does not follow. And in any event, living in an amoral place doesn't necessarily give you the license to be amoral yourself, you have to duty to live morally except *maybe* in some cases where assuring your very survival may force you to passively or actively violate your moral principles (like in say, Nazi Germany). And Christian ethics give believers less slack in this department than secular moral systems. But interesting question is: Why should we break the law publicly rather than privately? Because if the law is wrong, everyone benefits by a brave individual stepping forth to risk their neck in the hopes of getting the courts to strike the law down or weaken it. Breaking the law in secret may help you get what *you* want while minimizing *your* risks, but it does nothing to help the many others who feel the law is wrong but lack your advantage of secrecy or who have much more to lose by confronting the law head-on. That's why Doc Kevorkian and the Civil Rights protest movement have a heroic cast to them, they risked themselves for the benefit of others. On the other hand, pressure for public confrontation of the law makes those who are tempted to deceive themselves (convincing themselves that it is not just that the law inconveniences *them* but also that it is a bad law for *everyone* that deserves to be broken and held in contempt) into justifying criminal behavior to themselves that really isn't justifiable. This tends to take the tool of civil disobedience out of the hands of the average person and restrict it to very zealous folks who really hate the law and strongly believe that it will fall if exposed to public scrutiny in a famous court case. In return for accepting this restriction, we as a society get a lot fewer people using self-serving, faulty, logic to justify criminal behavior to themselves and turn their well-deserved feelings of guilt into blame for the government or business. Thus there's a trade off, one that may or may not be good on balance. Libertarians and anarchists would probably like to have civil disobedience be more broadly available/less risky so more people can get in the habit of bucking the system. But the value of forcing people to be accountable for their actions, not just to the government--but the community, shouldn't be forgotten. That's why I get a bit antsy about the anonymity/cryptography craze sometimes. >I think most people try to be fair to vendors most of the time. For the >most part, they have been to my company, even though there is a cadre who >aren't. Not having a law prevents abusive enforcement of that law by the state. But not having a law also sets up abuse of the trust that must take the place of the law. This is like the classic libertarian vs. welfare-liberal debate about what happens if you stop redistributing wealth and depend on people's charitable instincts to take the redistribution scheme's place. The libertarian says charity will do as well or better for the poor than redistribution. The liberal thinks just the opposite. Here, the libertarian thinks trusting folks to pay for software will do just as well for those who write code for a living as a law requiring folks to pay up. Again, liberals are doubtful. We need good solutions, social, technical, or a mixture of the two to get out of this dilemma. >It's not the little guy who will get hurt in such a scheme. He can >still sell software because chances are his neighbor won't have that >package anyhow. The big guy will get hurt though. But is that >necessarily so bad? It sounds to me like a good way to keep monopolies >out of the software industry. See my earlier comment about weighing the social benefits of particular cases (or perhaps classes of cases) of piracy as well as the real amount of harm to the producer. I think not punishing piracy of Windows and MS-DOS while punishing an identical case of piracy of MondoBase+ just because Microsoft is "too damn big and has all the money anyway" probably runs afoul of constitutional guarantees of 'equal protection under the law' for the company and moral expectations of equal treatment by innocent employees of Microsoft (low-level programmers?) who are in no way responsible for their employer's reputedly aggressive and sneaky legal behavior and who don't make all that much more than similarly employed people in other companies. We have laws about monopoly in the U.S. and Microsoft has gotten to know them up close and personal because its size and aggressiveness have made them a Federal Trade Commission target. Time will tell whether this is enough, or whether the software using community will out of fear of another monopoly reminiscient of IBM at its peak (which also got busted hard by the monopoly laws, if I remember right), conspire to drag Microsoft down through purposeful and targeted violation of their copyright and/or discrimination against their products when deciding what to buy. Shayne Weyker weyker@wam.umd.edu ------------------------------ Date: Tue, 26 Apr 1994 01:18:26 -0800 From: jdav@NETCOM.COM(James I. Davis) Subject: File 2--White House tech & Crime THE WHITE HOUSE Office of the Vice President ____________________________________________________________ For Immediate Release April 20, 1994 GORE JOINS BENTSEN, RENO IN CRIME TECHNOLOGY DEMONSTRATION Vice President Announces Inter-Agency Agreements WASHINGTON -- To illustrate how the use of technology can help fight rising crime, Vice President Al Gore today (4/20) joined Administration officials in a demonstration of wireless and dual-use technologies that can be used for law enforcement purposes. He also announced two inter-agency agreements that will increase cooperation between the Departments of Justice, Treasury, and Defense in using technology to help combat crime. "The technologies demonstrated today provide powerful new weapons in the war against crime," the Vice President said. "Technological advances make it possible to fight crime safer and smarter than ever before. They increase safety, enhance productivity for our law enforcement officials, and save taxpayer dollars." The Vice President joined Treasury Secretary Lloyd Bensten, Attorney General Janet Reno, Deputy Secretary of Defense John Deutch, and Office of National Drug Control Policy Director Lee Brown in the demonstration, which included a wide variety of technologies that will help fight crime or support law enforcement. In addition, the Vice President announced two inter- agency Memorandums of Understandings. The first MOU, between the Departments of Justice and Treasury, establishes an agreement to develop a wireless telecommunications network for use by federal, state, and local law enforcement officials. This agreement implements one of the recommendations of Vice President Gore's National Performance Review to make the federal government work better and cost less. The second MOU, between the Departments of Defense and Justice, is a five-year agreement to jointly develop and share technologies that are necessary for both law enforcement and military operations other than war. Secretary Bentsen said, "We want to invest in crime- fighting technology, we want to do it so local and state police benefit, and we want to do it so costs don't go through the roof. That's why I'm so eager to sign up Treasury in a partnership with Justice to develop cost- effective and efficient technology." "New technologies increase the effectiveness of law enforcement, offer police officers greater options for apprehension, and improve the safety of the public," said Attorney General Reno. "Today's agreements will unite the efforts of the Justice Department with those of Defense and Treasury to help make these technologies available to our nation's law enforcement community." Deputy Secretary Deutch said, "Today's Memorandum of Understanding formalizes our ongoing relationship with the Department of Justice. It comes at a time when budgets are decreasing and yet we need different capabilities and equipment to accomplish our peacekeeping and humanitarian missions. We are finding that these requirements are similar in many cases to the needs of law enforcement agencies, and we look forward to cooperating in this area." The demonstrations included an automated booking system to electronically record fingerprints and mug shots, laser- assisted computer imaging equipment for examining ballistics, and a portable/hand-held/single-step device to retrieve more readable fingerprints at crime scenes. They also viewed technology that provides police cars with mainframe database information such as criminal records and traffic violations, and allows them to file reports from their cars. Several non-lethal weapons for use in pursuit of a suspect or while a suspect is in custody also were displayed. ------------------------------ Date: Wed, 13 Apr 1994 11:07:13 -0700 From: "J. Eric Townsend" <jet@NAS.NASA.GOV> Subject: File 3--Comment on the Lamacchia case In response to: An Issues Primer for the Lamacchia Case (#6.32) > 1. Under current criminal statutes, may a systems operator > ("SYSOP") of a computer BBS be held criminally responsible for > what *users* of the system do while logged onto the network, > including the exchange of copyrighted software or indeed, the > publication of other copyrighted materials? If the SYSOP actively encourages others to use the system, doesn't that somehow change this? This is something like saying that because a bar owner isn't responsible for the activities of prostitutes, they should go out and encourage prostitutes to frequent their bar. Providing a place for, and encouraging criminal activities is not protected by the First Amendment to the US Constitution (at least it wasn't when I went to J-school :-). > covers for high-class *prostitution* rings. Yet only the people > who actually run the prostitution services are prosecuted for > those violations of law. But what about instances where the editors or publishers actively sought out 'escort services' to advertise in their paper, with full knowledge that the 'escort services' were prostitution rings? > In the case of a SYSOP (like David LaMacchia) of a computer BBS, > the First Amendment would appear to protect him from criminal > liability for the arguably illegal actions of other people using (or > mis-using) his system to upload, download, transfer, copy, and use > copyrighted software. Even though the SYSOP provided a place specifically for, and encouraged such illegal activity? In short, I don't buy the 1st Amendment defense in this case. A publisher *IS* culpable if they knowingly or with malice publish libelous material. A publisher *IS* culpable if they knowingly steal materials to publish legal material (if I use my US Fed. Gov computer to put out a newsletter, the 1st doesn't prevent me from being charged with theft of government resources). IMHO, the 1st Amendment is being severely abused in this particular case. ------------------------------ From: fernando@UBIK.SATLINK.NET(Fernando Bonsembiante) Date: Mon, 25 Apr 1994 19:17:14 -0200 Subject: File 4--hacking congress I'm organizing a congress about virus, hacking and computer underground. The congress will be in october, in Buenos Aires, and 3 days long. It will be free or cheap (under u$s 20), and oriented to discuss things related to hacking, viruses, and the technology impact in the society of now and in the future. We will also have discussions about cyberpunk, virtual reality, the internet, the phone system, programming, etc. The speakers will be both from the 'official' world, and the 'underground' world. We expect Emmanuel Goldstein (2600 magazine), Mark Ludwig (Little Black Book of Computer Viruses), and Rop Gonggrijp (Hack-Tic, Holland) to attend. The people coming from other countries will be offered free rooming at volunteer's homes. We can't afford plane tickets for anyone, so the travel expenses are up to you. The official languages will be spanish and english, with simultaneous translation. We expect the congress to be as open as possible, offering freedom to speak to all attendants, being from the 'bad' or 'good' side of the discussed issues. As we in Argentina don't have yet laws against hacking or virus writing/spreading, I think it is very important to discuss all those items as freely and deeply possible. Saludos, Fernando ------------------------------ Date: Sun, 10 Apr 1994 14:23:07 -0700 (PDT) From: John Ketchersid <hardware@NETCOM.COM> Subject: File 5--I hope this saves someone's buttons ("Dstry your data") This material is to the best of my knowledge, TOTALLY original except for a very short quote from a previous issue of CUD. I hope you find it of use and if just one MORE of us is spared LONG down time by this work, that alone will be enough for me. I am quite sure that all of us who have ever been creative enough to create an entire reality within our minds, i.e. written Fiction based upon our own experiences or the knowledge we have obtained through the efforts of other authors, have had fleeting thoughts criminal in nature, maybe, but just as essential to the existence to the alternate Fictitious reality as the effort, research and many hours of keying by the author. The basis of this subject is not the mental dexterity of such authors, rather it is the preface to methods that only a character in a book would have to employ in order to protect him/herself within the confines of a ficticious reality, where all of the gonvernmentlaists have found that they do not have complete control of the worldnet. They have discovered that there are people who have higher access then they have. Hence they have instated a network security force comprised mostly of personnel who have been beating the streets tracking down drug dealers and other less than savory types in an attempt to remove these ungrateful and dangerous information thieves from the face of their fair land. Sound familiar? Mmmmmm Could beeee. Methods used in protecting data from seizure by "The Authorities" How to instantly destroy the data on floppies and HD's Keep in mind the HD will probably never work again once it has been subjected to this method of data destruction. But which do you prefer? (1.) Multiple years in the Gov.s' Jug. (2.) I gotta get another HD. **** If you are sane, then obviously (2.) **** This being the case you will need the following items to destroy the data on as many floppies you could ever have. If you already have a place for your media, which I assume is the case. Let us for the sake of this work you presently store your media in a containment area with these dimensions, 18" from front to back, 18 inches from side to side and 12 inches top to bottom. You will need: 24 feet of 1/4" steel rebar if you are un familiar with rebar just go to your nearest hardware store and ask for it, they will be able to explain. 1000 feet of single core 18 gauge audio wire with thin insulation. (radio shack about $10.00 1 200W "UPS" Uninterruptable Power Supply with outputs. IMPORTANT! (You will know why soon enough) 1 Radio shack home command center. i.e. a remote control for home appliances. 3 MINIMUM of three receivers for the above item. 1 roll of electrical tape. 1 9 volt transistor battery. 1 17.5" length of piano hinge. (HARDWARE STORE) 10 1/4 taper head phillips head wood screws 1 piece of quarter round 1/2" molding Some wood glue. 1 electrical cord with an AC plug on the end. 1 bulk tape eraser. (Radio Shack) 1 small low wattage oscillating fan 1 small low wattage night light 1 pinwheel. What you are about to construct is a cubical electromagnetic matrix. First you will cut the rebar into the following lengths: (16) 18 inch sections Next you will wrap each of the sections with a coil of the audio wire from one end to the other and then back again leave 3-4" of excess wire hanging off end of the rebar. [It is easier to do the wrap if you tape one end of the wire to one end of the section of the rebar leaving the 3-4 inches of excess wire, hang the wire spool from a coat hanger on a door knob or the back of a chair. This will keep the wire in a manageable state. Then simply work your way end of the rebar and back again just remember to leave the excess 3-4inches of wire at the end of your return coil. and tape the loose end so as to keep it from uncoiling. The coils should be tight, but be careful not to break the conductor by pulling to hard.] Now that you have all of your sections coiled you will arrange four of the 18 inch sections pointing from front to back in the bottom of the containment area. Then you will connect the wires at the ends of the bars in this formation. Next you will install the sections that will run from front to back inside either side of the containment area. How you affix the rebar to the inside is up to you. I prefer to drill 3 holes about 5 inches apart starting about 1.5 inches from either end of the container along the line that the rebar will be placed then use some of the audio wire strung through the holes and around the rebar. Now you will connect the ends of the wires coming from bar 1 and 4 to the ends of the two wires coming from the two outside bars. Once you have mounted and connected the bars on both sides of the containment you will create a lid for your containment area, that done, you will affix the final four bars to the inside of the lid. A piece of 1/4" inch ply wood is usually good for this. Making the lid. If you go to the hardware store and ask them to cut an 18x18 sheet of ply 1/4" inch ply wood you'll find they probably won't charge anything for the cutting. Attach your lid via the piece of piano hinge using the 10 wood screws to the top inside edge of the container and to the rear underside of the lid. At the front of the containment measure 1/4" from the top of the containment and glue your piece of molding at that point, this will serve as a stop for the lid. (NOTE) you should let the glue cure for 24 hours before you close the lid. Now that you have made your lid you can attach the top bars to the inside of the lid and connect and tape the left or right loose top wire to it's mate. Now you have two loose wires. These will be the lead wires that get connected to the power leads, connect these wires to the ends of the AC power cord. Now for the Bulk tape eraser. This is for the HD's. Disable the off switch by either bridging the switch or gluing it in the on position. Now Hot glue it to the side of your PC case right next to the HD's. Now you will take your oscillating fan, night light and pinwheel. Tape, hot glue, super glue or any other solid method of attaching the night light to the top of the oscillating fan, attach the pinwheel in such a position that it is just in front of the night light and will be affected by the air flow of the fan. Now that all of the wiring is complete we are at the plug in stage. Plug the UPS into the wall outlet let it charge for the length of time suggests in the ops-man. Plug the Radio shack home command receiver into the UPS. Plug a power strip into the UPS's. Plug in two of your receivers into the UPS powered power strip. Plug the third into a standard wall outlet for use with a lamp, TV or Stereo system. Test your UPS and Remote. (A) Plug the night light and fan into one of your RadShack Receivers via the power bar. (a) Insure that the fan and night light are on. (B) Unplug the UPS from the wall. (C) Hit the button on the remote control corresponding to the setting of the receiver. If all is well the night light will light up the fan will start and the pinwheel will create some pretty random shadows. Try the other receivers that you have. Make sure each of them are set for a different channel. Now plug your two data killers into the same receiver, this way flops die with the HD's (Why should I buy a UPS they COST!) Well my friend. Most GOV boys KNOW that you will try to run a kill file! That is why they will either try to stop you before you get into your domain. i.e. "U.S. Computer Investigation Targets Austinites" by Kyle Pope ({cr} Austin-American Statesman, March 17, 1990: Pp A-1, A-12). The article summarizes the background of the Legion of Doom indictments (see CuD, 1.00, files 4, 5). In the continuing investigation, federal agents and Austin police appeared at the home of a Steve Jackson Employee, greeting him with guns drawn at 6:30 a.m. They confiscated his equipment, and also took a number of books and other documents. Picture this: I come home from a hard days work. I have my home command remote with me so I can turn the lights on from outside the house I approach the house, they appear. Instead of pressing 1,2,3 or 4 to activate indoor or outdoor lighting, I press 8 that fires up the big hum. Or this: I come home from a hard days work. I have my home command remote with me so I can turn the lights on from outside the house before I approach the house, I press 1 on the remote. But nothing happens, I look at the other houses, they have electricity, must be a blown bulb, so I hit #2 again nothing happens. I step back into the shadows and hit #4 on the remote. You see with any decent UPS you can connect a power strip and power two or three devices for a very long time. Well #4 turns on an oscillating fan with a night light and a pinwheel attached, this creates enough random movement from within that at least one of the govs will make a move. If so I hit 8. and the data goes the way of political promises. Also you can create a second activation circuit connected to your home security system. Hence if some one breaks in all they get is NOTHING! OR they will hit you while you are asleep. KEEP YOUR REMOTE WITH YOU AT ALL TIMES! Of course sense they expect that you will try to run a kill batch, they will normally cut the power to the domicile, hence the UPS again! If the govs wonder why you may have nuked the data. "I use it to keep my journal and I don't want people reading my PRIVATE thoughts on religion." "I use it to keep my journal and I don't want people reading my PRIVATE thoughts on politics." "I use it to keep my journal and I don't want people reading my PRIVATE thoughts on sexual practices." "I use it to write songs about subjects that could be considered controversial." I also suggest keeping a set of Backup tapes in a safe place, like in the hands of someone whom you would trust with your life, that thinks they are some new kind of VHS tape. i.e. NON TECH. I could go on for many more pages but I assume that you would become WAY board with me, so I'll leave the dosage as it is. All thing in excess, except of course for governmental control and loss of liberty! ------------------------------ End of Computer Underground Digest #6.38 ************************************