Computer underground Digest Wed May 17, 1995 Volume 7 : Issue 39 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Goddess of Judyism Editor: J. Tenuta CONTENTS, #7.39 (Wed, May 17, 1995) File 1--Gov't Appeal in 2600 Case File 2-- Making Bombs File 3--Mendacity File 4--(fwd) "Blacklisted! 411" - a direct ripoff of 2600 Magazine (fwd) File 5--Response to teleright critics File 6--(review) "Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994 File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 17 May 1995 15:54:26 -0400 From: "David Sobel" <sobel@EPIC.ORG> Subject: File 1--Gov't Appeal in 2600 Case The U.S. Secret Service has filed an appellate brief seeking to overturn a lower court decision ordering the release of information on a controversial "hacker" investigation. At issue are documents detailing the Secret Service's role in the so-called "Pentagon City Mall Raid." In November 1992, a group of young people affiliated with the computer magazine "2600" were confronted by mall security personnel, local police officers and several unidentified individuals. The group members were ordered to identify themselves and to submit to searches of their personal property. Their names were recorded and some of their property was confiscated. However, no charges were ever brought against any of the individuals. Although the Secret Service has never formally acknowledged its role in the incident, it eventually conceded that it did possess relevant information. Computer Professionals for Social Responsibility (CPSR) filed suit in federal court in early 1993 seeking the release of Secret Service records under the Freedom of Information Act. In July 1994, U.S. District Judge Louis Oberdorfer ordered the Secret Service to release the vast majority of documents it maintains on the incident. The Electronic Privacy Information Center (EPIC) is litigating the appeal that is now pending. The Secret Service has maintained that the disputed records were collected during the course of an investigation of telephone toll fraud. In its recently-filed brief, the agency asserts that "obviously, a meeting of individuals 'affiliated with 2600 Magazine' would be of interest to such an investigation since those individuals have, by their conduct, evidenced an interest in the technical intricacies of the telephone system." The government also reveals for the first time that the underlying investigation was closed on March 14 of this year. The Pentagon City incident has been described as an example of over-zealous law enforcement activities directed against so-called computer "hackers." The case raises significant issues of free speech and assembly, privacy and government accountability. EPIC is seeking support to assist with its defense of the lower court decision ordering disclosure. Tax-deductible contributions (payable to EPIC) can be sent to FOIA Project, EPIC, 666 Pennsylvania Avenue, S.E., Suite 301, Washington, DC 20003. ------------------------------ Date: Wed, 17 May 95 07:59:41 MST From: Dan Lester <ALILESTE@IDBSU.IDBSU.EDU> Subject: File 2-- Making Bombs Those who worry about bomb making should worry about an outfit called Loompanics, in Port Townsend, WA, before they worry about the nets. These folks (Box 1197, 98368, catalog $5.00, mail order only) sell books on a wide variety of interesting topics. Every time I lecture to classes (library science, journalism, political science, philosophy, education, etc.) on censorship I don't just take "dirty books". I also take the loompanics catalog and let them browse the titles in it to decide what, if anything, should be kept from kids, adults, etc. Here are some titles from the latest Loompanics Catalog: How to get tax amnesty, a guide to the forgiveness of IRS debt. The complete book of international smuggling. The organization of illegal makets. Sneak it through: smuggling made easier. How to build a bugproof room. Telling lies: clues to deceit in the marketplace, politics, and marriage. Reborn in the USA: personal privacy through a new identity. Counterfeit ID made easy. How to get anything on anybody. Techniques of the professional pickpocket. Escape from controlled custody. How to steal food from the supermarket. Techniques of safecracking. Deal the first deadly blow: an encyclopedia of unarmed and hand to hand combat. Screw the bitch: divorce tactics for men. Gunrunning for fun and profit. How to make disposable silencers. (also volume 2) Ragnar's homemade detonators. Ragnar's guide to home and recreational use of high explosives. Kitchen improvised plastic explosives. Kitchen improvised fertilizer explosives. "Among the everyday materials used in the manufacture are such things as fertilizer, fuel oil, diesel fuel, ....etc....etc....." "Because of the nature of this material, we must emphasize that this book is sold for informational purposes only." Mercenary operations manual. Coup d'etat: a practical handbook. "Remember: Coup d'etat is more common and more successful than free elections." The poisoner's handbook. 21 techniques of silent killing. How to date young women, for men over 35. (what every older geek needs? o-) ) Getting started in the illicit drug business. That should be enough to give you the flavor of this catalog of almost 300 pages, several books per page. Some of the other books cover living off the land, surviving in the wilds, building shelter from natural materials, and related topics. Should the catalog and the books in it be legal? Of course they should. All of them. Every blasted one, regardless of how disgusting, offensive, evil, or nasty you or I might think they are. One of the local TV stations did a feature last week on "bombmaking info on the internet". I called and informed them that it was a "so what?" topic since all the stuff was in print and freely available anyway. They said they didn't care...the internet was what was hot and of interest right now. Yeah, no surprise..... cyclops Dan Lester Internet: alileste@idbsu.idbsu.edu Network Information Coordinator WWW: http://cyclops.idbsu.edu/ Boise State University Library Boise, Idaho 83725 How can one fool make another wise? 208-385-1235 Kansas, "No One Together," 1979 ------------------------------ Date: Thu, 11 May 95 10:11:36 EDT From: Jerry Leichter <leichter@LRW.COM> Subject: File 3--Mendacity It's said that all organizations come to resemble their opponents. Sad to say, this has happened - with a vengence - with the organizations that nominally started out to protect Internet users. (I'm deliberately avoiding naming particular organizations because all have good and bad sides.) Now that they've entered the political realm, truth and careful analysis have tended to disappear. All that matters is public appeal. Numbers are not there for explanation; they are there to serve propaganda needs. Even when I agree with the aims of the groups and people involved, the ever-growing intellectual dishonesty of their means disgusts me. A case in point is Marc Rotenberg's recent CuD article quoting "Dave Banisar ['s recent efforts] ... going through the wiretap reports for 1994." I have no idea whether the interpretations below are due to Banisar or Rotenberg. Rotenberg's intent in quoting them was clear, however. Rotenberg and others have quoted fairly low numbers of total wiretaps in the past to show that wiretaps are not very important to law enforcement, so cannot justify various measures proposed by the FBI that the FBI claims are necessary to keep them possible. So now we have: -- wiretapping reached an all-time high in 1994, 1,154 taps authorized for federal and state combined up from 976 in 1993. In context (we'll see more below), it's clear that the intent of this quote (and of using language like "all-time high") is to produce a feeling of a growing threat to civil liberties. Of course, one could equally argue that 1,154 taps in a country of 300,000,000 or so, that pursued millions of criminal investigations in 1994, is so insignificant that it could be tossed out without any noticeable effect. I suppose others *will* make that argument, simply ignoring the increase. The numbers are wonderful. If they are small, they aren't important and it's no great loss if they are eliminated. If they are large, civil liberties are threatened, so they should be cut down. If they are increasing (decreasing) ... well, you can fill in the arguments. -- 75% of all taps were authorized for narcotics investigations, 8% for gambling, and 8% for racketeering OK. -- Not a single tap was authorized for investigations involving "arson, explosives, or weapons" in 1994. In fact, such an order hasn't been approved since the late 1980s. Keep that in mind when people say wiretapping is necessary to prevent tragedies like Oklahoma City. I guess whoever wrote this hasn't been listening to the radio, watching television, or reading the newspapers. Guess what: The investigative agen- cies of the government are under severe criticism for *ignoring* the threat posed by right-wing extremists. Not only haven't they wire-tapped these people; they basically haven't investigated them at all. One could equally well argue that "the FBI tells us FBI agents are necessary to prevent tragedies like Oklahoma City, but a look at the record indicates that they haven't been used in relevant investigations in 1994, so clearly they are wrong." (Oh, yes "preventing tragedies like Oklahoma City" is one of those little phrases all the best spin-doctors are using. Tugs so nicely at the heart strings. Can justify anything at all. Let's give it a try: "If money were available to provide better pre-school education, people like Timothy McVay would be better adjusted, better educated, and have better jobs. That would get at the root causes, the frustrations with modern life, and would be a big step toward preventing tragedies like Oklahoma City." OK, class, your assignment: Justify government funding of laptop computers for all citizens. Extra credit assignment: Justify better traffic control systems. Hint: TV cameras to monitor traffic.) By the way, the FBI more or less stopped investigating nominally-political groups in the mid- to late-1980's after changes in procedures made it very difficult. Under current rules, the FBI needs pre-existing evidence of criminal acts to "infiltrate" - i.e., send someone to a meeting without first identifying him as from the FBI - such a group. These rules were imposed in reaction to the perception of abuses, particularly in the infiltration of various political organizations concerned with Nicaragua. There is debate now as to whether the rules have gone too far and made investigation too difficult. Perhaps not, but *as the FBI has chosen to interpret them*, these rules have shut down investigation of "political" groups - which certainly includes shutting down wiretapping of such groups. -- Only 17% of all conversations intercepted were deemed "incriminating" by prosecutors. That figure is at an all-time low (in the early '70s it was closer to 50%), and it means that the FBI is gathering far more information through electronic surveillance unrelated to a criminal investigation than ever before. -- Also, the duration of the taps is way up, now around 40 days on average. Twenty years ago, it was closer to 18. So, if we put these together, it seems that the FBI is tapping phones that are being used for multiple purposes, rather than "criminal business lines" so to speak. So? We know from earlier figures that narcotics investigations made up the bulk of wiretaps. It seems logical that narcotics trafficers need to make relatively few "business-related" calls. Suppose twenty years ago a much larger percentage of taps were in gambling investigations. Many of those taps would be of bookie's phone lines, which are used for hours on end just for taking bets. Could this be the cause of the change? We can't say, because we aren't given any comparative numbers. Again, the numbers aren't being quoted here for information; they are being quoted to make a point. Finally: The FBI's claim that new technologies are frustrating wiretap is completely without support. The FBI has claimed that new technologies are just beginning to frustrate wiretapping, but that they will be an increasing problem in the future. The deployment of many of these technologies is limited even today. Yes, the FBI has at times been guilty of overstating the current problems. They too have been more interested in propaganda value than truth. I don't approve of mendacity on their part any more than I approve of it on the part of others - but lying doesn't justify more lying. Any objective look at the technologies that are beginning to be introduced into the telephone system make it clear that the FBI is correct. As a simple example, a traditional analogue telephone line can be tapped anywhere along its length with simple, inexpensive equipment. An ISDN voice line cannot be tapped without great difficulty and expense anywhere except within the telephone company central office, or within the premises where the phone is located. (This is inherent in the nature of the coding on the line, which is the combination of signals going both ways. The two endpoints each know their own signal and can subtract it off to figure out the other guy's signal; but in the middle, you know neither signal and so can get neither. The only way to "tap" the line is to physically cut it and break it into two separate lines, with you sitting in the middle, playing the role of telephone to the central office and central office to the telephone. Possible but not cheap or easy compared to a pair of clips and an amplifier. This is a fairly *simple* technology to deal with!) That new technologies will, in the near future, make tapping more difficult and expensive is clear fact. How important that fact is - how important the ability to wiretap is - can be argued. What we as a society choose to do about it is a political question. We've been conflating fact with political choices for too many years. We want to spend more and tax less - fine, come up with some "facts" to prove that (a) if the government taxes less, it will bring in more money; (b) deficits don't matter anyway. We want to provide Social Security for everyone - fine, cite the "fact" that it's an insurance system while implementing a pay-as-you-go system. We want cleaner air, so cite the "fact" that electic cars are "zero-pollution"; ignore such incon- veniences as emissions from the power plants, or the lead emitted into the environment in the process of making the batteries for those cars. (See a recent New York Times article.) If the remedy for bad speech is better speech, the remedy for propaganda masquerading as facts is real facts, not more propaganda. But if the $500,000,000 to make the network wiretap ready is appropriated, the current trends will be amplified: more surveillance, longer duration, less well targeted --> less privacy for all Americans. Pure hyperbole, speculation upon speculation all heaped on top of numbers way too flimsy to bear any such weight. -- Jerry ------------------------------ Date: Fri, 12 May 1995 22:04:43 -0500 (CDT) From: David Smith <bladex@BGA.COM> Subject: File 4--(fwd) "Blacklisted! 411" - a direct ripoff of 2600 Magazine (fw d) ---------- Forwarded message ---------- Recently a number of people have contacted 2600 concerning another hacker magazine called "Blacklisted! 411". Having more hacker publications has always been something we've tried to encourage. Zines like Cybertek, 40Hex, Hack Tic, and Private Line have been helped or inspired by 2600 over the years, not to mention numerous other zines that we have trade arrangements with. The current zine scene is healthy and prospering. So we were happy to see that there was another hacker rag in the works. Then we got our first look at "Blacklisted! 411". To say it's similar in appearance to 2600 would be an incredible understatement. Anyone looking at the two publications will notice a very disturbing amount of unattributed duplication which, we regret to say, goes far over the line to the category of blatant ripoff. This is not about style similarity. True, their zine is the same size as ours. They use the exact same font style and size, their text boxes are the same, the staff box looks almost identical (except, of course, for the staff). Not too original, but so what. The real problem comes from the fact that this publication has taken numerous pieces of 2600 and published them as their own without any credit given and without ever asking permission. We've nearly always granted permission for zines to reprint selected articles of ours, as long as the author and 2600 are credited. Our primary goal, after all, is to get the word out. But this goes way beyond any conceivable 'sharing of information' between two publications. The two feature articles in the current issue of "Blacklisted! 411" were both printed years ago in 2600. One of the articles (on 5ESS switches) was also printed in Phrack a few years back. No mention of this fact is made, no credit to the authors is given. Both articles appear to have been written by the staff of "Blacklisted! 411". We've heard reports that most of the other articles were also lifted from other publications or the net, again without accreditation and leaving the impression that "Blacklisted! 411" is the originator. "Blacklisted! 411" has a section very similar to the 2600 Marketplace. They call theirs the Marketplace. Our wording for our marketplace advertising is: "Marketplace ads are free to subscribers! Send your ad to: <address>. Ads may be edited or not printed at our discretion." Their wording reads: "Marketplace Ads are FREE to subscribers! Send your ad to: <address>. Ads may be edited or not printed at our discretion." Not only that, but these people have actually gone so far as to reproduce our subscribers' ads without their permission, no doubt as part of a plan to obtain more advertising by appearing to have many customers. They did such a poor job covering this up that one of "their" ads has a line reading "All 2600 subscribers gain complete access". Throughout its pages, "Blacklisted 411" reproduces our house ads *word for word* as if they were their own. Perhaps the most disturbing examples of this magazine's ill intent lie in the replies to their letters. Not surprisingly, some of their readers think they're somehow affiliated with 2600 and address them as such. In one reply, the editor says, "I wonder why everyone keeps addressing us as 2600? Are we THAT much alike? haha." So now we're faced with the unpleasant prospect of what to do about this. To do or say nothing would be a disservice to our magazine, our readers, and all that we've accomplished over the last 11 years. At the same time, we have no desire to emulate the corporate giants who try to intimidate us into not publishing what we publish, even though a number of people are advising us to take some sort of legal action. The truth is, we haven't decided yet on a course of action. Suggestions would be welcomed. Our only goals are to get these people to stop printing material from our magazine without permission or credit, to stop copying our in-house and subscriber advertisements, and to stop representing themselves fraudulently to the hacker community. Emmanuel Goldstein Editor, 2600 Magazine (516) 751-2600 emmanuel@2600.com ------------------------------ Date: Sat, 13 May 1995 13:40:30 -0500 (CDT) From: Wade Riddick <riddick@JEEVES.LA.UTEXAS.EDU> Subject: File 5--Response to teleright critics Reply to Teleright Criticism (c) 1995 By Wade Riddick Circulate freely unaltered I have made an effort to respond to most of my private critics and I believe the exchange has been mutually beneficial. Because of space constraints and other factors, I apparently failed to fully address certain areas which others found important to my argument so I will try to share the fruits of these exchanges with CUD readers and also address public comments made by David Gersic in CUD 7.37. Let me first thank everyone for their constructive criticism. The first major issue pertains to cryptography and piracy. As many have noted, no system of cryptography is full-proof. In Mr. Gersic's words, I've "missed the basic method of software piracy; remove the protection." While at least one of my respondents believes that secure hardware encryption devices are possible, I do not share this faith in technology. That is why I dedicated several paragraphs in my original essay to discussing the possibilities of piracy. Where there's a key, there's always a way to pick the lock. In the case of cryptography, there is always the danger that individuals with the proper keys (or technical knowledge) will undermine the system. This is a social-economic problem having to do with the way technology is used. But I do not wish to use cryptography to eliminate piracy and I implied as much in my reasoning. I just want to change the economic incentive structures to make piracy less prevalent. My aim is not to do away with fraud but to discourage it. It has been pointed out that licensing programmers will not put a stop to fraud. Well, licensing lawyers does not prevent them from abusing their powers of attorney. The potential for disbarment (not to mention jail) does, however, severely curtail these abuses. Plenty of people also run around counterfeiting currency, but I see no reason to legalize this activity for the general public. In Mr. Gersic's phrase, "information [is] neither 'good' nor 'bad.'" We may not be able to restrict information, but I think we can and must prosecute its misuse. When it comes to piracy, I can think of two separate sets of problems. The first problem comes from individuals decrypting and re- telerighting documents as their own in order to make money. If publications are issued from a public utility, that utility can ask for decrypted copies of the document and always check for pirated copies. In any event, a teleright document always contains its source and a company scanning the market for pirated copies could quite easily trace a pirated document back to its source, assuming network nodes can't be faked. There is the possibility that con-artists could set up and strike down node sites quite quickly to pick up a fast buck, but given the amount of time it would take to build a client base relative to the amount of time it would take to be detected I do not think this would usually be economically feasible. The second method of piracy is harder to detect and involves the possession/transmission of decrypted documents. Someone stealing information on their home computer wouldn't cost companies much unless they started passing it around. As long as the skills for doing such things are fairly restricted, the loss from private abuse is not likely to be great enough to worry companies. On the other hand, corporations will probably have the necessary talent base and economic incentives to buy a copy, decrypt it and pass it around the company. This sort of thing may be detectable by using intelligent software agents and packet sniffers on public right-of-ways to scan for copyrighted materials that has been decrypted. There is an optimization problem as far as deciding how much data to scan for and how high to set pirating fines. This sort of thing tends to be easier to detect the larger the organization is. I think, though, there is a better social solution. We can make individuals and corporations with the skills to pirate materials part of the legitimate distribution system. We can give them a re-publication franchise and a legal share of the gains made from their distribution efforts, cutting both the distribution and enforcement costs for normal publishers. This was essentially the solution accepted in the Chinese trade dispute over CDs several months ago. Sadly, this will not work for those individuals who pirate information for ideological and not economic reasons. One must make an effort to trace the decrypted documents back to their source and prosecute the original decryptor/distributor. Of course, the only real way society can deal with harmful beliefs is to insure that it does not produce individuals holding them. When it comes to piracy, as it does with any other form of criminal behavior, the question is not how to prevent something but how to discourage it from happening and reduce losses associated with it. The best example of this type of reasoning is found in Madison's Federalist #10. The second criticism leveled at telerights has to do with privacy. Many people balk at the idea of using a copyright protection system that links users and publishers so closely. People often give up a small amount of privacy for even more convenience. This happened with checks and credit cards. Cash is anonymous but people regularly use these easier forms of transactions, despite the fact that they have the buyer's name attached to them and pass through numerous institutions. From the privacy standpoint you would expect individuals to want to keep their most expensive purchases private and not care about smaller items, but we see exactly the opposite sort of behavior in the market. There are even laws that force companies to report large cash transactions ($10,000+). If this is of concern, though, it would be possible to use public libraries and private corporations as firewalls. The library would double encrypt the works it lent out with a time-expiring key and the library, not the borrower, would show up to the publisher as the user. One benefit to using a public utility is that it can act as just such a firewall; indeed, in many ways, libraries are already model utilities. One of my respondents indicated you could also use zero-knowledge proofs as one way to guarantee anonymity in the transaction. There are even ways telerights can strengthen individual privacy. A user could, for instance, teleright personal information about themselves to control who has access to it and to have knowledge about who's using it. There is also nothing to prevent the fragmentation of keys or the adoption of a public key system so that with credit records, let's say, you have to get the key from my site and the bank's in order to check my credit record. Technically I'm supposed to know about everyone who looks at my credit record, but in practice we rarely have time to request such information and the agencies that maintain the data don't ever go to the trouble to notify us on their own. Any agency collecting private information about us could be forced by law - depending on the type of information - to use a public key to encrypt that information and give us (and a government repository) the key necessary to decrypt it (or rather, we would give them the public key for encryption). It would be impossible to view such telerighted documents without first informing the individual concerned. The government would act as a disinterested third party that would verify to the company that the keys were valid. A third misconception is that telerights mandate a certain form of contract in the market, namely per-use billing for material. Mr. Gersic writes that "each time I want to refer to a diagram in this document I have to insert a quarter in the coin slot in the side of my monitor." Telerights, by strengthening private property rights, makes a variety of contracts possible. I would hope that companies continue to sell permanent rights to documents. I'm not trying to push a particular contract on the industry, just lower the general transaction cost for intellectual property. I think a telerights system, just like many digital technologies, causes us to rethink the mission of public libraries. Libraries not only create a barrier of anonymity between readers and publishers, they also serve as an archive for valuable information that may not be used for years to come. Under telerights, libraries get specifically encrypted copies to loan out. It is the publisher's duty to store the decrypted copies. I think telerighted libraries turn into archives for decrypted information, information that publishers no longer have an economic incentive to maintain. In this sense telerights might squeeze more money out of large publishing houses because it would force them to be more creative and more productive. Why buy a reprint of Machiavelli when you can get your own copy for free at the school library? I will now address the rest of Mr. Gersic's criticisms. I would normally not address some of these points, since they are minor, but they were made in a public forum. Mr. Gersic states that "At best, the current copyright code does not map well onto the computer information it is being applied to" but he himself offers no alternative method for rewarding producers of information, nor does he offer any revisions to the copyright code. This conceptual gap is most apparent when he links copyright law to the print media: "the print media are attempting to maintain their monopoly on information distribution." Copyrights apply to a number of electronic media as well. He does make a legitimate point that people will attempt to scan back in information for electronic distribution, in his words, "bootlegging movies... [with] a cam-corder." He also mentions "lousy" bootlegged copies of rock concerts and indicates these items tend to do well in the market. I would say that they only do well when better copies are unavailable. In both instances, they do not compete well at all with the genuine item. When the producers release the movie on videotape, I'll bet the bootleg market dries up unless the price for the legitimate item is exorbitantly high. Given that electronic distribution and teleright protection will lower transaction costs, I do not normally think this will be a problem. This also pertains to another point I made about non-linear media. There aren't any physical hard copies that can be scanned back in. Hypertext links and other non-linear structures can't be printed because they aren't of use on paper. The only real threat is to traditional linear media like books that can be perfectly scanned. Ignoring the re-publication and piracy issue which I've already covered, it's unclear why someone would scan a book back in for individual use if the license was inexpensive enough. Special care does have to be taken when it comes to fair use quotation, since that material may circulate around electronically. Mr. Gersic has also either failed to correctly read my essay or deliberately distorted it by taking portions out of context. If I can quote myself, I said in my opening paragraphs that, "Some have proposed drastically curtailing electronic technology in order to protect future publishers. They want to put all forms of computer copying under the copyright code... They want to ban the electronic resale or renting of copyrighted material fearing that the piracy which has plagued software will plague movies and books when they enter cyberspace." Mr. Gersic, though, only quotes the last sentence and asks the question, "Who are 'they'?", implying some sort of attempt on my part to be conspiratorial. "They" refers to the "some" people mentioned in the opening sentence of the paragraph - conveniently not quoted. Mr. Gersic does make valid points that a teleright system assumes, to use Mr. Gersic's words, "that I'll have a network connection wherever I might want to use this document... If I carry my laptop out under a tree to sit in the sunshine, I'm screwed and have to go back inside where the ethernet is." I happen to agree that this assumes a personal, high-bandwidth network connection. That's why I made the point in my original essay. "[E]ven though the technology exists, the infrastructure needed to make a system like telerights work is not yet in place." Mr. Gersic has conveniently omitted this quotation in his criticism. Regardless, I don't see why telerights could not operate over the airwaves, since the bandwidth that's needed to transmit the keys is much lower than that needed to transmit the entire document. And I don't think it's much of a burden to make someone get up from under a tree to go inside and purchase a copy of the movie. <Sigh> The life of digital convenience is a hard one. Mr. Gersic also assumes that "I have to pay for [network links] on a per-call basis." No one is forced to pay for local phone service on a per-call basis. I think this reasoning assumes network exchanges will periodically shut down and start up at fixed and knowable intervals. I see the networked future (in twenty years, say) as being something more or less continuous. I also think, given a high volume of network traffic and a flat rate for local use, that resending keys will be fairly cheap. Also, I believe I pointed out that the document stays decrypted in RAM once that link is made. Mr. Gersic seems to think that "if that document has a link to another document, there's another phone call to validate the new document, and possibly a third one to get back to my original document." No, it stays around - unless you lack the 4 terabytes needed to run Windows 2019, in which case the operating system can just cache the key. Although I have already covered the issue of privacy, I wish to reiterate that I do, in fact, share Mr. Gersic's desire to protect individual privacy. I do not think that the FBI (or the NSC, in particular) should run around making unwarranted checks on what everyone's doing. As one reader has pointed out, it is impossible to look at a library's records without a warrant. It ought to be the same with telerights. I do think these agencies should have warranted access to these records. If the FBI can convince a judge that there's reasonable cause Tim McVeigh bombed a federal building, then they should have the ability to search through all his records. There is no such thing as an absolute right to privacy. If individuals fail to produce cryptological keys when faced with a court order, they should be jailed for contempt just like a witness who refuses to testify. We don't make exceptions for witnesses in trails and we shouldn't make exceptions for inanimate lumps of bits. I do also agree with Mr. Gersic that international export poses a problem for telerights, though not on the cryptological dimension he points out. Obviously the American government will have to get past its problems with strong cryptography, but there are more important points with international copyright law. Telerights would automate and enforce a number of laws that some countries have up until now only paid lip service to. This brings me to my final point. Mr. Gersic sums up an number of common opinions found on the internet when he examines my degree program (political science) and states "I'm just another net.admin/programmer out here in the world. Maybe I don't know any better, but I worry when the government (or, in this case, somebody majoring in government) wants to help me." Well, I feel sorry that Mr. Gersic is unable to take individuals who profess to have an interest in the common good of society at their word. If I didn't feel that this attitude was dangerously prevalent, I would let this comment pass. I don't, in fact, feel that Mr. Gersic has been malicious in any of his criticisms - after all, he did call my proposal "well-meaning" - but he has been careless. The same National Science Foundation which has funded my analysis of politics also helped fund his beloved internet. I think the attitude - and I'm not accusing anyone in particular of having it, just pointing out its prevalence - that I've gotten mine now you get yours is quite harmful to society. All too often the government seems to be invisible when it's helping us. When it's helping others it looks, to use PJ O'Rourke's phrase, as if public restrooms are the pinnacle of public works projects. The real solution to government problems is not to become detached from the public discourse, but rather to join it. I don't think Mr. Gersic realizes that in responding to my essay he has made an important contribution to public political discourse. Why we see such activities as somehow being 'non-political' is beyond me. In any event, I have received a number of similar responses indicating a distrust in government. As a political refugee from Louisiana living in Texas (not much of an improvement), all I can say is that the solution to 'corruption' isn't to do away with warranted searches or to dismantle the 'government.' The solution is to go to the polls and carefully select your elected representatives. Trust me. The potential for abusing any kind of private information is far greater when it's in private hands. By and large, the people working in government are more diligent and honest than those in private industry (I would include Mr. Gersic in the former group since his net address indicates he works for a university). Few go into government service to get rich, though they may go there to make their friends rich. There is a corruption problem in politics and I've experienced it first-hand in a way that most of my readers have not. The solution isn't to get rid of government, but rather to get involved. I've seen the private sector at work too and I think we fail to realize that private market economics is all too often the prime cause of government corruption. If anything, we should be distrustful of the market. We don't always have a vote in it. We do with government. ------------------------------ Date: Thu, 11 May 1995 14:18:23 EST From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.DECUS.CA> Subject: File 6--(review) "Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994 MLALIVE.RVW 950508 "Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994 %A Suzana Stojakovic-Celustka celustka@sun.felk.cvut.cz %B Alive Ejournal %C Prague/Zagreb %D March 1994, July 1994 %E Suzana Stojakovic-Celustka celustka@sun.felk.cvut.cz %P Alive 0, 25K Alive 1, 100K %S Alive %T Alive 0, Alive 1 Suzana Celustka is part of the international virus research community. She became active in research while attending university in Prague, but comes originally from Croatia and is currently resident in Zagreb. In 1993 she attempted to spur development of a proper definition of a viral program (which still eludes researchers and writers) by promoting a virus definition contest. (She did put a bit of life into the proceedings by calling for definitions not only in text and mathematical forms, but also jokes and poetry.) The lack of success in this area will be familiar to workers in the field of artificial life, who have had similar difficulties in delineating life. As it happens, this is another area of Ms. Celustka's interests, and in 1994 she started "Alive" magazine, distributed electronically, in order to examine the relation between computer viral programs and artificial life. Two editions of the magazine have been published so far, with a third now in process. (The move back to Croatia and a period of ill health contributed to the delay.) "Alive 0" is stated to be the zeroth, or beta, edition, and explains the background of the project. It also contains the results of the first contest the definition of a computer virus in the technical categories. There are also articles on the "lifelike" characteristics of code for LAN token regeneration and on Cohen's theorem of the "undecidability" of viral detection. In "Alive 1", Ms. Celustka contributes two articles herself, one on the nature and limitations of language (in regard to the problem of technical definition), and another on the "Great Debate" about the benefits versus dangers of viral programs. In addition to the feature and invited articles, each edition includes an interview with at least one (and usually more) researcher prominent in the field. The participants in "The Great Debate", for example, were Fred Cohen (cf BKSHRTVR.RVW and BKITSALV.RVW), Mark Ludwig (cf BKLUDWIG.RVW) and Vesselin Bontchev. The questions asked are incisive and insightful. Alive is available in a number of ways. Subscriptions requests should be sent to mxserver@ubik.demon.co.uk. Back issues are available from ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/alive, ftp://ftp.demon.co.uk/pub/antivirus/journal/alive, ftp://ftp.elte.hu/pub/virnews, ftp://ftp.u.washington.edu/public/Alive, gopher://saturn.felk.cvut.cz, and gopher://ursus.bke.hu. Send your contributions and comments to celustka@sun.felk.cvut.cz. Alive represents very real explorations in both virus and artificial life research. The opinions and thought presented are sometimes radical departures from mainstream discussion. With careful moderation and editing, however, there is no chance of the "high noise/low signal" traffic one usually sees in many more well known fora. Alive is highly recommended for any interested in viral or artificial life studies. copyright Robert M. Slade, 1995 MLALIVE.RVW 950508 Postscriptum: As this review was being written, anti-personnel rounds were falling on Zagreb. Although the situation seems to have eased, momentarily, Croatia still does not seem to be a preferred situation for raising a family. Although Ms. Celustka does not know I am adding this message, I have reason to believe that she would appreciate any assistance with employment or immigration which those in safer parts of the world could give her. ============= Vancouver ROBERTS@decus.ca | "The only thing necessary Institute for Robert_Slade@sfu.ca | for the triumph of evil Research into Rob_Slade@mindlink.bc.ca | is for good men to do User slade@freenet.victoria.bc.ca | nothing." Security Canada V7K 2G6 | - Edmund Burke ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST <your name> Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.39 ************************************