Computer underground Digest    Wed  Jun 14, 1995   Volume 7 : Issue 49
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Triviata:     How many Spams have C&S Done since April '94?

CONTENTS, #7.49 (Wed, Jun 14, 1995)

File 1--INFO: Senate passes Decency Act 84-16; House is the next battle
File 2--Repost: EPIC Files Brief in 2600 Case
File 3--Media Feeding Frenzy on "runaway internet teens"
File 4-- Tutorial:  Social Engineering vs Psychological Subversion (fwd)
File 5--Tutorial:  Social Engineering vs Psychological Subversion
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 14 Jun 1995 18:33:53 -0400
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
Subject: 1--INFO: Senate passes Decency Act 84-16; House is the next battle

 =================================================================
       CAMPAIGN TO STOP THE EXON/GORTON COMMUNICATIONS DECENCY ACT
	(SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END)

	Update: -The Latest News: The Senate voted to attach the
		 Communications Decency Act to the Telecom Reform bill.
		 Leahy's alternative was not attached to the Telecom
		 Reform bill.
		-What You Can Do Now


        CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT
			   June 14, 1995

      PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
		 REDISTRIBUTE ONLY UNTIL June 25, 1995
	     REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS

      Distributed by the Voters Telecommunications Watch (vtw@vtw.org)

 ___________________________________________________________________
CONTENTS
	Background
	The Latest News
	What You Can Do Now
        For More Information
        List Of Participating Organizations

 _________________________________________________________________
BACKGROUND

The Communications Decency Act (sponsored by Sen. Exon and Gorton) would
criminalize many forms of expression on online systems.  Many believe
it to be unconstitutional, and a fight to oppose it has been waged
since its introduction.  It was recently attached to the fast-tracked
Telecommunications Deregulation bill, which is moving quickly through
Congress.

 _________________________________________________________________
THE LATEST NEWS

Right up until the last minute, callers reported weary Senatorial
staffers continued to report a deluge of incoming calls, almost all
against the Exon/Coats bill and supporting the Leahy alternative.  The
Senate debated the Exon/Coats/Gorton Communications Decency Act and the
Leahy alternative today (June 14, 1995) starting at about 3:30pm EST
for 90 minutes.

The debate was opened by Senator Exon who read a prayer to protect
against computer pornography.  Senators Exon (D-NE) and Coats (R-IN)
spoke in favor of their position.  Senator Gorton (R-WA) was
mysteriously absent from the debate.

Exon referred those that signed the petition to prevent his censorship
bill as "selfish".  Exon presented letters from many groups in support
of his bill, including the Christian Coalition, the Family Research
Council, the National Law Center for Families.  He also stated that
75% of computer owners have refused the join the Internet because the
obscene material they feared on the Internet.

Senators Byrd (D-WV) and Heflin (D-AL) cosponsored the Exon bill at
the last minute.

Senators Leahy (D-VT) and Feingold (D-WI) spoke passionately about the
First Amendment and the Internet.  Feingold warned against the dangers
of chilling free speech.  Leahy brought out the monster petition in
support of his alternative (it looks pretty impressive on television)
and proceeded to try to debunk the myths Exon promulgated about the
Internet.  He also trumpeted the success of the Internet, and pointed
out it wouldn't have been nearly as successful if the US government had
tried to micro-manage it.

Both Exon and Leahy then gave back extra debating time and went to a vote
on the bill.  The Exon bill was successfully attached to the Telecomm
Reform bill (84-16).  The Leahy alternative was not attached to the
Telecom Reform bill.

Questions and answers:

Q: What does this mean?
A: It means we lost this round.  The unconstitutional Exon Communications
   Decency Act was attached to the Telecomm Reform bill.

Q: What's the next step?
A: Next, we need to ensure that a House equivalent to the Exon
   Communications Decency Act is not attached to the House Telecomm Reform
   bill.

Q: Where can I find more information about the bill?
A: Check below.

 ___________________________________________________________________
WHAT YOU CAN DO NOW -- U.S. and non-U.S. citizens

1. Familiarize yourself with the version of the bill that passed,
   and the transcript of the Senate debate. (directions to obtain
   these are below)

2. Check the voting list below.  It wouldn't hurt to send a nice
   letter, email, or fax to the Senators that voted to defeat the
   Communications Decency Act.  Hateful mail to Senators who did
   not vote your way is not only *bad form*, but likely to become illegal
   soon anyway, under the Communications Decency Act.

   In other words, take some time to cool off.

3. If you don't receive Coalition alerts reliably through mail or news,
   join the mailing list by sending mail to listproc@vtw.org with
   "subscribe vtw-announce Firstname Lastname".  We'll have to fight
   this battle in the House soon and you should be informed.

4. Relax, it's not the end of the world.  We still have this battle to
   fight in the House of Representatives and then in the conference
   committee.  This is a setback, but we haven't lost yet.

 __________________________________________________________________
RESULTS OF THE SENATE VOTE

Senators who voted to defeat the Communications Decency Act
(A polite letter to congratulate them for defending your free speech
 rights would be appropriate.)

      D ST Name (Party)               Phone           Fax
      = == ==================         ==============  ==============
      D CT Lieberman, Joseph I.       1-202-224-4041  1-202-224-9750
      D DE Biden Jr., Joseph R.       1-202-224-5042  1-202-224-0139
      D IL Simon, Paul                1-202-224-2152  1-202-224-0868
                                        senator@simon.senate.gov
      D IL Moseley-Braun, Carol       1-202-224-2854  1-202-224-2626
      D MA Kennedy, Edward M.         1-202-224-4543  1-202-224-2417
                                        senator@kennedy.senate.gov
      D MI Levin, Carl                1-202-224-6221  na
      D MN Wellstone, Paul            1-202-224-5641  1-202-224-8438
      D NM Bingaman, Jeff             1-202-224-5521  na
                                        Senator_Bingaman@bingaman.senate.gov
      D NY Moynihan, Daniel P.        1-202-224-4451  na
      D OH Glenn, John                1-202-224-3353  1-202-224-7983
      R RI Chafee, John H.            1-202-224-2921  na
      D VA Robb, Charles S.           1-202-224-4024  1-202-224-8689
                                        Senator_Robb@robb.senate.gov
                                        vascr@CapAccess.org
      D VT Leahy, Patrick J.          1-202-224-4242  1-202-224-3595
                                        senator_leahy@leahy.senate.gov
      R VT Jeffords, James M.         1-202-224-5141  na
      D WA Murray, Patty              1-202-224-2621  1-202-224-0238
      D WI Feingold, Russell          1-202-224-5323  na
                                        russell_feingold@feingold.senate.gov


Senators who voted to support the (CDA) Communications Decency Act
(They voted for the CDA and to curtail your free speech rights.
 Writing them an impolite and nasty letter would be a bad idea, and
 may soon be illegal under the CDA anyway.  Take some time to cool down.)

      D ST Name (Party)               Phone           Fax
      = == ==================         ==============  ==============
      R AK Murkowski, Frank H.        1-202-224-6665  1-202-224-5301
      R AK Stevens, Ted               1-202-224-3004  1-202-224-1044
      D AL Heflin, Howell T.          1-202-224-4124  1-202-224-3149
      R AL Shelby, Richard C.         1-202-224-5744  1-202-224-3416
      D AR Bumpers, Dale              1-202-224-4843  1-202-224-6435
      D AR Pryor, David               1-202-224-2353  1-202-224-8261
      R AZ Kyl, Jon                   1-202-224-4521  1-202-228-1239
      R AZ McCain, John               1-202-224-2235  1-602-952-8702
      D CA Boxer, Barbara             1-202-224-3553  na
      D CA Feinstein, Dianne          1-202-224-3841  1-202-228-3954
      R CO Campbell, Ben N.           1-202-224-5852  1-202-225-0228
      R CO Brown, Henry               1-202-224-5941  1-202-224-6471
      D CT Dodd, Christopher J.       1-202-224-2823  na
      R DE Roth Jr.  William V.       1-202-224-2441  1-202-224-2805
      D FL Graham, Robert             1-202-224-3041  1-202-224-2237
      R FL Mack, Connie               1-202-224-5274  1-202-224-8022
      D GA Nunn, Samuel               1-202-224-3521  1-202-224-0072
      R GA Coverdell, Paul            1-202-224-3643  1-202-228-3783
      D HI Akaka, Daniel K.           1-202-224-6361  1-202-224-2126
      D HI Inouye, Daniel K.          1-202-224-3934  1-202-224-6747
      D IA Harkin, Thomas             1-202-224-3254  1-202-224-7431
      R IA Grassley, Charles E.       1-202-224-3744  1-202-224-6020
      R ID Craig, Larry E.            1-202-224-2752  1-202-224-2573
      R ID Kempthorne, Dirk           1-202-224-6142  1-202-224-5893
      R IN Coats, Daniel R.           1-202-224-5623  1-202-224-8964
      R IN Lugar, Richard G.          1-202-224-4814  1-202-224-7877
      R KS Dole, Robert               1-202-224-6521  1-202-224-8952
      R KS Kassebaum, Nancy L.        1-202-224-4774  1-202-224-3514
      D KY Ford, Wendell H.           1-202-224-4343  1-202-224-0046
      R KY McConnell, Mitch           1-202-224-2541  1-202-224-2499
      D LA Breaux, John B.            1-202-224-4623  na
      D LA Johnston, J. Bennett       1-202-224-5824  1-202-224-2952
      D MA Kerry, John F.             1-202-224-2742  1-202-224-8525
      D MD Mikulski, Barbara A.       1-202-224-4654  1-202-224-8858
      D MD Sarbanes, Paul S.          1-202-224-4524  1-202-224-1651
      R ME Snowe, Olympia             1-202-224-5344  1-202-224-6853
      R ME Cohen, William S.          1-202-224-2523  1-202-224-2693
      R MI Abraham, Spencer           1-202-224-4822  1-202-224-8834
      R MN Grams, Rod                 1-202-224-3244  na
      R MO Bond, Christopher S.       1-202-224-5721  1-202-224-8149
      R MO Ashcroft, John             1-202-224-6154  na
      R MS Cochran, Thad              1-202-224-5054  1-202-224-3576
      R MS Lott, Trent                1-202-224-6253  1-202-224-2262
      D MT Baucus, Max                1-202-224-2651  na
      R MT Burns, Conrad R.           1-202-224-2644  1-202-224-8594
      R NC Faircloth, D. M.           1-202-224-3154  1-202-224-7406
      R NC Helms, Jesse               1-202-224-6342  1-202-224-7588
      D ND Conrad, Kent               1-202-224-2043  1-202-224-7776
      D ND Dorgan, Byron L.           1-202-224-2551  1-202-224-1193
      D NE Kerrey, Bob                1-202-224-6551  1-202-224-7645
      D NE Exon, J. J.                1-202-224-4224  1-202-224-5213
      R NH Gregg, Judd                1-202-224-3324  1-202-224-4952
      R NH Smith, Robert              1-202-224-2841  1-202-224-1353
      D NJ Bradley, William           1-202-224-3224  1-202-224-8567
      D NJ Lautenberg, Frank R.       1-202-224-4744  1-202-224-9707
      R NM Domenici, Pete V.          1-202-224-6621  1-202-224-7371
      D NV Bryan, Richard H.          1-202-224-6244  1-202-224-1867
      D NV Reid, Harry                1-202-224-3542  1-202-224-7327
      R NY D'Amato, Alfonse M.        1-202-224-6542  1-202-224-5871
      R OH Dewine, Michael            1-202-224-2315  1-202-224-6519
      R OK Inhofe, James              1-202-224-4721
      R OK Nickles, Donald            1-202-224-5754  1-202-224-6008
      R OR Hatfield, Mark O.          1-202-224-3753  1-202-224-0276
      R OR Packwood, Robert           1-202-224-5244  1-202-228-3576
      R PA Santorum, Rick             1-202-224-6324  na
      R PA Specter, Arlen             1-202-224-4254  1-717-782-4920
      D RI Pell, Claiborne            1-202-224-4642  1-202-224-4680
      D SC Hollings, Ernest F.        1-202-224-6121  1-202-224-4293
      R SC Thurmond, Strom            1-202-224-5972  1-202-224-1300
      D SD Daschle, Thomas A.         1-202-224-2321  1-202-224-2047
      R SD Pressler, Larry            1-202-224-5842  1-202-224-1259*
      R TN Thompson, Fred             1-202-224-4944  1-202-228-3679
      R TN Frist, Bill                1-202-224-3344  1-202-224-8062
      R TX Hutchison, Kay Bailey      1-202-224-5922  1-202-224-0776
      R TX Gramm, Phil                1-202-224-2934  1-202-228-2856
      R UT Bennett, Robert            1-202-224-5444  1-202-224-6717
      R UT Hatch, Orrin G.            1-202-224-5251  1-202-224-6331
      R VA Warner, John W.            1-202-224-2023  1-202-224-6295
      R WA Gorton, Slade              1-202-224-3441  1-202-224-9393
      D WI Kohl, Herbert H.           1-202-224-5653  1-202-224-9787
      D WV Byrd, Robert C.            1-202-224-3954  1-202-224-4025
      D WV Rockefeller, John D.       1-202-224-6472  na
      R WY Simpson, Alan K.           1-202-224-3424  1-202-224-1315
      R WY Thomas, Craig              1-202-224-6441  1-202-224-3230

 __________________________________________________________________
FOR MORE INFORMATION

We will be archiving the version of the Communications Decency Act
that passed, the roll call vote that went with it, and the transcript
of the Senate debate.

We will make these available through the methods below as soon as
they are available through the Government Printing Office (this usually
takes about 24 hours).  Please try to use the Web or Gopher sites first
before using our email server.

Web Sites
        URL:http://www.panix.com/vtw/exon/
        URL:http://epic.org/
        URL:http://www.eff.org/pub/Alerts/
        URL:http://www.cdt.org/cda.html

FTP Archives
        URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
        URL:ftp://ftp.eff.org/pub/Alerts/

Gopher Archives:
        URL:gopher://gopher.panix.com/11/vtw/exon
        URL:gopher://gopher.eff.org/11/Alerts

Email:
        vtw@vtw.org (put "send help" in the subject line)
        cda-info@cdt.org (General CDA information)
        cda-stat@cdt.org (Current status of the CDA)

 ___________________________________________________________________
LIST OF PARTICIPATING ORGANIZATIONS

In order to use the net more effectively, several organizations have
joined forces on a single Congressional net campaign to stop the
Communications Decency Act.


American Civil Liberties Union * American Communication Association *
American Council for the Arts * Arts & Technology Society * Association
of Alternative Newsweeklies * biancaTroll productions * Californians
Against Censorship Together * Center For Democracy And Technology *
Centre for Democratic Communications * Center for Public Representation
* Citizen's Voice - New Zealand * Computer Communicators Association *
Computer Professionals for Social Responsibility * Cross Connection *
Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens'
Movement * Electronic Frontier Canada * Electronic Frontier Foundation
* Electronic Frontier Foundation - Austin * Electronic Frontiers
Australia * Electronic Frontiers Houston * Electronic Frontiers New
Hampshire * Electronic Privacy Information Center * Feminists For Free
Expression * First Amendment Teach-In * Florida Coalition Against
Censorship * Friendly Anti-Censorship Taskforce for Students * Hands
Off! The Net * Human Rights Watch * Inland Book Company * Inner Circle
Technologies, Inc. * Inst. for Global Communications * Internet
On-Ramp, Inc. * The Libertarian Party * Marijuana Policy Project *
Metropolitan Data Networks Ltd. * MindVox * National Bicycle Greenway *
National Coalition Against Censorship * National Public Telecomputing
Network * National Writers Union * Oregon Coast RISC * Panix Public
Access Internet * People for the American Way * Rock Out Censorship *
Society for Electronic Access * The Thing International BBS Network *
The WELL * Voters Telecommunications Watch

(Note: All 'Electronic Frontier' organizations are independent entities,
 not EFF chapters or divisions.)

------------------------------

From: sobel@epic.org (David L. Sobel)
Subject: 2--Repost: EPIC Files Brief in 2600 Case
Date: Mon, 12 Jun 1995 16:14:28 -0500

The Electronic Privacy Information Center (EPIC), on behalf of
Computer Professionals for Social Responsibility (CPSR), has filed
an appellate brief seeking to uphold a lower court decision
ordering the release of information on a controversial "hacker"
investigation.  At issue are documents detailing the Secret
Service's role in the so-called "Pentagon City Mall Raid."

In November 1992, a group of young people affiliated with the
computer magazine "2600" were confronted by mall security
personnel, local police officers and several unidentified
individuals.  The group members were ordered to identify
themselves and to submit to searches of their personal property.
Their names were recorded and some of their property was
confiscated.  However, no charges were ever brought against any of
the individuals.  Although the Secret Service has never formally
acknowledged its role in the incident, it eventually conceded that
it did possess relevant information.

CPSR filed suit in federal court in early 1993 seeking the release
of relevant Secret Service records under the Freedom of
Information Act.  In July 1994, U.S. District Judge Louis
Oberdorfer ordered the Secret Service to release the vast majority
of documents it maintains on the incident.  The government
appealed that decision and EPIC is litigating the appeal that is
now pending.  In the recently filed brief, EPIC and CPSR argue
that the withheld documents demonstrate Secret Service misconduct
and that the FOIA exemptions cited by the agency do not apply.

The Secret Service has maintained that the disputed records were
collected during the course of an investigation of telephone toll
fraud.  In its appellate brief, the agency asserts that
"obviously, a meeting of individuals 'affiliated with 2600
Magazine' would be of interest to such an investigation since
those individuals have, by their conduct, evidenced an interest in
the technical intricacies of the telephone system."  The
government has revealed for the first time that the underlying
investigation was closed on March 14 of this year.

The Pentagon City incident has been described as an example of
over-zealous law enforcement activities directed against so-called
computer "hackers."  The case raises significant issues of free
speech and assembly, privacy and government accountability.  Oral
argument before the federal appeals court is scheduled for mid-
September.

The EPIC/CPSR brief can be accessed via WWW at:

     http://epic.org/computer_crime/2600/

or by FTP/Gopher at:

     cpsr.org/cpsr/computer_crime/2600_brief_6_95.txt

------------------------------

Date: Mon, 12 Jun 1995 23:45:02 -0400 (EDT)
From: craftman <craftman@IGLOU.COM>
Subject: 3--Media Feeding Frenzy on "runaway internet teens"

          St. Matthews Teenager "Lured" Away By Computer Pal
              Richard D. Meadows  -  craftman@iglou.com

WRITERS NOTE:  I have used ALLCAPS for my added emphasis and placed  a
few  editorial/social comments in brackets [] in the article.  At  the
end there will additional editorializing.

     The media feeding frenzy, about teens being lured away by  people
they  have met online, in both Washington state and Kentucky has  pro-
vided more fuel for the Exon fire currently burning in the Senate.

     I live in Louisville, KY., and have been following the Tara Noble
runaway closely since it was first reported in the Courier-Journal (C-
J) on Tuesday June 6, a week after MS Noble left her home in St.  Mat-
thews an upper middle class suburb of Louisville.  Tara, 13, ran  away
sometime  on May 30, and yesterday she called the FBI  from  Hollywood
Boulevard  in  Los Angeles, CA., to say she wanted to  go  back  home.
[How many teens have run away to California and ended up on  Hollywood
Boulevard, where they call home or the police?]

     What  makes this runaway case different is the fact  that  Tara's
personal  computer  and AOL are involved.  The headline on  the  front
page story of the C-J on June 6....WOMAN FEARS COMPUTER PAL LURED AWAY
DAUGHTER,  13....sets  the  tone for the entire  article.   The  staff
writer,  John  Voskuhl, calls cyberspace a "shadowy  frontier",  in  a
story  that appears one full week after MS Noble ran away  from  home.
Tara's mother Lisa Noble tells the writer that she thinks her daughter
boarded a Greyhound bus headed west to rendezvous with someone she met
through a ' "chat room" ' on America Online.

     Voskuhl  writes in the story that it is not certain  that  Tara's
computer connections played a role in her disappearance.  In the  next
paragraph however:

 "The computer - that's what started this problem," said Norm
    Mayer, chief of the St. Matthews Police Department, which  is
    investigating  the case.  "And that's the only real  lead  we
    have."

[Excuse  me?  What about the Greyhound bus?  Is that not a lead?   Did
Mrs. Noble just pick that out of the air?]

     The  article  goes  on to tell of her  divorced  parents  turning
Tara's  room upside down in search of information.  They  found  tele-
phone  numbers  from  all across the country of people  Tara  had  met
during  the DOZENS OF HOURS SHE SPENT CHATTING ON  COMPUTER  NETWORKS.
[What networks are interfaced with AOL?]  The article has the  obliga-
tory  mention of "...a series of sexually explicit images  that  found
their  way across the Noble family's modem during the DOZENS OF  HOURS
her daughter spent online since April."    Mrs. Noble is quoted in the
article  about  the  images: "I'm like, 'How can this stuff  be  on  a
computer?"'

     During  her  trip across the country Tara stopped  and  used  the
computer to communicate with computer acquaintances through AOL.   Pam
McGraw  of AOL Fame, indicated that AOL was cooperating with  authori-
ties  investigating the Noble case.  McGraw also pointed out that  AOL
provides  "parental  controls"  that allow parents  to  prevent  their
children  from  using chat rooms.  Mrs. Noble said she  did  not  know
about them before her daughter disappeared.

     Tara  spent  so much time on the computer her  mother  eventually
removed the telephone jack Tara was using.  Her father, Sam Noble, was
quoted  in  the  story: "We encouraged her.  We didn't  know  she  was
talking to MEN all across the country."  He further indicated, "People
talk  about the information superhighway - in my opinion, it ought  to
be  regulated."  The article then goes on to tell about the Exon  bill
and  how  one of Kentucky's Senators, Wendell Ford, voted  for  it  in
committee and would vote for it on the floor.

     The end of the article the writer talks about the image appearing
on the screen to signal the computer was busy -- an hourglass, as Mrs.
Noble sat waiting for word of her daughter's whereabouts.



                          SCUM IN CYBERSPACE

Op-Ed Page Editorial - The Courier-Journal - Wednesday June 7, 1995

     The  volume and content of information that reaches  children  in
their  own  homes  makes parenthood ever  more  challenging.   Movies,
television, printed matter -- they can all influence values and  deci-
sions.
     Every major advance in information technology, from the  printing
press to the cellular phone, has been blamed for misleading the young.
Ideas open up new possibilities,  The results are often trying.
     Now comes the computer, with its awesome power to bring likemind-
ed folks together in a strange realm of cyberspace.  And, regrettably,
to serve as a medium for purveyors of pornography.
     The  recent  disappearance of 13-year-old Tara Noble  could,  her
parents  believe, be connected to contact she made in a computer  net-
work "chat room".  It's a realistic -- and frightening -- possibility.
     But the larger society must not let such occurrences stampede  it
into blaming the technology -- which, like every other, is hurtful  as
well as beneficial -- or resorting to censorship.  Such efforts  can't
work.   And  they  run counter to the laws and traditions  of  a  free
nation.
     A  better  idea  is  to manage the machine  better  --  by  using
electronic  wizardry to help parents decide what their  children  have
access  to.   That's no guarantee of safety, but  it's  preferable  to
controls on what all citizens read and see.
     UNSIGNED



The Courier-Journal -- Wednesday June 7, 1995
        DANGER MAY LURK FOR CHILDREN IN ANONYMOUS ONLINE WORLD
                   By Ric Manning, Business Writer

WRITERS  NOTE:  Ric Manning is a friend of mine and writes  for  other
computer  publications  besides the C-J, where you may have  seen  his
byline.   Doesn't  mean  I won't take him to task when I  feel  he  is
wrong, just ask him. ricman@iglou.com


     This article is a general overview of what can happen and some of
the  techno-wizardry  which  can be used by parents  to  help  prevent
children  going where no parent wants them going.  There is also  men-
tion of both the Washington state and Kentucky runaways.

     The  most interesting to me is SURFWATCH a new  $49.95  screening
program  which prevents access to more than 1000 internet  sites  that
contain sexually oriented material.  <800-458-6600>  When my son  gets
older  and begins to surf around a program like that on  his  computer
seems reasonable to me.

     Again  we  get  the comment, this time from  Tara's  mother  that
online  services should be regulated.  The services respond that  par-
ents  must  assume  most of the responsibility  for  their  children's
activities  online.   (See editorial comments at end.)   The  National
Center  for Missing and Exploited Children along with online  services
have  produced  a brochure called  "Child Safety  on  the  Information
Superhighway", which is available online on Compu$erve or through  the
center's hotline: 800-THE-LOST. [What is their online address?]  If  a
CI$  reader would be so kind as to get this and send it in to CuD,  it
would be nice.



           MISSING GIRL, 13, FOUND UNHARMED IN LOS ANGELES
               Monday June 12, 1995 The Courier-Journal
                       Bill Pike, Staff Writer


WRITERS  NOTE:  I am going to do excerpts from this article, but,  not
the entire thing.

Teen's Flight Linked To Online Contacts

     Unharmed but frightened after being away from home for two weeks,
13-year-old  Tara Noble call the FBI in Los Angeles yesterday  from  a
phone  booth on Hollywood Boulevard to say she wanted to return  home.
[Was it Hollywood & Vine?]
     Tara had been missing since May 30, when authorities feared  that
she  had been lured to California through contacts over her home  com-
puter -- perhaps by a man identified only as George in San Francisco.
     Tara was in "excellent health and apparently unharmed," said Dave
Kohl, the agent in charge of FBI operations in Kentucky.
     (Lisa) Noble and her ex-husband, Sam Noble of Pleasure Ridge Park, found
telephone  numbers  from across the country for people  Tara  had  met
while  chatting  on computer networks.  They also turned  up  sexually
explicit  material and a message from George, who wrote, "We  can  run
around our room naked all day and all night."
     Kohl declined to give details of Tara's whereabouts or activities
during  the past two weeks, although he said she had been in  "several
locations".
     He  acknowledged  that  the  computer played  a  role  in  Tara's
disappearance,  and  he said the case shows the need  for  parents  to
supervise their children's use of computers.
     Kohl  said that TARA DOES NOT FACE ANY CHARGES AND THAT  THE  FBI
WILL CONTINUE INVESTIGATING.
     He  added that "significant media coverage" of Tara's  disappear-
ance,  as  well as an extensive investigation, prompted Tara  to  call
authorities.
     A  story  in yesterday's [Sunday June 11, 1995. I would  like  to
have  a  complete hard copy of this article if someone in  l.a.  could
send it via snail mail to me.]  Los Angeles Times featured Tara and  a
15-year-old  Washington  state boy who was reunited with  his  parents
after making an unannounced trip to San Francisco to visit a friend he
had met through his computer.  [What happened to the MAN who had lured
this boy to San Francisco for gay sex?  Now it is an unannounced  trip
to visit a friend.  Can you say media hype?]
     Five FBI field offices worked on Tara's case, interviewing numer-
ous contacts she had made via computer, Kohl said.
     HE  ALSO SAID A "COOPERATIVE CITIZEN" IN SAN  FRANCISCO  NOTIFIED
THE  FBI  THERE YESTERDAY THAT TARA WAS IN LOS ANGELES. [I  guess  you
would  be  cooperative if Special Agents of the FBI came  knocking  on
your door and asking you questions about a 13-year-old runaway girl]



                            EDITORIALIZING

Without  exception  everyone in the community here,  both  online  and
offline, that I have discussed the Tara Nobles case with have said the
same  things.  There are bigger problems in the family than a 13  y.o.
running  away  because of a friend on AOL.    Kids have  been  running
away  to California for as long as I can remember  reading  newspapers
and  that is a few years now, and the fact that Tara met  this  person
via computer makes it different, but certainly not unique.

How come a parent lets a bright student suddenly spend dozens of hours
online?  They got the computer in April and Tara ran away in May.  She
was on AOL.  Lets see 30 days worth of online fees get charged to  the
old  credit  card.  The credit card bill comes in.  Mom nearly  has  a
heart  attack.   Mom  unplugs the telephone line  from  the  computer.
Daughter gets seriously upset.  Daughter decides to go join her online
friend(s)  so she can stay online.  I dunno maybe my thinking here  is
off.

I am consistently and constantly disappointed in the reporting of  the
C-J on most computer stories.  This is no exception.  Voskuhl shows  a
lack  of understanding of the Information Superhighway when he  writes
about Tara chatting on computer networks, after identifying AOL as the
service  provider.  The final paragraph dealing with a mother  waiting
to find out about her runaway daughter and the hourglass was just  too
sticky for my taste.  The Facts, Just the Facts, in a NEWS article.

I appreciate the C-J's support of personal freedom.  I wish they would
just go further with it.  If the Op-Ed page editorial writers were  as
doggedly  determined on protecting all of us from censorship  as  they
are on open records or preventing the building of an interstate bridge
near  the home of the editor of the opinion pages, Keith Runyon,  per-
haps my two senators would get a clue and vote no on Exon's bill.

We  are getting the same government needs to provide control  relative
to  the internet that has come and gone for years on  controlling  TV,
Movies, Music, et.al., vices that children can come in contact with if
not  supervised.  The key is parenting.  My son does not watch  Beavis
and Butthead, although he would love too, nor MTV, nor violent  movies
on  TV.  He does not listen to music I find offensive.  He  has  never
had  a toy gun, although he has made several with his erector set,  or
sticks,  or whatever is convenient and looks close enough to suit  his
needs  at the moment.  The point is I control  his  socio-environment.
That  is parenting.  That is the responsibility you take on  when  you
decide to bring a life into this world.  When he is older and  skilled
enough  I  will get him online.  But, he is not gonna be  reading  the
alt.sex. news groups.  Well certainly not until he figures out how  to
get  around how I have his system set up.  It is not up to Sen.  Exon,
or  the  guvmint, to control the internet, it is up to the  parent  to
take  back control of their family and instill the morals  and  values
that  they  believe  in, not the values of a senator  or  a  president
wannabe or even a vice-presidents wife.

End of Editorial Comments

------------------------------

Date: Sat, 10 Jun 1995 12:46:06 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: 4-- Tutorial:  Social Engineering vs Psychological Subversion (fwd)

Note: Susan Thunder has also promised to write "her side of the story" as
opposed to what is chronicled in Cyberpunk, (Katie Hafner and John Markoff)

David Smith	          *  "Where children dare to tread, the footsteps
bladex@bga.com            *   of censorship are sure to follow"
President, EFF-Austin     *  Fight the Communications Decency Act.
Board of Directors, CTCLU *  Send e-mail to vtw@vtw.org w/ "send info"

---------- Forwarded message ----------
From: thunders@ix.netcom.com (Susan Thunder )
Newsgroups: alt.2600,alt.fan.kevin-mitnick
Subject: 5--Tutorial:  Social Engineering vs Psychological Subversion
Date: 3 Jun 1995 06:56:25 GMT


What is the difference between "social engineering" vs "psychological
subversion"???

I will be offering a series of tutorials on these subjects, starting
below, but first I would like to post a challenge to all you REAL
superhackers out there:

Back in the days of 8BBS and other early '80's boards, the hacker ethic
was such that one who imagined him/herself to be a superhacker would
PROVE him/herself by the QUALITY of the posts (s)he left.  If a novice
hacker asked a question, those of us who were of the elite pantheon
would all try to outdo each other in a game of one-upsmanship to see
who could post the most informative and/or useful reply!  We
demonstrated our ability by the reliabiltity of the information we
provided to these newcomer queries, and it made for one HELLUVA
competitive and informative BBS.

So here's my challenge:  Instead of all you so-called experts out there
falling all over each other trying to outflame the novices, let's see
you SHOW YOUR STUFF!  Let's let the cream rise to the top, guys/gals!
Let's get this newsgroup back on track--it's a simple fact of life that
there will be a continuing flood of newcomers to the net, so let's work
together instead of against each other!

Let's face it:  If *WE* don't keep an eye on Big Brother, nobody will.
One of the main goals of communism in its efforts to subvert capitalist
society was to sow dissention and mistrust among the more inquisitive
political organizations--could it be that the feds are trying to do the
same to us, a potentially VERY POWERFUL segment of today's cutting-edge
theorists?  ***>DON'T LET THEM WIN!<***  Let's join together and
disseminate information freely rather than withhold it!

-------[Stepping down from the soapbox...]-------

Tutorial:  Social Engineering vs Psychological Subversion Part 1

Social Engineering has been defined as the art of manipulating
information out of a given person with a view towards learning
information about or from a given EDP system.  The techniques are
relatively simple, and I will go into greater detail and provide
examples in a future tutorial.  Essentially, the methodology consists
of pulling off a telephone ruse to get the persona at the other end of
the line to give you passwords or read you data off of their computer
screen.  Sometimes the techniques involve intimidation or blackmail.
Again, I will explore these techniques further in my next tutorial, but
first I want to address the differences between Social Engineering (a
lousy, non-descriptive term IMHO) and Psychological Subversion.

Psychological Subversion (PsySub) is a very advanced technique that
employs neural linguistic programming (nlp), subconscious suggestions,
hypnotic suggestions, and subliminal persuasion.  Essentially, you want
to plant the idea in the subject's mind that it's okay to provide you
with the information you seek to obtain.  the precise methods vary
according to the environment, but I will use the Miliary as an example
since they are very easily manipulated as a result of their inherent
compulsion to obey any directive emanating from a higher-ranking
officer.

If you would like to bypass a tempested system housed inside a SCIF
that employs multi-level/multi-keyed encryption methodology, the most
productive method I have ever encountered is to call inot the SCIF on
the appropriate autovon line (DMS-100, what a joke anyway), and firmly
inform the corporal or sergeant that answers the phone that you are
Specialist So-and-so calling on behalf of General such-and-such (the
base commandant is a good choice to use but be sure you use his
secretary's/("Specialist's) real name) and state that the General would
like to know WHY HE CANNOT ACCESS HIS ACCOUNT!  Naturally, the
low-ranking dupe on the other end of the phone line will be much more
concerned about getting into potential trouble by pissing off the
general than he will be concerned about the established security
procedures.

Often-times, it will be necessary to take him step-by-step through the
already obvious (to you) process of explaining WHY the account isn't
"working..."  (The real reason, FYI, is because Top Secret and higher
systems are not supposed to have any external connections to phone
lines outside the SCIF).  What you need to do is talk the dupe through
the process of creating/enabling a remote access line (i.e. dialup),a
nd it helps to have a definable STU-III dataset to exchange encryption
keys with him.  Failing passession of such a device, you just pretend
that you've tried to access the system anyway, and for some reason the
encryption devices aren't handshaking properly.  At this point you
either convince him that he could be in very big trouble for
insubordination if he doesn't cooperate and give the "general"
immediate access, albeit unencrypted, or you can simply have the poor
sod READ you the data off of his screen!  Oftentimes, you can even get
the fool to print out various materials that you would like to view,
and have him mail/deliver/ftp etc these items via another system.

In other words, to bypass encryption, just have a legitimate user read
and print the data you wish to acquire--intimidation works with some
people.  With others you need to flirt.  Some are simply the helpful
type of person who will accomodate your request with very little
fanfare.  In a couple of cases, I have had to play a subliminal tape
over the phone line as I spoke to the subject.  The tape would embed
instructions and reasurrance into the subject's mind on a subconscious
level that they were not even aware of.

Ususally, if there is something you want very badly, it may take
several contacts to build up rapport and level of trust before you
begin to lay the guilt trips on them about "haven't I been a friend to
you?  I might get in BIG trouble if I don't remember the "general's"
password and username.  Please, help me out of this mess..."  You'd be
surprised at how many people fall for this ruse!

Now I have a comment about how certain persons chose to utilize these
very powerful nlp techniques.  For instance, there is a well-known
hacker who is selling (or trying to, anyway) these awesomely powerful
techniques to men who desire to simply get-laid!  What a fucking waste
of time, effort, and talent.  Evidently the man in question has nothing
better to do with this remarkable knowlegde that compromise an already
vulnerable and probably lonely woman...

If this hacker would apply his substantial knowledge on this subject to
a socially useful endeavor, instead of efforts that lead to nothing
more than brief personal satisfaction at the lonely woman's emotional
expense, then HE could be a force to reckon with!

Pleae address questions and comments to the newsgroup and NOT my email
(unless it's very personal) because I would like to see an intelligent
exchange of useful information in this newsgroup again!

Are any of you so-called superhackers up to the challenge of proving
your knowledge and "pedigree" in a public forum where all can see the
results of your effots?  Let's get this group back on track...after
all, we all started somewhere!  Now this flood of aolers and ixers kind
of makes it necessary to slog though alot of crap, but there ARE useful
and informative posts buried within threads that have long since
migrated away from thier origianl intents.

I will post more specific hacks in my next "tutorial!"

REGARDS,
THUNDER  (Susan)


Hey guys:  Please pray for Kevin's early release from jail, and write
to him too if you can!

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST <your name>
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.49
************************************