Computer underground Digest Sun Aug 31, 1997 Volume 9 : Issue 65 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.65 (Sun, Aug 31, 1997) File 1--Islands in the Clickstream - Beyond the Edge File 2--crypto-logic US$1 million challenge File 3--CYPHERPUNKS PARTY -- invite to party in DC on September 6 File 4--INET'98 Call for Papers (fwd) File 5--An "Underground" Book on Australian Hackers Burns the Mind File 6--Court docs in Salgado/"Smak" case File 7--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Fri, 29 Aug 1997 20:23:11 From: Richard Thieme <rthieme@thiemeworks.com> Subject: File 1--Islands in the Clickstream - Beyond the Edge Islands in the Clickstream: Beyond the Edge There comes a point in our deepest thinking at which the framework of our thinking itself begins to wrinkle and slide into the dark. We see the edge of our thinking mind, an edge beyond which we can see ... something else ... a self-luminous "space" that constitutes the context of our thinking and our thinking selves. As a child I tried to imagine infinity. The best I could do was nearly empty space, a cold void defined by a few dim stars, my mind rushing toward them, then past them into the darkness. The same thing happens today when I think about energy and information and the fact that all organisms and organizations are systems of energy and information interacting in a single matrix. I try to imagine the form or structure of the system, but the structure itself is a system of energy and information. I try to imagine the structure of the structure ... and pretty soon the words or images are rushing into the darkness at warp speed and my mind is jumping into hyperspace. When we see our thinking from a point outside our thinking, we see that our ideas and beliefs are mental artifacts, as solid and as empty as all the things in the physical world -- things, we are told, that are really patterns of energy and information, that our fingertips or eyes or brains are structured to perceive as if they are objects -- out there -- external to ourselves. That is an illusion, of course. There is no "there" there. Makes a guy a little dizzy. At the recent Hacking in Progress Conference near Amsterdam (HIP97), there was a demonstration of van Eck monitoring. That means monitoring the radiation that leaks from your PC. Hackers do not have to break into your system if the system is leaking energy and information; they just have to capture and reconstitute it in useful forms. A participant at HIP said, "It was nice to see a real demonstration of analog van Eck monitoring of a standard PC, which meets all the normal shielding and emission control standards, via an aerial, via the power supply and via the surface waves induced in earthing cables, water pipes, etc. Even this simple equipment can distinguish individual machines of the same make and model in a typical office building from 50 to 150 metres or more with extra signal amplification." He is saying that the radiation leaked from your PC monitor, even when it meets all the standards proscribed by law, can be reconstituted on a screen at a distance greater than the length of a football field, and everything you are seeing at this moment can be seen by that fellow in the van down the block as well. And he can get the radiation from the water pipes under your house. We are radiating everywhere and always the information and energy that constitutes the pattern of what we look at, what we know ... who and what we are. A side trip: All of the great spiritual traditions teach practices of meditation. They teach that those who enter deep states of meditation soon discover that paranormal experience is the norm at a particular depth of consciousness. At first this discovery is fascinating. It is like scuba diving for the first time. The beauty of the underwater world is so compelling, you can stop at twenty or thirty feet and just gaze in awe at the beauty of the fish. But if you do, you won't go deeper. You'll get stuck. So we are told simply to note that what is happening is real, then keep on moving. In those deeper states, we observe more and more clearly the thinking that we often mistake for our real selves. We see that we are usually "inside" our thinking, living as if our thoughts are reality itself. We see the edge of our thinking and then ... something else beyond the edge. We see that the structures of our thinking -- our culture -- are mental artifacts. When we think that, and catch ourselves thinking about the illusion of thinking, we laugh. That's why laughter peals so often from the walls of Buddhist monasteries. Enlightenment is a comic moment. Enlightenment includes the experience of observing our minds in action and seeing that we are not our minds. Our minds may be as automatic as machines but we are not machinery. We are the ghosts in the machine. We see that in our essence we are more like stars in a spiralling galaxy. We are not just radiating energy and information always, we ARE radiant energy and information, a single matrix of light that is darkness visible. Back in my days of doing workshops and long weekends, we used to do an exercise of looking into each other's eyes until we were lost in a wordless communion. By playing games ("feel a feeling and communicate it without words, the other receive it and say what it is") we discovered that what we were feeling was always transmitted to anyone and everyone around us. All a person had to do was stop for a moment and pay attention and they would know who we were. Even when we thought we were providing high- level descriptions of ourselves that fooled everyone, we were leaking energy and information. It is dawning on us that privacy as we used to think of it is over, that the global village is a community in which the data of our lives is available to anyone who wants to gather or pay for it. It ought to be dawning on us as well that the ways we think we mask ourselves are as transparent as the shielding on a PC monitor. The initial distancing we experience when we first connect via computers is soon replaced with the realization that our willingness to be present -- to communicate via symbols like these -- means that we are transparent in our interaction, that the global network is a mediating structure through which information and energy is transmitted literally as well as in symbolic forms. WE show up in cyberspace, not just representations of ourselves. WE are here, alone together. The structures of energy and information in the universe are the universe. How can we speak of what we see beyond the edge of our collective selves? It seems to be a ground or matrix, a glowing self-luminous system of ... nothing ... there is no "there" there ... and we rush through the darkness toward the few stars defining the limits of our thought then past them. ------------------------------ Date: Fri, 29 Aug 1997 22:27:40 +0800 From: dragonXL <cbert@rocketmail.com> Subject: File 2--crypto-logic US$1 million challenge I got this from www.ultimateprivacy.com The Million Dollar Challenge Ultimate Privacy, the e-mail encryp- tion program combining ease of use with unbreakability. Ultimate Privacy is serious cryptography. On the Links page we have links to other Internet sites that discuss One-Time Pad cryptography and why it is unbreakable when properly implemented. Nevertheless, should you wish to try, the first person to be able to discern the original message within a year (following the simple requirements of the Challenge) will actually receive the million dollar prize as specified in the Rules page. The prize is backed by the full faith and credit of Crypto-Logic Corporation and its insurors. You might be interested in to know how the Challenge was done. We used a clean, non-network-connected computer. After installing Ultimate Privacy, one person alone entered the Challenge message and encrypted it. After making a copy of the encrypted message, we removed the hard disk from the computer nad it was immediately transported to a vault for a year. Therefore, the original message is not known by Crypto-Logic Corporation staff (other than the first few characters for screening purposes), nor are there any clues to the original message on any media in our offices. Next, the Rules. The next page contains the contest Rules, followed by the message itself. ------------------------------ Date: Tue, 26 Aug 1997 13:55:38 -0700 (PDT) From: Declan McCullagh <declan@well.com> Subject: File 3--CYPHERPUNKS PARTY -- invite to party in DC on September 6 You are cordially invited to a DC cypherpunk working meeting and patent expiration party on September 6. On Saturday, September 6, the patent on the Diffie-Hellman public key cryptography system expires. Along with the Merkle-Hellman patent (which expires on October 6), this patent is key to the future of public key crypto. Now programmers can write strong encryption software without worrying about patent licensing. But the expiration of the patents doesn't guarantee the future of strong cryptography. Proposed laws could restrict its use. So the party has two portions: -- 5:30 pm: a DCCP working party and potluck supper. Topics include discussion of the patents and regulation of cryptography. Guest speakers will discuss legislation in Congress and the Bernstein case. A speaker from the administration will provide a regulator's perspective. (Please contribute to the potluck dinner!) -- 8:00 pm: a post-meeting party to celebrate the expiration of the patents. (Please bring snack foods and beverages/drinks...) To RSVP, and for directions and details, e-mail Declan at declan@well.com with DCCP-DH in your Subject line. The party will be held in Adams Morgan in Washington, DC. ------------------------------ Date: Wed, 27 Aug 1997 14:42:57 -0400 (EDT) From: "noah@enabled.com" <noah@ENABLED.COM> Subject: File 4--INET'98 Call for Papers (fwd) ---------- Forwarded message ---------- Date--Wed, 27 Aug 1997 13:31:01 -0400 From--Internet Society <members@ISOC.ORG> |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| FIRST CALL FOR PAPERS - INET'98 Papers, Panels, Tutorials & Poster Sessions Deadline: 24 October 1997 |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| INET'98 ~~~ THE INTERNET: ENTERING THE MAINSTREAM Internet Society's 8th Annual Networking Conference 21-24 July 1998 Palexpo Conference Center Geneva, Switzerland http://www.isoc.org INET, the annual meeting of the Internet Society, is the premier international event for Internet and internetworking professionals. It is the crossroads at which the world's cyberspace pioneers meet to exchange experiences and plan their next steps. Each year, network technologists, industry and government representatives, and policy experts meet to share information and shape the future of the Internet and its related internetworking technologies. In 1998, INET will address both the traditional and evolving frontiers of the Internet as well as its significant impact on education, commerce, and societies throughout the world. Multiple conference tracks will address critical issues ranging from network engineering to user needs, from regulatory issues to the Internet's role as a conduit for social change, and from the transformation of education to the redefinition of commerce. The INET'98 Program Committee solicits abstracts of papers and suggestions for panels, tutorials and poster sessions which describe innovative developments, encourage vigorous discussion and further the understanding of the Internet's frontiers. CONFERENCE ~~~~~~~~~~ INET'98: 21-24 July 1998 Exhibition Hall Open: 22-24 July 1998 PRE-CONFERENCE EVENTS ~~~~~~~~~~ Network Training Workshop: 12-19 July 1998 (France, Latin America and Switzerland) Technical Tutorials: 20-21 July 1998 K-12 (Primary & Secondary) Workshop: 21 July 1998 African Networking Symposium: 21 July 1998 KEY SUBMISSION DATES ~~~~~~~~~~ 24 October 1997 ~~ Deadline to submit Abstract, Tutorial, Panel and Poster Session proposals for Program Committee review. 8 December 1997 ~~ Authors notified of accepted Abstracts and invited to submit full Papers. ~~ Presenters notified of accepted Tutorials, Panels and Poster Sessions. 13 February 1998 ~~ Deadline to submit full Papers for Program Committee review. 27 March 1998 ~~ Authors notified of accepted Papers. 10 April 1998 ~~ Deadline to submit final copy of Paper for inclusion in the INET'98 Proceedings. 20-21 July 1998 ~~ Technical Tutorials 21-24 July 1998 ~~ INET'98 Conference TOPIC SCOPE ~~~~~~~~~~ The following list is indicative of the scope of the conference. It should not be interpreted as limiting submissions: New Applications ~~Push Technologies ~~Caching and Replication ~~Digital Libraries Social, Legal and Regulatory Policies ~~Security and Cryptography ~~Regulation ~~Legal ~~Governance Commerce ~~New Industries and Services ~~Electronic Commerce ~~ISPs ~~Electronic Publishing Teaching and Learning ~~Curriculum Innovations ~~Network Learning ~~Collaboration ~~Teacher Empowerment Globalisation and Regional Implications ~~Internationalisation ~~Multilingual ~~Community Networking ~~Development Network Technology and Engineering ~~High Speed Networks / High Speed Applications ~~International Infrastructure ~~Wireless Technologies ~~Hardware and Software ~~Nomadic Computing ~~Collaboration ~~ATM ~~Satellite-Based Networking User-Centered Issues ~~Multimedia ~~Access ~~Disabilities TRACK DESCRIPTIONS ~~~~~~~~~~ TRACK 1: New Applications The exponential growth of the Internet involves not only computers, domain names, addresses and packets, but also content and people. The Applications Technologies track focuses on innovation that taps this growing wealth of information and people, including mechanisms for finding and accessing information and collaborative environments. In addition, this track covers technologies just below the user interface that are equally important: caching and prefetch technologies to improve access to information, and security technologies to support interactions such as contract signing and Internet commerce. TRACK 2: Social, Legal, Governance, and Regulatory Policies As the Internet keeps evolving and covering new territory, new forms of communication emerge and new social groupings appear. Sometimes these changes reinforce the old, sometimes weaken it or even threaten it. Weaving new human communities is a tricky business. Cultures, legal systems and institutions must find new compromises and mesh in new ways. What are the possible long-run governance structures for the Internet, and what are the implications of adopting them? TRACK 3: Commerce The promises of commerce on the Internet have come nearly as fast as new commercial sites. Yet many organizations are struggling to come to grips with the realities of the Internet for their business. What are these realities? Share the experience of successful projects, see how traditional forms of electronic commerce are adapting to the Internet and listen to experts argue the benefits and pitfalls of commerce on the Net. TRACK 4: Teaching and Learning The Internet evolved from computer science research projects to connect disparate and decentralized computer systems. Is this the same technology that is the hottest thing to happen in education in years? Once the private laboratory of university and post-secondary education, the Internet is now firmly entrenched in primary and secondary schools around the world. This track will look at what is happening on the Net today in support of primary, secondary and post-secondary education. Papers will cover current research in educational technology, case studies from the classroom, examples of collaborative learning and thought-provoking discussions on what effect the Internet will have on how we teach and learn. TRACK 5: Globalisation and Regional Implications Every day, the Internet is expanding to new parts of the world, to new groups of population, and to new, sometimes unanticipated, areas of usage. How far has the Internet gone on the road to true globalisation? What obstacles remain to its expansion in developing countries and to less advanced regions of the globe? What challenges should be expected in the future by those who, like ISOC, want to "take the Internet where it has never been before"? This track will address these questions, looking at the political, legal, cultural and economic aspects of the issues raised, while giving a central importance to the respective experiences of users and promoters of the Internet in all regions of the world. TRACK 6: Network Technology and Engineering The physical and administrative infrastructures of the Internet are being subjected to many stresses created by the explosion in the number of users and the demands of many new and exciting applications being developed. New support technologies are required in many areas to counter these stresses. This track will present a range of developments designed to make the network more reliable, more predictable, more scaleable and more manageable in the immediate future. TRACK 7: User-Centered Issues Frontiers don't exist just at the cutting edge of technology or in the remote regions of the world. Today, nearly everyone is an Internet user and many are responding to the challenge in unique and valuable ways to put this new tool to use. This track will examine contributions from a range of users, what they are doing and the impact the Internet has had on their daily lives. SUBMISSION GUIDELINES AND PROCEDURES ~~~~~~~~~~ Register your interest in contributing to the INET'98 program by subscribing to the INET'98 Authors and Presenters Contact List. Send the command "SUBSCRIBE INET98-PRESENTERS" in a one-line email message to: <<listserv@listserv.isoc.org>. You will receive an immediate acknowledgment of your subscription and periodic updates from the INET'98 Program Committee. I. PAPERS AND PANEL SUBMISSIONS ~ To view a sample Abstract, visit the Web-site <<www.isoc.org/inet98/presenters>. ~ An Abstract should provide the following: a. Motivate/define the problem addressed (1-2 sentences) b. Outline the results obtained or expected (1-2 sentences) c. Explain why the work/results are significant (1-2 sentences) d. Describe the work sufficiently for the Program Committee reviewer to have confidence that it was done well and that the result will be of interest to conference attendees (half to one page) ~ The official language of the conference is English. All abstracts must be submitted in English. ~ Abstracts of papers and proposals for panels should be submitted in plain ASCII by 24 October 1997 to: inet-abstracts@isoc.org. (No attachments will be reviewed by the Program Committee). ~ The following must be at the beginning of every abstract or proposal: a) A title (paper) or topic (panel). b) First and surname/family name(s) of all authors/presenters. Note: Please CAPITALIZE each surname/family name. c) Organisational affiliation(s). d) Full mailing address(es), telephone and fax number(s) for each author/presenter. e) E-mail address(es) for each author/presenter. Note: All correspondence is via e-mail. It is imperative that e-mail addresses are viable and that ISOC be informed of any changes to e-mail addresses. f) Identify a single point of contact if more than one author is listed. ~ Each abstract or proposal should be between one and two pages long (approximately 250 words) and contain a list of key words or topics. An abstract should be a brief summary of a paper and should not be divided into subsections or include tables, footnotes, or reference lists. Submissions will be acknowledged within 72 hours. If acknowledgment is not received within this timeframe, contact ISOC immediately at inet-program-chair@isoc.org. ~ The Exhibition Hall will provide the exclusive medium for product advertising. Papers should be directed at substantive issues and not focus upon marketing or sales issues. ~ Each panel proposal should indicate and justify the theme of the proposed session and include the names (with full presenter information) of suggested panelists. ~ Accepted abstract submissions will be invited to contribute full papers. Final selection will be based on full papers. II. TECHNICAL TUTORIAL SUBMISSIONS The Internet Society is pleased to invite submissions for Technical Tutorials, which precede the INET'98 Conference, 20-21 July 1998. ~ Tutorials are three hours (1/2 day) or six hours (full-day) in length. ~ All tutorials must be presented in English. ~ Tutorial proposals should be submitted in plain ASCII by 24 October 1997 to: inet-abstracts@isoc.org. ~ Each tutorial proposal must contain the following information: a) A topic or tutorial title. b) A 100-word description of the proposed tutorial, including three (3) learning objectives, three (3) learning outcomes, and a brief lesson plan. c) An indication that it is a tutorial proposal and the proposed length of the tutorial (1/2 day or full-day). d) Presentation titles, locations, and dates of previous seminars/tutorials/presentations the presenter/s have made on topics related to the proposed tutorial. e) First and surname/family name(s) of all presenters. Note: Please CAPITALIZE each surname/family name. f) Organisational affiliation(s). g) Full mailing address(es), telephone and fax number(s) of all presenters. h) E-mail address(es). Note: All correspondence is via e-mail. It is imperative that e-mail addresses are viable and that ISOC be informed of any changes to e-mail addresses. i) Identify a single point of contact if more than one presenter is listed. ~ Each tutorial proposal should be no more than two pages in length. Submissions will be acknowledged within 72 hours. If acknowledgment is not received within this timeframe, contact ISOC immediately at inet-program-chair@isoc.org. ~ The Exhibition Hall will provide the exclusive medium for product advertising. Tutorials should be directed at substantive issues and not focus upon marketing or sales issues. III. POSTER SESSIONS SUBMISSIONS The Internet Society is pleased to invite submissions for Poster Sessions, which will be held during the INET'98 Conference, 22-24 July 1998. ~ Posters will be on display throughout the conference, with a number of speaker opportunities for the poster session presenter. ~ Proposals should be submitted in plain ASCII by 24 October 1997 to: inet-abstracts@isoc.org. ~ Each poster session proposal must contain the following information: a) A topic or poster session title. b) A 50-word description of the proposed session, including two (2) learning objectives. c) An indication that it is a poster session proposal. d) First and surname/family name(s). Note: Please CAPITALIZE each surname/family name.. e) Organisational affiliation. f) Full mailing address, telephone and fax number. g) E-mail address. Note: All correspondence is via e-mail. It is imperative that e-mail addresses are viable and that ISOC be informed of any changes to e-mail addresses. ~ Submissions will be acknowledged within 72 hours. If acknowledgment is not received within this timeframe, contact ISOC immediately at inet-program-chair@isoc.org. ~ The Exhibition Hall will provide the exclusive medium for product advertising. Poster Sessions should be directed at substantive issues and not focus upon marketing or sales issues. REGISTRATION FEES ~~~~~~~~~~ Chosen presenters of papers, panels and poster sessions will be admitted into INET'98 at the ISOC member/early conference fee, although a limited amount of partial support may be available to assist presenters, generally from developing countries. Tutorials instructors will receive a stipend. Expenses such as travel, hotel, and meals are borne by presenters. GENERAL INFORMATION ~~~~~~~~~~ INET'98 The Internet Society 12020 Sunrise Valley Drive, Suite 210 Reston, VA 20191-3429 USA Telephone: +1 703 648 9888 Fax: +1 703 648 9887 Email: inet98@isoc.org PROGRAM INFORMATION ~~~~~~~~~~ Email: inet-program-chair@isoc.org We would appreciate if you would forward this announcement to your interested colleagues and within your own networks. ------------------------------ Date: 27 Aug 97 00:36:12 EDT From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM> Subject: File 5--An "Underground" Book on Australian Hackers Burns the Mind Source - CRYPT NEWSLETTER 44 AN "UNDERGROUND" BOOK ON AUSTRALIAN HACKERS BURNS THE MIND Crypt News reads so many bad books, reports and news pieces on hacking and the computing underground that it's a real pleasure to find a writer who brings genuine perception to the subject. Suelette Dreyfus is such a writer, and "Underground," published by the Australian imprint, Mandarin, is such a book. The hacker stereotypes perpetrated by the mainstream media include descriptions which barely even fit any class of real homo sapiens Crypt News has met. The constant regurgitation of idiot slogans -- "Information wants to be free," "Hackers are just people who want to find out how things work" -- insults the intelligence. After all, have you ever met anyone who wouldn't want their access to information to be free or who didn't admit to some curiosity about how the world works? No -- of course not. Dreyfus' "Underground" is utterly devoid of this manner of patronizing garbage and the reader is the better for it. "Underground" is, however, quite a tale of human frailty. It's strength comes not from the feats of hacking it portrays --and there are plenty of them -- but in the emotional and physical cost to the players. It's painful to read about people like Anthrax, an Australian 17-year old trapped in a dysfunctional family. Anthrax's father is abusive and racist, so the son --paradoxically -- winds up being a little to much like him for comfort, delighting in victimizing complete strangers with mean jokes and absorbing the anti-Semitic tracts of Louis Farrakhan. For no discernible reason, the hacker repetitively baits an old man living in the United States with harassing telephone calls. Anthrax spends months of his time engaged in completely pointless, obsessed hacking of a sensitive U.S. military system. Inevitably, Anthrax becomes entangled in the Australian courts and his life collapses. Equally harrowing is the story of Electron whose hacking pales in comparison to his duel with mental illness. Crypt News challenges the readers of "Underground" not to squirm at the image of Electron, his face distorted into a fright mask of rolling eyes and open mouth due to tardive dyskinesia, a side-effect of being put on anti-schizophrenic medication. Dreyfus expends a great deal of effort exploring what happens when obsession becomes the only driving force behind her subjects' hacking. In some instances, "Underground's" characters degenerate into mental illness, others try to find solace in drugs. This is not a book in which the hackers declaim at any great length upon contorted philosophies in which the hacker positions himself as someone whose function is a betterment to society, a lubricant of information flow, or a noble scourge of bureaucrats and tyrants. Mostly, they hack because they're good at it, it affords a measure of recognition and respect -- and it develops a grip upon them which goes beyond anything definable by words. Since this is the case, "Underground" won't be popular with the goon squad contingent of the police corp and computer security industry. Dreyfus' subjects aren't the kind that come neatly packaged in the "throw-'em-in-jail-for-a-few-years-while-awaiting-trial" phenomenon that's associated with America's Kevin Mitnick-types. However, the state of these hackers -- sometimes destitute, unemployable or in therapy -- at the end of their travails is seemingly quite sufficient punishment. Some things, however, never change. Apparently, much of Australia's mainstream media is as dreadful at covering this type of story as America's. Throughout "Underground," Dreyfus includes clippings from Australian newspapers featuring fabrications and exaggeration that bare almost no relationship to reality. Indeed, in one prosecution conducted within the United Kingdom, the tabloid press whipped the populace into a blood frenzy by suggesting a hacker under trial could have affected the outcome of the Gulf War in his trips through U.S. computers. Those inclined to seek the unvarnished truth will find "Underground" an excellent read. Before each chapter, Dreyfus presents a snippet of lyric chosen from the music of Midnight Oil. It's an elegant touch, but I'll suggest a lyric from another Australian band, a bit more obscure, to describe the spirit of "Underground." From Radio Birdman's second album: "Burned my eye, burned my mind, I couldn't believe it . . . " +++++++++ ["Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier" by Suelette Dreyfus with research by Julian Assange, Mandarin, 475 pp.] Excerpts and ordering information for "Underground" can be found on the Web at http://www.underground-book.com . George Smith, Ph.D., edits the Crypt Newsletter from Pasadena, CA. ------------------------------ Date: Sun, 31 Aug 1997 16:08:40 -0700 From: Greg Broiles <gbroiles@NETBOX.COM> Subject: File 6--Court docs in Salgado/"Smak" case I was over at the federal courthouse in SF on Friday, and copied documents from the court's file in _US v. Salgado_, the case which got national front-page coverage last week in which the defendant, a 30-something resident of Daly City, was able to gain access to many credit card numbers through security holes at some un-named ISP's. The documents (complaint + affidavit, indictment, pretrial release memo, and motion to seal record) are online at <http://www.parrhesia.com/smak/>, and also available at <http://jya.com/smak.htm>. The files were graciously and skillfully transferred from paper to digital/HTML format by John Young (thanks, John). I found this file interesting for two reasons: 1. Salgado used an unspecified crypto app/algorithm to encrypt his communications with his co-conspirator, an informant working for the FBI. (Details found in the affidavit accompanying the complaint). This case, a high-profile and high-value credit card/access fraud case, was brought quickly to a favorable conclusion for law enforcement, despite the use of crypto - there's no indication that crypto use hindered law enforcement at all. 2. The government has filed a motion to seal the transcripts of Salgado's guilty plea, because in the course of pleading guilty, he revealed the identity of some of his victims; the government would prefer that the public not learn which ISP's had security inadequate enough to protect their customers' and customers' customers credit cards. (Criminal defendants, as part of a guilty plea, are required to tell the court in their own words what it is that they did that constituted the crime - this is intended to help prevent defendants into being tricked/coerced into guilty pleas to crimes they don't understand.) The government's motion was filed on 8/25/97; no opposition was filed, and I don't believe it has been granted (yet). -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles@netbox.com | http://www.io.com/~gbroiles | Export jobs, not crypto. ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject" line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.65 ************************************