Computer underground Digest    Sun  May 11, 1997   Volume 9 : Issue 36
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Field Agent Extraordinaire:   David Smith
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.36 (Sun, May 11, 1997)

File 1--Credit  Card Numbers put Online?? (fwd)
File 2--Jim Tyre responds to CyberSitter's Brian Milburn
File 3--TV interview w/2 hackers banned from computers
File 4--Fwd: intellectual property and graduate students
File 5--Georgia expands the "Instruments of Crime"
File 6--More on Gov't Goofs on Virus Hoaxes (Crypt Reprint)
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sat, 10 May 97 23:07:12 -0700
From: Joab [email protected], [email protected]
Subject: File 1--Credit  Card Numbers put Online?? (fwd)

Spider Came a Crawlin'
From: April 30, 1997, The Baltimore City Paper

"You mean my credit-card number is on the Internet?" Mike Donahue
of the town of Lafayette State, Indiana, asks, rather surprised.

I thought he knew. After all, that's where I got his name, his
phone number, and his Visa number.

Up until two weeks ago all anyone had to do to get info on
Donahue's credit card-and the cards of at least 11 other
people-was go to the Internet search engine Excite and type in
"Holabird Sports," the name of a Baltimore sporting-goods store.
Up popped what looked to be on-line order forms-credit-card
numbers included.

Whoops! Somebody messed up. Big time.

When I called to get Donahue's reaction and that of others whose
account numbers were on the Net, I was usually greeted with
befuddlement. They wanted to know how the numbers they provided to
a Web page in Maryland landed on a computer in California. The
owner of Holabird Sports, David Hirshfeld, is at a loss too; in
many ways he's also a victim, having angered his customers through
no fault of his own.

A lesson everyone learned is how rapidly the Internet can turn
local mistakes into global ones.

Nine months ago, Holabird Sports contracted Worldscape, a small
local Web-presence provider headed by a former stockbroker named
Morris Murray, to build and maintain a Web site. Holabird had been
doing mail-order business for more than two decades, so it seemed
natural to expand onto the Web.  Hirshfeld didn't know much about
the Internet, but with Worldscape handling the site, he wouldn't
even need an Internet account. The on-line order forms filled out
by customers would be automatically converted into faxes and sent
to the sporting-goods store.

On April 3 one of Holabird's Web customers, Florida resident
Barbara Gehring, received an E-mail from an Internet user in St.
Louis informing her that her credit-card information was on-line.
Those fax files had become accessible.

"I was horrified," Gehring tells me by phone. She called Holabird;
on April 4, Murray removed the fax files as well as the entire
Holabird Web site, then called the people whose account numbers
and expiration dates were exposed. (Murray says he didn't phone
those whose expiration dates were not exposed, such as Donahue and
at least one other person I spoke with, because the lack of an
expiration date would have kept scofflaws from illegally using the
card numbers to make phone purchases.)

What had gone wrong? Worldscape set up its Web servers
incorrectly. The contents of any computer hooked to the Internet
can be partitioned into sections-some restricted for private use,
some accessible to others on the Net. Worldscape's restricted
areas-at least the one holding those Holabird fax files-were
misconfigured, making them accessible to the public. Murray
maintains the mistake occurred in mid-March when his system
administrator incorrectly linked two of Worldscape's file servers
together.

For a Web-presence provider, this is not a minor error. It's akin
to a bank accidentally leaving its customers' money in the alley
out back. But it was a little-traveled alley-the chance of someone
stumbling across that information was pretty slim. Murray's real
headache didn't begin until the records went onto Excite, a far
more trafficked site.

How did this happen? Excite's chief selling point is that it
updates its summaries of 50 million Web sites every three weeks,
the better to catch changes at frequently updated sites such as
on-line magazines. It would be impossible for even a horde of
librarians to catalog all the changes, so Excite uses a program
called a spider to automatically travel through the pages, copying
the text on each one and shipping it to Excite for indexing.  The
spider found the Holabird customers' numbers and put them up on
the Web.  Murray repeatedly asked Excite to erase the numbers from
its database, and the company repeatedly said it could not-thus
they stayed in view for nearly three weeks.

According to Kris Carpenter, product manager at Mountain View,
California-based Excite, all the information the search engine
holds is linked. "The way the underlying algorithms [used to
complete the Internet searches] are calculated is based on the
entire collection of documents," she tells me by phone. "To pull
even one throws off the calculation for the entire underlying
collection."

Excite's is an unusual design, and I wonder if it's a wise one. As
Murray says, "This thing is like a piece of stone that you can't
take any one part from. . . . What if there is a big
problem?They'll have to shut down the entire service."

In any event, the numbers disappeared from Excite by April 19, and
Murray reports that none of the Holabird customers have informed
him of any improper charges on their cards. So should we believe,
as Murray tells me, that the mistake shouldn't be blown out of
proportion? "The risk was very minimal," he says, likening the
danger to that of a shopkeeper surreptitiously using a customer's
credit-card number. But Murray is wrong.  There is a major
difference-the difference between a few people being privy to your
credit-card information versus the entire world.

------------------------------

Date: Tue, 6 May 1997 14:49:59 -0400
From: Declan McCullagh <[email protected]>
Subject: File 2--Jim Tyre responds to CyberSitter's Brian Milburn

Source  - Fight-Censorship

((MODERATORS' NOTE: Brian Milburn's block software has been
criticized for indiscriminate blocking of sites with minimal--if
any--sexual content, and of sites with politics to which Milburn
might object, including sites that criticize his software.
Bennett Haselton has been especially vocal (see CuD 9.33), and
Milburn has threatened him with litigation. The following is the
response of Haselton's attorney to Milburn's threat)).

Source -  [email protected]

Jim Tyre's response to Brian Milburn's letter is attached below.

Milburn's "demand letter" sent on April 24 is at:
 http://www.peacefire.org/archives/SOS.letters/bm.2.bh.4.24.97.txt

One of my articles about Milburn's earlier threats is at:
 http://cgi.pathfinder.com/netly/editorial/0,1012,453,00.html

Netly's Censorware Search Engine is at:
 http://cgi.pathfinder.com/netly/spoofcentral/censored/

-Declan

**************

May 5, 1997


Mr. Brian Milburn
President,                              BY FAX TO
Solid Oak Software, Inc.                (805) 967-1614
P.O. Box 6826                           AND BY CERTIFIED MAIL
Santa Barbara, CA 93160                 RETURN RECEIPT REQUESTED


       Re:     April 24, 1997 Demand Letter to Bennett Haselton


Dear Mr. Milburn:

This law firm represents Bennett Haselton with respect to your April 24,
1997 demand letter to him, received on April 29, 1997.  Any further
communications concerning this matter should be directed to me, not to
Mr. Haselton.

It is not my custom to engage in lengthy discussions of the law with
non-lawyers, and I shall not vary from that custom here.  I would
suggest that you have Solid Oak's attorneys contact me if there is
reason to discuss this matter further.  However, I will make the
following remarks.


                     ALLEGED COPYRIGHT INFRINGEMENT

You write that:

"You have posted a program on your web site called 'CYBERsitter filter
file codebreaker'.  This program illegally modifies and decodes data and
source code protected by U.S. and International intellectual property
laws.

"This program performs this action without permission of the copyright
owner. We demand that this program be removed immediately."

You should be perfectly well aware that your assertion that Mr.
Haselton's program modifies or decodes CYBERsitter source code is
factually incorrect.  Further, as you know, Mr. Haselton's program is
not in any way a work-around of CYBERsitter, nor did Mr. Haselton hack
into Solid Oak's computers in order to create the program.

Mr. Haselton's program does indeed decode data from the CYBERsitter
filter file.  However, there is no basis in the law for your assertion
that Mr. Haselton's program does so unlawfully.  If Solid Oak's
attorneys believe otherwise, I would be interested in their thoughts.
In that regard, my personal observation is one of surprise at how basic
was the encryption algorithm used for the CYBERsitter filter file.
XORing each byte with a constant byte, such as Ox94, is a methodology
which has been well known for many years, and which is detectable with
great ease.

Applied Cryptography (2nd edition) by Bruce Schneier is a standard
reference.  Mr. Schneier writes:

"The simple-XOR algorithm is really an embarrassment; its nothing more
than a Vigenere polyalphabetic cipher. Its here only because of its
prevalence in commercial software packages, at least those in the MS-DOS
and Macintosh worlds."

He continues, commenting on a slightly more sophisticated variant than
simple Ox94:

"There's no real security here. This kind of encryption is trivial to
break, even without computers. It will only take a few seconds with a
computer."

He concludes the discussion as follows:

"An XOR might keep your kid sister from reading your files, but it won't
stop a cryptanalyst for more than a few minutes."

With XOR (Ox94)  being the extent of the filter file encryption, it
certainly should have been foreseeable to Solid Oak that the filter file
would be decrypted into plaintext, and I am surprised that the algorithm
was not publicized by people examining the program far earlier than was
the case.

Far more important, however, is that Mr. Haselton's program simply is
not a violation of any copyright law or of any copyright which Solid Oak
allegedly may have in the filter file.  I suggest that Solid Oak's
attorneys review and explain to you the following cases, among others:
Vault Corp. v. Quaid Software Ltd., 847 F.2d 255 (5th Cir. 1988); Lewis
Galoob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965 (9th Cir.
1992); and Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th
Cir. 1992).

I would also commend that your attorneys explain to you the copyright
doctrine of fair use, as set forth in 17 United States Code ("U.S.C.") =A7
107.  One of the (nonexclusive) factors in determining whether the use
of copyrighted material is fair concerns  "the purpose and character of
the use, including whether such use is of a commercial nature or is for
nonprofit educational purposes."

Solid Oak cannot seriously assert that Mr. Haselton's program is of a
commercial nature.  On the other hand, Mr. Haselton can and will assert
that his program is for a nonprofit educational purpose.  Specifically,
Solid Oak's stated blocking policy, at
http://www.solidoak.com/cybpol.htm is as follows:

CYBERsitter Site Filtering Policies

CYBERsitter may filter web sites and/or news groups that contain
information that meets any of the following criteria not deemed suitable
for pre-teen aged children by a general consensus of reports and
comments received from our registered users:


    - Adult and Mature subject matter of a sexual nature.
    - Homosexuality / Transgender sites.
    - Pornography or adult oriented graphics.
    - Drugs, Tobacco or alcohol.
    - Illegal activities.
    - Gross depictions or mayhem.
    - Violence or anarchy.
    - Hate groups.
    - Racist groups.
    - Anti-Semitic groups.
    - Sites advocating intolerance.
    - Computer hacking.
    - Advocating violation of copyright laws.
    - Displaying information in violation of intellectual property
laws.
    - Information that may interfere with the legal rights and
obligations of a parent or our customers.
    - Any site maintaining links to other sites containing any of the
above content.
    - Any domain hosting more than one site containing any of the above
content.
    - Any domain whose general policies allow any of the above content.

     The above criteria is subject to change without notice.


Mr. Haselton has the right to test whether what CYBERsitter actually
blocks comports with Solid Oak's stated criteria, particularly given
some of the seemingly arbitrary decisions incorporated into
CYBERsitter.  Mr. Haselton has the First Amendment right to be critical
of what CYBERsitter does and how it does it.  Since the only way to
fully test what CYBERsitter blocks and to comment critically on the
functionality of CYBERsitter is to decrypt the filter file, Mr.
Haselton's program falls squarely within the fair use doctrine of 17
U.S.C. =A7 107.

Additional copyright arguments can be made, and, if necessary, will be
made.  However, I hope that this is enough to convince Solid Oak's
attorneys that Solid Oak cannot prevail in an infringement action
against Mr. Haselton.


                     ALLEGED IMPERMISSIBLE LINKING

You state that Mr. Haselton has placed links to various Solid Oak sites
on the www.peacefire.org site.  Of course you are correct, but your
assertion that Mr. Haselton needed permission to do this is nonsense.  A
URL (the "U", of course, standing for "universal") is merely a machine
readable encoding of a label identifying the work in the form
how://where/what:  It is no different than providing the card catalog
number for a book already in the library.  Solid Oak already is on the
internet, where, by definition, its presence is public, regardless of
whether Solid Oak is a public corporation or a private corporation.  Mr.
Haselton simply has told people where to find Solid Oak and given them
the means to get there without having to type in a URL.  Would you
contend that Mr. Haselton needs your permission to write on the
Peacefire site that "The URL for Solid Oak Software, Inc. is
http://www.solidoak.com"?  Would you contend that Mr. Haselton needs
your permission to state that Solid Oak's address is P.O. Box 6826,
Santa Barbara, CA 93160?  That Solid Oak's telephone number is (805)
962-9853, or that its fax number is (805) 967-1614?

Since you are in the business of making internet software products, no
doubt you should appreciate that linking one web site to another, or to
hundreds of others, which in turn could be linked to thousands of
others, is the raison d'etre of the World Wide Web.  If linking required
permission (which it does not) or was unlawful (which it is not) then,
as a practical matter, the web would die.  Since Solid Oak's business
depends on the web flourishing, I doubt that you would want to see that
happen.

However, regardless of what you might want, there is no law and there is
no policy which prevents Mr. Haselton from including links to Solid Oak
on the Peacefire site.  The same is true for Solid Oak's email
addresses, many of which are listed on Solid Oak's own web pages.  Solid
Oak's URLs are pure information, not protected under any intellectual
property law of which I am aware.  Disclosing and/or linking to them is
neither trespass nor any other offense.

Finally, although I consider the matter legally irrelevant, I note that
Solid Oak's site includes links to each of:

Parent Time http://pathfinder.com/ParentTime/Welcome/;
Microsoft http://www.microsoft.com/;
Quarterdeck http://www.quarterdeck.com/;
Windows95.com http://www.windows95.com/;
Berit's Best Sites for Children
http://db.cochran.com/db_HTML:theopage.db;
Discovery Channel http://www.discovery.com/; and
Family.Com http://www.family.com/.

If, prior to the date of your demand letter, you obtained written
permission from each of these sites to link to them, I would be
interested in seeing those writings.  If, however, Solid Oak has not
obtained written permission for those links, one might wonder as to your
motivation in making your assertion that the links provided by Mr.
Haselton are in any way improper.


Perhaps I can understand your being upset with how easy it was for Mr.
Haselton to lawfully decrypt the weakly encrypted CYBERsitter filter
file.  But being upset is one thing: accusing Mr. Haselton of criminal
conduct and threatening him with legal action (as you have done publicly
both recently and last December) is quite another.  Mr. Haselton has no
desire to institute legal proceedings against you or Solid Oak if this
goes no further.  Therefore, if you were just venting your frustration,
say so now and we will be done with this.  Otherwise, I am confident
that Solid Oak's attorneys know where the proper court is, as do I.



                                     BIGELOW, MOORE & TYRE, LLP




                                     By:
                                             JAMES S. TYRE

JST:hs

cc:     Mr. Bennett Haselton

------------------------------

Date: Tue, 06 May 1997 20:55:42 -0400
From: Minor Threat <[email protected]>
Subject: File 3--TV interview w/2 hackers banned from computers

TV.COM is a weekly, 30-minute television show devoted to topics of
the Internet, online services, web pages and new computer
technology. The May 17th show will feature interviews with two
hackers who have been ordered by federal judges to stay away from
computers after they were found guilty of committing computer and
other crimes.

Minor Threat will discuss the details of his ban from the Internet
and how it will affect him when he is released and why he feels it
is unfair. His crime was not computer-releated, but the judge
believed he had the capability to electronically retaliate against
the arresting officer by altering his credit rating and so,
ordered an Internet ban placed on him.  Minor Threat was
interviewed early April at FCI Bastrop where he is currently
serving a 70-month sentence. His web page is at
www.paranoia.com/~mthreat/.

Notorious computer hacker Kevin Poulsen was released from federal
prison last summer after serving 51 months and is now struggling
to cope with a life without computers. Having been surrounded by
computers up until his capture in 1991, his life has drastically
changed since he is currently prohibited from touching or being in
the same room as one. He will discuss the difficulties he faces as
a non-computer user in a high-tech environment.  His web page is
at www.catalog.com/kevin/.

Please check the TV.COM web site (www.tv.com) for local time and
channel listings in your area.

------------------------------

Date: Thu, 8 May 97 12:12:34 -0700
From: "Gordon R. Meyer" <[email protected]>
Subject: File 4--Fwd: intellectual property and graduate students

Date--Thu, 1 May 1997 08:49:19 -0700
From--Tony Rosati <[email protected]>

Source -  [email protected]

Intellectual Property May Prove to Be the Pressing Graduate &
Professional Student Concern at the Turn of the Century!

Find Out How YOU Can Help NAGPS Prepare to Help Save YOUR Intellectual
Property Rights!

by Anthony Rosati
NAGPS Information Exchange Coordinator

Recently, at the Annual NAGPS Southeastern Regional Meeting, in Atlanta
this past April 11-13, Anne Holt, former SE Regiona Coordinator for
NAGPS & Speaker of the Congress of Graduate Students of Florida State
University gave a presentation & presided over a Roundtable on
Intellectual Property. Her findings shocked the entire room of attendees.

She started off using her school, FSU, as a starting point. She pointed
out that at FSU, graduate & professional students, and even undergraduate
students, fall under the faculty guidelines for intellectual property,
regardless of whether they are working for the university or simply
matriculated. In addition, the FSU faculty handbook, in the section where
IP issues are discussed, clearly points out that even in areas that are
unrelated to the work done at the university and abny work done at home or
after-business-hours is encompassed. It even explicitedly stated that
AFTER one left the FSU, one's work, whether reklated to the support
received from FSU or not, could be claimed by FSU and was, for all intents
and purposes, theirs to lay claim to. We were all shocked. It basically
stated that regardless of whether you were working on campus or not,
working during business hours or not, working on something you were
matriculated or hired for, if you came up with it, it belonged to the FSU.

Anne mentioned several cases, including one of a Univ. of South Florida
graduate student, who documented that he worked on a computer software
package off-hours and at home, without any resources from the university,
and yet is still sitting in a jail cell awaiting trial.

Then Anne Holt began asking attendees what their schools' IP policies
were. Only a handful of individuals could cite them, and even fewer
realized that they may be covered by such policies.

Anne Holt is now spearheading an investigation for NAGPS into what
policies
exist at different schools. She would like to collect as many policies as
possible from different institutions. If you can, please send the relavent
excerpts by e-mail to [email protected], or if transcribing that
information into an e-mail message is too daunting or too large, please
send a hardcopy or photocopy of the policy to

       Anthony V. Rosati
       NAGPS Information Exchange Coordinator
       6630 Moly Drive
       Falls Church, VA 22046
       ATTN: IP Crisis

Anne & I will pour through the resulting collection and distill the
results into a document for us by all NAGPS Members. Additionally,
a recommended policy for Intellectual Property concerns between students
and institutions of higher learning, as well as a draft position statement
for the Association will be created and presented to the Membership at the
New Orleans Meeting this coming October for amendment & ratification.

Before parting, Anne & I wanted to remind all that with the future of
Intellectual Property becoming unstable and confusing, only YOU can
best protect your Intellectual Property by:

       (1) Knowing your rights under the contract(s) you signed when
           matriculating and/or accepting work with the university.
       (2) Knowing the current state & federal laws regarding the
           protection and claiming of Intellectual Property.
       (3) carefullly documenting the conditions, resources and
           chronology of your research and intellectual effort,
           regardless of its status.
       (4) Working with a strong advocacy group, like the AAUP, or
           the NAGPS, to ensure your rights are understood and
           addressed by local, regional & national legislatures.

You can learn some more about Intellectual Property Rights by going to the
NAGPS Web site at http://www.nagps.org/NAGPS/ and clicking on the Focus
Issues link - from there, click on the Legislative Issues link and go to
the bottom of the page.

Regards,

Anthony Rosati
NAGPS Infromation Exchange Coordinator

------------------------------

Date: Fri, 02 May 1997 09:59:58 -0400
From: "Robert A. Costner" <[email protected]>
Subject: File 5--Georgia expands the "Instruments of Crime"

Source -  [email protected]

    +++++++++++++

In Georgia it is a crime, punishable by $30K and four years to use in
furtherance of a crime:

* a telephone
* a fax machine
* a beeper
* email

The actual use of the law, I think, is that when a person is selling drugs
and either is in possession of a beeper, or admits to using the phone to
facilitate a meeting, he is charged with the additional felony of using a
phone.  This allows for selective enforcement of additional penalties for
some people.

 O.C.G.A. 16-13-32.3.

 (a) It shall be unlawful for any person knowingly or intentionally to
 use any communication facility in committing or in causing or
 facilitating the commission of any act or acts constituting a felony
 under this chapter. Each separate use of a communication facility
 shall be a separate offense under this Code section.  For purposes of
 this Code section, the term "communication facility" means any and all
 public and private instrumentalities used or useful in the
 transmission of writing, signs, signals, pictures, or sounds of all
 kinds and includes mail, telephone, wire, radio, computer or computer
 network, and all other means of communication.

 (b) Any person who violates subsection (a) of this Code section shall
 be punished by a fine of not more than $30,000.00 or by imprisonment
 for not less than one nor more than four years, or both.

------------------------------

Date: Fri, 2 May 1997 15:08:43 -0500 (CDT)
From: Crypt Newsletter <[email protected]>
Subject: File 6--More on Gov't Goofs on Virus Hoaxes (Crypt Reprint)

((MODERATORS NOTE:  For those unfamiliar with Crypt Magazine,
you should check it out. The homepage is at:
http://www.soci.niu.edu/~crypt - and the editor, George Smith,
is to covering computer viruses what Brock Meeks and
Declan McCullagh are to Net politics)).


CRYPT NEWSLETTER 42
April -- May 1997


HOISTED ON THE PETARD OF PENPAL

In an astonishing gaffe, government intelligence experts writing
for the Moynihan Commission's recent "Report . . . on Protecting
and Reducing Government Secrecy" reveal they've been hooked on one
of the Internet's ubiquitous e-mail computer virus hoaxes
known as "Penpal Greetings"!

In a boldly displayed boxed-out quote (page 109) in a part of the
report entitled "Information Age Insecurity" authors of the report
proclaim:

"Friendly Greetings?

"One company whose officials met with the Commission warned its
employees against reading an e-mail entitled Penpal Greetings.
Although the message appeared to be a friendly letter, it
contained a virus that could infect the hard drive and destroy all
data present. The virus was self-replicating, which meant that
once the message was read, it would automatically forward itself
to any e-mail address stored in the recipients in-box."

The Penpal joke is one in half-a-dozen or so permutations spun
off the well-known GoodTimes e-mail virus hoax.  Variations on
GoodTimes have appeared at a steady rate over the past couple
years. Real computer security experts -- as opposed to the
Moynihan commission's -- now occasionally worry in the press that
they spend more time clearing up confusion created by such
tricks than destroying actual computer viruses.

The report's authors come from what is known as "the Moynihan
commission," a group of heavy Congressional and intelligence
agency hitters tasked with critiquing and assessing the Byzantine
maze of classification and secrecy regulation currently embraced by
the U.S. government. The commission also devoted significant print
space to the topic of information security and network intrusion.

Among the commission's members are its chairman, Daniel Moynihan;
vice-chairman Larry Combest, Jesse Helms, ex-CIA director John
Deutch and Martin Faga, now at a MITRE Corporation facility in McLean,
Virginia, but formerly a head of the super-secret, spy satellite-flying
National Reconnaissance Office.

The part of the commission's report dealing with "Information Age
Insecurity" merits much more comment.  But in light of the report's
contamination by the Penpal virus hoax, two paragraphs from the March 4
treatise become unintentionally hilarious:

"Traditionally, computer security focuses on containing the effects of
malicious users or malicious programs. As programs become more complex,
an additional threat arises: _malicious data_ [Crypt Newsletter emphasis
added] . . . In general, the outlook is depressing: as the economic
incentives increase, these vulnerabilities are likely to be
exploited more frequently.

---W. Olin Sibert, 19th National Information Systems Security
Conference (October 1996)"

And,

"Inspector General offices, with few exceptions, lack the personnel,
skills, and resources to address and oversee information systems
security within their respective agencies. The President cannot turn to
an Information General and ask how U.S. investments in information
technology are being protected from the latest viruses, terrorists, or
hackers."

Got that right, sirs.
 ----------------------

Notes: Other authors of the commission report include Maurice
Sonnenberg, a member of the President's Foreign Intelligence Advisory
Board; John Podesta, a White House Deputy Chief of Staff and
formerly a visiting professor at Georgetown University's Cyberlaw
Center; Ellen Hume, a media critic for CNN's "Reliable Sources"
and former reporter for the Wall Street Journal and Los Angeles Times;
and Alison Fortier, a former National Security Council staffer and
current director of Missile Defense Programs in a Washington,
D.C.-based arm of Lockheed Martin.

The Penpal Greetings hoax appeared in November of 1996 which would
seem to indicate the section of the report containing it was not written
until a month or so before the report's publication on March 4 of
this year.

Unsurprisingly, much of the report appears to be written by staff
members for the commission chairmen.  An initial phone call to
the commission was answered by a staffer who declined to name the
author of the part of the report carrying the Penpal hoax. The
staffer did, however, mention he would forward the information to
the author.  And he was as good as his word.  The following week,
Crypt Newsletter was told to get in touch with Alison Fortier
by way of Jacques Rondeau, a U.S. Air Force colonel who served as
a commission staff director and was instrumental in writing the
chapter on "computer insecurity."

Fortier was surprised by the information that Penpal Greetings
was a hoax and could shed no light on the peer-review process that
went into verifying items included as examples in the report.  She
said the process involved readings of the material by staffers to
the commissioners.  Examples were presented and this was one of
the ones that was picked, apparently because it sounded good.

At first, Fortier argued that Penpal Greetings, as an example,
was difficult to distinguish from the truth. Indeed, Fortier wasn't
even convinced it wasn't a real virus. And this demonstrates the thorny
problem that arises when hoaxes work their way into the public
record at a very high level of authority: Simply, there is a great
reluctance to accept that they ARE rubbish, after the fact, because the
hearsay has come from multiple, supposedly authoritative, sources.

Crypt Newsletter then told Fortier that verification of whether or
not Penpal was bogus could have been accomplished by spending five
minutes of time on any of the Internet search engines and using it
as a keyword ("Penpal Greetings" returns numerous cites indicating
it is a hoax) and the Moynihan commissioner backed off on insistence
that it might still be real.

"It's unfortunate that this error occurred because it can interfere
with the recommendations of the commission, which are still valid,"
Fortier said.  "When policy meets science -- it's always an imperfect
match."

Crypt Newsletter also queried commissioner and ex-NRO director Martin
Faga. "I've been aware of the error since shortly after
publication of the report, but I'm not familiar with the background," Faga
told Crypt.

Commissioner Ellen Hume was also at a loss as to how Penpal Greetings
had arrived in the report.

Commission staff director Eric Biel had more to say on the subject in a
letter to Crypt Newsletter dated April 24. In it, Biel wrote: "I am
very frustrated that we failed to get our information correct in
this regard; as you note, the error only adds to the confusion
concerning a very complicated set of security issues.  You are quite
right when you indicate this portion of the report was added late
in the day.  We had been urged to provide some anecdotes to complement
the narrative text; this example thus was added to give greater
emphasis to the points already being described . . . Obviously, there
was not an adequate fact-checking and verification process with
respect to the Penpal information."

Biel added that he was still confident of "the soundness of [the
report's] findings and recommendations, including [those in the chapter
'Information Age Insecurity.']"

Go ahead, contact the Moynihan Secrecy Commission at 202-776-8727
and verify for them that Penpal Greetings is a hoax. After all, it's your
money, too.  But hurry, they're moving out of the office by the middle
of the month.

Acknowledgment: A copy of the Moynihan Commission report is mirrored
on the Federation of American Scientists' Website. Without FAS' timely
and much appreciated efforts to make government reports and documents
of strategic interest freely available to an Internet readership, Crypt
Newsletter's rapid tracing of the travel of the Penpal hoax into the
commission's record might not have been possible.


WE ARE THE ENEMY: BUNKER MENTALITY IN USAF INFO-WAR KOOKS

Just in case you've harbored the suspicion that Crypt Newsletter
exaggerates the outright paranoia now gripping portions of the
United States military with regards to the Internet, in this
issue I've excerpted substantial portions of an article which
appeared in a July 1996 issue of Intercom, an electronic
publication published on a Web server out of Scott Air Force Base in
Illinois. Intercom is a good source of US Air Force orthodoxy on the
topic of information technology as it pertains to members of the
service.

In this article, the information airmen of Goodfellow AFB,
Texas, tell us they're already under attack.  Computer viruses,
say soldiers, are continuously assaulting the base, leaving it
in essentially a continual state of information war.  While the
article may appear reasonable to the principals who commissioned it,
publishing it on the Internet has only served to reinforce the
notion that some "info-warriors" in the U.S. military are starkly
paranoid nutcases.

It's a whole new realm of warfare and you're no longer safe at work
or at home," said Lieutenant Randy Tullis, for Intercom.

"As evidence of the increase in information warfare activity,
communications officials at Goodfellow have logged 12 incidents of
computer viruses in less than four months this year," said
Sgt. Michael Minick.

The Intercom feature continues, "In all of 1995,
[Goodfellow] handled 14 cases [of computer virus infection.]"

"While viruses are not an all-out war waged against the base with
weapons of mass destruction, the results can be devastating," states
the article, rather balefully.

"Information warriors will try to deal heavy blows in future wars,
and Goodfellow and its 315th Training Squadron is at the forefront in
training defenders against these warriors," the article says.

"The most popular aspect of [information war] is the process of
attacking and protecting computer-based and communication information
networks," said Goodfellow AFB's Captain Tim Hall.

Hall had also advertised on the Internet in mid-November 1996 for
an info-war instructor at Goodfellow.  The job description called
for a captain's rank to "[Create and develop] infowar curricula for all
new USAF Intelligence personnel;  Supervise IW Lab development, student
training, infowar instructional methods and infowar exercises."

"Some attacks are by people who unintentionally access networks and
others are by those bent on destroying government computer data
through use of devastating viruses and other means," said Hall.

"Students also learn how other countries such as Russia, China and
France plan to conduct [information warfare] operations," said Hall.

"Indeed," said Crypt Newsletter.

It's war -- war against hackers, say the information soldiers of
Goodfellow.

Instruction courses at the base are designed to inculcate "basic
awareness in the defensive skills needed to recognize and defeat
information warriors, <I>commonly called computer hackers</I>," Hall
said for Intercom.

Goodfellow is stepping up efforts to train its information warriors.
"We are going to propose Team Goodfellow build an advanced [information
warfare] course," said another soldier. "It will teach offensive and
defensive concepts in a classroom and hands-on training in a lab
environment," which is a tricky way of saying that soldiers
think hacking the hackers, or whoever they think might be launching
info-war attacks, is a savvy idea.

Long-time Crypt Newsletter readers probably can't help but
recognize trenchant similarities between the quote of Goodfellow
info-warriors and examples of the paranoid rantings found sprinkled
through the writings of teenager-composed 'zines from the computer
underground ca. 1992.

We'll kick them off Internet Relay Chat.  They'll never get
channel ops on our watch.  Yeah, that's the ticket.

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

        In ITALY: ZERO! BBS: +39-11-6507540

 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
   Web-accessible from: http://www.etext.org/CuD/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #9.36
************************************