💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0619.txt captured on 2022-06-12 at 10:54:09.
-=-=-=-=-=-=-
Computer underground Digest Sun Feb 27, 1994 Volume 6 : Issue 19 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe (He's lurking in the archives now) Acting Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Clipper Editor: Hank O'Haira CONTENTS, #6.19 (Feb 27, 1994) File 1--"Clipper Chip will Block Crime" / D. Denning (Newsday) File 2--Re: "Clipper Chip will Block Crime" (#1) File 3--Re: "Clipper Chip will Block Crime" (#2) File 4--Nat'l Symposium on Proposed Arts & Humanities Policies File 5--Criticism of CuD post on Virus Contest File 6--Media "Hackers" Whack Harding's E-mail File 7--Entrapment Scam? File 8--Letter to Rep. Molinari (R-Brooklyn) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. To subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 ANONYMOUS FTP SITES: AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: ftp.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) UNITED STATES: aql.gatech.edu (128.61.10.53) in /pub/eff/cud etext.archive.umich.edu (141.211.164.18) in /pub/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD ftp.halcyon.com (192.135.191.2) in mirror2/cud KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Mon, 21 Feb 1994 22:45:51 EST From: Moderators <cudigest@mindvox.phantom.com> Subject: File 1--"Clipper Chip will Block Crime" / D. Denning (Newsday) Newsday, Tuesday, February 22, 1994, Viewpoints The Clipper Chip Will Block Crime By Dorothy E. Denning Hidden among the discussions of the information highway is a fierce debate, with huge implications for everyone. It centers on a tiny computer chip called the Clipper, which uses sophisticated coding to scramble electronic communications transmitted through the phone system. The Clinton administration has adopted the chip, which would allow law enforcement agencies with court warrants to read the Clipper codes and eavesdrop on terrorists and criminals. But opponents say that, if this happens, the privacy of law-abiding individuals will be a risk. They want people to be able to use their own scramblers, which the government would not be able to decode. If the opponents get their way, however, all communications on the information highway would be immune from lawful interception. In a world threatened by international organized crime, terrorism, and rogue governments, this would be folly. In testimony before Congress, Donald Delaney, senior investigator with the New York State Police, warned that if we adopted an encoding standard that did not permit lawful intercepts, we would have havoc in the United States. Moreover, the Clipper coding offers safeguards against casual government intrusion. It requires that one of the two components of a key embedded in the chip be kept with the Treasury Department and the other component with the Commerce Department's National Institute of Standards and Technology. Any law enforcement official wanting to wiretap would need to obtain not only a warrant but the separate components from the two agencies. This, plus the superstrong code and key system would make it virtually impossible for anyone, even corrupt government officials, to spy illegally. But would terrorists use Clipper? The Justice Department has ordered $8 million worth of Clipper scramblers in the hope that they will become so widespread and convenient that everyone will use them. Opponents say that terrorists will not be so foolish as to use encryption to which the government holds the key but will scramble their calls with their own code systems. But then who would have thought that the World Trade Center bombers would have been stupid enough to return a truck that they had rented? Court-authorized interception of communications has been essential for preventing and solving many serious and often violent crimes, including terrorism, organized crime, drugs, kidnaping, and political corruption. The FBI alone has had many spectacular successes that depended on wiretaps. In a Chicago case code-named RUKBOM, they prevented the El Rukn street gang, which was acting on behalf of the Libyan government, from shooting down a commercial airliner using a stolen military weapons system. To protect against abuse of electronic surveillance, federal statutes impose stringent requirements on the approval and execution of wiretaps. Wiretaps are used judiciously (only 846 installed wiretaps in 1992) and are targeted at major criminals. Now, the thought of the FBI wiretapping my communications appeals to me about as much as its searching my home and seizing my papers. But the Constitution does not give us absolute privacy from court-ordered searches and seizures, and for good reason. Lawlessness would prevail. Encoding technologies, which offer privacy, are on a collision course with a major crime-fighting tool: wiretapping. Now the Clipper chip shows that strong encoding can be made available in a way that protects private communications but does not harm society if it gets into the wrong hands. Clipper is a good idea, and it needs support from people who recognize the need for both privacy and effective law enforcement on the information highway. ====================================================== Copyright Newsday. All rights reserved. This article can be freely distributed on the net provided this note is kept intact, but it may not be sold or used for profit without permission of Newsday. ------------------------------ Date: Fri, 25 Feb 1994 22:43:48 EST From: rivest@theory.lcs.mit.edu (Ron Rivest) Subject: File 2--Re: "Clipper Chip will Block Crime" (#1) (Fwd by CPSR) Hi Dorothy -- Thanks for sending me a copy of your editorial. But I find the reasoning you present misleading and unpersuasive. First, you argue that the clipper chip will be a useful law enforcement tool. Given the small number of currently authorized wiretaps per year (under 1000) and the ease of using alternative encryption technology or superencryption, it seems plausible to me that law enforcement could expect at most ten "successful" clipper wiretaps per year. This is a pretty marginal basis for claiming that clipper will "block crime". Second, you seem to believe that anything that will "block crime" must therefore be a "good thing" and should therefore be adopted. This is not true, even if it is not subject to government abuse. For example, a system that could turn any telephone (even when on-hook) into an authorized listening microphone might help law enforcement, but would be unacceptable to almost all Americans. As another example, tattooing a person's social security number on his or her buttocks might help law enforcement, but would also be objectionable. Or, you could require all citizens to wear a bracelet that could be remotely queried (electronically, and only when authorized) to return the location of that citizen. There are all kinds of wonderfully stupid things one could do with modern technology that could "help" law enforcement. But merely being of assistance to law enforcement doesn't make a proposal a good thing; many such ideas are objectionable and unacceptable because of the unreasonably large cost/benefit ratio (real or psychological cost). The clipper proposal, in my opinion, is of exactly this nature. Third, you seem unnecessarily polly-annish about our government and the potential for abuse. The clipper proposal places all trust for its management within the executive branch; a corrupt president could direct that it be used for inappropriate purposes. The unspecified nature of many of the associated procedures leaves much room to speculate that there are "holes" that could be exploited by government officials to abuse the rights of American citizens. Even if the proposal were modified to split the trust among the various branches of government, one might still reasonably worry about possible abuse. Merely because you've met the current set of representatives of various agencies, and feel you can trust them, doesn't mean that such trust can be warranted in their successors. One should build in institutional checks and balances that overcome occasional moral lapses in one or more office holders. Fourth, your discussion of "searching your home and seizing your papers" is misleading. You seem to imply that because law enforcement can be issued a warrant to search your home, that we should adopt clipper. Yet this analogy only makes sense if individuals were required to deposit copies of their front door keys with the government. I can build any kind of house I wish (out of steel, for example), and put any kind of locks on it, and wire up any kind of intrusion detectors on it, etc. The government, armed with a search warrant, is not guaranteed an "easy entry" into my home at all. The appropriate analogical conclusion is that individuals should be able to use any kind of encryption they want, and the government should be allowed (when authorized, of course) to try and break their encryption. Finally, you argue (elsewhere, not in this editorial) that the decision rests in part on "classified" information. Such an argument only makes sense if there is a specific law-enforcement situation that makes such classified information timely and relevant. (E.g., if there was a current investigation as to whether the Department of the Treasury had been infiltrated by organized crime.) The use of "classified information" is otherwise generally inappropriate in discussing communications policy that will last over decades. This hardly covers all of the relevant issues, but it covers the points that came immediately to mind in reading your editorial... Cheers, Ron P.S. Feel free to pass along, quote, or otherwise re-distribute this... ------------------------------ Date: Fri, 25 Feb 1994 18:43:12 PST From: Jim Thomas <jthomas@well.sf.ca.us> Subject: File 3--Re: "Clipper Chip will Block Crime" (#2) Dorothy Denning's defense of Clipper as a crime-fighting strategy (as reported in Newsday, 22 Feb--see above file) reflects sincerity and passion. I have considerable intellectual and personal respect for Dorothy. In 1990, she was among the first to challenge media and law enforcement myths of the "dangerous hacker," and she did so while working in the private sector at the peak of the "hacker crackdown," which took considerable courage. She, along with John Nagel, also was instrumental in deflating the Government's case against Craig Neidorf in the Phrack/E911 trial in June, 1990, when she and John flew to Chicago at their own expense to help the defense prepare its case. Her good will, altruism, and integrity are unimpeachable. However, her defense of Clipper on the grounds that it will help fight crime requires some examination. CPSR, EFF and others have addressed some of the issues the Newsday story raises (see past CuDs and the documents in EFF's archives at ftp.eff.org /pub/EFF and browse). There are, however, a few specific examples used in the story to defend Clipper that I find troublesome. Among them: 1) Citing Don Delaney, senior investigator of the New York State Police, inspires little confidence. Dorothy notes that Delaney said that without an encoding standard that would not permit lawful intercepts, "we would have havoc in the United States." The hyperbole makes a dramatic media sound byte, but I can think of no society, none, ever, in which social stability and order were based on a government's ability and legitimate (or even illicit) power to surveil citizens at will. Generally, societies in which government ability to monitor citizens was high historically have been those in which respect for government authority was low, or in which stability was imposed by political repression. Although a minor point, the appeal to fears of undemonstrated social chaos to enact policies that threaten privacy are misdirected. If Delaney's comments before last summer's Congressional hearings are to be adduced as justification for Clipper, then his comments must be placed in the context in which they were made. The context does little to assure those of use concerned with the implications of Clipper for civil liberties. Delaney's comments occurred as critical commentary on 2600 Magazine, which we judged as dangerous to teenagers (emphasis added): Publications, such as "2600," which teach subscribers how to commit telecommunications crime are protected by the First Amendment, but disseminating pornography to minors is illegal. In that many of the phone freaks are juveniles, I BELIEVE LEGISLATION BANNING THE DISSEMINATION TO JUVENILES OF MANUALS ON HOW TO COMMIT CRIME WOULD BE APPROPRIATE. From a law enforcement perspective, I applaud the proposed Clipper chip encryption standard which affords individuals protection of privacy yet enables law enforcement to conduct necessary court-ordered wiretaps, and with respect to what was being said in the previous conversation, last year there were over 900 court-ordered wiretaps in the United States responsible for the seizure of tons of illicit drugs coming into this country, solving homicides, rapes, kidnappings. If we went to an encryption standard without the ability for law enforcement to do something about it, we would have havoc in the United States -- my personal opinion. Delaney expands in his later remarks: Well, the problem is that teenagers do read the "2600" magazine. I have witnessed teenagers being given free copies of the magazine by the editor-in-chief. I have looked at a historical perspective of the articles published in "2600" on how to engage in different types of telecommunications fraud, and I have arrested teenagers that have read that magazine. THE PUBLISHER, OR THE EDITOR-IN-CHIEF, DOES SO WITH IMPUNITY UNDER THE CLOAK OF PROTECTION OF THE FIRST AMENDMENT. However, as I indicated earlier, in that the First Amendment has been abridged for the protection of juveniles from pornography, I also FEEL THAT IT COULD BE ABRIDGED FOR JUVENILES BEING PROTECTED FROM MANUALS ON HOW TO COMMIT CRIME -- children, especially teenagers, who are hackers, and who, whether they be mischievous or intentionally reckless, don't have the wherewithal that an adult does to understand the impact of what he is doing when he gets involved in this and ends up being arrested for it. There is considerable room for disagreement on whether 2600 Magazine is any more a manual for crime than thousands of others examples drawn from movies, television, comic books, magazines, or radio programs are. What I find disturbing is the explicit advocacy that First Amendment protections be so easily abridged on the basis of simplistic opinions and interpretations. Following Delaney's logic for abridging First Amendment rights, one could with equal ease justify banning Bevis and Butthead, "Gangsta rap," and other forms of expression that law enforcement perceived to contribute to potential criminal behavior. Delaney's comments--although certainly well meaning and for a "higher goal"--do little to inspire confidence that some over-zealous law enforcement agents, believing they are acting for some higher purpose, won't abuse their power and authority. Those who remember the systematic abuses of law enforcement agents at all levels, especially the FBI, in the political surveillance excesses of the 1960s have no reason to trust the good faith of law enforcement in following-the-rules. 2) The double escrow systems of the two components of the chip's key do offer considerable protection from abuse, but the potential flaws have not been addressed, as many critics (eg, CPSR, EFF) have noted. The flaws include a) the ease of obtaining warrants, b) the misuse of warrants to justify overly-broad searches, c) the possibility of release of the key to unauthorized persons once obtained, and d) the assumption that collusion between persons to obtain a given set of keys is "impossible." Fully detailed discussion of security problems can be found in the position papers of the groups in the ftp.eff.org archives. 3) It is claimed that terrorists and others would, in fact, use Clipper, and the World Trade Center bombers, who were "stupid enough to return a truck that they had rented," is used as an example. Although a small detail, the bombers did not return the truck--it was destroyed in the blast. They returned for their deposit. Nonetheless, the argument could also be made that, if criminals are stupid, then why would they encrypt at all? Or, if they encrypted, why would they necessarily have an unbreakable code? The fact is that sophisticated criminals concerned with security of communications would likely circumvent Clipper, and Clipper is not the answer to intercepting such communications. 4) Clipper will have no significant impact on crime, and playing on the current "fear of crime" hysteria ignores several points. First, most of "crime" with which the public is concerned, street (or index) crimes, constitutes only a small fraction (under 15 percent by most estimates) of all crime. In dollar costs to society, white collar crime and tax fraud constitute almost two-thirds ($131 billion). Clipper will do absolutely nothing to reduce these offenses. Further, interception of communications is rarely used in apprehending criminals, and therefore would not be a significant factor in fighting crimes at all. Lets take a look at some figures on court-authorized orders granted for intercepts: YEAR STATE FEDERAL 1969 174 0 1974 607 121 1979 466 87 1984 512 289 1989 453 310 1991 500 386 Intercepts are useful for law enforcement, but they are simply not used often enough to justify the claim that Clipper would reduce crime, let alone that without Clipper we'd have social "havoc." What kinds of crimes are intercepts used for? In 1991, the Sourcebook of Criminal Justice Statistics (p. 474) lists the following: OFFENSE TOTAL FEDERAL STATE Narcotics 536 228 308 Racketeering 114 61 53 Gambling 98 19 79 Other 108 48 60 So, about 63 percent of intercepts are for drug dealers, and about another quarter are for racketeering and gambling. Intercepts for homicide (21) and kidnaping (5) were the only violent crimes for which intercepts were listed in 1991. This is hardly sufficient grounds on which to base an argument that Clipper will reduce crime or help stem social havoc. 5) The story alludes to the "success" of FBI wire taps of the El Rukns, a Chicago Street gang: In a Chicago case code-named RUKBOM, they prevented the El Rukn street gang, which was acting on behalf of the Libyan government, from shooting down a commercial airliner using a stolen military weapons system. My recollection of these events is quite different than those described above. The FBI did, in fact, intercept considerable communications between El Rukn members, include Jeff Forte, the group's leader, who led the gang from federal prison. The El Rukns attempted to obtain money from the Libyans for a variety of schemes, and one of the schemes included shooting down an airliner. Nothing ever came of the solicitations, and I recall no evidence that the plan described above was foiled by the FBI through wire taps or any other tactic. Some news accounts described it as a ploy to establish credibility with the Libyans. Others saw it as a fantasy, and some saw it as a potential danger that never went beyond posturing. I recall no evidence that law enforcement intervened to prevent it. Perhaps those with a better memory or with a press release at hand can refresh my memory, but I'm inclined to judge the story as at best a distortion of events and at worst simply false. 6) There's a sidebar to the El Rukn story relevant to Clipper. Federal prosecutors successfully prosecuted and imprisoned the gang's hierarchy. In 1993, it was revealed that the federal prosecutors engaged in illegal behaviors, including providing gang members with sex and drugs while in their custody to obtain testimony of some against the others. The fallout from the incident is still settling, but gross legal violations and other improprieties were commited under "color of law." It is ironic that the El Rukn investigation be used as an example of effective law enforcement when, in fact, it is an example of federal malfeasance and justice at its worst. It is precisely the blatant disregard of the rule of law by federal prosecutors in the El Rukn case that causes some of us to question the blind faith that others invest in it. It's an example of the dangers of law enforcement out of control. None of us like crime. All of us support reasonable ways to fight it, and most of us recognize the need for communications' intercepts on rare occasions. However, most U.S. citizens overwhelmingly oppose wiretapping (70 percent in 1991, down from 80 percent in 1974, according to Department of Justice Statistics). The history of government abuse of surveillance and the continued willingness of government agents to bend the law in pursuit of "justice," as the El Rukn incident above illustrates, suggests that Clipper poses far more risks to the commonweal than it offers protections. The subtext of the Newsday story, which ironically argues for Clipper on the basis of a case of government circumvention of law and a citation that occurred in the context of arguing for abridging Constitutional rights to argue FOR Clipper, in fact provides one of the best arguments against it. ------------------------------ Date: Mon, 21 Feb 1994 17:11:23 -0500 From: tomd@PANIX.COM(Tom Damrauer) Subject: File 4--Nat'l Symposium on Proposed Arts & Humanities Policies CALL FOR PAPERS, PANELS, AND PRESENTATIONS On October 14th, 15th and 16th, the Center for Art Research in Boston will sponsor a National Symposium on Proposed Arts and Humanities Policies for the National Information Infrastructure. Participants will explore the impact of the Clinton Administration's AGENDA FOR ACTION and proposed NII (National Information Infrastructure) legislation on the future of the arts and the humanities in 21st Century America. The symposium, which will be held at the American Academy of Arts and Sciences in Cambridge, Massachusetts, will bring together government officials, academics, artists, writers, representatives of arts and cultural institutions and organizations, and other concerned individuals from many disciplines and areas of interest to discuss specific issues of policy which will effect the cultural life of *all* Americans during the coming decades. To participate, submit a 250-word abstract of your proposal for a paper, panel-discussion or presentation, accompanied by a one-page vitae, by March 15, 1994. Special consideration will be given to those efforts that take a critical perspective of the issues, and are concerned with offering specific alternatives to current administration and congressional agendas. NOTE: PLEASE FORWARD AND/OR RE-POST TO APPROPRIATE NEWSGROUPS AND MAILING LISTS. +------------------------------------------------------------ Jay Jaroslav, Director jaroslav@artdata.win.net CENTER FOR ART RESEARCH 241 A Street Boston, MA 02210-1302 USA voice: (617) 451-8030 fax: (617) 451-1196 ------------------------------ Date: Fri, 25 Feb 1994 13:05:59 -0500 From: skirkham@ERC.CAT.SYR.EDU(Shawn Kirkham) Subject: File 5--Criticism of CuD post on Virus Contest Dear CuD, I find it offensive that you would allow a user to have his application for writing a virus published in CuD Issue 6.18. I think that this world has enough problems without someone trying to show how much grief they can cause on innocent computer users such as myself. I even created a virus or two in my years of computing, but never with the purpose of trying to harm another user's system! I create them only for testing purposes, and when I find one that fails a scanned test, I forward it to the company that created the anti-virus software. My main concern on this issue is will this company (American Eagle) forward all the viruses to all the possible anti-virus companies? If they don't then this is considered an illegal activity.