💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0869.txt captured on 2022-06-12 at 11:03:03.
-=-=-=-=-=-=-
Computer underground Digest Sun Sep 29, 1996 Volume 8 : Issue 69 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.69 (Sun, Sep 29, 1996) File 1--Poulsen Stifled by No-computers Probation Rule File 2--Microsoft response to David Smith/Web Browser Method File 3--Netscape CEO Jim Barksdale signs the pro-crypto petition (fwd) File 4--Banned Books Week 9/28-10/5 File 5--Computer Virus Hysteria/John McAfee Awards: plea for books File 6--Jean_bernard_Condat PhD Musicologie File 7--CDT Policy Post 2.32 - FBI Surveillance Demands Rejected on Privacy File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Fri, 27 Sep 1996 02:33:26 -0500 From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest) Subject: File 1--Poulsen Stifled by No-computers Probation Rule POULSEN STIFLED BY NO-COMPUTERS PROBATION RULE Published: Sept. 23, 1996 BY BRANDON BAILEY Mercury News Staff Writer Convicted hacker Kevin Poulsen is out of prison after five years, but he still can't touch a computer. Facing a court order to pay more than $57,000 in restitution for rigging a series of radio station call-in contests, Poulsen has complained that authorities won't let him use his only marketable skill -- programming. Instead, Poulsen said, he's doomed to work for minimum wage at a low-tech job for the next three years. Since his June release from prison -- after serving more time in jail than any other U.S. hacker -- the only work he's found is canvassing door-to-door for a liberal political action group. ....................... Poulsen now lives with his sister in the Los Angeles area, where he grew up in the 1970s and '80s. But he must remain under official supervision for three more years. And it galls him that authorities won't trust him with a keyboard or a mouse. U.S. District Judge Manuel Real has forbidden Poulsen to have any access to a computer without his probation officer's approval. That's a crippling restriction in a society so reliant on computer technology, Poulsen complained in a telephone interview, after a hearing last week during which the judge denied Poulsen's request to modify his terms of probation. To comply with those rules, Poulsen said, his parents had to put their home computer in storage when he stayed with them. He can't use an electronic card catalog at the public library. And he relies on friends to maintain his World Wide Web site. He even asked his probation officer if it was OK to drive because most cars contain microchips. ........................... Legal experts say there's a precedent for restricting a hacker's access to computers, just as paroled felons may be ordered not to possess burglary tools or firearms. Still, some say it's going too far. "There are so many benign things one can do with a computer," said Charles Marson, a former attorney for the American Civil Liberties Union who handles high-tech cases in private practice. "If it were a typewriter and he pulled some scam with it or wrote a threatening note, would you condition his probation on not using a typewriter?" ................ According to Schindler, the probation office now will consider Poulsen's requests to use computers "on a case by case basis." ------------------------------ Date: Fri, 27 Sep 1996 18:02:17 -0700 From: "Michael Bernard (IPTD)" <address@withheld.by.request> Subject: File 2--Microsoft response to David Smith/Web Browser Method ((MODERATORS' NOTE: By request, we removed Michael Bernard's mailing address, because the appropriate place for response is the homepage at: http://www.microsoft.com/ie/support/feedback/ )) In Article 5, Volume 8, Issue #66 of the Computer underground Digest, David Smith <bladex@bga.com> raised an issue about potentially misleading references to user preferences in our press announcement for Internet Explorer 3.0 (http://www.microsoft.com/corpinfo/press/1996/aug96/1MILLPR.htm). The press release stated that "four out of five users prefer Microsoft Internet Explorer to Netscape Navigator." It should have stated that "four out of five new Web users prefer Microsoft Internet Explorer to Netscape Navigator." We appreciate David pointing out the discrepancy and are revising such references to the study results. It is true that the subjects of the study (http://www.microsoft.com/ie/ie3/usability.htm) did not have any prior Web browser experience. As the study indicates: "The users had basic Windows 95 experience and understood Windows 95 concepts. All the users were individuals that had a strong interest in learning about and using the Internet but no prior experience with a web browser or the Internet. Users were not told who commissioned the study, and they were screened to ensure that they were not prejudiced toward either Microsoft or Netscape as a company." We felt that this was an appropriate way to conduct the survey. It provided an unbiased view of the browser product without the bias of prior use, experience, or existing preference. It would have been difficult to remove these biases if the study subjects had already been using a given browser (e.g. Navigator) for any length of time. As a test of first-time users, which the survey itself indicates, the results are solid. We regret any confusion that may have been caused by not indicating that the study was of new users in the August 19, 1996 Press Release. While it is too late for us to edit the Press Release, we are modifying any other references to the study results on our Web site to read ..."four out of five new Web users prefer Microsoft Internet Explorer to Netscape Navigator." Although the study results are valid for new users, we have been receiving strong evidence that experienced users also like Internet Explorer 3.0. (http://www.microsoft.com/ie/ie3/readeu.htm) Additionally, we have done extremely well in head-to-head comparisons by the press with Navigator 3.0. (http://www.microsoft.com/ie/ie3/read.htm) We appreciate this opportunity to clear up any confusion on what we genuinely feel to be an excellent product - Internet Explorer 3.0. We welcome any comments (http://www.microsoft.com/ie/support/feedback/), you have on our product and trust me - they get read! Michael Bernard Web Jamming with Internet Explorer 3.0 Product Manager, Microsoft Internet Platform and Tools Division ------------------------------ Date: Fri, 27 Sep 1996 00:15:43 -0400 (EDT) From: Voters Telecommunications Watch <shabbir@vtw.org> Subject: File 3--Netscape CEO Jim Barksdale signs the pro-crypto petition (fwd) From - Crypto News MORE NET LUMINARIES JOIN THOUSANDS IN SIGNING PRO-ENCRYPTION PETITION http://www.crypto.com/petition/ JUDICIARY HEARING ON HR 3011 (9/25/96) Date: September 25, 1996 URL:http://www.crypto.com/ crypto-news@panix.com If you redistribute this, please do so in its entirety, with the banner intact. ------------------------------------------------------------ Table of Contents Introduction Join Netscape CEO Jim Barksdale as he signs the pro-crypto petition! How to receive crypto-news Press contacts ---------------------------------------------------------- INTRODUCTION This is a busy last few days for Washington. In the midst of it all, the Judiciary committee held a hearing HR 3011, beginning the process of educating Congress for next year, and bringing in the Administration for a regular public drubbing about their antiquated encryption regulations. The very same day, WWW.Crypto.Com was honored to have Netscape CEO Jim Barksdale sign onto petition that supports legislation that would: -Relax export controls on encryption technology; -Prohibit the government from imposing "Key Escrow" solutions domestically; and -Recognize the importance of privacy and security for the future of electronic commerce, individual liberty, and the success of the Internet. Jim Barksdale is no stranger to the encryption debate. He testified at the July 25th hearing on the pro-encryption Pro-CODE bill (S1726). You can hear him in his own words by listening to the RealAudio transcript of the hearing cybercast at http://www.crypto.com/events/072596/ We'll be continuing the petition throughout the break and the election and use it next year to support the encryption legislation that will surely be introduced again. Be a part of it by signing the petition with Jim Barksdale at http://www.crypto.com/petition/ ! ------------------------------------------------------ JOIN NETSCAPE CEO JIM BARKSDALE IN FIGHTING FOR YOUR PRIVACY! The following petition can be signed onto at http://www.crypto.com/petition/ The Information Revolution is being held hostage by an outdated, Cold War-era U.S. encryption policy. Current U.S. export controls and other initiatives are slowing the widespread availability of strong encryption products, endangering the privacy and security of electronic communications, harming the competitiveness of U.S. businesses, and threatening the future of electronic commerce and the growth of the Global Information Infrastructure (GII). We the undersigned Internet users and concerned citizens strongly support Congressional efforts to address this critical issue. Bills are currently pending in both Houses of Congress which would: -Relax export controls on encryption technology; -Prohibit the government from imposing "Key Escrow" solutions domestically; and -Recognize the importance of privacy and security for the future of electronic commerce, individual liberty, and the success of the Internet. We urge Congress to act NOW to enact a U.S. encryption policy that promotes electronic privacy and security. Add your name to his at http://www.crypto.com/petition/ ! ------------------------------------------------------ HOW TO RECEIVE CRYPTO-NEWS To subscribe to crypto-news, sign up from our WWW page (http://www.crypto.com) or send mail to majordomo@panix.com with "subscribe crypto-news" in the body of the message. To unsubscribe, send a letter to majordomo@panix.com with "unsubscribe crypto-news" in the body. ------------------------------------------------------ PRESS CONTACT INFORMATION Press inquiries on Crypto-News should be directed to Shabbir J. Safdar (VTW) at +1.718.596.2851 or shabbir@vtw.org Jonah Seiger (CDT) at +1.202.637.9800 or jseiger@cdt.org ------------------------------ Date: Sat, 28 Sep 1996 17:38:59 +0100 From: Glenn Hauman <hauman@hks.net> Subject: File 4--Banned Books Week 9/28-10/5 Just a reminder: Banned Books Week is co-sponsored by the American Booksellers Foundation for Free Expression, the American Library Association, the Association of American Publishers, the American Society of Journalists and Authors, and the National Association of College Stores. As in the past, Banned Books Week is also endorsed by the Center for the Book of the Library of Congress. The battle against those who would remove materials from libraries, schools, and bookstores-- and now, the Internet-- continues, and in many areas has escalated. Through the participation of thousands of bookstores and libraries across the country, millions of Americans learn about the critical importance of free expression and of the perilous threats to First Amendment rights that exist in our country today. Banned Books Week draws attention to the danger that exits when restraints are imposed on the availability of information in a free society. The message goes beyond the freedom to choose and to express ones opinion; the message of Banned Books Week is the importance of ensuring the availability of viewpoints, even unorthodox or unpopular, to those who wish to read them. A large listing of banned books and their circumstances, along with additional links will be going up on http://www.bb.com shortly. Best-- Glenn Hauman, BiblioBytes http://www.bb.com/ ------------------------------ Date: Sat, 28 Sep 1996 01:03:29 -0500 (CDT) From: Crypt Newsletter <crypt@sun.soci.niu.edu> Subject: File 5--Computer Virus Hysteria/John McAfee Awards: plea for books Crypt Newsletter and Computer Virus Myths guru Rob Rosenberger have put their heads together to comb the media for computer virus stories that have contributed the most to computer virus misinformation and confusion in 1996. Once they've been compiled, we'll put them on display along with analyses of their impact and faults and throw the nominees open to Netizens for their votes on which are the best, or worst, depending on your point of view. Rob has puckishly named the contest the 1996 John McAfee Awards after the 1992 watershed event of Michelangelo hype that catapulted the anti-virus software developer to fame and fortune -- his former company to a dominant position in the anti-virus industry. But we want this to be an exercise in extending computer literacy and to that end we intend to give away some prizes -- namely books! Here's where you -- authors, publishers, the pure of heart and philanthropic -- come in. Contribute one book on computer security, computer viruses or reality and culture in cyberspace and we'll be forever in your debt. You'll get publicity when we mention your philanthropy and book during the nominations, voting and awards ceremony. Plus you'll have the satisfaction of knowing your book is going to be placed directly into the hands of someone in the media who needs it the most! To contribute a book, contact me or Rob Rosenberger. George Smith: crypt@sun.soci.niu.edu Rob Rosenberger: us@kumite.com In late October we'll publicize the nominees and the prizes so the voting can begin. Watch this space for further details. Computer Virus Myths http://www.us.kumite.com/myths Crypt Newsletter http://www.soci.niu.edu/~crypt ------------------------------ Date: Tue, 24 Sep 1996 17:42:39 -0700 (PDT) From: "Tariq KRIM <bronks@bok.net>" <bronks@bok.net> Subject: File 6--Jean_bernard_Condat PhD Musicologie ((MODERATORS' NOTE: Monday, CuD received a call from Mr. Tariq Krim, who is currently working in the Silicon Valley. Mr. Krim was upset with the following passage from CuD 8.67, File 5: Yesterday, I lost my job of senior consultant in the Smart Card Business Unit of Informix because Mr. Tariq Krim of the ENST in Paris don't hesitate to call all my chiefs with some kind words on my life. It appears that the above passage is less than accurate. And, while CuD cannot always identify forged messages, we do feel compelled to observe that the original post that Crypt Newsletter editor George Smith identified as plagiarized from him isn't normally the kind of forgeries that are sent, and the plagiarized post was consistent with similar posts from the same source that we published without complaint. Below is Mr. Krim's response to the allegation that he called "all my chiefs" that resulted in dismissal: ------------- Usually when I hear about Jean Bernard Condat we tell me bad things. I've heard that he claimed to be a computer hacker and specialist of telecommunications. A few years ago someone gave Condat a phone number and said "hack my machine if you can". Jean Bernard Condat spent 15 days trying. It was a Fax number ... Now he claims to be on the Internet since 81. Hopefully for the net he's around for a few years only and is forbidden on all the french BBS and french ISP. Now I've never seen Mister Condat personnaly. I don't want to keep contact with this person. I've just written this mail to tell all my friends and the CuD readers that the story he told is completely false. First: I don't know Condat. second: I don't know the people of Informix France. three: I don't know where he had my email four: Your are responsible for what you say on the Internet and lying is not a good thing as copying articles and books. five: defamation has legal issues that I could exploit if this story is not finished after this mail. six: be polite on phone and don't tell another story than the one published in CuD because it decreases your credibility ( if you still have some) And for the last time Jean Bernard Condat is a true Space "blaireau". Well all this to say that I don't have yet the power to fire people in a second, even people like JBC. I dont follow this guy 's life and technically what he said is impossible as I live in the US. (hey you didn't know that Mr Condat) I don't want to be better than Jean Bernard Condat, I dont want to be Jean Bernard Condat, and I dont want my name associate to this guy. never ever.... Any way Jim I want to tell you that this e-zine that I read for soon 6 years is still the reference for underground computers issues. "bonne continuation" ------------------------------ Date: Fri, 20 Sep 1996 12:11:24 -0400 From: Bob Palacios <editor@cdt.org> Subject: File 7--CDT Policy Post 2.32 - FBI Surveillance Demands Rejected on Privacy Grounds The Center for Democracy and Technology /____/ Volume 2, Number 32 ---------------------------------------------------------------------------- A briefing on public policy issues affecting civil liberties online ---------------------------------------------------------------------------- CDT POLICY POST Volume 2, Number 32 September 20, 1996 CONTENTS: (1) FBI Demands for Broad New Surveillance Power Rejected on Privacy Grounds (2) CDT Background Memo on the FBI Demands (3) How to Subscribe/Unsubscribe (4) About CDT, contacting us ** This document may be redistributed freely with this banner intact ** Excerpts may be re-posted with permission of <editor@cdt.org> ** This document looks best when viewed in COURIER font ** ----------------------------------------------------------------------------- (1) FBI Demands for Broad New Surveillance Power Rejected on Privacy Grounds A telecommunications industry standards body on Thursday voted to reject a demand by the FBI to create a national tracking system out of the wireless telephone network. CDT applauds this decision as a significant victory for privacy and condemns the FBI's blatant efforts to subvert the specific requirements of the Communications Assistance for Law Enforcement Act (CALEA, also known as "Digital Telephony"). "The FBI is demanding that every cell phone double as a tracking device, providing instant and continuous location information not just when a subject is talking but whenever a cellular phone is turned on. " said CDT Executive Director Jerry Berman. "The FBI is demanding real-time tracking of anyone suspected of committing a crime. This is a clear violation of the statute and the Fourth Amendment." Berman added At issue are technical standards currently being drafted to implement the 1994 law. The FBI, which holds an influential position within the industry standards process, has demanded that the wireless telephone network be designed in a way that would allow real time tracking of individuals suspected of a crime. Specifically, the FBI is demanding that wireless networks be designed to facilitate: