| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXVII / Part Four of Four PWN | |
| PWN PWN | |
| PWN Compiled by Dispater & Spirit Walker PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Computer Espionage: Can We Be Compromised By The Internet? December 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Extracted from Security Awareness Bulletin | |
| The advent of computer networks linking scientists and their research | |
| institutions vastly complicates any effort to identify Soviet scientific | |
| espionage. For example, foreign travel may become less important, as computers | |
| become more directly interconnected, allowing scientists anywhere in the world | |
| to talk to each other -- and, in some cases to access information in data bases | |
| at Western academic and defense-related institutions. | |
| This capability has been available for some time, but in 1989 the USSR took an | |
| important step toward increasing the breadth and availability of access, by | |
| applying (with Poland, Czechoslovakia, Hungary, and Bulgaria) to be connected | |
| to the European Academic Research Network (EARN). Approval of the application | |
| in April 1990 provided Soviet and East European users access far beyond simply | |
| a link to computers throughout Western Europe. Through EARN, the Soviets would | |
| be connected to Internet, a US network serving defense, research, and academic | |
| organizations worldwide. | |
| A number of threats are inherent in the trend toward computer linkage. The | |
| most obvious is the increased ease with which a Soviet can discuss professional | |
| matters with Westerners working on similar projects. A user also can put out a | |
| blanket request for information on any subject, and it may not always be | |
| obvious that the requestor is working for the USSR. In addition, the Soviet | |
| Academy of Sciences can use a computer network to issue general invitations to | |
| conferences -- in hopes that the responses will identify untapped research | |
| institutions or individual scientists that later can be targeted for specific | |
| information. | |
| Access to data in the computers connected to a network normally is controlled, | |
| so that specific files can be read only by authorized users. However, the | |
| Soviets have demonstrated that an innovative "hacker" connected to computers | |
| containing sensitive information can evade the access controls in order to read | |
| that information. In the "Hannover Hacker" case, for example, the Soviet | |
| intelligence services used West German computer experts to access US restricted | |
| data bases, obtaining both software and defense-related information. | |
| _______________________________________________________________________________ | |
| Waging War Against War Dialing November 27, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Edmund L. Andrews (New York Times) | |
| Special Thanks: Dark Overlord | |
| WASHINGTON -- Riding a wave of popular annoyance over telephone sales calls, | |
| Congress approved and sent to President Bush a bill that would ban the use of | |
| automated dialing devices that deliver pre-recorded messages to the home. The | |
| measure would also allow consumers to block calls from human sales-people by | |
| placing their names on a "do not call" list. | |
| The bill, which passed on voice votes in both the House and Senate, was | |
| supported by both Democrats and Republicans, some of whom have recounted their | |
| own aggravations with unsolicited sales calls. | |
| Although the White House has expressed concerns about what it views as | |
| unnecessary regulation, the President has not threatened to veto the bill. | |
| The measure, which combines provisions from several separate measures passed | |
| previously by both chambers of Congress, bans the use of autodialers for | |
| calling most individual homes. The few exceptions would be when a person has | |
| explicitly agreed to receive such a call or when the autodialer is being used | |
| to notify people of an emergency. | |
| When autodialers are used to call businesses, they would be prohibited from | |
| reaching more than two numbers at a single business. | |
| Many states have already passed laws that restrict autodialers, including about | |
| a dozen states that ban them altogether and about two dozen others that | |
| restrict their use in various ways. | |
| The state laws, however, do not stop a company from using an autodialer in an | |
| unregulated state to call homes in state with regulations. | |
| In an attempt to curb telemarketing by human sales representatives, the measure | |
| would instruct the Federal Communications Commission to either oversee the | |
| creation of a nationwide "do not call" list or issue rules ordering companies | |
| to maintain their own lists. | |
| The bill would allow people who placed their names on such a list to file suits | |
| is small claims courts against companies that persisted in calling. The suits | |
| could seek up to $500 for each unwanted call, up to a maximum of three calls | |
| >from a single company. | |
| Finally, the bill would ban unsolicited "junk fax" messages, which are | |
| advertisements transmitted to facsimile machines. | |
| "This is a victory for beleaguered consumers, who in this piece of legislation | |
| have their declaration of independence from junk faxes and junk calls," said | |
| Rep. Edward J. Markey, D-Mass., the measure's principal sponsor in the House. | |
| Companies that make or use autodialers glumly predicted that the measure would | |
| put them out of business and would hurt small advertisers the most. | |
| "I think it will put us out of business," said Mark Anderson, owner of the | |
| Leshoppe Corp., a New Orleans concern that uses about 160 machines for clients | |
| who sell everything from tanning products to health insurance. "What people | |
| don't understand is that a lot of mom-and-pop operations use electronic | |
| marketing, and use it successfully." | |
| Ray Kolker, president of Kolker Systems, the largest maker of autodialers, | |
| echoed those views. "Passage of this bill demonstrates that Congress just | |
| isn't as concerned about the economy as they think they are," he said. "This | |
| will destroy a multibillion-dollar business." | |
| Telemarketing has surged in recent years, as the cost of long-distance | |
| telephone service has plunged and as consumers have become deluged by floods of | |
| catalogues they do not read and envelopes they do not open. | |
| According to congressional estimates, the volume of goods and services sold | |
| through all forms of telephone marketing has increased from about $72 billion | |
| in 1982 to $435 billion in 1990. Over all, an estimated 300,000 people are | |
| employed in some facet of telephone marketing. | |
| Autodialers, which can each make about 1,500 calls a day, have become one of | |
| the most efficient but disliked forms of telemarketing. By one estimate, | |
| 20,000 autodialers are in operation at one time, with the capacity of making | |
| more than 20 million calls in a single day. | |
| During hearings on the issue earlier this year, Sen. Daniel K. Inouye, | |
| D-Hawaii, noted irritably that he had been summoned to the telephone only to | |
| hear a recorded sales message about winning a trip to Hawaii. | |
| The legislation was not opposed by all companies involved in telephone sales. | |
| Many marketing experts have long deplored the use of autodialers as a sales | |
| tool, arguing that they are counter-productive because they generate more | |
| irritation than sales interest. | |
| The Direct Marketing Association, a trade group, has expressed cautious support | |
| for the legislation and already maintains its own, voluntary "do not call" | |
| list. | |
| Beyond simply annoying people at home, the autodialers have been known to tie | |
| up telephone paging networks and the switchboards of hospitals and | |
| universities, and to call people on their cellular telephones. | |
| But it remains unclear how effective the "do not call" lists would be in | |
| practice, because the two options available to the FCC differ greatly. | |
| A national list maintained by the government would effectively protect | |
| consumers from all unwanted sales calls. But a requirement that each company | |
| maintain its own list would be much more limited, because people might have to | |
| call each company to be placed on its individual list. | |
| Congressional aides noted that the measure passed Wednesday strongly implied | |
| that the FCC should set up its own list, because it provides two pages of | |
| detail on just how such a list should be created. | |
| _______________________________________________________________________________ | |
| Foreign Guests Learn America Is Land Of The Free December 2, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Excerpted from the Orlando Sentinel | |
| "Merry Christmas From BellSouth!" | |
| A telephone computer glitch gave dozens of foreign travelers at downtown | |
| Orlando hotel early Christmas presents Saturday and Sunday. | |
| The giving began when a guest at the Plantation Manor, an international youth | |
| hotel across from Lake Eola, discovered that pay phones were allowing free | |
| long-distance calls to virtually anywhere in the world. | |
| As the news spread, the four public phones, which are normally deserted at the | |
| hotel, were busy non-stop until Sunday afternoon,when Southern Bell discovered | |
| the problem and dispatched technicians to shut off long-distance service. | |
| Roger Swain, a clerk at Plantation Manor, said the discovery was made by | |
| accident. | |
| "One of our guests said he tried to call Houston, Texas, from the second | |
| floor," Swain said. The operator told him he didn't need to use coins because | |
| the phone was not listed as a public phone. He was on the phone for 40 | |
| minutes, and they didn't charge him.' | |
| A spokesman for AT&T, which handles long distance for some of Southern Bell's | |
| phones, said the problem seemed to be with a Southern Bell computer. | |
| "Our equipment is working fine," said Randy Berridge, AT&T spokesman. "If it's | |
| a Southern Bell problem, they would bear the costs.' | |
| It's possible Southern Bell recouped some money: It still cost 25 cents for a | |
| local call. | |
| "This is a drop in the ocean to them," one English traveler said of the phone | |
| company, which had just covered the cost of his call home at the Sunday rate of | |
| $21.74 for each half hour." | |
| _______________________________________________________________________________ | |
| 8th Chaos Computer Congress December 27-29, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Klaus Brunnstein | |
| Special Thanks: Terra of CCC | |
| On occasion of the 10th anniversary of its foundation, Chaos Computer Club | |
| (CCC) organized its 8th Congress in Hamburg. To more than 400 participants | |
| (largest participation ever, with growing number of students rather than | |
| teen-age scholars), a rich diversity of PC and network related themes was | |
| offered, with significantly less sessions than before devoted to critical | |
| themes, such as phreaking, hacking or malware construction. Changes in the | |
| European hacker scene became evident as only few people from Netherlands | |
| (e.g. Hack-Tic) and Italy had come to this former hackers' Mecca. | |
| Consequently, Congress news are only documented in German. As CCC's founding | |
| members develop in age and experience, reflection of CCC's role and growing | |
| diversity of opinions indicates that teen-age CCC may produce less spectacular | |
| events than ever before. | |
| This year's dominating theme covered presentations of communication techniques | |
| for PCs, Ataris, Amigas and Unix, the development of a local net as well as | |
| description of regional and international networks, including a survey. In | |
| comparison, CCC '90 documents are more detailed on architectures while sessions | |
| and demonstrations in CCC '91 (in "Hacker Center" and other rooms) were more | |
| concerned with practical navigation in such nets. | |
| Phreaking was covered by the Dutch group HACK-TIC which updated its CCC '90 | |
| presentation of how to "minimize expenditures for telephone conversations" by | |
| using blue boxes and red boxes, and describing available software and recent | |
| events. Detailed information on phreaking methods in specific countries and | |
| bugs in some telecom systems were discussed. More information (in Dutch) was | |
| available, including charts of electronic circuits, in several volumes of Dutch | |
| "HACKTIC: Tidschrift voor Techno-Anarchisten" (news for techno-anarchists). | |
| Remark #1: Recent events (e.g. "Gulf hacks") and material presented on Chaos | |
| Congress '91 indicate that the Netherlands emerges as a new | |
| European center of malicious attacks on systems and networks. | |
| Among other potentially harmful information, HACKTIC #14/15 | |
| publishes code of computer viruses (a BAT-virus which does not work | |
| properly. | |
| Remark #2: While few Netherland universities devote research and teaching to | |
| security, Delft university at least offers introductory courses | |
| into data protection. | |
| Different from recent years, a seminar on Computer viruses (presented by Morton | |
| Swimmer of Virus Test Center, University of Hamburg) as deliberately devoted to | |
| disseminate non-destructive information (avoiding any presentation of virus | |
| programming). A survey of legal aspects of inadequate software quality | |
| (including viruses and program errors) was presented by lawyer Freiherr von | |
| Gravenreuth. | |
| Some public attention was drawn to the fact that the "city-call" telephone | |
| system radio-transmits information essentially as ASCII. A demonstration | |
| proved that such transmitted texts may easily be intercepted, analyzed and | |
| even manipulated on a PC. CCC publicly warned that "profiles" of such texts | |
| (and those addressed) may easily be collected, and asked Telecom to inform | |
| users about this insecurity; German Telecom did not follow this advice. | |
| Besides discussions of emerging voice mailboxes, an interesting session | |
| presented a C64-based chipcard analysis systems. Two students have built a | |
| simple mechanism to analyze (from systematic IO analysis) the protocol of a | |
| German telephone card communicating with the public telephone box; they | |
| described, in some detail (including an electronmicroscopic photo) the | |
| architecture and the system behavior, including 100 bytes of communication | |
| data stored in a central German Telecom computer. Asked for legal implications | |
| of their work, they argued that they just wanted to understand this technology, | |
| and they were not aware of any legal constraint. They have not analyzed | |
| possibilities to reload the telephone account (which is generally possible, | |
| due to the architecture), and they did not analyze architectures or procedures | |
| of other chipcards (bank cards etc). | |
| Following CCC's (10-year old charter), essential discussions were devoted to | |
| social themes. The "Feminine computer handling" workshop deliberately | |
| excluded men (about 25 women participating), to avoid last year's experience | |
| of male dominance in related discussions. A session (mainly attended by | |
| informatics students) was devoted to "Informatics and Ethics", introducing the | |
| international state-of-discussion, and discussing the value of professional | |
| standards in the German case. | |
| A discussion about "techno-terrorism" became somewhat symptomatic for CCC's | |
| actual state. While external participants (von Gravenreuth, Brunnstein) | |
| were invited to this theme, CCC-internal controversies presented the panel | |
| discussion under the technical title "definition questions". While one | |
| fraction wanted to discuss possibilities, examples and dangers of techno- | |
| terrorism openly, others (CCC "ol'man" Wau Holland) wanted to generally define | |
| "terrorism" somehow academically, and some undertook to describe "government | |
| repression" as some sort of terrorism. In the controversial debate, a few | |
| examples of technoterrorism (WANK worm, development of virus techniques for | |
| economic competition and warfare) were given. | |
| _______________________________________________________________________________ | |
| Another AT&T 800-Number Outage December 16, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Dana Blankenhorn (Newsbytes) | |
| BASKING RIDGE, NEW JERSEY -- AT&T suffered another embarrassing outage on its | |
| toll-free "800" number lines over the weekend, right in the middle of the | |
| Christmas catalog shopping season. | |
| Andrew Myers, an AT&T spokesman, said the problem hit at 7:20 PM on December 13 | |
| as technicians loaded new software into computers in Alabama, Georgia, and New | |
| York. The software identifies and transfers 800 calls, he said. A total of | |
| 1.8 million calls originating in parts of the eastern U.S. were impacted, the | |
| company said. | |
| Service was restored after about one hour when technicians "backed off" the | |
| patch and went back to using the old software. Programmers are now working on | |
| the software, trying to stamp out the bugs before it's reloaded. "Obviously we | |
| don't like it when a single call doesn't get through, but I wouldn't consider | |
| this a serious problem," Myers said. The problem was reported to the Federal | |
| Communications Commission over the weekend, and to the press the next day. | |
| The latest problem continues a disturbing trend of AT&T service outages in the | |
| Northeast. Worse, all the problems have had different causes -- power | |
| problems, switch software problems, and cable cuts caused previous outages. | |
| _______________________________________________________________________________ | |
| US Congress Sets Up BBS For Whistle Blowers December 16, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Dana Blankenhorn (Newsbytes) | |
| WASHINGTON, D.C. -- U.S. Congressman Bob Wise and his House Government | |
| Operations subcommittee on government information, justice and agriculture have | |
| opened a bulletin board service for government whistle-blowers. | |
| Wise himself is the system operator, or sysop, of the new board. Newsbytes | |
| contacted the board and found it accepts parameters of 8 bit words, no parity, | |
| and 1 stop bit, known as 8-N-1 in the trade, and will take calls from a | |
| standard 2400 bit/second Hayes- compatible modem. | |
| Whistle-blowers are employees who tell investigators about wrong- doing at | |
| their companies or agencies, or "blow the whistle" on wrong-doing. Wise said | |
| that pseudonyms will be accepted on the BBS -- most private systems demand | |
| real names so as to avoid infiltration by computer crackers or other abusive | |
| users. Passwords will keep other users from reading return messages from the | |
| subcommittee, Wise added. The committee will check the board daily and get | |
| back to callers about their charges. The board is using RBBS software, a | |
| "freeware" package available without license fee. | |
| The executive branch of the U.S. government uses a system of inspectors | |
| general to police its offices, most of whom have telephone hotlines for | |
| whistle-blowers and accept mail as well. But the inspectors expect whistle- | |
| blowers to collect evidence at work, which could get them in trouble. And | |
| efforts to contact the whistle-blower by an inspector general representative | |
| can identify them to wrongdoers. Theoretically, calls from Congressional | |
| staffers will be seen by the bad guys as typical annoying oversight calls. | |
| Press Contact: Rep. Bob Wise | |
| 202-224-3121 | |
| 202-225-5527 BBS | |
| _______________________________________________________________________________ | |
| NIST Extends Review Deadline for Digital Signature December 16, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By John McCormick (Newsbytes) | |
| WASHINGTON, DC -- NIST, the National Institute of Standards and Technology | |
| (formerly the Bureau of Standards) has taken the unusual step of extending the | |
| review period for the controversial digital signature standard which the agency | |
| proposed at the end of August. | |
| The normal 90-day comment period would already have ended, but the NIST has | |
| extended that deadline until the end of February - some say because the agency | |
| wishes to tighten the standard. | |
| NIST spokespersons deny that there was any need to modify the proposed standard | |
| to increase its level of security, but James Bidzos, whose RSA Data Security | |
| markets a rival standard, says that the NIST's ElGamal algorithm is too weak | |
| and is being promoted by the government because the National Security Agency | |
| feels that it can easily break the code when necessary. | |
| The new standard is not a way of encrypting messages themselves; that is | |
| covered by the existing DES or Data Encryption Standard. Rather, the DSS or | |
| Digital Signature Standard is the method used to verify the "signature" of the | |
| person sending the message, i.e., to make certain that the message, which | |
| might be an order to transfer money or some other important item, is really | |
| >from the person who is authorized to send such instructions. | |
| As Newsbytes reported back in July, the NSA and NIS had been charged with | |
| developing a security system nearly four years ago. The recently announced | |
| ElGamal algorithm was previously due to be released last fall, and in the | |
| meantime the RSA encryption scheme has become quite popular. | |
| At that time, NIST's deputy director, Raymond G. Kammer, told the Technology | |
| and Competitiveness Subcommittee of the House (U.S. House of Representatives) | |
| Science, Space and Technology Committee that the ElGamal encryption scheme, | |
| patented by the federal government, was chosen because it would save federal | |
| agencies money over the private RSA encryption and signature verification | |
| scheme. | |
| Interestingly enough, the only company that currently markets an ElGamal DS | |
| system is Information Security Corp., 1141 Lake Cook Rd., Ste. D, Deerfield, | |
| IL 60015, a company that fought and won a bitter court battle with RSA over | |
| the right to market RSA-based encryption software to the federal government. | |
| That was possible because RSA was developed at MIT by mathematicians working | |
| under federal grants. | |
| ISC's $249.95 Secret Agent, which uses the ElGamal algorithm, was released at | |
| last year's Federal Office Systems Expo in Washington. ElGamal is a public key | |
| system that can be used just like the RSA system but differs from it in | |
| significant theoretical ways. | |
| ISC's CEO and president, Thomas J. Venn, has told Newsbytes that the ElGamal | |
| system is highly secure, but the ElGamal algorithm is quite different from | |
| that of the RSA system, deriving its security from the difficulty of computing | |
| discrete logarithms, in finite field, instead of using RSA's very different | |
| method of factoring the products of two prime numbers. | |
| RSA has fought back by posting a prize for anyone who can crack the RSA scheme. | |
| To take a stab at it, send a self-addressed stamped envelope to RSA Data | |
| Security, Inc., 10 Twin Dolphin Dr., Redwood City, CA 94065, for the RSA list | |
| and the rules. Those with access to Internet e-mail can send a request to | |
| challenge-info@rsa.com. | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~~ | |
| 1. Computer bulletin boards aren't just for dweeby cyberpunks anymore -- at | |
| least not in San Francisco. Entrepreneur Wayne Gregori has created SF Net, | |
| a decidedly socialble computer network that links up patrons of the city's | |
| dangerously hip cafe's. From the Lower Haight to south of Market Street, | |
| high-tech trendies are interfacing over cappuccino. All you have to do is | |
| buy a ticket from the cafe>, enter a number into an on-site computer and | |
| begin your techno-chat at $1 per 15 minutes. The next Gregori test site is | |
| Seattle, Washington. (Newsweek, December 2, 1991) | |
| _______________________________________________________________________________ | |
| 2. The (November 29, 1991 issue of) San Jose Mercury News reported that the | |
| San Mateo, California 911 system was brought to it's knees because of a | |
| prank <but not by any computer hacker or phone phreak>. | |
| It seems that a disc jockey at KSOL decided to play a recent MC Hammer | |
| record over and over and over... as a prank. Listeners were concerned that | |
| something had happened to the personnel at the station, so they called 911 | |
| (and the police department business line). It seems that a few hundred | |
| calls in forty five minutes or an hour was enough to jam up the system. | |
| There was no report in the newspaper of any deaths or injuries to the | |
| overloaded system. | |
| The DJ didn't want to stop playing the record (claiming First Amendment | |
| rights), but did insert an announcement to not call the police. | |
| _____________________________________________________________________________ | |
| 3. Jean Paul Barrett, a convict serving 33 years for forgery and fraud in the | |
| Pima County jail in Tuscon, Arizona, was released on December 13, 1991 | |
| after receipt of a forged fax ordering his release. It appears that a copy | |
| of a legitimate release order was altered to bear HIS name. Apparently no | |
| one noticed that the faxed document lacked an originating phone number or | |
| that there was no "formal" cover sheet. The "error" was discovered when | |
| Barrett failed to show up for a court hearing. | |
| The jail releases about 60 people each day, and faxes have become standard | |
| procedure. Sheriff's Sergeant Rick Kastigar said "procedures are being | |
| changed so the error will not occur again." (San Francisco Chronicle, | |
| December 18, 1991, Page A3) | |
| _______________________________________________________________________________ | |
| 4. AT&T will boosted it's rates on direct-dial, out-of-state calls on January | |
| 2, 1992. The increase, to affect weekday and evening calls, would add | |
| about 8 cents to the average monthly long-distance bill of $17 and about | |
| $60 million to AT&T'd annual revenue. (USA Today, December 23, 1991, Page | |
| B1) | |
| _______________________________________________________________________________ | |
| 5. The following was in the AT&T shareholders quarterly, and is submitted not | |
| as a commercial solicitation but because somebody might be interested. | |
| A colorful 22-by-28-inch poster that traces the development of the | |
| telephone from Bell's first model to the latest high-technology feature | |
| phone can be purchased for $12. To order, send a check to Poster, AT&T | |
| Archives, WV A102, 5 Reinman Road, Warren, NJ 07059-0647. | |
| (Telephone 908-756-1590.)" | |
| (Special Thanks: The Tone Surfer) | |
| _______________________________________________________________________________ | |
| 6. Word has it that the normal toll-free number blue-box is now DEAD in | |
| Norway. According to some information received by Phrack, the toll-free | |
| numbers got switched onto the regular phone network in the United States, | |
| which you can't phreak the same way. (Special Thanks: Nosferatu) | |
| _______________________________________________________________________________ | |
| 7. In case you've been trying to call Blitzkreig BBS and been unable to | |
| connect with it, Predat0r is moving his board into the basement. He | |
| said the board would be back up as of February 1st. He also said that | |
| master copy of TAP #106 is finished, but he is a year behind on updating | |
| his mailing list. Predat0r said that making the copies was no problem but | |
| that with the influx of subscribers he was going to have to enlist local | |
| help to get the database updated. He also said that if someone paid for | |
| ten issues they will get ten issues. (Special Thanks: Roy the Tarantula) | |
| _______________________________________________________________________________ | |
| 8. There is a new science fiction book about called "Fallen Angels" by Larry | |
| Niven. The basis for the book is this: The United States government has | |
| been taken over by religious fanatics and militant environmentalists. | |
| Soon the United States is an Anti-Technological police state. Two | |
| astronauts are shot down over the United States and are on the run. They | |
| are on the run from various government agencies such as the (Secret | |
| Service like) Environmental Protection Agency. Nivin's wild imagination | |
| provides for a great deal of humor as well as some things that are not | |
| funny at all, due to the fact that they hit just a little to close to home. | |
| The story also mentions the Legion of Doom and The Steve Jackson Games | |
| raids. In the "acknowledgments" section at the rear of the book the author | |
| has this to say, "As to the society portrayed here, of course much of it is | |
| satirical. Alas, many of the incidents --- such as the Steve Jackson case | |
| in which a business was searched by Secret Service Agents displaying an | |
| unsigned search warrant --- are quite real. So are many of the anti- | |
| technological arguments given in the book. There really is an anti- | |
| intellectual on-campus movement to denounce 'materialistic science' in | |
| favor of something considerably more 'cold and unforgiving.' So watch it." | |
| (Special Thanks: The Mad Alchemist) | |
| _______________________________________________________________________________ | |
| 9. Bell Atlantic Shoots Themselves in the Foot (February 5, 1992) -- Newsbytes | |
| reports that Bell Atlantic admits having funded an advocacy group "Small | |
| Businesses for Advertising Choice" to oppose HR 3515, a bill regulating | |
| the RBOCs' entry into info services. Tennessee Democrat Jim Cooper, the | |
| sponsor, called it a "clumsy Astroturf campaign," meaning fake grass roots. | |
| Republican co-sponsor Dan Schaeffer was a target of a similar campaign by US | |
| West, in which telephone company employees were encouraged to call their | |
| representatives on company time to oppose the measure. | |
| The bill is HR 3515. To get a copy, call the House Documents Room at | |
| (202)225 3456 and ask for a copy. It's free (more accurately, you have | |
| already paid for it). | |
| _______________________________________________________________________________ | |
| 10. Computer Hackers Get Into Private Credit Records (Columbus Dispatch, | |
| February 24, 1992) -- DAYTON - Computer hackers obtained confidential | |
| credit reports of Midwest consumers from a credit reporting firm in | |
| Atlanta. Atlanta-based Equifax said a ring of 30 hackers in Dayton [Ohio] | |
| stole credit card numbers and bill-paying histories of the consumers by | |
| using an Equifax customer's password. | |
| Ronald J. Horst, security consultant for the company said the break-in | |
| apparently began in January. Police don't know if the password was stolen | |
| or if an employee of the client company cooperated with the hackers. Horst | |
| said the hackers were apparently doing it just for fun. No charges have | |
| been filed. Equifax will notify customers whose credit reports were taken. | |
| _______________________________________________________________________________ | |
| 11. Fingerprints And Connected Databases (Summary of an article by Stephen | |
| Schwartz, San Francisco Chronicle, February 22, 1992, Page A16) -- A | |
| fingerprint found in an unsolved 1984 murder of an 84-year-old woman was | |
| kept in the San Francisco police database all these years. Recently the | |
| San Francisco fingerprint database was linked with the Alameda County | |
| fingerprint database. The old print matched a new one taken in connection | |
| with a petty theft case, and so eight years later the police were able to | |
| solve the old case (burglary, arson, homicide). The two girls implicated | |
| were 12 and 15 at the time. (Special Thanks: Peter G. Neumann of RISKS) | |