| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 13 of 28 | |
| **************************************************************************** | |
| The 10th Chaos Computer Congress | |
| by Manny E. Farber | |
| Armed only with an invitation in English addressed to the "global | |
| community" and a small pile of German Marks, I arrived at the | |
| Eidelstedter Buergerhaus about an hour or so before the beginning of | |
| the 10th Chaos Communication Congress (subtitled "Ten years after | |
| Orwell"), sponsored by the (in)famous Chaos Computer Club. The | |
| Buergerhaus (literally, "citizen's house") turned out to be a modest | |
| community hall; needless to say, not all invited showed up. The | |
| Congress took place between the 27th and the 29th of December. As the | |
| title implies, social as well as technical issues were on the docket. | |
| After forking over 30 DM (about $20) for a pass for the first two | |
| days of the Congress, I sort of felt like asking for a schedule, but | |
| refrained, thinking that asking for scheduled chaos might seem a bit | |
| odd. I went to the cafeteria for breakfast. An organizer started out | |
| announcing, "Anyone who wants to eat breakfast pays 5 Marks, and gets a | |
| stamp, which--no, rather, anyone who wants breakfast pays 5 Marks and | |
| eats breakfast." | |
| The atmosphere was quite collegial and informal, with little more | |
| order than was absolutely necessary. The approximately 150 attendees | |
| were predominantly German (a few from Switzerland and Holland, at least | |
| -- and probably only -- one from the United States, namely myself), | |
| male, and technically oriented. (During an explanation of the | |
| mathematical algorithm underlying electronic cash, a non-techie | |
| objected, "But I don't want to have to think up a 200-digit random | |
| number every time I buy something!" It was explained to him that this | |
| was done by software in the chip-card ...). | |
| Although not mentioned in the invitation, not a word of English was to | |
| be heard; all the events were conducted in German. Some were conducted | |
| in a "talk show" format, with a host asking questions, simplifying | |
| answers, making jokes. A television network carried the video from the | |
| auditorium to other rooms throughout the building (albeit without | |
| sound) along with up-to-the-minute event schedules. | |
| The tone of the discussions of how electronic cash could be | |
| embezzled, or chip cards abused, digital signatures forged, etc., was | |
| constructive rather than destructive. And it was balanced, i.e. not | |
| only "how could a malicious individual embezzle money?" was discussed, | |
| but also "how could the government use chip cards to reduce people's | |
| privacy?" Here, the "hackers" were hackers in the positive sense of | |
| understanding a technology, not in the negative sense of wreaking | |
| havoc. It was, however, noted that trying out a potential weakness of | |
| the "EuroScheck" cash cards was quite easy: it would require buying a | |
| card reader for 1,500 DM and maybe a week of time. | |
| The question of technical solutions to "big brother" did come up in | |
| the presentations about chip cards. The danger is that a pile of cards | |
| is eliminated in favor of a card containing someone's driver's license, | |
| driving record (maybe), employee information, credit information, etc. | |
| etc. A chip card could theoretically be programed to give out *only* | |
| the information absolutely necessary, e.g. telling a policeman only | |
| that someone is allowed to drive, without disclosing his identity. | |
| The "Hackzentrum" (Hacking Center) turned out to be a room filled | |
| with networked computers and people hacking on them. It seemed mostly | |
| harmless. (I nevertheless did not try a remote login -- I had no | |
| reason to doubt good intentions, but on the other hand, who knows who | |
| wrote or replaced the keyboard driver and what sort of supplemental | |
| functionality it might have?) The packet radio room had a "Digi" | |
| repeating station and, true to the ham radio tradition, where the | |
| conversation centers on who is talking to whom and how well they hear | |
| each other and on what other frequency they might hear each other | |
| better, the computers attached were mostly displaying maps of the | |
| packet radio network itself. I didn't delve very deeply into the | |
| "Chaos Archive," but noticed a collection of maintenance sheets for | |
| telephone equipment among CCC newsletters and other paraphenalia. | |
| Some "signs of the Congress": | |
| - Bumper sticker: "I (heart) your computer" | |
| - Telephone stickers: "Achtung, Abhoergefahr" ("Attention, | |
| Eavesdropping danger"; and the German PTT logo transformed into a | |
| pirate insignia, with the words "Telefun - Mobilpunk" (derived from | |
| "Telefon - Mobilfunk") | |
| - T-shirt: "Watching them (eye-ball) watching us" | |
| - Post-It Note pad (for sale for DM 1.50): a pad of about 50, | |
| pre-printed with a hand-written note: "Vorsicht, Stoerung. | |
| Automat macht Karte ungueltig" ("Careful--Defect. Machine makes | |
| card invalid") | |
| - Word coinage: "Gopher-space" | |
| - Stamp: "ORIGINALE KOPIE" ("ORIGINAL COPY") | |
| The press were told not to take pictures of anyone without their | |
| explicit permission. | |
| Schedules were distributed throughout the Congress. By the evening | |
| of the 27th, a schedule for the 28th, "Fahrplan 28.12 Version 2.0," was | |
| already available ("Fahrplan" means a bus/train schedule; this is | |
| presumably an "in" joke). By 17:30 on the 28th, "Fahrplan 28.12 | |
| Version 2.7" was being distributed. (I missed most of the intervening | |
| versions; presumably they were neatly filed away in the Chaos Archive | |
| by then ...) | |
| The scheduled events (in translation) were as follows; a "*" means | |
| that I have included some comments later in this report: | |
| December 27, 1993 | |
| - Welcoming/opening | |
| - How does a computer work? | |
| - ISDN: Everything over one network | |
| - Internet and multimedia applications: MIME/Mosaik/Gopher | |
| - Data transport for beginners | |
| - Chip-cards: Technology | |
| * Media and information structures: How much truth remains? Direct | |
| democracy: information needs of the citizen | |
| - Encryption for beginners, the practical application of PGP | |
| * Alternative networks: ZAMIRNET, APS+Hacktic, Green-Net, Knoopunt, | |
| Z-Netz and CL | |
| December 28, 1993 | |
| - Encryption: Principles, Systems, and Visions | |
| - Modacom "wireless modem" | |
| - Electronic Cash | |
| - Bulletin board protocols: Functional comparison and social form, with the | |
| example of citizen participation | |
| - Discussion with journalist Eva Weber | |
| - Net groups for students, Jan Ulbrich, DFN | |
| * What's left after the eavesdropping attack? Forbidding encryption? | |
| Panel: Mitglied des Bundestags (Member of Parliament) Peter Paterna, | |
| Datenschutz Beauftragter Hamburg (Data privacy official) Peter Schar, | |
| a journalist from Die Zeit, a representative from the German PTT, a | |
| student writing a book about related issues, and a few members of the | |
| Chaos Computer Club | |
| - Cyber Bla: Info-cram | |
| * How does an intelligence service work? Training videos from the | |
| "Stasi" Ministrium fuer STAatsSIcherheit (Ministry for National Security) | |
| - System theory and Info-policies with Thomas Barth | |
| - Science Fiction video session: Krieg der Eispiraten | |
| ("War of the ice pirates") | |
| December 29, 1993 | |
| - Thoughts about organization ("Urheben") | |
| - Computer recycling | |
| - Dumbness in the nets: Electronic warfare | |
| - Lockpicking: About opening locks | |
| - The Arbeitsgemeinschaft freier Mailboxen introduces itself | |
| - In year 10 after Orwell ... Visions of the hacker scene | |
| ------------------------------------------------------------------------------- | |
| THE EAVESDROPING ATTACK | |
| This has to do with a proposed law making its way through the German | |
| Parliament. The invitation describes this as "a proposed law reform | |
| allowing state authorities to listen in, even in private rooms, in | |
| order to fight organized crime." This session was the centerpiece of | |
| the Congress. Bayerische Rundfunk, the Bavarian sender, sent a | |
| reporter (or at least a big microphone with their logo on it). The | |
| panel consisted of: | |
| MdB - Mitglied des Bundestags (Member of Parliament) Peter Paterna | |
| DsB - Datenschutz Beauftragter Hamburg (Data privacy official) Peter Schar | |
| Journalist - from Die Zeit | |
| PTT - a representative from the German PTT | |
| Student - writing a book about related issues | |
| CCC - a few members of the Chaos Computer Club | |
| My notes are significantly less than a word-for-word transcript. In | |
| the following, I have not only excerpted and translated, but | |
| reorganized comments to make the threads easier to follow. | |
| IS IT JUSTIFIED? | |
| MdB - There is massive concern ("Beunruhigung") in Germany: 7 million | |
| crimes last year. Using the US as comparison for effectiveness of | |
| eavesdroping, it's only applicable in about 10-20 cases: this has | |
| nothing to do with the 7 million. The congress is nevertheless | |
| reacting to the 7 million, not to the specifics. In principle, I am | |
| opposed and have concerns about opening a Pandora's box. | |
| CCC #1 - The 7 million crimes does not surprise me in the least. I am | |
| convinced that there is a clear relationship between the number of laws | |
| and the number of crimes. When you make more laws, you have more | |
| crimes. Every second action in this country is illegal. | |
| Journalist - Laws/crimes correlation is an over-simplification. There | |
| are more murders, even though there are no more laws against it. | |
| MdB - There is a conflict between internal security, protecting the | |
| constitution, and civil rights. How dangerous is 6 billion Marks of | |
| washed drug money to the nation? Taking the US as an example, the | |
| corrosion may have gone so far that it's too late to undo it. I hope | |
| that this point hasn't been reached yet in Germany. | |
| DsB - I am worried about a slippery slope. There is a tradeoff between | |
| freedom and security, and this is the wrong place to make it; other | |
| more effective measures aren't being taken up. | |
| EFFECTIVENESS OF CONTROLS ON EAVESDROPING | |
| MdB - Supposedly federal controls are effective. Although there are | |
| very few eavesdroping cases, even if you look at those that are | |
| court-approved, it's increasing exponentially. No proper brakes are | |
| built into the system. As for controls for eavesdroping by the | |
| intelligence service, there is a committee of three members of | |
| parliament, to whom all cases must be presented. They have final say, | |
| and I know one of the three, and have relatively much trust in him. | |
| They are also allowed to go into any PTT facility anytime, unannounced, | |
| to see whether or not something is being tapped or not. | |
| MdB - Policies for eavesdroping: if no trace of an applicable | |
| conversation is heard within the first "n" minutes, they must terminate | |
| the eavesdroping [...] The question is, at which point the most | |
| effective brakes and regulations should be applied: in the | |
| constitution? in the practice? | |
| PTT - True, but often the actual words spoken is not important, rather | |
| who spoke with whom, and when. | |
| DsB - There is no catalog for crimes, saying what measures can be | |
| applied in investigating which crimes. It's quite possible to use them | |
| for simple crimes, e.g. speeding. There is no law saying that the PTT | |
| *has to* store data; they *may*. They can choose technical and | |
| organizational solutions that don't require it. | |
| MdB - This is a valid point, I don't waive responsibility for such | |
| details. The PTT could be required to wipe out detailed information as | |
| soon as it is no longer needed, e.g. after the customer has been billed | |
| for a call. | |
| TECHNICAL TRENDS | |
| Journalist - Digital network techniques make it easy to keep trails, | |
| and there is an electronic trail produced as waste product, which can | |
| be used for billing as well as for other purposes. Load measurements | |
| are allowable, but it can also be used for tracking movements. | |
| DsB - The PTT claims they need detailed network data to better plan the | |
| network. The government says they need details in order to be able to | |
| govern us better. | |
| DsB - In the past, the trend has always been to increasingly | |
| identificable phone cards. There is economic pressure on the customer | |
| to use a billing card instead of a cash card, since a telephone unit | |
| costs less. With "picocells," your movement profile is getting more | |
| and more visible. | |
| PTT - As for the trend towards less-anonymous billing-cards: with the | |
| new ISDN networks, this is necessary. Billing is a major cost, and | |
| this is just a technical priority. | |
| Student - As for techniques to reduce potential for eavesdroping, it | |
| is for example technically possible to address a mobile phone without | |
| the network operator needing to know its position. Why aren't such | |
| things being pursued? | |
| PTT - UMTS is quite preliminary and not necessarily economically | |
| feasible. [Comments about debit cards]. We have more interest in | |
| customer trust than anything else. But when something is according to | |
| the law, we have no option other than to carry it out. But we don't do | |
| it gladly. | |
| THE BIG CONSPIRACY? | |
| CCC #2 - I don't give a shit about these phone conversations being | |
| overheard. I want to know why there is such a big controversy. Who | |
| wants what? Why is this so important? Why so much effort? Why are so | |
| many Mafia films being shown on TV when the eavesdroping law is being | |
| discussed? What's up? Why, and who are the people? | |
| Student - I am writing a book about this, and I haven't figured this | |
| out myself. My best theory: there are some politicians who have lost | |
| their detailed outlook ("Feinbild"), and they should be done away with | |
| ("abgeschaffen"). | |
| PTT - We're in a difficult position, with immense investments needed to | |
| be able to overhear phone conversations [in digital networks (?)]. We | |
| have no interest in a cover-up. | |
| MdB - As for the earlier question about what NATO countries may do. | |
| During the occupation of Berlin, they did want they wanted on the | |
| networks. In western Germany, it has always been debated. Funny | |
| business has never been proved, nor has suspicion been cleared up. | |
| CCC #2 - After further thought, I have another theory. American | |
| companies are interested in spying on German companies in order to get | |
| a jump on their product offerings. | |
| MdB - That's clear, but there are more benign explanations. Government | |
| offices tend towards creating work. Individuals are promoted if their | |
| offices expand, and they look for new fields to be busy in. In Bonn, | |
| we've gone from 4,000 people to 24,000 since the 50's. | |
| CCC #1 (to MdB) - Honestly, I don't see why you people in Bonn are | |
| anything other than one of these impenetrable bureaucracies like you | |
| described, inaccessible, out of touch with reality, and interested only | |
| in justifying their own existence. | |
| MdB - Well, *my* federal government isn't that. | |
| CLIPPER CHIP CONTROVERSY | |
| Student - Observation/concern: in the US, AT&T's encryption system is | |
| cheap and weak. If this becomes a de facto standard, it is much harder | |
| to introduce a better one later. | |
| Journalist - In the US, the Clipper chip controversy has centered more | |
| on the lost business opportunities for encryption technology, not on | |
| principles. There every suggestion for forbidding encryption has | |
| encountered stiff opposition. | |
| Student - As for the Clipper algorithm, it's quite easy to invite | |
| three experts to cursorily examine an algorithm (they weren't allowed | |
| to take documents home to study it) and then sign-off that they have no | |
| complaints. | |
| Journalist - As for the cursory rubber-stamping by the three experts | |
| who certified the Clipper algorithm, my information is that they had | |
| multiple days of computing days on a supercomputer available. I don't | |
| see a problem with the algorithm. The problem lies in the "trust | |
| centers" that manage the keys. I personally don't see why the whole | |
| question of cryptology is at all open ("zugaenglich") for the | |
| government. | |
| CONCLUDING REMARKS | |
| DsB - The question is not only whether or not politicians are separated | |
| from what the citizens want, but also of what the citizens want. | |
| Germans have a tendency to valuing security. Different tradition in | |
| the US, and less eavesdroping. I can imagine how the basic law | |
| ("Grundgesetz") could be eliminated in favor of regulations designed to | |
| reduce eavesdroping, the trade-off you (MdB) mentioned earlier. The | |
| headlines would look like "fewer cases of eavesdroping", "checks built | |
| in to the system," etc., everyone would be happy, and then once the law | |
| has been abolished, it would creep back up, and then there's no limit. | |
| MdB - (Nods agreement) | |
| CCC #2 - There are things that must be administered centrally (like the | |
| PTT), and the government is the natural choice, but I suggest that we | |
| don't speak of the "government," but rather of "coordination." This | |
| reduces the perceived "required power" aspect ... As a closing remark, | |
| I would like to suggest that we take a broader perspective, assume that | |
| a person may commit e.g. 5,000 DM more of theft in his lifetime, live | |
| with that, and save e.g. 100,000 DM in taxes trying to prevent this | |
| degree of theft. | |
| ------------------------------------------------------------------------------- | |
| MEDIA AND INFORMATION STRUCTURES | |
| In this session, a lot of time was wasted in pointless philosophical | |
| discussion of what is meant by Truth, although once this topic was | |
| forcefully ignored, some interesting points came up (I don't | |
| necessarily agree or disagree with these): | |
| - In electronic media, the receiver has more responsibility for judging | |
| truth placed on his shoulders. He can no longer assume that the sender | |
| is accountable. With "Network Trust," you would know someone who knows | |
| what's worthwhile, rather than filtering the deluge yourself. A | |
| primitive form of this already exists in the form of Usenet "kill" files. | |
| - A large portion of Usenet blather is due to people who just got their | |
| accounts cross-posting to the entire world. The actual posting is not | |
| the problem, rather that others follow it up with a few dozen messages | |
| debating whether or not it's really mis-posted, or argue that they | |
| should stop discussing it, etc. People are beginning to learn however, | |
| and the ripple effect is diminishing. | |
| - Companies such as Microsoft are afraid of the Internet, because its | |
| distributed form of software development means they are no longer the | |
| only ones able to marshal 100 or 1,000 people for a windowing system | |
| like X-Windows or Microsoft Windows. | |
| - If someone is trying to be nasty and knows what he's doing, a Usenet | |
| posting can be made to cost $500,000 in network bandwidth, disk space, etc. | |
| - At a Dutch university, about 50% of the network bandwidth could have | |
| been saved if copies of Playboy were placed in the terminal rooms. | |
| Such technical refinements as Gopher caching daemons pale in comparison. | |
| - All e-mail into or out of China goes through one node. Suspicious, | |
| isn't it? | |
| ------------------------------------------------------------------------------- | |
| ALTERNATIVE NETWORKS | |
| Several people reported about computer networks they set up and are | |
| operating. A sampling: | |
| APS+Hacktic - Rop Gonggrijp reported about networking services for the | |
| masses, namely Unix and Internet for about $15 per month, in Holland. | |
| There are currently 1,000 subscribers, and the funding is sufficient to | |
| break even and to expand to keep up with exponential demand. | |
| A German reported about efforts to provide e-mail to regions of | |
| ex-Yugoslavia that are severed from one another, either due to | |
| destroyed telephone lines or to phone lines being shut off by the | |
| government. A foundation provided them with the funds to use London | |
| (later Vienna), which is reachable from both regions, as a common node. | |
| The original author of the Zerberus mail system used on many private | |
| German networks complained about the degree of meta-discussion and how | |
| his program was being used for people to complain about who is paying | |
| what for networking services and so forth. He said he did not create | |
| it for such non-substantial blather. The difference between now and | |
| several years ago is that now there are networks that work, | |
| technically, and the problem is how to use them in a worthwhile manner. | |
| A German of Turkish origin is trying to allow Turks in Turkey to | |
| participate in relevant discussions on German networks (in German) and | |
| is providing translating services (if I heard right, some of this | |
| was being done in Sweden). This killed the rest of the session, | |
| which degenerated into a discussion of which languages were/are/should | |
| be used on which networks. | |
| ------------------------------------------------------------------------------- | |
| HOW AN INTELLIGENCE SERVICE WORKS: STASI TRAINING VIDEOS | |
| The person introducing the videos sat on the stage, the room | |
| darkened. The camera blotted out his upper body and face; all that was | |
| to see on the video, projected behind him, was a pair of hands moving | |
| around. | |
| It apparently didn't take much to earn a file in the Stasi archives. | |
| And once you were in there, the "10 W's: Wo/wann/warum/mit wem/..." | |
| ("where/when/why/with whom/...") ensured that the file, as well as | |
| those of your acquaintances, grew. | |
| The videos reported the following "case studies": | |
| - The tale of "Eva," whose materialistic lifestyle, contacts with | |
| Western capitalists, and "Abenteuerromantik" tendencies made her a | |
| clear danger to the state, as well as a valuable operative. She swore | |
| allegiance to the Stasi and was recruited. Eventually the good working | |
| relationship deteriorated, and the Stasi had to prevent her from trying | |
| to escape to the West. The video showed how the different parts of the | |
| intelligence service worked together. | |
| - A member of the military made a call to the consulate of West | |
| Germany in Hungary. The list of 10,000 possible travellers to Hungary | |
| in the relevant time frame was narrowed down to 6,000 on the basis of a | |
| determination of age and accent from the recorded conversation, then | |
| down to 80 by who would have any secrets to sell, then down to three | |
| (by hunch? I don't remember now). | |
| One video showed how a subversive was discreetly arrested. Cameras | |
| throughout the city were used to track his movements. When he arrived | |
| at his home, a few workers were "fixing" the door, which they claimed | |
| couldn't be opened at the moment. They walked him over to the next | |
| building to show him the entrance, and arrested him there. A dinky | |
| little East German car comes up, six people pile into it. Two | |
| uniformed police stand on the sidewalk pretending nothing is happening. | |