Computer underground Digest Wed Aug 14, 1996 Volume 8 : Issue 59 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.59 (Wed, Aug 14, 1996) File 1--Paranoia and Brit hackers fuel infowar craze in spy agencies File 2--Nat'l Law Journal and The Independent on CWD and net-filters File 3--ACLU warns of G-7 international net-censorship efforts File 4--DiFi/Barr: Terrorist Handbook on Net File 5--Internet Domain Survey, July 1996 (fwd) File 6--Hackers Find Cheap Scotland Yard Phone Connection File 7--Re: - SPECIAL ISSUE: Anti Terrorism File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Tue, 6 Aug 1996 20:12:06 -0500 (CDT) From: Crypt Newsletter To: Jim Thomas Subject: File 1--Paranoia and Brit hackers fuel infowar craze in spy agencies Electronic doom will soon be visited on U.S. computer networks by information warriors, hackers, pannational groups of computer-wielding religious extremists, possible agents of Libya and Iran, international thugs and money-mad Internet savvy thieves. John Deutch, director of Central Intelligence, testified to the truth of the matter, so it must be graven in stone. In a long statement composed in the august tone of the Cold Warrior, Deutch said to the Senate Permanent Subcommittee on Investigations on June 25, "My greatest concern is that hackers, terrorist organizations, or other nations might use information warfare techniques" to disrupt the national infrastructure. "Virtually any 'bad actor' can acquire the hardware and software needed to attack some of our critical information-based infrastructures. Hacker tools are readily available on the Internet, and hackers themselves are a source of expertise for any nation or foreign terrorist organization that is interested in developing an information warfare capability. In fact, hackers, with or without their full knowledge, may be supplying advice and expertise to rogue states such as Iran and Libya." In one sentence, the head of the CIA cast hackers -- from those more expert than Kevin Mitnick to AOLHell-wielding idiots calling an America On-Line overseas account -- as pawns of perennial international bogeymen, Libya and Iran. Scrutiny of the evidence that led to this conclusion was not possible since it was classified, according to Deutch. " . . . we have [classified] evidence that a number of countries around the world are developing the doctrine, strategies, and tools to conduct information attacks," said Deutch. Catching glimpses of shadowy enemies at every turn, Deutch characterized them as operating from the deep cover of classified programs in pariah states. Truck bombs aimed at the telephone company, electronic assaults by "paid hackers" are likely to be part of the arsenal of anyone from the Lebanese Hezbollah to "nameless . . . cells of international terrorists such as those who attacked the World Trade Center." Quite interestingly, a Minority Staff Report entitled "Security and Cyberspace" and presented to the subcommittee around the same time as Deutch's statement, presented a different picture. In its attempt to raise the alarm over hacker assaults on the U.S., it inadvertently portrayed the intelligence community responsible for appraising the threat as hidebound stumblebums, Cold Warriors resistant to change and ignorant or indifferent to the technology of computer networks and their misuse. Written by Congressional staff investigators Dan Gelber and Jim Christy, the report quotes an unnamed member of the intelligence community likening threat assessment in the area to "a toddler soccer game, where everyone just runs around trying to kick the ball somewhere." Further, assessment of the threat posed by information warriors was "not presently a priority of our nation's intelligence and enforcement communities." The report becomes more comical with briefings from intelligence agencies said to be claiming that the threat of hackers and information warfare is "substantial" but completely unable to provide a concrete assessment of the threat because few or no personnel were working on the subject under investigation. "One agency assembled [ten] individuals for the Staff briefing, but ultimately admitted that only one person was actually working 'full time' on intelligence collection and threat analysis," write Gelber and Christy. The CIA is one example. "Central Intelligence Agency . . . staffs an 'Information Warfare Center'; however, at the time of [the] briefing, barely a handful of persons were dedicated to collection and on [sic] defensive information warfare," comment the authors. " . . . at no time was any agency able to present a national threat assessment of the risk posed to our information infrastructure," they continue. Briefings on the subject, if any and at any level of classification, "consisted of extremely limited anecdotal information." Oh no, John, say it ain't so! The minority report continues to paint a picture of intelligence agencies that have glommed onto the magic words "information warfare" and "hackers" as mystical totems, grafting the subjects onto "pre-existing" offices or new "working groups." However, the operations are based only on labels. "Very little prioritization" has been done, there are few analysts working on the subjects in question. Another "very senior intelligence officer for science and technology" is quoted claiming "it will probably take the intelligence community years to break the traditional paradigms, and re-focus resources" in the area. Restated, intelligence director Deutch pronounced in June there was classified evidence that hackers are in league with Libya and Iran and that countries around the world are plotting plots to attack the U.S. through information warfare. But the classified data is and was, at best, anecdotal gossip -- hearsay, bullshit -- assembled by perhaps a handful of individuals working haphazardly inside the labyrinth of the intelligence community. There is no real threat assessment to back up the Deutch claims. Can anyone say _bomber gap_? The lack of solid evidence for any of the claims made by the intelligence community has created an unusual stage on which two British hackers, Datastream Cowboy and Kuji, were made the dog and pony in a ridiculous show to demonstrate the threat of information warfare to members of Congress. Because of a break-in at an Air Force facility in Rome, NY, in 1994, booth hackers were made the stars of two Government Accounting Office reports on network intrusions in the Department of Defense earlier this year. The comings and goings of Datastream Cowboy also constitute the meat of Gelber and Christy's minority staff report from the Subcommittee on Investigations. Before delving into it in detail, it's interesting to read what a British newspaper published about Datastream Cowboy, a sixteen year-old, about a year before he was made the poster boy for information warfare and international hacking conspiracies in front of Congress. In a brief article, blessedly so in contrast to the reams of propaganda published on the incident for Congress, the July 5 1995 edition of The Independent wrote, "[Datastream Cowboy] appeared before Bow Street magistrates yesterday charged with unlawfully gaining access to a series of American defense computers. Richard Pryce, who was 16 at the time of the alleged offences, is accused of accessing key US Air Force systems and a network owned by Lockheed, the missile and aircraft manufacturers." Pryce, a resident of a northwest suburb of London did not enter a plea on any of 12 charges levied against him under the British Computer Misuse Act. He was arrested on May 12, 1994, by New Scotland Yard as a result of work by the U.S. Air Force Office of Special Investigations. The Times of London reported when police came for Pryce, they found him at his PC on the third floor of his family's house. Knowing he was about to be arrested, he "curled up on the floor and cried." In Gelber and Christy's staff report, the tracking of Pryce, and to a lesser extent a collaborator called Kuji -- real name Mathew Bevan, is retold as an eight page appendix entitled "The Case Study: Rome Laboratory, Griffiss Air Force Base, NY Intrusion." Pryce's entry into Air Force computers was noticed on March 28, 1994, when personnel discovered a sniffer program he had installed on one of the Air Force systems in Rome. The Defense Information System Agency (DISA) was notified. DISA subsequently called the Air Force Office of Special Investigations (AFOSI) at the Air Force Information Warfare Center in San Antonio, Texas. AFOSI then sent a team to Rome to appraise the break-in, secure the system and trace those responsible. During the process, the AFOSI team discovered Datastream Cowboy had entered the Rome Air Force computers for the first time on March 25, according to the report. Passwords had been compromised, electronic mail read and deleted and unclassified "battlefield simulation" data copied off the facility. The Rome network was also used as a staging area for penetration of other systems on the Internet. AFOSI investigators initially traced the break-in back one step to the New York City provider, Mindvox. According to the Congressional report, this put the NYC provider under suspicion because "newspaper articles" said Mindvox's computer security was furnished by two "former Legion of Doom members." "The Legion of Doom is a loose-knit computer hacker group which had several members convicted for intrusions into corporate telephone switches in 1990 and 1991," wrote Gelber and Christy. AFOSI then got permission to begin monitoring -- the equivalent of wiretapping -- all communications on the Air Force network. Limited observation of other Internet providers being used during the break-in was conducted from the Rome facilities. Monitoring told the investigators the handles of hackers involved in the Rome break-in were Datastream Cowboy and Kuji. Since the monitoring was of limited value in determining the whereabouts of Datastream Cowboy and Kuji, AFOSI resorted to "their human intelligence network of informants, i.e., stool pigeons, that 'surf the Internet.' Gossip from one AFOSI 'Net stoolie uncovered that Datastream Cowboy was from Britain. The anonymous source said he had e-mail correspondence with Datastream Cowboy in which the hacker said he was a 16-year old living in England who enjoyed penetrating ".MIL" systems. Datastream Cowboy also apparently ran a bulletin board system and gave the telephone number to the AFOSI source. The Air Force team contacted New Scotland Yard and the British law enforcement agency identified the residence, the home of Richard Pryce, which corresponded to Datastream Cowboy's system phone number. English authorities began observing Pryce's phone calls and noticed he was making fraudulent use of British Telecom. In addition, whenever intrusions at the Air Force network in Rome occurred, Pryce's number was seen to be making illegal calls out of Britain. Pryce travelled everywhere on the Internet, going through South America, multiple countries in Europe and Mexico, occasionally entering the Rome network. From Air Force computers, he would enter systems at Jet Propulsion Laboratory in Pasadena, California, and the Goddard Space Flight Center in Greenbelt, Maryland. Since Pryce was capturing the logins and passwords of the Air Force networks in Rome, he was then able to get into the home systems of Rome network users, defense contractors like Lockheed. By mid-April of 1994 the Air Force was monitoring other systems being used by the British hackers. On the 14th of the month, Kuji logged on to the Goddard Space Center from a system in Latvia and copied data from it to the Baltic country. According to Gelber's report, the AFOSI investigators assumed the worst, that it was a sign that someone in an eastern European country was making a grab for sensitive information. They broke the connection but not before Kuji had copied files off the Goddard system. As it turned out, the Latvian computer was just another system the British hackers were using as a stepping stone; Pryce had also used it to cover his tracks when penetrating networks at Wright-Patterson Air Force Base in Ohio, via an intermediate system in Seattle, cyberspace.com. The next day, Kuji was again observed trying to probe various systems at NATO in Brussels and The Hague as well as Wright-Patterson. On the 19th, Pryce successfully returned to NATO systems in The Hague through Mindvox. The point Gelber and Christy seem to be trying to make is that Kuji, a 21-year old, was coaching Pryce during some of his attacks on various systems. By this point, New Scotland Yard had a search warrant for Pryce with the plan being to swoop down on him the next time he accessed the Air Force network in Rome. In April, Pryce penetrated a system on the Korean peninsula and copied material off a facility called the Korean Atomic Research Institute to an Air Force computer in Rome. At the time, the investigators had no idea whether the system was in North or South Korea. The impression created is one of hysteria and confusion at Rome. There was fear that the system, if in North Korea, would trigger an international incident, with the hack interpreted as an "aggressive act of war." The system turned out to be in South Korea. During the Korean break-in, New Scotland Yard could have intervened and arrested Pryce. However, for unknown reasons, the agency did not. Those with good memories may recall mainstream news reports concerning Pryce's hack, which was cast as an entry into sensitive North Korean networks. It's worth noting that while the story was portrayed as the work of an anonymous hacker, both the U.S. government and New Scotland Yard knew who the perpetrator was. Further, according to Gelber's report English authorities already had a search warrant for Pryce's house. Finally, on May 12 British authorities pounced. Pryce was arrested and his residence searched. He crumbled, according to the Times of London, and began to cry. Gelber and Christy write that Pryce promptly admitted to the Air Force break-ins as well as others. Pryce confessed he had copied a large program that used artificial intelligence to construct theoretical Air Orders of Battle from an Air Force computer to Mindvox and left it there because of its great size, 3-4 megabytes. Pryce paid for his Internet service with a fraudulent credit card number. At the time, the investigators were unable to find out the name and whereabouts of Kuji. A lead to an Australian underground bulletin board system failed to pan out. On June 23 of this year, Reuters reported that Kuji -- 21-year-old Mathew Bevan -- a computer technician, had been arrested and charged in connection with the 1994 Air Force break-ins in Rome. Rocker Tom Petty sang that even the losers get lucky some time. He wasn't thinking of British computer hackers but no better words could be used to describe the two Englishmen and a two year old chain of events that led to fame as international computer terrorists in front of Congress at the beginning of the summer of 1996. Lacking much evidence for the case of conspiratorial computer-waged campaigns of terror and chaos against the U.S., the makers of Congressional reports resorted to telling the same story over and over, three times in the space of the hearings on the subject. One envisions U.S. Congressmen too stupid or apathetic to complain, "Hey, didn't we get that yesterday, and the day before?" Pryce and Bevan appeared in "Security in Cyberspace" and twice in Government Accounting Office reports AIMD-96-84 and T-AIMD96-92. Jim Christy, the co-author of "Security in Cyberspace" and the Air Force Office of Special Investigations' source for the Pryce case supplied the same tale for Jack Brock, author of the GAO reports. Brock writes, ". . . Air Force officials told us that at least one of the hackers may have been working for a foreign country interested in obtaining military research data or areas in which the Air Force was conducting advanced research." It was, apparently, more wishful thinking. Notes: 1. The Federation of American Scientists has made available on its Web site electronic copies of all the reports mentioned previously. The URL is http://www.fas.org/ . The FAS Web site also features an easy to use search engine which can be used to pull up the Congressional testimony on hackers and network intrusion. These example key words are effective: "Jim Christy," "Datastream Cowboy". Crypt Newsletter 38 http://www.soci.niu.edu/~crypt ------------------------------ Date: Tue, 30 Jul 1996 16:06:06 -0500 From: Declan McCullagh Subject: File 2--Nat'l Law Journal and The Independent on CWD and net-filters Attached are portions of two articles from the National Law Journal and London's The Independent following up on the CyberWire Dispatch that Brock and I put out earlier this month on the rather unusual behavior of net-filtering software. The original CWD is at: http://www.eff.org/pub/Publications/Declan_McCullagh/ http://cyberwerks.com:70/cyberwire/cwd/ (eventually) -Declan =========================================================================== The National Law Journal Monday, August 5, 1996 Page A13 By Ann Davis ...Civil libertarians are demanding to know: since when were the National Organizaton for Women or the Endangered Species Coalition in the same class as devil worshippers? How can photos posted by animal rights groups be categorized as "gross depictions"? Caught in a dragnet of blocking software are web sites on everything from the safe use of fireworks to safe sex, according to a report by the Internet-based news service CyberWire Dispatch. To blocked groups' disappointment, however, Internet legal experts say any lawsuit against private computer censors may be a losing proposition... [Mike Godwin is quoted.] ...A cyber-Deep Throat recently leaked the lists to two Internet investigative reporters, Brock N. Meeks and Declan B. McCullagh. Blacklisted sites include a Silicon Valley council of the National Rifle Association and Cyber High School, whose web address is similar to that of a gay video site... [Snapshot of CyberHigh's web page included] As a lawyer for CompuServe, Inc., Mr. Cunard meets potential legal challenges with skepticism. The free speech angle? Implausible against a private entity, he said. Discrimination claims? Difficult, unless you can prove the Internet is a place of public accomodation. Tortious interferrence? not likely, because most web site operators don't require subscriptions and therefore don't have a duty to those who access their sites. =========================================================================== The Independent (London) Monday, July 22, 1996 By Charles Arthur REAL ALE IS TOO STRONG FOR THE AMERICAN MORALISTS Programs to protect children from Net porn are keeping them out of a vast range of sites, says Charles Arthur [...] Since last July, programs such as Cyber Patrol, NetNanny and Cybersitter have sold thousands of copies. Some have distribution agreements with organisations such as BT and CompuServe. The makers boast that their products "includes a bad site list of thousands of Wed sites that are not suitable for children" and "allow parents to censor what their children access on the Internet." So far, so good - except that many of those "banned" sites include many British sources holding very useful or entirely innocent information. And the morality underlying many of the bannings is very American, and quite unlike that which a British parent might be expected to apply. Among the British sites on the World Wide Web which your child would be unable to access when using the programs are the Campaign for Real Ale (Camra), the Prison Lexicon (which provides information about penal reform), the computing department of Queen Mary and Westfield College, Imperial College, the University of Stirling, the Internet connection companies Demon and Zetnet, and Telephone Information Services - which offers weather and share reports but not sex lines. Between them, the programs prevent access to tens of thousands of sites on the Internet. But they effectively apply an American system of morals - on religion, weapons, drugs, alcohol and sex - to the data which British children might be expected to know about, or could obtain from newspapers. None of the operators of any of the sites mentioned above was aware that they were "blocked", and all were mystified by it. "Which self-selected Mary Whitehouse put us on their list?" asked Iain Lowe, research manager of Camra. In Camra's case, the answer is a team of researchers at Microsystems Software, based in Farmingham, Massachusetts, which has been selling Cyber Patrol since July 1995, and now claims 80 per cent of a fast-growing market. "Camra's site is blocked under our code for beer, alcohol, wine and tobacco," said Dick Gorgens, the company's chief executive. "It was added on June 10 when it was advertising a beer festival." Mr Lowe responded, "We don't promote underage drinking. But pubs in this country are allowed to apply for childrens' certificates: all the family can go. And we have had inquiries to our site from GCSE students doing projects on the economics of the brewing industry." Mr Gorgens denied that the program was imposing American morals onto British users. However, the panel which reviews the banning of sites includes no Britons, although it does include representatives from the National Rifle Association and the right-wing anti-pornography Morality in Media group. [...] "A close look at the actual range of sites blocked by these programs shows they go far beyond just restricting 'pornography'," said Brock Meeks, an Internet journalist and consultant who, with fellow journalist Declan McCullough, obtained a decoded list of the sites banned by the programs earlier this month, July, and revealed their indiscriminate breadth in an Internet mailing list, Cyberwire Dispatch. Steve Robinson-Grindey, who runs the Prison Lexicon site, said "It is effectively an electronic encyclopaedia of everything concerning prisons and penal affairs in England and Wales. It is extensively used by schools and universities for information. Even the People's Republic of China allow access to the site." He thought it might be banned because "obviously they rely on search words for filtering - in which case they would discover the words sex, AIDS, homosexual, and so on. But they failed to realise these words were being used in serious material." [...] ------------------------------ Date: Wed, 31 Jul 1996 18:24:14 -0700 (PDT) From: Declan McCullagh Subject: File 3--ACLU warns of G-7 international net-censorship efforts ACLU Warns of Latest Government Efforts to Regulate Cyberspace; New Global Campaign Will Monitor National, International Threats FOR IMMEDIATE RELEASE Wednesday, July 31, 1996 NEW YORK, NY--Despite a second federal court decision affirming that censorship in cyberspace is unconstitutional, the ACLU today warned of persistent government attempts, in the U.S. and internationally, to censor electronic communications and regulate privacy technology. At a meeting in Paris yesterday of the major U.S. allies known as "G-7," government leaders announced plans to strictly regulate the Internet and other electronic communications in an effort to combat terrorism. The meeting came in the wake of the bombing incident at the Atlanta Olympics and the explosion of TWA Flight 800, which is being investigated as a possible terrorist bombing. Participants included France, Italy, Japan, Britain, Germany, Canada, Russia and the United States. Although not all details were made public, proposed measures apparently include investigations of charities and political organizations with radical political points of view -- threatening their rights to free speech -- and using the Internet to "monitor" terrorist communications. There was also agreement to adopt a U.S. plan to prohibit non-key-escrowed encryption, which would mean that individuals and companies would be barred from using encryption technology to electronically lock up their most private and sensitive information unless they make the keys available to their government. In response to these and other threats to limit Internet and electronic privacy, the Global Internet Liberty Campaign was formed last month at a meeting of the Internet Society in Montreal. The group, which announced its formation today, will work in coalition with organizations from around the world to share information and protect free speech, privacy, equality of access and liberty on the global Internet. GILC members include the ACLU, the Electronic Privacy Information Center, Human Rights Watch, the Internet Society, Privacy International, and other civil liberties and human rights organizations. The ACLU is a founding member of the group. "GILC recognizes that there are no borders in cyberspace and that decisions made by international bodies like the G-7 nations affect all Internet users," said Barry Steinhardt, associate director of the ACLU. "The U.S. government may not accomplish through an international end-run what the U.S. Congress and the U.S. Courts have rejected." Steinhardt cited a recent ruling by a panel of federal judges in New York declaring that censorship in cyberspace is unconstitutional. The decision marked another win in the ongoing battle for free speech in cyberspace, which saw its first major victory last month in ACLU v. Reno, when a Philadelphia court granted a motion for preliminary injunction on "indecency" provisions of the Communications Decency Act. The ACLU filed its challenge on February 8 of this year, the day the CDA was signed into law. "We are delighted that the New York judges have joined their Philadelphia colleagues in protecting the Internet from governmental intrusion," said Steinhardt, who testified in the Philadelphia case. "But we remain concerned about the government's continuing efforts to censor electronic speech, not only in the United States but internationally." In the U.S., Congress is now attempting to revive a proposal that would make it a felony to disseminate information on bomb- making in print, radio, television or in cyberspace. Violations would be punishable by up to 20 years in prison, a $250,000 fine, or both. "This unconstitutional bill, rightly rejected by Congress last year, would criminalize everything from a high school chemistry teacher explaining basic scientific principles, to a newspaper carrying an illustration of a bomb's construction, to a U.S. Department of Agriculture manual describing how to make fertilizer bombs for removing tree stumps," the ACLU's Steinhardt said. In addition, President Clinton this week announced an initiative to increase the powers of federal investigators, including an expanded wiretapping authority. While the ACLU has commended the Clinton Administration and law enforcement authorities for their investigation into recent tragic incidents, it urged President Clinton and Congress in a letter sent to the White House on Monday to "preserve the American spirit" by safeguarding constitutional principles. The ACLU has asked for a meeting with the President and Congressional leaders to discuss continuing civil liberties concerns in light of recent events. [Note to Editors: A temporary web page for the Global Internet Liberty Campaign has been established at < http://www.aclu.org/gilc/inde x1.html >.] -- 30 -- Contact: Emily Whitfield, (212) 944-9800 ext. 424 ------------------------------ Date: Tue, 30 Jul 1996 10:27:04 -0400 From: Bob Palacios Subject: File 4--DiFi/Barr: Terrorist Handbook on Net Excerpt of interview with Sen. Feinstein and Rep. Barr on CNN, 7/28: [Full transcript at http://prod.lexis-nexis.com/trackers/html/11000/11032.1693817.1.html] ------------------ Sen. DIANNE FEINSTEIN: .... But I'd like to say something else, and this is very disturbing. Right now on the Internet, you can take off of the Internet something called the terrorist handbook, the anarchist's cookbook, both of which have the recipe- FRANK SESNO: What you're holding is off the Internet? Sen. DIANNE FEINSTEIN: This is off the Internet. FRANK SESNO: I don't know if people can see it, but it says, 'Stuff You Are Not Supposed To Know About' right across the top there. Sen. DIANNE FEINSTEIN: Yes. 'Whether you're planning to blow up the World Trade Center or merely explode a few small devices on the White House Lawn, the terrorist handbook is an invaluable guide to having a good time.' And then it goes on and it tells you how to make a pipe bomb here with a design, with the words 'How to make a book bomb, a light bulb bomb, bombs in baby food, how to use nails and screws in bombs.' FRANK SESNO: You can also get this sort of thing in bookstores. Isn't that right? Sen. DIANNE FEINSTEIN: That's right. FRANK SESNO: What do you want to do with this? Sen. DIANNE FEINSTEIN: Well, what I want to do- and this passed the Senate again in the terrorism bill; it was taken out by the House. I have put it back in the defense authorization bill. It passed the Senate unanimously. It is now in conference, and from what I understand, some are going to try to take it out. What it would do is say, 'If you know or have reason to believe that this information will be used for criminal purposes, it is illegal to put it on.' Let me make one other point. FRANK SESNO: Quickly, because I want to get back to Congressman Barr. Sen. DIANNE FEINSTEIN: There is no legal purpose for a pipe bomb, a book bomb, a light bulb bomb. FRANK SESNO: Congressman Barr, is it time to ban this kind of document, documentation, from the Internet, from America's bookstores? Is this something that the House will now support? Rep. BOB BARR: Well, Frank, the problem is not the House. The problem is our courts. We made efforts in the telecommunications bill earlier this year to restrict certain information over the Internet, and the courts do not allow it. The problem really is working out language that meets First Amendment challenges through the courts, and that's something that we do need to work on. But it's not as simple as simply sending something over to the House and waiting for those of us in the House to take it out. The problem is with the courts, really, and that's where we need to devote our attention. Sen. DIANNE FEINSTEIN: I have worked with constitutional lawyers in the drafting of it. We believe it will pass a court test. I would challenge the congressman to let it have a court test. Pass the legislation. It is worth it. It'll keep kids from blowing themselves and others up. Let's do it. FRANK SESNO: Congressman? Rep. BOB BARR: Well, the problem here, again- and I'm not necessarily disagreeing with the senator. The problem, though, as you sort of alluded to, Frank, it goes beyond simply taking something off the Internet. It raises questions about what information can be in our libraries, in our bookstores, in our schools and so forth. FRANK SESNO: Well, you don't want pornography across the Internet. I know you're opposed- Rep. BOB BARR: Well, and we tried that also and the courts have not allowed us to place restrictions on it yet. [...] ----- Bob Palacios, Online Organizer/Sysop Center for Democracy and Technology 1634 Eye Street, NW Suite 1100 Washington, DC 20006 http://www.cdt.org/ (v) +1 202 637 9800 http://www.cdt.org/homes/bobpal/ (f) +1 202 637 0968 ------------------------------ Date: Fri, 9 Aug 1996 18:49:13 -0400 (EDT) From: Noah Subject: File 5--Internet Domain Survey, July 1996 (fwd) From -Noah ---------- Forwarded message ---------- Date: Thu, 8 Aug 96 17:01:11 PDT From: Mark Lottor Internet Domain Survey Network Wizards July 1996 The Domain Survey attempts to discover every host on the Internet by doing a complete search of the Domain Name System. The latest results were gathered during late July 1996 and a summary is listed below. For the full report see WWW.NW.COM. -- Mark Lottor Number of Hosts, Domains, and Nets Advertised in the Domain Name System Replied Network Class Date | Hosts Domains ToPing* A B C ------+----------------------------------------------------- Jul 96| 12,881,000 488,000 2,569,000 95 5892 128378 Jan 96| 9,472,000 240,000 1,682,000 92 5655 87924 Jul 95| 6,642,000 120,000 1,149,000 91 5390 56057 Jan 95| 4,852,000 71,000 970,000 91 4979 34340 Jul 94| 3,212,000 46,000 707,000 89 4493 20628 Jan 94| 2,217,000 30,000 576,000 74 4043 16422 [* estimated by pinging 1% of all hosts] Host Distribution by Top-Level Domain Name [see ftp.nw.com, zone/iso-country-codes to decode names] 3323647 com 25109 hu 1335 lt 99 mc 18 az 2114851 edu 24133 hk 1099 bm 94 mk 14 ky 1232902 net 21464 ie 919 cy 92 zm 11 vi 579492 uk 20253 mx 878 uy 89 aw 10 md 548168 de 17573 pt 817 eg 86 hn 9 mn 496427 jp 13601 su 609 ec 86 fo 9 bb 432727 us 13239 cl 545 kz 85 py 8 sb 431939 mil 12689 gr 476 mt 84 na 8 bz 424356 ca 11282 cn 469 ae 81 ad 7 vu 397460 au 10810 is 386 pk 79 jo 7 bj 361065 gov 9949 si 359 lb 77 al 7 aq 327148 org 9415 ar 351 ma 74 uz 6 qa 277207 fi 8541 my 307 ir 71 pr 6 gh 214704 nl 7743 tr 285 ni 66 tt 6 dj 189786 fr 6605 ee 277 sm 64 gu 6 cf 186312 se 6362 th 275 sa 60 ug 5 vn 120780 no 5498 sk 236 bh 60 np 4 cu 113776 it 5265 co 234 lk 60 gi 4 ci 102691 ch 5262 id 207 pa 58 fj 3 va 83349 za 4499 ua 195 jm 49 sz 3 to 77886 nz 3117 ph 170 bn 47 mu 3 gy 76955 dk 2932 lv 163 ag 46 sn 2 sr 71090 at 2877 lu 159 gt 45 zw 2 ne 62447 es 2725 ro 158 bs 44 ai 2 gn 47973 kr 2582 cr 154 bo 43 sv 2 an 46854 br 2480 hr 140 gl 40 tn 1 ml 43311 be 2269 pe 140 do 40 gb 1 ck 39611 il 2254 bg 134 li 27 dm 1 bf 38432 pl 2176 in 133 ke 26 mz 1 ao 38376 sg 1963 kw 129 mo 23 mg 32219 cz 1930 int 119 ge 20 lc 32022 ru 1679 ve 105 am 19 nc 30645 tw 1631 yu 103 by 18 dz ------------------------------ Date: Mon, 05 Aug 1996 12:02:55 -0400 From: valgamon@megahits.com Subject: File 6--Hackers Find Cheap Scotland Yard Phone Connection Monday August 5 12:01 AM EDT Hackers Find Cheap Scotland Yard Phone Connection LONDON (Reuter) - Computer hackers broke into a security system at Scotland Yard, London's metropolitan police headquarters, to make international calls at police expense, police said Sunday. A police spokesman would not confirm a report in the Times newspaper that the calls totaled one million pounds ($1.5 million). He said the main computer network remained secure. "There is no question of any police information being accessed," the spokesman said. "This was an incident which was investigated by our fraud squad and by AT&T investigators in the U.S." AT&T Corp investigators were involved because most of the calls were to the United States, the Times said. According to The Times, the hackers made use of a system called PBX call forwarding that lets employees to make business calls from home at their employer's expense. .................. Reuters/Variety ------------------------------ Date: Mon, 5 Aug 1996 16:35:27 +0000 From: e.tan@UCL.AC.UK(Emerson Tan) Subject: File 7--Re: - SPECIAL ISSUE: Anti Terrorism It would appear that the US legal system is intent on making another catastrophic attempt to regulate the net. What they seem to have forgotten is that due the truly borderless nature of the net, the sprit of the mesures proposed have been defeated before the leglistaion had been drafted. For a long time it has been possible to obatin much material, deemed illegal in many states (eg sinagapore), on the net. This is likely to remain so as long as the development of the net and the driving forces and sprit of the net reamin the same. All outlawing certain things in the united states will achieve is too drive these materials out of the country, not stop the materials being distributed. If the loons and terrorists still want to procure the information they wil;l still be able to, albeit somewhat slowers than would be otherwise. What will happen is that monitoring of the disemination of these materials will pass out of the accountable cvil juristiction, and into the very secret foreign intelligence realm (the CIA being the principal agency here). This will deny the public at large the oppotunity to look at how this effective this legislation was effectively giving those in power carte blanche to claim whatever sucesses or new menaces that they feel like. At the end of the day it has always been true that the best place to keep an enemy is in plain sight. On the net as in the real world this remains as true as it ever was. ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.59 ************************************