Computer Underground Digest--Sat Jul 13 01:10:10 CDT 1991 (Vol #3.25) Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Today's Contents: Moderators' Corner Spaf's Response to Bill Vajk Comments to Bill Vajk's posting in CuD #3.22 (T. Klotzbach) LOD Members for Comsec Computer Security (News Reprint) Alcor Email (ECPA) Case Settled (Keith Henson) NIST announces public-key digital signature standard (gnu) Secret Service Pays Hacker Call (Reprint from Newsbytes) Administratia: ARCHIVISTS: ROB KRAUSE, BOB KUSUMOTO, AND BRENDAN KEHOE CuD is available via electronic mail at no cost. Printed copies are available by subscription. Single copies are available for the costs of reproduction and mailing. Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, by FidoNet file request from 1:100/345, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.cs.widener.edu, chsun1.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: July 13, 1991 From: From the Moderators Subject: Moderators' Corner We're experimenting with a new format to conform with RFC-1153 that we hope will allow CuD to explode in most mailers. Thanks to John Stanley for his suggestions, and especially to an anonymous Texas sysop (whose initials are BI and can be reached at bei@dogface.austin.tx.us) for the patience to lead us by the hand in explaining the procedure. Please let us know if it works (or if it doesn't). If we can get it working properly, we will maintain both the original format for files and the new one for mailers. So pass back your suggestions and criticisms. ------------------------------ Date: Tue, 09 Jul 91 15:05:10 EST From: Gene Spafford Subject: Response to Bill Vajk In an earlier digest, Bill Vajk responded to one of my messages with lengthy commentary. I agree with some of his points, disagree with others, and have no opinion about most. Most deserve and/or need no comment. However, there were a few of his statements (and his overall attitude) I feel I should respond to somewhat; I won't dignify the obvious personal insults with commentary, however. He says: "I am concerned that Spafford's comments can be read to be forgiving and conciliatory in nature where it regards errors made by professional law enforcement." He then goes on to criticize the case in California described in CUD 3.15. That juxtaposition was unfair, and implied that I was in some way trying to excuse the actions of Office Nemeth & company -- and that is most definitely not the case. From what I have heard of that incident, the law enforcement personnel acted like idiots. As to being conciliatory and forgiving, I do not believe law enforcement personnel are basically evil or out to deprive us of our rights; I believe most law enforcement personnel are poorly educated in the area and overworked. I wish to improve that understanding, not seek to portray law enforcement personnel as "the enemy." I don't approve of or agree with some of their actions, but neither do I feel it inappropriate to try to see things from their point of view. Later, he says: >Yes, Gene. In article 5462@accuvax.nwu.edu you misspoke [sic] and assisted >in proliferation of such incorrect reports : > > "The information I have available from various sources > indicates that the investigation is continuing, others > are likely to be charged, and there MAY be some national > security aspects to parts of the discussion that have > yet to be disclosed." > >Need I voice the obvious and ask how any "responsible" individual should >handle errors they have made? Need I voice the obvious and ask a simple >question. What has Gene Spafford done to correct errors he has made? Has >his behavior in these matters met the criteria for responsibility he demands >from others? Mr. Vajk (and others) appears to misunderstand my usage of words. My comment was not a misstatement. I very carefully qualified it to indicate that it was based on information available to me, and that it was an indication, not a certainty. The investigation did continue. At the time, it seemed likely to my sources that others would be charged. And my use of the word MAY was to indicate that it was far from certain. I don't view this statement on this issue as erroneous, nor do I believe I have anything to apologize for when making it. Had I said "The investigation shows these guys to be traitors and part of a larger group that will all be arrested and charged." -- that would be an incorrect statement and something I would need to retract. However, I didn't make that statement. I also "demand(s)" nothing of others. I admit errors when I make them. Mr. Vajk then says a great deal about my statement that we should not believe that everyone charged with computer offenses is innocent. He points out (correctly) that *in US law* people are innocent until proven guilty. HOWEVER, that does not make them innocent of having committed an act. If Joe Random were to shoot someone in front of a crowd of witnesses, he would be innocent under the law until a jury returned a verdict in a trial, but he would NOT be innocent of the act. Would any witness to the crime, or anyone who spoke to a witness, then be equally condemned by Mr. Vajk for saying "Joe was not innocent of murder" before the conclusion of a trial? My point remains that claiming innocence (in the non-law sense) for all individuals accused of computer-related crimes is obviously incorrect and counter-productive. It may be technically correct to point out that a court has not convicted them yet, but that does not mean we should trumpet their innocence. Furthermore, implying that law enforcement personnel are all pursuing power-trips and vendettas against computer users is paranoid. The law is important, and I respect it, but I do not need a jury to verify that the sun rose this morning. Most people are able to distinguish between convicted and guily; when too many people believe that the guilty are not being convicted, repressive measures may get instituted. If we intend to fight for appropriate application of the laws to computing, we need to keep this distinction in mind. Following more insulting comments, Mr. Vajk then makes some mistaken comments on copyright and trade secret (proprietary) rights. Some of these errors have been addressed already in a previous CUD: copyright and trade secret rights may both be expressed on a document. One thing that was not mentioned in the previous comments on copyright is that there is, indeed, a Federal statute governing copyright infringement. 2319 USC 18 provides for criminal penalties when a copyright is infringed. The copyright must be formally registered and deposited with the Superintendent of Documents for this to take effect, however, and the infringement must be willful. I have heard directly from Federal attorneys that this law can be used (and has been used) against people copying source code or documentation (or chip masks) they do not own. Copyright is not always strictly a civil issue. Mr. Vajk then makes extensive comments on how he thinks copyright should work, how source code should be valued, and how Federal law should be applied in cases of interstate traffic in copyrighted material. This may or may not be of some interest to some readers, but it does nothing to change the fact that Len Rose was charged with, and plead guilty to, an offense based on his trafficking in proprietary source code. His attacks on my statement (and me, to some extent) to that effect are directed at the wrong parties: he seems to disagree with the way the law is written and/or applied, and that is not my fault. He is certainly correct, however, in his observation that the laws are not adequate for our current technology: this is historically the case with a great deal of technology, and certainly not restricted to telecommunications and computing. I have never disputed this point, and have often propounded it. Mr. Vajk continues by criticizing me for (in so many words) "making statements without knowing the full background." Interestingly enough, he does this by assuming he knows what documentation and information I have accessed, and by assuming that he knows the one, full truth of the matter of Len Rose's actions and trial. Furthermore, he then goes on to imply things about AT&T, Tim Foley, the Illinois (?) prosecutor in the case, and potential witnesses to the case based on circumstantial evidence. Am I the only one who finds such hypocrisy curious? In the end, there is a fundamental difference of opinion between our views and our approaches. Mr. Vajk chose to personally insult me with remarks in his commentary rather than address that difference. For instance, he states: "There has been movement by all branches at the federal level of law enforcement to assume guilt before investigation and to trample rights freely utilizing the immunity originally granted in order to protect officers making honest mistakes as a standard operating procedure instead of an exceptional circumstance." I believe there have been some misguided and ill-informed investigations and prosecutions; I do not believe it an organized movement as does (presumably) Mr. Vajk. I still believe that the common person is not going to find the story of Robert Morris or Len Rose to be particularly indicative of threats to their freedoms. Certainly some of the things done to Len were inappropriate (the search, for instance). However, the over-broad search does not negate his guilty plea to a criminal act. Although we wish to guarantee the same Constitutional rights to everyone, we should be somewhat cautious about the examples we pick to hold as standards, and I do not believe Len is a particular good standard for us to raise. I also believe that rude behavior and insults directed towards people with different opinions than one's own is counterproductive to having one's own views respected and listened to with attentiveness. Appeals to reason are more likely to sway people to one's views. That was the central thesis of my original comments, and still is. For us to secure a reasonable set of rights for all computer users, we must realize that the issue is complex and has many different perspectives, the legal community is not well-equipped to deal with the issues based on prior experience, and that not everyone on the electronic frontier is heroic in stature. Most of us are still learning as the situation changes. (My views on many things have changed in the last few years, thankfully, and continues to evolve as I learn more; we shouldn't criticize someone for developing new attitudes with experience.). Sometimes we will make mistakes as we go along, but some mistakes we can avoid if we think about them first. One common mistake in such highly-charged issues is attributing to malice what may be caused by ignorance. Another is being abusive to others for having a different set of views; one cannot champion the legal right to free speech without also embracing the responsibility to respect others who choose to exercise that right -- disagreement with views should not become contempt for the people who (appear to) espouse them. ------------------------------ Date: Fri, 5 Jul 91 13:10 GMT From: "Thomas J. Klotzbach" <0003751365@MCIMAIL.COM> Subject: Comments to Bill Vajk's posting in CuD #3.22 I am posting to the CuD to address factual and other errors that Bill Vajk made in his original posting to CuD #3.22. I had hoped to avoid this course of action, but feel it necessary due to the puzzling actions of Mr Vajk. I originally replied directly to Mr. Vajk with my concerns about his posting. He replied back to send him specific information or "retire from the conversation". I sent back the information he requested and Mr. Vajk never responded. I also sent two follow-up letters with again, no response. I came to the conclusion that Mr. Vajk was going to make no attempt in the foreseeable future to address the errors in his original posting to the CuD, so now I present them to the readership. My attempt is not to "bash" Mr. Vajk, but to hopefully correct some of the disinformation that Mr. Vajk has posted to the CuD. Bill writes: >If this is the case, then possession is not illegal, because >the text is protected by commercial exploitation by the copyright >laws and Len should have not been charged with criminal. Copyright is a >matter for civil suit... This is misleading, as it implies that copyright infringement may not be remedied in criminal court. There are also provisions for criminal proceedings if a person willfully infringes a copyright for among other things, private financial gain (17 USC 506 et seq.; 18 USC 2319). This half-truth (copyright law only allows remedy in civil court) seems to be circulating about the net with great frequency. A knowledgeable netter wrote to me and stated that the reason that the government does not pursue more cases with the aforementioned statute is that the criminal penalties are not as large as the interstate transportation of stolen property and wire fraud statutes provide for violators. Bill goes on: >...It seems that AT&T source code (according to one of the Foley >affidavits) bears legends which claim both proprietary rights and a >copyright. You stipulate proprietary. The dual labeling of the >original software should do a lot to remove it from consideration as >truly proprietary information. The laws regarding copyrights require >that all copyright material is subject to deposit at the Library of >Congress, where any citizen has a right to read and review. The ownership of copyright is distinct from the ownership of the object in which the work is embodied (17 USC 101 et seq.; 17 USC 202). You imply that the dual labeling of the source code suggests that the work is not truly proprietary information, by stating that "the dual labeling of the original software should do a lot to remove it from consideration as truly proprietary information". Rubbish. AT&T is within their rights to do what they did. The notice of copyright MAY be placed on publicly distributed copies of a work (17 USC 401). Labeling a work as copyrighted does not imply a forfeiture of any proprietary rights (17 USC 202 et seq.; 17 USC 401, also please see Douglas v. Taylor, Tex.Civ.App. 497 S.W. 2d 308, 310 and Green v. Lewis, 221 Va. 547, 272 S.E. 2d 181, 185). In effect, proprietary declares that you are the owner of the work. You may also copyright the work as well. And what does the bit about "copyright material is subject to deposit and any citizen has the right to review" about? Are you implying that somehow Len Rose was within his rights to copy the source code in an attempt to review it? If you are, you are incorrect. Copyright law is fairly specific on the limitation of exclusive rights as they pertain to computer programs (it is the section that software makers refer to when they allow the owner of a copy of software to make backup copies - 17 USC 117). Bill also writes: >Twice now, regarding the resultants of the E-911 case you've been long >on assumptions, short on proof. Twice now, regarding the resultants of >the E-911 case you've been long on promises, short on results. Given >this history, I ask, would a "responsible" man now seek truth and >publish it, or retire from this discussion. But Bill then states: >Thus far, it seems most computer laws have been written at the behest >of special interests instead of the public interest. The laws already >inflict restrictions contrary to generally understood and accepted >constitutional provisions. Well, Bill, would you please provide some "proof" for the readership on the aforementioned statement? YOU imply much while proving little. There are other errors in Mr Vajk's article to the CuD and I am still in the process of researching them. Again, I am not attempting to split hairs, but Mr. Vajk has a responsibility to not put "spin" on what the laws/statues/etc mean, a spin that distorts the facts at hand and does a disservice to you and I, the readers of the CuD. In closing: Bill Vajk writes: >...What has Gene Spafford done to correct errors he has made? Has his >behavior in these matters met the criteria for responsibility he demands >from others? I ask the same question of Bill Vajk. What has he done to correct the errors he has made in his posting to the CuD #3.22? ------------------------------ Date: Fri, 5 Jul 1991 13:52 CDT From: "ROBERT G. HEARN" <9999AH02@UHDBIT.BITNET> Subject: LOD Members for Comsec COmputer Security (News Reprint) Reprint from Sunday, June 23, 1991 Houston Chronicle (1A, 15A) By Joe Abernathy FORMER HACKERS OFFER SERVICES IN COMPUTER SECURITY The most notorious force of computer hacking's heyday is asking forgiveness and joining the forces of good. The storied Legion of Doom, nemesis to the Secret Service, is forming a computer security consulting firm in Houston. Drawing members from around the nation and its name from comic book villains, the youthful hackers' group dominated the underground electronic landscape of the middle and late 1980s. Finally, a controversial penetration of phone company computers landed several members in jail. According to documents, activities of the Legion of Doom were a primary motivation for Operation Sun Devil, a nationwide crackdown on computer crime coordinated by the U.S. Secret Service. But remaining members in Austin and Houston, who disavowed any connection with the phone company incident, now say they are on the right side of the law and are offering their expertise on computer security. "People need us. We're the best," said Scott Chasin, known in his hacking days by the computer handle Doc Holliday. "Ten years from now we'll be the leaders in data security." Computer security is a burgeoning field, but one that is almost impossible to define in terms of dollars lost to penetrations or dollars spent on security. Tales are plentiful among police of losses in the six-figure range that went unprosecuted in order to spare the affected firms embarrassment. Estimates of the yearly loss to industry from computer break-ins range from $500 million to more than $2 billion -- much of it lost to long-distance phone service theft or credit card fraud. Some industry observers welcomed the creation of Comsec Computer Security, as the new company will be known, while others derided it as a new twist on a familiar theme. "There's lots of precedent for that," said Richard A. Schaffer of New York, editor of the industry publication ComputerLetter. "Crooks of all types try to hire themselves out after the fact." "So these guys are purporting to tell you how to protect against folks like them," he mused. "It strikes me that people should refuse to hire them just on principle...although from what I've seen they're qualified." But Linda Laskey of the Computer Security Institute in San Francisco said she believes the firm will provide a valuable service. "They know what they're doing as far as doing as far as security systems go," she said. Laskey said the Computer Security Institute, a worldwide organization of computer security professionals from business and government will be among the first clients of Comsec. The value of computer security is pitched now by those associated with particular security products. Accounting firms also provide security consulting. By contrast, Comsec is banking on its past association with the Legion, which gained a high profile from run-ins with the Secret Service and BellSouth, one of the regional phone companies. Robert J. Riggs, Franklin E. Dardin Jr. and Adam E. Grant were sentenced on Nov. 16, 1990, in federal court in Atlanta for breaking into the computers of BellSouth and stealing a document on the administration of the emergency 911 system. Hacking grew up around the Legion, which wasn't content merely to penetrate computer systems and networks. The deed wasn't finished until the intimate details of each system were written up and electronically published. Legion followers became associated with tutorials on obscure subjects, such things as how to make nitroglycerin and drugs, and with electronic documents on "social engineering," the fine art of the scam. Born in the swirling computer underground of the 1980s and named after the minions of Superman archrival Lex Luthor, the Legion's "educational services" ultimately helped reshape the online community and gave the group a stature beyond its nominal activities. But the best summary may have been written by Comsec principal Chris Goggans, the historian of the Legion and only member associated with it from its official founding in 1984 until it was disbanded late last year. "The Legion of Doom has been called everything from 'Organized Crime' to 'a communist threat to national security' to 'an international conspiracy of computer terrorists bent on destroying the nation's 911 service,'" he wrote under his pseudonym, Eric Bloodaxe. "Nothing comes closer to the actual truth than 'bored adolescents with too much spare time.'" Now Sun Devil has put an end to hacking's innocence and perception of among computer enthusiasts that it is a noble pursuit. As for the Legion members, a few got busted, a few got bored, and the rest are pondering a direction for their lives as young adults. "I didn't want to be 30 years old and still breaking into systems," said Chasin, who is 21. "I want to be securing systems." Chasin and Goggans, 22, will be joined in the firm by Ken Shulman, 21, the son of Houston socialite Carolyn Farb, who is providing discounted office space and other assistance. Comsec will be managed by Robert Cupps, 24, a graduate of Emory University and former securities trader. Chasin and Goggans are pursuing degrees at the University of Houston. "From a marketing standpoint, we've got a real strong presentation," said Cupps, a Baytown native who does not consider himself a computer expert. "What we will do is a brief demonstration. When you can walk into someone's office and get root (administrative privileges) on their system, that says something in itself, that maybe you're the person they should be talking to about securing their systems." The only member of Comsec who has faced criminal charges is Shulman, known vicariously on computer networks as Malefactor, The Mentor, and Jack the Ripper. He pleaded no contest in 1989 to misdemeanor charges of credit card fraud, paid nearly $20,000 in restitution and was put on a year's deferred adjudication -- meaning he emerged from probation without a final conviction on his record. "It was telephones, long distance calls," he said. "I quit everything after that, and that was years ago." Goggans has also had a run-in with the law, however. His Austin home was raided on March 1, 1990, because he allegedly possessed the 911 document. No charges have been filed. Originally held forth as a life-threatening penetration of the 911 system, the document theft is now viewed by computer enthusiasts and others as having been considerably overblown. "The fact of the matter is that there was no damage to the system," acknowledged Scott Ticer, operations manager for BellSouth and spokesman for the security team that lead the investigation. "But the potential for damage was there." "You just can't have people playing around in your network -- it's not some high-tech toyland. This is the telecommunications system." Would BellSouth hire the former hackers whose associates caused it so much grief -- proving their expertise along the way? "We don't use hackers as consultants, period," Ticer said. "Thanks but no thanks." ------------------------------ ------------------------------ Date: 5 Jul 91 07:10:45 GMT From: hkhenson@cup.portal.com Subject: Alcor Email (ECPA) Case Settled The long running Alcor/email case against the County and City of Riverside, CA was settled out of court in April of this year. The announcement was delayed until all parties had signed off, and the check (for $30k) had cleared the bank :-). The Alcor Life Extension Foundation (a non-profit cryonics organization -- alcor@cup.portal.com) ran a BBS for members and prospective members from early 1987 through January 12, 1988. On that day, the BBS computer was removed under a warrant to take the computer (but no mention of any contained email) in connection with the investigation into the death of 83-year-old Dora Kent. (Mrs. Kent was placed into cryonic suspension by Alcor in December of 1987. During and following the investigation, Alcor staff members were publicly accused by county officials of murder, theft, and building code violations. No charges were ever filed and the investigation was officially closed three years later.) In December, 1988 Keith Henson filed a civil suit to force an investigation of the apparent violations of the Electronic Communication Privacy Act by the FBI, but the case was dismissed by the now convicted Judge Aguilar. In early 1990, just before the statute of limitations ran out, Henson and 14 others (of the roughly 50 people who had email on the system) filed a civil action against a number of officials and the County and City of Riverside, CA under Section 2707 of the Electronic Communication Privacy Act. Some time after the case was filed, the Electronic Frontier Foundation came into existence in response to law enforcement abuses involving a wide spectrum of the online community. EFF considered this case an important one, and helped the plaintiffs in the case by locating pro bono legal help. While the case was being transferred, the County and City offered a settlement which was close to the maximum damages which could have been obtained at trial. Although no precedent was set because the case did not go to trial, considerable legal research has been done, and one judgment issued in response to the Defendants' Motion to Dismiss. The legal filings and the responses they generated from the law firm representing the County/City and officials are available by email from mnemonic@eff.org or (with delay) from hkhenson@cup.portal.com. (They are also posted on Portal.) The Plaintiffs were represented by Christopher Ashworth of Garfield, Tepper, Ashworth and Epstein in Los Angeles (408-277-1981). A summary of the settlement agreement is attached. SETTLEMENT AGREEMENT This agreement is made and entered into in Riverside, California, this _____ day of ______ by and between [long list of defendants and plaintiffs] I. FACTUAL RECITALS 1. This Agreement is executed with reference to the following facts for purpose of this Agreement only. 2. On January 12, 1998, some of the Defendants, pursuant to a search warrant, entered into the premises of Alcor Life Extension Foundation in Riverside, California. 3. Upon entry into the property, some of the Defendants seized various items, including electronic media containing E-mail owned by the plaintiffs. 4. On or about January 11, 1990, plaintiffs commenced civil action No. SAC 90-021js in the United States District Court, Santa Ana ("the Action"), against the defendants for injuries and damages allegedly suffered as a result of the defendants' seizure of plaintiff's E-mail. 5 It is now the desire and intention of plaintiffs, on the one part, and defendants on the other part, to settle, compromise, and resolve all the differences, disagreements, and disputes, which exist and may exist, including those which are the subject matter of, referred to, related to, or mentioned in the Action. Pursuant to this desire, and in consideration of the mutual promises contained herein, the parties agree as follows. II CONSIDERATION 6. Upon the execution of this Agreement, defendants County of Riverside shall pay to plaintiffs, by check, the total sum of Thirty Thousand Dollars ($30,000), inclusive of attorney fees and cost. ------------------------------ Date: Thu, 27 Jun 91 11:39:59 -0700 From: gnu@TOAD.COM Subject: NIST announces public-key digital signature standard Statement of Raymond G. Kammer, Deputy Director National Institute of Standards and Technology Before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology On Computer Security Implementation House of Representatives June 27, 1991 Digital Signature Standard I know that you are interested in our progress in developing a federal digital signature standard based upon the principles of public-key cryptography. I am pleased to tell you that we are working out the final arrangements on the planned standard, and hope to announce later this summer our selection of a digital signature standard based on a variant of the ElGamal signature technique. Our efforts in this area have been slow, difficult, and complex. We evaluated a number of alternative digital signature techniques, and considered a variety of factors in this review: the level of security provided, the ease of implementation in both hardware and software, the ease of export from the U.S., the applicability of patents and the level of efficiency in both the signature and verification functions that the technique performs. In selecting digital signature technique method [sic], we followed the mandate contained in section 2 of the Computer Security Act of 1987 to develop standards and guidelines that ". . . assure the cost-effective security and privacy of sensitive information in Federal systems." We placed primary emphasis on selecting the technology that best assures the appropriate security of Federal information. We were also concerned with selecting the technique with the most desirable operating and use characteristics. In terms of operating characteristics, the digital signature technique provides for a less computational-intensive signing function than verification function. This matches up well with anticipated Federal uses of the standard. The signing function is expected to be performed in a relatively computationally modest environment such as with smart cards. The verification process, however, is expected to be implemented in a computationally rich environment such as on mainframe systems or super-minicomputers. With respect to use characteristics, the digital signature technique is expected to be available on a royalty-free basis in the public interest world-wide. This should result in broader use by both government and the private sector, and bring economic benefits to both sectors. A few details related to the selection of this technique remain to be worked out. The government is applying to the U.S. Patent Office for a patent, and will also seek foreign protection as appropriate. As I stated, we intend to make the technique available world-wide on a royalty-free basis in the public interest. A hashing function has not been specified by NIST for use with the digital signature standard. NIST has been reviewing various candidate hashing functions; however, we are not satisfied with any of the functions we have studied thus far. We will provide a hashing function that is complementary to the standard. I want to speak to two issues that have been raised in the public debate over digital signature techniques. One is the allegation that a "trap door", a method for the surreptitious defeat of the security of this system, has been built into the technique that we are selecting. I state categorically that no trap door has been designed into this standard nor does the U.S. Government know of any which is inherent in the ElGamal signature method that is the foundation of our technique. Another issue raised is the lack of public key exchange capabilities. I believe that, to avoid capricious activity, Public Key Exchange under control of a certifying authority is required for government applications. The details of such a process will be developed for government/industry use. NIST/NSA Technical Working Group Aspects of digital signature standard were discussed by the NIST/NSA Technical Working Group, established under the NIST/NSA Memorandum of Understanding. The Working Group also discussed issues involving the applicability of the digital signature algorithm to the classified community, cryptographic key management techniques, and the hashing function to be used in conjunction with the digital signature standard. Progress on these items has taken place; however, as with the digital signature standard, non-technical issues such as patents and exportability require examination, and this can be a lengthy process. We have found that working with NSA is productive. The Technical Working Group provides an essential mechanism by which NIST and NSA can conduct the technical discussions and exchange contemplated by the Computer Security Act and also allows us to address important issues drawing upon NSA's expertise. ------------------------------ Date: July 8, 1991 From: Barbara E. McMullen & John F. McMullen Subject: Secret Service Pays Hacker Call (Reprint from Newsbytes) SECRET SERVICE PAYS HACKER CALL 07/08/91 NEW YORK, NEW YORK U.S.A., 1991 JULY 8 (NB) -- According to a Pennsylvania teenage "hacker" known as "Wing", agents of the United States Secret Service visited his home and that of some friends asking questions about rumors they had allegedly received about the planting of "July 4th logic bombs". Wing told Newsbytes that the agents arrived at his home and requested to talk to him about "rumors that he had planted logic bombs or viruses to go off on the 4th of July." Wing said that, on the advise of his father, he refused to discuss the matter with the agents, "The last time that the Secret Service was here my father told them not to come back again without a warrant so, when they did, I didn't talk to them. The whole thing is ridiculous anyhow. There was obviously no July 4th bombs and I certainly didn't plant any." Wing also said that agents visited friends of his and "made one who is new to computers feel that he was doing something wrong by trying to log onto bulletin boards." A Secret Service official, speaking to Newsbytes, confirmed that agents had attempted to interview Wing in relation to rumors of a July 4th attack on computer systems. The official also said that, because of Wing's juneville status, his parents have the right to deny the agents' request for an interview. The agent further said that, to his knowledge, there were no cases of computer attack on the 4th of July. Other law enforcement officials had told Newsbytes, previous to the July 4th holiday, that they had received rumors of such a planned attack but that they had little substantive material upon which to base an investigation. There have also been recent reports to Newsbytes from sysops of university and foundation computer systems in the Boston, MA area of attempted unauthorized access by an individual purporting to be Wing. ------------------------------ Date: Tue, 09 Jul 91 05:56:11 CDT From: Anonymous Subject: Calling the kettle black In an article in comp.org.eff.talk, David Turrell wrote, > Anyone caught using illegal copies of 1-2-3 who keeps on doing it > after being asked not to and at the same time expresses "utter > contempt" for Lotus' right should be made to wash lots and lots of > cars, and wax those that need it. You'd be surprised who would have to come clean. There's a very big company that has provided technical opinions, albeit with a few decimal places added, to Federal officials. Would those Federal officials turn on such a technical resource and accuse it of software piracy? Would they take the word of an ex-employee that the very big company kept megabytes of pirated software on company computers? That managers within the company knew of those computers and used that unlicensed software in furtherance of the company's business? Would it matter that a now-dead division of that very big company kept archives of pilfered copies of (among other titles) Harvard Project Manager, Microsoft Word, Procomm Plus, Lotus 1-2-3, and Word Perfect for company use? Within twenty feet of an ADAPSO/SPA anti-piracy poster? If there's one law enforcement official who wouldn't hesitate to ask some hard questions of this very big company, I'd hope that they'd come out of the electronic shadows in this forum, and declare in front of all of us that Justice is for the Big as well as the Small. Sign me, A Belated Whistle Blower P.S. Bothered by my anonymity? I am, too. Truth is, I think that the LE people who I'd hope to hear from will try and kick MY butt before they'll go after the employer of so many "expert witnesses". Wait and see. ------------------------------ End of Computer Underground Digest #3.25 ************************************