[misc.headlines] Hacker Scholarship

gcm@mtgzz.UUCP (g.c.mccoury) (06/18/87)

  Wonder why we have so many security problems at our comp centers -
read on.

************************************
From Asbury Park Press (week of 6/15)
************************************

	        APPLE FOUNDER OFFERS SCHOLARSHIP FOR HACKERS
	          - Associated Press

	Boulder, CO - Computer whiz Stephen Wozniak has donated $100,000 for
    a University of Colorado scholarship aimed at developing excellence in
    computer hackers at his alma mater.
	"The value of cracking security codes and understanding them is that 
    generates incredible knowledge," said Wozniak, one of the original hackers
    and co-founder of Apple Computer Inc. 
	Wozniak said he actually encourages the "mildly" social deviants" to
    break access and security codes as a way to learn.
	The "Woz" scholarship program is twofold: a tuition grant and a job
    working with the computer science department.
	"There is a misconception that hackers are dangerous to society," 
    Wozniak said. "They are just trying to do things that they are not supposed
    to be able to do."
	As a freshman at CU in 1969, Wozniak tapped into the university's
    computer system to print out reams of mathematical information. Angry 
    university officials placed him on probation, and, he said, on the road to
    Apple Computer.

	...nuff said.

/***************************************************************************
*									   *
*      e N			Grover McCoury				   *
*    B     o			ATT Laboratories(?) [was ISL]		   *
*   y       r m a l  ??		...!ihnp4!mtgzz!gcm			   *
*   h									   *
*     W				I refuse to have a battle of wits	   *
*				  with an unarmed person...		   *
*									   *
****************************************************************************/

andys@genesis.UUCP (a.b.sherman) (06/18/87)

In article <2757@mtgzz.UUCP>, gcm@mtgzz.UUCP writes:
> 
>   Wonder why we have so many security problems at our comp centers -
> read on.
> 
> ************************************
> From Asbury Park Press (week of 6/15)
> ************************************
> 
> 	        APPLE FOUNDER OFFERS SCHOLARSHIP FOR HACKERS
> 	          - Associated Press
> 
> 	Boulder, CO - Computer whiz Stephen Wozniak has donated $100,000 for
>     a University of Colorado scholarship aimed at developing excellence in
>     computer hackers at his alma mater.
> 	"The value of cracking security codes and understanding them is that 
>     generates incredible knowledge," said Wozniak, one of the original hackers
>     and co-founder of Apple Computer Inc. 
> 	Wozniak said he actually encourages the "mildly" social deviants" to
>     break access and security codes as a way to learn.
> 	As a freshman at CU in 1969, Wozniak tapped into the university's
>     computer system to print out reams of mathematical information. Angry 
>     university officials placed him on probation, and, he said, on the road to
>     Apple Computer.
> 
> 	...nuff said.


First, I think that used to be done here with blue-boxers. 
However toll fraud is now a multi-million dollar industry that is no
longer cute, no longer funny and no longer tolerable to our
business.

Second, I think the social deviance is more than mild when people
hack away at other people's work or learning environment.  It is one
thing to figure out how to become root.  It is quite another to use
that knowledge to make it impossible for other people (NOT faceless
representatives of Ma Bell, but PEOPLE) to do their work.  Somebody
who thinks it's cute to cream the root file system of somebody
else's computer is extremely anti-social.  Real people have their
livelihoods, and professional reputations tied up with the data that
is lost, and suffer from real depression and frustration when it
happens.

Screw Wozniak and send the bastards to jail.
-- 
andy sherman / at&t bell laboratories (medical diagnostic systems)
room 2h-097 / 480 red hill road / middletown, nj 07748
(201) 615-5708 / andys@shlepper.ATT.COM
...The views and opinions are my own.  Who else would want them?

mel1@houxa.UUCP (06/19/87)

I agree with much of what Andy says, but feel that his anger should
mostly be directed to the people who consciously allow the hackers
to do so much damage.  Woz's work was done several generations of
system software and hardware ago.  The holes were well know then
and still allowed to exist.  They exist now and are still allowed
to exist.  Why?  Who makes these decisions?  Why?

The DES algorithm is now quite old, but still not used in computer
hardware.  Why?  Call back and random password techniques are readily
available, but aren't used.  Why?  Data communication protocols are
well into the standards making procedure, but don't include
encryption capabilities.  Why?  Our computer systems can be designed
to be reliable and fault tolerant, but still require "superuser"
gurus to administer them.  Why?

I think the damage is being done by the people who bury their heads
in the sand and foist these security horrors onto the public, not
the college kid hackers.

Make it so that nothing gets onto any storage hardware in clear text.
Don't allow anyone to get access to the system without their handy-dandy
vest pocket gadget.  Don't put anything over any line or cable in
clear text.  Don't let anybody, ever, get into the system with
"privileged" access.  ----  Then, do as Woz suggests, and pay the
brightest and best to find holes in the defenses.  And pay rewards
for being a hacker and learning the next generation of techniques to
cause problems.  ----  Then DO SOMETHING about the problems, don't let
another 12 years or so go by with heads buryed.

   Mel Haas  ,  odyssey!mel

gnu@hoptoad.uucp (John Gilmore) (06/19/87)

A.B.Sherman, apparantly from AT&T, complained about Steve Wozniak
giving a $100K/yr scholarship for young hackers.  [I can't cross-post
to att.workplace from here, sorry.]

Indeed, Woz used to hack the phone system.  But I don't think he
committed much "toll fraud" in the sense of getting communications
service for free.  Just like many people who use other peoples'
computers don't use them to make money, just use them to learn on.
This is often encouraged in the computer community; we all learn
faster, and bright kids get to play with 'the real stuff' so by
the time they get a job they will know a lot about what's going on.
Woz was exploring how the phone network is built, as we might explore
the wonders of tty handling, the contents of /lib, or the rare
treasures of comp.binaries.ibm.pc.

>                                                            It is one
> thing to figure out how to become root.  It is quite another to use
> that knowledge to make it impossible for other people (NOT faceless
> representatives of Ma Bell, but PEOPLE) to do their work.  Somebody
> who thinks it's cute to cream the root file system...

Woz's comments in the article were pretty clear.

        "There is a misconception that hackers are dangerous to society,"
    Wozniak said. "They are just trying to do things that they are not
    supposed to be able to do."

He wants to reward young people who explore the limits of today's
technology and find its weaknesses.  (It's up to us, who develop
tomorrow's technology, to fix what they find.  You can't claim somebody
is ripping you off if you leave your door wide open.  The kids will
probably be glad to help us.)  Woz is not out to teach kids how to
destroy a system, but how to learn about a system.  That knowledge can
be used for Good or E-vill as can all knowledge.  Nobody will be
teaching how to cream root file systems.

> However toll fraud is now a multi-million dollar industry that is no
> longer cute, no longer funny and no longer tolerable to our
> business.

OK, toll fraud is no longer tolerable to your business.  Why don't you
stop it?  Stop assigning account numbers that are printed in
directories in every home.  Stop printing the security code (password)
on the credit card.  Allow the user to change the password.  Basically,
treat it like an access control rather than an unchecked billing
number.  About 1980, Sprint was massively hacked by youngsters.  They
were using 5-digit account numbers and assigning them in groups; with
15 minutes' work at a touchtone pad you could come up with 3 or 4
account numbers that worked fine for 'toll fraud'.  After a year or two
of this, Sprint wised up, lengthened the numbers, assigned them at
random, and tacked on 2 more digits if you were not using your 'home CO',
making brute force attack impractical.  They didn't go yelling about
blue boxes or buying congressmen to make 'hurting the phone company' a
criminal offense, they fixed the problem.  Why hasn't AT&T done this?
-- 
{sun,ptsfa,lll-crg,ihnp4,ucbvax}!hoptoad!gnu	       gnu@ingres.berkeley.edu
Kudos to Stargate for permitting redistribution.   May the Source be with you!

baum@apple.UUCP (Allen J. Baum) (06/19/87)

--------
[]
>In article <345@genesis.UUCP> andys@genesis.UUCP (a.b.sherman) writes:
>In article <2757@mtgzz.UUCP>, gcm@mtgzz.UUCP writes:
>> 
>> 
>> 	        APPLE FOUNDER OFFERS SCHOLARSHIP FOR HACKERS
>> 	          - Associated Press
>> 
>> 	Boulder, CO - Computer whiz Stephen Wozniak has donated $100,000 for
>>     a University of Colorado scholarship aimed at developing excellence in
>>     computer hackers at his alma mater.........
>> 	"The value of cracking security codes and understanding them is that 
>>   generates incredible knowledge," said Wozniak, one of the original hackers
>>     and co-founder of Apple Computer Inc. 
>
>....... I think the social deviance is more than mild when people
>hack away at other people's work or learning environment.  It is one
>thing to figure out how to become root.  It is quite another to use
>that knowledge to make it impossible for other people (NOT faceless
>representatives of Ma Bell, but PEOPLE) to do their work.  Somebody
>who thinks it's cute to cream the root file system of somebody
>else's computer is extremely anti-social.  Real people have their
>livelihoods, and professional reputations tied up with the data that
>is lost, and suffer from real depression and frustration when it
>happens.
>
>Screw Wozniak and send the bastards to jail.

I don't believe Woz is advocating creaming a file system. He is
advocating breaking the file system security, and learning a lot
about the guts of the system in the process (like he did). He
believes this kind of hands-on experience is the best way to learn,
and that people are responsible and wouldn't abuse this system of
learning (I didn't say he wasn't naive and idealistic)
--
{decwrl,hplabs,ihnp4}!nsc!apple!baum		(408)973-3385

hah@isum.intel.com (Hans Hansen) (06/20/87)

In article <345@genesis.UUCP> andys@genesis.UUCP (a.b.sherman) writes:
>In article <2757@mtgzz.UUCP>, gcm@mtgzz.UUCP writes:
>> 
>>   Wonder why we have so many security problems at our comp centers -
>> read on.
>> 
>> ************************************
>> From Asbury Park Press (week of 6/15)
>> ************************************
>> 
>> 	        APPLE FOUNDER OFFERS SCHOLARSHIP FOR HACKERS
>> 	          - Associated Press
>> 
>First, I think that used to be done here with blue-boxers. 
>However toll fraud is now a multi-million dollar industry that is no
>longer cute, no longer funny and no longer tolerable to our
>business.
>
>Second, I think the social deviance is more than mild when people
>hack away at other people's work or learning environment.  It is one
>thing to figure out how to become root.  It is quite another to use
>that knowledge to make it impossible for other people (NOT faceless
>representatives of Ma Bell, but PEOPLE) to do their work.  Somebody
>who thinks it's cute to cream the root file system of somebody
>else's computer is extremely anti-social.  Real people have their
>livelihoods, and professional reputations tied up with the data that
>is lost, and suffer from real depression and frustration when it
>happens.
>
>Screw Wozniak and send the bastards to jail.
>-- 
>andy sherman

Its too bad that you failed to fully reason this out before firing off
your followup.

What Woz is trying to do will IMPROVE systems security not destroy it.
As more holes are found and plugged all computer users will benifit,
INCLUDING Ma Bell!  If anything all security conscious companies should
follow Woz's lead.  The fact that it is so easy to rip off the Phone
Company should SHOUT that you have major problems.  Don't stick your
head in the sand and expect the problems to go away!  Donate computer
systems with your latest software to schools and have them HACK away
in a controlled environment.  Find your BACK DOORS and put locks on
them!  If this is handled correctly it can be a BIG win for the whole
computer using society.

As far as Woz being ANTI-SOCIAL, I think if you just calm down and
reasses his true intent you will come to the conclusion that he is
a real leader!

Hans

apc@cblpe.UUCP (06/20/87)

In article <2318@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
>You can't claim somebody
>is ripping you off if you leave your door wide open.
>

Why the 'ell not!  It is my stuff inside my house, you know it,
and I know it.  Just cause I leave my door wide open, is NOT
a statment of lack of ownership.

Jeez, what is today's society comming to if it can only be considered
theft if you break through six locks, three alarm systems, kill
four guard dogs, etc.

Mine is mine, not yours!!!

(I am upset, obviously!)
-- 
"Are you sure you won't change your mind?"           | Alan P. Curtis
"Is there something wrong with the one I have?"      | AT&T,BTL,CB
-----------------------------------------------------| apc@cblpe.ATT.COM
Copyright (c) 1987.  Use for profit not allowed.     | !cbosgd!cblpe!apc  

jdia@osiris.UUCP (Josh Diamond) (06/20/87)

In article <532@houxa.UUCP>, mel1@houxa.UUCP (M.HAAS) writes:
...
> The DES algorithm is now quite old, but still not used in computer
> hardware.  Why? 
...
>    Mel Haas  ,  odyssey!mel

According to many, the DES algorithm is not used because the feds designed it 
so that THEY could break it.  The NSA doesn't want any codes being used that
they can't break.  

This is why people who really want to seriously encrypt their messages/data
use RSA public key encryption.  This supposedly beats DES any day. 31 Bit key 
for DES vs. huge (50 deciman digit) prime for RSA.  RSA wins.

BTW, I don't think NSA / DOD / CIA super secret goop is done using DES.


Nonetheless, there is no excuse for not using some standard kind of encryption
for each system, especially sensitive network links.


						Spidey!

-- 
DON'T PANIC!!!                                              \_\ /_/  Yes, it is
                                                             _[*]_   supposed to
A message from Spidey, and the Spidey Team.  ------>>>>     / / \ \  look like a
Reachable via UUCP: ...[seismo,mimsy]!jhu!osiris!jdia                spider!

worley@dana.UUCP (John Worley) (06/21/87)

Mel Haas (odessy!mel) writes:

> The holes were well know then
> and still allowed to exist.  They exist now and are still allowed
> to exist.  Why?  Who makes these decisions?  Why?

    Can you say $$$,$$$,$$$?  I thought you could.

> The DES algorithm is now quite old, but still not used in computer
> hardware.  Why?  Call back and random password techniques are readily
> available, but aren't used.  Why?  Data communication protocols are
> well into the standards making procedure, but don't include
> encryption capabilities.  Why?  Our computer systems can be designed
> to be reliable and fault tolerant, but still require "superuser"
> gurus to administer them.  Why?
> 
> I think the damage is being done by the people who bury their heads
> in the sand and foist these security horrors onto the public, not
> the college kid hackers.

FLAME ON!

    ARGH!!  This is equivalent to suggesting personal armor is the solution
to violent crime!!  Are victims of muggings, rape, murder, etc., at fault
because they "bury their heads in the sand" and expect reasonable behavior
from their fellow humans?!

FLAME OFF (heat still on)

    When I was at UCLA, there was an freshman who managed to get access to
our 4.1 UNIX system, and proceeded to go traipsing all over the ARPA net
using well-known security holes.  This twit was far from "the best and the
brightest" - he was a fool was got off on stealing other peoples accounts.
To the best of my knowledge, he ended up doing community service, and I say
AMEN! HE PAID FOR HIS CRIME!

    "Kid hackers" are not doing anything constructive, adventurous, or even
cute, any more than the kid trying to break into your car to take it for a
joy ride  (In fact, the California penal code makes no distinction between
the taking of another's car temporarily or permanently).  A computer system,
whether private, corporate or academic, is as much private property as your
house, car or stereo.  If you leave your front door unlocked, is it OK for
anyone off the street to just walk right in?  If you leave your bicycle for
a few minutes, is it OK for anyone to just walk up and borrow it? Breaking
system security is a malicious activity and a direct, deliberate violation
of private property!

    As Andy Sherman (andys@shlepper.ATT.COM) said: Screw Wozniak and send the
bastards to jail!

					John Worley
					hplabs!dana!worley

Disclaimer:	The opinions expressed herein are mine soley and do not
		reflect those of Dana Computer, its other employees, or
		its customers.

edw@ius2.cs.cmu.edu (Eddie Wyatt) (06/22/87)

  Mel Hass seems to advocate the philosophy similiar to if you don't
protect yourself then you deserve what you get.  I don't think most people
would say that just because you make yourself vulnerable you deserve to
become a victim.

  There are measures one can take to prevent becoming a victim however, and
this is the stand I believe Wozniak is taking.  As an example - just because
you leave you car unlock doesn't mean that are asking someone the steal 
your car, but also you should realize that the chances of it getting
stolen are greater.  If you install a alarm system or steering wheel
lock then the chances of it getting stolen are less.

  To install an alarm system, so to speak, in a computer system
you must first understand how the thief is breaking the existing
security features.  As others have pointed out, the problem of
hackers breaking your systems won't go away with a wave of legislation's
magic wand.

  The computer science community should do everything posible to improve
security. The first step in this process is to find the loop holes
in existing systems.  Second fix  these loop holes.  And finally
incorperate these changes in new systems.

   This method of course has some practicle throw backs, such as
in finding loop holes in a system, any other company that owns
such a system in now vulnerable if such knowledge is made publicly
availible.

  Let me share three case of security problems I know of.


	case 1. (Source OS class)  Linear password decomposition algorithm.

	Two very interesting utilities in a certain unknown OS combined to
	provide a technique of decoding any password in linear time respective
	of the length of the password.  The utilities were a facility
	for determining when a page fault occurred in a application
	program so that the user could finely tune a program preformance
	and the other happened to be the password untility and the way
	in which it was coded.  The password function read in a character
	at a time and compared it to the system password.  If the given
	character didn't match, the password function would jump to another
 	place in the program causing a page fault, then continue reading the
	rest of the password.  One can obviously see how the method
	works.  Type in a character, see if there is a page fault.
	If so, start again with new character else look for next 
	character in password.  The fix to the problem is also obvious,
	that is read the whole password before testing to see if it
	matches the system password.


	case 2. (Source the University I use to attend) Reduced
	search space algorithm.

	At the university I use to attend, they use to issue the
	initial passwords to the user's birthday.  Well, this made a
	brute force attempt at decoding passwords feasible, I need
	not say more.  The fix here was to initialize the passwords
	to some 7 digit random number.

	case 3. (Source the University I use to attend and a high
	school near where I lived - 2 different systems) 

	I don't know what the actual bug in each system was, but
	I do know of the results.  Someone, had access to the grade
	accounts and for a small fee, would change that D or F to 
	a B or A.  As I understand this may have been going on
	for years.  At the high school the person that committed
	the act was caught and was only expelled for a year.
	At the university, as far as I know no-one was caught for
	grade changing.  The person that pointed out the problem,
	by actually committing the act for the administration to
	see, caught an unreasonable amount a flack and may have
	had charges brought against him/her.
-- 
					Eddie Wyatt

e-mail: edw@ius2.cs.cmu.edu

terrorist, cryptography, DES, drugs, cipher, secret, decode, NSA, CIA, NRO.

mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer) (06/22/87)

In article <532@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
<to exist.  Why?  Who makes these decisions?  Why?

The people who design computer systems make some of them, the people
who run them make others.

<Why?  Call back and random password techniques are readily
<available, but aren't used.  Why? 

Sorry, but call back and random password technology *are* used. Just
not widely. Why? Because they tend to cost more, and are make getting
to a system harder for the legitimate users as well as crackers (*not*
hackers - hackers you put on your payroll and let them make your
system a nicer place to be).

<Why?  Our computer systems can be designed to be reliable and fault
<tolerant, but still require "superuser" gurus to administer them. 

Reliable and fault tolerant? Hmmm. The few I know of that actually are
cost lots of extra $$$s.

As for needing gurus, simple systems (a Macintosh, say) don't require
gurus to administer them. But a box that supports 20+ users is
noticably more complicated than a Macintosh, so you expect it to be
more complicated to run.

<I think the damage is being done by the people who bury their heads
<in the sand and foist these security horrors onto the public, not
<the college kid hackers.

Oh, horse pucky. You can buy secure systems if you want to. But they
cost (and cost, and cost). The public (since individuals very seldom
buy multi-user boxes, "the public" is actually closer to "corporate
america") chooses to spend fewer dollars for less security.

<Make it so that nothing gets onto any storage hardware in clear text.

How much extra will this cost? And what do you do about moving things
to other sites with different hardware and character sets?

<Don't allow anyone to get access to the system without their handy-dandy
<vest pocket gadget. 

How much more does this cost than a simple lock? How about the extra
inconvenience of having to carry a passcard and a key?

<Don't put anything over any line or cable in clear text.

How much does it cost? What do you do for dialin lines?

<Don't let anybody, ever, get into the system with "privileged" access.

So how do you do maintenance things that require privileges, like
reading all the files to back them up to tape? Privileged programs? So
who gets the privs needed to create those? The vendor supplies them
all (snicker)?

<Then, do as Woz suggests, and pay the
<brightest and best to find holes in the defenses.  And pay rewards
<for being a hacker and learning the next generation of techniques to
<cause problems.  ----  Then DO SOMETHING about the problems, don't let
<another 12 years or so go by with heads buryed.

All of which costs money. This cost gets passed back to your
customers. Pretty soon, most of your customers have gone to a less
secure and less costly system.

You forgot some important things, though. Make sure that *no* lines
carrying data go outside the machine/terminal rooms. Make sure both
rooms are EMF tight, including filtering on the power line. Of course,
that all costs mone too.

Face it: what people are willing to spend on security is less than the
percieved costs of having a system broken into. For most people,
that's significantly less than what real security costs, so they
settle for a placebo.

	"The only secure computer is one that's turned off."
	<mike
--
How many times do you have to fall			Mike Meyer
While people stand there gawking?			mwm@berkeley.edu
How many times do you have to fall			ucbvax!mwm
Before you end up walking?				mwm@ucbjade.BITNET

roger@celtics.UUCP (Roger B.A. Klorese) (06/22/87)

In article <532@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
>I think the damage is being done by the people who bury their heads
>in the sand and foist these security horrors onto the public, not
>the college kid hackers.
>
And, in the same vein:

- Don't blame the burglar, blame the guy with inadequate alarms.
- Don't blame the murderer, blame the guy who goes out without
  suitable body armor.
- Don't blame the rapist, blame the woman who's "asking for it"...

>Make it so that nothing gets onto any storage hardware in clear text.
>Don't allow anyone to get access to the system without their handy-dandy
>vest pocket gadget.  Don't put anything over any line or cable in
>clear text.  Don't let anybody, ever, get into the system with
>"privileged" access.

Don't walk down the street at night.
Don't answer your door.
Don't answer your phone.
Lock up your daughters...

>----  Then, do as Woz suggests, and pay the
>brightest and best to find holes in the defenses.  And pay rewards
>for being a hacker and learning the next generation of techniques to
>cause problems.  ----  Then DO SOMETHING about the problems, don't let
>another 12 years or so go by with heads buryed.

Why do people seem to think that the advent of computers has liberated
them from moral education?  Electronic crime is still crime.  Would you
papplaud your local police picking up street gang members, and, instead of
punishing them, paying them to teach how to perform assaults?  I agree
that it is important to beef up security... but this "aren't hackers 
cute?" mentality is the MAJOR threat.  Someone who destroys a financial
record should be jailed for robbery.  It's THAT simple.  I don't care
if your tool is a jimmy or a keyboard.  Scum is scum, no matter how
high-tech the pond it's floating atop.
-- 
 ///==\\   (No disclaimer - nobody's listening anyway.)
///        Roger B.A. Klorese, CELERITY (Northeast Area)
\\\        40 Speen St., Framingham, MA 01701  +1 617 872-1552
 \\\==//   celtics!roger@seismo.CSS.GOV - seismo!celtics!roger

roger@celtics.UUCP (Roger B.A. Klorese) (06/22/87)

In article <2318@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
>(It's up to us, who develop tomorrow's technology, to fix what they find.  
>You can't claim somebody is ripping you off if you leave your door wide open.)

You certainly can.  You can't accuse them of illegal entry (and if you post
a warning about illegal entry at login, you CAN accuse them of it if they
stay), but if they steal or destroy anything, they are thieves and vandals,
even if the door was open.
-- 
 ///==\\   (No disclaimer - nobody's listening anyway.)
///        Roger B.A. Klorese, CELERITY (Northeast Area)
\\\        40 Speen St., Framingham, MA 01701  +1 617 872-1552
 \\\==//   celtics!roger@seismo.CSS.GOV - seismo!celtics!roger

roger@celtics.UUCP (Roger B.A. Klorese) (06/22/87)

In article <2318@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
>They didn't go yelling about blue boxes or buying congressmen to make 
>'hurting the phone company' a criminal offense, they fixed the problem.

No, they haven't.  The problem is not that people CAN steal phone service,
but that they DO.  'Hurting' ANYONE already IS a criminal offense.  It's
just that information-age dreamers seem to feel that, if it's magnetic, 
it belongs to the world, and the burden of security is on the owner.  Well,
the burden of morality is on each of us.  Teach these kids morals, teach 
them the rights of property and privacy... then turn them loose.  If they
find that they can get somewhere they shouldn't, teach them that their first 
and only obligation is to report the holes.  Then reward the ones who do,
not because they're caught but because they know it's the right thing to do.

-- 
 ///==\\   (No disclaimer - nobody's listening anyway.)
///        Roger B.A. Klorese, CELERITY (Northeast Area)
\\\        40 Speen St., Framingham, MA 01701  +1 617 872-1552
 \\\==//   celtics!roger@seismo.CSS.GOV - seismo!celtics!roger

sl@van-bc.UUCP (Stuart Lynne) (06/23/87)

In article <497@cblpe.ATT.COM> apc@cblpe.ATT.COM (55212-Alan Curtis) writes:
>In article <2318@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
>>You can't claim somebody
>>is ripping you off if you leave your door wide open.
>>
>
>Why the 'ell not!  It is my stuff inside my house, you know it,
>and I know it.  Just cause I leave my door wide open, is NOT
>a statment of lack of ownership.
>
>Jeez, what is today's society comming to if it can only be considered
>theft if you break through six locks, three alarm systems, kill
>four guard dogs, etc.
>
>Mine is mine, not yours!!!
>
>(I am upset, obviously!)
>-- 

In this case the analogy (metaphor) used is a very poor one.

Walking into someone's house and taking something is theft. It is a
crimininal act. This is because most civilized states pass law's making it so.

Unfortunately "breaking" into a computer system is not covered by these same
laws. Until specific laws are passed making it illegal and criminal it
simply isn't. (Fortunately this is SLOWLY happening!)

Until such time as there are straight forward criminal statutes covering
illegal access to computer services you will only have recourse via a civil
suit against the parties involved.

Some of the differences of civil vs. criminal proceedings do have to do with
how well you have protected yourself. If you don't take reasonable
precautions to prevent people from damaging your property you cannot expect
the courts to do so. As technology improves the amount of protection you
must undertake also increases, simply because it is more reasonable to do
so.

An extreme but related example of this type of suit is the current practice
of the courts to lower awards to accident victims who did not wear their
seat belts (at least in Canada). If the plaintiff was awarded (for example)
$1 million, this will be reduced (for example) by 33% if the court feels
that this is the amount of additional damages that were received due to not
wearing the seat belt.

The bottom line is that you cannot equate (as many people do) the civil and
criminal justice systems. Different principles apply, different precendants
and procedures. For the most part criminal proceedings are largely based on
statute law, civil suits are judged on case or precendant law. And until
something is covered by criminal law your only recourse will be the civil
courts. And they simply operate under different assumptions. Just because
you want it to be against the law doesnt' make it so. And just because it
isn't against the law doesn't mean you can't sue them if the damage your
property.

Aside: The level of proof is often lower in civil suits. While in criminal
actions the must be no uncertainty (because of the harsh remedies), civil
law often only requires preponderance of the evidence. So it may actually be
easier to get a favourable ruling in a civil court where you wouldn't in a
criminal action.





-- 
Stuart Lynne	ihnp4!alberta!ubc-vision!van-bc!sl     Vancouver,BC,604-937-7532

gls@odyssey.UUCP (06/23/87)

In article <345@genesis.UUCP>, andys@genesis.UUCP (a.b.sherman) writes:
> 
> Screw Wozniak and send the bastards to jail.

That's too lenient.  Instead, we'll make them all SYSTEM ADMINISTRATORS!


	"Hey, Rocky!  Watch me pull a UNIX program out of my
	   source directory!"
	"AGAIN?"
	"Nothin' up my sleeve ... PRESTO!"

		IDENTIFICATION DIVISION.
		PROGRAM-ID.  PROCESS-DATA.
		AUTHOR-NAME.  B. J. MOOSE, FROSTBYTE DATA SYS.
		SOURCE-COMPUTER.  IBM-7044.
		OBJECT-COMPUTER.  IBM-7044.
		. . .

	"No doubt about it--I gotta get a new source directory!"
-- 
Col. G. L. Sicherman
...!ihnp4!odyssey!gls

tim@ism780c.UUCP (Tim Smith) (06/23/87)

In article <2757@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
< 
<   Wonder why we have so many security problems at our comp centers -
< read on.

You have so many security problems because you have idiots running
your comp centers.
-- 
Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism780c!tim

tim@ism780c.UUCP (Tim Smith) (06/23/87)

In article <497@cblpe.ATT.COM> apc@cblpe.ATT.COM (55212-Alan Curtis) writes:
< Why the 'ell not!  It is my stuff inside my house, you know it,
< and I know it.  Just cause I leave my door wide open, is NOT
< a statment of lack of ownership.

No, but it is a statement of lack of intelligence.  If I have a computer
with important stuff on it, and if I have a security problem, I would
rather find out about it by having someone break in for fun and tell me
about it rather than by having someone who wants to do damage break in
and destroy things.
-- 
Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism780c!tim

tim@ism780c.UUCP (Tim Smith) (06/23/87)

In article <183@dana.UUCP> worley@dana.UUCP (John Worley) writes:
< 
<     ARGH!!  This is equivalent to suggesting personal armor is the solution
< to violent crime!!  Are victims of muggings, rape, murder, etc., at fault
< because they "bury their heads in the sand" and expect reasonable behavior
< from their fellow humans?!

If you walk through a neighborhood that is known to have a high crime rate,
holding a few thousand-dollar bills visable in your hands, alone, and
you get robbed, I am not going to have much sympathy for you.

There are unreasonable people in the world.  Expecting reasonable behavior
from everyone is ignoring reality, which is rarely a good idea.
-- 
Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism78 +y on 

barmar@think.uucp (Barry Margolin) (06/24/87)

In article <1594@celtics.UUCP> roger@celtics.UUCP (Roger B.A. Klorese) writes:
>  Would you
>papplaud your local police picking up street gang members, and, instead of
>punishing them, paying them to teach how to perform assaults?  

Often the "punishment" for some crimes is community service.  These
gang menbers might be good candidates for teaching self-defense at the
Y.

								I agree
>that it is important to beef up security... but this "aren't hackers 
>cute?" mentality is the MAJOR threat.  Someone who destroys a financial
>record should be jailed for robbery.  It's THAT simple.  I don't care
>if your tool is a jimmy or a keyboard.  Scum is scum, no matter how
>high-tech the pond it's floating atop.

I don't think anyone who destroys financial records will be awarded
one of Woz's scholarship.  The candidates will more likely be the ones
who bring an administrator over to their terminal and say, "All I have
to do is type '...' and your financial records would be ruined;
however, if you had done X I wouldn't be able to do it."

What this discussion needs is another good analogy.  Many techniques
can be used for good and evil.  Locksmithing is an important
profession; isn't Woz's scholarship similar to a locksmith school
giving scholarships to people who have demonstrated talent in picking
locks?  I'm sure most locksmiths and many stage magicians started out
by picking locks.

Yes, there are problems if people with these talents have moral
problems.  I think it was once said that we were lucky that Houdini
never turned to crime, because no handcuffs or prison could hold him.
But if you were looking for someone to put on a show, there was none
finer.

Another analogy: the technology that is used to build nuclear reactors
is the same as that for atomic bombs.  Should the study of nuclear
physics be disallowed because it might be used to destroy the world?

ken@argus.UUCP (Kenneth Ng) (06/24/87)

In article <6677@ism780c.UUCP>, tim@ism780c.UUCP (Tim Smith) writes:
> In article <497@cblpe.ATT.COM> apc@cblpe.ATT.COM (55212-Alan Curtis) writes:
> < Why the 'ell not!  It is my stuff inside my house, you know it,
> < and I know it.  Just cause I leave my door wide open, is NOT
> < a statment of lack of ownership.
> No, but it is a statement of lack of intelligence.  If I have a computer
> with important stuff on it, and if I have a security problem, I would
> rather find out about it by having someone break in for fun and tell me
> about it rather than by having someone who wants to do damage break in
> and destroy things.
> Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism780c!tim

I don't see how this is relevant the hacker scholarships.  A hacker is
one who explores the universe and fixes bugs.  By that very definition
the creeps that go around and destroy systems are no different than
vandels or other common thieves.  Let's get the definiton of 'hacker'
correct.

... This signature was put in in a way to bypass the 
... bogus artificial line limit on the .signature file.
... Also, by its length it adds fodder to help avoid having
... my followups being bounced due to the restriction on
... followup articles.

Kenneth Ng: Post office: NJIT - CCCC, Newark New Jersey  07102
uucp !ihnp4!allegra!bellcore!argus!ken *** NOT ken@bellcore.uucp ***
bitnet(prefered) ken@orion.bitnet

ken@argus.UUCP (Kenneth Ng) (06/24/87)

In article <1594@celtics.UUCP>, roger@celtics.UUCP (Roger B.A. Klorese) writes:
>.. but this "aren't hackers 
> cute?" mentality is the MAJOR threat.  Someone who destroys a financial
> record should be jailed for robbery.

But by definition these people aren't hackers, they are just scum.
The true definition of a hacker is one who explores and *FIXES* problems.

... This signature was put in in a way to bypass the 
... bogus artificial line limit on the .signature file.
... Also, by its length it adds fodder to help avoid having
... my followups being bounced due to the restriction on
... followup articles.

Kenneth Ng: Post office: NJIT - CCCC, Newark New Jersey  07102
uucp !ihnp4!allegra!bellcore!argus!ken *** NOT ken@bellcore.uucp ***
bitnet(prefered) ken@orion.bitnet

dlo@drutx.ATT.COM (OlsonDL) (06/24/87)

[]

In article <871@van-bc.UUCP>, sl@van-bc.UUCP (Stuart Lynne) writes:
> Walking into someone's house and taking something is theft. It is a
> crimininal act. This is because most civilized states pass law's making it so.

> Unfortunately "breaking" into a computer system is not covered by these same
> laws. Until specific laws are passed making it illegal and criminal it
> simply isn't. (Fortunately this is SLOWLY happening!)

Are you sure about that?  My understanding is that it is definately
illegal.  I don't know the details, but I heard that recently someone
was caught breaking into SPRINT and got his butt carted off to jail.

David Olson
..!ihnp4!drutx!dlo

"Eliminate the impossible, my dear doctor, and whatever remains, however
improbable, must be the truth."  -- Sherlock Holmes

atsg@ssc-vax.UUCP (Dennis P. McClure) (06/24/87)

That was worth about 2 cents (or less).

rha@bunker.UUCP (The Minister of Myrth) (06/24/87)

In article <871@van-bc.UUCP> sl@van-bc.UUCP (Stuart Lynne) writes:

>Walking into someone's house and taking something is theft. It is a
>crimininal act. This is because most civilized states pass law's making it so.

>Unfortunately "breaking" into a computer system is not covered by these same
>laws. Until specific laws are passed making it illegal and criminal it
>simply isn't. (Fortunately this is SLOWLY happening!)

>Some of the differences of civil vs. criminal proceedings do have to do with
>how well you have protected yourself. If you don't take reasonable
>precautions to prevent people from damaging your property you cannot expect
>the courts to do so. As technology improves the amount of protection you
>must undertake also increases, simply because it is more reasonable to do
>so.

     If I admit someone into my home and this person walks into my bedroom
while I'm in the bathroom and steals my wife's necklace from her jewelry box,
this person is guilty of larceny.  If my office has no reception area but
someone walks in and takes some files out of my file cabinet without my
consent, that person is guilty of larceny.

     Electronically stored information should be no different from any other
tangible good.  If a computer system has even basic security features and
this security is violated by someone who is not authorized, then this person
should be guilty of either larceny or breaking and entering, whichever is
more applicable to the particular circumstance.

     I defend the Freedom of Information Act with all that I have.  However,
there are normal, accepted channels for acquiring this information.  These
channels DO NOT include hacking.

     ...just one man's opinion.

-- 
                       {yale!,decvax!,philabs!}bunker!rha                    
                            Bob "Such a Deal" Averack                           
                        Bunker Ramo, an Olivetti Company                      
               Two Enterprise Drive - Shelton, Connecticut 06484             

mel1@houxa.UUCP (M.HAAS) (06/25/87)

In article <2240@bunker.UUCP>, rha@bunker.UUCP (The Minister of Myrth) writes:
>      Electronically stored information should be no different from any other
> tangible good.  If a computer system has even basic security features and
> this security is violated by someone who is not authorized, then this person
> should be guilty of either larceny or breaking and entering, whichever is
> more applicable to the particular circumstance.

Here is the statement I agree with.  But, note the operative phrase,
"If a computer system has even basic security features".

The punk who steals your car is a criminal and should be punished.  But,
how about the car maker that sold you the car but didn't supply adequate
locks?  or worse, put in fake locks that looked OK but aren't effective
in keeping the door closed or the ignition inoperative or the steering
locked?

Closer to the point, how about the bank that stores your valuables in
what looks like a vault, but is actually made of plaster?

   Mel Haas  ,  attmail!mel

apc@cblpe.ATT.COM (Alan Curtis) (06/25/87)

In article <4332@drutx.ATT.COM> dlo@drutx.ATT.COM (OlsonDL) writes:
>In article <871@van-bc.UUCP>, sl@van-bc.UUCP (Stuart Lynne) writes:
>> Unfortunately "breaking" into a computer system is not covered by these same
>> laws. Until specific laws are passed making it illegal and criminal it
>> simply isn't. (Fortunately this is SLOWLY happening!)
>
>Are you sure about that?  My understanding is that it is definately
>illegal.  I don't know the details, but I heard that recently someone
>was caught breaking into SPRINT and got his butt carted off to jail.
>

This morning, I was greeted with the following message, from /etc/motd:
(message of the day, for non unix machines/people)
Oh, it has been the motd for about two months, not just today, not
since the dawn of time (You know, back in 1970 :-))

*****************************************************************************
 >>>>                           NOTICE                                  <<<<
 >>>>   This  system  is restricted to  AT&T  authorized users for      <<<<
 >>>>   legitimate AT&T business purposes and is subject to audit.      <<<<
 >>>>   The  unauthorized access, use, or modification of computer      <<<<
 >>>>   systems  or  the  data  contained  therein  or  in transit      <<<<
 >>>>   to/from,is a criminal violation of federal and state laws.	<<<<
*****************************************************************************

Would we lie?
-- 
"Are you sure you won't change your mind?"           | Alan P. Curtis
"Is there something wrong with the one I have?"      | AT&T,BTL,CB
-----------------------------------------------------| apc@cblpe.ATT.COM
Kudos to stargate for redistribution rights          | !cbosgd!cblpe!apc  

gertler@mtuxo.UUCP (D.GERTLER) (06/25/87)

In article <915@argus.UUCP>, ken@argus.UUCP (Kenneth Ng) writes:
> But by definition these people aren't hackers, they are just scum.

Which definition of "scum" are you talking about?

daveb@rtech.UUCP (Dave Brower) (06/25/87)

In article <2240@bunker.UUCP> rha@bunker.UUCP (The Minister of Myrth) writes:
>In article <871@van-bc.UUCP> sl@van-bc.UUCP (Stuart Lynne) writes:
>
>>Walking into someone's house and taking something is theft....
>>This is because most civilized states pass law's making it so...
>
>     If I admit someone into my home and this person walks into my bedroom
>while I'm in the bathroom and steals my wife's necklace from her jewelry box,
>this person is guilty of larceny.  If my office has no reception area but
>someone walks in and takes some files out of my file cabinet without my
>consent, that person is guilty of larceny.
>
>     Electronically stored information should be no different from any other
>tangible good.  If a computer system has even basic security features and
>this security is violated by someone who is not authorized, then this person
>should be guilty of either larceny or breaking and entering, whichever is
>more applicable to the particular circumstance.

Ah, we're talking hypotheticals and analogies.

I have a house and garden next to a city park.  There is no fence
between them, and no 'no trespassing' signs.

* Some people walk in to my garden. Can they be convicted of trespassing?
  (Not likely)  Can I collect civil damages for 'invasion of my space'?
  (I doubt it.).

* Someone reads my tax return that I have left on the picnic table.
  Can they be convicted of any crime?  (I can't think of one).  Can I
  collect any civil damages?  (I can't see why).

* Someone reads a document showing how my company is going to go chapter 7
  next week.  This person shorts a bunch of stock.  Can he be convicted of
  anything?  (Don't know?)  Can I?  (Maybe I'm in trouble with the SEC for
  not adequately protecting sensitive information).

* They cut some roses from my bush.  Can they be convicted for theft?
  (Possibly).  Can I collect civil damages?  (Maybe).

* They smash my Mickey Mouse statue.  Can they be be convicted of
  vandalism, or whatever?  (Probably).  Can collect civil damages?
  (Probably).

* They take my barbecue pit.  Can they be convicted of theft?  (Probably).
  Can I collect civil damages if it is not recovered?  (Possibly).

It seems to make a lot of difference how 'secure' my back yard is from
someone doing reasonable and legal activities.  If the trespassers do only
innocuous actions, it will be difficult for me to collect any civil damages,
since I haven't really been hurt.

Trespassing may or may not be criminal depending on the law and how well
I have held my part of the bargain to deter people from entering.  If
there is no sign and no fence, I may be out of luck.

With the more serious criminal charges, the individuals are probably
culpable because their activity is illegal, period.

As a reasonable man, I cannot expect the law to protect my rights and
property before I suffer harm.  I may hope that the existance of law is
going to deter illegal actions against me, but I cannot assume this will
work.  I can hope that the perpetrators are prosecuted to "the full
extent of the law."

If I want people out of my garden, and don't want my precious Mickey to
be at risk of random vandalism, I had better put up an fence adequate to
the neighborhood. This isn't a question of legality, but of prudence.

The analogies to computer security are clear.  If electronic
tresspassing is illegal (as I think may be the case), I had better put
up whatever 'fences' the law requires for me to fall under it's
protection.  I cannot expect this law to protect my system from illegal
access.

If I want to protect my data from destruction or dissemination, I should
plug whatever holes places them in jeapordy.  I am responsible for it
because it is my data.

I see Jobs' "scholarship" as inviting people to locate potential
problems, in a way that will not greatly endanger the real security of
the the systems in question.  This does not seem cause for
villification.

-dB


-- 
{amdahl, cbosgd, mtxinu, ptsfa, sun}!rtech!daveb daveb@rtech.uucp

gcm@mtgzz.UUCP (g.c.mccoury) (06/26/87)

In article <6674@ism780c.UUCP>, tim@ism780c.UUCP writes:
> In article <2757@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
> < 
> <   Wonder why we have so many security problems at our comp centers -
> < read on.
> 
> You have so many security problems because you have idiots running
> your comp centers.
> -- 
> Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism780c!tim

	I was speaking about comp centers in general - I should have 
made that clear in the initial article(Hacker Scholarship) I posted. 
By the way, on what information do you base your accusations about
the lack of competence of our comp centers employees?? 

/***************************************************************************
*									   *
*      e N			Grover McCoury				   *
*    B     o			ATT Laboratories(?) [was ISL]		   *
*   y       r m a l  ??		...!ihnp4!mtgzz!gcm			   *
*   h									   *
*     W				I refuse to have a battle of wits	   *
*				  with an unarmed person...		   *
*									   *
****************************************************************************/

michael@stb.UUCP (Michael) (06/27/87)

Well, from personal experience, I learned a lot by screwing around. Sometimes
on my system, sometimes on other people system (the security holes were truck
sized). Damage anything? Never. Steal unused cycles? A few.

Belive me, if the people are not ?ssholes, then it does work.
-- 
: Michael Gersten		seismo!scgvaxd!stb!michael
: Monsters from outta space -- 3-11-2

peter@sugar.UUCP (Peter DaSilva) (06/28/87)

In article <532@houxa.UUCP>, mel1@houxa.UUCP (M.HAAS) writes:
> I agree with much of what Andy says, but feel that his anger should
> mostly be directed to the people who consciously allow the hackers
> to do so much damage.  Woz's work was done several generations of
> system software and hardware ago.  The holes were well know then
> and still allowed to exist.  They exist now and are still allowed
> to exist.  Why?  Who makes these decisions?  Why?

The "holes" still exist because the solutions to them usually cause more
problems than the holes themselves do. These solutions all serve to further
distance the user from the computer, and make the computer less of a
useful tool. If Wozniak was really thinking about the situation rather
than mouthing sixties platitudes, then he would realise that if people
took him seriously the situation would worsen.

The United States is a society based on free (that is, unregulated) transfer
of goods and services. Anything that serves to interrupt that hurts the
country. And... you can find and fix loopholes without becoming a cracker.
While I was at Berkeley I discovered a couple of holes in the EECS machine.
Both were minor and temporary, but rather than screwing things up and
encouraging paranoid measures, I plugged them and left mail to someone
responsible.

> The DES algorithm is now quite old, but still not used in computer
> hardware.  Why?

The DES algorithm is used in computer hardware where security is important.
The UNIX password encryption technique is a deliberately mutated version
of the DES algorithm... mutated so that DES chips can't be used in an
exhaustive search of likely name spaces.

> Call back and random password techniques are readily available, but aren't
> used.  Why?

Because they're a pain. People do not like to remember random passwords, and
are more likely to write them down somewhere... which would actually reduce
security. Callback is used where necessary, but most of the time users of
a machine need to be able to call from multiple and unpredictable places.
For example... reporters phoning in a story from a hotel room.

> Data communication protocols are well into the standards making procedure,
> but don't include encryption capabilities.  Why?

Because it's neither a necessary nor sufficient technique. It's not necessary
because you can always encrpt your data at a higher level, and it's not
sufficient because all systems still have to have the keys. If security is
broken at one site and the key is discovered you will now be completely
open... while still thinking you're secure. On the other hand individual
files and parts of files canm be encrypted using a key that's not even
stored permanently online *anywhere*.

> Our computer systems can be designed to be reliable and fault tolerant, but
> still require "superuser" gurus to administer them.  Why?

Because the set of things that can go wrong is larger than the set of things
that can be predicted to go wrong, and because a human is still cheaper than
a 500 megabyte AI system.

> I think the damage is being done by the people who bury their heads
> in the sand and foist these security horrors onto the public, not
> the college kid hackers.

While you didn't mean that the way I would, I'd have to agree with you. The
damage is being done by the people who want to foist excessive security
measures onto the public.

> Make it so that nothing gets onto any storage hardware in clear text.
> Don't allow anyone to get access to the system without their handy-dandy
> vest pocket gadget.  Don't put anything over any line or cable in
> clear text.  Don't let anybody, ever, get into the system with
> "privileged" access.

There are systems that do this. They tend to be slow, cumbersome to use, and
at Government sites.

> ----  Then, do as Woz suggests, and pay the brightest and best to find holes
> in the defenses.

This is also done. Have you ever heard of the Navy's "Tiger Teams"?

> And pay rewards for being a hacker and learning the next generation of
> techniques to cause problems.

Pay rewards for reporting problems, not for taking advantage of them... and
don't pay so much that you divert too many resources into security. A
computer is primarily a tool, not a place to play "wheel wars".

> ----  Then DO SOMETHING about the problems, don't let another 12 years or
> so go by with heads buryed.

That's "buried". Before you do something about the problem, make sure it's
costing you more than the solution. Shoplifting could be solved by doing strip-
searches of all customers before they leave the store, but it would probably
not turn out to be a wise investment.

>    Mel Haas  ,  odyssey!mel
-- 
-- Peter da Silva `-_-' ...!seismo!soma!uhnix1!sugar!peter (I said, NO PHOTOS!)
-- 
-- Peter da Silva `-_-' ...!seismo!soma!uhnix1!sugar!peter (I said, NO PHOTOS!)

robertl@killer.UUCP (Robert Lord) (06/28/87)

Look..There has ben alot of talk floating around about hackers and such
beeing 'scum' and other derogatory types of life.  90% of hackers are just
computer buffs who have no other way of getting computer time.  They have
there Apple //e's with thier modems, and they want to expand and learn more.
How do you expect them to do this?  Go to there scholl where they can teach
the teacher, and have the same computers as thsi little hacker does at home?
Naturally, the hacker goes looking for bigger and better systems to play
with, and along the line learns about security flaws to get accses.  Also,
occasionally, he will make a mistake and wipe out some data..I agree this
is unexcusible, but there should have been more security on the system.  I
speak from experiance when I say that there are less that 1,000 real 'hackers'
out there, that only hack to learn, and know how to take down a system but 
never do.  The rest of the so called hackers are just rodents who think there
cool by hacking, and at the first chance they have will nuke a system.  There
are bulletin boards all over the country catering to these people, and there
is a close nit community for the real hackers.  I should know, I've been there.
I was once in the not too distant past a 'real hacker'.  How do you think
I learned all that I know? (well, you don't know how much I know...oh well).
My speciallty was unix systems, ans I can tell you right now a few easy steps
to make your system less vunerable.

  1) PUT PASSWORDS on you system!!!! Noone does this, and it makes it easy.
     I have gotten into systems that were connected up to a modem, and
     no password on the root account!

  2) Protect your uucp network.  Most system administrators think the uucp
     account is not important, so they don't protect it.  Well, I have news
     for you, it is very important if you belong to a network.  Once I
     broke into one system, that lead to a whole slew of unix computers
     around the country.  A friend of mine and I broke into every one of them!

  3) Protect your information!  Many systems have mail that is readable
     by everyone.  Most of the audit files (such as the modem logs) are
     writeable by everyone, so if I used the 'cu' command to call a few
     other comuters I could just edit the audit files...Not smart!

These are a few of the major points of security, and they run rampent on
almost all systems around the world.  Your first line of defense are the
passwords.  Make sure every one on your system has a password, otherwise
it is fairly simple to get accses to the system.  If the hacker only
has one account, all he has to do is to look at the /etc/passwd file and
get at least 3-4 more accounts without a pass.  Also, make sure you
backup your system reguarly (like a full backup once a week...archive it
every day).  This will prevent major damage in case a rodent decidedes to
try and take out your system.
    If you are setting up a new system, then give one of your friendly
unix gurus a call, and he will be happy to help you with the security of your
system.
    In summary....Really, the real hackers are nice people (take me for an
example).  They don't try to hurt systems, but infact are just trying to
learn everything they can about something they love - Computers.


              Robert Lord, Hacker Extrodinare (retired)
                       ihnp4!killer!robertl

P.S. I retired for a few reasons...Namely it got boring.  I decided to go into
     comercial programing...and am dooing pretty well considering I'm still
     in high school.
 

jdia@osiris.UUCP (Josh Diamond) (06/29/87)

In article <1594@celtics.UUCP>, roger@celtics.UUCP (Roger B.A. Klorese) writes:
> ...
> Why do people seem to think that the advent of computers has liberated
> them from moral education?  Electronic crime is still crime.  Would you
> papplaud your local police picking up street gang members, and, instead of
> punishing them, paying them to teach how to perform assaults?  I agree
> that it is important to beef up security... but this "aren't hackers 
> cute?" mentality is the MAJOR threat.  Someone who destroys a financial
> record should be jailed for robbery.  It's THAT simple.  I don't care
> if your tool is a jimmy or a keyboard.  Scum is scum, no matter how
> high-tech the pond it's floating atop.

I seem to recall that there was an episode of Max Headroom where someone
describes computer/credit fraud as being "worse than murder".

There also was a story written by Isaac Asimov (I think) about someone
in a ultra-computerized society who commited computer fraud.  His punishment
was to be prevented to from using a computer for a year.  He was conditioned
psychologically to vomit every time he ouched a computer device of any type.

I my opinion, a little of all aspects of protection is necessary.  A
combination of stiffer penalties for computer fraud/vandalism/theft, strong
education on the fact that these actions are immoral (or at least illegal --
no flames about "morality" please), and better security procedures.

With regards to maintaining better security procedures, these could include
(but in no means be limited to) the following ideas:

1) Distribution of random letter combination privaledged passwords at random
   intervals through secure communication channels.
2) Forcing users to change their passwords regularly.
3) Callback systems to verify the system is being accessed from a known
   terminal.
4) Implementation of a key card system, in which the user must insert his/her
   card into a slot in the terminal so that it can be read and verified.
   Login name and password would still be required, but this would help
   prevent users from looking over someones shoulder to find out their
   password and get onto the system. (I believe that IBM already implemented
   a system like this as an option on their 3270 series terminals).
5) Use of encryption systems (RSA public key preferably) for communication and
   storage of private data/messages.
6) Keep accurate accounting files tracking all commands/system calls executed.
7) Make sure that all acounts autologout after a relatively short period
   of idle time (perhaps send a warning message after 30 seconds idle time,
   then autologout if still no key hit within 30 seconds).  This would prevent
   the "root forgot to log out and left an open terminal as superuser" problem.


At one system that I know of, new student and faculty user id's are posted in
the computer center.  The initial password is always the person's social 
security number.  There are always those users who never change their 
passwords, leaving a gaping hole in security.  There are others who never 
use their account, leaving it open to anyone who takes the time to figure
out the users social security number (not very difficult at a university
where SS# doubles as school id number).


					Spidey!




-- 
DON'T PANIC!!!                                          /\ Josh /\   At last! a
                                                       //\\ .. //\\  spider that
A message from Spidey, and the Spidey Team.  ----->>>  //\((  ))/\\  looks like
Available via UUCP: ...[seismo,mimsy]!jhu!osiris!jdia  /  < `' >  \  a spider!

rem@remsit.UUCP (Roger Murray) (06/30/87)

In article <1610@stb.UUCP>, michael@stb.UUCP (Michael) writes:
> Well, from personal experience, I learned a lot by screwing around. Sometimes
> on my system, sometimes on other people system (the security holes were truck
> sized). Damage anything? Never. Steal unused cycles? A few.
> 
> Belive me, if the people are not ?ssholes, then it does work.

For example, when Michael was running his BBS on his TRS-80 Model I, we would
spend hours thinking of ways of getting into BASIC, modifying the program, etc.
They ranged from the very basic (password hacking, etc) to the very complex
(replacing SYS files, replacing the RS232 driver, sending a stream of ^S's).
But every time we managed to do something, we told him.  Well, there was that
one time..... :-)

Now it's running on a Model 16.  Streams of ^S's don't do it anymore, but wait
till he gets a load of the new /xenix I installed!  :-) :-) :-)

Enter your name (or handle)? BASIC/CMD
...
Delete this? Y

Ah, those were the days!
-- 
Roger Murray

UUCP: ...!{ihnp4,randvax,sdcrdcf,ucbvax}!ucla-cs!cepu!ucla-an!remsit!rem
ARPA: cepu!ucla-an!remsit!rem@LOCUS.UCLA.EDU

worley@dana.UUCP (John Worley) (06/30/87)

daveb@rtech writes:

> Ah, we're talking hypotheticals and analogies.
> 
> I have a house and garden next to a city park.  There is no fence
> between them, and no 'no trespassing' signs.

    Your analogy is already faulty.  The "fence" here is the phone number you
must dial to get access to the computer in the first place.  Like a good fence,
it requires a positive action to "cross".  The "lock" or "no trepassing" sign
is played by the login routine, which normally requires the user to identify
himself/herself and supply a secret comfirmation code (password).

    So, by dailing up and logging in, the security breaker has overcome three
explicit and unavoidable barriers.  Further, he/she has misrepresented himself/
herself to the system to gain unauthorized access.

	[ Scenarios of "if they ... can I" deleted ]

> 
> The analogies to computer security are clear.  If electronic
> tresspassing is illegal (as I think may be the case), I had better put
> up whatever 'fences' the law requires for me to fall under it's
> protection.  I cannot expect this law to protect my system from illegal
> access.
> 

    Ref. above - the 'fences' are already there.  The intent of the system
owner is clear, as is the intent of the electronic tresspasser.

> If I want to protect my data from destruction or dissemination, I should
> plug whatever holes places them in jeapordy.  I am responsible for it
> because it is my data.

    For every lock ever built, there is a way to open it w/o the proper key.
It is irrelevant that the lock can be picked, or even that the method to do so
is well known.  By locking your garage, house, car, bike, you have proven your
intent to secure your possesion against unauthorized use; by overcoming the
lock, no matter how simple, the thief has demonstrated his/her intent to
violate your property.

> I see Jobs' "scholarship" as inviting people to locate potential
> problems, in a way that will not greatly endanger the real security of
> the the systems in question.  This does not seem cause for
> villification.

    It's Wozniak, not Jobs.

    I see his scholarship as an attempt to legitimize the criminal activity
of breaking system security.  If a computer house wants to test its security,
it will authorize someone to try.  Abetting, yes even financing, a criminal
action is certainly cause for vilification, especially for someone of Steve
Wozniak's position of community leader - a position now in great doubt in my
mind.

						John Worley
						hplabs!dana!worley

edw@ius2.cs.cmu.edu (Eddie Wyatt) (06/30/87)

In article <1226@osiris.UUCP>, jdia@osiris.UUCP (Josh Diamond) writes:
> 
> I my opinion, a little of all aspects of protection is necessary.  A
> combination of stiffer penalties for computer fraud/vandalism/theft, strong
> education on the fact that these actions are immoral (or at least illegal --
> no flames about "morality" please), and better security procedures.

     You have to be able to catch them first. Not a simple problem.

> 
> With regards to maintaining better security procedures, these could include
> (but in no means be limited to) the following ideas:
> 
> 1) Distribution of random letter combination privaledged passwords at random
>    intervals through secure communication channels.
> 2) Forcing users to change their passwords regularly.
> 3) Callback systems to verify the system is being accessed from a known
>    terminal.
> 4) Implementation of a key card system, in which the user must insert his/her
>    card into a slot in the terminal so that it can be read and verified.
>    Login name and password would still be required, but this would help
>    prevent users from looking over someones shoulder to find out their
>    password and get onto the system. (I believe that IBM already implemented
>    a system like this as an option on their 3270 series terminals).
> 5) Use of encryption systems (RSA public key preferably) for communication and
>    storage of private data/messages.
> 6) Keep accurate accounting files tracking all commands/system calls executed.
> 7) Make sure that all acounts autologout after a relatively short period
>    of idle time (perhaps send a warning message after 30 seconds idle time,
>    then autologout if still no key hit within 30 seconds).  This would prevent
>    the "root forgot to log out and left an open terminal as superuser" problem.
> 
> 					Spidey!
> 
> 
> 
> 
> -- 
> DON'T PANIC!!!                                          /\ Josh /\   At last! a
>                                                        //\\ .. //\\  spider that
> A message from Spidey, and the Spidey Team.  ----->>>  //\((  ))/\\  looks like
> Available via UUCP: ...[seismo,mimsy]!jhu!osiris!jdia  /  < `' >  \  a spider!


1)  Not really save.  If someone knows what the procedure is then 
    they will be able to use the passwords.

2)  If you force users to  change their passwords regularly then - 1. you'll
    have your users forgetting their passwords regularly, 2. have a less
    friendly system, 3 probably have the user cycle between two different
    passwords.

3)  Is only as safe as the phone lines.  If you have broken Ma'bell, you could
    probably fool this mechanism.

4)  This is only as safe as an extra password.  At some level this will
    get turned into a bit stream.

5) Isn't one of the problems with data encryption for communications, the
   fact that the both systems have to agree on the key?  And hence the key
   must be transmitted.

6) is easy to break, what if someone writes this loop -

	while (1) logged_system_call();

    when the log file is filled (ie. no more disk space) does your system
    come to a grinding halt or do you truncate the log file. Either
    solution is unexpectable.

7) easy to fool, plus makes the system very unfriendly.  You'll find users
   writing little programs like

	while (1) { printf("Hello\n"); sleep(29); }

   Theses are a start though and will help keep the novice from doing damage,
but if someone wants to get onto your system, I'm sure they'll find away
around those security  measures.

-- 
					Eddie Wyatt

e-mail: edw@ius2.cs.cmu.edu

terrorist, cryptography, DES, drugs, cipher, secret, decode, NSA, CIA, NRO.

davidsen@steinmetz.steinmetz.UUCP (William E. Davidsen Jr) (06/30/87)

In article <1226@osiris.UUCP> jdia@osiris.UUCP (Josh Diamond) writes:
>...
>There also was a story written by Isaac Asimov (I think) about someone
>in a ultra-computerized society who commited computer fraud.  His punishment
>was to be prevented to from using a computer for a year.  He was conditioned
>psychologically to vomit every time he ouched a computer device of any type.
>
Several members of my family feel that way. Could they have been
convicted of computer crime?
-- 
	bill davidsen		(wedu@ge-crd.arpa)
  {chinet | philabs | sesimo}!steinmetz!crdos1!davidsen
"Stupidity, like virtue, is its own reward" -me

dougs@sequent.UUCP (Doug Schwartz) (07/01/87)

In article <4332@drutx.ATT.COM>, dlo@drutx.ATT.COM (OlsonDL) writes:
> I don't know the details, but I heard that recently someone
> was caught breaking into SPRINT and got his butt carted off to jail.

I believe the charge was "theft of services", analagous to tapping into HBO
and not paying for the service.

Doug Schwartz
Sequent Computer
...!tektronix!ogcvax!sequent!dougs

forys@sigi.Colorado.EDU (Jeff Forys) (07/01/87)

In article <2780@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
>>In article <2757@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
>>   Wonder why we have so many security problems at our comp centers -
>
> I was speaking about comp centers in general - I should have 
> made that clear in the initial article (Hacker Scholarship) I posted.

I work for the Computer Center at the University of Colorado @ Boulder.
I am also an indirect beneficiary of the Wozniak Scholarship.  I receive
one of these `hacker's to delegate some of my workload to and, in return,
the `hacker' has an excellent opportunity to learn.  In retrospect, I was
lucky enough to get the same breaks when I was younger...

The term `hacker', as used here, is a person who is seriously interested
in learning more about computers as opposed to "just knowing enough to
get by".  Perhaps this is what some people are afraid of, I dont know.
Anyways, to be selected, they must have a `decent' GPA and have some
"special quality" (loosely defined by an *equally* special selection
committee).  In answer to your question, our group is looking forward
to their arrival.  I myself, will probably learn a couple things too,
uh, but dont tell anyone that...  :-)
---
Jeff Forys @ UC/Boulder Engineering Research Comp Cntr (303-492-4991)
forys@Boulder.Colorado.EDU  -or-  ..!{hao|nbires}!boulder!forys

msf@amelia (Michael S. Fischbein) (07/03/87)

One point that no one seems to have brought up yet in this discussion is
the "attractive nuisance" laws.  As I understand them (ie, my nodding
acquaintance with the topic), some items (such as a swimming pool) are
"attractive nuisances" and it is the owner's responsibility to set up
security measures (such as a fence to prevent the local toddlers from
drowning).

Given the current state of US culture (no pro or con arguments, just
let it be there), maintaining a computer system without minimal
security is certainly an attraction, both to the irresponsible
`crackers' and the curious 'hackers'.  Extending this sort of
opportunity might even be contributing to the delinquency of a minor,
or something.

No, people should not have to triple lock their doors, hire armed
guards, etc.  But bank vaults should.  Not all computers need call
back modems, multiple encryption schemes, etc.  But some do.  If you
leave your door open and someone steals your stereo, you were not
quite brilliant for leaving it open, but the thief is just that, a
thief.  If you leave your stereo on the curb and someone picks it up
thinking you are throwing it away, what then?  How about if you leave
it in a public area, unsecured, for several days?

Computer breakins are just a phone call away -- if someone calls your
home phone and you don't want to talk to them, are they stealing your
telephone access?  If so, what sort of penalty should be imposed?  How
does this impact direct telephone marketers?  If someone calls your
computer, that you want to keep secure, and you don't have at least a
non-well-known account/password combination, you have left your data
in a public place (the telephone exchange) without even a sign on it
that says "mine."  There is a big difference between someone tapping a
phone or committing b&e to get a password to enter a nominally secure
system and someone who connects to a modem tone and gets "Welcome to
the Whizzo Co orders database" without being asked for id.  I don't
know of any multi-user computer system capable of remote access that
doesn't offer that level of security for free.  Yes, it requires a
system administrator with an IQ > 50.  Yes, it can be broken in
several ways, depending on the specific system.  But if you park your
car with the window down and the engine running, it may get stolen.
Lock it, it might still be stolen but the chances are less -- and
there is next to no chance that it will be stolen on a lark, by
someone out for a joyride rather than profit.

		mike

(maybe I should have said LaRC? :-))

edw@ius2.cs.cmu.edu (Eddie Wyatt) (07/04/87)

In article <2231@ames.arpa>, msf@amelia (Michael S. Fischbein) writes:

> One point that no one seems to have brought up yet in this discussion is
> the "attractive nuisance" laws.  As I understand them (ie, my nodding
> acquaintance with the topic), some items (such as a swimming pool) are
> "attractive nuisances" and it is the owner's responsibility to set up
> security measures (such as a fence to prevent the local toddlers from
> drowning)

  Attractive nuisance laws where made to protect people from hazardous areas
that are readily accessable to the public.  In the case of a pool, you are
require to put up a fence around it even though it is your own property because
any child could accidently fall into the pool.   Instead you having
the owner of the pool put the blame on the child for trespassing, the
blame is on the owner of the pool for not taking some sort of protective
measure.

  I do not see why attractive nuisance laws extend here since the
aim of the law was not to put the blame on the victum of a crime
because he didn't protect himself, but to have people exercise
more caution in instances where OTHERS MAY BE INDANGERED (in the above
example the pool owner was a victum of trespassing).

   This is not the case with publicly accessable computers.  No one
is physically or mentally at wrisk by there existance!


> Given the current state of US culture (no pro or con arguments, just
> let it be there), maintaining a computer system without minimal
> security is certainly an attraction, both to the irresponsible
> `crackers' and the curious 'hackers'.  Extending this sort of
> opportunity might even be contributing to the delinquency of a minor,
> or something.

  The analogy you are trying to draw generizes to , if you are a victum 
of property crime then its not the fault of the criminal, its your  fault,
you were temping him too much.  That is  unless you can show you've excessively
protected yourself.  If not, show me where your attitude differs.

> If you leave your stereo on the curb and someone picks it up
> thinking you are throwing it away, what then?  How about if you leave
> it in a public area, unsecured, for several days?

  He is guilty of theft.  He would be guilty of theft even if he was taking out
of your garbage.  If you find property, you are legally responsible for
reporting it to the police.  If no one claims it after n number of days, they
may give it to you. As simple as that.  Are you advocating - finders keeper,
loosers weepers?

[a lot of bad analogies]

  Lets consider all of us adopt your policies, which I'm intepreting as :
computer owners must take preventive measures to protect access to their
computers, otherwise hackers that invade their system would not be consider
responsible for their actions.

   I have a hacker trash my disk system and he is caught.  What do I have
to do to show that I was not negliable in protecting my system?

> 		mike
> 
> (maybe I should have said LaRC? :-))

-- 
					Eddie Wyatt

e-mail: edw@ius2.cs.cmu.edu

terrorist, cryptography, DES, drugs, cipher, secret, decode, NSA, CIA, NRO.

ken@rochester.arpa (Ken Yap) (07/05/87)

|	case 1. (Source OS class)  Linear password decomposition algorithm.
|
|	Two very interesting utilities in a certain unknown OS combined to
|	provide a technique of decoding any password in linear time respective
|	of the length of the password.  The utilities were a facility
|	for determining when a page fault occurred in a application
|	program so that the user could finely tune a program preformance
|	and the other happened to be the password untility and the way
|	in which it was coded.  The password function read in a character
|	at a time and compared it to the system password.  If the given
|	character didn't match, the password function would jump to another
| 	place in the program causing a page fault, then continue reading the
|	rest of the password.  One can obviously see how the method
|	works.  Type in a character, see if there is a page fault.
|	If so, start again with new character else look for next 
|	character in password.  The fix to the problem is also obvious,
|	that is read the whole password before testing to see if it
|	matches the system password.

This is described in Hints for System Designers by Butler Lampson.

	Ken

tim@ism780c.UUCP (Tim Smith) (07/07/87)

In article <2780@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
< In article <6674@ism780c.UUCP>, tim@ism780c.UUCP writes:
< > In article <2757@mtgzz.UUCP> gcm@mtgzz.UUCP (g.c.mccoury) writes:
< > <   Wonder why we have so many security problems at our comp centers -
< > < read on.
< > You have so many security problems because you have idiots running
< > your comp centers.
< 	I was speaking about comp centers in general - I should have 
< made that clear in the initial article(Hacker Scholarship) I posted. 
< By the way, on what information do you base your accusations about
< the lack of competence of our comp centers employees?? 

It was clear that you were talking about comp centers in general.
My answer was about comp centers in general.  Since you used "we"
to refer to comp centers in general, it seemed appropriate to
use "you" to respond.  I wasn't talking about your specific comp
center.
-- 
Tim Smith, Knowledgian		{sdcrdcf,seismo}!ism780c!tim

batie@agora.UUCP (Alan Batie) (07/08/87)

In article <1063@killer.UUCP> robertl@killer.UUCP (Robert Lord) writes:
>
>
>Look..There has ben alot of talk floating around about hackers and such
>beeing 'scum' and other derogatory types of life.  90% of hackers are just
>computer buffs who have no other way of getting computer time.  They have
>there Apple //e's with thier modems, and they want to expand and learn more.
>How do you expect them to do this?  Go to there scholl where they can teach
>the teacher, and have the same computers as thsi little hacker does at home?

This is a bad argument for two reasons:

1.  It's no justification.  I present the time honored analogy of stealing
(actually "joyriding") a car: "I don't have any way of getting there, so
I'll use this here car (gee, they even left the keys in it, but it would
have been easy to hot wire anyhow).  It's the middle of the night, and the
owner isn't using it now; I'll have it back by morning -- he'll never know
I used it.  I'll learn more about driving in the process, and well, if I
wreck it, gee, I'm so sorry."

Most people I know would be upset if someone did this.

2.  It's false.  There are public access Unix systems all over the place
now where one can get free access to do everything you're trying to accomplish
(except cracking the system).  I run one myself (agora, 503-640-4262) --
there's absolutely no need to crack a system to expand your horizons, unless
you're such a twit that no one will give you an account (and I doubt that).
-- 
Alan Batie
batie@agora
tektronix!reed!percival!agora!batie

biff@nuchat.UUCP (Brad Daniels) (07/11/87)

In article <2240@bunker.UUCP>, rha@bunker.UUCP (The Minister of Myrth) writes:
>      Electronically stored information should be no different from any other
> tangible good.  If a computer system has even basic security features and
> this security is violated by someone who is not authorized, then this person
> should be guilty of either larceny or breaking and entering, whichever is
> more applicable to the particular circumstance.

I don't think this is an accurate assessment.  You could possibly argue that
breaking into a computer system (with or without security) is the moral
equivalent of breaking and entering or maybe trespassing, but the fact
remains that that is not what the person is actually doing.  Nobody is
physically entering your property or breaking your locks.

Similarly, "stealing" information is not strictly "stealing"....  If
you leave me alone in your office and leave confidential information
where I can get at it, and then I take pictures of that information
to look at later, I am hardly stealing anything.  You would still have
the information, but I would now have it also.  Granted, it seems
that there is something morally wrong with doing such things, but
it certainly doesn't qualify as larceny.

I agree that some methods of obtaining information are acceptable,
while others aren't.  I certainly do not want people randomly
invading computers and discovering information which I would prefer
to keep confidential.  However, the information is not a "tangible
good."  The person obtaining the information can and should only
be punished if a law was broken in obtaining the information.  I
firmly believe that unauthorized possession of confidential infor-
mation should not constitute a crime.

As for the issue of accessing computers without authorization, I
agree that there should be some law against it.  I do not, however,
believe that it is breaking and entering.

what I am trying to say is that the issue is not at all cut-and-dried.
Should we treat a kid who just wants to see if he can get into a real
computer the same as we treat a professional thief who is trying to
make a companies computer mail him money?  At present, people can only
be punished if they commit a crime (such as toll fraud, embezzlement,
etc.) when they break into a system.  Perhaps that is how things should
remain.

			- Brad
-- 
Brad Daniels				...!soma!eyeball!biff
Now that I have my own account,		biff@tethys.rice.edu
I don't	NEED a disclaimer.		...!uhnix1!nuchat!biff

karl@ddsw1.UUCP (Karl Denninger) (07/15/87)

In article <555@agora.UUCP>, batie@agora.UUCP (Alan Batie) writes:
> In article <1063@killer.UUCP> robertl@killer.UUCP (Robert Lord) writes:
> > (Dissertation comparing hacking to joyriding deleted)
> >
> 2.  It's false.  There are public access Unix systems all over the place
> now where one can get free access to do everything you're trying to accomplish
> (except cracking the system).  I run one myself (agora, 503-640-4262) --
> there's absolutely no need to crack a system to expand your horizons, unless
> you're such a twit that no one will give you an account (and I doubt that).
> -- 

True -- in the Chicago area, there are at least five public-access Unix
systems I know of, and probably a few I don't know about. Nice, inexpensive
systems like the 7300 and Microport's proliferation have been largely
responsible for this (heck, we run it here).

We permit public access to our system (in a limited manner). Some other
sites are much more open than we are (although they do not have the diverse
choice of facilities and software available that we do). Also, gaining what
essentially amounts to full access here requires only a modest contribution
to help us maintain our phone lines, etc.... 

In short -- you want to learn Unix, learn. If you're going to hack (be
destructive and/or invasive), you're way out of line.

(Modem number below is public access line)

-- 

Karl Denninger				UUCP : ...ihnp4!ddsw1!karl
Macro Computer Solutions		Dial : +1 (312) 566-8909 (300-1200)
"Quality solutions at a fair price"	Voice: +1 (312) 566-8910 (24 hrs)

elg@killer.UUCP (Eric Green) (07/18/87)

in article <225@ddsw1.UUCP>, karl@ddsw1.UUCP (Karl Denninger) says:
> In article <555@agora.UUCP>, batie@agora.UUCP (Alan Batie) writes:
>> In article <1063@killer.UUCP> robertl@killer.UUCP (Robert Lord) writes:
>> > (Dissertation comparing hacking to joyriding deleted)
>> >
>> 2.  It's false.  There are public access Unix systems all over the place
>> now where one can get free access to do everything you're trying to accomplish
>> (except cracking the system).  I run one myself (agora, 503-640-4262) --
>> there's absolutely no need to crack a system to expand your horizons, unless
>> you're such a twit that no one will give you an account (and I doubt that).
>> -- 
> 
> True -- in the Chicago area, there are at least five public-access Unix
> systems I know of, and probably a few I don't know about. Nice, inexpensive
> systems like the 7300 and Microport's proliferation have been largely
> responsible for this (heck, we run it here).

Free public-access systems are a recent innovation, driven by the declining
price of hardware. Until recently, the only available public access systems
were "for-pay" systems like Compuserve or The Source, due to the high cost of
the necessary hardware.  For example, a friend has some '70s vintage 80-meg
hard drives designed for a DEC minicomputer... the size of a washing machine,
consumes 1000 watts of power. Cost probably in the 10s of thousands originally
(altho he didn't pay that much, of course, since it was being scrapped... he's
STILL trying to figure out what he's going to do with those three PDP-8's that
he salvaged!). Needless to say, if you've got 10 or 15 of those on-line, you
have a pretty hefty A/C system, and a lot of free space (like,
WASHATERIA-size!). Ain't no way someone would run such a system as a hobby.

Nowadays, I could get an 80 meg drive for a Pee-Cee for $900 (and the AT clone
with Microport Unix for less than $3,000).

I would venture to say that for-pay on-line systems are the most common
victims of "hacking" (in the news-media sense of the word, not in MY sense of
the word!). For example, one popular gambit on Quantum Link (a Commodore
on-line system) is for people to log on with a forged certificate number and
fake credit card number... a month later, the account is deleted, upon which
they log in under yet another forged number....

Also needless to say, until the recent proliferation of powerful
microcomputers such as the Commodore Amiga, or the IBM AT clone running
Microport, the only way that a high schooler could get access to a "real"
system would be to get it illegally. Most schools still have an Apple ][ as
their most powerful computer (suburban schools, that is -- inner-city schools
don't have computers, because they don't have enough money, because school
systems are funded by sick racists).  What would YOU say if you're Joe Public,
and your kid says "Hi, Dad, I'd like you to give me $400/month to use The
Source, so I can learn how to program"? 
   Hell, most people won't even give their kids money to buy programming books
or any OTHER educational book! I can't count the number of times that I've
answered chat on my BBS, to find it's a kid asking simple programming
questions... and when I recommend that they get some particular book (e.g., if
they're trying to program in assembler, the SAMS book _C-64 Assembly Language
Programming_), "uh, how much is it?  I don't have the money right now..." and
when I tell'em "why don't you ask your parents, they'll probably be glad that
you want to learn something" but usually their parent's answer is "no! Now go
back to your room, I don't want to be bothered with miserable little snivelly
kids underfoot while I'm watching nighttime soap operas!". It's amazing how
little time and money that most modern parents spend on their children's
growth, development, and education... usually, "here, here's $400 worth of
toys, get to your room out of sight because I don't want to be bothered with
the sight of you while I'm conspicuously consuming." (cut to boxed C-64 with
1541 and disk drive and modem). 

--
Eric Green   elg%usl.CSNET     Ron Headrest: A President
{cbosgd,ihnp4}!killer!elg      for the Electronic Age!
Snail Mail P.O. Box 92191      
Lafayette, LA 70509            BBS phone #: 318-984-3854  300/12 fli fli