[alt.society.cu-digest] C-u-D, #2.09

TK0JUT2%NIU.BITNET@UICVM.uic.edu (10/27/90)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 2, Issue #2.09 (October 27, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may be reprinted as long as the source is
cited.  It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS:
File 1: Moderators' Corner
File 2: Len Rose Arrest
File 3: Mars was not "Censored"
File 4: Response to Mars "Censoring"
File 5: Steve Jackson Games (SJG) Update
File 6: The Future of Hacking and the System Security Profession
File 7: The Ultimate Interface: Hackers and the Private Sector
File 8: CU in the News: "Hackers" and Bank Blackmail in England

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #2.09, File 1 of 8: Moderator's corner                  ***
********************************************************************

From:      Moderators
Subject:   Moderators' Corner
Date:      October 27, 1990

++++++++++
In this file:
1. COPYRIGHT ARTICLE INFORMATION
2. BIBLIOGRAPHIC RESOURCES

+++++++++++++++
Copyright Article Information
+++++++++++++++

CuD is *NOT* copyright, and articles by moderators, anonymous articles, and
other articles may be reprinted as long as the source is attributed.
However, occasionally an individual article is copyright protected. The
article in CuD 2.08 by Jim Warren on "PCs and Political Organizing" is an
example of a submission that is copyprotected but remains freely available
for others' use. We have heard horror tales of authors who make public
posts and then later find their material plagiarized and copyright
protected under another's name. So, do not copyright others' material as
your own. That's tacky--very, very tacky.  If a CuD article is listed as
copyright (this notice was excluded from Jim Warren's article), you should
check directly with that author (not CuD) for permission to reprint it.

++++++++++++++++++
Bibliographic Resources
+++++++++++++++++++

We are trying to compile a list of bibliographic sources related to the CU
to eventually place in the archives. If you are writing term paper,
conference papers, or articles, or if you come across books, legal cases,
or other references that seem relevant, send the full citation over to us.
If you come across new books, or better, if you do a book review, send the
titles or the review along as well.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:      Moderators
Subject:   Len Rose Arrest
Date:      October 26, 1990

********************************************************************
***  CuD #2.09: File 2 of 8: Len Rose Arrest                     ***
********************************************************************

Len Rose was arrested on state charges of "computer tampering" in
Naperville, Ill., Naperville police confirmed Monday night. Len obtained
a job at Interactive Systems Corporation, a software consulting firm, in
Naperville and began Monday, October 15. Friday, he was fired.  Bail was
initially set at $50,000, and as of late Friday afternoon, he remained
in jail.

Len's wife speaks little English and is stuck in Naperville, lacking both
friends and resources. Len currently has no money to post bond, and this
leaves he and his family in a dreadful situation.

We caution readers to remember that, under our Constitution, Len is
*innocent* unless proven otherwise, but there is something quite
troublesome about this affair.  Hopefully, we'll soon learn what specific
charges and what evidence led to those charges. Even if a "worst case"
scenario evolves, there are surely better ways to handle such cases in less
intrusive and devastating ways.  Devastated lives and full invocation of
the CJ process are simply not cost effective for handling these types of
situations.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Gene Spafford <spaf@CS.PURDUE.EDU>
Subject: Mars was not "Censored"
Date: Sat, 20 Oct 90 14:11:52 EST

********************************************************************
***  CuD #2.09: File 3 of 8: Mars was not "Censored"             ***
********************************************************************

I'm against censorship in pretty much any guise.  I'm opposed to people who
try to have gif images pulled from sites soley because of their
sexually-oriented content.

However, if I were running a news site, I would not carry the current
alt.sex.pictures newsgroup, nor would I have an archive of the images.

This is not a contradiction in terms.

First off, I am not trying to have anyone else's collection of images
pulled because of the subject matter, nor am I trying to prevent others
from seeing those images.

So, if I'm not against the subject matter of the material, why would I
prevent their transmission through my site and storage on my disk?

Reason number 1 is most of those images were scanned in from magazines and
films that have active copyright protection.  Scanning them in and
transmitting them around is a violation of copyright.  Not only is that not
legal, I don't view it as proper to infringe on copyright.  Storing those
images is an infringement.

Reason #2 is the quality of most of those images is poor compared with the
original.  If you want stuff like that, almost any bookstore or videotape
rental place has the originals.  Or, you can order by mail.  I don't see
the value of tying up bandwidth and storage to transmit poor copies of
material that is generally available elsewhere.

If the machine was a personal machine, I wouldn't keep the images because I
have no use for them.  They may (or may not) be interesting to look at some
of them once, but after that I don't see any use for them.  And as things
go, I barely have enough free disk on most of machines as it is.   If the
machine was a shared machine, this reason would need to be explored with
the other users, but it holds with most people I've talked with about these
images.

The bottom line is that there may be legitimate reasons not to have these
images or carry newsgroups or mailing lists containing them.  I think
prudes are dangerous, but I also realize that everyone declining to have
these images online is not automatically bowing to censorship or forbidding
their presence because of content.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: portal!cup.portal.com!dan-hankins@SUN.COM
Subject: Response to Mars "Censoring"
Date: Sun, 21 Oct 90 00:04:25 PDT

********************************************************************
***  CuD #2.09: File 4 of 8: Response to Mars "Censoring"       ***
********************************************************************

In article <CuD #2.08 #3>, Karl Lehenbauer <karl@sugar.hackercorp.com> writes,

>I used Prodigy several times, and it is a heavily censored system,...

This is inaccurate.  Prodigy is not censored, it is _edited_.  There is a
significant difference.  When newspaper articles are removed by government
order, that's censorship.  When the newspaper owners decide to not run an
article because it is counter to their editorial policies (or personal
prejudices), then that's editing.

The difference is that in the first case, the State is telling a citizen (by
threat of force) what she can and cannot do with her own property.  In the
second, a citizen is disposing of his property as he sees fit.

The Prodigy situation is far more like the second case than the first.
Prodigy resources are owned by IBM and Sears.  Since Prodigy is their
property, they may dispose of it as they see fit.  This includes editing their
databases to remove any information inconsistent with their policies.

Some may argue that the $10 a month (plus fees for other services provided)
gives the Prodigy subscriber the right to post anything she desires. This
isn't the case.  The subscriber is paying for the right to use the resources
as provided for in the contract.  Unless IBM and Sears agree in the contract
not to edit or abridge information residing on Prodigy, they continue to have
the right, both morally and legally, to do so.

Censorship is when some organization says, "You may not say X.".  Editing is
when some organization says, "You may not use _my property_ to say X."  This
is an important distinction to make explicit; there is an increasing tendency
for people to believe that they have not only the right to say whatever they
want, but also the unlimited right to use the property of others to do so.

Mr. Lehenbauer also writes,

>If this is IBM's view of the future of personal electronic communications...
>it is a bleak future indeed... every message must be so inoffensive that
>*nobody* is going to be offended by it... and that is censorship.

IBM doesn't control electronic communications in this country;  the Prodigy
subscriber is certainly free to go elsewhere to express his views.  This is
what many of them are doing.  BIX is getting a lot of former Prodigy users
these days.

It's not censorship.

It's also worth mentioning here that although the Prodigy bulletin board
system is edited, Sears and IBM have agreed to not edit email.  Users are free
to form email groups (like Internet mailing lists) to discuss whatever they
want, from sex to explosives.  They just have to pay extra for it.

In article <CuD #2.08 #4), the moderators write,

>In the MARS incident, the NSF flexed its fiscal muscles (according to those
>on the receiving end).

This is again not censorship.  The NSF pays for the Internet, and has the
right to say how those monies are spent.  Since MARS resided on an Internet
node, the NSF had the right to refuse to pay for those files to be transmitted
across its network.  In fact, the NSF has the right to refuse to pay for
network connections for any site for any reason whatsoever, unless it has made
a contract to the contrary.  If this is "flexing its fiscal muscles", then so
be it.

The quoted article quotes some other postings.  I reproduce here the relevant
portions:

>I also don't like the idea of the university having to censor this board to
>suit the narrow-minded leanings of a few people...

>Again i am sorry that CENSORSHIP found its way into another democratic haven
>of society...

This is just more of the sort of illogic I referred to earlier.  If these
folks want their X-rated pictures, then they can have them.  They just can't
expect somebody else (the NSF or their University) to pay for them.  They are
certainly free to start their own BBS or post the material on a private BBS or
Usenet mail server that allows such stuff.

>Can a few angry letters to a federal bureaucrat invoke threats of fiscal
>blackmail?

     If I boycott your business because I find some of your activities
objectionable, am I threatening you with fiscal blackmail?   Why should the
NSF or a university be any different?  The NSF is just boycotting sites that
carry material it finds offensive, and the universities are just exercising
their right to control use of their property.

>It would seem that officials could confiscate the equipment of a sysop who
>maintained adult .gif/.gl files.

     If you are concluding this on the basis of the "federal prosecutions and
application of RICO" referred to earlier, then I agree with you that it's
something to be worried about.  It would be a violation of various First
Amendment rights.

     If you're concluding this by extension from the NSF actions, I must
disagree.  A government agency deciding what it wants to spend its money on is
hardly analogous to confiscating someone's property.  The legal right to do
one does not provide the legal right to do the other.

>A recent article... raised the spectre of "licensing" BBSs.

     Now _this_ is something to worry about.  This reminds me of the situation
in oppressive regimes, where printing presses and photocopiers are "licensed".
Somehow I don't think they'll get away with this one.  Any such regulation
would be a clear violation of First (and other) Amendment rights.

CLARIFICATION:

When an organization is funded by extortion (i.e. taxes), those who fund it
have a moral right to say how those funds will be spent, over and above the
organization's aims.  The receivers of the service _still_ don't have any
rights of control, unless they have entered into a contract with the provider
that gives them that right.

In a constitutionally limited republic such as ours, that taxpayer control is
exerted in one of two ways.  The first is by electing to government those we
believe will implement the policies we want.  The second (and far more rare
option) is referendum.

As long as its decisions remain within the policies set for it by elected
officials and referendum, the NSF has the right to spend (or refuse to spend)
its money as it likes.

If the article I read in CuD is any indication, the purpose of the NSFnet is
to only support the exchange of "scholarly" information.  X-rated GIFs don't
belong in that category, in most folks' eyes.

:END CLARIFICATION

By the way, with PC-Pursuit costs, I pay $40 a month for Net access.  Yet at
work there is an Internet gateway I could sign up for access to and use to
make my posts (for free!).  The reason I don't is that I don't think it's
moral to use IBM resources for purposes IBM wouldn't approve of, such as
expressing disapproval of their policies; it's their property.  So I'm not
just spouting rhetoric that doesn't cost me anything.

+++++++++

Dan Hankins

dan-hankins@cup.portal.com
dan-hankins@pro-realm.cts.com

Complete the following: Pro is to Con as Progress is to ________.

Disclaimer: I don't work for the NSF or Sears.  Although I have a contract
with IBM to provide programming services to them in return for a salary, this
does not constitute approval for their policies.  In particular, I think that
their Prodigy policies, while not immoral, are particularly stupid.  The kind
of editing they do on the bulletin board, their ridiculously high email
charges, and their complete lack of upload/download capability will simply
drive customers to other services.  I am not a Prodigy subscriber, nor do I
intend to become one.  For the same $10 a month, I like Portal much better.
And I post things in alt.individualism that you'd never see on Prodigy BBS.
I defend your right to freedom of expression.  Just don't ask me or anyone
else to foot the bill.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:     Steve Jackson
Subject:  Steve Jackson Games (SJG) Update
Date:     October 23, 1990

********************************************************************
***  CuD #2.09: File 5 of 8: Steve Jackson Games Update          ***
********************************************************************

{The following, by Steve Jackson, is reprinted with permission
from two posts on The Well--moderators}.

++++++++++++
UPDATE ON SJ GAMES
++++++++++++

We were raided on March 1. Most people here have heard that story, though
I'm working on an article for upload. This is an excerpt, because I don't
know when I'll have time to finish the whole thing.

The brief story: The Secret Service took 3 computers, a laser printer, lots
of assorted hardware, lots of disks and papers, and lots of my business
data.  In particular, they took every current copy, on paper or disk, of
the new book we were about to send to the printer.

Because of the confiscation of the GURPS Cyberpunk book, our business came
to a standstill for six weeks - the time it took us to reconstruct it and
get it to the printer.

THE RETURN

In early June, we started talking to the people setting up the EFF, and
word leaked out; I got several inquiries from reporters. On June 20, quite
suddenly, the Secret Service called to say we could have our property back.
So we went to pick it up. They really did give most of our stuff back. They
kept one hard disk and some assorted hardware, as well as some papers. Of
the things they returned, one computer required $200 in repairs before it
would work. Another has so much visible damage that I don't even want to
turn it on.

Loyd hasn't gotten ANY of his things back.

And we still don't know why they raided us. They took our book; they took
our BBS computer; they took a lot of things. And their application for a
search warrant is STILL sealed. So we can speculate, but that's all.

Nobody connected with the business has been arrested. Nobody has been
indicted. Nobody has been charged. Nobody has even been QUESTIONED again.
And these guys are still saying "No comment." Well, if I were in their
shoes, I wouldn't have any comment, either.

OUR CURRENT STATUS (SIGH)

We're not a big business, and the cost of the raid (now well over $125,000)
pushed us to the wall. We have been squeaking by ever since then -
sometimes things look more hopeful, sometimes less. The problem is cash
flow.

We have kept up with our long-term debt (in fact, we've cleared all but
$50K of it up, making most payments on the last day of the grace period),
but we have been very slow-paying with current suppliers. We simply have no
margin for error; any unexpected expense or failure of income will knock us
off.  As I write this, a couple of big receivables didn't come in when they
should have; we're about to default on a note payment, and our big printers
are demanding CASH NOW OR NO MORE PRINTING, for which I can't blame them.

So the current news is not good. We should still be all right if we make it
into 1991, but current cash is tighter than it has been for months.

+++++++++++++
SIGNIFICANT STATUS UPDATE:
+++++++++++++

The warrant application under which my offices were raided has been
unsealed. It was unsealed a month ago! Apparently this was just after the
last request from Silverglate and Good, but they were not informed that it
had been unsealed. (Question of etiquette here?)

At any rate, I got a copy today in a package from Senator Bentsen's office,
in reply to my last letter asking if the Senator could help get this
information. He could and did.

Ver-r-r-r-y interesting. A copy has gone to Silverglate and Good, who
should have comments shortly. Brief answers to oft-repeated questions, now
that I really do know what's going on:

Yes, this was connected to the Neidorf case. Specifically, my managing
editor was being "accused" of receiving a copy of the Phrack issue with the
E911 file and posting it on the BBS, Phoenix Project.  The description of
the E911 file included the same wild allegations that were exploded during
the Phrack trial.

No, there is nothing in the application to indicate that the GURPS
CYBERPUNK game was a target when they came in the door (which does not
mitigate the seriousness of their effective suppression of the text).

Yes, they definitely knew that they were raiding a BBS system; it was one
of the things they were after. The application specifically defined what a
BBS is - though it did not mention the ECPA or the protections granted
therein.

No, they alleged no criminal behavior on my part or on the company's part.
SJ Games was invaded because Loyd Blankenship was an employee and a
co-sysop and frequent user of our BBS.

No, there's nothing there to change my attitude toward Loyd. He is a valued
employee, innocent until proven guilty, and they haven't even STARTED to
prove anything.

I am, no doubt, oversimplifying in my attempt to boil a large stack of
paper down to a short update - but that does seem to me to be the gist of
it. I'm sure the attorneys will have more to add soon.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:  BORGVM
Subject: The Future of Hacking and the System Security Profession
Date: 22 Oct., '90

********************************************************************
***  CuD #2.09: File 6 of 8: Hacking and System Security         ***
********************************************************************

Before I begin the discussion of my views on the future of hacking and the
system security profession, I feel it necessary to offer an introduction
which I hope will aid in the understanding of my views.  I am an ex-hacker,
yet in saying so I do not rule out a few things which I associate with my
personal perspective on hacking.  To begin with, I have always associated
hacking with a genuine lust for knowledge.  Whether or not that knowledge
was restricted solely depends on the views of the individual.  For me,
however, hacking was an acquisition of knowledge a form the military likes
to give as a good reason to join it.  You know, hands-on training, of
course!

It was an attempt to learn as many operating systems as possible.  Their
strengths in comparison to one another, their weaknesses, and their
nuances.   When I was hacking, data was sacred.  It was something which
must not be harmed.  I can say with genuine conviction that every time  I
heard of destructive viruses, malicious crashes, or the like, I would
become enraged far more than would your common security professional, who
would most likely eye the event as a possibility to acquire cash,
reputation in the foiling of the plot, or as leverage to gain funding and
public support.

Although my respect towards data is still very healthy, my urge to hack is
not.  After entering higher education, I have been granted an account on
the mainframe with internet and bitnet access.  This situation had served
as a fuel towards my already healthy paranoia of law enforcement and their
new technologies:  its just not worth the risk.

After my 'retirement', however, I began to ponder the devices available
during the apex of my hacking career such as ANI (Automatic Number
Identification) and CLID (Caller Line Identification) which could
instantaneously register the number of any 800 caller, and processes
inherent in some  digital switching systems which register calls to local
packet-switched networks, that about 20% of my hacks could be traced right
to my doorstep by the right investigator.

I also noted the increase in these types of investigators and the
development of more organized computer-security networks involving FBI,
Secret Service, and private computer security enterprises which developed
highly efficient training methods:  the numbers of security representatives
in the telephone companies and computer networks has increased
dramatically, and to a point where telephone company toll fraud is no
longer convenient, for danger and convenience rarely coexist.

I believe that the future will offer much protection from hacking, but only
to a certain extent.  One needs only to examine the header of a message
originating from some microcomputer host which UUCP's it through half a
dozen Usenet sites, the Internet, and finally to its BITNET destination to
visualize, quite realistically, a phone number tagged onto the end of the
originating userid.

With digital technology advancing at its current rate, the possibilities
are endless.  It is for these reasons that the private computer security
profession (at its current size) is only a short-term success sparked by
mass press-generated hysteria, and blatant disinformation.  The computer
security profession did not receive its recognition from the voices of
concerned individuals or even gluttonous corporations: it received the
necessary attention and nurturing due to the paranoias of a corrupt
military-minded government which knows exactly what it keeps on its systems
and exactly why no one else must.  You see, its a matter of 'national'
security!  Any good real hacker who has been around a few nets knows this.

The time will come when a hacker will sit down at his terminal to hack a
computer somewhere far away.  This hacker might dial up a local network
such as Tymnet or Telenet and connect to a computer somewhere.  That remote
computer's standard issue security drivers will sense an intrusion (user
John Doe calling form a network address originating in California which is
inconsistent with Mr. Doe's schedule,) request the network's CLID result,
and forward the information directly to Mr. Hacker's local police
department which is, in this day and age, fully equipped with the ability
to centrally tap telco lines (data or otherwise.)  The expert system at
the police department verifies that the local data tap is indeed consistent
with the victim computer's John Doe Session and sends out a dispatch.

Sound like fantasy?  Every bit of it is perfectly possible with our
existing technology, and upon review of the chronology of computer security
over the last three years, certainly probable.

Data security professionals are as easily replacable by computers as are
assembly-line workers.  In this day (which will be, incidentally, just
prior to the banning of Orwell's "1984") there will be a small but very
knowledgeable and powerful group of hackers able to circumvent some of
these security mechanisms.  A group of hackers not large enough to present
an obvious threat, but powerful enough to give a self-perpetuating
technological dictatorship and its docile society a nice, re-asserting slap
on the rear.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

Subject: The Ultimate Interface: Hackers and the Private Sector
From: Dark Adept
Date: Tue, 23 Oct 90 22:19 CDT

********************************************************************
***  CuD #2.09: File 7 of 8: Hackers and the Private Sector      ***
********************************************************************

          The Ultimate Interface:  Hackers and The Private Sector

A major problem in Cyberspace is the lack of communication between hackers
and non-hackers.  Corporations are fully entitled to their privacy, and so
they feel threatened by the hacker "menace."  They view the hacker as the
enemy, and so they persecute him. This is a valid belief since history
shows that when a group does not understand another group, they try to
destroy it.  Saying this is valid does not make it right.  If hackers and
corporations and security companies and software companies, etc., etc.,
etc. were to overcome their differences much could be done.  By trading
bits and pieces of knowledge, the two opposing groups could together
develop revolutionary advances in computing that would benefit all.  The
problem is to get the two groups to trust one another.  In some upcoming
G-Philes and submissions to CuD, I hope to break down this barrier of
resentment by crossing over the lines of the Underground into the "real"
world and providing valuable information about systems, security,
interfacing, etc. from a hacker's/member-of-the-underground's point of
view.  I hope others will follow suit, and that the private sector will
reciprocate by allowing technical information to flow into the Underground.
Ultimately, I hope that there will be a rapport between hackers and members
of the private sector so that we may learn from each other and make the
best use possible of this greatest of inventions, the computer.  Without
further delay, then, I present the first of what I hope will be a long and
successful series of articles.  These must be short since they are merely
articles, but I have planned a few full-length works that will be more
in-depth; I will send them to the CuD archives as they become available.  I
hope you enjoy them.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

            System Security:  Security Levels and Partitioning

                             by The Dark Adept

Traditionally, security levels are used to prevent a user from gaining
access to areas where he lacked legitimate interest.  They also have
another very useful purpose that is seldom recognized.  They can be used as
a firewall of sorts to stop the spread of viruses and the destruction of
files by an intruder.  A good analogy of this theory is ship design.  When
a ship is designed, the lower compartments are designed separate from each
other so that if the hull is punctured, the flooding compartment may be
sealed off thus localizing the damage and stopping the ship from sinking.
In the same way accounts should be assigned security levels.  However, if
the accounts are fully isolated from one another, it is too restrictive to
be of any real use.  A user in Accounting would not be able to access the
records from Personnel to find an employee's rate of pay, for example.
Optimally, then, one would want a balance between freedom and security.
This optimal assignment of security levels is accomplished through a
two-stage step.

The first stage is the creation of generic accounts.  Many computer
systems, such as those of schools, use generic accounts as their sole
source of security.  This is VERY dangerous.  By generic accounts, I mean a
set of basic accounts where each member has certain privileges assigned to
it that differ from the other members.  For example, in schools the
teachers often receive one type of account, and students another.  Besides
the systems operator's account, these are the only two types of accounts
available.  The teachers have a wide-range of freedoms including being able
to look into files that don't belong to their department since they can be
trusted. The students have a limited amount of ability, mostly restricted
to accessing their files only.  But what happens if an intruder grabs a
teacher's account?  You got it, he has access to A LOT of stuff!
Obviously, this won't do.  However, generic accounts are useful if used in
combination with other devices.  This leads to the implementation of the
second stage: security levels.

Example:  Let X, Y, and Z be generic accounts in system S with the
following maximum abilities:

X can access file areas A, B, C, D
Y can access file areas B, D, J, K
Z can access file areas B, C, J, L

Assume some User, u, needs access to file areas B and L alone.  Assign him
account type Z with security modifications such that he may access only
file areas B and L.

This results in User u being restricted to the proper file areas, B and L,
but allows ease of modification later if he needs access to areas C or J.
It also allows for the greatest amount of security since his account type
is Z so by definition he cannot access file areas A, D, or K without
receiving a new account.  Therefore, if an intruder takes control of
account u, he cannot destroy more than areas B and L without modification.
The most he can modify account u to have access to is areas B, C, J, and L.
Therefore the damage will be localized to file areas B, C, J, and L.  The
only way he can enter the other areas is to get a new account. This is much
more difficult than modifying one he already has.

The same sort of setup may be applied to commands, usage times, dialup
ports, etc.  For example, say the editor of a newspaper has account Z that
has maximum port capability of T, t1, t2, t3 where T is a terminal in his
office and t1, t2, and t3 are outside lines.  At first he is assigned a
security level that allows access to T only so his account cannot be
accessed from intruders outside thus stopping someone from deleting all of
tomorrow's edition.  Now, if he must go on location somewhere, it would be
a simple matter to modify his account to give him access to t1 so he can
call up and review the submissions.  Yet, again, if there exist ports t4,
t5, etc., these would NEVER be able to access the files since account type
Z is incapable of being accessed through these ports.

What follows here is a mathematical model of account partitioning using
concepts of discrete mathematics.  Since this is a text file and cannot use
graphics characters, some common mathematical symbols must be defined using
regular characters.

Symbols:
--------

|    = "such that" (ordinarily a vertical bar)
\e\  = "is an element of"  (ordinarily an emphasized epsilon)
<==> = "if and only if"

Model:
-----

Let S represent a computer system.

Let S1 be a set of different areas of interest in a computer system.  This
is modelled by S1={a1,a2,a3,...,an} where n is some integer, and a1,a2,
a3,... are the areas of interest in S.

Let S2 be a set of different user accounts in a computer system.  This is
modelled by S2={u1,u2,u3,...,uq} where q is some integer, and u1,u2,
u3,... are the user accounts in S.

Let x \e\ S2.  Let y \e\ S1. Let r be a relation on S defined as this:

xry <==>  x \e\ S2 | x has access to y.

Now r becomes a partitioning relation on S2.  The function that defines r
is determined by how the operator wants his accounts set up.

Further, the equivalence class of x, [x], defines the generic account.

Example: Say S has accounts u1, and u2.  It also has areas of interest a1,
a2,a3.  Now say the operator wants u1 to have access to a1 and a2, and u2 to
have access to a1 and a3.  By defining r in the proper manner he gets:
r ={(u1,a1), (u1,a2), (u2,a1), (u2,a3)}.  Now [u1]={a1, a2} and
[u2] = {a2, a3}.  Thereby defining the generic accounts.

Now let G be the set of all of the equivalence classes determined by xry
that define generic accounts in S.  This is seen as G={[x]|x /e/ S2}.

For clarity, let g1 = [u1], g2 = [u2], ... so we have G={g1,g2,...gq} where
q is some integer.

Now let d \e\ G.  We define w to be a relation as such:

dwy <==> d \e\ G | d has access to y.

Now w becomes a partitioning relation on G.  The function that defines w
is determined by how the operator wants to implement a generic account
for a particular user.

Further, the equivalence class of d, [d], defines the specific user
account.

Example:  Say S has generic account g1 set up.  It has areas of interest
a1, a2, and a3.  g1 is partitioned in such a way that it can only access a1
and a3.  Now say the operator wants a certain holder of a generic account
type g1 to have access only to a1.  By defining w in the proper manner he
obtains: w={(g1,a1)}.  Now [g1]={a1} thereby defining an appropriate user
account.

As some may have noticed, accounts can be partitioned ad infinitum.  In
most cases I have found two partitions to be sufficient.  An interesting
adaptation is also to use this method to define what users have access to
which commands.  It again allows much room for change while keeping things
safely separate.

The ultimate safety would come when the first partition is defined in the
operating/timesharing system itself.  For example, if Unix (Tm of AT&T)
came with say 30 different file areas and accounts accessing those areas in
specialized ways, then even if an intruder grabbed the root account, he
could not change the first level of partitioning to access all those
accounts.

As I hope I have shown, the proper use of generic accounts and security
levels allows the optimum balance of security and ability.  By properly
partitioning accounts, the system operator can isolate a problem to a
relatively small area allowing faster restructuring afterward.

I hope you have enjoyed this article.  I can be reached for comments,
criticism, and E-mail bombs at Ripco BBS (312)-528-5020.  Also, if you
liked this article, you may comment to Jim Thomas (editor of CuD) and he
can pass the general reception on to me.

Written 10/21/90 in Chicago, IL -- The Dark Adept

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:        P.A.Taylor@EDINBURGH.AC.UK
Subject:     CU in the News: "Hackers" and Bank Blackmail in England
Date:        24 Oct 90  12:59:34 bst

********************************************************************
***  CuD #2.09: File 8 of 8: CU in the News: Hackers/English Banks**
********************************************************************

Taken from: "The Independent On Sunday," October 14, '90:
Mysterious computer experts demand money to reveal how they penetrated
sophisticated security.

             HACKERS BLACKMAIL FIVE BANKS  by Richard Thomson

At least four British clearing banks and one merchant bank in the City are
being blackmailed by a mysterious group of computer hackers who have broken
into their central computer systems over the last six months.  These
breaches of computer security may be the largest and most sophisticated
ever among British Banks.

The electronic break-ins which began last May, could cause chaos for the
banks involved. Once inside their systems, the hackers could steal
information or indulge in sabotage, such as planting false data or damaging
complex computer programs.It is unlikely, however, they would be able to
steal money.  So far, the hackers have contented themselves with demanding
substantial sums of money in return for showing the banks how their systems
where penetrated.  None of the banks has yet paid.

The break-ins are evidence of the rapid growth in computer fraud and
manipulation in Britain. Although most hacking is relatively trivial, the
latest cases show much sophistication. The hackers have concentrated on
tapping the banks' electronic switching systems which, among other things,
control the routing of funds around the world.

Some of the hackers are in contact with each other, but they are believed
to be operating individually. One computer expert described their level of
expertise and knowledge of the clearing bank computer systems as "truly
frightening". They are not believed to have links with organised crime,
which has become heavily involved in computer hacking in the US over the
last two to three years.

It is a severe embarrassment for the banking community which is frightened
that public awareness of the security breach could undermine public
confidence. As a result, they have not called in the police but have hired
a firm of private investigators, Network Security Management, which is
owned by Hambros Bank and specialises in computer fraud. It is common for
banks not to report fraud and security failures to the police for fear of
damaging publicity.

All the banks approached either denied that they were victims of the
blackmail attempt or refused to comment.  The hunt for the hackers is being
led by David Price, managing director of NSM, who confirmed his firm was
investigating computer security breaches at five British banks. "I am
confident of success in catching the hackers," he said.  "The amount of
information they can get from the banks will vary depending on the computer
systems and the ways the hackers broke into them," he added.  "They could
go back in and sabotage the systems, but they are not threatening to do
so."

The ease with which the hackers appear to have penetrated the systems
highlights the vulnerability of the computer data. Clearing banks in
particular rely on huge computer systems to control their operations, from
cash dispenser payments to massive international transfers of funds.
Security measures were tightened after a large computer fraud at a leading
City bank three years ago Although the bank involved was never named, it is
understood the money was never recovered.

Nevertheless, the speed with which computer technology has developed in the
last few years has made the detection of security breaches more difficult.
According to an expert, who recently advised one of the big four clearers
on its computer systems, there are few people who understand the banks
system well enough even to detect a break-in.

Computer-related fraud has boomed over the last decade as businesses have
come to rely more heavily on electronic information. According to some
reputable UK and US estimates, up to 5% of the gross national product of
western economies disappears in fraud. Experts say that the senior managers
of many companies simply do not appreciate the need for tight security.

The British legal system has been slow to respond. The Computer Misuse Act
which makes it illegal to access a computer without authorisation, came
into effect only at the end of August this year.
                               (end article)

++++++++++++++++++++++++++++++++++++++++++++

The follow-up article (from The Independent on Oct 21), also by Richard
Thomson, is basically much of the same thing.  He quotes a hacker from the
US who's computer "nom de guerre" is Michael Jordan who makes the following
points.

1.One large US bank is notorious for lax security and it has effectively
become a training ground for hackers.

2. Guessing passwords is sometimes "absurdly simple", they tend to choose
words like "Sex, Porsche, or Password"

3.Social Engineering techniques are used and he would spend approx 6 weeks
trying to suss out from a manager's secretary etc. anything he could find
out that would help him have a better chance of accessing a bank's system.

The main body of the article is pretty glib; it has the usual stock phrases
like..."Hackers and Bank employees have always been a danger, but now there
are signs that yesterdays bank robbers have hung up their sawn-off
shot-guns and are turning to computers instead." and even more hypey is ...
" Mr Jordan claims to have been shown pictures of people in organised
crime.

"They're East End lads who've become more sophisticated now. I've been told
that if they ask you to help them and you refuse, it's baseball bats at
dawn."

There's also a discussion of the reliability of fraud figures, a mention of
how various definitions can exaggerate the actual role played by the
computer. Detective Chief Superintendent Perry Nove head of the city fraud
squad defines "computer fraud" as ... "It is when the computer system
itself is attacked rather than just used to facilitate an offence" The main
conclusion on the whole area of fraud is "...the subject remains cloaked in
mythology and mystery.Naturally, no one knows how many frauds are commited
that are never discovered. Matters are further obscured because banks
fearful of bad publicity, sometimes do not report frauds to the police- a
situation that Mr Nove accepts with resignation. There is general agreement
among hackers and other experts that it is more widespread and more
sophisticated in the US, that it is growing in Britain, but that British
Banks are more secure than those in America and the Continent. That is
about as reliable as the detailed information gets."

I hope I've summed up the general tone of the whole article, it was in the
business section of The Independent On Sunday, 21st Oct. The paper's
normally a very good one, so the generally bad coverage this bloke Thomson
gave to the subject of hacking, and the amount of what I'd call "casual
empiricism" he used to back up his arguments, is sadly probably indicative
of what the CU is up against in the way of ignorance and bad reporting.  I
thought it was quite ironic that he recognised the role of mystery and
mythology, since he seemed to be doing his best to add to it. Finally, if
he'd of mentioned the word expert once more ..grrrrrrr.... Cheers for now,

P.A.T.

********************************************************************

------------------------------

                           **END OF CuD #2.09**
********************************************************************