About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

COMP.SOCIETY.CU- DIGEST CHANGE, Bell System Policie


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From uunet!NIU.BITNET!TK0JUT2 Sun Aug 16 17:24 CDT 1992
Received: by bsc835
(16.6/16.2) id AA24435; Sun, 16 Aug 92 17:24:55 -0500
Return-Path: <uunet!NIU.BITNET!TK0JUT2>
Received: from uunet with uucp; Sun, 16 Aug 92 17:01:32
Received: from UICVM.UIC.EDU by relay1.UU.NET with SMTP
(5.61/UUNET-internet-primary) id AA03216; Sun, 16 Aug 92 17:01:32 -0400
Message-Id: <[email protected]>
Received: from NIU.BITNET by UICVM.UIC.EDU (IBM VM SMTP V2R1)
with BSMTP id 6082; Sun, 16 Aug 92 16:01:07 CDT
Date: Sun, 16 Aug 92 15:15 CDT
To: NIU.BITNET!TK0JUT1
From: Cu Digest ([email protected]) <uunet!UICVM.UIC.EDU!TK0JUT2%NIU.bitnet>
Subject: Cu Digest, #4.36
Status: RO

Computer underground Digest Sun Aug 16, 1992 Volume 4 : Issue 36

Editors: Jim Thomas and Gordon Meyer ([email protected])
Copy Editor: Etaion Shrdlu, III
Archivist: Brendan Kehoe
Shadow-Archivist: Dan Carosone

CONTENTS, #4.36 (Aug 16, 1992)
File 1--COMP.SOCIETY.CU-DIGEST CHANGE
File 2--Bell System Policies - in Re CuD 4.35
File 3--Bell System Policies (John's Response 1)
File 4--Bell System Policies (Jerry's Response 2)
File 5--Bell System Policies (John's Response 2)
File 6--Pacbell security - The Final Word
File 7--Brooks Statement on INSLAW Report
File 8--Special Investigator Requested for Inslaw (Press Release)
File 9--Summary of NBC's Coverage of Danny Casolaro/Inslaw
File 10--Re: Overstated? (Chic Tribune summary)
File 11--Elite Pirates? I think not.
File 12--Deferring the Piracy Debate until September
File 13--Software piracy in America's schools?

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from [email protected]. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
European distributor: ComNet in Luxembourg BBS (++352) 466893.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to
computer culture and communication. Articles are preferred to short
responses. Please avoid quoting previous posts unless absolutely
necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Fri, 14 Aug, 1992 17:15:32 CDT
From: CuD Moderators <[email protected]>
Subject: File 1--COMP.SOCIETY.CU-DIGEST CHANGE

Chip Rosenthal reminds everybody:

The comp.society.cu-digest newsgroup has been created. Effective
immediately, the CuD will be cross-posted into both the old alt
group and the new comp group. After about a month's time to
allow for changeover, I will delete the old alt group and send it
only to the comp group.

SO: If you're reading CuD as an ALT group, BE SURE TO unjoin and
join COMP.SOCIETY.CU-DIGEST instead.

Chip took the initiative for the change, managed the discussion on
newss.groups, and is making the transition smooth and easy.

THANKS CHIP!! NICE JOB!!

------------------------------

Date: Mon, 10 Aug 1992 15:51:38 GMT
From: [email protected](Jerry M. Carlin)
Subject: File 2--Bell System Policies - in Re CuD 4.35

((MODERATORS' COMMENT: We asked Jerry Carlin and John Higdon to frame
their discussion of Bell System/Bellcore policies as a
point-counterpoint exchange. We found their discussion exceptionally
informative and commend them for putting together a stimulating
sequence of posts)).

In CuD 4.35, John Higdon wrote:

>But the policy of "The Bell System" and now Bellcore and the RBOCs
>seems to be to do nothing about any such problems and wait for some
>phreak to get caught with a hand in the cookie jar...

I'm not going to argue history but John's contention that Bellcore and
the RBOCs are doing nothing is incorrect. BTW, I work for PacBell.
Some examples:

Bellcore has issued "Technical Advisories" on the subject of
security including FA-NWT-000835 "Generic Framework
Requirements for Network Element and Network System Security
Administration Messages" and FA-STS-001324 "Framework Generic
Requirements for X Window System Security".

They participate in security organizations such as IEEE P1003.6
doing security standards for POSIX (UNIX) and ISO/IEC JTC1/SC27
and ANSI X3T4 (a mouthful :-) I personally voted on the last
draft of P1003.6, spending quite a bit of time to try to fathom
a very large document. Also, a set of Bellcore security
requirements forms a large part of a draft NIST "Minimum
Security Functionality Requirements for Multi-User Operating
Systems" (MSFR) document designed to replace the DoD Orange
Book.

They are doing work on using Kerberos and exploring OSF/DCE
security features to increase the robustness of distributed
applications.

We (Pacbell) have spent millions of dollars implementing
various security measures including security packages (RACF for
MVS) and in using Security Dynamics "SecureID" cards for dial
access.

We have been working on enhancing UNIX security. Bellcore has
developed a UNIX Security Toolkit which added many features to
the basic scripts first outlined in the book "UNIX System
Security" by Wood & Kochan. They added a one-week course on
UNIX security to their curriculum. We and they now have
security components to reviews of applications. Bellcore
developed a set of UNIX security requirements and asked all the
major vendors to respond. Systems security is now part of the
purchasing decisions.

Is all of this enough? Well, that is another argument but I hope it's
clear that Bellcore and Pacbell (and the other RBOCS) are "doing
something".

++++
Jerry M. Carlin (510) 823-2441 [email protected]
Alchemical Engineer and Virtual Realist

------------------------------

Date: Mon, 10 Aug 92 17:37 PDT
From: [email protected](John Higdon)
Subject: File 3--Bell System Policies (John's Response 1)

[email protected](Jerry M. Carlin) writes:

[Lots of stuff about how Bellcore and Pac*Bell give major lip service
to security.]

But the truth of the matter is that while Bellcore may have written a
book on the matter of security, it apparently forgot to read it. Even
to this day, it is more or less a trivial matter for a knowledgeable
person to get into things he shouldn't.

If you want to have a good horse laugh, you should read the COSMOS
training manual. This system WAS so full of holes that you could
literally set up your own phone company using Pac*Bell's network with
the company becoming none the wiser.

This has been tightened up somewhat. And how did it get tightened up?
Go down to the LA area sometime and pull the microfilm on the LA Times
and the Orange County Register and see the pictures of the evil
desperados (a bunch of sixteen year old kids) who easily penetrated
Pac*Bell and set up all manner of telephonic conveniences for
themselves using COSMOS. This took place in the mid-eighties. Pac*Bell
should have been exceedingly embarrassed.

> Is all of this enough? Well, that is another argument but I hope it's
> clear that Bellcore and Pacbell (and the other RBOCS) are "doing
> something".

Dialups into CO switches used to have no password protection
whatsoever. Now they do. That's a start, folks. So you are now
thinking about security? Good for you. It is about time. Why has it
taken so long?

------------------------------

Date: Tue, 11 Aug 92 09:01:16 PDT
From: [email protected](Jerry M. Carlin)
Subject: File 4--Bell System Policies (Jerry's Response 2)

> From zygot!john@apple.com Mon Aug 10 17:48:25 1992
>
> [email protected](Jerry M. Carlin) writes:
> [Lots of stuff about how Bellcore and Pac*Bell give major lip service
> to security.]

I don't consider spending tens of millions of dollars over the past
few years as "lip service". If you wonder what on: such things as RACF
for MVS is not cheap. SecureID cards cost quite a bit when multiplied by
10,000 people. Getting lots of shredders costs money. Could we have spent
it more wisely. Of course, but what else is new. IMHO we've done pretty well.

> But the truth of the matter is that while Bellcore may have written a
> book on the matter of security, it apparently forgot to read it. Even
> to this day, it is more or less a trivial matter for a knowledgeable
> person to get into things he shouldn't.

It's neither easy nor quick to plug all the holes in 'swiss cheese'. The
point I'm trying to make is that we've been working on it for a number
of years and are continuing to work on it and that we've made good progress.

> ... Good for you. It is about time. Why has it taken so long?

Some of the reasons are our fault and some are not.

We have been yelling at vendors to deliver operating systems with adequate
security features and bug fixes for a number of years now. I'm REALLY
tired of having stupidities like /etc/hosts.equiv "+" and initial ID's
without passwords forcing us to do work we should not have to do to clean
it up.

Some of the problems require new technology. We REALLY want Kerberos
and/or OSF DCE but they are not ready yet. We're just getting to the
point of having secure SNMP. When the protocols are full of security holes
it makes it kind of difficult to have true security.

By the way, my personal opinion is that the biggest security problem is
people. We can have the most secure systems in the world, and they can
even be maintained in a secure state but one successful "social engineer"
can knock all of that into a cocked hat. It is a non-trivial problem to
make sure that all legitimate calls from one employee to another get
responded to without delay while at the same time catching all those
trying to talk employees out of confidential information or into opening
up some access in the name of a (bogus) emergency.

There is a public trust issue here. If someone gets the unlisted number
of a public figure and then uses that to harass the person, it's a serious
matter. If the 911 service is disrupted lives are at stake. If someone's
conversations are intercepted illegally, we've violated an expectation of
privacy if not various laws.

While I obviously believe that John is overemphasizing the negative, his
feeling that security is vital and that we need to finish the job is one
that I share. I think it is mandatory that we do so if we want to succeed
in the coming era where any customer will have a choice between several
vendors for basic dial tone. We're getting close now with cellular and
will get closer with the next generation mobile technology. Even the
hard-wired local loop will be opened up. We can no longer be arrogant
since "we're the phone company, after all". It's not true now and it will
be less true in the future. We're "A" phone company not "THE" phone
company.

------------------------------

Date: Wed, 12 Aug 92 14:13 PDT
From: [email protected](John Higdon)
Subject: File 5--Bell System Policies (John's Response 2)

[email protected](Jerry M. Carlin) responds:

> It's neither easy nor quick to plug all the holes in 'swiss cheese'. The
> point I'm trying to make is that we've been working on it for a number
> of years and are continuing to work on it and that we've made good progress.

Yes, and it is important to separate "inherent insecurity" from
"sloppiness". The matter of inband signaling (from which the
publication "2600" derives its name) involved an imbedded, virtually
uncorrectable security hole. Most of these, thank heaven, are becoming
history.

But Pac*Bell, among others, is still just a wee bit sloppy on the
administrative level. Just one example:

After having eight of my residence phone numbers changed, I suddenly
realized that my Pac*Bell Calling Card was invalid. I called the
business office and explained that I wanted a new card. No problem. In
fact, I could select my own PIN. And if I did so, the card would
become usable almost immediately.

Do you see where I am going with this? No effort was made to verify
that I was who I claimed to be, even though my accounts are all
flagged with a password. (When I reminded the rep that she forgot to
ask for my password, she was highly embarrassed.) If I had been Joe
Crook, I would have a nice new Calling Card, complete with PIN, of
which the bill-paying sucker (me) would not have had any knowledge. By
the time the smoke cleared, how many calls to the Dominican Republic
could have been made?

When will Pac*Bell do something about this wide, gaping security hole?
I will tell you: when losses become significant, and/or the press gets
wind of it and some notable, visible cases go to court. So, you want
to go into the "Call Back to your Homeland Cheap" business? Call the
Pac*Bell business office, tell the rep you want a calling card for a
particular number (perferably one you do not get the bill for) and
select your own PIN (one that you can easily remember :-).

So, Pac*Bell, do you want to sue me for publishing "sensitive"
information? Or do you want to plug the hole and fix the problem? I
think by now you get the point.

------------------------------

Date: Wed, 12 Aug 92 16:45:35 PDT
From: [email protected](Jerry M. Carlin)
Subject: File 6--Pacbell security - The Final Word

John writes:

> But Pac*Bell, among others, is still just a wee bit sloppy on the
> administrative level. Just one example:...
>
> Do you see where I am going with this? No effort was made to verify
> that I was who I claimed to be, even though my accounts are all flagged
> with a password. (When I reminded the rep that she forgot to ask for my
> password, she was highly embarrassed.)...
>
> When will Pac*Bell do something about this wide, gaping security hole?...

All I can say is that we're trying. As I pointed out earlier in this
conversation, it all comes down to people. A mistake was made, no
doubt about it. Can be do a better job than we are doing? We're
trying to. Is being Ok enough? As the current advertising slogan says
"Good enough isn't". This slogan has to translate into real action.

As my part in this effort, I'm going to pass all of this along so that
management realizes that a mistake was made so that action can be
taken to minimize the chances of it reoccuring. At the very least we
can remind service reps that they need to remember to verify users and
to make sure that the procedures and training are up to snuff.

Even though it is uncomfortable to be the recipients of criticism, we
need to listen to our customers, especially knowedgeable ones like
John, otherwise they will go elsewhere as competition comes to the
business.

------------------------------

Date: Fri, 14 Aug, 1992 17:15:32 CDT
From: CuD Moderators <[email protected]>
Subject: File 7--Brooks Statement on INSLAW Report

Statement of Chairman Jack Brooks
Committee on the Judiciary
re: INSLAW Report
Tuesday, August 11, 1992

(MODERATORS' COMMENT: Following is the complete text of Jack Brooks
(Texas), chair of the House Judiciary Committee, summarizing the
findings of the Committee's investigation into the dispute between
INSLAW and the U.S. Department of Justice).

THE LAST ITEM ON OUR AGENDA TODAY IS THE CONSIDERATION OF THE
INVESTIGATIVE REPORT "THE INSLAW AFFAIR," WHICH WITHOUT OBJECTION WILL
BE CONSIDERED AS READ.

THIS REPORT DESCRIBES THE COMMITTEE'S INVESTIGATION INTO SERIOUS
ALLEGATIONS THAT HIGH-LEVEL DEPARTMENT OF JUSTICE OFFICIALS WERE
INVOLVED IN A CRIMINAL CONSPIRACY TO FORCE INSLAW, A SMALL COMPUTER
COMPANY, OUT OF BUSINESS AND STEAL ITS PRIMARY ASSET--A SOFTWARE
SYSTEM CALLED PROMIS.

BASED ON THE COMMITTEE'S INVESTIGATION AND TWO SEPARATE FEDERAL COURT
RULINGS, THE DRAFT REPORT CONCLUDES THAT HIGH-LEVEL DEPARTMENT OF
JUSTICE OFFICIALS DELIBERATELY IGNORED INSLAW'S PROPRIETARY RIGHTS IN
THE ENHANCED VERSION OF PROMIS AND MISAPPROPRIATED THIS SOFTWARE FOR
USE AT LOCATIONS NOT COVERED UNDER CONTRACT WITH THE COMPANY. JUSTICE
THEN PROCEEDED TO CHALLENGE INSLAW'S CLAIMS IN COURT EVEN THOUGH IT
KNEW THAT THESE CLAIMS WERE VALID AND THAT THE DEPARTMENT WOULD MOST
LIKELY LOSE IN COURT ON THIS ISSUE. AFTER ALMOST SEVEN YEARS OF
LITIGATION AND $1 MILLION IN COST, THE DEPARTMENT IS STILL DENYING ITS
CULPABILITY IN THIS MATTER.

UNFORTUNATELY, INSTEAD OF CONDUCTING AN INVESTIGATION INTO INSLAW'S
CLAIMS THAT CRIMINAL WRONGDOING BY HIGH-LEVEL GOVERNMENT OFFICIALS HAD
OCCURED, ATTORNEYS GENERAL MEESE AND THORNBURGH BLOCKED OR RESTRICTED
CONGRESSIONAL INQUIRIES INTO THE MATTER, IGNORED THE FINDINGS OF TWO
FEDERAL COURTS AND REFUSED TO SEEK THE APPOINTMENT OF AN INDEPENDENT
COUNSEL. THESE ACTIONS WERE TAKEN IN THE FACE OF A GROWING BODY OF
EVIDENCE THAT SERIOUS WRONGDOING HAD OCCURED WHICH REACHED THE HIGHEST
LEVELS OF THE DEPARTMENT. THE EVIDENCE RECEIVED BY THE COMMITTEE
DURING ITS INVESTIGATION CLEARLY RAISES SERIOUS CONCERNS ABOUT THE
POSSIBILITY THAT A HIGH-LEVEL CONSPIRACY AGAINST INSLAW DID EXIST AND
THAT GREAT EFFORTS HAVE BEEN EXPENDED BY THE DEPARTMENT TO BLOCK ANY
OUTSIDE INVESTIGATION INTO THE MATTER.

BASED ON THE EVIDENCE PRESENTED IN THIS REPORT, IT IS CLEAR THAT
EXTRAORDINARY STEPS ARE REQUIRED TO RESOLVE THE INSLAW ISSUE. THE
REPORT RECOMMENDS THAT THE ATTORNEY GENERAL TAKE IMMEDIATE STEPS TO
REMUNERATE INSLAW FOR THE HARM THE DEPARTMENT HAS EGREGIOUSLY CAUSED
THE COMPANY. IT ALSO RECOMMENDS THAT IN INDEPENDENT COUNSEL BE
APPOINTED WITH BROAD POWERS TO INVESTIGATE ALL MATTERS RELATED TO THE
ALLEGATIONS OF WRONGDOING IN THE INSLAW MATTER.

IN MY VIEW, CONGRESS AND THE EXECUTIVE BRANCH MUST TAKE IMMEDIATE AND
FORCEFUL STEPS TO RESTORE THE PUBLIC CONFIDENCE AND FAITH IN OUR
SYSTEM OF JUSTICE WHICH HAS BEEN SEVERELY ERODED BY THIS PAINFUL AND
UNFORTUNATE AFFAIR. I, THEREFORE URGE ALL MEMBERS TO SUPPORT THE
ADOPTION OF THIS REPORT.

(end -- original report all in upper case)

------------------------------

Date: Fri, 14 Aug, 1992 19:52:31 PDT
From: [email protected]
Subject: File 8--Special Investigator Requested for Inslaw (Press Release)

One Hundred Second Congress
Congress of the United States
U.S. House of Representatives
Committee on the Judiciary
Washington, D.C. 20515

For Immediate Release
August 11, 1992

NEWS RELEASE

JUDICIARY COMMITTEE REPORT CALLS FOR INDEPENDENT COUNSEL TO
INVESTIGATE THE INSLAW CONTROVERSY

By a vote of 21 to 13, the House Committee on the Judiciary today
voted to adopt an investigative report entitled, "The INSLAW Affair."
This report recommends that Attorney General Barr seek the
appointment of an Independent Counsel to investigate potential
criminal conduct of current and former Justice officials involved in
an alleged conspiracy to steal the PROMIS software system from
INSLAW, Inc.

Congressman Jack Brooks (D-Tex.), Chairman of the full
Committee, stated, "This report culminates the Committee's
three-year investigation into serious allegations that
high-level Department of Justice officials were involved in
a criminal conspiracy to force INSLAW, a small computer
company, out of business and steal its primary asset -- a
software system called PROMIS. While the Department
continues to attempt to describe its conflict with INSLAW as
a simple contract dispute that has been blown out of
proportion by the media, the Committee's investigation has
uncovered information which suggests a much different,
disturbing conclusion."

In March 1982, the Justice Department awarded INSLAW, Inc., a $10
million, three year contract to implement a case management software
system called PROMIS at 94 U.S. Attorney's offices across the country
and U.S. territories. While PROMIS could have gone a long way toward
correcting the Department's long- standing need for a standardized
case management system, the contract between INSLAW and Justice
quickly became embroiled in bitterness and controversy which has
lasted for almost a decade.

The report concludes that there appears to be strong evidence, as
indicated by the findings of two Federal court proceedings, as well as
by the Committee investigation, that the Department of Justice "acted
willfully and fraudulently," and "took, converted and stole" INSLAW's
Enhanced PROMIS by "trickery, fraud and deceit." The report finds that
these actions against INSLAW were implemented through the Project
Manager from the beginning of the contract and under the direction of
high-level Justice Department officials. The evidence presented in the
report demonstrates that high-level Department officials deliberately
ignored INSLAW's proprietary rights and misappropriated its PROMIS
software for use at locations not covered under contract with the
company. Justice then proceeded to challenge INSLAW's claims in court
even though its own internal deliberations had concluded that these
claims were valid and that the Department would most likely lose in
court on this issue.

Brooks stated, "After almost seven years of litigation and
$1 million in cost to the taxpayer, the Department is still
trying to avoid accountability for the actions it took
against INSLAW. It is time for Justice to recognize its
mistakes and cut its losses and restore its moral standing
as an enforcement agency, which is just as committed to
living by the law as any other citizen."

According to the report, the second phase of the Committee's
investigation concentrated on the allegations that high-level
officials at the Department of Justice conspired to drive INSLAW into
insolvency and steal PROMIS. In this regard, the report states that
several individuals testified under oath that INSLAW's PROMIS software
was stolen and distributed internationally in order to provide
financial gain to associates of Justice Department officials and to
further intelligence and foreign policy objectives of the United
States. Additional corroborating evidence was uncovered by the
Committee which substantiated to varying degrees the information
provided by these individuals.

Brooks stated, "It is unfortunate that the Department chose
not to conduct a thorough investigation into INSLAW's
allegations of criminal wrongdoing by high-level government
officials. Although they were faced with a growing body of
evidence that serious wrongdoing had occurred which reached
to the highest levels of the Department, both Attorneys
General Meese and Thornburgh blocked or restricted
Congressional inquiries into this matter and in the case of
Attorney General Thornburgh ignored the findings of two
Federal courts and refused to seek the appointment of an
Independent Counsel."

The report recommends that Attorney General Barr immediately settle
INSLAW's claims in a fair and equitable manner. The Committee report
also strongly recommends that the Department seek the appointment of
an Independent Counsel in accordance with 28 USC $$591-599 to conduct
a comprehensive investigation of the INSLAW allegations of a high
level conspiracy within the Justice Department to steal and distribute
the Enhanced PROMIS software. According to the report, the
investigation should: (1) ascertain whether there was a strategy by
former Attorneys General and other Department officials to obstruct
this and other investigations through employee harassment and denial
of access to Department records; (2) determine whether current and
former Justice Department officials and others involved in the INSLAW
affair resorted to perjury and obstruction in order to cover-up their
misdeeds; (3) determine whether the documents subpoenaed by the
Committee and reported missing by the Department were stolen or
illegally destroyed; and, (4) determine if private sector individuals
participated in (a) the alleged conspiracy to steal INSLAW's PROMIS
software and distribute it to various locations domestically and
overseas, and (b) the alleged cover-up of this conspiracy through
perjury and obstruction.

Finally, the Committee report recommends that the Independent Counsel
investigate the mysterious death of reporter, Daniel Casolaro, who
died while conducting an investigation of the INSLAW matter. The
report notes that the suspicious circumstances surrounding his death
have led some law enforcement professionals and others to believe that
his death may not have been a suicide.

Brooks concluded: "The conduct of the Department in the
INSLAW affair has resulted in an erosion of the public's
trust in the organization charged with enforcing our
Nation's laws. In order to restore the public's confidence
in the Department of Justice, there must be a full and open
investigation into this matter. However, I'm skeptical that
without the appointment of an individual to conduct this
investigation who is not under the direct control of the
Attorney General, this matter will ever be fully resolved."

------------------------------

From: [email protected](Chrome Cboy)
Date: Wed, 12 Aug 1992 11:07:44 -0400
Subject: File 9--Summary of NBC's Coverage of Danny Casolaro/Inslaw

The NBC coverage of the Danny Casolaro death in the Inslaw case, which
aired last week, didn't seem to add many new facts, but I was
surprised to see that the incident hadn't been forgotten--in fact, it
seems to finally be making its way back into the spotlight.

Interviewed were Jack Anderson, a personal friend of Danny; Timothy
Hutton, who is playing Danny in a forthcoming HBO docu-drama; John
Connolly, the investigative reporter who has continued Danny's
research on behalf of HBO, and the chief counsel for INSLAW, an
ex-head of the Department of Justice who's name I can't remember.

Connolly felt that there wasn't an "Octopus" as Danny thought--eight
men at the highest levels of government, working in concert to further
their own desires. He did think, however, that these eight men were
involved in wrongdoings involving illegal aid to the Contras, the BCCI
scandal, the INSLAW theft, drug running, and possibly other things.
They simply weren't in cahoots.

There was also a taped interview with a forensic expert who claimed
that the entire autopsy was poorly performed, that it didn't follow
standard procedures, and that the report looked like the conclusion
regarding the cause of Danny's death had been reached a priori, and
that the rest of the report was then written to justify the
conclusion. Items that went unmentioned or were glossed over include:
multiple large contusions, including one to the head; that three of
Danny's fingernails had either been pulled off or were broken off
(possibly during a struggle); and that the wounds on his wrists were
deep and unhesitating, which is extremely rare in suicide victims. (In
fact, one of his wrists had been slashed eight times, cutting through
tendons all the way to the bone.)

It was Connolly's hypothesis that Danny had been jumped in his hotel
room in the early morning hours, subdued, interrogated (traces of
"strange drugs" were found in his system), and then killed. Adding to
the suspicions of foul play include the fact that none of Danny's
personal effects have been returned to the family, and that
investigators have been unable to view any of his personal effects,
reportedly including some notes that were found hidden in one of his
shoes. Also, his reporter's note are still missing.

I could probably flesh this out, add disclaimers, and touch it up if
you can't find anyone who managed to record the segment.

------------------------------

Date: Mon, 10 Aug 92 13:46:35 -0500
From: Neil W Rickert <[email protected]>
Subject: File 10--Re: Overstated? (Chic Tribune summary)

>Computer underground Digest Sun Aug 9, 1992 Volume 4 : Issue 35

>Sunday Tribune computer columnists Reid and Hume challenged what they
>call one of the software industry's "periodic public relations
>campaigns to get people to believe it's being robbed blind by software
>pirates."

I too was glad to see this column.

I remember an interview I heard on NPR ("All Things Considered") a few
years ago. The industry representative asked the rhetorical question
"What would it be like if, for every car an auto dealer sells, two are
stolen?" At the time, I thought the analogy was wonderful, except
that the industry rep had it slightly wrong. He should have asked
"What would it be like if, for every car an auto dealer sells, two are
taken for test drives?" And of course the answer would be "That
already happens."

The software piracy problem is, to a considerable extent, the natural
consequence of industry policies. The software industry would have
you purchase software sight unseen, in shrink wrapped packaging,
without any knowledge of whether it will adequately serve your
purposes, and with no chance of a refund if the product proves
unsuitable or defective. They exacerbate this problem further by
setting prices which bear little relation to their costs. They
justify their costs on a "perceived value" basis, whereby they argue
about the financial value of say a spreadsheet package to an
accountancy firm. This "perceived value" pricing might make sense if
they charged a much lower "perceived value" to the treasurer of a
small church who wished use the spreadsheet once per month to manage
the church books; but they don't.

In the book publishing industry, the price of a book is much closer to
the manufacturing cost, except for special topic books with limited
markets. Natural market forces require this. If publishers charged
too much other authors would write books of a somewhat similar nature,
and capture much of the market. But, in an obvious attempt to defeat
such natural market forces, the software publishing industry uses its
"look and feel" lawsuits in an attempt to defeat the law of supply and
demand, and thereby maintain monopoly privileges for their products.

------------------------------

Date: 10 Aug 92 08:06:42 CDT (Mon)
From: [email protected](Peter da Silva)
Subject: File 11--Elite Pirates? I think not.

Elite Pirates, as described in (Jim Thomas's article in CuD #4.35)
article, are virtually unknown: an endangered species at best, perhaps
by now simply a chimera...

>Reid and Hume continue, making several points that pirates would agree
>with:

Not the ones I know about.

>1. If you use a program, you should pay for it.

Maybe there's an elite among pirates who think this way, but the vast
majority pirate software because they need it and don't want to pay for
it. Virtually everyone I know who has pirated software has done so for
this reason. Many have purchased IBM PCs, as they earlier bought Apples,
because of the vast amount of pirate domain software available... the
biggest beneficiaries of piracy are clone vendors.

>2. Sharing software can enhance sales.

Only if most pirates go along with point 1.

>They also note that the shareware concept, based on free distribution
>of programs, has thrived and has made programmers quite successful.

Not really. The main success stories have been from people who have gone
commercial or switched to crippleware demos to "encourage" people to go
along with point 1.

>3. They, as do most elite pirates, strongly condemn the practice of
>copying an authorized program in a business and sharing it around to
>avoid the site license fees.

Most pirates I know wouldn't go that far, but they would "borrow" a copy
from the guy in the next office, which comes to much the same thing.

>4. The pre-purchase use of software is "not such a bad thing" because
>it can help sales. It also provides users a chance to compare the most
>expensive programs [...]

So would a software library, or software rental agencies... something I've
hoped would start showing up. They did for a while, but large-scale piracy
has so muddied the waters that there's no hope of them catching on until
software becomes as hard to copy as a book.

>The columnists fall short of advocating responsible piracy, and they
>make it clear that they oppose unauthorized copying for profit or
>"free use" simply to avoid paying for a product that will be used.

I suspect that they're simply unfamiliar with the normal corporate
environment, and think that their buddies counting coup on Lotus and
Borland are what the SPA is really concerned about. The pirate who does
it simply for the thrill of the chase is a rare bird indeed.

BUT, they do make great headlines when they get caught. Sorry if the small
time corporate thief has ruined your playground, but that's the way it goes
in the real world.

------------------------------

Date: Fri, 14 Aug, 1992 17:15:32 CDT
From: Jim Thomas <[email protected]>
Subject: File 12--Deferring the Piracy Debate until September

I partially agree with Peter: The pirate world has changed
dramatically in the past two years, and the "elite pirates" of the
1980s--those who enjoyed the thrill (albeit an anal-retentive one) of
the chase--are an endangered species. Peter and I will address this
issue in a near-future issue. The points I would make are that the
types, the motivations, and the consequences of creative software
sharing are not as clear-cut and certainly not as pernicious as the
SPA and other anti-piracy activists suggest. I suspect the primary
difference between the positions of Peter and I are not that *some*
line must be drawn between acceptable and unacceptable "piracy," but
*where* that line should be drawn.

A spokesperson for the SPA has *tentatively* agree to participate in
the debate, and we hope to have at least one special issue in early
September on the pros/cons of the ethics, legality, and responses to
sharing unpurchased copyright software.

------------------------------

Date: Wed, 12 Aug 1992 18:37 CDT
From: <[email protected]>
Subject: File 13--Software piracy in America's schools?

In an advertising publication, CPR (Curriculum Product News),
distributed to school district administrators, an article, "Software
copying in schools: a 1992 update," presents piracy problems within a
slightly different population than that which we normally see.

The article (unsigned) begins: "The last we heard from Captain
Diskcopy, a few years ago, she and her brash band of pirates were busy
encouraging educators to disregard the law that allows only one backup
copy for each program purchased. Their credo was 'copy, copy,
copy.'...[their] gospel: 'It's OK because you're doing it for the
kids!'"

It continues by detailing the lessening, but apparently still
troublesome, level of software copying in US school districts. A
representative of the National School Boards Assn. (members include
more than 2000 districts from 50 states) is quoted as saying that
unauthorized copying has been greatly reduced in recent years.

The article continues by citing information from the SPA about the
dollars lost to piracy ($24 billion in 1990), and the availability of
the SPAudit program (30,000 distributed in 1991), as well as a
12-minute videotape, "It's Just Not Worth the Risk." The tape is part
of an SPA "...public awareness and prevention campaign."

Also mentioned is the ICIA and its pamphlet of "...guidelines for
schools to follow, entitled, 'Should I Copy Micropcomputer Software.'
The guidelines are drawn from the Software Policy Statement published
in 1987 by ISTE (International Society for Technology in Education)...
." ISTE also distributes "A Code of Ethical Conduct for Computer-Using
Educators."

These progams, videos and publications are credited with decreasing
illegal copying in school districts.

The article then explains "lab packs," in which schools can obtain
multiple copies of software for educational purposes at special rates.
It notes that a few firms allow unlimited copying within a single
school building. (Rarely is an entire school district housed in a
single building, which can mean a district would have to buy multiple
lab packs for district use.) A smaller number of firms does offer
district-wide licenses, according to the article.

The article notes that the SPA has never sued a kindergarten through
high school (K-12) district, but does discuss a suit filed against the
University of Oregon's Continuation Center. A negotiated settlement
required the university to "...pay the SPA $130,000, launch a massive
on-campus campaign to educate students and faculty about lawful use of
copyrighted software, and host a national conference on 'Software and
the Law.'"

ICIA also asked its software publishing members to identify schools
which were copying software. An Ohio school district, described in the
article as "average sized," was mentioned frequently after the
campaign began, resulting in ICIA sending a cease and desist order to
the district.

A coordinator for instructional technology in an Indiana school
district then describes some of the problems she's had in purchasing
adequate software for her district's needs at a price that the
district can afford.

She says they are trying to comply with the law, but "'Even when I say
to a publisher that I'm willing to pay whatever you suggest is fair
for a building or district-wide license, they won't discuss it.'"

She also believes software publishers are not responsive to hardware
configurations in districts. Many, she says, have older hardware, and
are in transition periods to newer, but software companies won't allow
for these variations in selling their products. So districts can be
forced to buy multiple licensed copies or, as she suggests, revert to
piracy.

The article concludes with a remark paraphrased from "talking to...
educators" that flexible volume purchasing options would help to
further eliminate pirating in American schools.

The last page of the article (in a three column format) includes a
two-column ad from the SPA with a hotline number to report
"...unauthorized use of software including:
"*bulletin boards
"*unauthorized sales
"*hard disk loading
"*unauthorized internal copying[.]"
The ad also provides an address for obtaining a free pamphlet about
software and law.

A sidebar to the main story describes potential federal sentences and
fines for piracy, and notes that school districts are legally allowed
to lend software to students and staff unless that is "expressly
prohibited in the publisher's own licensing agreement." The sidebar
was credited to Mark Sherry, identified as president of Microease
Consulting, Inc., consultant with the Mecklenburger Group, and former
director of Software Evaluation for the EPIE Institute.

CURRICULUM PRODUCT NEWS is a slick (paper-quality) magazine
containing articles, advertising, and the ubiquitous "Circle #xxx for
more information" at the end of the 'news' articles. Its subtitle is
"The Magazine for District-Level Administrators," and it is published
10 times a year by Educational Media, Inc., 992 High Ridge Rd.,
Stamford, CT 06905. The article recapped here was in the May issue,
Vol. 3, No. 9, pages 22-26.

The article was heavy on the industry side (articulation of the
problems of piracy came from trade and like organizations), but did
attempt to balance the concerns and problems of educators with those
of software publishers. The article provides no specific information
about how much software piracy is going on in elementary and secondary
schools.

------------------------------

End of Computer Underground Digest #4.36
************************************



 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS