Previous Next Index Thread

Cu Digest, #7.86

Computer underground Digest    wed  Nov 1, 1995   Volume 7 : Issue 86
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #7.86 (Wed, Nov 1, 1995)

File 1--CyberAngels FAQ file
File 2--Re: Attention Spammer: The War Has Started
File 3--Scientology Attacks Carnegie Mellon University
File 4--Head of the French hackers group was a secret service agent...
File 5--Cu Digest Header Info (unchanged since 18 Oct, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Mon, 30 Oct 1995 11:54:48 -0600
From: bladex@BGA.COM(David Smith)
Subject: 1--CyberAngels FAQ file

CYBERANGELS: FAQ

The Guardian Angels "CyberAngels" project is an all-volunteer
Internet patrol and monitoring project started by senior members of the world
famous "International Alliance of Guardian Angels", whose HQ is in New York
City.

We are a worldwide informal group of volunteers, whose mission is to be a
Cyberspace "Neighborhood Watch".

THE INTERNET IS OUR NEIGHBORHOOD - LET'S LOOK AFTER IT!

1) How did the CyberAngels project start?

The Cyberangels project was born in June 1995, after a discussion between
senior Guardian Angels about the apparent lawlessness of the Internet world
CyberCity.  Guardian Angels leaders on the West Coast of the USA (Los Angeles
and San Francisco) had been online for the previous 2 years, and when
Guardian Angels Founder and President Curtis Sliwa himself went online in New
York City and got his email address, we began a serious discussion about
CyberCrime and how the Guardian Angels might respond to it.

Curtis Sliwa has a daily talk radio show on WABC in the New York state area.
 Once he had an email address, he made the announcement over the radio, and
his email box immediately started to receive letters telling stories of
online harassment (stalking), hate mail, pedophiles trying to seduce children
in live chat areas, and complaints from worried parents about the easy access
their children had to hard core pornographic images.

Realizing that there was a big issue at stake here, Curtis began discussing
the Internet issues on his talk show, and as the debate raged daily, and the
letters kept pouring in, we realized that perhaps we were being asked to DO
SOMETHING.

We sat down and discussed what we the Guardian Angels could do to help
reassure parents and to make the Net a safer place for kids and others.  The
answer was simple - we should do what we do in the streets.  The Internet is
like a vast city: there are some rough neighborhoods in it, including "red
light" areas.  Why not patrol the Internet, particularly in these "rough
neighborhoods" just like a Neighborhood Watch?  Just like our own Guardian
Angels Community Safety Patrols.  And why not recruit our volunteers from the
very people who inhabited this vast world CyberCity?  Who better than to
cruise the Net watching out for people's safety than members of the Internet
community themselves?  After all, who else could do it?  Never an
organization to blame it on, or leave it to the government, we decided to do
something ourselves.

So the CyberAngels program was set up - an all volunteer team, providing a
CyberSpace Community Safety Patrol and an Internet monitoring service.

Current CyberAngels Chief Coordinator is Colin "Gabriel" Hatcher.


2) What is the purpose of the CyberAngels project?

The purpose of the project is
a) To promote and protect the idea that the same laws of decency and respect
for others that apply in our streets should apply also to the Internet.
b) To protect our children from online abuse.
c) To pressurize service providers to enforce their Terms of Service.
d) To give advice and assistance to victims of hate mail, harassment and
sexual abuse online.
e) To watch out for users violating terms of service by committing
cybercrimes and to report them to relevant authorities (Sysadmins, or even
Police).
f) To help to make unnecessary Government legislation by showing Government
that the World Net Community takes the safety of our children and the well
being of all its members seriously.


3) How does the project work?

Volunteers send their information to Gabriel at ganetwatch@aol.com and we
send them a copy of our FAQ.  Each volunteer volunteers to spend a minimum of
2 hours per week cruising the Net and looking for places where they believe
there may be unacceptable activity.  It is up to each member where they go
and what they look for, although sometimes we may send a bulletin to all
members advising them to search a particular area.

If a volunteer finds criminal activity on the Net, GANetWatch functions as a
clearing house for information.  We do encourage members to report violations
themselves, but we ask that copies of all actions taken are forwarded to us.
 Members may choose instead to simply report the problem to us and leave it
to our more experienced members to deal with.

We keep our members informed via email, with a regular update on what's going
on.

4) Why do we need volunteers?

The Internet Community is huge - around 40-50 million people, and growing
every day.  There are hundreds of new Web sites each week.  The more
volunteers we have, the more effective we can be.  And by giving a little of
your time to looking after the welfare of the Net, you can make a real
difference!

WE NEED MORE VOLUNTEERS!

Anyone can be a CyberAngel.  The only requirement is that you commit a
minimum of 2 hours per week to the project.  No previous experience or
special skills are necessary...although a computer and an Internet account
would be useful! :)

JOIN US NOW!  LOOK AFTER YOUR CYBERCITY!

We are anonymous in cyberspace.  Noone cruises with a Cyberangels badge.  And
we do not encourage our volunteers to identify themselves online.  We DO NOT
advise our volunteers to challenge cybercriminals directly, neither by
arguing in live areas, nor by flaming in emails, nor by counter-postings on
message boards / newsgroups.   Being a CyberAngel  involves no risk or
danger.  You are volunteering only to be eyes watching the Net.


5) What should volunteers be looking out for?

We are searching to uncover and prevent:

a) Child abuse and pedophilia;
b) The trading in images of child pornography;
b) Sexual harassment;
c) Hate crimes, including harassment;
d) Fraud schemes operating on the Net (particularly credit card fraud);
e) Software piracy;
f) Computer virus developments;
g) Terrorism, bomb-making, weapons trading etc.

Activities between consenting adults (providing they are within the law) are
not our concern.

Searching for the above violations our volunteers are encouraged to visit:

a) Live talk sites (Chat Rooms, IRC areas, MUDs etc);
b) Kids and Teens sites of all types;
c) Message boards, where visitors can leave postings;
d) Newsgroups (particularly "alt." newsgroups);
e) Any sites providing material / discussions / images / contacts of a
sexually explicit nature (there are thousands!)  These are unsupervised areas
of the Net where children may roam.  For example, parts of the World Wide Web
are online porno stores with the doors wide open, and with no staff inside.
 Kids can easily surf by.... The only warning says "Don't come in here if you
are under 18".  But there is noone there to check what is happening.  And
naturally enough kids are wandering in and looking at the merchandise.  This
is not acceptable on the streets of our cities, and yet we are allowing this
on the Net.

When discovering suspicious or criminal activity, CyberAngels should record
the date, time and place and nature of the violation and write down the
user's full ID and InterNet address.  Mail can be forwarded to
ganetwatch@aol.com, or volunteers may copy and paste information to send.

Please follow our advice and DO NOT attempt to challenge cybercriminals
directly.  Simply report the violations to us at Netwatch, and  also to the
System Administrators, or Service Providers, of the cybercriminal.  Email can
usually be sent to "Postmaster@..." or "Sysop@..." or "Sysadmin@...", or find
out by writing to/calling the company (the cybercriminal's Service Provider)
and asking them who you contact to report a violation.

As far as Web Sites are concerned, w e are encouraging parents to use some of
the new filtering software, that can screen out chosen areas of the WWW.
 Organizations like **"Safesurf"** are campaigning for Websites to register
as "child friendly", and are on the cutting edge in helping to develop new
software for parents to regulate their children's access to the Internet.  We
fully support Safesurf and are working together with them.  Together we
believe that CyberAngels and Safesurf will form an irresistible alliance for
Good on the Net!


6) How will the project develop?

The first stage of our project is to involve volunteers in pressurizing
Internet Providers to enforce their terms of service.  This involves the
accumulation of information and the reporting of violations to Service
Providers.

The second stage of our project involves the Police.  Information about
crimes will be passed to the relevant Police authorities, particularly Sex
Crime departments and Fraud departments.

For the third stage of our project we will have a section on our Web Site
where we will be offering rewards for information about various
cybercriminals.  There will be the equivalent of "Wanted" posters, asking for
further information about people who have already been reported to us, and
whom we have verified as cybercriminals.


7) Is this a US  First Amendment Issue? What about Freedom of Speech?  Don't
people have a right on the Internet to express their views freely?  Are the
CyberAngels proposing censorship?

CyberAngels support the First Amendment of the US Constitution.

We are not trying to abolish free speech, but we believe that freedom of
speech should not be exercised if by exercising it you are violating someone
else's basic rights.  For example I could claim freedom of speech to justify
talking sexually and obscenely to a young child - but we all know that that
is wrong. This is not a First Amendment issue.  Breaking the law takes
precedence over "freedom of speech".  We are all granted our freedom, but not
the freedom to hurt, corrupt, abuse or harass innocent people.

The First Amendment was not written to protect pedophiles.  No criminal can
claim "freedom of expression" to justify a crime.  Child pornographers on the
Net are criminals and should be brought to justice.

8) The Internet is huge and unregulated.  Surely such a project is an
impossible task?

The fact that the Net is impossible to maintain crime-free is no reason for
us to do nothing.  Each person does their part.  If everyone picked up their
own trash, there would be no need for garbage collectors.  The same could be
said of our streets.  We are not naively hoping to eliminate crime from the
Net, only to play our part in protecting the innocent majority from the
violations of the tiny tiny minority.

The Internet Community consists of millions of people.  That is millions of
potential CyberAngels.

TOGETHER WE CAN MAKE A DIFFERENCE!


9) What kinds of changes would the Guardian Angels / CyberAngels like to see?

a) We would like to see an improvement in User identification.  User ID is
impossible to verify or trace back.  The very anonymity of Users is itself
causing an increase in rudeness, sexual abuse, flaming, and crimes like
pedophile activity.  We the Net Users must take responsibility for the
problem ourselves.  One of our demands is for more accountable User IDs on
the Net.  When people are anonymous they are also free to be criminals.  In a
riot you see rioters wearing masks to disguise their true identity.  The same
thing is happening online.  We would like to see User ID much more thoroughly
checked by Internet Service Providers.
b) We would like to see Websites registering as "Child Safe" or "Child
Friendly", so that parents can use the new software to restrict children's
access.  We support Safesurf in their campaign on this issue.
c) We would like to see Internet Service Providers enforcing their Terms of
Service.
d) We would like to see a worldwide blacklist of known cybercriminals,
circulated to all Providers and regularly updated, so that these people could
be denied access to Internet accounts.
e) We would like to see the whole Internet Community united together to
protect the Net from all crimes and violations.

JOIN US, NOW!

------------------------------

Date: Fri, 27 Oct 95 11:43:28 PDT
From: Barry Gold <barryg@sparc.SanDiegoCA.ATTGIS.COM>
Subject: 2--Re: Attention Spammer: The War Has Started

Instead of using the extra-legal methods so heavily hinted-at in Patrick
Townson's comments, I think we should look at technological methods to
defend ourselves against Spammers.  I don't think we can stop them
althogether, but we can probably make their life more difficult and
get rid of all but two classes:
    (A) First-time offenders that don't know enough to cover their tracks
    (B) A very few, really dedicated and net-wise spammers who won't
       give a damn about the law.

Class (A), of course, can be dealt with by traditional methods: e-mail
the ISP and get their account cancelled.

Class (B) will probably require resort to the law, but I think we can
push them to the point where they will have to commit actual crimes in
order to get their spam through - which is why only a very few of them
will remain.

Let me (try to) explain:

The latest round of spam (the "Magazine subscription service") came
from an obviously forged address.  In general, the more experienced
spam artists forge the headers of their spam to make themselves harder
to track down.  (Which means it takes longer before we can get their
account cancelled.)  So, we make this a little harder:

Definitions:
    "real site": something with an IP address that is up 24-hours a
        day (more or less, allowing for possible down time due to
        telecomm problems, software bugs, hardware faults, etc.).

        To qualify as a "real site", you must be able to ping it and
        open an SMTP connection to it on the standard port (25).

    "hop": something that shows up in "received:" headers.  Each "hop"
        therefore causes either one "received: from... by..." header
        or a single pair of "Received: from" and "Received: by"
        headers, depending on the mailer daemons involved.

        Note that this isn't the same as the IP "hop" involved in the
        "hop count", "time-to-live", etc. fields.

Assumption:
    A legitimate e-mail address is no more than "n" (say 2) hops away
    from a "real site".  If it appears to be further away than that,
    the probability is that one or more "received:" headers have been
    forged to conceal the true origin of the message.

    1 hop would be even better, because then we can at least verify
    the site names for every message (see below).


1. Mailing lists: two steps:

    a) Improve majordomo and listserv to recognize obviously forged
    headers and dump the messages.  This is a simple change.  If the
    supposedly "verified" From: line is non-conforming, trash the
    message.  Some examples include:
        . more than one "from" address
        . totally ridiculous site names, especially where the
          top-level domain (the last one) isn't one of the "standard"
          three-letter names or a two-letter country code.

    b) A further improvement involves actually verifying the From:
    line before sending the message out again.  This would be more
    work, but would make the spammer's job much more difficult.  When
    processing a message, majordomo/listserv should open an SMTP
    connection to the site shown in the "From:" header.  If that can't
    be done, the Return-Path and/or Received: headers should be parsed
    to find a system that _can_ be connected to.

    If the From: site is "real", majordomo/listserv should go further
    and verify that a RCPT-TO: will be accepted by the smtpd at that site.
    If it isn't real, at least verify that the next-site in the
    return-path is acceptable (RCPT-TO: postmaster@site).

2. News: similar two steps

    a) a daemon that runs periodically and trashes anything in the
    spool directories that has a bad From: line.

    b) verify From: lines as above.  This might be done when the
    message is accepted by nntpd (or uucp, for sites that still use
    it).  Or the above daemon might do the verify for each message it
    scans.

Note that step b) can be improved by cacheing site names known to be
good and possibly even user names at those sites.

So, I can hear you asking, what does all this get us?  The spammers
will just put "real" site names and real usernames in their "From:"
headers, right?  Then when the software checks it out, the supposed
"From:" site will say "sure, I exist and I've got a user with that
name".  And the message will be posted/remailed, and the spam will go
on.

BUT, if we fix things so the spammer can only get a message in with a
real username, then those messages will be much closer to "forgeries" in
the legal sense: a document issued by person B, and purporting to issue
from person A.  I'm not a lawyer, so I'm not sure if an ordinary
letter qualifies for this purpose (as opposed to a check, deed,
contract, etc.) but it sure brings them a lot closer to a prosecutable
offense.

And if it isn't currently unlawful, I think we can get the legal
definition expanded without getting the government into
constitutionally questionable areas of regulating free speech.  We
don't need the govt telling people what's "on-topic" for a given
newsgroup or mailing list.  No regulation of "commercial" speech in
areas dedicated to "non-commercial" use -- and just try getting such a
law through a Congress dominated by commercial interests anyway.

Just a simple rule that makes it a crime to claim to be someone else.
Note that this doesn't outlaw pseudonyms per se.  Using an anonymous
account, or one where you've used "chfn" or equivalent to change the
name to something other than what you use for other purposes, wouldn't
be unlawful -- the basic rule still applies: you can use any name you
like, as long as the purpose isn't to defraud others.  But pretending
to be some other _real_ person would be a crime -- if not under
current law, then under rules that could be enacted, would be
defensible under constitutional challenge, and wouldn't be excessively
intrusive in our freedoms on the net.

In fact, such a law needn't (and _shouldn't_) mention the network,
computers, etc. at all.  It would be unlawful to sign someone else's
name to a letter sent via snailmail, e-mail, netnews, posted on a
supermarket bulletin board, or carved in the bark of a tree
(S.K. -heart- J.S.).

Of course, this still leaves the dedicated few who don't care about
the law, but they will be few and very much on the fringes, _not_ the
big companies that we usually worry about.  Just as existing rules
(and social controls) help keep down the number and intrusiveness of
crackers, I think this scheme would keep down the number and volume of
the spam artists.

So, whatdya think?

------------------------------

Date: Wed, 1 Nov 1995 00:34:11 -0800 (PST)
From: Declan McCullagh <declan@EFF.ORG>
Subject: 3--Scientology Attacks Carnegie Mellon University

Reprinted from FOCUS, vol. 25, no. 1,  October 1995, page 4:

        SCIENTOLOGY ATTACKS CARNEGIE MELLON UNIVERSITY

            by Declan McCullagh (declan@well.com)


A flame-war raging on the Internet over the Church of Scientology's
attempts to halt the distribution of its bizarre secret scriptures has
spread to Carnegie Mellon University.

When SCS senior research scientist Dave Touretzky placed a copy of a
Scientology tract on the World Wide Web in August, the church immediately
moved to cancel his netnews posts that mentioned the web pages.  It also
faxed printouts of the pages to CMU's attorneys and threatened a lawsuit
over "trade secret violations."

The same day, University Attorney Walter DeForest called Touretzky, who
agreed to remove the 136-page tract from his web site.  "DeForest didn"t
know what the legal status was of the court records and copyrighted
documents.  He was going to research this.  In order to spare CMU and
myself an unnecessary lawsuit, I voluntarily took the materials down," says
Touretzky.

Complicating the problem for CMU was the files' origin.  Touretzky's web
site contained documents that were then available to anyone who walked into
the federal court building in Los Angeles.  The court documents were later
sealed after attorneys for Scientology successfully argued that copyright
laws prohibiting unauthorized republication apply to the documents.

"This is not an easy area of the law since it combines the Internet with
controversial subjects," DeForest says.  "It's normal and appropriate for a
university to respect copyright -- if it exists.  It's consistent with
academic freedom."

The threats against CMU are the most recent in a series of lawsuits the
church has filed against Internet service providers, newspapers, magazines
-- and especially against its critics, who argue Scientology is a cult that
brainwashes and blackmails its members and harasses defectors and critics.

"The Church of Scientology has made a practice of suing people who have
been critics of their practices or their tactics.  The fact is that these
lawsuits are not meritorious," says Mike Godwin, staff counsel for the
Electronic Frontier Foundation, an online civil liberties group based in
San Francisco.

In August the church sued one of its former members for posting anti-church
information to the Internet and persuaded a federal judge to permit the
seizure of his computer.  The church then sued The Washington Post for
reporting on the computer seizure and quoting from public court records.
Ironically, the court documents were generated by Scientology's previous
lawsuit against TIME magazine, which in 1991 ran a cover story calling the
church a "thriving cult of greed and power."

Despite Scientology's best efforts, its religious teachings remain publicly
available on the Internet -- not just because of the efforts of critics and
free-speech advocates, but because network users delight in passing around
the excerpts, which read like one of Scientology founder L.  Ron Hubbard's
pulp science fiction novels.

Hubbard's scriptures claim that 75 million years ago an evil galactic
overlord named Xenu solved the galaxy's overpopulation problem by freezing
the excess population and transporting the bodies to Teegeeack, now called
Earth.  After the hapless travelers were defrosted, they were chained to
volcanoes that were blown up by hydrogen bombs.  Then, Hubbard writes in
Operating Thetan 7: "The Pacific area ones were taken in boxes to Hawaii
and the Atlantic area ones to Las Palmas and there "packaged."  His name
was Xenu.  He used renegades."

Elsewhere in the scriptures, Hubbard requires church acolytes to go to a
park or a zoo "with many types of life and communicate with each of them
until you know the communication is received and, if possible, returned."
The disembodied spirits of the dead are called "thetans" and supposedly
still haunt mankind, but Scientology offers ways to "audit" them away --
for a price.

Church members pay tens of thousands of dollars and wait years before
they"re "cleared" for this "Operating Thetan" (OT) knowledge.  (They"re
required to wait this long.  The tracts threaten pneumonia if the mentally
unprepared read the OT texts.)

Now, to the church's dismay, any of the Internet's 35 million users can
peruse the most private -- and lucrative -- teachings of Scientology.  The
band of online dissidents understands this.  Many are former church members
who became disaffected and left.  Some have used a private anti-cult
bulletin board system in Colorado to distribute news on the activities of
the church.  Others have relied on netnews.alt.religion.scientology, a
Usenet newsgroup, to disseminate information about Scientology tactics.

If alt.religion.scientology is the front line of the war on the Internet,
then the newsgroup is the Internet's equivalent of a food fight in a school
cafeteria.  The attacks on the church flowing through
alt.religion.scientology once prompted a church attorney to try and delete
the newsgroup from every computer on the Internet via an "rmgroup" control
message.

That raised the netiquette hackles of many Internet users and escalated the
online fight from a small-scale battle into a full-scale war.  It's one the
church can"t win, says EFF's Godwin.  "The church is going to lose.
They"re making so many people angry that they"re succeeding in motivating
people to become critics," says Godwin.

On the WELL, a computer conferencing system in California, Godwin posted:
"If the Church wanted the records sealed, it could have sought that.  In
the meantime, copyright interests do not normally trump the public's right
to know the details of court proceedings."

Another participant in the discussion, Jerod Pore, wrote that
alt.religion.scientology is "the site of the most vicious flame-war on the
Net: a flame-war that includes forged cancels of articles, with the
forgeries coming from sites such as the Department of Energy, real lawsuits
being filed to shut people up, death threats, midnight phone calls and the
like."

Other net-skirmishes have touched upon Scientology's attempts to censor
anti-church netnews posts by deleting them from Usenet servers; the
church's threats to sue people who posted the above-quoted lines about
communicating with animals at the zoo; the church's attempt to file
university disciplinary charges against a California college student; the
church's attempt to force Caltech to reveal the identity of one of its
alumni users; and the church's attempt to remove the contents of a web page
maintained by an MIT user.

But perhaps what riled online "netizens" the most was the church's raids on
Finland's anon.penet.fi anonymous remailer and on the Colorado anti-cult
bulletin board system.  In both cases, the church was able to seize
information to protect its "trade secrets" under international law.  The
secrets in question? Xenu and the galactic conspiracy.  On the Internet,
thousands of users every day rely on Julf Helsingus' anon.penet.fi server
to communicate anonymously with other users or post to controversial
netnews bboards under a numerical pseudonym automatically assigned by his
computer.  When Scientology and the Finnish police forced Helsingus to
reveal the true name of one of his users, his subscribers on the Internet
realized how vulnerable their identities were.

And more sparks started flying on alt.religion.scientology.  Recently, the
41-year-old church has experienced setbacks in its attempts to stifle its
critics.  Last month, a federal judge in Colorado upheld free speech claims
and ordered Scientology to return the computers and files seized from two
men who ran an anti-Scientology bulletin board.  An ad-hoc group of network
users formed and successfully fought the church's attempts to cancel
netnews posts.  On September 15, the judge in The Washington Post case said
she thought the newspaper had acted appropriately in printing the Xenu
excerpts and that Scientology had gone too far in snooping through the
computer they seized in August.  She ordered the church to "immediately
return and restore to [the defendant] all seized materials in their exact
original condition."  The uproar from the church's raids on computers
worldwide is why CMU's Touretzky became involved.  "I realized there was a
great interest in this material and I knew about the forged cancels.  I
wanted to further an educational purpose in a way that would be protected
from vandals," says Touretzky.

Even though Touretzky has removed the court records from his site, he
maintains a list of their current locations on the Internet.  After
Scientology threatened an Internet service provider in the Netherlands,
Dutch collections of the United States documents sprouted overnight.  "Many
of the Dutch sites are copies of my site.  My site's still up, but with
hyperlinks to the Dutch sites," Touretzky says.

A member of the Dutch House of Commons has put the materials on his home
page, and the materials are popping up elsewhere.  Once Xenu is out of the
bottle, there's no putting him back.


  DECLAN MCCULLAGH

For more information, look at: http://www.cs.cmu.edu/~dst/Fishman on the
World Wide Web.

[ screen dump of a Netscape display of the 1991 TIME Magazine volcano cover,
  "The Cult of Greed", showing the URL for the Fishman web site. ]

 ................

FOCUS -- in seven issues a year -- is a publication of the faculty and
staff of Carnegie Mellon University.  Many of the articles in FOCUS express
the opinions of individual members of the CMU community; unless so
indicated, they should not be construed as reflecting university policy.

------------------------------

Date: 28 Oct 1995 18:56:54 GMT
From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat)
Subject: 4--Head of the French hackers group was a secret service agent...

Bonjour,

In the October 12th issue of "Intelligence Newsletter", I note the
following text that the editor accept to put at the end of this email.
Don't hesitate to send me all your comments related at this fact...

The _Chaos Digest_ from the CCCF was build in this mission by me!

Regards,

-- Jean-Bernard Condat
   47 rue des Rosiers, 93400 Saint-Ouen, France
   Phone: +33 141238807, portable phone: +33 07238628
   JeanBernard_Condat@eMail.FranceNet.FR

  ========================================================
A Computer Spy Unmasked

For years Jean-Bernard Condat has undoubtedly been France's
best-known computer hacker. Appearing on television talk shows,
launching provocative operations and attending computer seminars, he
founded the Chaos Computer Club France (CCCF) in 1989 as France's
answer to the renowned Chaos Computer Club in Germany. French
journalist Jean Guisnel revealed this week in a book entitled Guerres
dans le Cyberespace, Internet et les Services Secrets (Cyberspace
War, Internet and Secret Services) published  by the Editions La
Decouverte  (ISBN 2-7071-2502-4) that Condat has been controlled from
the outset by the Direction de la Surveillance du Territoire.  A
student in Lyons where he followed music and information technology
courses, Condat was taken in hand by the local branch of the DST in
1983 after committing some "minor misdemeanor." The DST organized his
participation in hacker meetings abroad. Guisnel said that from 1989
onwards "Jean-Luc Delacour, Condat's handler at the DST, decided that
his proteg  was ready for bigger and better things." He asked Condat
to start up CCCF, then worked to promote his public image in order
that the largest number of hackers would gravitate towards him. The
DST printed hundreds of T-shirts and thousands of post cards for him.
When Thomson and Pechiney found that hackers were trying to break
into their systems Condat enabled the French counter-espionage
service to trace the intruders. When he was taking part in a
television program in 1991 in which he was to demonstrate how to hack
into a system his handler dictated what he should say in his
earphones.  Questioned by Intelligence Newsletter, Condat admitted he
had worked for the DST over a 52 month period and written up 1,032
reports during that time. He claims, however, that he broke with the
DST in 1991 and that he intends to shortly publish an account of what
he calls his "turpitude." Whether true or not, Condat worked for
several years for the SVP company before leaving it a few months ago
to take over a key function: he is now system operator for the France
forum on Compuserve.

Guisnel cites any number of cases of  how "Internet is controlled to
the bone" by such  measures as turning around hackers, systematically
bugging computer networks and manipulating newsgroups. "If no serious
company should confide its correspondence to the network and if no
government should use it to transmit sensitive information the reason
is that the NSA is watching and that all the network's communications
physically travel through the U.S., and very probably through
computer filters at its installations at Fort Meade, Maryland,"
Guisnel said. He said the conclusion was that advanced encryption
programs like PGP needed to be used if one wants to communicate in a
secure manner on the Internet. Citing the debate raging in the U.S.
over computer security which has made little impact in Europe,
Guisnel called on France to authorize the use of encryption by
everyone and criticized the country's reactionary policy in that
score. He said the attitude, while defensive in nature, was all the
harder to understand because its first consequence was to increase
the vulnerability of French companies, to the benefit of NSA.
 ------
Copyright 1995 Indigo Publications.  All rights reserved.
This news report may not be republished or redistributed, in whole or in
part, without the prior written consent of Indigo Publications.
For more information and sample issues, please mail to
indigo1@dialup.francenet.fr.

------------------------------

Date: Sun, 18 Oct 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 5--Cu Digest Header Info (unchanged since 18 Oct, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.86
************************************