Computer underground Digest Tue, Mar 10, 1992 Volume 4 : Issue 11 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Associate Editor: Etaion Shrdlu CONTENTS, #4.11 (Mar 10, 1992) File 1--Net Resources File 2--Readers Reply: "Bury Usenet" File 3--Readers Reply: Apology to Craig Neidorf (CuD #4.10) File 4--F.B.I. and Digital Communications Amendment (NYT synopsis) File 5--F.B.I.' Proposed Digital Communications Legislation File 6--CPSR Response to FBI Proposal File 7--"Real Hackers?" Comparing the old and the new (DFP Reprint) File 8--BBSes and Telco Rates File 9--HACKING grounds for dismissal File 10--Updated Info on 2nd Annual Int'l BBSing & Elec. Comm Conf. Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132), chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet in Luxembourg BBS (++352) 466893. NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL FURTHER NOTICE. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Mon, 9 Mar 92 19:58:41 CST From: Moderators Subject: File 1--Net Resources Frank Klaess, sysop of ComNet in Luxembourg, is providing CuDs and other text files on ComNet Luxembourg BBS. ComNet is a two-line, 14,400 board and the phone number is: (++352) 466893. ComNet is not yet accessible through internet, but Frank can be reached on PC-Exec BBS in Milwaukee (414) 789-4352. +++++++ The Well, perhaps the best system in the country, is now accessible through ftp (192.132.30.2). The initial sign-up is nominal, and usage fees are more than reasonable ($10 a month and $2 an hour). There are thousands of discussion topics, conferences on almost every issue conceivable, and there are a number of services and features that make it a valuable investment. Cybernauts would find the Hacking, EFF (Electronic Frontier Foundation) and CPSR (Computer Professionals for Social Responsibility) conferences especially interesting. ------------------------------ Date: 8 Mar 92 13:53:33 CST (Sun) From: peter@TARONGA.COM(Peter da Silva) Subject: File 2--Readers Reply: "Bury Usenet" Building a new net with a wider bandwidth and tighter controls, as Steve seems to want, is a SMOP. Write the software, build your Usenet II, and if it's really that far superior then it will supplant Usenet I. People are always coming up with improvements they'd like to the basic Usenet model, but none seem willing to put their money where their mouth is. Come on, Steve. You can use the existing transport mechanism, even. Just a new newsreader or two and you're in business! ------------------------------ Date: Sun, 8 Mar 92 13:55:28 EST From: The Advocate Subject: File 3--Readers Reply: Apology to Craig Neidorf (CuD #4.10) A poster in CuD 4.10 writes: > I never meant to suggest that Craig was in any way "at fault" for the > cost of his defense, nor to discourage people from donating money to > offset his expenses. I was just wondering, did craig ever consider getting a public defender? After all, he was above 18, he was an independent student. I think he could have qualified, with a little finagling. A lot of them are damn good. I think I had disconnected, during the arrest periods, due to work loads or i would have suggested it. HAve to admit, it would have been nice to put the tab on uncle sam. and federal PDs are 1000 fold better then local ones. ((Moderators' note: Craig's initial attorney seemed unfamiliar with the issues his case raised. The Advocate is correct in observing that many public defenders are competent, idealistic, and hard working. Unfortunately, the issues raised in this case were beyond the resources and expertise of most public defenders and required some specialized skills. In Chicago, the jurisdiction of Craig's trial, Federal public defenders are appointed only if the defendant can demonstrate financial need, and Craig, at best, probably would not have qualified. Public defense attorneys appointed by the presiding judge from a pro bono list, and while, through luck if the draw, it is possible to obtain some of the best legal counsel in the country, it is just as likely that he would be appointed one who neither was familiar with nor willing to take on the line of defense ultimately used. Unfortunately, our system of justice requires investment of resources before the wheels turn properly.)) ------------------------------ Date: Mon, 9 Mar 92 01:32:06 EST From: Cy Burway Subject: File 4--F.B.I. and Digital Communications Amendment (NYT synopsis) As Technology Makes Wiretaps More Difficult, F.B.I. Seeks Help (From: New York Times, March 8, 1992: p. I-12) By Anthony Ramirez The Department of Justice says that advanced telephone equipment in wide use around the nation is making it difficult for law-enforcement agencies to wiretap the phone calls of suspected criminals. The Government proposed legislation Friday requiring the nation's telephone companies to give law-enforcement agencies technical help with their eavesdropping. Privacy advocates criticized the proposal as unclear and open to abuse. In the past, the Federal Bureau of Investigation and other agencies could simply attach alligator clips and a wiretap device to the line hanging from a telephone pole. Law-enforcement agents could clearly hear the conversations. That is still true of telephone lines carrying analog transmissions, the electronic signals used by the first telephones in which sounds correspond proportionally to voltage. But such telephone lines are being steadily replaced by high-speed, high-capacity lines using digital signals. On a digital line, F.B.I. agents would hear only computer code or perhaps nothing at all because some digital transmissions are over fiber-optic lines that convert the signals to pulses of light. In addition, court-authorized wiretaps are narrowly written. They restrict the surveillance to particular parties and particular topics of conversation over a limited time on a specific telephone or group of telephones. That was relatively easy with analog signals. The F.B.I. either intercepted the call or had the phone company re-route it to an F.B.I. location, said William A. Bayse, the assistant director in the technical services division of the F.B.I. But tapping a high-capacity line could allow access to thousands of conversations. Finding the conversation of suspected criminals, for example, in a complex "bit stream" would be impossible without the aid of phone company technicians. There are at least 140 million telephone lines in the country and more than half are served in some way by digital equipment, according to the United States Telephone Association, a trade group. The major arteries and blood vessels of the telecommunications network are already digital. And the greatest part of the system, the capillaries of the network linking central telephone offices to residences and businesses, will be digital by the mid-1990s. Thousand Wiretaps The F.B.I. said there were 1,083 court-authorized wiretaps--both new and continuing--by Federal, state, and local law-enforcement authorities in 1990, the latest year for which data are available. Janlori Goldman, director of the privacy and technology project for the American Civil Liberties Union, said she had been studying the development of the F.B.I. proposal for several months. "We are not saying that this is not a problem that shouldn't be fixed," she said, "but we are concerned that the proposal may be overbroad and runs the risk that more information than is legally authorized will flow to the F.B.I. In a news conference in Washington on Friday, the F.B.I. said it was seeking only to "preserve the status quo" with its proposal so that it could maintain the surveillance power authorized by a 1968 Federal law, the Omnibus Crime Control and Safe Streets Act. The proposal, which is lacking in many details is also designed to benefit state and local authorities. Under the proposed law, the Federal Communications Commission would issue regulations to telephone companies like the GTE Corporation and the regional Bell telephone companies, requiring the "modification" of phone systems "if those systems impede the Government's ability to conduct lawful electronic surveillance." In particular, the proposal mentions "providers of electronic communications services and private branch exchange operators," potentially meaning all residences and all businesses with telephone equipment. Frocene Adams, a security official with US West in Denver is the chairman of Telecommunications Security Association, which served as the liaison between the industry and the F.B.I. "We don't know the extent of the changes required under the proposal," she said, but emphasized that no telephone company would do the actual wiretapping or other surveillance. Computer software and some hardware might have to be changed, Ms. Adams aid, but this could apply to new equipment and mean relatively few changes for old equipment. ------------------------------ Date: Mon, 9 Mar 92 19:58:41 CST From: Jim Thomas Subject: File 5--F.B.I.' Proposed Digital Communications Legislation Increasingly sophisticated technology available to the average citizen undeniably makes it more difficult for law enforcement to pursue legitimate investigations. When technology expands faster than society's capacity to examine the social, ethical, or legal implications of the changes, two potential problems emgerge: Laws that correspond to technological advances do not change, leaving law enforcement either handicapped or forced to implement illicit means in investigations, or laws change in ways that potentially intrude on civil liberties by reducing Constitutional protections. The trick is to find a happy medium. The legislation proposed by the U.S. Government reflects an attempt to bring current Federal legislation in line with technology. In principle, this is wise. In practice, questions arise that should be addressed in order to assure that the proposed legislation allows law enforcement to pursue its legitimate ends while simultaneously protecting the interests of citizens. The proposed legislation has not yet been submitted to Congress, and our understanding is that there is as yet no draft of the proposed changes. CPSR, EFF, the ACLU, and other groups appear to be actively involved in assuring that the language and implications of the final document will be carefully examined prior to submission. As we understand the proposed legislation, it would make it easier for investigators to conduct *legal* surveillance of digital, broad-band, communications by implementing technology that targets a specific user rather than an entire stream of users. To do this, telecommunications systems would require modification that would be implemented by the phone companies and would include changes in user devices. Among the questions the proposed legislation raises are: 1. Who would bear the costs of the modifications? Should costs be passed on to end telecommunications users? 2. How would the modifications change the requirements for obtaining warrants? 3. What potential abuses might arise from the modifications? 4. What unanticipated advantages or social benefits might emerge? 5. How might the concept of "good faith" be interpreted when non-targeted information is obtained? 6. How would the proposed legislation dovetail into recent U.S. Supreme Court decisions that expand the search powers of law enforcement? 7. What concepts or definitions of "telecommunications" and other terms would be established? How far would the scope of the legislation extend? Would it include data lines if it were suspected that the target were transferring an unlicensed version of Word Perfect? Among the "evidence" used to justify the seizure of Steve Jackson Games, the Secret Service claimed that the simple description of Kermit as a 7-bit protocol used to transfer data between mainframes and PCs was evidence of a conspiracy. Would this allow monitoring of all Kermit up/downloads by Steve Jackson employees? There are many other questions to be addressed, but the ultimate one remains: What is the best language that would protect both law enforcements' ability to carry out its function while preserving Constitutional rights? The recent history of some law enforcement officials, particularly in the Secret Service and a few local jurisdictions, indicates that the question is more than a philosophical debate. The consequences of ill-considered language for all involved require careful consideration of balance. The following is the press release proposing the legislation: +++++ U.S. Department of Justice Federal Bureau of Investigation Office of the Director Washington, D.C. 20535 March 6, 1992 STATEMENT BY FBI DIRECTOR WILLIAM S. SESSIONS CONCERNING PROPOSED DIGITAL COMMUNICATIONS LEGISLATION Law enforcement's continued ability to conduct court-authorized electronic surveillances is one of the most critical issues facing law enforcement today. However, recent telecommunications systems improvements have outpaced the government's ability to technologically continue this highly successful, and lawful technique. Consequently, the U.S. Government has proposed legislation requiring the telecommunications industry to ensure that its advanced digital telephone systems accommodate the legitimate needs of federal, state, and local law enforcement. Specifically, this legislation seeks to preserve the status quo of an extraordinarily efficient and effective technique utilized by law enforcement to conduct court-authorized electronic surveillances, as authorized by Congress in Title III of the Omnibus Crime Control and Safe Streets Act of 1968. The approach suggested in the legislation represents by far the least costly alternative and is the only certain method of addressing the issue. Without an ultimate solution, terrorists, violent criminals, kidnappers, drug cartels, and other criminal organizations will be able to carry out their illegal activities using the telecommunications system without detection. This proposal is critical to the safety of the American people and to the law enforcement officers who must daily enforce the laws of this country. The Legislative proposal is not solely a law enforcement proposal but is a result of a cooperative effort by Administration and Congressional leaders, telecommunications industry executives and law enforcement. ------------------------------ Date: Tue, 10 Mar 1992 17:47:59 -0500 From: dbanisar@washofc.cpsr.org Subject: File 6--CPSR Response to FBI Proposal CPSR letter on FBI Proposal CPSR and several other organizations sent the following letter to Senator Patrick Leahy regarding the FBI's recent proposal to undertake wire surveillance in the digital network. If you also believe that the FBI's proposal requires further study at a public hearing, contact Senator Hollings at the Senate Committee on Commerce. The phone number is 202/224-9340. Dave Banisar, CPSR Washington Office ==================================================== March 9, 1992 Chairman Patrick Leahy Senate Subcommittee on Law and Technology Committee on the Judiciary United States Senate Washington, DC 20510 Dear Senator Leahy, We are writing to you to express our continuing interest in communications privacy and cryptography policy. We are associated with leading computer an telecommunication firms, privacy, civil liberties, and public interest organizations, as well as research institutions and universities. We share common concern that all policies regarding communications privacy and cryptography should be discussed at a public hearing where interested parties are provided an opportunity to comment or to submit testimony. Last year we wrote to you to express our opposition to a Justice Department sponsored provision in the Omnibus Crime Bill, S. 266, which would have encouraged telecommunications carriers to provide a decrypted version of privacy-enhanced communications. This provision would have encouraged the creation of "trap doors" in communication networks. It was our assessment that such a proposal would have undermined the security, reliability, and privacy of computer communications. At that time, you had also convened a Task Force on Privacy and Technology which looked at a number of communication privacy issues including S. 266. The Task Force determined that it was necessary to develop a full record on the need for the proposal before the Senate acted on the resolution. Thanks to your efforts, the proposal was withdrawn. We also wish to express our appreciation for your decision to raise the issue of cryptography policy with Attorney General Barr at his confirmation hearing last year. We are pleased that the Attorney General agreed that such matters should properly be brought before your Subcommittee for consideration. We write to you now to ask that you contact the Attorney General and seek assurance that no further action on that provision, or a similar proposal, will be undertaken until a public hearing is scheduled. We believe that it is important to notify the Attorney General at this point because of the current attempt by the administration to amend the Federal Communications Commission Reauthorization Act with provisions similar to those contained in S. 266. We will be pleased to provide assistance to you and your staff. Sincerely yours, Marc Rotenberg, Computer Professionals for Social Responsibility David Peyton, ITAA Ira Rubenstein, Microsoft Jerry Berman, Electronic Frontier Foundation Mike Cavanagh Electronic Mail Association Martina Bradford, AT&T Evan Hendricks, US Privacy Council Professor Dorothy Denning, Georgetown University Professor Lance Hoffman, George Washington University Robert L. Park, American Physical Society Janlori Goldman, American Civil Liberties Union Whitfield Diffie, Sun Microsystems John Podesta, Podesta and Associates Kenneth Wasch, Software Publishers Association John Perry Barlow, Contributing Editor, Communications of the ACM David Johnson, Wilmer, Cutler & Pickering cc: Senator Joseph R. Biden, Jr Senator Hank Brown Senator Ernest F. Hollings Senator Arlen Specter Senator Strom Thurmond Representative Don Edwards Attorney General Barr Chairman Sikes, FCC ------------------------------ Date: Mon, 2 Mar 92 18:52:34 CST From: Digital Free Press Subject: File 7--"Real Hackers?" Comparing the old and the new (DFP Reprint) ((Moderators' note: The following article is reprinted from the Digital Free Press. DFP and the Underground Computing Foundation BBS are useful sources for material on the Computer Underground. The DFP can be contacted at: max%underg@uunet.uu.net)) Real Hackers? There is a lot of talk these days about how the word 'hacker' has been redefined by the press. The theory is that the old hackers, as portrayed in Steven Levy's excellent book _Hackers: Heroes of the Computer Revolution_, were good and pure and this breed of hacker dramatized in the press is some new evil non-hacker terrorist. This is nonsense. According to the book, the hacker ethic(paraphrased) is as follows: 1. Access to computers should be unlimited and total. 2. All information should be free. 3. Mistrust Authority - Promote Decentralization. 4. Hackers should be judged by their hacking. 5. You can create art and beauty on a computer. 6. Computers can change your life for the better. In pursuit of the hacker ethic these heroes performed various acts that would not be looked upon favorably in today's anti-hacker society: Used Equipment Without Authorization (Page 20) ++++++++++++++++++++++++++++++++++++++++++++++ "So, without any authorization whatsoever, that is what Peter Sampson set out to do, along with a few friends of his from an MIT organization with a special interest in model railroading. It was a casual, unthinking step into a science-fiction future, but that was typical of the way that an odd subculture was pulling itself up by its bootstraps and growing to underground prominence-to become a culture that would be the impolite, unsanctioned soul of computerdom. It was among the first computer hacker escapades of the Tech Model Railroad Club, or TMRC." Phone Phreaked (Page 92) ++++++++++++++++++++++++ "He had programed some appropriate tones to come out of the speaker and into the open receiver of the campus phone that sat in the Kluge room. These tones made the phone system come to attention, so to speak, and dance." Modified Equipment Without Authorization (Page 96) ++++++++++++++++++++++++++++++++++++++++++++++++++ "Nelson thought that adding an 'add to memory' instruction would improve the machine. It would take _months_, perhaps, to go through channels to do it, and if he did it himself he would learn something about the way the world worked. So one night Stewart Nelson spontaneously convened the Midnight Computer Wiring Society." Circumvented Password Systems (Page 417) ++++++++++++++++++++++++++++++++++++++++ "Stallman broke the computer's encryption code and was able to get to the protected file which held people's passwords. He started sending people messages which would appear on screen when they logged onto the system: 'I see you chose the password [such and such]. I suggest that you switch to the password "carriage return. "It's much easier to type, and also it stands up to the principle that there should be no passwords.' 'Eventually I got to the point where a fifth of all the users on the machine had the Empty String password.' RMS later boasted. Then the computer science laboratory installed a more sophisticated password system on its other computer. This one was not so easy for Stallman to crack. But Stallman was able to study the encryption program, and as he later said, 'I discovered changing one word in that program would cause it to print out your password on the system console as part of the message that you were logging in.' Since the 'system console' was visible to anyone walking by, and its messages could easily be accessed by any terminal, or even printed out in hard copy, Stallman's change allowed any password to be routinely disseminated by anyone who cared to know it. He thought the result 'amusing.' Certainly these hackers were not anarchists who wanted only to destroy. They had a personal code of ethics, the hacker ethic to base their behavior on. In fact the modern hacker has his/her ethics intact. Compare the above hacker ethic with the hacker ethic found in _Out of the Inner Circle_ by Bill 'The Cracker' Landreth, a teenager arrested by the FBI (Page 18,60): 1. Never delete any information you can not easily restore. 2. Never leave any names on a computer. 3. Always try to obtain your own information. The common denominator to these ethics systems are the respect for technology, and the personal growth through free access and freedom of information. Certainly the attitude towards private property is the same. Accessing and using equipment that you do not own is okay as long as you do not prevent those who own it from using it, or damage anything. With respect to the hacker ethic the hackers mentioned in _Cyberpunk: Outlaws and Hackers on the Computer Frontier_ by Katie Hafner and John Markoff were in fact good hackers. If free access, and free information were the law of the land would Kevin Mitnick have gone to jail? I do not think so. Sure he got the source code for VMS, but is there any evidence that he used this information for personal gain, or did he simply use the information to improve his understanding of the VMS operating system? Robert T. Morris's worm program was a clever hack. Of course he 'gronked' it by programming the replication rate much too fast, but still there is no evidence that he had any intention of doing harm to the system. It was simply a computer experiment. Who owns the Internet? Is it some mysterious 'them' or is it our net? If it is out net, then we should be able to try some stuff on it, and to heck with 'them' if they can't take a joke. Of course the German hackers are a different story. What they got in trouble for was espionage, and not hacking, which is a breach of faith, and is hacking for personal gain. However selling Minix to the KGB almost makes it forgivable... It is my contention that hackers did not change. Society changed, and it changed for the worse. The environment the early hackers were working in correctly viewed these activities as the desire to utilize technology in a personal way. By definition hackers believe in the free access to computers and to the freedom of information. If you do not believe in these principles you are not a hacker, no matter how technologically capable you are. You are probable just a tool for the greed society. Current bad mouthing of hackers is simply snobbery. Rather than cracking down on the modern hacker, we should reinforce the hacker ethic, a code of conduct not based upon greed and lust for the almighty dollar, but instead for personal growth through the free access of computers and information, and a respect for technology. It is the humane thing to do. ------------------------------ Date: Sun, 8 Mar 92 03:21 EST From: "Michael E. Marotta" Subject: File 8--BBSes and Telco Rates GRID News. ISSN 1054-9315. vol 3 nu 5 March 7, 1992. World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA ------------------------------------------------------------------ (54 lines) Say YES! to Business Rates (C) 1992 by Michael E. Marotta BBS sysops in Oregon are fighting a telco policy to charge busi- ness rates for any phone with a fax or modem attached. BBS users know of similar telco policies from Kansas City, New York, Illinois, Indiana, Michigan and Texas over the last two years. Actually, there are at least two ways to view the situation. (1) THE HOME DATA CENTER In an information society, every home must be an information center. We have telephones and televisions, books, newspapers and magazines, computers, copiers, faxen, cable TV, VCRs, camcorders and answering machines. There is a view, wrongly held by sysops, that they "provide a service to many users." EVERY BBS USER IS A SYSOP. Whether you go to them or they go to you, data travels from home to home. (2) THE HOME TREASURY In a commercial society every home must be a business. We all buy and sell. Most of us buy and sell labor. (Anyone can build a car; most people choose not to.) In addition, people everywhere and Americans especially buy and sell housewares, nutritional supplements, baseball cards, comic books, automobiles and very many other goods. We routinely trade childcare, bookkeeping and computer programming services. Your checkbook is your general ledger. In 1892, "no one" had an adding machine or typewriter in their home. In 1942, dishwashers were found only in restaurants. Should your phone rate depend on whether or not you have a dishwasher or adding machine in your home? If yours should not, then why should General Motors'? Karl Marx's "Communist Manifesto" mandated public schools as a prerequisite to socialism. It is no accident that schools supported by tax dollars justify many marxist assertions. Among these is the myth that "businesses" are "rich" and can afford higher phone rates, while "workers" are "poor" and deserve a subsidy for the "right" to a phone. Another fallacy of marxism is that telephones are a "public utility" that must be regulated or owned by the state. Judging by other markets, if you let anyone become a phone company you will find that those who use more service will pay more in toto less per call. A user's or provider's race, sex, sources of income, height or weight will be equally irrelevant. Those who are good at providing information and carrier services will prosper and the others will become telco hobbyists. ------------------------------ Date: Fri, 6 Mar 1992 19:55:42 GMT From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory Subject: File 9--HACKING grounds for dismissal A recent article in the _Solicitors Journal_ (Sept. 1991, p.1008-10) posed the question as to whether the unauthorised access to a Company's computer was grounds for dismissal of an employee. It was written by Geoff Holgate, and the following is based on it. The issue came before the court English Employment Appeals Tribunal (EAT) and is reported in Denco Ltd. v. Joinson [1991] 1 Weekly Law Reports 330. The employee, Michael Joinson, worked as a sheet metal worker for Denco Ltd. which manufactured air drying and air conditioning equiptment. In 1988 Denco installed a computer which had a number of VDU terminals attached to it. The computer was also used by another company, Intek, which operated out of the same premises. Denco's policy was to encourage its employees to use the terminal even though their jobs didn't strictly require it. The computer, via a series of menus, provided information relating to the part-icular department within the company. To gain access to a particular menu (or sub-menu) the user was required to enter a user identity code and password. The password was changed every week. The purpose of the passworded system was that the information was provided on a 'need to know' basis, and only those authorised to access a particular menu were entitled to use it. The system's history file (which recorded every stroke entered on every terminal on the system) revealed an unauthorised access to certain of Intek's records on the system. This access was traced to Joinson (who admitted the unauthorised access). He had used the password of the daughter of a fellow employee who was an Intek trainee. Joinson was a member of the Amalgamated Engineering Union. Indeed, he was chairperson of a joint committee representing the AEU and other unions. Denco alleged that Joinson had used the identity code and password to obtain information which would be of use to him in his trade union activities, such use being hostile to the company. Joinson claimed that his access to the unauthorised information was accidental. He was summarily dismissed for gross misconduct. Joinson complained he had been unfairly dismissed. The Employment Appeal Tribunal (hearing an appeal by Denco against an industrial tribunal which found in favour of Joinson) held that "if an employee deliberately used an unauthorised password in order to enter, or attempt to enter, a computer known to obtain information to which he was not entitled, then that of itself was gross misconduct which prima facie would attract summary dismissal..." [quote from article, p.1009, not judgement] However the EAT then went on to limit their decision by emphaising that "there may be some exceptional circumstances in which such a response might be held ule". [quote from case in article, p.1009] The tribunal reasoned that as maintenance of the integrity of information stored on an employer's computer was important, it was in the best interests of management to make it "abundantly clear" that interference with its integrity would result in severe penalty. Any comments from the floor? ------------------------------ Date: Tue, 3 Mar 92 02:49:54 MST From: mbarry@ISIS.CS.DU.EDU.CS.DU.EDU(Marshall Barry) Subject: File 10--Updated Info on 2nd Annual Int'l BBSing & Elec. Comm Conf. FOR IMMEDIATE RELEASE Contact: Terry Travis or Michelle Weisblat IBECC A Non-Profit Educational, Literary, and Scientific Society P.O. Box 486 Louisville, CO 80027-0486 Presents The 1992 International BBSing and Electronic Communications Conference (303) 426-1847 [VOICE] (303) 429-0449 [Fax] (303) 426-1866 [DATA/BBS] E-Mail: IBECC@f69.n104.z1.FidoNet.Org What is IBECC '92? ------------------ IBECC '92 is the SECOND ANNUAL International BBSing and Electronic Communications Conference. It will be held AUGUST 13-16, 1992 in Denver, Colorado. This year's theme is "Socially Responsible Computing." -------------- Special Guests -------------- DR. JERRY POURNELLE, Ph.D. - Computer Columnist and Editor (Byte), Author (Science Fact and Fiction), Lecturer, Consultant on the Impact of High Technology on Society, Chairman of the Citizen's Advisory Council on National Space Policy, and Outspoken Social Critic - Speaking on "Socially Responsible Computing", the future of communications and technology in an electronic world, as well as his own views on the society of tomorrow. LARRY NIVEN - Futurist, Hugo Award-Winning Author, Designer of Worlds, Supporter of Space Conquest - Speaking on the future of networks as personal interfaces, reality overtaking fantasy, and living with computers when you really don't want to. DAVID HUGHES, SR. - Architect of Big Sky Telegraph (the Montana Electronic School House), Consultant, Mover and Shaker, President of Old Colorado City Communications, U.S. Military (ret) - Speaking on NREN, the SuperComputer Highway, and education through computers and networking. Attending IBECC '92 ------------------- IBECC '92 is an intensive THREE-DAY conference. Sessions planned include: "Introduction to BBSing" (What is a BBS, and How Do I Use It?), "BBSes and the Law" (The Legal Rights and Responsibilities of BBS Operators and Users), "Safe Computing" (The Detection and Prevention of Computer Infection), "Rumor Control 1992" (Knowing the Difference Between Fact and Fiction, and Taking Action Where Needed), "Why Kelly CAN Read" (An Exploration into Education and the Computer), "NREN" (The National SuperComputer Highway and How it Will Affect Us All), "Staying Alive" (BBSing, Electronic Communication and the Homebound / Physically Challenged), and "Security? What's That?" (The What, Why, and How of Keeping Your Data and Information Safe). Should you attend? If you have an interest in electronic communications, bulletin boards, telecommuting, security or safe computing, yes. If you would like to understand what a "hacker" is, and is not, and what you can do to protect your electronic privacy, yes. If your children make more use of your modem or computer than you do, yes. In fact, unless you have absolutely no interest in using your computer for interacting with the world, you should be there! So that the conference will retain its personal and informal atmosphere, attendance at IBECC '92 is strictly limited. What Is IBECC? -------------- IBECC is a Non-Profit Educational, Scientific, Literary and Charitable Society (IRS 501(c)(3) applied for). Incorporated in Colorado, IBECC's purposes include the promotion of national and international electronic communications, the advancement of telecommunications and teleconferencing, the improvement of communications between electronic networks, education in the uses, requirements, and security of online services, and general support of the electronic community. A non-profit organization, IBECC is much MORE than just another %trade show' -- it is a year-round clearing house for ideas, news, and relevant information. IBECC represents the interests and concerns of not only the professional, but the hobbyist and home user as well. IBECC is primarily Volunteer-Run. Membership (currently $25.00/year individual, $100.00/year corporate) pays for the IBECC Newsletter and electronic Bulletin Board System (BBS), telephones, support and information services, etc. - not salaries. The founders of IBECC, who are all handicapped, are extensively involved in computer networks and electronic communications, and also run several BBSes in the Denver area. ---------------------------------------- IBECC '92 Membership & Hotel Information ---------------------------------------- (All Rates are in U.S. Dollars) VIP (Includes IBECC Membership and VIP Suite) SPECIAL RATE THROUGH MARCH 8, 1992: $80.00 March 9, 1992 through June 15, 1992: $125.00 June 16, 1992 through July 31, 1992: $175.00 August 1, 1992 and at the door (if available): $200.00 Spouse/Significant Other, with VIP Member: $9.69 Children (Under 14), with VIP Member: FREE Call or Write for Other Rates (Conference Only, Handicapped, etc) Conference Location ------------------- The conference will be held in the SAME HOTEL AS LAST YEAR: Sheraton Denver West Hotel & Convention Center 360 Union Boulevard, Lakewood, CO 80228 (800) LAKEWOOD or (303) 987-2000 Rates ----- $62.00 (+ tax) Single or Double Please Mention IBECC for this DISCOUNTED RATE! Special Rates on Hospitality and Sleeping Suites may be Arranged through IBECC ---------------------------------- VENDORS, DEALERS, and DISTRIBUTORS ---------------------------------- Dealer and Vendor Booths and Tables Available at VERY Competitive Rates Please Call or Write for Information and Rates IBECC - Now, More than Ever, Your Connection to the WORLD! IBECC BBS: (303) 426-1866 (3/12/24/96/14.4 v.32bis/v.42/HST) IBECC VOICE INFORMATION: (303) 426-1847 (Mon-Sat, 9AM-7PM, MST) IBECC Mailing Address: P.O. Box 486, Louisville, CO 80027-0486 ------------------------------ End of Computer Underground Digest #4.11 ************************************