Computer underground Digest Wed Oct 5, 1994


Computer underground Digest    Wed  Oct 5, 1994   Volume 6 : Issue 86
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Urban Legend Editor:  E. Greg Shrdlugold

CONTENTS, #6.87 (Wed, Oct 5, 1994)

File 1--The Dilemma of Crypto
File 2--MCI Worker in Phone-card Ripoff (w/obligatory hacker link)
File 3--Judge Rejects FBI Delay
File 4--An Invitation to Hear Your Opinion! (Seattle Times)
File 5--Outlaws on the Net: Criminal Law in Cyberspace
File 6--The Scary Story of Serdar Argic (EYE Reprint)
File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

From: weyker@WAM.UMD.EDU
Date: Thu, 29 Sep 1994 21:56:09 -0400
Subject: File 1--The Dilemma of Crypto

Hi. The following is a little bit dated now (it responds to Bruce
Sterling's article on crypto some month's back in Wired magazine's
"Infobahn Warrior" issue), since it has been languishing in my account
for several months while I waited to see if Wired would run part of it
as a letter.  They didn't.

It's probably worth noting that I wrote David Chaum the leading
advocate of Digital Cash and asked for some ideas on how "validating
authorities" and other stuctures he mentions in his Scientific
American article might be able to deal with some of the concerns I
express below. I did this hoping I could revise the article and make
it more constructive and less alarmist about crypto's possible
realtionship to future white-collar crime.  Unfortunately Mr. Chaum
never wrote back.

Much of this piece is raw speculation and I welcome corrections from
people who are better informed about the intricacies of crypto,
net.privacy, and computer/financial crime.

Shayne Weyker
weyker@wam.umd.edu

the text of the piece follows:
----------------------------------------------------------------------------

                            Clipper:
                 How much privacy can we afford?
                  How much security do we need?

                        by Shayne Weyker
                       weyker@wam.umd.edu

Three cheers for Bruce Sterling. Finally someone on the privacy
side of the Clipper debate has the courage to admit that Clipper
might indeed provide some needed protection against crooks and
terrorists. I want to try and do a bit more of what Bruce has done:
to try and pin down what the real dangers are both of strong crypto
and of bans on strong crypto.

To date, the anti-clipper faction has tried to deny the force of
the "law enforcement needs wiretaps" argument. They have claimed that
wiretaps aren't truly necessary and that law enforcement officers
will just have to work a bit harder.

This often-repeated argument has a flaw in it that I've heard no one else
mention. It doesn't acknowledge the fact that more and more crimes that
used to be susceptible to discovery through means other than wiretapping
(witnesses, visual or audio surveillance, physical searches) may soon be
concealed to all forms of discovery *except* wiretapping and its variants.
More and more of our life will take place over the wires, so it is no
surprise that more and more crime will take place there as well.

FROM PAPER TO DIGITAL VAPOR
Criminals who wanted to share things like military secrets, monthly
sales reports for drugs or stolen merchandise, and lists of stolen
credit card numbers used to have to keep a lot of this stuff on
paper. But more and more folks own computers and modems, and
software will eventually make using and sharing the computer files
even easier than paper. How long will it be before cops long for
the days when they could arrest someone and search their premises
for incriminating documents and actually expect to find anything
that isn't encrypted with RSA or PGP? Cops will be less able to
find incriminating paper evidence if crooks are smart enough to
keep things on computers and encrypted. And while I think privacy
advocates too often tend to make the criminal in their own image,
the privacy advocates' argument is that crooks are indeed smart and
careful with incriminating data.

"IF YOU WANNA ROB A BANK YOU MUST BEWARE,
YOU'VE GOTTA USE THE COMPUTER UPSTAIRS"
Criminals who want lots of quick cash now often go stick-up a bank.
And even if hacking into and diverting money from banks' Electronic
Funds Transfer (EFT) systems or a company's billing system is more
their style, they still have to work at it. The hackers who claimed
to have diverted funds from an EFT system gave an involved story
about how they went to multiple banks, used phony identities, and
altered their appearance and handwriting each time when they opened
an account and again when they went back to withdraw their loot
over several visits. Somewhere in all those visits they may have
slipped up and given a clue as to who really picked up the money.
But if those hackers could bypass all this by just transforming
other people's bank deposits into their own digital cash with a few
keystrokes, all these opportunities to screw up and leave clues
behind go away.

BACK TO THE FUTURE:
TWENTY-FIRST CENTURY GRIFTERS

     [Con artists' schemes in the 1800s] often presupposed the
     anonymities of a mobile society. Con men slipped from
     place to place; geographically speaking; they also milked
     the fact of social ambiguity. . . . boundaries between
     classes (of every sort) were more porous than before. It
     was possible to pass oneself off as a lord, a professor,
     or a rich investor, which simply could not have been done
     in a tight, controlled, barnacled society where the
     markers of class are more obvious, if not indelible. . .
     . Technology permitted the more obvious forms of
     emulation [of the upper class]: cheap copies of hats or
     dresses; mass-produced artifacts and furniture.

Lawrence Friedman noted that in 1800s America fraud skyrocketed.
Two of the reasons he gives for this have fascinating parallels
with the social environment of the net.

The first was the anonymity of people in communities with a high
turnover in their membership. There was no opportunity to develop
a moral track-record on the community's members which people could
use when deciding who to trust. The second was the new high-tech
mass-produced objects, furniture, and fashionable clothes could be
used to let the con artist appear in all ways to be a member of the
respected upper class.

Does any of this sound familiar? Modern people have adapted to the above
circumstances, but the net society with crypto looks like it's going to
give us heightened anonymity and entirely new means to simulate
respectability which will lead to another whole generation getting being
ripped off.

Privacy advocates have been saying, with some good reason, how nice
the anonymity of the net is. And indeed it is good in some ways
that we judge professors, high schoolers, and street people only by
their words. It is also empowering for some to be able to use the
net to create virtual personas for themselves in communication with
other people that will appear to be real.

But there's a dark side to this. Yes, anonymity does mean one can
escape retribution for whistleblowing and avoid unfair prejudices
of others based on one's appearance and surroundings. But anonymity
also means one can escape retribution for actions that fully
deserve punishment like spamming the net, e-mail bombing, or
forging nasty posts in widely-read newsgroups. This can be done by
hiding behind chains of anonymous remailers or getting a new
account with a new name when too many folks have started to warn
others about you.

Also, one can create a virtual persona for oneself in e-mail and
postings, such as that of a cancer victim, designed to elicit trust
and confidence from those of a similar background who may be
emotionally vulnerable. This trust is undeserved and subject to
abuse, while the eventual discovery of the lie damages the tricked
person's (and others') ability to trust people they meet on the
net. If this kind of abuse becomes common, the cloud of suspicion
hanging over people's communications on the net will hinder the
very trust needed to form those kinds of associations of private
individuals that Bruce Sterling and others are so fond of.

Finally, returning to con artists, there may be increased
gullibility on the users' part once teleconferencing becomes common
and buying stuff on the net is an everyday practice. Con artists
could then use set design and image processing for the video end of
the scam and fancy programming to appear established and credible
to folks checking out their site on the net. So, the con artist
never has to meet the victim in person and anonymity based on
encryption makes it nigh-impossible to connect the grifter with the
victim's money.

REACH OUT AND TOUCH SOMEONE

For an extreme, if unlikely, case, consider the murderer who
remotely reprograms some victim's household robot to electrocute
him. No hope of witnesses or physical evidence there. Finding out
who made the suspect call to the house to plant the code is the
only hope. Sometimes the cops will be lucky and have a suspect who
happens to be a programmer, but convicting this person without his
being caught with the killer program code or being identified as
party to the suspect communication to the victim's house will be
tough.

THE RUN-DOWN

People interacting with others using cryptography-aided
telecommunications are currently expected to be able to:
- be totally anonymous in cyberspace
- create multiple pseudonymous virtual identities for themselves--
each with separate and un-crosscheckable personal associations and
finances
- secretly conduct financial dealings
- secretly exchange valuable commercial or government secrets
- secretly exchange socially-disapproved-of (or illegal)
information

Libertarians and anarchists may think all these things sound great.
They may be excited by opportunities for whistleblowing, anonymous
political expression, secret political organization for oppressive
environments, riskless sharing of erotica and other sometimes-legal
data, and so on.

But responsible adults should spend equal amounts of time thinking
about opportunities for easier planning of terrorism, easier
evasion of punishment for abusing innocent people on the net, and
very real benefits for con artists, money launderers, embezzlers,
tax cheats, and other white-collar crooks.

THE OTHER SIDE OF THE COIN:

Remember though, it was said earlier that more and more of human
life is going to take place over the wires. Clipper advocates may
well say that they're only trying to maintain the same ability to
wiretap that the government has had for decades. But if more and
more of our lives are there to see in our telephone and data
communications, and those communications remain less protected than
other forms of communication such as face to face, then our overall
privacy is going to be eroded.

Bulletin Board Systems aren't as private as the local coffeehouse
or bar. 900-number sex lines aren't as private as a visit to a
lover. Videoconferences aren't as private as face to face meetings.
E-mail and ftp aren't as private as postal mail. The list goes on.

This erosion of privacy is rightly thought to be a bad thing in and
of itself, and unrestricted crypto looks like the only way to stop it.

THE SEEMING ALL-OR-NOTHING DILEMMA OF CRYPTO

We seem to have two choices.

We can let crypto run free. This probably means more terrorism,
some of it with really impressive body-counts. It means lots more
white collar crime, and somewhat more distrust on the net. The
terrorism and crime may mean that the public hastily agrees to give
up other freedoms if they think the government has suddenly become
ineffective in protecting them.

Or the developed nations can get together and ban crypto and watch
most people's privacy quickly disappear. The technology-elite
corporations and individuals will still develop their own, and some
criminals will pay hackers for secure internal communications.
Meanwhile, in the developing world, oppressive governments gain a
powerful new weapon. Heavy regulation of crypto will have much the same
effect.

It's an ugly choice. And I've heard too many people dismiss the folks on
the other side as either voyeuristic fascists or paranoid anarchists with
a "don't worry, be happy" attitude towards public safety.  Both sides are
doing public who depend upon the quality of the debate a disservice. The
debate should have less fear-mongering about what is goin to happen if
"the other side" wins, and more brainstorming about exactly what new
technology, new laws, and new behaviors we can develop which will protect
us against the very real dangers of a world with too much or too little
crypto in the public's hands.

------------------------------

Date: Wed, 5 Oct 1994 17:33:21 CDT
From: Anonymous <cudigest@mindvox.phantom.com>
Subject: File 2--MCI Worker in Phone-card Ripoff (w/obligatory hacker link)

Source: Chicago Tribune, Oct 4, 1994, p. 4 (AP Wire story):

               MCI WORKER IS CHARGED IN HUGE PHONE-CARD THEFT

   An MCI employee has been charged with stealing more than 100,000
telephone calling-card numbers that were used to make $50 million in
long-distance calls, federal investigators said.

   Ivey James Lay was a main supplier of the numbers for an
international ring operating in Los Angeles, Chicago and other U.S.
cities, as well as in Spain and Germany, said the U.S. Secret Service,
which investigates interstate telephone fraud.

   Tens of thousands of customers at MCI, AT&T, Sprint and some local
telephone companies were victims, the Secret Service said. Those
consumers won't be billed for fraudulent calls on their phone-card
numbers, spokesmen for MCI, AT&T and Sprint said.

   Lay, a switch engineer based in Charlotte, N.C., was known as
"Knightshadow" to computer hackers. He devised computer software to
divert and hold calling-card numbers from a variety of carriers that
ran through MCI's telephone switching equipment, said Secret Service
special agent Steven A. Sepulveda.

   According to MCI officials, the case is the largest of its kind in
terms of known losses. The theft was far more sophisticated than past
credit-card and calling-card scams, MCI said. In the others, thieves
had access to a small number of cards.

   In this ring, the numbers were purchased by computer hackers in the
United States and Europe, who in turn sold them to Europeans who would
use them later to call the United States for free, Sepulveda said.

------------------------------

From: email list server <listserv@SUNNYSIDE.COM>
Date: Mon, 3 Oct 1994 13:28:35 -0700
Subject: File 3--Judge Rejects FBI Delay

                       Judge Rejects FBI Delay

      =============================================================

PRESS RELEASE

For immediate release
October 3, 1994

Contact:
Marc Rotenberg, EPIC Director
David Sobel, EPIC Legal Counsel
202 544 9240 (tel)


            JUDGE REJECTS DELAY ON FBI WIRETAP DATA;

                 "STUNNED" BY BUREAU'S REQUEST

WASHINGTON, D.C.- A federal judge today denied the FBI's request
for a five-year delay in processing documents concerning wiretap
legislation now pending in Congress.

     Saying he was "stunned" by the Bureau's attempt to postpone
court proceedings for five years, U.S. District Judge Charles R.
Richey ordered the FBI to release the material or to explain its
reasons for withholding it by November 4.

     The Electronic Privacy Information Center (EPIC), a public
interest research group based in Washington, DC, filed the Freedom
of Information Act lawsuit on August 9, the day legislation was
introduced in Congress to authorize the expenditure of $500
million to make the nation's communications systems easier to
wiretap.  The group is seeking the public release of two surveys
cited by FBI Director Louis Freeh in support of the pending
legislation.

     The FBI had moved to stay proceedings in the case until June
1999, more than five years after the filing of the initial
request.  The Bureau asserted it was confronted with "a backlog of
pending FOIA requests awaiting processing."  The FBI revealed that
there are "an estimated 20 pages to be reviewed" but said that the
materials would not be reviewed until "sometime in March 1999."

     Judge Richey rejected the FBI's claims in sharp language from
the bench.  He told the government's attorney to "call Director
Freeh and tell him I said this matter can be taken care of in an
hour and a half."

     In court papers filed late last week, EPIC charged that
the requested materials are far too important to be kept secret.
"The requested surveys were part of the FBI's long-standing
campaign to gain passage of unprecedented legislation requiring
the nation's telecommunications carriers to redesign their
telephone networks to more easily facilitate court-ordered
wiretapping," said the EPIC brief.

     Earlier documents obtained through the FOIA in similar
litigation with the FBI revealed no technical obstacles to the
exercise of court-authorized wire surveillance.

     The FBI is pushing for quick enactment of the wiretap
legislation in the closing days of the 103rd Congress.  A
grassroots campaign to oppose the measure is being coordinated by
EPIC and Voters Telecomm Watch.

     The Electronic Privacy Information Center is a project of
Computer Professionals for Social Responsibility, a membership
organization based in Palo Alto, California, and the Fund for
Constitutional Government, a Washington-based foundation dedicated
to the protection of Constitutional freedoms. 202 544 9240 (tel),
202 547 5482 (fax), info@epic.org (e-mail).

------------------------------

Date: Mon, 26 Sep 1994 08:00:02 -0700 (PDT)
From: 2020 World <year2020@seatimes.com>
Subject: File 4--An Invitation to Hear Your Opinion! (Seattle Times)

The year 2020, what will it be like?  By then, the big version of what we
call the info-highway will have been with us for some time.  Society will
have undergone major adjustments, earthquake-sized shifts.  Today's
journalism about the info-highway misses the point.  What difference does
it make if it's coax or fiber, PC or set-top box, TCI or AT&T.  What
matters is how it will change our world.

Our world will change dramatically.  How?  Where?  What?  Today, if you
are curious about this stuff, you have two choices; read the Time
magazine-type "general interest" feature written by someone who hasn't got
a clue, or read the Wired magazine-type "top ten"  Industry-leaders/
futurists (you know who they are!) lecture us on their particular vested
interest.  Either way, the real changes are not being discussed.  Let's
change that.

I want to invite you to participate in a global group exploration of life
in the year 2020.  Let me introduce myself and then explain.  My name is
Kurt Dahl and I am currently the Vice President of Information Technology
at The Seattle Times (Seattle's major metro newspaper).  I am writing a
new weekly column that will be published in the Sunday Seattle Times
Personal Technology section.

The column is called 2020world.  The idea of 2020world is to explore how
our lives will change when the information highway is a familiar and
integral part of our society.  The column will *NOT* be about technology,
that's why I picked the year 2020, by then we can all agree that a
broadband, fully switched, ubiquitous network will have been in place for
many years.  How that network will change our lives, not how it will work,
is the question 2020world will address.

So now you are thinking -- I really don't need to read more simple-minded
drivel about the information highway.  I agree, you don't, and won't.
2020world will explore ideas that are far outside the typical, boring
discussions of home-shopping and video-on-demand.  Yet it will be written
for the general reader.  Let me show you how.  I have included the first
column from September 25th, as an example.  Please read it, then you will
get the idea.

Here is where you come in, and this is the most impo~
To join in, simply reply (as shown below) and you will automatically be
enrolled as a subscriber to our mailing list.  Each week the new 2020world
column will be e-mailed to you as well as the best and most exciting
comments and responses.  If you want to respond, simply send an e-mail to
our address (also included below).  Any questions, send me an e-mail or
call.

But first, read the inaugural column!  Here goes...

Copyright 1994 Seattle Times Company

            2020world column title:  Emily is illiterate

The information superhighway -- aren't you tired of reading about it?
And it doesn't even exist!  But it will.  And after it's built, we will
live in a very different world.

How different and in what ways?  What you have read in the press so far
is a lot of trivial chatter about "home shopping" and movies-on-demand"
combined with boring technical details.  These stories just don't come
close to capturing the profound changes we will experience.  To better
understand where we are going we need a new approach, fresh ideas.
That's what this column will try to do.

Let's discover this new world together.  Let's use one of the most
intriguing new capabilities of the information superhighway:  the concept
of group-mind.  Here's how:  I'll start with an original, sometimes
outrageous, thought about life in the year 2020, and you send me your
reaction to that idea.  I'll organize the most thoughtful, expansive and
mind-stretching responses, and we will print them.

Your thoughts and questions can lead us in new directions.  Over time we
will follow these "group-mind" wanderings whichever way they go.  If we
succeed, 2020world will be as much your space as mine.

   It's the year 2020, your daughter Emily is 9 years old, and she
   can't read or write.  Is this your worst nightmare about our schools
   come true?  Nope, Emily just doesn't need to read or write anymore.

The written word is a means to an end and not an end in itself.  We use
it to communicate with large groups and to preserve ideas, but we prefer
the spoken word.  In 2020world, with the ability to create, store and
send audio and video as easily as written words, why would we need to
read and write?

Look inside your own head.  Do you store information as written words?
Do you dream in written words?  No, you don't.  Visual images and spoken
languages are our natural form of information.  Writing is nothing more
than a technology.  It can be replaced by something better.  In fact,
some forms of the written word are being replaced right now, like
shorthand.  Can you think of other dead technologies?

I'll bet you are now in the "but what about..." stage:

But what about education?  Video can do anything books can do;
well-produced video can do many things better.  Which is the better way
to learn about the Civil War -- reading a text for 10 hours or watching
10 hours of Ken Burns' PBS production on the Civil War?

But what about the law?  Don't we need the precision implied by written
rules?  Perhaps, but wouldn't videos of the original trials, legislative
debates, rulings and precedents be a better guide to future generations
than law books?

Send me your own "but what abouts."  But make sure to include your
thoughts about how the 2020world would deal with those situations, too.

Does Emily really need to read and write in 2020world?  I don't think
so.  Do you?

      **************************************************************
      *                                                            *
      *  Kurt Dahl is vice president of information technology at  *
      *  The Seattle Times.  The views he expresses here are not   *
      *  necessarily those of The Seattle Times Company.           *
      *                                                            *
      **************************************************************

SUBSCRIPTION INSTRUCTIONS:

2020world is currently an unmoderated list, however, there are plans to
implement the DIGEST option.  All mail sent to this list will be sent to
all other subscribers.

To subscribe, mail to:

        majordomo@seatimes.com
        and, include in body of text:  subscribe 2020world

If you choose not to subscribe, but would like to e-mail me directly with
your comments, my address is:

        year2020@seatimes.com

or, call me at:

        206-464-3339

or, FAX me at:

        206-382-8898

Thanks for taking the time to read this loonnggg e-mail.  Please join in
and help us understand the real nature of our world after the information
highway is built.  Send your subscription e-mail right now!  I'm looking
forward to adding your thoughts to our discussion.

One last request, please forward this invitation to those who you think
would be interested.

Thanks!

Kurt Dahl

------------------------------

Date:         Tue, 4 Oct 1994 15:44:33 -0500
From:         Stephen Smith <libertas@COMP.UARK.EDU>
Subject: File 5--Outlaws on the Net: Criminal Law in Cyberspace

                   District of Columbia Bar Association

                        The New Technology Committee
            of the Computer Law Section, and the Criminal Law and
        Individual Rights Section, invite you to a Panel Discussion entitled:

            CRIMINAL LAW IN CYBERSPACE:  OUTLAWS ON THE NET

Speakers:      Scott Charney, Chief, Computer Crimes
               Unit of the U.S. Department of Justice

               Mike Godwin, Counsel to the Electronic Frontier Foundation

               Mark D. Rasch, Arent Fox Kintner Plotkin & Kahn

Moderator:     Andrew Grosso, Co-Chair, New Technology Committee


Whenever a new technology becomes prevalent, the law enters a period of
struggle during which it tries to find adequate means for resolving disputes
involving that technology, and for protecting the rights of people affected
by it.  We are now in such a period for the Internet and the developing
National Information Infrastructure (NII).  Of all legal fields, the struggle
concerning the criminal law is the most pronounced, since old statutes
must be narrowly construed to protect civil liberties, while used in a
creative fashion in order to deter malevolent acts which have never seen
before.   This program focuses on computer network crime having national
and international ramifications, including several recent investigations and
prosecutions.

This panel brings together noted experts in the field of civil liberties and
computer crime to discusses the issues presented by the latest
developments in this area.  Scott Charney is the Chief of the Computer
Crimes Unit of the U. S. Department of Justice, and is actively involved
in the formulation of federal policy with regard to computer-related
crimes.  Mike Godwin is the On Line Legal Counsel for the Electronic
Frontier Foundation who is a respected defender of civil liberties for
telecommunications users.  Mark D. Rasch is prominent defense attorney
who, while an attorney with the Fraud Section of the Department of
Justice, prosecuted the "Internet Worm" case  in 1989.  Andrew Grosso,
the panel moderator, is a Co-Chair of the New Technology Committee and
a former federal prosecutor.  Written materials by the panelists will
be distributed.

Date:     Thursday, October 27, 1994

Time:     12:00 Noon

Place:     D.C. Bar Headquarters
           1250 H Street, N.W.

Cost:     Box Lunch:       $25.00 for Section members and
                             students; $30.00 for Non-Members.
          Program Only:    $19.00 for Section Members and students;
                             $24.00 for Non-Members.
 ____________________________________________________________

                        REGISTRATION FORM
 ____________________________________________________________

Mail to:  Computer Law Section
             D.C. Bar, 1250 H Street, N.W. 6th Floor
             Washington, D.C.  20005-3908

Please reserve ____________ spaces(s) for me at the October 27 program.
Enclosed is my check for __________ made payable to the DC Bar.

Checks must be received by October 25.  Sorry, phone reservations cannot
be accepted.

Name(s)               Phone(s)               Bar No(s).         Bar Member?

 _____________         ____________           ___________          Yes/No

 _____________         ____________           ___________          Yes/No

 _____________         ____________           ___________          Yes/No


Please notify the Sections Office (202-626-3463) if you require any
special dietary or physical accommodations.

------------------------------

Date: Fri, 2 Sep 1994 11:08:07 -0400 (EDT)
From: eye WEEKLY <eye@IO.ORG>
Subject: File 6--The Scary Story of Serdar Argic (EYE Reprint)

((MODERATORS' NOTE:  We're periodically asked what we know about
Serdar Argic.  All we know is what we read on the Nets and....from EYE
Magazine, a first-rate arts/culture 'Zine out of Toronto. Argic
is considered by some to be a finalist for the all-time NetKook
award. Here's why.))


  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY                                                July 28 1994
Toronto's arts newspaper                      .....free every Thursday
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYE NET                                                        EYE NET

                         HOWLING IN THE WIRES
                  -- A net.poltergeist horror story

                                  by
                     ARMENIAN CRIMINAL/CROOK/WACKO
                             K.K. CAMPBELL


Huddle round the fire, little netters ... lend yer ear to hear The
Scariest Net.Story Ever Told. 'Tis a tale of a creature so hideous, so
awe-inspiring, so inhuman, so incomprehensible, that none that
behold it dare sleep without altering their .newsrc again.

We speak of none other than "Serdar Argic."

The Serdar-thing manifested outta nowhere, terrorized Usenet News
for two blood-curdling years ... then, just as mysteriously,
disappeared without trace.

So wide was the spectre's swath that nary a Usenetter hasn't
stumbled into a newsgroup only to be confronted by this wild-eyed
banshee gnawing at the cables. The Argic.poltergeist posted
endlessly, reams and reams of repeat-info to irrelevant newsgroups,
so insatiable was its bloodlust.

The entity's purpose? Whitewash Turk genocide against Armenians
in WWI. The entity's tactics? Snark School of Demagoguery:
Whatever I say three times is true -- so if I say it 37 million times,
it must really really be true.

And the Argic-entity did just that -- April 29 last, Usenet stats
indicated "Serdar Argic" had, over two weeks, posted 935 articles
(66 a day) comprising over 7,100 kbytes of Armenian-hatred. A full
.5 per cent of Planet Earth's Usenet posts.

                     SMELLS LIKE SERDAR SPIRIT

So, who or what is "Serdar Argic"? No one is completely sure. But
the net.poltergeist has many avid hunters. You think swapping
"banned" Homolka info is fun, kids? You ain't seen nothing yet.
Argicology is a Usenet passion without compare.

Veteran Argicologist Warren Burstein is certain "Serdar Argic" was,
originally, Hasan B. Mutlu, an AT&T employee. Burstein brought forth
several rare specimens of Mutlu's early-'90s Usenet posts. Indeed,
they're stylistically identical to Argic.chain.rattling -- schoolyard
taunts like "Hey gum brain"; the famous phrase "Armenian terrorist
from the ASALA/SDPA/ARF Terrorism Triangle"; and the clever
segue, "In any event, let me get back to the real issue at hand,"
namely, denying the Turk slaughter of Armenians.

Mutlu disappeared from Usenet after someone scanned a picture of
him from an AT&T technical digest, and uploaded it to the net. Its
caption reads: "Hasan B. Mutlu, a member of the technical staff in
the Computing Technology Department at AT&T Bell Laboratories in
Napervile, Ill."

After this, the Serdar spectre arose through a Minnesota-based
Internet site run by an Ahmet Cosar. (Type "whois anatolia.org" at
shell prompt for info.) Some suggest Cosar is Serdar Argic. To back
the Cosar-is-Argic theory, Argicologists point to a March 22, 1994,
post where Cosar (probably by mistake) uses the Argic account to
post a personal reply. He signs it "Ahmet Cosar."

Others think the Argic-entity is a "bot" -- an "artificial
intelligence" that greps (searches) select newsgroups for buzzwords
(like "Turkey" or "Greece") and responds. (Many contend the U.S.
National Security Agency has done this for years with phone lines,
listening for its own obsessive buzzwords.)

The latter would explain some truly bizarre Argic-entity replies. For
instance: Ken Arromdee (arromdee@jyusenkyou.cs.jhu.edu) signed all
his posts with the line: "On the first day after Christmas my
truelove served to me ... Leftover Turkey!" Deliberate bot-bait. Sure
enough, the Argic-entity once responded to this with data on evil
Armenians, drawn by the word "turkey" but unable to understand the
difference between country and bird.

                           NOW YOU SEE HIM ...

And, just as suddenly, it was gone. Usenet is still stunned. There are
several rumors: the spook was recalled by secret Turkish
government handlers, propaganda campaign terminated (Turkey still
officially denies the Armenian holocaust). Or it was finally
exorcised by UUNet for extreme breach of user agreement. Or Cosar
left the University of Minnesota (voluntarily or otherwise), thus
losing access to the paper's computer.

"Anatolia.org was a student machine for a student newspaper --
Cosar lost access because he was so busy being Argic he didn't have
time to be a computer science student," contends battle-hardened
Argicologist Joel Furr (jfurr@acpub.duke.edu). Furr is creator of the
newsgroup alt.fan.serdar-argic (with a little help from Canada's
prodigal son, Bruce Becker).

"Is the baton just being passed?" Furr asks in a phone interview. "Is
it an organization, where they decide who is going to be the robo-
poster for the year? Mutlu started it and recruited, by my theory."

So what will be the next manifestation of the net.wraith? Burstein,
currently in Israel (warren@itexjct.jct.ac.il), told eye he thinks the
current low-volume Armenian-haters now in soc.culture.turkish are
just Argic-groupies. "Joel thinks these folks are aliases for
whoever was behind Mutlu and Argic. I'm not sure, as they aren't at
all abusive, unlike the real thing -- and they do answer email."

                      THAT CERTAIN SERDAR STYLE

Furr has created a popular net.collectible: Serdar Argic T-shirts! We
kid you not. He's sold 136, from Osaka, Japan, to Lund, Sweden. It's a
break-even project, not for profit. Write Furr for info: the shirts are
about $15 in U.S. funds. Furr says his next T-shirt subject will honor
two-bit, suck-my-left-nut lawyers Canter and Siegel -- net.spammers
(they posted an ad in 5,000-plus newsgroups) extraordinaire.

Serdar shirt art, designed by Furr, Paul Vail and Peter Vorobieff, can
be downloaded from eye's gopher site "gopher.io.org" in the
/misc/Argicology directory. You can also find the Argic FAQ
(frequently asked questions) file, written by Burstein, in the same
directory, along with the scanned picture of Mutlu.


  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace        Author holds standard copyright
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
eye@io.org           "Break the Gutenberg Lock..."        416-971-8421

------------------------------


------------------------------

Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493
          In BELGIUM: Virtual Access BBS:  +32.69.45.51.77 (ringdown)

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #6.87
************************************



=END=

Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS