<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://kb42.info/index.php?action=history&amp;feed=atom&amp;title=BBS%2Fedit</id>
	<title>BBS/edit - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://kb42.info/index.php?action=history&amp;feed=atom&amp;title=BBS%2Fedit"/>
	<link rel="alternate" type="text/html" href="https://kb42.info/index.php?title=BBS/edit&amp;action=history"/>
	<updated>2026-05-15T17:25:53Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://kb42.info/index.php?title=BBS/edit&amp;diff=7893&amp;oldid=prev</id>
		<title>Maintenance script: Politics BBS Archive</title>
		<link rel="alternate" type="text/html" href="https://kb42.info/index.php?title=BBS/edit&amp;diff=7893&amp;oldid=prev"/>
		<updated>2023-09-24T02:35:55Z</updated>

		<summary type="html">&lt;p&gt;Politics BBS Archive&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Category:BBS]]&lt;br /&gt;
[[Category:Politics]]&lt;br /&gt;
[[Category:Censorship]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Infobox BBS&lt;br /&gt;
| image         = Archived-En.png&lt;br /&gt;
| file          = edit.txt&lt;br /&gt;
| author        = Unknown&lt;br /&gt;
| date          = Unknown&lt;br /&gt;
| subject       = &lt;br /&gt;
| orig_bbs      = Unknown&lt;br /&gt;
| bbs_main_page = &lt;br /&gt;
| key_words     = Politics&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
THERE&amp;#039;S GOTTA BE A BETTER WAY&lt;br /&gt;
&lt;br /&gt;
By	Glen Roberts&lt;br /&gt;
	Bill Vajk&lt;br /&gt;
&lt;br /&gt;
COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED.&lt;br /&gt;
&lt;br /&gt;
This issue of Full Disclosure is devoted to the current attempts at solving &lt;br /&gt;
the problems of computer security through prosecution of computer crimes.&lt;br /&gt;
&lt;br /&gt;
It would appear from the recent activities of the federal government that one &lt;br /&gt;
of its major attacks is trying to spread fear throughout the ``hacker&amp;#039;&amp;#039; &lt;br /&gt;
community. Such a concept will certainly work in a limited number of cases. &lt;br /&gt;
However, as the reading of any local newspaper will show, numerous crimes are &lt;br /&gt;
committed everyday, criminals are not stopped by the fear of punishment.&lt;br /&gt;
&lt;br /&gt;
The other aspect of the government&amp;#039;s fear program appears directed towards &lt;br /&gt;
those who have no criminal involvement, who wish to participate in First &lt;br /&gt;
Amendment activities by high-technology. Some have been subjected to &lt;br /&gt;
punishment without even the allegation of criminal behavior. See related &lt;br /&gt;
article titled ``Dr. Ripco Seizure.&amp;#039;&amp;#039; The result is a fear by some of &lt;br /&gt;
participating in the First Amendment, not a legitimate goal of law &lt;br /&gt;
enforcement or the government.&lt;br /&gt;
&lt;br /&gt;
Reprinted in this issue is a copy a sentencing memorandum filed by the &lt;br /&gt;
Government last year in a computer crime case. It portrays the defendants as &lt;br /&gt;
particularly ``powerful by&amp;#039;&amp;#039; means of the information they stole. Missing is &lt;br /&gt;
the fact that the lax nature of computer security is what actually gave the &lt;br /&gt;
defendants power. If the state of computer security been reasonable secure, &lt;br /&gt;
the information obtained by defendants (whether legally or not) would have &lt;br /&gt;
granted them no extraordinary power.&lt;br /&gt;
&lt;br /&gt;
A primary reason the government seeks incarceration as part of the sentence &lt;br /&gt;
is not because of the criminal nature of the defendants activities, but &lt;br /&gt;
rather to send ``the message that the hackers around the country need to &lt;br /&gt;
hear.&amp;#039;&amp;#039; Unfortunately, the death penalty has failed to stop murder.&lt;br /&gt;
&lt;br /&gt;
The government appears to be more concerned with the free flow of information &lt;br /&gt;
than the fact that criminal acts were committed; ``[f]rom the start, &lt;br /&gt;
information was stolen and, by definition no longer safeguarded.&amp;#039;&amp;#039; Later &lt;br /&gt;
concluding, ``in essence, stolen information equalled power, and by that &lt;br /&gt;
definition, all three defendants were becoming frighteningly powerful.&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
The concept that information is the crux of the problem is also highlighted &lt;br /&gt;
by William Cook, Assistant United States Attorney, Chicago, Illinois in an &lt;br /&gt;
article he wrote for the Spring 1990, COMMUNICATOR&amp;lt;M^&amp;gt;*1. He noted that &lt;br /&gt;
hackers can ``easily keep up with industry technical developments.&amp;#039;&amp;#039; He also &lt;br /&gt;
perceives that hackers are able to easily use prior information to form &lt;br /&gt;
attack plans on new computers.&lt;br /&gt;
&lt;br /&gt;
As the Soviet Union moves toward a more open society, the United States is &lt;br /&gt;
just as surely closing its windows of communication. The United States has &lt;br /&gt;
always been the technological forefront in the world because of the ease of &lt;br /&gt;
information flow. Researchers, corporations and individuals have always been &lt;br /&gt;
free to group together and exchange information as desired. This has greatly &lt;br /&gt;
increased the ability of the United States to make technological advances &lt;br /&gt;
quickly.&lt;br /&gt;
&lt;br /&gt;
One can easily see the results by looking at the space programs administered &lt;br /&gt;
by NASA. They have resulted in many inventions finding their way quickly into &lt;br /&gt;
our economy, including rapid improvements in our exports. A few of the things &lt;br /&gt;
that have resulted from NASA&amp;#039;s openness with U.S. industry have included: new &lt;br /&gt;
applications such as teflon coatings (frying pans and such), inhalation &lt;br /&gt;
therapy for lung ailments, teflon coatings for asbestos fiber made into &lt;br /&gt;
special apparel for rescue in fires, and many more too numerous to mention.&lt;br /&gt;
&lt;br /&gt;
The phenomenon of information exchange is exactly what William Cook describes &lt;br /&gt;
in his article. However, because the ``hackers&amp;#039;&amp;#039; have apparently built or &lt;br /&gt;
made use of a highly efficient communications medium they have been able to &lt;br /&gt;
advance as quick as corporations which have failed to take devote resources &lt;br /&gt;
to advance their informational security. The corporate security departments &lt;br /&gt;
should make use of the same hacker communication techniques to work on their &lt;br /&gt;
problems and see their use of the ``frightening power&amp;#039;&amp;#039; of information lead &lt;br /&gt;
to secure computer systems.&lt;br /&gt;
&lt;br /&gt;
The Communications Fraud Control Association (CFCA) in its published FRAUD &lt;br /&gt;
ALERT of June 21, 1990, is concerned that the government may not be able to &lt;br /&gt;
stop computer crime, if several organizations promising funding for legal &lt;br /&gt;
defense follow through. At risk is the review of several federal and state &lt;br /&gt;
statutes for compliance with constitutional guidelines. To date, even with &lt;br /&gt;
the presence of one such rights organization, the EFF&amp;lt;M^&amp;gt;&amp;lt;MI^&amp;gt;*2, in at least &lt;br /&gt;
two federal cases, such a review has thus far been thwarted.&lt;br /&gt;
&lt;br /&gt;
In short, we see the CFCA&amp;#039;s position as allowing only two choices: 1) violate &lt;br /&gt;
the rights of hackers in order to obtain convictions, or 2) the world will be &lt;br /&gt;
runover by a rampage of hacking activities.&lt;br /&gt;
&lt;br /&gt;
Two decades ago, the same problems, but with slightly different technology &lt;br /&gt;
was showing its ugly face. The related article in this issue ``The Death of &lt;br /&gt;
the Blue Box&amp;#039;&amp;#039; overviews the legal difficulties the government had in &lt;br /&gt;
prosecuting those stealing telecommunications services.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the law enforcement efforts to stop blue boxers were by all &lt;br /&gt;
practical means of measurement a complete failure. Only a handful of &lt;br /&gt;
thousands of offenses were prosecuted. Those prosecutions proved to have no &lt;br /&gt;
deterrent effect on others. Just as we will see that the few recent computer &lt;br /&gt;
hacker prosecutions will do nothing to stem the flow of current day hacking &lt;br /&gt;
and telecommunications fraud.&lt;br /&gt;
&lt;br /&gt;
Prosecution of crimes throught to be victimless does little more than to &lt;br /&gt;
strengthen the resolve to not get caught in a very evoluntionary way. The &lt;br /&gt;
solution today is the same as it was in the blue box solution. An upgrading &lt;br /&gt;
of the technology will prevent the simplistic attacks that are so common. The &lt;br /&gt;
first step towards a technological upgrade requires an increase in the &lt;br /&gt;
communication between those experiencing compromise of their data.&lt;br /&gt;
&lt;br /&gt;
The CFCA&amp;#039;s COMMUNICATOR claims in the February 1990 issue of Security &lt;br /&gt;
Management to be the only regular journal on telecommunications crime. &lt;br /&gt;
Apparently overlooking, CUD, 2600 and the non defunct Phrack. That is a small &lt;br /&gt;
start towards the free flow of information needed by those who are looking &lt;br /&gt;
for security solutions for their companies.&lt;br /&gt;
&lt;br /&gt;
*1 Communications Fraud Control Association (CFCA), 7921 Jones Branch Dr, &lt;br /&gt;
#300, McLean, Virginia 22102, Phone: (703) 848-9768, Fax: (703) 356-3701. The &lt;br /&gt;
association also operates a Consumer Hotline for anyone experiencing phone &lt;br /&gt;
fraud.&lt;br /&gt;
&lt;br /&gt;
*2 EFF, The Electronic Frontier Foundation, 155 Second St, Cambridge, MA &lt;br /&gt;
02141, Phone: (617) 864-0665, Fax: (617) 864-0866. &lt;br /&gt;
&lt;br /&gt;
The above is reprinted from Full Disclosure Newspaper. Subscribe today and &lt;br /&gt;
get interesting articles like the above, plus more... pictures, graphics, &lt;br /&gt;
advertisement, and more articles. Full Disclosure is your source for &lt;br /&gt;
information on the leading edge of surveillance technology. Print the &lt;br /&gt;
following form, or supply the information on a plain piece of paper:&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please start my subscription to Full Disclosure for:&lt;br /&gt;
&lt;br /&gt;
[ ] Sample issue, $2.00&lt;br /&gt;
&lt;br /&gt;
[ ] 12 issue subscription, $18.00&lt;br /&gt;
&lt;br /&gt;
[ ] 24 issue subscription, $29.95&lt;br /&gt;
     With 24 issue susbcription include free one of the following:&lt;br /&gt;
         [ ] Directory of Electronic Surveillance Equipment Suppliers&lt;br /&gt;
         [ ] Citizen&amp;#039;s Guide on How to Use the Freedom of Info/Privacy Acts&lt;br /&gt;
         [ ] Maximizing PC Performance&lt;br /&gt;
&lt;br /&gt;
Also available separately:&lt;br /&gt;
&lt;br /&gt;
[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00&lt;br /&gt;
&lt;br /&gt;
[ ] Citizen&amp;#039;s Guide on How to Use the Freedom of Info/Privacy Acts, $5.00&lt;br /&gt;
&lt;br /&gt;
[ ] Maximizing PC Performance, $6.00&lt;br /&gt;
&lt;br /&gt;
    Illinois residences, add 6.5% sales tax on above 3 items.&lt;br /&gt;
&lt;br /&gt;
Enclosed is payment in the form of:&lt;br /&gt;
&lt;br /&gt;
[ ] Check/Money order, [ ] Visa, [ ] Mastercard&lt;br /&gt;
&lt;br /&gt;
Card no:___________________________________ Exp date:_______&lt;br /&gt;
&lt;br /&gt;
Signature:__________________________________________________&lt;br /&gt;
&lt;br /&gt;
Phone:______________________________________________________&lt;br /&gt;
(required for credit card orders)&lt;br /&gt;
&lt;br /&gt;
My name/address:&lt;br /&gt;
&lt;br /&gt;
Name:_______________________________________________________&lt;br /&gt;
&lt;br /&gt;
Street:_____________________________________________________&lt;br /&gt;
&lt;br /&gt;
City/State/Zip:_____________________________________________&lt;br /&gt;
&lt;br /&gt;
Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Maintenance script</name></author>
	</entry>
</feed>