Computer underground Digest Sun Apr 21, 1996 Volume 8 : Issue 32 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.32 (Sun, Apr 21, 1996) File 1--Golden Key Campaign File 2--(Fwd) Congress puts bomb-making material on internet File 3--Canadian "criminalization of technology" File 4--Re: Cu Digest, #8.29, Apr 11, 1996 File 5--Re: The Day the Sites Went Out in Georgia? File 6--Proposed Swedish law about computer-mediated communication File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 23 Apr 1996 21:47:56 -0500 From: "David Sobel" Subject: File 1--Golden Key Campaign PRESS RELEASE Wednesday, April 24, 1996 URL: http://www.privacy.org/ipc/ Contact: Marc Rotenberg, EPIC, 202/544-9240 Lori Fena, EFF, 415/436-9333 Barbara Simons, USACM 408/463-5661 Kurt Stammberger, RSA 415/595-8782 ------------------------------------------ INTERNET PRIVACY COALITION FORMED Golden Key Campaign Launched Groups Urge Good Technology for Privacy and Security Senator Burns to Introduce Legislation ------------------------------------------ WASHINGTON, DC -- A new coalition today urged support for strong technologies to protect privacy and security on the rapidly growing Internet. The Internet Privacy Coalition said that new technologies were critical to protect private communications and on-line commerce, and recommended relaxation of export controls that limit the ability of US firms to incorporate encryption in commercial products. Phil Zimmermann, author of the popular encryption program Pretty Good Privacy, expressed support for the effort of the new coalition. "It is time to change crypto policy in the United States. I urge those who favor good tools for privacy to back the efforts of the Internet Privacy Coalition." GOLDEN KEY CAMPAIGN LAUNCHED The Coalition has asked companies and Internet users to display a golden key and envelope to show support for strong encryption technology. Copies of the logo are available at the group's web page on the Internet. According to Lori Fena, director of the Electronic Frontier Foundation, the purpose of the campaign is to educate the public about new techniques for privacy protection. "Society's feelings about privacy have not changed, only the medium has," said Ms. Fena. US industry has pressed the US government to relax export controls on encryption as consumer demand for software products has increased. They cite the fact that foreign companies have been able to sell strong products in overseas markets that are now restricted for US firms. Jim Bidzos, President and CEO of RSA Data Security, said that US firms continue to face excessive burdens. "Encryption is the key to on-line commerce. Government regulations are simply keeping US firms out of important markets." The Internet Privacy Coalition is the first net-based effort to bring together a broad base of companies, cryptographers and public interest organizations around the central goal of promoting privacy and security on the Internet andurging relaxation of export controls. Dr. Barbara Simons, chair of the public policy committee of the Association for Computing said, "The broad support for the Golden Key campaign shows that the reform of encryption policy is a shared goal for companies, users, and professional associations." SENATOR BURNS TO INTRODUCE LEGISLATION The Internet Privacy Coalition is being established as Congress considers new legislation to relax export controls on encryption. Senator Conrad Burns (R-MT) today introduced legislation that would relax export controls on commercial products containing technologies for privacy such as encryption. Marc Rotenberg, director of the Electronic Privacy Information Center, said "We believe that Senator Burns has put forward a constructive proposal. We look forward to working with him to ensure that good tools for privacy and security are widely available to Internet users." Hearings on Senator Burns bill are expected to take place in early June. The proposal has already gathered support from a bipartisan coalition in Congress. For Internet users who are interested in following the debate about encryption policy, the IPC has set up a Web page with information about encryption regulations, court challenges, legislative developments, and organizations and companies involved in the campaign. The Internet Privacy Coalition was established by more than a dozen of the nation's leading cryptographers, and thirty associations, companies, and civil liberties organizations committed to strong privacy and security technology for all users of the Internet. URL: http://www.privacy.org/ipc/ ---------------------------------------------- A KEY, AN ENVELOPE -- Both are historic means for communicating privately and protecting personal information. Today, encryption tools provide this privacy in the electronic world. The Golden Key Campaign is being launched to raise awareness and support for the preservation of the right to communicate privately and the availability of new techniques which make it possible. Privacy, a fundamental human right, has been affirmed by the US Supreme Court, the constitutions and laws of many countries, and the United Nations Universal Declaration of Human Rights. Privacy must be preserved as we move from paper to electronic communications. The Internet Privacy Coalition is urging members of the net community to display a Golden Key & Envelope symbol on their Web pages to show support for the right of privacy and the freedom to use good tools of privacy without government restraints. ------------------------------ Date: Sun, 21 Apr 1996 00:46:55 -0400 From: tallpaul Subject: File 2--(Fwd) Congress puts bomb-making material on internet Ah, the things one thinks about late at night. The post below is self-explanatory and might make a wonderful short piece for _CuD_. I personally checked the URL and instructions and Rochkind is correct. The good folks in Congress really did post to the internet how to make "babyfood bombs" and a nasty detanator for them as well! As "Mr. Roger's Capital Hill Neighborhood" might put it: "the word for today Congressmen and Congresswomen is 'clueless.' Can you spell C-L-U-E-L-E-S-S?" >----- Forwarded message (jrochkin@cs.oberlin.edu (Jonathan Rochkind)) At 11:45 PM 04/19/96, Rich Graves wrote: >Oh yeah, and Biden read the full text of the "Attention All Unabomber >Wannabes" and "Babyfood Bombs" documents into the Congressional Record, >supposedly to underscore the point that those nasty Republicans are >endorsing such nasty nasty stuff. Sort of like Exon's little blue book. > >So if you want to know how to build a baby-food bomb, simply write your >congresscritter. Or access the congressional record on thomas, as Rich gives earlier gives us a URL to. Go to http://thomas.loc.gov/r104/r104s17ap6.html, choose the second TERRORISM PREVENTION ACT--CONFERENCE REPORT link, choose the first BIDEN link. Congress is putting information on how to build babyfood bombs on the internet! Clearly, the first thing the FBI would do under the law Biden wants is wiretap congress to see who is accessing the congressional record. Wonder what the congressional librarians who run thomas think of that. ((MODERATORS' NOTE: For this without access to the original, here is the text)) ++++++++++++++++++++++++++++++++ TERRORISM PREVENTION ACT--CONFERENCE REPORT (Senate - April 17, 1996) Mr. BIDEN. Mr. President, I yield myself such time as I may use within the limit of the time I have. This provision is very straightforward and simple. It is beyond me why it was taken out of the Senate version of the language that was sent to the House. I have heard many colleagues stand up on the floor here and rail against pornography on the Internet, and for good reason. Even when we thought we had corrected the language that Senator Exon introduced to comport with the first amendment, I still hear in my State, and I hear of people writing about how so and so is promoting pornography on the Internet because they will not ban pornography on the Internet. Yet, in the bill, we came along--all of us here--and the genesis of this came from Senator Feinstein, when it was initially offered. The majority leader, Senator Hatch, and I had some concerns with this, and we thought the language to ban teaching people how to make bombs on the Internet or engage in terrorist activities on the Internet might violate the first amendment. Senators Dole, Hatch, and I worked to tighten the language and came up with language that was tough and true to civil liberties. It was accepted by unanimous consent. We have all heard about the bone-chilling information making its way over the Internet, about explicit instructions about how to detonate pipe bombs and even, if you can believe it, baby food bombs. Senator Feinstein quoted an Internet posting that detailed how to build and explode one of these things, which concludes that `If the explosion don't get'em, the glass will. If the glass don't get'em, the nails will.' I would like to give you a couple of illustrations of the kinds of things that come across the Internet. This is one I have in my hand which was downloaded. It said, `Baby food bombs by War Master.' And this is actually downloaded off the Internet. It says: These simple, powerful bombs are not very well known, even though all of the materials can be obtained by anyone (including minors). These things are so-- I will delete a word because it is an obscenity. powerful that they can destroy a CAR. The explosion can actually twist and mangle the frame. They are extremely deadly and can very easily kill you and blow the side of a house out if you mess up while building it. Here is how they work. This is on the Internet now. It says: Go to Sports Authority or Herman's Sport Shop and buy shotgun shells. It is by the hunting section. At the Sports Authority that I go to you can actually buy shotgun shells without a parent or an adult. They don't keep it behind the glass counter, or anything like that. It is $2.96 for 25 shells. And then it says: Now for the hard part. You must cut open the plastic housing of the bullet to get to the sweet nectar that is the gun powder. The place where you can cut is CRUCIAL. It means a difference between it blowing up in your face or not. Then there is a diagram, which is shown as to how to do that on the Internet. Then it says: You must not make the cut directly where the gun powder is, or it will explode. You cut it where the pellets are. And then it goes through this in detail. And then it gets to the end, and it says: Did I mention that this is also highly illegal? Unimportant stuff that is cool to know. And then it rates shotgun shells by two numbers, gauge, pellet size, and goes into great detail. It is like building an erector set. It does it in detail. So what Senators Dole and Hatch and I did, we said you should not be able to do this, but we have a first amendment problem, possibly. So we added a provision that says that you have to have the intent, when you are teaching people how to do this, that the person using it is using it for the purpose of doing harm. So it seems to me that this is pretty straightforward. Granted, I want to stop pornography on the Internet. I think pornography does harm to the minds of the people who observe it, particularly young people. But if that does harm, how much harm is done by teaching a 15-year-old kid, a 12-year-old kid, or a 20-year-old person, with great detail, how to build a baby food bomb, or how to build an automatic particle explosion provision, or how to build light bulb bombs. ------------------------------ Date: Mon, 8 Apr 1996 10:50:41 -0700 (PDT) From: Doc_Holliday@AWWWSOME.COM(M. Steven McClanahan) Subject: File 3--Canadian "criminalization of technology" Regarding the following letter reprinted in CuD: > > "An Act to amend the Criminal Code and to amend certain other Acts"The >new subsection 487(2.1)(a) would provide that a person authorized to >search a computer system for data may use any computer system in the >building "to search any data contained in or available to the computer >system." The quoted language does not distinguish between the two >sources of data. However, there is good reason to treat data available to the >computer system differently from data contained within it. Data available >to the system may be physically located outside of the jurisdiction of >the issuer of the warrant, potentially bringing the persons authorizing and >conducting the search into conflict with foreign law. A similar concern >is identified and addressed in the existing subsection 487(2), which >provides for modified search warrants in circumstances where the subject of the >search "is believed to be in any other territorial division" within >Canada. In the context of the search of a computer system, it is quite probable >that the data available to the computer system includes data located in >jurisdictions outside of Canada. The international nature of the >difficulty calls for a solution beyond that offered by subsection 487(2). >It is necessary to have two distinct sets of provisions, one of which >governs >the search of data "contained in" a computer system and another specifically >designed to address the difficulty of searching data "available to" a >computer system. The words "or available to" should be removed from the >proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a). This sets dangerous precedent, as it seeks to make criminal the possession of hardware, software and/or knowledge to configure systems so as to access information the ruling junta may find objectionable. If you've configured your system to automatically log onto another system that is connected to something the government has defined as "criminal," then you are subject criminal liability for information gained in a broad search as authorized by this law. If you are a "newbie," even though your system might be capable of accessing such information, because you could not configure it to do so, then you are not subject to criminal liability. This would make the same hardware, software and Internet connections criminal in one situation and not in another, based solely on the level of expertise of the user! >Finally, we are concerned about the potential for self-incriminatory >activity by the person whose property is the subject of a search. >Subsection 487(2.1) would authorize the person conducting the search to >use the computer system in order to search, reproduce, and seize data. >Subsection 487(2.2), while similar, would add that the person whose >property is being searched "shall, on presentation of the warrant, permit the >person carrying out the search" to use the computer system. It is unclear from >this language whether the person whose property is being searched is >required to take positive steps to assist the person carrying out the >search. Our concern is that the inherent vagueness of the proposed >provision allows for such an interpretation. If the computer system is >accessible only by first supplying a password, the person may have to >supply it. If the data being searched is encrypted, the person may have to >provide the decryption key. This would amount to being compelled to assist in >the discovery of evidence against oneself, which is inconsistent with the >most fundamental principles of criminal law. The proposed amendment should >be rewritten to remedy its potentially dangerous vagueness. The obvious solution to the above is to suffer "cyber-amnesia" when the cops come busting down your door. Possession of encryption software should not be illegal in any jurisdiction, however, realistically, most cops assume, if it's encrypted it must be illegal - why else would you encrypt it? It's a catch 22 situation and one in which you lose either way. Speaking as one who had a Power Macintosh with a 2 gigabyte hard disk drive and all my backups subpeonaed in a civil case, I can tell you that the other side is not likely to want or accept your help in determining what is on your mass storage devices and/or in learning how your systems work. I had to stand by while the attorney corrupted all the data on my hard drive trying to beat my PGP encryption. Then he did the same thing to my back ups. Despite my protests I would have GIVEN them the key to decrypt the data - he didn't trust me. This is in a CIVIL case, imagine how they would feel in a CRIMINAL matter. They spent days trying to get past PGP and could not. Even if they had, all they would have gotten was copies of email between my wife and I. The downside was it took me two weeks to reconstruct my hard drive, time which the courts refused to order the attorney that started all this to pay me for. (They did sanction him after he threatened to punch me during a deposition for refusing to reveal my sources - which were protected by attorney-client privilege - which I thought was interesting; apparently he could waste all my time, but he couldn't hit me.) The court decided my data had no value and that having to rebuild my hard drive was a "minor inconveneince" compared to the "interests of justice." Since it is a no win situation, extending cooperation is problematic. It probably won't do any good. My experience told me most people in law enforcement have not advanced, technologically, past the level of an Atari 2600 and are completely baffled by complex systems. Based on what they did with a Mac system, I doubt they would even be able to access anything now that I use a SPARCstation 4. An attitude seems to have developed in the prosecution of computer crime that "the ends justifies the means." As the voters have gone along like sheep and surrendered many civil rights in the prosecution of drug related crimes, they are similarly doing in the prosecution of computer crimes having to do with the Internet and claims of "child porn." This is extremely dangerous as. If you look long and hard enough on any system,and systems accessible to it, you can, eventually, find something that will offend someone. Therefore, applying the rule that "the ends justifies the means," everyone who connects to a computer network is thereby "criminalized." The frigthening part is that, whether or not the innocent victim is doing anything illegal, the reams of good press such actions bring for prosecutors and police just encourages them. After it is all through and nothing illegal is found, law enforcement still looks good in the press, (because the public has been whipped up into such a frenzy they preceive any action as "good"). The victims of such harassment are always "guilty" in the eyes of the public, simply because the government took any action. ------------------------------ From: Dave++ Ljung Subject: File 4--Re: Cu Digest, #8.29, Apr 11, 1996 Date: Mon, 15 Apr 96 13:01:07 MDT |Olsen concocted this scheme that he calls L18, for "Less than 18." |Under it, every net-user must label every USENET post, email message, |FTP site file, web page, chat room, IRC channel... Wow. That's quite a bit. Well, here's a thought. They can't possibly fine people for *NOT* labeling non-offensive material as being L18 (non-offensive). Even if they did, you could always add some four-letter exon somewhere in the post to make sure that it was no longer L18. So what's the point? Well - the point is that most of the content on the net is provided by us 'adults.' So it would be amazingly easy to boycott the L18 label. What will be the effect? Well - one unfortunate effect is that anyone who is pegged as under 18 will (for a hopefully short time) be unable to access much of anything the net. In the long run this would make the L18 plan so infeasible that it would become valueless, and hopefully would be dropped. One way to protect the kids from the nasty adult's ideas is by censoring any such ideas. Another way is to keep the kids out. I don't prefer either, but the latter is better than censorship. ------------------------------ Date: Fri, 19 Apr 1996 07:16:20 -0700 (PDT) From: Declan McCullagh Subject: File 5--Re: The Day the Sites Went Out in Georgia? ---------- Forwarded message ---------- Date--Fri, 19 Apr 1996 03:59:06 -0400 From--Mike Godwin Georgia Legislative Information HB 1630 Computer or telephone network; transmitting misleading data (3.7K) *** BILL STATUS *** 04/18/96 HB 1630 Computer or telephone network; transmitting misleading data 1. Parsons 40th 2. Scoggins 24th 3. Coker 31st House Comm: Ind / Senate Comm: ST&I / House Vote: Yeas 142 Nays 26 Senate Vote: Yeas 48 Nays 0 ---------------------------------------- House Action Senate ---------------------------------------- 2/8/96 Read 1st Time 3/5/96 2/9/96 Read 2nd Time 3/13/96 2/26/96 Favorably Reported 3/13/96 Sub Committee Amend/Sub Am 2/29/96 Read 3rd Time 3/14/96 2/29/96 Passed/Adopted 3/14/96 FSFA Comm/Floor Amend/Sub CAFA 3/15/96 Amend/Sub Disagreed To Recedes 3/18/96 4/3/96 Sent to Governor 4/18/96 Signed by Governor 1029 Act/Veto Number 7/1/96 Effective Date ---------------------------------------- Code Sections amended: 16-9-93.1 *** FIRST READER *** 02/07/96 HB 1630 A BILL to amend Article 6 of Chapter 9 of Title 16 of the Official Code of Georgia Annotated, known as the "Georgia Computer Systems Protection Act," so as to provide that it shall be unlawful for any person or organization knowingly to transmit certain misleading data through a computer or telephone network for the purpose of setting up, maintaining, operating, or exchanging data with an electronic mailbox, home page, or any other electronic information storage bank; and for other purposes. *** FULL TEXT *** 02/29/96 HB 1630 HB 1630/FSFA H. B. No. 1630 (FLOOR SUBSTITUTE)(AM) By: Representative Parsons of the 40th A BILL TO BE ENTITLED AN ACT To amend Article 6 of Chapter 9 of Title 16 of the Official Code of Georgia Annotated, known as the "Georgia Computer Systems Protection Act," so as to provide that it shall be unlawful for any person or organization knowingly to transmit certain misleading data through a computer or telephone network for the purpose of setting up, maintaining, operating, or exchanging data with an electronic mailbox, home page, or any other electronic information storage bank; to provide for a penalty; to provide that civil actions are allowed; to repeal conflicting laws; and for other purposes. BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA: SECTION 1. Article 6 of Chapter 9 of Title 16 of the Official Code of Georgia Annotated, known as the "Georgia Computer Systems Protection Act," is amended by adding, following Code Section 16-9-93, a new Code Section 16-9-93.1 to read as follows: "16-9-93.1. (a) It shall be unlawful for any person, any organization, or any representative of any organization knowingly to transmit any data through a computer network or over the transmission facilities or through the network facilities of a local telephone network for the purpose of setting up, maintaining, operating, or exchanging data with an electronic mailbox, home page, or any other electronic information storage bank or point of access to electronic information if such data uses any individual name, trade name, registered trademark, logo, legal or official seal, or copyrighted symbol to falsely identify the person, organization, or representative transmitting such data or which would falsely state or imply that such person, organization, or representative has permission or is legally authorized to use such trade name, registered H. B. No. 1630 (SUB) -1- HB 1630/FSFA trademark, logo, legal or official seal, or copyrighted symbol for such purpose when such permission or authorization has not been obtained; provided, however, that no telecommunications company or Internet access provider shall violate this Code section solely as a result of carrying or transmitting such data for its customers. (b) Any person violating subsection (a) of this Code section shall be guilty of a misdemeanor. (c) Nothing in this Code section shall be construed to limit an aggrieved party's right to pursue a civil action for equitable or monetary relief, or both, for actions which violate this Code section." SECTION 2. Nothing contained herein shall prohibit a member of the General Assembly from using the state seal or the Georgia flag which contains the state seal on a home page that is clearly identified with the name of the member as the home page of that member. SECTION 3. All laws and parts of laws in conflict with this Act are repealed. H. B. No. 1630 (SUB) ------------------------------ Date: Fri, 12 Apr 1996 09:36:07 -0700 (PDT) From: Olle Jarnefors Subject: File 6--Proposed Swedish law about computer-mediated communication It might be interesting to readers of the CU Digest to know how the problems of freedom of expression on the Internet are tackled in Sweden. Professor Jacob Palme at Stockholm University and the Royal Institute of Technology has arranged for publication of the English summary of the recent proposal from a Swedish government committee, at < http://www.dsv.su.se/~jpalme/SOU-1996-40-eng.html > Professor Palme's introduction and the full text of the proposed law follows here. -- Olle Jarnefors, Royal Institute of Technology (KTH) ----- (This initial text was written by Jacob Palme.) A Swedish government committee has put forward a proposal covering partly the same issues as the famous U.S. "Communications Decency Act". The committee does not propose that anything is unlawful in BBSes and the Internet except what would be unlawful according to other Swedish laws (for example copyright laws, libel laws, child pornography laws). The main issue for the proposal is which responsibility the provider of a data base (WWW data base, BBS, news server, etc.) has on the content. According to the law proposal, sysop must remove illegal items, but only under two conditions: 1. The item was obviously illegal. I.e. on borderline cases, the sysop does not have to remove the item. 2. The sysop was aware of the existence of the item. I.e. the sysop is not forced to pre-censor information, but if the sysop is informed of the occurrence of illegal items in the data base, these must be removed. A sysop which does not follow these rules, can be punished by fines or a maximum of 2 years prison. The next step is that the Swedish government will send the proposal to organizations who are allowed to comment on it. In this stage, anyone can send their views on the proposal to the government. After that, the government may prepare a (possibly modified) proposal to the Swedish parliament, and the parliament may turn it into a law. ----- ELECTRONIC MEDIATION SERVICES BILL _Areas of application_ ARTICLE 1. This law applies to services that are intended for the electronic mediation of messages. The law does not apply to: 1. the provision alone of a network or other connections for the transmission of messages, 2. mediation of messages within an agency or between agencies or within an enterprise or a legal group of enterprises, and 3. such services that are covered by the regulations in the Freedom of the Press Act [this is the pride of Swedish legislation, a constitutional law originally adopted in 1766, pertaining to printed media /OJ] or the Fundamental Law on Freedom of Expression [this constitutional law regulates radio and television /OJ]. In the law, "messages" means text, images, sounds and other information being transmitted in electronic form. _Exceptions from the Data Act_ ARTICLE 2. The provisions in Sections 1-20 and 22-25 of the Data Act (1973:289) shall not be applied to personal registers [i.e. any computer file holding data about identifyable natural persons /OJ] that are maintained by a service according to this law, to the extent that 1. the registers contain only regular running text and information about messages and users of the service, and 2. the register is maintained for the purpose of enabling users to deposit or collect information with a view to free exchange of opinions, free and comprehensive information and freedom of artistic creation. In the law, "regular running text" means information that has not been structured to facilitate the acquisition of personal information. _An overview of the service_ ARTICLE 3. The service supplier shall have supervision over the service to the degree necessary with regards to the scope and aim of the operation. _Information to the user_ ARTICLE 4. The service supplier shall, as soon as possible, inform each person who wishes to use the service about 1. who is supplying the service, 2. that the users are responsible for the content of the messages that they post, and 3. to what extent incoming messages become available to other users. If an agency supplies the service it should also mention that messages which are mediated may become public documents. _The hindrance of continued distribution_ ARTICLE 5. If it is obvious that a user, by posting a message, has made himself guilty of a crime or infringement of copyright or that the contents of the message are liable to be used in crime, the service supplier shall hinder further distribution of the message. The same applies to any person who supervises the service on behalf of the service supplier. The first paragraph is not in effect if the message is intended to be received only by one or more designated recipients (electronic mail). _Penalties_ ARTICLE 6. A person who intentionally or through negligence violates article 4 or who intentionally violates article 5 shall be sentenced to pay a fine or to imprisonment for at most six months, or, if the crime is serious, to imprisonment for at most two years. If the offence is of only a minor nature the offender shall not be sentenced. The first paragraph is not applied if the offence is punishable under the Penal Code. _Forfeiture_ ARTICLE 7. Computers and other equipment that have been used in a crime under this law may be declared forfeited, if this is called for in order to prevent crime or for other special reasons. ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.32 ************************************