867 lines
43 KiB
Plaintext
867 lines
43 KiB
Plaintext
|
|
||
|
|
||
|
Computer underground Digest Sun Aug 13, 1995 Volume 7 : Issue 67
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
|
||
|
CONTENTS, #7.67 (Sun, Aug 13, 1995)
|
||
|
|
||
|
File 1--Who Else is Reading your Email?
|
||
|
File 2--Fighting obscenity on the Net
|
||
|
File 3--Communication*Human Rights*CfP (fwd)
|
||
|
File 4--pro-exon transcript (fwd)
|
||
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Wed, 09 Aug 1995 19:25:49 -0400
|
||
|
From: kkc@INTERLOG.COM(K.K. Campbell)
|
||
|
Subject: File 1--Who Else is Reading your Email?
|
||
|
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
eye WEEKLY June 29 1995
|
||
|
Toronto's arts newspaper .....free every Thursday
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
eye.NET eye.NET
|
||
|
|
||
|
WHO ELSE IS READING YOUR EMAIL?
|
||
|
Part 1 of a 2-part series on PGP
|
||
|
|
||
|
by
|
||
|
K.K. CAMPBELL
|
||
|
|
||
|
I recently conducted an overseas interview with a "computer security
|
||
|
person at a highly sensitive facility." Mr. Security explained that the
|
||
|
potential misuse of the computer resources of this site was a serious
|
||
|
concern, a danger to thousands. This instilled in him a peppery dash of
|
||
|
paranoia about who was using what machine for what purpose.
|
||
|
|
||
|
In discussing this, the name of a certain, rather net.famous individual
|
||
|
arose. I was surprised to learn this individual was well-known in
|
||
|
international security circles. This individual is considered a "risk."
|
||
|
I was informed that this person's email is "monitored."
|
||
|
|
||
|
To spell it out: people were reading and collecting all the email the
|
||
|
"risk" wrote. Without the target's knowledge. Without any form of
|
||
|
warrant.
|
||
|
|
||
|
Most netters think such intrusion involves someone "hacking a
|
||
|
password." Wrong. When you hit the "send" command for email, your
|
||
|
missive seems to (poof!) magically appear in the recipient's mailbox.
|
||
|
Person to person. The ultimate intimacy. Wrong again. Email is actually
|
||
|
passed through a number of computers. The operator of one of those
|
||
|
machines can effortlessly read your email. Any one who "breaks into"
|
||
|
such a machine can inspect your mail. Once in, they can tamper with
|
||
|
files so that all your email is copied to another location, without you
|
||
|
being aware of it.
|
||
|
|
||
|
But not everyone wants to "break into" a computer. In the above case,
|
||
|
email was copied "in transit." When email is transferred from machine
|
||
|
to machine, it is made readable. So if you intercept a copy (through
|
||
|
"sniffers"), you can read it. Everything this individual had written
|
||
|
over the last couple of years has apparently been intercepted and read.
|
||
|
His file is huge.
|
||
|
|
||
|
With Canada news media in a tizzy about "regulating the net," how long
|
||
|
before CSIS requests funds to start collecting posts with buzzwords in
|
||
|
the network data flow?
|
||
|
|
||
|
POSTCARDS
|
||
|
|
||
|
It should be the first lesson every newbie learns: email ain't secure.
|
||
|
An email is like a postcard: it travels through the many sets of hands
|
||
|
in delivery and any set of hands can read it if so inclined. Most
|
||
|
postal employees don't, for two reasons: there is so much mail they
|
||
|
haven't the time, and most postcards are so boring, who the hell wants
|
||
|
to?
|
||
|
|
||
|
The same goes with the system administrators who oversee the shunting
|
||
|
around of all your cyberscribbling. Most don't snoop, but some do. Need
|
||
|
I remind you that, er, sysadmins are not a monolithically
|
||
|
mature-and-well-adjusted breed imbued with highly developed moral
|
||
|
principles...
|
||
|
|
||
|
What can you, the lowly downtrodden, rights-less end-user, do? You have
|
||
|
three strategies:
|
||
|
|
||
|
-- no precautions: who cares if anyone reads what you write/receive;
|
||
|
-- minimal coding, easy to crack, but enough to stop casual snoops --
|
||
|
kind of like "virtual envelopes"; and
|
||
|
-- PGP.
|
||
|
|
||
|
PGP stands for Pretty Good Privacy -- a humble title to be sure,
|
||
|
considering that the U.S. government/military wants to ban the thing.
|
||
|
And why? Because PGP has the power to thwart their zillion-dollar spy
|
||
|
efforts by imbuing everyday folk with the cryptographic might of the
|
||
|
best "puzzle palaces" around the world.
|
||
|
|
||
|
The elegantly powerful encryption device is the offspring of Colorado
|
||
|
resident Phil Zimmermann (prz@acm.org). He basically took all the (very
|
||
|
public) papers on cryptography, stirred it together and voil=E1: instant
|
||
|
"threat to democracy" -- if you buy the government/military propaganda.
|
||
|
(More on Zimmermann and the cryptographic spook backlash next issue
|
||
|
[below].)
|
||
|
|
||
|
What PGP does is solve that decades old spy/cryptography dilemma: How
|
||
|
can one send secure messages to absolute strangers over an insecure
|
||
|
medium?
|
||
|
|
||
|
PGP exploits two historical developments:
|
||
|
|
||
|
-- home computers gave commoners the computational power to use the
|
||
|
sophisticated cryptography algorithms; and
|
||
|
-- the advent of public key encryption in the late '70s bade
|
||
|
farewell to Ilya Kuryakin and Napoleon Solo.
|
||
|
|
||
|
Computers were originally designed (back in World War II) to be
|
||
|
sophisticated code breakers. Today, government/military bureaucracy
|
||
|
(especially in the U.S.) still operate with that attitude: computer
|
||
|
cryptography is a military weapon.
|
||
|
|
||
|
In those Cold War days, the only way to send secure messages over
|
||
|
insecure channels (telegraphs, phones, mail, etc.) was to first
|
||
|
deliver a "cryptographic key" via secure channels. The key was
|
||
|
something like a little code book; the secure delivery channel was
|
||
|
usually a dour-faced courier with a black bag handcuffed to his wrist.
|
||
|
"Deliver this or die doing so, 007..."
|
||
|
|
||
|
BE AN INTERNATIONAL ARMS DEALER!
|
||
|
|
||
|
Governments and mega-corps could afford to send satchel-toting couriers
|
||
|
overseas, but us proles had little hope of doing that. So citizens were
|
||
|
always vulnerable to mail-opening, phone-tapping spooks.
|
||
|
|
||
|
PGP uses two keys -- a public key and a secret key. Anyone can use your
|
||
|
public key to encrypt a message to you, and only you can then decrypt
|
||
|
it with your secret key. As long as your secret key remains secret, no
|
||
|
one can read that message -- not even the person who encrypted. The
|
||
|
idea is to spread your public key around in Key Exchanges, like phone
|
||
|
books.
|
||
|
|
||
|
For details on this complex subject, try _PGP: Pretty Good Privacy_ by
|
||
|
Simson Garfinkel (O'Reilly & Assoc., http://www.ora.com, $29.95 paper).
|
||
|
Or _The Computer Privacy Handbook_ (Peachpit Press,
|
||
|
http://www.peachpit.com/peachpit, $31.95 paper). Both go beyond
|
||
|
technical details and delve into the sociopolitical issues around
|
||
|
privacy.
|
||
|
|
||
|
Where can you get PGP? All around the world. PGP is freeware -- you can
|
||
|
use it endlessly without cost. But remember: The U.S. State Department
|
||
|
export restrictions classify cryptographic materials to be munitions.
|
||
|
Exporting it from the U.S. is a serious matter. For those uninterested
|
||
|
in becoming international arms smugglers, do an Archie search for "PGP"
|
||
|
or try Toronto's Interlog at ftp://ftp.interlog.com/pub/pgp . Read
|
||
|
newsgroups alt.security.pgp and sci.crypt for discussions.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 7 Aug 1995 16:26:01 -0700
|
||
|
From: Alexander Chislenko <sasha1@netcom.com>
|
||
|
Subject: File 2--Fighting obscenity on the Net
|
||
|
|
||
|
As a father of a 12yo child I was very happy to see the Exon bill
|
||
|
pass. This finally prohibits indecent content and obscene words in
|
||
|
any computer messages and documents accessible to minors.
|
||
|
|
||
|
Being a good citizen I decided to be vigilant and assist the
|
||
|
government in identifying the sources of obscene messages on the Net.
|
||
|
|
||
|
The results of my research were horrifying!!!
|
||
|
I found that many supposedly innocent messages posted to unsuspecting
|
||
|
people contain VERY OBSCENE words.
|
||
|
|
||
|
For example, one message on the PUBLIC newsgroup "alt.binaries.pictures"
|
||
|
enticingly titled "Take a look at this one" contains the following line:
|
||
|
|
||
|
MJ+5K!H+G7SHIT6[U75EFN=8N=3OM?T^\UZW$%QI^K>([B"WTIX/AF672?A;J
|
||
|
****
|
||
|
|
||
|
As you can see, the obscene foul word that can inflict serious
|
||
|
psychological damage upon innocent children and cause them to engage in
|
||
|
untimely physical activities, is put into the VERY MIDDLE of this message
|
||
|
and is even CAPITALIZED!!!
|
||
|
|
||
|
To my complete horror, I found lots of obscene words in the messages of
|
||
|
practically every "binaries" newsgroup. I also discovered them in many
|
||
|
executable files, object libraries, and graphics and movie files ON EVERY
|
||
|
COMPUTER I CHECKED!!!
|
||
|
|
||
|
As a computer professional, I suggest that censoring output filters
|
||
|
should be added to all existing compilers, graphic packages, encoding
|
||
|
programs, and random number generators, that would remove obscene words
|
||
|
from the output of these programs.
|
||
|
I expect that this measure would be very good for the economy, as it
|
||
|
should create thousands of new jobs in the computer industry.
|
||
|
|
||
|
I am sure that the resulting little glitches in functioning of software
|
||
|
are a small price to pay for the protection of the souls of our children.
|
||
|
|
||
|
|
||
|
Yours in Child protection,
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 21 Jul 1995 01:02:42 -0500 (CDT)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 3--Communication*Human Rights*CfP (fwd)
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
|
||
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
CALL FOR PAPERS
|
||
|
The Journal of International Communication [June 1998 issue]
|
||
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
|
||
|
Special Issue on Communication, Human Rights and Civil Society
|
||
|
|
||
|
Issue editors: Howard H. Frederick and Naren Chitty
|
||
|
DEADLINE: Ongoing through December 1, 1997
|
||
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
|
||
|
[KEYWORDS: Freedom of expression, opinion, press; Right to communi-
|
||
|
cate; Local cable/TV/radio; Computer networks and new multimedia tech-
|
||
|
nologies; Universal Declaration of Human Rights; Global Information
|
||
|
Infrastructure; (tele)communication policy; Protection of human rights.]
|
||
|
|
||
|
Proposals and articles accepted in French, German, Spanish!
|
||
|
|
||
|
This special issue of the _Journal of International Communication_
|
||
|
commemorates the 50th anniversary of the Universal Declaration of
|
||
|
Human Rights with a discussion of the evolving right to communicate
|
||
|
within the context of the emergence of global civil society. It is
|
||
|
devoted to an exploration of real-world and theoretical constructs,
|
||
|
policies, and practices. Articles that combine such kinds of
|
||
|
analysis, and also provide comparative or "global" perspectives, are
|
||
|
particularly welcome. Contributions are invited from across and among
|
||
|
(and outside) academic disciplines and will be refereed by at least
|
||
|
three referees.
|
||
|
|
||
|
The human rights of communication are central to national and
|
||
|
international law. Perhaps the oldest human right of all, FREEDOM OF
|
||
|
OPINION was first guaranteed in Ancient Greece. FREEDOM OF EXPRESSION
|
||
|
was enshrined only in 1689 in the English Bill of Rights. In 1789,
|
||
|
the First Amendment to the U.S. Constitution first guaranteed FREEDOM
|
||
|
OF THE PRESS. Now, in the Information Age, one crucial component may
|
||
|
be missing in the law: the RIGHT TO COMMUNICATE, or access to media
|
||
|
distribution channels which are controlled by markets and governments.
|
||
|
|
||
|
Possible foci include, but are not limited to, the following
|
||
|
questions:
|
||
|
|
||
|
** What is the impact of global NGO/citizen/community communication
|
||
|
networks via computer on the protection and evolution of human
|
||
|
rights?
|
||
|
** What is the relation of civil society and human rights within the
|
||
|
dominant marketplace and government systems?
|
||
|
** What is the right to communicate? What are the points of
|
||
|
difference among theoretical standpoints?
|
||
|
** How do the human rights of communication help us interpret
|
||
|
(demystify?) the new global communication order? Globalization
|
||
|
process? New forms of social movements and global politics? Old
|
||
|
forms of international relations?
|
||
|
** How does the concept of "global civil society" help us theorize
|
||
|
about contemporary global flows of cultural products?
|
||
|
** How does NGO/citizen/community communication defend and protect
|
||
|
other human rights? Contribute to global solidarities? Local
|
||
|
politics? National identities?
|
||
|
** What are civil society's own forms of communication networking,
|
||
|
and how effective are they?
|
||
|
** What role is communication and civil society in helping us to
|
||
|
envision and construct global futures? In this respect, how does
|
||
|
global civil society communication influence, modify existing
|
||
|
actors or help create alternative actors, in global affairs, to
|
||
|
states, international regimes and organizations, non-governmental
|
||
|
organizations and transnational corporations?
|
||
|
|
||
|
Howard Frederick, Emerson College, USA hfrederick@igc.apc.org
|
||
|
|
||
|
Proposals and Abstracts may be sent to and "Notes for Contributors"
|
||
|
requested from the Guest Editor at hfrederick@igc.apc.org (Emerson
|
||
|
College, 100 Beacon Street, Boston, MA 02116. Fax: +1-617-578-8804)
|
||
|
Completed articles should be sent, in the form described in "Notes..."
|
||
|
to the Managing Editor at the address provided below.
|
||
|
|
||
|
The Journal of Communication is a refereed journal. The JIC Editorial
|
||
|
Advisory Board currently includes: Hussein Amin (Egypt); Sarath
|
||
|
Amunugama (Sri Lanka); Kwame Boafa (UNESCO); Ron Burnett (Canada);
|
||
|
Kuan- Hsing Chen (Taiwan); Naren Chitty (Australia); Leonard Chu
|
||
|
(Australia); Chua Siew Keng (Australia); Eddie C. Y. Kuo (Singapore);
|
||
|
David Crookall (USA); Simon During (Australia); Howard Frederick
|
||
|
(USA); George Gerbner (USA); Peter Golding (Britain); Shelton
|
||
|
Gunaratne (USA); Cees Hamelink (Holland); Hyeon-Dew Kang (South
|
||
|
Korea); Youicho Ito (Japan); Alex Ivaanikov (Russia); Karol Jacobowicz
|
||
|
(Poland); Meheroo Jussawalla (USA); Michael Kunczik (Germany); Tuen-yu
|
||
|
Lau (USA); Glen Lewis (Australia); P. Eric Louw (South Africa); Ernest
|
||
|
Martin Jr. (Hong Kong); Armand Mattelart (France); Jose Marques de
|
||
|
Melo (Brazil); Tom McPhail (USA); Bella Mody (USA); Frank Morgan
|
||
|
(Australia); Hamid Mowlana (USA); P. Murari (India); Lalita
|
||
|
Rajasingham (New Zealand); Colleen Roach (USA); Roland Robertson
|
||
|
(USA); Everett Rogers (USA); Florangel Rosairo-Braid (Philippines);
|
||
|
Brian Shoesmith (Australia); John Sinclair (Australia); Colin Sparks
|
||
|
(Britain); Annabelle Sreberny-Mohammadi (Britain); P.Subramaniam
|
||
|
(India); Gerald Sussman (USA); Majid Tehranian (USA); Luke Uche
|
||
|
(Nigeria)
|
||
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
MANAGING EDITOR: Dr N. J. Chitty; ADDRESS: c/o International
|
||
|
Communication Program, Media and Communication Department; Macquarie
|
||
|
University, North Ryde, NSW 2109, AUSTRALIA; E-mail:
|
||
|
nchitty@pip.engl.mq.edu.au Voice: 612-850-8725; Fax: 612-850-8240.
|
||
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 4 Jul 1995 01:31:33 -0500 (CDT)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 4--pro-exon transcript (fwd)
|
||
|
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
|
||
|
Beverly LaHaye Live
|
||
|
"A Ministry of Concerned Women for America"
|
||
|
Monday, June 12, 1995
|
||
|
As heard on KCIS AM-630
|
||
|
Seattle, Washington
|
||
|
|
||
|
BEVERLY LAHAYE: BL
|
||
|
JIM WOODALL: JW
|
||
|
PATRICK TRUMAN: PT
|
||
|
|
||
|
BL: Pornography is an $8 billion a year industry with more outlets in America
|
||
|
than there are McDonald's. But now they've gone high-tech in their attempts
|
||
|
to reach a wider audience. Our guest today has valuable information on how
|
||
|
you can protect your family. So stay with us.
|
||
|
|
||
|
[Intro music]
|
||
|
|
||
|
BL: And thanks to the Information Superhighway, pornography could be
|
||
|
invading your home without you even knowing it. The challenge for parents
|
||
|
today is finding ways to keep their children from being exposed to these
|
||
|
vulgar influences.
|
||
|
|
||
|
JW: Here today with us to give us some helpful advice is Patrick Truman,
|
||
|
he's the director of government affairs for the American Family Association.
|
||
|
|
||
|
BL: And welcome Patrick Truman to our program today.
|
||
|
|
||
|
PT: Thank you, Beverly and Jim.
|
||
|
|
||
|
BL: It's a delight to have you; I can't say it's a delight to discuss what
|
||
|
we have to discuss, but we're happy to have you here to talk about it.
|
||
|
|
||
|
PT: Thank you, and I think it's an issue that parents need to know about.
|
||
|
|
||
|
BL: Absolutely. Any parent that hears about this - and many for the first
|
||
|
time - are just appalled that this has been going on _in their homes_ and
|
||
|
they've had no idea. Well, let's start at the beginning here; is
|
||
|
computerized pornography really that big of a problem, and how widespread is
|
||
|
it?
|
||
|
|
||
|
PT: Well, it's a very big problem; I would say this. I spent seven years at
|
||
|
the Justice Department in the office that prosecuted pornography. And
|
||
|
earlier this year, we got lots of pornographers, the big names; Al Tumbarger
|
||
|
in jail, Farris Alexander, Ruben Sturman, etc., many of them are still out
|
||
|
there, a lot of work needs to be done; but a few months, Beverly, Senator
|
||
|
Exon introduced a bill to control pornography on the Internet, and I didn't
|
||
|
know anything about the Internet. So I took it upon myself to learn how you
|
||
|
get this stuff, so that I could help craft the bill because I had met with
|
||
|
him, and said I would. But, when I found out how easy available [sic] it is
|
||
|
to anyone with a computer, even children, I realized that everybody we did
|
||
|
for seven years at the Justice Department was for naught; the future of
|
||
|
pornography isn't the seedy, smut-filled shops; it is your home computer.
|
||
|
|
||
|
BL: And how many homes have computers, how many children today are computer
|
||
|
smart?
|
||
|
|
||
|
PT: Much better than their parents...
|
||
|
|
||
|
BL: That's right! And they know how to get at that, and they teach one
|
||
|
another. Well, we all hear about the development of an information
|
||
|
superhighway, and do you expect that this will become a bigger issue in the
|
||
|
days ahead?
|
||
|
|
||
|
PT: Yes, and I think it's a much bigger issue than people are aware of
|
||
|
today, I mean, the people who understand the computer are for the most part
|
||
|
all on the Information Superhighway. If you have a rudimentary knowledge of
|
||
|
computers, it's very easy to get on the Information Superhighway, and what
|
||
|
is that? Well, it's a highway, literally, from your computer to _every other
|
||
|
computer in the world_. A pedophile who would sexually molest a child, his
|
||
|
computer is similarly equipped; a pornography shop in the Netherlands is
|
||
|
similarly equipped; it's just a means of getting anywhere in the world, via
|
||
|
computer, which is hooked to a phone line.
|
||
|
|
||
|
BL: What kind of pornography is really available through the Internet?
|
||
|
|
||
|
PT: Well, I was shocked. I've been in the worst pornography shops in
|
||
|
Manhattan, downtown New York, on investigations, and anything I saw there
|
||
|
was available on the Internet. And it's not only pictures, which come to
|
||
|
your screen in television and movie quality - and of course if you have the
|
||
|
right equipment, you can print it off on your color printer - but it is
|
||
|
also videotapes, it is sexual sounds, it's hard to believe that people would
|
||
|
record sexual acts and put them on the Internet, and you can download them,
|
||
|
you can bring them to your computer if your computer has sounds, which most
|
||
|
do; it is anything. Animal sex, group sex, Playboy, Penthouse, Hustler all
|
||
|
have areas on the Internet where you can dial in and look at all their
|
||
|
pornographic images.
|
||
|
|
||
|
BL: You know we've just recently heard in the news some examples of what's
|
||
|
happening to children as a result of this kind of porn on the computers.
|
||
|
|
||
|
PT: Children are being solicited by computer, and the one way they do it,
|
||
|
the pornography's available, the kids download or take from the Internet
|
||
|
this computer pornography, and then they talk back and forth with the person
|
||
|
who put it up there, and pretty soon the person says, "Hey, I've got a whole
|
||
|
collection, would you like to come over to my house, and you can have
|
||
|
whatever you want." The kid gets there, and he's molested.
|
||
|
|
||
|
BL: You know, a real example, is just recently, Daniel Montgomery, a
|
||
|
15-year-old boy from Seattle, Washington believed he might be gay, and
|
||
|
through America OnLine, an interactive Bulletin Board Service, he began
|
||
|
chatting with a homosexual man in San Francisco. And when this man sent him
|
||
|
a _bus ticket_, Daniel then ran away from home and was missing for _two
|
||
|
weeks_, and was found by the police and returned to his parents, this last
|
||
|
week; and this is because of the computer!
|
||
|
|
||
|
PT: Yes. And this is just a reported case. How many go unreported?
|
||
|
|
||
|
BL: Yes! Well, we've got another example, a 13-year-old little girl named
|
||
|
Tara Noble is presently missing from Louisville, Kentucky and police believe
|
||
|
she left to meet someone she was chatting with through America OnLine. This
|
||
|
man left sexual [sic] explicit messages for Tara, inviting her to come and
|
||
|
live with him.
|
||
|
|
||
|
PT: See, you're identifying a problem that is very much related to
|
||
|
pornography, it's these obscene conversations that you can have - worldwide
|
||
|
conversations, you can talk to someone in Australia, in the Netherlands,
|
||
|
wherever, and have a _terrible_ conversation. There are no age limits. And,
|
||
|
uh, it's all...
|
||
|
|
||
|
JW: Pat, address that person that's listening right now that says, well, I
|
||
|
may have a home computer, but I don't have access to that, I don't have a
|
||
|
modem, or, so, why, how's that going to affect my family. Why should I care?
|
||
|
|
||
|
PT: Well, of course, even if your computer is not equipped, your neighbor's
|
||
|
computer probably is, your school computer is, I had a high school librarian
|
||
|
in Seattle, Washington call me the other day because she dialed in, to - you
|
||
|
can get what's called the Internet Yellow Pages, you buy it, and it tells
|
||
|
you how to get to all these locations, and if you dial in the location they
|
||
|
tell you for US Government, Executive Branch, Clinton Cabinet, you dial that
|
||
|
in you get obscene work, after obscene work, after obscene work. She said, I
|
||
|
was getting this for the kids! It is so available, but, to address someone's
|
||
|
home computer, uh, I used to say, just watch whatever your kids are looking
|
||
|
at there, but now, after being aware of what's on the _Internet_ and how
|
||
|
people will _solicit_, and try to _take_ your _kids_, put all this vile
|
||
|
pornography on, _I_ tell parents, _don't_ have that computer located in a
|
||
|
place in the house where you can't readily see it, and _don't_ have it near
|
||
|
a phone line, because this is all transacted by plugging your computer into
|
||
|
a phone line. And every computer is equipped with that. But don't have it
|
||
|
near a place where you can plug it in unless you, as the parent, move it to
|
||
|
that location. But if you have this in your kid's room, in your den, in the
|
||
|
basement, and you're not there, your kids can likely get this material. And
|
||
|
here's what's important; the pornographers and the people who talk this way,
|
||
|
obscene ways on the computer, they want it that way. They _want your kid
|
||
|
alone_.
|
||
|
|
||
|
JW: And isn't that kind of normal? I mean, if you're going to use the
|
||
|
computer to be isolated someplace, is that, is that normal?
|
||
|
|
||
|
PT: Well, perhaps. People don't have it in their living rooms. I would
|
||
|
suggest the kitchen's a fine place for it. Unfortunately, until we get this
|
||
|
problem solved, and you're not allowed to _have_ this material...
|
||
|
|
||
|
BL: But see now the parent who doesn't have a computer in their home still
|
||
|
can't rest at ease, because, what about their child's friends?
|
||
|
|
||
|
PT: That's right.
|
||
|
|
||
|
BL: And they go over to Johnny's house to spend the afternoon, and Johnny's
|
||
|
got a computer and knows how to enter all this, and here these two boys
|
||
|
_play_ with this kind of _porn_!
|
||
|
|
||
|
JW: That, and the fact they can print it out, and take it to school and
|
||
|
distribute it to their [sic] kids!
|
||
|
|
||
|
BL: Well, the porn industry says the first amendment guarantees their right
|
||
|
to sell and distribute this kind of material; would you address that for a
|
||
|
moment, please?
|
||
|
|
||
|
PT: Well, when I was at the Department of Justice, I think we convicted, had
|
||
|
120 conventions, and they all said the same; I have a right to distribute
|
||
|
this. And they can say that in jail today. But the fact is the Supreme Court
|
||
|
has said that hard core pornography - that is, the material that is, uh,
|
||
|
well, I don't want to be very explicit here, but hard-core showing sex acts,
|
||
|
or lascivious exhibition of the private parts of an individual, that is not
|
||
|
protected speech. That is not protected speech. It never has been, and I
|
||
|
believe it never will be. Our constitution doesn't provide protection for
|
||
|
that, and it doesn't provide protection for child pornography. But you know,
|
||
|
it isn't just this hard-core material, or child pornography that is
|
||
|
available on the Internet. Material that is soft-core is very attractive to
|
||
|
children; Playboy magazine, they know that, Playboy knows that, and they put
|
||
|
theirs for free to the kids on the Internet. Not just the kids, but to
|
||
|
anyone, but they know it's the kids that are getting it.
|
||
|
|
||
|
BL: It was Attorney General Janet Reno who tried to undermine the Federal
|
||
|
law against child pornography; do you think we can expect to see the Clinton
|
||
|
Administration's help on this issue?
|
||
|
|
||
|
PT: Well, actually, on this issue of computer pornography, in the effort to
|
||
|
draft a good law on Capital Hill, the Clinton administration has a correct
|
||
|
position. And I attribute that to the staff of my old office, I don't take
|
||
|
credit, but the staff lawyers there who have taken this issue on and forced
|
||
|
this position in the Justice Department, and I credit all the people who
|
||
|
blasted Janet Reno a year ago when she tried to undermine the child
|
||
|
pornography - she's learned her lesson, Beverly, and your group is as much
|
||
|
involved as anyone else.
|
||
|
|
||
|
BL: Well, we did some programs on it here...
|
||
|
|
||
|
JW: So you're saying that Janet Reno's position is solid on this.
|
||
|
|
||
|
PT: Absolutely solid. Now they haven't done many cases, and I think they can
|
||
|
be faulted for that, although I am assured they will do cases, but I'm
|
||
|
really looking for getting the right law so that when the right people who
|
||
|
are very aggressive on this issue get back to the Justice Department - I
|
||
|
hate to say Republicans, since it isn't only Republicans - but if the [sic]
|
||
|
Republican administration got in, I think you'd see that war on pornography
|
||
|
start again. And this is the future of the pornography industry; it is the
|
||
|
Internet.
|
||
|
|
||
|
BL: Has anyone prosecuted a computer pornography case yet?
|
||
|
|
||
|
PT: Yes, there is one case, that this Clinton administration under Janet
|
||
|
Reno has prosecuted, down in Memphis, Tennessee. They used the current law,
|
||
|
which doesn't specifically spell out the computer pornography is illegal, it
|
||
|
just prohibits hard-core pornography, and the distribution of hard-core
|
||
|
pornography, and that law was used, and in fact, just recently, the - it's a
|
||
|
husband and wife team that were [sic] putting pornography on the Internet.
|
||
|
The husband got three years, the wife got two years and three months. So
|
||
|
it's serious business. But that's only one case; I'd like to see hundreds.
|
||
|
|
||
|
BL: Now, I know our listeners are saying, well, if this is out there, can't
|
||
|
we do something about it? Isn't there legislation that is going to protect
|
||
|
our families? You mentioned Senator Exon has proposed a bill to regulate
|
||
|
computer pornography, and you made a comment. Talk to us a little bit about
|
||
|
the Senator's bill.
|
||
|
|
||
|
PT: The Senator would, his bill would do two things, supposedly; it would
|
||
|
eliminate hard-core pornography from the Internet altogether; and it would
|
||
|
prohibit any pornography, hard or soft, from going to _children_. But the
|
||
|
reason I criticized the Exon bill, and I've worked with his office since he
|
||
|
first introduced it, is that he would give immunity from prosecution from
|
||
|
the major pornography _profiteers_, and so - it's a little difficult to
|
||
|
explain, but his bill - and I'll be happy to do it, should you want that -
|
||
|
but his bill wouldn't get the job done, it would be useless, I think.
|
||
|
|
||
|
BL: Then we want something that would get the job done. How about Senator
|
||
|
Cote's bill, he's got a proposed bill, is that right?
|
||
|
|
||
|
PT: That's right, Senator Dan Cotes, pro-family champion, his is the
|
||
|
pro-family champion, and it is as worthless as Senator Exon's bill. I've
|
||
|
analyzed it, the Justice Department has analyzed it, they've analyzed it
|
||
|
correctly, he does the same thing, and you have to understand how the
|
||
|
Internet works in order to understand why they're both bad bills.
|
||
|
|
||
|
JW: Well, why don't you take a second, can you tell us how that works?
|
||
|
|
||
|
BL: We don't want to leave our listeners right now in a state of
|
||
|
confusion...
|
||
|
|
||
|
PT: Well, the pornography that is available on the Internet is mostly free,
|
||
|
in a manner of speaking. That is, someone with a computer scans into that
|
||
|
computer - and that's a term many people don't understand, but if you have a
|
||
|
scanning machine, looks like a Xerox machine - and you put on that Xerox
|
||
|
machine, essentially, the pornographic image. And that will put it into your
|
||
|
computer. And then from there they put it on the Internet. They send it from
|
||
|
their computer onto a specific location in the Internet, the pornographic
|
||
|
locations, and there's hundreds of them. So now it is on the Internet. Now,
|
||
|
if I wanted to pull that off, I could do that. But to do that, I have to
|
||
|
have access to the Internet. You buy access to the Internet, with companies
|
||
|
like America OnLine, Prodigy, CompuServe, Netcom. Those are the four biggest
|
||
|
companies out there. I have Netcom. So I subscribe to Netcom. Now they
|
||
|
charge me a fee, based on the amount of time I use their service. And all
|
||
|
their service does is provide access to the Internet. So if I want to get on
|
||
|
my computer, and I click on Netcom, all of a sudden I'm on the Internet. And
|
||
|
then I just merely go to one of the hundreds of locations where there's
|
||
|
pornography, and I click on it, and it comes right to my computer screen.
|
||
|
The person who put that on the Internet didn't charge for it. But _Netcom_,
|
||
|
or America OnLine, or these others, _will_ charge you for the amount of time
|
||
|
that you view it. Or, if you would like to keep that image, you can press a
|
||
|
button and it comes directly into your computer, and then at any time in the
|
||
|
future you can draw it back. But it takes several minutes...
|
||
|
|
||
|
BL: So it stores it right there...
|
||
|
|
||
|
PT: It stores it right there. But it takes several minutes to store it. So,
|
||
|
I may pay in a month $50, $75 to Netcom, if I were interested in
|
||
|
pornography, just to view it. Some people spend hundreds and hundreds of
|
||
|
dollars viewing it, and some of those people are children.
|
||
|
|
||
|
JW: And you're saying that the people that are making the biggest money off
|
||
|
of this are the providers of the online services.
|
||
|
|
||
|
PT: The access providers. Yes. And as I told someone recently in a letter,
|
||
|
it used to be the names of the biggest pornographers in the world were like
|
||
|
Ruben Sturman, who was identified by the Attorney General's commission as
|
||
|
the top pornographer profiteer, the pornographer profiteers today are the
|
||
|
people who give you access to the Internet, Internet [sic]. And they know
|
||
|
that material's there, they know that's why thousands and thousands of
|
||
|
people subscribe every month to their services, that is in order to get
|
||
|
pornography. So the pornography profiteers today are the access providers,
|
||
|
like Netcom, CompuServe, etc.
|
||
|
|
||
|
BL: So you, ah, as I understand it, you would like to have legislation that
|
||
|
really goes after _them_, who are providing it.
|
||
|
|
||
|
PT: I would like legislation that merely says that those who provide the
|
||
|
pornography, or facilitate that, are guilty. And so that would have to be
|
||
|
not only the person who puts that pornography from his collection on the
|
||
|
Internet, but the access provider who gives access to that material. They
|
||
|
knowingly participate in this crime, and they should be prosecuted.
|
||
|
|
||
|
JW: Are there technological ways for them to provide that service, in order,
|
||
|
to, to keep that stuff from being on their network.
|
||
|
|
||
|
PT: _Yes_, there is, and it's sad to see someone from the pro-family
|
||
|
movement arguing the case that there isn't. [Typist's note; Orrin Hatch?]
|
||
|
But for example, the University of Chicago, and their computers, which are
|
||
|
used on the Internet for storage of material, they have found this kind of
|
||
|
material, and they have blocked it up. They will not store any pornography.
|
||
|
Prodigy has blocked out anti-Semitic comments in their chat lines. Well, if
|
||
|
they can block out words that are offensive to words, they can block out
|
||
|
obscene words as well.
|
||
|
|
||
|
BL: Sure they could, yes...
|
||
|
|
||
|
PT: And in any event, just recently, in the last month, there's a
|
||
|
development - and people in these companies have made a big deal about it -
|
||
|
that you can buy software as a parent that will block this material from
|
||
|
coming to your personal computer. So these access providers now say, if you
|
||
|
don't like it in your home, go buy something for 50 bucks that enables you
|
||
|
to block it out. And my position is, if you don't, we don't like it. So
|
||
|
_you_ provide the software that prevents it from coming into my home, or to
|
||
|
_every other_ home, unless someone subscribes to it. And then if it's
|
||
|
illegal material, you shouldn't get it.
|
||
|
|
||
|
BL: You know, Mrs. LaHaye, this sounds very similar to, up in New York, um,
|
||
|
if you order cable television, in your package are some of those pornography
|
||
|
providers for your television. And there's legislature being discussed right
|
||
|
now that would prevent them from doing that, because people don't want to
|
||
|
have to just have it, their choice is, they have pornography or they don't
|
||
|
have cable. And what some pro-family groups up there want to do is get that
|
||
|
stuff off the basic package, so they don't have to deal with it, and I think
|
||
|
that's a logical argument.
|
||
|
|
||
|
PT: Exactly right. But now, what some are arguing, is that these access
|
||
|
providers shouldn't be held liable, criminally liable, if they didn't create
|
||
|
the material, or if they've failed to block it - where does this come from?
|
||
|
I mean, if this is material that is harmful to our kids, where do they get
|
||
|
the right to distribute it? The porn shop of old is going to disappear. The
|
||
|
porn shop is now going to be the computer in your home. And we'd better make
|
||
|
laws that prevent the access providers from profiting off of it. Give them
|
||
|
incentive like we do in the current Federal child pornography law. In 1988,
|
||
|
Ronald Reagan proposed a law to Congress that prohibited child pornography
|
||
|
by computer. He didn't provide any defenses to these companies. And these
|
||
|
same companies, like Netcom, or America OnLine, when they hear about child
|
||
|
pornography that's available on their services, they block it, or they
|
||
|
report it to authorities. And why do they do that? The deterrent effect of
|
||
|
the law. They don't want to be held liable for distributing child
|
||
|
pornography. So it's very difficult to find child pornography out there.
|
||
|
Now, you can find it. But these access providers don't know about it. And
|
||
|
why should we tell them with hard-core pornography or even soft-core
|
||
|
pornography, well, we defend you, you don't have any liability.
|
||
|
|
||
|
BL: Isn't it a shame - I mean, I guess I'm an idealist - that something so
|
||
|
helpful and so new and high-tech as the computer and Internet, that is
|
||
|
serving well many people for good, has now, pornography has found a way to
|
||
|
use _it_, to bring in the evil and this deterioration of our society.
|
||
|
|
||
|
PT: It is terrible, and I've heard these access providers and others who use
|
||
|
the Internet say, well, if you tamper with it, by trying to restrict
|
||
|
pornography, you'll harm the _freedom_ which is on the Internet. But what I
|
||
|
think is a better response is that the more the Internet becomes a red light
|
||
|
district, the more polluted it becomes, the less parents will want their
|
||
|
kinds on it. I wouldn't want my child on it.
|
||
|
|
||
|
BL: No, I wouldn't either... well, Patrick Truman, thanks for being with us
|
||
|
today, to try to explain a very difficult situation and one that a lot of
|
||
|
families don't understand just yet. So I trust that this few moments of
|
||
|
describing it has been of great benefit to our listeners. Thanks for being
|
||
|
with us.
|
||
|
|
||
|
PT: That's for having me.
|
||
|
|
||
|
BL: You know, Concerned Women for America, is really trying to fight against
|
||
|
this kind of immorality, and we stand for decency for the family, and you
|
||
|
know down on Florida, our grass-roots leaders for CWA formed a group called
|
||
|
Citizens Opposing Pornography, so we are out there on the front lines.
|
||
|
|
||
|
JW: Well, all over America, our volunteers have targeted bookstores, X-rated
|
||
|
bookstores, topless bars, other adult-type business, and they've been
|
||
|
involved in the front lines of fighting against this type of thing that
|
||
|
invades communities.
|
||
|
|
||
|
BL: And here in the national office, our legislative staff are up on Capital
|
||
|
Hill encouraging Congress to pass legislation that will _really_ protect our
|
||
|
families and our children.
|
||
|
|
||
|
JW: And we put together an information packet that we're calling the [sic]
|
||
|
Protecting Family Decency. And we'd like to share that with you today,
|
||
|
absolutely free, all you have to do is call 1-800-527-9600.
|
||
|
|
||
|
BL: You know, this packet will give you information that will help you
|
||
|
protect your family from all types of pornography, and it will give you
|
||
|
specific suggestions if you have a home computer and how to protect your
|
||
|
kids. So the Protecting Family Decency packet gives vital facts on how the
|
||
|
porn industry is taking advantage of computers right in your home to spread
|
||
|
their evil message.
|
||
|
|
||
|
JW: It also gives you action items and steps that you can take to make sure
|
||
|
this kind of material doesn't come into your home. So call us right now at
|
||
|
1-800-527-9600 and ask for our free Protecting Family Decency packet.
|
||
|
And now with today's commentary, here's Beverly LaHaye.
|
||
|
|
||
|
[begin editorial music]
|
||
|
|
||
|
BL: Modern ministers have developed a new theology. They say sin isn't
|
||
|
wrong, it's simply genetic. Anglican Bishop Richard Halloway believes the
|
||
|
Church should not condemn affairs; he claims that adultery is caused by our
|
||
|
genetics. The Bishop's theology bears a striking resemblance to homosexual's
|
||
|
[sic] search for a gay gene. And the Justice Department is studying the
|
||
|
brains of prison inmates. They are trying to find a biological link to
|
||
|
violent crime. Doug Walston, a genetic researcher, finds this trend very
|
||
|
alarming, and claims that we should _stop_ this before it gets out of hand.
|
||
|
But it's already out of hand! Genetics has become the modern-day scapegoat
|
||
|
for sin! But God does not accept man's excuses for sin; theologians,
|
||
|
psychologists, and activists try to hide sin behind a genetic code, but God
|
||
|
still says, the wages of sin is death. But there is a way of escape. God
|
||
|
loved us enough to offer his son in payment for our sin. He has offered us
|
||
|
salvation and freedom from sin. All we have to do is repent and accept it.
|
||
|
The world tries to justify sin through genetics, but God brings us his
|
||
|
justification by grace, through faith in Jesus Christ. This is Beverly
|
||
|
LaHaye, in Washington.
|
||
|
|
||
|
[end editorial music]
|
||
|
|
||
|
JW: Thank you, Mrs. LaHaye. You know, despite what they say, pornography is
|
||
|
_not_ a victimless crime. Families are being torn apart; the innocence of
|
||
|
children is being violated; women are being raped; and this is because of
|
||
|
pornography!
|
||
|
|
||
|
BL: And that's why Concerned Women for America is working hard to stop these
|
||
|
obscene influences. And when you receive your free Protecting Family Decency
|
||
|
packet, you'll be able to speak out against pornography, even in your
|
||
|
computers, along with us.
|
||
|
|
||
|
JW: [pitch for donations, reiteration of packet offer]
|
||
|
|
||
|
BL: Now let's face it Jim: pornography is destroying many, many young people
|
||
|
in America today. And we want to fight against it. Well, our thanks to
|
||
|
Patrick Truman for helping to draw attention to this very critical issue.
|
||
|
Tomorrow, we'll talk about more ways to defend your family against this
|
||
|
high-tech abuse of morality and decency. You won't want to miss it. From our
|
||
|
nation's capital, I'm Beverly LaHaye.
|
||
|
|
||
|
JW: And I'm Jim Woodall.
|
||
|
|
||
|
BL: Thank you for joining us today.
|
||
|
|
||
|
[End music and standard "out" talk by Janet Parchell - "Help make sure your
|
||
|
Christian Values are represented here in our nation's capitol"]
|
||
|
|
||
|
BL: Thanks to computers, pornography is more available now than ever before.
|
||
|
Does your child have access to porn? Find out tomorrow.
|
||
|
|
||
|
[End music climax and ends]
|
||
|
|
||
|
BL: It's been said that anyone with a home computer and access to the
|
||
|
Internet has a porn shop in their home. Tomorrow, on Beverly LaHaye Live,
|
||
|
we'll show you how to protect your family from these immoral influences.
|
||
|
|
||
|
[Out ad for Lifeline Long Distance, talking about how they do not promote
|
||
|
"special rights for homosexuals" and so on. Standard ad.]
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.67
|
||
|
************************************
|
||
|
|