892 lines
41 KiB
Plaintext
892 lines
41 KiB
Plaintext
![]() |
|
|||
|
Computer underground Digest Wed Mar 4, 1998 Volume 10 : Issue 16
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #10.16 (Wed, Mar 4, 1998)
|
|||
|
|
|||
|
File 1--Renewed Federal and State attempts to censor Internet
|
|||
|
File 2--In re CyberSitter (CuD 10.14)
|
|||
|
File 3--Article by Allen Smith
|
|||
|
File 4--"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E.
|
|||
|
File 5--cj#781> *ALERT* Internet Vulnerability * COUNTERMEASURES *
|
|||
|
File 6--1998-02-04 Executive Order on Year 2000 Conversion (fwd)
|
|||
|
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 13 Feb 1998 18:19:02 -0500 (EST)
|
|||
|
From: owner-cyber-liberties@aclu.org
|
|||
|
Subject: File *&*--Renewed Federal and State attempts to censor Internet
|
|||
|
|
|||
|
Source - ACLU Cyber-Liberties Update
|
|||
|
February 16, 1998
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Internet Censorship Legislation Takes Center Stage Again in Senate
|
|||
|
|
|||
|
Acting less than a year after the Supreme Court delivered a passionate
|
|||
|
defense of free
|
|||
|
speech on the Internet in Reno v. ACLU, a Senate committee held a
|
|||
|
hearing on Internet indecency this week where Senators John McCain
|
|||
|
(R-AZ) and Dan Coats (R-IN) called for support for two bills that seek
|
|||
|
to regulate content and control access to sensitive or controversial
|
|||
|
information on the Internet.
|
|||
|
|
|||
|
Commerce Committee Chairman McCain formally introduced legislation on
|
|||
|
Monday that would require schools and libraries to block "indecent"
|
|||
|
Internet sites or lose federal funds for online programs. In defending
|
|||
|
his proposal, McCain said that people should give up some of their
|
|||
|
civil liberties to prevent the dissemination of harmful material on
|
|||
|
the Net.
|
|||
|
|
|||
|
Senator Coats, who sponsored the ill-fated Communications Decency Act
|
|||
|
that was held unconstitutional last year, also called for support on a
|
|||
|
bill he introduced in November that would punish commercial online
|
|||
|
distributors of material deemed "harmful to minors" with up to six
|
|||
|
months in jail and a $50,000 fine.
|
|||
|
|
|||
|
The ACLU said that, if adopted, both bills would almost certainly face a
|
|||
|
court challenge and would likely face the same fate as the
|
|||
|
Communications Decency Act, which was unanimously overturned by the
|
|||
|
Supreme Court last June.
|
|||
|
|
|||
|
In a letter to members of the Commerce Committee, ACLU Legislative
|
|||
|
Counsel Gregory T. Nojeim said that the ACLU recognizes the "deeply felt
|
|||
|
concerns of many parents about the potential abuse of information on the
|
|||
|
Internet."
|
|||
|
|
|||
|
But, he said, the ACLU strongly believes that individual Internet users
|
|||
|
must be given the right to access information and parents should not
|
|||
|
abdicate responsibility to the government for determining which
|
|||
|
information their children can see.
|
|||
|
|
|||
|
Under the Coats proposal, which was introduced last November, criminal
|
|||
|
penalties could be leveled against "distributors," a designation that
|
|||
|
could include the virtual bookstore amazon.com or a promotional site for
|
|||
|
a Hollywood movie, as well as Internet Service Providers such as
|
|||
|
Microsoft and America Online. And unlike the CDA, the Coats statute
|
|||
|
would apply only to web sites, not to chat rooms, e-mail or news groups.
|
|||
|
|
|||
|
The new McCain legislation threatens speech in a completely different
|
|||
|
way by cutting off federal funds to schools that do not implement
|
|||
|
restrictive Internet access policies. Such a plan, the ACLU said, would
|
|||
|
mean that teachers could not assign Internet research on subjects such
|
|||
|
as female genital mutilation or the history of the Roe v. Wade abortion
|
|||
|
rights case -- information that is typically blocked when filters are
|
|||
|
installed, and that is otherwise available on the shelves of school and
|
|||
|
public libraries.
|
|||
|
|
|||
|
The ACLU, along with other members of the Internet Free Expression
|
|||
|
Alliance, (IFEA), which the ACLU co-founded, also submitted letters
|
|||
|
objecting to online censorship efforts. Letters by Feminists for Free
|
|||
|
Expression, Electronic Frontier Foundation, Electronic Privacy
|
|||
|
Information Center (EPIC) and the National Coalition Against Censorship
|
|||
|
are available online at the IFEA home page, at <http://www.ifea.net>
|
|||
|
|
|||
|
The ACLU and IFEA plan to fight the passage of both the McCain and Coats
|
|||
|
bills.
|
|||
|
|
|||
|
The ACLU's letter to the Commerce Committee can be found at:
|
|||
|
<http://www.aclu.org/congress/lg021098b.html>
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
New Mexico, Illinois, Rhode Island, Tennessee Consider Broad State
|
|||
|
Internet Regulations
|
|||
|
|
|||
|
Despite the Supreme Court ruling in Reno v. ACLU, which granted the
|
|||
|
highest level of First Amendment protection to the Internet, states are
|
|||
|
busy crafting online censorship laws. At least 13 states have passed
|
|||
|
laws since 1995, and several others are considering such bills.
|
|||
|
|
|||
|
Some particularly troublesome state legislation include recently
|
|||
|
introduced bills in Tennessee, Rhode Island, New Mexico, and Illinois.
|
|||
|
The bills are briefly described below:
|
|||
|
|
|||
|
Tennessee:
|
|||
|
HB 3353, SB 3329, introduced 2/5/98. Calls on the US Congress to create
|
|||
|
a domain code for adult oriented sites, to facilitate users,
|
|||
|
Internet Service Providers and software developers to manage the
|
|||
|
problem of uncontrolled access to obscenity, child pornography and other
|
|||
|
adult oriented materials via the Internet. The bill also includes the
|
|||
|
following:
|
|||
|
|
|||
|
requires the creation of rules governing use of state computers and
|
|||
|
sanctions for misuses;
|
|||
|
|
|||
|
requires public schools and libraries that operate computers with
|
|||
|
Internet access to use software to block material, including,
|
|||
|
pornography, obscentiy and other material harmful to minors;
|
|||
|
|
|||
|
imposes criminal liability on librarians, teachers, or any other
|
|||
|
administrator who knowingly fails to comply with restrictions;
|
|||
|
|
|||
|
makes Internet Service Providers (ISPs) that provide services to
|
|||
|
Tennessee residents criminally liable for any distribution, including by
|
|||
|
third parties, of any harmful material.
|
|||
|
|
|||
|
Rhode Island:
|
|||
|
GA Bill 11-9-21, introduced 1/98. Criminalizes the use of computers for
|
|||
|
immoral and illegal purposes involving children. Every person who,
|
|||
|
by means of computer, knowingly compiles, enters, transmits, makes,
|
|||
|
prints, publishes, reproduces, causes, allows, buys, sells, receives,
|
|||
|
exchanges, or disseminates any notice, statement, advertisement, or
|
|||
|
minors name... for the purposes engaging, facilitating, encouraging,
|
|||
|
offering, or soliciting unlawful, sexual conduct and/or any felony or
|
|||
|
misdemeanor shall be guilty of a felony.... (emphasis added)
|
|||
|
|
|||
|
New Mexico:
|
|||
|
Senate Bill to amend 30-37-1, introduced 1/98. Criminalizes the
|
|||
|
transmission of indecent material to minors and requires the use of a
|
|||
|
mechanism such as labeling, segregation or other means that enables the
|
|||
|
indecent material to be automatically blocked or screened by software or
|
|||
|
other capability reasonably available...
|
|||
|
|
|||
|
Illinois:
|
|||
|
HB 2558, introduced 1/27/98. Criminalizes the transmission of harmful
|
|||
|
material to minors.
|
|||
|
|
|||
|
For more information about other state measures to regulate the
|
|||
|
Internet, read the ACLU guide to online censorship in the states,
|
|||
|
Speech in America, ACLU in Brief, available by calling
|
|||
|
1-800-775-ACLU.
|
|||
|
|
|||
|
==============
|
|||
|
About Cyber-Liberties Update:
|
|||
|
|
|||
|
ACLU Cyber-Liberties Update Editor:
|
|||
|
A. Cassidy Sehgal (csehgal@aclu.org)
|
|||
|
American Civil Liberties Union
|
|||
|
National Office 125 Broad Street,
|
|||
|
New York, New York 10004
|
|||
|
|
|||
|
The Update is a bi-weekly e-zine on cyber-liberties cases and
|
|||
|
controversies at the state and federal level. Questions or comments
|
|||
|
about the Update should be sent to Cassidy Sehgal at csehgal@aclu.org.
|
|||
|
Past issues are archived at
|
|||
|
<http://www.aclu.org/issues/cyber/updates.html>
|
|||
|
|
|||
|
To subscribe to the ACLU Cyber-Liberties Update, send a message to
|
|||
|
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
|
|||
|
message. To terminate your subscription, send a message to
|
|||
|
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 27 Feb 1998 20:15:00 -0700
|
|||
|
From: Doc Holiday <Doc_Holliday@AWWWSOME.COM>
|
|||
|
Subject: File *&*--In re CyberSitter (CuD 10.14)
|
|||
|
|
|||
|
>From--"Robert J. Woodhead (AnimEigo)" <trebor@ANIMEIGO.COM>
|
|||
|
>Subject--File 3--Hacking Cybersitter (Cu Digest, #10.12, Wed 18 Feb 98)
|
|||
|
>
|
|||
|
>>Date--Tue, 17 Feb 98 15:04 EST
|
|||
|
>>From-- Michael Gersten <michael@STB.INFO.COM>
|
|||
|
>>Subject--File 5--Re--Cu Digest, #10.11, More on CyberSitter
|
|||
|
>>
|
|||
|
>>Programs like cybersitter, however, do not work that way. You cannot
|
|||
|
>>tell ahead of time what they will block; often there is no way to
|
|||
|
>>tell that your site is blocked. Although they claim to do it to
|
|||
|
>>protect children from "unsuitable" material, that definition is
|
|||
|
>>arbitrary, and often includes web pages that oppose such software,
|
|||
|
>>or in some cases, any page hosted on the same site as one "unsuitable"
|
|||
|
>>page.
|
|||
|
>
|
|||
|
>I've never played with cybersitter or similar programs, but it should be
|
|||
|
>relatively trivial to write a program that emulates a browser and sends,
|
|||
|
>say, every URL on Yahoo (it is trivial to write a spider to collect these)
|
|||
|
>through the censorware, to determine what they are blocking.
|
|||
|
|
|||
|
The question is, why should we have to work to get around Brian Milburn's
|
|||
|
censorship, (or should I say Focus on the Family, to think I used to be
|
|||
|
intimately involved with them?)? You and I may be able to create an
|
|||
|
application that could send CyberSitter every URL listed on Yahoo, but the
|
|||
|
average parent can't and doesn't want to. The average parent should be able
|
|||
|
to pick and choose what is blocked -- if they choose to block anything. As
|
|||
|
usual, in this type of debate, the fact that a child who is supervised
|
|||
|
while using the Internet by their parent has the best "filter" of all
|
|||
|
installed is never mentioned.
|
|||
|
|
|||
|
No offense to anyone else out there, but it is beginning to seem -- with
|
|||
|
this filterware debate -- that I spend more time supervising my dog, Lady
|
|||
|
Joyous of Shasta, CD (Golden Retriever, the 'CD' means 'companion dog' and
|
|||
|
is a result of winning obedience trials), than they do supervising their
|
|||
|
kids.
|
|||
|
|
|||
|
>
|
|||
|
>Similarly, it would be trivial to build a site that returns pages with
|
|||
|
>subsets of every word in a large dictionary, so one could binary-chop and
|
|||
|
>determine what words are red-flagged.
|
|||
|
>
|
|||
|
>The beauty of such a hack, of course, would be that one would not be
|
|||
|
>cracking their encryption or hacking their program, but merely asking it to
|
|||
|
>do what it was designed to do, and noting the responses.
|
|||
|
|
|||
|
This all seems like too much work. The persons who are able to do this,
|
|||
|
won't want to take the time to do it, because they won't buy into Milburn's
|
|||
|
tripe and the others, well, unfortunately, they will probably buy his tripe
|
|||
|
and be none the wiser. By the way, I am still not convinced that breaking
|
|||
|
the weak encryption on CyberSitter's software for your own information
|
|||
|
would be illegal, either criminally or tortiously.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 25 Feb 1998 14:19:00 -0700
|
|||
|
From: "Moore, Mike W" <MooreMW@LOUISVILLE.STORTEK.COM>
|
|||
|
Subject: File *&*--Article by Allen Smith
|
|||
|
|
|||
|
I have been a reader of CuD for a few years now and have occaisionally
|
|||
|
felt an urge to respond but never stronger than when I read this
|
|||
|
article:
|
|||
|
|
|||
|
Date--Thu, 19 Feb 1998 23:07:31 -0500
|
|||
|
From--Allen Smith <easmith@beatrice.rutgers.edu>
|
|||
|
|
|||
|
>Regarding the various censorware programs... everyone seems to be
|
|||
|
>making the assumption that parents _do_ have the right to censor
|
|||
|
>what their children see. But is this truly the case, in ethics if
|
|||
|
>not in law?
|
|||
|
|
|||
|
If I don't have the right to control and monitor the information my
|
|||
|
children receive, than who does? The guvmint? No one?
|
|||
|
|
|||
|
>We do not allow parents to keep their children from getting an
|
|||
|
>education. We do not allow this even though that education can lead
|
|||
|
>to those children learning things that will cause them to disagree
|
|||
|
>with their parents.
|
|||
|
|
|||
|
Parents do not have the right to keep their children from an education
|
|||
|
but with things like the PTA and school board meetings we do have some
|
|||
|
control on the content of that education.
|
|||
|
|
|||
|
> We do not allow this even though that education
|
|||
|
>can lead to those children learning things that will shock them -
|
|||
|
>such as about war.
|
|||
|
|
|||
|
War is a fact and cannot be hidden, however are you going to show photos
|
|||
|
of Aushwitz to a 3rd grade class or pictures of liberated villages whose
|
|||
|
people are glad that some one stood up to fight when it was necessary.
|
|||
|
Showing a little child pictures of horror will not end wars in the
|
|||
|
future but it will frighted, shock, and disturb him. Is this the way we
|
|||
|
want our small children to feel? I don't and will do everything I can to
|
|||
|
block such sights from them until I think they're ready.
|
|||
|
|
|||
|
<snipped lot pertaining to blocking software and examples>
|
|||
|
|
|||
|
>The same is true of other controversial topics, such as ones
|
|||
|
>regarding violence. While there is some evidence (and much evidence
|
|||
|
>against it) that viewing violence results in increased aggression,
|
|||
|
>whether this is a problem depends on in what situations and against
|
|||
|
>whom that aggression emerges.
|
|||
|
|
|||
|
Violence is a fact of life but it is my job as a parent to protect my
|
|||
|
children from violence as long as I can. I fail to see how teaching
|
|||
|
self-defence to an eight year old can protect them from violence from an
|
|||
|
adult. I must and do teach my kids what they can do in a bad situation,
|
|||
|
but I also try to teach them that in many instances violence is not as
|
|||
|
ubiquitious as the media portrays. I don't hide the fact of violence and
|
|||
|
hate from them but if I left it up to them to learn on their own, would
|
|||
|
they not learn that it is unavoidable, everyone is evil, and they can do
|
|||
|
nothing to escape it? Wouldn't it be more traumatic for my kids to live
|
|||
|
paranoid and afraid? Because of the sensational nature of the really
|
|||
|
heinous crimes, might they not think they are more prevelant then they
|
|||
|
actually are? Of course I'm going to keep some of this from my kids
|
|||
|
until I, no one else, decide that they are ready to handle it.
|
|||
|
|
|||
|
>Yes, as a previous poster said, a 10-year-old searching for
|
|||
|
>information under "American Girl" may see things that will remain
|
|||
|
>with that child for the rest of his or her life. But there is no
|
|||
|
>evidence that this harms the child; there are a _lot_ of things that
|
|||
|
>remain with people throughout their lives. Parents have the
|
|||
|
>opportunity to do a lot of things that have this characteristic;
|
|||
|
>should they be able to shut children off from others doing the same,
|
|||
|
>if no harm is done to the child?
|
|||
|
|
|||
|
Maybe this stuff will do no permanent harm but they can be confusing to
|
|||
|
a child without the maturity to handle it. The little folks have enough
|
|||
|
problems living in the big folks world as it is. So I will keep things
|
|||
|
from my kids that I don't think they are ready for.
|
|||
|
|
|||
|
It boils down to a matter of values, not the PC "Family Values" that are
|
|||
|
being touted but the values that I've learned over the years and have
|
|||
|
put into my own life. I will try to instill those values in my children
|
|||
|
until such time as they are ready to develop their own. And I will do it
|
|||
|
by "censorship" if I think that is the way it should be done.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 20 Feb 1998 08:28:41 -0800
|
|||
|
From: <rslade@sprint.ca>
|
|||
|
To: slade@victoria.tc.ca
|
|||
|
Subject: File *&*--"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E.
|
|||
|
|
|||
|
BKINBSGD.RVW 971120
|
|||
|
|
|||
|
"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E.
|
|||
|
Denning/Peter J. Denning, 1998, 0-201-30820-7
|
|||
|
%A Dorothy E. Denning denning@cs.georgetown.edu
|
|||
|
%A Peter J. Denning
|
|||
|
%C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8
|
|||
|
%D 1998
|
|||
|
%G 0-201-30820-7
|
|||
|
%I Addison-Wesley Publishing Co.
|
|||
|
%O 416-447-5101 fax: 416-443-0948 800-822-6339 617-944-3700
|
|||
|
%O Fax: (617) 944-7273 bkexpress@aw.com
|
|||
|
%P 547 p.
|
|||
|
%T "Internet Besieged: Countering Cyberspace Scofflaws"
|
|||
|
|
|||
|
As with the earlier "Computers Under Attack" (cf. BKDENING.RVW), this
|
|||
|
book is a collection of papers related to the titular topic. This
|
|||
|
text is not just an updating of the earlier work, although some of the
|
|||
|
same papers appear, having been revised and updated. It is also more
|
|||
|
narrowly focussed, with sections discussing the worldwide network,
|
|||
|
Internet security, cryptography, secure electronic commerce, and
|
|||
|
finally dealing with law, policy, and education. The anthology style
|
|||
|
is well suited to a constantly changing and still emergent field.
|
|||
|
|
|||
|
Under the scope of the worldwide network, there is an initial review
|
|||
|
of the history of the net by Peter Denning. Dorothy Denning follows
|
|||
|
up with an overview of system security breaking methods over networks.
|
|||
|
(While it is a fine and readable piece of work, the essay is not quite
|
|||
|
as riveting as the interview with a system cracker in "Computer Under
|
|||
|
Attack.") As usual, the most interesting papers deal with real case
|
|||
|
studies, such as the attack on Rome Labs. Peter Neumann's brief piece
|
|||
|
on the RISKS-FORUM archives indicates the value that the net can be in
|
|||
|
protecting itself, since RISKS acts as a kind of repository memory of
|
|||
|
attacks and weaknesses. The even briefer article on securing the
|
|||
|
information infrastructure is a kind of call to arms to pay attention
|
|||
|
to security in important control systems. Part one is finished off
|
|||
|
with Eugene Spafford's computer virus paper; by now the classic short
|
|||
|
work in the field.
|
|||
|
|
|||
|
Part two, specifically looking at Internet security, starts with
|
|||
|
another case study; that of the Berferd attack on Bell Labs. This is
|
|||
|
followed by an overview of network security threats and protective
|
|||
|
tools. Two articles look at specific types of assaults: "sniffing",
|
|||
|
which works because of the broadcast nature of many means of media
|
|||
|
access, and "spoofing", which works because of the automatic
|
|||
|
configuration and repair protocols intended to provide reliability.
|
|||
|
An overview of password use looks primarily at technologies to make
|
|||
|
password cracking more difficult. Four security tools are introduced,
|
|||
|
a GPS (Global Positioning System) based authentication scheme,
|
|||
|
Tripwire, DIDS (Distributed Intrusion Detection System), and SATAN
|
|||
|
(Security Administrator Tool for Analyzing Networks). Java security
|
|||
|
also gets a thorough examination.
|
|||
|
|
|||
|
The section on cryptography starts with the development of the Data
|
|||
|
Encryption Standard. (It is indicative of the rate of change in this
|
|||
|
field that the following article, looking at the breaking of two
|
|||
|
recent cryptographic systems, doesn't cover the cracking of DES. The
|
|||
|
book was published just before that happened.) There is a detailed
|
|||
|
essay on the Internet Privacy Enhanced Mail (PEM) protocol, and a more
|
|||
|
conceptual paper on authentication for distributed networks. There is
|
|||
|
also a taxonomy, or method of classifying, for key recovery encryption
|
|||
|
systems.
|
|||
|
|
|||
|
Security of electronic commerce covers electronic commerce itself,
|
|||
|
atomicity in electronic commerce (which determines the general
|
|||
|
usefulness of a system), another overview of Internet security
|
|||
|
vulnerabilities, digital forms of money and cash, ad identify misuse
|
|||
|
and fraud.
|
|||
|
|
|||
|
The final part looks at social issues. The law enforcement in
|
|||
|
cyberspace address, coming as it does from a US federal agency, is
|
|||
|
unsurprising in its call for key escrow. Dorothy Denning follows up
|
|||
|
with a more reasoned review of the market forces. Bruce Sterling gets
|
|||
|
two cracks at computers and privacy. Eugene Spafford gets the hardest
|
|||
|
job--looking at computer ethics--and does a decent and practical job.
|
|||
|
There are two examples of use policies from universities, and a final,
|
|||
|
very interesting, article on the inclusion of data security topics and
|
|||
|
activities in the teaching of computer science concepts (rather than
|
|||
|
the other way around).
|
|||
|
|
|||
|
Even within this limited frame of reference, the book cannot be
|
|||
|
exhaustive. When you start to consider the gaps that are missing,
|
|||
|
like the international nature of many activities that make them
|
|||
|
essentially immune to legal remedies, you also find that whole fronts
|
|||
|
of the Internet siege are unmentioned, or only tangentially referred
|
|||
|
to. Spam, fraudulent scams, and chain letters claim many more victims
|
|||
|
than do system crackers.
|
|||
|
|
|||
|
Still, this work is both interesting and valuable. It should be of
|
|||
|
particular use to the student or teacher of data security, although
|
|||
|
there is much to hold the attention of any interested individual.
|
|||
|
|
|||
|
copyright Robert M. Slade, 1997 BKINBSGD.RVW 971120
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 23 Feb 1998 21:22:15 GMT
|
|||
|
From: "Richard K. Moore" <rkmoore@iol.ie>
|
|||
|
Subject: File *&*--cj#781> *ALERT* Internet Vulnerability * COUNTERMEASURES *
|
|||
|
|
|||
|
Dear netizens,
|
|||
|
|
|||
|
Are you fully aware of how extremely fragile and vulnerable are Internet
|
|||
|
infrastructures such as this list? Did you know that any Internet server
|
|||
|
(eg, "@sun.soci.niu.edu" or "@cpsr.org" or "@weber.ucsd.edu") can be taken
|
|||
|
off the air at any time with no warning by a "mailbomb" attack? ...that
|
|||
|
your personal email address and web site can be incapacitated in the same
|
|||
|
way? ...and that there is no effective way to prevent such an attack nor
|
|||
|
to defend against it? Did you know such an attack can be conveniently
|
|||
|
mounted by any sizable group of people who have an ideological axe to
|
|||
|
grind, or by a smaller group with only minimal software support (to
|
|||
|
automatically generate thousands of pseudo messages)?
|
|||
|
|
|||
|
|
|||
|
~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
|
|||
|
~-=-=-=-=-=-=~THE DANGER IS REAL~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
|
|||
|
|
|||
|
A successful attack of this kind was carried out last Summer against IGC
|
|||
|
(Insitute for Global Communications), and IGC was promptly forced to close
|
|||
|
down a Basque-related web site that a Spanish citizens' group had deemed to
|
|||
|
be objectionable. Phil Agre (RRE news service) published the first
|
|||
|
announcemnt of the event that came to my attention:
|
|||
|
|
|||
|
~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
|
|||
|
| Date--Thu, 17 Jul 1997 15:34:17 -0700 (PDT)
|
|||
|
| From--Maureen Mason <mmason@igc.apc.org>
|
|||
|
| Subject--IGC censored by mailbombers
|
|||
|
|
|
|||
|
| Hi Phil,
|
|||
|
|
|
|||
|
| [...]
|
|||
|
|
|
|||
|
| We host a site (http://www.igc.org/ehj) for a US group supporting Basque
|
|||
|
| independence in Spain and France, and have gotten protest letters over the
|
|||
|
| past 4 months saying that the site "suppports terrorism" because a section
|
|||
|
| of it contains material on ETA, an armed group somewhat like the IRA in
|
|||
|
| Northern Ireland, at http://www.igc.org/ehj/html/eta.html (the rest of the
|
|||
|
| site includes material on human rights, politics, other Basque
|
|||
|
| independence groups and hyperlinks to site with opposing views).
|
|||
|
|
|
|||
|
| But now the protest--fueled by ETA's kidnapping and killing of a
|
|||
|
| Spanish politician this month--has turned into a serious
|
|||
|
| "mailbombing" campaign against that is threatening to bring our
|
|||
|
| servers to a halt. We are also getting hundreds of legitimate
|
|||
|
| protest messages, which we can handle. What is damaging us is
|
|||
|
| thousands of anonymous hits to our mail servers from hundreds of
|
|||
|
| different mail relays, with bogus return addresses; there's not
|
|||
|
| much we can do about these short of blocking access from hundreds
|
|||
|
| of mail servers as new sources of mailbombings appear.
|
|||
|
|
|
|||
|
| Our other email users (we have 13,000 members) are having their
|
|||
|
| mail tied up or can't reach it, and our support lines are tied
|
|||
|
| up with people who can't access their mail.
|
|||
|
| -=-=-=-=-=-=~-<snip>-~=-=-=-=-=-=-
|
|||
|
|
|
|||
|
~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
|
|||
|
|
|||
|
|
|||
|
Shortly after this posting, IGC (a "progressive" non-profit
|
|||
|
service-provider) submitted to the demands of the attack and took down the
|
|||
|
Basque-independence site. The mailbombing then ceased.
|
|||
|
|
|||
|
The attack was not only successful, but it was very selective (a surgical
|
|||
|
strike on IGC) - there was no general disruption of the net, minimal
|
|||
|
collateral opposition was generated, and media and officaldom simply
|
|||
|
ignored the episode (as far as I know). If it had been an attack on some
|
|||
|
corporate-operated server, and it had disrupted financial transactions, one
|
|||
|
could well imagine headlines about "net terrorism" and perhaps prompt
|
|||
|
legislation to "crack down" on "excessive" net freedoms. (Notice how we
|
|||
|
lose either way if such attacks become more prevelant.)
|
|||
|
|
|||
|
|
|||
|
~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
|
|||
|
-=-=-=-=-=-=~WHY YOU SHOULD BE CONCERENED~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=~
|
|||
|
|
|||
|
Is this something we need to be concerned with?
|
|||
|
|
|||
|
I suggest that it is; I will explain why; and I will recommend some simple
|
|||
|
counter measures - cheap "fire insurance" if you will - that should be
|
|||
|
promptly implemented by anyone who wants to retain some ability to "stay in
|
|||
|
touch" in the event of determined mailbombing campaigns (or net-attacks of
|
|||
|
any description).
|
|||
|
|
|||
|
Fast forward to "-=~COUNTER MEASURES~=-" if you're already sufficietly
|
|||
|
"conerned" and want to skip to the chase.
|
|||
|
|
|||
|
The means by which serious, but selective, net disruption could be brought
|
|||
|
about should be clear at this point... here's a fully plausible scenario:
|
|||
|
|
|||
|
-=-=-=-=-=-=~-~=-=-=-=-=-=-
|
|||
|
Imagine that a group of the Christian-Coalition genre were to
|
|||
|
make an issue of the fact that many "liberal" servers and web-sites on
|
|||
|
the net support discusson of abortion, gay liberation, revolution,
|
|||
|
pornography, and socialism. We've seen how even murder (of abortion
|
|||
|
doctors) has been a result of fundamentalist fervor - is there any
|
|||
|
reason to assume that a mail-bomb attack on "liberal God-denying net
|
|||
|
servers" would be considered "out of bounds" as a tactic to "stop the
|
|||
|
anti-christ" and slow the further erosion of "family values"?
|
|||
|
-=-=-=-=-=-=~-~=-=-=-=-=-=-
|
|||
|
|
|||
|
Substitute your own scenario if you prefer, but I hope it's clear that only
|
|||
|
_intention_ stands between us and the loss of our networking. If some
|
|||
|
activist group - on their own or via encouragement and support of "others"
|
|||
|
- takes it in their head to bring an end to widespread progressive
|
|||
|
networking, they can do it. And if legal remedies are attempted, it is
|
|||
|
difficult to imagine anything effective coming out of Washington (or the UK
|
|||
|
or Germany or etc) that wouldn't do us more harm than good. My first
|
|||
|
recommendation (:>) is to knock on wood and say "God willing" each time you
|
|||
|
dial in to the net.
|
|||
|
|
|||
|
So the means and the danger are clear, and have been established by
|
|||
|
precedent. The remaining question is:
|
|||
|
Do we have any reason to expect that such an attack will in fact be
|
|||
|
mounted?
|
|||
|
|
|||
|
Here is one person's view, received this morning over the wsn list:
|
|||
|
|
|||
|
~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
|
|||
|
| Date--Mon, 23 Feb 1998
|
|||
|
| From--<name suppressed>
|
|||
|
| To: WORLD SYSTEMS NETWORK <wsn@csf.colorado.edu>
|
|||
|
| Subject--The REAL WAR yet to come
|
|||
|
|
|
|||
|
| This Iraq/US stand off business is just international snow ball
|
|||
|
| fights.
|
|||
|
|
|
|||
|
| Get this, the US says they want Iraq to honour UN decisions but
|
|||
|
| says in the same breath "we (the USA) will not honour UN
|
|||
|
| decisions. The Americans fall for that ?
|
|||
|
|
|
|||
|
| The REAL WAR will come when the USA will be attacked by
|
|||
|
| people of conscience from the ground through the Internet. The
|
|||
|
| US Govt will subversively attempt to close down or disturb internet
|
|||
|
| comunications to disrupt ground swells. The only interests the US
|
|||
|
| has is oil ! Fuelled by the Oil Companies. Think about it. This
|
|||
|
| GREAT Technologically advanced nation is not a nation of
|
|||
|
| electronic vehicles in the late 1990's. Amateur futurists like myself
|
|||
|
| could have predicted this scenario in 1960. I think it is time that
|
|||
|
| the world citizens of this planet set the record straight.
|
|||
|
|
|
|||
|
| Be prepared however for disconnection through the Internet !
|
|||
|
|
|
|||
|
~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
|
|||
|
|
|||
|
|
|||
|
The Oil Theory re/ Iraq is a bit simplistic, but the Effective Progressive
|
|||
|
Activism Scenario is one to take very seriously. There hasn't been a
|
|||
|
"real" protest movement during the Internet era, not one within an
|
|||
|
order-of-magnitude of, say, the sixties movements. If such a movement were
|
|||
|
to arise, if it were to create political discomfort for those in power, and
|
|||
|
if the net were being used effectively for coordination and news
|
|||
|
distribution (eg, worldwide distribution of videos of 'blacked out' protest
|
|||
|
events) - then it would not be at all surprising if counter-measures were
|
|||
|
undertaken.
|
|||
|
|
|||
|
In such an event, various governments might simply close down servers,
|
|||
|
under some kind of conspiracy or riot-act charges. Or a "spontaneous"
|
|||
|
attack of the variety described above could be covertly encouraged and
|
|||
|
supported. The choice would be "theirs", and the tactics could be selected
|
|||
|
on the basis of PR-effect & political expediency. And the targets wouldn't
|
|||
|
just be extremist groups, they'd be the whole progressive communications
|
|||
|
infrastructure. At least that's what would make obvious Machivellian sense
|
|||
|
in such a scenario: nip problems in the bud, as it were.
|
|||
|
|
|||
|
As the US persists in its determination to deploy new weapons systems
|
|||
|
against Iraq, and as global opposition grows and generalizes to the
|
|||
|
sanctions as well, we could be on the very verge of a political movement
|
|||
|
significant enough to show up on Washington's early-warning radar. If the
|
|||
|
net is doing its part in such a movement - as many of us are endeavoring to
|
|||
|
encourage - we should not be surprised by a bud-nipping reactionary
|
|||
|
response, in some adequately disguised or rhetorically justified form.
|
|||
|
|
|||
|
If not Iraq, then the MAI And National Sovereignty, or Disgust With
|
|||
|
Corporate Political Domination, or, if we get our act together, All Of The
|
|||
|
Above. Corporate globalization has had easy sailing for too long, and has
|
|||
|
made too many enemies - an energetic opposition movement is only a
|
|||
|
spark-in-dry-grass away, by the estimate of this observer.
|
|||
|
|
|||
|
You may think Internet is Unsinkable, but even the Titanic had _some_
|
|||
|
lifeboats; I suggest we don't steam unprepared into uncertain waters.
|
|||
|
|
|||
|
|
|||
|
~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
|
|||
|
-=-=-=-=-=-=~COUNTER MEASURES~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
|
|||
|
|
|||
|
What countermeasures are available to us?
|
|||
|
|
|||
|
The goal of countermeasures, I suggest, should be to facilitate
|
|||
|
communication-by-other means among people and groups who have come to
|
|||
|
depend on Internet in their political and educational activity. Obviously
|
|||
|
alternative communication means would be less effective than the net, but
|
|||
|
in time of emergency _some_ connectivity will be preferable to total
|
|||
|
isolation (ie: dependence on mass media for information).
|
|||
|
|
|||
|
My recommendation is to identify who your "key net contacts" are - people
|
|||
|
whose presence you take for granted in your net communications, people you
|
|||
|
are collaborating with, people who provide you with important information,
|
|||
|
people who are likely to be in touch with others in an emergency situation.
|
|||
|
|
|||
|
The next step is to contact those people NOW - while you still can
|
|||
|
conveniently - and exchange with them your phone numbers, fax numbers, and
|
|||
|
postal addresses. You might even go so far as to make preliminary
|
|||
|
arrangements for "phone-tree" or "photocopy-tree" protocols for
|
|||
|
distributing information, but most of us probably won't get around to that,
|
|||
|
life being what it is. The important thing is to have the necessary data
|
|||
|
on hand well in advance of need.
|
|||
|
|
|||
|
If serious net disruption does occur, for whatever reason, it is critically
|
|||
|
important to observe certain common-sense protocols in the use of phone and
|
|||
|
fax numbers. Effective anarchic communications require a certain finesse
|
|||
|
and forethought.
|
|||
|
|
|||
|
For example, if you're a member of somone's email list (eg, cyberjournal)
|
|||
|
you SHOULD NOT send faxes to the moderator such as: "Please tell me what's
|
|||
|
going on, I'm curious". That would jam up communications, and would lead
|
|||
|
people to disconnect their fax machines. Only contact "information source"
|
|||
|
people if you have important information that needs to be shared, or if you
|
|||
|
want to volunteer to be an "echo node" - to redistribute information to
|
|||
|
others. Other than that you should use your fax bandwidth to build up a
|
|||
|
"peer" network and then try to connect as a group with wider neworking
|
|||
|
efforts.
|
|||
|
|
|||
|
Much of our technology would continue to serve us: we could still use our
|
|||
|
email software (Eudora or whatever) to create and manage our messages, but
|
|||
|
we'd fax them to lists of recipients or we'd print them - for posting on
|
|||
|
physical bulletin boards and kiosks or for copying and distributing.
|
|||
|
|
|||
|
|
|||
|
~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
|
|||
|
-=-=-=-=-=-=~A REQUEST~=-=- re: NOW -=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
|
|||
|
|
|||
|
I hereby invite those of you with whom I reguarly correspond, or who would
|
|||
|
like to be on an emergency information-distribution network, to please send
|
|||
|
me whatever contact details you'd like to make available. Don't expect
|
|||
|
accompanying comments to b
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 19 Feb 1998 14:19:55 -0600
|
|||
|
From: garbled@in.transit.by.net.demons
|
|||
|
Subject: File *&*--1998-02-04 Executive Order on Year 2000 Conversion (fwd)
|
|||
|
|
|||
|
((MODERATORS' NOTE: The address of the poster who contributed the
|
|||
|
following forward was lost in transit. But, thanks for the humor
|
|||
|
anyway)).
|
|||
|
(A humor alert for the parody challenged):
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
THE WHITE HOUSE
|
|||
|
|
|||
|
Office of the Press Secretary
|
|||
|
________________________________________________________________________
|
|||
|
For Immediate Release
|
|||
|
February 4, 1998
|
|||
|
|
|||
|
|
|||
|
EXECUTIVE ORDER
|
|||
|
|
|||
|
- - - - - - -
|
|||
|
|
|||
|
YEAR 2000 CONVERSION
|
|||
|
|
|||
|
|
|||
|
The American people expect reliable service from their
|
|||
|
Government and deserve the confidence that critical government
|
|||
|
functions dependent on electronic systems will be performed
|
|||
|
accurately and in a timely manner. Because of a design feature in
|
|||
|
many electronic systems, a large number of activities in the
|
|||
|
public and private sectors could be at risk beginning in the year
|
|||
|
2000. Some computer systems and other electronic devices will
|
|||
|
misinterpret the year "00" as 1900, rather than 2000. Unless
|
|||
|
appropriate action is taken, this flaw, known as the "Y2K
|
|||
|
problem," can cause systems that support those functions to
|
|||
|
compute erroneously or simply not run. Minimizing the Y2K problem
|
|||
|
will require a major technological and managerial effort, and it
|
|||
|
is critical that the United States Government do its part in
|
|||
|
addressing this challenge.
|
|||
|
|
|||
|
Accordingly, by the authority vested in me as President by the
|
|||
|
Constitution and the laws of the United States of America, it is
|
|||
|
hereby ordered as follows:
|
|||
|
|
|||
|
Section 1. Policy. (a) It shall be the policy of the
|
|||
|
executive branch that agencies shall:
|
|||
|
|
|||
|
(1) assure that no critical Federal program experiences
|
|||
|
disruption because of the Y2K problem;
|
|||
|
|
|||
|
(2) assist and cooperate with State, local, and tribal
|
|||
|
governments to address the Y2K problem where those governments
|
|||
|
depend on Federal information or information technology or the
|
|||
|
Federal Government is dependent on those governments to perform
|
|||
|
critical missions;
|
|||
|
|
|||
|
(3) cooperate with the private sector operators of critical
|
|||
|
national and local systems, including the banking and financial
|
|||
|
system, the telecommunications system, the public health system,
|
|||
|
the
|
|||
|
|
|||
|
transportation system, and the electric power generation system,
|
|||
|
in addressing the Y2K problem; and
|
|||
|
|
|||
|
(4) communicate with their foreign counterparts to raise
|
|||
|
awareness of and generate cooperative international arrangements
|
|||
|
to address the Y2K problem.
|
|||
|
|
|||
|
(b) As used in this order, "agency" and "agencies" refer to
|
|||
|
Federal agencies that are not in the judicial or legislative
|
|||
|
branches.
|
|||
|
|
|||
|
Sec. 2. Year 2000 Conversion Council. There is hereby
|
|||
|
established the President's Council on Year 2000 Conversion (the
|
|||
|
"Council").
|
|||
|
|
|||
|
(a) The Council shall be led by a Chair who shall be an
|
|||
|
Assistant to the President, and it shall be composed of one
|
|||
|
representative from each of the executive departments and from
|
|||
|
such other Federal agencies as may be determined by the Chair of
|
|||
|
the Council (the "Chair").
|
|||
|
|
|||
|
(b) The Chair shall appoint a Vice Chair and assign other
|
|||
|
responsibilities for operations of the council as he or she deems
|
|||
|
necessary.
|
|||
|
|
|||
|
(c) The Chair shall oversee the activities of agencies to
|
|||
|
assure that their systems operate smoothly through the year 2000,
|
|||
|
act as chief spokesperson on this issue for the executive branch
|
|||
|
in national and international fora, provide policy coordination of
|
|||
|
executive branch activities with State, local, and tribal
|
|||
|
governments on the Y2K problem, and promote appropriate Federal
|
|||
|
roles with respect to private sector activities in this area.
|
|||
|
|
|||
|
(d) The Chair and the Director of the Office of Management
|
|||
|
and Budget shall report jointly at least quarterly to me on the
|
|||
|
progress of agencies in addressing the Y2K problem.
|
|||
|
|
|||
|
(e) The Chair shall identify such resources from agencies as
|
|||
|
the Chair deems necessary for the implementation of the policies
|
|||
|
set out in this order, consistent with applicable law.
|
|||
|
|
|||
|
Sec. 3. Responsibilities of Agency Heads. (a) The head of
|
|||
|
each agency shall:
|
|||
|
|
|||
|
(1) assure that efforts to address the Y2K problem receive
|
|||
|
the highest priority attention in the agency and that the policies
|
|||
|
established in this order are carried out; and
|
|||
|
|
|||
|
(2) cooperate to the fullest extent with the Chair by making
|
|||
|
available such information, support, and assistance, including
|
|||
|
personnel, as the Chair may request to support the accomplishment
|
|||
|
of the tasks assigned herein, consistent with applicable law.
|
|||
|
|
|||
|
(b) The heads of executive departments and the agencies
|
|||
|
designated by the Chair under section 2(a) of this order shall
|
|||
|
identify a responsible official to represent the head of the
|
|||
|
executive department or agency on the Council with sufficient
|
|||
|
authority and experience to commit agency resources to address the
|
|||
|
Y2K problem.
|
|||
|
|
|||
|
Sec. 4. Responsibilities of Interagency and Executive Office
|
|||
|
Councils. Interagency councils and councils within the Executive
|
|||
|
Office of the President, including the President's Management
|
|||
|
Council, the Chief Information Officers Council, the Chief
|
|||
|
Financial Officers Council, the President's Council on Integrity
|
|||
|
and Efficiency, the Executive Council on Integrity and Efficiency,
|
|||
|
the National Science and Technology Council, the National
|
|||
|
Performance Review, the National Economic Council, the Domestic
|
|||
|
Policy Council, and the National Security Council shall provide
|
|||
|
assistance and support to the Chair upon the Chair's request.
|
|||
|
|
|||
|
Sec. 5. Judicial Review. This Executive order is intended
|
|||
|
only to improve the internal management of the executive branch
|
|||
|
and does not create any right or benefit, substantive or
|
|||
|
procedural, enforceable at law or equity by a party against the
|
|||
|
United States, its agencies, or instrumentalities, its officers or
|
|||
|
employees, or any other person.
|
|||
|
|
|||
|
|
|||
|
WILLIAM J. CLINTON
|
|||
|
|
|||
|
|
|||
|
THE WHITE HOUSE,
|
|||
|
February 4, 1998.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File *&*--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|||
|
|
|||
|
SUBSCRIBE CU-DIGEST
|
|||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|||
|
|
|||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|||
|
|
|||
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|||
|
|
|||
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|||
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #10.16
|
|||
|
************************************
|
|||
|
|