843 lines
37 KiB
Plaintext
843 lines
37 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.07 (March 2, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
RESURRECTED SYSCZAR: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest. Back
|
|||
|
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (back up and running) and
|
|||
|
(2) cudarch@chsun1.uchicago.edu
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles relating to
|
|||
|
the Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: CuD Index, Volume Two (2.00 - 2.19)
|
|||
|
File 4: Electronic Frontier Foundation Job Announcement
|
|||
|
File 5: Bad Moveez mark II
|
|||
|
File 6: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07, File 1 of 6: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: March 2, 1991
|
|||
|
|
|||
|
++++++++++++
|
|||
|
Apology to a valuable contributor
|
|||
|
++++++++++++
|
|||
|
|
|||
|
Sometimes letters are published that were not so-intended by the authors to be
|
|||
|
published. We indicate in the header that we assume notes may be published,
|
|||
|
and as a rule, even though we assume letters may be published, we double check
|
|||
|
"just in case." When we ask for a copy of an article or note that someone has
|
|||
|
written, we generally assume, whatever wording we use, that it's understood
|
|||
|
that it is for publication. Even if a note has been posted publicly on the
|
|||
|
nets and an author sends us a copy, we still try to check. Unfortunately,
|
|||
|
signals are sometimes crossed and an article slips into publication which an
|
|||
|
author prefered to not to be. We regret when this occurs, but it is the result
|
|||
|
of legitimate misunderstandings and not the result of any attempt to bypass
|
|||
|
author prerogative. Given the amount of mail we receive and weekly schedule, in
|
|||
|
addition to net-lag that may delay a response until *after* a post has been
|
|||
|
published, miscommunication can arise. We regret such occurances and apologize
|
|||
|
to a recent valuable contributor to whom this happened.
|
|||
|
|
|||
|
+++++++++++++
|
|||
|
Corrected NIA Address
|
|||
|
+++++++++++++
|
|||
|
|
|||
|
In the last issue of CuD, the wrong nuchat address for NIA was listed by
|
|||
|
mistake. The *CORRECT* address for NIA submissions and correspondence is:
|
|||
|
ELISEM@NUCHAT.SCCSI.COM
|
|||
|
We regret any inconvenience caused to those on the mistakenly
|
|||
|
listed account.
|
|||
|
|
|||
|
+++++++++++++
|
|||
|
Intertek: The CyberPunk Journal
|
|||
|
+++++++++++++
|
|||
|
|
|||
|
The latest INTERTEK (Winter, 1991, Vol 3,1) is out, and features
|
|||
|
"Reflections on Hackers" by Katie Hafner and interviews with John Perry
|
|||
|
Barlow and Eric Bloodaxe. For those who have not seen it, Intertek is a
|
|||
|
hard-copy magazine (the current issue is 28 pages) with articles,
|
|||
|
commentary, interviews, book reviews, research summaries, and other
|
|||
|
cutting-edge hi-tek information. Single issues are $2.50, or a one year
|
|||
|
subscription is $7. The editor, Steve Steinberg, can be contacted at: 325
|
|||
|
Ellwood Bech, #3, Goleta, CA (93117) or internet at steve@cs.ucsb.edu.
|
|||
|
|
|||
|
+++++++++++++++++
|
|||
|
Call for Articles
|
|||
|
+++++++++++++++++
|
|||
|
|
|||
|
For the next few issues, we are especially looking for articles from
|
|||
|
readers on: (1) State of the CU (p/h and pirate) BBS community; (2) Views
|
|||
|
on such issues sysop liability on BBSs, e-mail privacy on BBS and mainframe
|
|||
|
(university or employer) systems,; and (3) Surveillance of BBSs by local,
|
|||
|
state or federal LE agents.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Assorted
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: 4 March, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07: File 2 of 6: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: dgelbart@QUESTOR.WIMSEY.BC.CA(Dave Gelbart)
|
|||
|
Subject: Robert Miles - "computer wizard"
|
|||
|
Date: Sat, 23 Feb 91 23:08:00 PST
|
|||
|
|
|||
|
*Very* interesting article "The FBI comes rapping...".
|
|||
|
But, on Robert Miles being a "computer wizard", well, in his own words:
|
|||
|
|
|||
|
"...in a computer journal, called PC/Computing, a nationwide publication,
|
|||
|
out of Cambridge, Mass., there is an article by some lying idiot...in which
|
|||
|
he calls me a computer wizard, and states that I was a defendant in the Berg
|
|||
|
case in Denver. Sorry, about that old boy. I was never tried in Denver. The
|
|||
|
friends who were, will be amazed to learn that I was a co-defendant in that
|
|||
|
trial. And as for me being a 'computer wizard', wow, did that crack up
|
|||
|
Dotty... I can hardly fix the toaster. ... So, what you read in this
|
|||
|
article.... ha! ... Yesterday, ah couldn't spell one, now ah is one.....
|
|||
|
.....a real live Computer Wizard."
|
|||
|
|
|||
|
"..." is where I have deleted irrelevant sections. "...." and "....." were
|
|||
|
in the original text.
|
|||
|
|
|||
|
Not that this proves much, -- I trust Miles about as much as I trust the
|
|||
|
media -- but in the pictures I've seen of him, he certainly doesn't *look*
|
|||
|
like a techie type.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: <Anonymous>
|
|||
|
Subject: Civil Liberties and the Computer Underground
|
|||
|
Date: February 23, 1991
|
|||
|
|
|||
|
Has CuD been intentionally backing off their earlier defense of civil
|
|||
|
liberties? Recent issues lack the spark of earlier ones. What's happening
|
|||
|
with Len Rose? Why aren't there more articles on follow-ups to
|
|||
|
investigations, Ripco, Secret Service activities, searches, Steve Jackson
|
|||
|
Games, and all the issues that CuD started with? I enjoy the news and some
|
|||
|
of the articles, but I subscribed because of you guys seemed about the only
|
|||
|
ones willing to take a strong stand and speak out. Whatever happened with
|
|||
|
the informant thing? Another issue I'd like to see raised is all the
|
|||
|
anonymous posts in CuD and on the nets. In one issue you said you publish
|
|||
|
anonymously when people are afraid of reprisals. This reminds me of
|
|||
|
McCarthyism, where people were afraid to speak out for fear of being
|
|||
|
listed. Maybe the fear that the nets are monitored by vindictive types
|
|||
|
(and there are a few of these on comp.org.eff.talk) or law enforcement.
|
|||
|
Plus the fact that it's so easy to send hate mail and otherwise harass on
|
|||
|
the nets. If you're being pressured or if people are complaining about you
|
|||
|
being too pro-hacker or too radical, would you publish it, or would you
|
|||
|
just allow yourselves to be co-opted? I'd personally like to see more fire
|
|||
|
in between the other material.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++
|
|||
|
(Editors' response: No, we haven't been pressured or in any way or
|
|||
|
"encouraged" to change our position. Quite the opposite. Yes, we may have
|
|||
|
become less strident--although there would be a few who would claim
|
|||
|
otherwise. We have been advised to refrain from publishing anything
|
|||
|
substantive about on-going cases by those involved in them for fear of
|
|||
|
putting the principles at risk or of subverting legal strategies responding
|
|||
|
to what many see as abuses of authority. We're willing to publish articles
|
|||
|
that are both radical and conservative, and we generally have not had many
|
|||
|
articles from either extreme. However, we do have two special issues
|
|||
|
planned (tentatively 3.09 and 3.10) on government surveillance and what
|
|||
|
people in the CU can do about it.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Gordon Meyer
|
|||
|
Subject: CuD Index, Volume Two (2.00 - 2.19)
|
|||
|
Date: 25 February, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07: File 3 of 6: CuD Index for Volume Two ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Index to Volume Two ***
|
|||
|
*** Issues 2.00 - 2.19 ***
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
Volume 1, Issue #2.00 (Aug 25, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: EFF mailing #3: About the Electronic Frontier Foundation
|
|||
|
File 3: Len Rose's Search Warrant
|
|||
|
File 4: What to Read When the SS is at the Door
|
|||
|
File 5: CU in the News: More on the NY Raids
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.01 (Aug 31, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Proposed changees in Computer Abuse Act (S.2476)
|
|||
|
File 3: CPSR Seeks FBI data on Bulletin Board Monitoring
|
|||
|
File 4: Computers, Social Responsibility, and Political Action
|
|||
|
File 5: Another experience with the SS
|
|||
|
File 6: CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.02 (September 9, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Musing over Operation Sun Devil
|
|||
|
File 3: IPCO BBS Back on-Line
|
|||
|
File 4: CuD Index, Volume 1 (Nos. 1.00 through 1.29, complete)
|
|||
|
File 5: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.03 (September 14, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose's experience with the Secret Service
|
|||
|
File 3: Tim Wolfson's address, cite list
|
|||
|
File 4: A comment on Zod's case
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.04 (September 23, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Re: Evidence (was Re: Musing on Constitutionality)
|
|||
|
File 3: Why the FBI should be concerned about the Secret Service
|
|||
|
File 4: California Computer Abuse Law revisited
|
|||
|
File 5: Candidate for state governor supports electronic freedom & privacy
|
|||
|
File 6: Review of Steven Levy's CLOAK AND DAGGER
|
|||
|
File 7: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.05 (September 30, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Re: The CU in the News (Mail reading)
|
|||
|
File 3: Anarchist Times, Inc. (ATI)--background
|
|||
|
File 4: The status of the electronic forum (BBS)
|
|||
|
File 5: Another experience with the law
|
|||
|
File 6: Some views on what to do if questioned by LE agents
|
|||
|
File 7: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.06 (October 6, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: MARS BBS Sting a Prank
|
|||
|
File 4: Another view of hacking
|
|||
|
File 5: The CU in the news
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.07 (October 15, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
|
|||
|
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
|
|||
|
File 4: Electronic Frontier Foundation Hires Staff Counsel
|
|||
|
File 5: 13th Annual National Computer Security Conference (Part 1)
|
|||
|
File 6: 13th Annual National Computer Security Conference (Part 2)
|
|||
|
File 7: Summary of COMPUTER ETHICS (book)
|
|||
|
File 8: Introduction to TOXIC SHOCK
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.08 (October 20, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Prodigy, Problems, and Censorship
|
|||
|
File 4: Censorship on the Nets
|
|||
|
File 5: PC's & Political Action
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.09 (October 27, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose Arrest
|
|||
|
File 3: Mars was not "Censored"
|
|||
|
File 4: Response to Mars "Censoring"
|
|||
|
File 5: Steve Jackson Games (SJG) Update
|
|||
|
File 6: The Future of Hacking and the System Security Profession
|
|||
|
File 7: The Ultimate Interface: Hackers and the Private Sector
|
|||
|
File 8: CU in the News: "Hackers" and Bank Blackmail in England
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.10 (November 2, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose Funds--A Humanitarian Necessity
|
|||
|
File 3: EFF Seeks Executive Director (Job Announcement)
|
|||
|
File 4: Massachusetts Computer Crime Bill
|
|||
|
File 5: Re: C-u-D, #2.09 Censoring of gif's
|
|||
|
File 6: The Piratical Dilemma
|
|||
|
File 7: Obtaining Identification Cards
|
|||
|
File 8: Logisticon vs. Revlon
|
|||
|
File 9: In-House Security Problems
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Volume 2, Issue #2.11 (November 13, 1990)
|
|||
|
|
|||
|
*** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.12 (November 17 1990) (mailed in two parts)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: PhD Candidate Seeks information on the CU
|
|||
|
File 3: Riggs, Darden, and Grant Sentenced
|
|||
|
File 4: Prodigy Saga Continues
|
|||
|
File 5: Re: Response to Mars "Censoring"
|
|||
|
File 6: Response to SJG Affidavit (part 1)
|
|||
|
File 7: Warrants schmarrants! The SS is Crazy!
|
|||
|
File 8: More guidelines on what to do if busted
|
|||
|
File 9: CU in the News--England and Emma Nicholson; VOGON News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.13 (November 25 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: EPIC (Effective Performance in Candidates)
|
|||
|
File 3: The Riggs Sentencing (reprint from Newsbytes)
|
|||
|
File 4: First Conference on Computers, Freedom & Privacy
|
|||
|
File 5: Hackers Break into DEA Lines
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Volume 2, Issue #2.14 (November 30, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose Indicted
|
|||
|
File 3: CPSR's FOIA request from the FBI
|
|||
|
File 4: International Information Retrieval Guild
|
|||
|
File 5: A Note on Censorship
|
|||
|
File 6: Two Comments on Prodigy
|
|||
|
File 7: Don't Talk to Cops
|
|||
|
File 8: Response to DEA/PBX News Story
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.15 (December 5, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose Indictment in Illinois
|
|||
|
File 3: 2600 Magazine Response to Atlanta Sentencing
|
|||
|
File 4: List of Computer Underground Clippings
|
|||
|
File 5: Computer Crime Laws list
|
|||
|
File 6: Media and the CU
|
|||
|
File 7: The Hermetic Underground
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.16 (December 10, 1990)
|
|||
|
|
|||
|
*> SPECIAL ISSUE: "ATLANTA THREE" SENTENCING MEMORANDUM <*
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
Volume 2, Issue #2.17 (December 16, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: EFF Response to Atlanta Sentencing Memorandum
|
|||
|
File 4: Some Thoughts on the Atlanta Sentencing
|
|||
|
File 5: Earning your Stripes
|
|||
|
File 6: Playgrounds of the Mind: Cyberspace
|
|||
|
File 7: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.18 (December 28, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Computers Under Attack
|
|||
|
File 4: CU Resources in Germany
|
|||
|
File 5: Trade Secrets; When are they Bad?
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Volume 2, Issue #2.19 (December 31, 1990)
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Telecoms Ripping off BBSs?
|
|||
|
File 4: Michigan Bell vs BBSs
|
|||
|
File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
|
|||
|
File 6: a.k.a. freedom of expression
|
|||
|
File 7: Z-modem Virus Alert
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
********************************************************************
|
|||
|
****** END OF CuD VOLUME TWO - INDEX ********
|
|||
|
********************************************************************
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Mike Godwin (EFF)
|
|||
|
Subject: Electronic Frontier Foundation Job Announcement
|
|||
|
Date: 28 February, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07: File 4 of 6: EFF Job Announcement ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Electronic Frontier Foundation
|
|||
|
Job Announcement
|
|||
|
|
|||
|
The Electronic Frontier Foundation is looking to hire a Boston-based Director
|
|||
|
of Communications (DoC) to become its second full-time employee.
|
|||
|
|
|||
|
A key aspect of the EFF's mission is to educate the public about the
|
|||
|
opportunities and challenges posed to society by technological developments
|
|||
|
in computers and telecommunications. The Foundation has taken a leading
|
|||
|
role in the effort to make sure that civil liberties are protected in the
|
|||
|
exercise of communication through computer networks and electronic bulletin
|
|||
|
boards.
|
|||
|
|
|||
|
The EFF's public education activities are carried out through a variety of
|
|||
|
media including computer conferencing systems, public speaking, writing
|
|||
|
articles for periodicals and newspapers, appearances at public and private
|
|||
|
forums, its own publications including online and print newsletters, and a
|
|||
|
variety of special projects and publications.
|
|||
|
|
|||
|
EFF Board members, staff, volunteers, and legal counsel all participate in
|
|||
|
these activities. The DoC will serve as a dedicated resource in these areas
|
|||
|
in order to provide oversight and co-ordination, as well as to be a
|
|||
|
principal contributor to the activities.
|
|||
|
|
|||
|
The ideal candidate will possess:
|
|||
|
|
|||
|
% the ability to think clearly
|
|||
|
|
|||
|
% the writing, editing, and speaking skills to convey ideas with
|
|||
|
impact. Needs to be able to deal with complex technical and legal issues by
|
|||
|
simplifying without trivializing.
|
|||
|
|
|||
|
% an understanding of the theory and practice of "The Marketing of
|
|||
|
Ideas", in order to reach journalists, computer professionals, politicians,
|
|||
|
hackers, lawyers, and other groups
|
|||
|
|
|||
|
% comfort with the world of online communications and its "savage user
|
|||
|
interfaces".
|
|||
|
|
|||
|
% a strong idealistic streak, tempered by a knowledge of what is
|
|||
|
possible.
|
|||
|
|
|||
|
% perseverance and patience.
|
|||
|
|
|||
|
% knowing when to use volunteers and when to use experts. Has to be
|
|||
|
able to co-ordinate the two in order to maximize limited resources. Needs to
|
|||
|
know how to nudge. A facilitator, not a dictator.
|
|||
|
|
|||
|
General legal knowledge is a plus.
|
|||
|
|
|||
|
The position is available immediately. For further information, contact:
|
|||
|
Mitchell Kapor
|
|||
|
Electronic Frontier Foundation, Inc.
|
|||
|
155 Second St.
|
|||
|
Cambridge, MA 02141
|
|||
|
|
|||
|
(617) 864-1550
|
|||
|
(617) 864-0866 (fax)
|
|||
|
|
|||
|
mkapor@eff.org
|
|||
|
|
|||
|
Please post and circulate this announcement.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: dogface!bei@CS.UTEXAS.EDU(Bob Izenberg)
|
|||
|
Subject: Bad Moveez mark II
|
|||
|
Date: Wed, 27 Feb 91 00:10:53 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07: File 5 of 6: Computers in the Movies ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
* CUD Goes To The Movies *
|
|||
|
|
|||
|
Jim Thomas challenged some friends and I to come up with the worst "hacker"
|
|||
|
films that we'd seen. What follows is only a partial list, and you've
|
|||
|
probably got your own favorites, if that's the right word. They're in no
|
|||
|
particular order. I know that I'm leaving a gold-mine of bad plot ideas
|
|||
|
untouched by ignoring commercial television. There's been one awful Booker
|
|||
|
episode that weighed in at the Cargo Cult level of sophistication, for
|
|||
|
example. You probably can think of more.
|
|||
|
|
|||
|
-- Bob
|
|||
|
|
|||
|
----------------------------------------------------------------
|
|||
|
Eight Bad Bits: The Computer Underground Film Hall of Shame
|
|||
|
----------------------------------------------------------------
|
|||
|
|
|||
|
[ 1 ] War Games. The first of the big "Swatch hacker"
|
|||
|
movies. It spawned a wave of original thinkers with "joshua"
|
|||
|
as their user id or password. Were NORAD computers ever
|
|||
|
this insecure? For about ten seconds back in the Dark Ages,
|
|||
|
maybe.
|
|||
|
[ 2 ] Malibu Express. High tech and low morals,
|
|||
|
courtesy of ex-ABC Sports producer Andy Sidaris. I could
|
|||
|
say that this is a tightly plotted adventure which treats
|
|||
|
today's computer embezzlement headlines as a starting point.
|
|||
|
If you'd stop staring at the bimbos for a minute, you might
|
|||
|
agree with me. The opening credits roll over some serious
|
|||
|
Nail Slicks risking death on an Atari keyboard. This sets
|
|||
|
the tone for the whole film.
|
|||
|
[ 3 ] Prime Risk. Komputer Kids with job and bank
|
|||
|
problems spoof their least favorite bank's ATM network, only
|
|||
|
to find someone doing it on a bigger scale, for money
|
|||
|
instead of curiosity and revenge. The understanding and
|
|||
|
empathetic Federal agent rescues them and thanks them for
|
|||
|
their vigilance. Uh huh. Note how Toni Hudson's character
|
|||
|
is scripted as a Renaissance nerd, as far above Gilda
|
|||
|
Radner's Lisa Lubner character as amoebas are above Dan
|
|||
|
Quayle.
|
|||
|
[ 4 ] Colossus: The Forbin Project. Jim Thomas voted
|
|||
|
for this one, in appreciation of a malevolent defense
|
|||
|
computer with no off switch. It's the system manager's
|
|||
|
fairy tale: it never crashes, never needs new parts, never
|
|||
|
has transmission problems. How long it takes us to reach
|
|||
|
this cybernetic state of grace is left to the viewer's
|
|||
|
imagination.
|
|||
|
[ 5 ] The Manhattan Project. There's a reason, you
|
|||
|
know, why electrical supply houses aren't found in high-
|
|||
|
dollar shopping malls. I'm sorry, but hipper-than-thou
|
|||
|
nerds are the stuff of Hollywood's Summer Slump cure. Not a
|
|||
|
computer in the picture except as props, but there's a bit
|
|||
|
of hacker curiosity and humor in the script.
|
|||
|
[ 6 ] Electric Dreams. Computer oversell proves
|
|||
|
truthful when digiphobe Lenny Van Dohlen competes with his
|
|||
|
"Pineapple" computer for his neighbor's affections.
|
|||
|
[ 7 ] The Running Man. Hahahahahahahahah. Arnold in
|
|||
|
Spandex yellow leotards. Mick Fleetwood and Dweezil Zappa
|
|||
|
running the Revolutionary Left. One hundred years from now,
|
|||
|
"Richard Bachman" will spin in his grave like a turbine
|
|||
|
whenever this is shown. The "Weiss" character plays video
|
|||
|
skittles for a minute to crack the Secret Network Code. Rick
|
|||
|
Moranis says it best in Spaceballs: "That's the combination
|
|||
|
an idiot would have on his luggage!"
|
|||
|
[ 8 ] Tron. A bitter triumph of Big Special Effects
|
|||
|
Bucks over story, guaranteed to make anyone who's ever heard
|
|||
|
of Mike Jittlov cry in anguish. Picture the scriptwriter's
|
|||
|
meeting: "You're not leaving this room until you've used
|
|||
|
every buzzword in this book!" Must material to show off
|
|||
|
that new videodisc player or 50" monitor, however. (No
|
|||
|
"bit player" jokes here, I gots too much class fer that.)
|
|||
|
|
|||
|
------------------------
|
|||
|
Dishonorable Mention
|
|||
|
------------------------
|
|||
|
|
|||
|
[ 0 ] Evilspeak. The Devil's in my disk drive! Military
|
|||
|
prep Clint Howard gets hazed by classmates, then seeks
|
|||
|
Satanic assistance from behind his keyboard. Carrie without
|
|||
|
tampons for the high-tech set. The Bad Sci-Fi numerologists
|
|||
|
hint that this (666) must be the sequel to The Andromeda
|
|||
|
Strain (601), digitwise. Jeez, experts.
|
|||
|
[ 0 ] The Computer Wore Tennis Shoes. Always consider
|
|||
|
the Classics. A kinda porky Kurt Russell gets a jolt and
|
|||
|
leaves Jockville behind for Braintown. Old Walt might have
|
|||
|
known as much about computers as he did about animal
|
|||
|
behavior, but he did cut an acceptable teen yarn.
|
|||
|
[ 0 ] Forbidden World. Show this and you'll disappoint
|
|||
|
computerists and sci-fi fans alike. Some gene-spliced oil
|
|||
|
slick expresses a difference of opinion about who's the Food Of
|
|||
|
The Future around here, anyway. Later, it grows teeth and
|
|||
|
is found to have bio-hacked the base computer. Type type, munch
|
|||
|
munch. Stay tuned for (or beware of) the scientist who cuts
|
|||
|
a softball-sized tumor out of his own stomach (sans anesthesia)
|
|||
|
and slam dunks it down the monster's throat.
|
|||
|
[ 0 ] Thrillkill. Bad bad bad. Even cable stations
|
|||
|
won't show this when decent folk are awake.
|
|||
|
[ 0 ] Ferris Bueller's Day Off. I know, it's a comedy,
|
|||
|
so I'll go easy. "I asked for a car; I got a computer."
|
|||
|
Maybe I'm way off base in doubting whether a conniving rich
|
|||
|
kid would ever get beyond a stock ticker, technology-wise.
|
|||
|
That thirty-second scene, and the synth in the bedroom,
|
|||
|
branded it forever thus: "Ferris Bueller (Matthew Broderick)
|
|||
|
plays high-tech hooky in the big city." Cliff's Notes are too
|
|||
|
complex for some people, apparently.
|
|||
|
[ 0 ] Chopping Mall. Sorry, but I had to slip one more
|
|||
|
slash flick in here. It's nice to see Paul and Mary Bland again
|
|||
|
(after Eating Raoul.) Also, there's something about security robots
|
|||
|
running amuck that might strike a familiar chord in readers of
|
|||
|
this august publication.
|
|||
|
|
|||
|
-----------------------------------------
|
|||
|
From The Land of The Forgotten Titles
|
|||
|
-----------------------------------------
|
|||
|
|
|||
|
[ ? ] A bunch of fantasy gamers find some plugged-in
|
|||
|
Ayatollah using a time-sharing network to aim his terrorists
|
|||
|
here in the U.S. of A. They sneak in and aim them at
|
|||
|
useless targets. Dialogue by Craftsman and U.S. Plywood.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: The CU in the News
|
|||
|
Date: March 3, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.07: File 6 of 6: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Date: Wed, 20 Feb 91 14:34:11 PST
|
|||
|
From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM>
|
|||
|
Subject: Sounds good... court ruling on BBS in SW Bell
|
|||
|
|
|||
|
From: Jim.Bellotte@f2.n106.z1.fidonet.org (Jim Bellotte)
|
|||
|
Newsgroups: alt.cosuard
|
|||
|
Subject: settlement
|
|||
|
Date: 19 Feb 91 12:15:38 GMT
|
|||
|
|
|||
|
On January 9, 1991, the Texas Public Utilities Commission, on a vote of
|
|||
|
3 to 0 approved a negotiated settlement in Texas PUC docket 8387. This
|
|||
|
is the case of Reginald A. Hirsch, et. al. vs Southwestern Bell
|
|||
|
Telephone Company. This case grew from Southwestern Bell's attempt to
|
|||
|
assess business rates to all known BBSs.
|
|||
|
|
|||
|
The negotiated settlement provides for the following provision to be
|
|||
|
added to the Southwestern Bell tariffs:
|
|||
|
|
|||
|
-------------Begin quotation from proposed stipulation---------------
|
|||
|
|
|||
|
2. Southwestern Bell agrees to amend Section 23,
|
|||
|
Paragraph 3.1 of its General Exchange Tariff defining business
|
|||
|
service to include the following footnote:
|
|||
|
|
|||
|
As a result of a Stipulation in Docket No. 8387 approved by the
|
|||
|
Commission on ______, Southwestern Bell agrees that all Bulletin Board
|
|||
|
Systems ("BBS") that are located at residence locations that do not
|
|||
|
solicit, require, or receive monetary compensation and that use three or
|
|||
|
fewer local exchange access lines shall be permitted to subscribe to
|
|||
|
local exchange access service at the approved residential rates. BBSs
|
|||
|
that are eligible to subscribe to local exchange access service at
|
|||
|
residential rates may publish their name, telephone number and technical
|
|||
|
information in a listing of BBSs by location or subject matter. Such
|
|||
|
listings must be purely informational to advise readers of the BBS's
|
|||
|
name, telephone number, location, subject matter, hours, baud rates, and
|
|||
|
other technical information. BBSs that do not meet these conditions
|
|||
|
will be considered businesses, and approved business rates will apply
|
|||
|
for all local exchange access lines used by such BBS.
|
|||
|
|
|||
|
-----------------------------End Quotation--------------------------
|
|||
|
|
|||
|
The stipulation also provides that Southwestern Bell will provide a
|
|||
|
single point of contact for BBS operators and that for a period of 90
|
|||
|
days after the PUC decision, they will waive service charges on orders
|
|||
|
to change service from one class of service to another in order to
|
|||
|
comply with settlement.
|
|||
|
|
|||
|
This has been a long fight. The settlement is not what any of the
|
|||
|
parties would consider perfect. It does give BBS operators in Texas a
|
|||
|
firm set of guidelines in which to operate. They no longer have to play
|
|||
|
"Russian Roulette", hoping that they reach a SWBT business office that
|
|||
|
understands the rules.
|
|||
|
|
|||
|
Ed Hopper
|
|||
|
President - COSUARD
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: New Telecom Laws Proposed
|
|||
|
Date: Fri, 22 Feb 91 08:23 EST
|
|||
|
|
|||
|
GRID News. ISSN 1054-9315. vol 2 nu 6. February 22, 1991.
|
|||
|
World GRID Association, P. O. Box 15061, Lansing, MI 48901 USA
|
|||
|
----------------------------------------------------------------
|
|||
|
Michigan to Overhaul Telecom Rules by Michael E. Marotta
|
|||
|
|
|||
|
On February 19 and 20, companion bills were introduced into the
|
|||
|
state house and state senate of Michigan. "The Michigan
|
|||
|
Telecommunications Act" is House Bill 4343 and Senate Bill 124.
|
|||
|
The two versions are identical. HB4343 was introduced by Alma G.
|
|||
|
Stallworth (D-Detroit), chair of the House Public Utilities
|
|||
|
committee. SB124 was introduced by Mat J. Dunaskiss (R-Lake
|
|||
|
Orion), chair of the newly-created Senate Technology and Energy
|
|||
|
Committee. If passed by October 1, 1991, the bills become law on
|
|||
|
that date and have sunset limits of four years, expiring on
|
|||
|
September 30, 1995.
|
|||
|
|
|||
|
The Michigan Telecommunications Act would, if passed into law,
|
|||
|
accomplish the following:
|
|||
|
(*) establish a new regulator, the Michigan Telecommunications
|
|||
|
Commission, removing telephone from the Public Service
|
|||
|
Commission and bringing cable television under the new
|
|||
|
agency's scope.
|
|||
|
(*) de-regulate local exchange providers, allowing them
|
|||
|
monopoly status and the right to sell other services,
|
|||
|
including long distance, cable television and information.
|
|||
|
(*) freeze local rates at the current level, allowing no
|
|||
|
increase beyond the maximum rate as of Nov. 1, 1990.
|
|||
|
(*) require 911 service to be provided to any county that
|
|||
|
wants it. In fact, there are 48 separate provisions for
|
|||
|
911 service, significantly more than any other section of
|
|||
|
the act. (Mandatory service for the hearing impaired runs
|
|||
|
a mere 42 lines.)
|
|||
|
(*) Outlaw unsolicited advertising via fax. (This provision,
|
|||
|
like many of the 911 rules, is already in place. It was
|
|||
|
created in 1990 as an amendment to the Telephone Act of
|
|||
|
1913 and is being carried over.)
|
|||
|
|
|||
|
The Michigan Telecommunications Act specifically seeks to overturn
|
|||
|
the "Modified Final Judgement." Its goal is to allow Michigan
|
|||
|
telecom providers the freedom to develop products and services.
|
|||
|
Whether and to what extent it meets those goals will be determined
|
|||
|
in part by what happens to the bills in committees and on the
|
|||
|
floors.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: John / Barbara McMullen (Reprint from Newsbytes)
|
|||
|
Subject: 2600 banned from Texas Prisons
|
|||
|
Date: March 4, 1991
|
|||
|
|
|||
|
MIDDLE ISLAND, NEW YORK, U.S.A., 1991 MAR 4(NB) --
|
|||
|
Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly, has
|
|||
|
told Newsbytes that The Texas Department of Criminal Justice has prohibited
|
|||
|
delivery delivery of the fall 1990 issue of 2600 to a subscriber
|
|||
|
incarcerated in a Texas prison.
|
|||
|
|
|||
|
The official "Publication Denial Notification" form, dated January 9, 1991,
|
|||
|
was received by Goldstein and published in the Winter 1990-91 issue that
|
|||
|
was released on March 1st. The form indicates that the denial was
|
|||
|
instituted because "Publication contains material on the setting up and
|
|||
|
operation of criminal schemes or how to avoid detection of criminal schemes
|
|||
|
by lawful authority charged with the responsibility for detected such
|
|||
|
illegal activity."
|
|||
|
|
|||
|
The specific reasons for determining the basis for the ruling are listed as
|
|||
|
"Pages 18, 19, 20, 21, 29, 42 and 43 contain information on misusing
|
|||
|
telephone equipment to make telephone calls illegally and to obtain cash
|
|||
|
and credit cards illegally."
|
|||
|
|
|||
|
Goldstein, commenting on the ban to Newsbytes, said "Inside of prison,
|
|||
|
there is not much freedom so I guess it's not surprising that they do
|
|||
|
things like this. What is surprising is that the article which they were
|
|||
|
most concerned with was written by the Fraud Division of the U.S. Secret
|
|||
|
Service and was clearly indicated to have been so authored."
|
|||
|
|
|||
|
Newsbytes examined the Fall issue of 2600 and found that the Secret Service
|
|||
|
technical synopsis is contained on pages 18-21 while page 29 is part of the
|
|||
|
letters from readers section and contains a letter from a prisoner in an
|
|||
|
unnamed prison explaining how he or she makes unpaid telephone calls. Pages
|
|||
|
42 and 43 contain an article by "Crazed Luddite & Murdering Thug", "An
|
|||
|
Algorithm For Credit Cards", which explains the checksum verification of
|
|||
|
credit card numbers.
|
|||
|
|
|||
|
Also contained in the same issue is an interview with security expert Dr.
|
|||
|
Dorothy Denning, an explanation of caller-id and an article by Goldstein on
|
|||
|
alleged BellSouth plans for monitoring telephone lines.
|
|||
|
|
|||
|
A supervisor at the Texas Department of Criminal Justice, Institutional
|
|||
|
Division told Newsbytes that "Inmates may subscribe to any publication they
|
|||
|
choose but they understand that the magazines are subject to review for
|
|||
|
appropriateness. If they contain any material that does not meet or
|
|||
|
standards, either the articles in question or the entire magazine will be
|
|||
|
rejected." The supervisor, who could not speak for attribution, explained
|
|||
|
that, if the objectionable passages were 5 pages or less, they would have
|
|||
|
been removed and the remainder of the magazine delivered. She also said
|
|||
|
that both the inmate and the publication have the right to appeal the
|
|||
|
decision.
|
|||
|
|
|||
|
(Barbara E. McMullen & John F. McMullen/19910304)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.07**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|