958 lines
44 KiB
Plaintext
958 lines
44 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Wed Oct 13 1993 Volume 5 : Issue 80
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Eidtor: Etaoin Shrdlu, III
|
|||
|
|
|||
|
CONTENTS, #5.80 (Oct 13 1993)
|
|||
|
File 1--CALIF AB1624 signed into law - PUBLIC INFO ACCESS!
|
|||
|
File 2--Thanks to The folks who made AB1624 possible
|
|||
|
File 3--Response to Cohen in re ITAR & Export Regs
|
|||
|
File 4--Space computer hacker gets bond.
|
|||
|
File 5--all eff.org machines moving 10/15-10/18
|
|||
|
File 6--IGC Wins Public Interest Aw
|
|||
|
File 7--Response to PGP Encryption Flap (RE:CuD 574)
|
|||
|
File 8--RSAREF VERS NUMBER
|
|||
|
File 9--Elansky/Hartford bbs Hearings - Case Continues
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
UNITED STATES:
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
|||
|
Subject: File 1--CALIF AB1624 signed into law - PUBLIC INFO ACCESS!
|
|||
|
Date: Tue, 12 Oct 1993 14:26:21 -0700
|
|||
|
|
|||
|
Shortly before 8 a.m. this morning, Assembly Member Debra Bowen's
|
|||
|
legislative aide who has been honchaing AB1624, Mary Winkley, sent the
|
|||
|
following hand-written fax:
|
|||
|
|
|||
|
"The Governor signed 1624 last night! [Oct 11th, Monday, Columbus
|
|||
|
Day] Yes. You read this correctly. This is not a joke!
|
|||
|
Congratulations & thank you! Mary"
|
|||
|
|
|||
|
AB1624 will take effect Jan.1, 1994 (as is true of most of the 1,100+
|
|||
|
bills, passed by the Legislature in 1993, that Gov. Pete Wilson signed
|
|||
|
into law).
|
|||
|
|
|||
|
To my knowledge*, this is the first time that comprehensive
|
|||
|
information about state legislation-in-process and state laws have
|
|||
|
been made available by a state via the nonproprietary public computer
|
|||
|
networks, especially without any fees charged by the state. (Hawaii
|
|||
|
makes such information available, but only via an expensive private
|
|||
|
state network, so far.)
|
|||
|
|
|||
|
This will permit *timely* access to legislative details -- crucial to
|
|||
|
effective citizen participation in the process of their/our
|
|||
|
governance; participation that is simply not practical via snailmailed
|
|||
|
copies of quickly-obsolete printed legislative information (useful
|
|||
|
only for after-the-fact fury).
|
|||
|
|
|||
|
It makes the information available in *useful* form. Whereas printed
|
|||
|
legislative information can only be read <sneer>, the same information
|
|||
|
arriving in computerized form can be:
|
|||
|
|
|||
|
Automatically monitored for *all* words and phrases that are
|
|||
|
"interesting," Quickly searched for *all* specified topics and
|
|||
|
subjects, Indexed, hyperlinked and cross-referenced to other related
|
|||
|
information, Extracted, excerpted and forwarded to others, quickly
|
|||
|
and accurately, and, oh yes, recipients can also read it.
|
|||
|
|
|||
|
Using the public global networks will provide other state legislative
|
|||
|
staff, legislators and federal legislators with fast, easy access to
|
|||
|
California legislation and statutes -- often used as models for other
|
|||
|
states.
|
|||
|
|
|||
|
And, AB1624 can be used as a model -- by citizen-activists and
|
|||
|
legislators -- for other states willing to encourage open democratic
|
|||
|
processes.
|
|||
|
|
|||
|
Finally, as far as I know*, this is the first time online advocacy and
|
|||
|
network-assisted citizen action was *instrumental* in structuring and
|
|||
|
obtaining the passage of legislation. (There have, however, been
|
|||
|
several instances where net-based action has *halted* undesired
|
|||
|
legislation or regulations -- re crypto prohibitions, modem taxes,
|
|||
|
etc.)
|
|||
|
|
|||
|
It won't be the last!
|
|||
|
|
|||
|
* - Please let me know if you know of other instances. (But, please phone;
|
|||
|
I'm backlogged over a thousand messages in my email <cringe, blush>.)
|
|||
|
|
|||
|
|
|||
|
ITS THE LAW!
|
|||
|
|
|||
|
The final version of the bill states [hand-typed for the last time!;
|
|||
|
typos and bracketed notes are mine]:
|
|||
|
|
|||
|
"(a) The Legislative Counsel shall, with the advice of the Assembly
|
|||
|
Committee on Rules and the Senate Committee on Rules, make all of the
|
|||
|
following information available to the public in electronic form:
|
|||
|
" (1) The legislative calendar, the schedule of legislative committee
|
|||
|
hearings, a list of matters pending on the floors of both houses of the
|
|||
|
Legislature, and a list of the committee of the Legislature and their
|
|||
|
members.
|
|||
|
" (2) The test of each bill introduced in each current legislative
|
|||
|
session, including each amended, enrolled [passed by the Legislature] and
|
|||
|
chaptered [signed or passed into law] form of each bill.
|
|||
|
" (3) The bill history of each bill introduced and amended in each
|
|||
|
current legislative session.
|
|||
|
" (4) The bill status of each bill introduced and amended in each
|
|||
|
current legislative session.
|
|||
|
" (5) All bill analyses prepared by legislative committees in connection
|
|||
|
with each bill in each current legislative session. [Bill analyses by the
|
|||
|
party caucuses are *not* included.]
|
|||
|
" (6) All vote information concerning each bill in each current %
|
|||
|
legislative session.
|
|||
|
" (7) Any veto message concerning a bill in each current legislative
|
|||
|
session.
|
|||
|
" (8) The California Codes. [the state's laws or statutes]
|
|||
|
" (9) The California Constitution [including enacted ballot initiatives]
|
|||
|
" (10) All statutes enacted on or after January 1, 1993.
|
|||
|
"(b) The information identified in subdivision (a) shall be made available
|
|||
|
to the public by means of access by way of the largest nonproprietary,
|
|||
|
nonprofit cooperative public computer network ... in one or more formats.
|
|||
|
... Any person who accesses the information may access all or any part of
|
|||
|
the information. The information that is maintained in the legislative
|
|||
|
information system ... shall be made available in the shortest feasible
|
|||
|
time after the information is available in the [Legislature's internal]
|
|||
|
information system. The information that is not maintained in the
|
|||
|
information system shall be made available in the shortest feasible time
|
|||
|
after it is available to the Legislative Counsel.
|
|||
|
"... [public documentation of digital formats will be available, online]
|
|||
|
"(d) Personal information concerning a person who accesses the information
|
|||
|
may be maintained only for the purpose of providing service to that person.
|
|||
|
"(e) No fee or other charge may be imposed by the Legislative Counsel as
|
|||
|
a condition of accessing the information ... . ..."
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 12 Oct 1993 14:28:59 -0700
|
|||
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
|||
|
Subject: File 2--Thanks to The folks who made AB1624 possible
|
|||
|
|
|||
|
((MODERATORS' NOTE: Jim Warren graciously thanks all those who
|
|||
|
assisted in the enactment of California's AB1624, which expands the
|
|||
|
public's access to state government documents. But, Jim Warren was the
|
|||
|
primary force behind the legislation. Both the language of the law and
|
|||
|
the energy to push the Bill through are a credit to Jim's efforts.
|
|||
|
THANKS, JIM!!))
|
|||
|
|
|||
|
++++
|
|||
|
|
|||
|
There are *lots* of folks who greatly assisted AB1624 to become law,
|
|||
|
but these are the crucial ones:
|
|||
|
|
|||
|
Assembly Member Debra Bowen introduced the concepts embodied in this
|
|||
|
law. And, she did so on her own -- unlike most legislation, which is
|
|||
|
brought to legislators by outside special interests (i.e., no
|
|||
|
"sponsors").
|
|||
|
|
|||
|
Bowen's Legislative Aide Mary Winkley road herd on this bill, provided
|
|||
|
Bowen with massive, *essential* input and guidance regarding the
|
|||
|
details of the bill as it whip-sawed its way through the contorted
|
|||
|
amendment and committee processes. Her assistance was especially
|
|||
|
crucial given that Bowen had never held elective office before this
|
|||
|
year.
|
|||
|
|
|||
|
Mary is the one who fielded several thousand phone calls and about
|
|||
|
1,500 faxes and letters, concerning this bill alone (on top of a
|
|||
|
dozen-or-so others for which she had key responsibility).
|
|||
|
|
|||
|
She was there days, evenings, nights, dawns, weekends and holidays
|
|||
|
(I know; I often called her -- or she, me -- at night and on
|
|||
|
weekends!).
|
|||
|
|
|||
|
Without Mary Winkley's *consumptive* efforts, AB1624 would not be
|
|||
|
law.
|
|||
|
|
|||
|
The 1,500-or-so people who sent the faxes and letters to Bowen and to
|
|||
|
crucial committee members as the bill went through the legislative
|
|||
|
process.
|
|||
|
YOUR *ACTION* WAS ESSENTIAL.
|
|||
|
|
|||
|
(When I first heard about the bill and talked to Winkley, she said
|
|||
|
it was dead -- they had not found any public support for it,.amd the
|
|||
|
Legislative Counsel's staff had said it would cost millions of dollars
|
|||
|
to implement.)
|
|||
|
|
|||
|
[ And maybe me: "How I Spent My Summer Vacation." :-) <can't
|
|||
|
think of a much better way!>
|
|||
|
Most of all, I broadcast 32+ updates to you hundreds of folks who
|
|||
|
so-politely tolerated my un-terse-osity, and YOU made it happen via
|
|||
|
your support when and where it counted. (Also processed several
|
|||
|
thousand email messages.)
|
|||
|
|
|||
|
I also showed 'em how they could do it for little or no cost via the
|
|||
|
Internet and a cheap file-server (detailed it in a 16-page
|
|||
|
implementation report), and detailed how the printed bills and their
|
|||
|
semantically-meaningful italics, underscoring and strike-thrus might
|
|||
|
be easily represented in ASCII text for dumb terminals. ]
|
|||
|
|
|||
|
|
|||
|
PLEASE THANK MARY AND DEBRA -- WELL-EARNED APPLAUSE, WORTH BOTH HANDS
|
|||
|
CLAPPING I have one final request of you: Please take the time to
|
|||
|
at least call, or possibly fax or write, and personally thank Mary
|
|||
|
Winkley and Debra Bowen for what they have done. They *deserve* to
|
|||
|
know we noticed; we care; we appreciate their consumptive efforts.
|
|||
|
Both are at: State Capitol, Room 3126, Sacramento CA 95814
|
|||
|
voice/916-445-8528, fax/916-327-2201
|
|||
|
Please, do it now. They deserve it!
|
|||
|
|
|||
|
And, thank you all -- *so much* -- for your interest and efforts. It
|
|||
|
*is* possible for citizens to significantly impact government -- all
|
|||
|
it takes is time and effort. :-)
|
|||
|
|
|||
|
ON TO THE NEXT PROJECT
|
|||
|
|
|||
|
The next thing to do is get the Secretary of State to make
|
|||
|
already-required public campaign-contributor and financial-disclosure
|
|||
|
information from "serious" candidates available in the same way as
|
|||
|
AB1624 makes public legislative data and public laws available. Then
|
|||
|
we can cross-reference vote records to contributor information --
|
|||
|
making reform of the legislative process possible via a
|
|||
|
better-informed electorate.
|
|||
|
|
|||
|
Like AB1624, this could be done at little or no cost to the
|
|||
|
tax-payers or the candidates. There is already movement on this
|
|||
|
project. More in a later message.
|
|||
|
|
|||
|
(Who knows -- maybe we won't need incumbency guarantees such as
|
|||
|
campaign-spending limits, or tax-suckin' public campaign-funding to
|
|||
|
pay for candidates' teevee ads and massive junk-mail.)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 10 Oct 1993 17:42:00 -0700
|
|||
|
From: bjones@WEBER.UCSD.EDU(Bruce Jones)
|
|||
|
Subject: File 3--Response to Cohen in re ITAR & Export Regs
|
|||
|
|
|||
|
In CuD 5.79, Fredrick B. Cohen <fc@JUPITER.SAIC.COM> writes:
|
|||
|
|
|||
|
Let's unpack a bit of what Mr. Cohen has to say about ITAR
|
|||
|
export regulations and his experiences.
|
|||
|
|
|||
|
>Your discussion seems very strange to me. I seem to think I have
|
|||
|
>heard it all before - about 3 years ago - when I got permission from
|
|||
|
>the government to export an RSA cryptosystem with no restriction on
|
|||
|
>key length or anything else.
|
|||
|
>
|
|||
|
>It took a few weeks (6-8 as I recall), but all I did was submit the
|
|||
|
>software to the government (in 12 copies or so), and request a ruling.
|
|||
|
>After a few call-backs, I got permission.
|
|||
|
|
|||
|
Please note that the posting site for Mr. Cohen's message is
|
|||
|
the Science Applications International Corporation, a La Jolla
|
|||
|
California based think tank that has deep ties to the U.S. Gov't and
|
|||
|
does lots of work for the DoD. Given his ties to the DoD, it comes
|
|||
|
as small surprise that he was able to get export permission for his RSA
|
|||
|
cryptosystem.
|
|||
|
|
|||
|
[Discussion of key generation deleted because it's not germane to
|
|||
|
my critique]
|
|||
|
|
|||
|
>All of this is not to say that I think it is reasonable to prevent us
|
|||
|
>from doing as we please in this area, and I certainly wish I didn't
|
|||
|
>have to wait so long before distributing new versions overseas, but
|
|||
|
>why not just apply for export and see what happens? Maybe you'll get
|
|||
|
>permission and it will all be no problem.
|
|||
|
|
|||
|
Why should a software manufacturer or a private citizen have to ask
|
|||
|
permission in the first place, from the DoD (operating under the
|
|||
|
guise of the Dept of Commerce) to export software that uses
|
|||
|
encryption algorithms freely available in the country to which the
|
|||
|
product is being exported?
|
|||
|
|
|||
|
>IBM has been exporting DES for quite a few years according to sources
|
|||
|
>I have in EC who have seen IBM chips with DES on them in EC computers.
|
|||
|
>I believe they simply asked for permission and got it.
|
|||
|
|
|||
|
Again, it's likely quite simple for someone who does business with
|
|||
|
the DoD and the U.S. Gov't to get permission to export.
|
|||
|
|
|||
|
>I applaud the EFF for helping defend people in this area, but maybe if
|
|||
|
>they tried to work within the law in the first place, they would have
|
|||
|
>found it was easier to obey the law than break it.
|
|||
|
|
|||
|
Serious charges without foundation. Whom within the EFF has been
|
|||
|
accused of breaking the law?
|
|||
|
|
|||
|
>Maybe if they apply now, they will end up with a no-case (assuming
|
|||
|
>they get permission).
|
|||
|
|
|||
|
A dodge of the issue, which is not about whether or not one can get
|
|||
|
permission to do something specific, but whether or not the
|
|||
|
government has a right to require permission in the first place.
|
|||
|
|
|||
|
One of the founding tenets of the Unites States of America is the
|
|||
|
idea that its citizens may do whatever they like, so long as their
|
|||
|
chosen activity is not proscribed by law and doesn't violate the
|
|||
|
rights of their neighbors. The opposite is ostensibly true for
|
|||
|
the government, which may only do what has been permitted it under
|
|||
|
the law. We live in a society where those distinctions apparently
|
|||
|
collapsed some time ago.
|
|||
|
|
|||
|
Bruce Jones Department of Communication
|
|||
|
bjones@ucsd.edu/bitnet University of California, San Diego
|
|||
|
(619) 534-0417/4410 9500 Gilman Drive
|
|||
|
FAX (619) 534-7315 La Jolla, Ca. 92093-0503
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 7 Oct 1993 17:49:40 +0800 (WST)
|
|||
|
From: Stephen Hardman <hardguy@GARION.IT.COM.AU>
|
|||
|
Subject: File 4--Space computer hacker gets bond.
|
|||
|
|
|||
|
Thursday: Space computer hacker gets bond.
|
|||
|
|
|||
|
MELBOURNE: A computer hacker who forced a 24-hour shutdown at US
|
|||
|
National Aeronautics and Space Administration base was sentenced
|
|||
|
yesterday to a year's jail but freed on a good behaviour bond and
|
|||
|
ordered to do 500 hours' unpaid community work.
|
|||
|
|
|||
|
Nashon Even-Chaim, 22, of Caulfield, pleaded guilty to 15 charges of
|
|||
|
unlawful interference with computer data in 1990, including using the
|
|||
|
password "friend" to penetrate a NASA computer in Virginia.
|
|||
|
|
|||
|
Even-Chaim also admitted interfering with a CSIRO computer in
|
|||
|
Melbourne, a private computer manufacturer's system in Texas and a US
|
|||
|
government computer laboratory in California.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 13 Oct 1993 17:31:14 -0400
|
|||
|
From: Christopher Davis <ckd@KEI.COM>
|
|||
|
Subject: File 5--all eff.org machines moving 10/15-10/18
|
|||
|
|
|||
|
All eff.org machines will be disconnected and unavailable (due to
|
|||
|
moving from Cambridge, MA to Washington, DC) from approximately noon
|
|||
|
(EDT) Friday 15 October 1993 to approximately noon (EDT) Monday 18
|
|||
|
October 1993.
|
|||
|
|
|||
|
This includes email to eff@eff.org, access to the archives on
|
|||
|
ftp.eff.org and gopher.eff.org, and mail-news gateways for
|
|||
|
comp.org.eff.* and alt.comp.acad-freedom.*.
|
|||
|
|
|||
|
Mirrors of the archives should be available during the weekend.
|
|||
|
|
|||
|
We apologize for any inconvenience.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
|
|||
|
Date: Tue, 12 Oct 1993 16:05:07 EST
|
|||
|
Subject: File 6--IGC Wins Public Interest Aw
|
|||
|
|
|||
|
IGC Wins Public Interest Award
|
|||
|
|
|||
|
Palo Alto, Calif., October 12, 1993 - Computer Professionals for
|
|||
|
Social Responsibility (CPSR), the national public interest
|
|||
|
organization based in Palo Alto, announced today that the Institute
|
|||
|
for Global Communications (IGC) has been named the winner of the 1993
|
|||
|
Norbert Wiener Award for Social and Professional Responsibility.
|
|||
|
Beginning in 1986, CPSR has presented this award each year to a
|
|||
|
distinguished individual who, through personal example, demonstrated a
|
|||
|
deep commitment to the socially responsible use of computing
|
|||
|
technology. In 1992, the CPSR Board expanded the nominations to
|
|||
|
include organizations. IGC is the first organizational recipient of
|
|||
|
this prestigious award.
|
|||
|
|
|||
|
"The award is particularly appropriate this year because of the
|
|||
|
enormous interest in computer networks generated by the debate over
|
|||
|
the proposed National Information Infrastructure (NII)," said Stanford
|
|||
|
professor and CPSR Board president Eric Roberts. "IGC has worked
|
|||
|
diligently to use network technology to empower previously
|
|||
|
disenfranchised individuals and groups working for progressive change.
|
|||
|
CPSR has a strong commitment to making sure that everyone has access
|
|||
|
to the resources and empowerment that networks provide. IGC has been
|
|||
|
providing such access ever since it was founded in 1986."
|
|||
|
|
|||
|
"We're honored to be recognized by CPSR and to be the Norbert Wiener
|
|||
|
Award recipient," says Geoff Sears, IGC's Executive Director. "Of
|
|||
|
course, this award honors not just IGC, but the efforts and
|
|||
|
accomplishments of all our network members, our entire network
|
|||
|
community."
|
|||
|
|
|||
|
Sears will accept the Wiener award at CPSR's annual meeting banquet in
|
|||
|
Seattle, Washington, on Saturday, October 16th.
|
|||
|
|
|||
|
This year's annual meeting is a two-day conference entitled
|
|||
|
"Envisioning the Future: A National Forum on the National Information
|
|||
|
Infrastructure (NII)" that will bring together local, regional, and
|
|||
|
national decision makers to take a critical look at the social
|
|||
|
implications of the NII. The keynote speaker will be Bruce McConnell,
|
|||
|
Chief of Information Policy at the Office of Information and
|
|||
|
Regulatory Affairs in the Office of Management and Budget (OMB), who
|
|||
|
will present his views on the major NII issues now facing the
|
|||
|
administration. Other highlights of the meeting include Kit Galloway
|
|||
|
of Electronic Cafe International in Santa Monica, California, as the
|
|||
|
featured speaker at the banquet. Using videotapes and a live
|
|||
|
demonstration with CPSR chapters, Kit will present an innovative
|
|||
|
approach to electronic communication and discuss how the Electronic
|
|||
|
Cafe concept has been used.
|
|||
|
|
|||
|
The Institute for Global Communications is a nonprofit computer
|
|||
|
networking organization dedicated to providing low-cost worldwide
|
|||
|
communication and information exchange pertaining to environmental
|
|||
|
preservation, human rights, sustainable development, peace, and social
|
|||
|
justice issues. IGC operates the PeaceNet, EcoNet, ConflictNet, and
|
|||
|
LaborNet computer networks. With a combined membership of 10,000
|
|||
|
individuals and organizations ranging in size and scope from United
|
|||
|
Nations Commissions to local elementary schools, IGC members
|
|||
|
contribute to more than 1200 conferences covering virtually every
|
|||
|
environmental and human rights topic.
|
|||
|
|
|||
|
The Wiener Award was established in 1987 in memory of Norbert Wiener,
|
|||
|
the originator of the field of cybernetics and a pioneer in looking at
|
|||
|
the social and political consequences of computing. Author of the
|
|||
|
book, The Human Use of Human Beings, Wiener began pointing out the
|
|||
|
dangers of nuclear war and the role of scientists in developing more
|
|||
|
powerful weapons shortly after Hiroshima.
|
|||
|
|
|||
|
Past recipients of the Wiener Award have been: Dave Parnas, 1987, in
|
|||
|
recognition of his courageous actions opposing the Strategic Defense
|
|||
|
Initiative; Joe Weizenbaum, 1988, for his pioneering work emphasizing
|
|||
|
the social context of computer science; Daniel McCracken, 1989, for
|
|||
|
his work organizing computer scientists against the Anti Ballistic
|
|||
|
Missiles deployment during the 1960s; Kristen Nygaard of Norway, 1990,
|
|||
|
for his work in participatory design; Severo Ornstein and Laura Gould,
|
|||
|
1991, in recognition of their tireless energy guiding CPSR through
|
|||
|
its early years; and Barbara Simons, 1992, for her work on human
|
|||
|
rights, military funding, and the U.C. Berkeley reentry program for
|
|||
|
women and minorities.
|
|||
|
|
|||
|
Founded in 1981, CPSR is a national, nonprofit, public-interest
|
|||
|
organization of computer scientists and other professionals concerned
|
|||
|
with the impact of computer technology on society. With offices in
|
|||
|
Palo Alto, California, and Washington, D.C., CPSR challenges the
|
|||
|
assumption that technology alone can solve political and social
|
|||
|
problems.
|
|||
|
|
|||
|
For more information about CPSR, the annual meeting, or the awards
|
|||
|
banquet, call 415-322-3778 or send email to <cpsr@cpsr.org>.
|
|||
|
|
|||
|
For more information about IGC, contact Sarah Hutchison, 415-442-0220
|
|||
|
x117, or send email to <sarah@igc.apc.org>.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 11 Oct 93 12:07:01
|
|||
|
From: bob.paddock@CIRCELLAR.COM
|
|||
|
Subject: File 7--Response to PGP Encryption Flap (RE:CuD 574)
|
|||
|
|
|||
|
In Re CuD574: File 1--Phil Zimmerman Comments on Encryption Flap
|
|||
|
|
|||
|
I'm posting this rather long message (sorry about the length,
|
|||
|
but I wanted it to be complete [as the copyright states that it must
|
|||
|
be for permitted redistribution]) with a couple of question in mind
|
|||
|
that I would like answered:
|
|||
|
|
|||
|
1) Why is one branch of the government trying to kill off PGP
|
|||
|
specifically, and possibly public key encryption in general. While an
|
|||
|
other branch (DARPA) is helping to promote its use (See below)?
|
|||
|
|
|||
|
2) Since DARPA is promoting the use of the PEM public key
|
|||
|
implementation, does this mean that it has a back door for "THEM"?
|
|||
|
|
|||
|
3) If you can get this public key program via anonymous FTP,
|
|||
|
that IS export controlled, whats the governments beef with Austin Code
|
|||
|
Works, and PGP's author? [Better get your copy now be for one side
|
|||
|
finds out what the other is doing! %Maybe some one could point this
|
|||
|
out to PGP's authors defence lawyer, humm?%]
|
|||
|
|
|||
|
============================================================================
|
|||
|
Received: from RSA.COM (CHIRALITY.RSA.COM)
|
|||
|
!RSA.COM!rsaref-administrator
|
|||
|
!RSA.COM!coni
|
|||
|
|
|||
|
Subject--RSAREF VERS NUMBER
|
|||
|
|
|||
|
The current version of RSAREF is v1.01. To receive RSAREF read below.
|
|||
|
|
|||
|
RSAREF(TM):
|
|||
|
A Cryptographic Toolkit for Privacy-Enhanced Mail
|
|||
|
|
|||
|
RSA Laboratories
|
|||
|
(A division of RSA Data Security, Inc.)
|
|||
|
October 4, 1993
|
|||
|
|
|||
|
This document copyright (C) 1993 RSA Laboratories, a division of RSA
|
|||
|
Data Security, Inc. License is granted to reproduce, copy, post, or
|
|||
|
distribute in any manner, provided this document is kept intact and
|
|||
|
no modifications, deletions, or additions are made.
|
|||
|
|
|||
|
|
|||
|
WHAT IS IT?
|
|||
|
|
|||
|
RSAREF is a cryptographic toolkit designed to facilitate rapid
|
|||
|
deployment of Internet Privacy-Enhanced Mail (PEM) implementations.
|
|||
|
RSAREF represents the fruits of RSA Data Security's commitment to the
|
|||
|
U.S. Department of Defense's Advanced Research Projects Agency
|
|||
|
(DARPA) to provide free cryptographic source code in support of a PEM
|
|||
|
standard. Just recently, PEM became an Internet proposed standard.
|
|||
|
|
|||
|
Part of RSA's commitment to DARPA was to authorize Trusted
|
|||
|
Information Systems of Glenwood, MD, to distribute a full PEM
|
|||
|
implementation based on RSAREF. That implementation is now available
|
|||
|
via anonymous FTP to 'ftp.tis.com'.
|
|||
|
|
|||
|
RSAREF supports the following PEM-specified algorithms:
|
|||
|
|
|||
|
o RSA encryption and key generation, as defined by RSA
|
|||
|
Laboratories' Public-Key Cryptography Standards (PKCS)
|
|||
|
|
|||
|
o MD2 and MD5 message digests
|
|||
|
|
|||
|
o DES (Data Encryption Standard) in cipher-block chaining mode
|
|||
|
|
|||
|
RSAREF is written in the C programming language as a library that can
|
|||
|
be called from an application program. A simple PEM implementation
|
|||
|
can be built directly on top of RSAREF, together with message parsing
|
|||
|
and formatting routines and certificate-management routines. RSAREF
|
|||
|
is distributed with a demonstration program that shows how one might
|
|||
|
build such an implementation.
|
|||
|
|
|||
|
The name "RSAREF" means "RSA reference." RSA Laboratories intends
|
|||
|
RSAREF to serve as a portable, educational, reference implementation
|
|||
|
of cryptography.
|
|||
|
|
|||
|
|
|||
|
WHAT YOU CAN (AND CANNOT) DO WITH RSAREF
|
|||
|
|
|||
|
The RSAREF license agreement gives legal terms and conditions. Here's
|
|||
|
the layman's interpretation, for information only and with no legal
|
|||
|
weight:
|
|||
|
|
|||
|
1. You can use RSAREF in personal, non-commercial applications,
|
|||
|
as long as you follow the interface described in the RSAREF
|
|||
|
documentation. You can't use RSAREF in any commercial
|
|||
|
(moneymaking) manner of any type, nor can you use it to
|
|||
|
provide services of any kind to any other party. For
|
|||
|
information on commercial licenses of RSAREF-compatible
|
|||
|
products, please contact RSA Data Security. (Special
|
|||
|
arrangements are available for educational institutions and
|
|||
|
non-profit organizations.)
|
|||
|
|
|||
|
2. You can give others RSAREF and programs that interface to
|
|||
|
RSAREF, under the same terms and conditions as your RSAREF
|
|||
|
license.
|
|||
|
|
|||
|
3. You can modify RSAREF as required to port it to other
|
|||
|
operating systems and compilers, or to improve its
|
|||
|
performance, as long as you give a copy of the results to
|
|||
|
RSA Laboratories. Other changes require written consent.
|
|||
|
|
|||
|
4. You can't send RSAREF outside the United States or Canada, or
|
|||
|
give it to anyone who is not a U.S. or Canadian citizen and
|
|||
|
doesn't have a U.S. "green card." (These are U.S. State and
|
|||
|
Commerce Department requirements, because RSA and DES are
|
|||
|
export-controlled technologies.)
|
|||
|
|
|||
|
|
|||
|
HOW TO GET IT
|
|||
|
|
|||
|
To obtain RSAREF, read the RSAREF license agreement and return a copy
|
|||
|
of the following paragraph by electronic mail to
|
|||
|
<rsaref-administrator@rsa.com>. If your electronic mail address is
|
|||
|
located in Canada, please send your full name and mailing address;
|
|||
|
we'll need it to complete a Department of State export declaration.
|
|||
|
|
|||
|
I acknowledge that I have read the RSAREF Program License
|
|||
|
Agreement and understand and agree to be bound by its terms and
|
|||
|
conditions, including without limitation its restrictions on
|
|||
|
foreign reshipment of the Program and information related to the
|
|||
|
Program. The electronic mail address to which I am requesting
|
|||
|
that the program be transmitted is located in the United States
|
|||
|
of America or Canada and I am a United States citizen, a Canadian
|
|||
|
citizen, or a permanent resident of the United States. The RSAREF
|
|||
|
Program License Agreement is the complete and exclusive agreement
|
|||
|
between RSA Laboratories and me relating to the Program, and
|
|||
|
supersedes any proposal or prior agreement, oral or written, and
|
|||
|
any other communications between RSA Laboratories and me relating
|
|||
|
to the Program.
|
|||
|
|
|||
|
RSAREF is distributed by electronic mail in UNIX(TM) "uuencoded" TAR
|
|||
|
format. When you receive it, store the contents of the message in a
|
|||
|
file, and run your operating system's "uudecode" and TAR programs.
|
|||
|
For example, suppose you store the contents of your message in the
|
|||
|
file 'contents'. You would run the commands:
|
|||
|
|
|||
|
uudecode contents # produces rsaref.tar
|
|||
|
tar xvf rsaref.tar
|
|||
|
|
|||
|
You can also get a "uuencoded" PKZIP(TM) version of RSAREF. Just ask
|
|||
|
for the ZIP file when you return the acknowledgement.
|
|||
|
|
|||
|
RSAREF includes about 60 files organized into the following
|
|||
|
subdirectories:
|
|||
|
|
|||
|
doc documentation on RSAREF and RDEMO
|
|||
|
install makefiles for various operating systems
|
|||
|
rdemo RDEMO demonstration program
|
|||
|
source RSAREF source code and include files
|
|||
|
test test scripts for RDEMO
|
|||
|
|
|||
|
RSAREF is also available via anonymous FTP to 'rsa.com'. Along with
|
|||
|
RSAREF you can get RIPEM, Mark Riordan's RSAREF-based privacy-enhanced
|
|||
|
mail application, and an Emacs command interface to RIPEM. See the
|
|||
|
file 'README' in the FTP directory 'rsaref' for more information.
|
|||
|
|
|||
|
|
|||
|
USERS' GROUP
|
|||
|
|
|||
|
RSA Laboratories maintains the electronic-mail users' group
|
|||
|
<rsaref-users@rsa.com> for discussion of RSAREF applications, bug
|
|||
|
fixes, etc. To join the users' group, send electronic mail to
|
|||
|
<rsaref-users-request@rsa.com>.
|
|||
|
|
|||
|
|
|||
|
REGISTRATION
|
|||
|
|
|||
|
RSAREF users who register with RSA Laboratories are entitled to free
|
|||
|
RSAREF upgrades and bug fixes as soon as they become available and a
|
|||
|
50% discount on selected RSA Data Security products. To register,
|
|||
|
send your name, address, and telephone number to
|
|||
|
<rsaref-registration@rsa.com>.
|
|||
|
|
|||
|
|
|||
|
INNOVATION PRIZES
|
|||
|
|
|||
|
RSA Laboratories will award cash prizes for the best applications
|
|||
|
built on RSAREF. If you'd like to submit an application, want to be
|
|||
|
on the review panel, or would like more details, please send
|
|||
|
electronic mail to <rsaref-prizes@rsa.com>. Applications are due
|
|||
|
December 31, 1993, and awards will be announced March 31, 1994. First
|
|||
|
prize is $5000, second prize is $2000, and there are five prizes of
|
|||
|
$1000. First prize in 1992's content went to Mark Riordan for RIPEM.
|
|||
|
|
|||
|
|
|||
|
PUBLIC-KEY CERTIFICATION
|
|||
|
|
|||
|
RSA Data Security offers public-key certification services conforming
|
|||
|
to forthcoming PEM standards. For more information, please send
|
|||
|
electronic mail to <pem-info@rsa.com>.
|
|||
|
|
|||
|
|
|||
|
PKCS: PUBLIC-KEY CRYPTOGRAPHY STANDARDS
|
|||
|
|
|||
|
To obtain copies of RSA Laboratories' Public-Key Cryptography
|
|||
|
Standards (PKCS), send electronic mail to <pkcs-info@rsa.com>.
|
|||
|
|
|||
|
|
|||
|
OTHER QUESTIONS
|
|||
|
|
|||
|
If you have questions on RSAREF software, licenses, export
|
|||
|
restrictions, or other RSA Laboratories offerings, send electronic
|
|||
|
mail to <rsaref-administrator@rsa.com>.
|
|||
|
|
|||
|
|
|||
|
AUTHORS
|
|||
|
|
|||
|
RSAREF was written by the staff of RSA Laboratories with assistance
|
|||
|
from RSA Data Security's software engineers. The DES code is based on
|
|||
|
an implementation that Justin Reyneri did at Stanford University. Jim
|
|||
|
Hwang of Stanford wrote parts of the arithmetic code under contract
|
|||
|
to RSA Laboratories.
|
|||
|
|
|||
|
|
|||
|
ABOUT RSA LABORATORIES
|
|||
|
|
|||
|
RSA Laboratories is the research and development division of RSA Data
|
|||
|
Security, Inc., the company founded by the inventors of the RSA
|
|||
|
public-key cryptosystem. RSA Laboratories reviews, designs and
|
|||
|
implements secure and efficient cryptosystems of all kinds. Its
|
|||
|
clients include government agencies, telecommunications companies,
|
|||
|
computer manufacturers, software developers, cable TV broadcasters,
|
|||
|
interactive video manufacturers, and satellite broadcast companies,
|
|||
|
among others.
|
|||
|
|
|||
|
RSA Laboratories draws upon the talents of the following people:
|
|||
|
|
|||
|
Len Adleman, distinguished associate - Ph.D., University of
|
|||
|
California, Berkeley; Henry Salvatori professor of computer
|
|||
|
science at University of Southern California; co-inventor of
|
|||
|
RSA public-key cryptosystem; co-founder of RSA Data Security, Inc.
|
|||
|
|
|||
|
Martin Hellman, distinguished associate - Ph.D., Stanford University;
|
|||
|
professor of electrical engineering at Stanford University;
|
|||
|
co-inventor of public-key cryptography, exponential key exchange;
|
|||
|
IEEE fellow; IEEE Centennial Medal recipient
|
|||
|
|
|||
|
Burt Kaliski, chief scientist - Ph.D., MIT; former visiting assistant
|
|||
|
professor at Rochester Institute of Technology; author of Public-Key
|
|||
|
Cryptography Standards; general chair of CRYPTO '91
|
|||
|
|
|||
|
Cetin Koc, associate - Ph.D., University of California, Santa
|
|||
|
Barbara; assistant professor at Oregon State University
|
|||
|
|
|||
|
Ron Rivest, distinguished associate - Ph.D., Stanford University;
|
|||
|
professor of computer science at MIT; co-inventor of RSA public-key
|
|||
|
cryptosystem; co-founder of RSA Data Security, Inc.; member of
|
|||
|
National Academy of Engineering; director of International
|
|||
|
Association for Cryptologic Research; program co-chair of ASIACRYPT
|
|||
|
'91
|
|||
|
|
|||
|
Matt Robshaw, research scientist - Ph.D., University of London
|
|||
|
|
|||
|
RSA Laboratories seeks the talents of other people as well. If you're
|
|||
|
interested, please write or call.
|
|||
|
|
|||
|
ADDRESSES
|
|||
|
|
|||
|
RSA Laboratories RSA Data Security, Inc.
|
|||
|
100 Marine Parkway 100 Marine Parkway
|
|||
|
Redwood City, CA 94065 Redwood City, CA 94065
|
|||
|
|
|||
|
(415) 595-7703 (415) 595-8782
|
|||
|
(415) 595-4126 (fax) (415) 595-1873 (fax)
|
|||
|
|
|||
|
PKCS, RSAREF and RSA Laboratories are trademarks of RSA Data
|
|||
|
Security, Inc. All other company names and trademarks are not.
|
|||
|
+----------------------------------------------------------------------
|
|||
|
RSA LABORATORIES
|
|||
|
PROGRAM LICENSE AGREEMENT
|
|||
|
|
|||
|
Version 1.02
|
|||
|
January 21, 1993
|
|||
|
|
|||
|
RSA LABORATORIES, A DIVISION OF RSA DATA SECURITY, INC. ("RSA")
|
|||
|
GRANTS YOU A LICENSE AS FOLLOWS TO THE "RSAREF" PROGRAM:
|
|||
|
|
|||
|
1. LICENSE. RSA grants you a non-exclusive, non-transferable,
|
|||
|
perpetual (subject to the conditions of Section 8) license for
|
|||
|
the "RSAREF" program (the "Program") and its associated
|
|||
|
documentation, subject to all of the following terms and
|
|||
|
conditions:
|
|||
|
|
|||
|
a. to use the Program on any computer;
|
|||
|
|
|||
|
b. to make copies of the Program for back-up purposes;
|
|||
|
|
|||
|
c. to modify the Program in any manner for porting or
|
|||
|
performance improvement purposes (subject to Section 2)
|
|||
|
or to incorporate the Program into other computer programs
|
|||
|
for your own personal or internal use, provided that you
|
|||
|
provide RSA with a copy of any such modification or
|
|||
|
Application Program by electronic mail, and grant RSA a
|
|||
|
perpetual, royalty-free license to use and distribute such
|
|||
|
modifications and Application Programs on the terms set
|
|||
|
forth in this Agreement.
|
|||
|
|
|||
|
d. to copy and distribute the Program and Application Programs
|
|||
|
in accordance with the limitations set forth in Section 2.
|
|||
|
|
|||
|
"Application Programs" are programs which incorporate all or any
|
|||
|
portion of the Program in any form. The restrictions imposed on
|
|||
|
Application Programs in this Agreement shall not apply to any
|
|||
|
software which, through the mere aggregation on distribution media,
|
|||
|
is co-located or stored with the Program.
|
|||
|
|
|||
|
2. LIMITATIONS ON LICENSE.
|
|||
|
|
|||
|
a. RSA owns the Program and its associated documentation and
|
|||
|
all copyrights therein. You may only use, copy, modify and
|
|||
|
distribute the Program as expressly provided for in this
|
|||
|
Agreement. You must reproduce and include this Agreement,
|
|||
|
RSA's copyright notices and disclaimer of warranty on any
|
|||
|
copy and its associated documentation.
|
|||
|
|
|||
|
b. The Program and all Application Programs are to be used only
|
|||
|
for non-commercial purposes. However, media costs associated
|
|||
|
with the distribution of the Program or Application Programs
|
|||
|
may be recovered.
|
|||
|
|
|||
|
c. The Program, if modified, must carry prominent notices
|
|||
|
stating that changes have been made, and the dates of any
|
|||
|
such changes.
|
|||
|
|
|||
|
d. Prior permission from RSA in writing is required for any
|
|||
|
modifications that access the Program through ways other
|
|||
|
than the published Program interface or for modifications
|
|||
|
to the Program interface. RSA will grant all reasonable
|
|||
|
requests for permission to make such modifications.
|
|||
|
|
|||
|
3. NO RSA OBLIGATION. You are solely responsible for all of your
|
|||
|
costs and expenses incurred in connection with the distribution
|
|||
|
of the Program or any Application Program hereunder, and RSA
|
|||
|
shall have no liability, obligation or responsibility therefor.
|
|||
|
RSA shall have no obligation to provide maintenance, support,
|
|||
|
upgrades or new releases to you or to any distributee of the
|
|||
|
Program or any Application Program.
|
|||
|
|
|||
|
4. NO WARRANTY OF PERFORMANCE. THE PROGRAM AND ITS ASSOCIATED
|
|||
|
DOCUMENTATION ARE LICENSED "AS IS" WITHOUT WARRANTY AS TO THEIR
|
|||
|
PERFORMANCE, MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR
|
|||
|
PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF
|
|||
|
THE PROGRAM IS ASSUMED BY YOU AND YOUR DISTRIBUTEES. SHOULD THE
|
|||
|
PROGRAM PROVE DEFECTIVE, YOU AND YOUR DISTRIBUTEES (AND NOT RSA)
|
|||
|
ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR
|
|||
|
CORRECTION.
|
|||
|
|
|||
|
5. LIMITATION OF LIABILITY. EXCEPT AS EXPRESSLY PROVIDED FOR IN
|
|||
|
SECTION 6 HEREINUNDER, NEITHER RSA NOR ANY OTHER PERSON WHO HAS
|
|||
|
BEEN INVOLVED IN THE CREATION, PRODUCTION, OR DELIVERY OF THE
|
|||
|
PROGRAM SHALL BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY
|
|||
|
DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF RSA HAS BEEN
|
|||
|
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
|||
|
|
|||
|
6. PATENT INFRINGEMENT OBLIGATION. Subject to the limitations set
|
|||
|
forth below, RSA, at its own expense, shall: (i) defend, or at
|
|||
|
its option settle, any claim, suit or proceeding against you on
|
|||
|
the basis of infringement of any United States patent in the
|
|||
|
field of cryptography by the unmodified Program; and (ii) pay any
|
|||
|
final judgment or settlement entered against you on such issue in
|
|||
|
any such suit or proceeding defended by RSA. The obligations of
|
|||
|
RSA under this Section 6 are subject to: (i) RSA's having sole
|
|||
|
control of the defense of any such claim, suit or proceeding;
|
|||
|
(ii) your notifying RSA promptly in writing of each such clai proceeding
|
|||
|
against you on
|
|||
|
the basis of infringement of any United States patent in the
|
|||
|
field of cryptography by the unmodified Program; and (ii) pay any
|
|||
|
final judgment or settlement entered against you on such issue in
|
|||
|
any such suit or proceeding defended by RSA. The obligations of
|
|||
|
RSA under this Section 6 are subject to: (i) RSA's having sole
|
|||
|
control of the defense of any such claim, suit or proceeding;
|
|||
|
(ii) your notifying RSA promptly in writing of each such clai proceeding
|
|||
|
against you on
|
|||
|
the basis of infringement of any United States patent in the
|
|||
|
field of cryptography by the unmodified Program; and (ii) pay any
|
|||
|
final judgment or settlement entered against you on such issue in
|
|||
|
any such suit or proceeding defended by RSA. The obligations of
|
|||
|
RSA under this Section 6 are subject to: (i) RSA's having sole
|
|||
|
control of the defense of any such claim, suit or proceeding;
|
|||
|
(ii) your notifying RSA promptly in writing of each such claim,
|
|||
|
suit or proceeding and giving RSA authority to proceed y United States
|
|||
|
patent in the
|
|||
|
field of cryptography by the unmodified Program; and (ii) pay any
|
|||
|
final judgment or settlement entered against you on such issue in
|
|||
|
any such suit or proceeding defended by RSA. The obligations of
|
|||
|
RSA under this Section 6 are subject to: (i) RSA's having sole
|
|||
|
control of the defense of any such claim, suit or proceeding;
|
|||
|
(ii) your notifying RSA promptly in writing of each such claim,
|
|||
|
suit or proceeding and giving RSA authority to proceed as stated
|
|||
|
in this Section 6; and (iii) your giving RSA all information
|
|||
|
known to you relating to such claim, suit or proceeding and
|
|||
|
cooperating with RSA to defend any such claim, suit or
|
|||
|
proceeding. RSA shall have no obligation under this Section 6
|
|||
|
with respect to any claim to the extent it is based upon (a) use
|
|||
|
of the Program as modified by any person other than RSA or use of
|
|||
|
any Application Program, where use of the unmodified Program
|
|||
|
would not constitute an infringement, or (b) use of the Program
|
|||
|
in a manner other than that permitted by this Agreement. THIS
|
|||
|
SECTION 6 SETS FORTH RSA'S ENTIRE OBLIGATION AND YOUR EXCLUSIVE
|
|||
|
REMEDIES CONCERNING CLAIMS FOR PROPRIETARY RIGHTS INFRINGEMENT.
|
|||
|
|
|||
|
NOTE: Portions of the Program practice methods described in and
|
|||
|
subject to U.S. Patents Nos. 4,200,770, 4,218,582 and 4,405,829,
|
|||
|
and all foreign counterparts and equivalents, issued to Leland
|
|||
|
Stanford Jr. University and to Massachusetts Institute of
|
|||
|
Technology. Such patents are licensed to RSA by Public Key
|
|||
|
Partners of Sunnyvale, California, the holder of exclusive
|
|||
|
licensing rights. This Agreement does not grant or convey any
|
|||
|
interest whatsoever in such patents.
|
|||
|
|
|||
|
7. RSAREF is a non-commercial publication of cryptographic
|
|||
|
techniques. Portions of RSAREF have been published in the
|
|||
|
International Security Handbook and the August 1992 issue of Dr.
|
|||
|
Dobb's Journal. Privacy applications developed with RSAREF may be
|
|||
|
subject to export controls. If you are located in the United States
|
|||
|
and develop such applications, you are advised to consult with the
|
|||
|
State Department's Office of Defense Trade Controls.
|
|||
|
|
|||
|
8. TERM. The license granted hereunder is effective until
|
|||
|
terminated. You may terminate it at any time by destroying the
|
|||
|
Program and its associated documentation. The termination of your
|
|||
|
license will not result in the termination of the licenses of any
|
|||
|
distributees who have received rights to the Program through you
|
|||
|
so long as they are in compliance with the provisions of this
|
|||
|
license.
|
|||
|
|
|||
|
9. GENERAL
|
|||
|
|
|||
|
a. This Agreement shall be governed by the laws of the State of
|
|||
|
California.
|
|||
|
|
|||
|
b. Address all correspondence regarding this license to RSA's
|
|||
|
electronic mail address <rsaref-administrator@rsa.com>, or
|
|||
|
to
|
|||
|
|
|||
|
RSA Laboratories
|
|||
|
ATTN: RSAREF Administrator
|
|||
|
100 Marine Parkway, Suite 500
|
|||
|
Redwood City, CA 94065
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 13 Oct 1993 18:22:13 CDT
|
|||
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 9--Elansky/Hartford bbs Hearings - Case Continues
|
|||
|
|
|||
|
HEARINGS CONTINUE IN BOMB-RECIPES CASE
|
|||
|
Oct. 13, Page B-11, The Hartford Courant
|
|||
|
|
|||
|
Michael Elansky, a 22-year-old West Hartford man accused of
|
|||
|
possessing bomb recipes on his computer bulletin board, will remain in
|
|||
|
jail pending further hearings on his case.
|
|||
|
|
|||
|
A 90-minute pretrial hearing in closed chambers Tuesday in Hartford
|
|||
|
Superior Court produced no resolution in the case. Another hearing is
|
|||
|
scheduled next Tuesday.
|
|||
|
|
|||
|
((remainder, summarizing the case, deleted))
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.80
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|