884 lines
44 KiB
Plaintext
884 lines
44 KiB
Plaintext
|
|
||
|
Computer underground Digest Wed Jun 14, 1995 Volume 7 : Issue 49
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Triviata: How many Spams have C&S Done since April '94?
|
||
|
|
||
|
CONTENTS, #7.49 (Wed, Jun 14, 1995)
|
||
|
|
||
|
File 1--INFO: Senate passes Decency Act 84-16; House is the next battle
|
||
|
File 2--Repost: EPIC Files Brief in 2600 Case
|
||
|
File 3--Media Feeding Frenzy on "runaway internet teens"
|
||
|
File 4-- Tutorial: Social Engineering vs Psychological Subversion (fwd)
|
||
|
File 5--Tutorial: Social Engineering vs Psychological Subversion
|
||
|
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Wed, 14 Jun 1995 18:33:53 -0400
|
||
|
From: "Shabbir J. Safdar" <shabbir@PANIX.COM>
|
||
|
Subject: 1--INFO: Senate passes Decency Act 84-16; House is the next battle
|
||
|
|
||
|
=================================================================
|
||
|
CAMPAIGN TO STOP THE EXON/GORTON COMMUNICATIONS DECENCY ACT
|
||
|
(SEE THE LIST OF CAMPAIGN COALITION MEMBERS AT THE END)
|
||
|
|
||
|
Update: -The Latest News: The Senate voted to attach the
|
||
|
Communications Decency Act to the Telecom Reform bill.
|
||
|
Leahy's alternative was not attached to the Telecom
|
||
|
Reform bill.
|
||
|
-What You Can Do Now
|
||
|
|
||
|
|
||
|
CAMPAIGN TO STOP THE UNCONSTITUTIONAL COMMUNICATIONS DECENCY ACT
|
||
|
June 14, 1995
|
||
|
|
||
|
PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
|
||
|
REDISTRIBUTE ONLY UNTIL June 25, 1995
|
||
|
REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS
|
||
|
|
||
|
Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
|
||
|
|
||
|
___________________________________________________________________
|
||
|
CONTENTS
|
||
|
Background
|
||
|
The Latest News
|
||
|
What You Can Do Now
|
||
|
For More Information
|
||
|
List Of Participating Organizations
|
||
|
|
||
|
_________________________________________________________________
|
||
|
BACKGROUND
|
||
|
|
||
|
The Communications Decency Act (sponsored by Sen. Exon and Gorton) would
|
||
|
criminalize many forms of expression on online systems. Many believe
|
||
|
it to be unconstitutional, and a fight to oppose it has been waged
|
||
|
since its introduction. It was recently attached to the fast-tracked
|
||
|
Telecommunications Deregulation bill, which is moving quickly through
|
||
|
Congress.
|
||
|
|
||
|
_________________________________________________________________
|
||
|
THE LATEST NEWS
|
||
|
|
||
|
Right up until the last minute, callers reported weary Senatorial
|
||
|
staffers continued to report a deluge of incoming calls, almost all
|
||
|
against the Exon/Coats bill and supporting the Leahy alternative. The
|
||
|
Senate debated the Exon/Coats/Gorton Communications Decency Act and the
|
||
|
Leahy alternative today (June 14, 1995) starting at about 3:30pm EST
|
||
|
for 90 minutes.
|
||
|
|
||
|
The debate was opened by Senator Exon who read a prayer to protect
|
||
|
against computer pornography. Senators Exon (D-NE) and Coats (R-IN)
|
||
|
spoke in favor of their position. Senator Gorton (R-WA) was
|
||
|
mysteriously absent from the debate.
|
||
|
|
||
|
Exon referred those that signed the petition to prevent his censorship
|
||
|
bill as "selfish". Exon presented letters from many groups in support
|
||
|
of his bill, including the Christian Coalition, the Family Research
|
||
|
Council, the National Law Center for Families. He also stated that
|
||
|
75% of computer owners have refused the join the Internet because the
|
||
|
obscene material they feared on the Internet.
|
||
|
|
||
|
Senators Byrd (D-WV) and Heflin (D-AL) cosponsored the Exon bill at
|
||
|
the last minute.
|
||
|
|
||
|
Senators Leahy (D-VT) and Feingold (D-WI) spoke passionately about the
|
||
|
First Amendment and the Internet. Feingold warned against the dangers
|
||
|
of chilling free speech. Leahy brought out the monster petition in
|
||
|
support of his alternative (it looks pretty impressive on television)
|
||
|
and proceeded to try to debunk the myths Exon promulgated about the
|
||
|
Internet. He also trumpeted the success of the Internet, and pointed
|
||
|
out it wouldn't have been nearly as successful if the US government had
|
||
|
tried to micro-manage it.
|
||
|
|
||
|
Both Exon and Leahy then gave back extra debating time and went to a vote
|
||
|
on the bill. The Exon bill was successfully attached to the Telecomm
|
||
|
Reform bill (84-16). The Leahy alternative was not attached to the
|
||
|
Telecom Reform bill.
|
||
|
|
||
|
Questions and answers:
|
||
|
|
||
|
Q: What does this mean?
|
||
|
A: It means we lost this round. The unconstitutional Exon Communications
|
||
|
Decency Act was attached to the Telecomm Reform bill.
|
||
|
|
||
|
Q: What's the next step?
|
||
|
A: Next, we need to ensure that a House equivalent to the Exon
|
||
|
Communications Decency Act is not attached to the House Telecomm Reform
|
||
|
bill.
|
||
|
|
||
|
Q: Where can I find more information about the bill?
|
||
|
A: Check below.
|
||
|
|
||
|
___________________________________________________________________
|
||
|
WHAT YOU CAN DO NOW -- U.S. and non-U.S. citizens
|
||
|
|
||
|
1. Familiarize yourself with the version of the bill that passed,
|
||
|
and the transcript of the Senate debate. (directions to obtain
|
||
|
these are below)
|
||
|
|
||
|
2. Check the voting list below. It wouldn't hurt to send a nice
|
||
|
letter, email, or fax to the Senators that voted to defeat the
|
||
|
Communications Decency Act. Hateful mail to Senators who did
|
||
|
not vote your way is not only *bad form*, but likely to become illegal
|
||
|
soon anyway, under the Communications Decency Act.
|
||
|
|
||
|
In other words, take some time to cool off.
|
||
|
|
||
|
3. If you don't receive Coalition alerts reliably through mail or news,
|
||
|
join the mailing list by sending mail to listproc@vtw.org with
|
||
|
"subscribe vtw-announce Firstname Lastname". We'll have to fight
|
||
|
this battle in the House soon and you should be informed.
|
||
|
|
||
|
4. Relax, it's not the end of the world. We still have this battle to
|
||
|
fight in the House of Representatives and then in the conference
|
||
|
committee. This is a setback, but we haven't lost yet.
|
||
|
|
||
|
__________________________________________________________________
|
||
|
RESULTS OF THE SENATE VOTE
|
||
|
|
||
|
Senators who voted to defeat the Communications Decency Act
|
||
|
(A polite letter to congratulate them for defending your free speech
|
||
|
rights would be appropriate.)
|
||
|
|
||
|
D ST Name (Party) Phone Fax
|
||
|
= == ================== ============== ==============
|
||
|
D CT Lieberman, Joseph I. 1-202-224-4041 1-202-224-9750
|
||
|
D DE Biden Jr., Joseph R. 1-202-224-5042 1-202-224-0139
|
||
|
D IL Simon, Paul 1-202-224-2152 1-202-224-0868
|
||
|
senator@simon.senate.gov
|
||
|
D IL Moseley-Braun, Carol 1-202-224-2854 1-202-224-2626
|
||
|
D MA Kennedy, Edward M. 1-202-224-4543 1-202-224-2417
|
||
|
senator@kennedy.senate.gov
|
||
|
D MI Levin, Carl 1-202-224-6221 na
|
||
|
D MN Wellstone, Paul 1-202-224-5641 1-202-224-8438
|
||
|
D NM Bingaman, Jeff 1-202-224-5521 na
|
||
|
Senator_Bingaman@bingaman.senate.gov
|
||
|
D NY Moynihan, Daniel P. 1-202-224-4451 na
|
||
|
D OH Glenn, John 1-202-224-3353 1-202-224-7983
|
||
|
R RI Chafee, John H. 1-202-224-2921 na
|
||
|
D VA Robb, Charles S. 1-202-224-4024 1-202-224-8689
|
||
|
Senator_Robb@robb.senate.gov
|
||
|
vascr@CapAccess.org
|
||
|
D VT Leahy, Patrick J. 1-202-224-4242 1-202-224-3595
|
||
|
senator_leahy@leahy.senate.gov
|
||
|
R VT Jeffords, James M. 1-202-224-5141 na
|
||
|
D WA Murray, Patty 1-202-224-2621 1-202-224-0238
|
||
|
D WI Feingold, Russell 1-202-224-5323 na
|
||
|
russell_feingold@feingold.senate.gov
|
||
|
|
||
|
|
||
|
Senators who voted to support the (CDA) Communications Decency Act
|
||
|
(They voted for the CDA and to curtail your free speech rights.
|
||
|
Writing them an impolite and nasty letter would be a bad idea, and
|
||
|
may soon be illegal under the CDA anyway. Take some time to cool down.)
|
||
|
|
||
|
D ST Name (Party) Phone Fax
|
||
|
= == ================== ============== ==============
|
||
|
R AK Murkowski, Frank H. 1-202-224-6665 1-202-224-5301
|
||
|
R AK Stevens, Ted 1-202-224-3004 1-202-224-1044
|
||
|
D AL Heflin, Howell T. 1-202-224-4124 1-202-224-3149
|
||
|
R AL Shelby, Richard C. 1-202-224-5744 1-202-224-3416
|
||
|
D AR Bumpers, Dale 1-202-224-4843 1-202-224-6435
|
||
|
D AR Pryor, David 1-202-224-2353 1-202-224-8261
|
||
|
R AZ Kyl, Jon 1-202-224-4521 1-202-228-1239
|
||
|
R AZ McCain, John 1-202-224-2235 1-602-952-8702
|
||
|
D CA Boxer, Barbara 1-202-224-3553 na
|
||
|
D CA Feinstein, Dianne 1-202-224-3841 1-202-228-3954
|
||
|
R CO Campbell, Ben N. 1-202-224-5852 1-202-225-0228
|
||
|
R CO Brown, Henry 1-202-224-5941 1-202-224-6471
|
||
|
D CT Dodd, Christopher J. 1-202-224-2823 na
|
||
|
R DE Roth Jr. William V. 1-202-224-2441 1-202-224-2805
|
||
|
D FL Graham, Robert 1-202-224-3041 1-202-224-2237
|
||
|
R FL Mack, Connie 1-202-224-5274 1-202-224-8022
|
||
|
D GA Nunn, Samuel 1-202-224-3521 1-202-224-0072
|
||
|
R GA Coverdell, Paul 1-202-224-3643 1-202-228-3783
|
||
|
D HI Akaka, Daniel K. 1-202-224-6361 1-202-224-2126
|
||
|
D HI Inouye, Daniel K. 1-202-224-3934 1-202-224-6747
|
||
|
D IA Harkin, Thomas 1-202-224-3254 1-202-224-7431
|
||
|
R IA Grassley, Charles E. 1-202-224-3744 1-202-224-6020
|
||
|
R ID Craig, Larry E. 1-202-224-2752 1-202-224-2573
|
||
|
R ID Kempthorne, Dirk 1-202-224-6142 1-202-224-5893
|
||
|
R IN Coats, Daniel R. 1-202-224-5623 1-202-224-8964
|
||
|
R IN Lugar, Richard G. 1-202-224-4814 1-202-224-7877
|
||
|
R KS Dole, Robert 1-202-224-6521 1-202-224-8952
|
||
|
R KS Kassebaum, Nancy L. 1-202-224-4774 1-202-224-3514
|
||
|
D KY Ford, Wendell H. 1-202-224-4343 1-202-224-0046
|
||
|
R KY McConnell, Mitch 1-202-224-2541 1-202-224-2499
|
||
|
D LA Breaux, John B. 1-202-224-4623 na
|
||
|
D LA Johnston, J. Bennett 1-202-224-5824 1-202-224-2952
|
||
|
D MA Kerry, John F. 1-202-224-2742 1-202-224-8525
|
||
|
D MD Mikulski, Barbara A. 1-202-224-4654 1-202-224-8858
|
||
|
D MD Sarbanes, Paul S. 1-202-224-4524 1-202-224-1651
|
||
|
R ME Snowe, Olympia 1-202-224-5344 1-202-224-6853
|
||
|
R ME Cohen, William S. 1-202-224-2523 1-202-224-2693
|
||
|
R MI Abraham, Spencer 1-202-224-4822 1-202-224-8834
|
||
|
R MN Grams, Rod 1-202-224-3244 na
|
||
|
R MO Bond, Christopher S. 1-202-224-5721 1-202-224-8149
|
||
|
R MO Ashcroft, John 1-202-224-6154 na
|
||
|
R MS Cochran, Thad 1-202-224-5054 1-202-224-3576
|
||
|
R MS Lott, Trent 1-202-224-6253 1-202-224-2262
|
||
|
D MT Baucus, Max 1-202-224-2651 na
|
||
|
R MT Burns, Conrad R. 1-202-224-2644 1-202-224-8594
|
||
|
R NC Faircloth, D. M. 1-202-224-3154 1-202-224-7406
|
||
|
R NC Helms, Jesse 1-202-224-6342 1-202-224-7588
|
||
|
D ND Conrad, Kent 1-202-224-2043 1-202-224-7776
|
||
|
D ND Dorgan, Byron L. 1-202-224-2551 1-202-224-1193
|
||
|
D NE Kerrey, Bob 1-202-224-6551 1-202-224-7645
|
||
|
D NE Exon, J. J. 1-202-224-4224 1-202-224-5213
|
||
|
R NH Gregg, Judd 1-202-224-3324 1-202-224-4952
|
||
|
R NH Smith, Robert 1-202-224-2841 1-202-224-1353
|
||
|
D NJ Bradley, William 1-202-224-3224 1-202-224-8567
|
||
|
D NJ Lautenberg, Frank R. 1-202-224-4744 1-202-224-9707
|
||
|
R NM Domenici, Pete V. 1-202-224-6621 1-202-224-7371
|
||
|
D NV Bryan, Richard H. 1-202-224-6244 1-202-224-1867
|
||
|
D NV Reid, Harry 1-202-224-3542 1-202-224-7327
|
||
|
R NY D'Amato, Alfonse M. 1-202-224-6542 1-202-224-5871
|
||
|
R OH Dewine, Michael 1-202-224-2315 1-202-224-6519
|
||
|
R OK Inhofe, James 1-202-224-4721
|
||
|
R OK Nickles, Donald 1-202-224-5754 1-202-224-6008
|
||
|
R OR Hatfield, Mark O. 1-202-224-3753 1-202-224-0276
|
||
|
R OR Packwood, Robert 1-202-224-5244 1-202-228-3576
|
||
|
R PA Santorum, Rick 1-202-224-6324 na
|
||
|
R PA Specter, Arlen 1-202-224-4254 1-717-782-4920
|
||
|
D RI Pell, Claiborne 1-202-224-4642 1-202-224-4680
|
||
|
D SC Hollings, Ernest F. 1-202-224-6121 1-202-224-4293
|
||
|
R SC Thurmond, Strom 1-202-224-5972 1-202-224-1300
|
||
|
D SD Daschle, Thomas A. 1-202-224-2321 1-202-224-2047
|
||
|
R SD Pressler, Larry 1-202-224-5842 1-202-224-1259*
|
||
|
R TN Thompson, Fred 1-202-224-4944 1-202-228-3679
|
||
|
R TN Frist, Bill 1-202-224-3344 1-202-224-8062
|
||
|
R TX Hutchison, Kay Bailey 1-202-224-5922 1-202-224-0776
|
||
|
R TX Gramm, Phil 1-202-224-2934 1-202-228-2856
|
||
|
R UT Bennett, Robert 1-202-224-5444 1-202-224-6717
|
||
|
R UT Hatch, Orrin G. 1-202-224-5251 1-202-224-6331
|
||
|
R VA Warner, John W. 1-202-224-2023 1-202-224-6295
|
||
|
R WA Gorton, Slade 1-202-224-3441 1-202-224-9393
|
||
|
D WI Kohl, Herbert H. 1-202-224-5653 1-202-224-9787
|
||
|
D WV Byrd, Robert C. 1-202-224-3954 1-202-224-4025
|
||
|
D WV Rockefeller, John D. 1-202-224-6472 na
|
||
|
R WY Simpson, Alan K. 1-202-224-3424 1-202-224-1315
|
||
|
R WY Thomas, Craig 1-202-224-6441 1-202-224-3230
|
||
|
|
||
|
__________________________________________________________________
|
||
|
FOR MORE INFORMATION
|
||
|
|
||
|
We will be archiving the version of the Communications Decency Act
|
||
|
that passed, the roll call vote that went with it, and the transcript
|
||
|
of the Senate debate.
|
||
|
|
||
|
We will make these available through the methods below as soon as
|
||
|
they are available through the Government Printing Office (this usually
|
||
|
takes about 24 hours). Please try to use the Web or Gopher sites first
|
||
|
before using our email server.
|
||
|
|
||
|
Web Sites
|
||
|
URL:http://www.panix.com/vtw/exon/
|
||
|
URL:http://epic.org/
|
||
|
URL:http://www.eff.org/pub/Alerts/
|
||
|
URL:http://www.cdt.org/cda.html
|
||
|
|
||
|
FTP Archives
|
||
|
URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
|
||
|
URL:ftp://ftp.eff.org/pub/Alerts/
|
||
|
|
||
|
Gopher Archives:
|
||
|
URL:gopher://gopher.panix.com/11/vtw/exon
|
||
|
URL:gopher://gopher.eff.org/11/Alerts
|
||
|
|
||
|
Email:
|
||
|
vtw@vtw.org (put "send help" in the subject line)
|
||
|
cda-info@cdt.org (General CDA information)
|
||
|
cda-stat@cdt.org (Current status of the CDA)
|
||
|
|
||
|
___________________________________________________________________
|
||
|
LIST OF PARTICIPATING ORGANIZATIONS
|
||
|
|
||
|
In order to use the net more effectively, several organizations have
|
||
|
joined forces on a single Congressional net campaign to stop the
|
||
|
Communications Decency Act.
|
||
|
|
||
|
|
||
|
American Civil Liberties Union * American Communication Association *
|
||
|
American Council for the Arts * Arts & Technology Society * Association
|
||
|
of Alternative Newsweeklies * biancaTroll productions * Californians
|
||
|
Against Censorship Together * Center For Democracy And Technology *
|
||
|
Centre for Democratic Communications * Center for Public Representation
|
||
|
* Citizen's Voice - New Zealand * Computer Communicators Association *
|
||
|
Computer Professionals for Social Responsibility * Cross Connection *
|
||
|
Cyber-Rights Campaign * CyberQueer Lounge * Dutch Digital Citizens'
|
||
|
Movement * Electronic Frontier Canada * Electronic Frontier Foundation
|
||
|
* Electronic Frontier Foundation - Austin * Electronic Frontiers
|
||
|
Australia * Electronic Frontiers Houston * Electronic Frontiers New
|
||
|
Hampshire * Electronic Privacy Information Center * Feminists For Free
|
||
|
Expression * First Amendment Teach-In * Florida Coalition Against
|
||
|
Censorship * Friendly Anti-Censorship Taskforce for Students * Hands
|
||
|
Off! The Net * Human Rights Watch * Inland Book Company * Inner Circle
|
||
|
Technologies, Inc. * Inst. for Global Communications * Internet
|
||
|
On-Ramp, Inc. * The Libertarian Party * Marijuana Policy Project *
|
||
|
Metropolitan Data Networks Ltd. * MindVox * National Bicycle Greenway *
|
||
|
National Coalition Against Censorship * National Public Telecomputing
|
||
|
Network * National Writers Union * Oregon Coast RISC * Panix Public
|
||
|
Access Internet * People for the American Way * Rock Out Censorship *
|
||
|
Society for Electronic Access * The Thing International BBS Network *
|
||
|
The WELL * Voters Telecommunications Watch
|
||
|
|
||
|
(Note: All 'Electronic Frontier' organizations are independent entities,
|
||
|
not EFF chapters or divisions.)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: sobel@epic.org (David L. Sobel)
|
||
|
Subject: 2--Repost: EPIC Files Brief in 2600 Case
|
||
|
Date: Mon, 12 Jun 1995 16:14:28 -0500
|
||
|
|
||
|
The Electronic Privacy Information Center (EPIC), on behalf of
|
||
|
Computer Professionals for Social Responsibility (CPSR), has filed
|
||
|
an appellate brief seeking to uphold a lower court decision
|
||
|
ordering the release of information on a controversial "hacker"
|
||
|
investigation. At issue are documents detailing the Secret
|
||
|
Service's role in the so-called "Pentagon City Mall Raid."
|
||
|
|
||
|
In November 1992, a group of young people affiliated with the
|
||
|
computer magazine "2600" were confronted by mall security
|
||
|
personnel, local police officers and several unidentified
|
||
|
individuals. The group members were ordered to identify
|
||
|
themselves and to submit to searches of their personal property.
|
||
|
Their names were recorded and some of their property was
|
||
|
confiscated. However, no charges were ever brought against any of
|
||
|
the individuals. Although the Secret Service has never formally
|
||
|
acknowledged its role in the incident, it eventually conceded that
|
||
|
it did possess relevant information.
|
||
|
|
||
|
CPSR filed suit in federal court in early 1993 seeking the release
|
||
|
of relevant Secret Service records under the Freedom of
|
||
|
Information Act. In July 1994, U.S. District Judge Louis
|
||
|
Oberdorfer ordered the Secret Service to release the vast majority
|
||
|
of documents it maintains on the incident. The government
|
||
|
appealed that decision and EPIC is litigating the appeal that is
|
||
|
now pending. In the recently filed brief, EPIC and CPSR argue
|
||
|
that the withheld documents demonstrate Secret Service misconduct
|
||
|
and that the FOIA exemptions cited by the agency do not apply.
|
||
|
|
||
|
The Secret Service has maintained that the disputed records were
|
||
|
collected during the course of an investigation of telephone toll
|
||
|
fraud. In its appellate brief, the agency asserts that
|
||
|
"obviously, a meeting of individuals 'affiliated with 2600
|
||
|
Magazine' would be of interest to such an investigation since
|
||
|
those individuals have, by their conduct, evidenced an interest in
|
||
|
the technical intricacies of the telephone system." The
|
||
|
government has revealed for the first time that the underlying
|
||
|
investigation was closed on March 14 of this year.
|
||
|
|
||
|
The Pentagon City incident has been described as an example of
|
||
|
over-zealous law enforcement activities directed against so-called
|
||
|
computer "hackers." The case raises significant issues of free
|
||
|
speech and assembly, privacy and government accountability. Oral
|
||
|
argument before the federal appeals court is scheduled for mid-
|
||
|
September.
|
||
|
|
||
|
The EPIC/CPSR brief can be accessed via WWW at:
|
||
|
|
||
|
http://epic.org/computer_crime/2600/
|
||
|
|
||
|
or by FTP/Gopher at:
|
||
|
|
||
|
cpsr.org/cpsr/computer_crime/2600_brief_6_95.txt
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 12 Jun 1995 23:45:02 -0400 (EDT)
|
||
|
From: craftman <craftman@IGLOU.COM>
|
||
|
Subject: 3--Media Feeding Frenzy on "runaway internet teens"
|
||
|
|
||
|
St. Matthews Teenager "Lured" Away By Computer Pal
|
||
|
Richard D. Meadows - craftman@iglou.com
|
||
|
|
||
|
WRITERS NOTE: I have used ALLCAPS for my added emphasis and placed a
|
||
|
few editorial/social comments in brackets [] in the article. At the
|
||
|
end there will additional editorializing.
|
||
|
|
||
|
The media feeding frenzy, about teens being lured away by people
|
||
|
they have met online, in both Washington state and Kentucky has pro-
|
||
|
vided more fuel for the Exon fire currently burning in the Senate.
|
||
|
|
||
|
I live in Louisville, KY., and have been following the Tara Noble
|
||
|
runaway closely since it was first reported in the Courier-Journal (C-
|
||
|
J) on Tuesday June 6, a week after MS Noble left her home in St. Mat-
|
||
|
thews an upper middle class suburb of Louisville. Tara, 13, ran away
|
||
|
sometime on May 30, and yesterday she called the FBI from Hollywood
|
||
|
Boulevard in Los Angeles, CA., to say she wanted to go back home.
|
||
|
[How many teens have run away to California and ended up on Hollywood
|
||
|
Boulevard, where they call home or the police?]
|
||
|
|
||
|
What makes this runaway case different is the fact that Tara's
|
||
|
personal computer and AOL are involved. The headline on the front
|
||
|
page story of the C-J on June 6....WOMAN FEARS COMPUTER PAL LURED AWAY
|
||
|
DAUGHTER, 13....sets the tone for the entire article. The staff
|
||
|
writer, John Voskuhl, calls cyberspace a "shadowy frontier", in a
|
||
|
story that appears one full week after MS Noble ran away from home.
|
||
|
Tara's mother Lisa Noble tells the writer that she thinks her daughter
|
||
|
boarded a Greyhound bus headed west to rendezvous with someone she met
|
||
|
through a ' "chat room" ' on America Online.
|
||
|
|
||
|
Voskuhl writes in the story that it is not certain that Tara's
|
||
|
computer connections played a role in her disappearance. In the next
|
||
|
paragraph however:
|
||
|
|
||
|
"The computer - that's what started this problem," said Norm
|
||
|
Mayer, chief of the St. Matthews Police Department, which is
|
||
|
investigating the case. "And that's the only real lead we
|
||
|
have."
|
||
|
|
||
|
[Excuse me? What about the Greyhound bus? Is that not a lead? Did
|
||
|
Mrs. Noble just pick that out of the air?]
|
||
|
|
||
|
The article goes on to tell of her divorced parents turning
|
||
|
Tara's room upside down in search of information. They found tele-
|
||
|
phone numbers from all across the country of people Tara had met
|
||
|
during the DOZENS OF HOURS SHE SPENT CHATTING ON COMPUTER NETWORKS.
|
||
|
[What networks are interfaced with AOL?] The article has the obliga-
|
||
|
tory mention of "...a series of sexually explicit images that found
|
||
|
their way across the Noble family's modem during the DOZENS OF HOURS
|
||
|
her daughter spent online since April." Mrs. Noble is quoted in the
|
||
|
article about the images: "I'm like, 'How can this stuff be on a
|
||
|
computer?"'
|
||
|
|
||
|
During her trip across the country Tara stopped and used the
|
||
|
computer to communicate with computer acquaintances through AOL. Pam
|
||
|
McGraw of AOL Fame, indicated that AOL was cooperating with authori-
|
||
|
ties investigating the Noble case. McGraw also pointed out that AOL
|
||
|
provides "parental controls" that allow parents to prevent their
|
||
|
children from using chat rooms. Mrs. Noble said she did not know
|
||
|
about them before her daughter disappeared.
|
||
|
|
||
|
Tara spent so much time on the computer her mother eventually
|
||
|
removed the telephone jack Tara was using. Her father, Sam Noble, was
|
||
|
quoted in the story: "We encouraged her. We didn't know she was
|
||
|
talking to MEN all across the country." He further indicated, "People
|
||
|
talk about the information superhighway - in my opinion, it ought to
|
||
|
be regulated." The article then goes on to tell about the Exon bill
|
||
|
and how one of Kentucky's Senators, Wendell Ford, voted for it in
|
||
|
committee and would vote for it on the floor.
|
||
|
|
||
|
The end of the article the writer talks about the image appearing
|
||
|
on the screen to signal the computer was busy -- an hourglass, as Mrs.
|
||
|
Noble sat waiting for word of her daughter's whereabouts.
|
||
|
|
||
|
|
||
|
|
||
|
SCUM IN CYBERSPACE
|
||
|
|
||
|
Op-Ed Page Editorial - The Courier-Journal - Wednesday June 7, 1995
|
||
|
|
||
|
The volume and content of information that reaches children in
|
||
|
their own homes makes parenthood ever more challenging. Movies,
|
||
|
television, printed matter -- they can all influence values and deci-
|
||
|
sions.
|
||
|
Every major advance in information technology, from the printing
|
||
|
press to the cellular phone, has been blamed for misleading the young.
|
||
|
Ideas open up new possibilities, The results are often trying.
|
||
|
Now comes the computer, with its awesome power to bring likemind-
|
||
|
ed folks together in a strange realm of cyberspace. And, regrettably,
|
||
|
to serve as a medium for purveyors of pornography.
|
||
|
The recent disappearance of 13-year-old Tara Noble could, her
|
||
|
parents believe, be connected to contact she made in a computer net-
|
||
|
work "chat room". It's a realistic -- and frightening -- possibility.
|
||
|
But the larger society must not let such occurrences stampede it
|
||
|
into blaming the technology -- which, like every other, is hurtful as
|
||
|
well as beneficial -- or resorting to censorship. Such efforts can't
|
||
|
work. And they run counter to the laws and traditions of a free
|
||
|
nation.
|
||
|
A better idea is to manage the machine better -- by using
|
||
|
electronic wizardry to help parents decide what their children have
|
||
|
access to. That's no guarantee of safety, but it's preferable to
|
||
|
controls on what all citizens read and see.
|
||
|
UNSIGNED
|
||
|
|
||
|
|
||
|
|
||
|
The Courier-Journal -- Wednesday June 7, 1995
|
||
|
DANGER MAY LURK FOR CHILDREN IN ANONYMOUS ONLINE WORLD
|
||
|
By Ric Manning, Business Writer
|
||
|
|
||
|
WRITERS NOTE: Ric Manning is a friend of mine and writes for other
|
||
|
computer publications besides the C-J, where you may have seen his
|
||
|
byline. Doesn't mean I won't take him to task when I feel he is
|
||
|
wrong, just ask him. ricman@iglou.com
|
||
|
|
||
|
|
||
|
This article is a general overview of what can happen and some of
|
||
|
the techno-wizardry which can be used by parents to help prevent
|
||
|
children going where no parent wants them going. There is also men-
|
||
|
tion of both the Washington state and Kentucky runaways.
|
||
|
|
||
|
The most interesting to me is SURFWATCH a new $49.95 screening
|
||
|
program which prevents access to more than 1000 internet sites that
|
||
|
contain sexually oriented material. <800-458-6600> When my son gets
|
||
|
older and begins to surf around a program like that on his computer
|
||
|
seems reasonable to me.
|
||
|
|
||
|
Again we get the comment, this time from Tara's mother that
|
||
|
online services should be regulated. The services respond that par-
|
||
|
ents must assume most of the responsibility for their children's
|
||
|
activities online. (See editorial comments at end.) The National
|
||
|
Center for Missing and Exploited Children along with online services
|
||
|
have produced a brochure called "Child Safety on the Information
|
||
|
Superhighway", which is available online on Compu$erve or through the
|
||
|
center's hotline: 800-THE-LOST. [What is their online address?] If a
|
||
|
CI$ reader would be so kind as to get this and send it in to CuD, it
|
||
|
would be nice.
|
||
|
|
||
|
|
||
|
|
||
|
MISSING GIRL, 13, FOUND UNHARMED IN LOS ANGELES
|
||
|
Monday June 12, 1995 The Courier-Journal
|
||
|
Bill Pike, Staff Writer
|
||
|
|
||
|
|
||
|
WRITERS NOTE: I am going to do excerpts from this article, but, not
|
||
|
the entire thing.
|
||
|
|
||
|
Teen's Flight Linked To Online Contacts
|
||
|
|
||
|
Unharmed but frightened after being away from home for two weeks,
|
||
|
13-year-old Tara Noble call the FBI in Los Angeles yesterday from a
|
||
|
phone booth on Hollywood Boulevard to say she wanted to return home.
|
||
|
[Was it Hollywood & Vine?]
|
||
|
Tara had been missing since May 30, when authorities feared that
|
||
|
she had been lured to California through contacts over her home com-
|
||
|
puter -- perhaps by a man identified only as George in San Francisco.
|
||
|
Tara was in "excellent health and apparently unharmed," said Dave
|
||
|
Kohl, the agent in charge of FBI operations in Kentucky.
|
||
|
(Lisa) Noble and her ex-husband, Sam Noble of Pleasure Ridge Park, found
|
||
|
telephone numbers from across the country for people Tara had met
|
||
|
while chatting on computer networks. They also turned up sexually
|
||
|
explicit material and a message from George, who wrote, "We can run
|
||
|
around our room naked all day and all night."
|
||
|
Kohl declined to give details of Tara's whereabouts or activities
|
||
|
during the past two weeks, although he said she had been in "several
|
||
|
locations".
|
||
|
He acknowledged that the computer played a role in Tara's
|
||
|
disappearance, and he said the case shows the need for parents to
|
||
|
supervise their children's use of computers.
|
||
|
Kohl said that TARA DOES NOT FACE ANY CHARGES AND THAT THE FBI
|
||
|
WILL CONTINUE INVESTIGATING.
|
||
|
He added that "significant media coverage" of Tara's disappear-
|
||
|
ance, as well as an extensive investigation, prompted Tara to call
|
||
|
authorities.
|
||
|
A story in yesterday's [Sunday June 11, 1995. I would like to
|
||
|
have a complete hard copy of this article if someone in l.a. could
|
||
|
send it via snail mail to me.] Los Angeles Times featured Tara and a
|
||
|
15-year-old Washington state boy who was reunited with his parents
|
||
|
after making an unannounced trip to San Francisco to visit a friend he
|
||
|
had met through his computer. [What happened to the MAN who had lured
|
||
|
this boy to San Francisco for gay sex? Now it is an unannounced trip
|
||
|
to visit a friend. Can you say media hype?]
|
||
|
Five FBI field offices worked on Tara's case, interviewing numer-
|
||
|
ous contacts she had made via computer, Kohl said.
|
||
|
HE ALSO SAID A "COOPERATIVE CITIZEN" IN SAN FRANCISCO NOTIFIED
|
||
|
THE FBI THERE YESTERDAY THAT TARA WAS IN LOS ANGELES. [I guess you
|
||
|
would be cooperative if Special Agents of the FBI came knocking on
|
||
|
your door and asking you questions about a 13-year-old runaway girl]
|
||
|
|
||
|
|
||
|
|
||
|
EDITORIALIZING
|
||
|
|
||
|
Without exception everyone in the community here, both online and
|
||
|
offline, that I have discussed the Tara Nobles case with have said the
|
||
|
same things. There are bigger problems in the family than a 13 y.o.
|
||
|
running away because of a friend on AOL. Kids have been running
|
||
|
away to California for as long as I can remember reading newspapers
|
||
|
and that is a few years now, and the fact that Tara met this person
|
||
|
via computer makes it different, but certainly not unique.
|
||
|
|
||
|
How come a parent lets a bright student suddenly spend dozens of hours
|
||
|
online? They got the computer in April and Tara ran away in May. She
|
||
|
was on AOL. Lets see 30 days worth of online fees get charged to the
|
||
|
old credit card. The credit card bill comes in. Mom nearly has a
|
||
|
heart attack. Mom unplugs the telephone line from the computer.
|
||
|
Daughter gets seriously upset. Daughter decides to go join her online
|
||
|
friend(s) so she can stay online. I dunno maybe my thinking here is
|
||
|
off.
|
||
|
|
||
|
I am consistently and constantly disappointed in the reporting of the
|
||
|
C-J on most computer stories. This is no exception. Voskuhl shows a
|
||
|
lack of understanding of the Information Superhighway when he writes
|
||
|
about Tara chatting on computer networks, after identifying AOL as the
|
||
|
service provider. The final paragraph dealing with a mother waiting
|
||
|
to find out about her runaway daughter and the hourglass was just too
|
||
|
sticky for my taste. The Facts, Just the Facts, in a NEWS article.
|
||
|
|
||
|
I appreciate the C-J's support of personal freedom. I wish they would
|
||
|
just go further with it. If the Op-Ed page editorial writers were as
|
||
|
doggedly determined on protecting all of us from censorship as they
|
||
|
are on open records or preventing the building of an interstate bridge
|
||
|
near the home of the editor of the opinion pages, Keith Runyon, per-
|
||
|
haps my two senators would get a clue and vote no on Exon's bill.
|
||
|
|
||
|
We are getting the same government needs to provide control relative
|
||
|
to the internet that has come and gone for years on controlling TV,
|
||
|
Movies, Music, et.al., vices that children can come in contact with if
|
||
|
not supervised. The key is parenting. My son does not watch Beavis
|
||
|
and Butthead, although he would love too, nor MTV, nor violent movies
|
||
|
on TV. He does not listen to music I find offensive. He has never
|
||
|
had a toy gun, although he has made several with his erector set, or
|
||
|
sticks, or whatever is convenient and looks close enough to suit his
|
||
|
needs at the moment. The point is I control his socio-environment.
|
||
|
That is parenting. That is the responsibility you take on when you
|
||
|
decide to bring a life into this world. When he is older and skilled
|
||
|
enough I will get him online. But, he is not gonna be reading the
|
||
|
alt.sex. news groups. Well certainly not until he figures out how to
|
||
|
get around how I have his system set up. It is not up to Sen. Exon,
|
||
|
or the guvmint, to control the internet, it is up to the parent to
|
||
|
take back control of their family and instill the morals and values
|
||
|
that they believe in, not the values of a senator or a president
|
||
|
wannabe or even a vice-presidents wife.
|
||
|
|
||
|
End of Editorial Comments
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 10 Jun 1995 12:46:06 -0500 (CDT)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: 4-- Tutorial: Social Engineering vs Psychological Subversion (fwd)
|
||
|
|
||
|
Note: Susan Thunder has also promised to write "her side of the story" as
|
||
|
opposed to what is chronicled in Cyberpunk, (Katie Hafner and John Markoff)
|
||
|
|
||
|
David Smith * "Where children dare to tread, the footsteps
|
||
|
bladex@bga.com * of censorship are sure to follow"
|
||
|
President, EFF-Austin * Fight the Communications Decency Act.
|
||
|
Board of Directors, CTCLU * Send e-mail to vtw@vtw.org w/ "send info"
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
From: thunders@ix.netcom.com (Susan Thunder )
|
||
|
Newsgroups: alt.2600,alt.fan.kevin-mitnick
|
||
|
Subject: 5--Tutorial: Social Engineering vs Psychological Subversion
|
||
|
Date: 3 Jun 1995 06:56:25 GMT
|
||
|
|
||
|
|
||
|
What is the difference between "social engineering" vs "psychological
|
||
|
subversion"???
|
||
|
|
||
|
I will be offering a series of tutorials on these subjects, starting
|
||
|
below, but first I would like to post a challenge to all you REAL
|
||
|
superhackers out there:
|
||
|
|
||
|
Back in the days of 8BBS and other early '80's boards, the hacker ethic
|
||
|
was such that one who imagined him/herself to be a superhacker would
|
||
|
PROVE him/herself by the QUALITY of the posts (s)he left. If a novice
|
||
|
hacker asked a question, those of us who were of the elite pantheon
|
||
|
would all try to outdo each other in a game of one-upsmanship to see
|
||
|
who could post the most informative and/or useful reply! We
|
||
|
demonstrated our ability by the reliabiltity of the information we
|
||
|
provided to these newcomer queries, and it made for one HELLUVA
|
||
|
competitive and informative BBS.
|
||
|
|
||
|
So here's my challenge: Instead of all you so-called experts out there
|
||
|
falling all over each other trying to outflame the novices, let's see
|
||
|
you SHOW YOUR STUFF! Let's let the cream rise to the top, guys/gals!
|
||
|
Let's get this newsgroup back on track--it's a simple fact of life that
|
||
|
there will be a continuing flood of newcomers to the net, so let's work
|
||
|
together instead of against each other!
|
||
|
|
||
|
Let's face it: If *WE* don't keep an eye on Big Brother, nobody will.
|
||
|
One of the main goals of communism in its efforts to subvert capitalist
|
||
|
society was to sow dissention and mistrust among the more inquisitive
|
||
|
political organizations--could it be that the feds are trying to do the
|
||
|
same to us, a potentially VERY POWERFUL segment of today's cutting-edge
|
||
|
theorists? ***>DON'T LET THEM WIN!<*** Let's join together and
|
||
|
disseminate information freely rather than withhold it!
|
||
|
|
||
|
-------[Stepping down from the soapbox...]-------
|
||
|
|
||
|
Tutorial: Social Engineering vs Psychological Subversion Part 1
|
||
|
|
||
|
Social Engineering has been defined as the art of manipulating
|
||
|
information out of a given person with a view towards learning
|
||
|
information about or from a given EDP system. The techniques are
|
||
|
relatively simple, and I will go into greater detail and provide
|
||
|
examples in a future tutorial. Essentially, the methodology consists
|
||
|
of pulling off a telephone ruse to get the persona at the other end of
|
||
|
the line to give you passwords or read you data off of their computer
|
||
|
screen. Sometimes the techniques involve intimidation or blackmail.
|
||
|
Again, I will explore these techniques further in my next tutorial, but
|
||
|
first I want to address the differences between Social Engineering (a
|
||
|
lousy, non-descriptive term IMHO) and Psychological Subversion.
|
||
|
|
||
|
Psychological Subversion (PsySub) is a very advanced technique that
|
||
|
employs neural linguistic programming (nlp), subconscious suggestions,
|
||
|
hypnotic suggestions, and subliminal persuasion. Essentially, you want
|
||
|
to plant the idea in the subject's mind that it's okay to provide you
|
||
|
with the information you seek to obtain. the precise methods vary
|
||
|
according to the environment, but I will use the Miliary as an example
|
||
|
since they are very easily manipulated as a result of their inherent
|
||
|
compulsion to obey any directive emanating from a higher-ranking
|
||
|
officer.
|
||
|
|
||
|
If you would like to bypass a tempested system housed inside a SCIF
|
||
|
that employs multi-level/multi-keyed encryption methodology, the most
|
||
|
productive method I have ever encountered is to call inot the SCIF on
|
||
|
the appropriate autovon line (DMS-100, what a joke anyway), and firmly
|
||
|
inform the corporal or sergeant that answers the phone that you are
|
||
|
Specialist So-and-so calling on behalf of General such-and-such (the
|
||
|
base commandant is a good choice to use but be sure you use his
|
||
|
secretary's/("Specialist's) real name) and state that the General would
|
||
|
like to know WHY HE CANNOT ACCESS HIS ACCOUNT! Naturally, the
|
||
|
low-ranking dupe on the other end of the phone line will be much more
|
||
|
concerned about getting into potential trouble by pissing off the
|
||
|
general than he will be concerned about the established security
|
||
|
procedures.
|
||
|
|
||
|
Often-times, it will be necessary to take him step-by-step through the
|
||
|
already obvious (to you) process of explaining WHY the account isn't
|
||
|
"working..." (The real reason, FYI, is because Top Secret and higher
|
||
|
systems are not supposed to have any external connections to phone
|
||
|
lines outside the SCIF). What you need to do is talk the dupe through
|
||
|
the process of creating/enabling a remote access line (i.e. dialup),a
|
||
|
nd it helps to have a definable STU-III dataset to exchange encryption
|
||
|
keys with him. Failing passession of such a device, you just pretend
|
||
|
that you've tried to access the system anyway, and for some reason the
|
||
|
encryption devices aren't handshaking properly. At this point you
|
||
|
either convince him that he could be in very big trouble for
|
||
|
insubordination if he doesn't cooperate and give the "general"
|
||
|
immediate access, albeit unencrypted, or you can simply have the poor
|
||
|
sod READ you the data off of his screen! Oftentimes, you can even get
|
||
|
the fool to print out various materials that you would like to view,
|
||
|
and have him mail/deliver/ftp etc these items via another system.
|
||
|
|
||
|
In other words, to bypass encryption, just have a legitimate user read
|
||
|
and print the data you wish to acquire--intimidation works with some
|
||
|
people. With others you need to flirt. Some are simply the helpful
|
||
|
type of person who will accomodate your request with very little
|
||
|
fanfare. In a couple of cases, I have had to play a subliminal tape
|
||
|
over the phone line as I spoke to the subject. The tape would embed
|
||
|
instructions and reasurrance into the subject's mind on a subconscious
|
||
|
level that they were not even aware of.
|
||
|
|
||
|
Ususally, if there is something you want very badly, it may take
|
||
|
several contacts to build up rapport and level of trust before you
|
||
|
begin to lay the guilt trips on them about "haven't I been a friend to
|
||
|
you? I might get in BIG trouble if I don't remember the "general's"
|
||
|
password and username. Please, help me out of this mess..." You'd be
|
||
|
surprised at how many people fall for this ruse!
|
||
|
|
||
|
Now I have a comment about how certain persons chose to utilize these
|
||
|
very powerful nlp techniques. For instance, there is a well-known
|
||
|
hacker who is selling (or trying to, anyway) these awesomely powerful
|
||
|
techniques to men who desire to simply get-laid! What a fucking waste
|
||
|
of time, effort, and talent. Evidently the man in question has nothing
|
||
|
better to do with this remarkable knowlegde that compromise an already
|
||
|
vulnerable and probably lonely woman...
|
||
|
|
||
|
If this hacker would apply his substantial knowledge on this subject to
|
||
|
a socially useful endeavor, instead of efforts that lead to nothing
|
||
|
more than brief personal satisfaction at the lonely woman's emotional
|
||
|
expense, then HE could be a force to reckon with!
|
||
|
|
||
|
Pleae address questions and comments to the newsgroup and NOT my email
|
||
|
(unless it's very personal) because I would like to see an intelligent
|
||
|
exchange of useful information in this newsgroup again!
|
||
|
|
||
|
Are any of you so-called superhackers up to the challenge of proving
|
||
|
your knowledge and "pedigree" in a public forum where all can see the
|
||
|
results of your effots? Let's get this group back on track...after
|
||
|
all, we all started somewhere! Now this flood of aolers and ixers kind
|
||
|
of makes it necessary to slog though alot of crap, but there ARE useful
|
||
|
and informative posts buried within threads that have long since
|
||
|
migrated away from thier origianl intents.
|
||
|
|
||
|
I will post more specific hacks in my next "tutorial!"
|
||
|
|
||
|
REGARDS,
|
||
|
THUNDER (Susan)
|
||
|
|
||
|
|
||
|
Hey guys: Please pray for Kevin's early release from jail, and write
|
||
|
to him too if you can!
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.49
|
||
|
************************************
|
||
|
|