1643 lines
74 KiB
Plaintext
1643 lines
74 KiB
Plaintext
|
|
Computer underground Digest Sun May 28, 1996 Volume 8 : Issue 39
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.39 (Sun, May 28, 1996)
|
|
|
|
File 1--The Civil Liberies On-line Circus
|
|
File 2--Article #12 of France's proposed telecoms law
|
|
File 3--University of Wisconsin/Madison hires cyber-police
|
|
File 4--19 year old arrested for making terrorist threats
|
|
File 5--Nat'l Jrnl article sez net-activism is just political hicks
|
|
File 6--Cyber Sit-in
|
|
File 7--(fwd fyi) Internet a Broadcast Media?
|
|
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 23 May 96 04:00:19 EDT
|
|
From: Lance Rose <72230.2044@CompuServe.COM>
|
|
Subject: File 1--The Civil Liberies On-line Circus
|
|
|
|
The Civil Liberties Online Circus: Why Bother with Real Life When
|
|
We Can Yell About Heaven and Hell?
|
|
|
|
Civil liberties groups are rallying the troops of good netizens
|
|
against one absurd, banal evil after another. What are today's
|
|
greatest hits? (1) The CDA, (2) the crypto software battles, and
|
|
(3) the proposed NII copyright legislation.
|
|
|
|
|
|
It's understandable that civil liberties groups have to yell louder.
|
|
They need to combat the moves of powerful, well-connected industry
|
|
and political groups. There's a sinking feeling, however, that they
|
|
might be losing a little perspective amidst all their exhorting.
|
|
Let's look at the 3 big battles mentioned above.
|
|
|
|
1. The CDA has been labeled some sort of showdown on the future of
|
|
free speech on the Internet. Hey, check your calendar -- we're
|
|
still in the prehistory of the digital era. It's a little early for
|
|
showdowns when we're only learning how to crawl. The current CDA
|
|
fight is just the latest battleground in a moral/legal debate that
|
|
in the past half century has stretched from books, to comic books,
|
|
to television, to telephone, to computer games, and now to online
|
|
transmissions. This infinitely rewinding moral play may make for
|
|
good drama for some, but the real action on online free speech --
|
|
where there is some prospect for defining rights, rather than the
|
|
routine compromise between moralists and free speech advocates we
|
|
will inevitably see play out in the CDA -- will be elsewhere.
|
|
|
|
How deeply are CDA opponents getting lost in the hype? Check this
|
|
out: One of their arguments against the CDA is that it wrongly
|
|
seeks to impose the "indecency" standard from television -- a
|
|
"pervasive" medium -- on the supposedly non-"pervasive" Internet.
|
|
This is a creditable legal argument (though it begs the question on
|
|
"pervasiveness" until the Su. Ct. gets its hands on the issue).
|
|
Another of their arguments is that if an indecency standard is
|
|
indeed applied to the Internet, it would be impossible to enforce
|
|
meaningfully, and would shut down practically all speech. Whoa --
|
|
let's circle back to the top now. Isn't an indecency standard of
|
|
some sort very much in place for television today? And isn't
|
|
television a hugely popular mass medium, at the very center of U.S.
|
|
and other societies?
|
|
|
|
Seems these two arguments don't hang together, unless we all share
|
|
some very damning assessments of the current TV system, which is not
|
|
very likely. In other words, the anti-CDA position is not logically
|
|
consistent -- it's just an all-out opposition to the CDA. That's
|
|
fine, but let's at least recognize it for what it is, rather than a
|
|
position derived axiomatically from bedrock-strong First Amendment
|
|
first principles. Some litigators among us, round about now, might
|
|
contend that good adversaries legitimately plead alternative
|
|
theories, but that's my point. They're alternative theories, and
|
|
fairly mutually exclusive, to boot.
|
|
|
|
2. On to the crypto battles. Will common netizens have the right
|
|
to encrypt their messages without handing their encryption keys over
|
|
to the government? Who knows, but there's lots of fighting going
|
|
on, and more doomsaying predictions that we're battling over the
|
|
deepest privacy questions ever. The feds want our crypto keys, and
|
|
they've rolled out Clipper 3 now, just to show how belligerent they
|
|
are about it. The civil liberties groups are running test cases,
|
|
grass roots campaigns, cultivating politician champions and pursuing
|
|
various other agendas in a truly all-out effort to save crypto for
|
|
all of us.
|
|
|
|
But what is crypto, really, but just an awkward way of hiding
|
|
things? We're not talking about the underlying math, of course,
|
|
designed by guys next to whose intellects most of us are just chimps
|
|
in lab cages. Rather, what is crypto used for? It is used to hide
|
|
a message right in someone else's face. It is like sticking a
|
|
self-incriminating note in a physical capsule that is uncrackably
|
|
hard and strong, then lobbing the capsule through the window of a
|
|
police station to sit in the middle of the floor among a bunch of
|
|
cops, powerless to open it up and figure out how to get the perp.
|
|
Gee, is that really the best way to hide a message (given that the
|
|
cops" first move will be to look outside for those responsible)? Or
|
|
is it better to leave the cops blissfully unaware of the message's
|
|
existence, or its true nature, so they never even get close to the
|
|
point of having an encrypted message they're trying to crack?
|
|
|
|
You probably get the point by now. Encryption rights are the brute
|
|
force, crude wood cudgel approach to achieving message secrecy. Far
|
|
more elegant and effective means of attaining secrecy exist today,
|
|
and will be devised in the future. That's where the action will be
|
|
after the dust has cleared on today's crypto rights battles, no
|
|
matter who "wins" them.
|
|
|
|
3. The proposed "National Information Infrastructure" copyright
|
|
legislation. There's a lot of fire and brimstone being spewed over
|
|
this one, but who has really looked at the proposed law? There
|
|
ain't much there.
|
|
|
|
One part of the proposed law gives a copyright owner control over
|
|
"transmissions" of works online. The opposing civil liberties
|
|
people say this will make browsing on the Net illegal. What?
|
|
|
|
If the online copyright proposal would make browsing on the Net
|
|
illegal, then it's already illegal today. That's right. Copyright
|
|
owners today control rights to make "copies" of their works. If you
|
|
copy my text on your computer, even in RAM, you've made a copy of my
|
|
work, and theoretically violated my copyright. Then why aren't
|
|
copyright owners already suing everyone on the Internet? Because,
|
|
first, the very way the Net works is by people putting up materials
|
|
for others to browse. Second, enforcement against individual
|
|
browsing users is nearly impossible. Third, browsing users have a
|
|
very, very good argument that anyone who voluntarily places their
|
|
materials into an online environment where it will be routinely and
|
|
customarily browsed implicitly licenses such use of their materials.
|
|
|
|
If the new proposal turns the current "copying" right into a
|
|
so-called "transmission" right when it happens across a network,
|
|
this is no more than a change in terminology. The same factors
|
|
described above apply as much to "transmissions" involving browsing
|
|
users as to "copying" involving browsing users.
|
|
|
|
The other major part of the proposed law makes various efforts to
|
|
hack copy protection schemes illegal. Why are some people concerned
|
|
about this? Have you seen the Web lately? We're not exactly
|
|
suffering an information shortage. Copy protection will take some
|
|
stuff out of the public flow, but probably not a whole lot. What we
|
|
do have right now are some very wary publishers, unwilling to make
|
|
certain investments in online information unless they know they can
|
|
protect it heavily if they feel a need to do so. We also have a
|
|
bunch of hackers who are indeed ready to grab anything they can get
|
|
their hands on, the more protected the better. So this part of the
|
|
law calms the publishers down, tells them it's safe to go in the
|
|
water. Does it really consign the Net to hell, as some civil
|
|
liberties groups seem to think, merely to give some legal protection
|
|
to copy protection devices? No.
|
|
|
|
|
|
Here comes the part that you may find hard to believe: in all the
|
|
battles mentioned above, I personally side with the civil liberties
|
|
groups every single time. Then why the criticisms? It looks like
|
|
these groups, with their admirable principles and agendas, are
|
|
increasingly getting lost in hyperbole and losing important
|
|
perspective. Frankly, the shrillness is beginning to hurt my ears.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 12:17:03 +0100
|
|
From: Jean-Bernard Condat <jeanbc@INFORMIX.COM>
|
|
Subject: File 2--Article #12 of France's proposed telecoms law
|
|
|
|
Paris, May 23, 1996: There is an EC regulation called which applies to
|
|
all EC countries.
|
|
This restricts the use of cryptography in the context of weapons of
|
|
mass destruction, but not for any other purpose. The UK also has an
|
|
export licensing requirement which is similar in scope. France, on
|
|
the other hand, has much wider restrictions. The EC regulation is
|
|
"Dual-Use and Related Goods (Export Control) Regulations" and the UK
|
|
is "Export of Goods (Control) Order".
|
|
|
|
Attached is a message containing the pending French legislation,
|
|
followed by some comments. I hope this is helpful to readers on both
|
|
sides of the pond.
|
|
|
|
[Tuesday, 07 May 96 08:30:54 EST, "jean-bernard condat" <condat@atelier.fr>
|
|
writte:]
|
|
---------------
|
|
Art. 12
|
|
|
|
Article 28 of the Law No. 90-1170 dated December 29, 1990, on
|
|
telecommunications regulation is hereby amended as follows:
|
|
|
|
I - Section I is hereby amended as follows:
|
|
|
|
1) The first paragraph shall be completed by the following
|
|
phrase: "Secret coding method denotes all materials or programs
|
|
conceived or modified for the same purpose."
|
|
|
|
2) The second and third paragraphs are hereby replaced by the
|
|
following provisions:
|
|
|
|
"To preserve the interests of national defense and the internal
|
|
or external security of the State, while permitting the
|
|
protection of information and the development of secure
|
|
communications and transactions,
|
|
|
|
1) the use of a secret coding method or service shall be:
|
|
|
|
a) allowed freely:
|
|
|
|
- if the secret coding method or service does not allow the
|
|
assurance of confidentiality, particularly when it can only be
|
|
used to authenticate a communication or ensure the integrity of
|
|
the transmitted message;
|
|
|
|
- or if the method or the service assures confidentiality and
|
|
uses only coding conventions managed according to the procedures
|
|
and by an organization approved under the conditions defined in
|
|
Section II;
|
|
|
|
b) subject to the authorization of the Prime Minister in other
|
|
cases.
|
|
|
|
2) the supply, importation from countries not belonging to the
|
|
European Community, and exportation of secret coding methods as
|
|
well as services:
|
|
|
|
a) shall require the prior authorization of the Prime Minister
|
|
when they assure confidentiality; the authorization may require
|
|
the supplier to reveal the identity of the purchaser;
|
|
|
|
b) shall require declaration in other cases."
|
|
|
|
3) A decree sets the conditions under which the declarations are
|
|
signed and the authorizations approved. This decree provides
|
|
for:
|
|
|
|
a) a simplified system of declaration or authorization for
|
|
certain types of methods or services or for certain categories of
|
|
users;
|
|
|
|
b) the substitution of the declaration for the authorization, for
|
|
transactions concerning secret coding methods or services whose
|
|
technical characteristics or conditions of use, while justifying
|
|
a certain attention being paid with regard to the aforementioned
|
|
interests, do not require the prior authorization of these
|
|
transactions;
|
|
|
|
c) the waiver of all prior formalities for transactions
|
|
concerning secret coding methods or services whose technical
|
|
characteristics or conditions of use are such that the
|
|
transactions are not capable of damaging the interests mentioned
|
|
at the beginning of this paragraph.
|
|
|
|
II - Section II is hereby replaced by the following provisions:
|
|
|
|
"II - Organizations responsible for managing, on behalf of
|
|
others, the coding conventions for secret coding methods or
|
|
services that allow the assurance of confidentiality must be
|
|
approved in advance by the Prime Minister.
|
|
|
|
They are obligated to maintain professional confidentiality in
|
|
the exercise of their approved activities.
|
|
|
|
The approval shall specify the methods and services that they may
|
|
use or supply.
|
|
|
|
They shall be responsible to preserve the coding conventions that
|
|
they manage. Within the framework of application of the Law No.
|
|
91-646 dated July 10, 1991, concerning the confidentiality of
|
|
correspondence sent via telecommunications, and within the
|
|
framework of investigations made under the rubric of Articles 53
|
|
et seq. and 75 et seq. of the Code of Criminal Procedure, they
|
|
must release them to judicial authorities or to qualified
|
|
authorities, or implement them according to their request.
|
|
|
|
They must exercise their activities on domestic soil.
|
|
|
|
A decree in the Council of State sets the conditions under which
|
|
these organizations shall be approved, as well as the guarantees
|
|
which the approval shall require; it specifies the procedures and
|
|
the technical provisions allowing the enforcement of the
|
|
obligations indicated above.
|
|
|
|
III - a) Without prejudice to the application of the Customs
|
|
Code, the fact of supplying, importing from a country not
|
|
belonging to the European Community, or exporting, a secret
|
|
coding method or service, without having obtained the prior
|
|
authorization mentioned in I or in violation of the conditions of
|
|
the granted approval, shall be punishable by six months
|
|
imprisonment and a fine of FF 200,000.
|
|
|
|
The fact of managing, on behalf of others, the coding conventions
|
|
for secret coding methods or services that allow the assurance of
|
|
confidentiality, without having obtained the approval mentioned
|
|
in II or in violation of the conditions of this approval, shall
|
|
be punishable by two years imprisonment and a fine of FF 300,000.
|
|
|
|
The fact of supplying, importing from a country not belonging to
|
|
the European Community, or exporting, a secret coding method or
|
|
service, in order to facilitate the preparation or commission of
|
|
a felony or misdemeanor, shall be punishable by three years
|
|
imprisonment and a fine of FF 500,000.
|
|
|
|
The attempt to commit the infractions mentioned in the preceding
|
|
paragraphs shall be punishable by the same penalties.
|
|
|
|
b) The natural persons guilty of the infractions mentioned under
|
|
a) shall incur the complementary penalties provided for in
|
|
Articles 131-19, 131-21, and 131-27, as well as, either
|
|
indefinitely or for a period of five years or longer, the
|
|
penalties provided for in Articles 131-33 and 131-34 of the
|
|
Criminal Code.
|
|
|
|
c) Judicial persons may be declared criminally responsible for
|
|
the infractions defined in the first paragraph under the
|
|
conditions provided for in Article 121-2 of the Criminal Code.
|
|
The penalties incurred by judicial persons are:
|
|
|
|
1) the fine according to the modalities provided for by Article
|
|
131-38 of the Criminal Code;
|
|
|
|
2) the penalties mentioned in the Article L. 131-39 of the same
|
|
code. The prohibition mentioned in 2) of this article L. 131-39
|
|
concerns activities, during the exercise of which, or on the
|
|
occasion of the exercise of which, the infraction was committed."
|
|
|
|
III - Section III becomes IV.
|
|
|
|
Its last paragraph is hereby replaced by the following
|
|
provisions:
|
|
|
|
"The fact of refusing to supply information or documents, or of
|
|
obstructing the progress of the investigations mentioned in this
|
|
section IV, shall be punishable by six months imprisonment and a
|
|
fine of FF 200,000."
|
|
|
|
IV - Section IV becomes V.
|
|
|
|
After the word "authorizations," the words "and declarations" are
|
|
hereby inserted.
|
|
|
|
V - A section VI is hereby added, formulated as follows:
|
|
|
|
"VI - The provisions of this article shall not hinder the
|
|
application of the Decree dated April 18, 1939, establishing the
|
|
regulation of war materials, arms, and munitions, to those secret
|
|
coding methods which are specially conceived or modified to allow
|
|
or facilitate the use or manufacture of arms."
|
|
|
|
VI - This article is applicable to overseas territories and to
|
|
the territorial commonwealth of Mayotte.
|
|
|
|
Copyright 1996 Steptoe & Johnson LLP
|
|
|
|
Steptoe & Johnson LLP grants permission for the contents of this
|
|
publication to be reproduced and distributed in full free of
|
|
charge, provided that: (i) such reproduction and distribution is
|
|
limited to educational and professional non-profit use only (and
|
|
not for advertising or other use); (ii) the reproductions or
|
|
distributions make no edits or changes in this publication; and
|
|
(iii) all reproductions and distributions include the name of the
|
|
author(s) and the copyright notice(s) included in the original
|
|
publication.
|
|
---------------
|
|
In trying to analyze the impact of the proposed law, I would note
|
|
the following:
|
|
|
|
Section I:
|
|
|
|
Paragraph 1 (a), first bullet, seems to explicitly allow digital
|
|
signatures, and does not require that the secret keys used for such
|
|
purposes be escrowed.
|
|
|
|
Paragraph 1 (a), second bullet, in combination with Section II,
|
|
strongly hints at a requirement for key escrow. Conceivably,
|
|
depending on the details of Law No 91-646 dated July 10, 1991
|
|
concerning the confidentiality of correspondence sent via
|
|
telecommunications, the use of short keys that might expose
|
|
information to unauthorized individuals (a la the IBM masked DES
|
|
and Lotus Notes solution) might even be prohibited!
|
|
|
|
Paragraph 1 (b) provides an escape clause for certain favored
|
|
activities (and/or organizations?). Presumably international
|
|
standards such as Visa/MasterCard's SET, which apply strong
|
|
confidentiality to only certain data fields, notably the
|
|
cardholders account number, would be permitted under this kind of
|
|
an exception. Banking transactions and other sensitive information
|
|
may also be excluded from the key escrow requirement, especially if
|
|
(since) the Government could subpoena the bank's records directly.
|
|
This is further borne out by paragraph 3, (a, b, and c).
|
|
|
|
Paragraph 1 seems to apply to the use of encryption, as opposed to
|
|
the supply, import, or export. However, unless such use is covered
|
|
by Law No. 91-646, the proposed amendment does not seem to apply
|
|
criminal or civil penalties to such use.
|
|
|
|
Paragraph 2 is interesting, in that it differentiates between
|
|
"supply" and "importing from countries not belonging to the
|
|
European community". This may be a techni-cality of the European
|
|
Community import/export laws -- perhaps importation from countries
|
|
within the European Community no longer has any meaning, since such
|
|
customs barriers were supposed to have been removed. I would
|
|
interpret "supply" to include the offering for sale, or even
|
|
distributing for free, such code, even by a French citizen. This
|
|
would therefore appear to apply to the (re-)distribution of PGP
|
|
and/or any home-grown French products, as well as any encryption
|
|
products originating within the EC. If so, this would seem to be
|
|
more even-handed with respect to imports from the US and elsewhere
|
|
than might otherwise appear, and may obviate any claim that the law
|
|
would violate the World Trade Organization's Most Favored Nation
|
|
agreements. The apparent import preference for EC products simply
|
|
reflect's France's obligation to allow the free flow of goods
|
|
within the EC.
|
|
|
|
Paragraph 3 seems to provide for some simplified administrative
|
|
mechanisms that may be less onerous than a case by case review. IN
|
|
US terms, this may be similar to requesting a commodity
|
|
jurisdiction from Commerce, rather than having encryption being
|
|
construed as following under the ITARs. If so, we should certainly
|
|
investigate these options. Subparagraphs b and c may apply to the
|
|
use of relatively short keys, or for transactions of limited scope,
|
|
e.g., for SET.
|
|
|
|
Section II defines conditions for establishing and approving escrow
|
|
agencies. Given the requirement for "professional
|
|
confidentiality", I would not be at all surprised if the civil law
|
|
"notaires" didn't jump at the chance to get into this business.
|
|
|
|
The requirement that they exercise their activities on French soil
|
|
is rather obscure. The prior language doesn't explicitly say that
|
|
anything about escrow, nor where the escrowed keys must be
|
|
maintained -- it only talks about the management of coding
|
|
conventions, and the requirement to comply with the requirements of
|
|
the Code of Civil Procedure, which presumably requires that they
|
|
divulge the keys and/or the text of any confidential messages upon
|
|
demand by a proper authority. But a literal reading of the text
|
|
would suggest that a standards organization that manages and
|
|
preserves the coding conventions would have to carry out their
|
|
activities on French soil, while the escrow repository might be
|
|
elsewhere.
|
|
|
|
Section III certainly makes it clear that they are serious about
|
|
all this. The natural persons who have committed, or even
|
|
attempted to commit acts in violation of the Act are subject to
|
|
fines and imprisonment, and I would hazard a guess that the
|
|
Articles 131-33 and 131-34 would debar them from participating in
|
|
any future importing or exporting.
|
|
|
|
Corporations (judicial persons) may be held criminally responsible
|
|
for any infractions caused by their employees, and I would assume
|
|
that Article 131-39 would also lead to a debarment for future
|
|
import or export, in exactly the same manner as US export
|
|
violations would.
|
|
|
|
Section VI makes the Act applicable to overseas territories, which
|
|
means that some of the more obscure areas and countries would also
|
|
be covered, such as French Guiana, etc.
|
|
|
|
Disclaimer: I am not a French attorney, nor someone who is at all
|
|
knowledgeable about EC law. The preceding analysis should not be
|
|
construed as any kind of an official position. Go get your own
|
|
hired guns if you need advice!
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 04:59:21 -0700 (PDT)
|
|
From: Declan McCullagh <declan@eff.org>
|
|
Subject: File 3--University of Wisconsin/Madison hires cyber-police
|
|
|
|
[Now _this_ is a disturbing turn of events, though I suppose it was
|
|
inevitable. "Electronic recidivism rates?" --Declan]
|
|
|
|
|
|
// declan@eff.org // I do not represent the EFF // declan@well.com //
|
|
|
|
|
|
Chicago Tribune
|
|
May 20, 1996 Monday, FINAL EDITION
|
|
NEWS; Pg. 3; ZONE: M; In the Midwest.
|
|
LENGTH: 317 words
|
|
BYLINE: Compiled by David Elsner.
|
|
DATELINE: MADISON, WISCONSIN
|
|
|
|
BODY:
|
|
|
|
The University of Wisconsin -Madison is planning to hire a computer cop
|
|
to police the electronic traffic of its students and faculty.
|
|
|
|
The "network investigator" would examine pranks, harassment, copyright
|
|
infringement, software thievery and other computer system misuses and
|
|
abuses, officials said.
|
|
|
|
....................
|
|
|
|
UW-Madison is now advertising the full-time post. Officials envision an
|
|
investigator who will track down, retrieve and restore offending
|
|
electronic communication. The evidence would be turned over to university
|
|
officials or police.
|
|
|
|
Five years ago, relatively few students and faculty members had Internet
|
|
access and electronic mail, or e-mail. Today, university officials handle
|
|
50,000 separate computer accounts, and a part-time investigator has not
|
|
been able to keep up with the volume.
|
|
|
|
During the spring semester,
|
|
officials received an average of two to three complaints a week about
|
|
computer abuses, said Susan Puntillo, of UW-Madison's Division of
|
|
Information Technology.
|
|
|
|
Years ago, warnings and reprimands generally sufficed. Even now, once
|
|
chastised, few repeat their offense. Puntillo estimated electronic
|
|
recidivism rates at less than 1 percent.
|
|
|
|
....................
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 25 May 1996 20:49:53 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 4--19 year old arrested for making terrorist threats
|
|
|
|
The first quotation is an AP article excerpt about a college student
|
|
arrested for making a terrorist threat via a Usenet post.
|
|
|
|
The second excerpt is the text of the actually message in question.
|
|
|
|
--- Excerpt 1 ----
|
|
|
|
NET THREAT IS TRACED TO STUDENT
|
|
|
|
SACRAMENTO (AP) - An Internet message declaring an "open season"
|
|
on state Sen. Tim Leslie because of the lawmaker's stance on
|
|
mountain lions has been traced to a 19-year-old college student in
|
|
El Paso, Texas, authorities say.
|
|
Jose Eduardo Saavedra was arrested on a no-bail warrant based on
|
|
felony charges filed in Sacramento alleging that he had made
|
|
terrorist threats and threatened a public official, said El Paso
|
|
County sheriff's Sgt. Don Marshall.
|
|
The computer message posted March 6 read: "Let's hunt Sen. Tim
|
|
Leslie for sport. ... I think it would be great" if he "were
|
|
hunted down and skinned and mounted for our viewing pleasure."
|
|
Leslie, who pushed for a ballot measure that would have removed
|
|
special protections for mountain lions in California, expressed
|
|
relief that an arrest had been made but said the incident raised
|
|
"big new issues" about the use - and misuse - of the Internet.
|
|
...............
|
|
According to Al Locher of the Sacramento County district
|
|
attorney's office, Saavedra was tracked down by investigators
|
|
working on information from his Internet provider, Primenet of
|
|
Arizona.
|
|
---end excerpt---
|
|
|
|
+++++++++++++++++++
|
|
|
|
--- Excerpt 2 ---
|
|
Path--news.primenet.com!zuma
|
|
From--Zuma <zuma@primenet.com>
|
|
Newsgroups:
|
|
talk.environment,sci.environment,talk.politics.animals,rec.pets,ca.politics,rec
|
|
.pets.cats,rec.animals.wildlife,rec.food.veg,alt.save-the-earth
|
|
Subject--Re--Hunting Mountain Lions
|
|
Followup-To:
|
|
talk.environment,sci.environment,talk.politics.animals,rec.pets,ca.politics,rec
|
|
.pets.cats,rec.animals.wildlife,rec.food.veg,alt.save-the-earth
|
|
Date--6 Mar 1996 16:09:00 -0700
|
|
Organization--Primenet (602)395-1010
|
|
Lines--19
|
|
Sender--root@primenet.com
|
|
Message-ID--<4hl5uc$6c4@nnrp1.news.primenet.com>
|
|
References--<4e3573$105e@news.ccit.arizona.edu>
|
|
<wabbit-2401961812250001@ana0020.deltanet.com>
|
|
<4e79n6$5a6@ixnews5.ix.netcom.com> <4e7lfe$bsg@ixnews7.ix.n
|
|
<4g3pk3$7m0@cloner4.netcom.com> <4gnh1u$qur@oracle.damerica.net>
|
|
X-Posted-By--zuma@usr3.primenet.com
|
|
Xref--news.primenet.com talk.environment:58565 sci.environment:94565
|
|
talk.politics.animals:67399 rec.pets:57445 ca.politics:97674
|
|
rec.pets.cats:152834 rec.animals.wildlife:11723 rec.food.veg:78925
|
|
|
|
Instead of huntng Lions in California, let us declare open season
|
|
on State SEN Tim Leslie, his family, everyone he holds near and
|
|
dear, the Cattlemen's association and anyone else who feels that LIONS
|
|
in California should be killed.
|
|
|
|
I think it would be great to see ths slimeball, asshole, conservative
|
|
moron hunted down and skinned and mounted for our viewing pleasure.
|
|
|
|
I would rather see every right-wing nut like scumface Leslie destroyed
|
|
in the name of politicl sport, then lose one mountain lion whose only
|
|
fault is havng to live in a state with a fuck-ed up jerk like this
|
|
shit-faced republican and his supporters.
|
|
|
|
Pray for his death. Pray for all their deaths.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 11:04:50 -0700
|
|
From: Jim Warren <jwarren@well.com>
|
|
Subject: File 5--Nat'l Jrnl article sez net-activism is just political hicks
|
|
|
|
Tommorrow, Washington's politically-powerful National Journal
|
|
reportedly will publish a know-nothing piece of "journalism" saying
|
|
that net-aided politics is essentially nothing but a batch of
|
|
ineffective, know-nothing nerds and back-water political hacks.
|
|
|
|
Check it out on Friday or thereafter -- at www.politicsusa.com -- and
|
|
forward your *informed* comments to the NJ's Editor and Letters
|
|
Editor.
|
|
|
|
--jim
|
|
|
|
On the other hand, maybe we ought to just continue escalating our
|
|
political effectiveness using the net, and let it come as a total
|
|
shock to the Beltway insiders who trust this piece of misinformed
|
|
blather ... when we provide more and more swing votes in contested
|
|
elections -- as already occured with DeFoley8 against ex-Speaker Tom
|
|
Foley, VTW for now-Senator Ron Wyden, me for now-available Calif
|
|
legislative data, the gun BBS against ex-Calif Senate Prez Pro Tem
|
|
David Roberti, etc. :-)
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 27 May 96 12:15 EST
|
|
From: jordanh@iquest.net <jordanh@iquest.net
|
|
Subject: File 6--Cyber Sit-in
|
|
|
|
Well folks,
|
|
|
|
The CDA is STILL legal and AOL and other online providers, not to
|
|
mention the feds are still practicing censorship. I suggest we each
|
|
make a statement.
|
|
|
|
CCA (Creative Coalition on AOL, now OFF AOL) a grass roots
|
|
organization which began when a bunch of AOL poets protested the daily
|
|
censorship of their poems by AOL, is holding a cyber sit-in
|
|
demonstration. It is being sponsored by the ACLU. This forum will
|
|
take place for 24 hours starting on June 2 at 6.a.m. EDT. This will
|
|
be held in two places, one, right under the noses of AOL in the ACLU
|
|
Freedom Hall area of AOL. There will be live chat and in the Freedom
|
|
of Expression folder there will be a place to post letters to your
|
|
congress persons as well as local editors of newspapers. These will
|
|
be forwarded for you. On the net, chat and bulletin boards will be at
|
|
http://www.stjpub.com/cca/
|
|
|
|
AOL poets, atheists, screenwriters, and netizens of every ilk are sick
|
|
of these crummy censorship practices. CCA has represented all artists in
|
|
the quest for freedom of expression. Now it is your turn to let your
|
|
voice be heard. June 2, 24 hours, on AOL and CCA website, please join CCA
|
|
in their demonstration against censorship.
|
|
|
|
|
|
Jordanne Holyoak, media director, CCA
|
|
Dwain Kitchel, web liason, CCA
|
|
http://www.stjpub.com/cca/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 17:02:14 -0700
|
|
From: Jim Warren <jwarren@well.com
|
|
Subject: File 7--(fwd fyi) Internet a Broadcast Media?
|
|
|
|
Date-- Thu, 23 May 1996 15--01--44 EDT
|
|
From-- sap@TANK.RGS.UKY.EDU
|
|
Subject-- Internet a Broadcast Media?
|
|
|
|
From DM News International, April 15, 1996:
|
|
|
|
|
|
European Commission Wants Control Over WWW
|
|
|
|
by Thomas Weyr
|
|
|
|
Brussels - The European Commission has issued yet another draft of its
|
|
Television Without Frontiers directive, this one with a "legal
|
|
clarification" that widens the definition of broadcasting to include
|
|
the Internet.
|
|
The "clarification" states that a moving or non-moving sequence of
|
|
images, whether or not accompanied by sound, constitutes a TV program.
|
|
"I am very worried about this development," said Alistair Tempest,
|
|
director general of FEDIM (the Federation of European Direct
|
|
Marketing), "because broadcasting becomes anything but personal
|
|
correspondence and can be regulated."
|
|
E-mail, Tempest noted, is excepted. Anything else would be fair
|
|
game for national and European regulators, both from the broadcasting
|
|
and the telecom end.
|
|
And such regulations could seriously crimp U.S. direct marketing
|
|
efforts on TV and over the Web.
|
|
The struggle over updating the original TV Without Frontiers
|
|
directive -- first issued in 1989 -- has been underway for over a year.
|
|
The explosive growth of the WWW in recent months has served to
|
|
intensify the conflict.
|
|
"This is a fascinating exercise in how European politics works,"
|
|
Tempest said. He noted that the European Commission -- the
|
|
policy-making bureaucrats in Brussels -- had sent the directive to the
|
|
European parliament in Strasbourg without the expanded broadcast
|
|
definition.
|
|
The parliament debated the issue late last year, and last month
|
|
returned the draft to the EC with a number of proposed amendments
|
|
including this one, which the commission then dutifully incorporated
|
|
into the new draft.
|
|
The decision now rests with representatives of the member states
|
|
in Brussels, who can revise the directive once again or adopt it and
|
|
send it back to the member governments for reconciliation with national
|
|
laws.
|
|
On March 22, experts from the 15 member countries held a meting
|
|
without coming to a conclusion. "They agreed that the more important
|
|
issues, including this one, should be kicked upstairs to the council of
|
|
ministers for resolution," Tempest said.
|
|
Agreement in principle, he added, might be reached next month,
|
|
with a common position worked out over the summer. "I don't expect
|
|
anything concrete to come out till after the summer," he said.
|
|
Fortunately for the direct marketing industry, FEDIM isn't the
|
|
only body up in arms about the implication of the new broadcast
|
|
definition.
|
|
Software manufacturers like Mircosoft and programmers like Time
|
|
Warner and Polygram are also lobbying hard in Brussels to delete the
|
|
"clarification."
|
|
"We have time to put pressure on them," Tempest said.
|
|
|
|
-----------------------------------------------------------------
|
|
|
|
Posted by Adam Starchild
|
|
The Offshore Entrepreneur at http://www.au.com/offshore<<
|
|
|
|
reposted : Gary D. Goodman
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.39
|
|
************************************
|
|
|
|
From TK0JUT2@MVS.CSO.NIU.EDU Wed May 29 15:14 CDT 1996
|
|
Return-Path: <TK0JUT2@MVS.CSO.NIU.EDU>
|
|
Received: from MVS.CSO.NIU.EDU by sun.soci.niu.edu (5.0/SMI-SVR4)
|
|
id AA13631; Wed, 29 May 1996 15:14:33 -0500
|
|
Received: from MVS.CSO.NIU.EDU by MVS.CSO.NIU.EDU (IBM MVS SMTP V2R2.1)
|
|
with BSMTP id 7881; Wed, 29 May 96 15:14:22 LCL
|
|
Message-Id: <9605292014.AA13631@sun.soci.niu.edu>
|
|
Date: Wed, 29 May 96 15:13 CDT
|
|
To: CUDIGEST@SUN.soci.niu.edu
|
|
From: Cu Digest (tk0jut2@mvs.cso.niu.edu) <TK0JUT2@MVS.CSO.NIU.EDU>
|
|
Subject: cud839.go
|
|
Content-Type: text
|
|
Content-Length: 37535
|
|
Status: RO
|
|
X-Status:
|
|
|
|
|
|
Computer underground Digest Sun May 26, 1996 Volume 8 : Issue 39
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.39 (Sun, May 26, 1996)
|
|
|
|
File 1--The Civil Liberies On-line Circus
|
|
File 2--Article #12 of France's proposed telecoms law
|
|
File 3--University of Wisconsin/Madison hires cyber-police
|
|
File 4--19 year old arrested for making terrorist threats
|
|
File 5--Nat'l Jrnl article sez net-activism is just political hicks
|
|
File 6--Cyber Sit-in
|
|
File 7--(fwd fyi) Internet a Broadcast Media?
|
|
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 23 May 96 04:00:19 EDT
|
|
From: Lance Rose <72230.2044@CompuServe.COM>
|
|
Subject: File 1--The Civil Liberies On-line Circus
|
|
|
|
The Civil Liberties Online Circus: Why Bother with Real Life When
|
|
We Can Yell About Heaven and Hell?
|
|
|
|
Civil liberties groups are rallying the troops of good netizens
|
|
against one absurd, banal evil after another. What are today's
|
|
greatest hits? (1) The CDA, (2) the crypto software battles, and
|
|
(3) the proposed NII copyright legislation.
|
|
|
|
|
|
It's understandable that civil liberties groups have to yell louder.
|
|
They need to combat the moves of powerful, well-connected industry
|
|
and political groups. There's a sinking feeling, however, that they
|
|
might be losing a little perspective amidst all their exhorting.
|
|
Let's look at the 3 big battles mentioned above.
|
|
|
|
1. The CDA has been labeled some sort of showdown on the future of
|
|
free speech on the Internet. Hey, check your calendar -- we're
|
|
still in the prehistory of the digital era. It's a little early for
|
|
showdowns when we're only learning how to crawl. The current CDA
|
|
fight is just the latest battleground in a moral/legal debate that
|
|
in the past half century has stretched from books, to comic books,
|
|
to television, to telephone, to computer games, and now to online
|
|
transmissions. This infinitely rewinding moral play may make for
|
|
good drama for some, but the real action on online free speech --
|
|
where there is some prospect for defining rights, rather than the
|
|
routine compromise between moralists and free speech advocates we
|
|
will inevitably see play out in the CDA -- will be elsewhere.
|
|
|
|
How deeply are CDA opponents getting lost in the hype? Check this
|
|
out: One of their arguments against the CDA is that it wrongly
|
|
seeks to impose the "indecency" standard from television -- a
|
|
"pervasive" medium -- on the supposedly non-"pervasive" Internet.
|
|
This is a creditable legal argument (though it begs the question on
|
|
"pervasiveness" until the Su. Ct. gets its hands on the issue).
|
|
Another of their arguments is that if an indecency standard is
|
|
indeed applied to the Internet, it would be impossible to enforce
|
|
meaningfully, and would shut down practically all speech. Whoa --
|
|
let's circle back to the top now. Isn't an indecency standard of
|
|
some sort very much in place for television today? And isn't
|
|
television a hugely popular mass medium, at the very center of U.S.
|
|
and other societies?
|
|
|
|
Seems these two arguments don't hang together, unless we all share
|
|
some very damning assessments of the current TV system, which is not
|
|
very likely. In other words, the anti-CDA position is not logically
|
|
consistent -- it's just an all-out opposition to the CDA. That's
|
|
fine, but let's at least recognize it for what it is, rather than a
|
|
position derived axiomatically from bedrock-strong First Amendment
|
|
first principles. Some litigators among us, round about now, might
|
|
contend that good adversaries legitimately plead alternative
|
|
theories, but that's my point. They're alternative theories, and
|
|
fairly mutually exclusive, to boot.
|
|
|
|
2. On to the crypto battles. Will common netizens have the right
|
|
to encrypt their messages without handing their encryption keys over
|
|
to the government? Who knows, but there's lots of fighting going
|
|
on, and more doomsaying predictions that we're battling over the
|
|
deepest privacy questions ever. The feds want our crypto keys, and
|
|
they've rolled out Clipper 3 now, just to show how belligerent they
|
|
are about it. The civil liberties groups are running test cases,
|
|
grass roots campaigns, cultivating politician champions and pursuing
|
|
various other agendas in a truly all-out effort to save crypto for
|
|
all of us.
|
|
|
|
But what is crypto, really, but just an awkward way of hiding
|
|
things? We're not talking about the underlying math, of course,
|
|
designed by guys next to whose intellects most of us are just chimps
|
|
in lab cages. Rather, what is crypto used for? It is used to hide
|
|
a message right in someone else's face. It is like sticking a
|
|
self-incriminating note in a physical capsule that is uncrackably
|
|
hard and strong, then lobbing the capsule through the window of a
|
|
police station to sit in the middle of the floor among a bunch of
|
|
cops, powerless to open it up and figure out how to get the perp.
|
|
Gee, is that really the best way to hide a message (given that the
|
|
cops" first move will be to look outside for those responsible)? Or
|
|
is it better to leave the cops blissfully unaware of the message's
|
|
existence, or its true nature, so they never even get close to the
|
|
point of having an encrypted message they're trying to crack?
|
|
|
|
You probably get the point by now. Encryption rights are the brute
|
|
force, crude wood cudgel approach to achieving message secrecy. Far
|
|
more elegant and effective means of attaining secrecy exist today,
|
|
and will be devised in the future. That's where the action will be
|
|
after the dust has cleared on today's crypto rights battles, no
|
|
matter who "wins" them.
|
|
|
|
3. The proposed "National Information Infrastructure" copyright
|
|
legislation. There's a lot of fire and brimstone being spewed over
|
|
this one, but who has really looked at the proposed law? There
|
|
ain't much there.
|
|
|
|
One part of the proposed law gives a copyright owner control over
|
|
"transmissions" of works online. The opposing civil liberties
|
|
people say this will make browsing on the Net illegal. What?
|
|
|
|
If the online copyright proposal would make browsing on the Net
|
|
illegal, then it's already illegal today. That's right. Copyright
|
|
owners today control rights to make "copies" of their works. If you
|
|
copy my text on your computer, even in RAM, you've made a copy of my
|
|
work, and theoretically violated my copyright. Then why aren't
|
|
copyright owners already suing everyone on the Internet? Because,
|
|
first, the very way the Net works is by people putting up materials
|
|
for others to browse. Second, enforcement against individual
|
|
browsing users is nearly impossible. Third, browsing users have a
|
|
very, very good argument that anyone who voluntarily places their
|
|
materials into an online environment where it will be routinely and
|
|
customarily browsed implicitly licenses such use of their materials.
|
|
|
|
If the new proposal turns the current "copying" right into a
|
|
so-called "transmission" right when it happens across a network,
|
|
this is no more than a change in terminology. The same factors
|
|
described above apply as much to "transmissions" involving browsing
|
|
users as to "copying" involving browsing users.
|
|
|
|
The other major part of the proposed law makes various efforts to
|
|
hack copy protection schemes illegal. Why are some people concerned
|
|
about this? Have you seen the Web lately? We're not exactly
|
|
suffering an information shortage. Copy protection will take some
|
|
stuff out of the public flow, but probably not a whole lot. What we
|
|
do have right now are some very wary publishers, unwilling to make
|
|
certain investments in online information unless they know they can
|
|
protect it heavily if they feel a need to do so. We also have a
|
|
bunch of hackers who are indeed ready to grab anything they can get
|
|
their hands on, the more protected the better. So this part of the
|
|
law calms the publishers down, tells them it's safe to go in the
|
|
water. Does it really consign the Net to hell, as some civil
|
|
liberties groups seem to think, merely to give some legal protection
|
|
to copy protection devices? No.
|
|
|
|
|
|
Here comes the part that you may find hard to believe: in all the
|
|
battles mentioned above, I personally side with the civil liberties
|
|
groups every single time. Then why the criticisms? It looks like
|
|
these groups, with their admirable principles and agendas, are
|
|
increasingly getting lost in hyperbole and losing important
|
|
perspective. Frankly, the shrillness is beginning to hurt my ears.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 12:17:03 +0100
|
|
From: Jean-Bernard Condat <jeanbc@INFORMIX.COM>
|
|
Subject: File 2--Article #12 of France's proposed telecoms law
|
|
|
|
Paris, May 23, 1996: There is an EC regulation called which applies to
|
|
all EC countries.
|
|
This restricts the use of cryptography in the context of weapons of
|
|
mass destruction, but not for any other purpose. The UK also has an
|
|
export licensing requirement which is similar in scope. France, on
|
|
the other hand, has much wider restrictions. The EC regulation is
|
|
"Dual-Use and Related Goods (Export Control) Regulations" and the UK
|
|
is "Export of Goods (Control) Order".
|
|
|
|
Attached is a message containing the pending French legislation,
|
|
followed by some comments. I hope this is helpful to readers on both
|
|
sides of the pond.
|
|
|
|
[Tuesday, 07 May 96 08:30:54 EST, "jean-bernard condat" <condat@atelier.fr>
|
|
writte:]
|
|
---------------
|
|
Art. 12
|
|
|
|
Article 28 of the Law No. 90-1170 dated December 29, 1990, on
|
|
telecommunications regulation is hereby amended as follows:
|
|
|
|
I - Section I is hereby amended as follows:
|
|
|
|
1) The first paragraph shall be completed by the following
|
|
phrase: "Secret coding method denotes all materials or programs
|
|
conceived or modified for the same purpose."
|
|
|
|
2) The second and third paragraphs are hereby replaced by the
|
|
following provisions:
|
|
|
|
"To preserve the interests of national defense and the internal
|
|
or external security of the State, while permitting the
|
|
protection of information and the development of secure
|
|
communications and transactions,
|
|
|
|
1) the use of a secret coding method or service shall be:
|
|
|
|
a) allowed freely:
|
|
|
|
- if the secret coding method or service does not allow the
|
|
assurance of confidentiality, particularly when it can only be
|
|
used to authenticate a communication or ensure the integrity of
|
|
the transmitted message;
|
|
|
|
- or if the method or the service assures confidentiality and
|
|
uses only coding conventions managed according to the procedures
|
|
and by an organization approved under the conditions defined in
|
|
Section II;
|
|
|
|
b) subject to the authorization of the Prime Minister in other
|
|
cases.
|
|
|
|
2) the supply, importation from countries not belonging to the
|
|
European Community, and exportation of secret coding methods as
|
|
well as services:
|
|
|
|
a) shall require the prior authorization of the Prime Minister
|
|
when they assure confidentiality; the authorization may require
|
|
the supplier to reveal the identity of the purchaser;
|
|
|
|
b) shall require declaration in other cases."
|
|
|
|
3) A decree sets the conditions under which the declarations are
|
|
signed and the authorizations approved. This decree provides
|
|
for:
|
|
|
|
a) a simplified system of declaration or authorization for
|
|
certain types of methods or services or for certain categories of
|
|
users;
|
|
|
|
b) the substitution of the declaration for the authorization, for
|
|
transactions concerning secret coding methods or services whose
|
|
technical characteristics or conditions of use, while justifying
|
|
a certain attention being paid with regard to the aforementioned
|
|
interests, do not require the prior authorization of these
|
|
transactions;
|
|
|
|
c) the waiver of all prior formalities for transactions
|
|
concerning secret coding methods or services whose technical
|
|
characteristics or conditions of use are such that the
|
|
transactions are not capable of damaging the interests mentioned
|
|
at the beginning of this paragraph.
|
|
|
|
II - Section II is hereby replaced by the following provisions:
|
|
|
|
"II - Organizations responsible for managing, on behalf of
|
|
others, the coding conventions for secret coding methods or
|
|
services that allow the assurance of confidentiality must be
|
|
approved in advance by the Prime Minister.
|
|
|
|
They are obligated to maintain professional confidentiality in
|
|
the exercise of their approved activities.
|
|
|
|
The approval shall specify the methods and services that they may
|
|
use or supply.
|
|
|
|
They shall be responsible to preserve the coding conventions that
|
|
they manage. Within the framework of application of the Law No.
|
|
91-646 dated July 10, 1991, concerning the confidentiality of
|
|
correspondence sent via telecommunications, and within the
|
|
framework of investigations made under the rubric of Articles 53
|
|
et seq. and 75 et seq. of the Code of Criminal Procedure, they
|
|
must release them to judicial authorities or to qualified
|
|
authorities, or implement them according to their request.
|
|
|
|
They must exercise their activities on domestic soil.
|
|
|
|
A decree in the Council of State sets the conditions under which
|
|
these organizations shall be approved, as well as the guarantees
|
|
which the approval shall require; it specifies the procedures and
|
|
the technical provisions allowing the enforcement of the
|
|
obligations indicated above.
|
|
|
|
III - a) Without prejudice to the application of the Customs
|
|
Code, the fact of supplying, importing from a country not
|
|
belonging to the European Community, or exporting, a secret
|
|
coding method or service, without having obtained the prior
|
|
authorization mentioned in I or in violation of the conditions of
|
|
the granted approval, shall be punishable by six months
|
|
imprisonment and a fine of FF 200,000.
|
|
|
|
The fact of managing, on behalf of others, the coding conventions
|
|
for secret coding methods or services that allow the assurance of
|
|
confidentiality, without having obtained the approval mentioned
|
|
in II or in violation of the conditions of this approval, shall
|
|
be punishable by two years imprisonment and a fine of FF 300,000.
|
|
|
|
The fact of supplying, importing from a country not belonging to
|
|
the European Community, or exporting, a secret coding method or
|
|
service, in order to facilitate the preparation or commission of
|
|
a felony or misdemeanor, shall be punishable by three years
|
|
imprisonment and a fine of FF 500,000.
|
|
|
|
The attempt to commit the infractions mentioned in the preceding
|
|
paragraphs shall be punishable by the same penalties.
|
|
|
|
b) The natural persons guilty of the infractions mentioned under
|
|
a) shall incur the complementary penalties provided for in
|
|
Articles 131-19, 131-21, and 131-27, as well as, either
|
|
indefinitely or for a period of five years or longer, the
|
|
penalties provided for in Articles 131-33 and 131-34 of the
|
|
Criminal Code.
|
|
|
|
c) Judicial persons may be declared criminally responsible for
|
|
the infractions defined in the first paragraph under the
|
|
conditions provided for in Article 121-2 of the Criminal Code.
|
|
The penalties incurred by judicial persons are:
|
|
|
|
1) the fine according to the modalities provided for by Article
|
|
131-38 of the Criminal Code;
|
|
|
|
2) the penalties mentioned in the Article L. 131-39 of the same
|
|
code. The prohibition mentioned in 2) of this article L. 131-39
|
|
concerns activities, during the exercise of which, or on the
|
|
occasion of the exercise of which, the infraction was committed."
|
|
|
|
III - Section III becomes IV.
|
|
|
|
Its last paragraph is hereby replaced by the following
|
|
provisions:
|
|
|
|
"The fact of refusing to supply information or documents, or of
|
|
obstructing the progress of the investigations mentioned in this
|
|
section IV, shall be punishable by six months imprisonment and a
|
|
fine of FF 200,000."
|
|
|
|
IV - Section IV becomes V.
|
|
|
|
After the word "authorizations," the words "and declarations" are
|
|
hereby inserted.
|
|
|
|
V - A section VI is hereby added, formulated as follows:
|
|
|
|
"VI - The provisions of this article shall not hinder the
|
|
application of the Decree dated April 18, 1939, establishing the
|
|
regulation of war materials, arms, and munitions, to those secret
|
|
coding methods which are specially conceived or modified to allow
|
|
or facilitate the use or manufacture of arms."
|
|
|
|
VI - This article is applicable to overseas territories and to
|
|
the territorial commonwealth of Mayotte.
|
|
|
|
Copyright 1996 Steptoe & Johnson LLP
|
|
|
|
Steptoe & Johnson LLP grants permission for the contents of this
|
|
publication to be reproduced and distributed in full free of
|
|
charge, provided that: (i) such reproduction and distribution is
|
|
limited to educational and professional non-profit use only (and
|
|
not for advertising or other use); (ii) the reproductions or
|
|
distributions make no edits or changes in this publication; and
|
|
(iii) all reproductions and distributions include the name of the
|
|
author(s) and the copyright notice(s) included in the original
|
|
publication.
|
|
---------------
|
|
In trying to analyze the impact of the proposed law, I would note the following:
|
|
|
|
Section I:
|
|
|
|
Paragraph 1 (a), first bullet, seems to explicitly allow digital signatures,
|
|
and does
|
|
not require that the secret keys used for such purposes be escrowed.
|
|
|
|
Paragraph 1 (a), second bullet, in combination with Section II, strongly
|
|
hints at a
|
|
requirement for key escrow. Conceivably, depending on the details of Law No
|
|
91-646 dated July 10, 1991 concerning the confidentiality of correspondence sent
|
|
via telecommunications, the use of short keys that might expose information to
|
|
unauthorized individuals (a la the IBM masked DES and Lotus Notes solution)
|
|
might even be prohibited!
|
|
|
|
Paragraph 1 (b) provides an escape clause for certain favored activities (and/or
|
|
organizations?). Presumably international standards such as Visa/MasterCard's
|
|
SET, which apply strong confidentiality to only certain data fields, notably
|
|
the
|
|
cardholders account number, would be permitted under this kind of an exception.
|
|
Banking transactions and other sensitive information may also be excluded from
|
|
the key escrow requirement, especially if (since) the Government could subpoena
|
|
the bank's records directly. This is further borne out by paragraph 3, (a,
|
|
b, and c).
|
|
|
|
Paragraph 1 seems to apply to the use of encryption, as opposed to the supply,
|
|
import, or export. However, unless such use is covered by Law No. 91-646, the
|
|
proposed amendment does not seem to apply criminal or civil penalties to
|
|
such use.
|
|
|
|
Paragraph 2 is interesting, in that it differentiates between "supply" and
|
|
"importing
|
|
from countries not belonging to the European community". This may be a techni-
|
|
cality of the European Community import/export laws -- perhaps importation
|
|
from countries within the European Community no longer has any meaning, since
|
|
such customs barriers were supposed to have been removed. I would interpret
|
|
"supply" to include the offering for sale, or even distributing for free,
|
|
such code,
|
|
even by a French citizen. This would therefore appear to apply to the
|
|
(re-)distribution
|
|
of PGP and/or any home-grown French products, as well as any encryption products
|
|
originating within the EC. If so, this would seem to be more even-handed with
|
|
respect to imports from the US and elsewhere than might otherwise appear,
|
|
and may obviate any claim that the law would violate the World Trade
|
|
Organization's
|
|
Most Favored Nation agreements. The apparent import preference for EC products
|
|
simply reflect's France's obligation to allow the free flow of goods within
|
|
the EC.
|
|
|
|
Paragraph 3 seems to provide for some simplified administrative mechanisms
|
|
that may be less onerous than a case by case review. IN US terms, this may
|
|
be similar
|
|
to requesting a commodity jurisdiction from Commerce, rather than having
|
|
encryption being construed as following under the ITARs. If so, we should
|
|
certainly
|
|
investigate these options. Subparagraphs b and c may apply to the use of
|
|
relatively
|
|
short keys, or for transactions of limited scope, e.g., for SET.
|
|
|
|
Section II defines conditions for establishing and approving escrow agencies.
|
|
Given the requirement for "professional confidentiality", I would not be at
|
|
all surprised
|
|
if the civil law "notaires" didn't jump at the chance to get into this business.
|
|
|
|
The requirement that they exercise their activities on French soil is rather
|
|
obscure.
|
|
The prior language doesn't explicitly say that anything about escrow, nor
|
|
where the
|
|
escrowed keys must be maintained -- it only talks about the management of
|
|
coding
|
|
conventions, and the requirement to comply with the requirements of the Code of
|
|
Civil Procedure, which presumably requires that they divulge the keys and/or
|
|
the text
|
|
of any confidential messages upon demand by a proper authority. But a literal
|
|
reading of the text would suggest that a standards organization that manages and
|
|
preserves the coding conventions would have to carry out their activities on
|
|
French soil, while the escrow repository might be elsewhere.
|
|
|
|
Section III certainly makes it clear that they are serious about all this.
|
|
The natural
|
|
persons who have committed, or even attempted to commit acts in violation of
|
|
the Act
|
|
are subject to fines and imprisonment, and I would hazard a guess that the
|
|
Articles 131-33 and 131-34 would debar them from participating in any future
|
|
importing or exporting.
|
|
|
|
Corporations (judicial persons) may be held criminally responsible for any
|
|
infractions
|
|
caused by their employees, and I would assume that Article 131-39 would also
|
|
lead to a
|
|
debarment for future import or export, in exactly the same manner as US
|
|
export violations
|
|
would.
|
|
|
|
Section VI makes the Act applicable to overseas territories, which means
|
|
that some of the
|
|
more obscure areas and countries would also be covered, such as French
|
|
Guiana, etc.
|
|
|
|
Disclaimer: I am not a French attorney, nor someone who is at all
|
|
knowledgeable about EC
|
|
law. The preceding analysis should not be construed as any kind of an
|
|
official position.
|
|
Go get your own hired guns if you need advice!
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 04:59:21 -0700 (PDT)
|
|
From: Declan McCullagh <declan@eff.org>
|
|
Subject: File 3--University of Wisconsin/Madison hires cyber-police
|
|
|
|
[Now _this_ is a disturbing turn of events, though I suppose it was
|
|
inevitable. "Electronic recidivism rates?" --Declan]
|
|
|
|
|
|
// declan@eff.org // I do not represent the EFF // declan@well.com //
|
|
|
|
|
|
Chicago Tribune
|
|
May 20, 1996 Monday, FINAL EDITION
|
|
NEWS; Pg. 3; ZONE: M; In the Midwest.
|
|
LENGTH: 317 words
|
|
BYLINE: Compiled by David Elsner.
|
|
DATELINE: MADISON, WISCONSIN
|
|
|
|
BODY:
|
|
|
|
The University of Wisconsin -Madison is planning to hire a computer cop
|
|
to police the electronic traffic of its students and faculty.
|
|
|
|
The "network investigator" would examine pranks, harassment, copyright
|
|
infringement, software thievery and other computer system misuses and
|
|
abuses, officials said.
|
|
|
|
....................
|
|
|
|
UW-Madison is now advertising the full-time post. Officials envision an
|
|
investigator who will track down, retrieve and restore offending
|
|
electronic communication. The evidence would be turned over to university
|
|
officials or police.
|
|
|
|
Five years ago, relatively few students and faculty members had Internet
|
|
access and electronic mail, or e-mail. Today, university officials handle
|
|
50,000 separate computer accounts, and a part-time investigator has not
|
|
been able to keep up with the volume.
|
|
|
|
During the spring semester,
|
|
officials received an average of two to three complaints a week about
|
|
computer abuses, said Susan Puntillo, of UW-Madison's Division of
|
|
Information Technology.
|
|
|
|
Years ago, warnings and reprimands generally sufficed. Even now, once
|
|
chastised, few repeat their offense. Puntillo estimated electronic
|
|
recidivism rates at less than 1 percent.
|
|
|
|
....................
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 25 May 1996 20:49:53 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 4--19 year old arrested for making terrorist threats
|
|
|
|
The first quotation is an AP article excerpt about a college student
|
|
arrested for making a terrorist threat via a Usenet post.
|
|
|
|
The second excerpt is the text of the actually message in question.
|
|
|
|
--- Excerpt 1 ----
|
|
|
|
NET THREAT IS TRACED TO STUDENT
|
|
|
|
SACRAMENTO (AP) - An Internet message declaring an "open season"
|
|
on state Sen. Tim Leslie because of the lawmaker's stance on
|
|
mountain lions has been traced to a 19-year-old college student in
|
|
El Paso, Texas, authorities say.
|
|
Jose Eduardo Saavedra was arrested on a no-bail warrant based on
|
|
felony charges filed in Sacramento alleging that he had made
|
|
terrorist threats and threatened a public official, said El Paso
|
|
County sheriff's Sgt. Don Marshall.
|
|
The computer message posted March 6 read: "Let's hunt Sen. Tim
|
|
Leslie for sport. ... I think it would be great" if he "were
|
|
hunted down and skinned and mounted for our viewing pleasure."
|
|
Leslie, who pushed for a ballot measure that would have removed
|
|
special protections for mountain lions in California, expressed
|
|
relief that an arrest had been made but said the incident raised
|
|
"big new issues" about the use - and misuse - of the Internet.
|
|
The Carnelian Bay Republican said it was a "very serious matter"
|
|
when someone could "threaten or intimidate or extort others in a
|
|
public forum like this."
|
|
According to Al Locher of the Sacramento County district
|
|
attorney's office, Saavedra was tracked down by investigators
|
|
working on information from his Internet provider, Primenet of
|
|
Arizona.
|
|
---end excerpt---
|
|
|
|
+++++++++++++++++++
|
|
|
|
--- Excerpt 2 ---
|
|
Path--news.primenet.com!zuma
|
|
From--Zuma <zuma@primenet.com>
|
|
Newsgroups:
|
|
talk.environment,sci.environment,talk.politics.animals,rec.pets,ca.politics,rec
|
|
.pets.cats,rec.animals.wildlife,rec.food.veg,alt.save-the-earth
|
|
Subject--Re--Hunting Mountain Lions
|
|
Followup-To:
|
|
talk.environment,sci.environment,talk.politics.animals,rec.pets,ca.politics,rec
|
|
.pets.cats,rec.animals.wildlife,rec.food.veg,alt.save-the-earth
|
|
Date--6 Mar 1996 16:09:00 -0700
|
|
Organization--Primenet (602)395-1010
|
|
Lines--19
|
|
Sender--root@primenet.com
|
|
Message-ID--<4hl5uc$6c4@nnrp1.news.primenet.com>
|
|
References--<4e3573$105e@news.ccit.arizona.edu>
|
|
<wabbit-2401961812250001@ana0020.deltanet.com>
|
|
<4e79n6$5a6@ixnews5.ix.netcom.com> <4e7lfe$bsg@ixnews7.ix.n
|
|
<4g3pk3$7m0@cloner4.netcom.com> <4gnh1u$qur@oracle.damerica.net>
|
|
X-Posted-By--zuma@usr3.primenet.com
|
|
Xref--news.primenet.com talk.environment:58565 sci.environment:94565
|
|
talk.politics.animals:67399 rec.pets:57445 ca.politics:97674
|
|
rec.pets.cats:152834 rec.animals.wildlife:11723 rec.food.veg:78925
|
|
|
|
Instead of huntng Lions in California, let us declare open season
|
|
on State SEN TIM LESLIE, his family, everyone he holds near and
|
|
dear, the Cattlemen's association and anyone else who feels that LIONS
|
|
in California should be killed.
|
|
|
|
I think it would be great to see ths slimeball, asshole, conservative
|
|
moron hunted down and skinned and mounted for our viewing pleasure.
|
|
|
|
I would rather see every right-wing nut like scumface Leslie destroyed
|
|
in the name of politicl sport, then lose one mountain lion whose only
|
|
fault is havng to live in a state with a fuck-ed up jerk like this
|
|
shit-faced republican and his supporters.
|
|
|
|
Pray for his death. Pray for all their deaths.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 11:04:50 -0700
|
|
From: Jim Warren <jwarren@well.com>
|
|
Subject: File 5--Nat'l Jrnl article sez net-activism is just political hicks
|
|
|
|
Tommorrow, Washington's politically-powerful National Journal
|
|
reportedly will publish a know-nothing piece of "journalism" saying
|
|
that net-aided politics is essentially nothing but a batch of
|
|
ineffective, know-nothing nerds and back-water political hacks.
|
|
|
|
Check it out on Friday or thereafter -- at www.politicsusa.com -- and
|
|
forward your *informed* comments to the NJ's Editor and Letters
|
|
Editor.
|
|
|
|
--jim
|
|
|
|
On the other hand, maybe we ought to just continue escalating our
|
|
political effectiveness using the net, and let it come as a total
|
|
shock to the Beltway insiders who trust this piece of misinformed
|
|
blather ... when we provide more and more swing votes in contested
|
|
elections -- as already occured with DeFoley8 against ex-Speaker Tom
|
|
Foley, VTW for now-Senator Ron Wyden, me for now-available Calif
|
|
legislative data, the gun BBS against ex-Calif Senate Prez Pro Tem
|
|
David Roberti, etc. :-)
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 27 May 96 12:15 EST
|
|
From: jordanh@iquest.net <jordanh@iquest.net
|
|
Subject: File 6--Cyber Sit-in
|
|
|
|
Well folks,
|
|
|
|
The CDA is STILL legal and AOL and other online providers, not to
|
|
mention the feds are still practicing censorship. I suggest we each
|
|
make a statement.
|
|
|
|
CCA (Creative Coalition on AOL, now OFF AOL) a grass roots
|
|
organization which began when a bunch of AOL poets protested the daily
|
|
censorship of their poems by AOL, is holding a cyber sit-in
|
|
demonstration. It is being sponsored by the ACLU. This forum will
|
|
take place for 24 hours starting on June 2 at 6.a.m. EDT. This will
|
|
be held in two places, one, right under the noses of AOL in the ACLU
|
|
Freedom Hall area of AOL. There will be live chat and in the Freedom
|
|
of Expression folder there will be a place to post letters to your
|
|
congress persons as well as local editors of newspapers. These will
|
|
be forwarded for you. On the net, chat and bulletin boards will be at
|
|
http://www.stjpub.com/cca/
|
|
|
|
AOL poets, atheists, screenwriters, and netizens of every ilk are sick
|
|
of these crummy censorship practices. CCA has represented all artists in
|
|
the quest for freedom of expression. Now it is your turn to let your
|
|
voice be heard. June 2, 24 hours, on AOL and CCA website, please join CCA
|
|
in their demonstration against censorship.
|
|
|
|
|
|
Jordanne Holyoak, media director, CCA
|
|
Dwain Kitchel, web liason, CCA
|
|
http://www.stjpub.com/cca/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 May 1996 17:02:14 -0700
|
|
From: Jim Warren <jwarren@well.com
|
|
Subject: File 7--(fwd fyi) Internet a Broadcast Media?
|
|
|
|
Date-- Thu, 23 May 1996 15--01--44 EDT
|
|
From-- sap@TANK.RGS.UKY.EDU
|
|
Subject-- Internet a Broadcast Media?
|
|
|
|
From DM News International, April 15, 1996:
|
|
|
|
|
|
European Commission Wants Control Over WWW
|
|
|
|
by Thomas Weyr
|
|
|
|
Brussels - The European Commission has issued yet another draft of its
|
|
Television Without Frontiers directive, this one with a "legal
|
|
clarification" that widens the definition of broadcasting to include
|
|
the Internet.
|
|
The "clarification" states that a moving or non-moving sequence of
|
|
images, whether or not accompanied by sound, constitutes a TV program.
|
|
"I am very worried about this development," said Alistair Tempest,
|
|
director general of FEDIM (the Federation of European Direct
|
|
Marketing), "because broadcasting becomes anything but personal
|
|
correspondence and can be regulated."
|
|
E-mail, Tempest noted, is excepted. Anything else would be fair
|
|
game for national and European regulators, both from the broadcasting
|
|
and the telecom end.
|
|
And such regulations could seriously crimp U.S. direct marketing
|
|
efforts on TV and over the Web.
|
|
The struggle over updating the original TV Without Frontiers
|
|
directive -- first issued in 1989 -- has been underway for over a year.
|
|
The explosive growth of the WWW in recent months has served to
|
|
intensify the conflict.
|
|
"This is a fascinating exercise in how European politics works,"
|
|
Tempest said. He noted that the European Commission -- the
|
|
policy-making bureaucrats in Brussels -- had sent the directive to the
|
|
European parliament in Strasbourg without the expanded broadcast
|
|
definition.
|
|
The parliament debated the issue late last year, and last month
|
|
returned the draft to the EC with a number of proposed amendments
|
|
including this one, which the commission then dutifully incorporated
|
|
into the new draft.
|
|
The decision now rests with representatives of the member states
|
|
in Brussels, who can revise the directive once again or adopt it and
|
|
send it back to the member governments for reconciliation with national
|
|
laws.
|
|
On March 22, experts from the 15 member countries held a meting
|
|
without coming to a conclusion. "They agreed that the more important
|
|
issues, including this one, should be kicked upstairs to the council of
|
|
ministers for resolution," Tempest said.
|
|
Agreement in principle, he added, might be reached next month,
|
|
with a common position worked out over the summer. "I don't expect
|
|
anything concrete to come out till after the summer," he said.
|
|
Fortunately for the direct marketing industry, FEDIM isn't the
|
|
only body up in arms about the implication of the new broadcast
|
|
definition.
|
|
Software manufacturers like Mircosoft and programmers like Time
|
|
Warner and Polygram are also lobbying hard in Brussels to delete the
|
|
"clarification."
|
|
"We have time to put pressure on them," Tempest said.
|
|
|
|
-----------------------------------------------------------------
|
|
|
|
Posted by Adam Starchild
|
|
The Offshore Entrepreneur at http://www.au.com/offshore<<
|
|
|
|
reposted : Gary D. Goodman
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.39
|
|
************************************
|
|
|