798 lines
34 KiB
Plaintext
798 lines
34 KiB
Plaintext
|
|
Computer underground Digest Tue Jul 23, 1996 Volume 8 : Issue 55
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.55 (Tue, Jul 23, 1996)
|
|
|
|
File 1--(fwd) lecture about internet and censorship (fwd)
|
|
File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
|
|
File 3--Online Dispute Resolution, etc. (fwd)
|
|
File 4--Re: Response to CUD re: selling wind
|
|
File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
|
|
File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
|
|
File 7--(Fwd) $50K Hacker challenge
|
|
File 8--Access control, Censorship, and Precision
|
|
File 9--Computer Literacy Bookshops events
|
|
File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 9 Jun 1996 13:26:59 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 1--(fwd) lecture about internet and censorship (fwd)
|
|
|
|
This is a speech on internet censorship given by the managing director of
|
|
the Dutch Internet Service Provider which created the child pornography
|
|
"hotline" that I forwarded about a month ago.
|
|
|
|
---------- Forwarded message ----------
|
|
From--felipe@xs4all.nl (Felipe Rodriquez)
|
|
Date--8 Jun 1996 17:29:50 GMT
|
|
|
|
A lecture i gave at the international liberals congress:
|
|
|
|
|
|
Hello,
|
|
|
|
I am Felipe Rodriquez, Managing director of Xs4all Internet, a mayor
|
|
dutch provider, and Im also chairman of the dutch foundation of
|
|
internet providers.
|
|
|
|
I was asked to do a short lecture about Internet and censorship.
|
|
|
|
Internet is an emerging market, and at the same time an exciting new
|
|
social environment. A space of communications between people of
|
|
different nations, with different habits, traditions and legal codes.
|
|
|
|
Internet is a place without borders. Information travels from one
|
|
country to another in a split second. From here to the United States it
|
|
takes 100 milliseconds. To Japan the information travels within 300
|
|
milliseconds. Nicaragua takes 250 milliseconds and to Australia it
|
|
takes the bits and bytes 400 milliseconds. Information crosses many
|
|
borders on its path to the final destination.
|
|
|
|
This challenges the concept of regionally defined cultures. The world
|
|
becomes a global village of many cultures. Those cultures are not
|
|
necessarily confined to a certain region or location. They are on the
|
|
Net, and thus independent of location.
|
|
|
|
The environment and conditions on the Net change quickly. New
|
|
possibilities of communicating with other people emerge on an almost
|
|
daily basis. Today people can sound-talk over the Internet, play games
|
|
together, send pictures, send video transmissions, radio et cetera.
|
|
Never before have people been communicating so massively, on an
|
|
intenational scale. Every person is a medium that generates network
|
|
traffic.
|
|
|
|
This mash of global cultures, all communicating with eachother, creates
|
|
a culture shock. Every culture has its own traditions and codes, and
|
|
naturally tries to protect and nurture these values.The traditional way
|
|
of protecting ones culture and traditions has always been through
|
|
legislation and social control. It is legislation that now threatens
|
|
most of the worldwide cultures on Internet.
|
|
|
|
Legislation on Internet is a slippery road. A communication technology
|
|
on this scale is a new concept. It is difficult to legislate a global
|
|
social environment. The main problem is the fact that countries try to
|
|
legislate a global environment through their own culturally defined
|
|
moral codes.
|
|
|
|
Different things are allowed in different countries. In the US it is
|
|
allowed to make racist comments, in Holland it is not. So you see a
|
|
migration of the information that dutch neo-nazi groups put on the
|
|
Internet. Vice versa the United States has strict laws against
|
|
obsenity, that are much more tolerant in Holland. Now you see a
|
|
migration of pornographic material towards Holland. From both countries
|
|
the information is published on a world wide scale. Implementation of
|
|
law for Internet should include a harmonisation of some kind in the
|
|
area of international legislation.
|
|
|
|
The United States has implemented the Communications Decency Act. This
|
|
law defines unacceptable speech on Internet. You can be criminally
|
|
prosecuted for saying the word fuck or other indecent words, if you are
|
|
an American. Anything indecent is being supressed. This proves to be a
|
|
law that is impossible to uphold.
|
|
|
|
The United States government webservers violate the Communications
|
|
Decency Act. On the White House webserver there is a picture of a
|
|
painting that is displayed. The painting shows a family of a mother
|
|
with her two children. One of the children is nude. According to the
|
|
Decency Act it is forbidden to display this image on the Internet.
|
|
There are similar examples on other government systems in the US.
|
|
|
|
This communications decency act is now being challenged as being
|
|
unconstitutional by a group of organisations on Internet that has more
|
|
than 40.000 supporters.
|
|
|
|
Other countries like China, Vietnam and Saudi Arabia have even stricter
|
|
guidelines for Internet. No one can use the Internet without prior
|
|
government permission. These governments introduce strict control on
|
|
the gateways that connect them to the Net. These countries are afraid
|
|
that Internet will give their citizens access to information against
|
|
their government and political structure. The Internet is too
|
|
democratic for them.
|
|
|
|
Germany had ordered Compuserve to block off all groups about sex, and
|
|
Compuserve then had no other way to shut these groupsdown worldwide.
|
|
Eventually the german ambassador had to explain this action to
|
|
President Clinton. A local law was influencing cultures in other
|
|
countries.
|
|
|
|
France arrested two internet-providers a couple of weeks ago. They
|
|
where held responsible for the publication of child-pornography that
|
|
was foumd on the Net. They did not distribute it themselves, but it was
|
|
available somewhere on Internet. After global concern, the french
|
|
minister of Interior admitted the arrests where a mistake, and that the
|
|
providers could not be held liable.
|
|
|
|
Prudence is needed because experience must first be aquired. You cannot
|
|
legislate something you do not know anything about, but it happens
|
|
everywhere on Internet. Resulting in unworkable situations, and
|
|
repression of the people and the market.
|
|
|
|
Many problems on Internet can be dealt with today. One of those
|
|
problems is Child Pornography. In Holland we have started a hotline
|
|
against child pornography on Internet. If we get a report about a dutch
|
|
user that is transmitting child-pornography, then we send him a
|
|
warning. If that does not stop him, we report that user to the police.
|
|
The user gets his chance to test the legal system. The hotline does not
|
|
censor, it warns and reports. This project is a cooperation between
|
|
the foundation of dutch internetproviders, the dutch criminal
|
|
intelligence agency, a psychologist, a couple of internet users and the
|
|
national bureau against racial discrimination. The hotline is based on
|
|
existing law, and proves that no extra law is needed to fight
|
|
child-pornography on Internet. Im a firm believer of first trying all
|
|
the intruments that the existing legislation has to offer. Why bother
|
|
about new laws if existing rules are sufficient ?
|
|
|
|
One of the common concerns is the availabality of obscene and violent
|
|
information to children. This is the main argument in the United Stated
|
|
to impose strict rules for the Net. But there are already techniques
|
|
that can protect children from seeing any these materials. There is
|
|
software that is especially made for the purpose of creating a safe
|
|
Internet. There is a demand from the market to create these programs,
|
|
and thus they are created.
|
|
|
|
Protection of the children on the Net is not a government task, but an
|
|
educational task of the parents of the children. Instead of regulating
|
|
a worldwide network one could also think of imposing an age limit.
|
|
|
|
Pridence is needed to find solutions for these new problems. Business
|
|
can only thrive in a stable environment. And rushing in all kinds of
|
|
repressive measures is not a stabilising factor. It is often easier to
|
|
impose new legislation, than it is to repair old bad legislation.
|
|
|
|
Thank you !
|
|
|
|
|
|
|
|
--
|
|
Felipe Rodriquez - XS4ALL Internet - finger felipe@xs4all.nl for
|
|
http://xs4all.nl/~felipe/ - Managing Director - pub pgp-key 1024/A07C02F9
|
|
|
|
pgp Key fingerprint = 32 36 C3 D9 02 42 79 C6 D1 9F 63 EB A7 30 8B 1A
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 14 Jul 1996 18:25:52 -0700 (PDT)
|
|
From: baby-X <baby-x@zoom.com>
|
|
Subject: File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
|
|
|
|
You've probably already seen this elsewhere, but I figured I'd send it
|
|
your way directly.
|
|
|
|
|
|
----------------------------------------------------------------------------
|
|
Christopher D. Frankonis - Rootless Cosmopolitan
|
|
cyberPOLIS - Communicate This Culture
|
|
|
|
Draft "Cyber-Rights" Platform Plank
|
|
http://www.cypher.net/cyberPOLIS/platform-plank.html
|
|
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
Submissions of platform proposals to both the Democratic and Republican
|
|
Parties are due by the first week of August. The Libertarians have already
|
|
held their convention, but will receive a copy of this plank proposal
|
|
anyway, as will Perot's Reform Party if it can ever be determined who to
|
|
send it to.
|
|
|
|
Therefore, I am opening a final period of discussion on the proposed
|
|
"cyber-rights" platform plank -- beginning at the start of Sunday, July
|
|
14, and ending at the close of Wednesday, July 17.
|
|
|
|
Please try to focus the discussion in the following locations (although I
|
|
will be tracking the entire handful of lists and groups this announcement
|
|
is being posted to):
|
|
|
|
the Bonfire mailing list
|
|
(see http://www.well.com/user/jonl/bonfire.html)
|
|
the cyberPOLIS mailing list
|
|
(see http://www.cypher.net/cyberPOLIS/discussion.html)
|
|
alt.culture.internet
|
|
alt.politics.datahighway
|
|
comp.org.eff.talk
|
|
|
|
At the close of the final discussion period, the draft platform plank will
|
|
be considered to be in a fixed state; development will be over.
|
|
|
|
For the two weeks between Wednesday, July 17, and Wednesday, July 31, an
|
|
email address will be made available for collecting the names of
|
|
individuals and groups which wish to signify their support for the plank.
|
|
The collection of names will be appended to the plank proposal, and sent
|
|
along with the text of the plank to each of the four parties being
|
|
targeted. Note: Do NOT send me any of this now. When the time comes, I
|
|
will announce the appropriate address.
|
|
|
|
And so, without further explanation, here is the current version (the
|
|
2nd, in fact) of the proposed "cyber-rights" platform plank:
|
|
|
|
|
|
[ Respect for Freedom in the Information Age ]
|
|
|
|
"As the most participatory form of mass speech yet developed, the
|
|
Internet deserves the highest protection from government intrusion."
|
|
|
|
- Judge Stewart Dalzell
|
|
|
|
The [BLANK] Party takes special recognition of the unique
|
|
characteristics of computer-mediated communication. As the nation and
|
|
the world experience the Information Revolution, we must rise to the
|
|
challenge of embracing the achievements and the promise of the global
|
|
Internet.
|
|
|
|
To this end, we affirm that the new world of cyberspace calls for a
|
|
commitment to these essential values of American liberty:
|
|
|
|
* The right to speak, express oneself, and associate freely.
|
|
* The right to privacy, whether through the use of anonymity,
|
|
pseudonymity, encryption, or other means.
|
|
* The right of the individual to control both the information they
|
|
access and the information they provide.
|
|
|
|
As the people of America and those of nations around the world come
|
|
closer together through the power of computer networking, the [BLANK]
|
|
Party embraces the spirit of freedom embodied by this new medium.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 16 Jul 1996 21:46:13 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 3--Online Dispute Resolution, etc. (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
Date-- Thu, 11 Jul 1996 13:09:43 -0400
|
|
From-- Ethan Katsh <katsh@LEGAL.UMASS.EDU>
|
|
|
|
Some members of this list may have in interest in (or know someone
|
|
who has a need for) the Online Ombuds Office, which can be found at
|
|
http://www.ombuds.org. This is a pilot project aimed at using online tools
|
|
to try to resolve disputes arising out of online activities (and even
|
|
non-online activities). There is no charge for the use of the service,
|
|
since most of our costs are covered by a grant from the National Center
|
|
for Automated Information Research.
|
|
|
|
If you belong to any listservs or newsgroups where disputes
|
|
arising out of online activities are discussed, I'd be most grateful if
|
|
you would mention the project and our URL.
|
|
|
|
We are particularly interested in disputes involving copyrights,
|
|
domain names, First Amendment, online service providers, and harassment.
|
|
Our home page even describes a little reward for the parties in the first
|
|
disputes that we settle in these areas.
|
|
|
|
!~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~!
|
|
! Ethan Katsh Internet: Katsh@Legal.umass.edu !
|
|
! Professor VOICE: 413-545-5879 !
|
|
! Department of Legal Studies FAX: 413-545-1640 !
|
|
! University of Massachusetts !
|
|
! 216 Hampshire House !
|
|
! Amherst, MA 01003 !
|
|
! Co-Director, Online Ombuds Office !
|
|
! http://www.ombuds.org !
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 9 Jul 1996 13:52:38 -0700
|
|
From: Barry Gold <bgold@platinum.com>
|
|
Subject: File 4--Re: Response to CUD re: selling wind
|
|
|
|
To: Roland Dobbins,
|
|
|
|
Seems to me that CUD is being about as balanced as usual. They
|
|
published your "right-wing rant", just as they published the
|
|
"left-wing rant" you were objecting to.
|
|
|
|
You are quite correct about the "liberal" Clinton administration
|
|
trying to foist key-escrow (like Clipper), "anti-terrorism"
|
|
legislation that uses guilt-by-association, and has violated the
|
|
rights of individuals in their quest to force various "militias" to
|
|
submit. (Although I'm not sure that the Clinton admin can really be
|
|
blamed for Ruby Ridge -- that was already planned before he took
|
|
office, and bureaucracies have a certain inertia.) In any case, if
|
|
they are to be blamed for the idiocies at Ruby Ridge and Waco, they
|
|
are equally entitled to take credit for learning from past mistakes
|
|
and working out a negotiated settlement with the "Free Men".
|
|
|
|
I'm not sure about "filegate". Maybe it's an enemies list. But it
|
|
seems just as likely to me (a computer professional) that it resulted
|
|
from somebody searching an outdated list of white-house employees.
|
|
Seems to me if Clinton wanted to keep an enemies list, he could have
|
|
picked a better list than a bunch of former white-house employees and
|
|
applicants. However, I maintain an open mind on this, as additional
|
|
evidence may turn at any time.
|
|
|
|
But I really must take issue with your bringing up SDI. Yes, weapons
|
|
are made to be used. That's one reason why we maintained and continue
|
|
to maintain our own weapons. It lets any foreign power who might think
|
|
of using such weapons on the U.S. know that the result will be the total
|
|
destruction of whatever country they are ruling.
|
|
|
|
But the SDI was, and remains, a chimera. Vaporware, impossible to
|
|
build. I just happen to have a relevant LA Times column, which I will
|
|
quote part of:
|
|
|
|
David L. Parnas(1) spent two days listening to Air Force
|
|
briefings, then in June 1985 he resigned from the advisory panel,
|
|
concluding that the fundamental computer requirements for
|
|
strategic defense could never be satisfied.
|
|
|
|
...
|
|
|
|
His basic points are simple and unalterable: By its nature,
|
|
strategic ballistic missile defense cannot be tested in its
|
|
conditions of use -- we can't fire a missile at Los Angeles
|
|
to see if our defense works. And no computer system of even
|
|
modest complexity has ever been considered reliable without
|
|
extensive testing in actual conditions of use.
|
|
...
|
|
National ballistic missile defense, of course, would require
|
|
computer software of both unimaginable(sic) complexity and
|
|
infallible trustworthiness -- and it would have to work
|
|
correctly the first time it was ever used.
|
|
|
|
...
|
|
|
|
Furthermore, the long lead time and elaborate facilities
|
|
required to build an intercontinental missile mean that the
|
|
U.S. and its allies would be able to deal with such a threat(2)
|
|
from a rogue state in others(sic) ways -- via a preemptive
|
|
strike, for example.
|
|
|
|
Above quoted from "Innovation" column, by Gary Chapman, Los Angeles
|
|
Times, Monday, July 8, 1996, page D6.
|
|
|
|
I note that Chapman ignores the many missiles left in the former
|
|
Soviet Union. These are mostly controlled by the Russian military,
|
|
regardless of where they are physically located. And Russia seems to
|
|
have other things than intercontinental war on its mind. This could
|
|
change in the future, of course. But I suspect it would be cheaper to
|
|
just buy the missiles than to build even the prototype SDI ($31-60
|
|
billion; we have spent over "$100 billion on ... research so far, without
|
|
noticeable progress."(ibid))
|
|
|
|
Also ignored by proponents of SDI is that there are other methods of
|
|
delivering weapons of mass destruction than ICBMs. If Russia _did_
|
|
become a threat again, they could use submarine-launched missiles,
|
|
which are harder to defend against because they travel tens or hundreds
|
|
of miles instead of thousands. And the smaller "rogue states" that
|
|
indulge in terrorism could get quite satisfactory results by smuggling
|
|
the weapons into the U.S. and assembling them in whichever city they
|
|
want to destroy.
|
|
|
|
It would be difficult to completely destroy the U.S. with short range
|
|
or smuggled in weapons, but you could certainly deliver a lot of
|
|
terror, just the sort of thing those dictators would enjoy. Except
|
|
for one thing -- the retaliatory strike would leave them radioactive
|
|
dust, or if they happened to have a deep enough bunker to survive it,
|
|
no army and a radioactive wasteland to "rule" over. The same thing
|
|
would happen to anyone who launched a more massive missile strike, of
|
|
course.
|
|
|
|
So, who are we to fear? Anyone who is weighing risks against gains
|
|
will see there is nothing to be gained by using such weapons against
|
|
U.S. territory. And in spite of propaganda labelling Hussein and
|
|
Kaddafi "madmen", they are quite sane, just working from goals we
|
|
don't understand. And if someone crazy does come to power (Hitler,
|
|
perhaps), SDI will not prevent him from smuggling in weapons.
|
|
|
|
In fact, assuming such a ruler (or a stateless terrorist group for
|
|
that matter) could lay hands on enough fissionables, this would be at
|
|
least as efficient a method of using them as launching missiles.
|
|
Missiles have a way of failing, their payloads refusing to go off.
|
|
Worse, after you've figured out how to build a fission bomb (not that
|
|
difficult, most of the info is now available in libraries), you
|
|
_still_ have to figure out how to build the missiles, a much more
|
|
difficult task. (Or spend a lot of money to buy them, then hope you
|
|
can maintain them in working condition until its time to use them.)
|
|
|
|
Thank you, I'd rather use the 31-60 billion to lower taxes or reduce
|
|
the national debt.
|
|
|
|
|
|
---
|
|
|
|
(1) a famous software engineer and a member of the panel charged with
|
|
looking at the computer requrirements for an SDI system.
|
|
|
|
(2) e.g., the occasional threats by the current rulers of North Korea,
|
|
Iraq, and Libya.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 17 Jul 1996 19:59:47 -0700 (PDT)
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
|
|
|
|
The New York Times, July 17, 1996, p. A10.
|
|
|
|
16 Indicted On Charges Of Internet Pornography
|
|
Allegations of Molestation Are Also Filed
|
|
|
|
By Tim Golden
|
|
|
|
San Jose, Calif., July 16 -- [...]
|
|
|
|
Today, Federal officials said the girl in a small central
|
|
California town had led them to one of the more distant
|
|
frontiers of sexual crime.
|
|
|
|
In an indictment handed up here, a Federal grand jury
|
|
charged 16 people in the United States and abroad with
|
|
joining in a pornography ring that was effectively an
|
|
on-line pedophilia club. Its members shared homemade
|
|
pictures, recounted their sexual experiences with children
|
|
and even chatted electronically as two of the men molested
|
|
a 10-year-old girl, the authorities said.
|
|
|
|
The case appeared likely to heighten concerns about the
|
|
spread of child pornography over the Internet. Debate has
|
|
grown steadily over whether or how the government should
|
|
impose obscenity standards in cyberspace, and Republican
|
|
leaders have increasingly attacked the Clinton
|
|
Administration for being insufficiently vigorous in the
|
|
prosecution of on-line pornography cases.
|
|
|
|
[...]
|
|
|
|
In addition to 13 men arrested around the United States,
|
|
officials said the group included members in Finland,
|
|
Canada and Australia. Although arrest warrants have been
|
|
issued for those three, officials said they were still only
|
|
known by their computer aliases.
|
|
|
|
[...]
|
|
|
|
With help from Customs Service investigators in Silicon
|
|
Valley, F.B.I. agents eventually uncovered computer files
|
|
that began to trace the scope of the Orchid Club, one of
|
|
the thousands of virtual conference rooms of Internet Relay
|
|
Chat.
|
|
Officials said they did not have to conduct wire-tap
|
|
surveillance or break into encrypted files; two of the
|
|
accused conspirators collaborated with investigators, going
|
|
on-line in the presence of law-enforcement agents to help
|
|
track other members of the club.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 8 Jul 1996 08:56:51 -0400 (EDT)
|
|
From: Noah <noah@enabled.com>
|
|
Subject: File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
|
|
|
|
U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM
|
|
The federal government is planning a centralized emergency response team to
|
|
respond to attacks on the U.S. information infrastructure. The Computer
|
|
Emergency Response Team at Carnegie Mellon University, which is financed
|
|
through the Defense Department, will play a major role in developing the new
|
|
interagency group, which will handle security concerns related to the
|
|
Internet, the telephone system, electronic banking systems, and the
|
|
computerized systems that operate the country's oil pipelines and electrical
|
|
power grids. (Chronicle of Higher Education 5 Jul 96 A19)
|
|
|
|
AT&T TARGETS CYBERSPACE
|
|
AT&T's recent investment in Nets Inc., through its spin-off of New Media
|
|
Services to Jim Manzi's Industry.Net, signals its plans to become a one-stop
|
|
shop for electronic communications -- from e-mail and Internet access to
|
|
cellular calling and satellite TV. The company's primary strategy is to
|
|
sign up millions of customers for its WorldNet Internet access service. The
|
|
company will also provide its corporate customers a "hosting" service called
|
|
EasyCommerce, which will create and operate corporate Web sites. At the
|
|
same time, the company has scrapped Network Notes and is looking to get rid
|
|
of its Imagination Network, an online gaming service; it's also considering
|
|
phasing out Personalink, a messaging service that uses General Magic
|
|
technology. (Business Week 8 Jul 96 p120)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 18 Jul 1996 23:10:49 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 7--(Fwd) $50K Hacker challenge
|
|
|
|
I saw this article in a recent edition of Online Business Today.
|
|
|
|
------- Forwarded Message Follows -------
|
|
Date-- Tue, 25 Jun 1996 09:08:17 -0400 (EDT)
|
|
From-- Home Page Press <obt@hpp.com>
|
|
|
|
<sections snipped>
|
|
|
|
**************************************************
|
|
|
|
Hackers $50K challenge to break Net security system
|
|
|
|
World Star Holdings in Winnipeg, Canada is looking for
|
|
trouble. If they find it, they're willing to pay $50,000 to the
|
|
first person who can break their security system. The
|
|
company has issued an open invitation to take the "World
|
|
Star Cybertest '96: The Ultimate Internet Security Challenge,"
|
|
in order to demonstrate the Company's Internet security
|
|
system.
|
|
|
|
Personal email challenges have been sent to high profile
|
|
names such as Bill Gates, Ken Rowe at the National Center
|
|
for Super Computing, Dr. Paul Penfield, Department of
|
|
Computer Science at the M.I.T. School of Engineering and
|
|
researchers Drew Dean and Dean Wallach of Princeton
|
|
University.
|
|
|
|
OBT's paid subscription newsletter Online Business
|
|
Consultant has recently quoted the Princeton team in several
|
|
Java security reports including "Deadly Black Widow On The
|
|
Web: Her Name is JAVA," "Java Black Widows---Sun
|
|
Declares War," Be Afraid. Be Very Afraid" and "The
|
|
Business Assassin." To read these reports go to Home Page
|
|
Press http://www.hpp.com and scroll down the front page.
|
|
|
|
Brian Greenberg, President of World Star said, "I personally
|
|
signed, sealed and emailed the invitations and am very
|
|
anxious to see some of the individuals respond to the
|
|
challenge. I am confident that our system is, at this time, the
|
|
most secure in cyberspace."
|
|
|
|
World Star Holdings, Ltd., is a provider of interactive
|
|
"transactable" Internet services and Internet security
|
|
technology which Greenberg claims has been proven
|
|
impenetrable. The Company launched its online contest
|
|
offering more than $50,000 in cash and prizes to the first
|
|
person able to break its security system.
|
|
|
|
According to the test's scenario hackers are enticed into a
|
|
virtual bank interior in search of a vault. The challenge is to
|
|
unlock it and find a list of prizes with inventory numbers and
|
|
a hidden "cyberkey" number. OBT staff used Home Page
|
|
Press's Go.Fetch (beta) personal agent software to retrieve the
|
|
World Star site and was returned only five pages.
|
|
|
|
If you're successful, call World Star at 204-943-2256. Get to
|
|
it hackers. Bust into World Star at http://205.200.247.10 to
|
|
get the cash!
|
|
|
|
**************************************************
|
|
============================
|
|
============================
|
|
ONLINE BUSINESS TODAY(TM)
|
|
NEWSLETTER: Vol 2 (#6)
|
|
MORNING FINAL
|
|
THURSDAY, JUNE 24, 1996
|
|
OBT@HPP.COM
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 15 Jul 96 07:30:34 GMT
|
|
From: "David G. Bell" <dbell@zhochaka.demon.co.uk>
|
|
Subject: File 8--Access control, Censorship, and Precision
|
|
|
|
For me, the most disturbing part of the Meeks story about control of
|
|
access to parts of the Internet was the allegation of a lack of
|
|
precision in defining controlled sites, so that sites with a similar,
|
|
but not identical, URL could be blocked.
|
|
|
|
I imagine that a smart lawyer could make a case for damages out of that
|
|
one.
|
|
|
|
Contrast it with the iSTAR story. The list of newsgroups they have
|
|
refused to handle is pretty clear, and while different countries, even
|
|
different States in the USA, have different limits, pretty well all of
|
|
the newsgroups have names which strongly suggest an illegal content in
|
|
many jurisdictions.
|
|
|
|
About the only one which I was surprised to see was the newsgroup for
|
|
pictures of cheerleaders, but on an international network of networks,
|
|
it isn't hard to find differences in age limits, which would make a
|
|
picture of a 17-year-old legal in one country, and illegal in another.
|
|
|
|
At least the censors and controllers have a reason for their actions,
|
|
and one which I believe can be defended. The danger in both the stories
|
|
is that so much is being done in secret, and these actions should be
|
|
challenged, should be publically debated, rather than imposed in secret.
|
|
|
|
Here in the UK we have what is officially a film _classification_
|
|
system, backed by law. Mostly, it seems to work pretty well. There are
|
|
stories about scenes being cut from films to get a less restrictive
|
|
classification. It has also been claimed that no film can be released
|
|
in the UK which shows the use of nunchaku, because of some decision
|
|
taken by the current head of the BBFC.
|
|
|
|
It can be argued that too many people on the Internet fail to accept
|
|
responsibility for what they make available. The scary thing about the
|
|
secrecy surrounding efforts to classify or censor material, is that it
|
|
suggests that the people taking the decisions are afraid to accept their
|
|
responsibilities.
|
|
Date: Thu, 18 Jul 1996 23:23:16 -0400 (EDT)
|
|
From: Noah <noah@enabled.com>
|
|
Subject: File 9--Computer Literacy Bookshops events
|
|
|
|
From -Noah
|
|
|
|
noah@enabled.com
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Thu, 18 Jul 96 18:05:19 PDT
|
|
From--CLB Event Accounement <announce@clbooks.com>
|
|
|
|
AN EVENT AT COMPUTER LITERACY BOOKSHOPS
|
|
|
|
-----------------------------------------------------------
|
|
Logical Synthesis with Verilog HDL
|
|
---------------------------------------------------------
|
|
|
|
a free presentation by Samir Palnitkar
|
|
|
|
What is?
|
|
Logic Synthesis
|
|
Impact of Logic Synthesis
|
|
Synthesis Design Flow Sequential Circuit Synthesis Example
|
|
|
|
Samir Palnitkar is the president of Indus Consulting Services, Inc.
|
|
in Sunnyvale, CA; a company which offers training and consulting
|
|
services for chip design and verification.
|
|
|
|
As a member of the technical staff at Sun Microsystems, he was
|
|
involved in several successful microprocessor, ASIC and system
|
|
design projects. He's also been a consultant to chip design
|
|
companies, semiconductor houses and EDA companies. He has also
|
|
taught Verilog and Synthesis courses to engineers at various
|
|
companies. Samir has published several technical papers and is the
|
|
holder of two U.S. Patents.
|
|
|
|
Mr. Palnitkar is the author of
|
|
"Verilog HDL: A Guide to Design and Synthesis.
|
|
|
|
Date: Tuesday, July 30, 1996
|
|
Time: 6:30 p.m. to 8:30 p.m.
|
|
|
|
Location: Computer Literacy Bookshop
|
|
2590 N First St (at Trimble)
|
|
San Jose, (408) 435-1118
|
|
|
|
DID YOU KNOW THAT OUR EVENTS ARE POSTED ON OUR WEB PAGE?
|
|
http://www.clbooks.com/
|
|
|
|
Stay tuned. There are more events to come.
|
|
|
|
August 7, 1996
|
|
Tons of Practial Experience with the Shlaer-Mellor Method
|
|
with Leon Starr
|
|
|
|
August 17, 1996
|
|
Power of Ignorance (C++ Templates)
|
|
with Andrew Koenig
|
|
|
|
August 21, 1996
|
|
Web Multimedia Techniques
|
|
with Tay Vaughan
|
|
|
|
Events at our stores are always free.
|
|
|
|
------------------------------------------------------------
|
|
If you would like to receive e-mail announcements for upcoming store
|
|
events, simply write to:
|
|
|
|
events_ca-request@clbooks.com (for events held at our California stores)
|
|
events_va-request@clbooks.com (for events held at our Virginia store)
|
|
--------------------------------------------------------------
|
|
|
|
If you have signed up for email announcements but have not received any,
|
|
or wish to be removed from this list, please contact us. We add names
|
|
by request only.
|
|
|
|
****************************************************
|
|
Computer Literacy Bookshops, Inc.
|
|
|
|
Cherrie C. Chiu
|
|
eventinfo_va@clbooks.com
|
|
(408) 435-5015 x116
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.55
|
|
************************************
|
|
|