643 lines
26 KiB
Plaintext
643 lines
26 KiB
Plaintext
|
|
Computer underground Digest Sun Apr 27, 1997 Volume 9 : Issue 33
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.33 (Sun, Apr 27, 1997)
|
|
|
|
File 1--Wired news: German Network Lifts Ban on Dutch ISP (fwd)
|
|
File 2--Effective blockade on the Internet impossible (AP newswire)
|
|
File 3--HACK - Censorship as system failure; route around...
|
|
File 4--Demand letter - Milburn v. Hasselton??
|
|
File 5--Fwd: More news about DES...
|
|
File 6--NSF out of DNS, what comes next?
|
|
File 7--Texas CyberWar - Tx Telecom Jrnl (fwd)
|
|
File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 24 Apr 1997 15:22:36 +1000 (EST)
|
|
From: Peter Tonoli <anarchie@brimstone.suburbia.net>
|
|
Subject: File 1--Wired news: German Network Lifts Ban on Dutch ISP (fwd)
|
|
|
|
From-- tank <tank@xs4all.nl>
|
|
To-- tank@xs4all.nl
|
|
Date-- Wed, 23 Apr 1997 11:39:04 +0200 (MET DST)
|
|
|
|
>From www.wired.com:
|
|
|
|
|
|
German Network Lifts Ban on Dutch ISP
|
|
|
|
With mirror sites defeating its attempt to shutter a left-wing
|
|
magazine, Germany's main academic network has called off the blockade.
|
|
The network acted 11 April after prosecutors warned that Radikal
|
|
magazine, hosted by Dutch ISP XS4ALL, was illegal. The network then
|
|
blocked XS4ALL, which hosts 6,000 Web sites. Protests included
|
|
widespread mirroring of Radikal. "An effective barrier to the illegal
|
|
content was not possible," a network spokesman told the Associated
|
|
Press Tuesday.
|
|
|
|
|
|
XS4ALL Internet BV - Felipe Rodriquez-Svensson - finger
|
|
felipe@xs4all.nl for
|
|
Managing Director - - pub pgp-key 1024/A07C02F9
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 24 Apr 1997 10:38:59 +0200 (MET DST)
|
|
From: Felipe Rodriquez <felipe@xs4all.nl>
|
|
Subject: File 2--Effective blockade on the Internet impossible (AP newswire)
|
|
|
|
This was was sent in Germany on tuesday, i got the translation today:
|
|
|
|
"Effective blockade on the Internet impossible"
|
|
|
|
Frankfurt/M, April 22 (AP)
|
|
Effectively barring information of a certain kind from
|
|
the Internet is not possible. That is the outcome of a week
|
|
long blockade by Deutsche Forschungsnetz (DFN) of the Dutch
|
|
Internet provider XS4ALL (meaning Access for All), which was
|
|
lifted Monday evening.
|
|
"It has been demonstrated that an effective blockade of
|
|
illegal information has not been within the bounds of
|
|
possibility" said DFN spokesman Klaus)Eckart Maass to AP news
|
|
agency last Tuesday. Other Web servers, according to Mr Maass,
|
|
have set up mirror sites of the online edition of the
|
|
underground magazine "Radikal", published via XS4ALL, that
|
|
is, it has been copied and been made accessible to the public.
|
|
But this only served to put "Radikal" really in the picture.
|
|
Besides, he had been faced with a flood of protest and abuse
|
|
from the Internet, Mr Maass said. "Maintaining the blockade
|
|
was not feasible."
|
|
|
|
With their measure of 11 April, DFN responded to a letter
|
|
from the Federal Criminal Investigation Department, pointing
|
|
out the illegal contents of the magazine. Issue no. 154 of the
|
|
radical left wing magazine contains a "Short Guide to
|
|
hindering railway transports of all kinds" a manual
|
|
describing how attacks can be made on the tracks on which the
|
|
nuclear waste transports to Gorleben take place. On account of
|
|
the Telecoms Bill, which received its second reading in the
|
|
federal parliament on Friday, he is obliged to bar access to
|
|
material on the Internet as soon as he learns of any illegal
|
|
contents, Mr Maass explained, provided this is technically
|
|
feasible.
|
|
|
|
Protests from Serbia's opposition broadcasting station B92
|
|
|
|
As suppressing separate Web)pages is technically not
|
|
possible, DFN cut off all access to the Dutch provider, which
|
|
offers more than 6,000 different information sites among
|
|
which those of Serbian opposition broadcasting station B92 and
|
|
several others in the scientific field. "I cannot undertake
|
|
anything that hampers scientific developments", said Mr Maass.
|
|
Three DFN users complained they were no longer able to reach
|
|
archeological and other information at XS4ALL. DFN, to which
|
|
all German universities are connected, is used by about
|
|
500,000 users to obtain access to the Internet. Protests also
|
|
came from B92, as the broadcasting station found its efforts
|
|
to further the cause of democracy in Serbia thwarted by the
|
|
blockade.
|
|
In September of last year several commercial Internet
|
|
providers had already blocked XS4ALL temporarily out of
|
|
concern, so they said, that the measures taken by the law
|
|
could take on such dimensions as would endanger their very
|
|
existence. This action gave rise to fierce protests on the
|
|
Internet, but also caused XS4ALL to remove issue 154 of
|
|
"Radikal" from the server temporarily. It has not come to that
|
|
during this recent blockade.
|
|
Speaking out on the renewed blockade, XS4ALL said they were
|
|
surprised, stating that censoring measures on the
|
|
Internet had repeatedly proved to be counter productive. "As a
|
|
provider we take the position that we cannot curtail freedom
|
|
of opinion", XS4ALL spokesman Felipe Rodriquez-Svensson said.
|
|
If there are doubts about the legitimacy of "Radikal" in the
|
|
Netherlands, they should be settled in a Dutch court.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 23 Apr 1997 23:12:37 EDT
|
|
From: Martin Kaminer <iguana@MIT.EDU>
|
|
Subject: File 3--HACK - Censorship as system failure; route around...
|
|
|
|
Date--Wed, 23 Apr 1997 11:33:37 -0500 (CDT)
|
|
From--FringeWare News Network <email@Fringeware.COM>
|
|
|
|
Sent from: heath m rezabek <rez@fringeware.com>
|
|
http://www.news.com/News/Item/0,4,9964,00.html
|
|
|
|
Teen bypasses blocking software
|
|
By Courtney Macavinta
|
|
April 22, 1997, 5:30 p.m. PT
|
|
|
|
A teenager is using his Web site to help others bypass one brand
|
|
of filtering software intended to protect minors from illicit Net
|
|
material.
|
|
|
|
Using the "CYBERsitter codebreaker" from 18-year-old Bennett
|
|
Haselton, surfers can now decode the list of all Net sites
|
|
blocked by Solid Oak's Cybersitter software.
|
|
|
|
Haselton--the founder of a teen organization called Peacefire
|
|
that fights Net censorship--contends that the software violates
|
|
free speech rights for adults and teen-agers. He claims the
|
|
software is also falsely advertised because it promises parents
|
|
the "ability to limit their children's access to objectionable
|
|
material on the Internet," but also blocks other content on the
|
|
Net.
|
|
|
|
Haselton's campaign to get around Cybersitter has Solid Oak's
|
|
president seeing red.
|
|
|
|
Solid Oak denies Haselton's charges and is investigating the
|
|
legality of the code-breaking program. "He doesnUt know anything,
|
|
and he's just a kid," Solid Oak President Brian Milburn said
|
|
today. "We have never misrepresented our product--ever."
|
|
|
|
Haselton's Cybersitter codebreaker can be used to crack a coded
|
|
list of the sites that CYBERsitter blocks. The list is
|
|
distributed to subscribers to notify users what sites are being
|
|
blocked. Subscribers pay $39.95 for the software.
|
|
|
|
The software blocks sites containing any words describing
|
|
genitals, sex, nudity, porn, bombs, guns, suicide, racial slurs
|
|
and other violent, sexual and derogatory terms.
|
|
|
|
The list also blocks an array of sites about gay and lesbian
|
|
issues, including PlanetOut and the International Gay and Lesbian
|
|
Human Rights Commission . Cybersitter even blocks the National
|
|
Organization for Women because it contains information about
|
|
lesbianism, Solid Oak stated. "The NOW site has a bunch of
|
|
lesbian stuff on it, and our users don't want it," said Milburn.
|
|
|
|
The software also filters any site that contains the phrase
|
|
"Don't buy CYBERsitter" as well as Haselton's own site and any
|
|
reference to his name.
|
|
|
|
Milburn says Haselton's campaign is hurting the product's
|
|
marketability and hinted that the company will stop him, but
|
|
wouldn't say exactly how.
|
|
|
|
"We have users who think they purchased a secure product. This is
|
|
costing us considerably," Milburn said. "But we're not going to
|
|
let Bennett break the law."
|
|
|
|
He did point out that Haselton's program to decode the software
|
|
may violate its licensing agreement, which states: "Unauthorized
|
|
reverse engineering of the Software, whether for educational,
|
|
fair use, or other reason is expressly forbidden. Unauthorized
|
|
disclosure of CYBERsitter operational details, hacks, work around
|
|
methods, blocked sites, and blocked words or phrases are
|
|
expressly prohibited."
|
|
|
|
Haselton is undaunted by the suggestion of legal reprecussions.
|
|
"I've talked to a lawyer who offered to represent me in the event
|
|
that Cybersitter goes after me," he added.
|
|
|
|
Haselton, a junior at Vanderbuilt University, argues that the
|
|
software doesnUt protect kids from smut, but just keeps them from
|
|
learning new ideas.
|
|
|
|
"Blocking software is not the solution to all of our problems.
|
|
What's dangerous is not protecting [teenagers' free] speech on
|
|
the Net as well," he said. "This is the age, when you form your
|
|
opinions about social issues, human rights, and religion. We need
|
|
to keep free ideas on the Net for people under 18."
|
|
|
|
Haselton's organization is also a plaintiff in a lawsuit being
|
|
argued today in New York, the American Library Association vs.
|
|
Governor George Pataki. The case was filed to strike down a state
|
|
law similar to the Communications Decency Act that prohibits
|
|
making indecent material available to minors over the Net.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 24 Apr 1997 15:18:50 -0500 (CDT)
|
|
From: Bennett Haselton <bennett@peacefire.org>
|
|
Subject: File 4--Demand letter - Milburn v. Hasselton??
|
|
|
|
Source - fight-censorship@vorlon.mit.edu, peacefire-talk@vorlon.mit.edu
|
|
|
|
[I like the part about us linking to his web site.
|
|
-Bennett]
|
|
|
|
>Return-path--<bennett@www.media3.net>
|
|
>Date--Thu, 24 Apr 1997 09:59:10 -0700
|
|
>From--Brian Milburn <bmilburn@solidoak.com>
|
|
>Subject--Demand letter
|
|
>X-Sender--Brian Milburn
|
|
>To--bennett@peacefire.org
|
|
>Organization--Solid Oak Software, Inc.
|
|
>
|
|
>The following is a copy of a certified letter mailed to you on April 24, 1997.
|
|
>
|
|
>------------------------------
|
|
>
|
|
>Bennett Haselton
|
|
>Vanderbuilt University
|
|
>Box 1161, Station B
|
|
>Nashville, TN 37235
|
|
>
|
|
>Re: www.peacefire.org
|
|
>
|
|
>
|
|
>Dear Mr. Haselton:
|
|
>
|
|
>Please let this letter serve as notice of the following:
|
|
>
|
|
>1. You have posted a program on your web site called "CYBERsitter filter file
|
|
>codebreaker". This program illegally modifies and decodes data and source code
|
|
>protected by U.S. and International intellectual property laws.
|
|
>
|
|
>This program performs this action without permission of the copyright
|
|
owner. We demand
|
|
>that this program be removed immediately.
|
|
>
|
|
>2. You have placed links on your web site to various locations on servers
|
|
owned and
|
|
>operated by Solid Oak Software, Inc., a private corporation. These include,
|
|
but are
|
|
>not limited to, HTTP links, FTP links, and e-mail links and private e-mail
|
|
addresses.
|
|
>
|
|
>You have done this without permission of Solid Oak Software, Inc. Further
|
|
use of
|
|
>these links to our private facilities will be viewed as trespassing and
|
|
intentional
|
|
>harassment. We demand that these links be removed immediately.
|
|
>
|
|
>Your failure to comply with these demands immediately upon receipt of this
|
|
letter will
|
|
>be met with appropriate action.
|
|
>
|
|
>
|
|
>Sincerely,
|
|
>Brian Milburn, President
|
|
>Solid Oak Software, Inc.
|
|
>
|
|
>
|
|
>
|
|
>____________________________________________
|
|
>
|
|
>Brian Milburn
|
|
>Solid Oak Software,Inc. - Santa Barbara, CA
|
|
>bmilburn@solidoak.com - CIS: 74774,551
|
|
>http://www.solidoak.com - CIS: "GO SOLIDOAK"
|
|
>
|
|
>
|
|
>
|
|
---------------------------------------------------------
|
|
bennett@peacefire.org (615) 421 6408 http://www.peacefire.org
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 25 Apr 97 22:09:30 -0700
|
|
From: Gordon Meyer <grmeyer@ricochet.net>
|
|
Subject: File 5--Fwd: More news about DES...
|
|
|
|
---------------- Begin Forwarded Message ----------------
|
|
Date-- 04/25 5:52 PM
|
|
From-- Justin Dolske, dolske@cis.ohio-state.edu
|
|
|
|
Thanks for your DESCHALL mention in CUD 9.31... Here's a further
|
|
development in the DESCHALL DES cracking effort... We're actually testing
|
|
over 1 billion keys per seconds right now, and are close to hitting 2%
|
|
done!
|
|
|
|
Justin Dolske
|
|
<URL:http://www.cis.ohio-state.edu/~dolske/>
|
|
(dolske@cis.ohio-state.edu)
|
|
Graduate Fellow / Research Associate at The Ohio State University, CIS
|
|
Dept.
|
|
|
|
INTERNET LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
|
|
|
|
LOVELAND, COLORADO (April 17, 1997). Thousands of computers, all
|
|
across the U.S. and Canada, are linking together via the Internet in an
|
|
unprecedented attempt to "crack" the Data Encryption Standard, DES.
|
|
|
|
The so-called DESCHALL effort is responding to a challenge,
|
|
including a prize of $10,000, being offered by RSA Data Security to the
|
|
individual or group which is first to decode RSA's secret message.
|
|
|
|
According to Rocke Verser, a contract programmer and consultant,
|
|
who developed the specialized software in his spare time, "There are
|
|
over 2500 computers now working cooperatively on the challenge."
|
|
|
|
Using a technique called "brute-force", computers participating in
|
|
the challenge are simply trying every possible key. "There are over 72
|
|
quadrillion keys. A number", Verser quips, "about 15,000 times larger
|
|
than the deficit."
|
|
|
|
But the DESCHALL group is racing through the keys at an incredible
|
|
pace. The group is now trying over 50 trillion keys per day -- or more
|
|
than 600 million keys per second.
|
|
|
|
Perhaps even more impressive, the number of computers
|
|
participating, and the rate at which they are trying keys has been
|
|
doubling every 8 to 11 days for the past 2 months.
|
|
|
|
If the number of participants continues to double every 10 days, it
|
|
should take about 2 months to find the key. If no other participants
|
|
joined the effort, it should take about 2 years to find the key.
|
|
|
|
Word of this cooperative effort has spread primarily by word of
|
|
mouth, and the Internet equivalents -- IRC, Newsgroups, and Mailing
|
|
Lists.
|
|
|
|
Noone knows where the growth of this type of cooperative computing
|
|
effort will peak.
|
|
|
|
"Members of the DESCHALL team will be in a festive mood, Friday",
|
|
Verser predicts. "About suppertime" on Friday, DESCHALL computers will
|
|
have tested 1% of the total set of 72 quadrillion keys.
|
|
|
|
Anyone with a computer and an Internet connection can participate.
|
|
The software is available free of charge, and a portion of the prize
|
|
money will be awarded to the computer user that finds the correct key.
|
|
|
|
Information about the DESCHALL effort, including how to join, is
|
|
available from the official DESCHALL Web site at:
|
|
<http://www.frii.com/~rcv/deschall.htm>
|
|
|
|
|
|
MEDIA CONTACTS:
|
|
Matt Curtin, (908) 431-5300 x 295, <cmcurtin@research.megasoft.com>
|
|
|
|
ALTERNATE:
|
|
Rocke Verser, (970) 663-5629, <rcv@dopey.verser.frii.com>
|
|
|
|
- 30 -
|
|
|
|
|
|
|
|
INTERNET LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
|
|
Background / Sidebar, for Release dated April 17, 1997
|
|
|
|
The Data Encryption Standard, DES, is a national standard, adopted
|
|
in 1977. Use of DES is mandatory in most Federal agencies, except the
|
|
military. DES is very widely used in the private sector, as well.
|
|
|
|
Interbank wire transfers, Visa transactions, your medical and
|
|
financial records, and your employer's financial data are some of the
|
|
many things secured against prying eyes or against modification by DES.
|
|
|
|
When the Data Encryption Standard was adopted in 1977, there was
|
|
some question as to whether or not the Standard was adequate to protect
|
|
confidential data.
|
|
|
|
Matt Curtin, Chief Scientist for Megasoft, Inc. says, "This is
|
|
proving by example, not by mathematical calculation, that DES can be
|
|
broken with little or no cost." Curtin added, "Others could just as
|
|
easily be attempting to gain access to multibillion dollar wire
|
|
transfers."
|
|
|
|
|
|
MEDIA CONTACTS:
|
|
Matt Curtin, (908) 431-5300 x 295, <cmcurtin@research.megasoft.com>
|
|
|
|
ALTERNATE:
|
|
Rocke Verser, (970) 663-5629, <rcv@dopey.verser.frii.com>
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 23 Apr 1997 22:46:58 -0400 (EDT)
|
|
From: Thomas Grant Edwards <tedwards@Glue.umd.edu>
|
|
Subject: File 6--NSF out of DNS, what comes next?
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
C-NET is reporting that the National Science Foundation is getting out of
|
|
the domain name business as early as March 1998 if not sooner, and will
|
|
not renew the InterNIC agreement with Network Solutions.
|
|
|
|
NSF acting deputy director Joseph Bordogna is quoted as saying "The
|
|
long-term issues raised by [an internal report made public today] may
|
|
indeed require additional government oversight. We are referring the OIG
|
|
report to appropriate policy-makers in the Administration for
|
|
consideration."
|
|
|
|
This kind of rhetoric makes me think that the Administration is going to
|
|
try to rush in like a white knight and try to solve our "problem" in a way
|
|
which will no doubt lead to government censorship of domain names.
|
|
|
|
While Network Solutions has had a government-granted monopoly on domain
|
|
names, at least it was a level removed from the government itself. I fear
|
|
we will begin now to see trial balloons floated for direct government
|
|
intervention in DNS issues. I can imagine Congresscritters arguing, "We
|
|
need the Internet for our children...butthole.com, sex.com, christ.com,
|
|
penis.org, vagina.com, anal.org, and the like just will not do!"
|
|
|
|
Someone please tell me I'm worrying too much!
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 24 Apr 1997 07:57:26 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 7--Texas CyberWar - Tx Telecom Jrnl (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Thu, 24 Apr 1997 05:15:57 -0500 (CDT)
|
|
From--Gene Crick <gcrick@tpoint.net>
|
|
|
|
TTJ is a digest of news/analysis for telecommunications professionals
|
|
Re-posting is allowed where appropriate, if full attribution included
|
|
All Copyrights (1995-97) retained by Texas Telecommunications Journal
|
|
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
|
Texas Telecommunications Journal volume 2, number 14
|
|
|
|
|
|
Secession and Cyberspace: The First Internet War
|
|
|
|
GENERAL MORALES VS. THE REPUBLIC OF TEXAS
|
|
|
|
|
|
Recently the eyes of Texans have been turning to the Internet, observing
|
|
the continuing conflict between Texas Attorney General Dan Morales and
|
|
the "Republic of Texas" political group, a secessionist organization
|
|
which challenges current state and federal government authority and has
|
|
been filing allegedly "bogus" liens against Texas property deeds.
|
|
|
|
In civil actions arising from these liens, the Texas AG served subpoenas
|
|
on ten Texas ISPs, demanding the ISPs turn over all sorts of records
|
|
relating to several subscribers, most of whom are linked by the AG to
|
|
the Republic of Texas group. The demand could include printout of all
|
|
those customers' system e-mail, website content, service applications,
|
|
account IDs, passwords, plus payment and other business records.
|
|
|
|
Eight of these ISPs, acting on legal counsel, reportedly delivered
|
|
records to the AG.
|
|
|
|
Two others, Internet Texoma and Overland Network, were less cooperative.
|
|
Expressing concerns about subscriber privacy and possible violation of
|
|
the federal Electronic Communications Privacy Act of 1986 (ECPA), they
|
|
joined forces with the Texas ISP Association (TISPA) to oppose the broad
|
|
scope of information sought by Attorney General Morales.
|
|
|
|
The ISPs maintain they are placed in an impossible position by the AG's
|
|
subpoenae. Though they are willing to comply with any lawful court
|
|
orders received, they claim compliance as requested by the AG would
|
|
force them to violate their perceived responsiblities to their customers
|
|
and also violate explicit privacy requirements of state and federal law.
|
|
|
|
One concern cited by the ISPs is this delivery would make all the email
|
|
information public. Since many subscribers requested were not party to
|
|
any lawsuits, this raises significant issues for Internet privacy. So
|
|
whatever the outcome of these actions, Internet precedent will be set.
|
|
|
|
Another complaint from TISPA/ISP attorney Scott McCollough is that the
|
|
AG's subpoenae were not from a judge, merely from a court reporter.
|
|
Unlike true judicial orders these demands, if denied, do not necessarily
|
|
subject the non-complying ISPs to penalties for contempt of court.
|
|
|
|
|
|
THE WORLD IS WATCHING TEXAS... AGAIN
|
|
The investigative precedents sought by Attorney General Morales raised
|
|
hackles outside the state. In a letter to Wired News, Wayne Shirley,
|
|
Chairman of the New Mexico Public Utility Commission said, "I find the
|
|
actions by the Attorney General of Texas to be beyond any reasonable
|
|
limit which even an overly zealous rookie prosecutor would argue."
|
|
|
|
Chairman Shirley (whose brother-in-law is COO of Internet Texoma)
|
|
further maintains that "the actions of the Attorney General of Texas in
|
|
this matter undermine the bedrock foundation of our free society."
|
|
|
|
|
|
SO WHAT'S GONNA HAPPEN?
|
|
The position of TISPA and the two ISPs is that any customer specific
|
|
content or information is private and confidential and thus cannot be
|
|
revealed under casual summons. They contend these customer data are
|
|
protected by laws and safeguards which require more than the AG's
|
|
current subpoenae to breach.
|
|
|
|
Faced with this opposition, the Attorney General apparently intends to
|
|
curtail his Internet subscriber information requests significantly, and
|
|
is expected to drop demands for user email logs and message contents.
|
|
He seems more intent on pursuing action against the dissident "Republic"
|
|
than on starting a conflict with people on the Internet.
|
|
|
|
|
|
KEVLAR AND KEYBOARDS
|
|
In a bizarre late development the Republic of Texas has just posted a
|
|
formal "Declaration of War" to their website at Overland Network. (TTJ
|
|
just reports `em, folks; we don't try to explain this kind of politics.)
|
|
|
|
Once again, the ISPs involved are placed in an uncomfortable position -
|
|
debate is certain over whether this secessionist act is protected free
|
|
political speech or criminal treason against the lawful government. But
|
|
whatever legal view prevails, to the best of our knowledge this marks
|
|
the first time that the Internet has been used to declare a war.
|
|
|
|
* * * * * *
|
|
|
|
Final Note: it's tempting to be flip about such strange happenings. But
|
|
recent events remind that real people can sustain real harm in political
|
|
conflicts. Let's hope this whole episode remains nothing more than a
|
|
slightly off-center milestone as rights are defined in Cyberspace.
|
|
|
|
|
|
Republic of Texas web sites:
|
|
<http://www.overland.net/~embthert/em02007.html>.
|
|
<http://www.flash.net/~robertk/>
|
|
|
|
* * * * * * * * * * *
|
|
|
|
22 April, 1997
|
|
|
|
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
|
TTJ editor Gene Crick is also president of the Texas ISP Association.
|
|
Note: TTJ is a journal of information, opinion and telecom advocacy.
|
|
We cannot guarantee accuracy of these early, informal reports;
|
|
please check with official sources to confirm critical results.
|
|
Subscribers may request details or forward specific questions.
|
|
Subscription info: Gene Crick gcrick@main.org 512/303-1021 fx 321-3163
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.33
|
|
************************************
|
|
|