827 lines
37 KiB
Plaintext
827 lines
37 KiB
Plaintext
|
||
Computer underground Digest Wed Apr 22, 1998 Volume 10 : Issue 25
|
||
ISSN 1004-042X
|
||
|
||
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Field Agent Extraordinaire: David Smith
|
||
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
||
CONTENTS, #10.25 (Wed, Apr 22, 1998)
|
||
|
||
File 1--Call for Papers - Special Issue of SP&E
|
||
File 2--Congress May Soon Vote on Spawn of CDA Censorship Bills
|
||
File 3--"Spam King" abdicates
|
||
File 4--REVIEW: "Digital Fortress", Dan Brown
|
||
File 5--Internet porn restriction moving ahead in Congress
|
||
File 6--Re: "tagging color printers" (CuD 10.22)
|
||
File 7--Re: File 1--proposal of technical solutions to spam problem
|
||
File 8--for CuD
|
||
File 9--Islands in the Clickstream. Densities. April 11, 1998
|
||
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: Mon, 13 Apr 1998 07:58:57 -0700 (PDT)
|
||
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
||
Subject: File 1--Call for Papers - Special Issue of SP&E
|
||
|
||
Call for Papers
|
||
Special issue of "Software Practice & Experience"
|
||
Experiences with Computer and Network Security
|
||
July 1, 1998
|
||
|
||
Later this year or early next year, there will be a special issue
|
||
of the journal "Software Practice & Experience," with Gene
|
||
Spafford as the guest editor; if there are enough articles, a
|
||
second issue may also be published. This special issue will be
|
||
devoted to experiences with computer and network security.
|
||
|
||
The purpose of Software- Practice & Experience is to convey the
|
||
results of practical experience (whether successful or not) that
|
||
might benefit the computing community. The key criterion for a
|
||
paper is that it make a contribution from which other persons
|
||
engaged in software design and implementation might benefit.
|
||
Originality, although important, is secondary, especially in cases
|
||
where apparently well known techniques do not appear in the
|
||
readily available literature.
|
||
|
||
Papers describing both `systems' and `applications' software in
|
||
any computing environment are acceptable. Typical topics include
|
||
software design and implementation, case studies, studies
|
||
describing the evolution of software systems, critical appraisals
|
||
of systems, and the practical aspects of software engineering.
|
||
Theoretical discussions can be included, but should illuminate the
|
||
practical aspects of the work, or indicate directions that might
|
||
lead to better practical systems.
|
||
|
||
This special issue is specifically devoted to issues of computer
|
||
and network security software. We are seeking high-quality
|
||
articles relating to the above-mentioned themes. This includes
|
||
papers on at least the following topics:
|
||
* access control systems
|
||
* auditing systems and analysis
|
||
* misuse and instrusion detection systems
|
||
* applications of cryptography
|
||
* secure messaging systems
|
||
* information protection systems
|
||
* security of mobile code
|
||
* security of browsers and related technology
|
||
* security testing and assurance
|
||
* firewall construction and testing
|
||
* experiences with new security programming paradigms
|
||
* development and experience with "hacking tools"
|
||
* experiences with patching security flaws
|
||
|
||
Papers may be of any length, ranging from a short note (perhaps a page) to
|
||
a full treatment of a substantial software system (say 40 pages). To submit
|
||
a paper to this special issue of the journal, please submit 3 paper copies
|
||
of your paper, double-spaced, to:
|
||
SP&E Special Issue Submissions
|
||
c/o Prof. Eugene Spafford
|
||
Department of Computer Sciences
|
||
Purdue University
|
||
West Lafayette, IN 47907-1398
|
||
|
||
Articles should be submitted when ready, and preferably by July 1,
|
||
1998 so as to allow sufficient time for peer review and any
|
||
required edits and resubmission. Expected publication of the
|
||
issue will be December 1998.
|
||
|
||
If you are interested in being added to the list of potential
|
||
reviewers for this issue, or if you have questions concerning
|
||
submissions, contact Spaf at <spaf@cs.purdue.edu>
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 6 Apr 1998 17:44:12 -0500 (EST)
|
||
From: owner-cyber-liberties@aclu.org
|
||
Subject: File 2--Congress May Soon Vote on Spawn of CDA Censorship Bills
|
||
|
||
CYBER-LIBERTIES UPDATE
|
||
April 7, 1998
|
||
|
||
|
||
7Congress May Soon Vote on Spawn of CDA Censorship Bills
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
Congress May Soon Vote on Spawn of CDA Censorship Bills
|
||
|
||
The Senate Commerce Committee recently approved two bills that may soon
|
||
go to a floor vote that reconstruct the unconstitutional provisions of
|
||
the 1996 Communications Decency Act and remove power from parents and
|
||
local communities to decide how to help children use the Internet
|
||
safely.
|
||
|
||
The ACLU dubbed the bills "spawn of CDA," saying in a letter to the
|
||
committee that the proposals fly in the face of the Supreme Court's
|
||
landmark ruling in ACLU v. Reno and will restrict protected speech on
|
||
the Internet.
|
||
|
||
Ignoring these warnings, the Commerce Committee passed Senate Bill 1619,
|
||
the Internet School Filtering Act, by a unanimous voice vote. The bill,
|
||
sponsored by Sen. John McCain, R-AZ, requires all public libraries and
|
||
schools that receive federal funds for Internet access to use blocking
|
||
software.
|
||
|
||
The second bill, S. 1482, was sponsored by Senator Dan Coats, R-IN.
|
||
Dubbed "Son of CDA," its thrust is identical to the ill-fated
|
||
Communications Decency
|
||
Act, which was unanimously overturned last year by the United States
|
||
Supreme Court in
|
||
Reno v ACLU. The lone dissenter in that voice vote was Sen. Ron Wyden,
|
||
D-OR, who criticized the "one-size-fits-all Washington approach" to
|
||
regulating the Internet.
|
||
|
||
Congress is obviously enjoying the free political ride these bills
|
||
provide, with little thought for the taxpayers who will ultimately pay
|
||
the price when the courts strike them down, said Ann Beeson, ACLU Staff
|
||
Attorney.
|
||
|
||
In an ACLU letter to the Senate Committee about the Internet Filtering
|
||
Act, the group said, "blocking software restricts access to valuable,
|
||
protected online speech about topics including safe sex, AIDS and even
|
||
web sites posted by religious groups such as the Society of Friends and
|
||
the Glide United Methodist Church."
|
||
|
||
The ACLU is also working with 37 organizations that are members of the
|
||
Internet Free Expression Alliance (IFEA) on efforts to dissuade Congress
|
||
from passing the laws.
|
||
|
||
The ACLU and IFEA members continue to emphasize that parents and
|
||
teachers, not the government, should provide minors with guidance about
|
||
accessing the Internet.
|
||
|
||
The Coats bill, which attempts to narrow the CDA's restrictions to
|
||
speech that is "harmful to minors," is also unconstitutional, the groups
|
||
said, because such speech is "unquestionably protected by the
|
||
Constitution when communicated among adults."
|
||
|
||
The bill would impose criminal penalties on any sites with a commercial
|
||
component that provide access to inappropriate material without
|
||
requiring age verification. The definition of commercial distributor
|
||
could include any site from amazon.com to individual home pages that
|
||
have banner advertisements.
|
||
|
||
The bill also "fails to make any distinction between material that may
|
||
be harmful to a six-year-old but valuable for a 16-year-old, such as
|
||
safer-sex information," the ACLU letter said.
|
||
|
||
Some Congressional staff members believe the bills may go to a floor
|
||
vote shortly after Congress spring recess.
|
||
|
||
Take action against these bills by sending a message to Congress that
|
||
you oppose these bills. You may send a fax in just a few moments by
|
||
visiting the In Congress section of the ACLU Freedom Network web
|
||
page, online at: <http://www.aclu.org/congress/IC031298.html>
|
||
|
||
More information can also be found online at the Internet Free
|
||
Expression Alliance home page, online at <http://www.ifea.net>
|
||
|
||
++++++++++++++++++++++++++++
|
||
|
||
The Update is a bi-weekly e-zine on cyber-liberties cases and
|
||
controversies at the state and federal level. Questions or comments can
|
||
be sent to Cassidy Sehgal at csehgal@aclu.org. Past issues are archived
|
||
at: <http://www.aclu.org/issues/cyber/updates.html>
|
||
|
||
To subscribe to the ACLU Cyber-Liberties Update, send a message to
|
||
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
|
||
message. To terminate your subscription, send a message to
|
||
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
|
||
|
||
FOR GENERAL INFORMATION ABOUT THE ACLU, WRITE TO info@aclu.org.
|
||
SEE US ON THE WEB AT <http://www.aclu.org> AND AMERICA ONLINE KEYWORD:
|
||
ACLU
|
||
|
||
------------------------------
|
||
|
||
From: "Leandro Asnaghi-Nicastro" <leandro@CAPNASTY.ORG>
|
||
Date: Fri, 17 Apr 1998 22:36:30 +0000
|
||
Subject: File 3--"Spam King" abdicates
|
||
|
||
Thursday April 16 11:17 AM EDT
|
||
|
||
"Spam King" abdicates
|
||
|
||
PHILADELPHIA (Reuters) - "The Spam King," one of the most notorious
|
||
junk e-mailers on the Internet, says he has abdicated his throne and
|
||
promises never to sin again.
|
||
|
||
But not everyone believes him.
|
||
|
||
Sanford Wallace, 29-year-old president of Cyber Promotions Inc.,
|
||
abruptly announced his decision to a legion of long-time adversaries
|
||
who frequent a newsgroup dedicated to fighting bulk e-mail promotions.
|
||
|
||
|
||
The term "spamming" was derived from a "Monty Python" sketch in which
|
||
a waitress offers diners a choice of "spam, spam, spam, spam and
|
||
spam."
|
||
|
||
As the Internet's so-called Spam King, Wallace once boasted that his
|
||
Philadelphia-based firm was sending out 25 million promotional e-mails
|
||
daily on behalf of himself and his clients.
|
||
|
||
But in his parting message, posted last weekend, he said he had not
|
||
only abandoned the practice but would support anti-spam legislation.
|
||
|
||
"I will never go back to spamming," he wrote. "I apologize for my past
|
||
actions."
|
||
|
||
He added that although there was money in spamming, profits were
|
||
outweighed by risks.
|
||
|
||
Some anti-spam activists welcomed the news as a sign that the battle
|
||
had turned in their favor. But others remained suspicious, recalling
|
||
that Wallace had once previously promised to desist and form a direct
|
||
mailing standards organization.
|
||
|
||
His latest change of heart followed a futile six-month attempt to get
|
||
his operation back online after an angry service provider cut him off.
|
||
He also had been saddled with expensive legal settlements, ending with
|
||
a judgment against him last week over unsolicited faxes.
|
||
|
||
Wallace could not be reached for comment. ^REUTERS@
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 16 Apr 1998 08:38:02 -0800
|
||
From: "Rob Slade" <rslade@sprint.ca>
|
||
Subject: File 4--REVIEW: "Digital Fortress", Dan Brown
|
||
|
||
BKDGTLFT.RVW 980222
|
||
|
||
"Digital Fortress", Dan Brown, 1998, 0-312-18087-X, U$24.95/C$33.95
|
||
%A Dan Brown danbrown@digitalfortress.com
|
||
%C 175 Fifth Ave., New York, NY 10010
|
||
%D 1998
|
||
%G 0-312-18087-X
|
||
%I St. Martin's Press
|
||
%O U$24.95/C$33.95 212-674-5151 fax 800-288-2131 www.stmartins.com
|
||
%P 384 p.
|
||
%T "Digital Fortress"
|
||
|
||
Dear Dan,
|
||
|
||
Thanks for getting St. Martin's to send along the book. I enjoyed it
|
||
a lot. Your characters are great, and the device of having the
|
||
physical "street" action run in parallel with the cerebrations going
|
||
on in Crypto was quite effective. It lost a little when the action in
|
||
Crypto got physical, and at times the street activity skated a bit
|
||
close to farce, but that's a fine line with thrillers anyway. You
|
||
have a fine touch with dialogue, and the misunderstandings caused by
|
||
specific messages was particularly realistic. (Although, if I may
|
||
say, the people who staff your command center are a bit thick: I got
|
||
it sixteen pages before they did.)
|
||
|
||
However, I suspect that whoever suggested the review project to you
|
||
didn't tell you the whole story. The books reviewed here are
|
||
critiqued on the basis of technology, including the fiction. And on
|
||
that score, well, there are a few things you might want to reconsider
|
||
on your next effort.
|
||
|
||
I will say that you have included a good presentation of ciphering,
|
||
although you sometimes seem to get codes and ciphers confused.
|
||
("Without wax" is a code, and therefore not subject to decryption.)
|
||
You have also stressed the importance of key lengths, which, along
|
||
with the algorithm used, is critical to determining the strength of
|
||
encryption. Cryptographic key length is usually expressed in bits,
|
||
but you often refer to keys with different lengths of characters. A
|
||
character is usually measured as a byte, or eight bits.
|
||
(Incidentally, ASCII characters were original defined as seven bits,
|
||
so there are only 128, not 256.) Let me point out, though, that
|
||
*adding* a single bit (not character) to a key length is generally
|
||
considered to double the key space, essentially doubling the time
|
||
necessary to crack a given key.
|
||
|
||
Let's start with arithmetic. If your TRANSLTR superdecrypter is able
|
||
to crack a 64 *character* key in ten minutes, a 65 character key will
|
||
take about a day. A 66 character key will need about four months.
|
||
However, in the book, a 10,000 bit key, which is equivalent to 1,250
|
||
bytes and roughly twenty *times* as long as your 64 byte key, only
|
||
takes an hour. A key length a hundred times as long as the 10,000
|
||
bits takes only three hours.
|
||
|
||
Sticking with calculations, I note that your command center, dominated
|
||
by a 30' by 40' video wall, required the excavation of 250 metric tons
|
||
of earth. If so, the room is less than eight feet from front to back,
|
||
even if it was earth that was excavated and not rock, as one might
|
||
expect at 214 feet down. In the same vein, TRANSLTR is housed in
|
||
something no more than twenty three feet across and eight stories
|
||
deep. But if we assume that the three million processors in it are no
|
||
more advanced than, say, Pentiums, then the processors themselves are
|
||
going to occupy a solid block of space ten feet thick and five stories
|
||
high, even if the "spray-seal" doesn't add too much bulk. (I assume
|
||
that by "VSLI" you mean VLSI, very large scale integration?) This
|
||
disregards the space needed for memory, support chips, the boards
|
||
themselves, cabling, interfaces, catwalks, and the oft-mentioned
|
||
generators and cooling system, never mind enough air to support a
|
||
fire.
|
||
|
||
(While we are on the subject, we might as well mention chemistry: fire
|
||
consumes oxygen, it doesn't usually release it.)
|
||
|
||
A short detour via linguistics. Japanese ideographs are, as you say,
|
||
based on Chinese ideographs. The similarity is not confined to the
|
||
form of the symbols, though: enough of the meaning should come through
|
||
in either language. (Of course, if you have the actual symbols, it
|
||
should be clear which language is being used. The biggest problem
|
||
would be in determining representation for the symbols. Unicode,
|
||
anyone?)
|
||
|
||
And, finally, to computers. Just to get these points out of the way,
|
||
Grace Murray Hopper's moth was found in the Mark II, not the Mark I,
|
||
and was not the first use of the term "bug" (although it may have been
|
||
the origin of the use of "debugging"). PGP (Pretty Good Privacy) is
|
||
not an algorithm, although it is one of the most widely used
|
||
implementations.
|
||
|
||
First of all, you can't weld ceramic, and secondly, if you do weld the
|
||
computer shut, you have rendered it instantly obsolete. Even Deep
|
||
Blue got rebuilt between matches. Next, it makes no sense to say that
|
||
the computer uses quantum states "rather than" binary for storage.
|
||
Binary is, in a basic sense, a quantum state, and quantum physics
|
||
could be used to build devices that store binary information. (All
|
||
information can be stored in a binary system.) Also, I know about
|
||
silicon, CMOS (complementary metal oxide semiconductor), and gallium-
|
||
arsenide but ... titanium-strontium? And, OK, I know titanium burns,
|
||
but you have to get it pretty darn hot in order to do so.
|
||
|
||
Yes, some languages are similar enough that it makes it easy for
|
||
someone who has learned one to learn the other. However, it doesn't
|
||
mean that you automatically know how to use a third. When programs
|
||
are created, though, they are generally compiled into machine
|
||
language. (Certainly programs in Pascal and C are.) That means it
|
||
doesn't matter what languages you know: typing source commands into
|
||
the keyboard isn't going to affect the running program. Some
|
||
scripting languages use the source files, but Pascal and C don't
|
||
qualify. But the difference between source and object code raises
|
||
another point: the net would not automatically adopt an encryption
|
||
standard without having the source code and a description of the
|
||
algorithm to examine. The source code for PGP is available, and many
|
||
people compile their program directly from the source, not trusting an
|
||
already compiled version. Therefore, a "trap-doored" Digital Fortress
|
||
would be detected almost immediately. (The publication of the
|
||
Skipjack algorithm did result in the detection of a bug: ironically
|
||
the bug would have let the public use non-escrowed keys with it,
|
||
rendering the government's attempt to read messages much more
|
||
difficult.) Your email tracer doesn't make any sense: if you can't
|
||
find the guy, how can you find his site? Also, even if you could link
|
||
back to him somehow, as I get everlastingly tired of repeating, you
|
||
can't send programs in text messages (at least, not without it being
|
||
blindingly obvious).
|
||
|
||
More importantly, it doesn't matter how powerful your computer is, you
|
||
can't decrypt a message with a key if you don't know the algorithm.
|
||
Key length is important, but so is the algorithm used. A 56 bit
|
||
(that's seven bytes, by the way) key can be very strong in one
|
||
algorithm, and relatively weak in another. Also, the importance of
|
||
public-key encryption does not lie simply in the strength of the
|
||
algorithm. It is the "public" aspect that is so important.
|
||
Correspondents who have not met can be completely sure of the
|
||
authentication of the other without ever knowing identities. A
|
||
fraudulent "North Dakota" would not be a problem to someone who really
|
||
knew about encryption.
|
||
|
||
Finally, there is my field, viruses. It makes no sense to create a
|
||
virus for a one-of-a-kind computer, since viruses, as you eventually
|
||
do point out, are meant to reproduce. Most of what you say about
|
||
viruses makes no sense, including "mutation strings" and "rotating
|
||
cleartext." Viruses do not infect data, or, if they do, they just
|
||
corrupt it, rather than continuing to spread. I suppose you can
|
||
"cross-breed [viruses] into oblivion," but it's easier to delete than
|
||
overwrite them. And finally, what you have isn't a virus, and, no, it
|
||
isn't a worm either. (Worms reproduce, too.) What you have is the
|
||
classic, common or garden trojan horse. The bane of greedy net
|
||
surfers everywhere.
|
||
|
||
copyright Robert M. Slade, 1998 BKDGTLFT.RVW 980222
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 2 Apr 1998 14:20:54 -0800
|
||
From: "(--Todd Lappin-->)" <telstar@wired.com>
|
||
Subject: File 5--Internet porn restriction moving ahead in Congress
|
||
|
||
Internet porn restriction moving ahead in Congress
|
||
|
||
WASHINGTON, April 2 (Reuters) - Legislation to restrict
|
||
pornography on the Internet, backed by conservative lawmakers but
|
||
opposed by civil libertarians, is picking up momentum,
|
||
Congressional staff members said on Thursday.
|
||
Last month, the Senate Commerce Committee approved a bill
|
||
authored by Dan Coats, Republican of Indiana, that would require
|
||
commercial Internet sites containing material deemed harmful to
|
||
minors to prohibit access by children.
|
||
Within a few weeks, a companion bill will be introduced in the
|
||
U.S. House of Representatives by Republicans Mike Oxley of Ohio
|
||
and Jim Greenwood of Pennsylvania, an Oxley staffer said.
|
||
"Senator Coats has done a good job of building momentum," the
|
||
staffer said.
|
||
|
||
------------------------------
|
||
|
||
From: "Frank Knobbe" <FKnobbe@BELLSOUTH.NET>
|
||
Date: Fri, 17 Apr 1998 23:07:17 -0600
|
||
Subject: File 6--Re: "tagging color printers" (CuD 10.22)
|
||
|
||
> Date--06 Apr 1998 15:29:44 -0400
|
||
> From--Mark Atwood <mra@POBOX.COM>
|
||
> Subject--File 3--US Govt wants to "tag" color printers
|
||
|
||
[...]
|
||
|
||
> "In addition, Castle said, practical and realistic measures to tag
|
||
> scanners and printers must be considered, in order to identify the
|
||
> source of the counterfeit notes."
|
||
>
|
||
> In other words, he wants every color printer to embed some sort of
|
||
> signature into its output, so that the "authorities" can determine
|
||
> where it came from.
|
||
>
|
||
> I remember, back in high school civics, one of the bits of patriotic
|
||
> propaganda that was dispenced to us, was that the USSR required all
|
||
> photocopiers to embed a machine id and page number into its output,
|
||
> so that the "authorites" could control their use as publishing
|
||
> tools.
|
||
>
|
||
> Now the USA wants to do the same thing.
|
||
|
||
[...]
|
||
|
||
Great! I'm so curious to see how they are gonna tackle this issue. Put
|
||
an ID on top of the page? Sure, go right ahead, I have to use my
|
||
scissors anyway to cut out the Lincoln's.
|
||
|
||
The only way this would work, would be to overlay the copy with a fine
|
||
barcode type output, where the lines stretch across the whole page.
|
||
Which means the ID changes when the fuser gets old'n'dirty. Plus,
|
||
imagine how many people would return that copier because "it's broke
|
||
and procudes crappy output".
|
||
|
||
How about mandatory copier paper with a watermark? All you need to do
|
||
is equip the copier's paper cassette with a padlock.
|
||
|
||
Of course, alternatively you could try to improve security with newer
|
||
dollar bills that have additional security features such as holograms,
|
||
etc. but that would be too easy....
|
||
|
||
|
||
The world is going crazy, and it's not gonna get better...
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 20 Apr 1998 10:47:04 -0500
|
||
From: Neil Rickert <rickert@CS.NIU.EDU>
|
||
Subject: File 7--Re: File 1--proposal of technical solutions to spam problem
|
||
|
||
"Vladimir Z. Nuri" <vznuri@netcom.com> writes:
|
||
|
||
>the software problem
|
||
|
||
> Currently the large mass of internet sites use a mail program called
|
||
> Sendmail developed chiefly by Eric Allman. Will all due respect to the
|
||
> author and maintainers, IMHO the program is an embodiment in awkward
|
||
> and monolithic legacy software. It features many extremely arcane
|
||
> syntax rules and inscrutable conventions.
|
||
|
||
Vladimir has misdiagnosed the problem. Granted, most systems use
|
||
sendmail, and granted, sendmail uses methods that many consider
|
||
arcane and inscrutable. But that is mostly a matter of internal
|
||
design, and has very little to do with spam.
|
||
|
||
If Vladimir wants to criticize, he should get to the heart of the
|
||
matter, which is the SMTP protocol. This protocol requires no sender
|
||
authentication (other than a simple syntax check), and could not
|
||
easily be extended to prevent spam.
|
||
|
||
The nucleus of the problem really goes back to the way the network
|
||
has evolved. In its early days most computing was done by multi-user
|
||
systems. Thus there was a core of trustworthy machines administered
|
||
by technically compentent professionals, most of whom had a sense of
|
||
ethics and public responsibility. Most of the network protocols were
|
||
designed under the assumption that the machines you would communicate
|
||
were trustworthy. However, we now have a network composed mostly of
|
||
individual machines, too often untrustworthy, and usually run by
|
||
novices and in some case by unethical novices (spammers, for
|
||
example).
|
||
|
||
There is little hope of resolving the spam situation unless we
|
||
recognize the nature of the problem. The best solution would be a
|
||
return to the idea of a central core of trustworthy machines. This
|
||
would still allow a network of mostly individual machines. But it
|
||
would require that each individual machine forward outgoing mail to a
|
||
core machine that is capable of identifying it. And each non-core
|
||
machine would only accept email from its own users or from a core
|
||
machine. And each core machine would only accept email from other
|
||
core machines or from machines it could identify and authenticate.
|
||
Then you would have to design new protocols which carried
|
||
authentication information in the message envelope.
|
||
|
||
Spam is only partly a technical problem. It is partly a social
|
||
problem. We could not re-establish a core of trustworthy machines
|
||
without setting up social conventions to accredit those machines, and
|
||
to identify which they are. And we could not find a technical
|
||
solution to network problems such as spam without some concept of
|
||
trustworthy machines.
|
||
|
||
> One of the deficiencies in sendmail is the inability to reject email
|
||
> based on header information alone.
|
||
|
||
The alternative would be like having a "big brother" or "post office
|
||
nanny" machine attached to your mailbox, which automatically shreds
|
||
mail if it does not begin with "Dear person" and end with "Yours
|
||
sincerely." We don't need such a machine. Automated rejection of
|
||
email on the basis of header information is *evil*. What is needed
|
||
is some sort of authentication information, including an estimation
|
||
of the degree of trust to be placed in the purported origin of the
|
||
message. This information should be transported in the envelope
|
||
(separate from the message content and headers), so that it can be
|
||
dynamically updated as the mail is tranferred between machines.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Apr 1998 21:05:20 -0400
|
||
From: Jonathan Wallace <jw@bway.net>
|
||
Subject: File 8--for CuD
|
||
|
||
FEDERAL COURTS USE CENSORWARE; FREE SPEECH ADVOCATES OBJECT
|
||
|
||
FOR IMMEDIATE RELEASE
|
||
|
||
Contact: Jonathan Wallace daytime: 212-513-7777 evening:
|
||
718-797-9808 email: jw@bway.net
|
||
|
||
|
||
New York, April 22, 1998--The Censorware Project
|
||
<http://www.spectacle.org/cwp>, an organization which battles the
|
||
use of blocking software by public institutions including schools
|
||
and libraries, announced today that it has learned that federal
|
||
courts are using the WebSENSE censorware product, at least in the
|
||
Eighth, Ninth and Tenth judicial circuits (covering twenty-two
|
||
states and Guam). WebSENSE <http://www.websense.com> was
|
||
installed by the Administrative Office of the Courts, apparently
|
||
without the knowledge or consent of the judges themselves.
|
||
|
||
"I am really disturbed that the federal court administrators have
|
||
installed censorware, especially in light of federal judge Leonie
|
||
Brinkema's recent decision in the Loudoun County, Virginia
|
||
case," said James Tyre, a First Amendment attorney who is a
|
||
founding member of the Censorware Project. "In that decision,
|
||
available at http://www.venable.com/ORACLE/opinion.htm, the judge
|
||
suggested that blocking a web site in a library is like pulling a
|
||
book from the shelves. It is particularly shocking that the
|
||
Administrative Office of the Courts thinks that federal judges
|
||
need to be protected against the Internet--and that our tax money
|
||
is being spent to buy censorware for this purpose. It would be
|
||
ironic indeed if Judge Brinkema is prevented by WebSENSE from
|
||
visiting the very sites at issue in the Loudoun County case,
|
||
blocked by X-Stop, a competitor of WebSENSE."
|
||
|
||
One site erroneously blocked by the WebSENSE product under its
|
||
"Hacking" category is http://www.digicrime.com -- a humorous site
|
||
created by security experts to educate the public about computer
|
||
crime. "WebSENSE apparently took the site for a real computer
|
||
crime site," Tyre said. "DigiCrime is not just one bad block out
|
||
of 200,000: it is one of 54 hand-picked sites by the makers of
|
||
WebSENSE itself included in the downloadable demo versions of
|
||
the product. Although The Censorware Project has not done a full
|
||
analysis of WebSENSE, one must seriously question its claims to
|
||
accuracy if it cannot even get its demo blocks right." WebSENSE
|
||
also reportedly blocks A Different Light Bookstore,
|
||
http://www.adlbooks.com/, specializing in gay or lesbian
|
||
literature. The company claims that the product blocks 200,000
|
||
sites.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 13 Apr 1998 16:07:31 -0500
|
||
From: Richard Thieme <rthieme@thiemeworks.com>
|
||
Subject: File 9--Islands in the Clickstream. Densities. April 11, 1998
|
||
|
||
Islands in the Clickstream:
|
||
Densities
|
||
|
||
|
||
Steven Hawking noted in a netcast from the White House that the next
|
||
generation of humans will live inside a common sense world of quantum
|
||
physics the way we have lived inside a Newtonian landscape. "Common sense"
|
||
is simply what we're taught to see, he said, which is why new truths always
|
||
appear at the edges of our thinking.
|
||
|
||
Or, as George Bernard Shaw put it, " All great truth begins as blasphemy."
|
||
|
||
|
||
Is it any wonder we are all beset by "cognitive dissonance" and see our
|
||
reality-frames flickering the way clairvoyants (excuse me, "remote
|
||
viewers") see images of distant sites? One moment we are living happily
|
||
inside Newtonian space, walking down a straight sidewalk toward a
|
||
right-angled corner when poof! with a puff of smoke, we experience
|
||
ourselves bent along a trajectory like light pulled by an immense
|
||
gravitational tug. Then we remember that how light bends IS gravity and
|
||
what we thought was a "pull" is simply the topography of energy wrinkling
|
||
and sliding into whorls of various densities.
|
||
|
||
In a museum the other day I watched a marble spiraling down a funnel of
|
||
smooth wood, circling toward the vortex. I thought of light travelling
|
||
along the curves and bumps of space-time ("the universe is shaped like a
|
||
potato," Einstein said, "finite but unbounded.") I thought of gravitational
|
||
lenses, created when galaxies that are closer to us magnify and distort
|
||
more distant galaxies.
|
||
|
||
Einstein predicted sixty years ago that a massive object would bend and
|
||
intensify light, generating multiple images or stretching an image into an
|
||
arc. When everything lines up just right, the distortion becomes a perfect
|
||
circle, like the galaxy pictured last week in Science News (Vol. 153, No.
|
||
114).
|
||
|
||
That's the long view. Turn the telescope around to see what's happening
|
||
right here in our own digital neighborhood.
|
||
|
||
Web sites are best characterized not by size but by density. A map of
|
||
cyberspace would look like millions of galaxies and a map of the traffic
|
||
between sites would look like a photo of electromagnetic energy across the
|
||
entire spectrum.
|
||
|
||
A browser is a knowledge engine that organizes information in flux so it
|
||
appears momentarily frozen. A site such as Yahoo that links links is a kind
|
||
of gravitational lens that boosts distant clusters into the foreground. If
|
||
we could see ourselves interacting in cyberspace, we too would look like
|
||
energy pouring through our monitors and moving at the speed of light toward
|
||
densities around which our interests coalesce. Our monitors like worm holes
|
||
let us bypass the long way around.
|
||
|
||
Organizational structures, including web sites, are dissipative structures
|
||
like whirlpools that retain their shape while exchanging energy and
|
||
information. Humans too are modular structures of energy and information
|
||
that interface over the Internet. That map of the energies of cyberspace is
|
||
really a map of our Mind.
|
||
|
||
Not quite common sense yet, is it? Words slip, slide, decay with
|
||
imprecision, T. S. Eliot said of his efforts to fix in poetic form the
|
||
world he discerned. In the world of printed text, the illusion that words
|
||
and meanings are fixed is magnified. The same words in pixels are obviously
|
||
transitory. Our media too function like gravitational lenses, magnifying
|
||
meanings intrinsic to their nature. The digital world builds a "common
|
||
sense reality" congruent with the quantum world, communicating by its very
|
||
nature that words, meanings, and all things slip, slide away.
|
||
|
||
We build this island for ourselves in the always sea and comfort ourselves
|
||
with the illusion that we are on dry land.
|
||
|
||
The trajectories of the energies of our lives - how they are organized,
|
||
aimed, and spent- are determined by our deepest intentionality. How we
|
||
intend to live our lives is how we wind up living them.
|
||
|
||
Cyberspace is a training ground for learning to live and move at the speed
|
||
of our minds, the speed of light, to inhabit a landscape that morphs or
|
||
changes shape according to our will, intention, and ultimate purpose.
|
||
|
||
The "sites" in our minds grow denser when our intentions coalesce like
|
||
millions of marbles rolling simultaneously toward a single vortex. Space,
|
||
time and causality may be woven into the very fabric of our minds, as Kant
|
||
said, but in a quantum landscape, causality is a very different animal. An
|
||
effect can precede its own cause.
|
||
|
||
Which is exactly how our minds operate.
|
||
|
||
Consciousness is always consciousness for or toward some end, always an
|
||
arrow aimed toward a potentiality or possibility. As a mental construct,
|
||
the image comes first. The effect precedes the cause and causes the effect
|
||
to come into being. That's why some think consciousness is the origin as
|
||
well as the goal of evolution.
|
||
|
||
A recent reflection on maps, filters, and belief systems ("Imaginary
|
||
Gardens - Filters. Filters of Filters.") brought from a reader an account
|
||
of the moment he realized how much the Mercator projection exaggerated the
|
||
size of the European community. He recalled the first time he looked at
|
||
Buckminster Fuller's Dymaxion map that looks at the world from the North
|
||
Pole rather than the equator. From that point of view, the world is seen as
|
||
a single unified landmass. The world has never looked the same to him since
|
||
|
||
|
||
Consciousness manifests itself in a visible medium like the Internet so we
|
||
can see it. We can never see the thing itself, because there is no thing
|
||
there. Nothing. But we can see some of the infinite ways it manifests
|
||
itself. Working and playing on the Internet is one way to practice
|
||
handling ourselves in a quantum world that is fluid, modular, and
|
||
interactive, a trans-planetary world, a trans-galactic world emerging on
|
||
the edge of the grid in which we have been living. That grid contained
|
||
reality in nice neat boxes. But the grid is flexing, morphing like an
|
||
animation even as we look at it, turning into another of its many
|
||
possibilities. Seen, of course - it's only common sense, isn't it?- from
|
||
just one of its infinitely many points of view.
|
||
|
||
|
||
|
||
|
||
**********************************************************************
|
||
|
||
Islands in the Clickstream is a weekly column written by
|
||
Richard Thieme exploring social and cultural dimensions
|
||
of computer technology. Comments are welcome.
|
||
|
||
Feel free to pass along columns for personal use, retaining this
|
||
signature file. If interested in (1) publishing columns
|
||
online or in print, (2) giving a free subscription as a gift, or
|
||
(3) distributing Islands to employees or over a network,
|
||
email for details.
|
||
|
||
To subscribe to Islands in the Clickstream, send email to
|
||
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
||
body of the message. To unsubscribe, email with "unsubscribe
|
||
islands" in the body of the message.
|
||
|
||
Richard Thieme is a professional speaker, consultant, and writer
|
||
focused on the impact of computer technology on individuals and
|
||
organizations.
|
||
|
||
Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.
|
||
|
||
ThiemeWorks on the Web: http://www.thiemeworks.com
|
||
|
||
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 7 May 1997 22:51:01 CST
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
||
SUBSCRIBE CU-DIGEST
|
||
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
||
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
||
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
||
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
||
Web-accessible from: http://www.etext.org/CuD/CuD/
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #10.25
|
||
************************************
|
||
|