890 lines
41 KiB
Plaintext
890 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Aug 15 1993 Volume 5 : Issue 61
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copie Editor: Etaoin Shrdlu, Senior
|
||
|
||
CONTENTS, #5.61 (Aug 15 1993)
|
||
File 1--ERRATA in CuD #5.60
|
||
File 2--EFF Job Opening for ONLINE ACTIVIST
|
||
File 3--NSA Seeks Delay in Clipper
|
||
File 4--CPSR and the Nat'l Info Infrastructure
|
||
File 5--Call for Papers IFIP SEC'94 Caribbean
|
||
File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING
|
||
File 7--Illinois BBS Sysop Busted for "porn-to-minors"
|
||
File 8--In response to E-fingerprinting in Calif
|
||
File 9--Re--NIRVANAnet (A View from Brazil)
|
||
File 10--Public Domain Internet Information for Teachers <fwd>
|
||
File 11--Gory details about texsun (breakin) (fwd)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sat, 14 Aug 1993 22:51:01 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 1--ERRATA in CuD #5.60
|
||
|
||
Ooops---In thanking our NIU folk in CuD 5.60, we misspelled the
|
||
name of the Director of our Academic Computing Service. Michael
|
||
Prais, not "Preis." Sorry 'bout that, Michael.
|
||
|
||
We also indicated that WYLBUR was our operating system. Neil Rickert
|
||
gently corrected us:
|
||
|
||
Actually WYLBUR is not an operating system at all. It is
|
||
just a multi-user interactive text editor which runs under
|
||
the operating system MVS-XA.
|
||
|
||
The computer center is finally taking the plunge and getting
|
||
a Unix system for those university users who need Unix.
|
||
We've been pushing them in this direction. I don't yet know
|
||
what the arrangements and policies will be for this system.
|
||
|
||
------------------------------
|
||
|
||
From: Shari Steele <ssteele@EFF.ORG>
|
||
Date: Thu, 5 Aug 1993 17:04:14 -0400
|
||
Subject: File 2--EFF Job Opening for ONLINE ACTIVIST
|
||
|
||
The Electronic Frontier Foundation (EFF), a nonprofit organization
|
||
dedicated to protecting civil liberties for users of newly emerging
|
||
technologies, is looking to hire an Online Activist.
|
||
|
||
The Online Activist will actively participate in and organize EFF's
|
||
sites on CompuServe, America Online, GEnie, Usenet and the WELL and
|
||
will distribute feedback from the various networks to EFF staff and
|
||
board through regular online summaries. This person will provide
|
||
leadership to groups of members and will possibly set up and maintain
|
||
an EFF BBS. The Online Activist will help to maintain EFF's ftp
|
||
library. This person will train new EFF staff members on online
|
||
communications. S/he will collect and solicit articles for, write
|
||
articles for, edit and assemble our biweekly electronic newsletter,
|
||
EFFector Online. The Online Activist will work with the System
|
||
Administrator to distribute and post EFFector Online and other EFF
|
||
electronic publications and to maintain a database of form answers for
|
||
commonly asked questions, along with the Membership Coordinator. This
|
||
person must be willing to work out of EFF's offices in Washington, DC.
|
||
|
||
The Electronic Frontier Foundation offers a competitive salary with
|
||
excellent benefits. For immediate consideration, please forward a
|
||
resume, along with a cover letter describing your online experience
|
||
and reason for applying for this job by August 23, 1993, to:
|
||
|
||
Online Activist Search
|
||
Electronic Frontier Foundation
|
||
1001 G Street, NW
|
||
Suite 950 East
|
||
Washington, DC 20001
|
||
fax (202) 393-5509
|
||
e-mail ssteele@eff.org (ASCII only, please)
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Aug 1993 16:05:14 EST
|
||
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
|
||
Subject: File 3--NSA Seeks Delay in Clipper
|
||
|
||
NSA Seeks Delay in Clipper Case
|
||
|
||
|
||
The National Security Agency (NSA) has asked a federal court for
|
||
a one-year delay in a lawsuit challenging the secrecy of the
|
||
government's "Clipper Chip" encryption proposal. The suit was filed
|
||
by Computer Professionals for Social Responsibility (CPSR) on May 28
|
||
and seeks the disclosure of all information concerning the
|
||
controversial plan.
|
||
|
||
In an affidavit submitted to the United States District Court for
|
||
the District of Columbia on August 9, NSA Director of Policy Michael
|
||
A. Smith states that
|
||
|
||
NSA's search for records responsive to [CPSR's] request is under
|
||
way, but is not yet complete. Because the Clipper Chip program
|
||
is a significant one involving the participation of organizations
|
||
in four of NSA's five Directorates and the Director's staff, the
|
||
volume of responsive documents is likely to be quite large.
|
||
Moreover, because the Clipper Chip program is highly complex and
|
||
technical and is, in substantial part, classified for national
|
||
security purposes, the review process cannot be accomplished
|
||
quickly.
|
||
|
||
CPSR called for the disclosure of all relevant information and
|
||
full public debate on the proposal on April 16, the day it was
|
||
announced. While NSA has insisted from the outset that the "Skipjack"
|
||
encryption algorithm, which underlies the Clipper proposal, must
|
||
remain secret, the Smith affidavit contains the first suggestion that
|
||
the entire federal program is classified "in substantial part." In
|
||
the interest of obtaining timely judicial review of the agency's broad
|
||
classification claim, CPSR intends to oppose NSA's request for delay
|
||
in the court proceedings.
|
||
|
||
In another case involving government cryptography policy, CPSR
|
||
has challenged NSA's classification of information concerning the
|
||
development of the Digital Signature Standard (DSS). The court is
|
||
currently considering the issue and a decision is expected soon.
|
||
|
||
CPSR is a national public-interest alliance of computer industry
|
||
professionals dedicated to examining the impact of technology on
|
||
society. CPSR has 21 chapters in the U.S. and maintains offices in
|
||
Palo Alto, California, and Washington, DC. For additional information
|
||
on CPSR, call (415) 322-3778 or e-mail <cpsr@cpsr.org>.
|
||
|
||
David L. Sobel
|
||
CPSR Legal Counsel
|
||
<sobel@washofc.cpsr.org>
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 10 Aug 1993 09:43:40 PDT
|
||
From: Nikki Draper <draper@CSLI.STANFORD.EDU>
|
||
Subject: File 4--CPSR and the Nat'l Info Infrastructure
|
||
|
||
COMPUTER PROFESSIONALS ADD SOCIAL CONSCIENCE
|
||
TO NATIONAL NETWORK DEBATE
|
||
|
||
Palo Alto, Calif., August 6, 1993 -- At a recent meeting in
|
||
Washington D.C., board members from Computer Professionals for Social
|
||
Responsibility (CPSR) were challenged by top level telecommunications
|
||
policy experts to craft a public interest vision of the National
|
||
Information Infrastructure (NII). The experts at the roundtable
|
||
discussion included Mike Nelson from the President's Office of Science
|
||
and Technology, Vint Cerf from the Internet Society, Jamie Love from
|
||
the Taxpayer's Assets Project, Ken Kay from Computer Systems Policy
|
||
Project, and Laura Breeden from FARnet.
|
||
|
||
"We were excited to discover that CPSR is in a position to play a key
|
||
role in shaping NII policy," said CPSR Board President, Eric Roberts.
|
||
"The commercial sector is already in the thick of the debate, but
|
||
there has been little coordinated response from the noncommercial
|
||
constituencies. After talking about the issues and CPSR's role, the
|
||
Board committed to meeting this challenge."
|
||
|
||
So far, the debate about the NII has centered around fiber versus
|
||
ISDN, cable companies versus telephone companies, research versus
|
||
commercialization, and so on. These are real questions with
|
||
important implications. However, CPSR believes that a better
|
||
starting point is a set of guiding principles as the context for all these
|
||
more detailed questions about "architecture," technical standards,
|
||
and prime contractor. Before arguing over bits and bytes, it is crucial
|
||
to clarify the vision and values that underlie a major endeavor like
|
||
the NII.
|
||
|
||
As individuals in the computing profession, CPSR's membership
|
||
knows that new technologies bring enormous social change.
|
||
CPSR's goal is to help shape this change in an informed manner.
|
||
Key issues discussed in the paper will include:
|
||
|
||
o ensuring that the design remains both open and flexible so
|
||
that it can evolve with changing technology.
|
||
|
||
o ensuring that all citizens have affordable network access and
|
||
the training necessary to use these resources.
|
||
|
||
o ensuring that risks of network failure and the concomitant
|
||
social costs are carefully considered in the NII design.
|
||
|
||
o protecting privacy and First Amendment principles in
|
||
electronic communication.
|
||
|
||
o guaranteeing that the public sector, and particularly schools
|
||
and libraries, have access to public data at a reasonable cost.
|
||
|
||
o seeking ways in which the network can strengthen democratic
|
||
participation and community development at all levels.
|
||
|
||
o ensuring that the network continues to be a medium for
|
||
experimentation and non commercial sharing of resources,
|
||
where individual citizens are producers as well as consumers.
|
||
|
||
o extending the vision of an information infrastructure beyond
|
||
its current focus of a national network, to include a global
|
||
perspective.
|
||
|
||
The national membership of CPSR brings a unique perspective to the
|
||
overall conception of the NII. Throughout CPSR's history, the
|
||
organization has worked to encourage public discussion of decisions
|
||
involving the use of computers in systems critical to society and to
|
||
challenge the assumption that technology alone can solve political and
|
||
social problems. This past year, CPSR's staff, national and chapter
|
||
leadership have worked on privacy guidelines for the National Research
|
||
and Education Network (NREN), conducted a successful conference on
|
||
participatory design, created local community networks, organized
|
||
on-line discussion groups on intellectual property, and much more.
|
||
|
||
To ensure that its position paper is broadly representative, CPSR will
|
||
work in concert with other public interest groups concerned about the
|
||
NII, such as the newly established coalition in Washington D.C., the
|
||
Telecommunications Policy Roundtable. CPSR chapters are will be
|
||
conducting a broad based public campaign to reach out beyond the
|
||
technical experts and producers -- to people who will be affected by
|
||
the NII even if they never directly log on.
|
||
|
||
CPSR will begin distributing its completed paper to policy makers on
|
||
October 16th at its annual meeting in Seattle, Washington. The
|
||
meeting will bring together local, regional and national decision
|
||
makers to take a critical look at the NII.
|
||
|
||
Founded in 1981, CPSR is a national, non-profit, public interest
|
||
organization of computer scientists and other professionals concerned
|
||
with the impact of computer technology on society. With offices in
|
||
Palo Alto, California, and Washington D.C., CPSR works to dispel
|
||
popular myths about technological systems and to encourage the use of
|
||
computer technology to improve the quality of life.
|
||
|
||
For more information on CPSR's position paper , contact Todd Newman,
|
||
CPSR board member, at 415-390-1614 .
|
||
|
||
For more information about CPSR, contact Nikki Draper, Communications
|
||
Director, at 415-322-3778 or draper@csli.stanford.edu.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 12 Aug 1993 01:43 +0100
|
||
From: fortrie@CIPHER.NL
|
||
Subject: File 5--Call for Papers IFIP SEC'94 Caribbean
|
||
|
||
Call for Papers IFIP SEC'94 - updated information August 1993
|
||
|
||
Technical Committee 11 - Security and Protection in Information
|
||
Processing Systems - of the UNESCO affiliated INTERNATIONAL
|
||
FEDERATION FOR INFORMATION PROCESSING - IFIP,
|
||
|
||
announces:
|
||
|
||
Its TENTH INTERNATIONAL INFORMATION SECURITY CONFERENCE, IFIP SEC'94
|
||
TO BE HELD IN THE NETHERLANDS ANTILLES (CARIBBEAN), FROM MAY 23
|
||
THROUGH MAY 27, 1994.
|
||
|
||
Organized by Technical Committee 11 of IFIP, in close cooperation with
|
||
the Special Interest Group on Information Security of the Dutch
|
||
Computer Society and hosted by the Caribbean Computer Society, the
|
||
TENTH International Information Security Conference IFIP SEC'94 will be
|
||
devoted to advances in data, computer and communications security
|
||
management, planning and control. The conference will encompass
|
||
developments in both theory and practise, envisioning a broad perspective of
|
||
the future of information security.
|
||
The event will be lead by its main theme "Dynamic Views on
|
||
Information Security in Progress".
|
||
|
||
|
||
Papers are invited and may be practical, conceptual, theoretical, tutorial
|
||
or descriptive in nature, addressing any issue, aspect or topic of
|
||
information security. Submitted papers will be refereed, and those presented
|
||
at the conference, will be included in the formal conference proceedings.
|
||
Submissions must not have been previously published and must be the
|
||
original work of the author(s). Both the conference and the five
|
||
tutorial expert workshops are open for refereed presentations.
|
||
|
||
The purpose of IFIP SEC'94 is to provide the most comprehensive international
|
||
forum and platform, sharing experiences and interchanging ideas, research
|
||
results, development activities and applications amongst academics,
|
||
practitioners, manufacturers and other professionals, directly or indirectly
|
||
involved with information security. The conference is intended for computer
|
||
security researchers, security managers, advisors, consultants, accountants,
|
||
lawyers, edp auditors, IT, administration and system managers from
|
||
government, industry and the academia, as well as individuals interested and/or
|
||
involved in information security and protection.
|
||
|
||
IFIP SEC'94 will consist of a FIVE DAY - FIVE PARALLEL STREAM - enhanced
|
||
conference, including a cluster of SIX FULL DAY expert tutorial workshops.
|
||
|
||
In total over 120 presentations will be held. During the event the second
|
||
Kristian Beckman award will be presented. The conference will address
|
||
virtually all aspects of computer and communications security, ranging
|
||
from viruses to cryptology, legislation to military trusted systems,
|
||
safety critical systems to network security, etc.
|
||
|
||
The six expert tutorial workshops, each a full day, will cover the
|
||
following issues:
|
||
|
||
Tutorial A: Medical Information Security
|
||
Tutorial B: Information Security in Developing Nations
|
||
Tutorial C: Modern Cryptology
|
||
Tutorial D: IT Security Evaluation Criteria
|
||
Tutorial E: Information Security in the Banking and Financial Industry
|
||
Tutorial F: Security of Open/Distributed Systems
|
||
|
||
Each of the tutorials will be chaired by a most senior and internationally
|
||
respected expert.
|
||
|
||
The formal proceedings will be published by Elsevier North Holland
|
||
Publishers, including all presentations, accepted papers, key-note talks,
|
||
and invited speeches.
|
||
|
||
The Venue for IFIP SEC'94 is the ITC World Trade Center Convention
|
||
Facility at Piscadera Bay, Willemstad, Curacao, Netherlands Antilles.
|
||
|
||
A unique social program, including formal banquet, giant 'all you can eat'
|
||
beach BBQ, island Carnival night, and much more will take care of leisure
|
||
and relax time.
|
||
|
||
A vast partners program is available, ranging from island hopping, boating,
|
||
snorkeling and diving to trips to Bonaire, St. Maarten, and Caracas.
|
||
A special explorers trip up the Venezuela jungle and the Orinoco River
|
||
is also available.
|
||
For families a full service kindergarten can take care of youngsters.
|
||
|
||
The conference will be held in the English language. Spanish translation
|
||
for Latin American delegates will be available.
|
||
|
||
Special arrangements with a wide range of hotels and apartments complexes
|
||
in all rate categories have been made to accommodate the delegates and
|
||
accompanying guests. (*)
|
||
The host organizer has made special exclusive arrangements with KLM Royal
|
||
Dutch Airlines and ALM Antillean Airlines for worldwide promotional fares
|
||
in both business and tourist class. (**)
|
||
|
||
(*)(**) Our own IFIP TC11 inhouse TRAVEL DESK will serve from any city on
|
||
the globe.
|
||
|
||
All authors of papers submitted for the referee process will enjoy special
|
||
benefits.
|
||
|
||
Authors of papers accepted by the International Referee Committee will enjoy
|
||
extra benefits.
|
||
|
||
If sufficient proof (written) is provided, students of colleges, universities
|
||
and science institutes within the academic community, may opt for
|
||
student enrollment. These include special airfares, apartment accommodations,
|
||
discounted participation, all in a one packet prepaid price.
|
||
(Authors' benefits will not be affected)
|
||
|
||
**************************
|
||
|
||
INSTRUCTIONS FOR AUTHORS
|
||
|
||
**************************
|
||
|
||
Five copies of the EXTENDED ABSTRACT, consisting of no more than 25 double
|
||
spaced typewritten pages, including diagrams and illustrations, of
|
||
approximately 5000 words, must be received by the Program Committee no
|
||
later than November 15th, 1993.
|
||
|
||
We regret that electronically transmitted papers, papers on diskettes,
|
||
papers transmitted by fax and handwritten papers are not accepted.
|
||
|
||
Each paper must have a title page, which includes the title of the paper,
|
||
full names of all author(s) and their title(s), complete address(es),
|
||
including affiliation(s), employer(s), telephone/fax number(s) and
|
||
email address(es).
|
||
To facilitate the blind refereeing process the author(s)' particulars
|
||
should only appear on the separate title page. The language of the
|
||
conference papers is English.
|
||
The first page of the manuscript should include the title, a keyword list
|
||
and a 50 word introduction. The last page of the manuscript should include
|
||
the reference work (if any).
|
||
|
||
Authors are invited to express their interest in participating in the
|
||
contest, providing the Program Committee with the subject or issue that
|
||
the authors intend to address (e.g. crypto, viruses, legal, privacy, design,
|
||
access control, etc.) This should be done preferably by email to
|
||
< TC11@CIPHER.NL >, or alternately sending a faxmessage to
|
||
+31 43 619449 (Program Committee IFIP SEC'94)
|
||
|
||
The extended abstracts must be received by the Program Committee on or
|
||
before November 15th, 1993.
|
||
|
||
Notification of acceptance will be mailed to contestants on or before
|
||
December 31, 1993. This notification will hold particular detailed
|
||
instructions for the presentation and the preparation of camera ready
|
||
manuscripts of the full paper.
|
||
|
||
Camera ready manuscripts must be ready and received by the Program Committee
|
||
on or before February 28, 1994.
|
||
|
||
If you want to submit a paper, or you want particular information on
|
||
the event, including participation, please write to:
|
||
|
||
IFIP SEC'94 Secretariat
|
||
Postoffice Box 1555
|
||
6201 BN MAASTRICHT
|
||
THE NETHERLANDS - EUROPE
|
||
|
||
or fax to:
|
||
|
||
IFIP SEC'94 Secretariat: +31 43 619449 (Netherlands)
|
||
|
||
or email to:
|
||
|
||
< TC11@CIPHER.NL >
|
||
|
||
***************************************************************
|
||
|
||
Special request to all electronic mail readers:
|
||
|
||
Please forward this Call for Papers to all networks and listservices
|
||
that you have access to, or otherwise know of.
|
||
|
||
****************************************************************
|
||
|
||
Sincerely
|
||
|
||
IFIP TC 11 Secretariat
|
||
|
||
Call for Papers - updated information August 1993
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 9 Aug 1993 16:49:06 -0700
|
||
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
Subject: File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING
|
||
|
||
*** PLEASE WRITE, NOW!*** PLEASE, DON'T STOP NOW!
|
||
|
||
Assembly Bill 1624, mandating online public access to public
|
||
legislative information via the public networks (i.e., the Internet
|
||
and all the nets connected to it - including wherever you are
|
||
receiving this msg), will either pass the Legislature by Sept. 10th,
|
||
or will die - and we have to re-fight the whole battle, year after
|
||
year.
|
||
|
||
LETTERS & FAXES ARE *NEEDED*!. THEY *WILL* DETERMINE THE OUTCOME.
|
||
|
||
REMAINING 1993 LEGISLATION SCHEDULE
|
||
Jul 16th, the Legislature went into remission - uh, recess.
|
||
Aug 16th, the Legislature reconvenes to diddle remaining 1993 business.
|
||
Sep 10th, the Legislature quits working in Sacramento for the year.
|
||
Oct 10th, the Governor must veto legislatively-approved bills he opposes.
|
||
On AUGUST 18TH, the Senate Rules Committee run by Sen. Dave Roberti
|
||
(D-Van Nuys area) will hear AB1624. If Roberti doesn't like it, he can and
|
||
will kill it. If Roberti passes it, it will almost-certainly pass the
|
||
Senate. Then we need for the Assembly to "concur in amendments" and the
|
||
Governor to not veto it.
|
||
|
||
|
||
Address letters/faxes to "State Capitol, Sacremanto CA 95814."
|
||
|
||
AS SOON AS POSSIBLE, send a one-page letter supporting AB1624 to the
|
||
Senate Rules Committee - who have seen essentially *no* support for it:
|
||
Sen. David Roberti, Chair, Room 400; fax/916-323-7224; voice/916-445-8390.
|
||
and to the other four members (tiny, *powerful* committee!):
|
||
Sen. Ruben Ayala (D-Chino area), Room 5108; f/916-445-0128; v/916-445-6868.
|
||
Sen. Robert Beverly (R-Long Bch), Room 5082; f/not avail.; v/916-445-6447.
|
||
Sen. William Craven (R-Oceanside), Room 3070; f/not avail.; v/916-445-3731.
|
||
Sen. Nick Petris (D-Alameda), Room 5080; fax/916-327-1997; v/916-445-6577.
|
||
|
||
Important: Please send COPIES of ALL letters to the AB1624 author:
|
||
Hon. Debra Bowen, Room 3126; voice/916-445-8528; fax/916-327-2201.
|
||
|
||
|
||
CAN EMAIL VIA ME, IF YA CAN'T FIND TIME FOR SNAIL-MAIL
|
||
If you don't have time to send snail-mail, you can email your message via
|
||
jwarren@well.sf.ca.us.
|
||
Write it exactly as you would snail-mail, but be SURE TO INCLUDE
|
||
your name, address and phone #s for legislators' independent
|
||
verification. Upon receipt by email, I will print and/or fax the
|
||
entire message to Bowen and to the legislator(s) to whom you address
|
||
it. (Please allow for that delay.)
|
||
|
||
LEGI-TECH'S OLDER BROTHER DONE GOOD!
|
||
The McClatchy organization is the owner of Legi-Tech, one of the two
|
||
largest online distributors of California legislative information. They are
|
||
also owner of a number of newspapers - their flagship being the powerful
|
||
Sacramento Bee.
|
||
On Jul 26th, the Bee ran an editorial *strongly* supportive of AB1624 -
|
||
laudable, principled action by The Bee, McClatchy, and presumably by
|
||
Legi-Tech in the face of a difficult trade-off between the public's
|
||
interests versus their business interests.
|
||
Applause! Applause!
|
||
|
||
|
||
CALIFORNIA LEGISPEAK: "AUTHOR" VS. "SPONSOR" VS. "SUPPORTER"
|
||
In California legislative circles:
|
||
A bill's AUTHOR is a legislator who introduced the bill.
|
||
A bill's SPONSOR(S) is a person or organization, if any, that requested that
|
||
the bill be introduced by the bill's author.
|
||
A bill's SUPPORTER(S) is a person or organization that is officially listed
|
||
as being in favor of the bill, usually including its sponsor(s), if any.
|
||
All bills have one or more authors. Some bills do NOT have sponsors.
|
||
AB1624's author was Assembly Member Debra Bowen. It had no sponsors, but
|
||
has a growing number of supporters.
|
||
|
||
|
||
PROGRAMMERS: SAMPLE LEGISLATIVE DATA-FILES ALSO AVAILABLE AT CPSR.ORG
|
||
AB1624 Update #19 detailed a set of sample data-files for review and
|
||
test-programming, available from Tim Pozar's KUMR.LNS.COM by anonymous ftp.
|
||
As of Jul 22nd, those Legislative Data Center sample files were/are also
|
||
online at cpsr.org in /ftp/cpsr/states/california/ab1624/sample_data
|
||
for binary ftp access. For questions about accessing them there, contact:
|
||
Al Whaley al@sunnyside.com +1-415 322-5411(Tel), -6481 (Fax)
|
||
Sunnyside Computing, Inc., PO Box 60, Palo Alto, CA 94302
|
||
|
||
We have a voice. Use it or loose it.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 6 Aug 93 09:28:12 CDT
|
||
From: anonymous@name.deleted
|
||
Subject: File 7--Illinois BBS Sysop Busted for "porn-to-minors"
|
||
|
||
"Kids, Computers, and Porn:
|
||
For Many, Adult Material just a Keystroke away"
|
||
Chicago Tribune, 6 Aug, 1993, p. 1, 16
|
||
By Susan Kuczka
|
||
|
||
Steven's mother described her 12-year old son as a "computer
|
||
nerd," and she believed he spent all his time engaged in
|
||
good, clean digital fun.
|
||
|
||
.......
|
||
|
||
What she didn't know was that her son also was using his
|
||
computer to watch hard-core pornography delivered to his
|
||
northwest suburban home by modem from a computer bulletin
|
||
board service.
|
||
|
||
.......
|
||
|
||
The discovery led to the arrest of a Des Plaines bulletin
|
||
board operator in the first prosecution of its kind in state
|
||
history.
|
||
|
||
.......
|
||
|
||
Nancy Clausen, spokeswoman for the National Coalition Against
|
||
Pornography, said, "Kids are getting this all the time, but
|
||
it's hard for parents to know it's happening because it's
|
||
easy for a child to hide. You think your kid's a computer
|
||
genius when he's spending hours at a computer, but when he
|
||
has a modem, he has access to a different world, and kids
|
||
are very curious."
|
||
|
||
<The story cites Lisa Palac, 29, editor of the quarterly magazine
|
||
FUTURE SEX, who calls it "cybersex:porn of the next generation."
|
||
According to the story, computer porn is becoming big business
|
||
with users being charged $25 to $50 year for file access, and
|
||
some of the larger services have toll-free 800 numbers.
|
||
It indicates that 13 million computer users are connected to
|
||
55,000 commercial bulletin boards nationwide, although less than
|
||
5 percent, according to the author, are "adult bulletin boards.">
|
||
|
||
There is nothing illegal about distributing most forms of
|
||
pornography to adults. Transmission of pornographic
|
||
materials to a minor--whether in print or by computer--is a
|
||
crime, though.
|
||
|
||
But the computer pornography industry is so new that law
|
||
enforcement authorities are only now beginning to investigate
|
||
it as more and more bulletin board services begin to operate
|
||
throughout the country.
|
||
|
||
<The story notes that Steven's mother spent weeks trying to interest
|
||
law enforcement officials to pursue the case, including her local PD,
|
||
the Illinois State Police, the Cook County sheriff, and the FBI.
|
||
Finally, the Cook County state's attorney accepted her complaint,
|
||
which resulted in a grant jury indictment. The BBS sysop is Raymond
|
||
F. Netupski, 30, of 10106 Holly Lane, Des Plaines (Ill.), who began
|
||
operating his board in 1987. Netupski's attorney is John J. Seno.
|
||
Netupski was indicted for distributing harmful materials to a minor
|
||
and obscenity, both misdemeanors. He was also charged with "unlawful
|
||
use of sound or audio visual recordings," because some of the
|
||
transmitted material was copyright-protected. The "piracy" charge, a
|
||
felony, carries a potential sentence of up to 3 years imprisonment and
|
||
a $100,000 fine.
|
||
|
||
The remainder of the story cites a several law enforcement agents,
|
||
sysops, and others, for their comments.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 2 Aug 1993 17:17:38 CST
|
||
From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
|
||
Subject: File 8--In response to E-fingerprinting in Calif
|
||
|
||
In comp.society.cu-digest, sfs0@PHPMTS1.EM.CDC.GOV writes:
|
||
|
||
[in regard to e-fingerprinting as a condition of public assistance]
|
||
|
||
> I fail to see this as a "Big Brother" issue. After all, isn't
|
||
> the goal of social services in a majority of the cases to provide
|
||
> assistance temporarily? Once the assistance is no longer needed, the
|
||
> recipient is no longer tracked.
|
||
|
||
Government and law enforcement agencies have shown a dismal track record
|
||
in the area of civil liberties of late. I have a very hard time
|
||
believing, even for a minute, that this vast amount of personal
|
||
information will be discarded.
|
||
|
||
Furthermore, once some kind of 'evidence of benefit' can be wrested from
|
||
the selective interpretation of the program's operational record,
|
||
pressure will be brought to expand the system to more and more areas.
|
||
I've seen mention in this very forum that L.A. intends to expand to GA
|
||
and Food Stamp recipients. California now has a magnetic stripe on
|
||
their drivers' licenses. Will that soon contain your e-fingerprint, as
|
||
well?
|
||
|
||
Don't you agree that this is perhaps a bit too much information to be
|
||
collecting on anyone?
|
||
|
||
Or perhaps you don't see any reason to stop with fingerprints. Coded
|
||
transponders carrying a unique identification number could easily be
|
||
implanted, say, at the base of the right thumb. That would be even
|
||
harder to spoof than e-fingerprints. So why not have all AFDC
|
||
recipients implanted with serial numbers? Hey, we could even make that
|
||
number tie in to your credit card numbers, so you'd be safe from fraud.
|
||
Make it your ATM card number, and you'd be safe from the shoulder
|
||
surfers at the ATM. And I'm sure you wouldn't mind the occasional
|
||
doorknob noting the exact time of your passage. After all, you're an
|
||
honest man with nothing to hide, so it doesn't matter that someone could
|
||
effortlessly track your every move.
|
||
|
||
You see, once this trend gets started, it will grow to envelop us all.
|
||
Don't know about you, but I don't want that transponder. And I'd rather
|
||
not be e-fingerprinted, either.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Aug 93 18:27:00 -0300
|
||
From: luiz.marques@BBS816.MANDIC.ONSP.BR(Luiz Marques)
|
||
Subject: File 9--Re--NIRVANAnet (A View from Brazil)
|
||
|
||
Dear CUD,
|
||
|
||
I'd like to thank you for your wonderful journal,and
|
||
tell you that it's enjoyed even in Brazil.
|
||
|
||
Reading the Time article on CuD 5.59,I couldn't help but
|
||
laugh after reading the following:
|
||
|
||
>One bulletin board, Burn This Flag, requires callers to fill out an
|
||
>application before gaining access to an adults-only section that
|
||
>contains files describing "bizarre sexual behavior." But in a written
|
||
>message, Burn This Flag's system operator, known as "Zardoz,"
|
||
>acknowledges there is no foolproof way to ensure all users of the
|
||
>adult section are at least 18.
|
||
|
||
Does paper adults magazines have any way to "unsure that all
|
||
users" of it will be at least 18?To the best of my knowledge,
|
||
this magazines are sold openly without directly checking ages(this
|
||
"checking" stops at appearance analysis).And that does not consider
|
||
what will happen to the magazine AFTER it's sold...
|
||
|
||
About this kind of assault on BBS reputation,I'd like to say that
|
||
it's probably international.Recently,here in Brazil,one of the
|
||
biggest newspapers of the country published a article with wild
|
||
remarks like these:
|
||
"BBS are little stores which sell pirated programs"
|
||
"There are 120 pirate BBSs in Sao Paulo"(there aren't even
|
||
120 BBS in Sao Paulo!!!)
|
||
|
||
These remarks are totally absurd,and most BBS around here
|
||
are completely legal(there is a small amount of "underground
|
||
BBS"here too),and hurt the BBS community as a whole.
|
||
|
||
And the effect of such remarks are much worse here,since
|
||
the computer community (and BBSs) are greatly underdeveloped
|
||
(taking the USA as a standard).
|
||
|
||
luiz.marques@bbs816.mandic.onsp.br
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 11 Aug 1993 05:26:41 -0500
|
||
From: CuD moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 10--Public Domain Internet Information for Teachers <fwd>
|
||
|
||
From--"samizdat@world.std.com" "B.R. Samizdat Express"
|
||
|
||
PLEASE COPY THIS DISK -- UPDATE 8/1/93
|
||
The B&R Samizdat Express
|
||
PO Box 161
|
||
West Roxbury, MA 02132
|
||
samizdat@world.std.com
|
||
|
||
(Reminder -- We're the folks who are making public-domain Internet
|
||
information available on disk, primarily for teachers who have no
|
||
access or limited access to the Internet. We encourage you to make as
|
||
many copies of these texts as you need to share with your colleagues
|
||
and students. If you would like to receive a list of our current
|
||
offerings, please send us email requesting it. If you didn't see our
|
||
initial message, where we explain what we're doing and why, and who we
|
||
are, just let us know and we'll send you a copy of that as well.)
|
||
|
||
It's been a busy week:
|
||
1) All our offerings are now available for Macintosh as well as IBM
|
||
PCs.
|
||
2) The United Nations Department of Public Information has given its
|
||
support to Global Education Motivators (GEM) in our joint project
|
||
to make on-line U.N. information available in our PLEASE COPY THIS
|
||
DISK format.
|
||
3) Your suggestions and requests pointed us to the Educational
|
||
Resources Information Center (ERIC) as a possible source for a whole
|
||
series of disks about teaching techniques and educational issues, as
|
||
well as lesson plans. 4) One of you let us know the importance of
|
||
books on disks for the blind, many of whom have equipment which can
|
||
"read" such material aloud to them.
|
||
5) We've added six new disks.
|
||
6) We've learned that in the summer, with people away, obtaining
|
||
permissions from sources can take a while.
|
||
7) We've been delighted by the enthusiastic response we received.
|
||
8) We learned that there simply isn't enough time in the
|
||
day to personally respond to everyone. (Please accept
|
||
our apologies, and our thanks for your helpful suggestions.)
|
||
|
||
We'd appreciate your help in finding sources of information to meet
|
||
the particular needs of people who have responded to us. We are
|
||
looking for public-domain on-line sources for: 1) Chaucer, 2) current
|
||
information on Africa, and 3) history c. 1850 of importation into the
|
||
U.S. of castorbean plants (source of the toxin Ricin, which is
|
||
possibly linked to Lou Gehrig's disease) and its use in fertilizer.
|
||
|
||
The information resources available on the Internet and from the
|
||
United Nations are immense. We need to target our efforts to provide
|
||
maximum benefit. For now, we're basing our decisions on the assumption
|
||
that some of you would like to use these like textbooks (having
|
||
students make their own copies), that others would like to assemble
|
||
your own anthologies, and that still others are interested in
|
||
government reference tools to encourage students to become informed
|
||
and active citizens. Please let us know as specifically as you can
|
||
what information would be most useful for you and your colleagues to
|
||
have on disk.
|
||
|
||
Please send your suggestions as well as your requests to be added to
|
||
our distribution list to: samizdat@world.std.com
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 6 Aug 1993 22:16:59 -0500 (CDT)
|
||
From: vswr!bobi@SPSGATE.SPS.MOT.COM(Bob Izenberg)
|
||
Subject: File 11--Gory details about texsun (breakin) (fwd)
|
||
|
||
# Date--Fri, 6 Aug 93 11:55:45 CDT
|
||
# From--William.Reeder@adhara.Central.Sun.COM (William Reeder)
|
||
(Sun Central Area Network Support)
|
||
|
||
# Subject--Gory details about texsun
|
||
|
||
# Eric Schnoebelen (eric@cirr.com) writes:
|
||
# > What I heard was that texsun got cracked, so SUN changed
|
||
# > policies to require call back on all connections. This means that
|
||
# > SUN/texsun has to originate all calls. I recently converted the UUCP
|
||
# > link between convex and texsun to route mail via smtp, to get "around"
|
||
# > this problem..
|
||
# >
|
||
# > Personal thought? texsun is now out of the news providing
|
||
# > business. And quite likely out of the general UUCP providing business.
|
||
# > Perhaps its time for another connectivity meeting. (just what _I_ need,
|
||
# > another meeting!)
|
||
|
||
# I think I can speak authoritatively about what happened to texsun :-(
|
||
|
||
# Actually, we have no evidence that anyone broke in through any of the
|
||
# modems in Sun's Dallas office (hosts texsun or dallas). What did
|
||
# happen was that one or more people (most likely more) broke in via
|
||
# modem to a number of Sun sites around the world (must've had a good
|
||
# calling card). We think that the initial entries were due to the most
|
||
# brain-dead of actions on our part: the intruders called us on the phone
|
||
# and asked for accounts, and we provided them. The callers would
|
||
# identify themselves as Sun employees on vacation near the local Sun
|
||
# office (visiting parents or such) and say that they wanted to login to
|
||
# read their email. They were able to provide enough credible
|
||
# information to convince over-worked and under-brained part-time
|
||
# sys-admins to create the accounts. Any one of you who reads USENET
|
||
# news can probably gather enough such information from headers and
|
||
# signatures (name, title, personal workstation, office phone number,
|
||
# etc.) to make the same claims.
|
||
|
||
# Anyway, once they were in we were totally compromised. We hadn't done
|
||
# much to keep up with security patches. And we had lots of machines
|
||
# with "+" in /etc/hosts.equiv. And lots of quickly crackable passwords
|
||
# on accounts (and NIS accessible password files). In other words, no
|
||
# internal security. The intruders almost instantly had bunches of other
|
||
# accounts to use, and seemed able to find other modem numbers (can you
|
||
# say, "directory assistance"? I thought you could.)
|
||
|
||
# The next question is, did they damage anything? Yes. At the very
|
||
# least they stole source code, which is a valuable product. They also
|
||
# deleted stuff, but I don't know what, and may have modified some
|
||
# things. They also crashed machines or in other ways denied service to
|
||
# legitimate users. All of those things are illegal, and damaging. We
|
||
# are doing our best to track the intruders, but it is very difficult, as
|
||
# any of you who have tracked intruders knows.
|
||
|
||
# What we can do is secure our network. That is why we are removing
|
||
# modems from all sales offices and setting up a small number of regional
|
||
# modem pools for employee dialup access (with three different and
|
||
# non-crackable passwords and dialback).
|
||
|
||
# I have spent the better part of the last week rebuilding texsun from
|
||
# the ground up and doing everything possible to secure it (all security
|
||
# patches applied, many services disabled, nothing trusted, security
|
||
# monitoring programs running, dialback software installed, etc.). I
|
||
# have finally convinced my management that there is no security risk in
|
||
# restoring the UUCP accounts for a short time, allowing our connections
|
||
# to make other arrangements and smoothly move over. The reason it is
|
||
# only temporary is that management doesn't want my UUCP modems to be the
|
||
# proverbial camel sticking its nose under the tent. They are very
|
||
# serious about strictly limiting the number of entry points into the
|
||
# company.
|
||
|
||
# So there you have it. Another one bites the dust. I'm sorry to have
|
||
# to pull out of the regional UUCP community, but I can understand Sun's
|
||
# needs to maintain a secure environment. While I agree that a properly
|
||
# configured machine running UUCP is not a security risk, Sun's employees
|
||
# have repeatedly demonstrated that they will not always properly
|
||
# configure machines or employ proper security procedures when creating
|
||
# accounts. The only way for Sun to maintain security is to strictly
|
||
# limit access, and that is what we are now doing. I have enjoyed being
|
||
# able to provide what I hope has been a useful service to the community,
|
||
# and will miss being a participant. I will show up to this Month's
|
||
# lunch-bunch meeting in case anyone wants to verbally abuse Sun through
|
||
# me.
|
||
#
|
||
# -- Wills
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.61
|
||
************************************
|
||
|
||
|
||
|