1129 lines
48 KiB
Plaintext
1129 lines
48 KiB
Plaintext
Computer underground Digest Wed Sep 28, 1994 Volume 6 : Issue 85
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Urban Legend Editor: E. Greg Shrdlugold
|
|
|
|
CONTENTS, #6.85 (Wed, Sep 28, 1994)
|
|
|
|
File 1--"Green Card Lawyers" Threaten T-Shirt Maker
|
|
File 2--ACLU letter and release on FBI Wiretap bill
|
|
File 3--Internet Security Seminar (Nov 12 '94)
|
|
File 4--Police, Press, and Porn in Toronto
|
|
File 5--Canadian BBS Sysops Plead Guilty to "Piracy"
|
|
File 6--PHRACK hardcopies available from SotMESC / GCMS
|
|
File 7--ACLU Gopher
|
|
File 8--Telecommunication Reform Bill (S. 1822) DEAD!
|
|
File 9--Cu Digest Header Information (unchanged)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Tue, 20 Sep 1994 16:42:43 -0400
|
|
From: eye@IO.ORG(eye WEEKLY)
|
|
Subject: File 1--"Green Card Lawyers" Threaten T-Shirt Maker
|
|
|
|
|
|
Toronto's arts newspaper .....free every Thursday
|
|
===================
|
|
EYE NET EYE NET
|
|
|
|
ALL HAIL THE CHIC GEEK!
|
|
Scum-sucking weasel lawyers as fashion statements
|
|
|
|
by
|
|
K.K. CAMPBELL
|
|
|
|
|
|
Coupla weeks ago, eye Net reported how North Carolina university
|
|
student Joel Furr (jfurr@acpub.duke.edu) designed a popular
|
|
collectible -- T-shirts about net.poltergeist "Serdar Argic." Furr
|
|
promised to follow-up with a T-shirt featuring Arizona lawyers
|
|
Laurence Canter and Martha Siegel.
|
|
|
|
On June 18, eye Net reported how this wife-and-hubby law team sent
|
|
an ad for the American "Green Card lottery" to thousands of
|
|
newsgroups (win a work permit raffle run by the U.S. government;
|
|
C&S offered to fill in a few forms for merely hundreds of dollars).
|
|
This posting tactic is called "spamming." C&S did it twice.
|
|
|
|
Spammers are loathed. Commercial spammers are loathed more.
|
|
Snotty lawyer commercial spammers attain monumental loathing. So
|
|
'twas no surprise C&S were mailbombed into oblivion after each
|
|
spam attack against Usenet. Both times, the lawyer's Internet
|
|
providers terminated their account after a global deluge of
|
|
complaints.
|
|
|
|
The legal weasels squealed in anger and threatened to sue their
|
|
Internet providers. But nothing came of it.
|
|
|
|
Now they've threatened to sue Furr over his little non-profit T-shirt
|
|
featuring the net.vermin. Shirt design features a four-color logo of a
|
|
hand clutching a green card bursting forth from a globe. Around it:
|
|
"The Green Card Lawyers -- Spamming the Globe."
|
|
|
|
On Aug. 8, Furr publicly announced C&S had sent him private email, a
|
|
standard nasty-lawyer letter. C&S asserted the "use of their names,
|
|
likenesses or nickname is prohibited" -- meaning he couldn't even
|
|
call them, "The Green Card Lawyers." Furthermore, Furr was
|
|
informed "several large companies" had contacted the lawyers about
|
|
a line of C&S T-shirts and Furr's plan to sell maybe 10 dozen shirts
|
|
"would hurt their marketability."
|
|
|
|
A clarification: Furr's shirt mocks C&S -- who the hell would wear
|
|
it, let alone buy it, otherwise? The claim that "several large
|
|
companies" are considering issuing a friendly C&S shirt is a source
|
|
of much mirth and merriment about Planet Earth.
|
|
|
|
Furr knew C&S was fullashit -- indeed, most of Usenet-reading
|
|
Planet Earth is sure they're fullashit -- but, being a student, he
|
|
knew he'd neither the time nor resources to fight a nuisance suit.
|
|
Thus he concluded his Aug. 8 public post: "I think I have lots and lots
|
|
of legal legs to stand on, but I can't afford to fight a lawsuit." The
|
|
term "Green Card Lawyers" would be removed from the shirt.
|
|
|
|
But Furr's mailbox soon brimmed with offers of legal assistance,
|
|
even monetary help -- anything to thwart the most hated husband-
|
|
wife team in Usenet history. (And Canter has said several times he's
|
|
going to write a book about how to advertise on the net!)
|
|
|
|
Electronic Frontier Foundation's chief legal counsel Mike Godwin
|
|
(mnemonic@eff.org) advised Furr C&S "threats" were impotent bluster,
|
|
Furr told eye in a telephone interview, because 1) C&S are not members
|
|
of the Arizona bar; 2) they are under investigation by the Tennessee
|
|
bar; 3) they can sue only in the state in which Furr does business; and
|
|
4) they have no trademark over the term "Green Card Lawyers."
|
|
|
|
This last means that just because Usenetters call C&S the "Green
|
|
Card Lawyers" doesn't grant them a trademark on the term. For
|
|
instance, eye calls them the "Two-Bit, Suck-My-Left-Nut Lawyers"
|
|
-- Martha and Larry don't own that name either.
|
|
|
|
Bottomline: Furr's going ahead with the original design.
|
|
|
|
"Green Card Lawyers" T-shirts are $11 U.S. -- XXL $1 more, XXXL $2
|
|
more. Canadians add $1. Write Furr for more details. To join the
|
|
net.collectibles mailing list, send email with the message
|
|
"subscribe netstuff" (without the quotes) to
|
|
majordomo@acpub.duke.edu . For the latest on the net.vermin, read
|
|
alt.flame.canter-and-siegel .
|
|
|
|
===========
|
|
Retransmit freely in cyberspace Author holds standard copyright
|
|
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
|
|
Mailing list available http://www.io.org/eye
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 26 Sep 1994 17:57:50 -0400
|
|
From: ACLU Information <infoaclu@ACLU.ORG>
|
|
Subject: File 2--ACLU letter and release on FBI Wiretap bill
|
|
|
|
ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU * ACLU
|
|
NEWS RELEASE * NEWS RELEASE * NEWS RELEASE * NEWS RELEASE
|
|
|
|
ACLU Opposes FBI Wiretap Access Bill;
|
|
Legislation Would Create Dangerous Precedent
|
|
|
|
For IMMEDIATE RELEASE
|
|
September 26, 1994
|
|
|
|
Contact: Barry Steinhardt
|
|
BarryS @ aclu.org
|
|
or Kathy Parrent, 212-944-9800, ext. 424
|
|
|
|
|
|
The American Civil Liberties Union today called on the House
|
|
Judiciary Committee to reject the FBI Wiretap Access Bill, H.R. 4922,
|
|
which would require private electronics manufacturers to insure that the
|
|
FBI can wiretap using developing telecommunications technologies.
|
|
|
|
In a letter sent to Congressman Jack Brooks, Chair of the House
|
|
Judiciary Committee, the ACLU stated that the bill "... creates a
|
|
dangerous and unprecedented presumption that government not only has the
|
|
power, subject to warrant to intercept private communications, but that it
|
|
can require private parties to create special access. It is as if the
|
|
government had required all builders to construct new housing with an
|
|
internal surveillance camera for government use."
|
|
|
|
"Moreover, the FBI has not borne the burden of proving why such an
|
|
extraordinary requirement is necessary..." the letter said.
|
|
|
|
A copy of the full letter with the ACLU's detailed objections
|
|
follows.
|
|
___________________________________________________________________________
|
|
|
|
September 22, 1994
|
|
|
|
|
|
|
|
|
|
Honorable Jack Brooks
|
|
Congressman, State of Texas
|
|
2449 Rayburn House Office Building
|
|
Washington, D.C. 20515-4309
|
|
|
|
Dear Congressman Brooks:
|
|
|
|
We are writing to you to express the ACLU's opposition to the
|
|
FBI-Wiretap Access Bill, H.R. 4922. While we were not actively involved
|
|
in Subcommittee deliberations, we have reviewed the legislation and we
|
|
have several major concerns.
|
|
|
|
The principal problem remains that any digital telephone bill
|
|
which mandates that communications providers make technological changes
|
|
for the sole purpose of making their systems wiretap-ready creates a
|
|
dangerous and unprecedented presumption that government not only has the
|
|
power, subject to warrant, to intercept private communications, but that
|
|
it can require private parties to create special access. It is as if the
|
|
government had required all builders to construct new housing with an
|
|
internal surveillance camera for government use. Even if such use were
|
|
triggered only by a judicial warrant, such a requirement would be strongly
|
|
resisted by the American people. H.R. 4922 establishes a similar
|
|
requirement, and is without precedent.
|
|
|
|
Moreover, the FBI has not borne the burden of proving why such an
|
|
extraordinary requirement is necessary. In 1993, there were fewer than
|
|
1,000 wiretaps authorized and many of them failed to yield any substantive
|
|
evidence while intercepting many innocent conversations. It is far from
|
|
clear that digital telephones will substantially obstruct legitimate law
|
|
enforcement efforts. Without further public discussion and debate, the
|
|
public will not have a sufficient opportunity to weigh the loss of privacy
|
|
against the FBI's claims. There has been no opportunity to learn the full
|
|
extent of the types of investigations that the FBI claims were precluded
|
|
because of a restriction on their public dissemination. Yet, based on
|
|
these secret assertions, 91 such incidents were cited by the FBI. On
|
|
those slim assertions, the public's loss of privacy in digital
|
|
communications is all but assured and taxpayers will be asked to pay an
|
|
extraordinary price.
|
|
|
|
H.R. 4922 authorizes $500 million over the next four years to
|
|
reimburse telecommunications carriers for the costs that would be imposed
|
|
by the bill. Even if you accept these cost estimates -- the industry puts
|
|
the real cost in the billions -- we will spending $125 million or $125,000
|
|
per wiretap, for the fewer than 1,000 taps that will be conducted each
|
|
year.
|
|
|
|
As you know, the ACLU has the greatest respect for Congressman
|
|
Edwards and Senator Leahy. Both have been tireless champions for civil
|
|
liberties. The Edwards/Leahy proposal is an improvement over earlier
|
|
versions offered by the FBI and we applaud their efforts to add new
|
|
privacy protections.
|
|
|
|
The proposed expansion of the Electronic Communications Privacy
|
|
Act to cordless phones and the requirement that a court order be obtained
|
|
for transactional data from electronic communication providers both are
|
|
steps forward and merit separate consideration by the Congress. But they
|
|
cannot and should not be traded for the unprecedented intrusion
|
|
represented by H.R. 4922.
|
|
|
|
In several respects, H.R. 4922 is still too broad in its
|
|
application.
|
|
|
|
For example, earlier versions of the bill would have applied
|
|
directly to on-line communication and information services such as
|
|
internet providers, America On Line, Compuserve, Prodigy etc. H.R. 4922
|
|
would apply directly only to "telecommunications carriers" such as the
|
|
Regional Bell Operating Companies.
|
|
|
|
But this provision does not narrow the scope of the bill as much
|
|
as it might seem. First, with the new presumption that the government is
|
|
entitled to require private manufacturers to insure its ability to
|
|
wiretap, law enforcement will undoubtedly be back in future years
|
|
insisting that this limitation thwarts its efforts and will seek to
|
|
broaden the coverage to other information providers. Once the basic
|
|
principle of H.R. 4922 is accepted, what arguments remain to resist its
|
|
expansion. The limited application of H.R. 4922 is surely temporary; what
|
|
matters is the basic requirement, not its immediate application.
|
|
|
|
More importantly, law enforcement will still have the opportunity
|
|
to intercept on-line communications over the internet or commercial
|
|
on-line networks, by tapping into the facilities of the telecommunications
|
|
companies. As critics of the earlier versions had noted the coverage of
|
|
the on-line providers was largely redundant. All these communications
|
|
still pass over telephone lines.
|
|
|
|
Law enforcement does not need access at every point in a
|
|
telecommunication in order to intercept it. Access at any one point is
|
|
sufficient and that would be readily available since ultimately on-line
|
|
communications must travel over the public switched telephone network
|
|
which the bill requires be wiretap ready.
|
|
|
|
Moreover, given the commingled nature of digital communication
|
|
lines, it is inevitable that more private information from third parties
|
|
will be intercepted than would be the case with analog phones, and the
|
|
minimization requirements in the bill will not prevent this.
|
|
|
|
In the end, this proposal will make our telecommunications
|
|
structure more, not less vulnerable.
|
|
|
|
In its original form the FBI Digital Telephony proposal would have
|
|
given the power to the Attorney General to impose standards on
|
|
communication providers which would guarantee that their systems were
|
|
wiretap-ready.
|
|
|
|
Essentially, this would have created a centralized wiretapping
|
|
system that threatened the privacy of the entire nation and was dependent
|
|
for its security on a few select people.
|
|
|
|
This raised the real concern that if electronic communications
|
|
service providers must design their systems to allow and ensure FBI
|
|
access, then the resulting mandatory "back doors" may become known to and
|
|
be exploited by "criminals."
|
|
|
|
The new proposal contains the same risks. It would have the
|
|
technical standards developed by the industry, through trade associations
|
|
or standard-setting bodies, in consultation with the Attorney General.
|
|
But it contains a "safe harbor" provision, which protects a carrier from
|
|
sanction if it is in compliance with standards created by this approach.
|
|
|
|
The safe harbor provision virtually guarantees that the standards
|
|
developed through the industry-based process will be adopted by all.
|
|
Whether the standards are directly imposed by government or created by
|
|
concerted industry action, in consultation with the government, makes
|
|
little difference. The result is the same. A centralized wiretapping
|
|
capacity with all of its vulnerabilities will still be created.
|
|
|
|
Finally, we have grave concerns about the encryption provisions.
|
|
The Edwards/Leahy version has been described as "neutral" on encryption.
|
|
The bill provides that telecommunications providers do not need to decrypt
|
|
data, unless they hold the key.
|
|
|
|
In the short term, this is an improvement over the earlier
|
|
versions of the bill which would have created obligations to decrypt, but
|
|
there are at least two longer term problems.
|
|
|
|
First, is the new presumption that industry has the affirmative
|
|
responsibility to create special technical capacity for the government to
|
|
snoop. Can there be any real doubt that the FBI will be back in the years
|
|
to come asserting that its ability to intercept communications has been
|
|
thwarted by easily available encryption and that an industry obligation,
|
|
analogous to the new obligation to provide wiretap capacity, must be
|
|
created.
|
|
|
|
Secondly, in some cases the telecommunications providers may well
|
|
hold the key -- particularly as they expand the services they provide to
|
|
their customers.
|
|
|
|
H.R. 4922 proposes a radical and expensive change in our
|
|
telecommunications structure. The threats it poses, now and
|
|
prospectively, are real, but the need for it far less than evident or
|
|
proven. We urge that your Committee not rush into consideration of this
|
|
far reaching measure with so little time left in the session.
|
|
|
|
We thank you for your consideration of our views and we would be
|
|
happy to sit down with you to discuss these issues.
|
|
|
|
Sincerely,
|
|
|
|
Ira Glasser Laura Murphy Lee
|
|
|
|
=====================
|
|
|
|
The ACLU urges interested persons to contact the following members of
|
|
Congress immediately:
|
|
|
|
Rep. Jack BrooksSen. Howard Metzenbaum
|
|
(202) 225-6565 (voice)(202) 224-7494 (voice)
|
|
(202) 225-1584 (fax)(202) 224-5474 (fax)
|
|
|
|
=============================================================
|
|
|
|
ACLU Free Reading Room | American Civil Liberties Union
|
|
gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036
|
|
mailto:infoaclu@aclu.org| "Eternal vigilance is the
|
|
ftp://aclu.org | price of liberty"
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 22 Sep 1994 08:35:44 GMT
|
|
From: voidstar@NETCOM.COM(Scott Corcoran)
|
|
Subject: File 3--Internet Security Seminar (Nov 12 '94)
|
|
|
|
INTERNET SECURITY
|
|
SECURE COMMUNICATIONS OVER UNTRUSTED NETWORKS
|
|
|
|
A one-day seminar on November 12, 1994
|
|
Embarcadero Hyatt Regency Hotel in San Francisco.
|
|
|
|
|
|
Methods of achieving authentication, authorization,
|
|
confidentiality, integrity, and nonrepudiation are key to the
|
|
successful realization of the National Information
|
|
Infrastructure (NII). Today's Internet is a proving ground for
|
|
what will become the NII.
|
|
|
|
The San Francisco Chapter of the IEEE Computer Society has put
|
|
together an outstanding program on encryption, intrusion
|
|
detection, firewalls, architectures, and protocols for Internet
|
|
Security. Speakers in this seminar will describe several of
|
|
the main techniques that exist today and the directions in
|
|
which they are evolving. The seminar will be helpful to
|
|
engineers, engineering managers and product planners seeking
|
|
current knowledge of Internet Security.
|
|
|
|
|
|
PROGRAM
|
|
|
|
8:30 a.m. Registration opens
|
|
|
|
9:00 a.m. Introduction
|
|
|
|
9:05 a.m. Keynote Address James Bidzos, President of RSA
|
|
|
|
9:45 a.m. Steven Bellovin, Ph.D., Bell Labs
|
|
"Firewalls for Computer Security"
|
|
|
|
11:00 a.m. Teresa Lunt, SRI
|
|
"Intrusion Detection"
|
|
|
|
11:45 a.m. Round Table Lunch (incl. with registration)
|
|
|
|
1:00 p.m. Professor Martin E. Hellman, Ph.D., Stanford
|
|
"Cryptography: The Foundation of Secure Networks"
|
|
|
|
2:00 p.m. Dan Nessett, Ph.D.,
|
|
SunSoft and PSRG
|
|
"Future Internet Security Architecture"
|
|
|
|
3:00 p.m. Matt Blaze, Ph.D., Bell Labs
|
|
"Protocols: Security Without Firewalls"
|
|
|
|
4:00 p.m. "Public Safety vs. Private Liberty"
|
|
A Panel Discussion on the Social
|
|
Implications of Internet Security
|
|
Rex Buddenberg NPS
|
|
Alan McDonald FBI
|
|
Stewart Baker formerly of the NSA
|
|
James Bidzos President of RSA
|
|
Matt Blaze Bell Labs
|
|
Martin Hellman Stanford
|
|
|
|
|
|
A one day seminar in San Francisco, on Saturday, November 12th,
|
|
covering private and public-key encryption, key-escrow,
|
|
fire-walls, architecture and protocols for security,
|
|
intrustion detection, and a spirited panel discussion on
|
|
"Public Safety vs. Private Liberty" !
|
|
|
|
SEATING IS LIMITED. PRE-REGISTER BY OCTOBER 15TH.
|
|
|
|
|
|
9:05 Keynote Address
|
|
|
|
James Bidzos, President of RSA
|
|
|
|
James Bidzos, President of RSA Data Security, will present the
|
|
keynote address. Mr. Bidzos heads a company whose encryption
|
|
technologies are licensed for products ranging from computer
|
|
operating systems, to software copy protection, to electronic
|
|
mail, to secure telephones. RSA has licensed several million
|
|
copies of its encryption software, and has become a focal point
|
|
for debate on appropriate application of cryptography.
|
|
|
|
Mr. Bidzos has gained a unique perspective on the requirements
|
|
of effective cryptographic systems. He will highlight the
|
|
problem of providing strong encryption for users of computer
|
|
networks while meeting the legitimate needs of law enforcement
|
|
|
|
|
|
9:45 Steven Bellovin, Ph.D., Bell Labs
|
|
"Firewalls for Computer Security"
|
|
|
|
When you connect your computer to the Internet, you also create
|
|
a channel into your computer. Clever vandals, thieves and
|
|
industrial spies have found ways to abuse most of the Internet
|
|
protocols from FTP and Telnet to the World Wide Web and
|
|
Network Time Protocols. Short of pulling the plug, firewalls
|
|
provide the surest defense. The firewall administrator must
|
|
keep abreast of new methods of attack and understand how
|
|
firewalls can mitigate the threat. Steven M. Bellovin, Ph.D.,
|
|
is a senior researcher at AT&T's Bell Laboratories and
|
|
co-author of the well known guide "Firewalls and Internet
|
|
Security: Repelling the Wily Hacker." As one responsible for
|
|
protecting "the phone company" from Internet hackers, Dr. Bellovin
|
|
can describe from firsthand experience how firewalls can be
|
|
constructed to screen them out. Dr. Bellovin will join us in a
|
|
live video teleconference from Bell Laboratories.
|
|
|
|
11:00 Teresa Lunt, SRI "Intrusion Detection"
|
|
|
|
Inevitably, someone will try to breach your firewall and might
|
|
succeed. The time it takes you to discover the intrusion and
|
|
catch the culprit depends on the event logging you have
|
|
established. However, logging the many different transactions
|
|
that might expose trespassing produces mountains of data.
|
|
Automatic digestion of the logs is the only hope of monitoring
|
|
them all. Teresa F. Lunt, Director of Secure Systems Research
|
|
at SRI's Computer Systems Laboratory, directs work in
|
|
multilevel database systems and intrusion detection. Ms. Lunt
|
|
will describe intrusion detection and demonstrate automated
|
|
tools developed at SRI to analyze audit data for suspicious
|
|
behavior.
|
|
|
|
1:00 Professor Martin E. Hellman, Ph.D., Stanford
|
|
"Cryptography: The Foundation of Secure Networks"
|
|
|
|
Data in transit across unsecured networks like the Internet
|
|
are subject to wiretapping attacks and impersonation.
|
|
Moreover, privacy of communication and authentication of the
|
|
sender's message are essential to Internet commerce, with
|
|
exchange of contracts, receipts, credit card drafts and the
|
|
like increasingly commonplace. Encryption can solve some of
|
|
these problems, but what kind of encryption? Authentication
|
|
only or encrypted messages? Secret key or public key, or
|
|
both? Will you need a giant key ring for mes sage keys,
|
|
session keys, file keys, and passwords? Martin E. Hellman,
|
|
Ph.D., Professor of Electrical Engineering at Stanford
|
|
University, is co-inventor of public key cryptography with
|
|
Whitfield Diffie and Ralph Merkle. He was elected a Fellow of
|
|
the IEEE for contributions to cryptography. Dr. Hellman will
|
|
explore threats to communication and costs of electronic
|
|
countermeasures. He will explain the importance and means of
|
|
authenticating electronic messages, and he will survey public key
|
|
cryptography. Dr. Hellman will describe public key techniques
|
|
including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, ElGamal
|
|
and Digital Signature Standard (DSS). He will also describe
|
|
the current status of export control and encryption standards
|
|
such as the Data Encryption Standard (DES), Escrowed
|
|
Encryption Standard (EES) and its encryption algorithm,
|
|
Skipjack, which is implemented in Clipper and Capstone chips.
|
|
|
|
2:00 Dan Nessett, Ph.D., SunSoft and PSRG
|
|
"Future Internet Security Architecture"
|
|
|
|
Dan Nessett, Ph.D., of the SunSoft Division of Sun
|
|
Microsystems, and until recently with Lawrence Livermore
|
|
National Laboratory, has worked extensively in local area
|
|
networks, distributed operating systems and distributed systems
|
|
security. He is a member of the Privacy and Security Research
|
|
Group (PSRG), which is convened under the auspices of the
|
|
Internet Society. Dr. Nessett will explain the emerging
|
|
Internet security architecture work undertaken by the PSRG.
|
|
The architecture will guide the development of security
|
|
mechanisms used in Internet standards.
|
|
|
|
|
|
3:00 Matt Blaze, Ph.D., Bell Labs
|
|
"Protocols: Security Without Firewalls"
|
|
|
|
We use firewalls because Internet protocols are not inherently
|
|
secure. Can we rehabilitate the Internet protocols to produce
|
|
protocols which are secure, not computationally prohibitive,
|
|
and compatible with existing protocols? Matt Blaze, Ph.D., of
|
|
Bell Laboratories will talk about the problems of integrating
|
|
cryptographic protection into large-scale network infrastructure.
|
|
Dr. Blaze is the author of "A Cryptographic
|
|
File System for Unix," presented at the 1993 ACM Conference on
|
|
Communications and Computer Security, and co-author with John
|
|
Ioann idis of "The Architecture and Implementation of
|
|
Network-Layer Security Under UNIX," which describes "swIPe," a
|
|
network-layer security protocol for the IP protocol suite.
|
|
Dr. Blaze will address issues concerning network security
|
|
protoc ols, key management and distribution, and threats and
|
|
models for cryptographic engineering.
|
|
|
|
4:00 A Panel Discussion on the Social Implications of
|
|
Internet Security "Public Safety vs. Private Liberty"
|
|
|
|
At one end of an imagined security spectrum lies the
|
|
information police-state. Through traffic analysis,
|
|
mandatory personal ID numbers and escrowed encryption, and
|
|
the ability to record all messages and commerce carried out
|
|
on the Information Superhighway, governments could maintain
|
|
dossiers on every aspect of the personal life and business
|
|
of its citizens. Privacy advocates fear that a corrupt government
|
|
could use such information against its political enemies and to
|
|
subvert personal freedoms. At the other extreme lies information
|
|
anarchy. Through the use of digital cash, anonymous remailers,
|
|
and strong non-escrowed encryption, the Information
|
|
Superhighway could become a hide-out for criminals and
|
|
national security threats. The potential for black-market
|
|
activity and the associated tax-evasion is so enormous that
|
|
some have speculated that governments could eventually
|
|
collapse. Law-enforcem ent advocates fear that they will be
|
|
unable to keep up with criminals and terrorists who ply their
|
|
trade electronically. Our distinguished panel will provide
|
|
insight into the interplay between the rights of individuals
|
|
to privacy and freedom, the rights of companies to conduct
|
|
unrestrained trade, and the ability of law enforcement and
|
|
security agencies to perform their functions efficiently.
|
|
This conclusion to the seminar will put into perspective
|
|
the social changes that might be wrought by the technical
|
|
advances discussed earlier in the day.
|
|
|
|
Panelists include:
|
|
|
|
Rex Buddenberg NPS
|
|
Alan McDonald FBI
|
|
Stewart Baker formerly of the NSA
|
|
James Bidzos President of RSA
|
|
Matt Blaze Bell Labs
|
|
Martin Hellman Stanford
|
|
|
|
Rex Buddenberg, Instructor of information systems architecture
|
|
and applied networking at the Naval Postgraduate School, will
|
|
moderate the panel. Mr. Buddenberg is a maritime command,
|
|
communication, control and intelligence (C3I) consultant and a
|
|
computer networking author. As a C3I architect for the U.S.
|
|
Coast Guard, he developed plans and specifications for
|
|
extending Internet connectivity to oceanographic ships. Mr.
|
|
Buddenberg contemplates the means and effects of net warfare as
|
|
both the good guys and bad guys share the same network.
|
|
|
|
Alan McDonald, Special Counsel for Electronic Surveillance Matters,
|
|
Information Resources Division, Federal Bureau of Investigation,
|
|
is a specialist in the law and policy concerning electronic
|
|
surveillance, Digital Telephony, and encryption issues.
|
|
He frequently represents the FBI's view of law enforcement equities
|
|
in light of advanced telecommunications and encryption.
|
|
|
|
Stewart Baker is a former General Counsel to the NSA and
|
|
a partner in Steptoe & Johnson, a Washington, DC law firm.
|
|
His expertise is in telecommunications, computer export policy,
|
|
security of national information infrastructure and encryption.
|
|
Mr. Baker brings direct experience with the problem that strong
|
|
encryption creates for the NSA in protecting our national
|
|
security.
|
|
|
|
|
|
QUESTIONS? CALL (415)-327-6622.
|
|
|
|
Cut-off and complete this form, enclose your check payable to
|
|
the IEEE SFCS, and mail to: IEEE Council Office 701 Welch
|
|
Rd. #2205 Palo Alto, CA. 94304
|
|
|
|
To qualify for the reduced Pre-registration fees, your
|
|
application with check must be postmarked no later than Oct.
|
|
15, 1994. Registration fee includes lunch, refreshments, and
|
|
parking. Seating is limited. To make sure the seminar is
|
|
not sold out, call (415) 327-6622.
|
|
|
|
please check the appropriate box
|
|
|
|
Fees on or before Oct. 15th:
|
|
|
|
___ IEEE Member $ 110
|
|
___ Non-member $ 120
|
|
___ Student $ 85
|
|
|
|
Fees after Oct. 15th:
|
|
___ IEEE Member $ 125
|
|
___ Non-member $ 145
|
|
___ Student $ 100 (students must present ID)
|
|
|
|
|
|
The seminar location is the Hyatt Regency Embarcadero Hotel,
|
|
near the Ferry Building, in San Francisco.
|
|
Your registration fee includes the all day seminar, lunch,
|
|
and convenient parking in the garages underneath adjacent
|
|
Embarcadero Centers 1, 2, or 3. (Keep your ticket for validation).
|
|
|
|
|
|
Please print clearly:
|
|
|
|
Name : __________________________________________
|
|
|
|
Title : __________________________________________
|
|
|
|
Company: __________________________________________
|
|
|
|
Address: __________________________________________
|
|
|
|
__________________________________________
|
|
|
|
_______________________________ ___ ______
|
|
|
|
Day phone #:(___)_____-_______
|
|
|
|
IEEE member (or affiliate) #:_______ ____ (for discount)
|
|
|
|
College/University (if student):___________________
|
|
|
|
___ Vegetarian lunch option
|
|
|
|
|
|
Refunds will be honored through October 22nd, substitutions
|
|
any time. Additional information can be obtained by telephoning
|
|
the IEEE Bay Area Council Office: (415)327-6622.
|
|
|
|
IEEE SFCS RESERVES THE RIGHT TO MAKE CHANGES TO THE SEMINAR
|
|
|
|
Sponsored by the San Francisco Chapter of the IEEE Computer
|
|
Society. The IEEE is a non-profit organization.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 25 Sep 1994 20:28:58 -0400
|
|
From: eye@IO.ORG(eye WEEKLY)
|
|
Subject: File 4--Police, Press, and Porn in Toronto
|
|
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
eye WEEKLY September 22 1994
|
|
Toronto's arts newspaper .....free every Thursday
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
EYE NET EYE NET
|
|
|
|
PRESS, POLICE AND PORN REVISITED
|
|
|
|
by
|
|
K.K. CAMPBELL
|
|
|
|
|
|
Once again, the news media finds itself being used to misrepresent
|
|
the nature of the net for the Big Story about the 3Ps -- Pedophilia,
|
|
Pornography or Piracy.
|
|
|
|
On Sept. 13, CITY-TV's CityPulse News did a story about "Mr.
|
|
Concerned Citizen," who is worried children can access hardcore
|
|
porn on the net through a system called called Interlog. Mr.
|
|
Concerned Citizen is Bruce Lloyd of Agincourt, who filed a complaint
|
|
with Metro Police Chief William McCormack against Interlog.
|
|
|
|
We also met Interlog owner Matt Harrop (mharrop@interlog.com), a
|
|
19-year-old with dyed-purple hair. It's the sort of juxtaposition of
|
|
images that the camera loves: Mr. Concerned-Citizen-Who-Loves-
|
|
Children versus Freaky-Haired Porn-Peddler.
|
|
|
|
But that's not quite the whole story.
|
|
|
|
It turns out Lloyd is himself a writer of copious vile material. Lloyd
|
|
had not counted on some elements of the news media discovering his
|
|
net.history. (Joe Baptista, a friend of Lloyd's, similarly suckered
|
|
CITY news in January with the fake story that the Ontario
|
|
government computers held banned Karla Homolka newstories in
|
|
them.)
|
|
|
|
In fact, as this column will demonstrate, Lloyd's complaint issues
|
|
from a personal vendetta against Harrop.
|
|
|
|
Sysadmins, take note.
|
|
|
|
LLOYD IN ACTION
|
|
|
|
Let's review some of Lloyd's posting habits. It all seems to have
|
|
started around Aug. 21, when Lloyd entered into a flamewar with
|
|
rabid homophobe Chuck Whealton (chuck@hopi.dtcc.edu).
|
|
|
|
* Lloyd began mailbombing Whealton's site, a definite no-no.
|
|
|
|
* Lloyd soon claimed he'd found out where Whealton lives and that he
|
|
and friends would drive down to Delaware and gang rape Whealton: "I
|
|
can't wait to have sex with him ... maybe we could do it at the same
|
|
time! I bet he's never had two guys up his ass at once before!"
|
|
|
|
* Lloyd has the curious distinction of being even more hated by most
|
|
online gays than brain-dead homophobes like Whealton. Quotes from
|
|
his public posts afford a glimpse into why. Lloyd wrote some
|
|
interesting posts to lesbian netters: "You just can't leave me alone
|
|
... Enjoy being a failure, Cuntlicker." "Perchance a rigorous butt-fuck
|
|
is what you need to loosen up, Cuntrag?"
|
|
|
|
In a phone interview, Lloyd admitted to eye he wrote these remarks
|
|
-- in fact, he giggled when admitting to them. "Well, you know, I
|
|
was trying to be insulting."
|
|
|
|
* His interest in protecting children from porn is also clear from
|
|
this Usenet post: "I love straight fuckers like this. What they really
|
|
need is to have their dicks tied up in leather straps and then have
|
|
needles pierced right through them."
|
|
|
|
* On the "pornography" front, Lloyd sent a very detailed post called
|
|
"How To Suck A Penis" to newsgroups accessible by children. (He did
|
|
not write it, just distributed it.)
|
|
|
|
"If Mr. Lloyd is so concerned about children being allowed on this
|
|
network, why was he contributing his own obscene material?" asks
|
|
Ken Weaverling (weave@dtcc.edu), manager of computer services at
|
|
Stanton/Wilmington Campuses of Delaware Technical & Community
|
|
College -- the site that has Whealton as a user.
|
|
|
|
For a fuller archive of Lloyd's public Usenet posts, use anonymous
|
|
FTP to hopi.dtcc.edu in directory ~ftp/interlog.
|
|
|
|
To experienced netters, these quotes from Lloyd's net.writings
|
|
aren't that shocking and are dismissed as immature attempts to
|
|
shock. They are really just his way of "turning up the heat" in this
|
|
medium.
|
|
|
|
But they become important to prove Lloyd's motives when he lays a
|
|
complaint with the chief of police.
|
|
|
|
HARROP IN ACTION
|
|
|
|
Other netters had long been complaining about Lloyd to sysadmin
|
|
Harrop. After the rape threat, Harrop asked Lloyd to tone it down.
|
|
|
|
"I informed him his account would be terminated if he kept it up,"
|
|
Harrop said. "At this point, he attempted to blackmail me. He said
|
|
he'd go to the police with obscenity charges against Interlog if he
|
|
was removed."
|
|
|
|
Reading that, Harrop said enough was enough and wrote Lloyd email
|
|
that his account was history.
|
|
|
|
Lloyd was permitted a farewell letter, which Harrop would use as
|
|
proof Lloyd had read the termination notice. It begins: "Matt, I'll let
|
|
you know that you've pissed me off. You've wasted a lot of your time
|
|
and energy on nothing. I encouraged a lot of people to use your
|
|
system. Now, they will not. I am very sorry, Matt, it sounds like you
|
|
are going to lose a lot more than just me as a user. You are also
|
|
going to lose Apple as a customer."
|
|
|
|
(When eye called Apple, a spokesperson emphatically denied that
|
|
Lloyd is an actual Apple employee. He is a subcontracted phone-tech
|
|
support staffer -- he answers questions from Mac users who forget
|
|
where the "on" switch is.)
|
|
|
|
Lloyd again made the police threat: "I might mention that I am
|
|
thinking of going to the police anyway. You are carrying highly
|
|
illegal material on your system. Pornographic and obscene material.
|
|
You are directly responsible for this."
|
|
|
|
The next day (Sept. 13), Lloyd faxed media a release entitled "Metro
|
|
Police To Investigate Obscenity Charges Against Toronto Internet
|
|
Service Provider" -- before the police had even read the complaint.
|
|
|
|
Lloyd told eye it's strictly coincidence his complaint came the day
|
|
after he was kicked off Interlog. Most netters don't buy Lloyd's story
|
|
for a second. But they worry that unless press and/or police get
|
|
savvy to how the Internet works, anyone with a grudge will be able
|
|
to do what Lloyd did.
|
|
|
|
Meanwhile, the real victim in all this is business owner Matt Harrop
|
|
and Interlog, portrayed by a gullible mainstream media outlet as
|
|
purveyors of porn to children.
|
|
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
Press Release
|
|
|
|
For More Information, Call:
|
|
|
|
Bruce Lloyd
|
|
Telephone: (416) 297-1742
|
|
|
|
METRO POLICE TO INVESTIGATE OBSCENITY CHARGES AGAINST
|
|
TORONTO INTERNET SERVICE PROVIDER
|
|
|
|
Metropolitan Toronto Police have been asked to investigate obscenity
|
|
charges against INTERLOG INTERNET SERVICES, and Internet service
|
|
provider operating from 1235 Bay Street, Suite 400, Toronto. (A copy of
|
|
the complaint to Metro Police is attached).
|
|
|
|
The complain stems from my discovery of obscene materials on the
|
|
computer system of Interlog. The materials include: sexually graphic
|
|
texts, pictures involving bestiality, and other pictures showing both
|
|
women and men in degrading and obscene activity. Such material would
|
|
clearly be in contravention of Canadian law.
|
|
|
|
The obscene material in question is distributed via the Internet: A
|
|
world-wide computer network, often referred to as "The Information
|
|
Superhighway". The material is received by Interlog, from computer
|
|
users around the world, and held on a hard disk drive at the Bay Street
|
|
address.
|
|
|
|
Anyone willing to pay Interlog9s membership fee of $22.50/month can
|
|
access the information. Of particular concern is the fact that
|
|
children have full access to this information -- As Interlog requires
|
|
no proof of age or identification when registering.
|
|
|
|
This will be an interesting case in law: The decision of Metro
|
|
Police and the Crown Attorney to pursue or not to pursue charges in
|
|
this matter, will have repercussions for Ontarian's with regard to what
|
|
information they will be able to access, in the future, on the
|
|
Information Superhighway. Further, the actions of the authorities in
|
|
this matter may help establish the status of Internet Service Providers
|
|
as "common carriers" (like Canada Post or Bell Canada), or not.
|
|
|
|
* * * * *
|
|
|
|
September 13, 1994
|
|
|
|
FAX
|
|
|
|
Chief William McCormack
|
|
Metropolitan Toronto Police
|
|
40 College Street
|
|
Toronto, ON
|
|
|
|
Dear Chief McCormack:
|
|
|
|
Please accept this correspondence as my official request for you to
|
|
commence an investigation into the operations and practices of Interlog
|
|
Internet Services (Interlog). Interlog is an Internet service
|
|
provider, operated from 1235 Bay Street, Suite 400, Toronto, (416)
|
|
975.2655 (voice), (416) 532.5015 (fax), (416) 515.1414 (data) my Mr.
|
|
Matt Harrop.
|
|
|
|
As you may be aware, the Internet is a world-wide computer network. At
|
|
present, approximately 20 million people have some form of access to
|
|
the Internet; and approximately 300,000 information databases are
|
|
available to users. Part of the Internet consists of Usenet. Usenet
|
|
is a forum of "newsgroups", which provide for the exchange of
|
|
information on a variety of topic specific areas. Of particular
|
|
concern to me, in relation to this complain, are the
|
|
"alt.binaries.pictures" hierarchy of newsgroups. One of these
|
|
newsgroups is "alt.pictures.binaries.tasteless". In this newsgroups, I
|
|
have found pictures which I consider to be pornographic and obscene,
|
|
and in contravention of Canadian Law.
|
|
|
|
Interlog Internet Services provides access to these newsgroups to
|
|
anyone who is willing to pay their fee of $22.50/month. The procedure
|
|
for obtaining an account with Interlog consists of mailing a cheque
|
|
along with a completed and signed registration form. I have attached
|
|
copy of the registration form, for your information. You will notice
|
|
that it is not necessary to submit identification with this form:
|
|
This, I am further concerned by the fact that children could easily
|
|
register and access the obscene material contained in
|
|
alt.binaries.pictures.tasteless.
|
|
|
|
The information contained in alt.binaries.pictures.tasteless, and other
|
|
newsgroups (including ones dealing with the Homolka publication ban,
|
|
and many sexually explicit groups), is downloaded by Mr. Harrop of
|
|
Interlog. It is then held on his computer system, and accessed by his
|
|
registered users.
|
|
|
|
Chief McCormack, at this time I ask that you undertake to investigate
|
|
the information which is contained on the computer systems of Interlog
|
|
Internet Services. Further I would expect that you would seek judicial
|
|
authorization to seize any equipment found to contain obscene
|
|
materials, and shut the service down. Lastly, I would ask that you
|
|
pursue criminal charges in this matter, should your investigations
|
|
determine that in fact Mr. Harrop is storing and transmitting obscene
|
|
materials.
|
|
|
|
Thank you for your time and attention to this matter. I will look
|
|
forward to speaking with your investigators at the earliest
|
|
opportunity, in order to provide any further information that may be
|
|
required.
|
|
|
|
Sincerely,
|
|
|
|
Bruce M. Lloyd
|
|
30 Thunder Grove, Suite 1612,
|
|
Agincourt, Ontario, M1V 4A3
|
|
(416) 297-1742
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 22 Sep 1994 15:15: 06 EDT
|
|
From: steven.horn@f1.n3409.z1.fidonet.org
|
|
Subject: File 5--Canadian BBS Sysops Plead Guilty to "Piracy"
|
|
|
|
* Copied (from: CAN_SYSLAW) by Steven Horn using timEd 1.01.g2+.
|
|
|
|
Hello All!
|
|
|
|
The following story appeared in Wednesday's The Globe and Mail Report on
|
|
Business (Sept. 21, 1994, National edition, p. 5):
|
|
|
|
"Two bulletin board operators in Montreal and Toronto recently
|
|
pleaded guilty to the illegal distribution of software and were fined
|
|
a total of $22,500.
|
|
|
|
'This sends an important message that software piracy in Canada
|
|
will not be tolerated -- at any level,' said Frank Clegg, president
|
|
of the Canadian Alliance Against Software Theft, which announced the
|
|
convictions yesterday.
|
|
|
|
In August, the RCMP raided a Montreal bulletin board system (BBS)
|
|
known as 90 North, revealing the distribution of unlicenced software
|
|
by Lotus, Microsoft, Novell and Novell/WordPerfect Applications
|
|
Group. Its operator, Michael Solomon, was fined $20,000.
|
|
|
|
In September, Sergio Arana, operator of Toronto-based Legion of
|
|
Death, was fined $2,500 after investigators infiltrated his BBS and
|
|
downloaded sufficient software to confirm illegal activity."
|
|
|
|
There's nothing I can add.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 22 Sep 94 14:25 CDT
|
|
From: rejones@MHGJRS.MHG.COM
|
|
Subject: File 6--PHRACK hardcopies available from SotMESC / GCMS
|
|
|
|
Press Release
|
|
|
|
The SotMESC is presenting three volumes of the collected
|
|
works from Phrack in a bounded treasury. These collectors
|
|
items can be obtained from the non-profit SotMESC organization.
|
|
Phrack 1-42 (c) SotMESC are being offered to the public to
|
|
fund our organization in protecting network liberties, freedom
|
|
and privacy.
|
|
|
|
The Phrack volumes and other assorted fundings we are
|
|
publishing can be found in our current catalog available for
|
|
$1 via Smail at: SotMESC, Box 573, Long Beach, Ms 39560.
|
|
|
|
More information on the SotMESC can be obtained by
|
|
pointed to http://www.phantom.com/~king with Mosaic.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 24 Sep 1994 12:47:15 -0500
|
|
From: "William B. Collins" <bcollins@FALCON.CC.UKANS.EDU>
|
|
Subject: File 7--ACLU Gopher
|
|
|
|
Point your gophers to aclu.org:6601/11/ for access to the ACLU Free
|
|
Reading Room. The following document is from the ACLU Gopher. It is also
|
|
available through the World Wide Web.
|
|
|
|
=======================
|
|
THE ACLU FREE READING ROOM
|
|
|
|
Welcome to the American Civil Liberties Union Free Reading Room,
|
|
a publications, software, and information resource of the
|
|
nation's oldest and largest defender of the principles set forth
|
|
in the Bill of Rights.
|
|
|
|
The ACLU Free Reading Room makes available to users of the
|
|
internet a growing collection of our publications and information
|
|
resources. Currently, the collection includes our basic line
|
|
of publications on issues of high public interest; the current issue
|
|
of our membership newsletter, Civil Liberties; a growing collection of
|
|
recent public policy reports and action guides; Congressional voting
|
|
records for the 103rd Congress; and an archive of news releases from the
|
|
National Office.
|
|
|
|
The collection will grow to include calls to action on legislative
|
|
issues, testimony delivered to Congress, and a collection of ACLU legal
|
|
briefs submitted in important Supreme Court cases.
|
|
|
|
In the future, we plan to develop a variety of electronic
|
|
publications, including an adaptation of our newsletter and other
|
|
special interest mailing lists. Please watch this space for
|
|
further information.
|
|
|
|
ADMINISTRATIVE INFORMATION
|
|
|
|
The ACLU Free Reading Room is a project of the Public Education
|
|
Department of the National Office of the American Civil Liberties
|
|
Union. Programming services are provided by The Pipeline
|
|
Network, an Internet access provider based in New York.
|
|
|
|
The ACLU Free Reading Room contains publications and other
|
|
materials from the ACLU in a gopher and ftp accessible resource,
|
|
and is a read-only site. At this time, we recommend that
|
|
follow-ups and public discussion of the materials at this site
|
|
take place in the USENET news group alt.society.civil-liberties,
|
|
alt.censorship or other newsgroups or bulletin boards where
|
|
appropriate. Comments and questions about this resource may be
|
|
directed to infoaclu@aclu.org.
|
|
|
|
Unless otherwise indicated, documents in this resource may be
|
|
circulated in whole with acknowledgement, and may of course be
|
|
quoted under fair use guidelines. Print reproduction other than
|
|
for personal use should be requested from infoaclu@aclu.org, or
|
|
by mail at this address: American Civil Liberties Union, Department of
|
|
Public Education, 132 West 43rd Street, New York, New York 10036
|
|
|
|
Consulting this resource is not a means of obtaining legal advice
|
|
or representation from the ACLU. For information about seeking
|
|
assistance from the ACLU, consult section 10 of this gopher. At this
|
|
time, we do not have the capacity to forward electronic mail to our state
|
|
offices, who are responsible for reviewing legal complaints
|
|
arising in their areas and offering legal assistance. Therefore,
|
|
requests for legal assistance sent to infoaclu@aclu.org cannot be
|
|
accepted.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 26 Sep 1994 12:17:02 CDT
|
|
From: Vigdor Schreibman - FINS <fins@ACCESS.DIGEX.NET>
|
|
Subject: File 8--Telecommunication Reform Bill (S. 1822) DEAD!
|
|
|
|
FINS SPECIAL REPORT September 23, 1994
|
|
|
|
S. 1822 DEAD!
|
|
Hollings Throws In The Towel
|
|
|
|
Washington, DC, Sept 23, 1994--Sen. Ernest F. Hollings (D-SC), announced
|
|
today that "we will be unable to pass comprehensive telecommunications
|
|
reform legislation this Congress." Hollings noted that "only one sector
|
|
of the industry continues to oppose the bill . . . the telephone
|
|
companies, and especially, the RBOCs." Moreover, Hollings listed a
|
|
serious of reasons that would make passage of the bill "impossible this
|
|
Congress." This included (among others reasons), the fact that "the
|
|
RBOCs have violated the terms of the agreement they have reached with
|
|
me and the other members of the committee on long distance" as well as
|
|
an ultimatum delivered by Sen. Dole. Dole informed the Committee
|
|
yesterday that a serious of revisions of the bill, were required,
|
|
which were "non-negotiable." The provisions would have "substantially
|
|
deregulated the industry" according to Hollings.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 13 Aug 1994 22:51:01 CDT
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: File 9--Cu Digest Header Information (unchanged since 10 Sept 1994)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.85
|
|
************************************
|
|
|