786 lines
35 KiB
Plaintext
786 lines
35 KiB
Plaintext
|
|
Computer underground Digest Sun Sep 28, 1997 Volume 9 : Issue 71
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.71 (Sun, Sep 28, 1997)
|
|
|
|
File 1--The Silicon Bomb (fwd)
|
|
File 2--Freelancers Lose Copyright Claim for Works Put On E-databases
|
|
File 3--SAFE crypto bill cracked again (fwd)
|
|
File 4--Markup - HR 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE)
|
|
File 5--A few URLS addressing anti-spam legislation
|
|
File 6--Texas Judge Enjoins "Spamming"
|
|
File 7--'wanna Fight Big Brother? Politcal Action Kit available
|
|
File 8--Anti-Terrorist Squad Orders Political Censorship Of The
|
|
File 9--cDc GDU #22 (cult of the Dead cow fwd)
|
|
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 25 Sep 1997 14:21:08 -0400
|
|
From: "George Smith [CRYPTN]" <70743.1711@compuserve.com>
|
|
Subject: File 1--The Silicon Bomb (fwd)
|
|
|
|
The Netly News
|
|
http://www.netlynews.com
|
|
|
|
Today's News
|
|
|
|
The Silicon Bomb
|
|
by George Smith September 25, 1997
|
|
|
|
Which would you rather have export controls on, technology used
|
|
for encryption or technology used in the development of nuclear
|
|
weaponry? The answer is obvious to most people. Everyone, that is, but
|
|
the U.S. government.
|
|
|
|
Here's the conundrum: The mandarins of law enforcement say that
|
|
encryption must be controlled, because homegrown terrorists and thugs
|
|
can use it to make their communications and records invulnerable. But
|
|
machines employed in the engineering of modern thermonuclear bombs can
|
|
be sold to Russian scientists in the former Soviet Union's most famous
|
|
nuclear weapons shop.
|
|
|
|
It's true, and the story goes like this.
|
|
|
|
More than a year ago, Gary Milhollin, the director of the
|
|
Wisconsin Project on Nuclear Arms Control in Washington, D.C.,
|
|
discovered that Silicon Graphics had sold four supercomputers to
|
|
Russian scientists at the nuclear weapons lab known as Chelyabinsk-70.
|
|
Nothing happened for a couple of months until Milhollin issued a
|
|
widely published editorial in late February of this year.
|
|
|
|
In it, Milhollin wrote, "[the Russians] got the computers just in
|
|
time to continue the arms race. Russia's minister of atomic energy,
|
|
Viktor Mikhailov, told the press recently that Moscow... will now
|
|
design its warheads with simulated explosions, using the computers
|
|
from Silicon Graphics."
|
|
|
|
Around the same time the Department of Commerce, along with the
|
|
Department of Justice, began a criminal investigation of the case.
|
|
According to export controls, technology capable of being used in the
|
|
manufacture of nuclear weapons is not to be sold to nuclear weapons
|
|
labs in Russia, Pakistan and China. That part of the equation is a
|
|
no-brainer.
|
|
|
|
However, Milhollin wrote that Silicon Graphic's CEO, Edward
|
|
McCracken, told him the company didn't know what Chelyabinsk did. John
|
|
Thompson, head of corporate communications at the Mountain View
|
|
company, said in interview that officials at Chelyabinsk-70 said they
|
|
wanted the computers for "environmental research."
|
|
|
|
"That's their story," said Milhollin in an interview. "It's like
|
|
someone saying they don't know what Los Alamos does."
|
|
|
|
You see, control of the transfer of technology useful in the
|
|
of nuclear weapons has become infinitely more complicated since
|
|
the height of the Cold War. In the case of computers, as they've
|
|
advanced rapidly in processing power, the industry has lobbied
|
|
aggressively for revision of export controls, saying that such
|
|
controls do little except hurt American business. The argument is that
|
|
since processing power is always increasing, sooner or later clients
|
|
like the Russians will be able to buy it from anyone, so controls do
|
|
little good.
|
|
|
|
"...The quantum advancement of technology and its widespread
|
|
foreign availability have made export controls on desk-top and
|
|
desk-side computer systems obsolete and ineffective," said one
|
|
industry press release on the matter in 1995. "[Relaxing export
|
|
controls] frees up sales of a wide variety of computers without
|
|
shackling... customers with onerous security conditions...."
|
|
|
|
This is similar to the arguments fielded by concerned Netizens
|
|
against control of encryption, with one small exception: The first U.S
|
|
hydrogen bomb blew a crater one mile wide in the Pacific atoll of
|
|
Eniwetok.
|
|
|
|
The four machines, for which Silicon Graphics was paid
|
|
$200,000, aren't really supercomputers, argued Thompson. At Silicon
|
|
Graphics, he said, they're thought of as "desktop servers," capable of
|
|
2.9 billion operations per second -- 150 times less powerful than
|
|
supercomputers made by Cray Research. Conversely, a 486 PC -- what
|
|
this article is being written on -- is capable of approximately 12.5
|
|
million operations per second. Compared to it, the SGI machines in
|
|
question are, relatively speaking, Crays.
|
|
|
|
But this argument falls on deaf ears today. Because, in response
|
|
to pressure from the computer industry, the Clinton administration
|
|
abolished the Coordinating Committee for Multilateral Export Controls
|
|
in 1994. This informal forum associated with NATO helped coordinate
|
|
policy and review potential exports to the former Soviet Union and
|
|
other proscribed destinations. And in 1995 the administration issued a
|
|
new, more relaxed set of controls on computing power.
|
|
|
|
The new controls divided world nations into four categories, of
|
|
which only two are interesting: Category D -- which includes Iraq,
|
|
Iran and North Korea, nations that are completely embargoed; and
|
|
Category C -- the next lowest tier, which includes Russia. In tier C
|
|
no government review is required for sale of computers capable of
|
|
between two and seven billion operations per second to civilians. An
|
|
export license -- a review -- is required for potential sales to
|
|
military sites. The SGI computers are rated at 2.9 billion operations
|
|
per second.
|
|
|
|
Thus, since Silicon Graphics insisted it was unaware of
|
|
Chelyabinsk-70's true nature, there was no need to review the sale.
|
|
Note that the processing power threshold for government review prior
|
|
the Clinton administration's revision was 1.5 billion operations
|
|
per second, which would have probably nixed the SGI sale.
|
|
|
|
Of course, Thompson claims that although Silicon Graphics is
|
|
cooperating fully with the criminal investigation, there is still some
|
|
question about whether or not the company's machines were capable of
|
|
being used in the testing and design of thermonuclear weapons.
|
|
|
|
Perhaps, but it's an argument that ignores history. Theoretical
|
|
physicists working on the hydrogen bomb in 1949 yearned for computing
|
|
power greater than the ENIAC, a machine horribly antiquated by today's
|
|
standards. The scientists had difficulty making any progress since the
|
|
main obstacle standing in the way of the hydrogen bomb's development
|
|
was an elaborate calculation dealing with the thermonuclear reaction.
|
|
Without the calculation, the scientists thought testing would be
|
|
extremely difficult because no one would be able to determine if a
|
|
bomb failed because the thermonuclear reaction wasn't feasible or
|
|
because a simple mechanical malfunction had occurred.
|
|
|
|
Because of the SGI case, two congressmen -- Rep. Floyd Spence
|
|
(R-S.C.) and Rep. Ron Dellums (D-Calif.) recently compiled a report
|
|
asking for yet another revision in supercomputer export controls.
|
|
|
|
George Smith is the author of the book "The Virus Creation Labs."
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 2 Sep 1997 15:51:59 GMT
|
|
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
|
|
Subject: File 2--Freelancers Lose Copyright Claim for Works Put On E-databases
|
|
|
|
Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997
|
|
|
|
Publishers may put their periodicals on electronic databases without the
|
|
permission of freelance writers who provide work for their print
|
|
publications, according to a recent decision by the Southern District of
|
|
New York. The case was brought by six freelance writers who claimed
|
|
copyright violations because their articles had been sold by newspapers or
|
|
magazines after publication and uploaded onto CD-ROMs or electronic databases.
|
|
|
|
The writers claimed that there was no written agreement spelling out their
|
|
rights for articles that they had written for print versions of the
|
|
publications including the New York Times, Sports Illustrated and Newsday,
|
|
thereby giving the publishers a windfall when they resold or made the works
|
|
available to on-line publications.
|
|
|
|
The court stated that there is no real precedent governing electronic
|
|
technologies and the application of Section 201(c) of the Copyright Act of
|
|
1976, which permits reproduction of ''collective works,'' and held that
|
|
putting the stories on-line was not an inappropriate exploitation of the
|
|
freelancers' works.
|
|
|
|
While the court recognized that the ruling "deprives plaintiffs of certain
|
|
benefits associated with their creations,'' it called on Congress to revise
|
|
copyright laws to provide a more equitable result.
|
|
|
|
Full text of the decision is available at the New York Law Journal Extra
|
|
site at <http://www.ljx.com/copyright/tasini.html/>
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 22 Sep 1997 07:59:46 -0500 (CDT)
|
|
From: Charles Stanford <cstanfor@MAIL.COIN.MISSOURI.EDU>
|
|
Subject: File 3--SAFE crypto bill cracked again (fwd)
|
|
|
|
SAFE crypto bill cracked again
|
|
By Alex Lash and Dan Goodin
|
|
September 12, 1997, 8:40 a.m. PT
|
|
|
|
For the second time in a week, a House committee has made significant
|
|
changes to the Security and Freedom through Encryption (SAFE) Act to
|
|
mandate that domestic encryption products give law enforcement agencies
|
|
access to users' messages.
|
|
|
|
The changes by the Intelligence Committee, which were passed as a
|
|
"substitute" to SAFE, turn the legislation on its head. The amendment
|
|
follows similar changes two days ago in the House National Security
|
|
Committee.
|
|
|
|
Initially drafted as a way to loosen U.S. export controls on encryption,
|
|
legislators have instead "marked up" the bill, or amended it at the
|
|
committee level, to reflect the wishes of the Federal Bureau of
|
|
Investigation and other law enforcement agencies that want "wiretap"
|
|
access to all encrypted email and other digital files.
|
|
|
|
Both the Intelligence and the National Security committees tend to favor
|
|
export controls, because they view encryption as a threat to
|
|
information-gathering activities by U.S. military and law enforcement
|
|
officials.
|
|
|
|
The Intelligence Committee cited those concerns today when announcing
|
|
the substitute legislation. "Terrorist groups...drug cartels...and those
|
|
who proliferate in deadly chemical and biological weapons are all
|
|
formidable opponents of peace and security in the global society," said
|
|
committee chairman Porter Goss (R-Florida) in a statement. "These bad
|
|
actors must know that the U.S. law enforcement and national security
|
|
agencies, working under proper oversight, will have the tools to
|
|
frustrate illegal and deadly activity and bring international criminals
|
|
to justice."
|
|
|
|
Opponents of government attempts to regulate encryption, including a
|
|
leading panel of cryptographers, have argued that built-in access to
|
|
encrypted files would in fact threaten national and individual security
|
|
and be prohibitively expensive to implement.
|
|
|
|
The amended legislation calls for all imported or U.S.-made encryption
|
|
products that are manufactured or distributed after January 31, 2000, to
|
|
provide "immediate access" to the decrypted text if the law officials
|
|
present a court order. "Law enforcement will specifically be required to
|
|
obtain a separate court order to have the data, including
|
|
communications, decrypted."
|
|
|
|
A markup of the same bill in the House Commerce Committee was postponed
|
|
today for two weeks. It will be the fifth such committee vote on the
|
|
bill since its introduction.
|
|
|
|
The Intelligence and National Security amendments this week are by no
|
|
means a defeat of the bill. Instead, they would have to be reconciled
|
|
with versions of the bill already approved by the House Judiciary and
|
|
International Relations committees. That reconciliation most likely
|
|
would have to happen on the House floor. The rapidly fragmenting bill
|
|
still has several layers of procedure to wend through before it reaches
|
|
a potential floor vote, but people on both sides of the encryption
|
|
debate openly question if the bill--in any form--will make it that far
|
|
this year.
|
|
|
|
The legislation has 252 cosponsors, more than half of the House
|
|
membership.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 26 Sep 1997 17:05:57 -0500
|
|
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
|
|
Subject: File 4--Markup - HR 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE)
|
|
|
|
Source - http://www.house.gov/commerce/full/092497/markup.htm
|
|
|
|
Full Committee Markup
|
|
September 24, 1997
|
|
2123 Rayburn House Office Building
|
|
|
|
PDF Versions of Committee Print and Amendments will be available by
|
|
11:00 AM EDT [IMAGE] Some of the the documents below have been created
|
|
using Adobe Acrobat. To view these documents, you will need the Adobe
|
|
PDF Viewer
|
|
|
|
H.R. 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT, was
|
|
ordered reported, amended, by a roll call vote of 44 yeas to 6 nays
|
|
(Roll Call Vote #42).
|
|
|
|
A unanimous consent request by Mr. Bliley to discharge the
|
|
Subcommittee on Telecommunications, Trade, and Consumer Protection
|
|
from further consideration and proceed to the immediate consideration
|
|
of H.R. 695, as reported to the House by the Committee on the
|
|
Judiciary, was agreed to without objection.
|
|
|
|
The following amendments were offered.
|
|
|
|
An Amendment in the Nature of a Substitute by Mr. Tauzin, #1, was
|
|
AGREED TO, amended, by a voice vote. (A unanimous consent request by
|
|
Mr. Tauzin to have the Amendment in the Nature of a Substitute
|
|
considered as base text for purposes of amendment was agreed to
|
|
without objection.)
|
|
|
|
An amendment to the Tauzin Amendment in the Nature of a Substitute
|
|
by Mr. Markey, #1A, was AGREED TO by a roll call vote of 40 yeas to
|
|
11 nays (Roll Call Vote #41).
|
|
|
|
An amendment by Mr. Oxley to the Markey Amendment to the Tauzin
|
|
Amendment in the Nature of a Substitute, #1A(1), was NOT AGREED TO
|
|
by a roll call vote of 16 yeas to 35 nays (Roll Call Vote #40).
|
|
|
|
An amendment to the Tauzin Amendment in the Nature of a Substitute
|
|
by Mr. Tauzin, #1B, was AGREED TO by a voice vote.
|
|
|
|
THE COMMITTEE ADJOURNED SUBJECT TO THE CALL OF THE CHAIR
|
|
|
|
|
|
U.S. House Seal The Committee on Commerce
|
|
2125 Rayburn House Office Building
|
|
Washington, DC 20515
|
|
(202) 225-2927
|
|
Commerce@mail.house.gov
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 22 Sep 1997 09:13:20 -0700
|
|
From: Simeon.Nevel@Schwab.COM
|
|
Subject: File 5--A few URLS addressing anti-spam legislation
|
|
|
|
I have just finished reading CU-Digest #9.70. I thought I would pass
|
|
along to you (and the other CUD readers if you think it appropriate)
|
|
a pointer to a *very* interesting legal research paper (by Michael W.
|
|
Carroll of the Georgetown University Law Center) regarding the
|
|
regulation
|
|
of UCE.
|
|
|
|
Check out http://server.Berkeley.EDU/BTLJ/articles/11-2/carroll.html
|
|
|
|
It describes the legal theories behind the regulation of other sorts
|
|
of unsolicited commercial communications (junk fax, telephone
|
|
solicitation, door-to-door sales and junk mail) and examines their
|
|
applicability to regulation of junk e-mail.
|
|
|
|
I haven't the legal backgroud to attest to the *quality* of that
|
|
analysis, but it does make for interesting reading.
|
|
|
|
==========================
|
|
|
|
Another very interesting net.resource on legal issues on the
|
|
cyber frontier is http://www.ssrn.com/CyberLaw/lawpaper.html
|
|
|
|
This is where the link to Carroll's paper originated.
|
|
|
|
There are papers dealing with all sort of issues including
|
|
free speech issues, intellectual property, privacy and cryptography.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 22 Sep 1997 22:07:42 -0500
|
|
From: Jon Lebkowsky <jonl@onr.com>
|
|
Subject: File 6--Texas Judge Enjoins "Spamming"
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
**************************************************
|
|
FOR IMMEDIATE RELEASE
|
|
|
|
|
|
TEXAS JUDGE ENJOINS "SPAMMING" OF INTERNET
|
|
BY CALIFORNIA STUDENT AND COMPANY
|
|
|
|
Austin, Texas, September 22, 1997: A Texas Court has entered a temporary
|
|
injunction against a California college student and his company,
|
|
prohibiting further "spamming" of the Internet without consent. Several
|
|
Internet leaders in Austin filed the lawsuit earlier this year, claiming
|
|
that Craig Nowak and his company, C.N. Enterprises, had illegally used the
|
|
return address of an Austin business when he sent out a mass commercial
|
|
solicitation by Internet electronic mail.
|
|
|
|
The lawsuit was filed by Tracy LaQuey Parker, a leading Internet author,
|
|
who owned the rights to the domain named "flowers.com" which Nowak and
|
|
his company used without her permission. Mr. Nowak's unsolicited mass
|
|
mailing, known as a "spam," offered for sale information on "Free Cash Gran=
|
|
ts"
|
|
for $19.95. Mr. Nowak's "spam" used Ms. Parker's domain name in the
|
|
electronic
|
|
return address, which allowed Mr. Nowak to avoid receiving thousands of
|
|
return-to-sender messages and the inevitable hate mail from recipients who
|
|
despise the controversial practice of "spamming." Ms. Parker received
|
|
thousands of such return messages, preventing her from accessing her
|
|
Internet account for hours and temporarily shutting down her Internet
|
|
service provider's mail servers. In essence, the lawsuit claims, Mr. Nowak
|
|
used Ms. Parker's mailbox as his personal trash bin.
|
|
|
|
Spamming is being criticized at all levels of the industry. Upon hearing
|
|
of the lawsuit, Vint Cerf, Senior Vice President for MCI
|
|
Telecommunications, also known as "the father of the Internet," said,
|
|
"Spamming is the scourge of electronic mail and newsgroups on the Internet.
|
|
It can seriously interfere with the operation of public services, to say
|
|
nothing of the effect it may have on any individual=EDs mail system.
|
|
Spammers are, in effect, taking resources away from users and service
|
|
suppliers without compensation and without authorization. MCI was the
|
|
first in the industry to publicly announce its policy against spamming and
|
|
will be watching the decision in this case with great interest."
|
|
|
|
The court order, entered last Wednesday, September 17, by Travis County
|
|
District Judge Scott McCown, prohibits Nowak, his company, and those
|
|
"acting in concert" with him, from using Ms. Parker's domain name in any
|
|
electronic mailings, or from using any Internet domain name as a return
|
|
address without the owner's permission. Judge McCown also ordered Mr.
|
|
Nowak to respond to discovery requests served upon him and set the case for
|
|
trial on November 10, 1997.
|
|
|
|
Joining Ms. Parker in the lawsuit are her business partners, Peter Rauch,
|
|
and her husband, Patrick Parker, who also used the domain name. Also suing
|
|
Nowak is Ms. Parker's Internet service provider at the time, Zilker
|
|
Internet Park, which had to deal with the consequences of the flood of
|
|
returned junk mail messages. They are joined by two Internet interest
|
|
groups, the Texas Internet Service Providers' Association and EFF-Austin.
|
|
Both groups fear the damage done to the Internet by mass mailings of the
|
|
sort at issue in this lawsuit.
|
|
|
|
Ms. Parker said she was pleased with the court's ruling. "Judge McCown
|
|
seemed to quickly understand the harm that this type of irresponsible use
|
|
of the Internet can cause people like me and small businesses like Zilker,"
|
|
she said. "We hope that this ruling sends a message not only to the
|
|
defendants, but to everyone who is abusing the Internet in this way." Pete
|
|
Kennedy, the lawyer who is representing Ms. Parker and the others,
|
|
commented that, "While Internet service providers are trying to combat
|
|
"spam" with technical means, there is also a need to set a clear legal
|
|
precedent that people do not have the right to send Internet junk mail and
|
|
use other people's e-mail accounts as their personal junkyard."
|
|
|
|
# # #
|
|
For more information, contact:
|
|
|
|
Plaintiffs:
|
|
Tracy LaQuey Parker and Patrick Parker (512) 454-7748
|
|
Smoot Carl-Mitchell and John Quarterman, Zilker Internet Park (512) 451-76=
|
|
20
|
|
Gene Crick, Texas Internet Service Providers Association (TISPA)
|
|
(512) 303-1021
|
|
Jon Lebkowsky, EFF-Austin
|
|
(512) 477-5566 x. 171 (day), (512) 444-5175 (eve)
|
|
|
|
Lawyers:
|
|
Peter D. Kennedy or Roger Williams
|
|
George, Donaldson & Ford, LLP (512) 495-1400
|
|
|
|
Media Contact:
|
|
Peggy Hubble or Sondra Runnells
|
|
MEM/Hubble Communications (512) 480-8961
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 23 Sep 1997 17:01:27 -0400
|
|
From: David HM Spector <spector@zeitgeist.com>
|
|
Subject: File 7--'wanna Fight Big Brother? Politcal Action Kit available
|
|
|
|
...not having much in the way of sleep since reading Louis Freeh's
|
|
testimony and his plans to assault the US Constitution I decided to do
|
|
something about it, and try to develop something that would help
|
|
others get involved too...
|
|
|
|
I would like to announce the availability of a Personal Political
|
|
Action Kit (PersPAK). It contains full databases of members of the
|
|
House and the Senate and may be used for mail merging, faxing, email
|
|
campaigns, as well as plain old phone calls. The data were culled
|
|
from the House and Senate directories that are on the Web, and are
|
|
current as of September 3, 1997.
|
|
|
|
The datasets are provided in two formats, tab-delimited and as an
|
|
Excel spreadsheet. Two sample letters are included that show how to
|
|
use the mail-merge features of Office95/97, along with a README file
|
|
that will step users through the basics of using this kit and offers
|
|
some hints on what to say -- and sometimes more importantly NOT to say
|
|
-- in a letter to their congress-folk.
|
|
|
|
The kit can be accessed at: http://www.zeitgeist.com/crypto
|
|
|
|
I plan on updating this toolkit with more features soon with some more
|
|
tools, and the ability to send mail/faxes to entire committees (as
|
|
opposed to picking congress persons/senators by individually), some
|
|
Java Applets to auto-generate letters, etc.
|
|
|
|
I'm making it available under the GNU Public License, so feel free to
|
|
use this kit as a base for other tools.
|
|
|
|
Constructive criticism/ideas may be sent to perspak@zeitgeist.com
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 19 Sep 1997 07:23:34 -0400
|
|
From: Paul Kneisel <tallpaul@nyct.net>
|
|
Subject: File 8--Anti-Terrorist Squad Orders Political Censorship Of The
|
|
|
|
The following press release was issued this morning by the
|
|
Campaign for Internet Freedom
|
|
|
|
Press release: immediate 18 September 1997
|
|
|
|
Anti-Terrorist Squad Orders Political Censorship Of The Internet
|
|
|
|
In the first move of its kind in the UK, Scotland Yard's
|
|
Anti-Terrorist Squad yesterday shut down Internet Freedom's UK web
|
|
site. Claiming to be acting against terrorism, the Squad demanded
|
|
that Easynet PLC, Internet Freedom's UK Internet Service Provider,
|
|
remove the entire content of the site from the web.
|
|
|
|
Internet Freedom is one of the foremost anti-censorship campaigns
|
|
in the UK. The web site featured the latest Net censorship news,
|
|
links to other anti-censorship campaigns, carefully researched
|
|
articles about censorship and a regular controversy feature. The
|
|
section of the site that was alleged to contain 'terrorist
|
|
material' related to a feature on the Euskal Herria Journal - a
|
|
New York based political publication. The online magazine supports
|
|
Basque independence and contains maps of the region, cartoons and
|
|
an online petition to the Spanish government.
|
|
|
|
The Journal had been originally suspended by its US Internet
|
|
Service Provider following an extended email campaign which
|
|
brought the host server to a standstill. In opposition to its
|
|
censorship, Internet Freedom, along with a number of other
|
|
organisations and individuals, hosted a copy of the suspended site
|
|
or 'mirror site', together with a bulletin board for Net users to
|
|
express their views.
|
|
|
|
As a consequence of the Squad's actions, Internet Freedom has been
|
|
forced to move its news operations to its US site at
|
|
<http://www.netfreedom.org> where anybody with access to the web
|
|
may examine the site and judge the content for themselves.
|
|
|
|
Chris Ellison, co-founder of CIF said:
|
|
|
|
Those who argue in favour of censorship on the Net claim that it
|
|
is to prevent the spread of pornography or paedophilia.
|
|
Yesterday's act of blatant political censorship shows the
|
|
consequences of accepting the need for regulations and controls.
|
|
Whatever one might think about the Euskal Herria Journal and its
|
|
entirely ordinary content, it is important that they be allowed
|
|
put their views across.
|
|
|
|
We are calling on the whole of the Net community to support us by
|
|
mirroring Internet Freedom's site. Internet Freedom has always
|
|
prided itself on exposing acts of censorship that have been
|
|
dressed in some other garb. Now we have been met with the most
|
|
blatant act of political censorship imaginable: the shutting down
|
|
of our site. If there was ever a time for Net users to defend free
|
|
speech, that time is now.
|
|
|
|
For further comment call Chris Ellison on 0956 129 518
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 27 Sep 1997 00:19:16 -0700 (PDT)
|
|
From: editor@cultdeadcow.com
|
|
Subject: File 9--cDc GDU #22 (cult of the Dead cow fwd)
|
|
|
|
|
|
_ _
|
|
((___))
|
|
[ x x ] cDc communications
|
|
\ / Global Domination Update #22
|
|
(' ') September 1st, 1997
|
|
(U)
|
|
Est. 1984
|
|
FOR IMMEDIATE RELEASE
|
|
FOR MORE INFORMATION, CONTACT: sratte@cultdeadcow.com
|
|
|
|
DEEP-FRIED ATTITUDE FOR A WORLD STARVED FOR SUPERHEROES
|
|
|
|
CULT OF THE DEAD COW (cDc) regrets the delay in releasing our glorious Global
|
|
Domination Update. What with George Clooney hopping onto Princess Diana's
|
|
coffin to settle old scores with the tabloids, it's been hell trying to get a
|
|
word in edgewise. But we bear our burdens and move on. And so it is -- after
|
|
much grieving and maudlin songs -- that the CULT OF THE DEAD COW releases two
|
|
file packs of five files each, anoints one new member and expands on our
|
|
work with the Hong Kong Blondes.
|
|
|
|
As our young people skip off to school, lunch pails bursting with wholesome
|
|
treats and whistling their favorite video bits, we at the CULT OF THE DEAD COW
|
|
DISTANCE LEARNING CENTER have labored long and hard to shine a light in the
|
|
darkness -- sort of like high-beams along the information superhighway.
|
|
Our crack team of learning experts have put together a wack packet of
|
|
mind expanding mayhem in the hope that it will be the one thing that keeps our
|
|
youth from purchasing firearms, or seeking employment in Redmond.
|
|
|
|
We take special pride in announcing a new member to our ranks who goes by the
|
|
name, SirDystic. He is rumored to be the child of Seymour Cray and an unknown
|
|
showgirl. We found him living in a dumpster with a Palm Pilot, a case of
|
|
Astroglide and his latest text file. Remember the Internet worm? Imagine the
|
|
same thing, only _bigger_. An automated, systemic infection of the Internet --
|
|
all made possible because of the success of Bill Gates' dream of a computer in
|
|
every home, running Windows. With a little work and SirDystic's file, this is
|
|
just one possibility.
|
|
|
|
It was a long hot summer for the HERD. The heat off the flashpacks and klieg
|
|
lights at DefCon and H.O.P.E. were trying, but they come with the territory.
|
|
Grandmaster Ratte's breakthrough performance at DefCon was the talk of Las
|
|
Vegas, as was Microsoft's idle promise to give cDc Hacker Laureate Mudge the
|
|
keys to the kingdom. Kaiser Wilhelm's star braun-nosers, Karan Khanna (head of
|
|
NT Marketing) and Paul Leech (one of the main developers and author of the
|
|
CIFS specification) promised Mudge a subscription to DevNet for a year and a
|
|
link to the L0pht's site from Microsoft's Web page. Waiting - still waiting.
|
|
|
|
And of the many happy memories at H.O.P.E., the CULT OF THE DEAD COW'S
|
|
official announcement of our strategic alliance with the Hong Kong Blondes was
|
|
received to deafening applause. The Hong Kong Blondes are a group of computer
|
|
scientists and human rights activists who have taken the revolution on-line.
|
|
They are active in Hong Kong, Shanghai and Beijing. And you can bet you'll be
|
|
hearing a lot more about the real meaning of payback if the government of
|
|
geriatric kleptocrats don't keep their word on social reform. Check the new
|
|
cDc homepage (www.cultdeadcow.com) for future announcements. And support human
|
|
rights in China -- the cDc does.
|
|
|
|
Oh, one last morsel. The CULT OF THE DEAD COW has been requested by the
|
|
Electronic Frontier Foundation to take over the EFF's ftp archives. The circle
|
|
is now complete. The group that for so long has contributed to the computer
|
|
underground will soon become the official custodian of its content. (Look for
|
|
a full announcement soon.) And you thought we didn't have a plan. Damn, we're
|
|
good.
|
|
|
|
_ _ the tedium is the message _ _
|
|
((___)) INFORMATION IS JUNK MAIL ((___))
|
|
[ x x ] _ [ x x ]
|
|
\ / _ |_|_ _ _|_ _|_ |_ _ _| _ _. _| _ _ \ /
|
|
(' ') (_|_|| |_ (_) | |_ | |(/_ (_|(/_(_|(_| (_(_)\_/\_/ (' ')
|
|
(U) (U)
|
|
.ooM cDc communications .ooM
|
|
deal with it NEW RELEASES FOR SEPTEMBER, 1997: deal with it
|
|
|
|
________________________________/text files\________________________________
|
|
|
|
331:"Angry Sun" by Franken Gibe. It's sundown on satori. If you like
|
|
sand up your ass or you're just plain photophobic, this one's for you.
|
|
|
|
332:"Don't Talk to Cops" by Robert W. Zeuner. Mom says never to talk
|
|
to strangers and Bessie says "Don't talk to the Man". Find out why.
|
|
|
|
333:"BELLK0RE Exposed!" by Oderus Urungus. This d00d smells somethin'
|
|
bad. And with a name like his, y'all know he's onto da shit.
|
|
|
|
334:"Making a Mess at 7-11" by Snarfblat. Bored? Stupid? No girlfriend?
|
|
Practice making a mess so you'll have it all mastered for your first
|
|
basement apartment.
|
|
|
|
335:"Milk and Blood" by Lady Carolin. If the pasture's a-rockin, don't
|
|
come a-knockin'. Notes from a damp commando.
|
|
|
|
***
|
|
|
|
336:"I'd Rather be Dead than Live in California" by Oxblood Ruffin. The
|
|
land of sunshine sucks more than your favorite hustler. Read and learn.
|
|
|
|
337:"Reid Fleming: Lady Killer" by Reid Fleming. What do you do with a chick
|
|
whose twat looks like a three ring binder? Find out from the cDc's own man of
|
|
steel.
|
|
|
|
338:"Who's Gonna Get Screwed Today? NetBIOS Attacks over TCP" by SirDystic.
|
|
Our latest member turns Bill Gates into his personal prison bitch. Bend over,
|
|
big boy. This will only hurt you in the wallet.
|
|
|
|
339:"Political Rant #1" by The Nightstalker. If he needs your opinion he'll
|
|
give it to you. But you have to learn the Macarena all by yourself.
|
|
|
|
340:"Hacking PC/Payroll for Windows" by Tarkin Darklighter. Why buy lotto
|
|
tickets when you can hack all the cash you need? Remember kidZz - this
|
|
file's just for educational purposes.
|
|
|
|
Reading is FUNdamental!
|
|
|
|
_______________________________/ - x X x - \________________________________
|
|
|
|
Thanks to the following items of influence this time around:
|
|
WAREZ: BeOS - the cDc's official operating system - and Dem0nseed ELITE
|
|
MUSIC: The Meters, DJ COLDCUT, Kid Koala (remember - you heard about the
|
|
Kid here first.)
|
|
FOOD: The Quadropounder
|
|
PRINT: Chuck Yeager autobiography, anything by Harold Innis
|
|
BUGS: Any two girlies from Montreal
|
|
|
|
Fools better recognize: CULT OF THE DEAD COW is a publication and trademark
|
|
of cDc communications. Established in 1984, cDc is the largest and oldest
|
|
organization of the telecommunications underground worldwide, and inventor of
|
|
the "e-zine." Every issue is produced on an Apple II for genuine old-school
|
|
flavor. You thirst for our body of work, you know you do. Find it at these
|
|
fine locations, among others:
|
|
|
|
World Wide Web: http://www.cultdeadcow.com
|
|
http://www.L0pht.com/cdc.html
|
|
FTP/Gopher: cascade.net in pub/cDc
|
|
Usenet: alt.fan.cult-dead-cow
|
|
BBS: 806/794-4362 Entry:KILL
|
|
|
|
For further information, contact:
|
|
|
|
Email: sratte@cultdeadcow.com
|
|
Postal: POB 53011, Lubbock, TX, 79453, USA
|
|
|
|
If you have a file to submit, send it to: editor@cultdeadcow.com
|
|
|
|
|
|
Sincerely,
|
|
|
|
Grandmaster Ratte'
|
|
cDc/Editor, Fearless Leader, and Pontiff
|
|
"We're into text philes for the girlies and the money."
|
|
|
|
####
|
|
By Oxblood Ruffin, Reid Fleming, Omega & GRatte'.
|
|
Copyright (c) 1997 cDc communications.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.71
|
|
************************************
|
|
|