Computer underground Digest Sun Sep 29, 1996 Volume 8 : Issue 69
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.69 (Sun, Sep 29, 1996)
File 1--Poulsen Stifled by No-computers Probation Rule
File 2--Microsoft response to David Smith/Web Browser Method
File 3--Netscape CEO Jim Barksdale signs the pro-crypto petition (fwd)
File 4--Banned Books Week 9/28-10/5
File 5--Computer Virus Hysteria/John McAfee Awards: plea for books
File 6--Jean_bernard_Condat PhD Musicologie
File 7--CDT Policy Post 2.32 - FBI Surveillance Demands Rejected on Privacy
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 27 Sep 1996 02:33:26 -0500
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
Subject: File 1--Poulsen Stifled by No-computers Probation Rule
POULSEN STIFLED BY NO-COMPUTERS PROBATION RULE
Published: Sept. 23, 1996
BY BRANDON BAILEY
Mercury News Staff Writer
Convicted hacker Kevin Poulsen is out of prison after five years,
but he still can't touch a computer.
Facing a court order to pay more than $57,000 in restitution for
rigging a series of radio station call-in contests, Poulsen has
complained that authorities won't let him use his only marketable
skill -- programming.
Instead, Poulsen said, he's doomed to work for minimum wage at a
low-tech job for the next three years. Since his June release from
prison -- after serving more time in jail than any other U.S.
hacker -- the only work he's found is canvassing door-to-door for
a liberal political action group.
.......................
Poulsen now lives with his sister in the Los Angeles area, where
he grew up in the 1970s and '80s. But he must remain under
official supervision for three more years. And it galls him that
authorities won't trust him with a keyboard or a mouse.
U.S. District Judge Manuel Real has forbidden Poulsen to have any
access to a computer without his probation officer's approval.
That's a crippling restriction in a society so reliant on computer
technology, Poulsen complained in a telephone interview, after a
hearing last week during which the judge denied Poulsen's request
to modify his terms of probation.
To comply with those rules, Poulsen said, his parents had to put
their home computer in storage when he stayed with them. He can't
use an electronic card catalog at the public library. And he
relies on friends to maintain his World Wide Web site. He even
asked his probation officer if it was OK to drive because most
cars contain microchips.
...........................
Legal experts say there's a precedent for restricting a hacker's
access to computers, just as paroled felons may be ordered not to
possess burglary tools or firearms. Still, some say it's going too
far.
"There are so many benign things one can do with a computer,"
said Charles Marson, a former attorney for the American Civil
Liberties Union who handles high-tech cases in private practice.
"If it were a typewriter and he pulled some scam with it or wrote
a threatening note, would you condition his probation on not using
a typewriter?"
................
According to Schindler, the probation office now will consider
Poulsen's requests to use computers "on a case by case basis."
------------------------------
Date: Fri, 27 Sep 1996 18:02:17 -0700
From: "Michael Bernard (IPTD)"
Subject: File 2--Microsoft response to David Smith/Web Browser Method
((MODERATORS' NOTE: By request, we removed Michael Bernard's
mailing address, because the appropriate place for response
is the homepage at:
http://www.microsoft.com/ie/support/feedback/ ))
In Article 5, Volume 8, Issue #66 of the Computer underground Digest,
David Smith raised an issue about potentially
misleading references to user preferences in our press announcement for
Internet Explorer 3.0
(http://www.microsoft.com/corpinfo/press/1996/aug96/1MILLPR.htm). The
press release stated that "four out of five users prefer Microsoft
Internet Explorer to Netscape Navigator." It should have stated that
"four out of five new Web users prefer Microsoft Internet Explorer to
Netscape Navigator." We appreciate David pointing out the discrepancy
and are revising such references to the study results.
It is true that the subjects of the study
(http://www.microsoft.com/ie/ie3/usability.htm) did not have any prior
Web browser experience. As the study indicates:
"The users had basic Windows 95 experience and understood Windows 95
concepts. All the users were individuals that had a strong interest in
learning about and using the Internet but no prior experience with a web
browser or the Internet. Users were not told who commissioned the study,
and they were screened to ensure that they were not prejudiced toward
either Microsoft or Netscape as a company."
We felt that this was an appropriate way to conduct the survey. It
provided an unbiased view of the browser product without the bias of
prior use, experience, or existing preference. It would have been
difficult to remove these biases if the study subjects had already been
using a given browser (e.g. Navigator) for any length of time.
As a test of first-time users, which the survey itself indicates, the
results are solid. We regret any confusion that may have been caused by
not indicating that the study was of new users in the August 19, 1996
Press Release. While it is too late for us to edit the Press Release, we
are modifying any other references to the study results on our Web site
to read ..."four out of five new Web users prefer Microsoft Internet
Explorer to Netscape Navigator."
Although the study results are valid for new users, we have been
receiving strong evidence that experienced users also like Internet
Explorer 3.0. (http://www.microsoft.com/ie/ie3/readeu.htm)
Additionally, we have done extremely well in head-to-head comparisons by
the press with Navigator 3.0. (http://www.microsoft.com/ie/ie3/read.htm)
We appreciate this opportunity to clear up any confusion on what we
genuinely feel to be an excellent product - Internet Explorer 3.0. We
welcome any comments (http://www.microsoft.com/ie/support/feedback/),
you have on our product and trust me - they get read!
Michael Bernard
Web Jamming with Internet Explorer 3.0
Product Manager, Microsoft
Internet Platform and Tools Division
------------------------------
Date: Fri, 27 Sep 1996 00:15:43 -0400 (EDT)
From: Voters Telecommunications Watch
Subject: File 3--Netscape CEO Jim Barksdale signs the pro-crypto petition (fwd)
From - Crypto News
MORE NET LUMINARIES JOIN THOUSANDS IN SIGNING PRO-ENCRYPTION PETITION
http://www.crypto.com/petition/
JUDICIARY HEARING ON HR 3011 (9/25/96)
Date: September 25, 1996
URL:http://www.crypto.com/ crypto-news@panix.com
If you redistribute this, please do so in its entirety,
with the banner intact.
------------------------------------------------------------
Table of Contents
Introduction
Join Netscape CEO Jim Barksdale as he signs the pro-crypto petition!
How to receive crypto-news
Press contacts
----------------------------------------------------------
INTRODUCTION
This is a busy last few days for Washington. In the midst of it all,
the Judiciary committee held a hearing HR 3011, beginning the process of
educating Congress for next year, and bringing in the Administration for
a regular public drubbing about their antiquated encryption regulations.
The very same day, WWW.Crypto.Com was honored to have Netscape CEO Jim
Barksdale sign onto petition that supports legislation that would:
-Relax export controls on encryption technology;
-Prohibit the government from imposing "Key Escrow" solutions
domestically; and
-Recognize the importance of privacy and security for the future
of electronic commerce, individual liberty, and the success of the
Internet.
Jim Barksdale is no stranger to the encryption debate. He testified
at the July 25th hearing on the pro-encryption Pro-CODE bill (S1726).
You can hear him in his own words by listening to the RealAudio transcript
of the hearing cybercast at http://www.crypto.com/events/072596/
We'll be continuing the petition throughout the break and the election
and use it next year to support the encryption legislation that will
surely be introduced again.
Be a part of it by signing the petition with Jim Barksdale at
http://www.crypto.com/petition/ !
------------------------------------------------------
JOIN NETSCAPE CEO JIM BARKSDALE IN FIGHTING FOR YOUR PRIVACY!
The following petition can be signed onto at http://www.crypto.com/petition/
The Information Revolution is being held hostage by an
outdated, Cold War-era U.S. encryption policy.
Current U.S. export controls and other initiatives are slowing
the widespread availability of strong encryption products,
endangering the privacy and security of electronic
communications, harming the competitiveness of U.S. businesses,
and threatening the future of electronic commerce and the
growth of the Global Information Infrastructure (GII).
We the undersigned Internet users and concerned citizens
strongly support Congressional efforts to address this critical
issue. Bills are currently pending in both Houses of Congress
which would:
-Relax export controls on encryption technology;
-Prohibit the government from imposing "Key Escrow" solutions
domestically; and
-Recognize the importance of privacy and security for the future of
electronic commerce, individual liberty, and the success of the
Internet.
We urge Congress to act NOW to enact a U.S. encryption policy that
promotes electronic privacy and security.
Add your name to his at http://www.crypto.com/petition/ !
------------------------------------------------------
HOW TO RECEIVE CRYPTO-NEWS
To subscribe to crypto-news, sign up from our WWW page (http://www.crypto.com)
or send mail to majordomo@panix.com with "subscribe crypto-news" in the body
of the message. To unsubscribe, send a letter to majordomo@panix.com with
"unsubscribe crypto-news" in the body.
------------------------------------------------------
PRESS CONTACT INFORMATION
Press inquiries on Crypto-News should be directed to
Shabbir J. Safdar (VTW) at +1.718.596.2851 or shabbir@vtw.org
Jonah Seiger (CDT) at +1.202.637.9800 or jseiger@cdt.org
------------------------------
Date: Sat, 28 Sep 1996 17:38:59 +0100
From: Glenn Hauman
Subject: File 4--Banned Books Week 9/28-10/5
Just a reminder:
Banned Books Week is co-sponsored
by the American Booksellers Foundation for Free Expression, the
American Library Association, the Association of American
Publishers, the American Society of Journalists and Authors, and the
National Association of College Stores. As in the past, Banned Books
Week is also endorsed by the Center for the Book of the Library of
Congress.
The battle against those who would remove materials from libraries,
schools, and bookstores-- and now, the Internet-- continues, and in
many areas has escalated. Through the participation of thousands of
bookstores and libraries across the country, millions of Americans
learn about the critical importance of free expression and of the
perilous threats to First Amendment rights that exist in our country
today. Banned Books Week draws attention to the danger that exits
when restraints are imposed on the availability of information in a
free society. The message goes beyond the freedom to choose and to
express ones opinion; the message of Banned Books Week is the
importance of ensuring the availability of viewpoints, even
unorthodox or unpopular, to those who wish to read them.
A large listing of banned books and their circumstances, along with
additional links will be going up on http://www.bb.com shortly.
Best-- Glenn Hauman, BiblioBytes
http://www.bb.com/
------------------------------
Date: Sat, 28 Sep 1996 01:03:29 -0500 (CDT)
From: Crypt Newsletter
Subject: File 5--Computer Virus Hysteria/John McAfee Awards: plea for books
Crypt Newsletter and Computer Virus Myths guru Rob Rosenberger
have put their heads together to comb the media for
computer virus stories that have contributed the most to
computer virus misinformation and confusion in 1996. Once they've
been compiled, we'll put them on display along with analyses of their
impact and faults and throw the nominees open to Netizens for their
votes on which are the best, or worst, depending on your point
of view.
Rob has puckishly named the contest the 1996 John McAfee Awards
after the 1992 watershed event of Michelangelo hype that catapulted
the anti-virus software developer to fame and fortune -- his
former company to a dominant position in the anti-virus industry.
But we want this to be an exercise in extending computer literacy
and to that end we intend to give away some prizes -- namely books!
Here's where you -- authors, publishers, the pure of heart and
philanthropic -- come in. Contribute one book on computer security,
computer viruses or reality and culture in cyberspace and we'll be
forever in your debt. You'll get publicity when we mention your
philanthropy and book during the nominations, voting and awards
ceremony. Plus you'll have the satisfaction of knowing your book
is going to be placed directly into the hands of someone in the media
who needs it the most!
To contribute a book, contact me or Rob Rosenberger.
George Smith: crypt@sun.soci.niu.edu
Rob Rosenberger: us@kumite.com
In late October we'll publicize the nominees and the prizes so the
voting can begin. Watch this space for further details.
Computer Virus Myths
http://www.us.kumite.com/myths
Crypt Newsletter
http://www.soci.niu.edu/~crypt
------------------------------
Date: Tue, 24 Sep 1996 17:42:39 -0700 (PDT)
From: "Tariq KRIM "
Subject: File 6--Jean_bernard_Condat PhD Musicologie
((MODERATORS' NOTE: Monday, CuD received a call from Mr.
Tariq Krim, who is currently working in the Silicon Valley.
Mr. Krim was upset with the following passage from CuD 8.67, File 5:
Yesterday, I lost my job of senior consultant in the Smart
Card Business Unit of Informix because Mr. Tariq Krim of
the ENST in Paris don't hesitate to call all my chiefs with
some kind words on my life.
It appears that the above passage is less than accurate.
And, while CuD cannot always identify forged messages, we do
feel compelled to observe that the original post that Crypt
Newsletter editor George Smith identified as plagiarized from
him isn't normally the kind of forgeries that are sent, and
the plagiarized post was consistent with similar posts from
the same source that we published without complaint.
Below is Mr. Krim's response to the allegation that he called
"all my chiefs" that resulted in dismissal:
-------------
Usually when I hear about Jean Bernard Condat we tell me bad things. I've
heard that he claimed to be a computer hacker and specialist of
telecommunications.
A few years ago someone gave Condat a phone number and said "hack my
machine if you can". Jean Bernard Condat spent 15 days trying.
It was a Fax number ...
Now he claims to be on the Internet since 81. Hopefully for the net he's
around for a few years only and is forbidden on all the french BBS and
french ISP.
Now I've never seen Mister Condat personnaly. I don't want to keep contact
with this person. I've just written this mail to tell all my friends and
the CuD readers that the story he told is completely false.
First: I don't know Condat.
second: I don't know the people of Informix France.
three: I don't know where he had my email
four: Your are responsible for what you say on the Internet and lying is not
a good thing as copying articles and books.
five: defamation has legal issues that I could exploit if this story is
not finished after this mail.
six: be polite on phone and don't tell another story than the one
published in CuD because it decreases your credibility ( if you still have
some)
And for the last time Jean Bernard Condat is a true Space "blaireau".
Well all this to say that I don't have yet the power to fire people in a
second, even people like JBC. I dont follow this guy 's life and
technically what he said is impossible as I live in the US. (hey you
didn't know that Mr Condat)
I don't want to be better than Jean Bernard Condat, I dont want to be Jean
Bernard Condat, and I dont want my name associate to this guy.
never ever....
Any way Jim I want to tell you that this e-zine that I read for soon 6
years is still the reference for underground computers issues.
"bonne continuation"
------------------------------
Date: Fri, 20 Sep 1996 12:11:24 -0400
From: Bob Palacios
Subject: File 7--CDT Policy Post 2.32 - FBI Surveillance Demands Rejected on Privacy
Grounds
The Center for Democracy and Technology /____/ Volume 2, Number 32
----------------------------------------------------------------------------
A briefing on public policy issues affecting civil liberties online
----------------------------------------------------------------------------
CDT POLICY POST Volume 2, Number 32 September 20, 1996
CONTENTS: (1) FBI Demands for Broad New Surveillance Power Rejected on
Privacy Grounds
(2) CDT Background Memo on the FBI Demands
(3) How to Subscribe/Unsubscribe
(4) About CDT, contacting us
** This document may be redistributed freely with this banner intact **
Excerpts may be re-posted with permission of
** This document looks best when viewed in COURIER font **
-----------------------------------------------------------------------------
(1) FBI Demands for Broad New Surveillance Power Rejected on Privacy
Grounds
A telecommunications industry standards body on Thursday voted to reject a
demand by the FBI to create a national tracking system out of the wireless
telephone network. CDT applauds this decision as a significant victory
for privacy and condemns the FBI's blatant efforts to subvert the specific
requirements of the Communications Assistance for Law Enforcement Act
(CALEA, also known as "Digital Telephony").
"The FBI is demanding that every cell phone double as a tracking device,
providing instant and continuous location information not just when a
subject is talking but whenever a cellular phone is turned on. " said CDT
Executive Director Jerry Berman. "The FBI is demanding real-time tracking
of anyone suspected of committing a crime. This is a clear violation of
the statute and the Fourth Amendment." Berman added
At issue are technical standards currently being drafted to implement the
1994 law. The FBI, which holds an influential position within the industry
standards process, has demanded that the wireless telephone network be
designed in a way that would allow real time tracking of individuals
suspected of a crime.
Specifically, the FBI is demanding that wireless networks be designed to
facilitate:
* Tracking of the physical location of a subject any time a cellular
phone is turned on (even if no call is being made or received)
* Tracking of the physical location of a subject when a cellular phone
moves within a service area or moves to another carrier's service area
* Tracking of the physical location of a subject when a cellular phone
makes or receives a call
* Delivery of this information to law enforcement in real time (within
500 milliseconds)
Although law enforcement currently has the authority to obtain certain
location information through a search warrant, the standards proposed by
the FBI would have allowed access to far more detailed location information
under a lower standard.
"The law was designed to freeze the FBI in time, not as a blank check to
the FBI to design the telecommunications network any way it pleased."
Berman said. "The FBI's demands go far beyond what's permitted under CALEA
and contradict statements by Director Freeh before Congress 2 years ago."
The drafters of CALEA specifically stated that the statute was not designed
to expand law enforcement surveillance authority. The Committee report on
the legislation notes:
"The FBI director testified that the legislation was intended to
preserve the status quo, that it was intended to provide law
enforcement no more and no less access to information than it had in
the past. The Committee urges against over broad interpretation of the
requirements."
-- House Judiciary Committee Report to Accompany H.R. 4922. Rept.
103-827 Part 1, Page 22
NEXT STEPS
In order to ensure public oversight and accountability over the FBI's
surveillance authority, CALEA requires the government to reimburse the
telecommunications industry for the costs of meeting the statute's
requirements. Congress is currently considering a mechanism to fund the
implementation of the law.
CDT urges the Congress to exercise its oversight role to determine whether
the FBI is seeking to use CALEA to expand current surveillance capabilities
contrary to the specific intent of the law. Unless and until the FBI
clarifies its intent and justifies its demands, Congress should not allow
the expenditure of any funds to implement CALEA.
CDT and a ad-hoc task force of other privacy organizations and
telecommunications industry representatives are currently conducting a
review of electronic surveillance issues at the request of Senators Patrick
Leahy (D-VT) and Arlen Specter (R-PA). The task force report will cover the
implementation of CALEA and will be released within the next few months.
CDT stands ready to intervene again at the standards setting process and
before the FCC if necessary in order to ensure that privacy is protected as
CALEA is implemented.
The Center for Democracy and Technology is a Washington DC based non-profit
public interest organization focusing on free speech and privacy issues in
new computer and communications technology. CDT can be found on the World
Wide Web at: http://www.cdt.org/
-----------------------------------------------------------------------
(2) CDT BACKGROUND MEMO ON THE FBI DEMANDS
FBI SEEKS TO USE CELLULAR TELEPHONES AS TRACKING DEVICES
The FBI is demanding the telecommunications industry design cellular
telephone networks in a way which would allow law enforcement to track
the physical location and movements of individuals in clear violation of
the law. This effort by the FBI raises grave privacy concerns and must
be rejected by the telecommunications industry.
In ongoing discussions with a Telecommunications Industry Association
committee established to set technical standards to implement the
Communications Assistance for Law Enforcement Act (CALEA, P.L. 103-414,
also known as the "Digital Telephony" statute), the FBI is requesting
surveillance capability far beyond current law enforcement capabilities and
in clear violation of the scope of the law.
CALEA was not designed as a blank check from Congress allowing law
enforcement to design the telecommunications network to expand existing
surveillance capability. Rather, the statute was carefully balanced to
ensure that law enforcement maintain the status quo. This overreaching by
the FBI raises serious privacy concerns and clearly violates the balance
struck by CALEA. CDT strongly urges Congress to refrain from approving any
funding for the implementation of CALEA until the FBI makes its intentions
clear.
FBI Demanding Location Information In Clear Violation of the Statute
The FBI's request is contained in a proposal called the Electronic
Surveillance Interface (ESI), which specifies the design of the interface
between the telecommunications network and law enforcement's own
surveillance equipment. The FBI has refused a formal request by CDT to view
a copy of the ESI.
However, documents obtained from a meeting of the FBI and the
telecommunications industry on September 12 indicate that the FBI is
demanding that cellular networks be designed to deliver location
information to law enforcement. Specifically, the ESI states that
cellular networks must be designed to provide the geographic location of a
particular subject:
The ESI states:
R7-62 The SSM (Surveillance Status Message) shall be delivered to
the LEA (Law Enforcement Authority) whenever the subject
changes location or between systems and this location is
available to the IAP (Intercept Access Point)
In short, the FBI is requesting that the cellular network be designed to
report the geographic location of an individual subject:
1. When a cellular phone is turned on (even if no call is made)
2. When a cellular phone moves within a service area or moves to another
carrier's service area.
3. When a cellular phone makes or receives a call.
The FBI claims that location information has to be provided to law
enforcement under CALEA because it is part of "call setup information."
However, in his testimony before a joint hearing of the House and Senate
Judiciary Committees on March 18, 1994, FBI Freeh director stated exactly
the opposite:
"Several privacy-based spokespersons have criticized the wording of the
definition (of call setup information)... alleging that the government
is seeking a new, pervasive, automated 'tracking' capability. Such
allegations are completely wrong.... In order to make clear that the
acquisition of such information is not... included within the term
'call setup information' we are prepared to add a concluding phrase to
this definition to explicitly clarify the point: '*** except that such
information [call setup information] shall not include any information
that may disclose the physical location of a mobile facility or
service beyond that associated with the number's area code or
exchange.'" (Testimony of FBI director Louis Freeh before a joint
hearing of the House Judiciary Subcommittee on Civil and
Constitutional Rights and the Senate Judiciary Subcommittee on
Technology and the Law, March 18, 1994. S. Hrg 103-1022).
The drafters of CALEA noted in the Committee report that the statute was not
designed to expand law enforcement surveillance ability:
"The FBI director testified that the legislation was intended to
preserve the status quo, that it was intended to provide law
enforcement no more and no less access to information than it had in
the past. The Committee urges against over broad interpretation of
the requirements." (House Judiciary Committee Report to Accompany H.R.
4922. Rept. 103-827 Part 1, page 22)
The FBI's demand that all wireless communications equipment provide the
physical locations of a subscriber at all times goes raises obvious privacy
issues and goes well beyond the scope of CALEA and the explicit statements
of the FBI.
No Funds Should Be Appropriated to Implement CALEA Until This Issue is Resolved
In passing CALEA, Congress sought to preserve law enforcement's ability to
conduct electronic surveillance as new communications technologies are
developed. At the same time, Congress was very clear that the law was
designed to preserve the status quo and not to expand law enforcement
surveillance authority. In addition, Congress took the extra step of
including substantial Congressional oversight and public accountability to
the implementation process in order to ensure that law enforcement did not
overreach and that privacy interests would be protected.
The law requires the telecommunications industry to set standards for
meeting the FBI's general requirements in an open process, allows
interested parties to challenge any standard before the FCC if it fails to
protect privacy, and requires Congressional oversight and accountability
over the implementation of the law by mandating government reimbursement
for expensive capability upgrades.
We urge Congress to exercise its oversight role to determine whether in
fact the FBI is seeking to use CALEA to expand its current surveillance
capabilities contrary to the intent of the law. Unless and until the FBI
clarifies its intent and justifies its demands, Congress should not allow
the expenditure of any funds to implement CALEA.
We look forward to discussing this issue with you further. If you have any
questions please contact:
Center for Democracy and Technology +1.202.637.9800
Danny Weitzner, Deputy Director
Jonah Seiger, Policy Analyst
-----------------------------------------------------------------------
(3) SUBSCRIPTION INFORMATION
Be sure you are up to date on the latest public policy issues affecting
civil liberties online and how they will affect you! Subscribe to the CDT
Policy Post news distribution list. CDT Policy Posts, the regular news
publication of the Center For Democracy and Technology, are received by
nearly 10,000 Internet users, industry leaders, policy makers and
activists, and have become the leading source for information about
critical free speech and privacy issues affecting the Internet and other
interactive communications media.
To subscribe to CDT's Policy Post list, send mail to
policy-posts-request@cdt.org
with a subject:
subscribe policy-posts
If you ever wish to remove yourself from the list, send mail to the
above address with a subject of:
unsubscribe policy-posts
-----------------------------------------------------------------------
(4) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US
The Center for Democracy and Technology is a non-profit public interest
organization based in Washington, DC. The Center's mission is to develop
and advocate public policies that advance democratic values and
constitutional civil liberties in new computer and communications
technologies.
Contacting us:
General information: info@cdt.org
World Wide Web: URL:http://www.cdt.org/
FTP URL:ftp://ftp.cdt.org/pub/cdt/
Snail Mail: The Center for Democracy and Technology
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
(v) +1.202.637.9800 * (f) +1.202.637.0968
-----------------------------------------------------------------------
End Policy Post 2.32 9/20/96
-----------------------------------------------------------------------
------------------------------
Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #8.69
************************************