Computer underground Digest Sun Feb 1, 1998 Volume 10 : Issue 08 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #10.08 (Sun, Feb 1, 1998) File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert) File 2--The EFF Pioneer Awards -1998 File 3--Quad/Graphics v. Sthrn Adirondack Lib System File 4--National & International Communications Interceptions Networks File 5--How Big is the Internet Today? File 6--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Mon, 26 Jan 1998 17:43:30 -0500 From: EPIC-News List Subject: File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert) ============================================================== Volume 5.01 January 26, 1998 -------------------------------------------------------------- Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. http://www.epic.org/ ======================================================================= [1] Court Blocks Discharge in Navy/AOL Privacy Case ======================================================================= A federal judge has enjoined the dismissal of a highly decorated sailor after finding that the proposed discharge was based upon information the Navy obtained from America Online in apparent violation of federal privacy law. The decision, issued today by U.S. District Judge Stanley Sporkin, concludes that Naval investigators "likely" violated the federal Electronic Communications Privacy Act (ECPA) when they requested and received confidential subscriber information from AOL, the nation's largest online service. (Excerpts from the decision are included below). Navy officials had ordered the discharge of the sailor, Timothy R. McVeigh (no relation to the convicted Oklahoma City bomber), on the ground that McVeigh violated the military's "Don't Ask, Don't Tell" policy on homosexuality. The Navy's proposed action is based entirely upon information obtained from AOL linking the sailor to a "screen name" on the system in which the user's marital status was listed as "gay." The information was received from AOL in violation of ECPA, which prohibits the government from obtaining "information pertaining to a subscriber" without a court order or subpoena. In addition to the privacy protections contained in ECPA, AOL's contractual "Terms of Service" prohibit the company from disclosing such information to *any* third party "unless required to do so by law or legal process." McVeigh's lawsuit is the first case to challenge governmental access to sensitive subscriber information maintained by an online service. In a statement issued when the suit was filed last week, EPIC said, "It is an important test of federal privacy law that will determine whether government agents can violate the law with impunity, or whether they will be held accountable for illegal conduct in cyberspace." EPIC noted that the incident also raises serious questions concerning the adequacy of contractual privacy protections like those contained in the AOL subscriber agreement. In a letter sent to Navy Secretary John Dalton on January 14, EPIC urged a postponement of McVeigh's discharge pending an investigation of the Navy's conduct. EPIC noted that, "Any other result would make a mockery of federal privacy law and subject the American people to intrusive and unlawful governmental surveillance." More information on the case, including a form for sending faxes to the White House and the Pentagon, is available at: http://www.hrc.org/mcveigh/ ======================================================================= [2] Excerpts From Court Decision in Navy/AOL Privacy Case ======================================================================= From the Memorandum Opinion of U.S. District Judge Stanley Sporkin in McVeigh v. Cohen, et al. (Civil Action 98-116, D.D.C.): The [investigative] steps taken by the Navy in its "pursuit" of the Plaintiff were not only unauthorized under its [Don't Ask, Don't Tell] policy, but likely illegal under the Electronic Communications Privacy Act of 1986 (ECPA). . . . The government knew, or should have known, that by turning over the information without a warrant, AOL was breaking the law. Yet the Navy, in this case, directly solicited the information anyway. What is most telling is that the Naval investigator did not identify himself when he made his request. . . . In these days of "big brother," where through technology and otherwise the privacy interests of individuals from all walks of life are being ignored or marginalized, it is imperative that statutes explicitly protecting these rights be strictly observed. . . . Certainly, the public has an inherent interest in the preservation of privacy rights as advanced by the Plaintiff in this case. With literally the entire world on the world-wide web, enforcement of the ECPA is of great concern to those who bare the most personal information about their lives in private accounts through the Internet. In this case in particular, where the government may well have violated a federal statute in its zeal to brand the Plaintiff a homosexual, the actions of the Navy must be more closely scrutinized by the Court. ======================================================================= Subscription Information ======================================================================= The EPIC Alert is a free biweekly publication of the Electronic Privacy Information Center. To subscribe or unsubscribe, send email to epic-news@epic.org with the subject: "subscribe" (no quotes) or "unsubscribe". A Web-based form is available at: http://www.epic.org/alert/subscribe.html Back issues are available at: http://www.epic.org/alert/ ------------------------------ Date: Mon, 26 Jan 1998 09:13:00 -0800 (PST) From: Mike Godwin Subject: File 2--The EFF Pioneer Awards -1998 THE SEVENTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS: CALL FOR NOMINATIONS * Please feel free to redistribute this notice in appropriate forums. * In every field of human endeavor,there are those dedicated to expanding knowledge, freedom, efficiency and utility. Along the electronic frontier, this is especially true. To recognize this, the Electronic Frontier Foundation established the Pioneer Awards for deserving individuals and organizations. The Pioneer Awards are international and nominations are open to all. In March of 1992, the first EFF Pioneer Awards were given in Washington D.C. The winners were: Douglas C. Engelbart, Robert Kahn, Jim Warren, Tom Jennings, and Andrzej Smereczynski. The 1993 Pioneer Award recipients were Paul Baran, Vinton Cerf, Ward Christensen, Dave Hughes and the USENET software developers, represented by the software's originators Tom Truscott and Jim Ellis. The 1994 Pioneer Award winners were Ivan Sutherland, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr Roxanne Hiltz, Lee Felsenstein, Bill Atkinson, and the WELL. The 1995 Pioneer Award winners were Philip Zimmermann, Anita Borg, and Willis Ware. The 1996 Pioneer Award winners were Robert Metcalfe, Peter Neumann, Shabbir Safdar and Matthew Blaze. The 1997 Pioneer Award winners were Hedy Lamarr and George Antheil (who won a special award), Marc Rotenberg, and Johan Helsingius. The 7th Annual Pioneer Awards will be given in Austin, Texas, at the 8th Conference on Computers, Freedom, and Privacy in February of 1998. All valid nominations will be reviewed by a panel of judges chosen for their knowledge of computer-based communications and the technical, legal, and social issues involved in computer technology and computer communications. There are no specific categories for the Pioneer Awards, but the following guidelines apply: 1) The nominees must have made a substantial contribution to the health, growth, accessibility, or freedom of computer-based communications. 2) The contribution may be technical, social, economic or cultural. 3) Nominations may be of individuals, systems, or organizations in the private or public sectors. 4) Nominations are open to all, and you may nominate more than one recipient. You may nominate yourself or your organization. 5) All nominations, to be valid, must contain your reasons, however brief, for nominating the individual or organization, along with a means of contacting the nominee, and, ideally, your own contact number. Anonymous nominations will be allowed, but we prefer to be able to contact the nominating parties in the event that we need more information.. 6) Every person or organization, with the single exception of EFF staff members, may be nominated for a Pioneer Award. 7) Persons or representatives of organizations receiving a Pioneer Award will be invited to attend the ceremony at the Foundation's expense. You may nominate as many as you wish, but please use one form per nomination. You may return the forms to us via email (preferred) to: pioneer@eff.org You may fax them to us at: +1 415 436 9993 Just tell us the name of the nominee, the phone number or email address at which the nominee can be reached, and, most important, why you feel the nominee deserves the award. You may attach supporting documentation. Please include your own name, address, and phone number. We're looking for the Pioneers of the Electronic Frontier that have made and are making a difference. Thanks for helping us find them, The Electronic Frontier Foundation -------EFF Pioneer Awards Nomination Form------ Please return to the Electronic Frontier Foundation the following information about your nominee for the Pioneer Awards: Nominee's name: Title: Company/Organization: Contact number or email address: Reason for nomination: Your name and contact information: Extra documentation attached: ------------------------------ Subject: File 3--Quad/Graphics v. Sthrn Adirondack Lib System Date: Sun, 25 Jan 1998 14:34:15 -0600 From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas) ((MODERATORS' NOTE: Here's the text of the decision reported by a recent poster regarding a company's attempt to access the user records of a library to determine who had used the libraries computers to allegedly access the company's computer resources.)) source: http://www.lcp.com/products/NY/slipops/pay/misc/F9757370.htm Matter of Quad/Graphics, Inc. v Southern Adirondack Lib. Sys. IN THE MATTER OF QUAD/GRAPHICS, INC., Petitioner, v. SOUTHERN ADIRONDACK LIBRARY SYSTEM, Respondent. Miscellaneous Courts -- 1997 NYSLIPOP 97573 Index No. 97-386 RJI 45-1-97-0189 SUPREME COURT SARATOGA COUNTY DECISION COUNSEL APPEARANCES: BOND, SCHOENECK & KING, L. L. P., Albany, for petitioner. EDWARD LINDNER, Saratoga Springs, for respondent. _________________________________________________________________ OPINION MAJORITY KENIRY, J.: In a case of first impression, petitioner corporation seeks to compel pre-litigation disclosure of the names of certain of its employees whom it suspects have misappropriated corporate computer resources. Quad Graphics, Inc. is a major national commercial printing company. Its headquarters is in Wisconsin. It maintains a large plant (1,000 employees) in Saratoga Springs, New York. Petitioner uses computers extensively in its business. Examination of relatively high long-distance telephone bills led the corporation to suspect that its computers were being misused. The respondent in the case is Southern Adirondack Library System (SALS). SALS is a cooperative system composed of 30 member libraries located in four upstate New York counties. Respondent operates, from its headquarters in Saratoga Springs, New York, an electronic information service known as "Library Without Walls". Users of "Library Without Walls" (LWW) possessing a valid library card and a personal identification number issued by any one of SALS' participating libraries, may access the "Internet". A library-based computer or a personally-owned computer can be used to log online. Access is free for 30 minute periods. Quad Graphics employees are prohibited from using Quad Graphics computers for personal purposes. Petitioner's Saratoga computer terminals do not have the capability of directly accessing outside telephone lines. However a computer operator in the Saratoga Springs plant may log into the company's mainframe computer located in Wisconsin. The terminal user can cause the mainframe by the use of a Quad Graphics password to access long distance. Then by telephoning the library in Saratoga Springs and providing a correct library password the employee-caller accomplishes a hook up with the LWW (third party) computer network. Petitioner contends that a cadre of its Saratoga Springs-based employees employed the library feature during working hours to effect the hookup and explore the "Internet" for personal purposes. Petitioner, after examining its long distance telephone billing records, asserts that unauthorized use between April 1995 and December 1996 has resulted in petitioner incurring over $23,000 in long distance telephone charges to the "LWW" telephone line and in petitioner losing 1,770 Saratoga Springs employee manhours in devotion to personal use of the "Internet". Petitioner, through internal investigative techniques, has been able to decipher nine distinct 13-digit identification numbers which were used to access "LWW" from its computer system. Petitioner, in an effort to learn the identity of the individuals to whom those nine identification numbers were issued, made a request under the Freedom of Information Law (Public Officers Law, art.6) to the Saratoga Springs Public Library for such information. Petitioner's request was rejected by the library on the basis that such information is confidential and may not be voluntarily disclosed. [1] In this application petitioner contends that SALS as a quasi-municipal agency is subject to and bound by the Freedom of Information Law and is required to disclose the names it seeks. SALS contends that under CPLR 4509 the identities are required to be kept confidential. Section 4509 of the Civil Practice Law and Rules, first enacted in 1982 (L. 1982, ch. 14) and broadened in 1988 (L. 1988, ch.112), provides as follows: Library records, which contain names or other personally identifying details regarding the users of public, free association, school, college and university libraries and library systems of this state, including but not limited to records related to the circulation of library materials, computer database searches, interlibrary loan transactions, reference queries, requests for photocopies of library materials, title reserve requests, or the use of audio-visual materials, films or records, shall be confidential and shall not be disclosed except that such records may be disclosed to the extent necessary for the proper operation of such library and shall be disclosed upon request or consent of the user or pursuant to subpoena, court order or where otherwise required by statute. The court has reviewed the legislative history of CPLR 4509 as contained in the bill jackets for the original enactment and the subsequent amendment. The supporting memorandum issued by the Assembly of the State of New York when the law was enacted, states: The New York State Legislature has a strong interest in protecting the right to read and think of the people of this State. The library, as the unique sanctuary of the widest possible spectrum of ideas, must protect the confidentiality of its records in order to insure its readers' right to read anything they wish, free from the fear that someone might see what they read and use this as a way to intimidate them. Records must be protected from the self-appointed guardians of public and private morality and from officials who might overreach their constitutional prerogatives. Without such protection, there would be a chilling effect on our library users as inquiring minds turn away from exploring varied avenues of thought because they fear the potentiality of others knowing their reading history. Enactment of '4509 in 1982 was supported by the New York Civil Liberties Union, the New York Public Library and the New York County Lawyers' Association. The State Education Department and State University of New York raised no objection to the bill. In 1988, the Law Revision Commission of the State of New York, acting on a request by library staff and faculty of State University of New York at Buffalo and its Law School, recommended that '4509 be broadened to protect additional library records. The statute as originally enacted protected only a library's circulation records. An amendment enacted in 1988 protected records relating to computer database searches, interlibrary loan transactions, reference inquiries, photocopy requests, title reserve requests and audio-visual materials, films and records usage information. The New York Library Association, the State Education Department, and the New York Civil Liberties Union supported broadening '4509's reach. It is clear that '4509 does not grant an absolute privilege prohibiting the disclosure of library records. The law is intended to allow limited disclosure pursuant to court order. A court order is precisely what petitioner seeks. The salient issue is whether or not petitioner's expressed desire to learn the identity of individuals who are alleged to have misused its computer system and misappropriated its property, in order to initiate civil legal proceedings, is a proper basis for release of the library system's records. It is the court's determination that disclosure of the information sought should not be permitted. Petitioner certainly has an internal security problem involving the unauthorized use of its computer equipment and resources. However a criminal complaint is not before this court and apparently has not been made. Were this application to be granted, the door would be open to other similar requests made, for example, by a parent who wishes to learn what a child is reading or viewing on the "Internet" via "LWW" or by a spouse to learn what type of information his or her mate is reviewing at the public library. The court recognizes the significance of the problem that petitioner faces and the difficulty that petitioner has encountered in trying to identify the users. The Legislature has expressed, in rather direct and unequivocal fashion, a public policy that the confidentiality of a library's records should not be routinely breached and this court, in denying the petitioner's request, is following the clearly expressed legislative purpose of CPLR 4509. One of the petitioner's other arguments deserves brief comment. Petitioner contends that disclosure of the records sought is required under '4509 since it, as the owner of the computer equipment and telephone lines utilized to access the Internet, should be considered the "user" of "LWW" and thus it is entitled to the information as a matter of right. The argument is specious. The operation of a computer is controlled by the person who gives it commands. The users in this case are the individuals who actually operated the computers guiding them through the "Internet". Petitioner's application is denied without costs. Dated: September 30, 1997, Ballston Spa, New York Footnotes Footnote 1: The Saratoga Springs Public Library was originally named as the respondent in this proceeding. An order, based upon a written stipulation, was made and entered substituting SALS as respondent since "LWW" was and is a program of SALS and not of the Saratoga Springs Public Library. ------------------------------ Date: Tue, 27 Jan 1998 23:18:21 +1100 From: Felipe Rodriquez Subject: File 4--National & International Communications Interceptions Networks I think this may be of interest to this list. This report is not available electronically, so I typed in the most interesting part. If you are interested in obtaining a free copy of the report, then refer to the bottom of this message and use the example-fax that is attached there. This message is a quote from a report published by the EU Parliament: AN APPRAISAL OF TECHNOLOGIES OF POLITICAL CONTROL Published by Scientific and Technological Options Assessment (STOA) Directorate General for Research Luxembourg 6 january 1998 Document nr: PE 166 499 "The document is a working document. The current version is being circulated for consultation. It is not an official publication of STOA or of the European Parliament. The document does not necessarily represent the views of the European Parliament." "4.4 National & International Communications Interceptions Networks Modern communications systems are virtually transparent to the advanced interceptions equipment which can be used to listen in. Some systems even lend themselves to a dual role as a national interceptions network. For example the message switching system used on digital exchanges like System X in the UK supports an Integrated Services Digital Network (ISDN) protocol. This allows digital devices. E.g. fax to share the system with existing lines. The ISDN subset is defined in their documents as "Signaling CCITT1-series interface for ISDN access. What is not widely known is that built in to the international CCITT protocol is the ability to take phones 'off hook' and listen to the conversations occurring near the phone, without the user being aware that it is happening. (SGR Newsletter, No.4,1993) This effectively means that a national dial up telephone tapping capacity is built into these systems from the start. (System X has been exported to Russia and China) Similarly, the digital technology required to pinpoint mobile phone users for incoming phone calls, means that all mobile phone users in a country when activated, are mini-tracking devices, giving their owners whereabouts at any time and stored in the company's computer for up to two years. Coupled with System X technology, this is a custom built mobile track, tail and tap system par excellence. (Sunday telegraph, 2.2.97) Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK. The system was first uncovered in the 1970's by a group of researchers in the UK (campbell, 1981. The researchers used open sources but where subsequently arrested under Britain's Official Secrets legislation. The 'ABC' trial that followed was a critical turning point in researcher's understanding of both of the technology of political control and how it might be challenged by research on open sources. (See Aubrey, 1981 & Hooper 1987) Other work on what is now known as Signals intelligence was undertaken by researchers such as James Bamford, which uncovered a billion dollar world wide interceptions network, which he nicknamed the 'Puzzle Palace'. A recent work by Nicky Hager, Secret Power, (hager 1996) provider the most comprehensive details to date of a project called ECHELON. Hager interviewed more than 50 people concerned with intelligence to document a global surveillance system that stretches around the world to form a targeting system on all of the key Intelsat satellites used to convey most of the world's satellite phone calls, internet, email, faxes and telexes. These sites are based at Sugar grove and Yakima, in the USA, at Waihopai in New Zealand, at Geraldton in Australia, Hong Kong and Morwenstow in the UK. The ECHELON system forms part of the UKUSA system but unlike many of the electronic spy systems developed during the cold war, ECHELON is designed for primarily non-military targets: governments, organisations and businesses in virtually every country. The ECHELON system works by indiscriminately intercepting very large quantities of communications and then siphoning out what is valuable using artificial intelligence aids like Memex. To find key words. Five nations share the results with the US as the senior partner under the UKUSA agreement of 1948, Britain, New Zealand, and Australia are very much acting as subordinate information sevicers. Each of the five centres supply "dictionaries" to the other four of keywords, Phrases, people and places to "tag" and the tagged information intercept is forwarded straight to the requesting country. Whilst there is much information gathered about potential terrorists, there is a lot of economic intelligence, notably intensive monitoring of all the countries participating in the GA TT negotiations. But Hager found that by far the main priorities of this system continued to be military and political intelligence applicable to their wider interests. Hager quotes from a "highly placed intelligence operatives" who spoke in the Observer in London. "We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate." They gave as examples. GCHQ interception of three charities, including Amnesty International and Christian Aid. "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In the case of phone taps the procedure is known as Mantis. With telexes its called Myfly. By keying in a code relating to third world aid, the source was able to demonstrate telex "fixes" on the three organisations. With no system of accountability, it is difficult to discover what criteria determine who is not a target. In February, the UK based research publication Statewatch reported that the EU had secretly agreed to set up an international telephone tapping network via a secret network of committees established under the "third pillar" of the Maastricht Treaty covering co-operation on law and order. Key points of the plan are outlined in a memorandum of understanding signed by EU states in 1995. (ENFOPOL 112 10037/95 25.10.95) which remains classified. According to a Guardian report (25.2.97) it reflects concern among European intelligence agencies that modern technology will prevent them from tapping private communications. "EU countries it says, should agree on "international interception standards set at a level that would ensure encoding or scrambled words can be broken down by government agencies." Official report say that the EU governments agreed to co-operate closely with the FBI in Washington. Yet earlier minutes of these meetings suggest that the original initiative cane from Washington. According to Statewatch, network and service providers in the EU will be obliged to install "tappable" systems and to place under surveillance any person or group when served with an interception order. These plans have never been referred to any European government for scrutiny, nor one suspects to the Civil Liberty Committee of the European Parliament, despite the clear civil liberties issues raised by such an unaccountable system. We are told that the USA, Australia, Canada, Norway and Hong Kong are ready to sign up. All these bar Norway are parties to the ECHELON system and it is impossible to determine if there are not other agendas at work here. Nothing is said about finance of this system but a report produced by the German government estimates that the mobile phone part of the package will cost 4 billion D-marks. Statewatch concludes that "It is the interface of the ECHELON system and its potential development on phone calls combined with the standardization of "tappable communications centres and equipment being sponsored by the EU and the USA which present a truly global threat over which there are no legal or democratic controls" (press release 25.2.97)" If you are interested in obtaining a free copy of this report, then complete this fax and send it to +32-22-849059 TO: Karin Sercu, STOA Programme Directorate-General for Research, Directorate B, Eastman 112, rue Belliard 97-113, B-1047 Bruxelles, Belgium Subject-- STOA report 'Technologies of Political Control' FROM: "YOUR NAME AND ADDRESS HERE" Dear Ms. Sercu, I'd like to acquire the STOA Report "AN APPRAISAL OF TECHNOLOGIES OF POLITICAL CONTROL", document number PE 166 499. Please please send it to: "YOUR ADDRESS HERE" Kind regards, "YOUR NAME HERE" ------------------------------ Date: Tue, 20 Jan 1998 19:09:35 -0500 (EST) From: editor@TELECOM-DIGEST.ORG Subject: File 5--How Big is the Internet Today? Source - TELECOM Digest Tue, 20 Jan 98, Volume 18 : Issue 16 From--anthony@alphageo.com (Anthony Argyriou) Date--Tue, 20 Jan 1998 04:15:58 GMT Following a thread from an irreverent e-mail list story, I discovered that Bellcore has a website which tracks the size of the Internet. They're using statistical sampling of the DNS to estimate the number of internet hosts. The estimate as I write is 30,096,400 and growing. The site is http://www.netsizer.com , and you need a Java-enabled browser to see it. Information about the estimate is at http://www.netsizer.com/info.html . Anthony Argyriou http://www.alphageo.com ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #10.08 ************************************