Computer underground Digest Sun Mar 8, 1998 Volume 10 : Issue 17 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #10.17 (Sun, Mar 8, 1998) File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98) File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98) File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98) File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES * File 5-- In Re - European Parliment STOA Program File 6--"USAG Reno pushes for computer security" (infoworld fwd) File 7--"Computers, Freedom, Privacy" File 8--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Thu, 5 Mar 1998 06:42:45 -0800 (PST) From: "Robert J. Woodhead (AnimEigo)" Subject: File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98) >The question is, why should we have to work to get around Brian Milburn's >censorship, (or should I say Focus on the Family, to think I used to be >intimately involved with them?)? You and I may be able to create an >application that could send CyberSitter every URL listed on Yahoo, but the >average parent can't and doesn't want to. The average parent should be able >to pick and choose what is blocked -- if they choose to block anything. As >usual, in this type of debate, the fact that a child who is supervised >while using the Internet by their parent has the best "filter" of all >installed is never mentioned. As to pick-n-choose, I agree. Insofar as censorware has a use, it should be parent-configurable - with the current settings readable by the user. The problem isn't so much with the idea of censorware, but the current implementations - and the current implementors (!) So, if you really want to piss off Bruce Milburn, write a totally configurable censorware product, and make it freeware, with a "Prejudice Construction Kit" that lets every nutgroup in the world build a module that eradicates their particular infidels from their kids view of the internet. Then, of course, spam the net to announce it ;^) Finally, consider that the *publication* of CyberSitter's settings (as reverse engineered) would be illuminating. >No offense to anyone else out there, but it is beginning to seem -- with >this filterware debate -- that I spend more time supervising my dog, Lady >Joyous of Shasta, CD (Golden Retriever, the 'CD' means 'companion dog' and >is a result of winning obedience trials), than they do supervising their >kids. Intelligent parents (of which I am hopefully one, with computer-literate but not yet surfing kids) tend to view censorware as a first-cut "spam" (or "scum") filter. Anyone who has kids know they are a 24-7 proposition, and an exhausting one at that. Labor saving devices are seized upon, so that the time can be spent on hopefully more important parenting tasks. I personally would want one that blocked spelling and grammar errors, so that my kids aren't corrupted by bad writing. Of course, this would mean they couldn't visit their daddy's pages... >This all seems like too much work. The persons who are able to do this, >won't want to take the time to do it, because they won't buy into Milburn's >tripe and the others, well, unfortunately, they will probably buy his tripe >and be none the wiser. By the way, I am still not convinced that breaking >the weak encryption on CyberSitter's software for your own information >would be illegal, either criminally or tortiously. Maybe not, but I doubt Mr. Milburn will agree with your legal analysis. Lawsuits are so pesky, so why not simply be more elegant? (that rustling sound is Bruce Milburn checking his clickwrap agreement to see if he's got that base covered...) ------------------------------ Date: Thu, 5 Mar 1998 12:15:26 -0500 (EST) From: "Bill Michaelson" Subject: File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98) > >Regarding the various censorware programs... everyone seems to be > >making the assumption that parents _do_ have the right to censor > >what their children see. But is this truly the case, in ethics if > >not in law? It's not strictly the case, as you have ably pointed out. BTW, I'm not one of "everyone", although I agree that most people seem to accept as a basic premise that children should be shielded from certain types of information. We who believe otherwise are in a very tiny minority. I suppose this doctrine is firmly embedded in our culture, with movie rating schemes and similar filtering/censoring devices all around. It's practically apostasy to suggest that children can handle any information with proper guidance. But having been a child who was allowed access to any type of information, I find this censorship quite repugnant. It is comforting to me to believe that we are very concerned with child welfare, but I am cynical because of the many who apparently trot out the child welfare issue as justification for their political agendas. I think children are far more resilient than we give them credit for being. We only stunt their intellectual growth when we withhold information (of any kind) from them. And when some claim that children are not "ready" for information, it is really the *adults* who are not ready or willing to discuss the issues with their children. > If I don't have the right to control and monitor the information my > children receive, than who does? The guvmint? No one? Controlling and monitoring are distinct activities. I heartily approve of monitoring (and editorializing upon) the information children receive. I do not approve of controlling it to the extent that any information is excluded. Regardless, I would give you the right to do both with your children, just so that I could live in peace with you. I wouldn't necessarily approve, and we might clash at the school board meeting occasionally. In the end, I suppose my child would then have a competitive advantage over yours. > >We do not allow parents to keep their children from getting an > >education. We do not allow this even though that education can lead > >to those children learning things that will cause them to disagree > >with their parents. > > Parents do not have the right to keep their children from an education > but with things like the PTA and school board meetings we do have some > control on the content of that education. And the PTA and the school board, et al, battle it out, and the kids are taught the resulting curriculum over some parents' objections. That was the original poster's point. > > We do not allow this even though that education > >can lead to those children learning things that will shock them - > >such as about war. > > War is a fact and cannot be hidden, however are you going to show photos > of Aushwitz to a 3rd grade class or pictures of liberated villages whose > people are glad that some one stood up to fight when it was necessary. Is that how you choose to introduce the concept of war to children? Show them the glory before you show them the horror? I'm getting a fresh perspective on why war has persisted through the ages. > Showing a little child pictures of horror will not end wars Not by itself it won't. > in the future but it will frighted, shock, and disturb him. Is this > the way we want our small children to feel? Yes. That is exactly how I want our small children to feel about war. Frightened, shocked and confused. That's how I feel about war. What about you? > I don't and will do everything I can to > block such sights from them until I think they're ready. "Ready", how? Ready to accept such sights unemotionally? Interesting to me that you use Aushwitz and third grade as an example. That's when I first learned about the Holocaust. I was about 7 or 8 years old when I pulled a history book off my aunt's shelf while looking for entertainment and found graphic descriptions of what man does to man in the photos of liberated Nazi concentration camps. Yeah, I was disturbed and confused. It was the weirdest shit I'd ever seen, and it took me years to digest it. But I was old enough to go seeking information in history books, so I found history, in a dosage exactly proportional to my perceptual abilities at the time. Later, when I heard about this guy called Hitler, it really meant something to me. I disagree with the notion that showing a child pictures of horror will not end war. It will require a lot of factors to end war, but at the core of our motivation will be a visceral revulsion of it. Short of first-hand experience (which would be self-defeating), how are people to acquire such revulsion through sanitized presentations at only "appropriate" times? Through a picture is the best way for a child to see a war, and it should be seen, as early as possible, as far as I'm concerned. A child can then contrast it with the reality of the decent civilized community within which (hopefully) they live. They need to see the possibilities while they're young and it will make the most lasting impression. This is important stuff to learn while young. > Violence is a fact of life but it is my job as a parent to protect my > children from violence as long as I can. I fail to see how teaching So protect them from violence. Don't "protect" them from knowledge. > self-defence to an eight year old can protect them from violence from an > adult. I must and do teach my kids what they can do in a bad situation, > but I also try to teach them that in many instances violence is not as > ubiquitious as the media portrays. I don't hide the fact of violence and > hate from them but if I left it up to them to learn on their own, would > they not learn that it is unavoidable, everyone is evil, and they can do > nothing to escape it? Wouldn't it be more traumatic for my kids to live > paranoid and afraid? Because of the sensational nature of the really > heinous crimes, might they not think they are more prevelant then they > actually are? Of course I'm going to keep some of this from my kids > until I, no one else, decide that they are ready to handle it. So you are seeking a sense of balance in how media portrays life for your child. That's sensible. Supervise and mediate, advise and consult. Help them think critically. Don't let them live in a fantasy world shaped by television and video games. You sound like a concerned, well-meaning and loving parent. But don't prohibit them from learning about ANYTHING. You can't stop it, and if you try, you'll lose some of their trust. They're very smart, and if you think you are keeping information from them, then it's almost certain that THEY are or will be keeping information from YOU. Believe it. > >Yes, as a previous poster said, a 10-year-old searching for > >information under "American Girl" may see things that will remain > >with that child for the rest of his or her life. But there is no > >evidence that this harms the child; there are a _lot_ of things that > >remain with people throughout their lives. Parents have the > >opportunity to do a lot of things that have this characteristic; > >should they be able to shut children off from others doing the same, > >if no harm is done to the child? > > Maybe this stuff will do no permanent harm but they can be confusing to > a child without the maturity to handle it. The little folks have enough That's how maturity is acquired. > problems living in the big folks world as it is. So I will keep things > from my kids that I don't think they are ready for. Like the military draft was something my mother thought I wasn't ready to handle at the tender age of 18, I'm sure. Events march on, and you can't stop them. You're not helping the kids. I suspect that it is you who are not ready to face these issues with your kids. It's tough to explain to a child why someone would hang a person from their skull on a meathook. In fact, I don't really know how to explain it, or whether it merits explanation so much as it calls for introspection. But if you have kids, you're stuck with this sort of problem, if you accept the responsibility. Your kids will know when you are hiding something, or are too squeamish to talk to them about it. That does not foster trust. Get over it before the gulf gets wide. > It boils down to a matter of values, not the PC "Family Values" that are > being touted but the values that I've learned over the years and have > put into my own life. I will try to instill those values in my children > until such time as they are ready to develop their own. And I will do it > by "censorship" if I think that is the way it should be done. You lead by example. Regardless of your motives, the value you are instilling is to control people by limiting their access to information. Perhaps they will learn this lesson well, and use it on you. Watch out for the teen years. But that's your privilege. Keep your kids off the 'net until you think they're "ready". Or supervise them. But don't surrender your parental responsibilities to someone else with their own social agenda, like a censorware software maker. I'm willing to pay the school tax for your kids, and to subsidize your extra tax write-offs. No problem. But don't ask me to pay the cost of your parenting responsibilities with my freedom of speech, or the freedom to seek information of *any* sort. Don't lend support to cockamamie rating systems that will sterilize the 'net. I don't mind too much if some parents choose to keep their kids ignorant, but not anyone else's, and certainly not the world at large. ------------------------------ Date: Thu, 5 Mar 1998 20:56:07 +0000 From: Dave Bird---St Hippo of Augustine Subject: File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98) >If serious net disruption does occur, for whatever reason, it is critically >important to observe certain common-sense protocols in the use of phone and >fax numbers. Effective anarchic communications require a certain finesse >and forethought. It's worth pointing that the UK, only, has a system by which the telephone system could be "pulled" in time of crisis. This has been publicised in various books by Duncan Campbell, but OTOH it is one of the things which under the voluntary censorship system papers and broadcasters have agreed not to mention. Exchanges have "telephone preference" which can be switched to three (all numbers), two (political and military numbers in time of civil crisis), or one (military only in the run up to a war threatening the home territory). The supposed justification is that people making extra panic calls in time of crisis would jam the system for priority callers. Not that they may be supporting the general strike, or protesting the coming war, of course. Though actually using it would bring its existence to widespread notice, and probably cause more panic than it cured! Still, it is hard to make contingency plans against interefrence with communications in a country that repressive. If you use this, use it as "Name withheld, UK." The knowledge is not particularly secret, but I don't want to be targeted for mentioning it. ------------------------------ Date: Thu, 5 Mar 1998 23:11:36 PST From: shadow@KRYPTON.RAIN.COM(Leonard Erickson) Subject: File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES * In Cu Digest, #10.16, Wed 4 Mar 98, "Richard K. Moore" writes: > The next step is to contact those people NOW - while you still can > conveniently - and exchange with them your phone numbers, fax numbers, and > postal addresses. You might even go so far as to make preliminary > arrangements for "phone-tree" or "photocopy-tree" protocols for > distributing information, but most of us probably won't get around to that, > life being what it is. The important thing is to have the necessary data > on hand well in advance of need. I suggest checking out Fidonet. Unlike the Internet, Fidonet is *based* on a "phone directory" (the nodelist) that permits *direct* exchange of email and files between sites. It also has some elementary security provisions, such as pre-arranged session passwords. If a system attempts to connect to my node (1:105/51) and claims to be a node I have a session passwortd with, it has to include the proper password in the session handshake. Failure to do so will get the connection rejected. Denial of service requires attack dialing my node's phone number, which is easily reported to the telephone company, who will cheerfully nail any non-government entity doing such a thing. Also, I can simply hook my hardware up to a different phone line and poll the nodes that I expect mail from. While Fidonet can learn (and has!) a lot from the Internet, I think we have some features that the Internet could stand to adopt. (e.g. we *explicitly* make sites responsible for content entering the network from them. "Spam" doesn't happen except via spoofing non-passworded links.) ------------------------------ Date: Thu, 05 Mar 1998 14:14:21 +0100 From: Gisle Hannemyr Subject: File 5-- In Re - European Parliment STOA Program In a recent edition of Computer underground Digest (#10.08, Sun, Feb 1, 1998) Felipe Rodriquez reported on a recent working paper for the European Parliement STOA Programme (File 4--National & International Communications Interceptions Networks). The working paper "AN APPRAISAL OF TECHNOLOGIES OF POLITICAL CONTROL" by Steve Wright of the Momega Foundation, Manchester, is now available from several wev locations, e.g. http://www.telepolis.de/tp/deutsch/inhalt/te/1393/anchor1.html As a survey of various techonologies that may be used of political control, the report is well worth reading. But read (as most media have) as a piece of journalism, reporting on current affairs, I find it less trustworthy. In that context, it suffers from Wright's inability to distinguish speculation from fact, and from his limited understanding of technology and telecommunications infrastructure. These problems, for example, becomes appearent in his treatment of Project ECHELON, which Wright introduces thusly; "a global surveillance system that stretches around the world to form a targeting system on all of the key Intelsat satellites used to convey most of the world's satellite phone calls, internet, email, faxes and telexes" [Wright, 1998] Unfortunately (or fortunately) this paints a picture of the world's telecommunication infrastructure that is at least ten years out of date. Today most of the world's phone calls, Internet traffic, email, faxes and telexes are _not_ carried by satelite, but by copper cables and optical fibres, and is therefore _not_ vulnerable to the surveillance techniques attributed to Project ECHELON, which was based upon erecting listening stations within the telecom.-satelites "footprint" and picking unencrypted data out of the ether. I have no reason to doubt that such a thing as Project ECHELON existed and maybe still even exists, but from a privacy point of view, it is now only of historical interests. Newspapers all over the globe covering Wrights paper seems to focus on Project ECHELON as a _current_ privacy problem. If it works as described in Wright's paper, this is simply not the case. Further, Wright's reading of his sources seems in places a bit sloppy in places. For instance, in the quote above, Wright includes telephony in what is monitored by ECHELON. As his source for information on Project Echelon he lists the book "Secret Power" by New Zealand based peace activist Nicky Hager. That book, however, states that: "Echelon is used only to intercept written communications: fax, e-mail, and telex." [Hager, 1996] which is much more believable. A key element in ECHELON seems to be automatic monitoring of communication streams by looking for certain keywords (known as "NSA-fodder" in hacker lore). While this is technically feasable to do this with text based communication streams, I know of no technology that with even moderate reliability can recognize more than a handful of keywords fed with continious speech in real-time from an un-cooperative and unknown speaker. References: Nicky Hager: Secret Power -- New Zealand's Role in the International Spy Network; Craig Potton Publishing, 1996 Steve Wright: An Appraisal of Technologies of Political Control; European Parliament, The STOA Programme, 1998 ------------------------------ Date: Sat, 7 Mar 1998 22:24:54 -0800 (PST) From: Jim Thomas Subject: File 6--"USAG Reno pushes for computer security" (infoworld fwd) By Torsten Busse InfoWorld Electric Posted at 3:07 PM PT, Mar 5, 1998 U.S. Attorney General Janet Reno has announced an interagency effort to track and analyze electronic threats to the nation's critical infrastructures, such as communications, transportation, and energy networks. The new National Infrastructure Protection Center (NIPC), headed by Associate Deputy Attorney General Michael Vatis, will include the Computer Investigations and Infrastructure Threat Assessment Center of the U.S. Federal Bureau of Investigation, and will add real-time intrusion-detection capabilities for cyberattacks directed at various national, electronic infrastructures. "Our telecommunications systems are more vulnerable than ever before as we rely on technology more than ever before," Reno said. The NIPC will coordinate the efforts of a number of government agencies in setting up and operating defenses against cyberspace intrusions from both inside and outside the borders of the United States. Effective defense will depend on that cooperation, Reno said. Reno will ask the U.S. Congress to commit $64 million for the NIPC in fiscal year 1999, a sum that will allow the establishment of six additional computer investigation centers in U.S. cities. ------------------------------ Date: Tue, 24 Feb 1998 12:03:06 From: Richard Thieme Subject: File 7--"Computers, Freedom, Privacy" Islands in the Clickstream: Computers, Freedom, and Privacy A conference on computers, freedom, and privacy might be the last place one expects to find the deepest expressions of the quest for meaning in our lives, yet there it was, all over the place. So was evidence of new possibilities for what I call the human- computer symbiot, that new kind of community generated by our symbiotic relationship to our electronic sensory extensions and intelligent networks. The choices we make now as we take the reins of our own evolution more securely in our hands -- with fear and trembling at the perilous task before us -- will determine the kind of world we bequeath to our children. The quest for meaning would not be an issue if our lives were obviously meaningful. Every foreground is defined by a background. The threat of meaninglessness posed by an entropic universe headed toward heat death makes us ask if the evolution of complexity of form and consciousness is evidence of consciousness that is the source as well as the goal of evolution -- or merely something that happened to happen. Either way, the existential choices are the same, and the fact that they exist is the definition of freedom. The battle for freedom is not being fought in wars far from home but in the policies and decisions we make personally and professionally about how we will live in a wired world. If those decisions are conscious, deliberate, and grounded in our real values and commitments, we will build communities on-line and off that are open, evolving, and free. If we are manipulated into fearing fear more than the loss of our own power and possibilities, then our communities will be constricted, rigidly controlled, over-determined. Privacy is key to these choices. There is no such thing as a guaranteed private conversation any more. We used to be able to walk out behind a tree and know we could not be overheard. Now the information that is broadcast by everything we say and do is universally available for cross- referencing and mining for hidden patterns. Those patterns, as Solveig Singleton of the Cato Institute observed, are in the eye of the beholder, determined by their needs and ultimate intentions -- an eye that half-creates and half-perceives, as Wordsworth said, constructing reality in accordance with its wishes and deepest beliefs. What we deeply believe, and how we allow others and our intentional communities to reinforce our beliefs and values, determines our actions and commitments. The choices we make downstream will emerge upstream when the river widens. In a conversation with a career intelligence officer about the actions of various US agencies, I made this appeal: "There is a cry for justice in a child's heart," I suggested, "that is eroded over time by the way we sometimes have to live. Yet the day comes when we look at what we have done with our lives and its relationship to that cry for compassion." He disagreed. "I long ago set aside the sentiments of my childhood religion," he said.... In order to do the things he had to do. And the growing sophistication of technologies of torture, that enable governments to leave fewer marks, fewer clear memories in the minds of victims? "A sign of growing sensitivity to world opinion," he said. "At least they're moving in the right direction." How we do hear that cry for compassion, when the foggy weather in our own minds works to obscure it? Would it help, I asked Patrick Ball of the American Association for the Advancement of Science, to have audio clips on the web of what happens in those interrogation rooms? "No," he said with conviction. "The descriptions I've read are sufficiently graphic." What I cannot represent in words is the look in his eyes as his brain did a quick sort of the hundreds of detailed torture scenarios he had studied. Nor can I say how the face of that intelligence professional went suddenly wooden and his eyes looked away as he remembered what he had done as part of his job. How wide do we draw the circle? A Department of Justice attorney arguing for weak encryption stopped at the border. Catching criminals inside America is his sole priority, so he wants a back door into every electronic conversation in the world. Ball draws a wider circle, including those in Guatemala, Ethiopia, or Turkey who might be alive if they had had a possibility of engaging in a private conversation. Ball favors strong encryption as a way to support human rights worldwide. Our knowledge of "how things really work" pushes the conversation further. Seldom have intelligence agents told me they worry about abuse of the information they gather. They trust the system. "We abide by the law," said a CIA professional. He added that even the NSA can not intercept conversations inside our borders. They don't have to, said another. Our special friends in New Zealand or Canada listen to American traffic as we listen to theirs. Good friends, he added, help one another. So ... granted that we live in a real world in which data gathered for one purpose finds its way into other nets, in which anything that has value will be bought and sold ... what are the limits we can place on the inordinate desires in the human heart to be in control, to know more than we have a right to know? How can technology serve the need for secure boundaries that guarantee citizens of a civil society the freedom they need? Knowing what human beings do to one another, how can we constrain our baser desires and make it less likely that they will determine policy and behavior? Conferences like CFP generate more questions than answers. But as long as the questions are raised, we maintain the margin between necessity and possibility that defines human freedom. That margin may be narrowing, but so long as it exists, our passion for freedom, justice, and compassion can still manifest itself in action as well as words. ********************************************************************** Islands in the Clickstream is a weekly column written by Richard Thieme exploring social and cultural dimensions of computer technology. Comments are welcome. Feel free to pass along columns for personal use, retaining this signature file. If interested in (1) publishing columns online or in print, (2) giving a free subscription as a gift, or (3) distributing Islands to employees or over a network, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@thiemeworks.com with the words "subscribe islands" in the body of the message. To unsubscribe, email with "unsubscribe islands" in the body of the message. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations. Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved. ThiemeWorks on the Web: http://www.thiemeworks.com ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321 ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #10.17 ************************************