Computer underground Digest Wed Jul 19, 1995 Volume 7 : Issue 61 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson CONTENTS, #7.61 (Wed, Jul 19, 1995) File 1--Senate Prayer - "Lord, save our kids from porn" File 2--Beyond the Rimm File 3--cybercensorship File 4--(fwd) Hackers busted in Colorado File 5--A response to a spammer (fwd) File 6--Exon is unknown to the public File 7--TIS CFP FYI File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 19 Jul 1995 01:53:49 -0500 From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas) Subject: File 1--Senate Prayer - "Lord, save our kids from porn" ((MODERATORS' NOTE: This isn't satire!!) prayer (Senate - June 12, 1995) [Page: S8127] The Chaplain, Dr. Lloyd John Ogilvie, offered the following prayer: Almighty God, Lord of all life, we praise You for the advancements in computerized communications that we enjoy in our time. Sadly, however, there are those who are littering this information superhighway with obscene, indecent, and destructive pornography . Virtual but virtueless reality is projected in the most twisted, sick, misuse of sexuality. Violent people with sexual pathology are able to stalk and harass the innocent. Cyber solicitation of teenagers reveals the dark side of online victimization. Lord, we are profoundly concerned about the impact of this on our children. We have learned from careful study how children can become addicted to pornography at an early age. Their understanding and appreciation of Your gift of sexuality can be denigrated and eventually debilitated. Pornography disallowed in print and the mail is now readily available to young children who learn how to use the computer. Oh God, help us care for our children. Give us wisdom to create regulations that will protect the innocent. In times past, You have used the Senate to deal with problems of air and water pollution, and the misuse of our natural resources. Lord, give us courage to balance our reverence for freedom of speech with responsibility for what is said and depicted. Now, guide the Senators as they consider ways of controlling the pollution of computer communications and how to preserve one of our greatest resources: the minds of our children and the future moral strength of our Nation. Amen. ------------------------------ Date: 17 Jul 95 08:21:57 EDT From: Lance Rose <72230.2044@COMPUSERVE.COM> Subject: File 2--Beyond the Rimm The Net did a swell job of defending its turf from errant government porn regulation by deep-sixing the badly misleading Rimm study, and causing Time magazine to recant. This certainly shows the astounding and still growing power of the Net organism. But it also raises the question: to what ends does the Net flex its muscles? For instance, the Net excels at self-protective acts against overt moves threatening the Net as a whole, like taking down the Rimm study, or making adjustments making spamming more difficult after Canter & Siegel. But what about more subtle moves? Net-based activities did not stop the FBI wiretapping act last year. Nor would they have made a dent in the Exon bill in the '94 incarnation had the telecom deregulation bills of that year stayed alive. The difference here seems to be in terms of media attention. A move with big media attention gets a big net response; a move that catches the news reporters asleep also catches the Net napping. The potential danger here is huge, and obvious. If the Net as a whole responds to mass media apperances, what is to stop those controlling the mass media from manipulating the power of the Net? Is the Net just a dumb creature that responds on a low level to dimly perceived threats to its existence, or is it (or can it be) a higher-order product of the smart minds that comprise it? As to the self-protective aspect, how well does the Net respond to events that do not rip at its very fibre? We have shining examples of a few years past -- the role of the Net in stopping the reactionary coup in Russia, and in getting out word on the repressive violent tactics of Chines gov't. leaders against students. As wonderful as these effects were, they were also a low-order use of the Net: using it as a robust communications medium. What about Net community responses to events other than those that threaten the Net as a whole? You can see the Net operate as a community to protect itself. But what else might it accomplish? Are there other social agendas or political results towards which the Net may turn its power in the future? Should there be, or should the Net be value-neutral (the issue of its very existence apart), acknowledging the diverse political views and needs of its inhabitants? ------------------------------ Date: Fri, 07 Jul 1995 15:03:06 -0400 From: christij@UNIX.ASB.COM(Joseph Christie) Subject: File 3--cybercensorship When I was a young child my momma read to me, a lot. She chose the books. When I got older the books I read were picked by her and my teachers. As I got older, I started to pick my own books from the ones made available to me by momma and my teachers. When I got a little older I was introduced to the public library. I picked out the books but they were always shown to momma for approval before I checked them out. As time went by, I started asking momma's approval less and less as my own tastes and preferrences developed but I still asked her opinion frequently. Momma was not very well educated and before the 8th grade I was reading things that she did not understand and had never been exposed to. Technical and science books as well as philosophy, religious texts other than the bible and some fiction that could be called "of questionable taste". She would sometimes look at what I was reading but I knew she didn't really understand much of it. She did not forbid me from reading things she didn't understand nor did she forbid me from reading those that she understood but did not approve, she had faith that she had instilled in me a good grounding for making my own value judgements. She knew I might sometimes make mistakes and also that sometimes I might choose to expose myself to things that she would not approve. I don't ever remember a time when momma wished that the government would step in and relieve her of the overwhelming burden of deciding what was acceptable for me to read. The term "family values" is bandied about more and more lately. Isn't responsibility one of the most important "family values" that we are expected to learn? We learn responsibility for ourselves, out pets, our family members. Much of what we learn while growing up centers around responsibility. Shouldn't parents demonstrate that responsibility by exercising control over their children rather than allowing some distant, faceless bureaucrat to dictate what is available to their family. When the discussion turns to the topic of adult material and children using computers, the politicians are saying that we are so incapable or so negligent in this particular instance that they must step in and tell us how to behave to protect our children from what the politicians don't understand themselves. How would these same parents feel if the government was trying to legislate that in order to become well rounded citizens, all children MUST be exposed to sexually explicit material by the age of say 7 or 8. It is the same principle just different particulars. We wouldn't have too much problem rallying support behind defeating that one though, would we? If the politicians were truly concerned about the welfare of children in this country their time and money could be better invested. How about some serious AIDS education? How about more money for public schools? How about let's not gut the school lunch program and the infant immunization programs? How about some real drug and alcohol education and treatment? More children die from tobacco and alcohol related death than from sex in this country, where's all the political outrage on this crisis? It is the parents themselves that must make the decisions about their own children and what they are exposed to as they grow up. Children are constantly barraged by sex in the media and in advertisements that surround them every day all day. Computers are just one more place they see it. Most of what the public and the politicians are outraged about is already illegal. Children being propositioned, children being lured away from home by perverts and pedophiles are all against laws already on the books. What we need is education not legislation. Teach the parents, don't write more laws. As Frank Zappa said, "We are a nation of laws, poorly written and randomly enforced." ------------------------------ Date: Sun, 25 Jun 1995 22:07:15 -0500 (CDT) From: David Smith Subject: File 4--(fwd) Hackers busted in Colorado ---------- Forwarded message ---------- Here is the pathetic excuse for a headline article, as printed in the Denver Post: (Note: All typos are the fools who typed this up) ROCKY MOUNTAIN NEWS (Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995) Quartet accused of hacking into Arapahoe college's system, inciting illegal acts. ---------------------------------------------- (Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys Duran) Suspects used equopment at college to incite criminal acts, officials say. Arapahoe County - Hackers calling themselves "The New Order" allegedly gained access to the Arapahoe Community College computer and used it to distribute tips on how to committ crimes. One man operated a computer bulletin board on which contributors from throughout the world exchanged how-to information on crimes ranging from credit-card fraud to high-tech burglary, authorities said. Computers were seized from the homes of four hackers, ranging in age from 15 to 21. Secret Service experts were called in to help crack the computer files. Investigators found software for breaking passwords, lists of private passwords for several computer systems, instructions for cellular telephone fraud, private credit reports, lists of credit-card numbers and electronic manuals on how to make bombs and illegal drugs. In a 97-page affidavit detailing the 18-month investigation, investigator John Davis of the Arapahoe district attorney's office said that the hackers "operate with an attitude of indifference to the rights and privacy of others and have made efforts to teach and involve others in their criminal enterprise." ((Remainder deleted)) ------------------------------ Date: Fri, 16 Jun 1995 07:01:20 +0200 From: Maurice Hendrix Subject: File 5--A response to a spammer (fwd) From--Hanno Liem ((MODERATORS' NOTE: The following post was a response to a spammer who complained about the cancelling of his posts. The spammer was not Canter and Siegel, but the comments are a perfect respose to C&S's complaints about cancelling spam)). > This evidently was in regards to a post sent to several pertinent > mailing lists, including one I operate here at my own site, When people do this I always like to say in a Monty Python manner: You do not get it. I will tell you. I hope you will get it. You spammed. We do not like spam. Spam is bad. Spam hurts the net. We like the net. So we do not like spam. In fact, we hate spam. What is spam? Spam is the same thing lots and lots of times. What is lots and lots? We will not tell you. Why? We think you might post one less, and then say it is not spam. But we will tell you this: count the things on your hands and feet. It is near that. What is spam not? Spam is not a bad post. Spam is not a bad post lots and lots of times. Spam is not a post in the wrong place. Spam is not a bad post in the wrong place lots and lots of times. Spam is the same thing lots and lots of times. We do not care what is in a spam. We do not care if it is in the right place or the wrong place. If we cared, that would be bad. If we did not like a post, we could say it is bad, so it is spam. Or we could say it is in the wrong place, so it is spam. That would be worse than spam. So we say a thing is spam if it is the same thing lots and lots of times. One more time: spam is the same thing lots and lots of times. Why is spam bad? The more times it is there, the more room it takes on each site's disk, and the more time it takes to get it to all of the sites. It should take just a small bit of room on each site's disk, and take just a small bit of time to get there. So spam is a lot of waste. Why else is spam bad? The more times it is there, the more times we have to see it. Some folks pay for their news by the note, or by the byte, or by how much time it takes them to get it. Some have to pay for each post in a group they read, and their site does not care if they read the post. So spam is not fair. Why else is spam bad? Spam makes folks mad. They post notes and say that they are mad. Lots and lots of notes. We call these notes "flames." So spam makes lots and lots of flames. Why is a small spam bad? Some folks think that if a small thing is not bad, then the same thing big is not bad too. So if a small spam is not yelled at, then there will be lots and lots of big spams. What did you do? You sent the same thing lots and lots of times. So you spammed. Spam is bad. We do not care what you said. We do not care if it was in the right place. You sent the same thing lots and lots of times. That is spam. That is bad. Some folks like to get rid of spam when they see it. We think that is good. We like them. We think they are good. When they get rid of spam, they get rid of all of it. They do not try to think if some of the posts are in the wrong place and just get rid of those ones. That would be bad. As bad as to say that a post is spam if they did not like it. No, they get rid of all of them. That is the right way to get rid of spam. Not all folks think we should do this. There are a few, like Dave Hayes, who think spam should be left there, that we should all be free to spam and spam and spam. But there are lots and lots more who think spam should be got rid of. Why are we mad at you? You spammed. But there is more: when we said we were mad, you said you did not spam. And you said few of us were mad. And you said your spam was not bad because it was in the right place. And you said that we should not get rid of it. Or that we should not get rid of the ones in the right place. You said you will do it no more. We do not know if we think that is true. Why? You said things that we think are bad. You did things that we think are bad. So we do not trust you. We think you might do it the next time you think of a thing you want lots and lots of folks to hear. How can you make us think you will do it no more, and that you are good folks? (1) Say that what you did was spam. (2) Say that what you did was bad. (3) Say that you feel bad since you did this bad thing. (4) *Then* say that you will do it no more. Then we might trust you. Then we might not be mad at you. That is not too hard for you to get, is it? ------------------------------ Date: Thu, 29 Jun 1995 10:33:07 -0500 From: m-atkinson@NWU.EDU(Michael A. Atkinson) Subject: File 6--Exon is unknown to the public It seems that most of the general public have no idea about the Exon Bill, aka the Communications Decency Act. My mother is a well-informed liberal lawyer in New York City. Speaking with her on the telephone last night, I asked her what she thought of Exon. Her response: "Huh?" She had heard of it, of course. She thought it was a great idea, because it would Protect The Children. Naturally, she was appalled when I told her what it really is about. Clearly, to get the issues out in the open where they belong, we need better national media involvement. If we could get the national media to believe (as I do) that Exon is the first step in a massive trouncing of the First Amendment, we would hopefully be able to mobilize public opinion, and defeat it. ------------------------------ Subject: File 7--TIS CFP FYI Date: Fri, 14 Jul 1995 12:16:33 -0700 From: Rob Kling CALL FOR PAPERS -- The Information Society (an International Journal) http://www.ics.uci.edu/~kling/tis.html Information and Call for Papers for "The Information Society" journal, published quarterly by Taylor & Francis Titles of articles published in Vol. 9 (1993) and Vol. 10 (1994) Subscription Form Revised [7/5/95] ----------------------------------------------------------- THE INFORMATION SOCIETY An International Journal An "information technology revolution" that can stimulate significant social change is clearly underway. The exponential growth in computational capability per unit dollar will continue at least for the next several decades. Communication bandwidth is undergoing simultaneous exponential growth. Connectivity among individuals, companies and nations is forming what some are calling cyberspace and virtual communities and new forums and formats for electronic publishing, communication and commerce. Since wealth, power and freedom of action derive from control over, access to, and effective use of, information and expertise, the shifting organization of information technologies and social life -- large scale and small scale -- is a major concern. These combined trends have stimulated discussions the relationships between technological change and social change. The term Information Society has been a key marker for many of these studies and discussions. "The Information Society" journal, published since 1981, is a key forum for thoughtful analysis of the impacts, policies, system concepts, methodologies and cultural change related to these trends. It is a refereed journal that publishes scholarly articles, position papers, short communications and book reviews. "The Information Society" is a multidisciplinary journal whose audiences include policy- and decision-makers and scientists in government, industry and education; managers concerned with the effects of the information revolution on individuals, organizations and society; and scholars with an interest in the relationship between information technologies, social/organizational life, and social change. The Information Society is undergoing a transition under the leadership of its new Editor-in-Chief, Rob Kling. This CFP lists some of the members of the new editorial board. The journal's editorial board will be experimenting with new electronic and paper formats, including a web server for abstracts and tables of contents. In addition, we are experimenting with a policy to allow authors to identify 5 people who may recieve copies of the issue in which their article appears. Rob Kling is soliciting individual articles and proposals from people who wish to organize and edit special issues. He is interested in provocative analytical articles or empirical studies that are written to advance our understanding of the relationships between information technology, related social practices and policies, and social change. TIS articles are typically 4,000-7,500 words long, and are written vividly with coherent analyses and minimal jargon. TIS also publishes shorter "position statements" of up to 2,000 words and debates in a new section, called "The Forum." Among the topics addressed within the journal are: * changing National Information Infrastructures, especially as they influence cultural expectations and social practices, * the politics of change in National Information Infrastrustures, * the implications of the coming surge in electronic data interchange (EDI) and electronic commerce among businesses globally, * the ability of companies to "outsource" portions of their information processing to different countries around the world, creating transborder data flow issues for the countries involved and increasing the rapidity with which jobs migrate globally, * meanings and implications of political/economic systems that are based on universal access to baseline information services or fees-for-all-services, * options for, and implications of, various forms of "electronic democracy", * the rise of "virtual communities" of persons worldwide engaging in "many-to-many" communication among their participants, irrespective of borders or corporate structures, * the role of place and space in visions and practice of digital libraries and electronic forums, * cultural changes in relation to cyberspace -- both empirical studies and studies of their representation in popular culture, * the structure of the information industries, including markets, industrial alliances, the character of work, and management-labor relations, * ethical dimensions in the development and use of new information technologies; and * gender issues in the development and use of new information technologies. Articles published in Vol. 9 (1993) and Vol 10( 1994) include: Kling, R., Dunlop, C. Controversies about computerization and the character of white collar worklife. 9(1), 1993. Calantone, R.J., Holsapple, C.W., Johnson, L.E. Communication and communication support: an agenda for investigation. 9(1), 1993. Schoonmaker, S. Trading on-line: information flows in advanced capitalism. 9(1), 1993. Arthur, C. Zen and the art of ignoring information. 9(1), 1993. Mankin, D. Review of Peter G.W. Keen, "Shaping the future: business design through information technology". 9(1), 1993. Kling, R. Organizational analysis in computer science. 9(2), 1993. Bikson, T.K., Law, S.A. Electronic mail use at the World Bank: messages from users. 9(2), 1993. Bikson, T.K., Law, S.A. Electronic information media and records management methods: a survey of practices in United Nations organizations. 9(2), 1993. Martin, W.J., McKeown, S.F. The potential of information and telecommunications technologies for rural development. 9(2), 1993. Lincoln, T.L., Essin, D.J., Ware, W.H. The electronic medical record: a challenge for computer science to develop clinically and socially relevant computer systems to coordinate information for patient care and analysis. 9(2), 1993. Kling, R., Covi, L. Review of Lee Sproull and Sara Kiesler "Connections: New ways of working in the networked organization". 9(2), 1993. Ware, W. The New Faces of Privacy. 9(3), 1993. Soe, L.L., Markus, M.L. Technological or social utility? Unraveling explanations of email, vmail, and fax use. 9(3), 1993. Orlikowski, W.J. Learning from Notes: organizational issues in groupware implementation. 9(3), 1993. Katz, J.E. and Hyman, M.H. Dimensions of concern over telecom privacy in the United States. 9(3), 1993. Chen, Z. Intelligence and discovery in an information society: an essay in memory of Derek de Solla Price. 9(3), 1993. Allen, J.P. Review of "Microcomputers in African development: critical perspectives". 9(3), 1993. ===================== Camp, L. Jean and J.D. Tygar. 1994. "Providing Auditing While Protecting Privacy." The Information Society. 10(1):59-71. Clarke, Roger. 1994. "Electronic Support for the Practice of Research." The Information Society.10(1):25-42. Lind. Mary, R. and Robert W. Zmud. 1994. "Employee Information Processing Behaviors Before and After a Corporate Downsizing." The Information Society. 10(1):43-58. Webster, Frank. 1994. "What Information Society?" The Information Society. 10(1):1-24. Agre, Philip E. 1994. "Surveillance and Capture: Two Models of Privacy." The Information Society. 10(2):101-128. Agre, Philip E. 1994. "Understanding the Digital Individual." The Information Society. 10(2):73-76. Allen, Jonathan P. 1994. "Mutual Control in the Newly Integrated Work Environments." The Information Society. 10(2):129-138. Clarke, Roger. 1994. "The Digital Persona and Its Application to Data Surveillance." The Information Society. 10(2):77-92. Hill, William C. and James D. Hollan. 1994. "History-Enriched Digital Objects: Prototypes and Policy Issues." The Information Society. 10(2):139-145. Kilger, Max. 1994. "The Digital Individual." The Information Society. 10(2):93-100. Chartrand, Robert Lee and Robert C. Ketcham. 1994. "Opportunities for the Use of Information Resources and Advanced Technologies in Congress: A Study for the Joint Committee on the Organized Congress." (A Consultant Report). The Information Society. 10(3):181-222. Kling, Rob. 1994. "Reading "All About" Computerization: How Genre Conventions Shape Nonfiction Social Analysis." The Information Society. 10(3):147-172. Wilson, Francis A. and John N. Wilson. 1994. "The Role of Computer Systems in Organizational Decision Making." The Information Society. 10(3):173-180. Fogelman, Martin. 1994. "Freedom and Censorship in the Emerging Electronic Environment." The Information Society. 10(4):295-303. Kraemer, Kenneth L., Dedrick, Jason and Sheryl Jarman. 1994. "Supporting the Free Market: Information Technology Policy in Hong Kong." The Information Society. 10(4):223-246. Lee, Laurie Thomas and Robert LaRose. 1994. "Caller ID and the Meaning of Privacy." The Information Society. 10(4):247-266. Mowshowitz, Abbe. 1994. "Virtual Organization: A Vision of Management in the Information Society." The Information Society. 10(4):267-288. Walsham, Geoff. 1994. "Virtual Organization: An Alternative View." The Information Society. 10(4):289-292. Mowshowitz, Abbe. 1994. "Reply to Walsham's Critique." The Information Society. 10(4):293-294. EDITORIAL BOARD (partial listing, 7/5/95) Phil Agre Department of Communications University of California, San Diego Jonathan Allen Department of Engineering Cambridge University (UK) Tora Bikson RAND Corporation Santa Monica, Ca Geoffrey Bowker Library and Information Science University of Illinois, Urbana Christine Borgman Library and Information Science University of California, Los Angeles Lewis Branscomb Kennedy School of Government Harvard University Su-Shing Chen Information Technology and Organizations National Science Foundation Andrew Clement Faculty of Information Studies University of Toronto Karen Coyle Department of Library Automation University of California Mary Culnan Department of Information Systems Georgetown University Batya Friedman Department of Computer Science Colby College Vijay Gurbaxani Graduate School of Management University of California, Irvine Suzanne Iacono Department of Information Systems Boston University Pertti Jarvinen Department of Information Systems University of Tampere (Finland) Kenneth Kraemer Center for Research on IT and Organizations and Graduate School of Management University of California, Irvine Gary T. Marx Department of Sociology University of Colorado, Boulder Richard O. Mason School of Management Southern Methodist University Mark Poster Department of History University of California, Irvine Marc Rotenberg Electronic Privacy Information Clearinghouse Washington, DC Jorge Schement School of Communication Rutgers University Doug Schuler Computer Professionals for Social Responsibility Seattle, Wa Rick Weingarten Computing Research Association Washington, DC Rolf Wigand School of Information Studies Syracuse University SUBMITTING A PAPER Please send five copies of each manuscript to the Editor-in-Chief. For manuscript format details (double spaced, single sided, etc.), contact the Editor-in-Chief, see the inside back cover of an issue of the journal or read the instructions file on the journal's web page:(URL http://www.ics.uci.edu/~kling/tis.html). (Note: TIS can accept some manuscipts via electronic submission. But this must be done with the permission and in coordination with the Editor-in-Chief, to insure that the electronic mansucsript exchange will be workable). Editor-in-chief: Professor Rob Kling Center for Research on Information Technology and Organizations 320 Berkeley Place University of California, Irvine Irvine, Ca 92717-4650 tel: (714) 824-5160 fax: (714)824-8096 email - internet: kling@ics.uci.edu http://www.ics.uci.ed u/~kling To subscribe, the following form may be clipped and mailed to the address below: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - THE INFORMATION SOCIETY Published quarterly, ISSN 0197-2243 ___ Please enter my institutional subscription to Volume 11 (1995) at US$99 ___ Please enter my personal subscription to Volume 11 (1995) at US$49 ___ Please send me a free sample copy Payment options: ___Check/Money Order Enclosed (please make checks payable to Taylor & Francis, in U.S. funds only) ___ Please charge my: ___ VISA __ MC ___ Amex Card # ________________________________ Exp date: __ Signature: ________________________________________ Telephone: ____________________________________ (required for credit card purchases) or BILL TO: (please print) Name ____________________________________________ Institution__________________________________________ Address______________________________________________ City_________________________________________________ State ____________________ Zip _______________ SHIP TO (if different): Name_________________________________________________ Institution __________________________________________ Address ______________________________________________ City _________________________________________________ State _______________________ Zip _______________ Mail this form to: Taylor & Francis Inc. 1900 Frost Road, Suite 101 Bristol PA 19007-1598 toll free: 1-800-821-8312 or fax: 1-215-785-5515 Outside the U.S. contact: Taylor & Francis Ltd. Rankine Road Basingstoke, Hampshire RG24 0PR, United Kingdom tel: +44 (0) 256 840366 fax: +44 (0) 256 479438 ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.61 ************************************