Computer underground Digest    Wed  Sep 14, 1994   Volume 6 : Issue 81
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Urban Legend Editor:  E. Greg Shrdlugold

CONTENTS, #6.81 (Wed, Sep 14, 1994)

File 1--Re: Exon Amendment -- text of existing laws
File 2--"Computer Related Crime" (Book Review)
File 3--First French book on Internet (Book Review)
File 4--Clipper T-shirts
File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud
File 6--Wiretap Bill Update
File 7--Women's Work and Informatics -- Call for Contributions
File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs
File 9--Cu Digest Header Information (last changed 11 Sep '94)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Tue, 13 Sep 1994 13:08:09 -0400 (EDT)
From: Steve Barber <sbarber@panix.com>
Subject: File 1--Re: Exon Amendment - text of existing laws

OK, so now that we've put the Exon amendment text out there (see CuD
6.79), it occurred to me that it isn't all that useful if you don't
have the text of what it proposes to amend! So here is Section 223 of
the Communications Act as it exists today, and the text of the
"safe-harbor" regulation that implements part of it.

-Steve Barber

                     ============================
FCC RESTRICTIONS ON OBSCENE AND INDECENT TELEPHONE TRANSMISSIONS

A.  STATUTE - Title 47, Section 223 of the United States Code (rev. 1989)

@ 223.  Obscene or harassing telephone calls in the District of
Columbia or in interstate or foreign communications

(a) Whoever--
   (1) in the District of Columbia or in interstate or foreign
communication by means of telephone--
     (A) makes any comment, request, suggestion or proposal which is
obscene, lewd, lascivious, filthy, or indecent;
     (B) makes a telephone call, whether or not conversation ensues, without
disclosing his identity and with intent to annoy, abuse, threaten, or
harass any person at the called number;
     (C) makes or causes the telephone of another repeatedly or
continuously to ring, with intent to harass any person at the called
number; or
     (D) makes repeated telephone calls, during which conversation
ensues, solely to harass any person at the called number; or
   (2) knowingly permits any telephone facility under his control to
be used for any purpose prohibited by this section, shall be fined not
more than $ 50,000 or imprisoned not more than six months, or both.

(b)(1) Whoever knowingly--
     (A) within the United States, by means of telephone, makes
(directly or by recording device) any obscene communication for
commercial purposes to any person, regardless of whether the maker of
such communication placed the call;
or
     (B) permits any telephone facility under such person's control to
be used for an activity prohibited by subparagraph (A), shall be fined
in accordance with title 18, United States Code, or imprisoned not
more than two years, or both.
   (2) Whoever knowingly--
     (A) within the United States, by means of telephone, makes
(directly or by recording device) any indecent communication for
commercial purposes which is available to any person under 18 years of
age or to any other person without that person's consent, regardless
of whether the maker of such communication
placed the call; or
     (B) permits any telephone facility under such person's control to
be used for an activity prohibited by subparagraph (A), shall be fined
not more than $ 50,000 or imprisoned not more than six months, or
both.
   (3) It is a defense to prosecution under paragraph (2) of this
subsection that the defendant restrict access to the prohibited
communication to persons 18 years of age or older in accordance with
subsection (c) of this section and with such procedures as the
Commission may prescribe by regulation.
   (4) In addition to the penalties under paragraph (1), whoever,
within the United States, intentionally violates paragraph (1) or (2)
shall be subject to a fine of not more than $ 50,000 for each
violation. For purposes of this paragraph, each day of violation shall
constitute a separate violation.
   (5)(A) In addition to the penalties under paragraphs (1), (2), and (5),
whoever, within the United States, violates paragraph (1) or (2) shall
be subject to a civil fine of not more than $ 50,000 for each
violation. For purposes of this paragraph, each day of violation shall
constitute a separate violation.
     (B) A fine under this paragraph may be assessed either--
       (i) by a court, pursuant to civil action by the Commission or any
attorney employed by the Commission who is designated by the
Commission for such purposes, or
       (ii) by the Commission after appropriate administrative proceedings.
   (6) The Attorney General may bring a suit in the appropriate
district court of the United States to enjoin any act or practice
which violates paragraph (1) or (2). An injunction may be granted in
accordance with the Federal Rules of Civil Procedure.

(c)(1) A common carrier within the District of Columbia or within any
State, or in interstate or foreign commerce, shall not, to the extent
technically feasible, provide access to a communication specified in
subsection (b) from the telephone of any subscriber who has not
previously requested in writing the carrier to provide access to such
communication if the carrier collects from subscribers an identifiable
charge for such communication that the carrier remits, in whole or in
part, to the provider of such communication.
   (2) Except as provided in paragraph (3), no cause of action may be
brought in any court or administrative agency against any common
carrier, or any of its affiliates, including their officers,
directors, employees, agents, or authorized representatives on account
of--
     (A) any action which the carrier demonstrates was taken in good
faith to restrict access pursuant to paragraph (1) of this subsection;
or
     (B) any access permitted--
       (i) in good faith reliance upon the lack of any representation
by a provider of communications that communications provided by that
provider are communications specified in subsection (b), or
       (ii) because a specific representation by the provider did not
allow the carrier, acting in good faith, a sufficient period to
restrict access to communications described in subsection (b).
   (3) Notwithstanding paragraph (2) of this subsection, a provider of
communications services to which subscribers are denied access
pursuant to paragraph (1) of this subsection may bring an action for a
declaratory judgment or similar action in a court. Any such action
shall be limited to the question of whether the communications which
the provider seeks to provide fall within the category of
communications to which the carrier will provide access only to
subscribers who have previously requested such access.

B. FCC REGULATION - Title 47, Section 64.201 of the Code of Federal
   Regulations

                 Restrictions on obscene or indecent telephone
                               message services.

                                 47 CFR 64.201

   It is a defense to prosecution under section 223(b) of the
Communications Act of 1934, as amended, 47 U.S.C. 223(b), that the
defendant has taken one of the actions set forth in paragraph (a),
(b), or (c) of this section to restrict access to prohibited
communications to persons eighteen years of age or older, and has
additionally complied with paragraph (d) of this section, where
applicable:

   (a) Requires payment by credit card before transmission of the message; or

   (b) Requires an authorized access or identification code before
transmission of the message, and where the defendant has:

   (1) Issued the code by mailing it to the applicant after reasonably
ascertaining through receipt of a written application that the
applicant is not under eighteen years of age; and

   (2) Established a procedure to cancel immediately the code of any
person upon written, telephonic or other notice to the defendant's
business office that such code has been lost, stolen, or used by a
person or persons under the age of eighteen, or that such code is no
longer desired; or

   (c) Scrambles the message using frequency inversion techniques so
that it is unintelligible and incomprehensible to the calling party
without use of a descrambler by the calling party; and

   (d) Where the defendant is a message sponsor or subscriber to mass
announcement services tariffed at this Commission and such defendant
prior to the transmission of the message has requested in writing to
the carrier providing the public announcement service that calls to
his message service be subject to billing notification as an adult
telephone message service.

------------------------------

Date: Mon, 05 Sep 1994 15:11:36 -0600 (MDT)
From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
Subject: File 2--"Computer Related Crime" (Book Review)

BKCMRLCR.RVW  940622

Loompanics Unlimited
P.O. Box 1197
Port Townsend, WA  98368
loompanx@pt.olympus.net
"Computer Related Crime", 1-55950-027-1, U$10.00

This purports to be Field Circular 19-146 of the US Army Military Policy
School.  Supposedly intended for US Army Criminal Investigation (Defence?)
Command Special Agents only, it appears to be an unauthorized photocopy of a
typed government document.  No date is included in any of the supposed
government material:  the Loompanics copyright date is 1990.

It doesn't really matter if this is an official government document or not.
The material is fairly pedestrian:  after a reasonably detailed set of
instructions on how to exercise a search warrant for computer equipment
(although not how to analyze the equipment, once you have it), the bulk of the
book defines various types of computer crimes.  Much of this would have serious
data security types going, "Well, maybe ...," but, at the same time, it isn't
bad enough as to indicate that American military policy are being misinformed
in what is, after all, a specialized topic.

A possibly interesting bit of arcana for the well-stocked data security
library.

copyright Robert M. Slade, 1994   BKCMRLCR.RVW  940622

                        ======================
DECUS Canada Communications, Desktop, Education and Security group newsletters
Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
Author "Robert Slade's Guide to Computer Viruses" (Sept. '94) Springer-Verlag

------------------------------

Date: 06 Sep 1994 12:47:08 GMT
From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat)
Subject: File 3--First French book on Internet (Book Review)

                 New Book in Franch Language: INTERNET

Internet is now available from Editions JCI, Inc. (2700 Joliette #201,
Montreal, Quebec, H1W 3G9, Canada)

The *Internet* book goes beyond all business school case studies and
descriptions of Internet tools, teaching French readers how to effectively
use the Internet to boost sales and cut costs. Through real world
examples and expert advice, you'll learn how to use the Internet to
build European/international market share, track down business leads,
communicate with colleagues, search online databases, provide cost-
effective customer support and access time-critical information.

You'll also explore the many business opportunities now available on
the Internet and get tips on shopping for the best deal on Internet access
and cybel-mail space.

Just as importantly you'll learn about the culture of the Internet, find
out what type of advertising is acceptable and can generate a positive
response, and which forms are verboten and can provoke community
hostility (the famous 'nethiquette').

The *Internet* also contain detailed descriptions of the author's first-
hand and experienced experience in doing business on the Internet. Co-
author Jean-Bernard Condat is a veteran information science writer and
publisher of electronic newsletter that tracks trends and developments
in electronic newspaper and magazine publishing. Co-author Nicolas Pioch
is the conceptor of WebLouvre--Paris, the first consulted WWW in Europe
(http://www.enst.fr/~pioch).

Here's the basic information:

Jean-Bernard Condat & Nicolas Pioch, "Internet", J.C.I. Inc., Oct. 1994,
224 pages, 195 FF (CAN$29.95), ISBN 2-921599-06-6.

Table des Matieres:

     1. Preface; 2. Premieres notions; 3. Documentation Internet; 4. Le
     courrier electronique; 5. Smileys (emoticons); 6. telnet; 7. Formats
     de fichiers; 8. FTP; 9. Archie; 10. Prospero; 11. Usenet/newsgroups;
     12. Netiquette; 13. WAIS; 14. Gopher; 15. WWW; 16. cryptographie;
     17. Adresses utiles; 18. MacTCP/PPP; Index.

Note that you can receive more information on this publication by ordering
it direct from:

     - Diffulivres, Canada: +1 514 738 2911, fax: +1 514 738 8512;
     - Distique, France: +33 37 34 84 84, fax: +33 37 30 78 65;
     - Context SA, Belgium: +32 41 40 19 82, fax: +32 41 490 19 82;
     - Micro-Distribution, Switzerland: +41 227843482, fax +41 227840945.

Don't hesitate to contact us for more information on Internet... in France.

Jean-Bernard Condat,  47 rue des Rosiers,  93404  St-Ouen  Cedex,  France
Tel: +33147874083, Fax: +33149450129, Alphapage: +3336605050 code 0030006
Email: JeanBernard_Condat@Email.FranceNet.FR  *or* an113309@anon.penet.fi

------------------------------

Date: 7 Sep 1994 20:40:52 -0700
From: normh@CRL.COM(Norman J Harman)
Subject: File 4--Clipper T-shirts

    Information and opposition to the Clipper proposal is strong
on the Internet.  But it is far too unknown to the 'outside'
community.  Everyone concerned by this issue should inform
all the people they know of its implications.  One way to
increase awareness and show your opinion is to wear it:).

    I would like to offer an anti Clipper/Skipjack T-shirt.
They would be white with black printing and cost
approximately $5.00 plus $2.90 shipping to US locations.
That is the cost to produce one shirt.  I am trying to
spread awareness not make money.

    I need to know if people are interested in this idea and
what should the shirts say?

Two quick ideas are:
    "Skip Skipjack"
    or
    "Just Say No to Clipper"

    Please send comments, suggestions, and questions to
normh@crl.com.  If more than a few people are interested I
will go ahead and have the shirts made and post how to get
one.

    A worthy cause is better if it benefits another good cause
so the shirts will be silk-screened by Zerolith, part of a
non-profit organization that employs, shelters, and assists
homeless youth.  If you would like to talk with Zerolith or
donate money directly here is how to contact them.

         Zerolith
         3075 21st Street
         San Francisco, CA 94110-2626
         415.641.1014 voice
         415.641.1474 fax


--
Norman J. Harman Jr.                               o  o   Smiley Systems
normh@crl.com                                      \__/   San Francisco, CA

------------------------------

Date: Tue, 13 Sep 1994 11:19:22 (CDT)
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud


(AP WIRE - Thurs, Sept. 8, 1994)

     NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other
hackers used computers to steal credit card numbers and used them to
buy $210,000 in gold coins and high-tech hardware, federal prosecutors
said Wednesday (Sept 8, '94).

The nine-count indictment unsealed Wednesday charged five men from
Louisana and one from New York with conspiracy, computer fraud, access
device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said.

Some fo their hacker nicknames were included. They were identified as
Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher
"Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James
McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y.

------------------------------

From: email list server <listserv@SUNNYSIDE.COM>
Date: Mon, 12 Sep 1994 09:29:49 -0700
Subject: File 6--Wiretap Bill Update

                         Wiretap Bill Update

The Electronic Privacy Information Center (EPIC) and Voters Telecomm
Watch (VTW) are urging concerned individuals and organizations to
help stop the FBI Wiretap Bill.  Congress is now back in session and your
support is critical.  The attached alert from VTW provides contact info
for the relevant Congressional representatives.

EPIC is a project of the Fund for Constitutional Government and Computer
Professionals for Social Responsibility.  For additional information,
send e-mail to <info@epic.org>.

      =========================================================


Subject--ACTION--Fight US bills--SB 2375 & HR 4922
From--shabbir@panix.com (Shabbir J. Safdar)
Date--11 Sep 1994 23:44:50 -0400

**********************************************************

     DISTRIBUTE WIDELY (though no later than October 1, 1994)

**********************************************************
[If you've only got 2 minutes, skip down to the "What You Can Do"
 section.]

[Washington insiders say the phone calls and faxes (especially to
 Rep Jack Brooks) are starting to attract significant attention, and
 many people prophesize that the bill won't even have time to pass
 this session.  Thanks for your efforts!]

The FBI's Wiretap bills (also known as the DT - Digital Telephony bills)
mandate that *all* communications carriers must provide wiretap-ready
equipment so that the FBI can more easily implement their court-ordered
wiretaps more easily.  The costs of re-engineering all communications
equipment will be borne by the government, industry and consumers.

The bill is vague and the standards defining "wiretap ready" do not
exist.  Furthermore, the FBI has yet to make a case which demonstrates
that they have been unable to implement a wiretap.

There are fewer than 1,000 court ordered surveillances per year.  Even if
all of them are wiretaps, and even if all of them require the changes
mandated by this legisation, are we as a nation prepared to build
eavesdropping features into the phones of 250 million people, in order
to justify these wiretaps?  None of these wiretaps has been demonstrated
to be unimplementable, nor has it been proven that the cases could not
be made with other methods of electronic surveillance.

The Voters Telecomm Watch (VTW) does not believe the FBI has made a
compelling case to justify that all Americans give up their privacy.
Furthermore, the VTW does not believe the case has been made to justify
spending 500 million Federal dollars over the next 4 years to
re-engineer equipment to compromise privacy, interfere with
telecommunications privacy, and fulfill an unproven government need.


WHAT YOU CAN DO
                           ===============
You can help stop this legislation before it is too late!
Phone/Fax/Write to each of the people below.  It should take
about two minutes a piece.


        . Rep. Jack Brooks (his Judiciary Committee must approve the bill
                            before it can be voted upon by the full House)
          DC Phone: (202) 225-6565, TX Phone: (409) 839-2508
          DC Fax: (202) 225-1584
          Also try Judiciary Comm. fax at (202) 225-3951
          US Mail: RHOB 2449, Washington DC 20515

        . Senator Patrick Leahy (the Senate sponsor of the bill)
          DC Phone: (202) 224-4242, VT Phone: (802) 863-2525
          DC Fax: (202) 224-3595
          US Mail: SR 433, Washington DC 20510
          email: senator_leahy@leahy.senate.gov

        . Rep. Don Edwards (the House sponsor of the bill)
          DC Phone: (202) 225-3072, CA Phone: (408) 345-1711
          DC Fax: (202) 225-9460
          US Mail: 2307 RHOB, Washington DC 20515

        . Your two Senators

        . Your Representative

Tell them you are opposed to the FBI's Wiretap legislation.  Feel
free to use the sample communique below:

SAMPLE COMMUNIQUE
                          =================

   Dear __________,

   The recent Digital Telephony bills (HR 4922 & SB 2375) disturb me
   greatly.  The FBI has not yet made their case to the public that we
   need to build wiretap functionality into the telephones of 250
   million people to justify wiretaps which have not yet been proven to
   be difficult to implement.

   The bills would clearly compromise the privacy of all Americans with
   no counterbalancing benefit to either law enforcement or the public.
   The FBI has not demonstrated the need, and the cost is uncalculated,
   but is known to be at least 500 million tax dollars.

   Furthermore, the standards are undefined, as are the bodies that
   would enact these standards.

   For these reasons, I am opposed to the Digital Telephony bills
   (HR 4922 & SB 2375).

   Sincerely,

   _______________________

If you get a response from your legislator, drop us a note at
vtw@vtw.org.  We track legislator positions on privacy-related issues
such as this one.

For more information about the Digital Telephony bills, check the
Voters Telecomm Watch gopher site (gopher.panix.com) or contact Steven
Cherry, VTW Press Contact at (718) 596-2851 or stc@vtw.org.

VTW posts a Digital Telephony FAQ monthly to several Usenet newsgroups
including comp.org.cpsr.talk and comp.org.eff.talk.  Look for it or
contact us at vtw@vtw.org for a copy.

------------------------------

Date: Tue, 16 Aug 1994 01:06:35 +0200
From: email list server <listserv@SUNNYSIDE.COM>
Subject: File 7--Women's Work and Informatics - Call for Contributions

Women's Work and Informatics

Call for Contributions

Please forward this call - Please forward this call - Please forward this call


"Women's Work and Informatics" (Frauenarbeit und Informatik) is the name of
a Special Interest Group founded eight years ago in the German Society for
Informatics (Gesellschaft fuer Informatik). Today our group has about 500
members and is a forum for female computer professionals to exchange
experi ences in the discipline and in the various work situations.
Our general aim is to increase the influence of women on the design and
application of information technology. 12 local and thematic working groups
are concerned with topics like women's research, promotion of women,
motivation and encouragement of young women, the installation of an experts
network, etc. In addition we are member of the national council of women's
organisations to emphasize the interests of female technicians in the
political environ ment.
The next issue of our biannual journal "Frauenarbeit und Informatik" will
focus on international perspectives and we hope to get your contributions
from all over the world!!!

Possible Contents
In the following we summarize some possible aspects of the issue. Please
keep in mind that we are collecting for a journal - so we are interested in
articles as well as in brief information boxes, statistics, comments, etc.
And of course the following points must not cover the national or
professional situation as a whole; informations about special branches,
situations, problems and solutions are also important, details appearing
trivial or obvious to you might be new for a german readership!

1)      The "One-Minute-Contribution":
An international issue demands an international cover and here we need your
help:
Please send us the title "Women's Work and Informatics" in your native
tongue and writing!!

2)      Figure data:
- General employment rate of women in your country?
- Women's proportion in technical studies?
- Women's proportion in the field of EDP professions?
- How does this field look like (job titles, the demanded
education/training, etc.)?...

3)      Women's Advancement:
- at university in the field of computer science
- in industrial or govermental EDP-area, in your company?
- Possibilities of part time work? of child care? of reengagement and
further training?...

4)      Amalgamations of women in computing:
Do you join or know a professional organization, a network in your country?
How is it organized, are there regular or irregular publications, what are
the main aims and acitivities?...
(Adresses and short description welcome for the planned index!)

5)      Gender specific aspects of the influence of IT on the labour market?
6)      Women's Research in the computing field (possibilities,
experiences, results...)?
7)      Lust but not least: Feel free to describe whatever is important for you.

Formal conditions:
Articles:       should not exeed 1.500 words.
Language:     English or German.
References:  Alphabetical order at the end of the article.
Artwork:      Sorry - but we don't have colour print
                     If the artwork not your own, please clear up the copyright.

Deadline:      September 30, 1994


Please send your contribution to the woman contacting you or to one of the
following addresses:

Roswitha Behnke
Mayskamp 8
D-45357 Essen
Germany
behnke@iug.uni-dortmund.de

Veronika Oechtering
Jenaer Str. 39
D-28215 Bremen
Germany
oechteri@informatik.uni-bremen.de

Doris Koehler
Wittmunder Str. 15
D-28219 Bremen
Germany
koehler@rrz.uni-hamburg.de

------------------------------

Date: Fri, 9 Sep 1994 22:26:17 -0700
From: Jim Warren <jwarren@WELL.SF.CA.US>
Subject: File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs

SAN FRANCISCO [ELECTRONIC] EXAMINER OFFERS CANDIDATES FREE WEB EXPOSURE

Date--07 Sep 94 23:57 GMT
From--GULKER@AppleLink.Apple.COM (S F Examiner, Chris Gulker,APD)

Distribute widely, please

As a service to the community, The Electric Examiner is offering free
Internet publishing to candidates for office who will appear on Bay
Area ballots.  Internet users with access to the World Wide Web via
Mosaic, Lynx or other browser software can access these files as noted
below

While it is anticipated that candidates will mainly offer text files
like position statements, speeches and schedules, The Examiner's World
Wide Web server also supports photos, graphics and short clips of
audio and video.

Candidates can e-mail files to chrisg@sfgate.com for inclusion on the
server.  Each candidate will be granted an equal heading and space up
to the limits reserved for this project.

Candidates who do not have e-mail access can send files on 3.5-inch
diskette in either DOS/Windows or Macintosh format to
   Chris Gulker
   Candidates Internet Project
   San Francisco Examiner
   110 Fifth Street
   San Francisco, CA 94103

Candidates offerings will be published at Uniform Resource Locator (URL):
   http://sfgate.com/examiner/candidates/

The Uniform Resource Locator of  The Electric Examiner is:
   http://sfgate.com/examiner/

File formats:

Text must be in plain ASCII format - this option is offered by most word
processors.  Photos and graphics should be in Compuserve GIF format and
should be sized to no more than 4 inches in the longest dimension at 72 dots
per inch.  Audio files should be in 'AU' format, video can be in either MPG
or Quicktime format - these should be brief clips.

The Electric Examiner is the World Wide Web service of The San Francisco
Examiner.

                                 ===

Thanks to both Phil Agre <pagre@weber.ucsd.edu> and brad@ape.com (Brad
Schrick) for fastly-forwarding this hot-stuff.  --jim

 &&&&&&&&&&&&&&&&&&&&

INTERNET HOSTS: HOST-COUNTS AND EXPENDITURES/GROSS-NATIONAL-PRODUCT
[ smaller number is better ]

From: Tony Rutkowski <amr@isoc.org> via farber@eff.org Wed Sep 7 1994

         GNP/GDP Compared to Internet Hosts in July 1994
                        by Eric Arnum*

Top-Level    Country   July 1994                          GNP/Host
Domain Name   Code   Internet Hosts      GNP/GDP Total      Ratio
    ------------------------------------------------------------------
Iceland         is          3,268       $4,200,000,000       1.29
Finland         fi         49,598      $80,600,000,000       1.63
Norway          no         38,759      $72,900,000,000       1.88
Australia       au        127,514     $280,800,000,000       2.20
USA            var      2,044,791   $5,700,000,000,000       2.79
New Zealand     nz         14,830      $46,200,000,000       3.12
Sweden          se         53,294     $202,500,000,000       3.80
Canada          ca        127,516     $521,500,000,000       4.09
Netherlands     nl         59,729     $249,600,000,000       4.18
Czech Republic  cz          5,639      $25,600,000,000       4.54
Switzerland     ch         47,401     $238,050,000,000       5.02
U.K.            uk        155,706     $915,500,000,000       5.88
South Africa    za         15,595      $96,000,000,000       6.16

World Median    ww      3,212,000  $19,850,690,000,000       6.18

Israel          il          8,464      $56,400,000,000       6.66
Denmark         dk         12,107      $91,100,000,000       7.52
Austria         at         20,130     $164,100,000,000       8.15
Chile           cl          3,703      $30,500,000,000       8.24
Germany         de        149,193   $1,300,000,000,000       8.71
Slovak Republic sk            868       $9,300,000,000      10.71
Singapore       sg          4,014      $43,200,000,000      10.76
Costa Rica      cr            544       $5,900,000,000      10.85
Hungary         hu          5,390      $60,100,000,000      11.15
Portugal        pt          4,518      $50,700,000,000      11.22
Ireland         ie          3,308      $39,200,000,000      11.85

R.o.W. Median (not USA) 1,180,387  $14,150,690,000,000      11.99

Belgium         be         12,107     $171,800,000,000      14.19
France          fr         71,899   $1,033,700,000,000      14.38
Taiwan          tw         10,314     $150,800,000,000      14.62
Luxembourg      lu            420       $7,830,000,000      18.64
Poland          pl          7,392     $162,700,000,000      22.01
South Korea     kr         12,109     $273,000,000,000      22.55
Spain           es         21,147     $487,500,000,000      23.05
Liechtenstein   li             27         $630,000,000      23.33
Greece          gr          2,958      $77,600,000,000      26.23
Kuwait          kw            297       $8,750,000,000      29.46
Croatia         hr            838      $26,300,000,000      31.38
Japan           jp         72,409   $2,370,000,000,000      32.73
Mexico          mx          5,164     $172,400,000,000      33.38
Malaysia        my          1,322      $44,900,000,000      33.96
Slovenia        si            574      $21,000,000,000      36.59
Ecuador         ec            256      $11,500,000,000      44.92
Italy           it         23,616   $1,090,000,000,000      46.16
Brazil          br          5,896     $358,000,000,000      60.72
Nicaragua       ni             23       $1,600,000,000      69.57
Turkey          tr          1,204      $91,780,000,000      76.23
Thailand        th          1,197      $92,000,000,000      76.86
Uruguay         uy            101       $9,100,000,000      90.10
Venezuela       ve            399      $52,300,000,000     131.08
Romania         ro            453      $71,900,000,000     158.72
Cyprus          cy             38       $6,100,000,000     160.53
Panama          pa             24       $5,000,000,000     208.33
Tunisia         tn             46      $10,900,000,000     236.96
Macau           mo             12       $3,100,000,000     258.33
Fiji            fj              5       $1,300,000,000     260.00
Colombia        co            144      $45,000,000,000     312.50
Argentina       ar            248     $101,200,000,000     408.06
Bulgaia         bg             79      $36,400,000,000     460.76
Peru            pe             42      $25,150,000,000     598.81
Philippines     ph             65      $47,000,000,000     723.08
Egypt           eg             52      $39,200,000,000     753.85
Ukraine         ua            339     $339,200,000,000   1,000.59
India           in            316     $328,000,000,000   1,037.97
China           cn            325     $452,000,000,000   1,390.77
Indonesia       id             54     $116,200,000,000   2,151.85
Russia          ru            322     $800,000,000,000   2,484.47
Algeria         dz              7      $54,000,000,000   7,714.29
Moldova         md              2      $16,900,000,000   8,450.00
Iran            ir              4      $90,000,000,000  22,500.00
Saudi Arabia    sa              1     $104,000,000,000 104,000.00
Yugoslavia      yu              1     $159,000,000,000 159,000.00
Czechoslovakia  cs          1,869                   $0       0.00
Soviet Union    su          3,145                   $0       0.00
Educational    edu        856,234
Commercial     com        774,735
Government     gov        169,248
Military       mil        130,176
Organization   org         66,459
Networks       net         30,993
US Int'l        us         16,556
International  int            315
Puerto Rico     pr             75
Antarctica      aq              4
Hong Kong       hk          9,141                  n/a
Estonia         ee            659                  n/a
Latvia          lv            180                  n/a
Lithuania       lt             53                  n/a

                                       n/a GNP figures not available

Sources: Internet hosts: Mark Lottor, Network Wizards,
         GNP figures: Groliers Encyclopedia,
         Ratios: EMMS.

*by permission to Internet Society

------------------------------

Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 9--Cu Digest Header Information (last changed 11 Sep '94)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493
          In BELGIUM: Virtual Access BBS:  +32.69.45.51.77 (ringdown)

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #6.81
************************************