Computer underground Digest Sun April 30, 1995 Volume 7 : Issue 34 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Desecrator: Emo Shrdlu CONTENTS, #7.34 (Sun, April 30, 1995) File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!) File 2--Clipper paper available for anon FTP File 3--New Maillist battles Omnibus Terrorism Bill/Join NOW! (fwd) File 4--Ohio Job Opening File 5--making reality acceptable: cybercafe @ compress File 6--Playing to Win in DC June 1-4 File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Thu, 27 Apr 1995 02:14:46 -0400 From: "Robert A. Rosenberg" <hal9001@PANIX.COM> Subject: File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!) ((MODERATORS' NOTE: We've received number of posts regarding the so-called "Good Times" virus, and "warnings" have appeared on many of the news groups we read. The following is unlikely to end it until it's time to pay the modem tax)). Originally from: <AMEND1-L%UAFSYSB.BITNET@UGA.CC.UGA.EDU> At 18:04 4/26/95, 00bawhelchel@bsuvc.bsu.edu wrote: [Another "Good Times" Virus Warning] Here we go again <g>. The "Good Times Virus" is a Urban Legend. In reality it is composed of the mass mailing of spurious warnings like the above from those who (admittedly) are trying to be helpful. Here is the real story (Note that date on the warning to see how long this BS has been going on). ================================================================ CIAC Notes Number 94-04c:December 8, 1994 Welcome to the fourth issue of CIAC Notes! This is a special edition to clear up recent reports of a "good times" virus-hoax. Let us know if you have topics you would like addressed or have feedback on what is useful and what is not. Please contact the editor, Allan L. Van Lehn, CIAC, 510-422-8193 or send E-mail to ciac@llnl.gov. Reference to any specific commercial product does not necessarily constitute or imply its endorsement, recommendation or favoring by CIAC, the University of California, or the United States Government. THE "Good Times" VIRUS IS AN URBAN LEGEND In the early part of December, CIAC started to receive information requests about a supposed "virus" which could be contracted via America OnLine, simply by reading a message. The following is the message that CIAC received: Here is some important information. Beware of a file called Goodtimes. Happy Chanukah everyone, and be careful out there. There is a virus on America Online being sent by E-Mail. If you get anything called "Good Times", DON'T read it or download it. It is a virus that will erase your hard drive. Forward this to all your friends. It may help them a lot. THIS IS A HOAX. Upon investigation, CIAC has determined that this message originated from both a user of America Online and a student at a university at approximately the same time, and it was meant to be a hoax. CIAC has also seen other variations of this hoax, the main one is that any electronic mail message with the subject line of "xxx-1" will infect your computer. This rumor has been spreading very widely. This spread is due mainly to the fact that many people have seen a message with "Good Times" in the header. They delete the message without reading it, thus believing that they have saved themselves from being attacked. These first-hand reports give a false sense of credibility to the alert message. There has been one confirmation of a person who received a message with "xxx-1" in the header, but an empty message body. Then, (in a panic, because he had heard the alert), he checked his PC for viruses (the first time he checked his machine in months) and found a pre-existing virus on his machine. He incorrectly came to the conclusion that the E-mail message gave him the virus (this particular virus could NOT POSSIBLY have spread via an E-mail message). This person then spread his alert. As of this date, there are no known viruses which can infect merely through reading a mail message. For a virus to spread some program must be executed. Reading a mail message does not execute the mail message. Yes, Trojans have been found as executable attachments to mail messages, the most notorious being the IBM VM Christmas Card Trojan of 1987, also the TERM MODULE Worm (reference CIAC Bulletin B-7) and the GAME2 MODULE Worm (CIAC Bulletin B-12). But this is not the case for this particular "virus" alert. If you encounter this message being distributed on any mailing lists, simply ignore it or send a follow-up message stating that this is a false rumor. Karyn Pichnarczyk CIAC Team ciac@llnl.gov WHO IS CIAC? CIAC is the U.S. Department of Energy's Computer Incident Advisory Capability. Established in 1989, shortly after the Internet Worm, CIAC provides various computer security services free of charge to employees and contractors of the DOE, such as: Incident Handling consulting, Computer Security Information, On-site Workshops, White-hat Audits. CIAC is located at Lawrence Livermore National Laboratory and is a part of its Computer Security Technology Center. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CONTACTING CIAC If you require additional assistance or wish to report a vulnerability, call CIAC at 510-422-8193, fax messages to 510-423-8002 or send E-mail to ciac@llnl.gov. ATTENTION: For emergencies and off-hour assistance, CIAC is available 24-hours a day to DOE and DOE contractors via an integrated voicemail and SKYPAGE number. To use this service, dial 1-510-422-8193 or 1-800-759-7243 (SKYPAGE). The primary SKYPAGE PIN number, 8550070 is for the CIAC duty person. A second PIN, 8550074 is for the CIAC Project Leader. Keep these numbers handy. CIAC's ELECTRONIC PUBLICATIONS Previous CIAC Bulletins and other information are available via anonymous FTP from ciac.llnl.gov. CIAC has several self-subscribing mailing lists for electronic publications: 1. CIAC-BULLETIN for Advisories, highest priority - time critical information, and Bulletins, important computer security information; 2. CIAC-NOTES for Notes, a collection of computer security articles; 3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI) software updates, new features, distribution and availability; 4. SPI-NOTES, for discussion of problems and solutions regarding the use of SPI products. Our mailing lists are managed by a public domain software package called ListProcessor, which ignores E-mail header subject lines. To subscribe (add yourself) to one of our mailing lists, send requests of the following form: subscribe list-name LastName, FirstName PhoneNumber as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for "LastName" "FirstName" and "PhoneNumber." Send to: ciac-listproc@llnl.gov (NOT to: ciac@llnl.gov) e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36 subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36 You will receive an acknowledgment containing address and initial PIN, and information on how to change either of them, cancel your subscription, or get help. To subscribe an address which is a distribution list, first subscribe the person responsible for your distribution list. You will receive an acknowledgment (as described above). Change the address to the distribution list by sending a second E-mail request. As the body of this message, substitute valid information for "list-name," "PIN", and "address of the distribution list" when sending E-mail to ciac-listproc@llnl.gov: set list-name address PIN distribution_list_address e.g., set ciac-notes address 001860 remailer@tara.georgia.orb To be removed from a mailing list, send the following request via E-mail to ciac-listproc@llnl.gov: unsubscribe list-name e.g., unsubscribe ciac-notes For more information, send the following request: help If you have any questions about this list, you may contact the list's owner: listmanager@cheetah.llnl.gov. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. End of CIAC Notes Number 94-04c 94_12_08 UCRL-MI-119788 ------------------------------ Date: Thu, 27 Apr 1995 15:24:59 -0400 (EDT) From: Michael Froomkin <mfroomki@UMIAMI.IR.MIAMI.EDU> Subject: File 2--Clipper paper available for anon FTP My paper, "The Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution" is now available for anonymous FTP. It is about 180pp. long, and contains more than 800 references. I would welcome your feedback on this paper -- even (especially?) contributions to the inevitable errata sheet. (Please note this docment resides at what is officially a "temporary" site, so that if you create a web link to it, please let me know so that I can notify you when it moves). Contents of FTP://acr.law.miami.edu/pub/.. File Type --------------- ---------- clipper.asc ASCII clipper.wp WP 5.1/Dos clipperwp.zip Pkzipped version of clipper.wp clipper.ps My best effort at Postscript. YMMV. (approx. 7Mb.) clipperps.zip Pkzipped version of clipper.ps clipper.ps.gz Gzipped version of clipper.ps Ports provided by nice people (please note I have not checked these) ------------------------------------------------------------------------ clipper.ps.Z Unix compressed version of clipper.ps with carriage returns removed -- courtesy of Whit Diffie clipperMSW.sea.hqx Binhexed self-extracting Microsoft Word 5.1 for Macintosh version of clipper.wp -- courtesy of Ted Byfield None of these files contains correct and final page numbers, and there are generally trivial typos that were corrected in the printed version. The printed version appears at 143 U.Penn.L.Rev. 709 (1995). I intend to put up a web version presently. The .index file in the above directory will have details when a clean copy is ready for prime time. A link to an experimental and highly buggy HTMLized version may appear at erratic intervals at http://acr.law.miami.edu at the very bottom of the homepage. A.Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | U.Miami Law School | MFROOMKI@UMIAMI.IR.MIAMI.EDU PO Box 248087 | Coral Gables, FL 33146 USA | It's warm here. ------------------------------ Date: Fri, 28 Apr 95 13:18:13 EDT From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU> Subject: File 3--New Maillist battles Omnibus Terrorism Bill (fwd) Obviously, CUD would be impacted by this legislation if enacted, as would we all. =========================== W. K. Gorman <bj496@Cleveland.Freenet.Edu> Copyright (C) 1995 by W. K. Gorman. With explicit reservation of all rights, exclusively and without prejudice, per UCC 1-207. Any commercial or for-profit use of all or any part of this message, in any form, is expressly forbidden. Opinions are my own. ----------------------------Original message---------------------------- Date--Fri, 28 Apr 1995 03:43:29 -0400 From--pc-man@netaxs.com (Howard L. Bloom) Subject--New Maillist battles Omnibus Terrorism Bill/Join NOW! The Omnibus Counterterrorism Bill was languishing in Congress before The Oklahoma Bombing. It is now on the fast track and needs to be stopped or at least changed drastically so that it does not infringe on our rights as Citizens. A concise description of what this bill represents follows the subscribe information to this list. Please post information relevant to fighting or making this bill more constitutional as this bill in both the house and senate makes a mockery of the constituiton. This is a non-partison issue that has people on the right, the left and the middle raising eyebrows. THIS IS NOT A RIGHT WING ANGRY WHITE MALE ISSUE! The listowner (me) is an Angry White Jewish Male who sees grave dangers should it be voted on in its present state. This list is not going to be a discussion list about whether the bill is good or bad, I think it is bad and it is my list. So, if you think it is good, then feel free to join, but do not inhibit or dilute the momentum of this list. I am a private individual who pays for the list traffic on the webcom.com service. If you would like to join you must decide whether you wish to join the reflected list where each message sent creates a new message in your mailbox, or the digest which lumps them all together for the day and sends many messages in one email post. To Join, send a message to one of the following addresses: Tono-terrorism-bill-request@webcom.com (this is the refelected list) Tono-terrorism-bill-digest-request@webcom.com (this is the digest) Fromyou Subject(please leave the subject blank) ------------------------------------------------- in the body of the message put just one word, the word "subscribe" You do not have to put your name or email address. And now a description of the Terrorism Bill Omnibus Counterterrorism Bill - S. 390 and H.R. 896 New FBI Charter To Investigate Political Groups February 10, 1995 the Omnibus Counterterrorism Bill was introduced as S. 390 into the Senate and as H.R. 896 in the House. It was initiated by the FBI, and passed on by the Justice Department and the White House. Senators Biden (D-DE) and Specter (R-PA) initiated it in the Senate, Rep. Schumer (D-NY) and Dicks (D-WA) in the House. It has bipartisan support and could get expedited action. Summary * This is a general charter for the FBI and other agencies, including the military, to investigate political groups and causes at will. The bill is a wide-ranging federalization of different kinds of actions applying to both citizens and non-citizens. The range includes acts of violence (attempts, threats and conspiracies) as well as giving funds for humanitarian, legal activity. * It would allow up to 10 year sentences for citizens and deportation for permanent resident non-citizens for the "crime" of supporting the lawful activities of an organization the President declares to be "terrorist", as the African National Congress, FMLN in El Salvador, IRA in Northern Ireland, and PLO have been labelled. It broadens the definition of terrorism. The President's determination of who is a terrorist is unappealable, and specifically can include groups regardless of any legitimate activity they might pursue. * It authorizes secret trials for immigrants who are not charged with a crime but rather who are accused of supporting lawful activity by organizations which have also been accused of committing illegal acts. Immigrants could be deported1) using evidence they or their lawyers would never see; 2) in secret proceedings; 3) with one sided appeals; 4) using illegally obtained evidence. * It suspends posse comitatus - allowing the use of the military to aid the police regardless of other laws. * It reverses the presumption of innocence - the accused is presumed ineligible for bail and can be detained until trial. * It loosens the rules for wiretaps. It would prohibit probation as a punishment under the act - even for minor nonviolent offenses. Implications * Those who remember the McCarran Walter Act will recognize this bill, only in some ways this is broader and potentially more dangerous. * This bill is highly politicalthe President can determine who is a terrorist and change his/her mind at will and even for economic reasons. The breadth of its coverage would make it impossible for the government to prosecute all assistance to groups around the world that have made or threatened to commit violent acts of any sort. Necessarily its choices would be targeted at organizations the government found currently offensive. People to be deported would be chosen specifically because of their political associations and beliefs. * The new federal crimeinternational terrorism doesn't cover anything that is not already a crime. As the Center for National Security Studies notes"Since the new offense does not cover anything that is not already a crime, the main purpose of the proposal seems to be to avoid certain constitutional and statutory protections that would otherwise apply." * While many provisions of this bill could well be found unconstitutional after years of litigation, in the mean time the damage could be enormous to the First Amendment and other constitutional rights including presumption of innocence and right to bail. ------------------------------ Date: Thu, 27 Apr 1995 08:14:50 -0700 From: Peter Miller <ptwnd@IGC.APC.ORG> Subject: File 4--Ohio Job Opening Job Posting -- Please Distribute: ================================ Ohio Community Computing Center Network Coordinator The Ohio Community Computing Center Network (OCCCN) will be establishing 14 computer centers in low-income neighhborhoods in Cleveland, Columbus, Dayton, Akron, Toledo, Youngstown, and Marietta. Funding for these centers comes from the settlement of the Ameritech Alternative Regulation case before the Ohio Public Utilities Commission. The OCCCN seeks to hire a part-time Coordinator to assist these centers in becoming operational and to provide ongoing support and coordination. The OCCCN Coordinator will be based in Columbus and provide program and technical assistance to each center, do outreach throughout the state, and perform statewide administrative duties, under the direction of the OCCCN Coordinating Committee, as follows: 1. Provide Ohio community computing centers with: * assistance in becoming operational; * assistance in making telecommunications arrangements for connecting centers to each other and to the national information infrastructure; * organization development assistance: planning and proposal development, fundraising, publicity, and board development; * program support: activities suggestions, technical support, assistance in choosing software, hardware and consultants, and in developing volunteer program; * arrange for and participate in on-site visits and regional and statewide gatherings/workshops. 2. Do outreach: * identify and establish contact with similar programs; * develop a pool of associates for the OCCCNetwork and coordinate involvement of those doing related work in the region; * attend regional meetings and conferences as appropriate. 3. Perform administrative duties statewide: * actively facilitate and participate in online conferences for the OCCCN; * work with funders in developing financial support for statewide and local coordination; * participate in discussion of directions and goals for OCCCN and involve involve centers in those discussions; * review periodic financial and performance reports from each center; summarize and report to the committee. * provide timely reports regarding activity in the above roles. The OCCCN Coordinators should be familiar with telecommunications and with either Mac or IBM-compatible systems, their basic applications, and trouble-shooting skills. The Coordinator should have community organizing experience and orientation; educational and related community technology experience will be particularly useful. Please send resume and cover letter by May 12 to Ellis Jacobs, OCCCN Coordinating Committee, Legal Aid Society of Dayton, Inc., 333 West First St., Suite 500, Dayton, OH 45402. =========================================================== Peter Miller Playing to Win Network Director Education Development Center 617/969-7101 x2727 55 Chapel St. FAX: 617/ 969-4902 Newton, MA 02158 ptwnd@igc.apc.org ------------------------------ Date: Sun, 30 Apr 1995 19:57:07 +0000 From: heath@CYBERCAFE.ORG(heath bunting) Subject: File 5--making reality acceptable: cybercafe @ compress cybercafe @ compress when the external can not be understood we DESIRE its transformation into our internal form if you have anything you can not cope with (e.g. ideas/people/cultures) please send them to cybercafe and we will restructure them for your pleasant CONSUMPTION this will be accomplished using the new technique of private SUBJECTIVE compression instead of public objectivity (compression is the process of interpretation often resulting in LOSS) subjective compression works through SELF reference and paradox. searching recursively for the WHOLE in smaller and smaller sections of itself, until all you have left is YOU. when the world is like us we will no longer desire CHANGE send the undigestible to: 4 egmont house 116 shaftesbury ave london wv1 7dj uk or via our web form http://www.cybercafe.org/cybercafe/compress.html heath cybercafe aims to promote/create spaces/situations in which people can create/behave/express/experience in ways unavailable in currently existing places Domains of activity radio/tv/telephones/fax/ mailart/flyposting/performance/computer. =-=-=-=-=-=-=-=-=-= uphold dignity/creativity =-=-=-=-=-=-=-=-=-= heath@cybercafe.org vox 44 171 437 8584 http://www.cybercafe.org/cybercafe/ mbl 44 374 823 840 flat 4, 116 shaftesbury ave bbs 44 171 439 3998 london w1v 7dj UK ------------------------------ Date: Thu, 27 Apr 1995 08:23:46 -0700 From: Peter Miller <ptwnd@IGC.APC.ORG> Subject: File 6--Playing to Win in DC June 1-4 For Immediate Distribution: PLAYING TO WIN COMMUNITY COMPUTING CENTER NETWORK Hosts 4th Annual Meeting in Washington DC Friday, June 2 - Sunday, June 4, 1995 Future Center at the Capital Children's Museum 800 Third Street NE -- near Union Station Thursday, June 1, 7:30 pm Kick Off with Working Group Against Information Redlining Forum on "Disenfranchised Communities and the Information Superhighway" ======================================================================= Summary Program Schedule Preliminary Program Thursday, June 1 7:30-9:30 - see below Friday, June 2 - 9:00 am to 7:00 pm Registration & Continental Breakfast Panel presentation: Issues of Access: The Best of Times, The Worst of Times -- * Mario Marino, Chairman, The Morino Institute, Reston, VA * Laura Breeden, Director, Telecommunications and Information Assistance Program, Washington, DC * James Ferguson, Executive Director, National Coalition on Black Voter Participation, Washington, DC * Lauren-Glenn Davitian, Coordinator, Chittenden Community Television, Burlington, VT Focus Groups Keynote Speaker: Elliot Soloway, Ph.D., Associate Professor of Electrical Engineering & Computer Science, Artificial Intelligence Lab, University of Michigan Concurrent Presentations & Workshops: Starting a Community Technology Center Technology and Literacy Managing Community Technology Programs The PTW Network -- IGC Training for New Users Role of Math and Science in Community Technology Programs Volunteers: How to Find Them/How to Keep Them Reception sponsored by The Morino Institute Saturday, June 3 9:00 am to 5:45 pm Registration & Continental Breakfast Affiliate Presentations & Workshops: The Whys and Hows of Public Access Multimedia Projects Integrating Technology: Video and Computers IGC Telecommunications Training for Experienced Users Role of Telecommunications in Community Technology Programs Exploring Internet Resources Telecommunication Projects Tools Play: Using basic computer tools to create learning games Math & Science Projects and Resources Program Assessment and Evaluation The PTW Network Agenda: 1995-96 and Beyond Sunday, June 4 9:00 am to 1:00 pm Regional and Steering Committee Meetings + + + + + + + + + + + + + + + + + + + + Conference co-sponsors: The Capital Children's Museum, The Morino Institute, The Legent Corporation, the National Science Foundation, and Playing To Win, Inc. Goals: To provide opportunities for personal networking and for exchanging information and experiences. To enhance community-based technology programs by providing technical training and program development information. To explore and understand issues related to providing equity in technology access at the local, regional and national levels. Description: The Annual All-Affiliates Meeting of The Playing To Win Network brings together Network affiliate members, potential affiliates, associates, friends, supporters and other persons interested in learning more about how community-based technology programs can and do provide technology access to underserved and disenfranchised peoples. In addition to gaining practical program development information, participants will learn how programs throughout the PTW Network are working and collaborating to open the doors to technology in their communities. Panel discussions, workshops, and training sessions will be led by affiliate members, PTW Network project staff and consultants, as well as representatives from public policy and public interest organizations. Opportunities for informal socializing will include group lunches and a Friday night reception sponsored by The Morino Institute. Registration and Lodging: Representatives of the PTW Network and conference presenters do not pay a registration fee. All other participants are charged $25 to attend the conference ($35 at the door). To register in advance for any day of the conference, contact Ruth Rappaport at RuthR@edc.org, or 800/225-4276 x2329, with your name, address, organization, and phone, and note whether you would like to take advantage of any of the reserved lodging and for what dates. A block of rooms has been reserved at the Radison Barcelo ($100 single; $113 double) and Carlyle Suites ($89; $99) Hotels. A detailed conference information packet will be mailed to all registered participants in May. This packet will include the final program, schedule, maps, and transportation information. Travel: Discounted airfare is available from US Air. Contact: Sally Kahn, Stewart International Travel, 800-441-8666. Tell her you are attending the PTW Network Conference in Washington DC. ======================================================================= DISENFRANCHISED COMMUNITIES AND THE INFORMATION SUPERHIGHWAY Co-Sponsored with THE WORKING GROUP AGAINST INFORMATION REDLINING Thursday, June 1st, 7:30 -- 9:30 p.m. Radison Barcelo Hotel 2121 "P" St. NW The Working Group Against Information Redlining, a coalition of primarily Washington-based organizations concerned with low-income community access to the National Information Infrastructure (NII), and the Playing to Win Network of community technology centers invite you to join us on June 1, from 7:30 to 9:30 p.m. to exchange ideas and information on our efforts to ensure that the gap between the haves and have-nots is not replicated (much less widened) in the deployment of the Information Superhighway. At the meeting on June 1st, we will distribute information about the proposed community telecommunication forums and resources we are both planning. We will want to discuss with you your possible participation and your ideas about content and community needs. WHAT WE ARE ABOUT: Universal access has become a major concern in building the NII. Community-based non-profits in rural and disdvantaged areas lack affordable access to the information superhighway as well as a voice in the development of the content it will carry. Will the information be relevant to community needs? Will people have the capacities and resources to make use of it and be active contributors? If so, how will that be determined? There is growing interest in people speaking for and about low-income and other disenfranchised individuals. However, there is little in the way of these individuals speaking for themselves in order to shape the debate and policies in ways beneficial to them. In the long run, empowering affected populations to speak for themselves will be essential. Resources for using the NII are limited: when and where communities have come to understand the real opportunities this "highway" could open up for them -- access to education and educational resources, access to medical information and (potentially treatment), access to needed governmental information and benefits, training opportunities, job opportunities -- they don't have the resources (financial, human, or technical) to take advantage of what is already available. Capacity building will be an essential component even if the NII is technically designed to reach all people. Toward this end, the Working Group Against Information Redlining has been meeting on a monthly basis since May 1994. The groups participating -- OMB Watch, RTK NET (the Right-to-Know Network), the Benton Foundation, Alliance for Public Technology, Alliance for Community Media, the National Council of Nonprofit Associations, the National Trust for the Development of African American Men, the National Consumer Law Center and numerous others -- have developed a proposal for community forums on non-profit access to and use of the NII. The Playing to Win Network, consisting of over 50 neighborhood community technology programs, is currently planning a program focusing on using telecommunications to heighten participants' interest in and involvement with local, state, and national policies upon which their technology access rests. These community forums and center resource projects will be discussed at the June 1st gathering. For more information on the June 1st program or either project, contact: Patrice McDermott Peter Miller OMB Watch Playing to Win Network patricem@CapAccess.org ptwnd@igc.apc.org 202/234-8494 800/225-4276 x2727 ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST <your name> Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.34 ************************************