Computer underground Digest Tue Jun 6, 1995 Volume 7 : Issue 46 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Tibia Editor: Who built the Seven Towers of Thebes? (Answer still pending) CONTENTS, #7.46 (Tue, Jun 6, 1995) File 1--A Seduction In Cyberspace? File 2--Re: Protecting kids from porn on Web -- html enhancement File 3--Illinois Legislater "Discovers" Net Porn (news excerpt) File 4--Canadian Police Chiefs Ponder Crime on the Infobahn (fwd) File 5--GovAccess.120: Christian Coalition urges net censorship (fwd) File 6--Voice System Up-Date File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 03 Jun 95 04:03:33 EDT From: Walter Scott <74276.3616@compuserve.com> Subject: File 1--A Seduction In Cyberspace? On May 18th, Daniel Montgomery left Seattle for an as yet unknown location. His departure has caused, in its wake, a frenzy of media coverage. And that magic word -- "INTERNET" -- is attached to this story. Daniel Montgomery is 15 years-old and potentially gay. Until May of this year, he was what Tahoma High School Assistant Principal Rob Morrow would call a "nice young man." More than being a "nice young man," Daniel Montgomery was a teenager exploring cyberspace via America Online. Through a chat room on America Online, Daniel met someone calling himself "Damien Starr." Eventually, Starr may have enticed Daniel to leave his Maple Valley home. According to a published report in the 6-2-95 edition of the Seattle Post Intelligencer, Starr's user profile on America Online indicates Starr is 18 years-old, gay, and resides somewhere on Nob Hill in San Fransisco. Starr and Daniel Montgomery apparently communicated, for a period of time, on America Online and by way of a password-protected 1-800 phone number. According to the Seattle Post Intelligencer and Bill Montgomery -- Daniel's father -- Starr had suggested that, if Daniel was discovering he is gay, and revealed such to his parents, they probably would kick him out of his home. Bill Montgomery believes this may have played a role in why Daniel Montgomery left -- ostensibly because Daniel had not discussed his sexual orientation with his parents, and Daniel's mother had stated negative feelings about gays in the past. Thus, Bill Montgomery asserts Daniel may have been particularly open to another suggestion -- that Daniel come join Starr. When Daniel left, he apparently did so after receiving a bus ticket in the mail from Starr. Since then, Daniel has sent 2 E-Mail messages to his father stating that he's doing OK while making more money than his parents, according to reports from several broadcast news organizations here in Seattle. Bill Montgomery doesn't KNOW if this is true but states that, if what Daniel had claimed is true, at least part of it is temporary. Soundbites aired on TV news (KOMO-TV and KING-TV - 6-2-95) illustrate Bill Montgomery suspects his son is being groomed for sex. According to the Seattle Post Intelligencer, that assessment may, in part, be drawn from Daniel's sister. She lives in Southern California and has informed Bill Montgomery of reports she's seen on TV about groups that seduce young gay males by offering protection from parents who might not be supportive of a homosexual orientation in their children. The Seattle Post Intelligencer summarizes Montgomery's description of the "group's" method of operation as enticement to run away followed by provision of food and money for a short time, and then culminating in requests for sexual favors in return. The Seattle Post Intelligencer, and broadcast news organizations in Seattle, are not, however, reporting confirmation of this notion. Starr has contacted the Montgomery family four times, again, according to the Seattle Post Intelligencer, to assure them Daniel is not in any danger. As stated previously, Montgomery doesn't doubt this for the time being. But, Montgomery also told the Seattle Post Intelligencer that Starr is probably a recruiter who might have been recruited into the "group" not so long ago. Bill Montgomery is not saying whether he will ask America Online to provide Starr's real name and/or other information on Starr retained by America Online. The Seattle Post Intelligencer, though, reports that the FBI won't deny they are interested in asking America Online to reveal information on Starr. And "sources" are stated by the Seattle Post Intelligencer as indicating that the FBI continues to investigate the case. There are several interesting factors in this turn of events. Some of those factors can be appreciated more easily by people who live in Washington state and in the Puget Sound in particular. 1. Washington state's Legislature just finished a regular session and special session -- back-to-back. Those sessions provided high political drama -- even for the online community. Until late last month, we were faced with a "harmful to minors" bill addressing, among other things, availability of sexual material to minors via online services. The bill easily passed the Legislature but was vetoed by Governor Lowry. A veto-override attempt did not fall so short that people here -- who were and are opposed to the legislation -- can breathe a sigh of relief; the issue WILL come back another day -- possibly quite soon. 2. The Legislature also passed legislation which would change Washington state's laws dealing with run-aways. This legislation was partially vetoed. The result is a firestorm of resentment among a significant number of parents. They feel as though long-awaited relief has been stolen by a Governor who doesn't appreciate parenting issues in this state. For example: Laws existing through this Spring required that a child at the age of 13 could legally run away from home. Parents were powerless to do anything about such behavior unless the child was acting under the coercion of others in very strict circumstances. The new law is only slightly more restrictive on whether minors can run away -- certainly NOT restrictive enough to make Daniel Montgomery's act of running away an illegal act. Such laws, as those existing prior to the most recent regular session of the Washington state Legislature, have been in place for several years to provide abused children with the means to escape parental abuse if running away would accomplish that goal. 3. A local TV station (KIRO) recently ran a series of reports called "Net Sex." Those reports were sensationally promoted with language that implied children can and do access sexually explicit sections of the INTERNET -- something which might be a threat to children if unsuspecting parents aren't watching what their kids are doing online. The actual reports, however, were reasonably balanced. But, the reports left Seattle sensitized to the existence of sexually explicit materials on the INTERNET. 4. We have the copious and invalid use of the word "INTERNET" in broadcast reporting of the Montgomery run-away. We also have a case in which a 15-year-old ran away to circumstances the father of that 15-year-old asserts are probably sexual in nature. All four of the factors listed here may eventually come together as a dangerous brew is or will be created. In the current social and political climate, the Montgomery run-away; the Baker case; the incidents where children download instructions on how to make pipe bombs and then construct them; an incident where a young girl seduces an adult male into a sexual encounter after online meetings; incidents where online pedophiles do there thing, and so much more seem to draw us headlong toward events we may regret some years from now. I wonder if there is no other way to see what is out there to be seen. Politicians revel in such events as those referred to above. I believe it is no strange coincidence that Senator Exon's legislation (Communications Decency Act) moved into the fast lane of Congressional action at around the same time as news broke on the Baker case. It is not novel for politicians to orchestrate their policies and agendas around politically favorable current events. I expect more instances of perceived or actual online abuse, and for politicians to take advantage in the ways only politicians can. Whether it's Washington state, New York state, Alabama or Washington, DC, I'm finding it more and more difficult to believe there is any room left to assume reason will necessarily prevail over emotion built to a fever-pitch. I see emotion more places than I don't, and rancorous emotion at that. I also see associated and ever-growing polarization. It actually frightens me because I think I know what all that HIGH emotion will promulgate. =========== UPDATE ================== On Sunday [6-4-95] Seattle area teenager Daniel Montgomery -- who had run away from home in mid-May at the possible coaxing of an AOL subscriber -- met with his parents at a San Francisco airport. According to various Seattle news media reports, Montgomery told his parents, at that time, he was doing ok and had not been harmed. Subsequently, reports from local media have exhibited an amazing cacophony of inaccurate or incomplete information. For example: Even on the day that Daniel Montgomery met with his parents, the Seattle Post Intelligencer reported that Montgomery had been seen by a Seattle Metro bus driver. According the the Seattle Post Intelligencer, Montgomery had told the bus driver he was on his way out of town, and Montgomery had shown the bus driver what the bus driver thought to be a bus ticket to Florida. Once it was clear that Montgomery had met with his parents in San Francisco, local news media issued conflicting stories as to whether Montgomery would stay with his parents or grandparents. More than one news organization implied a strained relationship between Montgomery and his parents In the past two days, some news media organizations have stated AOL was under some pressure to reveal information on a subscriber using the alias "Damien Starr." However, other news media organizations were stating that AOL was resolute in its policy not to reveal information about subscribers. Even so, today, [6-6-95] several broadcast organizations (KING-TV, KIRO-TV, KIRO radio, and KOMO radio) now report that AOL has terminated the person who used the Damien Starr alias. KOMO radio broadcast the following in a news program this morning. America Online says it's complying with a subpoena and giving investigators information about the account of Damien Starr. That's the name used by a man suspected of luring a teenaged boy to San Francisco. The computer service has also terminated the man's account. The boy's now back with his family in Maple Valley. [Maple Valley is a small community in the Seattle area] KING-TV takes us a step further with a report that Damien Starr is under investigation by the FBI for a possible violation of the Man Act. KIRO-TV states that AOL terminated Damien Starr because Starr allegedly solicited a minor in violation of AOL's policies. It's rather difficult to know what is truth, what is perception, and what is true at one moment and not in the next moment, hour, or day in this case. What seems certain, though, is that events pertaining to the running away and/or seduction of Daniel Montgomery are not finished. ------------------------------ Date: Mon, 22 May 1995 15:53:32 GMT From: subhas@CS.WM.EDU Subject: File 2--Re: Protecting kids from porn on Web -- html enhancement Source: comp-academic-freedom-talk@EFF.ORG Can the parents prevent their children from viewing -------------------------------------------------- unwanted Web pages? ------------------- Yes. There is a simple solution. The senate's Communication Decency Bill is ultimately harmful and moreover it won't work because Internet does not know any country boundaries. Nevertheless, the politicians are making impassioned arguments that the children must be protected from the pornographic materials and other unwanted materials (like how to make a bomb). Do they have a valid point? Well, let me rephrase the question : If you have a simple way to prevent your kids from viewing some adult materials or other unwanted stuff available on the Web, would you use it to control their access? Particularly if that objective can be accomplished without any censorship laws or any inconvenience? Also free of cost too? I suppose most parents probably would. Below the proposed solution is introduced in a question answer form. Q1. Why is this fuss? I don't see any problem. Therefore no solution is necessary. A. Actually, there is a problem. Do you want your 10-year old kid to read Hustler magazine? There are actually lots of adult materials on the Web (and there are going to be more in the future) which are even more unsuitable for young children. Concerned parents want to protect their kids from viewing such materials available on the Web. Also, adult page authors don't want any kids to view their stuff. Its apparent that the Internet is going to be so useful that kids should be encouraged to surf the Net. Currently there is no good solution to this dilemma. If something is not done by the net-citizens themselves, the politicians can generate enough public support to curtail freedom of expression on the Net. Despite all the hype, only a small percentage of the general population are on the Net and thus netters are powerless to the law-makers majority of whom are not friends of the Net. Q2. Can anything be done? How? A. Yes. Concerned parents and educators can control access on Web. All it needs is a little cooperation from the Web browser designers (like people at Netscape and NCSA Mosaic) and also from the adult Web page authors. In the next version of the Web navigators, just introduce a new HTML tag <adult_only>. If a WWW browser encounters this tag enclosed inside the <head> </head> part of a HTML document, then the browser will simply refuse to load or render the document. The author of a Web page should put that tag in all of his pages containing materials that he does not want to be seen by young children. At the time of installing the browser, a password will be asked from the person (who is assumed to be an adult) installing the program. This password is for identification of the installer. As a default, the <adult_only> checking is enabled. To allow a parent (the adult installer) the freedom to view adult-only stuff, the browser can have a command line option "-unrestricted". If that option is used, the program will ask for a password for identification (only at the beginning of the session). This way, a parent protects the kids from unwanted stuff on the Net. Also, the adult page authors are protected from unwanted attention from kids. It involves no cost, no laws or hassles. Q3. What about gopher and FTP sites? A. This solution works for any HTML page which many come via HTTP, gopher or FTP protocols. Besides, now the Web is the most popular part of the Net. However, external gif/jpeg files cannot be prevented because they are not in HTML. So, by this tag trick, all the unwanted stuff that is not in HTML cannot be barred. Q4. Why would the purveyors of net pornography comply to use the <adult_only> HTML tag in their pages? A. It seems that the people who are posting adult materials on their Web pages would like to prevent the young children from accessing the pages. That's why they build such lame "adult access shield" which asks "don't click here if you are under eighteen". So, we can hope that an author of a Web page containing adult stuff will be glad to put this HTML tag at the beginning of the all Web pages containing adult materials. One can send an e-mail to remind the author in case such a page is not properly tagged. Q5. Why should Netscape people or Mosaic people support the tag? A. Because implementing the tag is very easy and all protective parents and educators would be glad to have the support for such a tag. Such a tag should become a part of the standard HTML. Q6. But browsers are freely available and a kid can download his own copy of a browser himself. Also, a smart kid can hack something to get around the efforts of access control. What about that? A. Yes, this could be a problem. But automated software techniques (using some operating system support) can be used to ensure that no secretly installed browser exists in the system. A determined smart kid cannot not prevented from accessing anything he wants. He can possibly write his own browser and other tools. Heck, he can buy his own PC, have his own Internet connection and set up a Web server with his own home page containing adult materials! So, let us be concerned about the no-so-determined kids. Q7. Can't we use SurfWatch software or other such tools? A. SurfWatch (http://www.surfwatch.com) is a newly announced tool that seem to allow the concerned parents to prepare a list of offending sites. Any site in the list will be denied access to the browsers used by the children of the customer of SurfWatch. However there are serious problems. - Nobody can maintain an up-to-date and exhaustive list of sites. There are many obscure sites all over the world. New Web pages are appearing and disappearing dynamically everyday. You may block the Penthouse site, but your kid may possibly be viewing far more unwanted stuff from some obscure site in Netherlands if that site is not included in your list. - SurfWatch will maintain a list of unwanted sites for you (if you pay extra monthly fee). Then you will need to trust SurfWatch to decide what is good or bad for your kids. - You will have to pay for the blocking software as well as a optional list of sites maintained by SurfWatch company. - The browser will need to check a list of possibly thousand sites for every single Web access just to make sure it is not one of those. Won't it be slow? - A WWW site can host thousands of separate Web pages only a few of which probably contain adult materials and the rest are possibly harmless or useful. So blocking access to a site is not a good idea. If SurfWatch starts maintaining a list of offending Web pages, the list will be in very very long indeed. It is a hopeless idea to maintain a list of unwanted sites or unwanted URLs. Q8. The tag seems to be a good idea. Can it be used for other purposes? A. This tag idea can be generalized to classify Web documents in variety of ways and it will greatly facilitate cataloging the Web documents. Web desperately needs such categorization so that your browser can select and reject Web materials of all sorts based on your priorities. This will cut down noise as well as litigation. ------------------------------ Date: Tue, 6 Jun 1995 16:11:13 -0500 From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas) Subject: File 3--Illinois Legislater "Discovers" Net Porn (news excerpt) Source: Chicago Tribune, May, 1995 Legislator cruises the internet and can't believe his eyes By Christi Parsons SPRINGFIELD--Sen. Walter Dudycz ((Ill. state legislator) has seen some of the weirdest, kinkiest stuff of his life in the few short weeks he has had access to the worldwide computer network known as the Internet. Child pornography. Sex talk. Serious come-ons and propositions. "You wouldn't believe some of this stuff," said Dudycz (R-Chicago). "Every time I sit down at the computer I've got some pornographic picture waiting for me." In only a few weeks, Dudycz has seen how ugly things can get on the Internet. So this spring, is sponsoring a bill in the General Assembly to forbid adults from soliciting minors for sex on the Internet. The Senate already has approved the measure, and it awaits consideration in the House. Dudycz says it's the first of many bills to come, as he continues to prowl the Internet and discover the societal perils he's sure it harbors. ((Observation that child pornography is already illegal and that the Internet's newness leaves some grey areas. The article notes that Georgia and Florida have passed laws targetting the Internet, and Illinois and California are considering similar laws)). ((The article notes that policing the Internet and policing the corner store are similar in that anybody can file a complaint. It summarizes how on-line services can find people who are responsible for supplying "obscene" material. It notes that civil libertarians argue against restrictive legislation such as the Exon Bill pending on Congress)). "This has everything to do with the novelty of the Internet to the bill writers," Godwin said. "We're in a generation between people who never had this technology and people who grew up with it," Godwin said. "In this transition period, they're not comfortable. So their impulse is to regulate." ((The article notes that Dudycz is new on the nets, and--as a detective in the Chicago Police Department, he decided to go "undercover" to see "how intimate" people wanted to get)). He filled out his computer profile to say he is a 15-year-old girl from Chicago and set up a screen name. Dudcyz doesn't want to disclose the name he uses, but it is similar to "Bashful." Dudcyz said "Bashful" is routinely propositioned as "she" moves from chat room to chat room and talks with other users via e-mail and instant messaging systems. Dudcyz gets a lot of pornography, and one person has invited "Bashful" to pose nude for him. One recent night, as other senators were heading home from a week of session, Dudycz stayed after hours in the empty Senate offices and became "Bashful." When he signed on, there already were three pornographic photographs sent to him by other users. Two were garden-variety porn, and he tossed them out. The third was an amateurish photograph of an obviously underage girl in a state of semi-dress. Dudycz stored the screen name of its user to follow up on it later. ((The article describe a "chat room" encounter with a 39 year old engineer who, believing Dudycz was a 15 year old female, suggested a sexual liason)). So far, Dudycz hasn't busted anybody for solicitation. But he has compiled a list of screen names and is corresponding with several in anticipation of a sting operation by Chicago police. As for his bill, Dudycz said, he hopes it will at least alert parents to what's going on on the Internet. ((The article concludes with a warning by Dudycz to parents suggesting that when they think their kids are doing homework on the computer, maybe they're not)). ------------------------------ Date: Mon, 5 Jun 95 17:29:21 EDT From: Mitchell A. Pravatiner <Mitch.Pravatiner@LAMBADA.OIT.UNC.EDU Subject: File 4--Canadian Police Chiefs Ponder Crime on the Infobahn (fwd) From--"Ian S. Murray" <artsxnet@intacc.web.net Date--Sat, 03 Jun 1995 19:08:53 DST Subject--Canadian Police Chiefs Ponder Crime on the Infobahn Recommendations of the Prevention of Crime in Industry Committee of the Canadian Association of Chiefs of Police October 20, 1994 Ottawa, Ontario - - - - - - - - On October 20, 1994, the CACP Prevention of Crime in Industry Committee met with members of the private sector, governmental agencies, and various police agencies from across Canada. The purpose of the meeting was to discuss technological crime issues and their impact on crime prevention, law enforcement, and community based policing initiatives. The following recommendations were adopted at the meeting and are to be forwarded to the board of the Canadian Association of Chiefs of Police. Recommendation 1: Given the inter-provincial and international nature of computer and telecommunications crime, the Federal Government, in consultation with the provinces and other interested parties, should enact a federal statute to legislate against these crimes. Current provisions in the Criminal Code relating to technological crime, should remain intact and can be used for locally based computer and telecommunications crimes. Recommendation 2: The Federal Government should ensure that information highway services provide security and privacy features both for base service and to protect sensitive communications. Future legislative initiatives and policy statements should *not* provide the general public with the false expectation that basic services of the information highway will provide high degrees of privacy. In fact, the government should educate the public as to the "open" nature of many forms of communications technologies. The Prevention of Crime in industry Committee should encourage and participate ion the education of corporate management on the risks/ vulnerabilities of computer environments and remedial options available. Recommendation 3: The Criminal Code should be amended to include the following provisions: a) the unauthorized possession, use, sale, publication, or distribution of access codes, computer hacking programs/tools, and telecommunications access codes should be an offense. b) Sections 342.1 Criminal Code (Unauthorized computer access), 430(1.1) Criminal Code (Mischief to data), and Section 326 Criminal Code (Theft of telecommunications) should be listed in Section 183 of the Criminal Code as offenses where wiretap authorization may be obtained. c) Use of computer networks and the national telecommunications system in the furtherance of criminal activities such as the distribution of pornography, distribution of hate literature, or harassment of individuals should be an offense in itself, either in the Criminal Code or a Federal Statute. Recommendation 4: The Federal Government should closely examine the problem of computer data encryption as it relates to investigative duties of law enforcement and enact legislation to facilitate decryption of this data by compelling involved persons or corporations to assist police. This legislation should also prevent the disclosure of sensitive investigative techniques used by police or sensitive proprietary information of a private corporation that was compelled to assist police. Recommendation 5: The Federal Government, in conjunction with the provinces, should support educational initiatives to encourage sound computer ethics and computer responsibility in the youth of Canada. Computer crime prevention initiatives should be supported as part of a community based policing approach. Recommendation 6: The Federal Government in conjunction with the RCMP should explore the possibility of constructing a core competency group consisting of law enforcement and technical industry personnel to act: a) as a lead resource in problem identification and resolution, and b) as a lead investigative unit for complex computer and telecommunications crime investigations. Recommendation 7: The Federal Government should undertake discussions with the United States Government to make the searching of computer banks in the United States by Canadian officials in Canada legally possible though an international protocol or convention. Agreements of this nature with other countries can be explored at a later date. Ottawa October 20, 1994 #-intacc.web.net--------------------------------------------* |This message was sent from MATRIX ARTS NETWORK | |tel:(416)-364-1421 | |The views expressed in this posting are those of the | |individual author only. | #-----------------------------------------------------------* ------------------------------ Date: Thu, 18 May 1995 16:07:12 +0800 From: jwarren@WELL.COM(Jim Warren) Subject: File 5--GovAccess.120: Christian Coalition urges net censorship (fwd) Date--Thu, 18 May 1995 13:35:24 -0400 From--Jonah Seiger <jseiger@cdt.org> Subject--Christian Coalition Pledges to Restrict Access to Porno on the Net On Thursday 5/17, the Christian Coalition unveiled their "Contract with the American Family" yesterday (5/17). A number of prominant republicans -- including Newt Gingrich & Phil Gramm, have pledged to work to pass the CC's contract. And don't forget either that the repub presidential candidates are very interested in appealing to the CC. One of the items in the "Contract" seeks to restrict childrens access to pornography on the Internet. All this spells more bad news for us -- and gives one more reason why we need to get behind Leahy. -- >From the Contract with the American Family (pages 27 & 28) Restricting Pornography Protecting children from exposure to pornography on the Internet and cable television, and from the sexual exploitation of child pornographers. 1. Enactment of legislation to protect children from being exposed to pornography on the Internet PORNOGRAPHY, BOTH SOFT CORE and hard core, is freely available on the Internet to virtually anyone with a home computer. Several magazines post pornographic images that can be viewed by anyone, including children, for free. There are also numerous sites on the Internet where hard core pornography depicting a variety of explicit acts, even rape scenes and bestiality, are available free and can be accessed with a few clicks of a computer button. Christian Coalition urges Congress to enact legislation to protect children from being exposed to pornography on the Internet. Criminal law should be amended to prohibit distribution of, or making available, any pornography,, soft core or hard, to children, and to prohibit distribution of obscene hard core pornography to adults. 2. Enactment of legislation to require cable television companies to completely block the video and audio on pornography channels to non-subscribers. Many children throughout the country are exposed to pornography, often hard core, on cable television because of incomplete scrambling of the signal on pornography channels. Cable companies have asserted that it is the parents' responsibility to guard their children. Christian Coalition believes that the responsibility should be on the cable companies to help parents keep pornography out of their homes. Cable companies should not be allowed to transmit pornography to non-subscribers. We urge Congress to require cable television companies to completely block the video and audio on pornography channels to non-subscribers. 3. Amending the federal child pornography law to make illegal the possession of any child pornography Sexual exploitation of children though child pornography continues to be a major problem in society. Possession of child pornography should be a crime. President Reagan proposed such a law in 1988, hoping that those with collections of child pornography would destroy them for fear of federal prosecution. In an 11th hour compromise on the bill, however, a conference committee of House and Senate members changed the Reagan bill to criminalize only the possession of "three or more" items of child pornography, videos, magazines, etc. Thus, federal low sanctions the possession of some child pornography -- less than three pieces. A person with two hour-long videotapes depicting the rape of a child cannot be charged with a federal crime, yet a person with three photos depicting a child in a lascivious pose can. Christian Coalition urges that the federal child pornography law should be amended to make illegal possession of any child pornography. ------ For the other side of the story, check out CDT's archives: http://www.cdt.org/cda.html ftp://ftp.cdt.org/pub/cdt/policy Information on the Communications Decency Act issue is also available through auto-reply email. General info about the CDA issue cda-info@cdt.org Status of the legislation cda-stat@cdt.org -- Jonah Seiger, Policy Analyst Center For Democracy and Technology <jseiger@cdt.org> 1001 G Street NW, Suite 700 East Washington, DC 20001 PGP key via finger (v) +1.202.637.9800 For more info on CDT: email <info@cdt.org> or visit http://www.cdt.org/ ------------------------------ Date: Mon, 05 Jun 95 18:35:31 +0800 From: defcon@IBM.NET Subject: File 6--Voice System Up-Date [> The DEF CON Voice System is now up at (801) 855-3326 <] Voice Bridge / Voice BBS / Voice Mailboxes / Private Chat The Voice system has beed changed all around to now support a fast Voice BBS, VMBs and multiple 8 port conferences. Anyone can create their own VMB, etc. This voice bridge has been set up for people of like interestes to meet and discuss computers or whatever they want. Running on borrowed equiptment the systems is still under construction, but working fully. This is the same bridge that will be used for DEF CON III, a computer conference in Las Vegas this August. People who can not attend can call in and listen to the speakers during the day, or talk with other people at the convention. Oh, some people wondered about the cost.. it's whatever you pay to call this number, normal long distance. [> 24 hours at (801) 855-3326, all are welcome to call <] PGP Key (2.3a & 2.6) Available on key servers. Voice (AT&T) 0-700-TANGENT DEF CON FTP: ftp.fc.net /pub/defcon http://www.defcon.org FAX: 206-453-9567 ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST <your name> Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.46 ************************************