Computer underground Digest    Sun  Jul 16, 1995   Volume 7 : Issue 60
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson

CONTENTS, #7.60 (Sun, Jul 16, 1995)

File 1--Re CuD #7.55 and Dangers of Computer Intrusions
File 2--Copyrights and Obscenity
File 3--Re: File 6--File 1--Against Intellectual Property
File 4--Senator Grassley's Buthering of "CMU Study" Stats
File 5--NEWS: Hacker Disrupts Internet Link (fwd)
File 6--Voice of America on CDA (fwd)
File 7--'The Hackers Book of Poetry' (fwd)
File 8--AA BBS appeal for help (fwd)
File 9--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Mon, 03 Jul 1995 08:22:44 -0500
From: spaf@CS.PURDUE.EDU(Gene Spafford)
Subject: Re CuD #7.55 and Dangers of Computer Intrusions

In the article quoting from Flatland #12, there are some statements
on which I would like to comment:

>
>      Only Joe McCarthy knows how Robert Hager came up with a figure
> of 98 percent for undetected break-ins, and then pretended it was
> worth repeating. Hager continued with his voice-over and began
> talking about hackers breaking into one nameless hospital's records
> and reversing the results of a dozen pap smears. Patients who may
> have had ovarian cancer, Hager claimed, were told instead that they
> were okay.

No, others know where it came from too, because we follow the
literature on such things.  In fact, these results have been widely
published in various media, including Computerworld and InfoSecurity
News.  The same experiment has been done by different groups within
DoD, including the Air Force Information Warfare group, and the
Defence Information Systems Agency (DISA).  The DISA report was the
one that got the publicity, as I recall.  The numbers I have from the
article were that attempts to break in, using captured "hacker"
toolkits, were made against 8932 DoD systems.  7860 of those were
successfully penetrated.  Of those, 390 penetrations were detected,
but only 19 were reported to the proper authorities.  So, 95% of
successful break-ins were undetected, but 99.8% went unreported.

The hospital story is old news too, and not the worst of ones
reported.  I don't keep an extensive clipping file of these things,
but others do, and some research in the library would reveal many
such stories -- including several involving worse damage.

And those are the ones reported.  I've heard NDA and confidential
briefings that are much more troubling. (And I hate that they are
being kept confidential -- if we publicized these things a little
more, it might help wake people up some; see my comments further on.)


There are some real problems in the area of computer security.



>      So Big Brother has a problem. But it's not so much a problem
> of national security, except perhaps in the broad sense of economic
> vulnerability. Defense and intelligence systems that are classified
> are not connected to the Internet. When the Pentagon complains to
> NBC about national security, what they really mean is that they
> might have to forego the convenience of Internet contacts with
> their contractors, and use other means instead.

This evidences either ignorance or disregard for reality.   First of
all, there are a lot of sensitive but unclassified systems on the
network involving government.  Although disclosure of any arbitrary
bit of information may not be a problem, disclosure of large chunks of
it might be (inference),  But that isn't the main problem -- anyone
getting in to the systems and crashing them or altering the
information could really wreak havoc.  Imagine if the payroll systems
for the Army were disrupted so that all the enlisted men didn't get
paid for a month.  Or if the logistics supply computers were taken
down and data corrupted just prior to a major operation?

But national security is much more than simply military systems.  The
well-being of the citizens depends on many other organizations
operating smoothly.  If, for instance, the NY Stock Exchange were to
be shut down, or the Chicago futures trading market were to be
corrupted so there was no confidence in the records, the result might
well be another stock market crash.  You can bet that would have
implications for national security and our well-being.

One time-worn technique for destabilizing a country is to counterfeit
its currency.  If you can flood the world with good quality
counterfeit, you either cause enough doubt to get people to stop
accepting it, and/or you can cause massive inflation in the country
involved.  If you can get in to the networks and redirect the
currency, or generate "fake" money in transactions, you can have much
the same effect. only faster, and in larger quantities.

Or what if techno-terrorists (or simply young hackers & phreakers who
don't really know what they're doing ... or don't care) were to crash
the computers coordinating the electric power grids over the
northeast, or take down long-distance service for a couple of days?
These are highly disruptive, and done at the wrong time could threaten
far more than the inconvenienced customers.

There are lots more possibilities if you only think about them.  Many
have been documented, and quite a few have been discussed in places
like the Risks Digest over the years.  Many of us have been worried
about and speaking out against the computerization of so much of our
infrastructure without adequate safeguards.  The worry now is that by
networking these systems into the Internet, we have a high-speed
conduit for malfeasors.

National security can be eroded from within as well as from without.


This is all separate from the other comments made in the article.  I
think it is more than a tad paranoid to attribute so much motive and
coordination to the government, and it presumes a far more cordial and
cooperative relationship among TLAs (three-letter agencies) than
really exists....unless you believe in the Illuminati and the
Tri-Lateral Commission and the secret UN forces in the black
helicopters. :-)

However, there is a thread of rightous concern in the story that we
should note.  For years, people have ignored the sensible cautions of
experts on computer security.  Now, everyone's in a mad rush to hook
up to a global network, often without any other motive than the fact
that lots of other people are doing it too.  The result is massive
exposure to risks that are poorly understood.  Because they're not
taking the precautions themselves, the government is making noises
about imposing standards from without, because they have been paying
more attention to the security concerns (but still not paying enough
attention of the right kinds).

I am really bothered by the Clipper initiative, and the Digital
Telephony bill, and the Exon Amendment, and the Time magazine
"cyberporn" misrepresentation, and all the other acts along these
lines.  I am scared by reports that the director of the FBI claims
that private encryption may be outlawed and there is no Constitutional
right to privacy (although, in one technical sense, he is correct -
there is no *explicit* such right).

Although deeply troubled by these developments, I am not surprised.
I've seen it coming, as have others in the field.  The vendors are
helping it along by providing shoddy software with little in the way
of security; the users are helping it along by continuing to buy that
crap without demanding better; the media is helping it along by
focusing on the issues of porn and kiddie runaways instead of the
underlying problems; the computer literate are helping it along by
focusing on rights and ignoring responsibilities and dangers; and the
underground is accelerating the push by distributing more and more
powerful break-in tools so they fall in the hands of the careless (and
often venal).

I don't think there is any organized conspiracy involved in
government.  I think it is more the case that they see a lot of the
dark side of the whole issue, and they are very worried.  They also
don't see enough public concern, nor do they see enough action in the
marketplace.  They are trying to act, often in the only way they can.
That doesn't mean the rest of us should take it, nor that we should
like it if they succeed.  However, as a public, we've done a damned
poor job of addressing the problems on our own.  We should all be
worried about government getting carried away.  But we should be as
worried (or more) about the people who are rushing to put our stores,
hospitals, media and banks on-line.  And we should be outraged at the
lack of quality control and lack of safety involved with the software
we are sold.

------------------------------

From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
Subject: File 2--Copyrights and Obscenity
Date: Thu, 6 Jul 95 11:39:51 MDT

  Intellectual Property
  ---------------------

Keith, thanks for an excellent article!  You saved me the trouble
of typing all this up myself, I don't think I could have done it as well :)

Regarding the reply by Brian Martin:

*  You seem to ignore the many problems that are brought up by the removal
   of intellectual property - many of which Keith brought up in his article.

   Your response always seems to be that their are other possibilities, but
   then you always give us examples that would point towards a Socialist
   economic system, citing such possibilities as:
     contributions from viewers for specific directors
       (who pays for the first movie?)
     guaranteed annual income
       (presumably from the gov't?  regardless of talent?)
     payments based on number of library copies
       (this is a measure of talent?  what about non mainstream books such
        as The Anarchist's Cookbook, not likely to be found in a library?
        also, once again, this is presumably paid by the gov't?)
     relying on journalism
       (so then they would simply donate their books written during
        their spare time?  What would a musical performer rely on for income?)

*  You also point out that many performers like pirate tapes of
   their *concerts*   This is an example of a performer choosing not
   to pursue copyright violation, which is fine.  However I am sure
   these performers would feel very different if a company made copies
   of their own CDs and started to sell those.

*  I appreciate your point about the assumed value of Jurassic Park.
   However, Keith's arguments apply to any movie, regardless of cost.
   The main point being that creating a movie will always be more expensive
   than copying it - hence there is no way to recover such costs without
   resorting to Socialist type means.

I see no answers for a Capitalist society.  If you wish to discuss
Capitalism vs. Socialism, that's fine - I won't assume the superiority
of Capitalism.  But if you are asking us to change our economic system
to a more Socialist system, then I think you need to write a much larger
paper (of which the issue of intellectual property could certainly be one
of your arguments).

      ------------------------------------------------------

  Obscenity In Cyberspace
  -----------------------

Only one point I wanted to make here.  (explicit language used below)

> This decision was in many was unsatisfactory because the court avoided
> the sticky issue of defining obscenity...

It seems to me that this people are missing the point.

I don't think this is an issue of 'obscenity.'  I personally have no
problem with obscene material being available, certainly not on a
BBS that requires 'membership.'  You can create any scene you want
between consenting adults, such as nailing one's genitalia to a
table (ouch! ;).  However, when you start to bring animals and children
into pornographic material, I believe you are entering into the realm
of rape, not obscenity.  (I realize that whether or not children were
in any of the gifs was only implied in the article, but it seems quite
clear that bestiality was involved).

So if they were prosecuting because of a hairless pussy nailed to a table,
I would agree with the point of the article.  But if they were prosecuting
because of pictures of 'big horse cock in her twat' then I don't think this
is a case I would want to use as a first amendment vehicle.

------------------------------

Date: Fri, 30 Jun 1995 18:17:36 -0400
From: vapspcx@PRISM.GATECH.EDU(S. Keith Graham)
Subject: File 3--Re: File 6--File 1--Against Intellectual Property

(This was written as a summary of a point by point critique
of the original post.  It was intended to be posted earlier,
but bounced.)

    ==============================================================

While I did appreciate the research and writing in the
original article, it did contain one major flaw:

  It did not distinguish between "ideas" and "information
  products."

Some examples of "ideas" vs. "information products", include
"Word Processor" vs "MS-Word 6.0", "a dictionary" vs. "the OED",
and "a dinosaur movie" vs. "Jurrasic Park".

A finished, polished information product (including arguably
the author's article) contains a great deal more work than simply
thinking of an "idea".  And copyright only extends to that
specific "information product" (or work) and not to the underlying
idea.  (After all, I am still allowed to write an article against
intellectual property, even though other articles have been written
in the past.)

For example, the discussion of the "marketplace of ideas" fails to
distinguish that such a "marketplace" is truthfully of "ideas", and
not "works".  Once one believes in a given "truth", that person will
buy works that support it.  But the "marketplace" is a competition
between "truths", long before specific works are regularly purchased.

But the primary point remains, a finished "work" has a very large
amount of effort (and typically money) invested in its creation.
Without a financial incentive to "clean up" a computer program;
most software authors wouldn't make the effort needed to
add features that they (or their company) would not regularly use.

Even in the case of personal computers, I could easily forsee IBM
producing a proprietary computer archietecture and publishing software
that will only run on their hardware.  They will prevent copying
not by law, but by fact.

Further, if distribution of a piece of software would reduce a
companies' competitive advantage; without financial incentives
for that distribution; it is unlikely that they would provide
free copies to the world.   This results in duplication of creative
effort at their competition.  This does provide employment for us
programmers;  but perhaps the world would be better off if the
original company sold copies of the software, and we were off
working on a new project in an unrelated field.

In the entertainment area, "intellectual property" competes with
physical toys and other means of entertainment.   Hollywood movies
and novels by famous authors are both "commodities", that compete
with each other, as well as sporting events, toys, games, amusement
parks and other real property.    Especially in the case of movies,
the multi-million dollar investment in a "big budget" film would
not occur (and you wouldn't get the neat special effects) in a
low budget film created for "art's sake".  And frankly, many of
the "big budget" films have little redeeming artistic value.
However, without some kind of intellectual property protection,
this form of entertainment would cease to exist.   You can make
arguements that this isn't a "good" use of limited resources,
but it is generally accepted in the U.S. that the market should
choose what products to produce, not the government.  (And such movies
produce a higher profit rate than lower budget films, many of which
receive government subsidies.  This implies that the market does
want to see the big name stars, flashy special effects, etc.)

So for the entertainment market, as well as the productivity
market (including software, large scale bibliographys, and
other research projects), customers are not actually paying for
"information", but the ongoing man-years of work in creating
and revising the work.  Without some kind of protection for
their "current edition", there would be income to finance the
"next release".  And generally, in the entertainment and
productivity markets, competition lowers the costs to at least
managable levels.

Discussions of individual authors supporting themselves
through journalism or the largess of a community might be
appropriate for the rather narrow specialization of the creative
community that publishes fiction.  However, sweeping changes
to copyright law affect Nintendo, Microsoft, MGM, as well
as Stephen King, Neal Stephenson, and even myself as a publisher
on the 'net.

This isn't to say that there aren't problems with the current
system.  The patent system is being abused, at least from
many outsider's perspective.  Copyrights now extend
for an absurd period of time by modern standards, and proposals
exist to extend them further.  Copyright laws have not been
adjusted for digital and Xerographic realities.

But I do believe that informed attacks against the excesses of
the current system are much better justified (and much more
likely to be successful) than calls for a "new kinder world" based
on government paid, salaried "information workers."   (The thought
of Sen. Exon writing the rules for "allowable content while
producing government sponsored information products" sends chills
down my spine.)

Keith Graham
vapspcx@cad.gatech.edu

------------------------------

Date: Fri, 7 Jul 1995 23:47:24 -0500
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 4--Senator Grassley's Buthering of "CMU Study" Stats

((MODERATORS' NOTE: Why does it matter whether the CMU study is
accurate or why Time's irresponsible story on "cyberporn" requires
response? The answer is simple: When flawed studies and irresponsible
shape public debate on complex issues with reckless demagoguery, the
potential exists to shape Constitutional protections of freedom of
expression for decades.  Senator Grassely's comments suggest that he
is more interested in scoring political points than in serving
truth)).

   CYBERPORN (Senate - June 26, 1995)
   Sen. GRASSLEY

   Mr. GRASSLEY. Mr. President, there is an article from Time magazine
   and an article from the Spectator magazine that I ask unanimous
   consent to have printed in the Record at the end of my remarks.

   The PRESIDING OFFICER. Without objection, it is so ordered.

   (See exhibit 1.)

   Mr. GRASSLEY. Mr. President, this morning I want to speak on a topic
   that has received a lot of attention around here lately. My topic is
   cyberporn, and that is, computerized pornography . I have introduced
   S. 892, entitled the Protection of Children from Computer Pornography
   Act of 1995.

   This legislation is narrowly drawn. It is meant to help protect
   children from sexual predators and exposure to graphic pornography .

   Mr. President, Georgetown University Law School has released a
   remarkable study conducted by researchers at Carnegie Mellon
   University. This study raises important questions about the
   availability and the nature of cyberporn. It is this article I ask to
   have printed in the Record.

   Later on, on this subject, some time during the middle of July, I will
   be conducting hearings before the full Judiciary Committee to fully
   and completely explore these issues. In the meantime, I want to refer
   to the Carnegie Mellon study, and I want to emphasize that this is
   Carnegie Mellon University. This is not a study done by some religious
   organization analyzing pornography that might be on computer networks.

   The university surveyed 900,000 computer images. Of these 900,000
   images, 83.5 percent of all computerized photographs available on the
   Internet are pornographic . Mr. President, I want to repeat that: 83.5
   percent of the 900,000 images reviewed--these are all on the

((MODERTORS' NOTE: Grassley's error would be comical if not for the
serious implications.  A few errors in the above paragraph: 1) The
study did not examine 900,000+ images, it examined *descriptive
listings* of images; 2) It did not examine 900,000+ descriptions; it
examined less than 300,000; 3) The 83 pct figure to which Senator
Grassley refers is not from these images, but from a "top 40" Usenet
arbitron rating; 4) The 83.5 percent figure (contrary to what the CMU
study and Time Magazine indicated) are not from all computerized
Internet pictures, but from a subset of Usenet groups dealing with
images; 5) There is substantial evidence to suggest that the 83.5 pct
figure is simply wrong)).

   Internet--are pornographic , according to the Carnegie Mellon study.

   Now, of course, that does not mean that all of these images are
   illegal under the Constitution. But with so many graphic images
   available on computer networks, I believe Congress must act and do so
   in a constitutional manner to help parents who are under assault in
   this day and age. There is a flood of vile pornography , and we must
   act to stem this growing tide, because, in the words of Judge Robert
   Bork, it incites perverted minds. I refer to Judge Bork from the
   Spectator article that I have permission to insert in the Record.

   My bill, again, is S. 892, and provides just this sort of
   constitutional, narrowly focused assistance in protecting children,
   while also protecting the rights of consenting adults to transmit and
   receive protected pornographic material--protected, that is, under the
   first amendment.

   Also, according to the Carnegie Mellon University study, cyberporn is
   really big business. Some computer networks which specialize in
   computer pornography take in excess of $1 million per year.

   Later this week, I am going to introduce the Antielectronic
   Racketeering Act of 1995 which will target organized crime which has
   begun to use the awesome powers of computers to engage in criminal
   activity.

   As we all know from past debates in this body, organized crime is
   heavily involved in trafficking illegal pornography . The
   Antielectronic Racketeering Act will put a dent into that.

   In closing, Mr. President, I urge my colleagues to give this study by
   Carnegie Mellon University serious consideration, and I urge my
   colleagues to support S. 892. I yield the floor.

------------------------------

Date: Thu, 6 Jul 1995 21:50:07 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 5--NEWS: Hacker Disrupts Internet Link (fwd)

               ---------- Forwarded message ----------

(EXCERPTS)

Hacker Disrupts Internet Link          July 4, 1995

   SEATTLE (AP) -- An Internet provider with about 3,000 subscribers shut
down after a computer hacker defeated security measures on the system.
   The electronic intruder entered the system through an Internet link in
North Dakota, but his actual location is unknown.
[...]
   The service was struck last Thursday and Friday by the hacker, who
erased the personal files of Eskimo North administrator Robert Dinse. He
also deleted accounting data and gained access to a list of passwords
used by Eskimo North subscribers, Dinse said.
   "This is extremely sophisticated, and it means major grief for us,"
Dinse said. He said the hacker telephoned him to taunt him after the
attack.

------------------------------

Date: Wed, 12 Jul 1995 01:33:18 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 6--Voice of America on CDA (fwd)

---------- Forwarded message ----------

From--sschoen@sophia.smith.edu (Seth D. Schoen)
Date--12 Jul 1995 04:19:37 GMT

Here's what the Voice of America (gopher.voa.gov) had to say recently about
Sen. Exon's efforts.  I really like the "there is something called newsgroups
where people talk about sex and interest groups" :-)

[begin quote]

      DATE=7/5/95
      TYPE=COMPUTER SERIES 95-383
    NUMBER=3-22486
     TITLE=KEEPING KIDS SAFE
    BYLINE=DAN NOBLE
 TELEPHONE=619-1014
  DATELINE=WASHINGTON
    EDITOR=KLEINFELDT

CONTENT=

(INSERTS AVAILABLE FROM AUDIO SERVICES)

INTRO:   DURING THE COURSE OF CHILDHOOD, CHILDREN LEARN A NUMBER
         OF THINGS, INCLUDING HOW TO CROSS STREETS, AVOID
         STRANGERS, AND REACH THE SAFETY OF HOME.  BUT, COMPUTER
         TECHNOLOGY IS ADDING A NEW DIMENSION, ONE THAT PARENTS
         ARE ONLY NOW BEGINNING TO UNDERSTAND.  DAN NOBLE HAS
         DETAILS.

TEXT:    THERE IS A GREAT DEAL OF INFORMATION AVAILABLE ON
         HIGH-TECH ELECTRONIC NETWORKS.  BUT, APPARENTLY, THERE
         IS A GREAT DEAL OF DANGER.  A RECENT ISSUE OF NEWSWEEK
         MAGAZINE NOTES THAT "MOST DISTURBING OF ALL ARE THE
         TALES OF SEXUAL PREDATORS USING THE INTERNET AND
         COMMERCIAL ONLINE SERVICES TO SPIRIT CHILDREN AWAY FROM
         THEIR KEYBOARDS."  NEWSWEEK IS REFERRING TO THE RECENT
         CASE OF A 13-YEAR OLD KENTUCKY GIRL WHO WENT TO LOS
         ANGELES "AFTER SUPPOSEDLY BEING LURED BY A GROWN-UP
         CYBERPAL."  AND, IN RECENT DAYS, AN AMENDMENT TO A
         COMMUNICATIONS BILL, WAS PASSED BY THE UNITED STATES
         SENATE.  THE BILL SEEKS TO REGULATE SEXUALLY EXPLICIT
         MESSAGES AND MATERIAL SENT VIA COMPUTER.

         ROBIN RASKIN, EDITOR-IN-CHIEF OF FAMILY PC MAGAZINE,
         SAYS, TO PUT THE PROBLEM IN PERSPECTIVE, "THE ADULT
         CONTENT ON THE INTERNET, RELATIVE TO THE VASTNESS OF THE
         (COMPUTER NETWORK) IS A VERY SMALL PORTION."

TAPE:    CUT ONE -- ROBIN RASKIN (0:08)

         "REMEMBER, THIS INTERNET IS JUST UNDER CONSTRUCTION.  IT
         STARTED IN AN ADULT WORLD: IN ACADEMIA AND IN THE
         GOVERNMENT.  SO, THE STUFF FOR KIDS IS KIND OF BEING
         BUILT NOW."

TEXT:    BUT, SAYS ROBIN RASKIN, ONE OF THE PROBLEMS SEEMS TO BE
         THAT ELECTRONIC MATERIAL IS GETTING EASIER FOR EVERYONE
         TO FIND -- ESPECIALLY FOR CHILDREN.

TAPE:    CUT TWO -- ROBIN RASKIN (0:09)

         "THE FUNNY THING IS THAT THE SAME SEARCH TECHNIQUES THAT
         THEY ARE LEARNING IN SCHOOLS TO DO RESEARCH IN SCHOOL
         ARE THE SAME SEARCH TECHNIQUES THAT YOU'D USE TO FIND
         ADULT CONTENT."

TEXT:    ACCORDING TO THE EDITOR OF FAMILY PC, PARENTS CAN DO
         SOMETHING ABOUT STOPPING OBJECTIONABLE ELECTRONIC TOPICS
         FROM ENTERING THEIR HOMES.

TAPE:    CUT THREE -- ROBIN RASKIN (0:19)

         "THERE ARE A NUMBER OF THINGS HAPPENING NOW.  IF A
         PARENT FEELS THAT THEY ABSOLUTELY NEED TO CONTROL THIS
         INFORMATION THERE ARE PRODUCTS LIKE SURFWATCH.
         SURFWATCH COMES WITH ADDRESSES -- PLACES WHERE CHILDREN
         SHOULD NOT GO.  THERE IS SOMETHING CALLED NEWSGROUPS
         WHERE PEOPLE TALK ABOUT SEX AND INTEREST GROUPS.  THOSE
         PLACES ARE DENIED ACCESS TO CHILDREN."

TEXT:    ALSO, A NUMBER OF COMPANIES ARE LOOKING FOR WAYS TO RATE
         THE VARIOUS SITES ON THE INFORMATION SUPERHIGHWAY --
         SIMILAR TO THE RATING SYSTEM USED FOR FILMS AND HOME
         VIDEOS.  EVEN WITH ALL THE ELECTRONIC SAFEGUARDS, ROBIN
         RASKIN POINTS OUT THAT PARENTS MUST BE VIGILANT.

TAPE:    CUT FOUR -- ROBIN RASKIN (0:09)

         "YOU NEED TO BE THERE FOR THEM.  THE SAME WAY YOU WANT
         TO KNOW WHAT THEY DID IN SCHOOL TODAY.  YOU WANT TO KNOW
         WHO THEY ARE TALKING TOO ON THE PHONE.  YOU WANT TO KNOW
         WHAT MOVIES THEY'VE SEEN.  YOU NEED TO KNOW WHERE THEY
         ARE HANGING OUT ON THE INTERNET."

TEXT:    THE U-S CONGRESS MAY ULTIMATELY PASS LEGISLATION TO
         REGULATE WHAT GOES ON COMPUTER NETWORKS.  LAW
         ENFORCEMENT OFFICIALS MAY DEAL DIRECTLY WITH THE PROBLEM
         OF HIGH-TECH PORNOGRAPHY. BUT ROBIN RASKIN, AND OTHER
         EXPERTS, SAY THAT IT IS A PARENT'S RESPONSIBILITY TO
         MONITOR THE ACTIVITIES OF THEIR CHILDREN -- BOTH IN
         CYBERSPACE AND IN THE REAL WORLD.

(ACTUALITIES FROM ABC, ADDITIONAL MATERIAL FROM NEWSWEEK AND USA
                             TODAY)

05-Jul-95 4:32 PM EDT (2032 UTC)
NNNN

Source: Voice of America


[end quote]

------------------------------

Date: Wed, 12 Jul 1995 01:40:38 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 7--'The Hackers Book of Poetry' (fwd)

               ---------- Forwarded message ----------
From--ozzie@world.std.com (Tom C Oswald)
Date--Mon, 10 Jul 1995 20:23:12 GMT

	i am compiling 'The Hackers Book of Poetry' and i need some
works... so if you want to summit anything... i don't care what.. poems,
flames, papers, letters, etc... just send them over to:

ozzie@world.std.com or
pluto@squeaky.free.org

please *don't* post them here.. because then other people could take
credit for your work.... and don't forget to include you name so that i
can give you credit.. thanks

------------------------------

Date: Wed, 5 Jul 1995 21:11:21 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 8--AA BBS appeal for help (fwd)

               ---------- Forwarded message ----------

ALL MEMBERS PLEASE READ AND DISTRIBUTE FREELY!!

Dear Friends,
     A thank you is in order to all that have offered my family and I
support and direct assistance with the current legal issues we've been
faced with.
     Despite great efforts on your part and ours, I'm forced to dictate
this letter to you from within a federal prison versus the comforts of
my home and family offer in far away California.
     Although I'm currently the only person in prison for distributing
"obcene" material accros state lines electronically, currently proposed
legislation threatens to incarcerate you by different means by way of an
old tool called censorship.
     I'm a textbook example of the governments attempt at on-line
regulations. My feelings on this issue will be obvious to anyone that's
remotely knowledgeable with my case.
     Rather than waste your valuable time engaging in mindless anti
government rhetoric I prefer to get right down to the issues at hand. In
short, I'm requesting your assistance in helping my wife Carleen remain
free on bond pending the outcome of the appeal process we both are
currently engaged in.
     The scheduled time for her to begin serving  her sentence was
delayed by the Tennessee judge until July 12th. This delay was given to
allow my wife time to make the necessary arrangements for our children
during our departure from society.
     Any marriage that has lasted the 21 years that ours has, is bound
to have its ups and downs. However, I believe what has happened to my
family re-writes the book on what couples can expect out of family life.
     Carleen and I have two children from our marriage together, both
boys. One son is 14 and the other is 17 years old.
     My eldest son recently graduated from high school this year. Since
I was unable to attend the ceremonies, he chose to do the same against
our advise. My son now faces the next transition which will be college
and adulthood though not necessarily in that order. Adulthood will have
to take place first if he is to be without a father and mother.
     Of course these and more issues apply to my fourteen year old as
well. Most of these issues we do not have the space to even address
properly.
     As any responsible parent knows, times in a kids life such as these
are tremendously important developements that contribute toward the
overall shaping of their future.
     My wife and I have up until now, sucessfully attempted to raise our
two sons with the best education, values, and hopes that can be offered.
Both boys have so far avoided every imaginable pitfall that faces kids
growing up in this generation. I can truely say that my two sons are as
perfect as any parent can ask for. My greatest hope is that at the very
least my wife be allowed to be there to help them get through these most
important changes in their lives. Needless to say it hurts me deeply to
be unable to be there for my family. However, the hurt turns into
constant anxiety for me when I consider the prospect of both parents
becoming elimenated from my son's lives.
     Considering the powerful arguments my wife and I are presenting in
our appeal, I do not feel that the request for my wife to remain home
with our children during this process is unreasonable. Do you?
Considering the national if not global issues surrounding the outcome of
this case I think it would be a fair assumption to say that this case is
far from over. That's the difference. The outcome ultimately decided,
perhaps by the U.S. Supreme Court, directly affects millions of online
users. However, if this case is ultimately heard by the supreme court,
my wife and I will have completed our respective sentences. A favorable
decision at that stage will be a mere token jesture, for my familys life
will be irreverseably changed with  the risk of becoming tragic.
     As I write you this, my wife is awaiting word regarding a motion
filed by our attorneys for continuance of bond.
     If our appeals are exhausted without favorable changes to our
cases, my wife and I have little problem serving a sentence that
represents the best interests for the American public. I would however
be very distasteful to have a favorable decision by the higher courts at
the expense of my broken family. No victory means that much to me.
     In addition to leaving e-mail on Internet, America On-line,
Compuserv, and other bulletin boards, I ask that you send letters to our
attorney in Tennessee, James Causey. His address is 100 North Main,
suite 2400, Memphis, Tennessee, 38103. His fax number is 901-525-1540.
Just a small note is all that it takes to make a difference. No matter
who you are or where you live on this earth, your thoughts are important
and it can make things happen. Thank you all for listening, Robert and
Carleen Thomas.

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 9--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.60
************************************