Computer underground Digest    Sun  Aug 18, 1996   Volume 8 : Issue 60
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #8.60 (Sun, Aug 18, 1996)

File 1--Suit filed to enjoin crypto provisions of the ITAR
File 2--ACLU Gives Princeton "F" for Barring Pol Speech on its Network
File 3--Full Text of ACLU Letter to Princeton re: Computer Use Policy
File 4--EYENET: Ontario Tories Get "Make-Over" On The Web
File 5--BoS: Hare Virus Removal - VirusNet (fwd)
File 6--UK ISPs Restrict cyberporn; AOL (again) (news from noah)
File 7--Scientology begins PGP crack attempt (fwd)
File 8--An Apology to Edupage
File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Thu, 08 Aug 1996 15:21:24 -0400
From: "Peter D. Junger" <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
Subject: File 1--Suit filed to enjoin crypto provisions of the ITAR

[I have cross-posted this press release by my lawyers to several
mailing-lists. I am subscribed to all of them and I believe that this
information is relevant to all of them, but I apologize because you
may receive several copies.]

--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
Internet:  junger@pdj2-ra.f-remote.cwru.edu    junger@samsara.law.cwru.edu
		     URL:  http://samsara.law.cwru.edu


------------------------Press Release---------------------------------

Law Professor Sues Federal Government
Over Computer Privacy Issues

Federal Civil Rights Action Seeks Injunction Against
State Department And National Security Agency

Cleveland Scholar Attacks Prohibition On Discussing
Cryptographic Software With Foreign Students And Colleagues


For Immediate Release
Cleveland, Wednesday, August 7, 1996

For More Information Contact:
Raymond Vasvari  (216) 522-1925
Gino Scarselli  (216) 291-8601

More Information Will Be Available at:
URL: //http:/samsara.law.cwru.edu


     A Case Western Reserve University law professor filed suit today in
     federal court, challenging government regulations which restrict
     his ability to teach a course in computer law.  Peter Junger, a
     twenty-five year veteran of the law school faculty, will file a
     federal civil rights action this afternoon in the United States
     District Court in Cleveland.  The suit names the Department of
     State and the secretive National Security Agency, which administer
     federal regulations limiting Professor Junger's ability to teach.

     The case involves the International Traffic in Arms Regulations, or
     ITAR, federal regulations which restrict the export of military
     technology.  Under the ITAR, cryptographic computer software, which
     encodes text to preserve the privacy of messages on the Internet,
     is considered a "munition" and subject to strict export control.
     The regulations raise significant First Amendment questions by
     defining "export" to include discussing technical information about
     non-classified software with foreign nationals, such as students
     registered for Professor Junger's course.

     In recent months, the State Department has sent a series of letters
     threatening possible criminal action to a Florida man who posted a
     simple cryptographic algorithm to the "sci.crypt" Usenet Newsgroup,
     an Internet site popular with cryptography enthusiasts.  These and
     similar incidents have caused Professor Junger to limit his
     discussions of cryptographic material with foreign colleagues, for
     fear of violating the ITAR.  Penalties for unlicenced disclosure of
     cryptographic information are severe: federal law provides ten year
     prison terms and One Million Dollar fines for those convicted of
     violating the Arms Export Control Act, the legislation under which
     the ITAR was promulgated.

     Professor Junger, whose class at Case Western Reserve focuses on
     the legal aspects of computer use and software development, plans
     to turn away any foreign students who register for the course this
     fall, largely because the law is uncertain as to what he may teach,
     and to whom.

     The restrictions at issue are administered by the Department of
     State, in cooperation with the ultra-secret National Security
     Agency, the organization charged with eavesdropping on foreign
     governments.   Under the ITAR, Junger may not teach foreign
     students about even simple software capable of encoding messages.
     Such software is vital to maintaining the privacy of communications
     and financial transactions on the Internet, and Junger believes
     that lawyers need to understand how it works in order to prepare to
     practice in an increasingly technological world.

     The information that Junger wishes to disclose is widely available
     on the Internet and elsewhere.  "It's not as though we are talking
     about classified information,"  explained Gino Scarselli, one of
     three lawyers representing Junger in the case.  "The material at
     issue in this case can be found in any university library,  but the
     regulations make no exceptions for even the most basic software,"
     Scarselli noted.   The lawsuit does not challenge the government's
     right to restrict access to classified information.

     Junger is also represented by Raymond Vasvari and Kevin Francis
     O'Neill, two Cleveland attorneys with considerable experience in
     First Amendment issues.   As Vasvari explained, the suit presents
     important First Amendment questions about the government's ability
     to regulate academic life.  "These regulations allow the government
     to dictate what a professor may and may not teach, even though the
     material involved poses no threat to national security," Vasvari
     explained.

     The suit charges that by requiring Junger to apply for a federal
     license to discuss cryptography with foreigners, the government is
     violating a well-established First Amendment rule which prohibits
     the government from imposing prior restraints on expression without
     clear, narrowly drawn standards distinguishing prohibited
     expression from permissible speech.  The United States Supreme
     Court has consistently held that such prior restraints face a heavy
     burden in court, and that standardless licencing schemes allowing
     officials broad discretion in restriction speech are
     unconstitutional.

     Because computer cryptography is expected to play an important role
     in the economic development of the Internet, the case is being
     closely watched.  Scarselli has worked closely with attorneys
     affiliated with the San Francisco based Electronic Frontier
     Foundation in preparing the suit, and Junger and his lawyers have
     been in frequent contact with John Gilmore, formerly of Sun
     Microsystems, who has offered his assistance as a technical advisor
     in the case.

     At issue is not only Junger's right to discuss cryptography with
     foreigners, but also his and other's right to publish and
     distribute such information both in traditional forms and on the
     internet.

     Professor Junger's suit seeks declaratory and injunctive relief,
     prohibiting the government from interfering with his, or any other
     person's, discussing non-classified cryptographic information with
     foreign persons or from publishing that information.  Lawyers for
     Junger have moved the court for a preliminary injunction.  Junger's
     course begins in the fall semester, later this month.

------------------------------

Date: Thu, 15 Aug 1996 17:14:12 GMT
From: Ann Beeson <beeson@usa.pipeline.com>
Subject: File 2--ACLU Gives Princeton "F" for Barring Pol Speech on its Network

AMERICAN CIVIL LIBERTIES UNION
NATIONAL HEADQUARTERS
News Release   August 15, 1996
       ----------------------------------------------------

Free Speech 101: ACLU Gives Princeton University an "F"
for Barring Political Speech on its Network

FOR IMMEDIATE RELEASE
Wednesday, August 15, 1996

Contact: Ann Beeson, ACLU National (212) 944-9800, x788
David Rocah, ACLU of New Jersey (201) 642-2084

NEW YORK--In a letter sent today to Princeton University officials,  the
American Civil Liberties Union urged them to reconsider a policy barring
students and staff from using the computer network for "political
purposes."

The letter was sparked by complaints the ACLU national office received over
a recent memo from Princeton officials advising faculty, staff and
students, "especially in this year of a presidential election," that the
school's not-for-profit status barred it from allowing use of the computer
network "for political purposes."

The ACLU called this conclusion mistaken, pointing out in its letter that
the Internal Revenue Code specifies that only the University itself is
barred from political activity -- not faculty, staff, or students acting
independently.  In fact, the ACLU said, the IRS has previously held that
statements in support of political candidates appearing on the editorial
page of a student newspaper would not be considered violations of a
university's 501(c)(3) tax-exempt status.

"Because there exists no legitimate reason for Princeton's blanket
prohibition of political speech over the computer network," the ACLU letter
stated, "it is an unjustified content-based restriction on the free
expression rights of students, faculty and staff.  Therefore, the policy is
not only unworthy of a great university like Princeton, it is in violation
of the New Jersey State Constitution."  The letter was signed by ACLU
national staff attorney Ann Beeson and David Rocah, staff attorney of the
ACLU of New Jersey.

"We understand the university's concerns regarding it's tax-exempt status,"
Rocah said.  "But this is free speech 101.  Sadly, Princeton is not making
the grade."

Rocah said the ACLU would consider legal action if the university refuses
to drop its censorship policy.

"Traditionally, college campuses are the center of political discussion and
debate," said Beeson.  "The fact that the debate is taking place on the
Internet does not mean that the speech is any less deserving of
protection."

Beeson added that the policy could bar students and staff from a wide range
of protected expression, including downloading position papers from the
Dole or Clinton website; sending e-mail to their parents urging them to
vote for Ralph Nader; and organizing online discussion groups for  student
chapters of politically active groups such as Greenpeace.   In short, Rocah
said, "Everything that would be acceptable, even welcome, off-line, becomes
off-limits on the Internet."

In its letter, the ACLU called on the school to take a leadership role in
the academic community:  "As a school with a well-deserved reputation as a
leader in American higher education, Princeton should be the first to
promote and defend academic freedom and freedom of expression within its
community, to the very limits of the law," the letter said.

Beeson added that the ACLU  is working to develop model guidelines for
colleges and universities to help sort out the confusion in academia
regarding free expression on the Internet.  Many schools have already put
in place "Appropriate Use Policies" to police student and faculty computer
use, some of which violate rights of free expression, Beeson said.

[The full text of  the ACLU letter and Princeton memo are also available
through the ACLU's website <http://www.aclu.org>and America Online site
(keyword: ACLU).]

------------------------------

Date: Thu, 15 Aug 1996 17:29:11 GMT
From: Ann Beeson <beeson@usa.pipeline.com>
To: fight-censorship@vorlon.mit.edu, rountable@cni.org
Subject: File 3--Full Text of ACLU Letter to Princeton re: Computer Use Policy

AMERICAN CIVIL LIBERTIES UNION
NATIONAL LEGAL DEPARTMENT
132 West 43rd Street
New York, New York 10036
------------------------------

August 15, 1996

Mr. Harold Shapiro
President                 BY FACSIMILE, E-MAIL, & REGULAR MAIL
1 Nassau Hall
Princeton University
Princeton NJ 85044

RE: Computer Use Policy

Dear President Shapiro:

In response to complaints we have received from members of the Princeton
University community, we write on behalf of the American Civil Liberties
Union (ACLU) and the American Civil Liberties Union of New Jersey (ACLU-NJ)
to urge you to reconsider the policy prohibiting members of the University
from using the Princeton's computer network for "political purposes."  We
believe that the policy is based on a misunderstanding of the law regarding
the University's tax-exempt status, and restricts free speech and academic
freedom rights guaranteed by Art. I, par. 6 of the New Jersey Constitution.


Princeton University's decision to offer its faculty, staff and students
widespread access to the University's computer network and the Internet
greatly expanded the resources available for academic research.  It also
provided a new and exciting forum for the free communication of ideas.  In
contrast, Princeton's decision to prohibit the use of the network for
"political purposes" unjustifiably interferes with the right of the
University community to exchange ideas freely, regardless of their content.


Princeton's current computer use policy holds that "the Computing and
network resources of the University may not be used by members of the
University community for commercial or political purposes or for financial
gain . . . ."  Trustees of Princeton University, Rights, Rules,
Responsibilities 11 (1993) (emphasis added) (hereinafter "Rights," attached
as Appendix A).  On July 19, 1996, the Office of the General Counsel sent
an e-mail to members of the University community warning them that any use
of the Internet or computer network for "any participation in, or
intervention in, (including the publishing or distributing of statements),
any political campaign on behalf of (or in opposition to) any candidate for
public office" would result in disciplinary action.  See Office of the
General Counsel, "Internet use and Politics," E-mail of July 19, 1996,
attached as Appendix B.

We understand that the rationale behind the computer use policy is a
concern that the University will lose its tax-exempt status, under Internal
Revenue Code 501(c)(3), if it allows members of the University community to
use the computer network for political purposes.  We believe that this
concern is misplaced, based on the policies and rulings of the Internal
Revenue Service.

Internal Revenue Code 501(c)(3) provides that an educational organization
will be tax-exempt as long as it "does not participate in, or intervene in
(including the publishing or distributing of statements), any political
campaign on behalf of (or in opposition to) any candidate for public
office."  The Internal Revenue Service has clarified that in order to
constitute participation or intervention in a political campaign, the
political activity must be that of the University itself and not the
individual activity of its faculty, staff, or students.  See Internal
Revenue Service, Exempt Organizations Technical Institution Program for
1993 426-27 (1993), attached as Appendix C.  Thus, any personal
communication by University members over the computer network cannot
threaten Princeton's tax-exempt status.

The fact that Princeton provides the computing facilities over which the
communication takes place does not change this conclusion.  The Internal
Revenue Service has stated that a principal factor in determining whether
the provision of university facilities to a group engaged in political
activities will constitute participation in a political campaign by the
university under Internal Revenue Code  501(c)(3), is whether the
facilities are provided on an equal basis to groups using them for
non-political reasons.  Id. at 427.  Princeton provides fair and equal
access to the computer network, including e-mail and World Wide Web access,
to all University members, and allows use of the network for a variety of
non-political purposes.  See Rights at 11.  Thus, political speech over the
network will not jeopardize Princeton's tax-exempt status.

Even use of the computer network for political purposes in connection with
a particular course would not jeopardize Princeton's 501(c)(3) status.  The
Internal Revenue Service has previously held that a university that
required its students in a certain political science course to participate
in a political campaign of the student's choice for 60 to 80 hours during
the semester was not participating in political campaigns within the
meaning of Internal Revenue Code 501(c)(3).  See Revenue Ruling 75-512,
1972-2 C.B. 246, attached as Appendix D.

In addition, student organizations are able to publish political views on
the computer network without threatening Princeton's tax-exempt status.
The Internal Revenue Service has held that a university was not
participating in a political campaign within the meaning of Internal
Revenue Code 501(c)(3), when statements made in support of political
candidates appeared on the editorial page of a student newspaper.  This was
true despite the university's provision of financial support and facilities
to the newspaper, as long as the views expressed in the newspaper were
clearly those of the students and not of the university itself.  See
Revenue Ruling 75-513, 1972-2 C.B. 246, attached as Appendix E.

Accordingly, Princeton University does not risk its tax-exempt status by
allowing University members to use its computer network for political
purposes.  We recognize that Princeton has a legitimate interest in
ensuring that the individual views of its members not be mistaken for
official positions of the University.  At most, the only permissible
regulation that Princeton might desire is one requiring a member of the
University community, who uses Princeton's name in a way that could lead a
reasonable person to interpret the author's statement as an official
position of the University, to include a disclaimer clarifying that the
opinions expressed over the computer network are those of the author alone.
 Compare Rights, "Guidelines Relating to the Tax-Exempt Status of the
University and Political Activities," at Section 3.

Because there exists no legitimate reason for Princeton's blanket
prohibition of political speech over the computer network, it is an
unjustified, content-based restriction on the free expression rights of
students, faculty and staff.  Therefore, the policy is not only unworthy of
a great University like Princeton, it is in violation of Art. I, par. 6 of
the New Jersey Constitution.

Although Princeton University is not a state university, the New Jersey
Supreme Court has held the Princeton University campus to have been
sufficiently devoted to expressive uses so as to require the University to
honor the State constitutional guarantee of free expression.  See State v.
Schmid, 84 N.J. 535, 564-65 (1980); see also New Jersey Coalition Against
the War in the Middle East v. J.M.B. Realty Corp., 138 N.J. 326 (1994)
(holding that regional shopping malls were sufficiently open to expressive
use so as to extend state constitutional right to leaflet).  Princeton's
computer facilities are as much a part of the Princeton "campus" as are the
lawns and buildings.  Princeton may not constitutionally restrict its
students, faculty, and staff from engaging in political speech over the
Internet any more than it could prohibit them from engaging in such speech
in the dorm rooms, classrooms, halls, lawns, and offices of the campus.

Political expression has always received the highest degree of
constitutional protection.  See Buckley v. Valeo, 424 U.S. 1, 14 (1976).
The Constitution was written with the intention to protect from censorship
those who wish to express their political beliefs and their support for
political candidates.  Indeed, "where political speech is involved, our
tradition insists that government `allow the widest room for discussion,
the narrowest range for restriction.'"  State v. Miller, 83 N.J. 402, 412
(1980).  As a school with a well-deserved reputation as a leader in
American higher education, Princeton should be the first to promote and
defend academic freedom and freedom of expression within its community, to
the very limits of the law.

The computer use policy, read literally, also infringes upon the free
speech rights of Princeton faculty, staff, and students to receive
information.  Lamont v. Postmaster General, 381 U.S. 301, 307 (1965) (right
to receive information precludes government from labeling certain
publications "propaganda") (Brennan, J., concurring); Griswold v.
Connecticut, 381 U.S. 479-482-83 (1965) ("right of freedom of speech . . .
includes not only the right to utter or print, but the right to . . .
receive, the right to read . . . and freedom of inquiry, freedom of
thought, and freedom to teach . . . .  Without these peripheral rights the
specific rights would be less secure."); Kreimer v. Bur. of Police for Town
of Morristown, 958 F.2d 1242, 1350-55 (3d Cir. 1992) (listing cases).  This
is because the University's computer facilities, although located on the
Princeton campus, are a gateway to a virtual, worldwide community.  See
ACLU v. Reno, 1996 U.S. Dist. LEXIS 7919 (E.D. Pa., June 11, 1996).  They
provide a unique means for students, faculty, and staff to access
information on virtually any topic, including politics.

Finally, the computer use policy is in conflict with other University
policies and practices.  Princeton recognizes that

     "the central purposes of a University are the pursuit of truth, the
discovery of new knowledge through scholarship and research, the teaching
and general development of students, and the transmission of knowledge and
learning to society at large.  Free inquiry and free expression within the
academic community are indispensable to the achievement of these goals.
The freedom to teach and to learn depends upon the creation of appropriate
conditions and opportunities on the campus as a whole as well as in
classrooms and lecture halls."

Rights, Introduction to "Principles of General Conduct and Regulations."
With respect to political speech, the University also recognizes that it
has a fundamental responsibility to ensure

    "the opportunity for all members of the University community to
exercise their prerogatives as citizens. . . .  Encouragement of an
interest in public affairs and the furthering of a sense of social
responsibility have long been considered important elements of a liberal
education.  The University continues to consider self-chosen participation
in political and social action by individuals and groups to be a valuable
part of the educational experience it seeks to encourage.  Such activities
on the part of individuals or groups do not, and should not be taken to,
imply commitment of the University to any partisan political position or
point of view."

Rights, Introduction to "Guidelines Relating to Tax Exempt Status."

For all of the above reasons, we strongly urge you to repeal the existing
ban on use of the computer network for political purposes, and we look
forward to your early reply.

Sincerely,

Ann Beeson, Staff Attorney
American Civil Liberties Union
National Legal Department
132 West 43rd Street
New York, New York 10036
(212) 944-9800 x788

David Rocah, Staff Attorney
American Civil Liberties Union
  of New Jersey
2 Washington Place
Newark, NJ  07102
(201) 642-2086


cc:    Office of General Counsel

------------------------------

Date: Wed, 17 Jul 1996 20:59:11 -0400
From: eye WEEKLY <eye@eye.net>
Subject: File 4--EYENET: Ontario Tories Get "Make-Over" On The Web

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY                                               July 18, 1996
Toronto's arts newspaper                      .....free every Thursday
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYENET                                                          EYENET

               ONTARIO TORIES GET "MAKE-OVER" ON THE WEB

                                  by
                            K.K . CAMPBELL

6 am. I ascended the stairs to the eyrie in which my computer was
perched. The little mail program flag was up. Personal mailbox.

Navigating a steaming (and grungy) coffee cup to lips, my other hand
rifled through the usual collection of crap from the night. Nothing
special... wait, here was something. From "Anonymous."

I opened it and scanned the headers for which remailer -- the
Netherlands.

The anonymous author(s) wrote me: "The Ontario Progressive
Conservative Web Site has been hacked by absolut(0) & Essex. It has
been given a new look that we @ fix feel is a more suitable reflection
of their policies and ideology."

I was politely asked to visit the Tory web site at
http://www.ontariopc.on.ca.

"What the hell," I muttered and moused to the URL, expecting nothing.
The page came up: a picture of a Mike Harris sign burning.

Now, _that_ woke me up.

Putting coffee aside, I went back to the email, scanning the headers
much more closely this time. The missive was dated July 11, 5:08 am
(Dutch time). Assuming our anonymous friends were actually in Ontario,
that meant the letter was sent around 11 pm the night before
(Wednesday, July 10).

Back to the web site. I realized why the picture of Harris was so
familiar. It was from the Embarrass Harris web site
(http://www.eye.net/Misc/Harris). I had scanned it myself. (Actually,
I scanned a much larger picture, "absolut(0) & Essex" were using a
cropped detail from it.)

The "new-look" Tory site featured a quote from the US intellectual and
pinup boy Noam Chomsky:

"And apart from the most cynical, [the corporate and government]
planners must convince themselves of the justice of the actions, often
monstrous, that they plan and implement. There are only two pretexts:
self-defence and benevelonce. It need not be assumed that use of the
tools is mere deception or careerism, though sometimes it is. Nothing
is easier than to convince oneself of the merits of actions and
politics that serve self-interest."

(Actually, the quote might be from John Snobelen's "Summer of 95"
video pep talk.)

Only other text was a quote from Jim Hightower: "Let's keep our
factories and jobs here and move our corporate headquarters to Mexico,
Korea, or wherever else we can get some reasonably priced chief
executives."

"Anonymous" concluded the email to me: "We are happy that we could
help out. We imagine the 'new look' will last 24-72 hrs so see it
while you can."

The new-look Tory page was gone faster than that. News of it spread
like wildfire. Toronto's Golan Klinger even put it up on a big screen
at the Metro Convention Centre COMDEX show.

Finally a Tory was dragged off the golf course and cellphoned net
provider Magic to replace the hack. Having no other material at hand,
Magic put up an ad for themselves.

                  FOR OUR FINGER-PRINTIN' FRIENDS

In December 1994, someone did an anonymous newsgroup spoof of then-
Ontario premier Bob Rae (an impersonation, not a real forgery). At the
time, the Tories told eyeNET that if anyone did that to them, they
would track down the vile criminals. (To his credit, Rae took the
spoof in stride in a real follow-up post to the net.)

When the Tories won the election, they killed the premier account Rae
had established. They didn't want anything to do with the net.

Being loyal Ontarians, we at eyeNET want to help our finger-printin'
friends at Queen's Park track down these vile hackers. Here are two
helpful URLs: The Canadian Security Intelligence Service at
http://www.csis-scrs.gc.ca, and the Ontario Provincial Police --
http://www.gov.on.ca/OPP. Get to works, boys!

Hmm. You Tory chaps are probably scratching your heads, wondering if
this Noam Chomsky guy is some superhacker in the computer underground.
Here's another helpful URL:
http://www.worldmedia.com/archive/index.html. New World Media and ZNet
host the net's largest collection of Chomsky writing (almost eight
megs of text).

And for that strange conceptual stuff about CEOs being economic
parasites... you can read more about it at
http://www.panix.com/~dhenwood/LBO_home.html -- which web page is a
previous winner of an eyeSITE Web Award.

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace        Author holds standard copyright
http://www.eye.net                              Mailing list available
eyeNET archive -----------------------> http://www.eye.net/News/Eyenet
eye@eye.net          "...Break the Gutenberg Lock..."     416-971-8421

------------------------------

Date: Thu, 15 Aug 1996 12:38:35 -0400 (EDT)
From: Noah <noah@ENABLED.COM>
Subject: File 5--BoS: Hare Virus Removal - VirusNet (fwd)

From -Noah

---------- Forwarded message ----------
Date--Thu, 15 Aug 1996 11:41:55 -0400 (EDT)
From--Safetynet, Inc. <safety@gti.net>
Subject--BoS--Hare Virus Removal - VirusNet

Safetynet Virus Alert
 ---------------------

Virus: Hare.7610, Hare.7750, Hare.7786
Type: Resident Stealth OSBR MBR EXE COM
Frequency: Common

As you probably already know, the Hare virus (PC platform) is set to
trigger on August 22 and September 22.  Computers infected with this virus
may have their hard drive information erased.

Safetynet has included detection and removal for the three known variants
of the Hare virus in its VirusNet v2.24 scanner update.  All registered
users should download this update and scan their computers daily through
the end of September.  A total of 8,300 virus are detected by v2.24.

Evaluation versions of VirusNet with full virus detection and removal are
also available for download. Visit the Safetynet WWW site at
http://www.safe.net/safety/ and select the Free Stuff link.  For Windows
95, Windows NT, Windows 3.x and DOS users, download VirusNet 95.  For
network administrators who wish to scan an entire network, download
VirusNet LAN.

Questions about this and other virus related issues should be sent to
support@safe.net.

------------------
Virus Support Team
Safetynet, Inc.

------------------------------

Date: Sun, 11 Aug 1996 23:18:33 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 6--UK ISPs Restrict cyberporn; AOL (again) (news from noah)

U.K. INTERNET PROVIDERS PLAN TO RESTRICT CYBERPORN
Reacting to pressure from Scotland Yard, the Internet Service
Providers Association, representing 60 of an estimated 140
providers in the United Kingdom, will be asking its members to
voluntarily block access to sites and services featuring
hard-core pornography.  An executive of Demon Internet, which has
the largest subscriber base in the U.K., dismisses the proposed
action as ineffective:  "This is not a solution, it is just
hiding the problem."  (Financial Times 10 Aug 96)

AOL SEES  ITS IMPORTANCE "MORE CLEARLY THAN EVER"
Following last Wednesday's 19-hour blackout of America Online on
August 9th because of system problems that developed during
routine maintenance, AOL chief executive Steve Case concluded
that "the disruption caused by the temporary unavailability of
AOL illustrates more clearly than ever before how important AOL
has become in the daily lives of our members."  Case said:  "We
still have a long way to go to make AOL as reliable as must-have
utilities such as electricity and the telephone.  But that's what
we intend to do."  Members will get credit for the lost service,
which, for individuals who subscribe to AOL's standard billing
plan, will amount to about a 30-cent credit.   (Atlanta
Journal-Constitution 9 Aug 96 D2)

------------------------------

Date: Fri, 16 Aug 1996 07:31:50 -0700 (PDT)
From: Declan McCullagh <declan@eff.org>
Subject: File 7--Scientology begins PGP crack attempt (fwd)

Newsgroups--alt.religion.scientology,alt.security.pgp
From--grady@netcom.com (Grady Ward)
Subject--Criminal cult begins PGP crack attempt

The Special Master has informed me that Madame Kobrin has asked
her to retain a PC expert to attempt to "crack" a series of
pgp-encrypted multi-megabyte files that were seized along with
more than a compressed gigabyte of other material from my safety
deposit box.

Ironically, they phoned to ask for assistance in supplying them
with a prototype "crack" program that they could use in iterating
and permuting possibilities. I did supply them a good core
pgpcrack source that can search several tens of thousands of
possible key phrases a seconds; I also suggested that they should
at least be using a P6-200 workstation or better to make the
search more efficient.

The undercurrent is that this fresh hysterical attempt to "get"
something on me coupled with the daily settlement pleas reflects
the hopelessness of the litigation position of the criminal cult.

It looks like the criminal cult has cast the die to ensure that
the RTC vs Ward case is fought out to the bitter end.  Which I
modestly predict will be a devastating, humiliating defeat for
them from a pauper pro per.

I have given them a final settlement offer that they can leave or
take. Actually they have a window of opportunity now to drop the
suit since my counterclaims have been dismissed (although Jusge
Whyte invited me to re-file a new counterclaim motion on more
legally sufficiant basis).

I think Keith and I have found a successful counter-strategy to
the cult's system of litigation harassment.

Meanwhile, I could use some help from veteran a.r.s'ers. I need
any copy you have of the Cease and Desist letter that you may
have received last year from Eliot Abelson quondam criminal cult
attorney and Eugene Martin Ingram spokespiece.


Physical mail:

Grady Ward
3449 Martha Ct.
Arcata, CA  95521-4884

JP's BMPs or fax-images to:

grady@northcoast.com

Thanks.

Grady Ward

Ps. I really do need all of your help and good wishes after all.
Thanks for all of you keeping the net a safe place to insult
kook kults.

------------------------------

Date: Sun, 17 Aug 1996 19:22:32 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--An Apology to Edupage

CuD periodically receives news clippings or other items that
helpful readers forward to us for publication. We stress that
either permission should first be received for reprinting, or
that the items should be edited for fair use.

We also emphasize that the original source *MUST* be attributed.

Because we have neither the time nor resources to check on
forwarded posts, we rely heavily on submitters to assume
responsibility for copyright compliance.

Most recently, we inadvertantly reprinted excerpts from EDUPAGE
without attribution. We apologize for the error, and thank the
reader who recognized the source and let us know.

We appreciate the forwarded material that readers send, and we
equally appreciate being informed of possible goofs.  Keep them
both coming.

------------------------------

Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #8.60
************************************