Computer underground Digest Wed Mar 19, 1997 Volume 9 : Issue 21 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.21 (Wed, Mar 19, 1997) File 1--Cyber Angels' Antiporn ("FACES") Database Dies (From WIRED) File 2--Apologies for Duplicates of the last issue File 3--STUDY ON CONTENT-RELATED INTERNET LIABILITY File 4--Japanese Internet Users May Need Magician File 5--InfoWarCon 7 ~~ Call for Papers ~~ (fwd) File 6--Re - Maryland online "harassment" bill File 7--Coos Bay search and seizure File 8--Re: File 6--Cyber Promotions, Evil, Evil, EVIL File 9--Re: CuD 9.15 - "Do-Gooders" ?? File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 19 Mar 1997 16:38:18 -0600 From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest) Subject: File 1--Cyber Angels' Antiporn ("FACES") Database Dies (From WIRED) ((MODERATORS' NOTE: It appears that the CyberAngels "FACES" project has been cancelled, according to the following report from WIRED NEWS' Janelle Brown)). CuD readers and others contributed to the ill-conceived From Wired News Archives: Cyber Angels' Antiporn Database Dies by Janelle Brown 2:57pm 14.Mar.97.PST The Internet is chock-full of sexual predators, pedophiles, and free hard-core porn, and according to the Cyber Angels, not enough is being done about it. Thus, the self-described "Internet safety organization" spent six months developing the FACES project, a database of information to help identify children who might be suffering sexual abuse. But the recent demise of the ambitious project, which would have included cropped pictures of children believed to be victims of porn, highlights serious concerns about netizens taking matters into their own hands. .................. The database project, which would have been publicly accessible, had become entangled in moral and legal issues. "Although we were able to build a small database of faces, most child porn available is unsuitable for the project," says [Colin "Gabriel" ] Hatcher. "The children are in distress so you can't get a straight face from it, or the pictures are too old - they are from the 1970s and the kids are adults now." .................. While Hatcher says that the issues brought up in the Cu Digest debate were ones that the Cyber Angels were aware of, the anger that surrounded news of the project highlights netizen concerns about citizen-organized Net-policing. The CyberAngels say they are simply trying to help federal authorities by pointing out "probable cause," but some feel that an organization of thousands citizens out to patrol the Net with quasi-cop intentions is troublesome. It is the same criticism some have of the Guardian Angels patrolling city streets for crime. ........................... With the dissolution of the project, the Cyber Angels will refocus their attention on education issues, aiding netizens who need help, and continuing to patrol Usenet to prevent trouble. With over 200 requests for help coming in each week, they've got plenty to keep them busy - as well as the continuing public debate about whether they are qualified to do what they are doing. ------------------------------ Date: Thu, 20 Mar 1997 01:15:57 +0900 (JST) From: Cu Digest <cudigest@sun.soci.niu.edu> Subject: File 2--Apologies for Duplicates of the last issue Some groups received duplicates of the last issue, the overview of the Internet in Japan. Because of its length, it was inconvenient for some folks, and we apologize for the miscue. Thanks to readers for pointing it out. Here's Jim Schweizer's explanation of the cause: =============== > I'm sorry about causing an extra edition of the > Japanese-Internet cu-digest. Apparently the Linux XFMail program > doesn't strip the header from forwarded mail and this caused a > second copy of my forward to the Tokyo Linux Users Group to go > to CU-DIGEST subscribers. > > Please accept my apology and if appropriate pass it along to > other subscribers. > > Regards, > > Jim Schweizer ------------------------------ Date: Tue, 18 Mar 1997 15:31:03 -0500 From: Dov Wisebrod <dov@CATALAW.COM> Subject: File 3--STUDY ON CONTENT-RELATED INTERNET LIABILITY The study is now available on Industry Canada's site in Adobe PDF format. The study (a 300+ page/1004Kb document - including a 23 page/79Kb summary) was commissioned in the summer of 1996. It provides an analysis of how Canadian law applies to content-related Internet liability in the areas of copyright and trade-marks, privacy and defamation, obscenity, child pornography and hate literature. You can access it at: http://strategis.ic.gc.ca/nme (English) http://strategis.ic.gc.ca/nmd (French) Dov Wisebrod dov@catalaw.com www.CataLaw.com/dov 11:52 Digital Doomsday Clock www.CataLaw.com/doom CataLaw Metaindex of Law and Government www.CataLaw.com LoGIC Legal Group for the Internet in Canada www.CataLaw.com/logic ------------------------------ Date: Wed, 05 Mar 1997 02:07:35 -0500 From: Ari Herzog <ari@ici.net> Subject: File 4--Japanese Internet Users May Need Magician http://www.yahoo.com/headlines/970304/tech/stories/plugged_1.html Taken from Reuters story ---------------------------------------------------------------------- Tuesday March 4 10:06 AM EST Japanese Internet Users May Need Magician By Russell Blinch TOKYO - "What is a wizard?" It was a question asked by Aya Ishihara, general manager of a Japanese Internet service provider run by SSK & RCY Corp., during a recent conversation. Microsoft and other companies have recently introduced "Wizards" -- programs that, seemingly with the powers of a magician, can help frustrated personal computer users load programs and undertake other tasks. While the 29-year-old Ishihara had an inkling of what the Wizard metaphor was all about, her question illustrated why the Japanese are having trouble signing on to the Internet. So, like, wow, they don't know how to surf over to Yahoo on their browsers and hot link to some really cool homepage? "Many Japanese are against these kinds of terms," Ishihara said. It may seem ironic that a country that has flabbergasted the world with so many electronic innovations would be trailing other countries when it comes to the Internet. But many Japanese Internet players believe their country is badly trailing the United States, Canada and even Europe. "Compared with the U.S., it's really behind -- maybe three years," said Masahiro Inoue, president of Yahoo Japan. Internet idiom was a challenge for just about all users when they first took their baby steps on the World Wide Web. It could be argued, however, that North Americans familiar enough with the surf -- or snow -- boarding culture probably had a leg up when it came to adapting to the Web culture. According to the Japan Economic Almanac, there are one million Japanese Web surfers, which is absurdly low for a highly-industrialized country of 125 million. Even Canada, with a population of 30 million, has been estimated to have a Web surfing populace of more than double that. Another barrier to the Internet looming as large as Mount Fuji is the high cost of Web surfing in Japan. The Japanese do not have the luxury of a flat rate system for local phone charges, as surfers enjoy in North America. Instead they must pay a charge per three minutes on a local call. So when an Internet charge is factored in along with local tolls, the cost of fairly moderate surfing can run skyward. An official at the Canadian embassy in Tokyo explained that it was easy to incur a charge of more than 12,000 yen ($100) a month for Internet use -- which is about three to four times what a North American might pay for access. Nevertheless, a number of Japanese players don't believe they can afford to move to flat rate pricing, because it might lead to other problems. They seem well educated in the woes America Online has been facing with congested access to their network. "Maybe flat rate will lead to a chaotic solution," mused Ishihara, who at the same time saw the need for lower fees. There are many signs, however, that the pace of Net development is about to speed up significantly here. A number of Japanese players in the Web community liken the situation to the use of wireless phones. Initially, the West was far ahead in the head count of street corner phone yakkers, but now it looks like the Japanese have taken a collective decision that miniature, wireless phones are indispensable tools for the urban dweller. The phones really took off in 1995 with the introduction of the Personal Handy Phone system (PHS) and a pricing structure that many realized was too good to pass up in Japan's highly regulated communications system. Many online players believe the Internet might be ready for a similar explosion in demand. Officials at Fujitsu Ltd. and Nippon Telegraph and Telephone believe that there are probably more than five million Japanese Netizens when the number of people are counted that log on from the office. People are using the Net at lunchtime, perhaps largely because it is still too expensive for many Japanese to maintain accounts from home. Many Japanese Internet players are very optimistic that use of the Internet in the office will grow and spread to the home. And it would be this kind of growth that might spur a kind of collective wisdom or even "wizardry" from Japan -- as we have seen many times in the past from this country -- that will result in innovation benefiting not only Japan but the entire Internet community. -- For ideas or comments on the weekly Plugged In column contact: russell.blinch+reuters.com. Copyright, Reuters Ltd. All rights reserved ********************************************************************** Ari Herzog ari@ici.net Ari's Simple List of Record Labels http://aleph0.clarku.edu/~aherzog/links/rec_lab.html "Anything that is too stupid to be spoken is sung." -- Voltaire "We are the music makers and we are the dreamers of dreams." -- Arthur O'Shaugnessey ------------------------------ Date: Sun, 16 Mar 1997 08:26:32 -0500 (EST) From: "noah@enabled.com" <noah@enabled.com> Subject: File 5--InfoWarCon 7 ~~ Call for Papers ~~ (fwd) From -Noah ---------- Forwarded message ---------- Date--Fri, 14 Mar 1997 14:58:44 -0500 From--"Betty G. O'Hearn" <betty@infowar.com> Subject--InfoWarCon 7 ~~ Call for Papers ~~ Defensive Information Warfare And Systems Assurance For Community, Company and Country September 11-12, 1997 Sheraton Premier, Tysons Corner, VA Call for Papers Sponsors: National Computer Security Association http://www.ncsa.com and Winn Schwartau, Interpact, Inc. http://www.infowar.com http://www.info-sec.com Interested parties from government, law enforcement, academia, corporations and individuals from all nations are invited to submit papers or concepts for papers/presentation to be given at InfoWarCon 7 and published on http://www.infowar.com. The following Solutions Oriented topics are of special interest to the conference, but all papers will be considered: Case studies and real world successes are strongly encouraged. New technologies, systems, models and approaches to provide higher levels of information and systems assurance in a world where conflict has moved to Cyberspace. (Commercial, Law Enforcement and Government). Detect and Response Solutions Denial of Service Methods and Protection New Info-Sec Models for Local and Global Enterprises Demonstrations of New Emerging Technologies Encryption, Access Control, and Identification The technical and social convergence of the military, law enforcement and private sectors in the interest of National Security: defensive mechanisms, policies and cooperative efforts.. (Commercial and Government) Electronic Civil Defense Policies Alternative National Defense and Intelligence Mechanisms National vs. International Policy Development Educating Populations for Support Dealing with the Non-nation State Actor Cooperative legal, ethical and political means by which to interest, create and sustain international cooperation for the discovery and prosecution of computer crimes and cyber-terrorism. (Law enforcement and Government) Redefining the State Case Studies of Prosecution; Successful and Not Corporate Vigilantism and Self-Preservation Electronic Bills of Rights for Nation States United Nations of Cyberspace Legal Conundra Multi-media presentations, real-time scenarios or gaming, audience participation and highly interactive topics are more likely to be accepted. English is the conference language and all sessions will be unclassified. Submissions are to be in Word 6.0 or greater, Powerpoint, or other popular formats, sent by email to: betty@infowar.com Submission Deadline: May 16, 1997 Acceptance Date: June 9, 1997 For complete information on attendance: Registration: Conferences@ncsa.com Sponsorships: Sponsors@ncsa.com Questions/Help: betty@infowar.com ------------------------------ Date: Sat, 15 Mar 1997 09:20:33 -0500 From: Hitchcock <AreaWoman@JUNO.COM> Subject: File 6--Re - Maryland online "harassment" bill I was dismayed to read that this bill is being thought of as censorship -- it is not. What Mr. Jackson failed to mention in his article is that I testifed ON BEHALF of House Bill 778. Yes, some of the words are not applicable and will probably be struck from the final bill if it is passed, but I feel strongly that online harassers MUST be punished. All you have to do is go to the web site in my signature below to see what I've been through and I had no one I could contact for help. The local police couldn't help me, the FBI couldn't -- no one. So this bill WILL help victims of online harassment, even if it means starting with those who harass via e-mail. I intend on seeing this kind of statute pass, not only in Maryland, but nationwide if I have to. Jayne Hitchcock Read about an Internet Harasser: http://www.geocities.com/~hitchcockc/woodside.html ------------------------------ Date: Wed, 12 Mar 1997 18:04:27 -0500 (EST) From: baby-X <baby-x@slowdog.com> Subject: File 7--Coos Bay search and seizure I'm not in a position to tell you a sense of this statement's validity or whatnot. But I was asked to pass it along, and figured that if there's anything there, one of you guys might be able to find out, if so inclined. baby-X ---------- Forwarded message ---------- From--Killarney <kill@millennium-cafe.com> Date--Wed, 12 Mar 1997 14:48:40 -0800 (PST) Subject--the press release (fwd) this happened at this place down in Coos Bay over the weekend. My friend, who lives there, wants to help spread the word, and get this out to as many people as possible to get the media interested. Forward it to whoever you know. kill ---------- Forwarded message ---------- Date--Mon, 10 Mar 1997 07:28:42 -0800 From--Scott <szaz@harborside.com> To--Andraea.Carman@blitz.emc.maricopa.edu Cc--kxm281@psu.edu Subject--the press release Ok,here's the press release about all that's been going on here,whether you were expecting it or not. If you could do me and everyone here huge,huge favors by passing this on to anyone you can,media where you are or net-connected people, I and others,especially the guy accused,would really really appreciate it. Later. Background Fact Sheet on the Raid on 700 Commercial Ave, Coos Bay, Oregon on 4/6/96 @ 0800am The Issues: Where is the line drawn between a legally issued (though flawed) physical search warrant for a single individual's computer files and/or non-electronic evidence when it is executed in an computer-networked multi-residential building. A Synopsis: A contingent of local Coos Bay, Oregon and State Police, in search of evidence in an alleged computer crime during December 1996 against Koala Computers of Coos Bay, executed a search warrant at 700 Commercial Avenue in Coos Bay on 06Mar97. The search warrant (copies available on request) served by Oregon State Police Detective In Charge, Randy Becker, initiated a total building search lasting eight and one half hours, including the private residences of the twenty people living there, even though the warrant lists only one resident, Dan Parker, as a suspect in the alleged crime and is addressed only to Mr. Parker. The four story ex-hospital houses a hi-tech community and staff for a future, not-for-profit, cultural center and is slated to be the new home for the CyberCat Cafe, a computer coffee house recently forced to vacate its previous locale due to a notice to vacate their prior location without a written cause. Additional technologically-based businesses have applied to lease space to operate from the location once zoning issues are settled with city officials. The in-house computer network in question was installed in late February 1997 and provides Internet connectivity to the residents as well as access to a shared printer. It does not provide file server functionality which is the the ability to share files between computers. Mr. Parker was attached to the network for a total of three days prior to the raid. Although Mr. Parker neither owned nor had access to the other computers on the network, inhabitants were detained in their residences until they were removed during the search, which entailed the copying of hard drives and other storage media as well as a physical search of the individual premises. Vacant rooms in the building where the network does not extend and which contain no computers were also searched. No residents were allowed to witness the search of their living quarters or property. Additionally, one corporate entity in the building, after threatening legal action subsequent to a physical search, had their computers left untouched. Floor plans detailing the commercial and residential space were submitted to Coos Bay city officials as part of a zoning review three weeks prior to the raid. The same plans, which provide both the inhabitant's name and their location within the building have been available on a web page since early January 1997. Additional Background: CyberCat Cafe Owner: Andrea Wasson 700 Commercial Avenue Coos Bay, Oregon xxxxxx (541) 269-7491 e-mail: admin@cybrcat.com Business: The CyberCat Habitat , an Internet Coffee House (currently closed) struggling through zoning issues to reopen in a new location in Coos Bay, Oregon as the only all ages business that offers indoor activities to area teens and their families, in a well supervised, drug and alcohol-free environment). History: Opened April 1996 at 184 Market Avenue in Coos Bay, Oregon, offering computer access, espresso, coffee, soft drinks, juices, and prepackaged snacks, plus acoustical entertainment on Friday/Saturday evenings, and Saturday afternoons. Customer base highly varied, including teens, college age, siblings, parents, senior citizens. In other words, people of various racial, ethnic, sexual orientation, physical abilities, and economic backgrounds within the community. The CyberCat was immediately discovered by area youth and was busy from its inception. Pressure is applied by several area police officers within a couple months of opening for Ms. Wasson, as a business owner, to assume responsibility for controlling the actions or suspected actions of any and all teens in the general area of the business, regardless of their participation or lack of participation in the business as customers. Several initiatives by Ms. Wasson for a joint effort between the CyberCat and members of City Hall to find a solution for this problem are politely but bureaucratically ignored prior to receiving a notice to vacate and being forced to close the doors in October 1996. Several police "encounters" with both younger customers and the owner of the business, lead to a filing a complaint with the city of harassment against the police department after these encounters directly or indirectly provoked the notice to vacate from the landlord at that location. The building manager refused an actual written reason for the lease termination but implied that the interest in CyberCat activities by the Coos Bay Police Department (CBPD) was a determining factor. An internal investigation of the complaint found that neither CyberCat, certain customers, nor the CBPD was guilty of any wrong doing and that all of us were "mere victims of different people's perceptions". Statements making reference to interviews done during that investigation proved to be less than truthful, as many who were listed as interviewed in the process of that investigation claim they were never approached for interviews. Letters of support bearing witness to the harassment events which were sent to city hall during the investigation were ignored. Following the CyberCat's closing, Ms. Wasson and several volunteering residents set out to renovate a large, unproductive building located at 700 Commercial Avenue to create a not-for-profit, cultural activity center for area youth, a project directly motivated by experiences encountered through interaction with area youth at the coffeehouse. The volunteers range in age from 18-67, and number at thirteen adults and three children. Additionally, four people related to the current building owners with whom Ms. Wasson is negotiating the sale, also reside within the building. Each person/ or family has independent living quarters within the building, clearly defined in their mailing addresses and on a floor map posted on the Internet on a public access page which until the first week in March 1997, also outlined the group's intentions for the building. This page is being updated after receipt of a notice of zoning issues was received from the city regarding the need for a conditional use permit in order to reopen the coffeehouse here. However, the basic information remains up on the web. Additional Background: The Raid Pertinent questions are: If this warrant was to secure evidence against one person, why were the rights , personal property and/or computer files of 19 other people in the building impacted and in my opinion, their civil rights violated? Why did the warrant offer no definition of the crimes suspected and more specific information of the evidence that was sought clearly outlined? This "investigation" had been ongoing for over 2 months according to State Police Press releases, why were no female officers dispatched when it was known that women would be included in the raid? Why was a generic search warrant issued against a whole building when separate living quarters were well defined in a publicly accessible forum, in the possession of city officials and also explained first hand to the officers on the scene? Why were people within the building refused the right to basic privacy to get dressed when ordered from their beds, forced to be publicly humiliated while dressing in front of officers on the scene? If all residents were to be impacted by the warrant, why were ALL residents not included and given copies of the warrant? Where does the 4th amendment rights regarding search and seizure stop in regards to a network connection to the Internet when no file sharing capabilities are built into that system? Additional Background: Dan Parker It is interesting to note that there is a current conflict in process between Dan and Koala Computers, his prior employer and the company filing the charges of unauthorized access of a system against him. All of his personal files which were maintained on an in-house terminal at the business (which they claim were deleted through remote access in December 1996) were in fact deleted prior to his leaving their employment. Dan has been seeking payment from them for software programs he developed for them under a separate contract since his employment was terminated and a letter demanding payment for these programs was issued to them via registered mail approximately one month ago after several personal contacts demanding payment failed. He has been aggressively seeking resolution via legal channels regarding this dispute. ------------------------------ Date: Mon, 24 Feb 1997 10:51:48 -0800 (PST) From: Cedric Beust <beust@ILOG.FR> Subject: File 8--Re: File 6--Cyber Promotions, Evil, Evil, EVIL Danny Burstein <dannyb@panix.com> writes: : "What people are doing is jumping around from one (Internet : provider) toanother, and they don't have a secure home. We're : going to give them a home," said Cyber Promotion founder Sanford : Wallace. It seems very scary at first sight, but when I think of it, I have the impression it will help users such like us to filter this junk away. The main problem with spam is that unless it titles some well-known Subject--(uppercase, $ signs, "money", "read this", etc...) or emanates from a notorious spamming domain, it is impossible to filter it automatically. And while it only takes a second to read and hit "delete", it's still both money and time wasted. Now, the spam king (no capital) is saying all the spams will come from one same domain : his. Great ! On an individual basis, it will allow us to tune our filter software more accurately. On a broader basis (a whole domain, or an ISP), I am persuaded that sysadmins will be easily convinced to completely block receipts of mails from this (these) domain, avoiding users to pay for junk mail since it will never reach their mailbox. Now, there is a real threat behind all this, though : if the spam king realizes this, and decides to change regularly the domain from which spams are issued. Registering a new domain name say, each week, is a no-cost for a successful company, and I'm afraid he *will* be successful... Sigh. ------------------------------ Date: Tue, 11 Mar 1997 22:41 EDT From: "E. Allen Smith" <EALLENSMITH@mbcl.rutgers.edu> Subject: File 9--Re: CuD 9.15 - "Do-Gooders" ?? From: IN%"dryden@Radix.Net" "Tracy S. Dryden" 10-MAR-1997 19:28:20.79 >>To the degree that "do-gooder" is treated negatively on CuD, it >>is because of such phenomena as "we're from the government and >>we're here to help you." Only organizations (e.g., the Red Cross) >>with a history of competent, helpful action should be free from >>this suspicion; neither the CyberAngels nor their parent >>organization the Guardian Angels match this description. >>Cooperation between the CyberAngels and such government >>organizations. (As long as I'm replying, I'd like to mention that I seem to have accidentally deleted (including in the version sent to CuD) the last section of that last sentence - it was supposed to have been "Cooperation between the CyberAngels and such government organizations as the FBI does not discourage the dread of the aforementioned phenomenon.") >The Red Cross (at least the American Red Cross) has many times been referred to >as a "do-gooder" organization. Additionally, it's actions have _not_ always >been "competent and helpful." A case in point: Many years ago my ex-wife used [...] >donations of money, with which they would buy _new_ clothing. Even after all >these years I still find this attitude appallingly "dim-witted," as well as >wasteful - attitudes frequently attributed to so-called "do-gooder" >organizations. Thank you for this information; I will avoid thinking of the Red Cross as competent in the future. In the specific context - namely, how the phrase in question was _allegedly_ applied to CuDigest participants - my definition, related to the imposition of regulations (or cooperation in the imposition of regulations) for allegedly beneficial purposes, does appear to still be valid. >Be very careful when you start generalizing, and defining terms for people. It is admittedly possible that "Gabriel" was instead meaning an accusation against CuDigest participants for being suspicious of the _competencies_, not intentions, of the CyberAngels. Given that he did not cite any examples of opposition to _non-regulatory_ agency "do-gooding", this interpretation would make his point even more invalid. (In other words, he claimed that CuDigest participants were generally disparaging of "do-gooding." If, by this, he accused CuDigest participants of a cynical distrust of anyone trying to help (instead of my more specific interpretation of anyone trying to help via regulation), he would need to bring up examples of such alleged distrust when not dealing with regulatory agencies and proponents.) >Meddle not in the affairs of Dragons - >For you are crunchy, and good with mustard. I prefer the "Wizards" variant, myself... :-} ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.21 ************************************