Computer underground Digest Sun Mar 30, 1997 Volume 9 : Issue 26 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.26 (Sun, Mar 30, 1997) File 1--SUMMERCON 97 (fwd) File 2--[HIP] ("hacking in progress") - How you can help File 3--Reps. White and Bliley: requesting comments on crypto policy File 4--COMMENTARY: Katz on Kids and the CDA File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 19 Mar 1997 16:53:23 From: "noah@enabled.com" <noah@enabled.com> Subject: File 1--SUMMERCON 97 (fwd) Source -Noah The 1997 Summer Security Conference "SUMMERCON IX.V" May 31st, 1997 Atlanta, GA This is the official announcement and open invitation to the nine and 1/2 summer security conference, Summercon. A long time ago, Summercon was an invite-only hacker gathering held annually in St. Louis, Missouri. Starting in 1995, SummerCon became an open event to any and all interested parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators, Law Enforcement Officials, Vigilantes, Neo-Hippies, Secret Agents, Teachers, Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers, Programmers, Conspiracy Nuts, Musicians, Nudists, and Rug Sucking Wannabes. This con is going to be different than previous SummerCons. First off, there are two other major cons happening this summer, Defcon and Beyond HOPE. If you want to see good technical speakers, meet a ton of hackers, and have a good time for a couple days, I suggest you go to one or both of those cons. DefCon information is at http://www.defcon.org, Beyond HOPE info is at http://www.2600.com. So why have SummerCon at all? Well, its a tradition, and most of the people I talked to said we should have it anyways. But, because of the other 2 cons, I am really aiming just to make this a fun weekend with yer friends in a new city, not a technical hacker gala. If you want to learn something, go to HOPE or Defcon. If you want to meet hackers, go to HOPE or DefCon. If you have to choose one con to go to this summer, this one should NOT be it. If you are already going to DefCon and HOPE, and still have one more weekend you want to waste this summer, this is the perfect place for you. If you are a criminal, if you are an anarchist, if you are interested in pulling fire alarms or breaking things, don't come to this con; we don't want you here and you wouldn't like us anyhow. Why 9.5? Well, SummerCon X should be this huge major security conference, but with HOPE this year, we didn't think it was the right year to do another one of those. So, we'll have SummerCon X next year, this one is just going to be a little party. LOCATION It will be held in Atlanta, GA, but we haven't actually figured out WHERE in Atlanta. That's because this is a pre-release of the announcement, when this becomes official, we'll fill in the details. DIRECTIONS Fly to Hartsfield International Airport, look for the hackers. CONFERENCE INFO It has always been our contention that cons are for socializing. "Seekret Hacker InPh0" is never really discussed except in private circles, so the only way anyone is going to get any is to meet new people and take the initiative to start interesting conversations. Because of this, the formal speaking portion of Summercon will be held on one day, not two or three, leaving plenty of time for people to explore the city, compare hacking techniques, or go trashing and clubbing with their heretofore unseen online companions. Futhermore, except for maybe getting Mudge up on stage to blow us all away with some cool technical details, it is probably a pretty good bet that the speeches will end up being boring, long, and a complete waste of time. Don't come to SummerCon to learn anything, because you won't. If you are coming from out of town and want the full hacker/tourist experience, we will be having a specially scheduled 2600 meeting Friday, May 30th, at 6pm at Lenox Mall food court. If you don't know how to get there, just ask, everyone in Atlanta knows. The formal conference will be held on Saturday, May 31st, 1997, from 10am to 5pm (with a break for lunch). There will be a variety of speakers, panel discussions, demonstrations, and other events that will hopefully keep everyone entertained; if not you can always start drinking early. No video or audio tapes will be allowed in the conference room. No still photography will be permitted in the conference room without prior permission of all those being photographed. Violation of these policies will result in you being asked to leave the conference. There will be no selling of t-shirts, disks, firewalls, payphones, etc. in or around the conference area without prior permission of the organizers, and you WON'T get permission. We can't keep you from selling t-shirts in your hotel room, but we can keep you away from the actual conference area, and we can probably get you kicked out of the hotel for soliciting, and if we can, we will. T-Shirt sales is where we make up all the money we spend putting on the conference, and so we will be the only ones selling them. If you want to sell t-shirts, go have your own con. If you are interested in demoing or selling something, please contact us at the address listed at the bottom. If you offer us money, we might let you do it. SPEAKERS The speakers list for Summercon X is still being finalized, but it is sure to be much less interesting than previous years. In fact, right now we have NO speakers, and probably we won't until the day of the con. So again, don't come to summercon for the speakers. If you are an expert in some aspect of computer, network, or telco security and are interested in speaking at Summercon, please contact us to discuss the possibility further at the address listed at the end of this document.. We won't pay you, don't ask. We are also going to be having short speeches by real hackers or phreakers giving their own perspective on some issue or insight into a new technology. This is an open invitation for you hackers to be heard; just provide us with a brief outline of the topic you will be covering and the amount of time you will take (suggested: 5 - 15 minutes) at the address listed below. COSTS Costs for SummerCon X are as follows, these are same rates as last year, which I think is pretty good. There will be NO refunds, and if you annoy any of the organizers, we reserve the right to throw you out, and you won't get your money back. Secret Service / FBI Rate: $500.00 Government / Institutional Rate: $ 80.00 Hacker / Individual Rate: $ 20.00 Members of the United States Secret Service or Federal Bureau of Investigations, and anyone that has in the past or currently is providing information or services to the Secret Service or FBI are required to pay the 'Secret Service / FBI Rate'. Employees of a local, state, or federal government, members and associates of any L.E.O., must pay the 'Government / Institutional Rate'. Anyone that does not fit into one of the above categories is eligible for the 'Individual / Hacker Rate'. Due to historical lack of interest, there will not be pre-registration for the conference. Registration will begin at 10am the day of the conference, and will continue for the duration of the conference or until the meeting facilities have reached their capacity. Since the latter is likely to occur, it is suggested you don't oversleep. No purchase orders, checks, money orders, foreign currency, stock certificates, IOUs, or coins will be accepted for registration. Secret Service agents, small unmarked bills only, please. Bring money for t-shirts, they are cool, and this year we will make enough for everyone (we hope). HOTEL INFORMATION Still working on this part. The cost for a double occupancy room at the hotel is $XX. There is no special conference rate, there is no need to mention you are with a conference at all, the people in reservations probably won't know what you are talking about anyhow. If the hotel is damaged in any manner, you are going to pay for it, and you will probably end up in jail. And even if you are lucky enough to get away with it, the rest of the hackers staying at the hotel will end up paying for it, and I'm sure that's going to make you a well-liked and respected hacker, especially among some of the bigger hackers who might feel tempted to inflict bodily harm on someone who causes any damage to the hotel. Please act responsibly, don't drink and drive, chew all your food before you swallow, don't swallow your gum, and recycle. Anyhow, if you pull a fire alarm, if you damage a room, if you spit on the floor, and any of the organizers, or any of their friends find out, we are going to call the police and have you arrested. In fact, we are making a game out of it. If anyone does any damage to the hotel, we will give whoever tells us what person or persons did it $100 in cash if we are able to get that person taken to jail. CONTACTING SUMMERCON ORGANIZERS You can contact the Summercon organizers through e-mail. If you haven't figured out e-mail yet, you probably shouldn't be coming to Summercon. As a final note, if you are planning on coming to Summercon, we would appreciate you sending e-mail to us with the subject of "GOING TO SCON" or something similar, just so that we have a rough idea of how many people are going to show up. E-mail: scon@2600.com ------------------------------ Date: Wed, 19 Mar 1997 19:02:26 +0000 From: Hacking In Progress <info@hip97.nl> Subject: File 2--[HIP] ("hacking in progress") - How you can help --== Hacking In Progress ==-- 8th, 9th and 10th of August 1997 Near Almere, Netherlands http://www.hip97.nl/ info@hip97.nl Welcome to the HIP announcement list. We are not alone! More than 1600 (!) of you subscribed to this list. As you probably already know what HIP is about, this announcement will focus on how you can help us and how you can stay informed about HIP. Please read the FAQ for more common questions. What is HIP? ------------ HIP is a place for hackers, artists, activists and many, many others to network themselves, both in the social and electronic sense of the word. HIP is a do-it-yourself event. We, the organizers, will provide the infrastructure, such as large tents, showers, toilets and large amounts of reliable electrical power and network connectivity. We'll also arrange for a basic set of workshops and lectures, mainly dealing with the social and political aspects of information technology, security, Internet, access to technology, new developments, cryptography and other 'hacker- related' topics that come to mind. We are open to suggestions for other fields of interest. At this moment we are working on discussions and workshops about smartcard security, Tempest attacks, the SPAM threat, virtual communities, cryptography and the law (Trusted Third Parties and Key Recovery), a tele-presence experiment, activism on the Net, and much more. A do-it-yourself event? ----------------------- We will absolutely need your help setting up everything once we're there. HIPcamp will open on August 5th, three days before HIP starts. If you decide to join in that early expect some pretty primitive circumstances. If you don't care about that, or think that's the best part, you can help build HIPnet and all other facilities. We also urgently need you to think now about what it is you would like to see and do at HIP. Just like Hacking at the End of the Universe in 1993, we need lots of people that have ideas for organizing their own small part of HIP and the organizational talent to do this without too much help from us. One of the proven recipes for fun: * GET a group of friends together in an early stage; arrange how you're going to get there if you're far away. * THINK: Is there something you and your friends would like to show others, discuss or do there? * If so: TELL us about it, so we can coordinate, help or announce things. * Maybe BUY a nice big army surplus tent for almost nothing. * BRING lots of computers and other electronics. * HOOK it all up once you get there. * Check out what others have been doing and MEET nice people, hang out, have fun! Of course you can also come alone and have lots of fun, and there will be a huge exhibition tent to set up computers in. In another big tent there will be near to a thousand chairs where you can listen to and participate with panel discussions. This event will be big, and as said, in this stage we're looking for people to organize their own chaotic little part of it. So don't mail us saying "put me on the list, I want to be a volunteer" when you could say "I'm xxx and I'd like to do yyy." Tell us what you need us to do. We could put your workshop or whatever it is you'd like to do in one of our announcements and on the website, so people can communicate with you beforehand. We could make sure there is enough room if your project requires a lot of space. You name it. You can use the newsgroup alt.hacking.in.progress to find people to work with at HIP. Or you can use the notice board at the website to search for someone to travel with to HIP. Use it to ask for help or offer some. As the days get longer, there will be parts of the overall organization that need coordination with volunteers some time before the actual event (workshop coordination, audiovisual stuff, registration-desk, bar, network), but now is not yet the time. This isn't going to be passive entertainment, we all work together to make it work. Also: HIP is not the event to buy a computer or get advice on buying one, and there're not going to be any beginner courses on using the Internet. If you're not into networking of some sort, you'll think it's boring. But if you're very technically inclined, part of some remote community on the edge of the net, or if the politics surrounding information technology are just your thing, HIP is definitely made for you (and by you, we hope). HIPcamp will open on August 5th, three days before HIP starts. If you decide to join in that early expect pretty primitive circumstances. If you don't care about that, or think that's the best part, you can help build HIPnet and all other facilities. How to stay in contact: ----------------------- * Check out the website http://www.hip97.nl/ * Participate in alt.hacking.in.progress * Read the FAQ on the website or the newsgroup * Mail us at info@hip97.nl Snailmail us at: HIP Postbus 1035 1000 BA Amsterdam Netherlands Tel. +31 20 5352081 Fax. +31 20 5352082 ------------------------------ Date: Mon, 24 Mar 1997 19:33:06 -0500 From: Declan McCullagh <declan@well.com> Subject: File 3--Reps. White and Bliley: requesting comments on crypto policy Source - fight-censorship@vorlon.mit.edu Reps. Rick White (R-Washington) and Tom Bliley (R-Virginia) have been busy sending out letters requesting comments on encryption policy -- and asking pointed questions. The letters have gone to: Lieutenant General Kenneth Minihan, Director of the National Security Agency Secretary William Daley, United States Department of Commerce Director Louis Freeh, Federal Bureau of Investigation Ambassador David Aaron, U.S. Special Envoy for Cryptology Robert Holleyman, President of the Business Software Association Ken Wasch, President of the Software Publishers Association Kathy Kincaid, Director of I/T Security Programs at IBM Attached is the one to the NSA. -Declan ******************* March 21, 1997 Lieutenant General Kenneth A. Minihan Director National Security Agency/Central Security Service 9800 Savage Road Fort George G. Meade, MD 20755-6000 Dear General Minihan: The Committee on Commerce has jurisdiction over all matters relating to interstate and foreign commerce, including commerce transacted over electronic mediums. One vehicle for interstate and foreign electronic commerce, the Internet, has experienced unexpected and exceptional growth. Our Committee has an obligation to ensure that the growth of electronic commerce over the Internet and other networks is not stifled by unnecessary or harmful regulation or policies. Thus, the Committee will be discussing what policies best promote electronic commerce over the Internet and other networks. The growth and success of the Internet and the World Wide Web as both a communications tool, and a medium for electronic commerce is unprecedented. Leading industry estimates indicate that the number of people using the Internet is increasing at the rate of more than 100% per year -- few technologies have had such quick acceptance into the daily activities of Americans. However, the full potential of the Internet as a means for conducting business transactions, or electronic commerce, has yet to be achieved. Most leading experts agree that a developed Internet, and corresponding intranets, have the capability to be engines for economic growth for those offering services over the Internet, and also have the capability to be a means for transforming business operations from one of paper-intensity to one conducted solely through electronic communications and transactions. Unlocking the full potential of the Internet and thus, promoting the use of electronic commerce has been difficult, in part, because of existing and perceived barriers, e.g., many consumers and businesses are concerned with the security and privacy of transactions that would occur over the Internet. A belief in the security of information passed over the Internet and through on-line services that use the public switched network will foster the continued growth of electronic commerce. Fortunately, the use of cryptography or encryption, either hardware or software, may provide a technological aid in the promotion of electronic commerce. We believe, however, that a sound encryption policy for both interstate and foreign electronic commerce must balance users= privacy interests with society=s interest in legitimate law enforcement and investigative needs and the needs to preserve national security. As you know, the U.S. has export restrictions on certain encryption products that may or may not interfere with the development of encryption products designed to secure communications and transactions. These restrictions have been the subject of recently proposed legislation in committees in both the House and Senate. Because of our responsibility over electronic commerce, we seek to have your views on a number of the issues related to the various bills. Therefore, we request that you provide written answers to the following questions by April 25, 1997: (1) With the understanding that there are no domestic restrictions on encryption products, please provide examples where national security may be jeopardized by the relaxation of current American export restriction policy, as incorporated in Executive Order 13026 and implemented, in part, in the corresponding Bureau of Export Administration rules of December 30, 1996. Are there remedies other than export restrictions that would provide the United States government the access it needs to encrypted communications, e.g., increased funding for new advanced computers? (2) How significant is your agencies= consultive role with the Department of Commerce within the current export restrictions? Should this role be strengthened or is it even necessary? How much additional application process time does your agencies= consultive role add to the Department of Commerce=s procedures? (3) It is commonly accepted that current encryption export restrictions imposed by the Administration will delay the proliferation of advanced encryption products, but that it is inevitable that advanced encryption products will be developed world-wide. In your opinion, do export restrictions prevent the development and distribution of advanced encryption products? (4) Are foreign import restrictions consistent with the Administration=s policy? Please identify the countries that have import restrictions and those that have stated their intent not to have any import restrictions. If the United States relaxes its export restrictions, do you anticipate that foreign nations will increase their import restrictions? In addition, we request that your staff analyze and submit their comments on the following: (1) the current export restrictions; (2) the congressional bills introduced that would alter export policy (H.R. 695, S. 376, S. 377); and (3) any other analysis related to encryption export policy your organization has prepared. Please have your staff contact John Morabito or Tricia Paoletta of the Commerce Committee staff at (202) 225-2927 if you have any questions regarding the above request. We thank you in advance for your assistance. With kindest regards, we are Sincerely, Tom Bliley Chairman Rick White Member of Congress ------------------------- Time Inc. The Netly News Network Washington Correspondent http://netlynews.com/ ------------------------------ Date: Mon, 24 Mar 1997 15:02:09 -0800 From: --Todd Lappin-- <telstar@wired.com> Subject: File 4--COMMENTARY: Katz on Kids and the CDA THE CDA DISASTER NETWORK March 24, 1997 Amid all the banter and bluster about the Communications Decency Act, children have been caught in the crossfire. The CDA, though ostensibly aimed at protecting young'uns from the dangers of online smut, may also severely curtail their access to valuable information such as AIDS education materials and many classic works of literature. But even more ominously, as a government lawyer admitted before the Supreme Court last week, the CDA could turn kids into criminals if they discuss issues of sexuality online with other kids. As Jon Katz writes in his Netizen column today, "That a high-ranking government official would consider "unfiltered" access to Penthouse or Hustler a far greater danger to society than turning healthy, otherwise law-abiding older kids into criminals for talking about sexuality is as powerful a commentary as anybody could make about how irrational the discussion in America has become about new media, technology, morality, and children." Jon's piece -- and the unhappy comments about the CDA he's gotten from Net-savvy kids -- are thought-provoking, so I've included the full text of his column below. Work the network! --Todd Lappin--> Section Editor WIRED Magazine ---------------------------------------- FROM: http://www.netizen.com 24 March 97 Media Rant by Jon Katz <JDKatz@aol.com> Youth speak for themselves about the CDA Real children are voiceless and invisible even as they are ostensibly at the center of the raging national debate about ensuring their safety from media, technology, advertising, and pornography. Even though champions of the Communications Decency Act of 1996 characterize the Internet as a danger, and a "revolutionary means for displaying patently offensive, sexually explicit material to children in the privacy of their homes," no children are ever heard from in discussions about their safety. Adults, politicians, and journalists feel free to define kids, delineate dangers facing them, curb other people's freedom in the name of protecting them - yet they are eerily absent from discussions about their welfare. And if you spend any time talking to them, it's clear why. They aren't afraid of new media, and aren't in danger from it. In more than six weeks of touring to discuss children, morality, and old and new media on behalf of my book Virtuous Reality, I never saw or heard from a single young person on more than 150 radio and television appearances, almost every one of which talked about kid's cultural lives and the many "dangers" arising from TV, movies, and the Internet. In the oral arguments before the Supreme Court in Washington on Wednesday discussing the constitutionality of the CDA, US Supreme Court Justice Stephen Breyer elicited a shocking admission from government lawyers - buried deep in most media reports - that the CDA would criminalize countless teenagers who speak about their sexual lives, real or imagined, over email or other Net forums. Breyer asked Deputy Solicitor General Seth Waxman if the CDA "would suddenly make large numbers of high school students across the country guilty of federal crimes." That might be the case, argued Waxman, who added that the prospect of turning hundreds of thousands of teens into federal criminals because they yak about sex was "a small price to pay" to protect children from unfettered access to Penthouse, Hustler, and other sexually explicit material. That a high-ranking government official would consider "unfiltered" access to Penthouse or Hustler a far greater danger to society than turning healthy, otherwise law-abiding older kids into criminals for talking about sexuality is as powerful a commentary as anybody could make about how irrational the discussion in America has become about new media, technology, morality, and children. Given the willingness of politicians and government officials to brand adolescent sexual discussion as criminal behavior, it seems all the more outrageous that media and politicians have completely excluded the young from this discussion. But then, kids won't tell them what they want to hear. Children are presumed by politicians and journalists to be too stupid, vulnerable, and powerless to join in discussions involving their cultural lives and welfare. This is a huge mistake for both politics and media. An entire generation of kids is growing up seeing politicians and reporters as both clueless and useless. Both of these institutions seem to have forgotten that these are future voters and future consumers. But these kids may have long memories, judging from the email I get. If the Net is about anything, it's about giving voice and expression to people who haven't had much, especially in mainstream journalism and politics. Writing about the rights of children in the digital age in a Wired magazine article, about music sanitization at Wal-Mart, kids and pornography and other issues, I've gotten a lot of email from people under 18. Some of these kids email me regularly. Some volunteered their opinions about the CDA this week, and I emailed others asking what they thought about it. All the first names and cities are real. So are all the quotes. I cleaned up some misspellings and edited out some sentences for space. Otherwise, they are quoted directly from email posts. Not one of the children I corresponded with felt the Internet was dangerous or felt there was a need for federal policing of "decency" on the Internet. Almost all wondered why the government didn't move as aggressively to tackle the real problems many of them see every day. Jim from Kansas City, 14, writes: "I don't feel I need protection from the Internet. Why hasn't anybody asked kids like me? I'd love to go in front of the Supreme Court and tell them how great the Internet is. My parents taught me not to give out my name, address, or send anything to somebody I don't know. They taught me that when I was 10. I've been approached once by somebody who asked me if I wanted to send him some pictures for money, and that was in a Usenet group. I said no. It's obvious that wouldn't be a good idea." Patricia from San Jose, 16: "They say this law is supposed to protect me, when it would put me in jail for talking with my camp roommates about sex? Who are they kidding? They aren't trying to protect me. They're trying to control my life and keep power for themselves. I'm not stupid. I can take care of myself. Why don't they take care of people with real problems?" Donna, 15, from Philadelphia: "I have rights. I have freedoms, too. Why are all these old white men telling me what is moral for me?" Arrow from New York City, 9: "The Internet is a great place. I'm not scared of it all. Nobody has ever showed me a dirty picture, and I wouldn't give anybody my address or telephone number, and nobody has asked. I go into AOL chats, and I've seen dirty words, but I used them anyway, before I ever went onto a computer. The kids in my school use them. I don't think that hurts me. Mostly online I email my pen pals from other countries and go onto movie and TV Web sites and play games. My life is so cool since the Internet. I do my homework there, too." Heather from Minneapolis, 14: "Kids in my school form gangs. They carry guns. Guns are easy to get, but they want to make it a crime to talk dirty on the Internet? Brother! These kids really hurt each other, because they don't have parents who will take care of them and watch out for them. My parents watch out for me. They got me a computer because my mom didn't want me to have trouble getting into a good school and getting a good job. She did it because she loves me. She had to work hard to buy me this computer. If these people in Washington want to help kids, why don't they train them to find jobs, and take guns off the streets, and make it a crime to have children when you can't take care of them. If they try to tell me what to say on a computer, they'll be surprised, because my friends and I will never let them do that. I can speak freely on the computer. I can't in school. They should be ashamed of themselves." JimmyD from Arkansas, 12: "No wonder everybody hates Washington. They're incredibly stupid and clueless. Penthouse isn't dangerous for me. Getting killed by a gun is dangerous to me. Don't they have anything to do there but to worry about whether I use dirty words? My father yelled at me and asked me if I ever looked at Playboy online. I asked him if he ever looked at Playboy when he was my age, and he sent me to my room. There are a lot of hypocrites in the world. And most of them live in Washington. That's what the CDA teaches me." Patricia from Brooklyn, 12: "There are a lot of scary people in the world, I think. My friend Arquette was shot in the street. But a computer [her grandmother bought her one] is the safest thing I do. I love it. I can get dirty pictures anywhere. But online, I have new friends from everywhere. I can handle some dirty words. Bullets and knives scare me." Andreas from New Orleans, 11: "What's with these people, man? I do homework online. I use my computer to write. I have friends from all over the world, and I live in a tiny apartment! If I use a dirty word - OK, I've seen some naked women - is that a crime? Why can't I look at a picture of a naked woman? I get good grades. I don't hurt anybody. I don't need protection from the FBI when I go online. My dad told me never to give out my phone number or the place where I live. I don't. That ain't hard." Sandy from Chicago, 13: "My biggest fear? No jobs when I grow up. My sister has been looking for work for five years. It's hard out there, she says. The Internet isn't scary. It's fun and interesting. There's sexual stuff out there, sure. But you don't have to go looking for it, and you can avoid it. My mom told me if I ever see anything I don't like or understand, turn the computer off and go get her. That's pretty easy. Five kids got beat up at the school dance last week. One of them had a knife. That's scary. I'd take a computer anytime." According to the Center for Missing and Exploited Children, fewer than 30 young people have been harmed as the result of online encounters in the history of the Internet, which encompasses billions of interactions involving children every week. Of these, most were adolescents and teenagers who were drawn into dangerous and unhealthy relationships. In l995, nearly 5,000 American children were killed by guns, which are available from Wal-Mart and other fine stores. Copyright =A9 1994, 1995, 1996, 1997 HotWired, Inc. All rights reserved. ### +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ This transmission was brought to you by.... THE CDA DISASTER NETWORK The CDA Disaster Network is a moderated distribution list providing up-to-the-minute bulletins and background on efforts to overturn the Communications Decency Act. To SUBSCRIBE, send email to <majordomo@wired.com> with "subscribe cda-bulletin" in the message body. To UNSUBSCRIBE, send email to <info-rama@wired.com> with "unsubscribe cda-bulletin" in the message body. ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.26 ************************************