Computer underground Digest Sun Apr 20, 1997 Volume 9 : Issue 31 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.31 (Sun, Apr 20, 1997) File 1--XT clone for donation or sale (Sun Devil Redux) File 2--ACLU Cyber-Liberties Update File 3--Technology and Society (from NETFUTURE #45) File 4--Texas ISPs Targed in Secessionist Case File 5--Crack DES Challenge File 6--(Fwd) A listserv joke File 7--Family-Friendly Internet Access Act of 1997 File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Thu, 10 Apr 1997 09:18:48 -0500 (CDT) From: Bob Izenberg <bei@austin.sig.net> Subject: File 1--XT clone for donation or sale (Sun Devil Redux) ((MODERATORS' NOTE: Back in the dark days of early 1990, when the US Secret Service "discovered" TGHM (The Great Hacker Menace), Bob Izenberg was one of the system administrators caught up in the Kafkaesque nightmare of legal limbo. He was never arrested, indicted, or accused of wrong-doing, but his computer equipment was seized and prosecutors left him limbo for years. In part, it seemed that, like Dr Ripco and some others, the feds weren't sure what to do with him, and personnel changes amongts the feds added to the confusion on both sides. Finally, somebody in the USSS figured out that maybe, just maybe, somebody should close the case and return his equipment. For a summary of what all the fuss was about back in 1990, go out and buy Bruce Sterling's THE HACKER CRACKDOWN, which remains the best source of information for the period)). The United States Secret Service has returned to me the PC-XT clone system seized at my residence in February of 1990. It still works, which surprised me, but of course its disk had been wiped. It wasn't bad for an XT by the standards of the day: 2Mb EEMS memory card, Perstor disk controller, full-height 70Mb MFM fixed disk, NEC V20 processor. Today, of course, it's a doorstop. Anyway, as Ron Roberts and many other taxpayers graciously paid for its storage for all these years, it's the least that I can do to give it away to a worthy cause. Or even an un-worthy cause, just to get it out from under the desk. No, it won't run Windows 95 or any software written in at least the last five years. No warranty is offered, other than an assurance that seven years stored next to the Ark of the Covenant in Illinois hasn't damaged (or improved) it one bit. First come, first served, and you pay the shipping. After May 1st, it's history if nobody's claimed it. Bob -- ================ "We make the Internet work." ================ bob izenberg phone: +1 512 306-0700 sig.net network operations bei@sig.net ------------------------------ Date: Wed, 16 Apr 1997 20:19:36 GMT From: "ACLU Cyber-Liberties Update Owner"@newmedium.com Subject: File 2--ACLU Cyber-Liberties Update ACLU Cyber-Liberties Update Wednesday, April 16, 1997 * Act Now to Restore Telephone Privacy - Fax Congress The FBI is using a 1994 law (CALEA, or the "Communications Assistance to Law Enforcement Act") to force telecommunications companies to change their equipment and facilities to weaken privacy protection and provide enhanced wiretap access for government agents. In 1994, Congress authorized a half-billion dollars to pay for changes in old technology but blocked actual funding until last year when Congress both set up a special "slush fund" using excess funds from intelligence and law enforcement agencies and said the FBI could spend part of the money authorized in 1994. But Congress prohibited spending any money until the FBI submitted an implementation plan approved by Congress. The annual appropriations process gives us yet another chance to tell Congress not to allow this unprecedented attack on our privacy. Let your own representative and senators know that you want them to oppose funding this attack on your telephone privacy. Use the ACLU web site action fax page to send a fax to your members of Congress telling them not to fund CALEA! The free web-to-fax gateway will allow you to look up your representatives on Capitol Hill and send faxes right to their offices. It can be found at: http://www.aclu.org/action/calea_act.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * Privacy Risks Shut Down Government Web site The Social Security Administration recently announced that it had shut down an Internet site that supplied information about people's personal income and retirement benefits because of concerns that it might violate privacy rights, the New York Times reports. Thousands of people have obtained such data on the World Wide Web by requesting "personal earnings and benefit estimate statements." A computer user seeking the information need only supply a name, address, telephone number, place of birth, social security number and mother's maiden name. Experts on computer and privacy law expressed concern that such safeguards were not enough to keep people from obtaining confidential electronic data about others. "It remains unclear exactly where SSA officials were trying to go with this program, but in any case they ran over the privacy of 140 million Americans to get there,"said Don Haines, legislative counsel on privacy and cyberspace issues for the Washington national office of the American Civil Liberties Union. "We appreciate that the agency was trying to expand access to public information, but in doing so, it made the information a little too public. Without providing appropriate safeguards, the agency had no way of insuring that private information was only available to those entitled to have access." Haines said that with confidential information open to ex-spouses, landlords, employers, co workers, intrusive neighbors and credit agencies, the potential for abuse was enormous. The ACLU is working with members of Congress on legislation to correct the problem. Acting Commissioner of Social Security John J. Callahan said the agency would hold public forums around the country in the next 60 days to hear from beneficiaries and experts on privacy and computer security. This is just the most recent case of problems with the privacy of records held by the Social Security Administration. Almost exactly a year ago, in what computer experts said might be one of the biggest breaches of security of personal data held by the Federal government, Federal prosecutors in New York revealed that several employees of the Social Security Administration passed information on more than 11,000 people to a credit-card fraud ring. That information, the prosecutors said in court papers, included social security numbers and mothers' maiden names, and allowed the ring to activate cards stolen from the mail and run up huge bills at merchants ranging from J&R Music world to Bergdorf Goodman. The Internet address of the Social Security Administration is http://www.ssa.gov. General information about Social Security programs is still available there. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * Witnesses testify in New York State Cyber-censorship case. Oral Arguments scheduled for April 22. In hearings last week, witnesses representing an online arts group,a library, a gay issues forum and the American Civil Liberties Union all testified that a New York statute barring "indecency" on the Internet could subject them to criminal prosecution. Their testimony on Monday April 7 concluded three days of courtroom hearings before Judge Loretta A. Preska in ALA v. Pataki, the challenge to New York`s Internet censorship law brought by the American Civil Liberties Union, the New York Civil Liberties Union, the American Library Association, and others. The groups argue that the law, which imposes criminal sanctions of up to four years in jail for communicating so-called "indecency" to a minor, would reduce all speech on the Internet to a level suitable for a six-year-old. The ACLU successfully challenged a similar federal law in Reno v. ACLU, currently under review by the Supreme Court. "We think we were able to demonstrate the disastrous effect the New York law -- like the federal CDA -- would have on individual speakers and non-profit groups who communicate on the Internet both within and outside the state of New York," said Ann Beeson, an ACLU national staff attorney who conducted direct examination of several plaintiff witnesses. "A long line of well-established Supreme Court decisions demonstrate that government cannot ban protected speech for adults in the name of shielding children." Beeson is profiled in this week`s New York Magazine, in an article that raises, and answers in the affirmative, the question "Could it be that New York`s redundant, unconstitutional Internet-indecency law is more useful for scoring political points for protecting children?" Judge Preska has scheduled oral arguments in the case for April 22. Argument will begin at 2:00pm in room 12A at 500 Pearl Street, New York City. Full information on the New York Internet censorship case, including links to transcripts, can be found at http://www.aclu.org/news/nycdahome.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ACLU Cyber-Liberties Update Editor: Lisa Kamm (kamml@aclu.org) American Civil Liberties Union National Office 132 West 43rd Street New York, New York 10036 To subscribe to the ACLU Cyber-Liberties Update, send a message to majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your message. To terminate your subscription, send a message to majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body. The Cyber-Liberties Update is archived at http://www.aclu.org/issues/cyber/updates.html For general information about the ACLU, write to info@aclu.org. PGP keys can be found at http://www.aclu.org/about/pgpkeys.html ------------------------------ Date: Wed, 9 Apr 1997 17:19:23 -0400 From: Steve Talbott <stevet@ora.com> Subject: File 3--Technology and Society (from NETFUTURE #45) ((MODERATORS' NOTE: We came across NETFUTURE and were impressed by it. Here's a sample of the articles that Steve Talbott, the editor, runs. This E-Zine is worth taking a look it!)) +++++++++++++ Technology and Human Responsibility ------------------------------------------------------------------ Issue #45 Copyright 1997 Bridge Communications April 9, 1997 ----------------------------------------------------------------- Opinions expressed here belong to the authors, not Bridge Communications. Editor: Stephen L. Talbott NETFUTURE on the Web: http://www.ora.com/people/staff/stevet/netfuture/ You may redistribute this newsletter for noncommercial purposes. From Steve Talbott <stevet@ora.com> The evidence of our hollowing out as human beings is staring us in the face. Is anyone home? These days no article about technology and society seems complete without at least one reference to the accelerating pace of change. But, despite their ubiquity, a number of these references have particularly jumped out at me in recent weeks. Here are a few examples: * An article about Cisco in the *Boston Globe* described that company's current, top-of-the-line router, the model 7500, which sells for some $100,000 "fully loaded," and routes a million packets per second. "For a while," the article noted, "that capacity set the industry standard. But within months of the 7500's release in 1996, some Cisco customers were describing the machine as `long in the tooth' and `dinky.'" * The *EE Times* carried a piece about a new generation of fast Internet protocols. A high-tech executive is quoted as saying, "This is not a little, incremental shift. It's a major disruption of everything that's going on in the industry." * Princeton University vice president, Ira Fuchs, on Internet II: "It's not as simple as `You change the backbone and all will be well.' For individual users to take full advantage of the change in the infrastructure, you'll have to change everything." Also, "the technology is advancing so rapidly that by the time the computer you originally asked for is finally delivered, you don't want that computer any more." * From *Publisher's Weekly*: Database vendors serving libraries "have become frustrated with the number of new platforms they have to support. It cost one company $2 million to convert its databases to SGML for CD-ROM. Then the Web and HTML came along, costing $100,000 more for conversion, and now they must ready themselves for Java." * The *Economist*: A venture capitalist who sits on the boards of several small Internet companies says that "`a major strategic decision' is taken at virtually every meeting. This nimbleness is prompted by fear. The technology market changes so quickly that any company which fails to adjust will get pushed out." The magazine goes on to report that "age and experience, which elsewhere get people promoted, are no help in [Silicon] valley; on the contrary, there is a distinct bias in favor of youth. Nowadays the average software- engineering qualification becomes obsolete in around five years, so a student fresh out of college may be more valuable to a company than a 40-year-old. Many of the new Internet firms are headed by people in their mid-20s." Here closer to home, I find that my text-only Lynx browser is rapidly becoming a cripple on today's Web. Many sites now require frame support, which my browser does not have. Other sites, such as MSNBC, immediately hang the window in which I'm working; Lynx compatibility is simply not something Web site managers worry about. Apparently, as a sixteen-year veteran of the Net who would rather not spend his time downloading cutesy graphics, I've gotten myself a little behind the curve. I might as well be a dinosaur. The browser problem illustrates, I think, one striking fact about many Web sites: they are content providers for whom content scarcely matters. They do not begin with something important to say, and then seek the most effective vehicle for saying it. Rather, they are enamored of the vehicle (latest model only!) and are looking for something to say with it. Not surprisingly, the result is a lot of pandering. The message is there only to serve alien purposes. This is no eccentric reading of my own. It is the explicit acknowledgment of an entire industry that begins by producing and playing with whatever is technically feasible, and then hopes for a "killer app" to fasten the technical innovations upon the body social. Here, too, some recent news reports have leapt out at me: * Speaking of the high-tech transformation of the U.S. military, the *Economist* writes: "This embryonic revolution, unlike the development of nuclear weapons, has not emerged in response to any particular threat to the United States or its allies. It has come about because it is there -- that is, because generals want to play with new technologies in case a future threat emerges." * *Internet World* tells corporate executives they must embrace intranets for no other reason than that they are happening. "You can catch the Intranet wave and ride it or let your firm and your LAN be overwhelmed by the tides of change." The argument? None seems to be necessary. It's enough that intranets are *there*, and are deemed to represent a technical advance. "By now, you've gathered that intranets can be pricey and, in some ways, hard to manage. Are they worth it? The answer is yes. The future clearly belongs to the intranet model. Proprietary LANs ... have run their course. The future belongs to intranets, where getting information anywhere and anytime is possible for your users." * And the *Economist* again: "By 2000 customers will have shelled out a total of $200 billion on networking software and related equipment; but most forecasts for revenues from Internet-related activities, such as advertising on websites, are no more than $35 billion -- hardly a quick return." If you build the technology, a killer app will eventually come -- such is the reigning faith. Of course, as long as the rest of us are willing to go along with this backward game, chasing after the latest gadgetry regardless of need, it works quite well. Out of this willingness, the technological "necessity" that so many perceive in these matters is born. It's a strange infatuation that has a mature society hitching itself with uncritical enthusiasm to whatever happens to issue from the endless rows of cubicles where programmers -- often college students -- exercise their technically constrained and hopelessly uneducated imaginations. The cubicles themselves, I suppose, are a pretty good image of the inevitable result. We always mirror our inner worlds in the outer. The Loss of Purpose ------------------- So, what is going on here? Technical innovation -- the devising of new tools -- is surely a desirable activity. But unless there is a balance between our fascination with tools and our concern for the ends they may help us achieve, the tool becomes tyrannical. What stares us in the face today is the startling fact that, not only has the balance been upset, but one of its terms has virtually disappeared. Technological innovation now proceeds for its own sake, driven by its own logic, without reference to human need. We are a society obsessed with new tools, but incapable of asking in any serious way, "what are we developing these tools *for*?" It's rather as if a musician became so enamored of new instruments capable of generating novel sounds that he lost all interest in seeking the kind of disciplined musical inspiration that makes his art finally worthwhile. What I'm talking about here -- and what the preceding quotations testify to -- is a reversal of ends and means. I previously (NF #39 and NF #40) tried to show what this reversal looks like within the individual company, where the pursuit of worthwhile ends under the discipline of economics eventually gets twisted around to a pursuit of profits as an end in themselves. Now, however, I'm talking about society as a whole, driven as it increasingly is by the high-tech industry. A society obsessed by tools and technology without a balancing focus upon ends is a society whose members are being hollowed out. It is, after all, in establishing and pursuing higher values -- something we can only do from within ourselves -- that we assert our humanity. Otherwise, we merely react, machine-like, without internal compass. That is, we become like the programmed machines to which we devote so much of our energy. I for one would not want to quarrel with those who recognize a certain necessity in the one-sided tool focus of the past few hundred years. Nor would I want to insist that the U.S. military cease pushing its technical capabilities to the practical limit. And surely there is in any case little likelihood that the foreseeable future will bring a significant slowing of the overall, furious extension of the technical reach of our tools. What this means is that everything hinges upon our ability to counterbalance the prevailing technical mania with a strengthened inner compass. We must, wherever possible, be all the more forceful in asking, What is this tool *for* -- how does it relate to the deepest needs and yearnings of the human being? The stronger the tendency of the high- tech/commercial matrix to drive itself forward in terms of its own inherent logic, the more we must appeal to needs, values, and human ends in order to reign in and guide this logic. In making this effort we can hardly be satisfied with the hollow platitudes of those who would sell us an endless array of new gadgets. Our pressing need is *not* for more information, or faster access to information, or more connectivity. Our decisive problems arise -- as many others have noted -- from the lack of meaningful, value-centered contexts to which new information can be assimilated, and from those connections to other people we already have, but do not know how to deepen and make healthy. Adding new information and additional connections where these fundamental problems have not been solved only carries us further from ourselves and each other. Yet within the high-tech industry itself the platitudes have a certain validity. Any company that does not develop new technology fast enough -- human needs and purposes be damned -- will not likely survive for long. This industry, in other words, has itself become machine-like, hollowed out, lacking all evidence of the guiding human interior. Its employees and owners and investors sleepwalk through their working lives, bringing full consciousness only to the technical dimensions of their jobs. And we who buy their products in a similar trance contribute our fair share to the undermining of society. Do not underestimate the potential evils of a society that worships every new tool in forgetfulness of its own inner purposes through which alone the tools can be justified. Hollow men and women, whether educated or not, whether technically competent or not, can never sustain a healthy society, and are capable of unimagined monstrosities. Eventually we will have to recognize the symptoms of our hollowness in unexpected places. For example, in the burgeoning commercialized sex industry, where external presentations (now greatly aide by technology) substitute for profound connection between human beings. Or in the deranged excesses at the fringes of the fast-growing New Age movements, where the meaning so conspicuously absent from the social mainstream is sought in borderline experiences -- and even, as with the Heaven's Gate community, in death. Or in the outrages committed against man and nature by commercially driven biotechnologists. Or in the politics of appearance without principle. Or in the fragmentation of society, with the economic disfranchisement of large groups. Our only escape from the tyranny of the tool as an end in itself lies in our becoming *more* than our tools. Only we ourselves can supply the ends, and we can do so only by waking up to our own inner resources. The prevailing notion that the logic of high-tech development will itself guide society into a better future amounts to an abdication of our humanity. After all, a society with abundant technical means and no governing values and purposes can only become a hellish and dangerous place. On the other hand, a society struggling toward its own governing values is a society on its way toward healing. Which is it? Personally, I see little basis for optimism. But it may well be that I've just been leafing through too many trade rags lately. ------------------------------------------------------------ *** About this newsletter (29 lines) NETFUTURE is a newsletter concerning technology and human responsibility. Publication occurs roughly once per week. Editor of the newsletter is Steve Talbott, a senior editor at O'Reilly & Associates. Where rights are not explicitly reserved, you may redistribute this newsletter for noncommercial purposes. Current and past issues of NETFUTURE are available on the Web: http://www.ora.com/people/staff/stevet/netfuture/ To subscribe to NETFUTURE, send an email message like this: To: listproc@online.ora.com subscribe netfuture yourfirstname yourlastname No Subject line is needed. To unsubscribe, the second line shown above should read instead: unsubscribe netfuture To submit material to the editor for publication in the forum, place the material in an email message and address it to: netfuture@online.ora.com Send general inquiries to netfuture-owner@online.ora.com. ------------------------------ Date: Tue, 15 Apr 1997 10:02:45 EDT From: Martin Kaminer <iguana@MIT.EDU> Subject: File 4--Texas ISPs Targed in Secessionist Case Date--Sat, 12 Apr 1997 11:10:22 -0500 From--FringeWare News Network <email@Fringeware.COM> Sent from: Jon Lebkowsky <jonl@onr.com> [ mod's note: ROT information can be found at http://www.flash.net/~robertk/ ] Texas ISPs Targeted in Secessionist Case by Ashley Craddock 5:55pm 11.Apr.97.PDT Saying the Texas attorney general is violating the electronic privacy rights of their subscribers, two Lone Star Internet service providers have refused to turn over information about members of a secessionist movement who use their services. The movement, known as the Republic of Texas, holds that Congress' 1845 annexation of the independent state was illegal and that only a citizen vote can legalize its status as part of the Union. Charging everyone >from Governor George Bush Jr. to private citizens with the illegal seizure of property, the Republic has flooded state courts with liens that have been declared illegal. In a counterattack, Attorney General Dan Morales - of what the movement calls "the de facto state of Texas" - on 2 April served subpoenas on 10 ISPs who do business with the members of the group that state officials seem to delight in calling ROT. The subpoenas demand copies of all members' email, login and user IDs, subscriber applications, and billing information - including credit card and checking-account numbers. The court order was filed as part of a civil case, Morales v. Van Kirk et al., that the attorney general brought last June to stop the movement from posing as a government entity and clogging the courts with liens. Eight of the ISPs have agreed to comply with the subpoenas. Two others, Internet Texoma Inc. and the Overland Network, have refused. Both say the subpoenas violate a portion of the federal Electronic Communications Privacy Act stipulating that the information sought must be "relevant and material to an ongoing criminal investigation." In a Friday letter to the attorney general, W. Scott McCollough, the Texas Internet Service Providers Association attorney representing both ISPs, stated that the subpoenas "do not overcome our ... federal obligations." "This is a civil, not a criminal case," McCollough said. "Plus, the AG's office hasn't gone through due process in requesting the information. They didn't serve us with a search warrant. And if my clients turned over the information without a warrant, there's always the possibility that these people could sue us. I don't know if they would since they don't acknowledge the court system, but they could." Attorney general's spokesman Ward Tisdale said on Friday that since the "Republic of Texas folks do most of their communication over the Internet, we're simply taking the reasonable steps to gather all the information we need in the course of our investigation." Responding to McCollough's letter, the attorney general's office took a slightly different tack in an effort to skirt the issue of the federal privacy law. It called off the subpoenas and told McCollough it will file a civil investigative demand, a less-stringent request for material relevant to ongoing litigation. ------------------------------ Date: Thu, 10 Apr 1997 10:41:58 -0500 (CDT) From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu> Subject: File 5--Crack DES Challenge I'm just forwarding along. Check out the web page towards the end for all the relevant software and such. - -- FOR IMMEDIATE RELEASE: DESCHALL Group Searches for DES Key Sets out to prove that one of the world's most popular encryption algorithms is no longer secure. COLUMBUS, OH (April 9, 1997). In answer to RSA Data Security, Inc.'s "Secret Key Challenge," a group of students, hobbyists, and professionals of all varieties is looking for a needle in a haystack 2.5 miles wide and 1 mile high. The "needle" is the cryptographic key used to encrypt a given message, and the "haystack" is the huge pile of possible keys: 72,057,594,037,927,936 (that's over 72 quadrillion) of them. The point? To prove that the DES algorithm -- which is widely used in the financial community and elsewhere -- is not strong enough to provide protection from attackers. We believe that computing technology is sufficiently advanced that a "brute-force" search for such a key is feasible using only the spare cycles of general purpose computing equipment, and as a result, unless much larger "keys" are used, the security provided by cryptosystems is minimal. Conceptually, a cryptographic key bears many similarities to the key of a typical lock. A long key has more possible combinations of notches than a short key. With a very short key, it might even be feasible to try every possible combination of notches in order to find a key that matches a given lock. In a cryptographic system, keys are measured in length of bits, rather than notches, but the principle is the same: unless a long enough key is used, computers can be used to figure out every possible combination until the correct one is found. In an electronic world, cryptography is how both individuals and organizations keep things that need to be private from becoming public knowledge. Whether it's a private conversation or an electronic funds transfer between two financial institutions, cryptography is what keeps the details of the data exchange private. It has often been openly suggested that the US Government's DES (Data Encryption Standard) algorithm's 56-bit key size is insufficient for protecting information from either a funded attack, or a large-scale coordinated attack, where large numbers of computers are used to figure out the text of the message by brute force in their idle time: that is, trying every possible combination. Success in finding the correct key will prove that DES is not strong enough to provide any real level of security, and win the first person to report the correct solution to RSA $10,000. Many more participants are sought in order to speed up the search. The free client software (available for nearly every popular computer type, with more on the way) is available through the web site. One simply needs to follow the download instructions to obtain a copy of the software. Once this has been done, the client simply needs to be started, and allowed to run in the background. During unused cycles, the computer will work its way through the DES keyspace, until some computer cooperating in the effort finds the answer. If you can participate yourself, we urge you to do so. In any case, please make those you know aware of our effort, so that they might be able to participate. Every little bit helps, and we need all the clients we can get to help us quickly provide an answer to RSA's challenge. Contact Information * Media Contact Matt Curtin +1 908 431 5300 x295 <cmcurtin@research.megasoft.com> * Alternate Contact Rocke Verser, Contract Programmer, +1 970 663 5629 <rcv@dopey.verser.frii.com> * Web Site http://www.frii.com/~rcv/deschall.htm * Mailing List deschall@gatekeeper.megasoft.com To subscribe, send the text subscribe deschall to <majordomo@gatekeeper.megasoft.com> and you'll be emailed instructions. * RSA Data Security Secret Key Challenge '97 Site http://www.rsa.com/rsalabs/97challenge/ ------------------------------ Date: Thu, 17 Apr 1997 09:43:14 -0500 From: "Julia N. Visor" <jnvisor@RS6000.CMP.ILSTU.EDU Subject: File 6--(Fwd) A listserv joke Q: How many internet mail list subscribers does it take to change a light bulb? A: 1,331: 1 to change the light bulb and to post to the mail list that the light bulb has been changed 14 to share similar experiences of changing light bulbs and how the light bulb could have been changed differently. 7 to caution about the dangers of changing light bulbs. 27 to point out spelling/grammar errors in posts about changing light bulbs. 53 to flame the spell checkers 156 to write to the list administrator complaining about the light bulb discussion and its inappropriateness to this mail list. 41 to correct spelling in the spelling/grammar flames. 109 to post that this list is not about light bulbs and to please take this email exchange to alt.lite.bulb 203 to demand that cross posting to alt.grammar, alt.spelling and alt.punctuation about changing light bulbs be stopped. 111 to defend the posting to this list saying that we all use light bulbs and therefore the posts **are** relevant to this mail list. 306 to debate which method of changing light bulbs is superior, where to buy the best light bulbs, what brand of light bulbs work best for this technique, and what brands are faulty. 27 to post URLs where one can see examples of different light bulbs 14 to post that the URLs were posted incorrectly, and to post corrected URLs. 3 to post about links they found from the URLs that are relevant to this list which makes light bulbs relevant to this list. 33 to concatenate all posts to date, then quote them including all headers and footers, and then add "Me Too." 12 to post to the list that they are unsubscribing because they cannot handle the light bulb controversey. 19 to quote the "Me Too's" to say, "Me Three." 4 to suggest that posters request the light bulb FAQ. 1 to propose new alt.change.lite.bulb newsgroup. 47 to say this is just what alt.physic.cold_fusion was meant for, leave it here. 143 votes for alt.lite.bulb. ------------------------------ Date: Sat, 12 Apr 1997 02:50:49 -0400 From: "Robert A. Costner" <pooh@efga.org> Subject: File 7--Family-Friendly Internet Access Act of 1997 Source - fight-censorship@vorlon.mit.edu On March 20th, a national bill similar to the Texas law was introduced. The substantial part of the law is as follows: ------------------------------------ http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.1180: (d) OBLIGATIONS OF INTERNET ACCESS PROVIDERS- An Internet access provider shall, at the time of entering an agreement with a customer for the provision of Internet access services, offer such customer screening software that is designed to permit the customer to limit access to material that is unsuitable for children. Such software shall be provided either at no charge or for a fee that does not exceed the cost of such software to such provider. ------------------------------------ The above amendment to 47 USC 230 uses language that indicates an ISP is not a common carrier (see the link for definitions). Unlike the Texas law, this applies to all providers, not just the for pay providers. Also unlike the Texas law, the amendment provides for what is to be blocked - material that is unsuitable for children. Unlike the Texas law, this does not provide an exclusion for the ISP if the blocking software does not work properly. The term "limit access to material" would be up for debate, but I assume that a partial reduction in improper material would be fine. However, I assume that there is a requirement to block all areas, not just web sites. If this law has a prayer of passing, I'd prefer to see the Texas version instead. ------------------------------ Date: Thu, 15 Dec 1996 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.31 ************************************