Computer underground Digest    Sun  Apr 26, 1998   Volume 10 : Issue 26

                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Field Agent Extraordinaire:   David Smith
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.26 (Sun, Apr 26, 1998)

File 1--EFF challenge to New Mexico Net Censorship Law
File 2--FAQ Using the Law to Harrass The Cult v. the ARSCC
File 3--"Understanding Digital Signatures", Gail L. Grant
File 4--Court Finds AOL Immune from Libel Suit
File 5--Re: Cu Digest, #10.25, Weds 22 Apr 98
File 6--Federal Courts use Censorware (Spectacle Press Release)
File 7--Cu Digest Header Info (unchanged since 12 April, 1998)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 26 Apr 1998 16:57:09 -0500
From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas)
Subject: File 1--EFF challenge to New Mexico Net Censorship Law

Source: http://www.eff.org

April 22, 1998

Statement of Barry Steinhardt, President of the Electronic Frontier
Foundation (EFF) on the Legal Challenge to the New Mexico Net
Censorship Law.




The Electronic Frontier Foundation (EFF) believes that SB 127, New
Mexico's recently passed law banning the dissemination of material
deemed "harmful to minors" on the Internet, is patently
unconstitutional.  This law represents a threat to freedom of
expression, not only in New Mexico, but across the country.  The EFF,
as a content provider, and its members, would be compelled to either
refrain from communicating constitutionally protected speech or face
potential criminal prosecution.  Because of this threat, we join today
as a plaintiff in the challenge filed today by the American Civil
Liberties Union (ACLU).

The EFF was the first national non-profit group established to protect
free expression, privacy and open access to information in the
electronic age and has used the Internet to educate the public about
civil liberties and legal issues as they arise in cyberspace.  The EFF
was a party to the successful challenge to the Federal Communications
Decency Act (CDA) in Reno v. ACLU, decided by the US Supreme Court
only last June. We believe the New Mexico law is equally defective.

The EFF's public education efforts that would be affected include the
extensive online resources on its web site.  These resources include
articles, court cases, legal papers, news releases, newsletters, and
excerpts from public discussions related to the EFF's legal,
legislative, educational, and advocacy work.  Section A in SB 127, as
it affects the EFF, is even broader and more censorial that the CDA.
The term "harmful to a minor" is defined as any communication "which
in whole, or in part, depicts actual or simulated nudity, sexual
intercourse or any other sexual conduct."  The Legislature did not
even attempt to qualify this term by requiring that the speech be
viewed in its overall context or that its value to minors or adults be
taken into account.  Because the definitions used in SB 127 are so
broad and so unqualified, it would include everything from a web
site's representation of Michalangelo's David, to the publication of
the Biblical Song of Solomon on a newsgroup.  It would certainly
encompass information in many of the archives that the EFF maintains
on its web site.

Language purporting to limit the application of the law to those who
"knowingly and intentionally initiate or engage in communication" with
a minor cannot save the law.  For most speakers on the Internet, it is
not possible to limit speech to an audience that is known to be adults
only. Laws like SB 127, such as the even narrower CDA, will inevitably
and unconstitutionally restrict the speech available to adults, who
will be reduced to receiving only that speech which is deemed suitable
for children.

As the Supreme Court said in _Reno v. ACLU_:

    "Given the size of the potential audience for most messages,
  in the absence of a viable age verification process, the
  sender must be charged with knowing that one or more minor
  will likely view it. Knowledge that, for instance, one or
  more members of a 100-person chat group will be minors and
  therefore that it would be a crime to send the group and
  indecent message and would surely burden communication among
  adults."

In addition to the restricting Constitutionally protected speech, SB
127 would also violate the Interstate Commerce Clause of the US
Constitution.

SB 127 is not limited to purely intrastate New Mexico communications.
It seeks to broadly regulate an inherently "interstate", even
international medium.  A recent decision from New York, American
Library Ass'n v. Pataki, 969 F.Supp. 160, 164 (S.D.N.Y. 1997) dealt
with the interstate commerce issue.  The ALA case dealt with a New
York State statute that, like SB 127, sought to restrict speech on the
Internet that was "harmful to minors", without limiting the geographic
reach of its prohibition.  In that decision, which the State of New
York did not appeal, the judge held that the law was invalid because
it was an "unconstitutional projection of New York law into conduct
that occurs wholly outside New York; that the burdens on interstate
commerce [by enforcement of this law] ... could paralyze development of
the Internet altogether; and finally, that the Commerce Clause ordains
that only Congress can legislate in this area, subject, of course, to
whatever limitations other provisions of the Constitution (such as the
First Amendment) may require."

Given the fatal constitutional defects in the new law and its
potential to damage free speech on the Internet, the EFF believes that
it has no recourse other than to join in this case.

------------------------------

Date: Sun, 19 Apr 1998 20:42:25 -0700 (PDT)
From: Jim Thomas <jthomas@well.com>
Subject: File 2--FAQ Using the Law to Harrass The Cult v. the ARSCC

((Those who keep up with the Church of Scientology's "War on the
Net" will find the following interesting, reproduced from The Well
with permission)).

eff.661.705: Scientology, the Net, and Free Speech


 From--beckyjo@umich.edu (Rebecca Jo McLaughlin)
 Subject--Litigation FAQ
 Newsgroups--alt.religion.scientology
 Date--Thu, 16 Apr 1998 14:45:00 GMT


                               FAQ
                        USING THE LAW TO HARASS
                        THE CULT VS. THE ARSCC*


 On alt.religion.scientology you can get flamed.  You can also get
 harassed, investigated, fair gamed, raided, arrested or sued. The people
 below know, first-hand, how seriously the cult takes their dead leader's
 commands: "The law can be used very easily to harass..."

 Coming up:

 22 April 1998: [Ward, Henson] The parties are ordered to appear for a
 pre-trail conference.  The parties should be prepared to discuss the
 following issues:

 (1)   Whether this case should be consolidated with the related case  RTC
 v. Ward, Case No.                     C-96-20207, for trial;
 (2)   The trial schedule;
 (3)   Estimated length of the proceedings; and
 (4)   Available trial dates in April, May , and June.

 ***

 DENNIS ERLICH.  Dennis is accused of violating the cult's copyrights by
 posting some of the "Operating Thetan" (OT) materials.  The cult raided
 Dennis, going through his home and confiscating personal belongings.  He
 is being defended pro bono by the mighty MoFo; donations are gratefully
 accepted.  Send your checks or money orders to:

 Morrison & Foerster, 425 Market St., San Francisco, CA 94105
 Attn:  Carla Oakley - Dennis Erlich Defense Fund
 Telephone:  (415) 677-7000  Facsimile:  (415) 677-7522
 International funds can be accepted.  You can also wire donations to them.
 Call for instructions.
 **Make sure you label your check "Dennis Erlich Defense Fund".**

 Also - "seekon" maintains a "Friends of Dennis Erlich Page"
 www.netcom.com/~seekon/friends.html

 Dennis also faces attack on another front: the cult has provided his
 ex-wife (the Venomous Rosa) with a lawyer so that she and the cult can
 drag Dennis through court on a variety of child-support related cases.

 For more info:
 http://www.snafu.de/~tilman/mystory/#10
 http://www.snafu.de/~tilman/mystory/denseize.txt

 ******
 KEITH HENSON.  Having read the New Operating Thetan (NOTs) levels, Keith
 Henson believes that Scientology is practicing medicine without a license.
 He was sued for posting the relevant sections - NOTS 34 - that describe
 these practices.  Recently, Judge Whyte ruled against Henson in summary
 judgment and planned to conduct a "bench trial" to determine wilfulness.
 Sadly for the judge, the Supreme Court determined that people like Keith
 are entitled to a jury trial.  The Honorable Whyte is now attempting to
 lump Keith and Grady's cases together.

 On a related front, the cult takes offense at Keith picketing their
 various organizations.  The judge, at a recent hearing to strike Henson's
 trial brief, denied their ex parte application in no uncertain terms:
 "There is a lot of silliness going on here, and this court is not going to
 entertain it!  The statements of counsel in their briefs are just that,
 and not evidence."

 For more info:
 http://www.cs.cmu.edu/~dst/NOTs/
 http://www2.thecia.net/users/rnewman/scientology/home.html#HENSON
 http://homepages.skylink.net/~teddy/picketpage/picket.html

 Keith is accepting donations to offset the increasing costs of litigation:

 H. Keith Henson
 P.O. Box 60012
 Palo Alto, CA 94306

 ****
 FACTnet is a bulletin-board system containing a huge library of
 information about Scientology and other cults.  On 22 August 1995,
 FACTnet directors, Bob Penny and Larry Wollersheim were raided.  FACTnet
 is being sued for (surprise!) copyright infringement.

 For more info:.
 http://www.factnet.org/battle.htm
 http://www2.thecia.net/users/rnewman/scientology/home.html#FACTNET
 http://www2.dgsys.com/~alerma/

 FACTNET is accepting donations toward their operations and their legal
 defense.  Send to FACTNET Inc., PO Box 3135, Boulder, CO 80307-3135.  You
 may also charge your donation (see http://www.factnet.org for details).

 ****
 ZENON PANOUSSIS.  Zenon posted the widely-read Secret Scriptures materials
 to a.r.s. and was promptly sued.  It is unlikely that the cult lawyers
 expected that their own actions would result in Sweden becoming the only
 country in the world where the Secret Scriptures may be legally obtained.

 For more info:
 http://scncases.simplenet.com (webbed documents of most NOTs-connected
 cases in Sweden)
 http://www.dtek.chalmers.se/~d1dd/cos/
 *****
 RAY RANDOLPH.  Ray has a domain name, scientology_kills.net, that offends
 the cult.  They claim it infringes upon their trademarks and are suing.
 Ray is represented by the ACLU and EFF in this skirmish.

 For more info:
 http://www.ezlink.com/~rayr/scieno.htm
 ****

 KARIN SPAINK.  Karin and 12 Dutch internet providers are being sued by the
 cult for having the Fishman Affidavit (containing parts of OT1 through
 OT7) on homepages.  The cult lost the February 1996 trial, was ordered to
 pay costs and has appealed.  The appeal was scheduled for June 1996, but
 to date, the cult has not moved on it.  The defendants believe the reason
 for this is that Co$ is afraid it will lose.

 >From Karin: "The full-fledged case - which they started on the day the
 short-term lawsuit served in court - is still on its way. We hope to have
 a verdict this year.

 For more info:
 http://www.xs4all.nl/~kspaink
 http://www2.thecia.net/users/rnewman/scientology/dutch/home.html
 ****

 GRADY WARD   On 21 March 1996, RTC filed a lawsuit against Grady accusing
 him of being the elusive net entity, Scamizdat, who posted the Upper Level
 Materials Scientology cannot seem to keep under wraps.  Grady is defending
 himself in forma pauperis.   At a recent summary judgment hearing, Judge
 Whyte ruled against RTC, clearing the way for a trial.

 At the recent pretrial hearing, the judge stunned the cult by remarking
 that the cult had to prove at three things at trial:  (1)  that the
 proffered evidence were authentic Usenet posts or IRC chat logs (FRE  Rule
 901); (2) that Grady Ward somehow was associated with any authenticated
 posts that had been adjudged to be infringing; and (3) if (1) and (2) were
 met, that Grady Ward's acts were "wilful"  for purposes of copyright law.

 Currently, Judge Whyte is attempting to get cases of Ward and Henson
 combined into one.

 Grady accepts donations to defray mounting legal expenses.  Send donations
 to Grady Ward, 3449 Martha Ct., Arcata, CA  95521

 For more info:
 http://www2.thecia.net/users/rnewman/scientology/home.html#GRADY
 http://superlink.net/user/mgarde/new.htm

 ****
 Corrections, additions, deletions?  Mail beckyjo@umich.edu.

 * And, of course, we do not exist.

------------------------------

Date: Mon, 20 Apr 1998 08:54:03 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: File 3--"Understanding Digital Signatures", Gail L. Grant

BKUNDISI.RVW   980221

"Understanding Digital Signatures", Gail L. Grant, 1998,
0-07-012554-6, U$34.95
%A   Gail L. Grant
%C   300 Water Street, Whitby, Ontario   L1N 9B6
%D   1998
%G   0-07-012554-6
%I   McGraw-Hill Ryerson/Osborne
%O   U$34.95 905-430-5000 fax: 905-430-5020 louisea@McGrawHill.ca
%P   298 p.
%T   "Understanding Digital Signatures"

Part one is general background.  Chapter one is a brief and rough
background of the Internet.  Some of the statements are questionable,
as are a number of the figures, but it is probably reasonable for the
target business audience.  The title "Security and the Internet," for
chapter two, is only half right.  Some general topics that security
needs to address are raised, but the Internet isn't mentioned.  (The
figures convey even less information than in the first chapter, and
the situation is not helped by the fact that the figure numbers are
not used in the text, so the reader has no idea what passage they are
supposed to support.)  Again, "Securing the Internet," in chapter
three, is a reasonable basic primer on cryptography for the non-
technical, but doesn't talk about the Internet yet.  The most
important point made is the difference between encryption and
authentication.  Chapter four, on the public key infrastructure, is
the weakest, in that it only deals with hierarchical certificate
authority systems.  It is interesting that the term "network of
trust," seemingly used for a group of certificate authorities, is so
similar to the term "web of trust" which PGP (Pretty Good Privacy)
uses for such a radically different concept.

Part two is entitled "Case Studies," and it does have them, but not in
the usual style.  "Uses of Public Key Systems," in chapter five, still
seems to belong to the background section.  Chapters six, seven, and
eight, on identification and authentication, securing communication,
and application integration, say *that* certificates are being used,
but give almost no information on how.  Chapter nine lists the
operational steps in a SET (Secure Electronic Transaction protocol)
transaction.

Part three looks at technical, legal, and business issues, and at the
development of requirements specifications for digital signatures.
Chapter ten is only technical by the broadest possible definition of
the term, and does not provide enough detail or background for readers
to begin to make the decisions that might be necessary.  The legal
issues chapter eleven raises are at least clear enough to have legal
counsel begin to consider, and are not as US-centric as is normally
the case.  Chapter twelve's review of business issues is a decent
discussion starter.  The requirements planning tools in chapter
thirteen are probably too generic to be of use without further
background.

Part four is a listing of vendors.  Each vendor entry provides contact
information, company background, and a description of products or
services.  Many also list distinctives of the companies, future
intentions, and a list of major customers.  Chapters cover vendors of
certificate authority products and application toolkits.

A final chapter looks at the future.

copyright Robert M. Slade, 1998   BKUNDISI.RVW   980221

------------------------------

Date: Thu, 23 Apr 1998 17:16:07 -0400
From: "EPIC-News List" <epic-news@epic.org>
Subject: File 4--Court Finds AOL Immune from Libel Suit

   Source: EPIC Volume 5.05     April 23, 1998
   --------------------------------------------------------------

                            Published by the
              Electronic Privacy Information Center (EPIC)
                            Washington, D.C.

                          http://www.epic.org/

         ***  1998 EPIC Cryptography and Privacy Conference  ***
                   http://www.epic.org/events/crypto98/

=======================================================================
[2] Court Finds AOL Immune From Libel Suit
=======================================================================

A federal judge in Washington has ruled that America Online cannot be
sued for posting an allegedly defamatory item by gossip columnist
Matt Drudge. The ruling came in a lawsuit filed by White House
official Sidney Blumenthal after Drudge reported that Blumenthal had
"a spousal abuse past that has been effectively covered up."  The
suit named as defendants both Drudge and AOL, which carried "The
Drudge Report" under a license agreement with the columnist.

In an opinion issued on April 22, U.S. District Judge Paul L.
Friedman held that AOL enjoys broad immunity from suit under a
surviving provision of the Communications Decency Act (most of which
was struck down by the Supreme Court last summer).  That provision,
which was intended to encourage online providers to "self-police"
their systems for "offensive" content, states:

     No provider or user of an interactive computer
     service shall be treated as the publisher or speaker
     of any information provided by another information
     content provider.

The judge noted that, under the terms of its agreement with Drudge,
AOL retained "certain editorial rights ... including the right to
require changes in content and to remove it."  While finding that the
CDA provision relieves the online service of any potential liability,
Judge Friedman noted an anomaly in the result:

     Because it has the right to exercise editorial control
     over those with whom it contracts and whose words it
     disseminates, it would seem only fair to hold AOL to
     the liability standards applied to a publisher or, at
     least, like a book store owner or library, to the
     liability standards applied to a distributor.  But
     Congress has made a different policy choice by
     providing immunity even where the interactive service
     provider has an active, even aggressive role in making
     available content prepared by others.

The suit against Drudge will proceed, and attorneys for Blumenthal
have indicated that they will appeal the dismissal of AOL as a
defendant.

=======================================================================
Subscription Information
=======================================================================

The EPIC Alert is a free biweekly publication of the Electronic
Privacy Information Center.  To subscribe or unsubscribe, send email
to epic-news@epic.org with the subject: "subscribe" (no quotes) or
"unsubscribe". A Web-based form is available at:

     http://www.epic.org/alert/subscribe.html

Back issues are available at:

     http://www.epic.org/alert/

------------------------------

Date: Thu, 23 Apr 1998 10:24:51 -0400 (EDT)
From: "John S. Cronin" <jsc@SWAMP.OIT.GATECH.EDU>
Subject: File 5--Re: Cu Digest, #10.25, Weds 22 Apr 98

In article <cud.980423030708.22236@unicom.com> you wrote:
> From--"Frank Knobbe" <FKnobbe@BELLSOUTH.NET>
> Date--Fri, 17 Apr 1998 23:07:17 -0600
> Subject--File 6--Re--"tagging color printers" (CuD 10.22)
>
> > Date--06 Apr 1998 15:29:44 -0400
> > From--Mark Atwood <mra@POBOX.COM>
> > Subject--File 3--US Govt wants to "tag" color printers
>
> [...]
>
> > "In addition, Castle said, practical and realistic measures to tag
> > scanners and printers must be considered, in order to identify the
> > source of the counterfeit notes."
> >
> > In other words, he wants every color printer to embed some sort of
> > signature into its output, so that the "authorities" can determine
> > where it came from.
> >
> > I remember, back in high school civics, one of the bits of patriotic
> > propaganda that was dispenced to us, was that the USSR required all
> > photocopiers to embed a machine id and page number into its output,
> > so that the "authorites" could control their use as publishing
> > tools.
> >
> > Now the USA wants to do the same thing.
>
> [...]
>
> Great! I'm so curious to see how they are gonna tackle this issue. Put
> an ID on top of the page? Sure, go right ahead, I have to use my
> scissors anyway to cut out the Lincoln's.
>
> The only way this would work, would be to overlay the copy with a fine
> barcode type output, where the lines stretch across the whole page.
> Which means the ID changes when the fuser gets old'n'dirty. Plus,
> imagine how many people would return that copier because "it's broke
> and procudes crappy output".
>
> How about mandatory copier paper with a watermark? All you need to do
> is equip the copier's paper cassette with a padlock.
>
> Of course, alternatively you could try to improve security with newer
> dollar bills that have additional security features such as holograms,
> etc. but that would be too easy....
>
> The world is going crazy, and it's not gonna get better...

I wish I had been paying better attention.  Recently, I was watching
one of the major news programs (ABC, CBS or NBC - I don't remember
which one because my room mate had control of the remote).  They had
a segment on counterfeiting and the new $20 bill.  They spent quite a
bit of time talking about counterfeiting US currency using ordinary
color printers, and how over 50% of all counterfeit bills are now coming
from color printers.  The part that really floored me was when they
mentioned that Treasury was going to ask printer makers to begin making
printers that will refuse to print currency.  ?!

Now I wonder if the news folks misunderstood this tagging concept,
or if Treasury is really that clueless about the state of computing
and what is possible?  I have not been able to find any more info
on this.  I really do wonder though - does Treasury really believe
this is possible, especially in the price range of $200 printers?
I really wonder how they expect this to be implemented, if this is
true.  Not that I think it will happen anytime soon, if at all.

Has anybody else heard about this?

------------------------------

Date: Sun, 26 Apr 1998 14:06:21 -0500
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 6--Federal Courts use Censorware (Spectacle Press Release)

Source:  http://www.spectacle.org/cwp/courtcen.html

    The Censorware Project

Federal Courts Use Censorware;
Free Speech Advocates Object



   By the Censorware Project

   April 22, 1998

   FOR IMMEDIATE RELEASE

   Contact: Jonathan Wallace
   daytime: 212-513-7777
   evening: 718-797-9808
   email: jw@bway.net

   New York, April 22, 1998 -- The Censorware Project, an organization
   which battles the use of blocking software by public institutions
   including schools and libraries, announced today that it has learned
   that federal courts are using the WebSENSE censorware product, at
   least in the Eighth, Ninth and Tenth judicial circuits (covering
   twenty-two states and Guam). WebSENSE was installed by the
   Administrative Office of the Courts, apparently without the knowledge
   or consent of the judges themselves.

   "I am really disturbed that the federal court administrators have
   installed censorware, especially in light of federal judge Leonie
   Brinkema's recent decision in the Loudoun County, Virginia case," said
   James Tyre, a First Amendment attorney who is a founding member of the
   Censorware Project. "In that decision, available at
   http://www.venable.com/ORACLE/opinion.htm, the judge suggested that
   blocking a web site in a library is like pulling a book from the
   shelves. It is particularly shocking that the Administrative Office of
   the Courts thinks that federal judges need to be protected against the
   Internet -- and that our tax money is being spent to buy censorware
   for this purpose. It would be ironic indeed if Judge Brinkema is
   prevented by WebSENSE from visiting the very sites at issue in the
   Loudoun County case, blocked by X-Stop, a competitor of WebSENSE."

   One site erroneously blocked by the WebSENSE product under its
   "Hacking" category is http://www.digicrime.com/ -- a humorous site
   created by security experts to educate the public about computer
   crime. "WebSENSE apparently took the site for a real computer crime
   site," Tyre said. "DigiCrime is not just one bad block out of 200,000:
   it is one of 54 hand-picked sites by the makers of WebSENSE itself
   included in the downloadable demo versions of the product. Although
   The Censorware Project has not done a full analysis of WebSENSE, one
   must seriously question its claims to accuracy if it cannot even get
   its demo blocks right." WebSENSE also reportedly blocks A Different
   Light Bookstore, http://www.adlbooks.com/, specializing in gay or
   lesbian literature. The company claims that the product blocks 200,000
   sites.
  ________________________________________________________________

   The Censorware Project is a group of Internet activists opposed to
   blocking software and ratings systems for the Web on the grounds that
   both approaches promote government censorship of the Net. For more
   information, please contact Jonathan Wallace at jw@bway.net.

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 12 April, 1998)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

         In ITALY: ZERO! BBS: +39-11-6507540

  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #10.26
************************************