Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 06 Issue 40

  

Computer underground Digest Sun May 8, 1994 Volume 6 : Issue 40
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Suspercollater: Shrdlu Nooseman

CONTENTS, #6.40 (May 8, 1994)

File 1--The check finally arrived--(Steve Jackson Games Update)
File 2--"Why Censoring Cyberspace is Futile" (H. Rheingold reprint)
File 3--The Great Clipper Debate 5/9/94
File 4--NII Summer Internship at the White House
File 5--DOJ Clipper documents scheduled for summer release under FOIA
File 6--Re: Comment on the Lamacchia case
File 7--Opening of the Computer-Mediated Communication Studies Center
File 8--Net-Letter Guide 5/05
File 9--RSA-1,600 number Encryption Code Broken

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 5 May 1994 18:56:10 -0500 (CDT)
From: Steve Jackson <sj@INDIAL1.IO.COM>
Subject: File 1--The check finally arrived--(Steve Jackson Games Update)

PRESS RELEASE May 5, 1994 - For Immediate Release

SECRET SERVICE PAYS DAMAGES TO STEVE JACKSON GAMES

On March 1, 1990, agents of the US Secret Service invaded the offices
of Steve Jackson Games, in Austin, Texas, in what became a landmark
case for the rights of computer users. The agents seized several
computers, including the company's BBS, and hundreds of computer
disks. Among the files taken were several uncompleted books, including
one that was about to go to the printer!

The raid was carried out under a sealed warrant. It was eventually
revealed that the Secret Service was investigating an imaginary
"conspiracy" based on false information, and knew it had no grounds to
suspect SJ Games of any crime, but had never even considered asking
the company for its cooperation while planning the raid!

On March 12, 1993, a federal judge ruled for Steve Jackson Games and
its co-plaintiffs - Steve Jackson himself and three users of the
Illuminati Bulletin Board - on two separate counts. Judge Sam Sparks
ruled for SJ Games on the PPA (Privacy Protection Act), saying that
the publisher's work product was unlawfully seized and held. Under the
ECPA (Electronic Communications Privacy Act), he ruled that the Secret
Service had unlawfully read, disclosed and erased the computer
messages on the BBS - despite their repeated denials that they had
done any such thing. On a separate ECPA count, he ruled for the
defendants, saying that taking the computer out the door was not an
"interception" of the messages on it within the meaning of the law.
That decision is now being appealed.

Judge Sparks' opinion was harshly critical of the Secret Service's
behavior before, during and after their raid, calling the affidavit
and warrant preparation "simply sloppy and not carefully done."

Now, more than a year later, the Secret Service has finally paid the
judgment. The checks received today included $1,000 per plaintiff
under the ECPA, plus about 3% interest since the judgment. Under the
PPA, SJ Games received $52,431.50 for lost profits and direct costs of
the raid. The government agreed to pay additional costs of the suit,
originally borne by the EFF and the attorneys, adding another
$252,405.54.

Commented Jackson: "The heroes in this case are the people at the EFF
and the attorneys who put it together - especially Sharon Beckman at
Silverglate & Good, and Pete Kennedy at George, Donaldson and Ford.
Without them, we never would have had our day in court. They made a
big investment in justice. "
As for us, we'll use our share to pay off
old debts and buy new computers."

Since the raid, Jackson's bulletin board service has grown hugely.
Originally a one-line forum for game fans, it is now a full-scale
Internet access service, specializing in helping newcomers learn their
way around the Net. Doing business as "
Illuminati Online," Jackson now
serves over a thousand paying customers, with more signing up every
day. "
If not for the raid, I wouldn't have done it," he says. "It
brought home to me how important the Internet is becoming. And even if
we protect our legal right to be on the info highway, somebody has to
teach people how to use it!"

For more information, contact Steve Jackson at 512-447-7866.

------------------------------

Date: Thu, 5 May 1994 22:21:32 CDT
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 2--"
Why Censoring Cyberspace is Futile" (H. Rheingold reprint)

By Howard Rheingold. Originally published in the San Francisco
Examiner, part of a weekly series of columns called "
Tomorrow."
Reposted with permission.]

=======================================
vc.181: Howard Rheingold's "
Tomorrow" Columns Online vc.181.27: Howard
Rheingold (hlr) Tue 5 Apr 94 20:30
The following appeared in the San Francisco Examiner on April 6, 1994

Why Censoring Cyberspace Is Futile
By Howard Rheingold

For years, many Netheads had a recurring nightmare that a pedophile
would use a computer bulletin board system to make contact with a
child, and follow up with physical abuse offline. Now this nightmare
has become a reality. (See the news pages of today's Examiner.)

It is only a matter of time before law enforcement authorities use
cases like this to crack down on the free-wheeling,
everything-is-permitted culture of cyberspace. It's not hard to
imagine Jesse Helms standing before the US Senate, holding up an
X-rated image downloaded from the Internet, raging indignantly about
"
public funds for porno highways."

As the public begins to realize that communications technology is
exposing them to an unlimited array of words and images, including
some they might find thoroughly repulsive, the clamor for censorship
and government regulation of the electronic highway is sure to begin.

But it would be a mistake to let traffic cops start pulling people
over on the highway.

Yes, we have to think about ways of protecting our children and our
society from the easy availability of every kind of abhorrent
information imaginable. But the "
censor the Net" approach is not
just morally misguided. It's becoming technically impossible. As Net
pioneer John Gilmore is often quoted: "
The Net interprets censorship
as damage and routes around it."

The Net's technological foundation was built to withstand nuclear
attack. The RAND Corporation designed the network to be a thoroughly
decentralized command-and-control-and communications system, one that
would be less vulnerable to intercontinental missiles than a system
commanded by a centralized headquarters.

This decentralization of control means that the delivery system for
salacious materials is the same worldwide one that delivers economic
opportunity, educational resources, civic forums, and health advice.
If a hacker in Helsinki or Los Angeles connects to the Internet and
provides access to his digital porno files, anybody anywhere else in
the world, with the right kind of Internet connection, can download
those steamy bits and bytes.

This technological shock to our moral codes means that in the future,
we are going to have to teach our children well. The locus of control
is going to have to be in their heads and hearts, not in the laws or
machines that make information so imperviously available. Before we
let our kids loose on the Internet, they better have a solid moral
grounding and some common sense.

I bought an Internet account for my daughter when she was eight years
old, so we could exchange e-mail when I was on the road. But I didn't
turn her loose until I filled her in on some facts of online life.
"
Just because someone sends you mail, you don't have to answer unless
you know them," I instructed her. "And if anybody asks if you are
home alone, or says something to you that makes you feel funny about
answering, then just don't answer until you speak to me."

The worldwide virtual communities that provide users with
companionship, personal support, enlightenment, and entertainment can
also contain imposters and worse. Your 14 year old might look like he
is doing his homework, but is actually secretly joining a hot chat
session with lecherous strangers. (The same dangers exist with the
telephone -- ask parents who have had to pay hefty bills for their
kids' 976 habits.)

You should have the the right, and the ability, to restrict the
massive information-flow into your home, to exclude subject matter
that you don't want your children to see. But sooner or later, your
children will be exposed to everything you have shielded them from,
and then all they will have left to deal with these shocking sights
and sounds is the moral fiber you helped them cultivate.

Teach your children to be politely but firmly skeptical about
anything they see or hear on the Net. Teach them to have no fear of
rejecting images or communications that repel or frighten them. Teach
them to have a strong sense of their own personal boundaries, of
their right to defend those boundaries physically and socially. Teach
them that people aren't always who they present themselves to be in
e-mail and that predators exist. Teach them to keep personal
information private. Teach them to trust you enough to confide in you
if something doesn't seem right.

Yes, pedophiles and pornographers use computer networks. They also
use telephones and the mail, but nobody would argue that we need to
censor or shut down these forms of communication. The most relevant
question now is: how do we teach our children to live, in an
uncensorable world?

------------------------------

Date: Mon, 2 May 1994 18:17:02 +0000
From: Dave Banisar <epic@CPSR.ORG>
Subject: File 3--The Great Clipper Debate 5/9/94

The Great Clipper Debate:
National Security or National Surveillance?


Sponsored by: The Georgetown University Law Center Space Law Group
and Communications Law Forum

In Coordination with: The George Washington University Institute for
Computer and Telecommunications Systems Policy, the Association for
Computing Machinery Special Interest Group for Computers and Society, and
the American Bar Association Criminal Justice Section.

Date and Time: May 9, 1994, at 7:30 p.m.

Place: The Georgetown University Law Center(Moot Court Room)
600 New Jersey Avenue, N.W., Washington, D.C.



The Administration, through the Department of Justice and the
National Security Agency, has proposed a standard encryption algorithm
for both the public and commercial marketplace, with the goal of making
this algorithm the method of choice for persons wishing to encode their
telephone and other voice and data communications. The FBI and the NSA
are concerned that the increasing availability, and affordability, of
encryption mechanisms will make it difficult and in some cases impossible
for law enforcement and intelligence agencies to tap into and to
understand the communications of criminals and other pertinent groups.
This proposal has become known as the "
Clipper Chip," in that it would
be implemented by the voluntary insertion of a computer chip into
telephone, fax machine, and other communications systems.

The Clipper Chip has generated considerable controversy. Opposing
it are various civil libertarian groups, as well as telecommunications
companies, software and hardware manufacturers, and trade associations.
The debate has raged behind closed doors, and openly in the press.

On Monday, May 9, at the Georgetown University Law School, a round
table debate will take place on this controversy. The participants
represent both sides of the issue, and are illustrative of the various
groups which have taken a stand. The participants are:

Dorothy Denning, Chairperson of the Computer Science Department
of Georgetown University

Michael Godwin, Legal Counsel of the Electronic Frontier
Foundation;

Geoffrey Greiveldinger, Special Counsel to the Narcotic and
Dangerous Drug Section of the U.S. Department of Justice;

Michael Nelson, of the Office of Science and Technology Policy
of the White House;

Marc Rotenberg, Director of the Electronic Privacy Information
Center; and

Stephen Walker, President of Trusted Information Systems, Inc.,
and a former cryptographer with the National Security Agency

In addition, there will be two moderators: Dr. Lance
Hoffman, Professor of Electrical Engineering and Computer Science at The
George Washington University, and Andrew Grosso, a former federal
prosecutor who is now an attorney in private practice in the District of
Columbia.

The program will last approximately two and one half hours, and will
be divided into two parts. The first half will offer the panel the
opportunity to respond to questions which have been submitted to the
participants beforehand; the second will present the panel with questions
from the audience.

There is no charge for this program, and members of the public are
encouraged to attend. Reservations are requested in advance, and should
be directed to one of the following individuals:

- C. Dianne Martin, Associate Professor, Department of Electrical
Engineering and Computer Science, The George Washington University,
Phillips Hall, Room 624-C, Washington, D.C. 20052; telephone: (202)
994-8238; E mail: diannem@seas.gwu.edu

- Sherrill Klein, Staff Director, ABA Criminal Justice Section,1800
M Street, N.W., Washington, D.C. 20036; telephone: (202) 331-2624;
fax: (202) 331-2220

- Francis L. Young, Young & Jatlow, 2300 N Street, N.W., Suite 600,
Washington, D.C. 20037; telephone: (202) 663-9080; fax: (202)
331-8001

Questions for the panelists should be submitted, in writing, to one
of the moderators:

- Lance Hoffman, Professor, Department of Electrical Engineering and
Computer Science, The George Washington University, Washington,
D.C. 20052; fax: (202) 994-0227; E mail: ictsp@seas.gwu.edu

- Andrew Grosso, 2300 N Street, N.W., Suite 600, Washington, D.C.,
20037; fax: (202) 663-9042; E mail: agrosso@acm.org

------------------------------

Date: Mon, 2 May 1994 10:33:57 -0700
From: cpsr-announce@SUNNYSIDE.COM
Subject: File 4--NII Summer Internship at the White House

SUMMER INTERNSHIP AT THE WHITE HOUSE

The Technology Division of the Office of Science and Technology Policy
in the Executive Office of the President has the intention of hiring
an intern this summer. The Technology Division is the part of OSTP
that works on the National Information Infrastructure Initiative. We
would like our intern to be qualified to help the build the White
House World Wide Web server, which is likely to be open to the public
in the fall. The position will pay between $3,800 and $4,700 for 90
days. The person selected will devote approximately half of his or
her time to the Web server and half to general office duties such as
answering telephones, making photocopies, and sorting incoming paper
mail.

Anyone may apply for this position by responding to Vacancy
Announcement Number OSTP-94-02-AR (Student Assistant GS-303-3/4/5).
Applications must be received no later than close of business Friday 6
May 1994.

How to Apply: Send your SF-171 form (Application for Federal
Employment, available at a public library or campus placement office)
and a written narrative summary of your experience and/or education on
a separate sheet, and a SF-15 (Application for 10-point Veteran
Preference, if applicable).

Where to apply: Office of Science and Technology Policy, Technology
Division Room 423, Executive Office of the President, Old Executive
Office Building, Washington, DC 20500. You may send your completed
SF-171 by fax to 202- 456-6023. Applications must be *received* by
the closing date and will not be returned. Relocation Expenses will
*not* be paid to the applicant selected. A security prescreen will be
conducted. The applicant tentatively selected for this position may be
required to submit to urinalysis to screen for illegal drug use prior
to appointment. After appointment, the employee will be included in
the agency's random drug testing program.

Applications will be accepted from all qualified persons.
Consideration will be extended without discrimination for any
non-merit reasons such as race, color, religion, gender, national
origin, political affiliation, marital status, age, membership or
nonmembership in employee organizations, or nondisqualifying physical
handicap.

Selective factors: Experience operating a personal computer and using
word processing software; experience in locating and assembling
information for reports, briefings, or meetings.

Quality ranking factors: Ability to organize, follow procedures,
prioritize tasks and complete deadlines; knowledge of grammar,
punctuation, and spelling; ability to communicate effectively both
orally and in writing; ability to achieve cooperative working
relationships with all levels of staff.

Important additional information: If you want to show us what you can
do please send the URL to your Web home page in the subject line of an
e-mail message to interns@ostp.eop.gov. Do not put any other
information in the subject line, just http://your.own.address. No
phone calls or faxes please. Be creative with your home page. You are
not required to list telephone numbers or other information you would
not want to be publicly accessible. Good luck!

------------------------------

Date: Wed, 4 May 1994 08:00:28 -0700
From: Lee Tien <tien@WELL.SF.CA.US>
Subject: File 5--DOJ Clipper documents scheduled for summer release under FOIA

As you know, there has been much debate about the Clipper Chip
initiative, but relatively little hard information. John Gilmore,
member of the board of directors of the Electronic Frontier
Foundation, filed FOIA requests to numerous government
agencies last April after the Clipper plan was announced. In
June 1993, he filed a FOIA lawsuit against the Justice Department
("
DOJ") and the Federal Bureau of Investigation ("FBI").
Gilmore v. FBI, et al, C-93-2117, U.S. District Judge Charles
Legge, Northern District of California.

As a result of this lawsuit, the Justice Department has agreed to a
staggered release of some documents about Clipper and Digital
Telephony. The Justice Department and Gilmore signed a joint
stipulation and agreement on Friday, April 29, 1994, in which the
Justice Department and several other federal agencies agreed to
release documents over the next several months:

a) DOJ's Office of Information and Privacy ("
OIP") will
transmit all documents recovered in its search for responsive
documents that it has identified as requiring referrals or
consultations to the appropriate agencies or DOJ components by
May 31, 1994. OIP will complete processing of all documents that
it has identified as not requiring referrals or consultations to
other agencies or DOJ components by June 20, 1994.

b) DOJ's Justice Management Division ("
JMD") will
complete processing of all documents recovered in its search for
responsive documents, excluding documents which have been
referred for processing to other agencies, by July 30, 1994.

0) The Office of Management and Budget ("
OMB") will
respond to all DOJ consultation requests which OMB had received
as of April 20, 1994 by May 20, 1994.

d) The National Security Agency ("
NSA") will respond to
all DOJ consultation requests which it had received as of April
20, 1994 by July 18, 1994. NSA will complete processing of all
documents which had been referred to it by DOJ as of April 20,
1994 for direct response to plaintiff by July 18, 1994.

e) The National Security Council ("
NSC") will respond to
all DOJ consultation requests which NBC had received as of April
20, 1994 by July 29, 1994.

f) The Department of Commerce and National Institute of
Standards and Technology (collectively "
Commerce") will respond
to all DOJ consultation requests which Commerce had received as
of April 20, 1994 by August 7, 1994. Commerce will complete
processing of all documents which had been referred to it by DOJ
as of April 20, 1994 for direct response to plaintiff by August
7, 1994.

The documents being processed by the NSC include the Presidential Review
Directive and Presidential Decision Directive which started the Clipper
initiative. We have been informed that NSC is processing the two
final versions as well as 68 draft versions.

We have also been informed that documents produced in the course
of the OMB legislative clearance process for the Digital Telephony
Bill are being processed. This should provide insight into how the
government decided to proceed with this bill.

We have also been informed that there are approximately 25
documents produced in the course of the government's solicitation
of industry views on Clipper.

Obviously, we do not know how much useful information will be
released. It is probable that the documents will be heavily redacted.
Given the recent directives from the President and the Attorney General
that all possible discretionary disclosures of information should be made,
we hope, optimistically, that these disclosures will prove illuminating.

Unfortunately, the FBI is not a party to this agreement. We are in
the process of attempting to obtain the release of about 3000 pages
of FBI records. FBI has told the Court that it will be approximately
2 years and 8 months before it will even begin processing Gilmore's
request, and that actual processing will take about a year, if not more.
We believe that this delay is unlawful and cannot be countenanced.

Lee Tien
Attorney for John Gilmore
tien@well.sf.ca.us


PLEASE REDISTRIBUTE IF YOU THINK IT'S WORTH IT. (feel free to edit
any obvious typos, too)

------------------------------

Date: 02 May 1994 18:57:20 -0000
From: timk@YCRDI.COM(Tim King)
Subject: File 6--Re: Comment on the Lamacchia case

The legal council for David LaMacchia posted an article in CUD #6.32,
basically asserting that a BBS sysop or other computer administrator
should not be held liable for information transferred illegally
through his computer system, even if the sysop knows that this
activity is occuring.

J. Eric Townsend (jet@NAS.NASA.GOV) responded, "
If the SYSOP actively
encourages others to use the system, doesn't that somehow change this?
This is something like saying that because a bar owner isn't
responsible for the activities of prostitutes, they should go out and
encourage prostitutes to frequent their bar."

I am interested in understanding this point of view, but I don't see
how the statement addresses the issue. The original statement did not
say that bar owners _should_ encourage prostitution, although one
might conclude that they _can_. I'll grant that the analogy holds,
but it hasn't been shown that the hypothetical bar owner is
responsible for the activities of the prostitutes. Is he? Why? By
what reasoning?

Again, Silverglate & Good state, "
...Certain classified advertisements
for '_dating services_'... are really covers for high-class
*prostitution* rings.
Yet... editors and publishers of the newspapers are *not*
prosecuted... even if the editors and publishers were well aware of
the fact..."

Eric replied, "
But what about instances where the editors or
publishers actively sought out 'escort services' to advertise in their
paper, with full knowledge that the 'escort services' were
prostitution rings?"

Okay, what about these instances? Please describe at least one. It
is reasonable that the original posters would not cite instances that
had not come to court, and they would have had to in order to support
their claim that editors and publishers are not prosecuted. But Eric
certainly should be expected to cite instances that have come to
court, in order to support his counter-assertion.

However, Silverglate & Good _did_ cite a case that supported their
position. (_Smith v. California_, 361 U.S. 147 (1959)) This point
was not addressed at all in Eric's response.

So comes the conclusion, "
In short, I don't buy the 1st Amendment
defense in this case."

Okay, but this doesn't change the way the courts view First Amendment
rights, which is the only point on which Silverglate & Good were
relying. I have not been provided any reason to believe that the
defense has made any false statements, as Eric did not address the
court's view.

Furthermore, it is obvious that the issue has not been treated deeply
enough to give me reason to develop a desire to see the law changed in
this matter. There was no legal precedent treated. No one examined
the reasons for which the current rules were established. Eric did
not even thoroughly address the points that are already on the table.

Therefore, Eric, I don't understand precisely what you want to
accomplish. Why did you post your original response? Was it to try
to convince readers of your views? Although, my gut reaction would be
to agree with your conclusion, you've given me no objective reason to
do so.

------------------------------

Date: Sat, 30 Apr 1994 12:52:08 EDT
From: John December <decemj@RPI.EDU>
Subject: File 7--Opening of the Computer-Mediated Communication Studies Center

Announcing: Opening of the Computer-Mediated Communication Studies
Center and first issue of _Computer-Mediated Communication Magazine_


The Computer-Mediated Communication Studies Center, a set of web
pages dedicated to serving the needs of researchers, students, teachers,
and practitioners interested in computer-mediated communication
(CMC), is now open. This Center helps people share information, make
contacts, collaborate, and learn about developments and events related
to CMC. This center includes the first issue of _Computer-Mediated
Communication Magazine_, links to people who are interested in CMC, a
resources collection, and pointers to activities. If you are interested in
CMC studies, you are invited to participate.

About the CMC Studies Center

MISSION

* To provide a forum for the exchange of information about CMC
* To foster community-building among CMC scholars students,
developers, and users through collaboration and information exchange.
* To articulate and define CMC studies
* To inform and educate interested persons about CMC issues and
scholarship

SPONSORSHIP

The CMC Studies Center is not sponsored or officially endorsed by
any organization or institution. The opinions and information
expressed belong to and are the responsibility of the participants.

STATUS

The CMC Studies Center is a non-profit, non-commercial,
privately-created enterprise created for the benefit of its
participants and as a public service to interested persons.

DISSEMINATION

Over the World Wide Web. CMC Studies Center URL:

http://www.rpi.edu/~decemj/cmc/center.html

CMC Magazine URL:

http://www.rpi.edu/~decemj/cmc/mag/current/toc.html

NAVIGATING

Sections linked by hypertext

LINKING TO

The intent of the development efforts for this center is to involve
many people in working on various web pages. This will mean that
links to some of the pages will change to allow for distributed
development and maintenance. You should consider linking to the home
page (http://www.rpi.edu/~decemj/cmc/center.html) or index
(http://www.rpi.edu/~decemj/cmc/index.html) as a "
front door" to the
center, as these links should remain stable for a while. Links on
these pages (and the footers of other pages) will be updated to
reflect changes in links.

John December/decemj@rpi.edu/Rensselaer Polytechnic Institute/Troy NY
PhD Candidate/Department of Language, Literature, and Communication
<a href="
http://www.rpi.edu/~decemj/index.html">John December</a>

------------------------------

Date: Wed, 4 May 1994 21:20:33 -0400 (edt)
From: John Higgins <higgins@DORSAI.DORSAI.ORG>
Subject: File 8--Net-Letter Guide 5/05

NET-LETTER GUIDE
A newshound's guide to newsy periodicals available through the
Internet. Compiled by John M. Higgins (higgins@dorsai.dorsai.org)
Updated May 5, 1994

Introduction: My favorite things on the Internet are informative, high-
quality newsletters. The quality of info contributed to what Mitch Kapor
describes as the Net's "
gift economy" is amazing. Despite some excellent
e-pub guides, tracking down good NEWSY letters can be frustrating, partly
because they get lost in the flood of zines and very technical pubs.

So this list aims to point people to the news-oriented net-letters with
somewhat broader appeal. It's not intended to be as comprehensive as
other guides, but helpful nevertheless. Very technical and fanzine
newsletters are not included because they are well covered by other guides.

GIMME FEEDBACK!! This is just an initial stab, just a dozen or so I've
seen and like (including one I edit!). Some are well-known, others are
not. Send me your favorite net-letters, particularly if you're the
editor. Include any subscription information plus a copy.

HOW TO GET THE NET-LETTER GUIDE: For now, it will be available by
e-mailing higgins@dorsai.dorsai.org, plus Usenet groups alt.zines,
alt.etext, misc.writing, rec.mag, alt.internet.services, alt.answers,
misc.answers, rec.answers, news.answers. If folks like it, other
arrangements will be made.

(Far more exhaustive lists of electronic publications include John
Labovitz's e-zine-list {FTP to ftp.netcom.com:/pub/johnl/zines/e-zine-list
or http //www.ora.com:8080/johnl/e-zine-list/} or the giant e-pub archive,
by FTP and Gopher {etext.archive.umich.edu})

---------------------------------------------------------------------------
EDUPAGE: Tip sheet on information technology and media issued three
times weekly. Quickie summaries primarily of newspaper articles,
primarily from the majors.
How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME).

FITZ'S SHOPTALK: Daily dispatches on the TV business, both networks and
local stations by media headhunter Don FitzPatrick. Primarily summaries
of wire-service and major newspapers, but also includes some full-text
reprints.
How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE
YOUR@ADDRESS).

LATE SHOW NEWS: A guy who obviously stays up way too late puts out a
weekly newsletter on the late-night talk show wars. It's biased toward
Letterman but contains surprisingly good industry dirt on Leno, Conan,
etc. (even for those of us writing about television for a living).
How to get it: E-mail (letterman@mcs.net), Usenet (alt.fan.letterman
and rec.arts.tv), FTP (ftp.mcs.net:/mcsnet.users/barnhart/letterman).

HICNet MEDICAL NEWS DIGEST: Something painless from a dentist. Broad
bi-weekly newsletter on medicine by Health Info-Com Network, put together
by dentist David Dodell. One week featured sleep apnea and snoring plus
hemlock! Also carries excerpts of the Center for Disease Control's AIDS
Daily Summary. The downside is conference announcements (OK, on things
like techniques for identifying corpses, but they're still conference
announcements!).
How To Get It: E-Mail (mednews@asuvm.inre.asu.edu); FTP:(vm1.nodak.edu)

NETWORKS & COMMUNITY: The emphasis here is on "
community" in
Internet-land. Less techie than you might expect.
How To Get It: E-Mail (rre-request@weber.ucsd.edu; SUBSCRIBE YOUR NAME)
Gopher: (gopher.well.sf.ca.us or gopher.nlc-bnc.ca)

CABLE REGULATION DIGEST: Weekly summary of news on cable regulation
published by Multichannel News.
How to get it: E-Mail, distributed to the TELECOMREG mailing list.
(listserver@relay.adp.wisc.edu, SUBSCRIBE TELECOMREG);
FTP (ftp.vortex.com:pub/tv-film-video/cable-reg); Gopher (gopher.vortex.com)

SCIENCE BEAT: A tip sheet for science journalists from the National
Institute for Standards and Technologies. Maybe not too newsy, but short,
sweet and interesting.
How to get it: GOPHER (gopher-server.nist.gov).

HOTT: HOTT -- Hot Off The Tree -- has re-emerged as a giant pub
culling the latest advances in computer, communications, and electronics
technologies from over trade magazines, newspapers and net resources.
Great stuff, but why they're gathering so much material for a huge
monthly rather than a smaller weekly or something is beyond me.
How to get it: E-mail (listserv@ucsd.edu,SUBSCRIBE HOTT-LIST)

PRIVACY Forum: Tidbits about threats to privacy from government snoops
to credit agencies.
How to get it: E-Mail(privacy-request@vortex.com); FTP (ftp.vortex.com);
Gopher (gopher.vortex.com).

ALAWON: An electronic newsletter distributed by the Washington Office of
the American Library Association that covers federal legislation,
regulations, policy, and grant opportunities of interest to libraries.
How to get it: E-mail: (listserv@uicvm {Bitnet} or
listserv@uicvm.uic.edu {Internet} SUBSCRIBE ALA-WOFirstName LastName).

CURRENT CITES: A monthly letter for library technology, composed of
pointers from magazine articles. A little on the dry side, partly because
of its format.
How to get it: E-mail (listserv@library.berkeley.edu; SUB CITES YOUR
NAME); FTP: (ftp.lib.berkeley.edu:/pub/Current.Cites)

COMPUTER UNDERGROUND DIGEST: The latest news on cyberspace issues.
CUD's coolest when screaming about the latest hacker or BBS raid, good
when picking apart government policy issues. But CUD will occasionally
reprint the ENTIRE AGENDA for some upcoming computer conference. (YAWN!!!)
How to get it: E-Mail (listserv@uiucvmd.bitnet or
listserv@vmd.cso.uiuc.edu, SUB CUDIGEST YOUR NAME); Usenet
(comp.society.cu-digest); FTP (etext.archive.umich.edu:/pub/eff) plus
lots of other places.

EFFECTOR: The Electronic Frontier Foundation's membership newsletter,
great for telecom policy updates.
How to get it: E-mail: send request to brown@eff.org; FTP (ftp.eff.org);
Usenet: {preferred!~} (comp.org.eff); Gopher (gopher.eff.org)

RISKS Forum: Tidbits about the risks computers present in society. One
edition touched on industrial espionage, data escape from prison, and a
strange tale of e-mail stalking.
How to get it: E-mail (risks-request@csl.sri.com); Usenet {preferred!}
(comp.risks); FTP (crvax.sri.com).

------------------------------

Date: Sat, 30 Apr 1994 22:12:01 EDT
From: Anonymous <cudigest@mindvox.phantom.com>
Subject: File 9--RSA-1,600 number Encryption Code Broken

"
1,600 Computers Help Break 129-Digit Code"
(From: Chicago Tribune, 27 April, 1994 (Sect 1, p. 3)

Reuters

NEW YORK--The world's ultimate secret code--a 129 digit
combination billed as impossible to break--has finally been
cracked.

The article explains how 600 people using 1,600 computers linked
together via the internet over five continents cracked the code in
about eight months. Dr. Arjen Lenstra of Bellcore compares the feat to
finding 8.5 million needles in a haystack. Lenstra coordinated the
breaking of the encryption, "
names RSA for the first letters of its
three inventors' surnames."

The story explains that the code was devised 17 years ago by computer
scientists adn mathematicians Ronald Rivest, Adi Shamir, and Leonard
Adleman.

"
This discovery is important if you want to protect the code
guarding something like the secret formula for Coca-Cola or
nuclear weapons," rivest said at a press conference. He
suggested the encoders would have to use much longer numbers
in the future.

The article explains that numerical codes such as RSA 129 are
based on the difficulty of breaking down long numbers into
two sets of prime number (numbers divisible only by itself and
"
1"). Lenstra is quoted as saying the breaking of the code
required the longest mathematical computation ever performed.
The secret message that they successfully decrypted was
"
The magic words are squeamish ossifrage." The words were chosen
randomly, according to Lenstra.

Rivest presented Lenstra with a $100 check, the prize he and
his two colleagues offered when they first presented the
code to readers of Margin Gardiner's "
Mathematical Games"
column in Scientific American magazine to solve.

While they billed it as being so hard that it would take 40
quadrillion years to do, they did not count on the power of
modern-day computers.

------------------------------

End of Computer Underground Digest #6.40
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT