Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 06 Issue 81

  

Computer underground Digest Wed Sep 14, 1994 Volume 6 : Issue 81
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Urban Legend Editor: E. Greg Shrdlugold

CONTENTS, #6.81 (Wed, Sep 14, 1994)

File 1--Re: Exon Amendment -- text of existing laws
File 2--"Computer Related Crime" (Book Review)
File 3--First French book on Internet (Book Review)
File 4--Clipper T-shirts
File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud
File 6--Wiretap Bill Update
File 7--Women's Work and Informatics -- Call for Contributions
File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs
File 9--Cu Digest Header Information (last changed 11 Sep '94)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Tue, 13 Sep 1994 13:08:09 -0400 (EDT)
From: Steve Barber <sbarber@panix.com>
Subject: File 1--Re: Exon Amendment - text of existing laws

OK, so now that we've put the Exon amendment text out there (see CuD
6.79), it occurred to me that it isn't all that useful if you don't
have the text of what it proposes to amend! So here is Section 223 of
the Communications Act as it exists today, and the text of the
"safe-harbor" regulation that implements part of it.

-Steve Barber

============================
FCC RESTRICTIONS ON OBSCENE AND INDECENT TELEPHONE TRANSMISSIONS

A. STATUTE - Title 47, Section 223 of the United States Code (rev. 1989)

@ 223. Obscene or harassing telephone calls in the District of
Columbia or in interstate or foreign communications

(a) Whoever--
(1) in the District of Columbia or in interstate or foreign
communication by means of telephone--
(A) makes any comment, request, suggestion or proposal which is
obscene, lewd, lascivious, filthy, or indecent;
(B) makes a telephone call, whether or not conversation ensues, without
disclosing his identity and with intent to annoy, abuse, threaten, or
harass any person at the called number;
(C) makes or causes the telephone of another repeatedly or
continuously to ring, with intent to harass any person at the called
number; or
(D) makes repeated telephone calls, during which conversation
ensues, solely to harass any person at the called number; or
(2) knowingly permits any telephone facility under his control to
be used for any purpose prohibited by this section, shall be fined not
more than $ 50,000 or imprisoned not more than six months, or both.

(b)(1) Whoever knowingly--
(A) within the United States, by means of telephone, makes
(directly or by recording device) any obscene communication for
commercial purposes to any person, regardless of whether the maker of
such communication placed the call;
or
(B) permits any telephone facility under such person's control to
be used for an activity prohibited by subparagraph (A), shall be fined
in accordance with title 18, United States Code, or imprisoned not
more than two years, or both.
(2) Whoever knowingly--
(A) within the United States, by means of telephone, makes
(directly or by recording device) any indecent communication for
commercial purposes which is available to any person under 18 years of
age or to any other person without that person's consent, regardless
of whether the maker of such communication
placed the call; or
(B) permits any telephone facility under such person's control to
be used for an activity prohibited by subparagraph (A), shall be fined
not more than $ 50,000 or imprisoned not more than six months, or
both.
(3) It is a defense to prosecution under paragraph (2) of this
subsection that the defendant restrict access to the prohibited
communication to persons 18 years of age or older in accordance with
subsection (c) of this section and with such procedures as the
Commission may prescribe by regulation.
(4) In addition to the penalties under paragraph (1), whoever,
within the United States, intentionally violates paragraph (1) or (2)
shall be subject to a fine of not more than $ 50,000 for each
violation. For purposes of this paragraph, each day of violation shall
constitute a separate violation.
(5)(A) In addition to the penalties under paragraphs (1), (2), and (5),
whoever, within the United States, violates paragraph (1) or (2) shall
be subject to a civil fine of not more than $ 50,000 for each
violation. For purposes of this paragraph, each day of violation shall
constitute a separate violation.
(B) A fine under this paragraph may be assessed either--
(i) by a court, pursuant to civil action by the Commission or any
attorney employed by the Commission who is designated by the
Commission for such purposes, or
(ii) by the Commission after appropriate administrative proceedings.
(6) The Attorney General may bring a suit in the appropriate
district court of the United States to enjoin any act or practice
which violates paragraph (1) or (2). An injunction may be granted in
accordance with the Federal Rules of Civil Procedure.

(c)(1) A common carrier within the District of Columbia or within any
State, or in interstate or foreign commerce, shall not, to the extent
technically feasible, provide access to a communication specified in
subsection (b) from the telephone of any subscriber who has not
previously requested in writing the carrier to provide access to such
communication if the carrier collects from subscribers an identifiable
charge for such communication that the carrier remits, in whole or in
part, to the provider of such communication.
(2) Except as provided in paragraph (3), no cause of action may be
brought in any court or administrative agency against any common
carrier, or any of its affiliates, including their officers,
directors, employees, agents, or authorized representatives on account
of--
(A) any action which the carrier demonstrates was taken in good
faith to restrict access pursuant to paragraph (1) of this subsection;
or
(B) any access permitted--
(i) in good faith reliance upon the lack of any representation
by a provider of communications that communications provided by that
provider are communications specified in subsection (b), or
(ii) because a specific representation by the provider did not
allow the carrier, acting in good faith, a sufficient period to
restrict access to communications described in subsection (b).
(3) Notwithstanding paragraph (2) of this subsection, a provider of
communications services to which subscribers are denied access
pursuant to paragraph (1) of this subsection may bring an action for a
declaratory judgment or similar action in a court. Any such action
shall be limited to the question of whether the communications which
the provider seeks to provide fall within the category of
communications to which the carrier will provide access only to
subscribers who have previously requested such access.

B. FCC REGULATION - Title 47, Section 64.201 of the Code of Federal
Regulations

Restrictions on obscene or indecent telephone
message services.

47 CFR 64.201

It is a defense to prosecution under section 223(b) of the
Communications Act of 1934, as amended, 47 U.S.C. 223(b), that the
defendant has taken one of the actions set forth in paragraph (a),
(b), or (c) of this section to restrict access to prohibited
communications to persons eighteen years of age or older, and has
additionally complied with paragraph (d) of this section, where
applicable:

(a) Requires payment by credit card before transmission of the message; or

(b) Requires an authorized access or identification code before
transmission of the message, and where the defendant has:

(1) Issued the code by mailing it to the applicant after reasonably
ascertaining through receipt of a written application that the
applicant is not under eighteen years of age; and

(2) Established a procedure to cancel immediately the code of any
person upon written, telephonic or other notice to the defendant's
business office that such code has been lost, stolen, or used by a
person or persons under the age of eighteen, or that such code is no
longer desired; or

(c) Scrambles the message using frequency inversion techniques so
that it is unintelligible and incomprehensible to the calling party
without use of a descrambler by the calling party; and

(d) Where the defendant is a message sponsor or subscriber to mass
announcement services tariffed at this Commission and such defendant
prior to the transmission of the message has requested in writing to
the carrier providing the public announcement service that calls to
his message service be subject to billing notification as an adult
telephone message service.

------------------------------

Date: Mon, 05 Sep 1994 15:11:36 -0600 (MDT)
From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
Subject: File 2--"Computer Related Crime" (Book Review)

BKCMRLCR.RVW 940622

Loompanics Unlimited
P.O. Box 1197
Port Townsend, WA 98368
loompanx@pt.olympus.net
"Computer Related Crime", 1-55950-027-1, U$10.00

This purports to be Field Circular 19-146 of the US Army Military Policy
School. Supposedly intended for US Army Criminal Investigation (Defence?)
Command Special Agents only, it appears to be an unauthorized photocopy of a
typed government document. No date is included in any of the supposed
government material: the Loompanics copyright date is 1990.

It doesn't really matter if this is an official government document or not.
The material is fairly pedestrian: after a reasonably detailed set of
instructions on how to exercise a search warrant for computer equipment
(although not how to analyze the equipment, once you have it), the bulk of the
book defines various types of computer crimes. Much of this would have serious
data security types going, "Well, maybe ...," but, at the same time, it isn't
bad enough as to indicate that American military policy are being misinformed
in what is, after all, a specialized topic.

A possibly interesting bit of arcana for the well-stocked data security
library.

copyright Robert M. Slade, 1994 BKCMRLCR.RVW 940622

======================
DECUS Canada Communications, Desktop, Education and Security group newsletters
Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
Author "Robert Slade's Guide to Computer Viruses" (Sept. '94) Springer-Verlag

------------------------------

Date: 06 Sep 1994 12:47:08 GMT
From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat)
Subject: File 3--First French book on Internet (Book Review)

New Book in Franch Language: INTERNET

Internet is now available from Editions JCI, Inc. (2700 Joliette #201,
Montreal, Quebec, H1W 3G9, Canada)

The *Internet* book goes beyond all business school case studies and
descriptions of Internet tools, teaching French readers how to effectively
use the Internet to boost sales and cut costs. Through real world
examples and expert advice, you'll learn how to use the Internet to
build European/international market share, track down business leads,
communicate with colleagues, search online databases, provide cost-
effective customer support and access time-critical information.

You'll also explore the many business opportunities now available on
the Internet and get tips on shopping for the best deal on Internet access
and cybel-mail space.

Just as importantly you'll learn about the culture of the Internet, find
out what type of advertising is acceptable and can generate a positive
response, and which forms are verboten and can provoke community
hostility (the famous 'nethiquette').

The *Internet* also contain detailed descriptions of the author's first-
hand and experienced experience in doing business on the Internet. Co-
author Jean-Bernard Condat is a veteran information science writer and
publisher of electronic newsletter that tracks trends and developments
in electronic newspaper and magazine publishing. Co-author Nicolas Pioch
is the conceptor of WebLouvre--Paris, the first consulted WWW in Europe
(http://www.enst.fr/~pioch).

Here's the basic information:

Jean-Bernard Condat & Nicolas Pioch, "Internet", J.C.I. Inc., Oct. 1994,
224 pages, 195 FF (CAN$29.95), ISBN 2-921599-06-6.

Table des Matieres:

1. Preface; 2. Premieres notions; 3. Documentation Internet; 4. Le
courrier electronique; 5. Smileys (emoticons); 6. telnet; 7. Formats
de fichiers; 8. FTP; 9. Archie; 10. Prospero; 11. Usenet/newsgroups;
12. Netiquette; 13. WAIS; 14. Gopher; 15. WWW; 16. cryptographie;
17. Adresses utiles; 18. MacTCP/PPP; Index.

Note that you can receive more information on this publication by ordering
it direct from:

- Diffulivres, Canada: +1 514 738 2911, fax: +1 514 738 8512;
- Distique, France: +33 37 34 84 84, fax: +33 37 30 78 65;
- Context SA, Belgium: +32 41 40 19 82, fax: +32 41 490 19 82;
- Micro-Distribution, Switzerland: +41 227843482, fax +41 227840945.

Don't hesitate to contact us for more information on Internet... in France.

Jean-Bernard Condat, 47 rue des Rosiers, 93404 St-Ouen Cedex, France
Tel: +33147874083, Fax: +33149450129, Alphapage: +3336605050 code 0030006
Email: JeanBernard_Condat@Email.FranceNet.FR *or* an113309@anon.penet.fi

------------------------------

Date: 7 Sep 1994 20:40:52 -0700
From: normh@CRL.COM(Norman J Harman)
Subject: File 4--Clipper T-shirts

Information and opposition to the Clipper proposal is strong
on the Internet. But it is far too unknown to the 'outside'
community. Everyone concerned by this issue should inform
all the people they know of its implications. One way to
increase awareness and show your opinion is to wear it:).

I would like to offer an anti Clipper/Skipjack T-shirt.
They would be white with black printing and cost
approximately $5.00 plus $2.90 shipping to US locations.
That is the cost to produce one shirt. I am trying to
spread awareness not make money.

I need to know if people are interested in this idea and
what should the shirts say?

Two quick ideas are:
"Skip Skipjack"
or
"Just Say No to Clipper"

Please send comments, suggestions, and questions to
normh@crl.com. If more than a few people are interested I
will go ahead and have the shirts made and post how to get
one.

A worthy cause is better if it benefits another good cause
so the shirts will be silk-screened by Zerolith, part of a
non-profit organization that employs, shelters, and assists
homeless youth. If you would like to talk with Zerolith or
donate money directly here is how to contact them.

Zerolith
3075 21st Street
San Francisco, CA 94110-2626
415.641.1014 voice
415.641.1474 fax


--
Norman J. Harman Jr. o o Smiley Systems
normh@crl.com \__/ San Francisco, CA

------------------------------

Date: Tue, 13 Sep 1994 11:19:22 (CDT)
From: CuD Moderators <cudigest@mindvox.phantom.com>
Subject: File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud


(AP WIRE - Thurs, Sept. 8, 1994)

NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other
hackers used computers to steal credit card numbers and used them to
buy $210,000 in gold coins and high-tech hardware, federal prosecutors
said Wednesday (Sept 8, '94).

The nine-count indictment unsealed Wednesday charged five men from
Louisana and one from New York with conspiracy, computer fraud, access
device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said.

Some fo their hacker nicknames were included. They were identified as
Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher
"Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James
McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y.

------------------------------

From: email list server <listserv@SUNNYSIDE.COM>
Date: Mon, 12 Sep 1994 09:29:49 -0700
Subject: File 6--Wiretap Bill Update

Wiretap Bill Update

The Electronic Privacy Information Center (EPIC) and Voters Telecomm
Watch (VTW) are urging concerned individuals and organizations to
help stop the FBI Wiretap Bill. Congress is now back in session and your
support is critical. The attached alert from VTW provides contact info
for the relevant Congressional representatives.

EPIC is a project of the Fund for Constitutional Government and Computer
Professionals for Social Responsibility. For additional information,
send e-mail to <info@epic.org>.

=========================================================


Subject--ACTION--Fight US bills--SB 2375 & HR 4922
From--shabbir@panix.com (Shabbir J. Safdar)
Date--11 Sep 1994 23:44:50 -0400

**********************************************************

DISTRIBUTE WIDELY (though no later than October 1, 1994)

**********************************************************
[If you've only got 2 minutes, skip down to the "What You Can Do"
section.]

[Washington insiders say the phone calls and faxes (especially to
Rep Jack Brooks) are starting to attract significant attention, and
many people prophesize that the bill won't even have time to pass
this session. Thanks for your efforts!]

The FBI's Wiretap bills (also known as the DT - Digital Telephony bills)
mandate that *all* communications carriers must provide wiretap-ready
equipment so that the FBI can more easily implement their court-ordered
wiretaps more easily. The costs of re-engineering all communications
equipment will be borne by the government, industry and consumers.

The bill is vague and the standards defining "wiretap ready" do not
exist. Furthermore, the FBI has yet to make a case which demonstrates
that they have been unable to implement a wiretap.

There are fewer than 1,000 court ordered surveillances per year. Even if
all of them are wiretaps, and even if all of them require the changes
mandated by this legisation, are we as a nation prepared to build
eavesdropping features into the phones of 250 million people, in order
to justify these wiretaps? None of these wiretaps has been demonstrated
to be unimplementable, nor has it been proven that the cases could not
be made with other methods of electronic surveillance.

The Voters Telecomm Watch (VTW) does not believe the FBI has made a
compelling case to justify that all Americans give up their privacy.
Furthermore, the VTW does not believe the case has been made to justify
spending 500 million Federal dollars over the next 4 years to
re-engineer equipment to compromise privacy, interfere with
telecommunications privacy, and fulfill an unproven government need.


WHAT YOU CAN DO
===============
You can help stop this legislation before it is too late!
Phone/Fax/Write to each of the people below. It should take
about two minutes a piece.


. Rep. Jack Brooks (his Judiciary Committee must approve the bill
before it can be voted upon by the full House)
DC Phone: (202) 225-6565, TX Phone: (409) 839-2508
DC Fax: (202) 225-1584
Also try Judiciary Comm. fax at (202) 225-3951
US Mail: RHOB 2449, Washington DC 20515

. Senator Patrick Leahy (the Senate sponsor of the bill)
DC Phone: (202) 224-4242, VT Phone: (802) 863-2525
DC Fax: (202) 224-3595
US Mail: SR 433, Washington DC 20510
email: senator_leahy@leahy.senate.gov

. Rep. Don Edwards (the House sponsor of the bill)
DC Phone: (202) 225-3072, CA Phone: (408) 345-1711
DC Fax: (202) 225-9460
US Mail: 2307 RHOB, Washington DC 20515

. Your two Senators

. Your Representative

Tell them you are opposed to the FBI's Wiretap legislation. Feel
free to use the sample communique below:

SAMPLE COMMUNIQUE
=================

Dear __________,

The recent Digital Telephony bills (HR 4922 & SB 2375) disturb me
greatly. The FBI has not yet made their case to the public that we
need to build wiretap functionality into the telephones of 250
million people to justify wiretaps which have not yet been proven to
be difficult to implement.

The bills would clearly compromise the privacy of all Americans with
no counterbalancing benefit to either law enforcement or the public.
The FBI has not demonstrated the need, and the cost is uncalculated,
but is known to be at least 500 million tax dollars.

Furthermore, the standards are undefined, as are the bodies that
would enact these standards.

For these reasons, I am opposed to the Digital Telephony bills
(HR 4922 & SB 2375).

Sincerely,

_______________________

If you get a response from your legislator, drop us a note at
vtw@vtw.org. We track legislator positions on privacy-related issues
such as this one.

For more information about the Digital Telephony bills, check the
Voters Telecomm Watch gopher site (gopher.panix.com) or contact Steven
Cherry, VTW Press Contact at (718) 596-2851 or stc@vtw.org.

VTW posts a Digital Telephony FAQ monthly to several Usenet newsgroups
including comp.org.cpsr.talk and comp.org.eff.talk. Look for it or
contact us at vtw@vtw.org for a copy.

------------------------------

Date: Tue, 16 Aug 1994 01:06:35 +0200
From: email list server <listserv@SUNNYSIDE.COM>
Subject: File 7--Women's Work and Informatics - Call for Contributions

Women's Work and Informatics

Call for Contributions

Please forward this call - Please forward this call - Please forward this call


"Women's Work and Informatics" (Frauenarbeit und Informatik) is the name of
a Special Interest Group founded eight years ago in the German Society for
Informatics (Gesellschaft fuer Informatik). Today our group has about 500
members and is a forum for female computer professionals to exchange
experi ences in the discipline and in the various work situations.
Our general aim is to increase the influence of women on the design and
application of information technology. 12 local and thematic working groups
are concerned with topics like women's research, promotion of women,
motivation and encouragement of young women, the installation of an experts
network, etc. In addition we are member of the national council of women's
organisations to emphasize the interests of female technicians in the
political environ ment.
The next issue of our biannual journal "Frauenarbeit und Informatik" will
focus on international perspectives and we hope to get your contributions
from all over the world!!!

Possible Contents
In the following we summarize some possible aspects of the issue. Please
keep in mind that we are collecting for a journal - so we are interested in
articles as well as in brief information boxes, statistics, comments, etc.
And of course the following points must not cover the national or
professional situation as a whole; informations about special branches,
situations, problems and solutions are also important, details appearing
trivial or obvious to you might be new for a german readership!

1) The "One-Minute-Contribution":
An international issue demands an international cover and here we need your
help:
Please send us the title "Women's Work and Informatics" in your native
tongue and writing!!

2) Figure data:
- General employment rate of women in your country?
- Women's proportion in technical studies?
- Women's proportion in the field of EDP professions?
- How does this field look like (job titles, the demanded
education/training, etc.)?...

3) Women's Advancement:
- at university in the field of computer science
- in industrial or govermental EDP-area, in your company?
- Possibilities of part time work? of child care? of reengagement and
further training?...

4) Amalgamations of women in computing:
Do you join or know a professional organization, a network in your country?
How is it organized, are there regular or irregular publications, what are
the main aims and acitivities?...
(Adresses and short description welcome for the planned index!)

5) Gender specific aspects of the influence of IT on the labour market?
6) Women's Research in the computing field (possibilities,
experiences, results...)?
7) Lust but not least: Feel free to describe whatever is important for you.

Formal conditions:
Articles: should not exeed 1.500 words.
Language: English or German.
References: Alphabetical order at the end of the article.
Artwork: Sorry - but we don't have colour print
If the artwork not your own, please clear up the copyright.

Deadline: September 30, 1994


Please send your contribution to the woman contacting you or to one of the
following addresses:

Roswitha Behnke
Mayskamp 8
D-45357 Essen
Germany
behnke@iug.uni-dortmund.de

Veronika Oechtering
Jenaer Str. 39
D-28215 Bremen
Germany
oechteri@informatik.uni-bremen.de

Doris Koehler
Wittmunder Str. 15
D-28219 Bremen
Germany
koehler@rrz.uni-hamburg.de

------------------------------

Date: Fri, 9 Sep 1994 22:26:17 -0700
From: Jim Warren <jwarren@WELL.SF.CA.US>
Subject: File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs

SAN FRANCISCO [ELECTRONIC] EXAMINER OFFERS CANDIDATES FREE WEB EXPOSURE

Date--07 Sep 94 23:57 GMT
From--GULKER@AppleLink.Apple.COM (S F Examiner, Chris Gulker,APD)

Distribute widely, please

As a service to the community, The Electric Examiner is offering free
Internet publishing to candidates for office who will appear on Bay
Area ballots. Internet users with access to the World Wide Web via
Mosaic, Lynx or other browser software can access these files as noted
below

While it is anticipated that candidates will mainly offer text files
like position statements, speeches and schedules, The Examiner's World
Wide Web server also supports photos, graphics and short clips of
audio and video.

Candidates can e-mail files to chrisg@sfgate.com for inclusion on the
server. Each candidate will be granted an equal heading and space up
to the limits reserved for this project.

Candidates who do not have e-mail access can send files on 3.5-inch
diskette in either DOS/Windows or Macintosh format to
Chris Gulker
Candidates Internet Project
San Francisco Examiner
110 Fifth Street
San Francisco, CA 94103

Candidates offerings will be published at Uniform Resource Locator (URL):
http://sfgate.com/examiner/candidates/

The Uniform Resource Locator of The Electric Examiner is:
http://sfgate.com/examiner/

File formats:

Text must be in plain ASCII format - this option is offered by most word
processors. Photos and graphics should be in Compuserve GIF format and
should be sized to no more than 4 inches in the longest dimension at 72 dots
per inch. Audio files should be in 'AU' format, video can be in either MPG
or Quicktime format - these should be brief clips.

The Electric Examiner is the World Wide Web service of The San Francisco
Examiner.

===

Thanks to both Phil Agre <pagre@weber.ucsd.edu> and brad@ape.com (Brad
Schrick) for fastly-forwarding this hot-stuff. --jim

&&&&&&&&&&&&&&&&&&&&

INTERNET HOSTS: HOST-COUNTS AND EXPENDITURES/GROSS-NATIONAL-PRODUCT
[ smaller number is better ]

From: Tony Rutkowski <amr@isoc.org> via farber@eff.org Wed Sep 7 1994

GNP/GDP Compared to Internet Hosts in July 1994
by Eric Arnum*

Top-Level Country July 1994 GNP/Host
Domain Name Code Internet Hosts GNP/GDP Total Ratio
------------------------------------------------------------------
Iceland is 3,268 $4,200,000,000 1.29
Finland fi 49,598 $80,600,000,000 1.63
Norway no 38,759 $72,900,000,000 1.88
Australia au 127,514 $280,800,000,000 2.20
USA var 2,044,791 $5,700,000,000,000 2.79
New Zealand nz 14,830 $46,200,000,000 3.12
Sweden se 53,294 $202,500,000,000 3.80
Canada ca 127,516 $521,500,000,000 4.09
Netherlands nl 59,729 $249,600,000,000 4.18
Czech Republic cz 5,639 $25,600,000,000 4.54
Switzerland ch 47,401 $238,050,000,000 5.02
U.K. uk 155,706 $915,500,000,000 5.88
South Africa za 15,595 $96,000,000,000 6.16

World Median ww 3,212,000 $19,850,690,000,000 6.18

Israel il 8,464 $56,400,000,000 6.66
Denmark dk 12,107 $91,100,000,000 7.52
Austria at 20,130 $164,100,000,000 8.15
Chile cl 3,703 $30,500,000,000 8.24
Germany de 149,193 $1,300,000,000,000 8.71
Slovak Republic sk 868 $9,300,000,000 10.71
Singapore sg 4,014 $43,200,000,000 10.76
Costa Rica cr 544 $5,900,000,000 10.85
Hungary hu 5,390 $60,100,000,000 11.15
Portugal pt 4,518 $50,700,000,000 11.22
Ireland ie 3,308 $39,200,000,000 11.85

R.o.W. Median (not USA) 1,180,387 $14,150,690,000,000 11.99

Belgium be 12,107 $171,800,000,000 14.19
France fr 71,899 $1,033,700,000,000 14.38
Taiwan tw 10,314 $150,800,000,000 14.62
Luxembourg lu 420 $7,830,000,000 18.64
Poland pl 7,392 $162,700,000,000 22.01
South Korea kr 12,109 $273,000,000,000 22.55
Spain es 21,147 $487,500,000,000 23.05
Liechtenstein li 27 $630,000,000 23.33
Greece gr 2,958 $77,600,000,000 26.23
Kuwait kw 297 $8,750,000,000 29.46
Croatia hr 838 $26,300,000,000 31.38
Japan jp 72,409 $2,370,000,000,000 32.73
Mexico mx 5,164 $172,400,000,000 33.38
Malaysia my 1,322 $44,900,000,000 33.96
Slovenia si 574 $21,000,000,000 36.59
Ecuador ec 256 $11,500,000,000 44.92
Italy it 23,616 $1,090,000,000,000 46.16
Brazil br 5,896 $358,000,000,000 60.72
Nicaragua ni 23 $1,600,000,000 69.57
Turkey tr 1,204 $91,780,000,000 76.23
Thailand th 1,197 $92,000,000,000 76.86
Uruguay uy 101 $9,100,000,000 90.10
Venezuela ve 399 $52,300,000,000 131.08
Romania ro 453 $71,900,000,000 158.72
Cyprus cy 38 $6,100,000,000 160.53
Panama pa 24 $5,000,000,000 208.33
Tunisia tn 46 $10,900,000,000 236.96
Macau mo 12 $3,100,000,000 258.33
Fiji fj 5 $1,300,000,000 260.00
Colombia co 144 $45,000,000,000 312.50
Argentina ar 248 $101,200,000,000 408.06
Bulgaia bg 79 $36,400,000,000 460.76
Peru pe 42 $25,150,000,000 598.81
Philippines ph 65 $47,000,000,000 723.08
Egypt eg 52 $39,200,000,000 753.85
Ukraine ua 339 $339,200,000,000 1,000.59
India in 316 $328,000,000,000 1,037.97
China cn 325 $452,000,000,000 1,390.77
Indonesia id 54 $116,200,000,000 2,151.85
Russia ru 322 $800,000,000,000 2,484.47
Algeria dz 7 $54,000,000,000 7,714.29
Moldova md 2 $16,900,000,000 8,450.00
Iran ir 4 $90,000,000,000 22,500.00
Saudi Arabia sa 1 $104,000,000,000 104,000.00
Yugoslavia yu 1 $159,000,000,000 159,000.00
Czechoslovakia cs 1,869 $0 0.00
Soviet Union su 3,145 $0 0.00
Educational edu 856,234
Commercial com 774,735
Government gov 169,248
Military mil 130,176
Organization org 66,459
Networks net 30,993
US Int'l us 16,556
International int 315
Puerto Rico pr 75
Antarctica aq 4
Hong Kong hk 9,141 n/a
Estonia ee 659 n/a
Latvia lv 180 n/a
Lithuania lt 53 n/a

n/a GNP figures not available

Sources: Internet hosts: Mark Lottor, Network Wizards,
GNP figures: Groliers Encyclopedia,
Ratios: EMMS.

*by permission to Internet Society

------------------------------

Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 9--Cu Digest Header Information (last changed 11 Sep '94)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #6.81
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT