Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 08 Issue 73
Computer underground Digest Sun Oct 13, 1996 Volume 8 : Issue 73
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.73 (Sun, Oct 13, 1996)
File 1--Selling OverSeas Encryption (fwd)
File 2--AA BBS (Robert Thomas) Appeal Turned Away
File 3--A cypherpunk responds to Time
File 4--Re: White House Clipper 3.1.1 plan unveiled
File 5--Private censorship vs. free speech, from 10/96 IU
File 6--Scam spam?
File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Wed, 2 Oct 1996 22:19:59 -0400 (EDT)
From: Noah <noah@enabled.com>
Subject: File 1--Selling OverSeas Encryption (fwd)
From -Noah
---------- Forwarded message ----------
Date--Wed, 2 Oct 1996 12:38:47 -0400 (EDT)
From--Anthony Williams <alby@UU.NET>
Administration to ease export of encryption software
October 1, 1996
Posted at: 3:15 p.m. EDT
WASHINGTON (AP) -- The Clinton administration intends to break a
deadlock between law enforcement and the U.S. computer industry with a
plan announced Tuesday to make it easier for companies to sell powerful
data-scrambling software abroad.
Companies could export such technology as long as they have a system in
place that would allow U.S. law enforcement officials -- after getting
a court order -- to break the code in order to intercept
communications.
President Clinton will sign an executive order instituting the plan in
the middle of October, said Greg Simon, Vice President Al Gore's
domestic policy adviser.
The plan "will make it easier for Americans to use stronger encryption
products -- whether at home or aboard -- to protect their privacy,
intellectual property and other valuable information," Gore said in a
statement.
"It will support the growth of electronic commerce, increase the
security of the global information and sustain the economic
competitiveness of U.S. encryption product manufacturers," he added.
The plan changes U.S. export policy and affirms current U.S. import
policy, which places no restrictions on the sale of encryption devices
within the U.S.
The plan mirrors a proposal by the administration this summer. That
proposal, considered more acceptable to industry, has been criticized
by a number of computer trade groups and computer user groups.
At issue is sophisticated software that allows users to scramble
telephone and computer messages that move across computer networks and
the Internet. Users, particularly businesses, want to keep their data
private while law enforcement officials argue they need the power to
unscramble the messages to investigate crime.
"Law enforcement has been arguing that this is critical to their
continued operations. But virtually everyone else, from industry to the
civil liberties community, has opposed these proposals," said Marc
Rotenberg, director of the Electronic Privacy Information Center.
While the technology is sold domestically, the U.S. State Department
has blocked efforts to export it, although foreign firms sell their
software around the world.
Under the most recent White House plan, U.S. companies could export the
software that scrambles -- or encrypts -- data using codes that are up
to 56 bits long, Rotenberg said. As it stands, codes may only be 40
bits long in exported software. Bits are the electronic pulses that
make up the data being transmitted.
In return, U.S. companies would have to design a system that would
allow intelligence officials to get the code if they obtain a court
warrant. The plan also would transfer authority over encryption export
from the State Department to the Commerce Department, but it would give
the FBI power to review export plans.
This plan replaces the "clipper chip" the Clinton administration
proposed in 1994. That would have allowed computer or telephone
communications to be scrambled while giving the government a set of
decoding keys to allow for court-approved electronic surveillance.
The latest plan is different than the clipper chip because it would
make it more difficult for government to unscramble messages,
government officials say. The keys could be held by third parties and
their components would be spread across several companies.
The administration believes it will take some time for the United
States to persuade other countries to adopt the same systems, allowing
governments to work together.
------------------------------
Date: Mon, 7 Oct 1996 19:10:31 -0700
From: "baby-X @ cyberPOLIS" <baby-x@cyberpolis.org
Subject: File 2--AA BBS (Robert Thomas) Appeal Turned Away
http://www.news.com/News/Item/0,4,4200,00.html
Porn appeal rejected
By Reuters
October 7, 1996, 5 p.m. PT
The Supreme Court today opened its new session by rejecting an appeal
by a California couple involving the first conviction under federal
law for transmitting obscene materials by computer.
Robert and Carleen Thomas of Milpitas, California, were convicted in
1994 in Memphis for sending illegal, sexually explicit files from the
Amateur Action Computer Bulletin Board System they operated from their
home for several years. The system included email, chat lines, public
messages, and about 14,000 files that members could transfer and
download to their own computers and printers.
..........
Thomas received a 37-month prison term, while his wife got 30 months.
The government also seized their computer system.
The couple's attorneys asked the Supreme Court to hear the case. "This
prosecution represents the first attempt of the federal government to
apply content-based regulation to the emerging computer-based
technologies," they said.
The attorneys argued that the federal obscenity law, as previously
written, did not apply to the files, which were transmitted by
computer and thus were not tangible objects subject to the law. They
acknowledged that Congress, in passing the Telecommunications Act this
year, amended the law to specifically include computer transmissions
of obscene material.
The Supreme Court turned down the appeal without comment.
Story Copyright =A9 1996 Reuters Limited. All rights reserved.
------------------------------
Date: Thu, 10 Oct 1996 09:17:21 -0400
From: Jim Ray <liberty@gate.net>
Subject: File 3--A cypherpunk responds to Time
(Fwd from: fight-censorship@vorlon.mit.edu
Recently Time, which from what I've read had a role in founding this list,
printed an article about the cypherpunks. I had some comments, which I have
inserted. You may forward this [unmodified, please & within the bounds of
good netiquet] to other appropriate fora if you like. I have not sent it to
cypherpunks because it is obvious to them, but this article cried out for
rebuttal, otherwise, combined with cypherpunk's somewhat perjorative suffix,
it could produce unwarranted post election nastiness.
JMR
~~~~~~~~~~~~~~
Time, October 14, 1996, p. 78.
The Netly News
Joshua Quittner
Big Brother vs. Cypherpunks
Well, at least they got the headline right.
For more than three years, the White House and the U.S.
computer industry have sat locked, eyeball to eyeball, in
a seemingly intractable face-off over who will control
the secret codes that protect our most sensitive
communications. The government claimed to be working to
protect us from nuke-carrying terrorists; the computer
industry said it was championing the individual's right
to privacy. Neither was telling the whole truth.
[As if Time (!) were somehow an arbiter of the truth.]
Last week, in a concession to Silicon Valley, the
Administration blinked -- or perhaps it merely winked.
Fittingly, in the arcane world of code making and
breaking, it's difficult to ferret out who's doing what
to whom. And why.
Translation: "It requires journalism." Someone else commented: "Oh my, you
mean different sides of a controversial topic are saying different things?
What's a po reporter to do?"
A few things are incontrovertible. Vice President Al Gore
announced the new encryption initiative at midweek, timed
to coincide with support from an alliance of high-tech
businesses that included such hardware heavyweights as
IBM, Sun Microsystems and Hewlett-Packard. However, most
of the big software makers -- and every civil liberties
group -- still opposed it.
Gosh, what a surprise. Some individuals out there don't trust the government
with an ability to decrypt our private communications in almost-realtime.
Why would people _ever_ feel that way?
At the core of the initiative is a new code-making scheme
known as "key recovery." Here at last, the government and
its supporters claimed, was a way to get around the more
noxious aspects of the reviled Clipper chip, the
Administration's first doomed attempt to balance the
industry's call for stronger encryption with law
enforcement's need to surveil our shadier citizens.
According to Vice President Gore's announcement, this "key recovery" was an
export-only proposal, and supposedly U.S. citizens are still to be free to
use any encryption algorithm they wish, just as we are now. Therefore, I
fail to see what, if anything, it could have to do with the U.S. surveiling
the communications of "our shadier citizens." Unless, of course, the
government was lying about their Key Recovery Assurance Program [K.R.A.P.]
which they are pushing to replace their now-discredited Newspeak of "key
'escrow'" GAK [Government Access to Keys] program.
I can see it now: "I'm from the government, and I'm here to help you recover
your key." HINT: If you want to be able to recover your key after your hard
drive crashes, copy it onto a floppy disk and write-protect it.
Clipper, as proposed, would use a powerful encryption
[Wrong, unless "Powerful" now means "compromised long-ago by Matt Blaze."]
formula to encode communications sent over telephones and
computer networks but would require that a "back door"
key be built into each chip that would give police --
where warranted, of course -- a means to eavesdrop.
Oh, "of course." We all know how much cops and judges respect the warrant
process and the 4th amendment these days. Drugwar Uber Alles, after all.
Nobody -- especially foreign companies -- liked the idea
of the U.S. and its agents holding those keys. The new
key-recovery proposal tries to get around that objection
by chopping the keys into several pieces and storing them
with "trusted agents" of the user's choosing. Some nice
Swiss banks, perhaps.
Time knows that "nice Swiss banks" are unlikely to get a license to be the
trusted agents of users' choosing. Time also knows that few terrorists --
dumb as terrorists often are -- will actually be stupid enough to leave a
copy of their crypto-key with the FBI. What Time knows and what Time will
admit are, of course, two entirely different things.
But the Administration's plan still falls short of what
civil libertarians, and especially a vocal group of
cryptoextremists who call themselves cypherpunks, say
I suppose it is a distressing sign of the absolute pervasiveness of
media-bias that I am now beginning to get used to various whining liars
calling me an "extremist." <sigh> It used to upset me, but now I call them
"whining liars" and they call me an extremist.
I have yet to hear an answer from the whining liars to my question: "What's
so extreme about wanting a return to respect for the principles outlined in
the United States Constitution?" ... I'm not holding my breath...
they need: encryption powerful enough to give back to the
citizenry the right to absolute privacy, which we have
lost in the information age. According to the
cypherpunks, the so-called 56-bit code the Administration
has okayed for export can be cracked by the National
Security Agency's supercomputers in a matter of hours.
Wrong again, Josh. It may seem an awful lot like work or journalism or
something, but perhaps next time before writing about the cypherpunks you
might want to actually interview one or two of us. The "matter of hours" you
refer to is almost certainly either a matter of "minutes" or "seconds"
regarding 56-bit single DES (understandably, the NSA does not publicly
disclose their exact capabilities with regard to cryptography).
Are they right? It's hard to know whom to believe in this
cloak-and-dagger debate. Civil libertarians tend to gloss
over the fact that the world is full of bad people with
crimes to hide.
Nope, we constantly are made aware of this reality by folks who disagree
with us. Cypherpunks just maintain that the world is increasingly full of
*governments*, which also have "bad people with crimes to hide" (believe it
or not, Josh) and therefore we don't trust governments with our secrets.
The software industry -- which makes 48%
of its profit overseas --
Obvious evidence of software industry evil here, at least if you listen to
Pat Buchanan and Ro$$ Perot. Imagine, they make overseas profits -- how
*dastardly* of that slimy software industry.
is clearly less concerned with
privacy than with losing foreign sales.
Well, arguably the individuals running those companies embracing KRAP feel
that way, but trying to characterize an entire industry full of individuals
as all thinking in one way says more about Time's prejudices than I ever
could.
And it may be no
accident that the Administration chose to start making
concessions the same week an influential software CEO --
Netscape's Jim Barksdale -- excoriated Clinton's
cryptopolicy and endorsed Bob Dole.
56-bit GAK is not a very much of a "concession," and this is not the first
time Netscape has made statements against the idiotic U.S. export laws. Mr.
Barksdale may, however, be buying a pig in a poke by endorsing Mr. Dole, who
has yet to be pinned down by the media covering him on exactly how he feels
about GAK. His campaign statements are contradictory on the subject of
cryptography and privacy vs "the legitimate needs of law enforcement," and
he's going to lose the election in a landslide if the English odds are to be
believed, but I can predict how he would behave if he won -- Yep, just like
Clinton.
The issue is too complex -- and too important -- for
political gamesmanship.
Evidently, the issue is too complex for some reporters and editors, too.
It will never get sorted out
until somebody starts playing it straight.
Might I suggest that Time begin?
-----
Read the Netly News daily at netlynews.com on the World
Wide Web
[End]
Sift through cypherpunks at toad.com -- if you can withstand the deluge.
[Filtering software suggested.]
Thanks to JQ.
& thanks also to JYA :)
JMR
------------------------------
Date: Wed, 9 Oct 1996 01:11:29 -0700
From: Michael Kwun <kwun@uclink4.berkeley.edu>
Subject: File 4--Re: White House Clipper 3.1.1 plan unveiled
(I feel like, out of habit, that I'm required to quote part of Richard's
email, so I'm quoting L, M and N--the conclusions--below)
Tech wars: first of all, the police are going to need to build quite an
outrageous battering ram to beat down, say, PGP. This is inherent in the
asymmetric nature of multiplication/factoring technology. Absent a nicely
fundamental discovery in mathematics (which probably will come sometime,
but it's a tough problem), building a stronger house (ie doing more
multiplication) is substantially simpler than building a bigger battering
ram (ie doing more factoring). That is, PGP stacks the tech wars decidedly
in favor of the cypherpunks.
Those Amendments: they only protect us insofar as we are able to identify
when they are broken. If the feds spy on groups and decide which ones to
harass (oops, conduct further surveillance on) based on illegal seized
information due to their ability to crack Clipper, that's often going to be
difficult to identify. (and actually protection under the 4th Amendment is
getting weaker with each passing year anyway--I see no reason to weaken the
protections the 4th Amendment was intended to protect, IMHO, any further
with Clipper and the like).
Anonymity: The right to anonymity is fairly well enshrined in First
Amendment jurisprudence. The Clipper system, while it may not directly
impinge on that right in many circumstances, arguably chills it
considerably. (That's a pretty weak argument, as is, but I think it is the
kernal of a pretty strong argument, at least if you agree with standard
First Amendment jurisprudence.)
An analogy: would we be comfortable, if the technology existed, if
mind-reading taps were surgically implanted in all people under U.S.
jurisdiction if (1) someone with the right secret code could access a
person's thoughts without them knowing it; and (2) a Clipper-esque escrow
system were set up to keep the secret codes from being misused? (use of
these taps, under the right circumstances, could provide incontrovertible
evidence as to whether or not criminal intent existed--crucial to sucessful
prosecution of most criminal charges.) This system could be supported, it
seems to me, using Richard's analysis of Clipper.
A different sort of hypothetical: consider a proposal that if the police,
in the investigation of a possible crime, come across an encoded message
(on paper, not electronic). They are able to show (1) probably cause the
the unencoded contents would lead to evidence proving D committed the
crime; and (2) that D can decode the message. If D refuses to decode it,
why not allow that to be considered evidence of D's guilt? I think the
policy reasons for this sort of legal doctrine are pretty much the same as
the ones Richard brings up.
Michael
At 12:45 PM -0500 10/8/96, Richard MacKinnon wrote:
>L. Tech wars. Okay, let's postpone J and K for a moment. Let's say that
>we have gotten to the point that we all need to build big, strong houses to
>protect us from each other and the police (sheesh--what kind of mess have we
>gotten ourselves into!!?). The police are a well-funded institution.
>Eventually, they will build a big-enough battering ram and you're gonna help
>pay for it. Maybe you'll do it because you're not closely following the
>morass of legislation. Maybe you'll do it because someone stole your stuff
>and you'll want it back. But now that the police have a big-enough
>battering ram, the rest of us are gonna want to build even bigger and
>stronger houses. It's an escalating war of technology, and frankly, I don't
>think we can win. In fact, I don't think we should even get into it. Let's
>go back to J.
>
>M (the letter formerly known as J). This distrust of the police concerns
>me. On this point, Mike Godwin shouted at me at the former High Times
>restaraunt and smart drink bar in Austin. He said that I was naive. I told
>him that I used to be a cop. He told me that I should know better. He
>pressed me to reveal if I had known any crooked cops. Sigh. I know what
>he's getting at. Of course, I'm concerned with bad law enforcement and bad
>jurisprudence. But I still value the social contract which means using
>police to help me protect myself from you. I simply don't have the time to
>protect myself from the police as well. In fact, I don't want to protect
>myself from the police. I don't even want to encourage that line of thinking.
>
>N. I don't think we should build police-proof houses. We should build
>houses which assist the police in their lawful duties. If there's a problem
>with police carrying out their lawful duties then we should deal with THAT
>problem directly. Why not use our money and resources to monitor *them*
>rather than build fancy toys which prevents them from monitoring us? The
>maintenance of a professional, dedicated, and trustworthy police force is
>essential to the execution of our social contract. Conceding that the
>police that police do not possess these characteristics and operating with
>that mindset is a doomed cause for our civilization. Allowing such a police
>force to continue is a nightmare. Crypto-tech vis a vis the police is a red
>herring. If the problem is letter J, then we have bigger fish to fry.
------------------------------
Date: Tue, 8 Oct 1996 18:09:29 -0500
From: Declan McCullagh <declan@well.com>
Subject: File 5--Private censorship vs. free speech, from 10/96 IU
(Fwd from: fight-censorship@vorlon.mit.edu
Solveig Bernstein from the Cato Institute and I have opposing pieces
on "private censorship" in the October issue of _Internet
Underground_ magazine, in their Flamethrower column.
(http://www.underground-online.com/) And, as a bit of a plug, the
magazine's cover story for this month is an exclusive interview with
John Draper of Cap'n Crunch fame -- who now is a sad and pitiful
figure.
-Declan
*********
INTERNET UNDERGROUND
October 1996
http://www.underground-online.com/
---
FLAMETHROWER
Declan McCullagh (declan@well.com)
Far from being the saviors of the Net, corporations may be the ruin of
cyberspace.
Let's be clear: governments have done plenty to harm the Net. By
passing the Communications Decency Act (CDA), the U.S. Congress
extended television-style censorship to the Net. Other countries are
close behind.
But governments aren't the worst of the cybercensors -- the CDA has
been declared unconstitutional and netizens are organizing
internationally. Private businesses pose the more sinister threat to
free expression online.
Take America Online (AOL), which now boasts over six million members.
In a move akin to the paranoid antics of a kindergarten schoolmarm,
AOL this summer started deleting messages posted in Spanish and
Portuguese since its monitors can't understand them. Undercover AOL
cops continue to yank accounts of mothers who talk about breast
feeding and mention the word "nipple." The company's gapingly broad
"terms of service" agreement allows it to boot anyone, anytime, for
any reason.
Or consider private universities. Carnegie Mellon University bans
sexually-explicit Usenet newsgroups -- including innocuous ones
devoted to Japanese anime -- and "offensive" comments posted online.
Cornell University forced students who offended campus feminists with
an email satire to plea-bargain to "voluntary" punishment. Brigham
Young University disciplines students for downloading porn.
Don't forget net-filtering software. While busily touting itself as
anti-censorship, CyberSitter quietly blocks the National Organization
of Women and Queer Resources Directory web sites. CyberPatrol prevents
teen pornhounds from investigating animal and gun rights pages -- and,
inexplicably, the Electronic Frontier Foundation's censorship archive.
NetNanny cuts off AIDS resources including the sci.med.aids and
clari.tw.health.aids newsgroups. SurfWatch bans domestic partner web
pages and Columbia University's award-winning "Health Education and
Wellness" site.
Now, I don't dispute that state censorship is more heinous. The
government has guns, police, and gallows to back up its laws. Anyone
caught violating the CDA gets slammed with a $250,000 fine and two
years in Club Fed.
But to focus exclusively on the evils of government censorship is
myopic. Private censorship also shrinks the marketplace of ideas, a
concept California recognized when it passed a law striking down
private speech codes at universities.
That's why considering only the "speech rights" of businesses without
looking at the effects the *exercise* of the rights have is bonkers.
It ignores the very real effects of private censorship online -- which
is more insidious and harder to combat. And perhaps getting worse.
PUBLIC SQUARES IN CYBERSPACE
People claim the street as theirs on two occasions: to protest and to
celebrate.
Throughout the history of the United States, there always have been
readily available public spaces where people can assemble freely. In
lawyerspeak, these spaces are "public forums" and aren't subject to
content-based censorship. The only restrictions the state may impose,
such as a requirement for a permit, must be unrelated to the
protesters' message. People can scream "U.S. out of Vietnam,"
"legalize child pornography," or any politically explosive message
they choose.
Where will the public squares exist in 21st century cyberspace?
Nowhere. Cyberspace is and likely will continue to be controlled by
corporations. Unlike in meatspace, there is no public forum for
controversial expression that offends the multinationals that jointly
own the Net.
Sure, it's trivial to shift your embattled web site from one Internet
service provider to another. Right now, at least. In Canada, Marc
Lemire didn't find it so easy when his "White Nationalist" site was
kicked off of a number of ISPs in quick succession. (The Simon
Wiesenthal Center has been busy firing off terse letters to Lemire's
ISPs -- and clamoring for government crackdowns as well.) USENET
flamer and outspoken homophobe Fred Cherry keeps losing email
accounts.
This problem will become acute if the small number of Internet
backbone providers like MCI and Sprint -- which number only in the
single digits -- buckle to public pressure from groups like the
Wiesenthalers and refuse to provide connections to ISPs that host
controversial web sites.
If that happens, netizens will find their rosy vision of the Net as
the birthplace of a new form of democracy overwhelmed by the sad
reality of a new media oligarchy aborning.
*******************
FLAMETHROWER
By Solveig Bernstein (sberns@cato.org)
The decision to remain silent is an act of conscience, just like the
decision to speak. So the view that acts of "private censorship"
violate rights of free speech is incoherent. If an online service
provider ousts a Web site that posts explicit messages about sex, in
violation of the terms of their service contract, or a non-profit
organization persuades some Internet Service Providers to refuse to
host "Holocaust Revisionist" web sites, these decisions do not violate
rights of free speech.
Indeed, such private content selection decisions are themselves acts
of free speech. They are just like a newspaper editor's decision not
to run a certain letter to the editor, or a publisher's decision not
to publish a certain book. The editor and publisher have created a
means of distributing speech. The outlet they have created is their
property, and they have the right to decide what to do with it. Other
private companies in the speech distribution business are no
different.
Private content selection has the superficial feel of government
censorship. But it's dangerous to confuse the two. To see what can
happen, let's accept the premise that a private company that refuses
to provide a forum for speech violates the would-be speaker's free
speech rights. This is a very serious charge. Assuming government
exists for some legitimate purpose, it surely exists to protect our
rights. If the ISP or OSP mentioned above is violating someone's
rights, it logically follows that the government should take action
against them.
First, this means that the government would become responsible for
overseeing the distribution of computer network content. Clearly,
this is not a very good idea. Second, fortunately, it's fundamentally
incompatible with the First Amendment. The Supreme Court recognizes
that "[t]he right of freedom of thought protected by the First
Amendment against state action includes both the right to speak freely
and the right to refrain from speaking at all." And the right to
refrain from speaking includes the right not to provide a forum for
other speakers (a misguided case or two to the contrary
notwithstanding).
Any premise that lead us towards more government control over computer
networks should be questioned. Where does the notion that private
content selection violates free speech rights come from? Often, it
stems from the view that we have rights to speech because "more speech
is good." On this view, free speech rights float out in the ether,
with no connection any other aspect of our world, and come into play
whenever we need "more speech." But free speech rights are nothing
like that. They're just another aspect of property rights, and only
extend as far as property rights. Free speech doesn't mean I have the
right to walk into my neighbor's house to make a speech, or write an
essay, however enlightened, on the wall of an office building.
Another fallacy behind the premise is the view that free speech rights
come into play against anyone who has a lot of power over anyone else.
And, the theory goes, ISPs and OSPs just have too much power. They
might, in some very hypothetical unlikely future, turn into
monopolists.
This argument also goes too far, too fast, in the wrong direction.
ISPs and OSPs don't have any more power over authors than the New York
Times, or any big publishing house. Most parents have even more power
over their children. These kind of power relationships are a
necessary and natural part of life; anyone who has something we want
or need will have power over us. This doesn't mean that if someone is
exercising that power, he or she is violating our rights. A theory of
rights that aims to do away with these power relationships is
fundamentally unrealistic; it's ultimate aim would have to be to
abolish reality itself. By contrast, it is both necessary and proper
to expect rights to provide a line of defense against the kind of
power uniquely exercised by government -- the power of soldiers and
police.
So, we might criticize private content selection decisions as
intolerant. We could point out that suppressing "revisionist" nonsense
about the Holocaust might backfire, and that the truth should be
brought out in open discussion. We might point out that overly
restrictive ISPs and OSPs will lose customers. But none of this has
anything to do with rights of "free speech" protected against true
censorship by the First Amendment.
------------------------------
Date: Wed, 2 Oct 1996 12:55:17 -0400 (EDT)
From: "I G (Slim) Simpson" <ssimpson@cnwl.igs.net>
Subject: File 6--Scam spam?
I don't know if this information is CUD material, but I thought I
smelled a scam and decided to send this in.
On Monday, 30 September I received some spam advertising a 'we'll
scan your picture for you (only US$8.95)' from CB256@aol.com. The
only headers were From:; Subject:; and Date:. The only contact
information was a snail mail address to receive your money and the
address of the company's web page
(www.jet.laker.net/fastfoto). I don't like spam so I sent a I HATE
SPAM message to CB256@aol.com. It got bounced; no such address!
Ho Ho, says I. I went into the web site and found the same stuff as
had been in the e-mail message; but no e-mail address, no phone
number, no fax number,
just the same surface mail address to send your money to.
To be kind, maybe the folks at Fastfoto of Pomano Beach, Florida,
are just very poor business people. Maybe they just forgot to
include electronic contact information. May the shortened header
was an attempt to save bandwidth. I didn't send any money.
------------------------------
Date: Thu, 21 Mar 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #8.73
************************************