Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 07 Issue 77

  



Computer underground Digest Wed Sept 27, 1995 Volume 7 : Issue 77
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #7.77 (Wed, Sept 27, 1995)

File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)
File 2--New Firewalls Book from O'Reilly
File 3--CIX alternative to InterNIC's registration process.
File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)
File 5--COMPUTERS & THE LAW CONFERENCE INFO
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 20 Sep 1995 22:59:35 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)

---------- Forwarded message ----------

From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>

-----BEGIN PGP SIGNED MESSAGE-----

The following memo can be found at:
http://www.state.mn.us/ebranch/ag/memo.txt

As a resident of Minnesota, I have a great concern over how far this
inturrpretation can go. The AA BBS case seems to be ripe for repeat
under this, as can any other law that diffes between Minnesota and
another state. This is bad, IMHO.

I have deleted a small amount of white space, otherwise the memo is exact
as it appears on the web page.

================

WARNING TO ALL INTERNET USERS AND PROVIDERS

THIS MEMORANDUM SETS FORTH THE ENFORCEMENT POSITION OF THE
MINNESOTA ATTORNEY GENERAL'S OFFICE WITH RESPECT TO CERTAIN
ILLEGAL ACTIVITIES ON THE INTERNET.

PERSONS OUTSIDE OF MINNESOTA WHO TRANSMIT INFORMATION VIA THE
INTERNET KNOWING THAT INFORMATION WILL BE DISSEMINATED IN
MINNESOTA ARE SUBJECT TO JURISDICTION IN MINNESOTA COURTS FOR
VIOLATIONS OF STATE CRIMINAL AND CIVIL LAWS.

The following discussion sets out the legal basis for this
conclusion.

Minnesota's general criminal jurisdiction statute provides as
follows:

A person may be convicted and sentenced under the
law of this State if the person:

(1) Commits an offense in whole or in part within
this state; or

(2) Being without the state, causes, aids or abets
another to commit a crime within the state; or

(3) Being without the state, intentionally causes a
result within the state prohibited by the criminal laws
of this state.

It is not a defense that the defendant's conduct is
also a criminal offense under the laws of another state
or of the United States or of another country.

Minnesota Statute Section 609.025 (1994).

This statute has been interpreted by the Minnesota Supreme
Court. In State v. Rossbach, 288 N.W.2d 714 (Minn. 1980), the
defendant appealed his conviction for aggravated assault. The
defendant, standing inside the border of an Indian Reservation,
had fired a rifle across the boundary line at a person outside
the border. The defendant claimed that Minnesota courts did not
have jurisdiction because his act took place off of Minnesota
lands. Applying Minnesota Statute { 609.025 and the common law,
the Minnesota Supreme Court affirmed the conviction, holding that
the intentional impact within Minnesota land created
jurisdiction. Id. at 715-16.

The Minnesota Court of Appeals reached a similar result in
State v. Brown, 486 N.W.2d 816 (Minn. Ct. App. 1992). In Brown,
the court implicitly found that Minnesota courts had criminal
jurisdiction over individuals in Iowa who mailed unlicensed
gambling equipment to Minnesota residents. Id. at 817-18.






Minnesota courts have applied similar jurisdictional
principles in civil cases. In State v. Red Lake DFL Committee,
303 N.W.2d 54 (Minn. 1981), the Minnesota Supreme Court held that
state courts had jurisdiction over a committee of the Red Lake
Indian Tribe which had purchased space for political
advertisements in a newspaper circulated in the state. At issue
was whether the committee had to register under state ethical
practices laws.

The committee argued that it had done nothing outside of the
reservation, since the transaction with the newspaper took place
inside the reservation, and the committee did not assist in the
circulation of the newspaper. In holding that the committee was
required to register under state ethical practices law, the
Supreme Court responded to this argument as follows:

Defendants say nothing they did occurred outside the
reservation, but they choose to ignore that what they
did caused something to occur beyond the reservation
boundaries, namely, the dissemination of a political
message, which is the activity here sought to be
regulated.

Id. at 56 (emphasis added).

The above principles of Minnesota law apply equally to
activities on the Internet. Individuals and organizations
outside of Minnesota who disseminate information in Minnesota via
the Internet and thereby cause a result to occur in Minnesota are
subject to state criminal and civil laws.

An Example Of Illegal Activity On The Internet - Gambling

Gambling appears to be an especially prominent aspect of
criminal activity on the Internet. There are a number of
services outside of Minnesota that offer Minnesota residents the
opportunity to place bets on sporting events, purchase lottery
tickets, and participate in simulated casino games. These
services are illegal in Minnesota.

Lotteries

A lottery is defined as "a plan which provides for the
distribution of money, property or other reward or benefit to
persons selected by chance from among participants some or all of
whom have given a consideration for the chance of being
selected." Minnesota Statute Section 609.75, Subdivision 1(a)
(1994).

Generally, it is unlawful in Minnesota to sell or transfer a
chance to participate in a lottery. Minnesota Statute Section
609.755(2) (1994). It is also unlawful to disseminate
information in Minnesota about a lottery, except a lottery
conducted by an adjoining state, with intent to encourage


-2-





participation therein. Minnesota Statute Section 609.755(3).
Acts in Minnesota in furtherance of a lottery conducted outside
of Minnesota are included, notwithstanding its validity where
conducted. Minnesota Statute Section 609.75, Subdivision 1(c)
(1994). Violation of these provisions is a misdemeanor,
punishable by up to 90 days in jail, or a fine of up to $700, or
both. Minnesota Statute Section 609.755 (1994); 609.02,
Subdivision 3 (1994). It is a gross misdemeanor under Minnesota
law to conduct a lottery. Minnesota Statute Section 609.76,
Subdivision 1(3) (1994). A gross misdemeanor is punishable by up
to one year in jail, or a $3,000 fine, or both. Minnesota
Statute Section 609.02, Subdivision 4 (1994).








-3-





Sports Bookmaking

Sports bookmaking is defined as "the activity of
intentionally receiving, recording or forwarding within any
30-day period more than five bets, or offers to bet, that total
more than $2,500 on any one or more sporting events." Minnesota
Statute Section 609.75, Subdivision 7 (1994). Engaging in sports
bookmaking is a felony, which is punishable by more than one year
imprisonment. Minnesota Statutes Sections 609.76, Subdivision 2
(1994); 609.02, Subdivision 2 (1994). Intentionally receiving,
recording, or forwarding bets or offers to bet in lesser amounts
is a gross misdemeanor. Minnesota Statute Section 609.76,
Subdivision 1(7) (1994).

Accomplice Liability

Minnesota's accomplice statute provides that one who
intentionally aids, advises, counsels, or conspires with another
to commit a crime is equally liable for that crime. Minnesota
Statute Section 609.05, Subdivision 1 (1994). Therefore, persons
or organizations who knowingly assist Internet gambling
organizations in any unlawful activity may themselves be held
liable for that unlawful activity. Thus, for example, Internet
access providers and credit card companies that continue to
provide services to gambling organizations after notice that the
activities of the organizations are illegal would be subject to
accomplice liability.

In addition to being illegal under Minnesota law, the
Internet gambling organizations appear to violate several
provisions of the federal law. All of the services appear to
violate 18 United States Code Section 1084, which prohibits the
foreign or interstate transmission of bets or wagers or
information on bets or wagers by use of a wire communication. In
as much as the Internet gambling organizations involve lotteries,
they would also appear to violate 18 United States Code Section
1301 (prohibiting the "importing or transporting" of lottery
tickets; 18 United States Code Section 1302 (prohibiting the
mailing of lottery tickets); and 18 United States Code Section
1304 (prohibiting the "broadcasting" of lottery information).
Sections 1084 and 1301 provide for felony-level penalties, while
Sections 1302 and 1304 provide for misdemeanor penalties.

Placing A Bet Through Internet Gambling Organizations

Minnesota residents should be aware that it is unlawful to
make a bet through Internet gambling organizations. Minnesota
law makes it a misdemeanor to place a bet unless done pursuant to
an exempted, state-regulated activity, such as licensed
charitable gambling or the state lottery. Minnesota Statute
Sections 609.75, Subdivisions 2 - 3; 609.755(1) (1994). The
Internet gambling organizations are not exempted. Therefore, any
person in Minnesota who places a bet through one of these
organizations is committing a crime.


-4-






Minnesota residents should also be aware of forfeiture
provisions related to unlawful gambling activity. Minnesota
Statute Section 609.762, Subdivision 1 (1994) provides that the
following items are subject to forfeiture:

(a) Devices used or intended for use, including
those defined in section 349.30, subdivision 2, as a
gambling device, except as authorized in sections 349.11
to 349.23 and 349.40;

(b) All moneys, materials, and other property used
or intended for use as payment to participate in
gambling or a prize or receipt for gambling; and

(c) Books, records, and research products and
materials, including formulas, microfilm, tapes, and
data used or intended for use in gambling.

A "gambling device" is defined as "a contrivance which for a
consideration affords the player an opportunity to obtain
something of value, other than free plays, automatically from the
machine or otherwise, the award of which is determined
principally by chance." Minnesota Statute Section 609.75,
Subdivision 4 (1994).

Under this definition of "gambling device", a computer that
is used to play a game of chance for something of value would be
subject to forfeiture.

Gambling is just one example of illegal activity on the
Internet. However, the same jurisdictional principles apply with
equal force to any illegal activity.

Please direct any inquiries regarding this notice, or report
violations of Minnesota law to the Law Enforcement Section,
Minnesota Attorney General's Office, Suite 1400, NCL Tower, 445
Minnesota Street, St. Paul, Minnesota 55101-2131, telephone (612)
296-7575..

------------------------------

Date: Wed, 20 Sep 1995 11:33:36 -0700
From: Sara Winge <sara@ora.com>
Subject: File 2--New Firewalls Book from O'Reilly

FOR IMMEDIATE RELEASE
September 20, 1995

PRESS--FOR REVIEW COPIES, CONTACT: Sara Winge
707/829-0515
sara@ora.com

O'REILLY PUBLISHES GUIDE TO INTERNET FIREWALLS
New Book Describes Theory and Practice of
Key Computer Security Technology

SEBASTOPOL, CA--O'Reilly & Associates has released "Building Internet
Firewalls," a practical guide to protecting computer systems from the
growing threats to Internet security.

Determined Internet hackers and computer criminals can wreak havoc if
they break into computer systems that are connected to the Internet.
Firewalls are an important security tool for responding to this
threat--they keep damage on one part of the network (e.g.,
eavesdropping, a worm program, file damage) from spreading to the rest
of the network. A hardware and/or software solution that restricts
access from an internal network to the Internet (and vice versa), a
firewall may also be used to separate two or more parts of a local
network (for example, protecting finance from R&D). Without firewalls,
network security problems can rage out of control.

"Building Internet Firewalls" describes a variety of firewall
approaches and architectures. It discusses Internet threats, the
benefits of firewalls, overall security strategies, and a summary of
Internet services and their security risks. In addition, the book
thoroughly covers the technical aspects of firewall design and
maintenance, including how to protect the bastion host in a firewall
configuration, how to build proxying and packet filtering firewalls,
and how to configure Internet services to operate with a firewall. Its
appendices include a resource summary, a directory of how to find
firewall toolkits and other security-related tools, and a detailed
summary providing TCP/IP background information.

More than a million computer systems are now connected to the
Internet. Over 100 million email messages are exchanged each day,
along with countless files, documents, and images. For businesses that
are striving to be safe on the Net, "Building Internet Firewalls"
offers a comprehensive guide to the theory and practice of creating
effective firewalls.

About the Authors

D. Brent Chapman is a consultant in the San Francisco Bay Area,
specializing in Internet firewalls. He has designed and built Internet
firewall systems for a wide range of clients, using a variety of
techniques and technologies. He is also the manager of the Firewalls
Internet mailing list.

Elizabeth Zwicky is a senior system administrator at Silicon Graphics
and the president of SAGE (the System Administrators Guild). She has
been involuntarily involved in Internet security since before the
Internet worm.

# # #

Building Internet Firewalls"
By D. Brent Chapman & Elizabeth D. Zwicky
1st Edition September 1995
544 pages, ISBN: 1-56592-124-0, $29.95

------------------------------

From: Stanton McCandlish <mech@EFF.ORG>
Date: Mon, 18 Sep 1995 19:09:29 -0400 (EDT)
Subject: File 3--CIX alternative to InterNIC's registration process.

CIX has put out a white paper on overhauling the domain registration &
routing system of the US portion of Internet. Some of it sounds OK, most
of it does not sound any better than InterNIC's announcement that it'll
start charging for domain names. Some of it's downright strange, and
inspires some concern in me. Particular this section:

**********
Domain registration will be open to anybody but subject to several
restrictions to minimize abuse, i.e., acquisition of trademarked
names. Domains registration will require submittal of a taxpayer
identification number followed by hard copy submittal of company
letterhead and notary certification. Trademark disputes will not be
settled by the CIX but between parties in the appropriate legal forum.
Domain registration will require a one time fee and a yearly
maintenance fee.
**********

That's right. No domains for any entity that is not a corporation with a
letterhead, no domain if you aren't willing to send a bunch of notarized
snail mail, no domain if you are not willing to have your Social Security
Number tied to your domain registration, no domain if you're not a US
citizen with a Soc. Security Number in the first place. All this of course
directly contradicts the opening statement that domain registration is
available to "anybody".

The document says the registration process is "in realtime", whatever
that means. The implication is that it'll be immediate, and faster than
InterNIC. Somehow I have a hard time reconciling this with the
requirement for snailmailed paperwork.

Fortunately, this remains just a proposal.

The full text of this item is at:

CIX Registry Services Strategy White Paper
http://www.cix.org/Reports/registry.html

------------------------------

Date: Tue, 26 Sep 1995 22:38:50 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)

---------- Forwarded message ----------

Update --- Cult Internet Censorship in Norway
=============================================


News Release - 24th September 1995

On Thursday, 21st of September, news broke of another cult attempting
to silence its critics with the closing down of a student's account
at the Univeristy of Bergen, Norway. Within hours, this action had
been reported worldwide and many representations made by e-mail; the
staff responsible at the University have peddled various alternative
stories to those concerned net.citizens who wrote in protest. To set
the story straight and to record his gratitude for the enormous support
he has received, the student at the center of the affair, Mr Jan
Steinar Haugland, has released the following statement:

<beginning of statement>

In the autumn of 1993, when I was a Jehovah's Witness [JW], I met a
fellow Witness at a pub. His name was Kenneth Hostland, and I was
delighted to discover that he was a real Internet expert. I told him
about several JW resources that I had found on the Internet, such as
the "Friends" mailing list.

I had an email account at NHH, the Business School in Bergen, but at
the time the computing department there had closed all Internet access
except email and gopher, believing this would help them avoid viruses.
Kenneth said that since I was a student, I could get a less restricted
account at the University of Bergen (UiB).

The University and the NHH Business School are closely related. NHH
uses the University's computing facilities. If you are matriculated at
NHH, you can study at the University. Because of this close
connection, I decided to accept Kenneth Hostland's kind offer. I
dropped by his office, where he filled out a paper form. I signed it
and I was apparently officially authorized to have an account.

In the spring of 1995, after wrestling with many disturbing questions
about JW doctrine, I came to the conclusion I could no longer be a
Jehovah's Witness. I was finally disfellowshiped (excommunicated) for
not believing the 90-year-old JW teaching about the significance of
the year 1914. Ironically, the very teaching I disagreed with was
recently rejected by the Governing Body of Jehovah's Witnesses. The
doctrinal reversal was announced to the Witnesses this month
(September 1995) in their official publication, the WatchTower.

When you are disfellowshipped, all Jehovah's Witnesses are instructed
to shun you. Their leaders say that you deserve nothing less than
"complete hatred." (Watchtower, 1 Oct 1993, page 18)

My interest in the Witnesses continued, however. From time to time, I
posted material on the Internet that was critical of JW doctrine. I
also posted quotes from old Watchtower publications which demonstrated
a history of failed predictions and doctrinal "adjustments". These
were no doubt embarassing to the Witnesses, who believe that the
Watchtower organization is God's sole channel of information to the
world.

Kenneth Hostland, who was still a loyal Witness, decided to terminate
the account he had set up for me. Even though I was now a student at
the University, and had submitted the proper University paperwork to
secure my access, Hans Morten Kind <kind@edb.uib.no> was instructed to
cancel my account.

When Kenneth Hostland first set up my account, I had no idea that
getting an account through the University was more difficult than the
studies themselves! The procedure was simpler at the NHH Business
School; students automatically got an account. They didn't even have
to ask.

After my account was removed (September 21st, 1995), a number of
concerned individuals spread the news on Usenet groups and other
forums. Those who sent inquiries to the computing department were told
that my objections were "pure nonsense". Mr. Kind and Mr. Hostland
later claimed that this was simply a technical matter, involving the
cleaning up of accounts. Later still, they appealed to rules and
regulations at the University, saying that the account had been set up
improperly.

Their inconsistent and evasive replies to questions about this matter
lead me to only one conclusion: if I had stayed a Jehovah's Witness,
my account would not have been cancelled. I am certain it was removed
because I was critical towards the Watchtower Society, the multi-
billion dollar corporation that uses Jehovah's Witnesses to spread
their gospel.

Most censorship is done without actually breaking any laws. For
example, a newspaper has no legal duty to let all sides of a case be
heard. Yet, if they do not, they practice censorship. This practice
can be dangerous to democracy and freedom of speech, even when it is
technically legal.

The individuals responsible can provide credible excuses for their
actions; they have done nothing illegal. But it is still censorship.
Fortunately, even in cases of "legal" censorship, we all have the
right to protest. Thanks to the global stage of the Internet, I am
able to tell the world: I was taken off the Internet because of my
beliefs.

I believe that what they did is offensive to the Internet community,
where free speech is accorded the highest value. We all know that the
next time, censorship may hit someone who can not obtain another
account.

When you join in the protest directed at these individuals, you
demonstrate that the Internet community cares about censorship. Things
like this may happen again, but perhaps next time, the malicious
system administrator will remember how people rose up in protest, and
decide it isn't worth the trouble.

Mr. Kind is publicly calling me a liar, though it appears that he has
not read a single public statement I have made. He does not cite any
specifics; he simply says I am lying.

Before the protest gathered steam, Mr. Kind supported Mr. Hostland.
Now, however, his replies to protesters (apparently auto-mailed) claim
that my account was illegal from the start. This change of position
indicates that the protest is producing results. But I still do not
have my original account. For justice to be done, I need your support.

My sincerest thanks you to all.

Jan S. Haugland
jansh@telepost.no

<end of statement>

However, the efforts of this cult to silence all dissidence continues
apace. Cult members themselves have been warned in an internal bulletin
this September of the dangers of on-line participation; immediately
following this many loyal cultists dropped out of religion forums on
the major on-line services, web sites were taken off or emptied of
content, and of the two main cult internet mailing lists, one
("friends-chat") was closed down, and the other ("friends-all") began
strict moderation of mail. A classic cult pattern of information control.

Cultists are not, alas, satisfied with self-censorship and a new campaign
has begun to harass postmasters - including the Finnish anon-server
administrator who has been a previous target - and SysOps of on-line
services with the aim of closing down internet accounts of those who dare
to utter a dissident voice in defiance of the supposed God-given authority
of their ruling council in Brooklyn, NY. The postmaster of one of Norway's
independent Internet providers, telepost.no, has resisted the mail-bombing
by cult members in defense of his customers right to free speech - however
there are reports this weekend that ex-cult members on other Internet
service providers may also have had their accounts closed or suspended.

These are independent individuals of limited means and influence, faced
with a multi-billion dollar multinational corporation and millions of
loyal followers taught to shun and hate anyone who dares impede their
business or uncover what they prefer to keep covered-up. Your support is
needed *now* to help protect internet freedoms of speech for *everyone* -
there are many other powerful corporations and governments, ready to
follow up such a trend of repression if the cults are able to do so with
impudence. If the first window is left broken, all the rest will follow.

TowerWatch

-----------------------------------------------------------
"Give me the liberty to know, to utter, and to argue freely according to
conscience, above all liberties" - John Milton
-----------------------------------------------------------

CopyLeft 1995, TowerWatch
<end of press release>

------------------------------

Date: Mon, 18 Sep 1995 14:07:38 -0400 (EDT)
From: John <john@SUG.ORG>
Subject: File 5--COMPUTERS & THE LAW CONFERENCE INFO

SUN USER GROUP
Second Annual Technical Symposium
"Computers & The Law"
November 12-15, 1995
Tampa, FL

As computers are utilized in more and more aspects of everyday life,
the once distinct areas of technology, legislature, and law
enforcement draw closer together. This unique technical conference
provides a forum in which members of these three fields can meet to
share experiences and ideas. The four day technical program (a day of
tutorials, two days of talks, and another day of tutorials) will
provide you with essential knowledge, whether your field is technical,
legal, or law enforcement.

More detailed information of this symposium are available via email at
conference@sug.org or on the World Wide Web at http://sug.org.

If you have further questions, contact the Sun User Group at
(617)232-0514.


+-----------------------------------------------------------------------+
| IMPORTANT DATES TO REMEMBER: |
| Early-bird Savings Deadline: October 13, 1995 |
| Registrations must be received at the Sun User Group offices |
| by October 13, 1995 to be eligible for Early-bird savings |
| |
| Hotel Discount Reservation Deadline: October 21, 1995 |
+-----------------------------------------------------------------------+


CONFERENCE OVERVIEW:

SUNDAY, November 12, 1995 - TUTORIAL PROGRAM
MONDAY, November 13, 1995 - TECHNICAL SESSIONS
TUESDAY, November 14, 1995 - TECHNICAL SESSIONS
WEDNESDAY, November 15, 1995 - TUTORIAL PROGRAM

TUTORIALS:
----------
The SUG Tutorial Program brings experienced training professionals to
you. Courses are presented by skilled teachers who are hands-on
experts in their topic areas. The tutorials will cover a variety of
topics relating to Sun/SPARC and x86-based machines, running any of a
number of operating systems.

Those who attend the tutorials will benefit from this unique
opportunity to develop essential skills in a unique combination of
UNIX system security, ethical, and legal topics.

The tutorial program at Tampa is divided into two days, with both
full- and half-day tutorials offered. Attendees may select any
non-overlapping set of classes. To ensure adequate seating and to
reduce crowding, we are requiring that registrants pre-register for
specific classes. Please note that some prior knowledge is required
for the advanced tutorials.

SUG's tutorial program is always in demand, and some tutorials are
almost guaranteed to sell out before registration closes. Attendance
is limited, and pre-registration is strongly recommended. On-site
registration is possible ONLY if space permits.

Sunday, November 12, 1995 Tutorials
-----------------------------------

S1 - 9:00am-5:00pm
Basics of Unix Security
Peter Galvin, Corporate Technologies, Inc.

S2 - 9:00am-5:00pm
System Administrator Liability
Edward A. Cavazos

Wednesday, November 15, 1995 Tutorials
-----------------------------------

W1 - 9:00am-5:00pm
Firewalls and Internet Security
Rik Farrow, Consultant

W2a - 9:00pm- 12:30pm
Network Intrusions
John Smith, Computer Crime Unit, Santa Clara County District
Attorney's Office

T2b - 1:30pm-5:00pm
Ethics and Systems Administration
S.Lee Henry, Johns Hopkins University


KEYNOTE SPEAKERS:
-----------------

The Sun User Group keynote sessions are topical and informative --
speakers you won't hear at any other conference!

Ken Geide, Chief, FBI Economic Espionage Unit
"Economic Espionage in the USA"
Monday, November 13, 9 a.m. - 10:30 a.m.

Mike Godwin, Staff Counsel, The Electronic Frontier Foundation
Tuesday, November 14, 9 a.m. - 10:30 a.m.

Randal L. Schwartz, Stonhenge Consulting Services
"Just another convicted Perl hacker"
Tuesday, Nov 14, 4:30 p.m. - 5:30 p.m.


TECHNICAL SESSIONS (Monday, November 13 & Tuesday, November 14):
-------------------------------------------------------------------

"Computers & The Law" features three distinct parallel tracks of talks:
Technical; Legal; and Law Enforcement.

The TECHNICAL track will focus on nuts and bolts of
maintaining a UNIX or Sun system. These talks will cover the
all of the newest developments in the changing world
of technology. There are talks from the experts on: UNIX and
network security; encryption; software distribution in a
client/server environment; firewalls.

The LEGAL track will cover up-to-date issues of privacy and
morality, as well as in-depth examinations of the current and
changing laws pertaining to software and hardware. Legal
professionals from all over the country will examine how
changing technologies will necessitate changes in the law.

The LAW ENFORCEMENT track discusses computers as tools. Tools
which can help in the prevention of crimes -- or in the
commission of them. Join or experts in high-tech crime as the
discuss the discovery, investigation, apprehension, and
prosecution of crackers, software pirates, and bandits on the
information on the information superhighway.

SPECIAL FEATURES:

"The Future of Computer Crime, A Panel"

"Unix Security Tools Workshop"
Peter Galvin, Corporate Technologies, Inc.

The Great Debate: Round 2
"Can Existing Laws Be Applied To Cyberspace?"


RECEPTION Sponsored by our friends at SunExpress!
---------
You are invited to join in the fun, mingle with old and new friends,
and enjoy the plentiful hors d'oeuvres and beverages. The Sun User
Group Reception is Monday, November 13, from 6:00-8:00pm at the
Conference hotel. The Reception is included in the technical sessions
registration fee. Additional Reception tickets may be purchased for a
nominal fee at the conference.


THE SUN USER GROUP
------------------
The Sun User Group (SUG) brings people together to share information
and ideas about using Sun/SPARC equipment. You can discover new ways
to save time and money in the pages of _Readme_. You can get quick
answers to important questions on our electronic mailing list. At our
seminars you can learn more about the capabilities of your
workstation. At our conferences, you can meet other people who are
doing progressive and innovative work with their Sun/SPARC equipment.

Now is a better time than ever to join the Sun User Group. We're
reorganized, reinvented and growing every day. We've recently
introduced exciting new services specifically for our official LUGs.
Our members-only electronic mailing list has become one of the most
popular routes on the information highway. Our annual conferences
feature respected teachers - from Sun Microsystems as well as many
other areas of the industry.

REGISTRATION INFORMATION AND FEES
---------------------------------

CONTACT SUG AT office@sug.org FOR A REGISTRATION FORM TODAY!!!

+-------------------------------------------------------------------+
| Sun User Group members save $50.00! |
+-------------------------------------------------------------------+
+-------------------------------------------------------------------+
| Earlybird Bonus! Register before October 13, 1995 and |
| save $100.00 *plus* get the Sun User Group "Security" |
| CD-ROM for FREE -- a $195 savings if you register by |
| October 13, 1995! |
+-------------------------------------------------------------------+


More detailed information of this symposium are available via email at
conference@sug.org or on the World Wide Web at http://sug.org.

If you have further questions, contact the Sun User Group at
(617)232-0514.

For more information please call (617) 232-0514.

SUG Symposium
1330 Beacon Street, Suite 344
Brookline, MA 02146
USA

Email: registration@sug.org Fax: (617) 232-1347

You may also register over the telephone with a Master Card or Visa.

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #7.02
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT