Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 17

  


Computer underground Digest Sun Mar 8, 1998 Volume 10 : Issue 17
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.17 (Sun, Mar 8, 1998)

File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98)
File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98)
File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98)
File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES *
File 5-- In Re - European Parliment STOA Program
File 6--"USAG Reno pushes for computer security" (infoworld fwd)
File 7--"Computers, Freedom, Privacy"
File 8--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Thu, 5 Mar 1998 06:42:45 -0800 (PST)
From: "Robert J. Woodhead (AnimEigo)" <trebor@ANIMEIGO.COM>
Subject: File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98)

>The question is, why should we have to work to get around Brian Milburn's
>censorship, (or should I say Focus on the Family, to think I used to be
>intimately involved with them?)? You and I may be able to create an
>application that could send CyberSitter every URL listed on Yahoo, but the
>average parent can't and doesn't want to. The average parent should be able
>to pick and choose what is blocked -- if they choose to block anything. As
>usual, in this type of debate, the fact that a child who is supervised
>while using the Internet by their parent has the best "filter" of all
>installed is never mentioned.

As to pick-n-choose, I agree. Insofar as censorware has a use, it should
be parent-configurable - with the current settings readable by the user.
The problem isn't so much with the idea of censorware, but the current
implementations - and the current implementors (!)

So, if you really want to piss off Bruce Milburn, write a totally
configurable censorware product, and make it freeware, with a "Prejudice
Construction Kit" that lets every nutgroup in the world build a module that
eradicates their particular infidels from their kids view of the internet.

Then, of course, spam the net to announce it ;^)

Finally, consider that the *publication* of CyberSitter's settings (as
reverse engineered) would be illuminating.

>No offense to anyone else out there, but it is beginning to seem -- with
>this filterware debate -- that I spend more time supervising my dog, Lady
>Joyous of Shasta, CD (Golden Retriever, the 'CD' means 'companion dog' and
>is a result of winning obedience trials), than they do supervising their
>kids.

Intelligent parents (of which I am hopefully one, with computer-literate
but not yet surfing kids) tend to view censorware as a first-cut "spam" (or
"scum") filter. Anyone who has kids know they are a 24-7 proposition, and
an exhausting one at that. Labor saving devices are seized upon, so that
the time can be spent on hopefully more important parenting tasks.

I personally would want one that blocked spelling and grammar errors, so
that my kids aren't corrupted by bad writing. Of course, this would mean
they couldn't visit their daddy's pages...

>This all seems like too much work. The persons who are able to do this,
>won't want to take the time to do it, because they won't buy into Milburn's
>tripe and the others, well, unfortunately, they will probably buy his tripe
>and be none the wiser. By the way, I am still not convinced that breaking
>the weak encryption on CyberSitter's software for your own information
>would be illegal, either criminally or tortiously.

Maybe not, but I doubt Mr. Milburn will agree with your legal analysis.
Lawsuits are so pesky, so why not simply be more elegant?

(that rustling sound is Bruce Milburn checking his clickwrap agreement to
see if he's got that base covered...)

------------------------------

Date: Thu, 5 Mar 1998 12:15:26 -0500 (EST)
From: "Bill Michaelson" <bill@COSI.COM>
Subject: File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98)

> >Regarding the various censorware programs... everyone seems to be
> >making the assumption that parents _do_ have the right to censor
> >what their children see. But is this truly the case, in ethics if
> >not in law?

It's not strictly the case, as you have ably pointed out.

BTW, I'm not one of "everyone", although I agree that most people seem to
accept as a basic premise that children should be shielded from certain
types of information. We who believe otherwise are in a very tiny minority.

I suppose this doctrine is firmly embedded in our culture, with
movie rating schemes and similar filtering/censoring devices all
around. It's practically apostasy to suggest that children can
handle any information with proper guidance. But having been a child
who was allowed access to any type of information, I find this
censorship quite repugnant.

It is comforting to me to believe that we are very concerned with child
welfare, but I am cynical because of the many who apparently trot
out the child welfare issue as justification for their political agendas.

I think children are far more resilient than we give them credit
for being. We only stunt their intellectual growth when we withhold
information (of any kind) from them. And when some claim that children
are not "ready" for information, it is really the *adults* who are not
ready or willing to discuss the issues with their children.

> If I don't have the right to control and monitor the information my
> children receive, than who does? The guvmint? No one?

Controlling and monitoring are distinct activities. I heartily approve
of monitoring (and editorializing upon) the information children receive.
I do not approve of controlling it to the extent that any information
is excluded.

Regardless, I would give you the right to do both with your children,
just so that I could live in peace with you. I wouldn't necessarily
approve, and we might clash at the school board meeting occasionally.

In the end, I suppose my child would then have a competitive advantage
over yours.

> >We do not allow parents to keep their children from getting an
> >education. We do not allow this even though that education can lead
> >to those children learning things that will cause them to disagree
> >with their parents.
>
> Parents do not have the right to keep their children from an education
> but with things like the PTA and school board meetings we do have some
> control on the content of that education.

And the PTA and the school board, et al, battle it out, and the kids are
taught the resulting curriculum over some parents' objections. That
was the original poster's point.

> > We do not allow this even though that education
> >can lead to those children learning things that will shock them -
> >such as about war.
>
> War is a fact and cannot be hidden, however are you going to show photos
> of Aushwitz to a 3rd grade class or pictures of liberated villages whose
> people are glad that some one stood up to fight when it was necessary.

Is that how you choose to introduce the concept of war to children? Show
them the glory before you show them the horror? I'm getting a fresh
perspective on why war has persisted through the ages.

> Showing a little child pictures of horror will not end wars

Not by itself it won't.

> in the future but it will frighted, shock, and disturb him. Is this
> the way we want our small children to feel?

Yes. That is exactly how I want our small children to feel about war.
Frightened, shocked and confused. That's how I feel about war. What
about you?

> I don't and will do everything I can to
> block such sights from them until I think they're ready.

"Ready", how? Ready to accept such sights unemotionally?

Interesting to me that you use Aushwitz and third grade as an example.
That's when I first learned about the Holocaust. I was about 7 or 8 years
old when I pulled a history book off my aunt's shelf while looking for
entertainment and found graphic descriptions of what man does to man in the
photos of liberated Nazi concentration camps. Yeah, I was disturbed and
confused. It was the weirdest shit I'd ever seen, and it took me years
to digest it. But I was old enough to go seeking information in history
books, so I found history, in a dosage exactly proportional to my
perceptual abilities at the time. Later, when I heard about this
guy called Hitler, it really meant something to me.

I disagree with the notion that showing a child pictures of horror will
not end war. It will require a lot of factors to end war, but at the
core of our motivation will be a visceral revulsion of it. Short of
first-hand experience (which would be self-defeating), how are people
to acquire such revulsion through sanitized presentations at only
"appropriate" times?

Through a picture is the best way for a child to see a war, and it should
be seen, as early as possible, as far as I'm concerned. A child can
then contrast it with the reality of the decent civilized community within
which (hopefully) they live. They need to see the possibilities while
they're young and it will make the most lasting impression. This is
important stuff to learn while young.

> Violence is a fact of life but it is my job as a parent to protect my
> children from violence as long as I can. I fail to see how teaching

So protect them from violence. Don't "protect" them from knowledge.

> self-defence to an eight year old can protect them from violence from an
> adult. I must and do teach my kids what they can do in a bad situation,
> but I also try to teach them that in many instances violence is not as
> ubiquitious as the media portrays. I don't hide the fact of violence and
> hate from them but if I left it up to them to learn on their own, would
> they not learn that it is unavoidable, everyone is evil, and they can do
> nothing to escape it? Wouldn't it be more traumatic for my kids to live
> paranoid and afraid? Because of the sensational nature of the really
> heinous crimes, might they not think they are more prevelant then they
> actually are? Of course I'm going to keep some of this from my kids
> until I, no one else, decide that they are ready to handle it.

So you are seeking a sense of balance in how media portrays life for your
child. That's sensible. Supervise and mediate, advise and consult. Help
them think critically. Don't let them live in a fantasy world shaped by
television and video games. You sound like a concerned, well-meaning and
loving parent.

But don't prohibit them from learning about ANYTHING. You can't stop it,
and if you try, you'll lose some of their trust. They're very smart, and
if you think you are keeping information from them, then it's almost
certain that THEY are or will be keeping information from YOU. Believe it.

> >Yes, as a previous poster said, a 10-year-old searching for
> >information under "American Girl" may see things that will remain
> >with that child for the rest of his or her life. But there is no
> >evidence that this harms the child; there are a _lot_ of things that
> >remain with people throughout their lives. Parents have the
> >opportunity to do a lot of things that have this characteristic;
> >should they be able to shut children off from others doing the same,
> >if no harm is done to the child?
>
> Maybe this stuff will do no permanent harm but they can be confusing to
> a child without the maturity to handle it. The little folks have enough

That's how maturity is acquired.

> problems living in the big folks world as it is. So I will keep things
> from my kids that I don't think they are ready for.

Like the military draft was something my mother thought I wasn't ready
to handle at the tender age of 18, I'm sure.

Events march on, and you can't stop them.

You're not helping the kids. I suspect that it is you who are not ready
to face these issues with your kids. It's tough to explain to a child why
someone would hang a person from their skull on a meathook. In fact, I
don't really know how to explain it, or whether it merits explanation so
much as it calls for introspection. But if you have kids, you're stuck with
this sort of problem, if you accept the responsibility. Your kids will
know when you are hiding something, or are too squeamish to talk to them
about it. That does not foster trust. Get over it before the gulf gets wide.

> It boils down to a matter of values, not the PC "Family Values" that are
> being touted but the values that I've learned over the years and have
> put into my own life. I will try to instill those values in my children
> until such time as they are ready to develop their own. And I will do it
> by "censorship" if I think that is the way it should be done.

You lead by example. Regardless of your motives, the value you are
instilling is to control people by limiting their access to information.
Perhaps they will learn this lesson well, and use it on you. Watch out
for the teen years.

But that's your privilege. Keep your kids off the 'net until you think
they're "ready". Or supervise them. But don't surrender your parental
responsibilities to someone else with their own social agenda, like a
censorware software maker.

I'm willing to pay the school tax for your kids, and to subsidize your
extra tax write-offs. No problem. But don't ask me to pay the cost of
your parenting responsibilities with my freedom of speech, or the freedom
to seek information of *any* sort. Don't lend support to cockamamie rating
systems that will sterilize the 'net.

I don't mind too much if some parents choose to keep their kids ignorant,
but not anyone else's, and certainly not the world at large.

------------------------------

Date: Thu, 5 Mar 1998 20:56:07 +0000
From: Name-Withheld <XXX@XXX.DEMON.CO.UK>
Subject: File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98)

>If serious net disruption does occur, for whatever reason, it is critically
>important to observe certain common-sense protocols in the use of phone and
>fax numbers. Effective anarchic communications require a certain finesse
>and forethought.

It's worth pointing that the UK, only, has a system by which the
telephone system could be "pulled" in time of crisis. This has been
publicised in various books by Duncan Campbell, but OTOH it is one
of the things which under the voluntary censorship system papers
and broadcasters have agreed not to mention. Exchanges have
"telephone preference" which can be switched to three (all numbers),
two (political and military numbers in time of civil crisis), or
one (military only in the run up to a war threatening the home
territory). The supposed justification is that people making extra
panic calls in time of crisis would jam the system for priority
callers. Not that they may be supporting the general strike, or
protesting the coming war, of course. Though actually using it
would bring its existence to widespread notice, and probably cause
more panic than it cured! Still, it is hard to make contingency
plans against interefrence with communications in a country
that repressive.

------------------------------

Date: Thu, 5 Mar 1998 23:11:36 PST
From: shadow@KRYPTON.RAIN.COM(Leonard Erickson)
Subject: File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES *

In Cu Digest, #10.16, Wed 4 Mar 98, "Richard K. Moore" <rkmoore@iol.ie>
writes:

> The next step is to contact those people NOW - while you still can
> conveniently - and exchange with them your phone numbers, fax numbers, and
> postal addresses. You might even go so far as to make preliminary
> arrangements for "phone-tree" or "photocopy-tree" protocols for
> distributing information, but most of us probably won't get around to that,
> life being what it is. The important thing is to have the necessary data
> on hand well in advance of need.

I suggest checking out Fidonet. Unlike the Internet, Fidonet is *based*
on a "phone directory" (the nodelist) that permits *direct* exchange of
email and files between sites. It also has some elementary security
provisions, such as pre-arranged session passwords.

If a system attempts to connect to my node (1:105/51) and claims to be
a node I have a session passwortd with, it has to include the proper
password in the session handshake. Failure to do so will get the
connection rejected.

Denial of service requires attack dialing my node's phone number, which
is easily reported to the telephone company, who will cheerfully nail
any non-government entity doing such a thing.

Also, I can simply hook my hardware up to a different phone line and
poll the nodes that I expect mail from.

While Fidonet can learn (and has!) a lot from the Internet, I think we
have some features that the Internet could stand to adopt. (e.g. we
*explicitly* make sites responsible for content entering the network
from them. "Spam" doesn't happen except via spoofing non-passworded
links.)

------------------------------

Date: Thu, 05 Mar 1998 14:14:21 +0100
From: Gisle Hannemyr <gisle@hannemyr.no>
Subject: File 5-- In Re - European Parliment STOA Program

In a recent edition of Computer underground Digest (#10.08, Sun,
Feb 1, 1998) Felipe Rodriquez <felipe@xs4all.nl> reported on
a recent working paper for the European Parliement STOA
Programme (File 4--National & International Communications
Interceptions Networks).

The working paper "AN APPRAISAL OF TECHNOLOGIES OF POLITICAL
CONTROL" by Steve Wright of the Momega Foundation, Manchester,
is now available from several wev locations, e.g.

http://www.telepolis.de/tp/deutsch/inhalt/te/1393/anchor1.html

As a survey of various techonologies that may be used of political
control, the report is well worth reading.

But read (as most media have) as a piece of journalism, reporting
on current affairs, I find it less trustworthy. In that
context, it suffers from Wright's inability to distinguish
speculation from fact, and from his limited understanding of
technology and telecommunications infrastructure. These problems,
for example, becomes appearent in his treatment of Project ECHELON,
which Wright introduces thusly;

"a global surveillance system that stretches around the
world to form a targeting system on all of the key
Intelsat satellites used to convey most of the world's
satellite phone calls, internet, email, faxes and
telexes" [Wright, 1998]

Unfortunately (or fortunately) this paints a picture of the
world's telecommunication infrastructure that is at least
ten years out of date. Today most of the world's phone calls,
Internet traffic, email, faxes and telexes are _not_ carried
by satelite, but by copper cables and optical fibres, and is
therefore _not_ vulnerable to the surveillance techniques
attributed to Project ECHELON, which was based upon erecting
listening stations within the telecom.-satelites "footprint"
and picking unencrypted data out of the ether.

I have no reason to doubt that such a thing as Project ECHELON
existed and maybe still even exists, but from a privacy point
of view, it is now only of historical interests. Newspapers all
over the globe covering Wrights paper seems to focus on Project
ECHELON as a _current_ privacy problem. If it works as described
in Wright's paper, this is simply not the case.

Further, Wright's reading of his sources seems in places a bit
sloppy in places. For instance, in the quote above, Wright
includes telephony in what is monitored by ECHELON. As his
source for information on Project Echelon he lists the book
"Secret Power" by New Zealand based peace activist Nicky
Hager. That book, however, states that:

"Echelon is used only to intercept written communications:
fax, e-mail, and telex." [Hager, 1996]

which is much more believable. A key element in ECHELON seems
to be automatic monitoring of communication streams by looking
for certain keywords (known as "NSA-fodder" in hacker lore).
While this is technically feasable to do this with text based
communication streams, I know of no technology that with
even moderate reliability can recognize more than a handful
of keywords fed with continious speech in real-time from an
un-cooperative and unknown speaker.


References:

Nicky Hager:
Secret Power -- New Zealand's Role in the International
Spy Network; Craig Potton Publishing, 1996
<http://www.fas.org/irp/eprint/sp/>
Steve Wright:
An Appraisal of Technologies of Political Control; European
Parliament, The STOA Programme, 1998

------------------------------

Date: Sat, 7 Mar 1998 22:24:54 -0800 (PST)
From: Jim Thomas <jthomas@WELL.COM>
Subject: File 6--"USAG Reno pushes for computer security" (infoworld fwd)

By Torsten Busse
InfoWorld Electric

Posted at 3:07 PM PT, Mar 5, 1998
U.S. Attorney General Janet Reno has announced an interagency effort
to track and analyze electronic threats to the nation's critical
infrastructures, such as communications, transportation, and energy
networks.

The new National Infrastructure Protection Center (NIPC), headed by
Associate Deputy Attorney General Michael Vatis, will include the
Computer Investigations and Infrastructure Threat Assessment Center of
the U.S. Federal Bureau of Investigation, and will add real-time
intrusion-detection capabilities for cyberattacks directed at various
national, electronic infrastructures.

"Our telecommunications systems are more vulnerable than ever before
as we rely on technology more than ever before," Reno said.

The NIPC will coordinate the efforts of a number of government
agencies in setting up and operating defenses against cyberspace
intrusions from both inside and outside the borders of the United
States. Effective defense will depend on that cooperation, Reno said.

Reno will ask the U.S. Congress to commit $64 million for the NIPC in
fiscal year 1999, a sum that will allow the establishment of six
additional computer investigation centers in U.S. cities.

<snip>

------------------------------

Date: Tue, 24 Feb 1998 12:03:06
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 7--"Computers, Freedom, Privacy"

Islands in the Clickstream:
Computers, Freedom, and Privacy


A conference on computers, freedom, and privacy might be the last
place one expects to find the deepest expressions of the quest
for meaning in our lives, yet there it was, all over the place.
So was evidence of new possibilities for what I call the human-
computer symbiot, that new kind of community generated by our
symbiotic relationship to our electronic sensory extensions and
intelligent networks.

The choices we make now as we take the reins of our own evolution
more securely in our hands -- with fear and trembling at the
perilous task before us -- will determine the kind of world we
bequeath to our children.

The quest for meaning would not be an issue if our lives were
obviously meaningful. Every foreground is defined by a
background. The threat of meaninglessness posed by an entropic
universe headed toward heat death makes us ask if the evolution
of complexity of form and consciousness is evidence of
consciousness that is the source as well as the goal of evolution
-- or merely something that happened to happen. Either way, the
existential choices are the same, and the fact that they exist is
the definition of freedom.

The battle for freedom is not being fought in wars far from home
but in the policies and decisions we make personally and
professionally about how we will live in a wired world. If those
decisions are conscious, deliberate, and grounded in our real
values and commitments, we will build communities on-line and off
that are open, evolving, and free. If we are manipulated into
fearing fear more than the loss of our own power and
possibilities, then our communities will be constricted, rigidly
controlled, over-determined.

Privacy is key to these choices.

There is no such thing as a guaranteed private conversation any
more. We used to be able to walk out behind a tree and know we
could not be overheard. Now the information that is broadcast by
everything we say and do is universally available for cross-
referencing and mining for hidden patterns. Those patterns, as
Solveig Singleton of the Cato Institute observed, are in the eye
of the beholder, determined by their needs and ultimate
intentions -- an eye that half-creates and half-perceives, as
Wordsworth said, constructing reality in accordance with its
wishes and deepest beliefs.

What we deeply believe, and how we allow others and our
intentional communities to reinforce our beliefs and values,
determines our actions and commitments. The choices we make
downstream will emerge upstream when the river widens.

In a conversation with a career intelligence officer about the
actions of various US agencies, I made this appeal: "There is a
cry for justice in a child's heart," I suggested, "that is eroded
over time by the way we sometimes have to live. Yet the day comes
when we look at what we have done with our lives and its
relationship to that cry for compassion."

He disagreed. "I long ago set aside the sentiments of my
childhood religion," he said....

In order to do the things he had to do.

And the growing sophistication of technologies of torture, that
enable governments to leave fewer marks, fewer clear memories in
the minds of victims?

"A sign of growing sensitivity to world opinion," he said. "At
least they're moving in the right direction."

How we do hear that cry for compassion, when the foggy weather in
our own minds works to obscure it? Would it help, I asked Patrick
Ball of the American Association for the Advancement of Science,
to have audio clips on the web of what happens in those
interrogation rooms?

"No," he said with conviction. "The descriptions I've read are
sufficiently graphic."

What I cannot represent in words is the look in his eyes as his
brain did a quick sort of the hundreds of detailed torture
scenarios he had studied. Nor can I say how the face of that
intelligence professional went suddenly wooden and his eyes
looked away as he remembered what he had done as part of his job.

How wide do we draw the circle? A Department of Justice attorney
arguing for weak encryption stopped at the border. Catching
criminals inside America is his sole priority, so he wants a back
door into every electronic conversation in the world. Ball draws
a wider circle, including those in Guatemala, Ethiopia, or Turkey
who might be alive if they had had a possibility of engaging in a
private conversation. Ball favors strong encryption as a way to
support human rights worldwide.

Our knowledge of "how things really work" pushes the conversation
further. Seldom have intelligence agents told me they worry about
abuse of the information they gather. They trust the system.

"We abide by the law," said a CIA professional. He added that
even the NSA can not intercept conversations inside our borders.

They don't have to, said another. Our special friends in New
Zealand or Canada listen to American traffic as we listen to
theirs. Good friends, he added, help one another.

So ... granted that we live in a real world in which data
gathered for one purpose finds its way into other nets, in which
anything that has value will be bought and sold ... what are the
limits we can place on the inordinate desires in the human heart
to be in control, to know more than we have a right to know? How
can technology serve the need for secure boundaries that
guarantee citizens of a civil society the freedom they need?
Knowing what human beings do to one another, how can we constrain
our baser desires and make it less likely that they will
determine policy and behavior?

Conferences like CFP generate more questions than answers. But as
long as the questions are raised, we maintain the margin between
necessity and possibility that defines human freedom.

That margin may be narrowing, but so long as it exists, our
passion for freedom, justice, and compassion can still manifest
itself in action as well as words.









**********************************************************************

Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.

Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.

To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.

Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.

Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.

ThiemeWorks on the Web: http://www.thiemeworks.com

ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.17
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT