Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 08

  


Computer underground Digest Sun Feb 1, 1998 Volume 10 : Issue 08
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.08 (Sun, Feb 1, 1998)

File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert)
File 2--The EFF Pioneer Awards -1998
File 3--Quad/Graphics v. Sthrn Adirondack Lib System
File 4--National & International Communications Interceptions Networks
File 5--How Big is the Internet Today?
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Mon, 26 Jan 1998 17:43:30 -0500
From: EPIC-News List <epic-news@epic.org>
Subject: File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert)

==============================================================
Volume 5.01 January 26, 1998
--------------------------------------------------------------

Published by the
Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/
=======================================================================
[1] Court Blocks Discharge in Navy/AOL Privacy Case
=======================================================================

A federal judge has enjoined the dismissal of a highly decorated sailor
after finding that the proposed discharge was based upon information the
Navy obtained from America Online in apparent violation of federal
privacy law. The decision, issued today by U.S. District Judge Stanley
Sporkin, concludes that Naval investigators "likely" violated the federal
Electronic Communications Privacy Act (ECPA) when they requested and
received confidential subscriber information from AOL, the nation's
largest online service. (Excerpts from the decision are included below).

Navy officials had ordered the discharge of the sailor, Timothy R.
McVeigh (no relation to the convicted Oklahoma City bomber), on the
ground that McVeigh violated the military's "Don't Ask, Don't Tell"
policy on homosexuality. The Navy's proposed action is based entirely
upon information obtained from AOL linking the sailor to a "screen name"
on the system in which the user's marital status was listed as "gay."

The information was received from AOL in violation of ECPA, which
prohibits the government from obtaining "information pertaining to a
subscriber" without a court order or subpoena. In addition to the
privacy protections contained in ECPA, AOL's contractual "Terms of
Service" prohibit the company from disclosing such information to *any*
third party "unless required to do so by law or legal process."

McVeigh's lawsuit is the first case to challenge governmental access to
sensitive subscriber information maintained by an online service. In a
statement issued when the suit was filed last week, EPIC said, "It is an
important test of federal privacy law that will determine whether
government agents can violate the law with impunity, or whether they will
be held accountable for illegal conduct in cyberspace." EPIC noted that
the incident also raises serious questions concerning the adequacy of
contractual privacy protections like those contained in the AOL
subscriber agreement.

In a letter sent to Navy Secretary John Dalton on January 14, EPIC urged
a postponement of McVeigh's discharge pending an investigation of the
Navy's conduct. EPIC noted that, "Any other result would make a mockery
of federal privacy law and subject the American people to intrusive and
unlawful governmental surveillance."

More information on the case, including a form for sending faxes to the
White House and the Pentagon, is available at:

http://www.hrc.org/mcveigh/

=======================================================================
[2] Excerpts From Court Decision in Navy/AOL Privacy Case
=======================================================================

From the Memorandum Opinion of U.S. District Judge Stanley Sporkin in
McVeigh v. Cohen, et al. (Civil Action 98-116, D.D.C.):

The [investigative] steps taken by the Navy in its "pursuit" of the
Plaintiff were not only unauthorized under its [Don't Ask, Don't Tell]
policy, but likely illegal under the Electronic Communications Privacy
Act of 1986 (ECPA). . . .

The government knew, or should have known, that by turning over the
information without a warrant, AOL was breaking the law. Yet the Navy,
in this case, directly solicited the information anyway. What is most
telling is that the Naval investigator did not identify himself when he
made his request. . . .

In these days of "big brother," where through technology and otherwise
the privacy interests of individuals from all walks of life are being
ignored or marginalized, it is imperative that statutes explicitly
protecting these rights be strictly observed. . . .

Certainly, the public has an inherent interest in the preservation of
privacy rights as advanced by the Plaintiff in this case. With
literally the entire world on the world-wide web, enforcement of the
ECPA is of great concern to those who bare the most personal
information about their lives in private accounts through the Internet.
In this case in particular, where the government may well have violated
a federal statute in its zeal to brand the Plaintiff a homosexual, the
actions of the Navy must be more closely scrutinized by the Court.

=======================================================================
Subscription Information
=======================================================================

The EPIC Alert is a free biweekly publication of the Electronic
Privacy Information Center. To subscribe or unsubscribe, send email
to epic-news@epic.org with the subject: "subscribe" (no quotes) or
"unsubscribe". A Web-based form is available at:

http://www.epic.org/alert/subscribe.html

Back issues are available at:

http://www.epic.org/alert/

------------------------------

Date: Mon, 26 Jan 1998 09:13:00 -0800 (PST)
From: Mike Godwin <mnemonic@well.com>
Subject: File 2--The EFF Pioneer Awards -1998

THE SEVENTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
CALL FOR NOMINATIONS

* Please feel free to redistribute this notice in appropriate forums. *

In every field of human endeavor,there are those dedicated to expanding
knowledge, freedom, efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this, the Electronic Frontier
Foundation established the Pioneer Awards for deserving individuals and
organizations.

The Pioneer Awards are international and nominations are open to all.

In March of 1992, the first EFF Pioneer Awards were given in Washington
D.C. The winners were: Douglas C. Engelbart, Robert Kahn, Jim Warren, Tom
Jennings, and Andrzej Smereczynski. The 1993 Pioneer Award recipients were
Paul Baran, Vinton Cerf, Ward Christensen, Dave Hughes and the USENET
software developers, represented by the software's originators Tom
Truscott and Jim Ellis. The 1994 Pioneer Award winners were Ivan
Sutherland, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr
Roxanne Hiltz, Lee Felsenstein, Bill Atkinson, and the WELL. The 1995
Pioneer Award winners were Philip Zimmermann, Anita Borg, and Willis Ware.
The 1996 Pioneer Award winners were Robert Metcalfe, Peter Neumann,
Shabbir Safdar and Matthew Blaze. The 1997 Pioneer Award winners were Hedy
Lamarr and George Antheil (who won a special award), Marc Rotenberg, and
Johan Helsingius.

The 7th Annual Pioneer Awards will be given in Austin, Texas, at
the 8th Conference on Computers, Freedom, and Privacy in February of 1998.

All valid nominations will be reviewed by a panel of judges chosen
for their knowledge of computer-based communications and the technical,
legal, and social issues involved in computer technology and computer
communications.

There are no specific categories for the Pioneer Awards, but the
following guidelines apply:

1) The nominees must have made a substantial contribution to the
health, growth, accessibility, or freedom of computer-based
communications.

2) The contribution may be technical, social, economic or cultural.

3) Nominations may be of individuals, systems, or organizations in the
private or public sectors.

4) Nominations are open to all, and you may nominate more than one
recipient. You may nominate yourself or your organization.

5) All nominations, to be valid, must contain your reasons, however
brief, for nominating the individual or organization, along with a means of
contacting the nominee, and, ideally, your own contact number. Anonymous
nominations will be allowed, but we prefer to be able to contact the
nominating parties in the event that we need more information..

6) Every person or organization, with the single exception of EFF staff
members, may be nominated for a Pioneer Award.

7) Persons or representatives of organizations receiving a Pioneer Award
will be invited to attend the ceremony at the Foundation's expense.

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email (preferred) to:

pioneer@eff.org

You may fax them to us at:

+1 415 436 9993

Just tell us the name of the nominee, the phone number or email address at
which the nominee can be reached, and, most important, why you feel the
nominee deserves the award. You may attach supporting documentation.
Please include your own name, address, and phone number.

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,

The Electronic Frontier Foundation

-------EFF Pioneer Awards Nomination Form------

Please return to the Electronic Frontier Foundation the following
information about your nominee for the Pioneer Awards:

Nominee's name:

Title:

Company/Organization:

Contact number or email address:

Reason for nomination:

Your name and contact information:

Extra documentation attached:

------------------------------

Subject: File 3--Quad/Graphics v. Sthrn Adirondack Lib System
Date: Sun, 25 Jan 1998 14:34:15 -0600
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)

((MODERATORS' NOTE: Here's the text of the decision reported by a
recent poster regarding a company's attempt to access the user
records of a library to determine who had used the libraries
computers to allegedly access the company's computer resources.))

source: http://www.lcp.com/products/NY/slipops/pay/misc/F9757370.htm

Matter of Quad/Graphics, Inc. v Southern Adirondack Lib. Sys.


IN THE MATTER OF QUAD/GRAPHICS, INC., Petitioner, v. SOUTHERN
ADIRONDACK LIBRARY SYSTEM, Respondent.

Miscellaneous Courts -- 1997 NYSLIPOP 97573

Index No. 97-386


RJI 45-1-97-0189



SUPREME COURT



SARATOGA COUNTY

DECISION

COUNSEL







APPEARANCES:



BOND, SCHOENECK & KING, L. L. P., Albany, for petitioner.



EDWARD LINDNER, Saratoga Springs, for respondent.




_________________________________________________________________



OPINION



MAJORITY







KENIRY, J.:



In a case of first impression, petitioner corporation seeks to compel
pre-litigation disclosure of the names of certain of its employees
whom it suspects have misappropriated corporate computer resources.
Quad Graphics, Inc. is a major national commercial printing company.
Its headquarters is in Wisconsin. It maintains a large plant (1,000
employees) in Saratoga Springs, New York. Petitioner uses computers
extensively in its business. Examination of relatively high
long-distance telephone bills led the corporation to suspect that its
computers were being misused.



The respondent in the case is Southern Adirondack Library System
(SALS). SALS is a cooperative system composed of 30 member libraries
located in four upstate New York counties. Respondent operates, from
its headquarters in Saratoga Springs, New York, an electronic
information service known as "Library Without Walls". Users of
"Library Without Walls" (LWW) possessing a valid library card and a
personal identification number issued by any one of SALS'
participating libraries, may access the "Internet". A library-based
computer or a personally-owned computer can be used to log online.
Access is free for 30 minute periods.



Quad Graphics employees are prohibited from using Quad Graphics
computers for personal purposes. Petitioner's Saratoga computer
terminals do not have the capability of directly accessing outside
telephone lines. However a computer operator in the Saratoga Springs
plant may log into the company's mainframe computer located in
Wisconsin. The terminal user can cause the mainframe by the use of a
Quad Graphics password to access long distance. Then by telephoning
the library in Saratoga Springs and providing a correct library
password the employee-caller accomplishes a hook up with the LWW
(third party) computer network.



Petitioner contends that a cadre of its Saratoga Springs-based
employees employed the library feature during working hours to effect
the hookup and explore the "Internet" for personal purposes.
Petitioner, after examining its long distance telephone billing
records, asserts that unauthorized use between April 1995 and December
1996 has resulted in petitioner incurring over $23,000 in long
distance telephone charges to the "LWW" telephone line and in
petitioner losing 1,770 Saratoga Springs employee manhours in devotion
to personal use of the "Internet". Petitioner, through internal
investigative techniques, has been able to decipher nine distinct
13-digit identification numbers which were used to access "LWW" from
its computer system.



Petitioner, in an effort to learn the identity of the individuals to
whom those nine identification numbers were issued, made a request
under the Freedom of Information Law (Public Officers Law, art.6) to
the Saratoga Springs Public Library for such information. Petitioner's
request was rejected by the library on the basis that such information
is confidential and may not be voluntarily disclosed. [1]



In this application petitioner contends that SALS as a quasi-municipal
agency is subject to and bound by the Freedom of Information Law and
is required to disclose the names it seeks.



SALS contends that under CPLR 4509 the identities are required to be
kept confidential.



Section 4509 of the Civil Practice Law and Rules, first enacted in
1982 (L. 1982, ch. 14) and broadened in 1988 (L. 1988, ch.112),
provides as follows:



Library records, which contain names or other personally identifying
details regarding the users of public, free association, school,
college and university libraries and library systems of this state,
including but not limited to records related to the circulation of
library materials, computer database searches, interlibrary loan
transactions, reference queries, requests for photocopies of library
materials, title reserve requests, or the use of audio-visual
materials, films or records, shall be confidential and shall not be
disclosed except that such records may be disclosed to the extent
necessary for the proper operation of such library and shall be
disclosed upon request or consent of the user or pursuant to subpoena,
court order or where otherwise required by statute.



The court has reviewed the legislative history of CPLR 4509 as
contained in the bill jackets for the original enactment and the
subsequent amendment. The supporting memorandum issued by the Assembly
of the State of New York when the law was enacted, states:



The New York State Legislature has a strong interest in protecting the
right to read and think of the people of this State. The library, as
the unique sanctuary of the widest possible spectrum of ideas, must
protect the confidentiality of its records in order to insure its
readers' right to read anything they wish, free from the fear that
someone might see what they read and use this as a way to intimidate
them. Records must be protected from the self-appointed guardians of
public and private morality and from officials who might overreach
their constitutional prerogatives. Without such protection, there
would be a chilling effect on our library users as inquiring minds
turn away from exploring varied avenues of thought because they fear
the potentiality of others knowing their reading history.



Enactment of '4509 in 1982 was supported by the New York Civil
Liberties Union, the New York Public Library and the New York County
Lawyers' Association. The State Education Department and State
University of New York raised no objection to the bill.



In 1988, the Law Revision Commission of the State of New York, acting
on a request by library staff and faculty of State University of New
York at Buffalo and its Law School, recommended that '4509 be
broadened to protect additional library records. The statute as
originally enacted protected only a library's circulation records. An
amendment enacted in 1988 protected records relating to computer
database searches, interlibrary loan transactions, reference
inquiries, photocopy requests, title reserve requests and audio-visual
materials, films and records usage information. The New York Library
Association, the State Education Department, and the New York Civil
Liberties Union supported broadening '4509's reach.



It is clear that '4509 does not grant an absolute privilege
prohibiting the disclosure of library records. The law is intended to
allow limited disclosure pursuant to court order. A court order is
precisely what petitioner seeks. The salient issue is whether or not
petitioner's expressed desire to learn the identity of individuals who
are alleged to have misused its computer system and misappropriated
its property, in order to initiate civil legal proceedings, is a
proper basis for release of the library system's records.



It is the court's determination that disclosure of the information
sought should not be permitted. Petitioner certainly has an internal
security problem involving the unauthorized use of its computer
equipment and resources. However a criminal complaint is not before
this court and apparently has not been made. Were this application to
be granted, the door would be open to other similar requests made, for
example, by a parent who wishes to learn what a child is reading or
viewing on the "Internet" via "LWW" or by a spouse to learn what type
of information his or her mate is reviewing at the public library.



The court recognizes the significance of the problem that petitioner
faces and the difficulty that petitioner has encountered in trying to
identify the users. The Legislature has expressed, in rather direct
and unequivocal fashion, a public policy that the confidentiality of a
library's records should not be routinely breached and this court, in
denying the petitioner's request, is following the clearly expressed
legislative purpose of CPLR 4509.



One of the petitioner's other arguments deserves brief comment.
Petitioner contends that disclosure of the records sought is required
under '4509 since it, as the owner of the computer equipment and
telephone lines utilized to access the Internet, should be considered
the "user" of "LWW" and thus it is entitled to the information as a
matter of right. The argument is specious. The operation of a computer
is controlled by the person who gives it commands. The users in this
case are the individuals who actually operated the computers guiding
them through the "Internet".



Petitioner's application is denied without costs.

Dated: September 30, 1997, Ballston Spa, New York



Footnotes

Footnote 1: The Saratoga Springs Public Library was originally named
as the respondent in this proceeding. An order, based upon a written
stipulation, was made and entered substituting SALS as respondent
since "LWW" was and is a program of SALS and not of the Saratoga
Springs Public Library.

------------------------------

Date: Tue, 27 Jan 1998 23:18:21 +1100
From: Felipe Rodriquez <felipe@xs4all.nl>
Subject: File 4--National & International Communications Interceptions Networks

I think this may be of interest to this list. This report is not available
electronically, so I typed in the most interesting part. If you are
interested in obtaining a free copy of the report, then refer to the bottom
of this message and use the example-fax that is attached there.


This message is a quote from a report published by the EU Parliament:

AN APPRAISAL OF TECHNOLOGIES OF POLITICAL CONTROL
Published by Scientific and Technological Options Assessment (STOA)
Directorate General for Research
Luxembourg 6 january 1998
Document nr: PE 166 499

"The document is a working document. The current version is being
circulated for consultation. It is not an official publication of STOA or
of the European Parliament. The document does not necessarily represent the
views of the European Parliament."

"4.4 National & International Communications Interceptions Networks

Modern communications systems are virtually transparent to the advanced
interceptions equipment which can be used to listen in. Some systems even
lend themselves to a dual role as a national interceptions network. For
example the message switching system used on digital exchanges like System
X in the UK supports an Integrated Services Digital Network (ISDN)
protocol. This allows digital devices. E.g. fax to share the system with
existing lines. The ISDN subset is defined in their documents as "Signaling
CCITT1-series interface for ISDN access. What is not widely known is that
built in to the international CCITT protocol is the ability to take phones
'off hook' and listen to the conversations occurring near the phone,
without the user being aware that it is happening. (SGR Newsletter,
No.4,1993) This effectively means that a national dial up telephone tapping
capacity is built into these systems from the start. (System X has been
exported to Russia and China) Similarly, the digital technology required to
pinpoint mobile phone users for incoming phone calls, means that all mobile
phone users in a country when activated, are mini-tracking devices, giving
their owners whereabouts at any time and stored in the company's computer
for up to two years. Coupled with System X technology, this is a custom
built mobile track, tail and tap system par excellence. (Sunday telegraph,
2.2.97)

Within Europe, all email, telephone and fax communications are routinely
intercepted by the United States National Security Agency, transferring all
target information from the European mainland via the strategic hub of
London then by satellite to Fort Meade in Maryland via the crucial hub at
Menwith Hill in the North York Moors of the UK. The system was first
uncovered in the 1970's by a group of researchers in the UK (campbell,
1981. The researchers used open sources but where subsequently arrested
under Britain's Official Secrets legislation. The 'ABC' trial that followed
was a critical turning point in researcher's understanding of both of the
technology of political control and how it might be challenged by research
on open sources. (See Aubrey, 1981 & Hooper 1987) Other work on what is now
known as Signals intelligence was undertaken by researchers such as James
Bamford, which uncovered a billion dollar world wide interceptions network,
which he nicknamed the 'Puzzle Palace'. A recent work by Nicky Hager,
Secret Power, (hager 1996) provider the most comprehensive details to date
of a project called ECHELON. Hager interviewed more than 50 people
concerned with intelligence to document a global surveillance system that
stretches around the world to form a targeting system on all of the key
Intelsat satellites used to convey most of the world's satellite phone
calls, internet, email, faxes and telexes. These sites are based at Sugar
grove and Yakima, in the USA, at Waihopai in New Zealand, at Geraldton in
Australia, Hong Kong and Morwenstow in the UK.

The ECHELON system forms part of the UKUSA system but unlike many of the
electronic spy systems developed during the cold war, ECHELON is designed
for primarily non-military targets: governments, organisations and
businesses in virtually every country. The ECHELON system works by
indiscriminately intercepting very large quantities of communications and
then siphoning out what is valuable using artificial intelligence aids like
Memex. To find key words. Five nations share the results with the US as the
senior partner under the UKUSA agreement of 1948, Britain, New Zealand, and
Australia are very much acting as subordinate information sevicers.

Each of the five centres supply "dictionaries" to the other four of
keywords, Phrases, people and places to "tag" and the tagged information
intercept is forwarded straight to the requesting country. Whilst there is
much information gathered about potential terrorists, there is a lot of
economic intelligence, notably intensive monitoring of all the countries
participating in the GA TT negotiations. But Hager found that by far the
main priorities of this system continued to be military and political
intelligence applicable to their wider interests. Hager quotes from a
"highly placed intelligence operatives" who spoke in the Observer in
London. "We feel we can no longer remain silent regarding that which we
regard to be gross malpractice and negligence within the establishment in
which we operate." They gave as examples. GCHQ interception of three
charities, including Amnesty International and Christian Aid. "At any time
GCHQ is able to home in on their communications for a routine target
request," the GCHQ source said. In the case of phone taps the procedure is
known as Mantis. With telexes its called Myfly. By keying in a code
relating to third world aid, the source was able to demonstrate telex
"fixes" on the three organisations. With no system of accountability, it is
difficult to discover what criteria determine who is not a target.

In February, the UK based research publication Statewatch reported that the
EU had secretly agreed to set up an international telephone tapping network
via a secret network of committees established under the "third pillar" of
the Maastricht Treaty covering co-operation on law and order. Key points of
the plan are outlined in a memorandum of understanding signed by EU states
in 1995. (ENFOPOL 112 10037/95 25.10.95) which remains classified.
According to a Guardian report (25.2.97) it reflects concern among European
intelligence agencies that modern technology will prevent them from tapping
private communications. "EU countries it says, should agree on
"international interception standards set at a level that would ensure
encoding or scrambled words can be broken down by government agencies."
Official report say that the EU governments agreed to co-operate closely
with the FBI in Washington. Yet earlier minutes of these meetings suggest
that the original initiative cane from Washington. According to Statewatch,
network and service providers in the EU will be obliged to install
"tappable" systems and to place under surveillance any person or group when
served with an interception order. These plans have never been referred to
any European government for scrutiny, nor one suspects to the Civil Liberty
Committee of the European Parliament, despite the clear civil liberties
issues raised by such an unaccountable system. We are told that the USA,
Australia, Canada, Norway and Hong Kong are ready to sign up. All these bar
Norway are parties to the ECHELON system and it is impossible to determine
if there are not other agendas at work here. Nothing is said about finance
of this system but a report produced by the German government estimates
that the mobile phone part of the package will cost 4 billion D-marks.

Statewatch concludes that "It is the interface of the ECHELON system and
its potential development on phone calls combined with the standardization
of "tappable communications centres and equipment being sponsored by the EU
and the USA which present a truly global threat over which there are no
legal or democratic controls" (press release 25.2.97)"



If you are interested in obtaining a free copy of this report, then
complete this fax and
send it to +32-22-849059



TO: Karin Sercu, STOA Programme
Directorate-General for Research,
Directorate B, Eastman 112,
rue Belliard 97-113, B-1047 Bruxelles, Belgium

Subject-- STOA report 'Technologies of Political Control'


FROM: "YOUR NAME AND ADDRESS HERE"




Dear Ms. Sercu,

I'd like to acquire the STOA Report "AN APPRAISAL OF TECHNOLOGIES OF
POLITICAL CONTROL", document number PE 166 499.


Please please send it to:

"YOUR ADDRESS HERE"



Kind regards,

"YOUR NAME HERE"

------------------------------

Date: Tue, 20 Jan 1998 19:09:35 -0500 (EST)
From: editor@TELECOM-DIGEST.ORG
Subject: File 5--How Big is the Internet Today?

Source - TELECOM Digest Tue, 20 Jan 98, Volume 18 : Issue 16

From--anthony@alphageo.com (Anthony Argyriou)
Date--Tue, 20 Jan 1998 04:15:58 GMT

Following a thread from an irreverent e-mail list story, I discovered
that Bellcore has a website which tracks the size of the Internet.
They're using statistical sampling of the DNS to estimate the number
of internet hosts.

The estimate as I write is 30,096,400 and growing. The site is
http://www.netsizer.com , and you need a Java-enabled browser to see
it. Information about the estimate is at
http://www.netsizer.com/info.html .


Anthony Argyriou
http://www.alphageo.com

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.08
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT