Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 44
Computer underground Digest Tue June 10, 1997 Volume 9 : Issue 44
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.44 (Tue, June 10, 1997)
File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
File 2--NASA Nabs Teen Computer Hacker
File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
File 5--Purpose of CuD
File 6--Re: Germany "cybercops" battle offensive speech, violent games
File 7--RE: Anti-Spam bills....
File 8--Invitation - Interop Security Teleconference
File 9--Beyond Hope "Hackers Conference" '97
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Thu, 29 May 1997 16:49:16 -0500
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
((MODERATORS' NOTE: Following is the introductin to Senator
Murkowski's note, obtained from his homepage))
S. 771
The Unsolicited
Commercial Email
Choice Act of 1997
I introduced S. 771, the Unsolicited Commercial Email Choice Act of
1997, on May 21, 1997 to combat the growing cost to society of
unsolicited bulk electronic mail messages. All Americans including
Alaskans waste time and money having to receive and delete unsolicited
commercial e-mails. Rural Americans pay transmission charges to
receive this unwanted information. While the cost of these
transmission charges may not be extreme, I fail to see why any
American should bear any costs for receiving something they did not
ask for.
Please note that my bill does not ban such emails. Some may oppose
this approach. However, I have no desire to set a precedent of the
government telling you what you can and cannot see in your inbox. My
bill merely provides a means for Internet users to filter out e-mails
that they do not wish to receive by requiring that senders of
unsolicited e-mails to include Advertisement as the first word of the
subject line and that the real street address, e-mail address and a
telephone number be contained within the body of the message. Routing
information that accompanies the message must also be accurate.
Internet users can request that their ISP filter out all such emails
at their request. ISP's can also unilaterally block all such inbound
messages. Consumers who are disappointed with a unilateral blocking
policy of their ISP can always seek another ISP that allows such
messages on its network. Per their ISP policy, Internet users can also
choose to receive such messages and filter them individually by seeing
the Advertisement tag and using the delete key or to stop them
permanently from specific senders by sending a message to that effect
to the original e-mail originating address.
Some have raised the concern that an offshore marketer sending out
junk e-mails would be beyond the reach of these restrictions. It is
certainly true that no bill that Congress passes can reach directly
beyond American territory. This does not mean, however, that S. 771
would not have an impact upon marketers who mass e-mail from overseas.
If the initiator of the message has a meaningful presence in the
United States such as an office, parent company, bank to deposit
funds, etc..., S. 771 would still reach these marketers under what's
generally known as "long arm jurisdiction." I feel that most Americans
would be hesitant to send money overseas to order from an item
advertised in an unsolicited e-mail.
As with most Internet users, I have no personal objection to the
concept of unsolicited commercial e-mails if those who receive them
actually want to receive them. Today, Internet users subscribe to
electronic mailing lists of their own free will and whatever topic
they choose.
The Internet is an excellent tool for commerce though the use of
commercial world wide web sites. However, America should be not be
burdened by unwanted commercial e-mail.
I welcome the Internet community's comments and suggestions on this
bill. Please feel free to make them to me at
commercialemail@murkowski.senate.gov
Signature
------------------------------
Date: Wed, 04 Jun 1997 22:32:06 -0400
From: "Evian S. Sim" <evian@escape.com>
Subject: File 2--NASA Nabs Teen Computer Hacker
.c The Associated Press
Monday, June 2, 1997
WASHINGTON (AP) - A Delaware teen-ager who hacked his way into a
NASA web site on the Internet and left a message berating U.S.
officials is being investigated by federal authorities, agency
officials said Monday.
NASA Inspector General Robert Gross cited the incident - the most
recent example of a computer invasion of a NASA web site - as an
example of how the space agency has become ``vulnerable via the
Internet.''
"We live in an information environment vastly different than 20
years ago," Gross said in a written statement. "Hackers are
increasing in number and in frequency of attack."
In the latest case, the Delaware teen, whose name, age and
hometown were not released, altered the Internet web site for the
Marshall Space Flight Center in Huntsville, Ala., according to
the statement from the computer crimes division of NASA's
Inspector General Office.
"We own you. Oh, what a tangled web we weave, when we practice to
deceive," the teen's message said, adding that the government
systems administrators who manage the site were "extremely
stupid."
The message also encouraged sympathizers of Kevin Mitnick, a
notorious computer hacker, to respond to the site. Mitnick was
indicted last year on charges stemming from a multimillion-dollar
crime wave in cyberspace.
The altered message was noticed by the computer security team in
Huntsville but the NASA statement did not mention how long the
message was available to the public or exactly when it was
discovered. NASA officials weren't made available to answer
questions about the event.
In the statement, NASA called the teen's hacking "a cracking
spree" and said it was stopped May 26 when his personal computer
was seized.
Prosecutors from the U.S. Attorney's office in Delaware and
Alabama are handling the case with NASA's computer crimes
division.
Last March, cyberspace invaders made their way into another NASA
web site and threatened an electronic terrorist attack against
corporate America. The group, which called itself ``H4G1S'' in
one message and ``HAGIS'' in another, also called for some
well-known hackers to be released from jail.
Engineers at the Goddard Space Flight Center in Greenbelt, Md.,
quickly noticed the change and took the page off the Internet
within 30 minutes. NASA officials said the agency installed
electronic security measures designed to prevent a recurrence.
------------------------------
Date: Fri, 6 Jun 1997 19:51:15 -0400
From: Declan McCullagh <declan@well.com>
Subject: File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
Source - fight-censorship@vorlon.mit.edu
((Fwd from Phil Zimmerman))
Last month, Pretty Good Privacy Inc went through a reorganization in
its top management. We were spending too much money, too fast. Tom
Steding was replaced by Phil Dunkelberger as the president of PGP, and
I handed over the chairman title to Jonathan Seybold, who had been, with
me, the original cofounder of the company. Jonathan is devoting his time
to the business side of things, while I am focussing my attention on my
role as chief technology officer.
I have seen some speculation in some usenet newsgroups that these changes
were in some way connected with the fact that PGP was recently sued by RSA
Data Security over some dispute regarding royalties for use of the RSA
patent, which PGP holds a license to. Let me set the record straight
on this. There are sound business reasons why this shuffling of top
management occurred at PGP, and these reasons are known to all of our
employees. The RSA lawsuit against PGP is absolutely not one of the
reasons, not even remotely. I don't think shuffling top management is
a likely reaction for any company to take in response to a lawsuit, even
if the lawsuit had merit, which this one does not. We fully expect the
RSA matter to be resolved in arbitration proceedings, in our favor.
I know that it is common practice for some companies to issue statements
to "spin" the story about certain events, sometimes at the expense of
truth. This makes a lot of people understandably skeptical about such
explanations. I do have responsibilities toward my company, but no
one could get me to deny a truth about the reasons for the restructuring.
The truth is, the restructuring had absolutely nothing at all to do with
the RSA lawsuit.
I would now like to announce that we will be releasing PGP 5.0 in mid-June.
It's in beta release right now on our web page (www.pgp.com). In keeping
with my own dedication to personal freedom and privacy, we will be releasing
a freeware version for noncommercial use through MIT's web site
(web.mit.edu/pgp), just like in the old days before the company was formed.
And we do plan to publish the full PGP source code for Mac, Windows 95,
and Linux.
There are a lot of new exciting features, including automatic key lookups
from remote key servers on the Internet, which will likely result in the
rapid growth of a ready-made nationwide PGP public-key infrastructure,
on an unprecedented scale. We are also encouraging the migration to new
public key algorithms in addition to RSA, namely the NIST Digital
Signature Standard (DSS), as well as Diffie-Hellman (Elgamal) keys.
We expect most of the new users to be using these new algorithms instead
of RSA, in part because they offer new features, better performance, and
better security for the same key sizes. I hope that you will all join me
in this opportunity to move to these new algorithms, allowing everyone to
finally enjoy the use of public key cryptography without the encumberances
of patents.
Philip Zimmermann
Chief Technology Officer, PGP Inc.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQCVAwUBM5WoZWV5hLjHqWbdAQGaxgP/UM+i7Pz38x68zdWVOsTrQVepa+0FUndC
NkvTi5iMTC9up7HJgleXMWuAB00qVB8XlC1/6oSx4Ot+gTecu0wXgNG/l8LXFBAo
YYxlPhR497fvKfnWXATkJ3jQJAQbACHXzh7Wycc1MGq+46o6+CkECrUvUs8//KQT
toJMdfVJEVA=
=ywNo
-----END PGP SIGNATURE-----
------------------------------
Date: Thu, 29 May 1997 20:06:51 -0700 (PDT)
From: jonl@well.com
Subject: File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
FOR IMMEDIATE RELEASE
TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM" CLAIMING
ELECTRONIC TRESPASS AND NUISANCE
Austin, Texas, May 28, 1997: Several Internet leaders in Austin,
Texas filed a lawsuit yesterday afternoon against a company and an
individual believed to be responsible for the mass distribution of
junk mail over the Internet, also called "spam." The suit claims that
C.N. Enterprises and Craig Nowak of San Diego, California, sent
thousands of electronic messages selling information on "Free Cash
Grants" for $19.95. The ad's content was not only misleading, the
lawsuit claims, but the company's e-mail used a false return address,
causing the electronic mail boxes of several Austin residents to
overflow with returned copies of the junk mail.
According to the lawsuit, by using a false return address, those who
send junk mail over the Internet can avoid the anger that results from
this controversial practice. They can also avoid dealing with the
thousands of "bounce" messages that result from sending e-mail to
invalid or outdated addresses. "In effect," the lawsuit alleges,
"C.N. Enterprises deliberately dumped tons of its electronic garbage
and pollution" into the Austin residents' mailboxes. The lawsuit
claims that the use of false return addresses on junk e-mail, and the
resulting fallout on those who own the addresses used, is illegal
under the traditional common law causes of action of nuisance,
trespass and conversion.
The lead plaintiff is Tracy LaQuey Parker, a leading Internet
author, who owns the Internet domain name used by C.N. Enterprises
without her permission. Said Ms. Parker, "As a long-time Internet
advocate, I am saddened that the goodwill spirit of the Internet is
being spoiled by irresponsible individuals who forge their identity in
order to make a quick buck. There are plenty of examples of
legitimate commercial uses of the Internet. This isn't one of them."
Joining Ms. Parker in the lawsuit are her husband Patrick Parker and
Peter Rauch, both Ms. Parker's business partners. Also joining the
suit are Zilker Internet Park, Ms. Parker's Internet service provider,
which had to deal with the flood of messages stemming from the "spam,"
and two active Texas Internet groups, the Texas Internet Service
Providers Association (TISPA), a group of commercial Internet service
providers, and EFF-Austin, a local Internet civil liberties
organization.
John Quarterman, an owner of Zilker Internet Park, stated, "'Spam'
is a large and rapidly growing problem which has cost Zilker Internet
Park and many other ISPs and Internet users much time and money. We
have put many technical blocks in place to limit it. With this
lawsuit, we are taking the next step to help stop this abuse of the
Internet."
TISPA and EFF-Austin joined the lawsuit in an effort to broaden the
legal precedent beyond Ms. Parker's single Internet domain name,
according to Gene Crick, TISPA's president. "Increasingly, 'spammers'
are using false return addresses to avoid taking full responsibility
for the harm caused by their unsolicited commercial e-mail," Crick
said. "These forgeries dump huge volumes of unwanted junk mail onto
Internet companies and their customers. TISPA would like to see the
court grant a broad and clear injunction prohibiting this practice."
The lawsuit was filed on behalf of LaQuey and the others by Pete
Kennedy and Roger Williams of George, Donaldson & Ford, L.L.P. of
Austin. Among its other Internet related cases, the law firm has
been
involved in lawsuits against the United States Secret Service and
Simon Leis, the Hamilton County (Ohio) Sheriff, over the seizure of
private e-mail.
# # #
For more information, contact:
Plaintiffs:
Tracy LaQuey Parker and Patrick Parker, 512-454-7748
John Quarterman, Zilker Internet Park, 512-451-7620
Gene Crick, Texas Internet Service Providers Association (TISPA),
512-303-1021
Jon Lebkowsky, EFF-Austin, 512-444-5175
Law Firm:
Peter Kennedy or Roger Williams
George, Donaldson & Ford, L.L.P., 512-495-1400
Media Contact:
Peggy Hubble or Sondra Williams, MEM/Hubble Communications,
512-480-8961
------------------------------
Date: Wed, 4 Jun 1997 09:19:26 -0700
From: Mike Oar <mike_oar@MENTORG.COM>
Subject: File 5--Purpose of CuD
Dear Editors,
I general, I have enjoyed skimming or reading through CuD. Much
of what is contained in there tends to speak towards the
controversial issues which surround computing and society. Many
good points have been raised and provocative and/or
thought-provoking articles are common. I'm sorry to say though
that I've removed myself from the mailing list due to some brash
and poor-taste articles that you've allowed to be published.
Most recently the article (Cu Digest, #9.42) by Meeks. His
hostile tone and language disgust me and make me wonder that if
such people are the main stream of the "movement" to combat
government control over the internet and information, can such a
battle be won?
You may guess that I tend to draw a middle of the road
perspective on censorship. I believe that participants
(on-liners) need to be more civil than they now are, and that
those that aren't continue to destroy the reputation and ability
of the "real" users to use the information that is/could be out
there.
I also believe that while there's nothing inherently wrong with
annonimity, it is often abused and used to cover up sick and
disgusting acts by those who are simply too cowardly or perverse
to reveal their true identity.
However, I have not found that the majority of your articles are
far off the mark or raise concerns that are not worthy to be
heard. As a whole, I think that the information and service that
CuD provides is good. I take note against articles such as
Meeks' which voice slanderous and degrading feelings or opinions
with the intent of putting down people, not policies. I also do
not feel that his use of language is warranted or needed.
There are real issues to deal with as technology becomes more
readily available to the world. It's no longer the play ground
of the select few who can learn how to program or spend endless
hours on-line. And as this technology and it's uses begin to
demand more information and becomes more intimately a part of our
lives, it begins to become the responsibility of those that
create it to do all that they can to educate the users to it's
proper use. Computers are becomming the tool of non-programmers
(and I think that some programmers find that irksome). The
governments are simply responding (fairly well I think) to
something that they don't understand well but that the public
demands. I think it is our charge as the creators of technology
to promote and insure it's proper use, it's ethical use, and do
all that we can to support actions against using it to hurt
others or to promote illeagal behavior. I would like to see CuD
begin to become more proactive in the fight for the proper use of
current and developing technology. I would like to see CuD
support ethical uses of technology instead of complaining about
cyber-cops doing their best to crack down against child
pornography, etc. True, there are some censorship activities
that are going much too far. But I think that we need to realize
that there are malicious people who choose to use it as a weapon;
we should do what we can to stop that. If you will work to
better edit the articles you publish, and begin to look into the
issues I've state above, pleae let me know as I will want to
resume my readings.
Thank you.
--
*********************************
Mike Oar
Intern, QA Engineer
Mentor Graphics Corp.
------------------------------
Date: Wed, 4 Jun 1997 06:32:52 -0700 (PDT)
From: Elric of Imrryr <elric.of.imrryr@USA.NET>
Subject: File 6--Re: Germany "cybercops" battle offensive speech, violent games
From--Gurney Halleck <gurneyh@ix.netcom.com>
>I guess now any jerkwater police department can become an International
>Cyberspace Policing Unit.
>While they can do what ever they want in their country (I still don't
>like it), I don't see how they get off "policing" the world Internet.
>Do they plan to extradite "criminals" to Germany to face charges there?
>Seems that this police department is over stepping its jurisdiction
>(unless German police is nationalized and has authority to prosecute
>national/international crime a la US FBI, DOJ...)
They could issue a european warrent which could result in your
arrest if you travel to any country in european. An american who
was selling nazi matarial by mail to residents of Germany was
arrested in Denmark at the request of Germany authorities.
The US is supposely considering changes to its laws to allow one
to be prosecuted here for "morals" offenses committed abroad. So
if you violate morals laws in Germany, you could faces charges in
US, especially with hot botton issues like child porn.
Also, they don't need to convict to win. Just having someone
accused can result in that person losing their job and/or being
run out of town. Having to fight an international criminal
charge could drive most people into bankruptcy.
------------------------------
From: rsh@IDIRECT.COM(RSH)
Subject: File 7--RE: Anti-Spam bills....
Date: Mon, 09 Jun 1997 12:01:09 -0400
In Canada and using a .com address, as you can see from the return
address in this message, I too get spams from Cyberpromotions,
etc. and cannot see how either of these bills will enable ME to
stop the spams. There seems to be nothing in either of these
bills that makes it clear that Canadians can avail themselves of
the right to demand removal from the spammer's lists or avail
themselves of the remedy provided re the $500.
Therefore the question: Is it possible for someone NOT in the US
to stop spams from the US using either of these vehicles, should
either pass the Congress?
Bob
R.S. (Bob) Heuman - Willowdale, ON, Canada
===================================================
reply to: <heuman@mtnlake.com> or <rsh@idirect.com>
Copyright retained. My opinions - no one elses...
If this is illegal where you are, do not read it!
------------------------------
Date: Mon, 9 Jun 1997 14:45:12 -0500 (CDT)
From: Samantha Leggat <sleggat@ix.netcom.com>
Subject: File 8--Invitation - Interop Security Teleconference
June 9, 1997
MEDIA ALERT
SOFTBANK Forums to Hold Teleconference
Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
Topic: Security -- Issues, Solutions and Controversies
CONTACT:
Samantha Leggat, Lighthouse Public Relations, (760) 773-4870,
sleggat@ix.netcom.com
WHAT:
SOFTBANK Forums will host a press and analyst teleconference with industry
experts presenting and discussing security issues for enterprise networked
applications and public Internet access and use. SOFTBANK Forums will also
be announcing a new event focusing on these issues, the Interop Security
Symposium, to be held in conjunction with NetWorld+Interop 97 Atlanta,
October 6-10, 1997.
WHERE:
Teleconference dial-in: 1-800-260-0712
Reference conference subject "Interop Security Teleconference"
WHEN:
Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
WHO:
SOFTBANK Forums Interop Security Symposium program committee members will
present information on security issues and answer questions:
Frederick M. Avolio, Vice President of Technology, Trusted Information
Systems Inc. (TIS)
Michael Millikin, Senior Vice President of Worldwide Content, Interop,
SOFTBANK Forums
David M. Piscitello, President, Core Competence, Inc., and Program
Committee member, NetWorld+Interop
Marcus J. Ranum, CEO of Network Flight Recorder, Inc. and Chief Scientist,
V-One Corporation
BACKGROUND INFORMATION
Significant milestones will be crossed in the field of Internet and
networked applications security in the coming year. Security and
communications vendors are expected to announce the availability of
products that will satisfy several of the most sought-after and urgently
needed security requirements for secure networking, including: strong
authentication for core Internet applications (e.g., DNS), new methods for
defending intranets and extranets against intrusion, hardware-based
cryptographic protection of data in modems and remote access servers, new
techniques affording stronger authentication for remote and roaming access
to enterprise networks over the public Internet, data confidentiality
through the use of encryption of Internet Protocol payloads, data
confidentiality for NOS protocols through the use of encrypted tunnels
through the public Internet, and alternatives for digital key management,
escrow and recovery.
Many of these features will be based on de facto Internet standards, and
others will be based on innovative or bleeding edge technology. With these
issues come certain controversial problems, such as restrictions and
control, and the controversy should not be dismissed as being of concern to
academics and security professionals only. During this teleconference,
industry experts will discuss the subject of security and some of the
issues involved in securing networks, and answer questions regarding the
controversies involved.
The Interop Security Symposium is a new Interop event, officially being
announced June 17, to be held conjunction with NetWorld+Interop 97 Atlanta,
October 6-10, 1997. In addition to the sessions and presentations in the
Interop Security Symposium, there will be a hands-on, educational Security
Hot Spot demonstration on the NetWorld+Interop interactive show floor,
emphasizing authentication systems, encryption, access controls and
auditing systems.
The teleconference is open to press and analysts, and time will be allotted
for questions from the teleconference audience.
Samantha Leggat
Lighthouse Public Relations
281 Strada Fortuna
Palm Desert, CA 92260
Tel: 760/773-4870
Fax: 760/773-4821
Email: sleggat@ix.netcom.com
------------------------------
Date: Tue, 3 Jun 1997 01:26:56 -0400 (EDT)
From: Emmanuel Goldstein <emmanuel@2600.COM>
Subject: File 9--Beyond Hope "Hackers Conference" '97
*** B E Y O N D H O P E ***
the sequel to
H A C K E R S O N P L A N E T E A R T H !
=====================================================================
* A G l o b a l H a c k i n g E x p e r i e n c e *
* A u g u s t 8 , 9 , 1 0 , 1 9 9 7 *
* N e w Y o r k C i t y *
---------------------------------------------------------------------
It's time for the inevitable - the sequel to 1994's Hackers On Planet Earth
conference. If you missed that event, you'll feel even worse if you miss this
one! Don't let that happen. Beyond Hope will be everything HOPE was and
probably a lot more.
SPEAKERS/PANELS
So far we're lining up people for panels on social engineering, encryption,
surveillance, PCS/GSM technology, legal issues, hacker ex-prisoners, "pirate"
radio, the media, boxing, and a whole lot more. Our biggest worry at this
point is figuring out how to fit it all into three days. If you have ideas,
contact us using the methods below.
THE NETWORK
Even though we only had a 28.8 link to the outside world at the 1994 HOPE,
we still had a lot of fun networking all our computers together. This time
things will be different. Our link to the net will be faster than ever - at
the very least a T1 - and we will also be experimenting with video links to
the Hacking In Progress (HIP) conference going on in Holland. Plus we'll have
an amazing internal network of old and new machines. Bring your computer and
whatever toys you have! As in 1994, all attendees will get an account on
our hope.net machine. Valuable prizes will be awarded to those who
hack root.
LOGISTICS
It all takes place starting Friday evening, August 8th, running until Sunday
night, August 10th at the Puck Building in New York City, on the corner
of Houston and Lafayette Streets. The main part of the conference begins at
noon on Saturday, with registration starting at 10 am. However, you will also
be able to register Friday evening beginning at 6 pm and help us set up the
network for the weekend. There will be a special 2600 meeting beginning
at 5 pm on Friday at the Citicorp Center, located at 53rd and Lexington.
To get to the conference from the meeting, take the #6 train downtown to
Bleecker Street. Follow the signs and portents. ** NOTE: There will also
be a TAP reunion at Eddie's on Waverly and Mercer - if you were part of the
old TAP crowd, keep checking our web site (www.hope.net) for specifics! **
THE NEIGHBORHOOD
The Puck Building is in one of the liveliest sections of Manhattan, next to
Greenwich Village, Chinatown, Little Italy, and SoHo within easy walking
distance of Bleecker Street, Broadway, Avenue A, and St. Mark's Place. We
will have a full guide of places and Hope-related activities on our web site
and at the conference.
TRAVEL
There are many cheap ways to get to New York City in August but you may want
to start looking now, especially if you're coming from overseas. Travel
agencies will help you for free. Also, look in various magazines like
Time Out, Village Voice, local alternative weeklies, and travel sections of
newspapers. Buses, trains, and carpools are great alternatives to domestic
flights. Keep in touch with the update sites for more information as it
comes in.
GETTING TO THE SITE
From the airports: From all three airports (Kennedy, LaGuardia, Newark) you
can either take a cab or bus to the city - from Kennedy you can take a free
bus to the subway and take the A train into Manhattan for $1.50. To get to
the Puck Building in this manner, take the A train to West 4th in Manhattan
and transfer to a Brooklyn bound B, D, F, or Q for one stop to
Broadway/Lafayette. If you take a bus, see the directions below from the
Port Authority.
By car: We'll assume you can find New York City on your own. Once you're
actually over the bridge or through the tunnel, head for Houston Street,
just south of 1st Street. The conference takes place on the southeast corner
of Houston and Lafayette. There are parking garages in the neighborhood and
many nearby streets allow free parking from Friday evening through the weekend.
By train: From Penn Station, take the A train downtown to West 4th, transfer
to a Brooklyn bound B, D, F, or Q for one stop to Broadway/Lafayette. From
Grand Central, take the #6 subway downtown to Bleecker Street.
By bus: From the Port Authority Bus Terminal, take the A train downtown to
West 4th, transfer to a Brooklyn bound B,D, F, or Q for one stop to
Broadway/Lafayette.
WHERE TO STAY
The Puck Building is not a hotel, which we believe will make the conference
itself a lot more interesting. We will be compiling a list of places to stay
in the city, ranging in price from $40 a night on up. So far, we suggest the
following: the YMCA at 215 W 23rd Street between 7th and 8th Avenues
(212-741-9226) - rooms start at $40 and there are no age restrictions;
Off Soho Suites Hotel on 11 Rivington Street. This hotel is only a couple of
blocks away from the Puck Building and you can get European style suites,
complete with kitchens, for a low price. A suite for 2 is $89, for 4 it's
$149. They also have a location on East 12th Street off 3rd Avenue. Both of
these hotels don't have a huge number of rooms so we suggest making
reservations early (212-979-9808); Howard Johnson on 429 Park Avenue South
between 29th and 30th Streets (212-532-4860) - rooms start at around $100
a night; and Holiday Inn at 132 Lafayette Street (212-966-8898) - rooms are
around the $150 level. There are also youth hostels, bed and breakfasts,
and hundreds of other hotels in the city. This is only a preliminary list -
check with us for more details as the conference draws closer. You should
make reservations no closer than three weeks prior to the conference.
Remember, the cost of a room is lessened significantly if you split it with
other people. Bring sleeping bags to increase your flexibility.
WHAT WE NEED
Ideas, people, computers, technology of all sorts.
HOW TO STAY UPDATED
There are many ways to keep updated as preparations get underway. We will be
posting updates on our office phone line - (516) 751-2600 - as well as
the 2600 voice BBS - (516) 473-2626. The official Beyond Hope website can be
reached at www.hope.net and updates will also be found on the 2600 website at
www.2600.com. On the websites you'll find details on how to be part of the
Beyond Hope mailing lists. Email info@hope.net for the latest information,
travel@hope.net for cheap fares and advisories, tech@hope.net for technical
questions and suggestions, speakers@hope.net for anyone interested in
speaking at the conference, and vol@hope.net for those of you who want to
volunteer to help. On usenet, read alt.2600.hope.announce for the latest
announcements, alt.2600.hope.d for an ongoing discussion about the
conference, and alt.2600.hope.tech for technical setup discussion.
REGISTRATION
The cost for pre-registration is $20 for the weekend. While we hope to keep
the cost at $20 for those who register at the conference, we may wind up
filling the place up (capacity is only around 2,000 after all) and, in that
event, pre-registrants will have priority. So send us $20, your name and
address, and we'll send you a pass that will get you in without a hassle or
a wait. Make checks payable to 2600. The address is Beyond Hope,
c/o 2600 Magazine, PO Box 848, Middle Island, NY 11953. Don't send us
anything after July 15, 1997 to ensure that your pass is received in time.
Special Offer: FREE ADMISSION for anyone coming to Beyond Hope from
overseas with a foreign passport. North Americans not eligible.
NAME: _____________________________________________________________________
ADDRESS: __________________________________________________________________
CITY, STATE, ZIP, COUNTRY: ________________________________________________
PHONE (optional): ________________ email (optional): ______________________
IMPORTANT: If you're interested in participating in other ways or
volunteering assistance, please give us those details in addition.
So we can have a better idea of how big the network will be, please
let us know what, if any, computer equipment you plan on bringing.
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.44
************************************