home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 4, 1998 Volume 10 : Issue 16
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.16 (Wed, Mar 4, 1998)
-
- File 1--Renewed Federal and State attempts to censor Internet
- File 2--In re CyberSitter (CuD 10.14)
- File 3--Article by Allen Smith
- File 4--"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E.
- File 5--cj#781> *ALERT* Internet Vulnerability * COUNTERMEASURES *
- File 6--1998-02-04 Executive Order on Year 2000 Conversion (fwd)
- File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 13 Feb 1998 18:19:02 -0500 (EST)
- From: owner-cyber-liberties@aclu.org
- Subject: File *&*--Renewed Federal and State attempts to censor Internet
-
- Source - ACLU Cyber-Liberties Update
- February 16, 1998
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Internet Censorship Legislation Takes Center Stage Again in Senate
-
- Acting less than a year after the Supreme Court delivered a passionate
- defense of free
- speech on the Internet in Reno v. ACLU, a Senate committee held a
- hearing on .Internet indecency. this week where Senators John McCain
- (R-AZ) and Dan Coats (R-IN) called for support for two bills that seek
- to regulate content and control access to sensitive or controversial
- information on the Internet.
-
- Commerce Committee Chairman McCain formally introduced legislation on
- Monday that would require schools and libraries to block "indecent"
- Internet sites or lose federal funds for online programs. In defending
- his proposal, McCain said that people should .give up. some of their
- civil liberties to prevent the dissemination of .harmful. material on
- the Net.
-
- Senator Coats, who sponsored the ill-fated Communications Decency Act
- that was held unconstitutional last year, also called for support on a
- bill he introduced in November that would punish commercial online
- distributors of material deemed "harmful to minors" with up to six
- months in jail and a $50,000 fine.
-
- The ACLU said that, if adopted, both bills would almost certainly face a
- court challenge and would likely face the same fate as the
- Communications Decency Act, which was unanimously overturned by the
- Supreme Court last June.
-
- In a letter to members of the Commerce Committee, ACLU Legislative
- Counsel Gregory T. Nojeim said that the ACLU recognizes the "deeply felt
- concerns of many parents about the potential abuse of information on the
- Internet."
-
- But, he said, the ACLU strongly believes that individual Internet users
- must be given the right to access information and parents should not
- abdicate responsibility to the government for determining which
- information their children can see.
-
- Under the Coats proposal, which was introduced last November, criminal
- penalties could be leveled against "distributors," a designation that
- could include the virtual bookstore amazon.com or a promotional site for
- a Hollywood movie, as well as Internet Service Providers such as
- Microsoft and America Online. And unlike the CDA, the Coats statute
- would apply only to web sites, not to chat rooms, e-mail or news groups.
-
- The new McCain legislation threatens speech in a completely different
- way by cutting off federal funds to schools that do not implement
- restrictive Internet access policies. Such a plan, the ACLU said, would
- mean that teachers could not assign Internet research on subjects such
- as female genital mutilation or the history of the Roe v. Wade abortion
- rights case -- information that is typically blocked when filters are
- installed, and that is otherwise available on the shelves of school and
- public libraries.
-
- The ACLU, along with other members of the Internet Free Expression
- Alliance, (IFEA), which the ACLU co-founded, also submitted letters
- objecting to online censorship efforts. Letters by Feminists for Free
- Expression, Electronic Frontier Foundation, Electronic Privacy
- Information Center (EPIC) and the National Coalition Against Censorship
- are available online at the IFEA home page, at <http://www.ifea.net>
-
- The ACLU and IFEA plan to fight the passage of both the McCain and Coats
- bills.
-
- The ACLU's letter to the Commerce Committee can be found at:
- <http://www.aclu.org/congress/lg021098b.html>
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- New Mexico, Illinois, Rhode Island, Tennessee Consider Broad State
- Internet Regulations
-
- Despite the Supreme Court ruling in Reno v. ACLU, which granted the
- highest level of First Amendment protection to the Internet, states are
- busy crafting online censorship laws. At least 13 states have passed
- laws since 1995, and several others are considering such bills.
-
- Some particularly troublesome state legislation include recently
- introduced bills in Tennessee, Rhode Island, New Mexico, and Illinois.
- The bills are briefly described below:
-
- Tennessee:
- HB 3353, SB 3329, introduced 2/5/98. Calls on the US Congress to create
- a .domain code. for .adult oriented sites,. to facilitate users,
- Internet Service Providers and software developers to .manage the
- problem of uncontrolled access to obscenity, child pornography and other
- adult oriented materials via the Internet.. The bill also includes the
- following:
-
- requires the creation of rules governing use of state computers and
- sanctions for misuses;
-
- requires public schools and libraries that operate computers with
- Internet access to use software to block material, including,
- pornography, obscentiy and other material .harmful to minors;.
-
- imposes criminal liability on librarians, teachers, or any other
- administrator who knowingly fails to comply with restrictions;
-
- makes Internet Service Providers (ISPs) that provide services to
- Tennessee residents criminally liable for any distribution, including by
- third parties, of any harmful material.
-
- Rhode Island:
- GA Bill 11-9-21, introduced 1/98. Criminalizes the use of computers for
- .immoral and illegal purposes. involving children. .Every person who,
- by means of computer, knowingly compiles, enters, transmits, makes,
- prints, publishes, reproduces, causes, allows, buys, sells, receives,
- exchanges, or disseminates any notice, statement, advertisement, or
- minor.s name... for the purposes engaging, facilitating, encouraging,
- offering, or soliciting unlawful, sexual conduct and/or any felony or
- misdemeanor shall be guilty of a felony..... (emphasis added)
-
- New Mexico:
- Senate Bill to amend 30-37-1, introduced 1/98. Criminalizes the
- transmission of .indecent material. to minors and requires the use of a
- .mechanism such as labeling, segregation or other means that enables the
- indecent material to be automatically blocked or screened by software or
- other capability reasonably available....
-
- Illinois:
- HB 2558, introduced 1/27/98. Criminalizes the transmission of .harmful
- material. to minors.
-
- For more information about other state measures to regulate the
- Internet, read the ACLU guide to online censorship in the states,
- .Speech in America, ACLU in Brief,. available by calling
- 1-800-775-ACLU.
-
- ==============
- About Cyber-Liberties Update:
-
- ACLU Cyber-Liberties Update Editor:
- A. Cassidy Sehgal (csehgal@aclu.org)
- American Civil Liberties Union
- National Office 125 Broad Street,
- New York, New York 10004
-
- The Update is a bi-weekly e-zine on cyber-liberties cases and
- controversies at the state and federal level. Questions or comments
- about the Update should be sent to Cassidy Sehgal at csehgal@aclu.org.
- Past issues are archived at
- <http://www.aclu.org/issues/cyber/updates.html>
-
- To subscribe to the ACLU Cyber-Liberties Update, send a message to
- majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
- message. To terminate your subscription, send a message to
- majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
-
- ------------------------------
-
- Date: Fri, 27 Feb 1998 20:15:00 -0700
- From: Doc Holiday <Doc_Holliday@AWWWSOME.COM>
- Subject: File *&*--In re CyberSitter (CuD 10.14)
-
- >From--"Robert J. Woodhead (AnimEigo)" <trebor@ANIMEIGO.COM>
- >Subject--File 3--Hacking Cybersitter (Cu Digest, #10.12, Wed 18 Feb 98)
- >
- >>Date--Tue, 17 Feb 98 15:04 EST
- >>From-- Michael Gersten <michael@STB.INFO.COM>
- >>Subject--File 5--Re--Cu Digest, #10.11, More on CyberSitter
- >>
- >>Programs like cybersitter, however, do not work that way. You cannot
- >>tell ahead of time what they will block; often there is no way to
- >>tell that your site is blocked. Although they claim to do it to
- >>protect children from "unsuitable" material, that definition is
- >>arbitrary, and often includes web pages that oppose such software,
- >>or in some cases, any page hosted on the same site as one "unsuitable"
- >>page.
- >
- >I've never played with cybersitter or similar programs, but it should be
- >relatively trivial to write a program that emulates a browser and sends,
- >say, every URL on Yahoo (it is trivial to write a spider to collect these)
- >through the censorware, to determine what they are blocking.
-
- The question is, why should we have to work to get around Brian Milburn's
- censorship, (or should I say Focus on the Family, to think I used to be
- intimately involved with them?)? You and I may be able to create an
- application that could send CyberSitter every URL listed on Yahoo, but the
- average parent can't and doesn't want to. The average parent should be able
- to pick and choose what is blocked -- if they choose to block anything. As
- usual, in this type of debate, the fact that a child who is supervised
- while using the Internet by their parent has the best "filter" of all
- installed is never mentioned.
-
- No offense to anyone else out there, but it is beginning to seem -- with
- this filterware debate -- that I spend more time supervising my dog, Lady
- Joyous of Shasta, CD (Golden Retriever, the 'CD' means 'companion dog' and
- is a result of winning obedience trials), than they do supervising their
- kids.
-
- >
- >Similarly, it would be trivial to build a site that returns pages with
- >subsets of every word in a large dictionary, so one could binary-chop and
- >determine what words are red-flagged.
- >
- >The beauty of such a hack, of course, would be that one would not be
- >cracking their encryption or hacking their program, but merely asking it to
- >do what it was designed to do, and noting the responses.
-
- This all seems like too much work. The persons who are able to do this,
- won't want to take the time to do it, because they won't buy into Milburn's
- tripe and the others, well, unfortunately, they will probably buy his tripe
- and be none the wiser. By the way, I am still not convinced that breaking
- the weak encryption on CyberSitter's software for your own information
- would be illegal, either criminally or tortiously.
-
- ------------------------------
-
- Date: Wed, 25 Feb 1998 14:19:00 -0700
- From: "Moore, Mike W" <MooreMW@LOUISVILLE.STORTEK.COM>
- Subject: File *&*--Article by Allen Smith
-
- I have been a reader of CuD for a few years now and have occaisionally
- felt an urge to respond but never stronger than when I read this
- article:
-
- Date--Thu, 19 Feb 1998 23:07:31 -0500
- From--Allen Smith <easmith@beatrice.rutgers.edu>
-
- >Regarding the various censorware programs... everyone seems to be
- >making the assumption that parents _do_ have the right to censor
- >what their children see. But is this truly the case, in ethics if
- >not in law?
-
- If I don't have the right to control and monitor the information my
- children receive, than who does? The guvmint? No one?
-
- >We do not allow parents to keep their children from getting an
- >education. We do not allow this even though that education can lead
- >to those children learning things that will cause them to disagree
- >with their parents.
-
- Parents do not have the right to keep their children from an education
- but with things like the PTA and school board meetings we do have some
- control on the content of that education.
-
- > We do not allow this even though that education
- >can lead to those children learning things that will shock them -
- >such as about war.
-
- War is a fact and cannot be hidden, however are you going to show photos
- of Aushwitz to a 3rd grade class or pictures of liberated villages whose
- people are glad that some one stood up to fight when it was necessary.
- Showing a little child pictures of horror will not end wars in the
- future but it will frighted, shock, and disturb him. Is this the way we
- want our small children to feel? I don't and will do everything I can to
- block such sights from them until I think they're ready.
-
- <snipped lot pertaining to blocking software and examples>
-
- >The same is true of other controversial topics, such as ones
- >regarding violence. While there is some evidence (and much evidence
- >against it) that viewing violence results in increased aggression,
- >whether this is a problem depends on in what situations and against
- >whom that aggression emerges.
-
- Violence is a fact of life but it is my job as a parent to protect my
- children from violence as long as I can. I fail to see how teaching
- self-defence to an eight year old can protect them from violence from an
- adult. I must and do teach my kids what they can do in a bad situation,
- but I also try to teach them that in many instances violence is not as
- ubiquitious as the media portrays. I don't hide the fact of violence and
- hate from them but if I left it up to them to learn on their own, would
- they not learn that it is unavoidable, everyone is evil, and they can do
- nothing to escape it? Wouldn't it be more traumatic for my kids to live
- paranoid and afraid? Because of the sensational nature of the really
- heinous crimes, might they not think they are more prevelant then they
- actually are? Of course I'm going to keep some of this from my kids
- until I, no one else, decide that they are ready to handle it.
-
- >Yes, as a previous poster said, a 10-year-old searching for
- >information under "American Girl" may see things that will remain
- >with that child for the rest of his or her life. But there is no
- >evidence that this harms the child; there are a _lot_ of things that
- >remain with people throughout their lives. Parents have the
- >opportunity to do a lot of things that have this characteristic;
- >should they be able to shut children off from others doing the same,
- >if no harm is done to the child?
-
- Maybe this stuff will do no permanent harm but they can be confusing to
- a child without the maturity to handle it. The little folks have enough
- problems living in the big folks world as it is. So I will keep things
- from my kids that I don't think they are ready for.
-
- It boils down to a matter of values, not the PC "Family Values" that are
- being touted but the values that I've learned over the years and have
- put into my own life. I will try to instill those values in my children
- until such time as they are ready to develop their own. And I will do it
- by "censorship" if I think that is the way it should be done.
-
- ------------------------------
-
- Date: Fri, 20 Feb 1998 08:28:41 -0800
- From: <rslade@sprint.ca>
- To: slade@victoria.tc.ca
- Subject: File *&*--"Internet Besieged: Countering Cyberspace Scofflaws", Dorothy
- E.
-
- BKINBSGD.RVW 971120
-
- "Internet Besieged: Countering Cyberspace Scofflaws", Dorothy E.
- Denning/Peter J. Denning, 1998, 0-201-30820-7
- %A Dorothy E. Denning denning@cs.georgetown.edu
- %A Peter J. Denning
- %C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8
- %D 1998
- %G 0-201-30820-7
- %I Addison-Wesley Publishing Co.
- %O 416-447-5101 fax: 416-443-0948 800-822-6339 617-944-3700
- %O Fax: (617) 944-7273 bkexpress@aw.com
- %P 547 p.
- %T "Internet Besieged: Countering Cyberspace Scofflaws"
-
- As with the earlier "Computers Under Attack" (cf. BKDENING.RVW), this
- book is a collection of papers related to the titular topic. This
- text is not just an updating of the earlier work, although some of the
- same papers appear, having been revised and updated. It is also more
- narrowly focussed, with sections discussing the worldwide network,
- Internet security, cryptography, secure electronic commerce, and
- finally dealing with law, policy, and education. The anthology style
- is well suited to a constantly changing and still emergent field.
-
- Under the scope of the worldwide network, there is an initial review
- of the history of the net by Peter Denning. Dorothy Denning follows
- up with an overview of system security breaking methods over networks.
- (While it is a fine and readable piece of work, the essay is not quite
- as riveting as the interview with a system cracker in "Computer Under
- Attack.") As usual, the most interesting papers deal with real case
- studies, such as the attack on Rome Labs. Peter Neumann's brief piece
- on the RISKS-FORUM archives indicates the value that the net can be in
- protecting itself, since RISKS acts as a kind of repository memory of
- attacks and weaknesses. The even briefer article on securing the
- information infrastructure is a kind of call to arms to pay attention
- to security in important control systems. Part one is finished off
- with Eugene Spafford's computer virus paper; by now the classic short
- work in the field.
-
- Part two, specifically looking at Internet security, starts with
- another case study; that of the Berferd attack on Bell Labs. This is
- followed by an overview of network security threats and protective
- tools. Two articles look at specific types of assaults: "sniffing",
- which works because of the broadcast nature of many means of media
- access, and "spoofing", which works because of the automatic
- configuration and repair protocols intended to provide reliability.
- An overview of password use looks primarily at technologies to make
- password cracking more difficult. Four security tools are introduced,
- a GPS (Global Positioning System) based authentication scheme,
- Tripwire, DIDS (Distributed Intrusion Detection System), and SATAN
- (Security Administrator Tool for Analyzing Networks). Java security
- also gets a thorough examination.
-
- The section on cryptography starts with the development of the Data
- Encryption Standard. (It is indicative of the rate of change in this
- field that the following article, looking at the breaking of two
- recent cryptographic systems, doesn't cover the cracking of DES. The
- book was published just before that happened.) There is a detailed
- essay on the Internet Privacy Enhanced Mail (PEM) protocol, and a more
- conceptual paper on authentication for distributed networks. There is
- also a taxonomy, or method of classifying, for key recovery encryption
- systems.
-
- Security of electronic commerce covers electronic commerce itself,
- atomicity in electronic commerce (which determines the general
- usefulness of a system), another overview of Internet security
- vulnerabilities, digital forms of money and cash, ad identify misuse
- and fraud.
-
- The final part looks at social issues. The law enforcement in
- cyberspace address, coming as it does from a US federal agency, is
- unsurprising in its call for key escrow. Dorothy Denning follows up
- with a more reasoned review of the market forces. Bruce Sterling gets
- two cracks at computers and privacy. Eugene Spafford gets the hardest
- job--looking at computer ethics--and does a decent and practical job.
- There are two examples of use policies from universities, and a final,
- very interesting, article on the inclusion of data security topics and
- activities in the teaching of computer science concepts (rather than
- the other way around).
-
- Even within this limited frame of reference, the book cannot be
- exhaustive. When you start to consider the gaps that are missing,
- like the international nature of many activities that make them
- essentially immune to legal remedies, you also find that whole fronts
- of the Internet siege are unmentioned, or only tangentially referred
- to. Spam, fraudulent scams, and chain letters claim many more victims
- than do system crackers.
-
- Still, this work is both interesting and valuable. It should be of
- particular use to the student or teacher of data security, although
- there is much to hold the attention of any interested individual.
-
- copyright Robert M. Slade, 1997 BKINBSGD.RVW 971120
-
- ------------------------------
-
- Date: Mon, 23 Feb 1998 21:22:15 GMT
- From: "Richard K. Moore" <rkmoore@iol.ie>
- Subject: File *&*--cj#781> *ALERT* Internet Vulnerability * COUNTERMEASURES *
-
- Dear netizens,
-
- Are you fully aware of how extremely fragile and vulnerable are Internet
- infrastructures such as this list? Did you know that any Internet server
- (eg, "@sun.soci.niu.edu" or "@cpsr.org" or "@weber.ucsd.edu") can be taken
- off the air at any time with no warning by a "mailbomb" attack? ...that
- your personal email address and web site can be incapacitated in the same
- way? ...and that there is no effective way to prevent such an attack nor
- to defend against it? Did you know such an attack can be conveniently
- mounted by any sizable group of people who have an ideological axe to
- grind, or by a smaller group with only minimal software support (to
- automatically generate thousands of pseudo messages)?
-
-
- ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
- ~-=-=-=-=-=-=~THE DANGER IS REAL~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
-
- A successful attack of this kind was carried out last Summer against IGC
- (Insitute for Global Communications), and IGC was promptly forced to close
- down a Basque-related web site that a Spanish citizens' group had deemed to
- be objectionable. Phil Agre (RRE news service) published the first
- announcemnt of the event that came to my attention:
-
- ~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
- | Date--Thu, 17 Jul 1997 15:34:17 -0700 (PDT)
- | From--Maureen Mason <mmason@igc.apc.org>
- | Subject--IGC censored by mailbombers
- |
- | Hi Phil,
- |
- | [...]
- |
- | We host a site (http://www.igc.org/ehj) for a US group supporting Basque
- | independence in Spain and France, and have gotten protest letters over the
- | past 4 months saying that the site "suppports terrorism" because a section
- | of it contains material on ETA, an armed group somewhat like the IRA in
- | Northern Ireland, at http://www.igc.org/ehj/html/eta.html (the rest of the
- | site includes material on human rights, politics, other Basque
- | independence groups and hyperlinks to site with opposing views).
- |
- | But now the protest--fueled by ETA's kidnapping and killing of a
- | Spanish politician this month--has turned into a serious
- | "mailbombing" campaign against that is threatening to bring our
- | servers to a halt. We are also getting hundreds of legitimate
- | protest messages, which we can handle. What is damaging us is
- | thousands of anonymous hits to our mail servers from hundreds of
- | different mail relays, with bogus return addresses; there's not
- | much we can do about these short of blocking access from hundreds
- | of mail servers as new sources of mailbombings appear.
- |
- | Our other email users (we have 13,000 members) are having their
- | mail tied up or can't reach it, and our support lines are tied
- | up with people who can't access their mail.
- | -=-=-=-=-=-=~-<snip>-~=-=-=-=-=-=-
- |
- ~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
-
-
- Shortly after this posting, IGC (a "progressive" non-profit
- service-provider) submitted to the demands of the attack and took down the
- Basque-independence site. The mailbombing then ceased.
-
- The attack was not only successful, but it was very selective (a surgical
- strike on IGC) - there was no general disruption of the net, minimal
- collateral opposition was generated, and media and officaldom simply
- ignored the episode (as far as I know). If it had been an attack on some
- corporate-operated server, and it had disrupted financial transactions, one
- could well imagine headlines about "net terrorism" and perhaps prompt
- legislation to "crack down" on "excessive" net freedoms. (Notice how we
- lose either way if such attacks become more prevelant.)
-
-
- ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
- -=-=-=-=-=-=~WHY YOU SHOULD BE CONCERENED~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=~
-
- Is this something we need to be concerned with?
-
- I suggest that it is; I will explain why; and I will recommend some simple
- counter measures - cheap "fire insurance" if you will - that should be
- promptly implemented by anyone who wants to retain some ability to "stay in
- touch" in the event of determined mailbombing campaigns (or net-attacks of
- any description).
-
- Fast forward to "-=~COUNTER MEASURES~=-" if you're already sufficietly
- "conerned" and want to skip to the chase.
-
- The means by which serious, but selective, net disruption could be brought
- about should be clear at this point... here's a fully plausible scenario:
-
- -=-=-=-=-=-=~-~=-=-=-=-=-=-
- Imagine that a group of the Christian-Coalition genre were to
- make an issue of the fact that many "liberal" servers and web-sites on
- the net support discusson of abortion, gay liberation, revolution,
- pornography, and socialism. We've seen how even murder (of abortion
- doctors) has been a result of fundamentalist fervor - is there any
- reason to assume that a mail-bomb attack on "liberal God-denying net
- servers" would be considered "out of bounds" as a tactic to "stop the
- anti-christ" and slow the further erosion of "family values"?
- -=-=-=-=-=-=~-~=-=-=-=-=-=-
-
- Substitute your own scenario if you prefer, but I hope it's clear that only
- _intention_ stands between us and the loss of our networking. If some
- activist group - on their own or via encouragement and support of "others"
- - takes it in their head to bring an end to widespread progressive
- networking, they can do it. And if legal remedies are attempted, it is
- difficult to imagine anything effective coming out of Washington (or the UK
- or Germany or etc) that wouldn't do us more harm than good. My first
- recommendation (:>) is to knock on wood and say "God willing" each time you
- dial in to the net.
-
- So the means and the danger are clear, and have been established by
- precedent. The remaining question is:
- Do we have any reason to expect that such an attack will in fact be
- mounted?
-
- Here is one person's view, received this morning over the wsn list:
-
- ~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
- | Date--Mon, 23 Feb 1998
- | From--<name suppressed>
- | To: WORLD SYSTEMS NETWORK <wsn@csf.colorado.edu>
- | Subject--The REAL WAR yet to come
- |
- | This Iraq/US stand off business is just international snow ball
- | fights.
- |
- | Get this, the US says they want Iraq to honour UN decisions but
- | says in the same breath "we (the USA) will not honour UN
- | decisions. The Americans fall for that ?
- |
- | The REAL WAR will come when the USA will be attacked by
- | people of conscience from the ground through the Internet. The
- | US Govt will subversively attempt to close down or disturb internet
- | comunications to disrupt ground swells. The only interests the US
- | has is oil ! Fuelled by the Oil Companies. Think about it. This
- | GREAT Technologically advanced nation is not a nation of
- | electronic vehicles in the late 1990's. Amateur futurists like myself
- | could have predicted this scenario in 1960. I think it is time that
- | the world citizens of this planet set the record straight.
- |
- | Be prepared however for disconnection through the Internet !
- |
- ~=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=~
-
-
- The Oil Theory re/ Iraq is a bit simplistic, but the Effective Progressive
- Activism Scenario is one to take very seriously. There hasn't been a
- "real" protest movement during the Internet era, not one within an
- order-of-magnitude of, say, the sixties movements. If such a movement were
- to arise, if it were to create political discomfort for those in power, and
- if the net were being used effectively for coordination and news
- distribution (eg, worldwide distribution of videos of 'blacked out' protest
- events) - then it would not be at all surprising if counter-measures were
- undertaken.
-
- In such an event, various governments might simply close down servers,
- under some kind of conspiracy or riot-act charges. Or a "spontaneous"
- attack of the variety described above could be covertly encouraged and
- supported. The choice would be "theirs", and the tactics could be selected
- on the basis of PR-effect & political expediency. And the targets wouldn't
- just be extremist groups, they'd be the whole progressive communications
- infrastructure. At least that's what would make obvious Machivellian sense
- in such a scenario: nip problems in the bud, as it were.
-
- As the US persists in its determination to deploy new weapons systems
- against Iraq, and as global opposition grows and generalizes to the
- sanctions as well, we could be on the very verge of a political movement
- significant enough to show up on Washington's early-warning radar. If the
- net is doing its part in such a movement - as many of us are endeavoring to
- encourage - we should not be surprised by a bud-nipping reactionary
- response, in some adequately disguised or rhetorically justified form.
-
- If not Iraq, then the MAI And National Sovereignty, or Disgust With
- Corporate Political Domination, or, if we get our act together, All Of The
- Above. Corporate globalization has had easy sailing for too long, and has
- made too many enemies - an energetic opposition movement is only a
- spark-in-dry-grass away, by the estimate of this observer.
-
- You may think Internet is Unsinkable, but even the Titanic had _some_
- lifeboats; I suggest we don't steam unprepared into uncertain waters.
-
-
- ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
- -=-=-=-=-=-=~COUNTER MEASURES~=-=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
-
- What countermeasures are available to us?
-
- The goal of countermeasures, I suggest, should be to facilitate
- communication-by-other means among people and groups who have come to
- depend on Internet in their political and educational activity. Obviously
- alternative communication means would be less effective than the net, but
- in time of emergency _some_ connectivity will be preferable to total
- isolation (ie: dependence on mass media for information).
-
- My recommendation is to identify who your "key net contacts" are - people
- whose presence you take for granted in your net communications, people you
- are collaborating with, people who provide you with important information,
- people who are likely to be in touch with others in an emergency situation.
-
- The next step is to contact those people NOW - while you still can
- conveniently - and exchange with them your phone numbers, fax numbers, and
- postal addresses. You might even go so far as to make preliminary
- arrangements for "phone-tree" or "photocopy-tree" protocols for
- distributing information, but most of us probably won't get around to that,
- life being what it is. The important thing is to have the necessary data
- on hand well in advance of need.
-
- If serious net disruption does occur, for whatever reason, it is critically
- important to observe certain common-sense protocols in the use of phone and
- fax numbers. Effective anarchic communications require a certain finesse
- and forethought.
-
- For example, if you're a member of somone's email list (eg, cyberjournal)
- you SHOULD NOT send faxes to the moderator such as: "Please tell me what's
- going on, I'm curious". That would jam up communications, and would lead
- people to disconnect their fax machines. Only contact "information source"
- people if you have important information that needs to be shared, or if you
- want to volunteer to be an "echo node" - to redistribute information to
- others. Other than that you should use your fax bandwidth to build up a
- "peer" network and then try to connect as a group with wider neworking
- efforts.
-
- Much of our technology would continue to serve us: we could still use our
- email software (Eudora or whatever) to create and manage our messages, but
- we'd fax them to lists of recipients or we'd print them - for posting on
- physical bulletin boards and kiosks or for copying and distributing.
-
-
- ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
- -=-=-=-=-=-=~A REQUEST~=-=- re: NOW -=-=-=-=-=-=~=-=-=-=-=-=-=-=-=-=-=~
-
- I hereby invite those of you with whom I reguarly correspond, or who would
- like to be on an emergency information-distribution network, to please send
- me whatever contact details you'd like to make available. Don't expect
- accompanying comments to b
-
- ------------------------------
-
- Date: Thu, 19 Feb 1998 14:19:55 -0600
- From: garbled@in.transit.by.net.demons
- Subject: File *&*--1998-02-04 Executive Order on Year 2000 Conversion (fwd)
-
- ((MODERATORS' NOTE: The address of the poster who contributed the
- following forward was lost in transit. But, thanks for the humor
- anyway)).
- (A humor alert for the parody challenged):
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- THE WHITE HOUSE
-
- Office of the Press Secretary
- ________________________________________________________________________
- For Immediate Release
- February 4, 1998
-
-
- EXECUTIVE ORDER
-
- - - - - - - -
-
- YEAR 2000 CONVERSION
-
-
- The American people expect reliable service from their
- Government and deserve the confidence that critical government
- functions dependent on electronic systems will be performed
- accurately and in a timely manner. Because of a design feature in
- many electronic systems, a large number of activities in the
- public and private sectors could be at risk beginning in the year
- 2000. Some computer systems and other electronic devices will
- misinterpret the year "00" as 1900, rather than 2000. Unless
- appropriate action is taken, this flaw, known as the "Y2K
- problem," can cause systems that support those functions to
- compute erroneously or simply not run. Minimizing the Y2K problem
- will require a major technological and managerial effort, and it
- is critical that the United States Government do its part in
- addressing this challenge.
-
- Accordingly, by the authority vested in me as President by the
- Constitution and the laws of the United States of America, it is
- hereby ordered as follows:
-
- Section 1. Policy. (a) It shall be the policy of the
- executive branch that agencies shall:
-
- (1) assure that no critical Federal program experiences
- disruption because of the Y2K problem;
-
- (2) assist and cooperate with State, local, and tribal
- governments to address the Y2K problem where those governments
- depend on Federal information or information technology or the
- Federal Government is dependent on those governments to perform
- critical missions;
-
- (3) cooperate with the private sector operators of critical
- national and local systems, including the banking and financial
- system, the telecommunications system, the public health system,
- the
-
- transportation system, and the electric power generation system,
- in addressing the Y2K problem; and
-
- (4) communicate with their foreign counterparts to raise
- awareness of and generate cooperative international arrangements
- to address the Y2K problem.
-
- (b) As used in this order, "agency" and "agencies" refer to
- Federal agencies that are not in the judicial or legislative
- branches.
-
- Sec. 2. Year 2000 Conversion Council. There is hereby
- established the President's Council on Year 2000 Conversion (the
- "Council").
-
- (a) The Council shall be led by a Chair who shall be an
- Assistant to the President, and it shall be composed of one
- representative from each of the executive departments and from
- such other Federal agencies as may be determined by the Chair of
- the Council (the "Chair").
-
- (b) The Chair shall appoint a Vice Chair and assign other
- responsibilities for operations of the council as he or she deems
- necessary.
-
- (c) The Chair shall oversee the activities of agencies to
- assure that their systems operate smoothly through the year 2000,
- act as chief spokesperson on this issue for the executive branch
- in national and international fora, provide policy coordination of
- executive branch activities with State, local, and tribal
- governments on the Y2K problem, and promote appropriate Federal
- roles with respect to private sector activities in this area.
-
- (d) The Chair and the Director of the Office of Management
- and Budget shall report jointly at least quarterly to me on the
- progress of agencies in addressing the Y2K problem.
-
- (e) The Chair shall identify such resources from agencies as
- the Chair deems necessary for the implementation of the policies
- set out in this order, consistent with applicable law.
-
- Sec. 3. Responsibilities of Agency Heads. (a) The head of
- each agency shall:
-
- (1) assure that efforts to address the Y2K problem receive
- the highest priority attention in the agency and that the policies
- established in this order are carried out; and
-
- (2) cooperate to the fullest extent with the Chair by making
- available such information, support, and assistance, including
- personnel, as the Chair may request to support the accomplishment
- of the tasks assigned herein, consistent with applicable law.
-
- (b) The heads of executive departments and the agencies
- designated by the Chair under section 2(a) of this order shall
- identify a responsible official to represent the head of the
- executive department or agency on the Council with sufficient
- authority and experience to commit agency resources to address the
- Y2K problem.
-
- Sec. 4. Responsibilities of Interagency and Executive Office
- Councils. Interagency councils and councils within the Executive
- Office of the President, including the President's Management
- Council, the Chief Information Officers Council, the Chief
- Financial Officers Council, the President's Council on Integrity
- and Efficiency, the Executive Council on Integrity and Efficiency,
- the National Science and Technology Council, the National
- Performance Review, the National Economic Council, the Domestic
- Policy Council, and the National Security Council shall provide
- assistance and support to the Chair upon the Chair's request.
-
- Sec. 5. Judicial Review. This Executive order is intended
- only to improve the internal management of the executive branch
- and does not create any right or benefit, substantive or
- procedural, enforceable at law or equity by a party against the
- United States, its agencies, or instrumentalities, its officers or
- employees, or any other person.
-
-
- WILLIAM J. CLINTON
-
-
- THE WHITE HOUSE,
- February 4, 1998.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File *&*--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.16
- ************************************
-
-
-