home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun May 8, 1994 Volume 6 : Issue 40
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.40 (May 8, 1994)
-
- File 1--The check finally arrived--(Steve Jackson Games Update)
- File 2--"Why Censoring Cyberspace is Futile" (H. Rheingold reprint)
- File 3--The Great Clipper Debate 5/9/94
- File 4--NII Summer Internship at the White House
- File 5--DOJ Clipper documents scheduled for summer release under FOIA
- File 6--Re: Comment on the Lamacchia case
- File 7--Opening of the Computer-Mediated Communication Studies Center
- File 8--Net-Letter Guide 5/05
- File 9--RSA-1,600 number Encryption Code Broken
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 5 May 1994 18:56:10 -0500 (CDT)
- From: Steve Jackson <sj@INDIAL1.IO.COM>
- Subject: File 1--The check finally arrived--(Steve Jackson Games Update)
-
- PRESS RELEASE May 5, 1994 - For Immediate Release
-
- SECRET SERVICE PAYS DAMAGES TO STEVE JACKSON GAMES
-
- On March 1, 1990, agents of the US Secret Service invaded the offices
- of Steve Jackson Games, in Austin, Texas, in what became a landmark
- case for the rights of computer users. The agents seized several
- computers, including the company's BBS, and hundreds of computer
- disks. Among the files taken were several uncompleted books, including
- one that was about to go to the printer!
-
- The raid was carried out under a sealed warrant. It was eventually
- revealed that the Secret Service was investigating an imaginary
- "conspiracy" based on false information, and knew it had no grounds to
- suspect SJ Games of any crime, but had never even considered asking
- the company for its cooperation while planning the raid!
-
- On March 12, 1993, a federal judge ruled for Steve Jackson Games and
- its co-plaintiffs - Steve Jackson himself and three users of the
- Illuminati Bulletin Board - on two separate counts. Judge Sam Sparks
- ruled for SJ Games on the PPA (Privacy Protection Act), saying that
- the publisher's work product was unlawfully seized and held. Under the
- ECPA (Electronic Communications Privacy Act), he ruled that the Secret
- Service had unlawfully read, disclosed and erased the computer
- messages on the BBS - despite their repeated denials that they had
- done any such thing. On a separate ECPA count, he ruled for the
- defendants, saying that taking the computer out the door was not an
- "interception" of the messages on it within the meaning of the law.
- That decision is now being appealed.
-
- Judge Sparks' opinion was harshly critical of the Secret Service's
- behavior before, during and after their raid, calling the affidavit
- and warrant preparation "simply sloppy and not carefully done."
-
- Now, more than a year later, the Secret Service has finally paid the
- judgment. The checks received today included $1,000 per plaintiff
- under the ECPA, plus about 3% interest since the judgment. Under the
- PPA, SJ Games received $52,431.50 for lost profits and direct costs of
- the raid. The government agreed to pay additional costs of the suit,
- originally borne by the EFF and the attorneys, adding another
- $252,405.54.
-
- Commented Jackson: "The heroes in this case are the people at the EFF
- and the attorneys who put it together - especially Sharon Beckman at
- Silverglate & Good, and Pete Kennedy at George, Donaldson and Ford.
- Without them, we never would have had our day in court. They made a
- big investment in justice. "As for us, we'll use our share to pay off
- old debts and buy new computers."
-
- Since the raid, Jackson's bulletin board service has grown hugely.
- Originally a one-line forum for game fans, it is now a full-scale
- Internet access service, specializing in helping newcomers learn their
- way around the Net. Doing business as "Illuminati Online," Jackson now
- serves over a thousand paying customers, with more signing up every
- day. "If not for the raid, I wouldn't have done it," he says. "It
- brought home to me how important the Internet is becoming. And even if
- we protect our legal right to be on the info highway, somebody has to
- teach people how to use it!"
-
- For more information, contact Steve Jackson at 512-447-7866.
-
- ------------------------------
-
- Date: Thu, 5 May 1994 22:21:32 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 2--"Why Censoring Cyberspace is Futile" (H. Rheingold reprint)
-
- By Howard Rheingold. Originally published in the San Francisco
- Examiner, part of a weekly series of columns called "Tomorrow."
- Reposted with permission.]
-
- =======================================
- vc.181: Howard Rheingold's "Tomorrow" Columns Online vc.181.27: Howard
- Rheingold (hlr) Tue 5 Apr 94 20:30
- The following appeared in the San Francisco Examiner on April 6, 1994
-
- Why Censoring Cyberspace Is Futile
- By Howard Rheingold
-
- For years, many Netheads had a recurring nightmare that a pedophile
- would use a computer bulletin board system to make contact with a
- child, and follow up with physical abuse offline. Now this nightmare
- has become a reality. (See the news pages of today's Examiner.)
-
- It is only a matter of time before law enforcement authorities use
- cases like this to crack down on the free-wheeling,
- everything-is-permitted culture of cyberspace. It's not hard to
- imagine Jesse Helms standing before the US Senate, holding up an
- X-rated image downloaded from the Internet, raging indignantly about
- "public funds for porno highways."
-
- As the public begins to realize that communications technology is
- exposing them to an unlimited array of words and images, including
- some they might find thoroughly repulsive, the clamor for censorship
- and government regulation of the electronic highway is sure to begin.
-
- But it would be a mistake to let traffic cops start pulling people
- over on the highway.
-
- Yes, we have to think about ways of protecting our children and our
- society from the easy availability of every kind of abhorrent
- information imaginable. But the "censor the Net" approach is not
- just morally misguided. It's becoming technically impossible. As Net
- pioneer John Gilmore is often quoted: "The Net interprets censorship
- as damage and routes around it."
-
- The Net's technological foundation was built to withstand nuclear
- attack. The RAND Corporation designed the network to be a thoroughly
- decentralized command-and-control-and communications system, one that
- would be less vulnerable to intercontinental missiles than a system
- commanded by a centralized headquarters.
-
- This decentralization of control means that the delivery system for
- salacious materials is the same worldwide one that delivers economic
- opportunity, educational resources, civic forums, and health advice.
- If a hacker in Helsinki or Los Angeles connects to the Internet and
- provides access to his digital porno files, anybody anywhere else in
- the world, with the right kind of Internet connection, can download
- those steamy bits and bytes.
-
- This technological shock to our moral codes means that in the future,
- we are going to have to teach our children well. The locus of control
- is going to have to be in their heads and hearts, not in the laws or
- machines that make information so imperviously available. Before we
- let our kids loose on the Internet, they better have a solid moral
- grounding and some common sense.
-
- I bought an Internet account for my daughter when she was eight years
- old, so we could exchange e-mail when I was on the road. But I didn't
- turn her loose until I filled her in on some facts of online life.
- "Just because someone sends you mail, you don't have to answer unless
- you know them," I instructed her. "And if anybody asks if you are
- home alone, or says something to you that makes you feel funny about
- answering, then just don't answer until you speak to me."
-
- The worldwide virtual communities that provide users with
- companionship, personal support, enlightenment, and entertainment can
- also contain imposters and worse. Your 14 year old might look like he
- is doing his homework, but is actually secretly joining a hot chat
- session with lecherous strangers. (The same dangers exist with the
- telephone -- ask parents who have had to pay hefty bills for their
- kids' 976 habits.)
-
- You should have the the right, and the ability, to restrict the
- massive information-flow into your home, to exclude subject matter
- that you don't want your children to see. But sooner or later, your
- children will be exposed to everything you have shielded them from,
- and then all they will have left to deal with these shocking sights
- and sounds is the moral fiber you helped them cultivate.
-
- Teach your children to be politely but firmly skeptical about
- anything they see or hear on the Net. Teach them to have no fear of
- rejecting images or communications that repel or frighten them. Teach
- them to have a strong sense of their own personal boundaries, of
- their right to defend those boundaries physically and socially. Teach
- them that people aren't always who they present themselves to be in
- e-mail and that predators exist. Teach them to keep personal
- information private. Teach them to trust you enough to confide in you
- if something doesn't seem right.
-
- Yes, pedophiles and pornographers use computer networks. They also
- use telephones and the mail, but nobody would argue that we need to
- censor or shut down these forms of communication. The most relevant
- question now is: how do we teach our children to live, in an
- uncensorable world?
-
- ------------------------------
-
- Date: Mon, 2 May 1994 18:17:02 +0000
- From: Dave Banisar <epic@CPSR.ORG>
- Subject: File 3--The Great Clipper Debate 5/9/94
-
- The Great Clipper Debate:
- National Security or National Surveillance?
-
-
- Sponsored by: The Georgetown University Law Center Space Law Group
- and Communications Law Forum
-
- In Coordination with: The George Washington University Institute for
- Computer and Telecommunications Systems Policy, the Association for
- Computing Machinery Special Interest Group for Computers and Society, and
- the American Bar Association Criminal Justice Section.
-
- Date and Time: May 9, 1994, at 7:30 p.m.
-
- Place: The Georgetown University Law Center(Moot Court Room)
- 600 New Jersey Avenue, N.W., Washington, D.C.
-
-
-
- The Administration, through the Department of Justice and the
- National Security Agency, has proposed a standard encryption algorithm
- for both the public and commercial marketplace, with the goal of making
- this algorithm the method of choice for persons wishing to encode their
- telephone and other voice and data communications. The FBI and the NSA
- are concerned that the increasing availability, and affordability, of
- encryption mechanisms will make it difficult and in some cases impossible
- for law enforcement and intelligence agencies to tap into and to
- understand the communications of criminals and other pertinent groups.
- This proposal has become known as the "Clipper Chip," in that it would
- be implemented by the voluntary insertion of a computer chip into
- telephone, fax machine, and other communications systems.
-
- The Clipper Chip has generated considerable controversy. Opposing
- it are various civil libertarian groups, as well as telecommunications
- companies, software and hardware manufacturers, and trade associations.
- The debate has raged behind closed doors, and openly in the press.
-
- On Monday, May 9, at the Georgetown University Law School, a round
- table debate will take place on this controversy. The participants
- represent both sides of the issue, and are illustrative of the various
- groups which have taken a stand. The participants are:
-
- Dorothy Denning, Chairperson of the Computer Science Department
- of Georgetown University
-
- Michael Godwin, Legal Counsel of the Electronic Frontier
- Foundation;
-
- Geoffrey Greiveldinger, Special Counsel to the Narcotic and
- Dangerous Drug Section of the U.S. Department of Justice;
-
- Michael Nelson, of the Office of Science and Technology Policy
- of the White House;
-
- Marc Rotenberg, Director of the Electronic Privacy Information
- Center; and
-
- Stephen Walker, President of Trusted Information Systems, Inc.,
- and a former cryptographer with the National Security Agency
-
- In addition, there will be two moderators: Dr. Lance
- Hoffman, Professor of Electrical Engineering and Computer Science at The
- George Washington University, and Andrew Grosso, a former federal
- prosecutor who is now an attorney in private practice in the District of
- Columbia.
-
- The program will last approximately two and one half hours, and will
- be divided into two parts. The first half will offer the panel the
- opportunity to respond to questions which have been submitted to the
- participants beforehand; the second will present the panel with questions
- from the audience.
-
- There is no charge for this program, and members of the public are
- encouraged to attend. Reservations are requested in advance, and should
- be directed to one of the following individuals:
-
- - C. Dianne Martin, Associate Professor, Department of Electrical
- Engineering and Computer Science, The George Washington University,
- Phillips Hall, Room 624-C, Washington, D.C. 20052; telephone: (202)
- 994-8238; E mail: diannem@seas.gwu.edu
-
- - Sherrill Klein, Staff Director, ABA Criminal Justice Section,1800
- M Street, N.W., Washington, D.C. 20036; telephone: (202) 331-2624;
- fax: (202) 331-2220
-
- - Francis L. Young, Young & Jatlow, 2300 N Street, N.W., Suite 600,
- Washington, D.C. 20037; telephone: (202) 663-9080; fax: (202)
- 331-8001
-
- Questions for the panelists should be submitted, in writing, to one
- of the moderators:
-
- - Lance Hoffman, Professor, Department of Electrical Engineering and
- Computer Science, The George Washington University, Washington,
- D.C. 20052; fax: (202) 994-0227; E mail: ictsp@seas.gwu.edu
-
- - Andrew Grosso, 2300 N Street, N.W., Suite 600, Washington, D.C.,
- 20037; fax: (202) 663-9042; E mail: agrosso@acm.org
-
- ------------------------------
-
- Date: Mon, 2 May 1994 10:33:57 -0700
- From: cpsr-announce@SUNNYSIDE.COM
- Subject: File 4--NII Summer Internship at the White House
-
- SUMMER INTERNSHIP AT THE WHITE HOUSE
-
- The Technology Division of the Office of Science and Technology Policy
- in the Executive Office of the President has the intention of hiring
- an intern this summer. The Technology Division is the part of OSTP
- that works on the National Information Infrastructure Initiative. We
- would like our intern to be qualified to help the build the White
- House World Wide Web server, which is likely to be open to the public
- in the fall. The position will pay between $3,800 and $4,700 for 90
- days. The person selected will devote approximately half of his or
- her time to the Web server and half to general office duties such as
- answering telephones, making photocopies, and sorting incoming paper
- mail.
-
- Anyone may apply for this position by responding to Vacancy
- Announcement Number OSTP-94-02-AR (Student Assistant GS-303-3/4/5).
- Applications must be received no later than close of business Friday 6
- May 1994.
-
- How to Apply: Send your SF-171 form (Application for Federal
- Employment, available at a public library or campus placement office)
- and a written narrative summary of your experience and/or education on
- a separate sheet, and a SF-15 (Application for 10-point Veteran
- Preference, if applicable).
-
- Where to apply: Office of Science and Technology Policy, Technology
- Division Room 423, Executive Office of the President, Old Executive
- Office Building, Washington, DC 20500. You may send your completed
- SF-171 by fax to 202- 456-6023. Applications must be *received* by
- the closing date and will not be returned. Relocation Expenses will
- *not* be paid to the applicant selected. A security prescreen will be
- conducted. The applicant tentatively selected for this position may be
- required to submit to urinalysis to screen for illegal drug use prior
- to appointment. After appointment, the employee will be included in
- the agency's random drug testing program.
-
- Applications will be accepted from all qualified persons.
- Consideration will be extended without discrimination for any
- non-merit reasons such as race, color, religion, gender, national
- origin, political affiliation, marital status, age, membership or
- nonmembership in employee organizations, or nondisqualifying physical
- handicap.
-
- Selective factors: Experience operating a personal computer and using
- word processing software; experience in locating and assembling
- information for reports, briefings, or meetings.
-
- Quality ranking factors: Ability to organize, follow procedures,
- prioritize tasks and complete deadlines; knowledge of grammar,
- punctuation, and spelling; ability to communicate effectively both
- orally and in writing; ability to achieve cooperative working
- relationships with all levels of staff.
-
- Important additional information: If you want to show us what you can
- do please send the URL to your Web home page in the subject line of an
- e-mail message to interns@ostp.eop.gov. Do not put any other
- information in the subject line, just http://your.own.address. No
- phone calls or faxes please. Be creative with your home page. You are
- not required to list telephone numbers or other information you would
- not want to be publicly accessible. Good luck!
-
- ------------------------------
-
- Date: Wed, 4 May 1994 08:00:28 -0700
- From: Lee Tien <tien@WELL.SF.CA.US>
- Subject: File 5--DOJ Clipper documents scheduled for summer release under FOIA
-
- As you know, there has been much debate about the Clipper Chip
- initiative, but relatively little hard information. John Gilmore,
- member of the board of directors of the Electronic Frontier
- Foundation, filed FOIA requests to numerous government
- agencies last April after the Clipper plan was announced. In
- June 1993, he filed a FOIA lawsuit against the Justice Department
- ("DOJ") and the Federal Bureau of Investigation ("FBI").
- Gilmore v. FBI, et al, C-93-2117, U.S. District Judge Charles
- Legge, Northern District of California.
-
- As a result of this lawsuit, the Justice Department has agreed to a
- staggered release of some documents about Clipper and Digital
- Telephony. The Justice Department and Gilmore signed a joint
- stipulation and agreement on Friday, April 29, 1994, in which the
- Justice Department and several other federal agencies agreed to
- release documents over the next several months:
-
- a) DOJ's Office of Information and Privacy ("OIP") will
- transmit all documents recovered in its search for responsive
- documents that it has identified as requiring referrals or
- consultations to the appropriate agencies or DOJ components by
- May 31, 1994. OIP will complete processing of all documents that
- it has identified as not requiring referrals or consultations to
- other agencies or DOJ components by June 20, 1994.
-
- b) DOJ's Justice Management Division ("JMD") will
- complete processing of all documents recovered in its search for
- responsive documents, excluding documents which have been
- referred for processing to other agencies, by July 30, 1994.
-
- 0) The Office of Management and Budget ("OMB") will
- respond to all DOJ consultation requests which OMB had received
- as of April 20, 1994 by May 20, 1994.
-
- d) The National Security Agency ("NSA") will respond to
- all DOJ consultation requests which it had received as of April
- 20, 1994 by July 18, 1994. NSA will complete processing of all
- documents which had been referred to it by DOJ as of April 20,
- 1994 for direct response to plaintiff by July 18, 1994.
-
- e) The National Security Council ("NSC") will respond to
- all DOJ consultation requests which NBC had received as of April
- 20, 1994 by July 29, 1994.
-
- f) The Department of Commerce and National Institute of
- Standards and Technology (collectively "Commerce") will respond
- to all DOJ consultation requests which Commerce had received as
- of April 20, 1994 by August 7, 1994. Commerce will complete
- processing of all documents which had been referred to it by DOJ
- as of April 20, 1994 for direct response to plaintiff by August
- 7, 1994.
-
- The documents being processed by the NSC include the Presidential Review
- Directive and Presidential Decision Directive which started the Clipper
- initiative. We have been informed that NSC is processing the two
- final versions as well as 68 draft versions.
-
- We have also been informed that documents produced in the course
- of the OMB legislative clearance process for the Digital Telephony
- Bill are being processed. This should provide insight into how the
- government decided to proceed with this bill.
-
- We have also been informed that there are approximately 25
- documents produced in the course of the government's solicitation
- of industry views on Clipper.
-
- Obviously, we do not know how much useful information will be
- released. It is probable that the documents will be heavily redacted.
- Given the recent directives from the President and the Attorney General
- that all possible discretionary disclosures of information should be made,
- we hope, optimistically, that these disclosures will prove illuminating.
-
- Unfortunately, the FBI is not a party to this agreement. We are in
- the process of attempting to obtain the release of about 3000 pages
- of FBI records. FBI has told the Court that it will be approximately
- 2 years and 8 months before it will even begin processing Gilmore's
- request, and that actual processing will take about a year, if not more.
- We believe that this delay is unlawful and cannot be countenanced.
-
- Lee Tien
- Attorney for John Gilmore
- tien@well.sf.ca.us
-
-
- PLEASE REDISTRIBUTE IF YOU THINK IT'S WORTH IT. (feel free to edit
- any obvious typos, too)
-
- ------------------------------
-
- Date: 02 May 1994 18:57:20 -0000
- From: timk@YCRDI.COM(Tim King)
- Subject: File 6--Re: Comment on the Lamacchia case
-
- The legal council for David LaMacchia posted an article in CUD #6.32,
- basically asserting that a BBS sysop or other computer administrator
- should not be held liable for information transferred illegally
- through his computer system, even if the sysop knows that this
- activity is occuring.
-
- J. Eric Townsend (jet@NAS.NASA.GOV) responded, "If the SYSOP actively
- encourages others to use the system, doesn't that somehow change this?
- This is something like saying that because a bar owner isn't
- responsible for the activities of prostitutes, they should go out and
- encourage prostitutes to frequent their bar."
-
- I am interested in understanding this point of view, but I don't see
- how the statement addresses the issue. The original statement did not
- say that bar owners _should_ encourage prostitution, although one
- might conclude that they _can_. I'll grant that the analogy holds,
- but it hasn't been shown that the hypothetical bar owner is
- responsible for the activities of the prostitutes. Is he? Why? By
- what reasoning?
-
- Again, Silverglate & Good state, "...Certain classified advertisements
- for '_dating services_'... are really covers for high-class
- *prostitution* rings.
- Yet... editors and publishers of the newspapers are *not*
- prosecuted... even if the editors and publishers were well aware of
- the fact..."
-
- Eric replied, "But what about instances where the editors or
- publishers actively sought out 'escort services' to advertise in their
- paper, with full knowledge that the 'escort services' were
- prostitution rings?"
-
- Okay, what about these instances? Please describe at least one. It
- is reasonable that the original posters would not cite instances that
- had not come to court, and they would have had to in order to support
- their claim that editors and publishers are not prosecuted. But Eric
- certainly should be expected to cite instances that have come to
- court, in order to support his counter-assertion.
-
- However, Silverglate & Good _did_ cite a case that supported their
- position. (_Smith v. California_, 361 U.S. 147 (1959)) This point
- was not addressed at all in Eric's response.
-
- So comes the conclusion, "In short, I don't buy the 1st Amendment
- defense in this case."
-
- Okay, but this doesn't change the way the courts view First Amendment
- rights, which is the only point on which Silverglate & Good were
- relying. I have not been provided any reason to believe that the
- defense has made any false statements, as Eric did not address the
- court's view.
-
- Furthermore, it is obvious that the issue has not been treated deeply
- enough to give me reason to develop a desire to see the law changed in
- this matter. There was no legal precedent treated. No one examined
- the reasons for which the current rules were established. Eric did
- not even thoroughly address the points that are already on the table.
-
- Therefore, Eric, I don't understand precisely what you want to
- accomplish. Why did you post your original response? Was it to try
- to convince readers of your views? Although, my gut reaction would be
- to agree with your conclusion, you've given me no objective reason to
- do so.
-
- ------------------------------
-
- Date: Sat, 30 Apr 1994 12:52:08 EDT
- From: John December <decemj@RPI.EDU>
- Subject: File 7--Opening of the Computer-Mediated Communication Studies Center
-
- Announcing: Opening of the Computer-Mediated Communication Studies
- Center and first issue of _Computer-Mediated Communication Magazine_
-
-
- The Computer-Mediated Communication Studies Center, a set of web
- pages dedicated to serving the needs of researchers, students, teachers,
- and practitioners interested in computer-mediated communication
- (CMC), is now open. This Center helps people share information, make
- contacts, collaborate, and learn about developments and events related
- to CMC. This center includes the first issue of _Computer-Mediated
- Communication Magazine_, links to people who are interested in CMC, a
- resources collection, and pointers to activities. If you are interested in
- CMC studies, you are invited to participate.
-
- About the CMC Studies Center
-
- MISSION
-
- * To provide a forum for the exchange of information about CMC
- * To foster community-building among CMC scholars students,
- developers, and users through collaboration and information exchange.
- * To articulate and define CMC studies
- * To inform and educate interested persons about CMC issues and
- scholarship
-
- SPONSORSHIP
-
- The CMC Studies Center is not sponsored or officially endorsed by
- any organization or institution. The opinions and information
- expressed belong to and are the responsibility of the participants.
-
- STATUS
-
- The CMC Studies Center is a non-profit, non-commercial,
- privately-created enterprise created for the benefit of its
- participants and as a public service to interested persons.
-
- DISSEMINATION
-
- Over the World Wide Web. CMC Studies Center URL:
-
- http://www.rpi.edu/~decemj/cmc/center.html
-
- CMC Magazine URL:
-
- http://www.rpi.edu/~decemj/cmc/mag/current/toc.html
-
- NAVIGATING
-
- Sections linked by hypertext
-
- LINKING TO
-
- The intent of the development efforts for this center is to involve
- many people in working on various web pages. This will mean that
- links to some of the pages will change to allow for distributed
- development and maintenance. You should consider linking to the home
- page (http://www.rpi.edu/~decemj/cmc/center.html) or index
- (http://www.rpi.edu/~decemj/cmc/index.html) as a "front door" to the
- center, as these links should remain stable for a while. Links on
- these pages (and the footers of other pages) will be updated to
- reflect changes in links.
-
- John December/decemj@rpi.edu/Rensselaer Polytechnic Institute/Troy NY
- PhD Candidate/Department of Language, Literature, and Communication
- <a href="http://www.rpi.edu/~decemj/index.html">John December</a>
-
- ------------------------------
-
- Date: Wed, 4 May 1994 21:20:33 -0400 (edt)
- From: John Higgins <higgins@DORSAI.DORSAI.ORG>
- Subject: File 8--Net-Letter Guide 5/05
-
- NET-LETTER GUIDE
- A newshound's guide to newsy periodicals available through the
- Internet. Compiled by John M. Higgins (higgins@dorsai.dorsai.org)
- Updated May 5, 1994
-
- Introduction: My favorite things on the Internet are informative, high-
- quality newsletters. The quality of info contributed to what Mitch Kapor
- describes as the Net's "gift economy" is amazing. Despite some excellent
- e-pub guides, tracking down good NEWSY letters can be frustrating, partly
- because they get lost in the flood of zines and very technical pubs.
-
- So this list aims to point people to the news-oriented net-letters with
- somewhat broader appeal. It's not intended to be as comprehensive as
- other guides, but helpful nevertheless. Very technical and fanzine
- newsletters are not included because they are well covered by other guides.
-
- GIMME FEEDBACK!! This is just an initial stab, just a dozen or so I've
- seen and like (including one I edit!). Some are well-known, others are
- not. Send me your favorite net-letters, particularly if you're the
- editor. Include any subscription information plus a copy.
-
- HOW TO GET THE NET-LETTER GUIDE: For now, it will be available by
- e-mailing higgins@dorsai.dorsai.org, plus Usenet groups alt.zines,
- alt.etext, misc.writing, rec.mag, alt.internet.services, alt.answers,
- misc.answers, rec.answers, news.answers. If folks like it, other
- arrangements will be made.
-
- (Far more exhaustive lists of electronic publications include John
- Labovitz's e-zine-list {FTP to ftp.netcom.com:/pub/johnl/zines/e-zine-list
- or http //www.ora.com:8080/johnl/e-zine-list/} or the giant e-pub archive,
- by FTP and Gopher {etext.archive.umich.edu})
-
- ---------------------------------------------------------------------------
- EDUPAGE: Tip sheet on information technology and media issued three
- times weekly. Quickie summaries primarily of newspaper articles,
- primarily from the majors.
- How to get it. E-Mail (listproc@educom.edu, SUB EDUPAGE YOUR NAME).
-
- FITZ'S SHOPTALK: Daily dispatches on the TV business, both networks and
- local stations by media headhunter Don FitzPatrick. Primarily summaries
- of wire-service and major newspapers, but also includes some full-text
- reprints.
- How to get it: E-mail (shoptalk-request@gremlin.clark.net, SUBSCRIBE
- YOUR@ADDRESS).
-
- LATE SHOW NEWS: A guy who obviously stays up way too late puts out a
- weekly newsletter on the late-night talk show wars. It's biased toward
- Letterman but contains surprisingly good industry dirt on Leno, Conan,
- etc. (even for those of us writing about television for a living).
- How to get it: E-mail (letterman@mcs.net), Usenet (alt.fan.letterman
- and rec.arts.tv), FTP (ftp.mcs.net:/mcsnet.users/barnhart/letterman).
-
- HICNet MEDICAL NEWS DIGEST: Something painless from a dentist. Broad
- bi-weekly newsletter on medicine by Health Info-Com Network, put together
- by dentist David Dodell. One week featured sleep apnea and snoring plus
- hemlock! Also carries excerpts of the Center for Disease Control's AIDS
- Daily Summary. The downside is conference announcements (OK, on things
- like techniques for identifying corpses, but they're still conference
- announcements!).
- How To Get It: E-Mail (mednews@asuvm.inre.asu.edu); FTP:(vm1.nodak.edu)
-
- NETWORKS & COMMUNITY: The emphasis here is on "community" in
- Internet-land. Less techie than you might expect.
- How To Get It: E-Mail (rre-request@weber.ucsd.edu; SUBSCRIBE YOUR NAME)
- Gopher: (gopher.well.sf.ca.us or gopher.nlc-bnc.ca)
-
- CABLE REGULATION DIGEST: Weekly summary of news on cable regulation
- published by Multichannel News.
- How to get it: E-Mail, distributed to the TELECOMREG mailing list.
- (listserver@relay.adp.wisc.edu, SUBSCRIBE TELECOMREG);
- FTP (ftp.vortex.com:pub/tv-film-video/cable-reg); Gopher (gopher.vortex.com)
-
- SCIENCE BEAT: A tip sheet for science journalists from the National
- Institute for Standards and Technologies. Maybe not too newsy, but short,
- sweet and interesting.
- How to get it: GOPHER (gopher-server.nist.gov).
-
- HOTT: HOTT -- Hot Off The Tree -- has re-emerged as a giant pub
- culling the latest advances in computer, communications, and electronics
- technologies from over trade magazines, newspapers and net resources.
- Great stuff, but why they're gathering so much material for a huge
- monthly rather than a smaller weekly or something is beyond me.
- How to get it: E-mail (listserv@ucsd.edu,SUBSCRIBE HOTT-LIST)
-
- PRIVACY Forum: Tidbits about threats to privacy from government snoops
- to credit agencies.
- How to get it: E-Mail(privacy-request@vortex.com); FTP (ftp.vortex.com);
- Gopher (gopher.vortex.com).
-
- ALAWON: An electronic newsletter distributed by the Washington Office of
- the American Library Association that covers federal legislation,
- regulations, policy, and grant opportunities of interest to libraries.
- How to get it: E-mail: (listserv@uicvm {Bitnet} or
- listserv@uicvm.uic.edu {Internet} SUBSCRIBE ALA-WOFirstName LastName).
-
- CURRENT CITES: A monthly letter for library technology, composed of
- pointers from magazine articles. A little on the dry side, partly because
- of its format.
- How to get it: E-mail (listserv@library.berkeley.edu; SUB CITES YOUR
- NAME); FTP: (ftp.lib.berkeley.edu:/pub/Current.Cites)
-
- COMPUTER UNDERGROUND DIGEST: The latest news on cyberspace issues.
- CUD's coolest when screaming about the latest hacker or BBS raid, good
- when picking apart government policy issues. But CUD will occasionally
- reprint the ENTIRE AGENDA for some upcoming computer conference. (YAWN!!!)
- How to get it: E-Mail (listserv@uiucvmd.bitnet or
- listserv@vmd.cso.uiuc.edu, SUB CUDIGEST YOUR NAME); Usenet
- (comp.society.cu-digest); FTP (etext.archive.umich.edu:/pub/eff) plus
- lots of other places.
-
- EFFECTOR: The Electronic Frontier Foundation's membership newsletter,
- great for telecom policy updates.
- How to get it: E-mail: send request to brown@eff.org; FTP (ftp.eff.org);
- Usenet: {preferred!~} (comp.org.eff); Gopher (gopher.eff.org)
-
- RISKS Forum: Tidbits about the risks computers present in society. One
- edition touched on industrial espionage, data escape from prison, and a
- strange tale of e-mail stalking.
- How to get it: E-mail (risks-request@csl.sri.com); Usenet {preferred!}
- (comp.risks); FTP (crvax.sri.com).
-
- ------------------------------
-
- Date: Sat, 30 Apr 1994 22:12:01 EDT
- From: Anonymous <cudigest@mindvox.phantom.com>
- Subject: File 9--RSA-1,600 number Encryption Code Broken
-
- "1,600 Computers Help Break 129-Digit Code"
- (From: Chicago Tribune, 27 April, 1994 (Sect 1, p. 3)
-
- Reuters
-
- NEW YORK--The world's ultimate secret code--a 129 digit
- combination billed as impossible to break--has finally been
- cracked.
-
- The article explains how 600 people using 1,600 computers linked
- together via the internet over five continents cracked the code in
- about eight months. Dr. Arjen Lenstra of Bellcore compares the feat to
- finding 8.5 million needles in a haystack. Lenstra coordinated the
- breaking of the encryption, "names RSA for the first letters of its
- three inventors' surnames."
-
- The story explains that the code was devised 17 years ago by computer
- scientists adn mathematicians Ronald Rivest, Adi Shamir, and Leonard
- Adleman.
-
- "This discovery is important if you want to protect the code
- guarding something like the secret formula for Coca-Cola or
- nuclear weapons," rivest said at a press conference. He
- suggested the encoders would have to use much longer numbers
- in the future.
-
- The article explains that numerical codes such as RSA 129 are
- based on the difficulty of breaking down long numbers into
- two sets of prime number (numbers divisible only by itself and
- "1"). Lenstra is quoted as saying the breaking of the code
- required the longest mathematical computation ever performed.
- The secret message that they successfully decrypted was
- "The magic words are squeamish ossifrage." The words were chosen
- randomly, according to Lenstra.
-
- Rivest presented Lenstra with a $100 check, the prize he and
- his two colleagues offered when they first presented the
- code to readers of Margin Gardiner's "Mathematical Games"
- column in Scientific American magazine to solve.
-
- While they billed it as being so hard that it would take 40
- quadrillion years to do, they did not count on the power of
- modern-day computers.
-
- ------------------------------
-
- End of Computer Underground Digest #6.40
- ************************************
-
-
-