home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Sep 14, 1994 Volume 6 : Issue 81
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Urban Legend Editor: E. Greg Shrdlugold
-
- CONTENTS, #6.81 (Wed, Sep 14, 1994)
-
- File 1--Re: Exon Amendment -- text of existing laws
- File 2--"Computer Related Crime" (Book Review)
- File 3--First French book on Internet (Book Review)
- File 4--Clipper T-shirts
- File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud
- File 6--Wiretap Bill Update
- File 7--Women's Work and Informatics -- Call for Contributions
- File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs
- File 9--Cu Digest Header Information (last changed 11 Sep '94)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 13 Sep 1994 13:08:09 -0400 (EDT)
- From: Steve Barber <sbarber@panix.com>
- Subject: File 1--Re: Exon Amendment - text of existing laws
-
- OK, so now that we've put the Exon amendment text out there (see CuD
- 6.79), it occurred to me that it isn't all that useful if you don't
- have the text of what it proposes to amend! So here is Section 223 of
- the Communications Act as it exists today, and the text of the
- "safe-harbor" regulation that implements part of it.
-
- -Steve Barber
-
- ============================
- FCC RESTRICTIONS ON OBSCENE AND INDECENT TELEPHONE TRANSMISSIONS
-
- A. STATUTE - Title 47, Section 223 of the United States Code (rev. 1989)
-
- @ 223. Obscene or harassing telephone calls in the District of
- Columbia or in interstate or foreign communications
-
- (a) Whoever--
- (1) in the District of Columbia or in interstate or foreign
- communication by means of telephone--
- (A) makes any comment, request, suggestion or proposal which is
- obscene, lewd, lascivious, filthy, or indecent;
- (B) makes a telephone call, whether or not conversation ensues, without
- disclosing his identity and with intent to annoy, abuse, threaten, or
- harass any person at the called number;
- (C) makes or causes the telephone of another repeatedly or
- continuously to ring, with intent to harass any person at the called
- number; or
- (D) makes repeated telephone calls, during which conversation
- ensues, solely to harass any person at the called number; or
- (2) knowingly permits any telephone facility under his control to
- be used for any purpose prohibited by this section, shall be fined not
- more than $ 50,000 or imprisoned not more than six months, or both.
-
- (b)(1) Whoever knowingly--
- (A) within the United States, by means of telephone, makes
- (directly or by recording device) any obscene communication for
- commercial purposes to any person, regardless of whether the maker of
- such communication placed the call;
- or
- (B) permits any telephone facility under such person's control to
- be used for an activity prohibited by subparagraph (A), shall be fined
- in accordance with title 18, United States Code, or imprisoned not
- more than two years, or both.
- (2) Whoever knowingly--
- (A) within the United States, by means of telephone, makes
- (directly or by recording device) any indecent communication for
- commercial purposes which is available to any person under 18 years of
- age or to any other person without that person's consent, regardless
- of whether the maker of such communication
- placed the call; or
- (B) permits any telephone facility under such person's control to
- be used for an activity prohibited by subparagraph (A), shall be fined
- not more than $ 50,000 or imprisoned not more than six months, or
- both.
- (3) It is a defense to prosecution under paragraph (2) of this
- subsection that the defendant restrict access to the prohibited
- communication to persons 18 years of age or older in accordance with
- subsection (c) of this section and with such procedures as the
- Commission may prescribe by regulation.
- (4) In addition to the penalties under paragraph (1), whoever,
- within the United States, intentionally violates paragraph (1) or (2)
- shall be subject to a fine of not more than $ 50,000 for each
- violation. For purposes of this paragraph, each day of violation shall
- constitute a separate violation.
- (5)(A) In addition to the penalties under paragraphs (1), (2), and (5),
- whoever, within the United States, violates paragraph (1) or (2) shall
- be subject to a civil fine of not more than $ 50,000 for each
- violation. For purposes of this paragraph, each day of violation shall
- constitute a separate violation.
- (B) A fine under this paragraph may be assessed either--
- (i) by a court, pursuant to civil action by the Commission or any
- attorney employed by the Commission who is designated by the
- Commission for such purposes, or
- (ii) by the Commission after appropriate administrative proceedings.
- (6) The Attorney General may bring a suit in the appropriate
- district court of the United States to enjoin any act or practice
- which violates paragraph (1) or (2). An injunction may be granted in
- accordance with the Federal Rules of Civil Procedure.
-
- (c)(1) A common carrier within the District of Columbia or within any
- State, or in interstate or foreign commerce, shall not, to the extent
- technically feasible, provide access to a communication specified in
- subsection (b) from the telephone of any subscriber who has not
- previously requested in writing the carrier to provide access to such
- communication if the carrier collects from subscribers an identifiable
- charge for such communication that the carrier remits, in whole or in
- part, to the provider of such communication.
- (2) Except as provided in paragraph (3), no cause of action may be
- brought in any court or administrative agency against any common
- carrier, or any of its affiliates, including their officers,
- directors, employees, agents, or authorized representatives on account
- of--
- (A) any action which the carrier demonstrates was taken in good
- faith to restrict access pursuant to paragraph (1) of this subsection;
- or
- (B) any access permitted--
- (i) in good faith reliance upon the lack of any representation
- by a provider of communications that communications provided by that
- provider are communications specified in subsection (b), or
- (ii) because a specific representation by the provider did not
- allow the carrier, acting in good faith, a sufficient period to
- restrict access to communications described in subsection (b).
- (3) Notwithstanding paragraph (2) of this subsection, a provider of
- communications services to which subscribers are denied access
- pursuant to paragraph (1) of this subsection may bring an action for a
- declaratory judgment or similar action in a court. Any such action
- shall be limited to the question of whether the communications which
- the provider seeks to provide fall within the category of
- communications to which the carrier will provide access only to
- subscribers who have previously requested such access.
-
- B. FCC REGULATION - Title 47, Section 64.201 of the Code of Federal
- Regulations
-
- Restrictions on obscene or indecent telephone
- message services.
-
- 47 CFR 64.201
-
- It is a defense to prosecution under section 223(b) of the
- Communications Act of 1934, as amended, 47 U.S.C. 223(b), that the
- defendant has taken one of the actions set forth in paragraph (a),
- (b), or (c) of this section to restrict access to prohibited
- communications to persons eighteen years of age or older, and has
- additionally complied with paragraph (d) of this section, where
- applicable:
-
- (a) Requires payment by credit card before transmission of the message; or
-
- (b) Requires an authorized access or identification code before
- transmission of the message, and where the defendant has:
-
- (1) Issued the code by mailing it to the applicant after reasonably
- ascertaining through receipt of a written application that the
- applicant is not under eighteen years of age; and
-
- (2) Established a procedure to cancel immediately the code of any
- person upon written, telephonic or other notice to the defendant's
- business office that such code has been lost, stolen, or used by a
- person or persons under the age of eighteen, or that such code is no
- longer desired; or
-
- (c) Scrambles the message using frequency inversion techniques so
- that it is unintelligible and incomprehensible to the calling party
- without use of a descrambler by the calling party; and
-
- (d) Where the defendant is a message sponsor or subscriber to mass
- announcement services tariffed at this Commission and such defendant
- prior to the transmission of the message has requested in writing to
- the carrier providing the public announcement service that calls to
- his message service be subject to billing notification as an adult
- telephone message service.
-
- ------------------------------
-
- Date: Mon, 05 Sep 1994 15:11:36 -0600 (MDT)
- From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
- Subject: File 2--"Computer Related Crime" (Book Review)
-
- BKCMRLCR.RVW 940622
-
- Loompanics Unlimited
- P.O. Box 1197
- Port Townsend, WA 98368
- loompanx@pt.olympus.net
- "Computer Related Crime", 1-55950-027-1, U$10.00
-
- This purports to be Field Circular 19-146 of the US Army Military Policy
- School. Supposedly intended for US Army Criminal Investigation (Defence?)
- Command Special Agents only, it appears to be an unauthorized photocopy of a
- typed government document. No date is included in any of the supposed
- government material: the Loompanics copyright date is 1990.
-
- It doesn't really matter if this is an official government document or not.
- The material is fairly pedestrian: after a reasonably detailed set of
- instructions on how to exercise a search warrant for computer equipment
- (although not how to analyze the equipment, once you have it), the bulk of the
- book defines various types of computer crimes. Much of this would have serious
- data security types going, "Well, maybe ...," but, at the same time, it isn't
- bad enough as to indicate that American military policy are being misinformed
- in what is, after all, a specialized topic.
-
- A possibly interesting bit of arcana for the well-stocked data security
- library.
-
- copyright Robert M. Slade, 1994 BKCMRLCR.RVW 940622
-
- ======================
- DECUS Canada Communications, Desktop, Education and Security group newsletters
- Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
- Author "Robert Slade's Guide to Computer Viruses" (Sept. '94) Springer-Verlag
-
- ------------------------------
-
- Date: 06 Sep 1994 12:47:08 GMT
- From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat)
- Subject: File 3--First French book on Internet (Book Review)
-
- New Book in Franch Language: INTERNET
-
- Internet is now available from Editions JCI, Inc. (2700 Joliette #201,
- Montreal, Quebec, H1W 3G9, Canada)
-
- The *Internet* book goes beyond all business school case studies and
- descriptions of Internet tools, teaching French readers how to effectively
- use the Internet to boost sales and cut costs. Through real world
- examples and expert advice, you'll learn how to use the Internet to
- build European/international market share, track down business leads,
- communicate with colleagues, search online databases, provide cost-
- effective customer support and access time-critical information.
-
- You'll also explore the many business opportunities now available on
- the Internet and get tips on shopping for the best deal on Internet access
- and cybel-mail space.
-
- Just as importantly you'll learn about the culture of the Internet, find
- out what type of advertising is acceptable and can generate a positive
- response, and which forms are verboten and can provoke community
- hostility (the famous 'nethiquette').
-
- The *Internet* also contain detailed descriptions of the author's first-
- hand and experienced experience in doing business on the Internet. Co-
- author Jean-Bernard Condat is a veteran information science writer and
- publisher of electronic newsletter that tracks trends and developments
- in electronic newspaper and magazine publishing. Co-author Nicolas Pioch
- is the conceptor of WebLouvre--Paris, the first consulted WWW in Europe
- (http://www.enst.fr/~pioch).
-
- Here's the basic information:
-
- Jean-Bernard Condat & Nicolas Pioch, "Internet", J.C.I. Inc., Oct. 1994,
- 224 pages, 195 FF (CAN$29.95), ISBN 2-921599-06-6.
-
- Table des Matieres:
-
- 1. Preface; 2. Premieres notions; 3. Documentation Internet; 4. Le
- courrier electronique; 5. Smileys (emoticons); 6. telnet; 7. Formats
- de fichiers; 8. FTP; 9. Archie; 10. Prospero; 11. Usenet/newsgroups;
- 12. Netiquette; 13. WAIS; 14. Gopher; 15. WWW; 16. cryptographie;
- 17. Adresses utiles; 18. MacTCP/PPP; Index.
-
- Note that you can receive more information on this publication by ordering
- it direct from:
-
- - Diffulivres, Canada: +1 514 738 2911, fax: +1 514 738 8512;
- - Distique, France: +33 37 34 84 84, fax: +33 37 30 78 65;
- - Context SA, Belgium: +32 41 40 19 82, fax: +32 41 490 19 82;
- - Micro-Distribution, Switzerland: +41 227843482, fax +41 227840945.
-
- Don't hesitate to contact us for more information on Internet... in France.
-
- Jean-Bernard Condat, 47 rue des Rosiers, 93404 St-Ouen Cedex, France
- Tel: +33147874083, Fax: +33149450129, Alphapage: +3336605050 code 0030006
- Email: JeanBernard_Condat@Email.FranceNet.FR *or* an113309@anon.penet.fi
-
- ------------------------------
-
- Date: 7 Sep 1994 20:40:52 -0700
- From: normh@CRL.COM(Norman J Harman)
- Subject: File 4--Clipper T-shirts
-
- Information and opposition to the Clipper proposal is strong
- on the Internet. But it is far too unknown to the 'outside'
- community. Everyone concerned by this issue should inform
- all the people they know of its implications. One way to
- increase awareness and show your opinion is to wear it:).
-
- I would like to offer an anti Clipper/Skipjack T-shirt.
- They would be white with black printing and cost
- approximately $5.00 plus $2.90 shipping to US locations.
- That is the cost to produce one shirt. I am trying to
- spread awareness not make money.
-
- I need to know if people are interested in this idea and
- what should the shirts say?
-
- Two quick ideas are:
- "Skip Skipjack"
- or
- "Just Say No to Clipper"
-
- Please send comments, suggestions, and questions to
- normh@crl.com. If more than a few people are interested I
- will go ahead and have the shirts made and post how to get
- one.
-
- A worthy cause is better if it benefits another good cause
- so the shirts will be silk-screened by Zerolith, part of a
- non-profit organization that employs, shelters, and assists
- homeless youth. If you would like to talk with Zerolith or
- donate money directly here is how to contact them.
-
- Zerolith
- 3075 21st Street
- San Francisco, CA 94110-2626
- 415.641.1014 voice
- 415.641.1474 fax
-
-
- --
- Norman J. Harman Jr. o o Smiley Systems
- normh@crl.com \__/ San Francisco, CA
-
- ------------------------------
-
- Date: Tue, 13 Sep 1994 11:19:22 (CDT)
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 5--Five "Hackers" Indicted for Credit Card/Computer Fraud
-
-
- (AP WIRE - Thurs, Sept. 8, 1994)
-
- NEW ORLEANS (AP) -- "Dr. Demonicus," "Renegade" and four other
- hackers used computers to steal credit card numbers and used them to
- buy $210,000 in gold coins and high-tech hardware, federal prosecutors
- said Wednesday (Sept 8, '94).
-
- The nine-count indictment unsealed Wednesday charged five men from
- Louisana and one from New York with conspiracy, computer fraud, access
- device fraud and wire fraud, U.S. Attorney Eddie Jordan Jr. said.
-
- Some fo their hacker nicknames were included. They were identified as
- Dwayne "Dr. Demonicus" Comeger, 22; Brian Ursin, 21; John Christopher
- "Renegade" Montegut, 24; Timothy "Revelation" Thompson, 21; James
- McGee, 25; and Raymone "Wiseguy" Savage, 25, of Richmond Hills, N.Y.
-
- ------------------------------
-
- From: email list server <listserv@SUNNYSIDE.COM>
- Date: Mon, 12 Sep 1994 09:29:49 -0700
- Subject: File 6--Wiretap Bill Update
-
- Wiretap Bill Update
-
- The Electronic Privacy Information Center (EPIC) and Voters Telecomm
- Watch (VTW) are urging concerned individuals and organizations to
- help stop the FBI Wiretap Bill. Congress is now back in session and your
- support is critical. The attached alert from VTW provides contact info
- for the relevant Congressional representatives.
-
- EPIC is a project of the Fund for Constitutional Government and Computer
- Professionals for Social Responsibility. For additional information,
- send e-mail to <info@epic.org>.
-
- =========================================================
-
-
- Subject--ACTION--Fight US bills--SB 2375 & HR 4922
- From--shabbir@panix.com (Shabbir J. Safdar)
- Date--11 Sep 1994 23:44:50 -0400
-
- **********************************************************
-
- DISTRIBUTE WIDELY (though no later than October 1, 1994)
-
- **********************************************************
- [If you've only got 2 minutes, skip down to the "What You Can Do"
- section.]
-
- [Washington insiders say the phone calls and faxes (especially to
- Rep Jack Brooks) are starting to attract significant attention, and
- many people prophesize that the bill won't even have time to pass
- this session. Thanks for your efforts!]
-
- The FBI's Wiretap bills (also known as the DT - Digital Telephony bills)
- mandate that *all* communications carriers must provide wiretap-ready
- equipment so that the FBI can more easily implement their court-ordered
- wiretaps more easily. The costs of re-engineering all communications
- equipment will be borne by the government, industry and consumers.
-
- The bill is vague and the standards defining "wiretap ready" do not
- exist. Furthermore, the FBI has yet to make a case which demonstrates
- that they have been unable to implement a wiretap.
-
- There are fewer than 1,000 court ordered surveillances per year. Even if
- all of them are wiretaps, and even if all of them require the changes
- mandated by this legisation, are we as a nation prepared to build
- eavesdropping features into the phones of 250 million people, in order
- to justify these wiretaps? None of these wiretaps has been demonstrated
- to be unimplementable, nor has it been proven that the cases could not
- be made with other methods of electronic surveillance.
-
- The Voters Telecomm Watch (VTW) does not believe the FBI has made a
- compelling case to justify that all Americans give up their privacy.
- Furthermore, the VTW does not believe the case has been made to justify
- spending 500 million Federal dollars over the next 4 years to
- re-engineer equipment to compromise privacy, interfere with
- telecommunications privacy, and fulfill an unproven government need.
-
-
- WHAT YOU CAN DO
- ===============
- You can help stop this legislation before it is too late!
- Phone/Fax/Write to each of the people below. It should take
- about two minutes a piece.
-
-
- . Rep. Jack Brooks (his Judiciary Committee must approve the bill
- before it can be voted upon by the full House)
- DC Phone: (202) 225-6565, TX Phone: (409) 839-2508
- DC Fax: (202) 225-1584
- Also try Judiciary Comm. fax at (202) 225-3951
- US Mail: RHOB 2449, Washington DC 20515
-
- . Senator Patrick Leahy (the Senate sponsor of the bill)
- DC Phone: (202) 224-4242, VT Phone: (802) 863-2525
- DC Fax: (202) 224-3595
- US Mail: SR 433, Washington DC 20510
- email: senator_leahy@leahy.senate.gov
-
- . Rep. Don Edwards (the House sponsor of the bill)
- DC Phone: (202) 225-3072, CA Phone: (408) 345-1711
- DC Fax: (202) 225-9460
- US Mail: 2307 RHOB, Washington DC 20515
-
- . Your two Senators
-
- . Your Representative
-
- Tell them you are opposed to the FBI's Wiretap legislation. Feel
- free to use the sample communique below:
-
- SAMPLE COMMUNIQUE
- =================
-
- Dear __________,
-
- The recent Digital Telephony bills (HR 4922 & SB 2375) disturb me
- greatly. The FBI has not yet made their case to the public that we
- need to build wiretap functionality into the telephones of 250
- million people to justify wiretaps which have not yet been proven to
- be difficult to implement.
-
- The bills would clearly compromise the privacy of all Americans with
- no counterbalancing benefit to either law enforcement or the public.
- The FBI has not demonstrated the need, and the cost is uncalculated,
- but is known to be at least 500 million tax dollars.
-
- Furthermore, the standards are undefined, as are the bodies that
- would enact these standards.
-
- For these reasons, I am opposed to the Digital Telephony bills
- (HR 4922 & SB 2375).
-
- Sincerely,
-
- _______________________
-
- If you get a response from your legislator, drop us a note at
- vtw@vtw.org. We track legislator positions on privacy-related issues
- such as this one.
-
- For more information about the Digital Telephony bills, check the
- Voters Telecomm Watch gopher site (gopher.panix.com) or contact Steven
- Cherry, VTW Press Contact at (718) 596-2851 or stc@vtw.org.
-
- VTW posts a Digital Telephony FAQ monthly to several Usenet newsgroups
- including comp.org.cpsr.talk and comp.org.eff.talk. Look for it or
- contact us at vtw@vtw.org for a copy.
-
- ------------------------------
-
- Date: Tue, 16 Aug 1994 01:06:35 +0200
- From: email list server <listserv@SUNNYSIDE.COM>
- Subject: File 7--Women's Work and Informatics - Call for Contributions
-
- Women's Work and Informatics
-
- Call for Contributions
-
- Please forward this call - Please forward this call - Please forward this call
-
-
- "Women's Work and Informatics" (Frauenarbeit und Informatik) is the name of
- a Special Interest Group founded eight years ago in the German Society for
- Informatics (Gesellschaft fuer Informatik). Today our group has about 500
- members and is a forum for female computer professionals to exchange
- experi ences in the discipline and in the various work situations.
- Our general aim is to increase the influence of women on the design and
- application of information technology. 12 local and thematic working groups
- are concerned with topics like women's research, promotion of women,
- motivation and encouragement of young women, the installation of an experts
- network, etc. In addition we are member of the national council of women's
- organisations to emphasize the interests of female technicians in the
- political environ ment.
- The next issue of our biannual journal "Frauenarbeit und Informatik" will
- focus on international perspectives and we hope to get your contributions
- from all over the world!!!
-
- Possible Contents
- In the following we summarize some possible aspects of the issue. Please
- keep in mind that we are collecting for a journal - so we are interested in
- articles as well as in brief information boxes, statistics, comments, etc.
- And of course the following points must not cover the national or
- professional situation as a whole; informations about special branches,
- situations, problems and solutions are also important, details appearing
- trivial or obvious to you might be new for a german readership!
-
- 1) The "One-Minute-Contribution":
- An international issue demands an international cover and here we need your
- help:
- Please send us the title "Women's Work and Informatics" in your native
- tongue and writing!!
-
- 2) Figure data:
- - General employment rate of women in your country?
- - Women's proportion in technical studies?
- - Women's proportion in the field of EDP professions?
- - How does this field look like (job titles, the demanded
- education/training, etc.)?...
-
- 3) Women's Advancement:
- - at university in the field of computer science
- - in industrial or govermental EDP-area, in your company?
- - Possibilities of part time work? of child care? of reengagement and
- further training?...
-
- 4) Amalgamations of women in computing:
- Do you join or know a professional organization, a network in your country?
- How is it organized, are there regular or irregular publications, what are
- the main aims and acitivities?...
- (Adresses and short description welcome for the planned index!)
-
- 5) Gender specific aspects of the influence of IT on the labour market?
- 6) Women's Research in the computing field (possibilities,
- experiences, results...)?
- 7) Lust but not least: Feel free to describe whatever is important for you.
-
- Formal conditions:
- Articles: should not exeed 1.500 words.
- Language: English or German.
- References: Alphabetical order at the end of the article.
- Artwork: Sorry - but we don't have colour print
- If the artwork not your own, please clear up the copyright.
-
- Deadline: September 30, 1994
-
-
- Please send your contribution to the woman contacting you or to one of the
- following addresses:
-
- Roswitha Behnke
- Mayskamp 8
- D-45357 Essen
- Germany
- behnke@iug.uni-dortmund.de
-
- Veronika Oechtering
- Jenaer Str. 39
- D-28215 Bremen
- Germany
- oechteri@informatik.uni-bremen.de
-
- Doris Koehler
- Wittmunder Str. 15
- D-28219 Bremen
- Germany
- koehler@rrz.uni-hamburg.de
-
- ------------------------------
-
- Date: Fri, 9 Sep 1994 22:26:17 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 8--GovAccess.048: SF ElEx free candidate info & net hosts/GNPs
-
- SAN FRANCISCO [ELECTRONIC] EXAMINER OFFERS CANDIDATES FREE WEB EXPOSURE
-
- Date--07 Sep 94 23:57 GMT
- From--GULKER@AppleLink.Apple.COM (S F Examiner, Chris Gulker,APD)
-
- Distribute widely, please
-
- As a service to the community, The Electric Examiner is offering free
- Internet publishing to candidates for office who will appear on Bay
- Area ballots. Internet users with access to the World Wide Web via
- Mosaic, Lynx or other browser software can access these files as noted
- below
-
- While it is anticipated that candidates will mainly offer text files
- like position statements, speeches and schedules, The Examiner's World
- Wide Web server also supports photos, graphics and short clips of
- audio and video.
-
- Candidates can e-mail files to chrisg@sfgate.com for inclusion on the
- server. Each candidate will be granted an equal heading and space up
- to the limits reserved for this project.
-
- Candidates who do not have e-mail access can send files on 3.5-inch
- diskette in either DOS/Windows or Macintosh format to
- Chris Gulker
- Candidates Internet Project
- San Francisco Examiner
- 110 Fifth Street
- San Francisco, CA 94103
-
- Candidates offerings will be published at Uniform Resource Locator (URL):
- http://sfgate.com/examiner/candidates/
-
- The Uniform Resource Locator of The Electric Examiner is:
- http://sfgate.com/examiner/
-
- File formats:
-
- Text must be in plain ASCII format - this option is offered by most word
- processors. Photos and graphics should be in Compuserve GIF format and
- should be sized to no more than 4 inches in the longest dimension at 72 dots
- per inch. Audio files should be in 'AU' format, video can be in either MPG
- or Quicktime format - these should be brief clips.
-
- The Electric Examiner is the World Wide Web service of The San Francisco
- Examiner.
-
- ===
-
- Thanks to both Phil Agre <pagre@weber.ucsd.edu> and brad@ape.com (Brad
- Schrick) for fastly-forwarding this hot-stuff. --jim
-
- &&&&&&&&&&&&&&&&&&&&
-
- INTERNET HOSTS: HOST-COUNTS AND EXPENDITURES/GROSS-NATIONAL-PRODUCT
- [ smaller number is better ]
-
- From: Tony Rutkowski <amr@isoc.org> via farber@eff.org Wed Sep 7 1994
-
- GNP/GDP Compared to Internet Hosts in July 1994
- by Eric Arnum*
-
- Top-Level Country July 1994 GNP/Host
- Domain Name Code Internet Hosts GNP/GDP Total Ratio
- ------------------------------------------------------------------
- Iceland is 3,268 $4,200,000,000 1.29
- Finland fi 49,598 $80,600,000,000 1.63
- Norway no 38,759 $72,900,000,000 1.88
- Australia au 127,514 $280,800,000,000 2.20
- USA var 2,044,791 $5,700,000,000,000 2.79
- New Zealand nz 14,830 $46,200,000,000 3.12
- Sweden se 53,294 $202,500,000,000 3.80
- Canada ca 127,516 $521,500,000,000 4.09
- Netherlands nl 59,729 $249,600,000,000 4.18
- Czech Republic cz 5,639 $25,600,000,000 4.54
- Switzerland ch 47,401 $238,050,000,000 5.02
- U.K. uk 155,706 $915,500,000,000 5.88
- South Africa za 15,595 $96,000,000,000 6.16
-
- World Median ww 3,212,000 $19,850,690,000,000 6.18
-
- Israel il 8,464 $56,400,000,000 6.66
- Denmark dk 12,107 $91,100,000,000 7.52
- Austria at 20,130 $164,100,000,000 8.15
- Chile cl 3,703 $30,500,000,000 8.24
- Germany de 149,193 $1,300,000,000,000 8.71
- Slovak Republic sk 868 $9,300,000,000 10.71
- Singapore sg 4,014 $43,200,000,000 10.76
- Costa Rica cr 544 $5,900,000,000 10.85
- Hungary hu 5,390 $60,100,000,000 11.15
- Portugal pt 4,518 $50,700,000,000 11.22
- Ireland ie 3,308 $39,200,000,000 11.85
-
- R.o.W. Median (not USA) 1,180,387 $14,150,690,000,000 11.99
-
- Belgium be 12,107 $171,800,000,000 14.19
- France fr 71,899 $1,033,700,000,000 14.38
- Taiwan tw 10,314 $150,800,000,000 14.62
- Luxembourg lu 420 $7,830,000,000 18.64
- Poland pl 7,392 $162,700,000,000 22.01
- South Korea kr 12,109 $273,000,000,000 22.55
- Spain es 21,147 $487,500,000,000 23.05
- Liechtenstein li 27 $630,000,000 23.33
- Greece gr 2,958 $77,600,000,000 26.23
- Kuwait kw 297 $8,750,000,000 29.46
- Croatia hr 838 $26,300,000,000 31.38
- Japan jp 72,409 $2,370,000,000,000 32.73
- Mexico mx 5,164 $172,400,000,000 33.38
- Malaysia my 1,322 $44,900,000,000 33.96
- Slovenia si 574 $21,000,000,000 36.59
- Ecuador ec 256 $11,500,000,000 44.92
- Italy it 23,616 $1,090,000,000,000 46.16
- Brazil br 5,896 $358,000,000,000 60.72
- Nicaragua ni 23 $1,600,000,000 69.57
- Turkey tr 1,204 $91,780,000,000 76.23
- Thailand th 1,197 $92,000,000,000 76.86
- Uruguay uy 101 $9,100,000,000 90.10
- Venezuela ve 399 $52,300,000,000 131.08
- Romania ro 453 $71,900,000,000 158.72
- Cyprus cy 38 $6,100,000,000 160.53
- Panama pa 24 $5,000,000,000 208.33
- Tunisia tn 46 $10,900,000,000 236.96
- Macau mo 12 $3,100,000,000 258.33
- Fiji fj 5 $1,300,000,000 260.00
- Colombia co 144 $45,000,000,000 312.50
- Argentina ar 248 $101,200,000,000 408.06
- Bulgaia bg 79 $36,400,000,000 460.76
- Peru pe 42 $25,150,000,000 598.81
- Philippines ph 65 $47,000,000,000 723.08
- Egypt eg 52 $39,200,000,000 753.85
- Ukraine ua 339 $339,200,000,000 1,000.59
- India in 316 $328,000,000,000 1,037.97
- China cn 325 $452,000,000,000 1,390.77
- Indonesia id 54 $116,200,000,000 2,151.85
- Russia ru 322 $800,000,000,000 2,484.47
- Algeria dz 7 $54,000,000,000 7,714.29
- Moldova md 2 $16,900,000,000 8,450.00
- Iran ir 4 $90,000,000,000 22,500.00
- Saudi Arabia sa 1 $104,000,000,000 104,000.00
- Yugoslavia yu 1 $159,000,000,000 159,000.00
- Czechoslovakia cs 1,869 $0 0.00
- Soviet Union su 3,145 $0 0.00
- Educational edu 856,234
- Commercial com 774,735
- Government gov 169,248
- Military mil 130,176
- Organization org 66,459
- Networks net 30,993
- US Int'l us 16,556
- International int 315
- Puerto Rico pr 75
- Antarctica aq 4
- Hong Kong hk 9,141 n/a
- Estonia ee 659 n/a
- Latvia lv 180 n/a
- Lithuania lt 53 n/a
-
- n/a GNP figures not available
-
- Sources: Internet hosts: Mark Lottor, Network Wizards,
- GNP figures: Groliers Encyclopedia,
- Ratios: EMMS.
-
- *by permission to Internet Society
-
- ------------------------------
-
- Date: Thu, 13 Aug 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 9--Cu Digest Header Information (last changed 11 Sep '94)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.81
-