home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Sept 27, 1995 Volume 7 : Issue 77
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #7.77 (Wed, Sept 27, 1995)
-
- File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)
- File 2--New Firewalls Book from O'Reilly
- File 3--CIX alternative to InterNIC's registration process.
- File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)
- File 5--COMPUTERS & THE LAW CONFERENCE INFO
- File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 20 Sep 1995 22:59:35 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)
-
- ---------- Forwarded message ----------
-
- From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- The following memo can be found at:
- http://www.state.mn.us/ebranch/ag/memo.txt
-
- As a resident of Minnesota, I have a great concern over how far this
- inturrpretation can go. The AA BBS case seems to be ripe for repeat
- under this, as can any other law that diffes between Minnesota and
- another state. This is bad, IMHO.
-
- I have deleted a small amount of white space, otherwise the memo is exact
- as it appears on the web page.
-
- ================
-
- WARNING TO ALL INTERNET USERS AND PROVIDERS
-
- THIS MEMORANDUM SETS FORTH THE ENFORCEMENT POSITION OF THE
- MINNESOTA ATTORNEY GENERAL'S OFFICE WITH RESPECT TO CERTAIN
- ILLEGAL ACTIVITIES ON THE INTERNET.
-
- PERSONS OUTSIDE OF MINNESOTA WHO TRANSMIT INFORMATION VIA THE
- INTERNET KNOWING THAT INFORMATION WILL BE DISSEMINATED IN
- MINNESOTA ARE SUBJECT TO JURISDICTION IN MINNESOTA COURTS FOR
- VIOLATIONS OF STATE CRIMINAL AND CIVIL LAWS.
-
- The following discussion sets out the legal basis for this
- conclusion.
-
- Minnesota's general criminal jurisdiction statute provides as
- follows:
-
- A person may be convicted and sentenced under the
- law of this State if the person:
-
- (1) Commits an offense in whole or in part within
- this state; or
-
- (2) Being without the state, causes, aids or abets
- another to commit a crime within the state; or
-
- (3) Being without the state, intentionally causes a
- result within the state prohibited by the criminal laws
- of this state.
-
- It is not a defense that the defendant's conduct is
- also a criminal offense under the laws of another state
- or of the United States or of another country.
-
- Minnesota Statute Section 609.025 (1994).
-
- This statute has been interpreted by the Minnesota Supreme
- Court. In State v. Rossbach, 288 N.W.2d 714 (Minn. 1980), the
- defendant appealed his conviction for aggravated assault. The
- defendant, standing inside the border of an Indian Reservation,
- had fired a rifle across the boundary line at a person outside
- the border. The defendant claimed that Minnesota courts did not
- have jurisdiction because his act took place off of Minnesota
- lands. Applying Minnesota Statute { 609.025 and the common law,
- the Minnesota Supreme Court affirmed the conviction, holding that
- the intentional impact within Minnesota land created
- jurisdiction. Id. at 715-16.
-
- The Minnesota Court of Appeals reached a similar result in
- State v. Brown, 486 N.W.2d 816 (Minn. Ct. App. 1992). In Brown,
- the court implicitly found that Minnesota courts had criminal
- jurisdiction over individuals in Iowa who mailed unlicensed
- gambling equipment to Minnesota residents. Id. at 817-18.
-
-
-
-
-
-
- Minnesota courts have applied similar jurisdictional
- principles in civil cases. In State v. Red Lake DFL Committee,
- 303 N.W.2d 54 (Minn. 1981), the Minnesota Supreme Court held that
- state courts had jurisdiction over a committee of the Red Lake
- Indian Tribe which had purchased space for political
- advertisements in a newspaper circulated in the state. At issue
- was whether the committee had to register under state ethical
- practices laws.
-
- The committee argued that it had done nothing outside of the
- reservation, since the transaction with the newspaper took place
- inside the reservation, and the committee did not assist in the
- circulation of the newspaper. In holding that the committee was
- required to register under state ethical practices law, the
- Supreme Court responded to this argument as follows:
-
- Defendants say nothing they did occurred outside the
- reservation, but they choose to ignore that what they
- did caused something to occur beyond the reservation
- boundaries, namely, the dissemination of a political
- message, which is the activity here sought to be
- regulated.
-
- Id. at 56 (emphasis added).
-
- The above principles of Minnesota law apply equally to
- activities on the Internet. Individuals and organizations
- outside of Minnesota who disseminate information in Minnesota via
- the Internet and thereby cause a result to occur in Minnesota are
- subject to state criminal and civil laws.
-
- An Example Of Illegal Activity On The Internet - Gambling
-
- Gambling appears to be an especially prominent aspect of
- criminal activity on the Internet. There are a number of
- services outside of Minnesota that offer Minnesota residents the
- opportunity to place bets on sporting events, purchase lottery
- tickets, and participate in simulated casino games. These
- services are illegal in Minnesota.
-
- Lotteries
-
- A lottery is defined as "a plan which provides for the
- distribution of money, property or other reward or benefit to
- persons selected by chance from among participants some or all of
- whom have given a consideration for the chance of being
- selected." Minnesota Statute Section 609.75, Subdivision 1(a)
- (1994).
-
- Generally, it is unlawful in Minnesota to sell or transfer a
- chance to participate in a lottery. Minnesota Statute Section
- 609.755(2) (1994). It is also unlawful to disseminate
- information in Minnesota about a lottery, except a lottery
- conducted by an adjoining state, with intent to encourage
-
-
- -2-
-
-
-
-
-
- participation therein. Minnesota Statute Section 609.755(3).
- Acts in Minnesota in furtherance of a lottery conducted outside
- of Minnesota are included, notwithstanding its validity where
- conducted. Minnesota Statute Section 609.75, Subdivision 1(c)
- (1994). Violation of these provisions is a misdemeanor,
- punishable by up to 90 days in jail, or a fine of up to $700, or
- both. Minnesota Statute Section 609.755 (1994); 609.02,
- Subdivision 3 (1994). It is a gross misdemeanor under Minnesota
- law to conduct a lottery. Minnesota Statute Section 609.76,
- Subdivision 1(3) (1994). A gross misdemeanor is punishable by up
- to one year in jail, or a $3,000 fine, or both. Minnesota
- Statute Section 609.02, Subdivision 4 (1994).
-
-
-
-
-
-
-
-
- -3-
-
-
-
-
-
- Sports Bookmaking
-
- Sports bookmaking is defined as "the activity of
- intentionally receiving, recording or forwarding within any
- 30-day period more than five bets, or offers to bet, that total
- more than $2,500 on any one or more sporting events." Minnesota
- Statute Section 609.75, Subdivision 7 (1994). Engaging in sports
- bookmaking is a felony, which is punishable by more than one year
- imprisonment. Minnesota Statutes Sections 609.76, Subdivision 2
- (1994); 609.02, Subdivision 2 (1994). Intentionally receiving,
- recording, or forwarding bets or offers to bet in lesser amounts
- is a gross misdemeanor. Minnesota Statute Section 609.76,
- Subdivision 1(7) (1994).
-
- Accomplice Liability
-
- Minnesota's accomplice statute provides that one who
- intentionally aids, advises, counsels, or conspires with another
- to commit a crime is equally liable for that crime. Minnesota
- Statute Section 609.05, Subdivision 1 (1994). Therefore, persons
- or organizations who knowingly assist Internet gambling
- organizations in any unlawful activity may themselves be held
- liable for that unlawful activity. Thus, for example, Internet
- access providers and credit card companies that continue to
- provide services to gambling organizations after notice that the
- activities of the organizations are illegal would be subject to
- accomplice liability.
-
- In addition to being illegal under Minnesota law, the
- Internet gambling organizations appear to violate several
- provisions of the federal law. All of the services appear to
- violate 18 United States Code Section 1084, which prohibits the
- foreign or interstate transmission of bets or wagers or
- information on bets or wagers by use of a wire communication. In
- as much as the Internet gambling organizations involve lotteries,
- they would also appear to violate 18 United States Code Section
- 1301 (prohibiting the "importing or transporting" of lottery
- tickets; 18 United States Code Section 1302 (prohibiting the
- mailing of lottery tickets); and 18 United States Code Section
- 1304 (prohibiting the "broadcasting" of lottery information).
- Sections 1084 and 1301 provide for felony-level penalties, while
- Sections 1302 and 1304 provide for misdemeanor penalties.
-
- Placing A Bet Through Internet Gambling Organizations
-
- Minnesota residents should be aware that it is unlawful to
- make a bet through Internet gambling organizations. Minnesota
- law makes it a misdemeanor to place a bet unless done pursuant to
- an exempted, state-regulated activity, such as licensed
- charitable gambling or the state lottery. Minnesota Statute
- Sections 609.75, Subdivisions 2 - 3; 609.755(1) (1994). The
- Internet gambling organizations are not exempted. Therefore, any
- person in Minnesota who places a bet through one of these
- organizations is committing a crime.
-
-
- -4-
-
-
-
-
-
-
- Minnesota residents should also be aware of forfeiture
- provisions related to unlawful gambling activity. Minnesota
- Statute Section 609.762, Subdivision 1 (1994) provides that the
- following items are subject to forfeiture:
-
- (a) Devices used or intended for use, including
- those defined in section 349.30, subdivision 2, as a
- gambling device, except as authorized in sections 349.11
- to 349.23 and 349.40;
-
- (b) All moneys, materials, and other property used
- or intended for use as payment to participate in
- gambling or a prize or receipt for gambling; and
-
- (c) Books, records, and research products and
- materials, including formulas, microfilm, tapes, and
- data used or intended for use in gambling.
-
- A "gambling device" is defined as "a contrivance which for a
- consideration affords the player an opportunity to obtain
- something of value, other than free plays, automatically from the
- machine or otherwise, the award of which is determined
- principally by chance." Minnesota Statute Section 609.75,
- Subdivision 4 (1994).
-
- Under this definition of "gambling device", a computer that
- is used to play a game of chance for something of value would be
- subject to forfeiture.
-
- Gambling is just one example of illegal activity on the
- Internet. However, the same jurisdictional principles apply with
- equal force to any illegal activity.
-
- Please direct any inquiries regarding this notice, or report
- violations of Minnesota law to the Law Enforcement Section,
- Minnesota Attorney General's Office, Suite 1400, NCL Tower, 445
- Minnesota Street, St. Paul, Minnesota 55101-2131, telephone (612)
- 296-7575..
-
- ------------------------------
-
- Date: Wed, 20 Sep 1995 11:33:36 -0700
- From: Sara Winge <sara@ora.com>
- Subject: File 2--New Firewalls Book from O'Reilly
-
- FOR IMMEDIATE RELEASE
- September 20, 1995
-
- PRESS--FOR REVIEW COPIES, CONTACT: Sara Winge
- 707/829-0515
- sara@ora.com
-
- O'REILLY PUBLISHES GUIDE TO INTERNET FIREWALLS
- New Book Describes Theory and Practice of
- Key Computer Security Technology
-
- SEBASTOPOL, CA--O'Reilly & Associates has released "Building Internet
- Firewalls," a practical guide to protecting computer systems from the
- growing threats to Internet security.
-
- Determined Internet hackers and computer criminals can wreak havoc if
- they break into computer systems that are connected to the Internet.
- Firewalls are an important security tool for responding to this
- threat--they keep damage on one part of the network (e.g.,
- eavesdropping, a worm program, file damage) from spreading to the rest
- of the network. A hardware and/or software solution that restricts
- access from an internal network to the Internet (and vice versa), a
- firewall may also be used to separate two or more parts of a local
- network (for example, protecting finance from R&D). Without firewalls,
- network security problems can rage out of control.
-
- "Building Internet Firewalls" describes a variety of firewall
- approaches and architectures. It discusses Internet threats, the
- benefits of firewalls, overall security strategies, and a summary of
- Internet services and their security risks. In addition, the book
- thoroughly covers the technical aspects of firewall design and
- maintenance, including how to protect the bastion host in a firewall
- configuration, how to build proxying and packet filtering firewalls,
- and how to configure Internet services to operate with a firewall. Its
- appendices include a resource summary, a directory of how to find
- firewall toolkits and other security-related tools, and a detailed
- summary providing TCP/IP background information.
-
- More than a million computer systems are now connected to the
- Internet. Over 100 million email messages are exchanged each day,
- along with countless files, documents, and images. For businesses that
- are striving to be safe on the Net, "Building Internet Firewalls"
- offers a comprehensive guide to the theory and practice of creating
- effective firewalls.
-
- About the Authors
-
- D. Brent Chapman is a consultant in the San Francisco Bay Area,
- specializing in Internet firewalls. He has designed and built Internet
- firewall systems for a wide range of clients, using a variety of
- techniques and technologies. He is also the manager of the Firewalls
- Internet mailing list.
-
- Elizabeth Zwicky is a senior system administrator at Silicon Graphics
- and the president of SAGE (the System Administrators Guild). She has
- been involuntarily involved in Internet security since before the
- Internet worm.
-
- # # #
-
- Building Internet Firewalls"
- By D. Brent Chapman & Elizabeth D. Zwicky
- 1st Edition September 1995
- 544 pages, ISBN: 1-56592-124-0, $29.95
-
- ------------------------------
-
- From: Stanton McCandlish <mech@EFF.ORG>
- Date: Mon, 18 Sep 1995 19:09:29 -0400 (EDT)
- Subject: File 3--CIX alternative to InterNIC's registration process.
-
- CIX has put out a white paper on overhauling the domain registration &
- routing system of the US portion of Internet. Some of it sounds OK, most
- of it does not sound any better than InterNIC's announcement that it'll
- start charging for domain names. Some of it's downright strange, and
- inspires some concern in me. Particular this section:
-
- **********
- Domain registration will be open to anybody but subject to several
- restrictions to minimize abuse, i.e., acquisition of trademarked
- names. Domains registration will require submittal of a taxpayer
- identification number followed by hard copy submittal of company
- letterhead and notary certification. Trademark disputes will not be
- settled by the CIX but between parties in the appropriate legal forum.
- Domain registration will require a one time fee and a yearly
- maintenance fee.
- **********
-
- That's right. No domains for any entity that is not a corporation with a
- letterhead, no domain if you aren't willing to send a bunch of notarized
- snail mail, no domain if you are not willing to have your Social Security
- Number tied to your domain registration, no domain if you're not a US
- citizen with a Soc. Security Number in the first place. All this of course
- directly contradicts the opening statement that domain registration is
- available to "anybody".
-
- The document says the registration process is "in realtime", whatever
- that means. The implication is that it'll be immediate, and faster than
- InterNIC. Somehow I have a hard time reconciling this with the
- requirement for snailmailed paperwork.
-
- Fortunately, this remains just a proposal.
-
- The full text of this item is at:
-
- CIX Registry Services Strategy White Paper
- http://www.cix.org/Reports/registry.html
-
- ------------------------------
-
- Date: Tue, 26 Sep 1995 22:38:50 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)
-
- ---------- Forwarded message ----------
-
- Update --- Cult Internet Censorship in Norway
- =============================================
-
-
- News Release - 24th September 1995
-
- On Thursday, 21st of September, news broke of another cult attempting
- to silence its critics with the closing down of a student's account
- at the Univeristy of Bergen, Norway. Within hours, this action had
- been reported worldwide and many representations made by e-mail; the
- staff responsible at the University have peddled various alternative
- stories to those concerned net.citizens who wrote in protest. To set
- the story straight and to record his gratitude for the enormous support
- he has received, the student at the center of the affair, Mr Jan
- Steinar Haugland, has released the following statement:
-
- <beginning of statement>
-
- In the autumn of 1993, when I was a Jehovah's Witness [JW], I met a
- fellow Witness at a pub. His name was Kenneth Hostland, and I was
- delighted to discover that he was a real Internet expert. I told him
- about several JW resources that I had found on the Internet, such as
- the "Friends" mailing list.
-
- I had an email account at NHH, the Business School in Bergen, but at
- the time the computing department there had closed all Internet access
- except email and gopher, believing this would help them avoid viruses.
- Kenneth said that since I was a student, I could get a less restricted
- account at the University of Bergen (UiB).
-
- The University and the NHH Business School are closely related. NHH
- uses the University's computing facilities. If you are matriculated at
- NHH, you can study at the University. Because of this close
- connection, I decided to accept Kenneth Hostland's kind offer. I
- dropped by his office, where he filled out a paper form. I signed it
- and I was apparently officially authorized to have an account.
-
- In the spring of 1995, after wrestling with many disturbing questions
- about JW doctrine, I came to the conclusion I could no longer be a
- Jehovah's Witness. I was finally disfellowshiped (excommunicated) for
- not believing the 90-year-old JW teaching about the significance of
- the year 1914. Ironically, the very teaching I disagreed with was
- recently rejected by the Governing Body of Jehovah's Witnesses. The
- doctrinal reversal was announced to the Witnesses this month
- (September 1995) in their official publication, the WatchTower.
-
- When you are disfellowshipped, all Jehovah's Witnesses are instructed
- to shun you. Their leaders say that you deserve nothing less than
- "complete hatred." (Watchtower, 1 Oct 1993, page 18)
-
- My interest in the Witnesses continued, however. From time to time, I
- posted material on the Internet that was critical of JW doctrine. I
- also posted quotes from old Watchtower publications which demonstrated
- a history of failed predictions and doctrinal "adjustments". These
- were no doubt embarassing to the Witnesses, who believe that the
- Watchtower organization is God's sole channel of information to the
- world.
-
- Kenneth Hostland, who was still a loyal Witness, decided to terminate
- the account he had set up for me. Even though I was now a student at
- the University, and had submitted the proper University paperwork to
- secure my access, Hans Morten Kind <kind@edb.uib.no> was instructed to
- cancel my account.
-
- When Kenneth Hostland first set up my account, I had no idea that
- getting an account through the University was more difficult than the
- studies themselves! The procedure was simpler at the NHH Business
- School; students automatically got an account. They didn't even have
- to ask.
-
- After my account was removed (September 21st, 1995), a number of
- concerned individuals spread the news on Usenet groups and other
- forums. Those who sent inquiries to the computing department were told
- that my objections were "pure nonsense". Mr. Kind and Mr. Hostland
- later claimed that this was simply a technical matter, involving the
- cleaning up of accounts. Later still, they appealed to rules and
- regulations at the University, saying that the account had been set up
- improperly.
-
- Their inconsistent and evasive replies to questions about this matter
- lead me to only one conclusion: if I had stayed a Jehovah's Witness,
- my account would not have been cancelled. I am certain it was removed
- because I was critical towards the Watchtower Society, the multi-
- billion dollar corporation that uses Jehovah's Witnesses to spread
- their gospel.
-
- Most censorship is done without actually breaking any laws. For
- example, a newspaper has no legal duty to let all sides of a case be
- heard. Yet, if they do not, they practice censorship. This practice
- can be dangerous to democracy and freedom of speech, even when it is
- technically legal.
-
- The individuals responsible can provide credible excuses for their
- actions; they have done nothing illegal. But it is still censorship.
- Fortunately, even in cases of "legal" censorship, we all have the
- right to protest. Thanks to the global stage of the Internet, I am
- able to tell the world: I was taken off the Internet because of my
- beliefs.
-
- I believe that what they did is offensive to the Internet community,
- where free speech is accorded the highest value. We all know that the
- next time, censorship may hit someone who can not obtain another
- account.
-
- When you join in the protest directed at these individuals, you
- demonstrate that the Internet community cares about censorship. Things
- like this may happen again, but perhaps next time, the malicious
- system administrator will remember how people rose up in protest, and
- decide it isn't worth the trouble.
-
- Mr. Kind is publicly calling me a liar, though it appears that he has
- not read a single public statement I have made. He does not cite any
- specifics; he simply says I am lying.
-
- Before the protest gathered steam, Mr. Kind supported Mr. Hostland.
- Now, however, his replies to protesters (apparently auto-mailed) claim
- that my account was illegal from the start. This change of position
- indicates that the protest is producing results. But I still do not
- have my original account. For justice to be done, I need your support.
-
- My sincerest thanks you to all.
-
- Jan S. Haugland
- jansh@telepost.no
-
- <end of statement>
-
- However, the efforts of this cult to silence all dissidence continues
- apace. Cult members themselves have been warned in an internal bulletin
- this September of the dangers of on-line participation; immediately
- following this many loyal cultists dropped out of religion forums on
- the major on-line services, web sites were taken off or emptied of
- content, and of the two main cult internet mailing lists, one
- ("friends-chat") was closed down, and the other ("friends-all") began
- strict moderation of mail. A classic cult pattern of information control.
-
- Cultists are not, alas, satisfied with self-censorship and a new campaign
- has begun to harass postmasters - including the Finnish anon-server
- administrator who has been a previous target - and SysOps of on-line
- services with the aim of closing down internet accounts of those who dare
- to utter a dissident voice in defiance of the supposed God-given authority
- of their ruling council in Brooklyn, NY. The postmaster of one of Norway's
- independent Internet providers, telepost.no, has resisted the mail-bombing
- by cult members in defense of his customers right to free speech - however
- there are reports this weekend that ex-cult members on other Internet
- service providers may also have had their accounts closed or suspended.
-
- These are independent individuals of limited means and influence, faced
- with a multi-billion dollar multinational corporation and millions of
- loyal followers taught to shun and hate anyone who dares impede their
- business or uncover what they prefer to keep covered-up. Your support is
- needed *now* to help protect internet freedoms of speech for *everyone* -
- there are many other powerful corporations and governments, ready to
- follow up such a trend of repression if the cults are able to do so with
- impudence. If the first window is left broken, all the rest will follow.
-
- TowerWatch
-
- -----------------------------------------------------------
- "Give me the liberty to know, to utter, and to argue freely according to
- conscience, above all liberties" - John Milton
- -----------------------------------------------------------
-
- CopyLeft 1995, TowerWatch
- <end of press release>
-
- ------------------------------
-
- Date: Mon, 18 Sep 1995 14:07:38 -0400 (EDT)
- From: John <john@SUG.ORG>
- Subject: File 5--COMPUTERS & THE LAW CONFERENCE INFO
-
- SUN USER GROUP
- Second Annual Technical Symposium
- "Computers & The Law"
- November 12-15, 1995
- Tampa, FL
-
- As computers are utilized in more and more aspects of everyday life,
- the once distinct areas of technology, legislature, and law
- enforcement draw closer together. This unique technical conference
- provides a forum in which members of these three fields can meet to
- share experiences and ideas. The four day technical program (a day of
- tutorials, two days of talks, and another day of tutorials) will
- provide you with essential knowledge, whether your field is technical,
- legal, or law enforcement.
-
- More detailed information of this symposium are available via email at
- conference@sug.org or on the World Wide Web at http://sug.org.
-
- If you have further questions, contact the Sun User Group at
- (617)232-0514.
-
-
- +-----------------------------------------------------------------------+
- | IMPORTANT DATES TO REMEMBER: |
- | Early-bird Savings Deadline: October 13, 1995 |
- | Registrations must be received at the Sun User Group offices |
- | by October 13, 1995 to be eligible for Early-bird savings |
- | |
- | Hotel Discount Reservation Deadline: October 21, 1995 |
- +-----------------------------------------------------------------------+
-
-
- CONFERENCE OVERVIEW:
-
- SUNDAY, November 12, 1995 - TUTORIAL PROGRAM
- MONDAY, November 13, 1995 - TECHNICAL SESSIONS
- TUESDAY, November 14, 1995 - TECHNICAL SESSIONS
- WEDNESDAY, November 15, 1995 - TUTORIAL PROGRAM
-
- TUTORIALS:
- ----------
- The SUG Tutorial Program brings experienced training professionals to
- you. Courses are presented by skilled teachers who are hands-on
- experts in their topic areas. The tutorials will cover a variety of
- topics relating to Sun/SPARC and x86-based machines, running any of a
- number of operating systems.
-
- Those who attend the tutorials will benefit from this unique
- opportunity to develop essential skills in a unique combination of
- UNIX system security, ethical, and legal topics.
-
- The tutorial program at Tampa is divided into two days, with both
- full- and half-day tutorials offered. Attendees may select any
- non-overlapping set of classes. To ensure adequate seating and to
- reduce crowding, we are requiring that registrants pre-register for
- specific classes. Please note that some prior knowledge is required
- for the advanced tutorials.
-
- SUG's tutorial program is always in demand, and some tutorials are
- almost guaranteed to sell out before registration closes. Attendance
- is limited, and pre-registration is strongly recommended. On-site
- registration is possible ONLY if space permits.
-
- Sunday, November 12, 1995 Tutorials
- -----------------------------------
-
- S1 - 9:00am-5:00pm
- Basics of Unix Security
- Peter Galvin, Corporate Technologies, Inc.
-
- S2 - 9:00am-5:00pm
- System Administrator Liability
- Edward A. Cavazos
-
- Wednesday, November 15, 1995 Tutorials
- -----------------------------------
-
- W1 - 9:00am-5:00pm
- Firewalls and Internet Security
- Rik Farrow, Consultant
-
- W2a - 9:00pm- 12:30pm
- Network Intrusions
- John Smith, Computer Crime Unit, Santa Clara County District
- Attorney's Office
-
- T2b - 1:30pm-5:00pm
- Ethics and Systems Administration
- S.Lee Henry, Johns Hopkins University
-
-
- KEYNOTE SPEAKERS:
- -----------------
-
- The Sun User Group keynote sessions are topical and informative --
- speakers you won't hear at any other conference!
-
- Ken Geide, Chief, FBI Economic Espionage Unit
- "Economic Espionage in the USA"
- Monday, November 13, 9 a.m. - 10:30 a.m.
-
- Mike Godwin, Staff Counsel, The Electronic Frontier Foundation
- Tuesday, November 14, 9 a.m. - 10:30 a.m.
-
- Randal L. Schwartz, Stonhenge Consulting Services
- "Just another convicted Perl hacker"
- Tuesday, Nov 14, 4:30 p.m. - 5:30 p.m.
-
-
- TECHNICAL SESSIONS (Monday, November 13 & Tuesday, November 14):
- -------------------------------------------------------------------
-
- "Computers & The Law" features three distinct parallel tracks of talks:
- Technical; Legal; and Law Enforcement.
-
- The TECHNICAL track will focus on nuts and bolts of
- maintaining a UNIX or Sun system. These talks will cover the
- all of the newest developments in the changing world
- of technology. There are talks from the experts on: UNIX and
- network security; encryption; software distribution in a
- client/server environment; firewalls.
-
- The LEGAL track will cover up-to-date issues of privacy and
- morality, as well as in-depth examinations of the current and
- changing laws pertaining to software and hardware. Legal
- professionals from all over the country will examine how
- changing technologies will necessitate changes in the law.
-
- The LAW ENFORCEMENT track discusses computers as tools. Tools
- which can help in the prevention of crimes -- or in the
- commission of them. Join or experts in high-tech crime as the
- discuss the discovery, investigation, apprehension, and
- prosecution of crackers, software pirates, and bandits on the
- information on the information superhighway.
-
- SPECIAL FEATURES:
-
- "The Future of Computer Crime, A Panel"
-
- "Unix Security Tools Workshop"
- Peter Galvin, Corporate Technologies, Inc.
-
- The Great Debate: Round 2
- "Can Existing Laws Be Applied To Cyberspace?"
-
-
- RECEPTION Sponsored by our friends at SunExpress!
- ---------
- You are invited to join in the fun, mingle with old and new friends,
- and enjoy the plentiful hors d'oeuvres and beverages. The Sun User
- Group Reception is Monday, November 13, from 6:00-8:00pm at the
- Conference hotel. The Reception is included in the technical sessions
- registration fee. Additional Reception tickets may be purchased for a
- nominal fee at the conference.
-
-
- THE SUN USER GROUP
- ------------------
- The Sun User Group (SUG) brings people together to share information
- and ideas about using Sun/SPARC equipment. You can discover new ways
- to save time and money in the pages of _Readme_. You can get quick
- answers to important questions on our electronic mailing list. At our
- seminars you can learn more about the capabilities of your
- workstation. At our conferences, you can meet other people who are
- doing progressive and innovative work with their Sun/SPARC equipment.
-
- Now is a better time than ever to join the Sun User Group. We're
- reorganized, reinvented and growing every day. We've recently
- introduced exciting new services specifically for our official LUGs.
- Our members-only electronic mailing list has become one of the most
- popular routes on the information highway. Our annual conferences
- feature respected teachers - from Sun Microsystems as well as many
- other areas of the industry.
-
- REGISTRATION INFORMATION AND FEES
- ---------------------------------
-
- CONTACT SUG AT office@sug.org FOR A REGISTRATION FORM TODAY!!!
-
- +-------------------------------------------------------------------+
- | Sun User Group members save $50.00! |
- +-------------------------------------------------------------------+
- +-------------------------------------------------------------------+
- | Earlybird Bonus! Register before October 13, 1995 and |
- | save $100.00 *plus* get the Sun User Group "Security" |
- | CD-ROM for FREE -- a $195 savings if you register by |
- | October 13, 1995! |
- +-------------------------------------------------------------------+
-
-
- More detailed information of this symposium are available via email at
- conference@sug.org or on the World Wide Web at http://sug.org.
-
- If you have further questions, contact the Sun User Group at
- (617)232-0514.
-
- For more information please call (617) 232-0514.
-
- SUG Symposium
- 1330 Beacon Street, Suite 344
- Brookline, MA 02146
- USA
-
- Email: registration@sug.org Fax: (617) 232-1347
-
- You may also register over the telephone with a Master Card or Visa.
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.77
- ************************************
-
-