home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Oct 9, 1996 Volume 8 : Issue 72
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.72 (Wed, Oct 9, 1996)
- File 1--Boy May Have Killed Self, Mom Over Internet Bills
- File 2--Global online intellectual property conf at American Univ
- File 3--Stealth Attack in Budget Bill
- File 4--The WEB Magazine: The Party's Over: Another Perspective
- File 5--Wiretap In the Night (CyberWire Dispatch)
- File 6--Cyberspace Free Speech Law for Non-Lawyers
- File 7--Book review: "Computer Virus Supertechnology 1996"
- File 8--Jim Thomas Thursday at HotWired
- File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 3 Oct 1996 06:31:37 -0700 (PDT)
- From: Declan McCullagh <declan@eff.org>
- Subject: File 1--Boy May Have Killed Self, Mom Over Internet Bills
-
- Boy May Have Killed Self, Mom Over Internet Bills
- 10:14am EDT, 10/2/96
-
- CHICAGO, (Reuter) - A 12-year-old Missouri boy may have
- killed his mother and himself in a dispute over Internet-related
- telephone bills, police said Tuesday.
- The bodies of Ann Hoffman, 42, and her son Brad were found
- in their California, Missouri, home last week. She had been shot
- six times and the boy died of one shot to his head. A gun was
- found near his body.
- The Moniteau County Sheriff's Office near where the family
- lived in central Missouri said the boy's telephone bills from an
- online provider service ran into hundreds of dollars a month. It
- said the boy's father, who was divorced from Hoffman, had met
- with his son and ex-wife last week to discuss the bills.
- Sheriff Kenny Jones also said he was investigating a report
- that the boy had chatted over the Internet with a girl in Mexico
- last month telling her that he was contemplating suicide.
-
- ------------------------------
-
- Date: Mon, 7 Oct 1996 21:05:09 -0700 (PDT)
- From: Declan McCullagh <declan@well.com>
- Subject: File 2--Global online intellectual property conf at American Univ
-
- Folks in the DC area might want to stop by this free conference on
- intellectual property next week at American University. I'll be giving
- the closing remarks; Mike Nelson from the White House will be
- presenting the opening statement.
-
- -Declan
-
- ---------- Forwarded message ----------
-
- All who are interested are invited to attend a conference . . .
-
- The 1996 Conference of American University's
- Global Intellectual Property Project
-
- OWNERSHIP ON-LINE:
- INTELLECTUAL PROPERTY IMPLICATIONS OF
- THE GLOBAL INFORMATION INFRASTRUCTURE
-
- October 16, 1996
- 1:00-6:00 pm
- Husghes formal Lounge
- American University
- 4400 Massachusetts Ave., NW
- Washington, DC 20016-8071
-
- Free and Open to the Public
-
- Opening Session:
- Michael R. Nelson
- Special Assistant for Information Technology
- White House Office of Science and Technology
-
- Panel 1:
- Where are we and how did we get here?
- Panel 2:
- Where are we going?
-
- Closing Session:
- Declan McCullagh, HotWired
-
- Participants Include:
- David Holtzman, IBM's inforMarket
- Theodore Henke, Atlantic Mutual Insurance Companies
- Adam Eisgrau, American Library Association
- Elizabeth Blumenfeld, America On-Line
- Chris Meyer, Meyer and Klipper (formerly of the Patent and
- Trademark Office)
- Carsten Fink, World Bank
- Edward Comor, American University
- James Boyle, American University
- Peter Jaszi, American University
- Edward Malloy, Department of State
- Manuel Gameros, Mexican Finance Ministry
-
- Organizing Committee:
-
- Erran Carmel, American University
- Carole Ganz-Brown, American University and National Science Foundation
- Renee Marlin-Bennett, American University
-
- Conference Sponsors:
-
- American University
- Atlantic Mutual Companies
-
- Visit our Website, under construction, but with updated information, at:
- http://gurukul.ucc.american.edu/MOGIT/glipp96.htm
-
- or call: 202-885-1843
-
- ------------------------------
-
- Date: Thu, 03 Oct 1996 09:48:20 +0100
- From: Glenn Hauman <hauman@bb.com>
- Subject: File 3--Stealth Attack in Budget Bill
-
- >From this morning's NYT CyberTimes. Links to the Bill text are already
-
- there. Great job, Pam:
-
- New Digital Child Porn Law In Budget Bill
-
- By PAMELA MENDELS
-
- A little-known corner of the huge government budget bill passed on
- Monday was legislation that updates child pornography statutes by
- banning computer-generated depictions of children engaging in sexual
- conduct.
-
- The new law was quickly attacked by free speech
- advocates who say that it undermines First Amendment
- protections and is so broad that it could make sex scenes
- from movies in which adults portray teen-agers legally
- suspect.
-
- [...]
-
- But the new law, the Child Pornography Prevention Act of 1996, would
- expand the
- definition of illegal child pornography to include images not
- necessarily based on a real child. Among other things, the act,
- introduced by Senator Orrin Hatch, the Utah Republican who chairs the
- Judiciary Committee, outlaws "any visual depicition, including any
- photograph, film, video image or picture . . . where . . . such visual
- depiction is, or appears to be, of a minor engaging in sexually explicit
- conduct."
-
- [...]
-
- Bruce A. Taylor, president and chief counsel of the National Law Center
- for Children and Families, a Fairfax, Va.,-based anti-pornography group
- that supports the new law, said: "Congress has moved from seeing child
- pornography as a crime scene of yesterday's child abuse. It is also a
- tool for tomorrow's molestation. In other words, pedophiles look at
- child pornography and become incited to molest children, and pedophiles
- show those pictures to children to seduce them into imitating the
- pictures."
-
- ------------------------------
-
- Date: Thu, 3 Oct 1996 04:57:15 -0700 (PDT)
- From: Declan McCullagh <declan@well.com>
- Subject: File 4--The WEB Magazine: The Party's Over: Another Perspective
-
- ---------- Forwarded message ----------
- Date--Wed, 02 Oct 96 16:05:45 PST
- From--spencer_ante@PCWorld.com
-
- Hey Declan,
-
- Como estas?
-
- This is an article I wrote for the premiere issue of The WEB Magazine,
- where I'm editing the politics section (and the Web site;
- www.webmagazine.com). It offers an alternative perspective to
- Chapman's LA Times article. One of the many problems with Chapman's
- article is his misreading of the youth vote, which has been shown to
- lean towards third-party candidates. He also overlooks the fact that
- people are for the first time *already* registering to vote online,
- which has the potential to upset the ossified two-party system.
-
- Feel free to redistribute.
-
- cheers,
-
- Spencer
-
- ------------
- Copyright The WEB Magazine, 1996
-
-
- By Spencer E. Ante
-
- The Party's Over
-
- The Net is going to remake the face of politics in America, but not
- the way you might think. Cocktail-party pundits foresee a brave new
- digital nation in which the Net has rendered representative
- government obsolete. For their part, online activists predict the
- rise of "desktop democracy" as people register-and one day vote-from
- their home computers (see "The Online Ballot Box"). But such
- prognostications are so heavy on theory and light on spe-cifics that
- it's hard to gauge what will really happen as the heartland comes
- kicking and screaming into the Information Age.
-
- Then again, Ray Wolfinger of UC Berkeley may know. The 65-year-old
- political science professor doesn't have e-mail and doesn't surf the
- Web (he says his "life was fully formed before the Internet"), but
- his research on the 1993 federal "motor-voter" law may foretell the
- next stage of U.S. electoral politics. Officially named the National
- Voter Registration Act (NVRA), motor-voter was signed into law after
- a four-year-long partisan foodfight in Congress. Besides instituting
- a universal voter registration form, it mandates that states permit
- their citizens to register when they apply for a driver's license,
- welfare benefits, or other government services.
-
- Though NVRA began as a bipartisan bill (with Newt Gingrich as a
- cosponsor), GOP leaders later withdrew their support, citing the
- potential for fraud but really fearing that greater public
- participation would be a bonanza for the Democrats. As it turned
- out, the Republicans may have been looking for monsters in the wrong
- closet.
-
- Wolfinger found that motor- voter legislation is most likely to
- increase registration for people under 30-the same population most
- likely to be online. Therein lies the rub: Politically alienated
- twenty-somethings have weaker party identifications than do older
- voters, Wolfinger says, which makes them more inclined than their
- elders to vote for third-party candidates. In the 1992 election, for
- example, Ross Perot won 28% of the under-30 vote, his best showing
- among all age groups. "The most obvious beneficiary of higher
- turnout by young people," Wolfinger writes, "would be almost any
- third-party candidate."
-
- That's where the Net comes in. In spirit and demographics, the
- online population resembles the sweaty mosh pit of a rock concert,
- which explains why Rock the Vote (http://netvote96.mci.com/)
- recently opened shop on the Web. Jointly sponsored by Rock the Vote
- and MCI, NetVote '96 represents the nation's first online voter
- registration program; and like motor-voter, it is designed to
- increase political participation by weaving registration into the
- course of everyday life.
-
- "Our goal is to take voting registration to where the kids live,"
- says Mark Strama, the 28-year-old program director of Rock the Vote.
- "We've gone to concerts, campuses, and movie theaters. With so many
- people using the Net these days, it just made sense to move into
- cyberspace." To date, NetVote '96, which launched in April, has
- registered more than 21,000 young adults. The numbers involved
- aren't staggering, but they certainly point to the program's
- tremendous potential. "I assume that most people aren't interested
- in politics," Wolfinger says. "So when you surf the Internet and
- it's pretty painless, this may provide you with the impetus to
- register."
-
- Motor-voter may have been a struggle to enact, but members of both
- parties in Congress have voiced support for NetVote '96. In
- particular, Congressional Internet Caucus cofounders Rep. Rick White
- (R-WA) and Senator Patrick Leahy (D-VT) have applauded it as a
- democratic initiative. Perhaps they shouldn't be so hospitable. By
- embracing registration reform and the new technologies that bolster
- it, Congressional innovators may be creating their own
- Frankenstein's monster. But it will take a lot more than a stellar
- Web campaign to break down the doors of the White House.
-
- Spencer E. Ante is editor of Web Central Station, the online home of
- THE WEB Magazine. Send your comments and questions to
- politics@webmagazine.com.
-
- ------------------------------
-
- Date: Thu, 26 Sep 1996 16:32:01 -0700 (PDT)
- From: Declan McCullagh <declan@well.com>
- Subject: File 5--Wiretap In the Night (CyberWire Dispatch)
-
- CyberWire Dispatch // September // Copyright (c) 1996 //
-
- Jacking in from the "Smoked Filled Room" Port:
-
- Washington, DC -- Federal provisions funding the digital telephony bill
- and roving wiretaps, surgically removed earlier this year from an
- anti-terrorism bill, have quietly been wedged into a $600 billion
- omnibus spending bill.
-
- The bill creates a Justice Department "telecommunications carrier
- compliance fund" to pay for the provisions called for in the digital
- telephony bill, formally known as the Communications Assistance in Law
- Enforcement Act (CALEA). In reality, this is a slush fund.
-
- Congress originally budgeted $500 million for CALEA, far short of the
- billions actually needed to build in instant wiretap capabilities into
- America's telephone, cable, cellular and PCS networks. This bill now
- approves a slush fund of pooled dollars from the budgets of "any
- agency" with "law enforcement, national security or intelligence
- responsibilities." That means the FBI, CIA, NSA and DEA, among
- others, will now have a vested interest in how the majority of your
- communications are tapped.
-
- The spending bill also provides for "multipoint wiretaps." This is the
- tricked up code phase for what amounts to roving wiretaps. Where the
- FBI can only tap one phone at a time in conjunction with an
- investigation, it now wants the ability to "follow" a conversation from
- phone to phone; meaning that if your neighbor is under investigation and
- happens to use your phone for some reason, your phone gets tapped. It
- also means that the FBI can tap public pay phones... think about that
- next time you call 1-800-COLLECT.
-
- In addition, all the public and congressional accountability provisions
- for how CALEA money was spent, which were in the original House version
- (H.R. 3814), got torpedoed in the Senate Appropriations Committee.
-
- Provisions stripped out by the Senate:
-
- -- GONE: Money isn't to be spent unless an implementation plan is sent
- to each member of the Judiciary Committee and Appropriations committees.
-
- -- GONE: Requirement that the FBI provide public details of how its new
- wiretap plan exceeds or differs from current capabilities.
-
- -- GONE: Report on the "actual and maximum number of simultaneous
- surveillance/intercepts" the FBI expects. The FBI ran into a fire storm
- earlier this year when it botched its long overdue report that said it
- wanted the capability to tap one out of every 100 phones
- *simultaneously*. Now, thanks to this funding bill, rather than having
- to defend that request, it doesn't have to say shit.
-
- -- GONE: Complete estimate of the full costs of deploying and
- developing the digital wiretapping plan.
-
- -- GONE: An annual report to Congress "specifically detailing" how all
- taxpayer money -- YOUR money -- is spent to carry out these new wiretap
- provisions.
-
- "No matter what side you come down on this (digital wiretapping) issue,
- the stakes for democracy are that we need to have public accountability,"
- said Jerry Berman, executive director of the Center for Democracy and
- Technology.
-
- Although it appeared that no one in congress had the balls to take on
- the issue, one stalwart has stepped forward, Rep. Bob Barr (R-Ga.). He
- has succeeded in getting some of the accountability provisions back into
- the bill, according to a Barr staffer. But the fight couldn't have been
- an easy one. The FBI has worked congress relentlessly in an effort to
- skirt the original reporting and implementation requirements as outlined
- in CALEA. Further, Barr isn't exactly on the FBI's Christmas card list.
- Last year it was primarily Barr who scotched the funding for CALEA
- during the 104th Congress' first session.
-
- But Barr has won again. He has, with backing from the Senate, succeeded
- in *putting back* the requirement that the FBI must justify all CALEA
- expenditures to the Judiciary Committee. Further, the implementation
- plan, "though somewhat modified" will "still have some punch," Barr's
- staffer assured me. That includes making the FBI report on its
- expected capacities and capabilities for digital wiretapping. In other
- words, the FBI won't be able to "cook the books" on the wiretap figures
- in secret. Barr also was successful in making the Justice Department
- submit an annual report detailing its CALEA spending to Congress.
-
- However, the funding for digital wiretaps remains. Stuffing the funding
- measures into a huge omnibus spending bill almost certainly assures its
- passage. Congress is twitchy now, anxious to leave. They are chomping
- at the bit, sensing the end of the 104th Congress' tortured run as the
- legislative calender is due to run out sometime early next week. Then
- they will all literally race from Capitol Hill at the final gavel,
- heading for the parking lot, jumping in their cars like stock car
- drivers as they make a made dash for National Airport to return to their
- home districts in an effort to campaign for another term in the loopy
- world of national politics.
-
- Congress is "going to try to sneak this (spending bill) through the back
- door in the middle of the night," says Leslie Hagan, legislative
- director for the National Association of Criminal Defense Lawyers. She
- calls this a "worst case scenario" that is "particularly dangerous"
- because the "deliberative legislative process is short-circuited."
-
- Such matters as wiretapping deserve to be aired in the full sunlight of
- congressional hearings, not stuffed into an 11th hour spending bill.
- This is legislative cowardice. Sadly, it will most likely succeed.
-
- And through this all, the Net sits mute.
-
- Unlike a few months ago, on the shameful day the Net cried "wolf" over
- these same provisions, mindlessly flooding congressional switchboards
- and any Email box within keyboard reach, despite the fact that the
- funding provisions had been already been stripped from the
- anti-terrorism bill, there has been no hue-and-cry about these most
- recent moves.
-
- Yes, some groups, such as the ACLU, EPIC and the Center for Democracy
- and Technology have been working the congressional back channels,
- buzzing around the frenzied legislators like crazed gnats.
-
- But why haven't we heard about all this before now? Why has this bill
- come down to the wire without the now expected flurry of "alerts"
- "bulletins" and other assorted red-flag waving by our esteemed Net
- guardians? Barr's had his ass hanging in the wind, fighting FBI
- Director Louis "Teflon" Freeh; he could have used some political cover
- from the cyberspace community. Yet, if he'd gone to that digital well,
- he'd have found only the echo of his own voice.
-
- And while the efforts of Rep. Barr are encouraging, it's anything from a
- done deal. "As long as the door is cracked... there is room for
- mischief," said Barr's staffer. Meaning, until the bill is reported
- and voted on, some snapperhead congressman could fuck up the process yet
- again.
-
- We all caught a bit of a reprieve here, but I wouldn't sleep well. This
- community still has a lot to learn about the Washington boneyard.
- Personally, I'm a little tired of getting beat up at every turn. Muscle
- up, folks, the fight doesn't get any easier.
-
- Meeks out...
-
- ------------
-
- Declan McCullagh <declan@well.com> contributed to this report.
-
- ------------------------------
-
- Date: Fri, 4 Oct 1996 15:25:37 PST
- From: Eugene Volokh <VOLOKH@law.ucla.edu>
- Subject: File 6--Cyberspace Free Speech Law for Non-Lawyers
-
- PLEASE FEEL FREE TO FORWARD
-
- The Cyberspace Law for Nonlawyers free e-mail seminar (now at
- over 17,000 subscribers) is about to start its Free Speech unit. If
- you've ever wanted to brush up on the constitutional law of free
- speech, especially as it applies to cyberspace, this is your chance.
- To subscribe, send a message with the text
-
- SUBSCRIBE CYBERSPACE-LAW Yourfirstname Yourlastname
-
- to
-
- LISTSERV@PUBLISHER.SSRN.COM
-
-
- * The seminar is aimed at educated laypeople, not primarily at
- lawyers. Low on legalese and Latin.
-
- * This is a low-traffic distribution list, NOT a discussion
- list. Subscribers will get one message (a few paragraphs
- long) every few days.
-
- * The seminar is co-authored by
- Prof. Larry Lessig, University of Chicago Law School
- Prof. David Post, Georgetown University Law Center
- Prof. Eugene Volokh, UCLA School of Law
-
- Larry Lessig clerked for U.S. Supreme Court Justice Antonin
- Scalia, and now teaches constitutional law and the law of
- cyberspace. He's written about law and cyberspace for the
- Yale Law Journal and the University of Chicago Legal Forum
- (forthcoming).
-
- David Post practiced computer law for six years, then clerked
- for U.S. Supreme Court Justice Ruth Bader Ginsburg, and now
- teaches constitutional law, copyright law, and the law of
- cyberspace. He's written about law and cyberspace for the
- University of Chicago Legal Forum (forthcoming) and the Journal
- of Online Law, and writes a monthly column on law and
- technology issues for the American Lawyer.
-
- Eugene Volokh worked as a computer programmer for 12 years,
- and is still partner in a software company that sells the
- software he wrote for the Hewlett-Packard Series 3000. He
- clerked for U.S. Supreme Court Justice Sandra Day O'Connor, and
- now teaches constitutional law and copyright law. He's written
- about law and cyberspace for the Yale Law Journal, Stanford Law
- Review, Michigan Law Review, and the University of Chicago
- Legal Forum (forthcoming).
-
-
- -- Eugene Volokh, UCLA Law
-
- ------------------------------
-
- Date: Tue, 2 Oct 1996 20:13:34 -0500 (CDT)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 7--Book review: "Computer Virus Supertechnology 1996"
-
- Mark Ludwig's "Computer Virus Supertechnology 1996" (American
- Eagle, ISBN 0-929408-16-0) radically ups the ante for those
- interested in learning how to write computer viruses. At $395.00
- for about 200 pages, Ludwig has pitched it predominantly to repeat
- customers of American Eagle, would-be information warriors at
- Pentagon think tanks like Science Applications or MITRE Corp., the
- libraries of computer security organizations and a handful of
- eccentrics with too much discretionary cash and time on their hands.
- It's an effective sales strategy and, I imagine, covers just about
- the entire audience for the book in the United States and a handful
- of other countries.
-
- In direct contrast to his $12.95 underground bestseller "The Little
- Black Book of Computer Viruses," Ludwig only has to sell a few
- hundred copies of "CVS1996" to make a substantial return on investment.
- Printed in a run of 500, Ludwig claims to have already sold 60 percent
- of the lot. By the time you are reading this review, presumably
- "Computer Virus Supertechnology" will be about sold out.
-
- "CVS1996" focuses on writing viruses that infect Windows95 programs.
- It includes on its companion diskette the first one written, called
- Boza/Bizatch, which was originally published by the Australian
- virus-writing group, VLAD. Boza never made it into general circulation.
- And since its publication -- despite a spurt of crazy stories about
- in the mainstream media -- the current crop of virus writers, in
- general, have shown very little interest or ability in turning out
- the same hordes of trivial viruses for the new operating system as
- is the case with DOS.
-
- Ludwig says this is because the vast majority of virus writers
- write their programs as a sort of casual hobby. They lack the
- ability or the patience to crunch the internals of Windows 95
- code to the extent required to write functional viruses for the
- system. It's a reasonable claim. The vast majority of virus
- writers are, essentially, Caspar Milquetoasts when it comes to
- this type of "work." They tend to prefer collecting viruses or
- fragments of them in large numbers and mounting them as public
- collections on bulletin boards or Internet providers; writing
- aggressively menacing-sounding electronic press releases; and
- cobbling together hacks of any one of the thousands of DOS viruses
- already in existence.
-
- This could change writes Ludwig, using the following arguments. A
- number of relatively inexpensive books on the internals of Windows and
- Win95 are now in bookstores. These certainly furnish the essentials for
- understanding the ins-and-outs of file structures and system functions,
- sufficient information for virus-writers intent on the subject.
- Further, Ludwig points out DOS appeared in 1981 but the Pakistani Brain
- virus didn't show up until 1985. And by 1988 there were still
- only a small number of computer viruses written for that operating
- system. The current virus production glut is a phenomenon with its
- roots in the first half of this decade which tends to obscure the fact
- the DOS virus development didn't happen overnight. Ludwig implies the
- groundwork is now there for viruses under Windows95 but it will be a
- different cohort of virus-writers who wind up producing them.
-
- "CVS1996" walks the reader through the design of three viruses.
- All of them are "direct action" infectors, which is to say -- as
- Ludwig does -- that they're effective as basic demonstrators but
- because of their limited strategy in file infection, not likely to
- be successful in the wild. The first virus, called Hillary, looks
- for Windows95 files with more than 500 bytes of zero fill, or
- contiguous empty space in them. It then writes itself to this
- hole and adjusts the host program so that when loaded the virus
- gets control first. Although workable on just about anyone's
- PC, it's a reluctant infector -- much like Ludwig's TIMID virus
- from "The Little Black Book."
-
- Another virus adds itself as a code section to hosts; the last
- one in the book shuffles the host's internal code around before
- adding itself to the final product, an effort to make the infection
- a little less noticeable. The bulk of the virus tutorials are
- spent detailing the internal structures of the average Windows 95
- program and the way in which a virus has to modify them
- to infect the file without ruining it or crashing the machine.
-
- The final section of "CVS1996" is devoted to Robert Morris, Jr.'s
- Internet Worm. The Worm was unleashed on a computer in MIT's
- Artificial Intelligence lab in 1988. In a couple of hours it
- was paralyzing computers on the Internet from coast to coast.
- Morris confessed to it, was tried, convicted and sentenced with
- three years of probation, community service and a fine.
-
- Like many other discussions of the Worm, Ludwig writes the code
- of it is schizophrenic: routines that don't get called, either by
- error or in effort to throw others off. It presents "convoluted logic
- that seems at best illogical."
-
- Still, it was an amazing program in its effect on the Internet,
- Ludwig continues.
-
- And for the conspiracy-minded:
-
- "Though Morris has confessed to writing it . . . there has been
- lingering suspicion over the years that others were behind it, and
- possibly the NSA. Such allegations are, of course, unproveable."
-
- A detailed presentation of the Worm's code and function is delivered.
- Ludwig adds a small bit of the original is missing: "I simply could not
- find it anywhere."
-
- "Computer Virus Supertechnology" is one of kind. Despite years of social
- opprobrium, Mark Ludwig is still the only one doing these types of books
- regularly. The audience is entirely his. Paradoxically, other
- publishers offering books on computer viruses -- usually from the
- anti-virus side of things -- now call him to have their offerings sold
- through the American Eagle mail catalog!
-
- Finally, like the rest of American Eagle's recent offerings, "CVS1996"
- delivers a hefty amount of dense computer code and analysis requiring, at
- the very least, a passing familiarity with the subject or the patience to
- master a rather technical treatment in the taboo worlds of computer virus
- writing and publishing. Plus, there's its unique list price. These are
- not minor obstacles to the dilettante computer vandal.
-
- (American Eagle, POB 1507, Show Low, AZ 85901; ph: 1-520-367-1621)
-
- Crypt Newsletter
- http://www.soci.niu.edu/~crypt
-
- ------------------------------
-
- Date: Wed, 09 Oct 1996 09:52:35 -0500
- From: Jon Lebkowsky <jonl@well.com>
- Subject: File 8--Jim Thomas Thursday at HotWired
-
- Electronic Frontiers Forum
- Thursday, October 10
- 6PM Pacific Time (9PM Eastern, Friday 01:00 GMT)
-
- Guest: Jim Thomas, Editor of Computer Underground Digest
-
- On the table: control/enforcement issues of the criminal justice
- system, online hucksters, net censorship, privacy (is it
- over-rated?), the great child-porn myth, how is net technology
- changing culture?
-
- Where to login:
- telnet: talk.wired.com
- javachat: http://talk.wired.com
-
- Free membership required (http://www.hotwired.com/reception/join)
-
- --
- Jon Lebkowsky <jonl@hotwired.com> FAX (512)444-2693 http://www.well.com/~jonl
- Electronic Frontiers Forum, 6PM PDT Thursdays <http://www.hotwired.com/eff>
- "No politician can sit on a hot issue if you make it hot enough."--Saul Alinsky
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.72
- ************************************
-
-
-