home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue Dec 24, 1996 Volume 8 : Issue 92
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.92 (Tue, Dec 24, 1996)
-
- File 1--Strong crypto can be exported, says judge, at least in SF (fwd)
- File 2--From EFF - Court Declares Crypto Restrictions Unconstitutional
- File 3--CWD-Cooking with Crypto
- File 4--Re: Strong crypto can be exported, says judge, at least in SF
- File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 19 Dec 1996 08:04:34 -0800 (PST)
- From: Declan McCullagh <declan@well.com>
- Subject: File 1--Strong crypto can be exported, says judge, at least in SF (fwd)
-
- Source fight-censorship@vorlon.mit.edu
-
- Date--Wed, 18 Dec 1996 23:44:59 -0500
- From--Dave Banisar <banisar@epic.org>
-
- Headline: Encryption Restriction Nixed
- Wire Service: APO (AP Online)
- Date: Wed, Dec 18, 1996
- By BOB EGELKO
- Associated Press Writer
- SAN FRANCISCO (AP) -- The State Department's refusal to let a
- mathematician post his encryption programs on the Internet was
- unconstitutional, a federal judge said. The ruling announced Wednesday was
- hailed by computer industry executives who say the export restrictions
- have allowed the rest of the world to take business away from U.S.
- companies.
- U.S. District Judge Marilyn Hall Patel stopped short of forbidding all
- restrictions on the export of codes that allow computer messages to be
- scrambled. But she said the current rules, which treat such computer
- programs as if they were military weapons, go too far.
- The immediate effect of Monday's ruling is that anyone in the federal
- district that includes San Francisco and Silicon Valley can post the
- forbidden cryptography on the Internet, said Mike Godwin, a lawyer for the
- Electronic Frontier Foundation, an online civil rights group.
-
- <snip>
-
- ------------------------------
-
- Date: Fri, 20 Dec 1996 04:30:34 -0800 (PST)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 2--From EFF - Court Declares Crypto Restrictions Unconstitutional
-
- EFFector Online Volume 09 No. 15 Dec. 20, 1996 editors@eff.org
-
- * See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
-
- COURT DECLARES CRYPTO RESTRICTIONS UNCONSTITUTIONAL
- Free Speech Trumps Clinton Wiretap Plan
-
- December 19, 1996, 16:50 Pacific time.
-
- Electronic Frontier Foundation Contacts:
-
- Shari Steele, Staff Attorney
- 301/375-8856, ssteele@eff.org
-
- John Gilmore, Founding Board Member
- 415/221-6524, gnu@toad.com
-
- Cindy Cohn, McGlashan & Sarrail
- 415/341-2585, cindy@mcglashan.com
-
- San Francisco - On Monday, Judge Marilyn Hall Patel struck down Cold War
- export restrictions on the privacy technology called cryptography. Her
- decision knocks out a major part of the Clinton Administration's
- effort to force companies to build "wiretap-ready" computers,
- set-top boxes, telephones, and consumer electronics.
-
- The decision is a victory for free speech, academic freedom, and the
- prevention of crime. American scientists and engineers will now be
- free to collaborate with their peers in the United States and in other
- countries. This will enable them to build a new generation of tools
- for protecting the privacy and security of communications.
-
- The Clinton Administration has been using the export restrictions to goad
- companies into building wiretap-ready "key recovery" technology. In a
- November Executive Order, President Clinton offered limited
- administrative exemptions from these restrictions to companies which
- agree to undermine the privacy of their customers. Federal District
- Judge Patel's ruling knocks both the carrot and the stick out of
- Clinton's hand, because the restrictions were unconstitutional in the
- first place.
-
- The Cold War law and regulations at issue in the case prevented
- American researchers and companies from exporting cryptographic
- software and hardware. Export is normally thought of as the physical
- carrying of an object across a national border. However, the
- regulations define "export" to include simple publication in the U.S.,
- as well as discussions with foreigners inside the U.S. They also define
- "software" to include printed English-language descriptions and
- diagrams, as well as the traditional machine-readable object code and
- human-readable source code.
-
- The secretive National Security Agency has built up an arcane web of
- complex and confusing laws, regulations, standards, and secret
- interpretations for years. These are used to force, persuade, or
- confuse individuals, companies, and government departments into making
- it easy for NSA to wiretap and decode all kinds of communications.
- Their tendrils reach deep into the White House, into numerous Federal
- agencies, and into the Congressional Intelligence Committees. In
- recent years this web is unraveling in the face of increasing
- visibility, vocal public disagreement with the spy agency's goals,
- commercial and political pressure, and judicial scrutiny.
-
- Civil libertarians have long argued that encryption should be widely
- deployed on the Internet and throughout society to protect privacy,
- prove the authenticity of transactions, and improve computer security.
- Industry has argued that the restrictions hobble them in building
- secure products, both for U.S. and worldwide use, risking America's
- current dominant position in computer technology. Government
- officials in the FBI and NSA argue that the technology is too
- dangerous to permit citizens to use it, because it provides privacy to
- criminals as well as ordinary citizens.
-
- "We're pleased that Judge Patel understands that our national security
- requires protecting our basic rights of free speech and privacy," said
- John Gilmore, co-founder of the Electronic Frontier Foundation, which
- backed the suit. "There's no sense in 'burning the Constitution in
- order to save it'. The secretive bureaucrats who have restricted these
- rights for decades in the name of national security must come to a
- larger understanding of how to support and preserve our democracy."
-
- Reactions to the decision
-
- "This is a positive sign in the crypto wars -- the first rational
- statement concerning crypto policy to come out of any part of the
- government," said Jim Bidzos, President of RSA Data Security, one of
- the companies most affected by crypto policy.
-
- "It's nice to see that the executive branch does not get to decide
- whether we have the right of free speech," said Philip Zimmermann,
- Chairman of PGP, Inc. "It shows that my own common sense
- interpretation of the constitution was correct five years ago when I
- thought it was safe to publish my own software, PGP. If only US
- Customs had seen it that way." Mr. Zimmermann is a civil libertarian
- who was investigated by the government under these laws when he wrote
- and gave away a program for protecting the privacy of e-mail. His
- "Pretty Good Privacy" program is used by human rights activists
- worldwide to protect their workers and informants from torture and
- murder by their own countries' secret police.
-
- "Judge Patel's decision furthers our efforts to enable secure electronic
- commerce," said Asim Abdullah, executive director of CommerceNet.
-
- Jerry Berman, Executive Director of the Center for Democracy and
- Technology, a Washington-based Internet advocacy group, hailed the
- victory. "The Bernstein ruling illustrates that the Administration
- continues to embrace an encryption policy that is not only unwise, but
- also unconstitutional. We congratulate Dan Bernstein, the Electronic
- Frontier Foundation, and all of the supporters who made this victory
- for free speech and privacy on the Internet possible."
-
- "The ability to publish is required in any vibrant academic discipline,"
- This ruling re-affirming our obvious academic right will help American
- researchers publish without worrying," said Bruce Schneier, author of
- the popular textbook _Applied Cryptography_, and a director of the
- International Association for Cryptologic Research, a professional
- organization of cryptographers.
-
- Kevin McCurley, President of the International Association for
- Cryptologic Research, said, "Basic research to further the
- understanding of fundamental notions in information should be welcomed
- by our society. The expression of such work is closely related to one
- of the fundamental values of our society, namely freedom of speech."
-
- Background on the case
-
- The plaintiff in the case, Daniel J. Bernstein, Research Assistant
- Professor at the University of Illinois at Chicago, developed an
- "encryption algorithm" (a recipe or set of instructions) that he
- wanted to publish in printed journals as well as on the Internet.
- Bernstein sued the government, claiming that the government's
- requirements that he register as an arms dealer and seek government
- permission before publication was a violation of his First Amendment
- right of free speech. This is required by the Arms Export Control Act
- (AECA) and its implementing regulations, the International Traffic in Arms
- Regulations (ITAR).
-
- In the first phase of this litigation, the government argued that
- since Bernstein's ideas were expressed, in part, in computer language
- (source code), they were not protected by the First Amendment. On
- April 15, 1996, Judge Patel rejected that argument and held for the
- first time that computer source code is protected speech for purposes
- of the First Amendment.
-
- Details of Monday's Decision
-
- Judge Patel ruled that the Arms Export Control Act is a prior restraint
- on speech, because it requires Bernstein to apply for and obtain from
- the government a license to publish his ideas. Using the Pentagon
- Papers case as precedent, she ruled that the government's "interest of
- national security alone does not justify a prior restraint."
-
- Judge Patel also held that the government's required licensing
- procedure fails to provide adequate procedural safeguards. When the
- Government acts legally to suppress protected speech, it must reduce
- the chance of illegal censorship by the bureaucrats involved -- in this
- case, the State Department's Office of Defense Trade Controls (ODTC).
- Her decision states: "Because the ITAR licensing scheme fails to provide
- for a time limit on the licensing decision, for prompt judicial review
- and for a duty on the part of the ODTC to go to court and defend a
- denial of a license, the ITAR licensing scheme as applied to Category
- XIII(b) [i.e., as applied to encryption material] acts as an
- unconstitutional prior restraint in violation of the First Amendment."
- Professor Bernstein is now free to publish his ideas without asking the
- government's permission first.
-
- She also ruled that the export controls restrict speech based on the
- content of the speech, not for any other reason. "Category XIII(b) is
- directed very specifically at applied scientific research and speech on
- the topic of encryption." The Government had argued that it restricts
- the speech because of its function, not its content.
-
- The judge also found that the ITAR is vague, because it does not
- adequately define how information that is available to the public
- "through fundamental research in science and engineering" is exempt
- from the export restrictions. "This subsection ... does not give
- people ... a reasonable opportunity to know what is prohibited." The
- failure to precisely define what objects and actions are being
- regulated creates confusion and a chilling effect. Bernstein has been
- unable to publish his encryption algorithm for over four years. Many
- other cryptographers and ordinary programmers have also been restrained
- from publishing because of the vagueness of the ITAR. Brian
- Behlendorf, a maintainer of the popular public domain "Apache" web
- server program, stated, "No cryptographic source code was ever
- distributed by the Apache project. Despite this, the Apache server
- code was deemed by the NSA to violate the ITAR." Judge Patel also
- adopted a narrower definition of the term "defense article" in order to
- save it from unconstitutional vagueness.
-
- The immediate effect of this decision is that Bernstein now is free to
- teach his January 13th cryptography class in his usual way. He can
- post his class materials on the Internet, and discuss the upcoming
- class's materials with other professors, without being held in
- violation of the ITAR. "I'm very pleased," Bernstein said. "Now I
- won't have to tell my students to burn their notebooks."
-
- It is presently unclear exactly where Judge Patel's decision applies --
- in the Northern District of California (containing San Francisco and Silicon
- Valley) or throughout the country. Check with your own lawyer if
- you contemplate taking action based on the decision.
-
- It is not yet clear from the decision whether the export controls on
- object code (the executable form of computer programs which source
- code is automatically translated into) have been overturned. It may
- be that existing export controls will continue to apply to runnable
- software products, such as Netscape's broswer, until another court
- case challenges that part of the restrictions.
-
-
- ABOUT THE ATTORNEYS
-
- Lead counsel on the case is Cindy Cohn of the San Mateo law firm of
- McGlashan & Sarrail, who is offering her services pro bono. Major
- additional pro bono legal assistance is being provided by Lee Tien of
- Berkeley; M. Edward Ross of the San Francisco law firm of Steefel,
- Levitt & Weiss; James Wheaton and Elizabeth Pritzker of the First
- Amendment Project in Oakland; and Robert Corn-Revere, Julia Kogan,
- and Jeremy Miller of the Washington, DC, law firm of Hogan & Hartson.
-
-
- ABOUT THE ELECTRONIC FRONTIER FOUNDATION
-
- The Electronic Frontier Foundation (EFF) is a nonprofit civil
- liberties organization working in the public interest to protect
- privacy, free expression, and access to online resources and
- information. EFF is a primary sponsor of the Bernstein case. EFF
- helped to find Bernstein pro bono counsel, is a member of the
- Bernstein legal team, and helped collect members of the academic
- community and computer industry to support this case.
-
- Full text of the lawsuit and other paperwork filed in the case is
- available from EFF's online archives at:
-
- http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/
-
- The full text of Monday's decision is available at:
-
- http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/Legal/961206.decision
-
- ------------------------------
-
- Date: Fri, 20 Dec 1996 07:53:01 -0800 (PST)
- From: "Brock N. Meeks" <brock@well.com>
- Subject: File 3--CWD-Cooking with Crypto
-
- CyberWire Dispatch // Copyright (c) 1996 // December 20
-
- Jacking in from the "Two Flew Over the Crypto Nest" port:
-
- Washington -- The encryption issue continues to bubble up all
- over the boneyard of D.C. On Thursday, in the wake of the U.S.
- District Court decision in San Francisco, that declared current
- U.S. restrictions on exporting *printed* crypto code violates
- First Amendment rights, crypto came to the fore, if only briefly.
-
- The following instances, one during a congressional hearing, the
- other during a news conference by U.S. Attorney General Janet
- "Say Hallelujah, I've Saved My Job" Reno, point out the widening
- rift between congress and the Administration over the encryption
- issue.
-
- During a hearing to discuss the FBI's handling of the bombing in
- Centinneal Park in Atlanta during the summer Olympics, Sen. Arlan
- Spector (R-Pa.) couldn't resist tossing a dart at FBI Dir. Louis
- Freeh when he said:
-
- "And the very last thing is: I know the federal court decision
- which came down -- on export restrictions on certain encryption
- software --yesterday is not one you may have had a chance to
- review. But, Director Freeh, with my concern on what I have
- thought has been a misguided policy by the administration on
- their export restriction encryption policy, it's probably safe to
- assume that you and I may have a chance to discuss this latest
- court case, and whether it goes up on appeal, or whether we try
- one more time on some -- on a legislative fix."
-
- Freeh did not respond to Spector's question. But Spector's
- comments are important on two fronts. One, he comes out as vocal
- opponent of the Administration's policy, calling it "misguided"
- and signalling that it's likely he will ally himself with Sen.
- Conrad Burns (R-Mont.) to resurrect pro-encryption legislation
- during the 105th Congress.
-
- Spector is clearly dialed into the issue; good news for a
- Congress that has, with a few notable exceptions, essentially
- been brain dead on this issue and completely spun by the
- fictitious horror stories that the FBI's Freeh takes every
- opportunity tell on Capitol Hill.
-
- Sadly, the nation's top cop, Janet Reno, appears to be hopelessly
- lost on the crypto issue. During her weekly news conference,
- she was asked about the court decision and "why does the
- government feel that it's so important to place those
- restrictions on that type of technology, and will you appeal this
- decision?"
-
- Reno punted on the latter question, saying she hadn't seen the
- opinion. On the meat of the question, she simply muddled
- through. She emphasized wiretaps and how encrypting real time
- conversations can be a threat to law enforcement investigations.
-
- The problem, according to Reno, is this: "What we're faced with
- now is that there is the developing capacity -- and it will
- become more so --the power to encrypt or to code a system so that
- it cannot be intercepted through new high-tech systems."
-
- To counter this threat, Reno said, "We have got to have the
- capacity to intercept that." This has always, from day one of
- this crypto debate, been the real jones of the FBI: Real time
- interception and decryption of voice communications. Stored
- data and Email make up the FBI's crypto hat trick, but it's the
- wiretapping and decryption of coded voice communications that
- really gives the FBI a hard on.
-
- Reno short-hopped a common meme among civil libertarians, that
- being the notion that the FBI is simply looking to expand its
- current wiretap authority. Remember, Freeh has been dogged in
- saying that the Bureau is not looking to expand its authority,
- but simply maintain the status quo.
-
- Reno answered this "expansion" theory, saying: "What's expanding
- is not our authority, really, but the technology that permits
- such tremendous communication systems in the world. And what
- we've got to be prepared to do is to have a system that will
- permit us to get a court order, just as we do now for simple
- telephones, to intercept the communication and, if it is
- encrypted or coded, to decode it."
-
- Now... don't we all feel better? It's not "really" an expansion
- of authority. Nope, just an expansion of the technological law
- enforcement capacity. It's typical cheapjack bureaucratic
- Washington bullshit.
-
- Reno is convinced that people will "appreciate" the FBI's
- capability to do this and then tells this story: "A businessman
- says, 'Well, I don't want you messing with my business,' but if
- his competitor comes in and steals trade secrets and stores that
- in a coded computer, he's not going to like it if the FBI doesn't
- have the capacity to get a lawful search warrant and search that
- computer because they can't decode it."
-
- However, as Reno's own leutinent, Jamie Gorelick, admitted before
- a congressional panel earlier this year: If the FBI can't crack
- a code, it has, in the past, called on the "technical
- assistantance" of the National Security Agency, the nation's top
- spooks and the world's best equipped code crackers.
-
- As for the ban on crypto exports? "We're going to continue to
- work with everyone," Reno said, "because I think as people work
- through this issue, they understand that it is in everybody's
- best interest to be able to do it."
-
- Well, apparently Reno hasn't been in the loop on the industry's
- about face on this issue lately. Where only a few months ago
- the computer and software industry seemed to have turned into
- White House lap dogs by voicing initial approval of the new
- crypto initiatives put forth by the President via executive
- order, now that industry has revolted. Industry now claims that
- the Administration essentially kicked them in the balls, the term
- "bait and switch" has been used.
-
- Surprise, surprise. Industry got what it deserved for being cozy
- with an Administration famous for having blinders on when it
- comes to this issue. Now industry feels hurt and dismayed.
- Excuse me if I can't gin up any sympathy for these guys... what
- the fuck were they thinking in the first place?
-
- As Spector and Reno's comments show, this issue isn't likely to
- die a slow quiet death in the coming years. Indeed, it looks
- like battle lines are being drawn already; a kind of digital
- line in cyberspace.
-
- Who will win? Don't bet on the FBI... even their own turncoat
- spies aren't clever enough to encrypt their self-incriminating
- files. So, Mr. Freeh, tell me again why you need the keys to my
- encrypted messages? Even your own troops let you walk right
- through the digital front door.
-
- Meeks out...
-
- ------------------------------
-
- Date: Thu, 19 Dec 1996 19:43:34 -0800
- From: "James S. Tyre" <j.s.tyre@worldnet.att.net>
- Subject: File 4--Re: Strong crypto can be exported, says judge, at least in SF
-
- Source - fight-censorship@vorlon.mit.edu
-
- My congratulations to Professor Bernstein, his lawyers, the EFF and all
- who contributed to the side of the angels.
-
- I do have two nits to pick, however (one not so small), with the
- publicity surrounding Judge Patel's decision. The first is stated twice
- in Declan's post, although later clarified in his post. The second has
- not been stated in anything which I have read in the last day or so.
-
- First, many articles have said that Judge Patel's decision is NOT
- binding on courts outside of the United States District Court for the
- Northern District of California (roughly, the San Francisco bay area).
- True enough, but most have said that it IS binding within the Northern
- District. Not true. The U.S. District Court, like the Superior Courts
- in most states (New York being the notable exception) is a general
- jurisdiction trial court, not an appellate court. Judge Patel's
- decision, insofar as other courts are concerned, has no binding effect
- at all. Another trial court judge within the Northern District could
- just as easily rule another way as could a federal trial judge in
- Wisconsin or D.C. Declan's post gets to this point well into the text,
- but only after contradictory statements earlier in the post.
-
- My second nit, however, is more important. In EFF's release included in
- Declan's post, it is said that: "American scientists and engineers will
- now be _free_ to collaborate with their peers in the United States and
- in other countries. This will enable them to build a new generation of
- tools for protecting the privacy and security of communications." (My
- emphasis on "free".) Judge Patel did NOT rule that Prof. Bernstein
- could "freely" distribute his source code. Instead, she ruled that the
- export restrictions were an unconstitutional prior restraint on speech
- (having previously ruled that source code indeed is speech). This is
- not a mere semantic distinction, but a significant, substantive one. As
- Judge Patel wrote in her decision:
-
- > It is axiomatic that the First Amendment is more tolerant of
- > subsequent criminal punishment of speech than it is of prior restraints
- > on the same speech.
- >
- > The thread running through all these cases is that prior
- > restraints on speech and publication are the most serious and
- > the least tolerable infringement on First Amendment rights. A
- > criminal penalty or a judgment in a defamation case is subject
- > to the whole panoply of protections afforded by deferring the
- > impact of the judgment until all avenues of appellate review
- > have been exhausted. . . .
- >
- > A prior restraint, by contrast and by definition, has an
- > immediate and irreversible sanction. If it can be said that a
- > threat of criminal or civil sanction after publication "chills"
- > speech, prior restraint "freezes" it at least for the time.
- >
- > Nebraska Press Ass'n v. Stuart, 427 U.S. 539, 559 (196).
- >
-
- In other words: a government prosecutor or a defamation plaintiff has to
- make a much stronger showing to prevent speech from happening in the
- first instance (a prior restraint) than to impose liability for the
- speech after the fact. Judge Patel ruled that Bernstein could not be
- restrained in advance from speaking his source code. She did not rule,
- however, that that he cannot be prosecuted after the fact if, as and
- when he does speak his code. Specifically, near the end of her
- decision, Judge patel wrote that:
-
- > The court notes that an injunction appears hasty given the relative
- > positions of the parties. The government seems to suggest that teaching
- > a class on cryptography, regardless of the nationality of the students,
- > is not the problem; the concern is with posting material on the Internet
- > without limiting access. Assuming the government is sincere about its
- > limited objections and that plaintiff could easily limit access to the
- > class material he posts so that it is not available internationally, it
- > is not clear why the parties could not enter into a stipulation.
- >
- > In view of the fact that the court has ruled on the merits and
- > has found certain provisions of the ITAR invalid, plaintiff cannot be
- > prosecuted _under those provisions_ absent reversal on appeal.
- > Therefore, at this time there is no immediate threat of injury and no
- > need to rule on the preliminary injunction.[15] The motion for a
- > preliminary injunction is denied without prejudice. If plaintiff is
- > threatened with prosecution, he may return to this court and renew the
- > motion.
-
- (My emphasis on "under those provisions.")
-
- Like any good judge, Judge Patel did not speculate on whether Bernstein
- could be prosecuted under existing laws other than the specific ITAR
- provisions held to be invalid, if and when he puts his code on the net.
- Nor did she write that the mere fact that source code is speech would
- prevent Congress from enacting new laws seeking to punish
- crypto-speech. Are there existing laws, other than the invalid ITAR
- provisions, under which Bernstein theoretically could be prosecuted if
- he speaks his code on the net? I believe so. Could Congress enact such
- laws? Certainly. Would such laws be constitutional as applied to this
- type of a case? I won't speculate any more than did Judge Patel.
-
- I truly HATE to use OJ I and II and as an analogy for anything, but,
- unfortunately, the analogy is useful here. Because the burden of proof
- is so much higher in criminal cases than in civil cases, OJ's acquittal
- in the criminal case does not prevent the families from suing for
- wrongful death. Because the government has a higher burden when it
- attempts to stop speech before it happens than when it attempts to
- impose liability afterward, Judge Patel's ruling, even if upheld on
- appeal, does NOT mean that Bernstein or others can speak freely, without
- fear of consequence. That may turn out to be the case, but that was not
- decided in this case.
-
- None of this is intended to diminish Professor Bernstein's victory. Far
- from it. But let's understand what was decided and what was not. This
- certainly was a skirmish, and may be a good battle, but its not close to
- being the war.
-
- Or so I think.
-
- Jim Tyre
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.92
- ************************************
-
-
-