home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue June 10, 1997 Volume 9 : Issue 44
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.44 (Tue, June 10, 1997)
-
- File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
- File 2--NASA Nabs Teen Computer Hacker
- File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
- File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
- File 5--Purpose of CuD
- File 6--Re: Germany "cybercops" battle offensive speech, violent games
- File 7--RE: Anti-Spam bills....
- File 8--Invitation - Interop Security Teleconference
- File 9--Beyond Hope "Hackers Conference" '97
- File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 29 May 1997 16:49:16 -0500
- From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
-
- ((MODERATORS' NOTE: Following is the introductin to Senator
- Murkowski's note, obtained from his homepage))
-
- S. 771
- The Unsolicited
- Commercial Email
- Choice Act of 1997
-
- I introduced S. 771, the Unsolicited Commercial Email Choice Act of
- 1997, on May 21, 1997 to combat the growing cost to society of
- unsolicited bulk electronic mail messages. All Americans including
- Alaskans waste time and money having to receive and delete unsolicited
- commercial e-mails. Rural Americans pay transmission charges to
- receive this unwanted information. While the cost of these
- transmission charges may not be extreme, I fail to see why any
- American should bear any costs for receiving something they did not
- ask for.
-
- Please note that my bill does not ban such emails. Some may oppose
- this approach. However, I have no desire to set a precedent of the
- government telling you what you can and cannot see in your inbox. My
- bill merely provides a means for Internet users to filter out e-mails
- that they do not wish to receive by requiring that senders of
- unsolicited e-mails to include Advertisement as the first word of the
- subject line and that the real street address, e-mail address and a
- telephone number be contained within the body of the message. Routing
- information that accompanies the message must also be accurate.
-
- Internet users can request that their ISP filter out all such emails
- at their request. ISP's can also unilaterally block all such inbound
- messages. Consumers who are disappointed with a unilateral blocking
- policy of their ISP can always seek another ISP that allows such
- messages on its network. Per their ISP policy, Internet users can also
- choose to receive such messages and filter them individually by seeing
- the Advertisement tag and using the delete key or to stop them
- permanently from specific senders by sending a message to that effect
- to the original e-mail originating address.
-
- Some have raised the concern that an offshore marketer sending out
- junk e-mails would be beyond the reach of these restrictions. It is
- certainly true that no bill that Congress passes can reach directly
- beyond American territory. This does not mean, however, that S. 771
- would not have an impact upon marketers who mass e-mail from overseas.
- If the initiator of the message has a meaningful presence in the
- United States such as an office, parent company, bank to deposit
- funds, etc..., S. 771 would still reach these marketers under what's
- generally known as "long arm jurisdiction." I feel that most Americans
- would be hesitant to send money overseas to order from an item
- advertised in an unsolicited e-mail.
-
- As with most Internet users, I have no personal objection to the
- concept of unsolicited commercial e-mails if those who receive them
- actually want to receive them. Today, Internet users subscribe to
- electronic mailing lists of their own free will and whatever topic
- they choose.
-
- The Internet is an excellent tool for commerce though the use of
- commercial world wide web sites. However, America should be not be
- burdened by unwanted commercial e-mail.
-
- I welcome the Internet community's comments and suggestions on this
- bill. Please feel free to make them to me at
- commercialemail@murkowski.senate.gov
-
- Signature
-
- ------------------------------
-
- Date: Wed, 04 Jun 1997 22:32:06 -0400
- From: "Evian S. Sim" <evian@escape.com>
- Subject: File 2--NASA Nabs Teen Computer Hacker
-
- .c The Associated Press
- Monday, June 2, 1997
-
- WASHINGTON (AP) - A Delaware teen-ager who hacked his way into a
- NASA web site on the Internet and left a message berating U.S.
- officials is being investigated by federal authorities, agency
- officials said Monday.
-
- NASA Inspector General Robert Gross cited the incident - the most
- recent example of a computer invasion of a NASA web site - as an
- example of how the space agency has become ``vulnerable via the
- Internet.''
-
- "We live in an information environment vastly different than 20
- years ago," Gross said in a written statement. "Hackers are
- increasing in number and in frequency of attack."
-
- In the latest case, the Delaware teen, whose name, age and
- hometown were not released, altered the Internet web site for the
- Marshall Space Flight Center in Huntsville, Ala., according to
- the statement from the computer crimes division of NASA's
- Inspector General Office.
-
- "We own you. Oh, what a tangled web we weave, when we practice to
- deceive," the teen's message said, adding that the government
- systems administrators who manage the site were "extremely
- stupid."
-
- The message also encouraged sympathizers of Kevin Mitnick, a
- notorious computer hacker, to respond to the site. Mitnick was
- indicted last year on charges stemming from a multimillion-dollar
- crime wave in cyberspace.
-
- The altered message was noticed by the computer security team in
- Huntsville but the NASA statement did not mention how long the
- message was available to the public or exactly when it was
- discovered. NASA officials weren't made available to answer
- questions about the event.
-
- In the statement, NASA called the teen's hacking "a cracking
- spree" and said it was stopped May 26 when his personal computer
- was seized.
-
- Prosecutors from the U.S. Attorney's office in Delaware and
- Alabama are handling the case with NASA's computer crimes
- division.
-
- Last March, cyberspace invaders made their way into another NASA
- web site and threatened an electronic terrorist attack against
- corporate America. The group, which called itself ``H4G1S'' in
- one message and ``HAGIS'' in another, also called for some
- well-known hackers to be released from jail.
-
- Engineers at the Goddard Space Flight Center in Greenbelt, Md.,
- quickly noticed the change and took the page off the Internet
- within 30 minutes. NASA officials said the agency installed
- electronic security measures designed to prevent a recurrence.
-
- ------------------------------
-
- Date: Fri, 6 Jun 1997 19:51:15 -0400
- From: Declan McCullagh <declan@well.com>
- Subject: File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
-
- Source - fight-censorship@vorlon.mit.edu
- ((Fwd from Phil Zimmerman))
-
- Last month, Pretty Good Privacy Inc went through a reorganization in
- its top management. We were spending too much money, too fast. Tom
- Steding was replaced by Phil Dunkelberger as the president of PGP, and
- I handed over the chairman title to Jonathan Seybold, who had been, with
- me, the original cofounder of the company. Jonathan is devoting his time
- to the business side of things, while I am focussing my attention on my
- role as chief technology officer.
-
- I have seen some speculation in some usenet newsgroups that these changes
- were in some way connected with the fact that PGP was recently sued by RSA
- Data Security over some dispute regarding royalties for use of the RSA
- patent, which PGP holds a license to. Let me set the record straight
- on this. There are sound business reasons why this shuffling of top
- management occurred at PGP, and these reasons are known to all of our
- employees. The RSA lawsuit against PGP is absolutely not one of the
- reasons, not even remotely. I don't think shuffling top management is
- a likely reaction for any company to take in response to a lawsuit, even
- if the lawsuit had merit, which this one does not. We fully expect the
- RSA matter to be resolved in arbitration proceedings, in our favor.
-
- I know that it is common practice for some companies to issue statements
- to "spin" the story about certain events, sometimes at the expense of
- truth. This makes a lot of people understandably skeptical about such
- explanations. I do have responsibilities toward my company, but no
- one could get me to deny a truth about the reasons for the restructuring.
- The truth is, the restructuring had absolutely nothing at all to do with
- the RSA lawsuit.
-
- I would now like to announce that we will be releasing PGP 5.0 in mid-June.
- It's in beta release right now on our web page (www.pgp.com). In keeping
- with my own dedication to personal freedom and privacy, we will be releasing
- a freeware version for noncommercial use through MIT's web site
- (web.mit.edu/pgp), just like in the old days before the company was formed.
- And we do plan to publish the full PGP source code for Mac, Windows 95,
- and Linux.
-
- There are a lot of new exciting features, including automatic key lookups
- from remote key servers on the Internet, which will likely result in the
- rapid growth of a ready-made nationwide PGP public-key infrastructure,
- on an unprecedented scale. We are also encouraging the migration to new
- public key algorithms in addition to RSA, namely the NIST Digital
- Signature Standard (DSS), as well as Diffie-Hellman (Elgamal) keys.
- We expect most of the new users to be using these new algorithms instead
- of RSA, in part because they offer new features, better performance, and
- better security for the same key sizes. I hope that you will all join me
- in this opportunity to move to these new algorithms, allowing everyone to
- finally enjoy the use of public key cryptography without the encumberances
- of patents.
-
- Philip Zimmermann
- Chief Technology Officer, PGP Inc.
-
- -----BEGIN PGP SIGNATURE-----
- Version: PGP for Personal Privacy 5.0
- Charset: noconv
-
- iQCVAwUBM5WoZWV5hLjHqWbdAQGaxgP/UM+i7Pz38x68zdWVOsTrQVepa+0FUndC
- NkvTi5iMTC9up7HJgleXMWuAB00qVB8XlC1/6oSx4Ot+gTecu0wXgNG/l8LXFBAo
- YYxlPhR497fvKfnWXATkJ3jQJAQbACHXzh7Wycc1MGq+46o6+CkECrUvUs8//KQT
- toJMdfVJEVA=
- =ywNo
- -----END PGP SIGNATURE-----
-
- ------------------------------
-
- Date: Thu, 29 May 1997 20:06:51 -0700 (PDT)
- From: jonl@well.com
- Subject: File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
-
- FOR IMMEDIATE RELEASE
-
- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM" CLAIMING
- ELECTRONIC TRESPASS AND NUISANCE
-
- Austin, Texas, May 28, 1997: Several Internet leaders in Austin,
- Texas filed a lawsuit yesterday afternoon against a company and an
- individual believed to be responsible for the mass distribution of
- junk mail over the Internet, also called "spam." The suit claims that
- C.N. Enterprises and Craig Nowak of San Diego, California, sent
- thousands of electronic messages selling information on "Free Cash
- Grants" for $19.95. The ad's content was not only misleading, the
- lawsuit claims, but the company's e-mail used a false return address,
- causing the electronic mail boxes of several Austin residents to
- overflow with returned copies of the junk mail.
-
- According to the lawsuit, by using a false return address, those who
- send junk mail over the Internet can avoid the anger that results from
- this controversial practice. They can also avoid dealing with the
- thousands of "bounce" messages that result from sending e-mail to
- invalid or outdated addresses. "In effect," the lawsuit alleges,
- "C.N. Enterprises deliberately dumped tons of its electronic garbage
- and pollution" into the Austin residents' mailboxes. The lawsuit
- claims that the use of false return addresses on junk e-mail, and the
- resulting fallout on those who own the addresses used, is illegal
- under the traditional common law causes of action of nuisance,
- trespass and conversion.
-
- The lead plaintiff is Tracy LaQuey Parker, a leading Internet
- author, who owns the Internet domain name used by C.N. Enterprises
- without her permission. Said Ms. Parker, "As a long-time Internet
- advocate, I am saddened that the goodwill spirit of the Internet is
- being spoiled by irresponsible individuals who forge their identity in
- order to make a quick buck. There are plenty of examples of
- legitimate commercial uses of the Internet. This isn't one of them."
-
- Joining Ms. Parker in the lawsuit are her husband Patrick Parker and
- Peter Rauch, both Ms. Parker's business partners. Also joining the
- suit are Zilker Internet Park, Ms. Parker's Internet service provider,
- which had to deal with the flood of messages stemming from the "spam,"
- and two active Texas Internet groups, the Texas Internet Service
- Providers Association (TISPA), a group of commercial Internet service
- providers, and EFF-Austin, a local Internet civil liberties
- organization.
-
- John Quarterman, an owner of Zilker Internet Park, stated, "'Spam'
- is a large and rapidly growing problem which has cost Zilker Internet
- Park and many other ISPs and Internet users much time and money. We
- have put many technical blocks in place to limit it. With this
- lawsuit, we are taking the next step to help stop this abuse of the
- Internet."
-
- TISPA and EFF-Austin joined the lawsuit in an effort to broaden the
- legal precedent beyond Ms. Parker's single Internet domain name,
- according to Gene Crick, TISPA's president. "Increasingly, 'spammers'
- are using false return addresses to avoid taking full responsibility
- for the harm caused by their unsolicited commercial e-mail," Crick
- said. "These forgeries dump huge volumes of unwanted junk mail onto
- Internet companies and their customers. TISPA would like to see the
- court grant a broad and clear injunction prohibiting this practice."
-
- The lawsuit was filed on behalf of LaQuey and the others by Pete
- Kennedy and Roger Williams of George, Donaldson & Ford, L.L.P. of
- Austin. Among its other Internet related cases, the law firm has
- been
- involved in lawsuits against the United States Secret Service and
- Simon Leis, the Hamilton County (Ohio) Sheriff, over the seizure of
- private e-mail.
-
- # # #
-
- For more information, contact:
-
- Plaintiffs:
- Tracy LaQuey Parker and Patrick Parker, 512-454-7748
- John Quarterman, Zilker Internet Park, 512-451-7620
- Gene Crick, Texas Internet Service Providers Association (TISPA),
- 512-303-1021
- Jon Lebkowsky, EFF-Austin, 512-444-5175
-
- Law Firm:
- Peter Kennedy or Roger Williams
- George, Donaldson & Ford, L.L.P., 512-495-1400
-
- Media Contact:
- Peggy Hubble or Sondra Williams, MEM/Hubble Communications,
- 512-480-8961
-
- ------------------------------
-
- Date: Wed, 4 Jun 1997 09:19:26 -0700
- From: Mike Oar <mike_oar@MENTORG.COM>
- Subject: File 5--Purpose of CuD
-
- Dear Editors,
-
- I general, I have enjoyed skimming or reading through CuD. Much
- of what is contained in there tends to speak towards the
- controversial issues which surround computing and society. Many
- good points have been raised and provocative and/or
- thought-provoking articles are common. I'm sorry to say though
- that I've removed myself from the mailing list due to some brash
- and poor-taste articles that you've allowed to be published.
- Most recently the article (Cu Digest, #9.42) by Meeks. His
- hostile tone and language disgust me and make me wonder that if
- such people are the main stream of the "movement" to combat
- government control over the internet and information, can such a
- battle be won?
-
- You may guess that I tend to draw a middle of the road
- perspective on censorship. I believe that participants
- (on-liners) need to be more civil than they now are, and that
- those that aren't continue to destroy the reputation and ability
- of the "real" users to use the information that is/could be out
- there.
- I also believe that while there's nothing inherently wrong with
- annonimity, it is often abused and used to cover up sick and
- disgusting acts by those who are simply too cowardly or perverse
- to reveal their true identity.
-
- However, I have not found that the majority of your articles are
- far off the mark or raise concerns that are not worthy to be
- heard. As a whole, I think that the information and service that
- CuD provides is good. I take note against articles such as
- Meeks' which voice slanderous and degrading feelings or opinions
- with the intent of putting down people, not policies. I also do
- not feel that his use of language is warranted or needed.
-
- There are real issues to deal with as technology becomes more
- readily available to the world. It's no longer the play ground
- of the select few who can learn how to program or spend endless
- hours on-line. And as this technology and it's uses begin to
- demand more information and becomes more intimately a part of our
- lives, it begins to become the responsibility of those that
- create it to do all that they can to educate the users to it's
- proper use. Computers are becomming the tool of non-programmers
- (and I think that some programmers find that irksome). The
- governments are simply responding (fairly well I think) to
- something that they don't understand well but that the public
- demands. I think it is our charge as the creators of technology
- to promote and insure it's proper use, it's ethical use, and do
- all that we can to support actions against using it to hurt
- others or to promote illeagal behavior. I would like to see CuD
- begin to become more proactive in the fight for the proper use of
- current and developing technology. I would like to see CuD
- support ethical uses of technology instead of complaining about
- cyber-cops doing their best to crack down against child
- pornography, etc. True, there are some censorship activities
- that are going much too far. But I think that we need to realize
- that there are malicious people who choose to use it as a weapon;
- we should do what we can to stop that. If you will work to
- better edit the articles you publish, and begin to look into the
- issues I've state above, pleae let me know as I will want to
- resume my readings.
-
- Thank you.
-
-
- --
- *********************************
- Mike Oar
- Intern, QA Engineer
- Mentor Graphics Corp.
-
- ------------------------------
-
- Date: Wed, 4 Jun 1997 06:32:52 -0700 (PDT)
- From: Elric of Imrryr <elric.of.imrryr@USA.NET>
- Subject: File 6--Re: Germany "cybercops" battle offensive speech, violent games
-
- From--Gurney Halleck <gurneyh@ix.netcom.com>
-
- >I guess now any jerkwater police department can become an International
- >Cyberspace Policing Unit.
-
- >While they can do what ever they want in their country (I still don't
- >like it), I don't see how they get off "policing" the world Internet.
- >Do they plan to extradite "criminals" to Germany to face charges there?
- >Seems that this police department is over stepping its jurisdiction
- >(unless German police is nationalized and has authority to prosecute
- >national/international crime a la US FBI, DOJ...)
-
- They could issue a european warrent which could result in your
- arrest if you travel to any country in european. An american who
- was selling nazi matarial by mail to residents of Germany was
- arrested in Denmark at the request of Germany authorities.
-
- The US is supposely considering changes to its laws to allow one
- to be prosecuted here for "morals" offenses committed abroad. So
- if you violate morals laws in Germany, you could faces charges in
- US, especially with hot botton issues like child porn.
-
- Also, they don't need to convict to win. Just having someone
- accused can result in that person losing their job and/or being
- run out of town. Having to fight an international criminal
- charge could drive most people into bankruptcy.
-
- ------------------------------
-
- From: rsh@IDIRECT.COM(RSH)
- Subject: File 7--RE: Anti-Spam bills....
- Date: Mon, 09 Jun 1997 12:01:09 -0400
-
- In Canada and using a .com address, as you can see from the return
- address in this message, I too get spams from Cyberpromotions,
- etc. and cannot see how either of these bills will enable ME to
- stop the spams. There seems to be nothing in either of these
- bills that makes it clear that Canadians can avail themselves of
- the right to demand removal from the spammer's lists or avail
- themselves of the remedy provided re the $500.
-
- Therefore the question: Is it possible for someone NOT in the US
- to stop spams from the US using either of these vehicles, should
- either pass the Congress?
-
- Bob
-
- R.S. (Bob) Heuman - Willowdale, ON, Canada
- ===================================================
- reply to: <heuman@mtnlake.com> or <rsh@idirect.com>
- Copyright retained. My opinions - no one elses...
- If this is illegal where you are, do not read it!
-
- ------------------------------
-
- Date: Mon, 9 Jun 1997 14:45:12 -0500 (CDT)
- From: Samantha Leggat <sleggat@ix.netcom.com>
- Subject: File 8--Invitation - Interop Security Teleconference
-
- June 9, 1997
- MEDIA ALERT
-
- SOFTBANK Forums to Hold Teleconference
- Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
- Topic: Security -- Issues, Solutions and Controversies
-
- CONTACT:
- Samantha Leggat, Lighthouse Public Relations, (760) 773-4870,
- sleggat@ix.netcom.com
-
- WHAT:
- SOFTBANK Forums will host a press and analyst teleconference with industry
- experts presenting and discussing security issues for enterprise networked
- applications and public Internet access and use. SOFTBANK Forums will also
- be announcing a new event focusing on these issues, the Interop Security
- Symposium, to be held in conjunction with NetWorld+Interop 97 Atlanta,
- October 6-10, 1997.
-
- WHERE:
- Teleconference dial-in: 1-800-260-0712
- Reference conference subject "Interop Security Teleconference"
-
- WHEN:
- Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
-
- WHO:
- SOFTBANK Forums Interop Security Symposium program committee members will
- present information on security issues and answer questions:
-
- Frederick M. Avolio, Vice President of Technology, Trusted Information
- Systems Inc. (TIS)
-
- Michael Millikin, Senior Vice President of Worldwide Content, Interop,
- SOFTBANK Forums
-
- David M. Piscitello, President, Core Competence, Inc., and Program
- Committee member, NetWorld+Interop
-
- Marcus J. Ranum, CEO of Network Flight Recorder, Inc. and Chief Scientist,
- V-One Corporation
-
- BACKGROUND INFORMATION
-
- Significant milestones will be crossed in the field of Internet and
- networked applications security in the coming year. Security and
- communications vendors are expected to announce the availability of
- products that will satisfy several of the most sought-after and urgently
- needed security requirements for secure networking, including: strong
- authentication for core Internet applications (e.g., DNS), new methods for
- defending intranets and extranets against intrusion, hardware-based
- cryptographic protection of data in modems and remote access servers, new
- techniques affording stronger authentication for remote and roaming access
- to enterprise networks over the public Internet, data confidentiality
- through the use of encryption of Internet Protocol payloads, data
- confidentiality for NOS protocols through the use of encrypted tunnels
- through the public Internet, and alternatives for digital key management,
- escrow and recovery.
-
- Many of these features will be based on de facto Internet standards, and
- others will be based on innovative or bleeding edge technology. With these
- issues come certain controversial problems, such as restrictions and
- control, and the controversy should not be dismissed as being of concern to
- academics and security professionals only. During this teleconference,
- industry experts will discuss the subject of security and some of the
- issues involved in securing networks, and answer questions regarding the
- controversies involved.
-
- The Interop Security Symposium is a new Interop event, officially being
- announced June 17, to be held conjunction with NetWorld+Interop 97 Atlanta,
- October 6-10, 1997. In addition to the sessions and presentations in the
- Interop Security Symposium, there will be a hands-on, educational Security
- Hot Spot demonstration on the NetWorld+Interop interactive show floor,
- emphasizing authentication systems, encryption, access controls and
- auditing systems.
-
- The teleconference is open to press and analysts, and time will be allotted
- for questions from the teleconference audience.
-
-
- Samantha Leggat
- Lighthouse Public Relations
- 281 Strada Fortuna
- Palm Desert, CA 92260
- Tel: 760/773-4870
- Fax: 760/773-4821
- Email: sleggat@ix.netcom.com
-
- ------------------------------
-
- Date: Tue, 3 Jun 1997 01:26:56 -0400 (EDT)
- From: Emmanuel Goldstein <emmanuel@2600.COM>
- Subject: File 9--Beyond Hope "Hackers Conference" '97
-
- *** B E Y O N D H O P E ***
-
- the sequel to
-
- H A C K E R S O N P L A N E T E A R T H !
- =====================================================================
- * A G l o b a l H a c k i n g E x p e r i e n c e *
- * A u g u s t 8 , 9 , 1 0 , 1 9 9 7 *
- * N e w Y o r k C i t y *
-
- ---------------------------------------------------------------------
-
- It's time for the inevitable - the sequel to 1994's Hackers On Planet Earth
- conference. If you missed that event, you'll feel even worse if you miss this
- one! Don't let that happen. Beyond Hope will be everything HOPE was and
- probably a lot more.
-
- SPEAKERS/PANELS
-
- So far we're lining up people for panels on social engineering, encryption,
- surveillance, PCS/GSM technology, legal issues, hacker ex-prisoners, "pirate"
- radio, the media, boxing, and a whole lot more. Our biggest worry at this
- point is figuring out how to fit it all into three days. If you have ideas,
- contact us using the methods below.
-
- THE NETWORK
-
- Even though we only had a 28.8 link to the outside world at the 1994 HOPE,
- we still had a lot of fun networking all our computers together. This time
- things will be different. Our link to the net will be faster than ever - at
- the very least a T1 - and we will also be experimenting with video links to
- the Hacking In Progress (HIP) conference going on in Holland. Plus we'll have
- an amazing internal network of old and new machines. Bring your computer and
- whatever toys you have! As in 1994, all attendees will get an account on
- our hope.net machine. Valuable prizes will be awarded to those who
- hack root.
-
- LOGISTICS
-
- It all takes place starting Friday evening, August 8th, running until Sunday
- night, August 10th at the Puck Building in New York City, on the corner
- of Houston and Lafayette Streets. The main part of the conference begins at
- noon on Saturday, with registration starting at 10 am. However, you will also
- be able to register Friday evening beginning at 6 pm and help us set up the
- network for the weekend. There will be a special 2600 meeting beginning
- at 5 pm on Friday at the Citicorp Center, located at 53rd and Lexington.
- To get to the conference from the meeting, take the #6 train downtown to
- Bleecker Street. Follow the signs and portents. ** NOTE: There will also
- be a TAP reunion at Eddie's on Waverly and Mercer - if you were part of the
- old TAP crowd, keep checking our web site (www.hope.net) for specifics! **
-
- THE NEIGHBORHOOD
-
- The Puck Building is in one of the liveliest sections of Manhattan, next to
- Greenwich Village, Chinatown, Little Italy, and SoHo within easy walking
- distance of Bleecker Street, Broadway, Avenue A, and St. Mark's Place. We
- will have a full guide of places and Hope-related activities on our web site
- and at the conference.
-
- TRAVEL
-
- There are many cheap ways to get to New York City in August but you may want
- to start looking now, especially if you're coming from overseas. Travel
- agencies will help you for free. Also, look in various magazines like
- Time Out, Village Voice, local alternative weeklies, and travel sections of
- newspapers. Buses, trains, and carpools are great alternatives to domestic
- flights. Keep in touch with the update sites for more information as it
- comes in.
-
- GETTING TO THE SITE
-
- From the airports: From all three airports (Kennedy, LaGuardia, Newark) you
- can either take a cab or bus to the city - from Kennedy you can take a free
- bus to the subway and take the A train into Manhattan for $1.50. To get to
- the Puck Building in this manner, take the A train to West 4th in Manhattan
- and transfer to a Brooklyn bound B, D, F, or Q for one stop to
- Broadway/Lafayette. If you take a bus, see the directions below from the
- Port Authority.
-
- By car: We'll assume you can find New York City on your own. Once you're
- actually over the bridge or through the tunnel, head for Houston Street,
- just south of 1st Street. The conference takes place on the southeast corner
- of Houston and Lafayette. There are parking garages in the neighborhood and
- many nearby streets allow free parking from Friday evening through the weekend.
-
- By train: From Penn Station, take the A train downtown to West 4th, transfer
- to a Brooklyn bound B, D, F, or Q for one stop to Broadway/Lafayette. From
- Grand Central, take the #6 subway downtown to Bleecker Street.
-
- By bus: From the Port Authority Bus Terminal, take the A train downtown to
- West 4th, transfer to a Brooklyn bound B,D, F, or Q for one stop to
- Broadway/Lafayette.
-
- WHERE TO STAY
-
- The Puck Building is not a hotel, which we believe will make the conference
- itself a lot more interesting. We will be compiling a list of places to stay
- in the city, ranging in price from $40 a night on up. So far, we suggest the
- following: the YMCA at 215 W 23rd Street between 7th and 8th Avenues
- (212-741-9226) - rooms start at $40 and there are no age restrictions;
- Off Soho Suites Hotel on 11 Rivington Street. This hotel is only a couple of
- blocks away from the Puck Building and you can get European style suites,
- complete with kitchens, for a low price. A suite for 2 is $89, for 4 it's
- $149. They also have a location on East 12th Street off 3rd Avenue. Both of
- these hotels don't have a huge number of rooms so we suggest making
- reservations early (212-979-9808); Howard Johnson on 429 Park Avenue South
- between 29th and 30th Streets (212-532-4860) - rooms start at around $100
- a night; and Holiday Inn at 132 Lafayette Street (212-966-8898) - rooms are
- around the $150 level. There are also youth hostels, bed and breakfasts,
- and hundreds of other hotels in the city. This is only a preliminary list -
- check with us for more details as the conference draws closer. You should
- make reservations no closer than three weeks prior to the conference.
- Remember, the cost of a room is lessened significantly if you split it with
- other people. Bring sleeping bags to increase your flexibility.
-
- WHAT WE NEED
-
- Ideas, people, computers, technology of all sorts.
-
- HOW TO STAY UPDATED
-
- There are many ways to keep updated as preparations get underway. We will be
- posting updates on our office phone line - (516) 751-2600 - as well as
- the 2600 voice BBS - (516) 473-2626. The official Beyond Hope website can be
- reached at www.hope.net and updates will also be found on the 2600 website at
- www.2600.com. On the websites you'll find details on how to be part of the
- Beyond Hope mailing lists. Email info@hope.net for the latest information,
- travel@hope.net for cheap fares and advisories, tech@hope.net for technical
- questions and suggestions, speakers@hope.net for anyone interested in
- speaking at the conference, and vol@hope.net for those of you who want to
- volunteer to help. On usenet, read alt.2600.hope.announce for the latest
- announcements, alt.2600.hope.d for an ongoing discussion about the
- conference, and alt.2600.hope.tech for technical setup discussion.
-
- REGISTRATION
-
- The cost for pre-registration is $20 for the weekend. While we hope to keep
- the cost at $20 for those who register at the conference, we may wind up
- filling the place up (capacity is only around 2,000 after all) and, in that
- event, pre-registrants will have priority. So send us $20, your name and
- address, and we'll send you a pass that will get you in without a hassle or
- a wait. Make checks payable to 2600. The address is Beyond Hope,
- c/o 2600 Magazine, PO Box 848, Middle Island, NY 11953. Don't send us
- anything after July 15, 1997 to ensure that your pass is received in time.
- Special Offer: FREE ADMISSION for anyone coming to Beyond Hope from
- overseas with a foreign passport. North Americans not eligible.
-
-
- NAME: _____________________________________________________________________
-
- ADDRESS: __________________________________________________________________
-
- CITY, STATE, ZIP, COUNTRY: ________________________________________________
-
- PHONE (optional): ________________ email (optional): ______________________
-
- IMPORTANT: If you're interested in participating in other ways or
- volunteering assistance, please give us those details in addition.
- So we can have a better idea of how big the network will be, please
- let us know what, if any, computer equipment you plan on bringing.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.44
- ************************************
-
-
-