home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun June 15, 1997 Volume 9 : Issue 46
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.46 (Sun, June 15, 1997)
-
- File 1--CFP: Symposium on Network and Distributed System Security (fwd)
- File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)
- File 3--Upcoming Computer Policy and Law Program
- File 4--Sequel/Internet Monitoring at NetSec
- File 5--SSA Privacy Forum 6.16.97
- File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 10 Jun 1997 11:11:25 -0500
- From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 1--CFP: Symposium on Network and Distributed System Security (fwd)
-
- CALL FOR PAPERS
-
- The Internet Society Symposium on Network and Distributed System Security
-
- Where: San Diego, California
- When: March 1998
-
- GOAL: The symposium will foster information exchange between hardware and
- software developers of network and distributed system security services.
- The intended audience is those who are interested in the practical aspects
- of network and distributed system security, focusing on actual system
- design and implementation, rather than theory. Encouraging and enabling
- the Internet community to apply, deploy, and advance the state of available
- security technology is the major focus of symposium. Symposium proceedings
- will be published by the Internet Society. Topics for the symposium
- include, but are not limited to, the following:
-
- * Architectures for large-scale, heterogeneous distributed systems
- * Security in malleable systems: mobile code, mobile agents, dynamic policy
- updates, etc.
- * Special problems: e.g. interplay between security goals and other goals --
- efficiency, reliability, interoperability, resource sharing, and cost.
- * Integrating security services with system and application security
- facilities and with application protocols, including message handling,
- file transport, remote file access, directories, time synchronization,
- data base management, routing, voice and video multicast, network
- management, boot services, and mobile computing.
- * Fundamental services: authentication, integrity, confidentiality,
- authorization, non-repudiation, and availability.
- * Supporting mechanisms and APIs: key management and certification
- infrastructures, audit, and intrusion detection.
- * Telecommunications security, especially for emerging technologies -- very
- large systems like the Internet, high-speed systems like the gigabit
- testbeds, wireless systems, and personal communication systems.
- * Controls: firewalls, packet filters, application gateways
- * Object security and security objects
- * Network information resources and tools such as World Wide Web (WWW),
- Gopher, Archie, and WAIS.
- * Electronic commerce: payment services, fee-for-access, EDI, notary;
- endorsement, licensing, bonding, and other forms of assurance; intellectual
- property protections
-
- GENERAL CHAIR:
- David Balenson, Trusted Information Systems
- PROGRAM CHAIRS:
- Matt Bishop, University of California at Davis
- Steve Kent, BBN
- PROGRAM COMMITTEE:
- Steve Bellovin, AT&T Labs -- Research
- Doug Engert, Argonne National Laboratories
- Warwick Ford, VeriSign
- Li Gong, JavaSoft
- Rich Graveman, Bellcore
- Ari Juels, RSA Laboratories
- Tom Longstaff, CERT/CC
- Doug Maughan, National Security Agency
- Dan Nessett, 3Com Corporation
- Rich Parker, NATO
- Michael Roe, Cambridge University
- Rob Rosenthal, DARPA
- Wolfgang Schneider, GMD Darmstadt
- Christoph Schuba, Purdue University
- Win Treese, Open Market, Inc.
- Jonathan Trostle, Novell
- Gene Tsudik, USC/Information Sciences Institute
- Steve Welke, Institute for Defense Analyses
- LOCAL ARRANGEMENTS CHAIR:
- Thomas Hutton, San Diego Supercomputer Center
- PUBLICATIONS CHAIR:
- Steve Welke, Institute for Defense Analyses
- LOGISTICS CHAIR:
- Torryn Brazell, Internet Society
-
- SUBMISSIONS: The committee invites technical papers and panel
- proposals, for topics of technical and general interest. Technical
- papers should be 10-20 pages in length. Panel proposals should be two
- pages and should describe the topic, identify the panel chair, explain
- the format of the panel, and list three to four potential panelists.
- Technical papers will appear in the proceedings. A description of each
- panel will appear in the proceedings, and may at the discretion of the
- panel chair, include written position statements from each panelist.
-
- Each submission must contain a separate title page with the type of
- submission (paper or panel), the title or topic, the names of the
- author(s), organizational affiliation(s), telephone and FAX numbers,
- postal addresses, Internet electronic mail addresses, and must list a
- single point of contact if more than one author. The names of authors,
- affiliations, and other identifying information should appear only on
- the separate title page.
-
- Submissions must be received by 1 August 1997, and should be made via
- electronic mail in either PostScript or ASCII format. If the committee
- is unable to print a PostScript submission, it will be returned and
- hardcopy requested. Therefore, PostScript submissions should arrive
- well before 1 August. If electronic submission is difficult,
- submissions should be sent via postal mail.
-
- All submissions and program related correspondence (only) should be
- directed to the program chair: Matt Bishop, Department of Computer
- Science, University of California at Davis, Davis CA 95616-8562,
- Email: sndss98-submissions@cs.ucdavis.edu. Phone: +1 (916) 752-8060,
- FAX: +1 (916) 752-4767,
-
- Dates, final call for papers, advance program, and registration
- information will be available at the URL:
- http://www.isoc.org/conferences/ndss98.
-
- Each submission will be acknowledged by e-mail. If acknowledgment is
- not received within seven days, please contact the program chair as in-
- dicated above. Authors and panelists will be notified of acceptance by
- 1 October 1997. Instructions for preparing camera-ready copy for the
- proceedings will be sent at that time. The camera-ready copy must be
- received by 1 November 1997.
-
- ------------------------------
-
- Date: Tue, 10 Jun 1997 00:15:54 -0400
- From: Russ Haynal <Russ@NAVIGATORS.COM>
- Subject: File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)
-
- DC-ISOC Announces additional details of its next event...
-
- - - - - - Internet Gridlock - Fact, Fiction, or Future ? - - - - -
-
- Monday, June 16, 1997, 7-9 p.m.
-
- There has been increasing press coverage about the Internet's incredible
- growth, and the occasional Internet "brown-outs" or ISP outages. Is the
- Internet going to collapse under its own weight? Is congestion inevitable,
- or will access speeds improve overall? Join DC-ISOC to hear from Industry
- leaders how the Internet's infrastructure is growing and adapting to this
- exponential growth.
-
- Meeting Agenda
-
- Speaker #1: David Boyes - Internet Backbone and Interconnection Engineer
- Dimension Enterprises
-
- This first talk outlines what's on the other side of your
- favorite ISP, discusses some changes in the Internet backbone
- structure and interconnection policy, and outlines one network
- engineer's viewpoint on what current major challenges are to
- developing a higher-performance Internet backbone in a
- completely economically competitive Internet.
- http://www.dimension.net dboyes@dimension.net
-
- Speaker #2: Robert Cannon - Computer Telecommunications Attorney
- practicing in the Washington DC area.
-
- The baby bells have been lobbying for access charge reform
- due to the congestion that the Internet is allegedly causing
- on the voice phone system. Robert will give us a preview of
- his "Cybernauts vs. Ma Bell" Paper being presented this
- summer at INET '97
- http://www.cais.net/cannon/ cannon@dc.net
- http://www.fcc.gov/isp.html (FCC Access Charge Reform Homepage)
-
- Speaker #3: Robert Hagens - Director, Internet Engineering
- MCI Telecommunications Corporation
-
- Presentation of MCI's strategy to keep its Internet
- backbone ahead of the capacity curve, or "How to avoid
- being run over by the Internet freight-train!"
- http://www.mci.com
-
- Speaker #4: TBD - Sprint Internet Services
-
- Presentation of Sprint's approach to keep up with
- the Internet's rapid growth.
- http://www.sprint.com/fornet/
-
- Speaker #5: Charles Brownstein - Executive Director
- Cross-Industry Working Team, CNRI
-
- As the Internet matures into a core component of the
- commercial communications infrastructure, the providing
- industry needs mechanisms to keep it robust and reliable.
- IOPS.ORG is a mechanism for engineering reliability
- solutions in the Internet context. XIWT is an industry
- group devoted to advancing NII architecture, services and
- applications, and to industry cooperation to advance the NII
- marketplace in the public interest.
- http://www.iops.org and http://www.xiwt.org
-
- Following the speaker presentations, there will be an open Q&A session
- with the audience.
-
- - - - - - - - - Meeting Location - - - - - - - - - -
-
- The meeting will be held at the Sprint/Global One Building in Reston, VA
- (12524 Sunrise Valley Dr.) This is immediately off the Dulles Toll-road;
- only minutes from Tysons Corner
-
- Directions From Beltway/Tysons Corner:
-
- - Take Dulles Toll road west to exit 11
- (exit sign is for Fairfax County Parkway; Rte 7100)
- - At end of exit ramp, make a left onto Fairfax County Parkway (South)
- - At first intersection light, make a right onto Sunrise Valley Drive
- - Make immediate right into Sprint/Global One Campus
- - Global One building is the first building on your left
- ( # 12524 Sunrise Valley Drive)
- - Ample parking is available on your right
- - Enter through front lobby - Go down the stairs to the conference center
-
- As with all of our previous events, there is no charge to attend this event.
- Seating will be on a first-come, first-seated basis, though we expect that
- there should be room for all those interested.
-
- Please plan to arrive by 6:45, so we can begin on time, at 7pm
-
- ************* T H A N K S T O O U R S P O N S O R ***************
- * DC-ISOC wishes to thank Sprint Internet Services *
- * for sponsoring this meeting. *
- * Sprint's Global all-fiber network makes them uniquely qualified to *
- * bring you innovative products and services for Internet, Intranets, *
- * and IP Security. Please visit, http://www.sprint.com/fornet/ *
- * (To Sponsor a DC-ISOC Meeting, see http://www.dcisoc.org/sponsor.htm )*
- *************************************************************************
-
- Individuals who are interested in becoming members of DC-ISOC can do so
- by joining the Internet Society. See their web site at
- http://www.isoc.org for more information.
-
- The Washington DC Chapter of the Internet Society maintains its own web
- site at: http://www.dcisoc.org Please feel free to pass this announcement
- message along to other interested individuals. If this message was
- forwarded to you, you can join our announcement mailing list through
- out web site ( http://www.dcisoc.org )
-
- ------------------------------
-
- Date: Mon, 9 Jun 1997 19:32:13 -0500
- From: "Margie W. Hodges" <mwh2@cornell.edu>
- Subject: File 3--Upcoming Computer Policy and Law Program
-
- *************************************************************
- CORNELL UNIVERSITY
- COMPUTER POLICY AND LAW
- July 9-11, 1997
- Ithaca, New York
- *************************************************************
-
- An Invitation
- -------------
- To Technology Administrators, Legal Counsel, Judicial Administrators,
- Risk Managers, Auditors, Librarians, and Affirmative Action Officers at
- Colleges and Universities.
-
- In order to design appropriate computer-use policies and to plan for
- their effective implementation, colleges and universities must develop
- a new level of collaboration between technology specialists and the
- institution's legal counsel. At COMPUTER POLICY AND LAW, participants
- will examine the legal implications of extensive campus networking and
- explore frameworks for limiting personal and institutional exposure to
- liability, while at the same time preserving free speech and academic
- freedom.
-
- All too often computer-use policies are developed in response to crises
- resulting from the misuse of computer and networking resources. The
- Computer Policy and Law program will provide a much-needed opportunity
- to take stock of our institutional policies in an atmosphere of frank
- evaluation and informed discussion. PLEASE JOIN US as we identify the
- hallmarks of best practice in this area and develop the policy
- frameworks that will serve all of us in the critical days ahead.
-
-
- PROGRAM SESSIONS:
-
- Communication Technologies in Higher Education
- ----------------------------------------------
- We'll go on-line to explore the remarkable resources available to the
- faculty, staff, and students of an Information Age institution and to
- discover how electronic communications are used for scholarship and
- instruction, registration and record-keeping, study and research. As
- we review the state of the art of electronic communications
- technologies, we will identify the legal issues raised by the use of
- e-mail, listservs, discussion groups, the World-Wide Web, and desktop
- videoconferencing systems, such as Cornell's CU-SeeMe.
-
- Copyright in Cyberspace
- -----------------------
- Electronic communication technologies have dramatically increased the
- ease with which words and images can be copied, altered, and
- disseminated. On-line instructional materials, for example, often
- present text and graphics adapted from other sources. While copyright
- infringement is widespread on the Internet, it is not legal. Current
- case law and legislation provide mixed signals about an institution's
- responsibility to curb copyright infringement on its computer
- networks. This session will review how institutional copyright
- policies can navigate such uncertainty and provide accurate information
- about the application of copyright laws and permissions policies in
- cyberspace. It will also cover trademark law, including strategies
- for protecting institutional logos and domain names. An entire session
- is devoted to the future of copyright law and policy.
-
- Public Key Infrastructure
- -------------------------
- Public-key encryption provides the technological base for secure
- e-mail, digitally "signed" transactions, and reliable authentication.
- For higher education, this technology will present new opportunites for
- conducting business electronically, both with outside organizations and
- between internal departments. Interactions among all members of the
- university community will likely be impacted. This session will
- examine the emerging public-key infrastructure in the context of
- existing and anticipated legislation and case law.
-
- Electronic Communications: Institutional and Individual Liability
- -----------------------------------------------------------------
- This presentation will provide an overview of laws relating to libel,
- pornography, obscenity, indecency, and "negligent publication"
- (including the Telecommunications Act of 1996), as they pertain to
- colleges and universities in their roles as on-line information
- distributors. It will focus on the new theories of law used in recent
- litigation over on-line incidents, including CyberPromotions v. AOL.
- We will outline a number of steps that network administrators can take
- to minimize institutional and individual liability when responding to
- complaints about illegal or offensive materials.
-
- On-Line Privacy
- ---------------
- The institution may own the computers and the networks, but who owns
- the information on them? What on-line privacy rights do computer users
- have, and does the answer vary by an individual's status as a student,
- faculty member, or staff member? Formulating answers that will provide
- a basis for policy making, we will look at the details of open records
- laws, the Electronic Communications Privacy Act (ECPA), the Family
- Educational Rights and Privacy Act (FERPA), and discovery issues
- surrounding records retention policies.
-
- Policy Panel
- ------------
- College and university administrators are called upon with increasing
- frequency to respond to complaints about misuse of computer resources,
- many involving such emotionally charged issues as harassment and
- discrimination. In this panel presentation, representatives of a
- variety of institutions will describe the policies they relied on -- or
- later implemented -- to deal with a number of highly publicized
- computer-abuse cases. Panelists will address how well these
- institutional policies served those affected by the conflict and what
- steps they would take in resolving similar problems today. Particular
- attention will be given to the ways institutional goals and
- administrative structures should influence policy design and
- implementation.
-
- Computer Crime and the Law
- --------------------------
- This session will provide an update on recent initiatives of the US
- Department of Justice Computer Crime Unit, including current
- perspectives on the ECPA. Topics will include the scope of the
- computer crime problem, changes in legislation, sentencing guidelines,
- and efforts on domestic and international fronts to reduce
- computer-related crimes.
-
- Designing Computer-Use Policies You Can Live With
- -------------------------------------------------
- Pulling it all together, this session will provide a framework for
- policy making on your campus. Highlighting the advantages and
- disadvantages of existing policies, we will address ways to decrease
- legal and public relations liability, to use educational programs to
- inform campus communities about their rights and responsibilities in
- cyberspace, and to draw on model policies to meet the needs and goals
- of individual institutions.
-
- The Cornell Legal Information Institute Post-Program Open House
- ---------------------------------------------------------------
- The Legal Information Institute at the Cornell Law School (LII) was
- established in July, 1992 to explore new ways of distributing legal
- documents and commentary in electronic form. The LII will host an Open
- House at the Cornell Law School on Friday, 11 July, 1997, from 2:00 to
- 3:30 p.m. The founding (and current) directors of the LII, Thomas R.
- Bruce and Peter W. Martin, the Jane M.G. Foster Professor of Law at
- Cornell, will be present to answer questions about the development,
- operation, and future initiatives of the Institute. All participants
- in the Computer Policy and Law Program are invited to attend.
-
- PROGRAM PRESENTERS:
-
- Dan L. Burk, Assistant Professor of Law, Seton Hall University
-
- Mark Eckenwiler, Attorney, Computer Crime Unit, Department of Justice
-
- Robert W. Hamilton, Partner, Jones, Day, Reavis & Pogue
-
- Marjorie W. Hodges, Program Director, Computer Policy and Law, and
- Policy Advisor, Office of Information Technologies, Cornell University
-
- Barbara L. Krause, Judicial Administrator, Cornell University
-
- Terrence P. Maher, Special Counsel, Cooley, Godward, LLP
-
- Steven J. McDonald, Associate Legal Counsel, The Ohio State University
-
- Gary M. Pavela, Director, Judicial Programs, University of Maryland -
- College Park
-
- David Post, Visiting Associate Professor of Law, Georgetown University
- Law Center, and Co-Director, Cyberspace Law Institute
-
- Brian B. Shaw, Partner, Cumpston and Shaw
-
- Steven L. Worona, Program Director, Computer Policy and Law, and
- Assistant to the Vice President for Information Technologies, Cornell
- University
-
- PROGRAM FEE:
- $875, which includes meals.
- Enrollment is limited; early registration is encouraged.
-
- FOR INFORMATION:
- Computer Policy and Law
- E-mail: sp@sce.cornell.edu
- Phone: (607) 255-7259
- Fax: (607) 255-8942
- B20 Day Hall, Cornell University, Ithaca, NY 14853-2801
- http://www.sce.cornell.edu/exec/CPL.html
-
-
- *************************************************************
-
- Marjorie W. Hodges
- Office of Informatiopn Technologies
- 326 CCC, Garden Avenue
- Cornell University
- Ithaca, NY 14850
-
- email: mwh2@cornell.edu
- phone: (607) 255-4188
- fax: (607) 254-5222
-
- ------------------------------
-
- Date: Tue, 10 Jun 1997 07:04:07 -0400 (EDT)
- From: mds@mds.prwire.com
- Subject: File 4--Sequel/Internet Monitoring at NetSec
-
- Sequel/Internet Monitoring at NetSec
-
- Sequel Technology Presents Net Access Manager Internet Monitoring and
- Reporting Software at CSI's NetSec Conference
-
- Sequel's Cornerstone Product Enhances Network Security and Complements
- Firewall Technology
-
- SAN FRANCISCO, June 10 /PRNewswire/ -- Sequel Technology, leading
- developer of the Sequel Net Access Manager(TM) Internet and intranet
- monitoring and reporting tool, announced today at the Computer Security
- Institute (CSI) NetSec conference, its plan to enhance network security by
- offering a tool that measures employee usage of the Internet and manages
- access privileges at the individual, departmental or enterprise level.
- "Many businesses, today, think of firewalls as a vaccine for Internet
- security," said Richard Villars, Director of Network Architectures and
- Management at IDC Research. "Once a firewall is installed, they believe that
- they're immune to all future security problems. Unfortunately, many companies
- quickly discovered that this sense of security is an illusion. Organizations
- need to develop Internet usage polices for their internal users and
- reinforcing these guidelines with software that manages the flow of traffic
- both into and out of the network."
-
- How Net Access Manager Adds Value to a Firewall
- Sequel Net Access Manager provides IS managers with a customizable toolset
- for reporting and managing connections from the network to the Internet. Like
- a firewall, it provides the highest degree of security by running from the
- server and working as a dual-homed gateway to accurately monitor all TCP/IP
- activity between network users and the Internet.
- Sequel Net Access Manager is Internet management software that is designed
- to monitor access from the inside (network users) to the outside (the
- Internet). Conversely, a firewall works by blocking outside intruders from
- entering into the network. Together, these two technologies offer a
- comprehensive security solution.
-
- Sequel Provides Sophisticated E-mail Security
- Sequel Technology will soon be joining forces with two leading security
- software vendors -- Integralis and SRA International -- to offer a fully
- integrated high-end surveillance solution to supervise, track and log all
- e-mail communications. Key components of the system include e-mail content
- management software from Integralis which opens and screens the subject,
- message body and all attachments for viruses or offensive language. An even
- more intensive screening process developed by SRA uses sophisticated natural
- language analysis to detect even the most subtle language patterns, such as
- "guaranteed money maker" and "hot little tech stock." After the messages have
- been cleared and delivered to the end user, the Sequel component logs all
- traffic and generates various types of activity reports. The three partners
- will be launching the financial solution in July, with plans to customize the
- software for other industries which require the same level of management over
- highly sensitive information; such as medical records, banking statements,
- personnel records and insurance claims.
-
- About Sequel
- Sequel Technology Corporation was founded in 1995 and is the worldwide
- leader in the development, marketing and support of powerful and practical
- Internet Management Software products. These products allow information
- systems professionals, management and end users to better understand and
- manage their corporate and individual investment in Internet, intranet and
- online usage. Sequel Technology is an international company with over eighty
- employees located in offices around the world including Seattle, New York,
- Chicago, Washington, D.C., Atlanta, London, Tokyo, Ottawa and Toronto. Sequel
- Technology can be reached at the corporate offices located at Suite 300,
- 3245 - 146th Place SE, Bellevue, WA 98007, telephone 206-556-4000 or at
- http://www.sequeltech.com.
- NOTE: Sequel Technology and Sequel Net Access Manager are trademarks of
- Sequel Technology. All other trademarks, trade names or service marks are the
- property of their respective owners.
-
- SOURCE Sequel Technology
- -0- 06/09/97
- /CONTACT: Frances Cala, Public Relations Specialist, 206-556-4074, or
- fcala@sequeltech.com, or Susan McPherson, Director, Public Relations,
- 206-556-4057, or smcpherson@sequeltech.com, both of Sequel Technology/
-
- ------------------------------
-
- Date: Fri, 13 Jun 1997 18:05:37 -0400
- From: Dave Banisar <banisar@EPIC.ORG>
- Subject: File 5--SSA Privacy Forum 6.16.97
-
- Social Security Administration Forum
- Privacy and Customer Service in the Electronic Age
-
- Monday, June 16, 1997
-
- Georgetown U. Law Center
- Moot Court Room
- 600 New Jersey Ave. NW
- Washington D.C. 20001
-
-
- Agenda:
-
- WELCOME
-
- 12-12:15 pm
-
- Welcome by Marc Rotenberg, Director,
- Electronic Privacy Information Center and
- Professor, Georgetown Law University
-
- Introduction of Dr. John J. Callahan,
- Acting Commissioner of the Social Security Administration
-
- PANEL #1 PRIVACY EXPERTS AND CONSUMER ADVOCATES 12:15-1:15 pm
-
- Leslie Byrne, Special Assistant to the President, and
- Director, U.S. Office of Consumer Affairs
-
- Harry Hammitt, Editor and Publisher,
- Access Report Newsletter
-
- Evan Hendricks, Editor and Publisher,
- Privacy Times and Chairman, U.S. Privacy Council
-
- Sally Katzen, Director, Office of Information
- and Regulatory Affairs, Office of Management and Budget
-
- Deirdre Mulligan, Staff Counsel, Center for
- Democracy and Technology
-
- PANEL #2 COMPUTER TECHNOLOGY EXPERTS 1:30-2:15 pm
-
- Edward G. Amoroso, Technical Manager, AT&T Laboratories
-
- Michael Angelo, Principal Member, Technology Staff,
- Compaq Corporation
-
- Dorothy E. Denning, Professor of Computer Science,
- Georgetown University
-
- David P. Jablon, Software Engineer and Cryptographic
- Specialist, Integrity Sciences, Inc.
-
- George Spix, Chief Architect Consumer Platforms Division,
- Microsoft Corporation
-
- PANEL #3 INTERNET COMMERCE, BANKING AND FINANCIAL PLANNING EXPERTS
-
- 2:30-3:15 pm
-
- Mark Greene, Vice President, Electronic Payments and
- Certification, IBM Internet Division
-
- Russ Housely, Chief Scientist, Spyrus, Inc.
-
- Charles Merrill, Partner, McCarter & English Law Firm
-
- Jahan Moreh, Chief Security Architect, Open Horizon, Inc.
-
-
- PUBLIC COMMENT PERIOD - 3:15 pm
-
- Members of public who have registered may
- speak for 4 minutes. The panel may ask
- questions following each individual's
- testimony, if desired.
-
-
- CLOSING REMARKS - 4:30 pm
-
- For more information and directions, see:
-
- http://www.ssa.gov/forums/washingtondc.htm
-
- More information on EPIC is available at
-
- http://www.epic.org/
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.46
- ************************************
-
-
-