home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun July 20, 1997 Volume 9 : Issue 57
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.57 (Sun, July 20, 1997)
-
- File 1--USACM & IEEE-USA Letter on S. 909 (fwd)
- File 2--CFP '98 Request for Proposals
- File 3--Some Legal Advice for beyondHOPE Conferees
- File 4--Some humor on media hacks and hackers
- File 5--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 19 Jul 97 14:27 CDT
- From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
- Subject: File 1--USACM & IEEE-USA Letter on S. 909 (fwd)
-
- ============
-
- Date--Tue, 08 Jul 1997 06:17:52 -0400
- From--ACM US Public Policy Office <usacm_dc@acm.org>
-
- **************************************
-
- The Institute of Electrical and Electronics Engineers-
- United States Activities
- 1828 L Street, NW, Suite 1202
- Washington, DC 20036
- T: (202) 785-0017; F: (202) 785-0835
-
- The Association for Computing
- U.S. Public Policy Office
- 666 Pennsylvania Ave., SE
- Suite 302 B
- Washington, DC 20003
- T: (202) 544-4859
- F: (202) 547-5482
-
-
- July 3, 1997
-
- The Honorable John McCain
- Chairman
- Senate Commerce, Science & Transportation Committee
- 241 Russell Senate Office Bldg.
- Washington, DC 20510
-
- Dear Mr. Chairman:
-
- The U.S. Public Policy Office for the Association for Computing (USACM) and
- The Institute of Electrical and Electronics Engineers-United States
- Activities (IEEE-USA) note with considerable dismay the Senate Commerce,
- Science and Transportation Committee's recent approval of S. 909, the
- "Secure Public Networks Act."
-
- We share many of the concerns of the Committee members regarding problems
- of national security and law enforcement. However, we believe that the
- "Secure Public Networks Act," as approved by the Committee, leads U.S.
- encryption policy in the wrong direction. The proposed bill stands in
- opposition to the scientific and professional opinions of many experts who
- believe that national security and public safety will be weakened by the
- mandated introduction of constrained or recoverable-key encryption. We
- also believe that such action will hinder U.S. competitiveness in
- international markets, establish a dangerous precedent for the future, and
- endanger cherished civil liberties in the U.S. and elsewhere in the world.
-
- Since no hearings were held on the bill, the Committee may not have had
- full information on its implications.
- We believe the bill will have a serious, negative and long-term impact on
- society in general and on our organizations and their members. We are
- keenly interested in supporting significant consideration of the important
- issues involved, and we would very much like to provide technical and
- scientific input on this issue. Many of our members are
- internationally-recognized experts in the area of information security and
- encryption, and several have significant experience with law enforcement
- and national security issues. We would be happy to put you in contact with
- some of these experts should you desire more information on the points we
- outline in this letter.
-
- In what follows, we briefly outline some of the reasons why so many
- experts believe such a bill is harmful if it became law.
-
-
-
-
-
- - 2 -
-
- First, the bill is economically harmful. Voting to restrict strong
- cryptography would damage America's dominance in information technologies.
- Secure software and hardware is available overseas. Mathematical acumen
- exists around the world; the U.S. can neither control nor contain it.
- Software companies will continue to be forced to seek talent elsewhere.
- The widely-used, strong cryptographic algorithm IDEA, for example, was
- developed in Europe. U.S. software and hardware suppliers can incorporate
- IDEA into their products, but only if those products are confined to use in
- the U.S. Export controls have obviously not hindered the worldwide spread
- of encryption products based on IDEA and produced outside the U.S. These
- controls have merely prevented U.S. providers from participating in that
- global market. Customers throughout the world have the sophistication to
- understand the need for strong cryptographic products and they will
- continue to seek to buy them wherever they are sold. The result will be an
- increasing loss of jobs and revenues in an area where the U.S. once held
- the dominant position. It is conceivable that our own industry and
- civilian sector might eventually become dependent on foreign cryptography
- products should U.S. firms continue to be prohibited from open competition
- in this arena.
-
- Second, this bill threatens cherished civil freedoms. Information
- technologies make data surveillance possible and increasingly affordable.
- The best technical protections available to the individual depend upon
- cryptography. There is also an unfortunate history of a few law
- enforcement agents and government officials using their positions and
- access to violate the law and the rights of citizens. Strong encryption is
- the only practical means available to law-abiding citizens to defend
- themselves against these infrequent, but all-too-real abuses.
-
- The wording in the proposed bill for organizations with Federal funding to
- rely on a mandated form of encryption will be burdensome and may lead to
- severe invasions of privacy. For instance, if a library or university were
- forced to implement such encryption, how could the organization ensure that
- its users were actually employing the system? The only sure method would
- be to "snoop" on the messages to see if they were breakable under the
- mandated scheme. Otherwise, users would be able to substitute their own
- encryption instead of, or in addition to, the mandated form, thus rendering
- this bill meaningless but still costly to implement. This raises serious
- questions about privacy -- and more importantly -- First Amendment
- considerations.
-
- Third, the criminal element will not be hindered by any legislation similar
- to the one proposed. The referenced bill provides no provisions that would
- actually deter criminals from employing strong encryption obtained from
- other sources. Drug cartels, terrorists, pornographers and others who
- might use encryption in criminal enterprises are already violating laws
- with penalties much more severe than any that might be imposed for using
- unauthorized encryption technologies. Meanwhile, law-abiding citizens
- would be forced to rely on technologies that might not protect their
- private information against "crackers" and potential blackmailers. As in
- the physical world, the best public safety results from crime prevented
- through good practices, rather than crimes solved. Without strong
- cryptography Americans cannot lock their electronic doors, but must instead
- remain vulnerable. Thus, constraining cryptography might help law
- enforcement solve a small number of crimes, but it will do nothing to
- prevent opportunities for even more crimes, thereby reducing overall public
- safety.
-
- Fourth, constraints on strong cryptography will jeopardize national
- security. Requiring or encouraging weakened technology leaves the United
- States vulnerable to information warfare from other nation-states,
- techno-anarchists and terrorists, and from organized criminal elements. It
- is vital that telephone systems, medical health care systems, utility
- systems, and other control mechanisms affecting every sector of the economy
- be made more secure and not restrained from using improved security. Our
- national security depends on the reliability of our
-
-
-
-
- - 3 -
-
- national infrastructures and critical systems, particularly those based on
- computer and communications technology. To legislate the use of untested
- mechanisms that present weakened protection, or that have a single point of
- failure and attack, will unnecessarily endanger those critical institutions
- and the people who depend on them. Those same forces arrayed against our
- national interests will be freely able to obtain stronger cryptography
- technology from the many other countries that do not place restrictions on
- its development and sale.
-
- Fifth, information technologies change quickly. We don't want to require
- enabling legislation whenever advances in technology increase the
- vulnerability of current key lengths. The recent cracking of 56-bit DES in
- the RSA challenge shows that distributed computing power is now available
- to break this key length, thus identifying a need for larger keys. A
- breakthrough in mathematics, such as increasing the speed of factoring
- numbers, would require a prompt response, such as increasing key lengths or
- changing algorithms. The proposed legislation would severely discourage
- such changes. Additionally, by preventing the initial acquisition of
- strong encryption technology, the need for near-term upgrades to defeat
- improved cracking techniques is almost assured, as are the extra financial
- burdens.
-
- As a last point, consider the implicit message sent by passage of this act
- or any like it. The U.S. has long been a vocal proponent of freedom of
- speech and other civil rights for citizens around the world. Why should
- any other nation's leaders heed further such rhetoric if the U.S. adopts
- the proposed bill? If some foreign nation with a history of oppression
- were to pass the same legislation so as to eavesdrop on their citizens'
- communications for purposes of identifying human rights activities, we
- would register strong disapproval. With passage of legislation such as the
- "Secure Public Networks Act" the U.S. loses the moral high ground in any
- future such scenario.
-
- In summary, our professional position is that passage of the "Secure
- Public Networks Act" or similar legislation is ill-advised; we urge you to
- defeat this bill. Instead, we encourage passage of legislation such as
- Senator Conrad Burns' Pro-CODE bill, or Representative Bob Goodlatte's SAFE
- bill as a better, more effective aid to national security, law enforcement
- and civil rights.
-
- IEEE is the world's largest technical professional association with 320,000
- members worldwide. IEEE-USA promotes the career and technology policy
- interests of the more than 220,000 electrical, electronics and computer
- engineers who are U.S. members of the Institute. The Association for
- Computing (ACM) is an international non-profit educational and scientific
- society with 76,000 members worldwide, 60,000 of whom reside in the U.S.
- USACM strives to promote dialog on technology policy issues among U.S.
- policy makers, the general public, and the technology community.
-
- If you need additional information, please contact Deborah Rudolph in the
- IEEE-USA Washington office at (202) 785-0017 or Lauren Gelman in the USACM
- Public Policy office at (202) 544-4859 or (202) 298-0842.
-
- Sincerely,
-
-
-
-
- Barbara Simons, Ph.D. Paul J. Kostek
- Chair, U.S. Public Policy Vice Chair
- Committee of ACM United States Activities Board
-
- ------------------------------
-
- Date: Wed, 16 Jul 1997 15:47:28 -0500
- From: ecavazos <ecavazos@interliant.com>
- Subject: File 2--CFP '98 Request for Proposals
-
- REQUEST FOR PROPOSALS: CFP98
-
- (proposals must be received by August 15,1997 to be considered)
-
-
- COMPUTERS, FREEDOM, AND PRIVACY CONFERENCE
- February 18-20, 1998 * Hyatt Regency Austin at Town Lake * Austin, TX
-
- The Eighth Annual Conference on Computers, Freedom, and Privacy (CFP98) is
- scheduled for Wednesday February 18 to Friday February 20, 1998 in Austin,
- Texas, at the Hyatt Regency Austin Hotel on Town Lake.
-
- The Computers, Freedom, and Privacy Conferences serve as an internationally
- recognized forum and gathering place for the key members of the technical,
- government, hacker, legal, security and journalistic communities to address
- cutting edge technical, business, legal and cultural issues.
-
- Topics and speakers from prior years' CFP conferences can be found at the
- CFP web site, http://www.cfp.org.
-
- For the 1998 CFP conference, The 1998 Program Committee (members listed
- below) is particularly interested in receiving proposals that deal with:
-
- 1) emerging issues relating to privacy and data ownership, such as the use
- of infrared tracking of supermarket shopping carts to monitor search and
- purchasing patterns of customers; developments with medical databases,
- library filtering, GPS tracking systems, etc.
-
- 2) controversial issues;
-
- 3) conflict, e.g., debates where presenters have sharply defined and
- differing points of view, technolibertarian vs. anti-tech "humanist; " or
- have different training/disciplines, e.g., cyberactivists on virtual
- communities vs. sociologist/philosopher/writer discussing nature of the
- "physical world."
-
- 4) innovative and alterantive formats such as moot courts, case studies,
- reverse role playing, etc., to enliven some of CFP's recurring topics that
- are increasingly found at other conferences.
-
- The 1998 Program Committee strongly encourages proposals that involve one
- or two speakers, as well as panel presentations. A single or two person
- presentation is often better focused than a panel and it is the goal of The
- 1998 Program Committee to provide a mix of panels and single/dual speaker
- presentations during the General Session. Ideally, panels will be limited
- to no more than four persons whose views are not duplicative of each other.
-
- In addition to the two and one-half days of General Session, which starts
- the afternoon of Wednesday February 18, CFP98 will offer tutorials. Five or
- six three hour tutorial sessions will be offered on the morning of
- Wednesday February 18. CFP98 will also continue the practice of breakout
- topic presentations during the Thursday and Friday luncheons. The Program
- Committee is seeing proposals for both tutorials and the luncheon sessions.
-
- It is the goal of the CFP98 Program Committee to be able to offer some
- travel money to speakers; however the amount or allocation of travel funds
- depends heavily on success in obtaining sponsors, which will not be known
- until early September.
-
- The CFP98 Program Committee will meet the week of August 18 to finalize
- selection of proposals; consequently all proposals must be received * by
- August 15, 1997 * to assure consideration by the Program Committee.
- Please follow the submission guidelines below.
-
-
- * CFP98 PROPOSAL SUBMISSION GUIDELINES *
-
-
- CFP98 is being organized and hosted this February under the auspices of The
- University of Texas School of Law. Mark Lemley, Professor at The Law
- School, serves as Chair of the Program Committee. He may be reached by
- e-mail at: mlemley@mail.law.utexas.edu
-
- Proposals should include the following information.
-
- 1) Presentation Topic Title:
-
- 2) Presentation Type:
-
- [ ] General Session [ ] Luncheon [ ] Tutorial
-
- 3) Proposed Length of Presentation*
-
- * Presentations during the General Session can range from .5 to 1.5 hours.
- Breakout luncheon presentations are 1.0 hr. Tutorial presentations run 3.0
- hrs.
-
- 4) Name(s) of Speaker(s), plus BRIEF background description about each
- speaker. For presentations with more than one speaker, please indicate and
- provide contact information for the primary panel
- coordinator/moderator/chair.
-
- 5) A one to two paragraph description of the Topic and Format, suitable for
- conference brochure and press release.
-
- 6) Additional information regarding topic, format (including special
- presentation or A/V needs), possible but not yet confirmed speakers, or
- speaker substitutes -- or any other information that you think would be
- useful to The Program Committee in evaluating your proposal.
-
- For more information on the Computers, Freedom, and Privacy Conferences,
- please visit our Web page at: http://www.cfp.org.
-
- Proposals should be sent as soon as possible to CFP98 Program Chair
- Mark Lemley at: mlemley@mail.law.utexas.edu
-
- or by mail to:
-
- Mark Lemley
- The University of Texas School of Law
- 727 East 26th Street
- Austin, TX 78705
-
- *Proposals must be received no later than August 15, 1997 *
-
- -------------------------------------------------------------
-
- CFP98 PROGRAM COMMITTEE
-
- Mark A. Lemley, CHAIR
- Assistant Professor of Law
- The University of Texas School of Law
-
- Matt Blaze
- Senior Research Scientist
- AT&T Bell Research
-
- Edward A. Cavazos
- Senior Vice President, General Counsel
- Interliant, Inc.
-
- Gary B. Chapman
- Director, The 21st Century Project
- LBJ School of Public Affairs
- The University of Texas at Austin
-
- David Chaum
- DigiCash bv
- Amsterdam, The Netherlands
-
- Dave Del Torto
- Pretty Good Privacy, Inc.
-
- Michael Esposito
- The University of Texas School of Law
-
- A. Michael Froomkin
- Associate Professor of Law
- University of Miami School of Law
-
- Katie Hafner
- Newsweek Technology Correspondent
- Newsweek Magazine
-
- Donna L. Hoffman
- Owen Graduate School of Management
- Vanderbilt University
-
- Deborah Hurley
- Director, Information Infrastructure Project
- John F. Kennedy School of Government
- Harvard University
-
- Bruce R. Koball
- Technical Consultant
-
- Jon Lebkowsky
- President, EFF-Austin
-
- Teresa Peters
- Organisation for Economic Co-Operation and Development
- Paris, France
-
- Ned Ramage
- The Freedom Forum First Amendment Center
-
- Shabbir J. Safdar
- The Voters Telecommunications Watch
-
- Jonah Seiger
- Communications Director
- Center for Democracy and Technology
-
- Sharon Strover
- Director, Texas Telecommunications Policy Institute
- The University of Texas at Austin
-
- Peter Toren
- United States Department of Justice
-
- ------------------------------
-
- Date: Fri, 18 Jul 1997 22:55:19 -0400
- From: Paul Kneisel <tallpaul@nyct.net>
- Subject: File 3--Some Legal Advice for beyondHOPE Conferees
-
- Introduction
-
- The article below was prepared by the attorneys from the Mass Defense
- Committee of the National Lawyers Guild after conferring with security
- representatives for the upcoming beyondHOPE hackers conference.
-
- The conference will be held in New York City on August 8, 9, and 10.
-
- People who plan on attending the conference may wish to decide what to
- bring to the con and what to leave home based on information below.
-
- -- tallpaul (Paul Kneisel)
-
-
- Some Legal Advice for beyondHOPE Conferees
-
- Welcome to the conference. Enjoy yourself but keep in mind that
- there will be law enforcement persons present.
-
- Here are some basic police-encounter rules of law and procedure
- that you should remember:
-
- 1. A police officer is entitled to briefly ask you questions for
- almost any reason. However, you are not required to answer the
- questions and the police cannot stop you without evidence of
- wrongdoing (see below).
-
- 2. A police officer is entitled to briefly stop you if he or she
- has a "reasonable suspicion" that you are involved in criminal
- activity. You may be frisked for a weapon if there is a
- reasonable suspicion (such as the bulge of a gun) that you are
- carrying one. You are not required to answer questions. You are
- free to leave (after the frisk, if there is one) unless the
- officer has more evidence of a crime than "reasonable suspicion"
- (see below). The officer may not legally conduct a more
- extensive search on the basis of "reasonable suspicion".
-
- 3. A police officer may arrest and search you (and any bags or
- other containers you may be carrying) if he or she has probable
- cause to believe you have committed a crime (or an "offense",
- such as disorderly conduct). Probable cause means facts that
- make it more probable than not that you are committing a crime or
- offense.
-
- 4. If you are arrested the police will take you to a police
- precinct. If the arrest was for a minor offense such as
- disorderly conduct or possession of alcohol, you will probably
- receive a summons and be released in several hours. (You will
- need reliable identification to be released.) If you do not have
- reliable identification and the police do not believe you will
- come to court, they will not release you and will take you to
- court, a process that takes between 24-48 hours. If you are
- arrested for a serious offense, you will certainly not be
- released.
-
- 5. If you are under 16 and are arrested, the police will attempt
- to contact your parents while you are at the precinct. If your
- parents cannot be located, the police may transport you to a
- juvenile detention facility and/or Family Court (depending on the
- time of day) where your release will be decided.
-
- In short, if a police officer has sufficient evidence that you
- are committing a crime he may legally stop and search you and any
- containers you may be carrying.
-
- Even if a police officer does not have sufficient evidence that
- you are committing a crime he might well stop and search you
- anyway. If the officer finds drugs, alcohol, illegal weapons or
- devices or any other illegal property, he will usually arrest you
- and confiscate the property. If the search was illegal you will
- have a basis to challenge it in court but you will not get any
- illegal property back.
-
- Therefore, you would be wise to not carry anything illegal at
- this conference.
-
- If you have any questions about your rights contact:
-
- The Mass Defense Committee of the National Lawyers Guild, (212)
- 255-4181
-
- ------------------------------
-
- Date: Fri, 18 Jul 1997 12:08:12 -0500 (CDT)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 4--Some humor on media hacks and hackers
-
- In as fine a collection of stereotypes as can be found, the
- Associated Press furnished a story on July 14 covering the annual
- DefCon hacker get together in Las Vegas. It compressed at least
- one hoary cliche into each paragraph.
-
- Here is a summary of them.
-
- The lead sentence: "They're self-described nerds . . . "
-
- Then, in the next sentence, "These mostly gawky, mostly male
- teen-agers . . . also are the country's smartest and slyest computer
- hackers."
-
- After another fifty words, "These are the guys that got beat up in
- high school and this is their chance to get back . . . "
-
- Add a sprinkling of the obvious: "This is a subculture of
- computer technology . . ."
-
- Stir in a paraphrased hacker slogan: "Hacking comes from an
- intellectual desire to figure out how things work . . ."
-
- A whiff of crime and the outlaw weirdo: "Few of these wizards will
- identify themselves because they fear criminal prosecution . . . a
- 25-year-old security analyst who sports a dog collar and nose ring, is
- cautious about personal information."
-
- Close with two bromides that reintroduce the stereotype:
-
- "Hackers are not evil people. Hackers are kids."
-
- As a simple satirical exercise, Crypt News rewrote the Associated
- Press story as media coverage of a convention of newspaper editors.
-
- It looked like this:
-
- LAS VEGAS -- They're self-described nerds, dressing in starched
- white shirts and ties.
-
- These mostly overweight, mostly male thirty, forty and
- fiftysomethings are the country's best known political pundits,
- gossip columnists and managing editors. On Friday, more than 1,500 of
- them gathered in a stuffy convention hall to swap news and network.
-
- "These are the guys who ate goldfish and dog biscuits at frat parties
- in college and this is their time to strut," said Drew Williams,
- whose company, Hill & Knowlton, wants to enlist the best editors
- and writers to do corporate p.r.
-
- "This is a subculture of corporate communicators," said Williams.
-
- Journalism comes from an intellectual desire to be the town crier
- and a desire to show off how much you know, convention-goers said.
- Circulation numbers and ad revenue count for more than elegant prose
- and an expose on the President's peccadillos gains more esteem from
- ones' peers than klutzy jeremiads about corporate welfare and
- white-collar crime.
-
- One group of paunchy editors and TV pundits were overheard
- joking about breaking into the lecture circuit, where one
- well-placed talk to a group of influential CEOs or military
- leaders could earn more than many Americans make in a year.
-
- Few of these editors would talk on the record for fear of
- professional retribution. Even E.J., a normally voluble
- 45-year-old Washington, D.C., editorial writer, was reticent.
-
- "Columnists aren't just people who write about the political
- scandal of the day," E.J. said cautiously. "I like to think of
- columnists as people who take something apart that, perhaps,
- didn't need taking apart."
-
- "We are not evil people. We're middle-aged, professional
- entertainers in gray flannel suits."
-
- Crypt Newsletter
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.57
- ************************************
-
-
-