home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Sep 28, 1997 Volume 9 : Issue 71
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.71 (Sun, Sep 28, 1997)
-
- File 1--The Silicon Bomb (fwd)
- File 2--Freelancers Lose Copyright Claim for Works Put On E-databases
- File 3--SAFE crypto bill cracked again (fwd)
- File 4--Markup - HR 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE)
- File 5--A few URLS addressing anti-spam legislation
- File 6--Texas Judge Enjoins "Spamming"
- File 7--'wanna Fight Big Brother? Politcal Action Kit available
- File 8--Anti-Terrorist Squad Orders Political Censorship Of The
- File 9--cDc GDU #22 (cult of the Dead cow fwd)
- File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 25 Sep 1997 14:21:08 -0400
- From: "George Smith [CRYPTN]" <70743.1711@compuserve.com>
- Subject: File 1--The Silicon Bomb (fwd)
-
- The Netly News
- http://www.netlynews.com
-
- Today's News
-
- The Silicon Bomb
- by George Smith September 25, 1997
-
- Which would you rather have export controls on, technology used
- for encryption or technology used in the development of nuclear
- weaponry? The answer is obvious to most people. Everyone, that is, but
- the U.S. government.
-
- Here's the conundrum: The mandarins of law enforcement say that
- encryption must be controlled, because homegrown terrorists and thugs
- can use it to make their communications and records invulnerable. But
- machines employed in the engineering of modern thermonuclear bombs can
- be sold to Russian scientists in the former Soviet Union's most famous
- nuclear weapons shop.
-
- It's true, and the story goes like this.
-
- More than a year ago, Gary Milhollin, the director of the
- Wisconsin Project on Nuclear Arms Control in Washington, D.C.,
- discovered that Silicon Graphics had sold four supercomputers to
- Russian scientists at the nuclear weapons lab known as Chelyabinsk-70.
- Nothing happened for a couple of months until Milhollin issued a
- widely published editorial in late February of this year.
-
- In it, Milhollin wrote, "[the Russians] got the computers just in
- time to continue the arms race. Russia's minister of atomic energy,
- Viktor Mikhailov, told the press recently that Moscow... will now
- design its warheads with simulated explosions, using the computers
- from Silicon Graphics."
-
- Around the same time the Department of Commerce, along with the
- Department of Justice, began a criminal investigation of the case.
- According to export controls, technology capable of being used in the
- manufacture of nuclear weapons is not to be sold to nuclear weapons
- labs in Russia, Pakistan and China. That part of the equation is a
- no-brainer.
-
- However, Milhollin wrote that Silicon Graphic's CEO, Edward
- McCracken, told him the company didn't know what Chelyabinsk did. John
- Thompson, head of corporate communications at the Mountain View
- company, said in interview that officials at Chelyabinsk-70 said they
- wanted the computers for "environmental research."
-
- "That's their story," said Milhollin in an interview. "It's like
- someone saying they don't know what Los Alamos does."
-
- You see, control of the transfer of technology useful in the
- of nuclear weapons has become infinitely more complicated since
- the height of the Cold War. In the case of computers, as they've
- advanced rapidly in processing power, the industry has lobbied
- aggressively for revision of export controls, saying that such
- controls do little except hurt American business. The argument is that
- since processing power is always increasing, sooner or later clients
- like the Russians will be able to buy it from anyone, so controls do
- little good.
-
- "...The quantum advancement of technology and its widespread
- foreign availability have made export controls on desk-top and
- desk-side computer systems obsolete and ineffective," said one
- industry press release on the matter in 1995. "[Relaxing export
- controls] frees up sales of a wide variety of computers without
- shackling... customers with onerous security conditions...."
-
- This is similar to the arguments fielded by concerned Netizens
- against control of encryption, with one small exception: The first U.S
- hydrogen bomb blew a crater one mile wide in the Pacific atoll of
- Eniwetok.
-
- The four machines, for which Silicon Graphics was paid
- $200,000, aren't really supercomputers, argued Thompson. At Silicon
- Graphics, he said, they're thought of as "desktop servers," capable of
- 2.9 billion operations per second -- 150 times less powerful than
- supercomputers made by Cray Research. Conversely, a 486 PC -- what
- this article is being written on -- is capable of approximately 12.5
- million operations per second. Compared to it, the SGI machines in
- question are, relatively speaking, Crays.
-
- But this argument falls on deaf ears today. Because, in response
- to pressure from the computer industry, the Clinton administration
- abolished the Coordinating Committee for Multilateral Export Controls
- in 1994. This informal forum associated with NATO helped coordinate
- policy and review potential exports to the former Soviet Union and
- other proscribed destinations. And in 1995 the administration issued a
- new, more relaxed set of controls on computing power.
-
- The new controls divided world nations into four categories, of
- which only two are interesting: Category D -- which includes Iraq,
- Iran and North Korea, nations that are completely embargoed; and
- Category C -- the next lowest tier, which includes Russia. In tier C
- no government review is required for sale of computers capable of
- between two and seven billion operations per second to civilians. An
- export license -- a review -- is required for potential sales to
- military sites. The SGI computers are rated at 2.9 billion operations
- per second.
-
- Thus, since Silicon Graphics insisted it was unaware of
- Chelyabinsk-70's true nature, there was no need to review the sale.
- Note that the processing power threshold for government review prior
- the Clinton administration's revision was 1.5 billion operations
- per second, which would have probably nixed the SGI sale.
-
- Of course, Thompson claims that although Silicon Graphics is
- cooperating fully with the criminal investigation, there is still some
- question about whether or not the company's machines were capable of
- being used in the testing and design of thermonuclear weapons.
-
- Perhaps, but it's an argument that ignores history. Theoretical
- physicists working on the hydrogen bomb in 1949 yearned for computing
- power greater than the ENIAC, a machine horribly antiquated by today's
- standards. The scientists had difficulty making any progress since the
- main obstacle standing in the way of the hydrogen bomb's development
- was an elaborate calculation dealing with the thermonuclear reaction.
- Without the calculation, the scientists thought testing would be
- extremely difficult because no one would be able to determine if a
- bomb failed because the thermonuclear reaction wasn't feasible or
- because a simple mechanical malfunction had occurred.
-
- Because of the SGI case, two congressmen -- Rep. Floyd Spence
- (R-S.C.) and Rep. Ron Dellums (D-Calif.) recently compiled a report
- asking for yet another revision in supercomputer export controls.
-
- George Smith is the author of the book "The Virus Creation Labs."
-
- ------------------------------
-
- Date: Tue, 2 Sep 1997 15:51:59 GMT
- From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
- Subject: File 2--Freelancers Lose Copyright Claim for Works Put On E-databases
-
- Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997
-
- Publishers may put their periodicals on electronic databases without the
- permission of freelance writers who provide work for their print
- publications, according to a recent decision by the Southern District of
- New York. The case was brought by six freelance writers who claimed
- copyright violations because their articles had been sold by newspapers or
- magazines after publication and uploaded onto CD-ROMs or electronic databases.
-
- The writers claimed that there was no written agreement spelling out their
- rights for articles that they had written for print versions of the
- publications including the New York Times, Sports Illustrated and Newsday,
- thereby giving the publishers a windfall when they resold or made the works
- available to on-line publications.
-
- The court stated that there is no real precedent governing electronic
- technologies and the application of Section 201(c) of the Copyright Act of
- 1976, which permits reproduction of ''collective works,'' and held that
- putting the stories on-line was not an inappropriate exploitation of the
- freelancers' works.
-
- While the court recognized that the ruling "deprives plaintiffs of certain
- benefits associated with their creations,'' it called on Congress to revise
- copyright laws to provide a more equitable result.
-
- Full text of the decision is available at the New York Law Journal Extra
- site at <http://www.ljx.com/copyright/tasini.html/>
-
- ------------------------------
-
- Date: Mon, 22 Sep 1997 07:59:46 -0500 (CDT)
- From: Charles Stanford <cstanfor@MAIL.COIN.MISSOURI.EDU>
- Subject: File 3--SAFE crypto bill cracked again (fwd)
-
- SAFE crypto bill cracked again
- By Alex Lash and Dan Goodin
- September 12, 1997, 8:40 a.m. PT
-
- For the second time in a week, a House committee has made significant
- changes to the Security and Freedom through Encryption (SAFE) Act to
- mandate that domestic encryption products give law enforcement agencies
- access to users' messages.
-
- The changes by the Intelligence Committee, which were passed as a
- "substitute" to SAFE, turn the legislation on its head. The amendment
- follows similar changes two days ago in the House National Security
- Committee.
-
- Initially drafted as a way to loosen U.S. export controls on encryption,
- legislators have instead "marked up" the bill, or amended it at the
- committee level, to reflect the wishes of the Federal Bureau of
- Investigation and other law enforcement agencies that want "wiretap"
- access to all encrypted email and other digital files.
-
- Both the Intelligence and the National Security committees tend to favor
- export controls, because they view encryption as a threat to
- information-gathering activities by U.S. military and law enforcement
- officials.
-
- The Intelligence Committee cited those concerns today when announcing
- the substitute legislation. "Terrorist groups...drug cartels...and those
- who proliferate in deadly chemical and biological weapons are all
- formidable opponents of peace and security in the global society," said
- committee chairman Porter Goss (R-Florida) in a statement. "These bad
- actors must know that the U.S. law enforcement and national security
- agencies, working under proper oversight, will have the tools to
- frustrate illegal and deadly activity and bring international criminals
- to justice."
-
- Opponents of government attempts to regulate encryption, including a
- leading panel of cryptographers, have argued that built-in access to
- encrypted files would in fact threaten national and individual security
- and be prohibitively expensive to implement.
-
- The amended legislation calls for all imported or U.S.-made encryption
- products that are manufactured or distributed after January 31, 2000, to
- provide "immediate access" to the decrypted text if the law officials
- present a court order. "Law enforcement will specifically be required to
- obtain a separate court order to have the data, including
- communications, decrypted."
-
- A markup of the same bill in the House Commerce Committee was postponed
- today for two weeks. It will be the fifth such committee vote on the
- bill since its introduction.
-
- The Intelligence and National Security amendments this week are by no
- means a defeat of the bill. Instead, they would have to be reconciled
- with versions of the bill already approved by the House Judiciary and
- International Relations committees. That reconciliation most likely
- would have to happen on the House floor. The rapidly fragmenting bill
- still has several layers of procedure to wend through before it reaches
- a potential floor vote, but people on both sides of the encryption
- debate openly question if the bill--in any form--will make it that far
- this year.
-
- The legislation has 252 cosponsors, more than half of the House
- membership.
-
- ------------------------------
-
- Date: Fri, 26 Sep 1997 17:05:57 -0500
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 4--Markup - HR 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE)
-
- Source - http://www.house.gov/commerce/full/092497/markup.htm
-
- Full Committee Markup
- September 24, 1997
- 2123 Rayburn House Office Building
-
- PDF Versions of Committee Print and Amendments will be available by
- 11:00 AM EDT [IMAGE] Some of the the documents below have been created
- using Adobe Acrobat. To view these documents, you will need the Adobe
- PDF Viewer
-
- H.R. 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT, was
- ordered reported, amended, by a roll call vote of 44 yeas to 6 nays
- (Roll Call Vote #42).
-
- A unanimous consent request by Mr. Bliley to discharge the
- Subcommittee on Telecommunications, Trade, and Consumer Protection
- from further consideration and proceed to the immediate consideration
- of H.R. 695, as reported to the House by the Committee on the
- Judiciary, was agreed to without objection.
-
- The following amendments were offered.
-
- An Amendment in the Nature of a Substitute by Mr. Tauzin, #1, was
- AGREED TO, amended, by a voice vote. (A unanimous consent request by
- Mr. Tauzin to have the Amendment in the Nature of a Substitute
- considered as base text for purposes of amendment was agreed to
- without objection.)
-
- An amendment to the Tauzin Amendment in the Nature of a Substitute
- by Mr. Markey, #1A, was AGREED TO by a roll call vote of 40 yeas to
- 11 nays (Roll Call Vote #41).
-
- An amendment by Mr. Oxley to the Markey Amendment to the Tauzin
- Amendment in the Nature of a Substitute, #1A(1), was NOT AGREED TO
- by a roll call vote of 16 yeas to 35 nays (Roll Call Vote #40).
-
- An amendment to the Tauzin Amendment in the Nature of a Substitute
- by Mr. Tauzin, #1B, was AGREED TO by a voice vote.
-
- THE COMMITTEE ADJOURNED SUBJECT TO THE CALL OF THE CHAIR
-
-
- U.S. House Seal The Committee on Commerce
- 2125 Rayburn House Office Building
- Washington, DC 20515
- (202) 225-2927
- Commerce@mail.house.gov
-
- ------------------------------
-
- Date: Mon, 22 Sep 1997 09:13:20 -0700
- From: Simeon.Nevel@Schwab.COM
- Subject: File 5--A few URLS addressing anti-spam legislation
-
- I have just finished reading CU-Digest #9.70. I thought I would pass
- along to you (and the other CUD readers if you think it appropriate)
- a pointer to a *very* interesting legal research paper (by Michael W.
- Carroll of the Georgetown University Law Center) regarding the
- regulation
- of UCE.
-
- Check out http://server.Berkeley.EDU/BTLJ/articles/11-2/carroll.html
-
- It describes the legal theories behind the regulation of other sorts
- of unsolicited commercial communications (junk fax, telephone
- solicitation, door-to-door sales and junk mail) and examines their
- applicability to regulation of junk e-mail.
-
- I haven't the legal backgroud to attest to the *quality* of that
- analysis, but it does make for interesting reading.
-
- ==========================
-
- Another very interesting net.resource on legal issues on the
- cyber frontier is http://www.ssrn.com/CyberLaw/lawpaper.html
-
- This is where the link to Carroll's paper originated.
-
- There are papers dealing with all sort of issues including
- free speech issues, intellectual property, privacy and cryptography.
-
- ------------------------------
-
- Date: Mon, 22 Sep 1997 22:07:42 -0500
- From: Jon Lebkowsky <jonl@onr.com>
- Subject: File 6--Texas Judge Enjoins "Spamming"
-
- Source - fight-censorship@vorlon.mit.edu
-
- **************************************************
- FOR IMMEDIATE RELEASE
-
-
- TEXAS JUDGE ENJOINS "SPAMMING" OF INTERNET
- BY CALIFORNIA STUDENT AND COMPANY
-
- Austin, Texas, September 22, 1997: A Texas Court has entered a temporary
- injunction against a California college student and his company,
- prohibiting further "spamming" of the Internet without consent. Several
- Internet leaders in Austin filed the lawsuit earlier this year, claiming
- that Craig Nowak and his company, C.N. Enterprises, had illegally used the
- return address of an Austin business when he sent out a mass commercial
- solicitation by Internet electronic mail.
-
- The lawsuit was filed by Tracy LaQuey Parker, a leading Internet author,
- who owned the rights to the domain named "flowers.com" which Nowak and
- his company used without her permission. Mr. Nowak's unsolicited mass
- mailing, known as a "spam," offered for sale information on "Free Cash Gran=
- ts"
- for $19.95. Mr. Nowak's "spam" used Ms. Parker's domain name in the
- electronic
- return address, which allowed Mr. Nowak to avoid receiving thousands of
- return-to-sender messages and the inevitable hate mail from recipients who
- despise the controversial practice of "spamming." Ms. Parker received
- thousands of such return messages, preventing her from accessing her
- Internet account for hours and temporarily shutting down her Internet
- service provider's mail servers. In essence, the lawsuit claims, Mr. Nowak
- used Ms. Parker's mailbox as his personal trash bin.
-
- Spamming is being criticized at all levels of the industry. Upon hearing
- of the lawsuit, Vint Cerf, Senior Vice President for MCI
- Telecommunications, also known as "the father of the Internet," said,
- "Spamming is the scourge of electronic mail and newsgroups on the Internet.
- It can seriously interfere with the operation of public services, to say
- nothing of the effect it may have on any individual=EDs mail system.
- Spammers are, in effect, taking resources away from users and service
- suppliers without compensation and without authorization. MCI was the
- first in the industry to publicly announce its policy against spamming and
- will be watching the decision in this case with great interest."
-
- The court order, entered last Wednesday, September 17, by Travis County
- District Judge Scott McCown, prohibits Nowak, his company, and those
- "acting in concert" with him, from using Ms. Parker's domain name in any
- electronic mailings, or from using any Internet domain name as a return
- address without the owner's permission. Judge McCown also ordered Mr.
- Nowak to respond to discovery requests served upon him and set the case for
- trial on November 10, 1997.
-
- Joining Ms. Parker in the lawsuit are her business partners, Peter Rauch,
- and her husband, Patrick Parker, who also used the domain name. Also suing
- Nowak is Ms. Parker's Internet service provider at the time, Zilker
- Internet Park, which had to deal with the consequences of the flood of
- returned junk mail messages. They are joined by two Internet interest
- groups, the Texas Internet Service Providers' Association and EFF-Austin.
- Both groups fear the damage done to the Internet by mass mailings of the
- sort at issue in this lawsuit.
-
- Ms. Parker said she was pleased with the court's ruling. "Judge McCown
- seemed to quickly understand the harm that this type of irresponsible use
- of the Internet can cause people like me and small businesses like Zilker,"
- she said. "We hope that this ruling sends a message not only to the
- defendants, but to everyone who is abusing the Internet in this way." Pete
- Kennedy, the lawyer who is representing Ms. Parker and the others,
- commented that, "While Internet service providers are trying to combat
- "spam" with technical means, there is also a need to set a clear legal
- precedent that people do not have the right to send Internet junk mail and
- use other people's e-mail accounts as their personal junkyard."
-
- # # #
- For more information, contact:
-
- Plaintiffs:
- Tracy LaQuey Parker and Patrick Parker (512) 454-7748
- Smoot Carl-Mitchell and John Quarterman, Zilker Internet Park (512) 451-76=
- 20
- Gene Crick, Texas Internet Service Providers Association (TISPA)
- (512) 303-1021
- Jon Lebkowsky, EFF-Austin
- (512) 477-5566 x. 171 (day), (512) 444-5175 (eve)
-
- Lawyers:
- Peter D. Kennedy or Roger Williams
- George, Donaldson & Ford, LLP (512) 495-1400
-
- Media Contact:
- Peggy Hubble or Sondra Runnells
- MEM/Hubble Communications (512) 480-8961
-
- ------------------------------
-
- Date: Tue, 23 Sep 1997 17:01:27 -0400
- From: David HM Spector <spector@zeitgeist.com>
- Subject: File 7--'wanna Fight Big Brother? Politcal Action Kit available
-
- ...not having much in the way of sleep since reading Louis Freeh's
- testimony and his plans to assault the US Constitution I decided to do
- something about it, and try to develop something that would help
- others get involved too...
-
- I would like to announce the availability of a Personal Political
- Action Kit (PersPAK). It contains full databases of members of the
- House and the Senate and may be used for mail merging, faxing, email
- campaigns, as well as plain old phone calls. The data were culled
- from the House and Senate directories that are on the Web, and are
- current as of September 3, 1997.
-
- The datasets are provided in two formats, tab-delimited and as an
- Excel spreadsheet. Two sample letters are included that show how to
- use the mail-merge features of Office95/97, along with a README file
- that will step users through the basics of using this kit and offers
- some hints on what to say -- and sometimes more importantly NOT to say
- -- in a letter to their congress-folk.
-
- The kit can be accessed at: http://www.zeitgeist.com/crypto
-
- I plan on updating this toolkit with more features soon with some more
- tools, and the ability to send mail/faxes to entire committees (as
- opposed to picking congress persons/senators by individually), some
- Java Applets to auto-generate letters, etc.
-
- I'm making it available under the GNU Public License, so feel free to
- use this kit as a base for other tools.
-
- Constructive criticism/ideas may be sent to perspak@zeitgeist.com
-
- ------------------------------
-
- Date: Fri, 19 Sep 1997 07:23:34 -0400
- From: Paul Kneisel <tallpaul@nyct.net>
- Subject: File 8--Anti-Terrorist Squad Orders Political Censorship Of The
-
- The following press release was issued this morning by the
- Campaign for Internet Freedom
-
- Press release: immediate 18 September 1997
-
- Anti-Terrorist Squad Orders Political Censorship Of The Internet
-
- In the first move of its kind in the UK, Scotland Yard's
- Anti-Terrorist Squad yesterday shut down Internet Freedom's UK web
- site. Claiming to be acting against terrorism, the Squad demanded
- that Easynet PLC, Internet Freedom's UK Internet Service Provider,
- remove the entire content of the site from the web.
-
- Internet Freedom is one of the foremost anti-censorship campaigns
- in the UK. The web site featured the latest Net censorship news,
- links to other anti-censorship campaigns, carefully researched
- articles about censorship and a regular controversy feature. The
- section of the site that was alleged to contain 'terrorist
- material' related to a feature on the Euskal Herria Journal - a
- New York based political publication. The online magazine supports
- Basque independence and contains maps of the region, cartoons and
- an online petition to the Spanish government.
-
- The Journal had been originally suspended by its US Internet
- Service Provider following an extended email campaign which
- brought the host server to a standstill. In opposition to its
- censorship, Internet Freedom, along with a number of other
- organisations and individuals, hosted a copy of the suspended site
- or 'mirror site', together with a bulletin board for Net users to
- express their views.
-
- As a consequence of the Squad's actions, Internet Freedom has been
- forced to move its news operations to its US site at
- <http://www.netfreedom.org> where anybody with access to the web
- may examine the site and judge the content for themselves.
-
- Chris Ellison, co-founder of CIF said:
-
- Those who argue in favour of censorship on the Net claim that it
- is to prevent the spread of pornography or paedophilia.
- Yesterday's act of blatant political censorship shows the
- consequences of accepting the need for regulations and controls.
- Whatever one might think about the Euskal Herria Journal and its
- entirely ordinary content, it is important that they be allowed
- put their views across.
-
- We are calling on the whole of the Net community to support us by
- mirroring Internet Freedom's site. Internet Freedom has always
- prided itself on exposing acts of censorship that have been
- dressed in some other garb. Now we have been met with the most
- blatant act of political censorship imaginable: the shutting down
- of our site. If there was ever a time for Net users to defend free
- speech, that time is now.
-
- For further comment call Chris Ellison on 0956 129 518
-
- ------------------------------
-
- Date: Sat, 27 Sep 1997 00:19:16 -0700 (PDT)
- From: editor@cultdeadcow.com
- Subject: File 9--cDc GDU #22 (cult of the Dead cow fwd)
-
-
- _ _
- ((___))
- [ x x ] cDc communications
- \ / Global Domination Update #22
- (' ') September 1st, 1997
- (U)
- Est. 1984
- FOR IMMEDIATE RELEASE
- FOR MORE INFORMATION, CONTACT: sratte@cultdeadcow.com
-
- DEEP-FRIED ATTITUDE FOR A WORLD STARVED FOR SUPERHEROES
-
- CULT OF THE DEAD COW (cDc) regrets the delay in releasing our glorious Global
- Domination Update. What with George Clooney hopping onto Princess Diana's
- coffin to settle old scores with the tabloids, it's been hell trying to get a
- word in edgewise. But we bear our burdens and move on. And so it is -- after
- much grieving and maudlin songs -- that the CULT OF THE DEAD COW releases two
- file packs of five files each, anoints one new member and expands on our
- work with the Hong Kong Blondes.
-
- As our young people skip off to school, lunch pails bursting with wholesome
- treats and whistling their favorite video bits, we at the CULT OF THE DEAD COW
- DISTANCE LEARNING CENTER have labored long and hard to shine a light in the
- darkness -- sort of like high-beams along the information superhighway.
- Our crack team of learning experts have put together a wack packet of
- mind expanding mayhem in the hope that it will be the one thing that keeps our
- youth from purchasing firearms, or seeking employment in Redmond.
-
- We take special pride in announcing a new member to our ranks who goes by the
- name, SirDystic. He is rumored to be the child of Seymour Cray and an unknown
- showgirl. We found him living in a dumpster with a Palm Pilot, a case of
- Astroglide and his latest text file. Remember the Internet worm? Imagine the
- same thing, only _bigger_. An automated, systemic infection of the Internet --
- all made possible because of the success of Bill Gates' dream of a computer in
- every home, running Windows. With a little work and SirDystic's file, this is
- just one possibility.
-
- It was a long hot summer for the HERD. The heat off the flashpacks and klieg
- lights at DefCon and H.O.P.E. were trying, but they come with the territory.
- Grandmaster Ratte's breakthrough performance at DefCon was the talk of Las
- Vegas, as was Microsoft's idle promise to give cDc Hacker Laureate Mudge the
- keys to the kingdom. Kaiser Wilhelm's star braun-nosers, Karan Khanna (head of
- NT Marketing) and Paul Leech (one of the main developers and author of the
- CIFS specification) promised Mudge a subscription to DevNet for a year and a
- link to the L0pht's site from Microsoft's Web page. Waiting - still waiting.
-
- And of the many happy memories at H.O.P.E., the CULT OF THE DEAD COW'S
- official announcement of our strategic alliance with the Hong Kong Blondes was
- received to deafening applause. The Hong Kong Blondes are a group of computer
- scientists and human rights activists who have taken the revolution on-line.
- They are active in Hong Kong, Shanghai and Beijing. And you can bet you'll be
- hearing a lot more about the real meaning of payback if the government of
- geriatric kleptocrats don't keep their word on social reform. Check the new
- cDc homepage (www.cultdeadcow.com) for future announcements. And support human
- rights in China -- the cDc does.
-
- Oh, one last morsel. The CULT OF THE DEAD COW has been requested by the
- Electronic Frontier Foundation to take over the EFF's ftp archives. The circle
- is now complete. The group that for so long has contributed to the computer
- underground will soon become the official custodian of its content. (Look for
- a full announcement soon.) And you thought we didn't have a plan. Damn, we're
- good.
-
- _ _ the tedium is the message _ _
- ((___)) INFORMATION IS JUNK MAIL ((___))
- [ x x ] _ [ x x ]
- \ / _ |_|_ _ _|_ _|_ |_ _ _| _ _. _| _ _ \ /
- (' ') (_|_|| |_ (_) | |_ | |(/_ (_|(/_(_|(_| (_(_)\_/\_/ (' ')
- (U) (U)
- .ooM cDc communications .ooM
- deal with it NEW RELEASES FOR SEPTEMBER, 1997: deal with it
-
- ________________________________/text files\________________________________
-
- 331:"Angry Sun" by Franken Gibe. It's sundown on satori. If you like
- sand up your ass or you're just plain photophobic, this one's for you.
-
- 332:"Don't Talk to Cops" by Robert W. Zeuner. Mom says never to talk
- to strangers and Bessie says "Don't talk to the Man". Find out why.
-
- 333:"BELLK0RE Exposed!" by Oderus Urungus. This d00d smells somethin'
- bad. And with a name like his, y'all know he's onto da shit.
-
- 334:"Making a Mess at 7-11" by Snarfblat. Bored? Stupid? No girlfriend?
- Practice making a mess so you'll have it all mastered for your first
- basement apartment.
-
- 335:"Milk and Blood" by Lady Carolin. If the pasture's a-rockin, don't
- come a-knockin'. Notes from a damp commando.
-
- ***
-
- 336:"I'd Rather be Dead than Live in California" by Oxblood Ruffin. The
- land of sunshine sucks more than your favorite hustler. Read and learn.
-
- 337:"Reid Fleming: Lady Killer" by Reid Fleming. What do you do with a chick
- whose twat looks like a three ring binder? Find out from the cDc's own man of
- steel.
-
- 338:"Who's Gonna Get Screwed Today? NetBIOS Attacks over TCP" by SirDystic.
- Our latest member turns Bill Gates into his personal prison bitch. Bend over,
- big boy. This will only hurt you in the wallet.
-
- 339:"Political Rant #1" by The Nightstalker. If he needs your opinion he'll
- give it to you. But you have to learn the Macarena all by yourself.
-
- 340:"Hacking PC/Payroll for Windows" by Tarkin Darklighter. Why buy lotto
- tickets when you can hack all the cash you need? Remember kidZz - this
- file's just for educational purposes.
-
- Reading is FUNdamental!
-
- _______________________________/ - x X x - \________________________________
-
- Thanks to the following items of influence this time around:
- WAREZ: BeOS - the cDc's official operating system - and Dem0nseed ELITE
- MUSIC: The Meters, DJ COLDCUT, Kid Koala (remember - you heard about the
- Kid here first.)
- FOOD: The Quadropounder
- PRINT: Chuck Yeager autobiography, anything by Harold Innis
- BUGS: Any two girlies from Montreal
-
- Fools better recognize: CULT OF THE DEAD COW is a publication and trademark
- of cDc communications. Established in 1984, cDc is the largest and oldest
- organization of the telecommunications underground worldwide, and inventor of
- the "e-zine." Every issue is produced on an Apple II for genuine old-school
- flavor. You thirst for our body of work, you know you do. Find it at these
- fine locations, among others:
-
- World Wide Web: http://www.cultdeadcow.com
- http://www.L0pht.com/cdc.html
- FTP/Gopher: cascade.net in pub/cDc
- Usenet: alt.fan.cult-dead-cow
- BBS: 806/794-4362 Entry:KILL
-
- For further information, contact:
-
- Email: sratte@cultdeadcow.com
- Postal: POB 53011, Lubbock, TX, 79453, USA
-
- If you have a file to submit, send it to: editor@cultdeadcow.com
-
-
- Sincerely,
-
- Grandmaster Ratte'
- cDc/Editor, Fearless Leader, and Pontiff
- "We're into text philes for the girlies and the money."
-
- ####
- By Oxblood Ruffin, Reid Fleming, Omega & GRatte'.
- Copyright (c) 1997 cDc communications.
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.71
- ************************************
-
-
-