Computer underground Digest Wed May 22, 1996 Volume 8 : Issue 38 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #8.38 (Wed, May 22, 1996) File 1-- FBI Releases Digital Telephony Wiretap Report File 2--CyberAngels Mission Statement and C.o.C (fwd) File 3--ACLU: GA Prohibits Web Links? File 4--Rough Draft: Guide for Organizing Online File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-) File 6--Job Position for Manager of Network Services File 7--Dutch Internet Hotline agains Child Pornography online (fwd) File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 21 May 1996 16:02:49 -0500 From: "David Sobel" Subject: File 1-- FBI Releases Digital Telephony Wiretap Report Volume 3.10 May 21, 1996 Published by the Electronic Privacy Information Center (EPIC) Washington, D.C. ================================================================ The Federal Bureau of Investigation has finally released its long-overdue report on implementation on the controversial "digital telephony" wiretap statute. The report, which the FBI was legally required to release by November 30, 1995, was transmitted to Congress on April 11, 1996. EPIC had made several congressional inquiries concerning the FBI's failure to comply with the statutory reporting requirement. The bottom line: the digital telephony program is broke, which may explain the Bureau's tardiness in issuing the report. When Congress enacted the Communications Assistance to Law Enforcement Act (CALEA) in late 1994, it authorized $500 million to reimburse telecommunications carriers for the cost of retro-fitting their networks to facilitate electronic surveillance. Since that time, EPIC has led an effort to block the actual appropriation of those funds. To date, Congress has declined to make the money available. As the FBI report notes, No funding was appropriated in Fiscal Year 1995 for CALEA; therefore, no payments were made to telecommuni- cations carriers during the period October 1, 1994, through September 30, 1995 ... To date, no funding has been appropriated for Fiscal Year 1996 for payments to telecommunications carriers. ... Major switch manufacturers, upon whom telecommunications carriers must rely for most required technological solutions, have advised the FBI that timely development of interception features is technically feasible; however, the development and deployment of such features are directly dependent upon the availability of funding if the statutory deadlines are to be met. The wiretap budget battle will continue. The FBI is still trying to gain approval of $100 million for FY 1996, "to be generated through a surcharge on civil fines and penalties." The report also notes that "the President's Fiscal Year 1997 budget request proposes $100 million in funding for telephone carrier compliance through a direct appropriation." More information on digital telephony and wiretapping is available at: http://www.epic.org/privacy/wiretap/ ------------------------------ Date: Sun, 19 May 1996 16:17:55 -0500 (CDT) From: David Smith Subject: File 2--CyberAngels Mission Statement and C.o.C (fwd) ---------- Forwarded message ---------- Date--Sun, 19 May 1996 00:39:11 -0700 From--CyberAngels Director --Colin Gabriel Hatcher To--angels@wavenet.com Subject--CyberAngels Mission Statement and C.o.C CYBERANGELS MISSION STATEMENT v.2.0, May 1, 1996 written by Colin Gabriel Hatcher, CyberAngels Director CyberAngels an all-volunteer Internet safety patrol and monitoring project started in June of 1995 by senior members of the world famous crime prevention organization, The International Alliance of Guardian Angels. CyberAngels membership unites more than 1000 users worldwide in 30 countries, sharing a common mission: to be a Cyberspace Neighborhood Watch and to fight Internet crime. By being role models for self-regulation and responsibility, we are working hard to make the Internet a safer and more enjoyable place to work and play. We are dedicated to: FIGHTING CRIME ON THE INTERNET in particular criminal activity where there are clear victims and/or at-risk users. PROTECTING OUR CHILDREN FROM ONLINE CRIMINAL ABUSE by fighting against the trade in child pornography and by working to deter sexual predators online. SUPPORTING AND ADVISING ONLINE VICTIMS of hate mail, harassment, and sexual abuse by referring them to professional assistance, and helping guide them through the complaints and reporting processes. PROMOTING, PRESERVING, PROTECTING NETIQUETTE Netiquette is the collection of common rules of polite conduct that govern our use of the Internet. We believe in courtesy and respect for others. We support Internet Service Providers (ISPs) who have clearly defined Terms Of Service (TOS) for their users, and who are prepared and willing to enforce that TOS. HELPING PRESERVE INTERNET FREEDOM OF SPEECH by showing global governments that the citizens of the Internet Community are prepared and willing to take both the responsibility and the actions necessary to preserve their online personal safety, and in particular, the online safety of their children. CYBERANGELS CODES OF CONDUCT v.1.0, May 18, 1996 written by Colin Gabriel Hatcher, CyberAngels Director 1) CyberAngels should not flame, neither in email nor in newsgroups. 2) At all times CyberAngels understand that they speak and act only for themselves and are fully responsible for their words and actions. 3) The CyberAngels Organization will acknowledge and defend you only if you act in accordance with our Mission Statement and with our Codes of Conduct. 4) CyberAngels should not use anonymous or pseudo-anonymous remailers to communicate with ISPs, Federal authorities or Law Enforcement, as the use of anonymity in these cases will undermine the credibility of your complaint or report. 5) CyberAngels should be courteous and respectful in their communications with others. 6) CyberAngels should phrase all complaints and reports as questions. Remember you are neither judge, jury nor executioner - you are a witness to a suspect and a possible crime. 7) CyberAngels should be capable of telling the difference between material or activity that may be crime evidence and material or activity that personally offends their morals or beliefs. 8) CyberAngels should always observe the Netiquette of whatever group or channel they are in. 9) CyberAngels should not spam replies, opinions or information. 10) CyberAngels should never use any form of electronic harassment, e.g., mail-bombs, virii, spoofing mail headers, spamming etc. 11) CyberAngels should avoid humiliating suspects either in public or in private. Gloating over their impending arrest or taunting them with the Feds is unacceptable conduct. 12) All suspects are innocent until proven guilty. 13) All complaints and reports sent in to authorities by CyberAngels should maintain privacy and confidentiality. Reports are the business of the CyberAngel, the receiving authority and the CyberAngels Organization. 14) Remember: a) Headers can be spoofed (forged) on email and on Usenet postings. b) In live channels the user you are dealing with may not be the account holder of the access account. c) Impersonation is common in IRC / Live Chat d) Without crime evidence, it is just your opinion. e) Just because you don't like something, that doesn't make it criminal. 15) Sting operations (e.g. when you work undercover, masquerading as a pedophile in order to gather crime evidence) may obtain you crime evidence, but that evidence may later be ruled inadmissible in court, on the grounds that it was obtained by unlawful means. Study your country's / state's laws carefully on this matter, or contact your local law enforcement to discuss this. 16) No CyberAngel should offer child pornography images to trade, even if the purpose is to gather more crime evidence. 17) Received graphic files should be viewed before forwarding them to appropriate Internet Administration (e.g. the sender's Internet Service Provider) or Law Enforcement (e.g. US Customs or FBI). CyberAngels checking graphic files should follow the procedure below: a) Download and decode file to a floppy disk. b) View file and confirm your suspicions. c) Forward original file to relevant authorities. d) Reformat your floppy disk to permanently erase all trace of the downloaded file. If you are downloading to a Hard Drive, then after deleting the file you should erase your Hard Drive's free space, or reformat free space, so as to make the file unrecoverable. 18) CyberAngels should avoid storing archives of child pornography in any format whatsoever. If you store this material you run the risk of being accused of collecting it for your own personal use. 19) A CyberAngel may identify themselves publicly only if they support our Mission Statement and follow our Codes of Conduct. 20) In live channels like IRC or in the Live Chat areas of the big in-house providers like AOL, Compuserve and Prodigy, CyberAngels have the following 2 options when entering a channel: a) Identify yourself as a CyberAngel on patrol immediately. b) Say nothing about your being a CyberAngel. a) Identify yourself as a CyberAngel on patrol immediately. Advantage: everyone on the channel knows you are available to assist if there is a problem. Also you will act as an effective visual deterrent if a crime is about to take place. Disadvantage: In IRC if the Channel Op is hostile, then you will be immediately kicked off the channel. Also criminal activity will move somewhere else away from your eyes, so you will be unable to witness criminal activity. Also, once your userid becomes known, you will be unable to operate anonymously in the future. b) Say nothing about your being a CyberAngel. Advantage: Criminal activity is more likely to take place if no one knows what you are doing, therefore your ability to gather crime evidence will be enhanced. Disadvantage: Since no one knows who you are, no one can identify you immediately as someone offering assistance. Also CyberAngels gets no visibility if all its patrolling members are anonymous. 21) If suspected criminal activity, like child pornography trading, is observed in a live channel, CyberAngels have 4 options: a) Immediately identify yourself as a CyberAngel and ask the person to desist. b) Immediately notify an online channel guardian / sysop / host / guide to come and deal with the problem c) Remain silent and gather information / evidence, without requesting it, to report later to relevant authority. d) Participate in the activity, and masquerade as a pedophile, so as to infiltrate the operation. a) Immediately identify yourself as a CyberAngel and ask the person politely to desist. Advantage: You will rid the channel immediately of the problem. Also you will let others in the channel know you are there to help if needed. Disadvantage: Criminal activity will move and continue in a secret or private channel. In IRC you may even be kicked off the channel. b) Immediately notify an online channel guardian / sysop / host / guide to come and deal with the problem Advantage: Summoning the online administrators of a live area is always a good idea if you have a problem. Disadvantage: none. c) Remain silent and gather information / evidence, without requesting it, to report later to relevant authority. Advantage: You may get placed on a trading list of users on the channel as pictures are often spammed out, even if you don't personally request any, thus you will obtain crime evidence as other users trade in return and reply to all. This method of obtaining material is less likely to be ruled inadmissible later in court, as it was not unlawfully requested. You also avoid flames and hate mail and other harassment that may follow a public bust. Disadvantage: You may be mistaken for a pedophile yourself. d) Participate in the activity, and masquerade as a pedophile, so as to infiltrate the operation. Advantage: You can gain a lot of crime evidence and understanding of the operation if you infiltrate it. Disadvantage: You may be mistaken for a pedophile yourself. Also your evidence may be ruled inadmissible later in court. 22) All CyberAngels should keep logs of their activities, detailing logon and logoff times, channels / URLs / sites visited, with time of arrival and departure from sites, logs of suspicious conversations, postings and records of what, if any, actions were taken. CyberAngels may store headers from postings as reference, but should avoid storing graphic files that may be criminal to possess. 23) Copies of correspondence with all Authorities, relevant Usenet postings or email, should all be cc'd to angels@wavenet.com. 24) How does a CyberAngel decide what material or activity to complain about? When on patrol you should consider the following responses to material or activity that you witness: a) Harm b) Fear c) Distress d) Inconvenience e) Offense f) Concern These categories give you a ladder of responses to what you are finding. You may choose to complain about / report *anything* that causes you or others Harm, Fear, Distress, Inconvenience, Offense or Concern, regardless of whether it is criminal or not. The right to question what you see and to bring it to the attention of the proper authorities is your civil, legal and human right. In the USA this is Constitutionally protected. These are subjective judgments, based on the way you personally feel about what you see, or what happens to you. The fact that they are subjective in no way invalidates them. You have a right to your response. a) Harm - Harm is something that hurts you or another. On the Net it is not possible to physically harm someone, but you may still be a witness to harm. In the case of child pornography you are witnessing a record of harm done to a child when the picture was taken. A child has been sexually abused for the gratification of adults. So if you witness child pornography you are witness to a record of actual bodily harm - sexual abuse or child abuse. b) Fear - Fear means that you are witness to something that frightens you, that is puts you in fear for your physical or mental well-being. You may receive a death threat by email from someone who has located your home address; you may become aware of a child arranging a liaison with an adult online, and giving that adult personal information like the child's telephone number. You may fear that something will happen in the future. c) Distress - Hate mail causes distress. Distress means anything that makes you feel upset, e.g., makes you cry or feel like crying. A 13 year old Korean girl not long ago committed suicide as a result of hatred and abuse directed at her in IRC. Clearly she was distressed by what had happened to her online. d) Inconvenience - Inconvenience means your life is disrupted by some outside cause. All forms of electronic harassment cause inconvenience: having your account terminated for no reason, receiving a mail bomb or a virus, or having your mailbox filling up with spam. The emotion that goes with inconvenience is usually anger. e) Offense - There are plenty of things that you might come across on the Net that you may find offensive. With offense comes anger and outrage. Many people find all forms of pornography offensive, or some of the more bad taste newsgroups, or even someone's foul language. Christians find Satanists offensive, and vice versa. Offensive activity is more of a personal issue for you and your conscience, since it is very hard to objectively define "offensive". f) Concern - Concern is not usually the product of anger or distress. Concern means that you are worried about something, e.g. the easy access children have to pornography on the Net. If something concerns you, you should feel that you have a right to express your concern. The right and the choice to complain is yours. CyberAngels should aim to complain to the appropriate place. It is inappropriate for example to complain to the FBI because you are offended by someone cursing online. But you have every right to complain a) to the abuser and b) to the abuser's service provider. You might even choose to write a letter to your Senator or Congressperson, expressing your feelings about rudeness and foul language on the Net. The point is that you seek appropriate ways to express your feelings. 25) Whether any of the above categories are criminal in nature can not be decided by a CyberAngel, nor even by the Police. The determination of guilt or innocence can only be made by a court of law. This should be borne in mind when you are considering what to do and who to contact. Even if you have a good working knowledge of the relevant laws, and CyberAngels should educate themselves in this area, you are still not qualified to decide guilt or innocence. 26) If you decide to take a matter further, a CyberAngel should phrase a letter of complaint in the first person. It is far better to say "I believe this to be criminal" than to say "This is criminal". "I am offended" is better than "This is offensive". Own your own words. 27) The main focus of CyberAngel activity is on material and activities that are harmful, distressing and inconvenient. These are activities where there are real-life victims, i.e. people. 28) On the Internet people are free to do what they want. They are also free to take the consequences of their actions. Each user, whether they like it or not, is bound by the laws of the country they are logging in from. This fact applies to CyberAngels equally. CyberAngels have no special powers or privileges on the Internet. 29) All CyberAngels should recognize that we are a worldwide umbrella organization of people from many different cultures. We believe in and practise tolerance, and as long as our Mission Statement and Codes of Conduct are followed, we have no problem working together with people who in other respects have very different views from our own. 29) All CyberAngels should strive to be role-models for self-regulation and responsibility. In this way we seek to protect and preserve the very wonderful world that we inhabit, that we call Cyberspace or the Internet. ================================================= Proposals to enhance, expand or revise these Codes of Conduct are welcome. Please send your feedback to angels@wavent.com Copyright Colin Gabriel Hatcher, May 18, 1996 ********************************************************* Colin Gabriel Hatcher - CyberAngels Director angels@wavenet.com http://www.safesurf.com/cyberangels/ http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html "All that is required for the triumph of evil is ------------------------------ Date: Fri, 17 May 1996 10:12:50 -0700 From: blackbox@BBOX.COM Subject: File 3--ACLU: GA Prohibits Web Links? Date--Thu, 16 May 1996 13:55:45 GMT From--ACLU.Newsfeed-Owner ---------------------------------------------------------------- *Georgia Law Could Prohibit Web Links* Legislation recently signed into law by Georgia Governor Zell Miller is aimed at preventing fraud in cyberspace, but the Chronicle of Higher Education recently reported that critics say it could force developers of World Wide Web pages to remove links to other pages. The law, the Chronicle reported, makes it a crime to "falsely identify" oneself on the Net, or to direct people to someone else's computer without the other person's explicit permission. The ACLU said the Georgia law raises serious questions. "The Georgia law -- like the federal Communications Decency Act - - is just another example of legislators rushing to criminallize communication in the online medium before they even begin to understand how it operates," said Ann Beeson, an ACLU expert on cyberspace. "In the process," Beeson continued, "they have violated the free speech rights of cybercitizens and have drastically hindered a democratizing medium that enables people to communicate and share information around the world in a way never previously possible." ---------------------------------------------------------------- ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE ---------------------------------------------------------------- ACLU Freedom Network Web Page: http://www.aclu.org. America Online users should check out our live chats, auditorium events, *very* active message boards, and complete news on civil liberties, at keyword ACLU. ---------------------------------------------------------------- ACLU Newsfeed American Civil Liberties Union National Office 132 West 43rd Street New York, New York 10036 To subscribe to the ACLU Newsfeed, send a message to majordomo@aclu.org with "subscribe News" in the body of the message. To terminate your subscription, send a message to majordomo@aclu.org with "unsubscribe News" in the body of the message. For general information about the ACLU, write to info@aclu.org. - ------------------------------ Date: Tue, 21 May 1996 09:15:38 -0700 (PDT) From: jonl@well.com Subject: File 4--Rough Draft: Guide for Organizing Online NOTE: This is a VERY incomplete initial draft on which a longer guide for creating local online organizations will be based. It's also very U.S. oriented in this version. If you have comments or suggestions, send to jonl@hotwired.com or jonl@well.com... Why organize locally/regionally? Why not join a national organization? Do join one or more national or international organizations, but organize locally, as well. Only local groups can monitor local politics "Freedom and Privacy" are local as well as national issues. Freedom can be threatened as readily on a muncipal as a state or national level, so it's as important to have a network of empowered activists organizing cities as it is to have activists working `inside the Beltway.' In fact, though some disaffected citizens imagine that a monolithic Federal government churns on ignoring the wishes of John Q. America, government tends to be a bottom-up proposition in the U.S. Most legislators really do listen to their constituents, and are sensitive to their input when they hear it. If we want `em to hear, we have to turn the volume up...the way you do that is to get numbers with faces, and get `em organized locally, so that the pols will see and hear them during home-turf visits. Beyond that, it wouldn't hurt (as Jerry Berman once advised me) to load a busfull of local activists and drive them to Washington to drop in on the legislative offices for the area's representatives. Distribution: Local groups create and (most important) maintain membership lists that are potential distribution nodes for evolving grassroots networks. This allows for hierarchical, moderated distribution of essential information from national sources, and for organization on a local level in the `think globally, act locally' mode. Board of Directors: Find 4-5 individuals who will commit to the organization and work to meet its goals. Find persons with skills you can use: attorney, system administrator, writer/editor, accountant. Establish a Board of Directors and Incorporate Take special care in creating your mission statement. Look at mission statements for groups like EFF and EFF-Austin Also look at bylaws and articles of incorporation for existing groups Articles of incorporation will include your mission. Here's EFF-Austin's: (a) to engage in and support educational activities that increase understanding of the opportunities and challenges posed by computing and telecommunications, and related civil liberties issues. (b) to foster a clearer social understanding of the issues underlying free and open telecommunications; and (c) to facilitate and encourage communication between individuals interested in computer and telecommunication technology and related social and legal issues. * Consider whether you want to apply for 501(c)3 classification so that donations to the group are tax deductible. This decision has pros (facilitates fund raising) and cons (501(c)3 corporations can't overtly lobby). EFF-Austin to date has not completed the paperwork for 501(c)3. * Find volunteers for core tasks within the BOD and membership base * In addition to officers, you need someone to handle public relations, someone to take responsibility for the membership database, and someone to handle the online presence * Establish an online presence * Find an ISP or other system that will provide a comp account * Set up an email list for members and interested persons * Set up aliases for the board of directors, advisory board, perhaps others * Create a web page * Include a membership form on the web page * Establish a membership base * Recruit members online and in meatspace. * Keep dues low * Offer value to members * Hold monthly BOD and membership meetings * Get to know your local police: EFF-Austin has a police liaison (Bruce Sterling). One of his jobs is to ensure that the police know who we are and will call us for consultation. * Get to know the press * Create focus events that are well-blurbed * Find cooperating attorneys * Talk to other like-minded groups * Minimize costs * Leverage computer-mediated communication * Know your enemies * Know your friends * Know your rights * Always challenge bad press * Always encourage good press * Take public positions -- Jon Lebkowsky http://www.well.com/~jonl Electronic Frontiers Forum, 7PM PST Thursdays ------------------------------ Date: Sat, 18 May 1996 14:18:13 -0700 From: Jim Warren Subject: File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-) [Inflicted on you because you know me. Redistrib as desired.] Computer nerds and nerd-alikes might wish to mark June 12th on their calendars. PBS will air "Triumph of the Nerds" nationally on Wednesday, June 12th -- as a 3-hour special that they will be promoting as *the* PBS event for June. The host is Infoworld's "Robt Cringely" (a pseudonym) and is based mo'less on his book, _Accidental Empires_, that discloses how many personal computing personalities stumbled into successes. In the show, Cringely interviews a number of microcomputing's "pioneers" -- including Bill Gates ... and even li'l ol' me -- seeking candid insights and tales about the early daze of personal computing. The 3-hour premier show will include scenes that will *not* appear in later re-airings by various PBS stations, in snipped-down one-hour segments, nor will they be included in the "Nerds" videotapes that PBS will offer for sale. My understanding is that, among other things, the one-time-only showing will include some comments about Gates' notorious mid-1970s letter to editors accusing computer hobbyists of being thieves, pirating the life-blood of his little software company (i.e., duplicating the paper-tapes of Microsoft's first BASIC interpreter that -- if memory serves -- they were trying to sell for $350, for the MITS Altair 808-based computer kit that cost $395). Donno what other morstels will be included. NERDS IN THE NUDE Although the show was taped last fall, it follows a "tradition" later developed for pubic figures in the San Francisco Bay area: * In December, shortly before San Francisco's mayorial election, ex-police chief and then-Mayor Frank Jordan held a somewhat unusual photo-op. He was featured on front pages and teevee doing a nude shower interview with two local disk-jockeys. The shots were tastefully(?) clipped slightly above the jockey-shorts that Jordon was obviously not wearing. * Earlier this month, Stanford computer instructor and local microprocessor consultant/author/wizard John Wharton gained national fame as "Shower Man" when Dave Letterman chose him out of his Late Show audience to send to the showers -- broadcasting Wharton continent-wide, well-lathered in Letterman's shower where the show was produced during a week's visit in San Francisco. So ... When the "Nerds" producers first interviewed me last year, planning what they were going shoot with which of whom, I suggested doing the interview in my [large] hot tub -- on my redwooded San Francisco Peninsula ridgetop, overlooking about 100 miles of the Pacific. I mean, after *all* -- we Silicon Valley / Californica types *do* have our reputations to maintain. (Actually, I had more in mind doing the initial *off*-camera interview with the producer and very attractive assistant producer, who had properly oooh'ed and ahhh'ed over the ho'tub and vistas, as I was showing them around my mountaintop -- but that detracts from the story. :-) They discussed the idea and came back saying that Cringely would just *love* to do the ON-camera interview in the buff ... uh, in the ho'tub. (Woppps! -- my bluff was called.) I first said that I'd do it if all the video crew -- including, of course, the attractive assistant producer -- were also sans threads ... but it was a cool morning with wisps of fog flitting about, and for some strange reason they seemed disinclined, so I relented. Reasoned I: I *should* honor the origins of my [questionable claims] to such fame and accidental fortune. After all -- * I never would have gotten into computing in 1968, had I not been looking for work ... after resigning (upon request) from chairing the Math Dept at the College of Notre Dame, a catholic girls' college where the nun who was President somehow felt that the huge nude parties I was convening at my mountain home, not far from the area's nude beach, were somehow incompatible with the philosophy of a Catholic girls' school -- especially after rumors about the events began to spread through the student body [so to speak] ... in a college where many of the parents appeared to be doing everying possible to delay daughters' becoming women long enough to marry them off. [Hey! -- remember ... those hippie '60s were different times, back when Newt was smokin' dope and Willie wasn't inhaling. And no, I did not make a practice of inviting my students, and not even one of the Sisters ever attended -- though some of the lay faculty joined in.] * And for the seven years that I ran the Computer Faires and InfoWorld-to-be -- or they ran me -- clothing was always optional around our mountaintop compound, and the pool and ho'tub were popular in slack times, often sans slacks (ahhh, to return to the girth of those times :-). [You shoulda seen the UPS delivery guy when he walked into the office one day, only to find my completely-tanned, voluptuous young bookeeper and me consulting in the all-together with my office manager -- whom he knew was also my bookeeper's mother, and my next-door neighbor and good friend! We just turned casually, smiled brightly, and pointed to the outgoing packages.] [Back on topic] So with their "Nerds" camera rolling, Cringely and I began chatting about ISDN versus Frame Relay ... and stripped to zip. Once in the ho'tub, in place of coy camera angles, I turned on the bubbles for strategic opacity ("Bubbles, Bob?", asked I :-). You'll have to watch PBS on June 12th to, uh, see the rest. Somehow, I suspect that Bellevue Bill's interview was probably conducted with more mundane "style" ... but who knows. Guess we'll just have to wait for the movie. And oh yes -- Cringely tells me: >The shows have already run in England to great acclaim (our tub scene was >especially popular). The series has also been sold to networks in Ireland, >Norway, Sweden, Iceland, Holland, Czech & Slovak Reps, Croatia, Hong Kong, >Singapore, Thailand, Taiwan, South Africa, British Airways (inflight), and >a couple of others I can't remember. I guess this will sorta blow my cover. :-) But then again, I'm not planning to run for office ... and I *am* a WYSIWYG sorta guy. --jim Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com) 345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request> [puffery: John Dvorak Lifetime Achievement Award (1995); James Madison Freedom-of-Information Award, Soc. of Prof. Journalists - Nor.Cal. (1994); Hugh M. Hefner First-Amendment Award, Playboy Foundation (1994); Pioneer Award, Electronic Frontier Foundation (its first year, 1992); founded the Computers, Freedom & Privacy confs, InfoWorld; blah blah blah :-).] Hmmm, I wonder if ex-Mayor Jordon would like to come to my next nude party -- now that Willie Brown is Mayor. (Come to think of it though, by reputation, Willie would probably be the one more likely to attend. :-) ------------------------------ Date: 21 May 96 09:57:04 -0500 From: George_Wang-G11992@email.mot.com Subject: File 6--Job Position for Manager of Network Services Since I know that many readers of the CU digest are real network/computer "gurus" I thought I would see if there are any network experts there who beyond traditional system admin, has very strong "theoretical" networking skills in the "emerging" technologies such as ATM, FDDI, Cellular/Switched Packet Networks, Satellite, Cable, etc, etc. I work for Motorola University's Emerging Technologies Group and we are looking to find a Manager of Network Services who has very strong networking "design" skills to develop efficient network systems to distribute multimedia and other forms of training. If anyone is interested please email me at georgew@mot.com and I will send you the job description requirements. I don't think it's appropriate to add extra bandwidth to the digest for the description. Thanks, George Staff Engineer Motorola University ------------------------------ Date: Sat, 18 May 1996 01:25:09 -0500 (CDT) From: David Smith Subject: File 7--Dutch Internet Hotline agains Child Pornography online (fwd) ---------- Forwarded message ---------- Dutch Internet Hotline Against Child Pornography As of today it is possible to report child pornography postings originating from the Netherlands to a special hotline, meldpunt@xs4all.nl. If you see any child pornography pictures on Internet, posted by a dutch user, then the hotline is the right place to report a complaint. We will warn the user about his posting, and ask him to cancel any illegal materials that where posted by him. If the warning is ignored, then the hotline will forward any available information to the vice-squad of the local police, so they can prosecute the distributor of child pornography pictures. If you spot a child pornography picture in a Usenet posting, then check the headers, especially the NNTP-Posting-Host:. If that header contains a domain-name adress that terminates on '.nl' then send us the headers of that message, so we can investigate the report. *** Reports can be sent to meldpunt@xs4all.nl *** More information about the hotline against child pornography on Internet can be found at: http://www.xs4all.nl/~meldpunt This hotline is a self-regulating Internet initiative by the foundation for Dutch Internetproviders (NLIP), the Dutch National Criminal Intelligence Service (CRI), Internet users, a psychologist and the National Bureau against Racism (LBR). ------------------------------ Date: Thu, 21 Mar 1996 22:51:01 CST From: CuD Moderators Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (860)-585-9638. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #8.38 ************************************