Computer underground Digest Sun Feb 13, 1994 Volume 6 : Issue 15 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe (Improving each day) Acting Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cowpie Editor: Buffy A. Lowe CONTENTS, #6.15 (Feb 13, 1994) File 1--"Internet users get a warning" File 2--Vice President Gore Questions Current Key Escrow Policy! File 3--CPSR ANNOUNCES CAMPAIGN TO OPPOSE CLIPPER PROPOSAL File 4--EFF Wants You (to add your voice to the crypto fight!) File 5--Text of Cantwell Bill (HR 3627) File 6--Austrialian Federal Regulation ofBBSes File 7--Regulation of BBSes in Canada File 8--Pessimism in CuD (Response to Technological Disasters) File 9--Response to "Technological Disasters" File 10--How to avoid Postal Entrapment (Re: CuD #6.11) File 11--CNS-Internet (Internet access service) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. To subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 ANONYMOUS FTP SITES: AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: ftp.funet.fi in pub/doc/cud. (Finland) UNITED STATES: aql.gatech.edu (128.61.10.53) in /pub/eff/cud etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud ftp.eff.org (192.88.144.4) in /pub/Publications/CuD halcyon.com( 202.135.191.2) in mirror2/cud ftp.warwick.ac.uk in pub/cud (United Kingdom) KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: 09 Feb 94 13:49:16 EST From: Lou Poppler <71231.2724@COMPUSERVE.COM> Subject: File 1--"Internet users get a warning" ((MODERATORS' COMMENT: We've seen a number of media blurbs in the past few weeks with headlines such as "HACKERS BREAK INTO THE INTERNET." To readers (or politicians) with little understanding of the Nets, the headlines and accompanying stories suggest images of roving gangs lurking beneath every PC. The following comes from the Lansing State Journal)). WASHINGTON -- Users of the international computer network Internet are being advised to change their passwords because of a rash of break-ins to the system. Computer break-ins occur when an unauthorized user finds a way to connect to a computer system, often using a stolen password. Once connected, they can read private information or change or eliminate data belonging to others. "Intruders have already captured access information for tens of thousands of systems across the Internet," said an advisory late Thursday by the Computer Emergency Response Team, a federally funded panel that helps coordinate interconnections among computer systems. In the short term, the advisory panel urged users to change passwords. But it said this is not a permanent solution and said that the long-term solution lies in finding a way to eliminate reusable passwords on the Internet. ------------------------------ Date: Thu, 10 Feb 1994 18:54:59 -0500 (EST) From: Stanton McCandlish Subject: File 2--Vice President Gore Questions Current Key Escrow Policy! National Information Infrastructure Advisory Committee met today in Washington at the Old Executive Office Building. In comments made after a question and answer period, Vice President Al Gore said that key escrow policy announced last Friday (2/4/94) had serious flaws and that he hope the issue of who holds the keys and under what terms would be given more serious, careful consideration. Gore made it clear that some amount of control of cryptography technology was necessary for national security. However, the key escrow policies announced by the Departments of Justice, Commerce & State, and the NSA, were "low level decisions" that got out before thorough analysis. In a conversation with Mitchell Kapor, Esther Dyson, and Mike Nelson (of the White House Staff), Gore said that he would prefer that the keys be held by some part of the Judiciary branch, or perhaps even by trusted, private escrow agents. He made it clear that he believed that the escrow agents named in last Friday's announcement (National Institute of Standards & Technology and the Treasure Department) were no appropriate key holders. Mike Nelson also indicated that there was real interest in a software-based escrow system instead of the hardware-based SKIPJACK standard Those of us who heard Gore were quite surprised. His remarks suggest that the key escrow policies to date do not have full support of the White House. Still, Gore was quite firm in asserting that some control of encryption technology is essential to national security. "Encryption and codebreaking have determined the outcome of world wars. He stated (incorrectly) that most our industrialized allies place must stricter controls in encryption that the US does. In fact, almost all COCOM countries allow the export of DES-based products, though some do not allow DES to be imported. The whole question of encryption was raised when Mitchell Kapor told the Vice President that over half of the Advisory Council members had serious reservations about the current Clipper/Skipjack policies. Gore and Kapor agreed that the Advisory Council should be used to have a serious dialogue about encryption policy. Given Gore's departure from the current Clipper proposals, there might actually be something to talk about. ========== NOTE: This DOES NOT mean that Clipper is going away. Part of stopping Clipper is to lift export controls on encryption and enable US companies to start producing products that enable all of us to protect our privacy with strong encryption. I urge you to write to Rep. Cantwell today at cantwell@eff.org. In the Subject header of your message, type "I support HR 3627." In the body of your message, express your reasons for supporting the bill. EFF will deliver printouts of all letters to Rep. Cantwell. With a strong showing of support from the Net community, Rep. Cantwell can tell her colleagues on Capitol Hill that encryption is not only an industry concern, but also a grassroots issue. *Again: remember to put "I support HR 3627" in your Subject header.* P.S. If you want additional information about the Cantwell bill, send e-mail to cantwell-info@eff.org. To join EFF, write membership@eff.org. For introductory info about EFF, send any message to info@eff.org. The text of the Cantwell bill can be found on the Internet with the any of the following URLs (Universal Resource Locaters): ftp://ftp.eff.org/pub/Policy/Legislation/cantwell.bill http://www.eff.org/ftp/EFF/Policy/Legislation/cantwell.bill gopher://gopher.eff.org/00/EFF/legislation/cantwell.bill ************************************************************************** Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds. - John Perry Barlow, EFF co-founder The Electronic Frontier Foundation is working to protect your privacy. To help stop Clipper and eliminate export controls on cryptography, support a bill introduced in the House of Representatives, HR 3627. To support the bill, send email to . ------------------------------ Date: Tue, 8 Feb 1994 13:41:30 -0800 From: Dave Banisar Subject: File 3--CPSR ANNOUNCES CAMPAIGN TO OPPOSE CLIPPER PROPOSAL Campaign Against Clipper CPSR ANNOUNCES CAMPAIGN TO OPPOSE CLIPPER PROPOSAL Embargoed until 2 pm, Monday, February 7, 1994 contact: rotenberg@washofc.cpsr.org (202 544 9240) Washington, DC -- Following the White House decision on Friday to endorse a secret surveillance standard for the information highway, Computer Professionals for Social Responsibility (CPSR) today announced a national campaign to oppose the government plan. The Clipper proposal, developed in secret by the National Security Agency, is a technical standard that will make it easier for government agents to wiretap the emerging data highway. Industry groups, professional associations and civil liberties organizations have expressed almost unanimous opposition to the plan since it was first proposed in April 1993. According to Marc Rotenberg, CPSR Washington director, the Administration made a major blunder with Clipper. "The public does not like Clipper and will not accept it. This proposal is fatally flawed." CPSR cited several problems with the Clipper plan: o The technical standard is subject to misuse and compromise. It would provide government agents with copies of the keys that protect electronic communications. "It is a nightmare for computer security," said CPSR Policy Analyst Dave Banisar. o The underlying technology was developed in secret by the NSA, an intelligence agency responsible for electronic eavesdropping, not privacy protection. Congressional investigations in the 1970s disclosed widespread NSA abuses, including the illegal interception of millions of cables sent by American citizens. o Computer security experts question the integrity of the technology. Clipper was developed in secret and its specifications are classified. CPSR has sued the government seeking public disclosure of the Clipper scheme. o NSA overstepped its legal authority in developing the standard. A 1987 law explicitly limits the intelligence agency's power to set standards for the nation's communications network. o There is no evidence to support law enforcement's claims that new technologies are hampering criminal investigations. CPSR recently forced the release of FBI documents that show no such problems. o The Administration ignored the overwhelming opposition of the general public. When the Commerce Department solicited public comments on the proposal last fall, hundreds of people opposed the plan while only a few expressed support. CPSR today announced four goals for its campaign to oppose the Clipper initiative: o First, to educate the public about the implications of the Clipper proposal. o Second, to encourage people to express their views on the Clipper proposal, particularly through the computer network. Toward that goal, CPSR has already begun an electronic petition on the Internet computer network urging the President to withdraw the Clipper proposal. In less than one week, the CPSR campaign has drawn thousands of electronic mail messages expressing concern about Clipper. To sign on, email clipper.petition@cpsr.org with the message "I oppose clipper" in the body of the text. o Third, to pursue litigation to force the public disclosure of documents concerning the Clipper proposal and to test the legality of the Department of Commerce's decision to endorse the plan. o Fourth, to examine alternative approaches to Clipper. Mr. Rotenberg said "We want the public to understand the full implications of this plan. Today it is only a few experts and industry groups that understand the proposal. But the consequences of Clipper will touch everyone. It will affect medical payments, cable television service, and everything in between. CPSR is a membership-based public interest organization. For more information about CPSR, send email to cpsr@cpsr.org or call 415 322 3778. For more information about Clipper, check the CPSR Internet library CPSR.ORG. FTP/WAIS/Gopher and listserv access are available. ------------------------------ Date: Mon, 7 Feb 1994 18:32:26 -0500 (EST) From: Stanton McCandlish Subject: File 4--EFF Wants You (to add your voice to the crypto fight!) The Electronic Frontier Foundation needs your help to ensure privacy rights! * DISTRIBUTE WIDELY * Monday, February 7th, 1994 From: Jerry Berman, Executive Director of EFF jberman@eff.org Dear Friends on the Electronic Frontier, I'm writing a personal letter to you because the time has now come for action. On Friday, February 4, 1994, the Administration announced that it plans to proceed on every front to make the Clipper Chip encryption scheme a national standard, and to discourage the development and sale of alternative powerful encryption technologies. If the government succeeds in this effort, the resulting blow to individual freedom and privacy could be immeasurable. As you know, over the last three years, we at EFF have worked to ensure freedom and privacy on the Net. Now I'm writing to let you know about something *you* can do to support freedom and privacy. *Please take a moment to send e-mail to U.S. Rep. Maria Cantwell (cantwell@eff.org) to show your support of H.R. 3627, her bill to liberalize export controls on encryption software.* I believe this bill is critical to empowering ordinary citizens to use strong encryption, as well as to ensuring that the U.S. software industry remains competitive in world markets. Here are some facts about the bill: Rep. Cantwell introduced H.R. 3627 in the House of Representatives on November 22, 1993. H.R. 3627 would amend the Export Control Act to move authority over the export of nonmilitary software with encryption capabilities from the Secretary of State (where the intelligence community traditionally has stalled such exports) to the Secretary of Commerce. The bill would also invalidate the current license requirements for nonmilitary software containing encryption capablities, unless there is substantial evidence that the software will be diverted, modified or re-exported to a military or terroristic end-use. If this bill is passed, it will greatly increase the availability of secure software for ordinary citizens. Currently, software developers do not include strong encryption capabilities in their products, because the State Department refuses to license for export any encryption technology that the NSA can't decipher. Developing two products, one with less secure exportable encryption, would lead to costly duplication of effort, so even software developed for sale in this country doesn't offer maximum security. There is also a legitimate concern that software companies will simply set up branches outside of this country to avoid the export restrictions, costing American jobs. The lack of widespread commercial encryption products means that it will be very easy for the federal government to set its own standard--the Clipper Chip standard. As you may know, the government's Clipper Chip initiative is designed to set an encryption standard where the government holds the keys to our private conversations. Together with the Digital Telephony bill, which is aimed at making our telephone and computer networks "wiretap-friendly," the Clipper Chip marks a dramatic new effort on the part of the government to prevent us from being able to engage in truly private conversations. We've been fighting Clipper Chip and Digital Telephony in the policy arena and will continue to do so. But there's another way to fight those initiatives, and that's to make sure that powerful alternative encryption technologies are in the hands of any citizen who wants to use them. The government hopes that, by pushing the Clipper Chip in every way short of explicitly banning alternative technologies, it can limit your choices for secure communications. Here's what you can do: I urge you to write to Rep. Cantwell today at cantwell@eff.org. In the Subject header of your message, type "I support HR 3627." In the body of your message, express your reasons for supporting the bill. EFF will deliver printouts of all letters to Rep. Cantwell. With a strong showing of support from the Net community, Rep. Cantwell can tell her colleagues on Capitol Hill that encryption is not only an industry concern, but also a grassroots issue. *Again: remember to put "I support HR 3627" in your Subject header.* This is the first step in a larger campaign to counter the efforts of those who would restrict our ability to speak freely and with privacy. Please stay tuned--we'll continue to inform you of things you can do to promote the removal of restrictions on encryption. In the meantime, you can make your voice heard--it's as easy as e-mail. Write to cantwell@eff.org today. Sincerely, Jerry Berman Executive Director, EFF jberman@eff.org P.S. If you want additional information about the Cantwell bill, send e-mail to cantwell-info@eff.org. To join EFF, write membership@eff.org. For introductory info about EFF, send any message to info@eff.org. The text of the Cantwell bill can be found on the Internet with the any of the following URLs (Universal Resource Locaters): ftp://ftp.eff.org/pub/Policy/Legislation/cantwell.bill http://www.eff.org/ftp/EFF/Policy/Legislation/cantwell.bill gopher://gopher.eff.org/00/EFF/legislation/cantwell.bill It will be available on AOL (keyword EFF) and CIS (go EFFSIG) soon. ------------------------------ Date: 09 Feb 94 13:33:32 EST From: CuD Moderators Subject: File 5--Text of Cantwell Bill (HR 3627) IN THE HOUSE OF REPRESENTATIVES MS. CANTWELL (for herself and ___) introduced the following bill which was referred to the Committee on __________. --------------------------------------- A BILL To amend the Export Administration Act of 1979 with respect to the control of computers and related equipment. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress Assembled, SECTION 1. GENERALLY AVAILABLE SOFTWARE Section 17 of the Export Administration Act of 1979 (50 U.S.C. App. 2416) is amended by adding at the end thereof the following new subsection: ``(g) COMPUTERS AND RELATED EQUIPMENT.--- ``(1) GENERAL RULE.---Subject to paragraphs (2) and (3), the Secretary shall have exclusive au- thority to control exports of all computer hardware, software and technology for information security (including encryption), except that which is specifi- cally designed or modified for military use, including command, control and intelligence applications. ``(2) ITEMS NOT REQUIRING LICENSES.--- No validated license may be required, except pursuant to the Trading With The Enemy Act or the Inter- national Emergency Economic Powers Act (but only to the extent that the authority of such act is not exercised to extend controls imposed under this act), for the export or reexport of--- ``(A) any software, including software with encryption capabilities, that is--- ``(i) generally available, as is, and is designed for installation by the purchaser; or ``(ii) in the public domain or publicly available because it is generally accessible to the interested public in any form; or ``(B) any computing device soley because it incorporates or employs in any form software (including software with encryption capabilities) exempted from any requirement for a validated license under subparagraph (A). ``(3) SOFTWARE WITH ENCRYPTION CAPABILITIES. --- The Secretary shall authorize the export or reexport of software with encryption capabilities for nonmilitary end-uses in any country to which ex- ports of software of similar capability are permitted for use by financial institutions not controlled in fact by United States persons, unless there is substantial evidence that such software will be--- ``(A) diverted to a military end-use or an end-use supporting international terrorism; ``(B) modified for military or terrorist end- use; or ``(C) reexported without requisite United States authorization. ``(4) DEFINITIONS.---As used in this subsection--- ``(A) the term `generally available' means, in the case of software (including software with encryption capabilities), software that is offered for sale, license, or transfer to any person with- out restriction through any commercial means, including, but not limited to, over-the-counter retail sales, mail order transactions, phone order transactions, electronic distribution, or sale on approval; ``(B) the term `as is' means, in the case of software (including software with encryption ca- pabilities), a software program that is not de- signed, developed, or tailored by the software company for specific purchasers, except that such purchasers may supply certain installation parameters needed by the software program to function properly with the purchaser's system and may customize the software program by choosing among options contained in the soft- ware program; ``(C) the term `is designed for installation by the purchaser' means, in the case of soft- ware (including software with encryption capa- bilities)--- ``(i) the software company intends for the purchaser (including any licensee or transferee), who may not be the actual program user, to install the software pro- gram on a computing device and has sup- plied the necessary instructions to do so, except that the company may also provide telephone help line services for software in- stallation, electronic transmission, or basic operations; and--- ``(ii) that the software program is de- signed for installation by the purchaser without further substantial support by the supplier; ``(D) the term `computing device' means a device which incorporates one or more microprocessor-based central processing units that can accept, store, process or provide out- put of data; and ``(E) the term `computer hardware', when used in conjunction with information security, includes, but is not limited to, computer sys- tems, equipment, application-specific assem- blies, modules and integrated circuits.'' ------------------------------ Date: Sun, 6 Feb 1994 16:21:45 +0800 (WST) From: hardone Subject: File 6--Austrialian Federal Regulation ofBBSes Federal check on computer bulletin boards. Financial Rev. Feb 4th Page 4 Mounting evidence that computer bulletin boards were being used by criminals, neo-Nazis and paedophiles has prompted a federal investigation into their use. The Attorney-General, Mr. Lavarch, said he and the Minister for communications, Mr. Lee, had agreed to set up a joint task force to consider ways of regulating the use of computer bulletin boards. Mr. Lavarch said he was concerned that the bulletin boards - which anyone with a home computer and modem could access - were being used to disseminate "extremely offensive and often illegal material". "There is ample evidence that bulletin boards are being used to distribute banned publications, including child pornography," he said in a statement released yesterday. Although the Government has no idea how many Australians were tapping into bulletin boards, according to industry submissions to the Office of Film and Literature Classification, Australia was the second-largest user after the US where an estimated 40,000 people regularly used the boards. Mar Lavarch said in Amercia, paedophiles have been detected using bulletin boards to contact each other and their victims. "Other examples of misuse include neo-Nazi propaganda dissemination, unauthorized copying of software and other protected materials, sale of stolen credit card numbers and the spread of other defamatory information." He said it was time to look at ways to curb the growing misuse of technology. "We are in an era where children operate computers as easily as their parents rode bicycles. "We cannot allow advances in technology to overtake the legal and law enforcement measure designed to protect them, in particular, from undesirable material." He said the issue of bulletin boards was on the agenda for the next meeting of Federal, State and Territory censorship ministers in Canberra on February 17 where the proposed new classification system for over-the-counter video and computer games would be finalised. ------------------------------ Date: Wed, 09 Feb 94 16:09:08 EST From: pcalarco Subject: File 7--Regulation of BBSes in Canada The CRTC (Canadian Radio & Television Comission) is the most powerful government organization in Canada regarding radio,television, telephone, and telecommunications service. Recently, there have been unconfirmed rumours abounding across Fidonet and some mailing lists that the CRTC is looking at regulating computer bulletin boards as well. A recent story on BBSes on one of our national television networks (CTV, 5/2/94) focused on the proliferation of 'pornographic BBSes' in Canada in recent years, and the question naturally came up, "Should we regulate computer BBSes?" To the general public watching this, the response probably would be "Yes!" after seeing the very great danger to the moral fibre of this nation's youth . An interview with the new Minister of Communications, Mr. Jon Gerrard, on CBC Radio the same even- ing did not discount the idea. Mr. Gerrard evaded the pointed questions quite nicely, and gave no answer one way or the other as to whether regulation of BBSes was being considered. As Minister of Communications Mr. Gerrard is directly responsible for policy input into the CRTC, and can direct the CRTC to new areas. The recently-passed Telecommunication Act of June, 1993 does not include computer networks (and BBSes specific -ally) in its mandate, but their are clauses in the document that leave regulation of areas not specified by the legislation to fall under regulation at any future point, at the discretion of the CRTC. As to whether this is some nasty rumour or covert fact, none of us who have been investigating the issue can find out. Mr. Gerrard, however, did release his e-mail address on the Saturday night CBC program, and invited inputs from Canadians on this specific issue. I would venture to say that Americans should take interest in this issue as well. With the II initiative in the U.S. heating up, escrow still remaining very much a probabability in the Clinton administration, and the prolifera- tion of BBSes and Freenets in both countries, the issue of increased regulation of computer networks, especially at the more grassroots level, is a very real possibility. Along with regulation of the medium, we can see a number of consequences here in Canada: 1) a licensing fee of some kind, which hobbists presently running BBSes may or may not be able to afford; 2) a definite limit as to what is and what is not permissable to archive/disseminate/discuss on these licensed boards; 3) those not adhering to licensing, would become, in effect, 'pirate' boards, due to their non-registration, regardless of content; 4) a general homongenization of the BBS scene: the rules would be in favour of larger, more established (re: commercial) boards, killing off small hobby boards, and limiting all BBSes content. I urge all Canadians and Americans to please respond to Mr. Gerrard. Tell him from your perspective what you think the effects of regulation of our media would be. The more pressure we can place at earlier stages of policy development, the more effect we can have on any policy. Mr. Gerrard's Internet e-mail address is Gerrard.jon@istc.ca Please be polite and respectful. Coming off as boorish and juvenile will get this effort nowhere. I am also archiving any files & info that I can on the subject on my BBS, RadioCityZen, here in Montreal. All new users will have full access to all the file bases, and there are no download ratios. The files are contained in file SIG #27: CRTC & BBS licensing. Thanx for your time! Anybody with new info as things develop, please post to can.legal or alt.bbs.allsysop. ------------------------------ Date: Mon, 7 Feb 1994 09:16:08 -0500 From: gbs@PANIX.COM(Eric Braun) Subject: File 8--Pessimism in CuD (Response to Technological Disasters) The anti-hype of your "A GUIDE TO TECHNOLOGICAL DISASTERS TO COME" in CuD 6.13 is refreshing and much appreciated, but unfortunately your pessimistic future is presented as a forgone conclusion rather than a possible endpoint. Perhaps that was rhetorically necessary, but there are a couple things to keep in mind: 1) Numerous on-line commercial ventures were set up hoping to spoon feed their customers with home-shopping and entertainment services, but found that the inter-personal communication services that had been tacked on as an afterthought were what people really wanted. This paints a different picture from your gloomy one of the slobby American couch potato. 2) Changes in form can be accompanied by changes in content, in fact, the _best_ time to change the structure of content, its quality control and the incentives systems that produce it, is when form is changing as well. You might say that every political revolution is doomed to failure because "the mediums may change but the content will remain the same," but clearly this is not true. Occasionally when an old regime is overthrown the new form of government, enables an entirely new kind of nation. It is up to us to seize the day. ------------------------------ Date: Tue, 8 Feb 94 03:16:02 -0500 (EST) From: Gray Watson Subject: File 9--Response to "Technological Disasters" In Cu Digest #6.13, A GUIDE TO TECHNOLOGICAL DISASTERS TO COME, Kohntark (ktark@src4src.linet.org) says that the multimedia products of the future, like the television of the present, will contain "the usual fare of idiocy, sex and violence" and will be another way for the corporate world and the government to "spoon-feed its citizens with mindless, easy entertainment". Goodness. What cynically narrow view of the future. Might as well log off now. Before we go, let's take a second to not lose sight of the trees from the forest. New technology will give us access to information we did not have before. Period. Let's not worry about the emphasis being on the entertainment side of the coin. Talking about 500 channels and on-demand movie rental is the only way business can sell multimedia to its investors, stock holders, and to us the market. Sure, there will always be tripe entertainment -- the "People" magazine of the air-waves or fiber-lines. Why? Because there will always be those of us who read/watch it. The [entertainment] media is not to blame. You might say that they are being morally reprehensible by *serving* the junk, but you can't say they are dictating it. They are just responding to the market. We should not blame the supermarket owner who provides donuts for the obese. In the midst of all the crap -- maybe on the 475th channel -- next to the 24hr/day Harding/Bobbit station -- there is going to be something truly exciting -- truly educational. A multimedia Discovery Channel if you will. I'm not going to comment on the ease-of-use problems possibly inherent in future entertainment systems, except to point out that if they *are* too complicated, no one will buy them. This is a powerful signal to the companies that will be making the stuff, don't you think? Also, let's not point the finger at big business and government like they are some sort of *active* evil process. They are not. They both are just responding (or trying to respond) to our wants and needs -- whether voiced or not. And I'm not going to TOUCH what I think the root of our social problems are and what the warning signs Kohntark mentioned really indicate. I will say that we must continually encourage all forms of new technology -- entertainment or otherwise. Because it just may be the 500 channel, on demand, 'Geraldo' episode super-vision system that brings the $2/month, 100mb/sec digital fiber Internet line to our doorsteps. ------------------------------ Date: Tue, 8 Feb 1994 15:04:27 PST From: pamsmith%pamsmith@INFOSERV.COM(Pamela Smith) Subject: File 10--How to avoid Postal Entrapment (Re: CuD #6.11) Several issues ago, you had an article about how to avoid getting caught in a Post Office child porn trap. I found the suggestions of the writer valid, but unneccessarily risky. I am an attorney who has done some criminal defense work. There is no way most of us are going to be careful enough to not open a package that comes to us. So--you have opened a package that contains child porn, and you can feel the knock on the door coming any minute. I think you should immediately call 911 or the local equivilant. Tell the dispacher what you have, who it is from, and request that the police come get it. This does several things. The most important is that you now have a recording of your voice, telling the authorities about your horror at having recieved such dreck. Second, the locals might give the US Post Office a hard time. If you wait even an hour to call 911, then you risk the Feds picking you up, leaving you with no record of how you were really trying to take it back to the Post Office. Do not worry about whether or not the package contains material which is illegal locally. You want to be ON RECORD as not wanting the package, and you want this to happen as soon as possible. The time spent returning the package to the Post Office, or trying to get your attorney on the phone, is time the Post Office can use to execute their warrant. I know this advice might tie up an emmergency line, but you have no choice. The police do not always tape record their other calls. So make your call short, and be sure to mention the package contents, and the sender's name. Be sure your roommates who may open your packages are also told what to do. Hope this advice saves an innocent (if anyone is truely an innocent these days.) Pamela Smith, Attorney at Law ------------------------------ Date: Mon, 7 Feb 94 23:20:21 MST From: info@CSCNS.COM(CNS Information) Subject: File 11--CNS-Internet (Internet access service) CNS is an affiliation of Telephone Express, a long distance carrier. Internet service through CNS is approved for commercial purposes. CNS provides full INTERNET access through dial-in lines in Colorado Springs (719-520-1700), in Denver (303-758-2656), and through a national 800 service. CNS is connected to the Internet via a T1 (1.544 Megabyte/sec), and runs on a network of SUN SPARC 10 platforms. CNS provides dial-in, uucp, and slip services. CNS also provides dedicated 56K and T1 circuits throughout the United States. Please call our customer support at 1-800-748-1200 if you have any questions. CNS- A FULL INTERNET PROVIDER Provided at full T1 speeds are: email (mail and elm readers supported) ftp (File Transfer Protocol at 1.544 Meg/sec) telnet (Live Connection to Remote sites) newsgroups (All newsgroups, including ClariNet) irc (Internet Relay Chat- Networked Live Teleconference) 4m (A new emerging chat system) gopher (menu driven INTERNET information system) wais (Wide Area Information System) uucp (newsfeeds available) slip (newsfeeds and POP mail supported) full UNIX shell (csh, ksh, all UNIX commands, on line man pages) editors (vi, pico, and jove are supported) xwindows (supports xgopher, xmosiac, xachie, and more) Service is provided through easy-to-use menus which require no experience to use, or a full UNIX shell. BUSINESS SERVICES CNS also offers several business services, including electronic access to the COMMERCE BUSINESS DAILY, USA TODAY decision line, ClariNet news feed, and a number of services of interest to businesses local to the greater Denver and Colorado Springs area (such as city & county RFP, City, BBB, and Chamber of Commerce Press Releases, Events Calendars, SBDC Business Programs, etc). Part of the business services includes helping businesses use the Internet to their maximum benefit. CNS-BBS The CNS-INTERNET system is connected to a MajorBBS Galacticomm entertainment system. This BBS has primarily a social purpose. Access to this system is provided at no additional charge to CNS-INTERNET customers. You may also access this system through telnet (telnet bbs.cscns.com). CUSTOMER SERVICE Most importantly, CNS provides friendly and professional customer service. If you have special needs, or special information to carry, we would be delighted to customize your needs. Call customer service at 719-592-1240, or toll-free at 800-748-1200. RATES There are two plans to choose from: OPTION 1: $10 per month minimum 4.5 cents per minute for Colo Springs/Denver access 13.0 cents per minute for 800 access OPTION 2: $29.95 per month minmum 2.0 cents per minute for Colo Springs/Denver Access 13.0 cents per minute for 800 access Notice that our 800 service includes your long distance and your internet access charges for a price lower than the average long distance phone call! Local (Colo Springs or Denver) access charges are capped at $250 per month. In both options, there is a $35 one time set up fee. The first 1 Meg of disk space is free. Beyond the first 1 Meg there is a monthly fee of $2.50. Charges can be paid via credit card (Visa, Master Charge, American Express, or Discover) or by monthly invoice. The rate structure described above applies to UUCP, SLIP, or PPP connections as well with one exception: the setup fee for uucp is $45, and for slip/ppp is $75. Please write to service@cscns.com for quotes on 56K and T1 access. TO SIGN UP The following sign-up methods are available: 1) Call customer service at 1-800-748-1200. 2) Telnet to cscns.com. Log in as "new", password "newsuser". During business hours, your account is set up within 1 hour. Write to service@cscns.com or call us at 1-800-748-1200 if you have any questions! We would be delighted to help you. Important Phone Numbers: CNS-INTERNET 719-520-1700 Colorado Springs 303-758-2656 800 modem number given to subscribers only FAX 719-592-1201 VOICE 719-592-1240 SUPPORT 800-748-1200 You may write questions to service@cscns.com. Please do not hestitate to write if you have further questions. ------------------------------ End of Computer Underground Digest #6.15 ************************************