Previous Next Index Thread

Cu Digest, #7.98

Computer underground Digest    Wed  Dec 20, 1998   Volume 7 : Issue 98
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #7.98 (Wed, Dec 20, 1998)

File 1--CuD of for Holidays -- Back around January 3
File 2--REMINDER - CuD is Changing Servers - RESUBS ARE NECESSARY
File 3--Reconfiguring Power, Challenges for the 21st century
File 4--DC-ISOC Meeting - 1/18/95
File 5--AP/WP/NYT: Online Smut and Bogus Net Stats
File 6--Employees Disciplined for accessing Internet "porn"
File 7--OPEN LETTER TO NEWT GINGRICH
File 8--New authorization to put all people in a secret file...
File 9--PRIVACY WATCHDOG OUTS BIG BROTHER...
File 10--     Computer, Freedom and Privacy 1996
File 11--"The Underground Guide to Computer Security" by Alexander
File 12--SotMESC Information
File 13--Cu Digest Header Info (unchanged since 16 Dec, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 20 Dec, 1995 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 1--CuD of for Holidays -- Back around January 3

CuD will be taking two weeks off. We will return about Jan 3 with
Volume 8.

We will continue to read and respond to mail.

Happy Holidays, and thanks to everybody who has contributed
posts, advice, criticisms, and information over the past
year.

Jim Thomas and Gordon Meyer

------------------------------

Date: Sun, 16 Dec, 1995 16:19:32 CST
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: 2--REMINDER - CuD is Changing Servers - RESUBS ARE NECESSARY

                   ** CuD IS CHANGING SERVERS **

In about mid-January, Cu Digest will be moving to a new server
at weber.ucsd.edu. We're following the strong consensus of
readers and requiring that, to continue to receive CuD after
mid-January, you must RE-SUBSCRIBE.

Although the move will not take place for a few weeks, you can enter
your subscribtion before then, so WE STRONGLY URGE YOU TO SUB NOW.

Re-subbing is easy. Just send a message with this in the
   "Subject:" line
           SUBSCRIBE CU-DIGEST

send it to:

   cu-digest-request@weber.ucsd.edu

Issues will still be sent out from the older server for a few weeks,
so the strategy is to collect the resubs first, and then make the
transition.

If you prefer to access CuD from Usenet, use
    comp.society.cu-digest

If you prefer archives, you can use the ftp/www site at
ftp.eff.org (or www.eff.org) or the CuD archives at:
http://www.soci.niu.edu/~cudigest.

We also hope to have a mail archive set up soon as well.

You can still contact the moderators at:
        cudigest@sun.soci.niu.edu
or      tk0jut2@mvs.cso.niu.edu

Please *DO NOT* send inquiries to the server at UIUC.

Jim and Gordon

------------------------------

Date: Mon, 13 Nov 1995 12:08:05 -0800
From: Gilberto Arriaza <arriaza@UCLINK2.BERKELEY.EDU>
Subject: 3--Reconfiguring Power, Challenges for the 21st century

Dear colleagues:  Here is a Call for Papers you might be interested.
Gilberto Arriaza.  School of Education, UC Berkeley


                                Journal of Social Justice

Reconfiguring Power, Challenges for the 21st century
Recent backlash against immigrants and affirmative action can be seen as
part of a larger struggle over resources, national identity, and more
generally (re)configurations of power in the United States in the twenty
first century.  Demographic trends continue to point to greater diversity
in the U.S. population, however there is growing resistance to the
adjustments which  must be made in society generally, and in the
workplace and social institutions (i.e. education, the arts, political
parties) in particular, to accommodate those who have historically and
who are presently excluded.  Already the debates which have emerged over
these issues differ in several important ways from the manifestations of
social conflict and polarization that occurred in the latter part of the
twentieth century.

This issue of the Journal of Social Justice is dedicated to exploring the
contours and substance of these new struggles.  In addition to
documenting how these conflicts are being played out in particular social
and cultural contexts, contributors will analyze the underlying social
and cultural forces and interests which influence how issues are viewed,
and how social action and discourse are affected.  Beyond analyzing the
content and character of those conflicts, contributors are encouraged to
illuminate possibilities of influencing how they can be resolved such
that greater social justice is achieved.

Topics for this issue may include::
Issues of immigration, cultural identity and the nation state.
Dismantling of the welfare state, social implications.
Schools and the meaning of citizenship, national identity and cultures,
and the access to power.
Obstacles to Gay, Lesbian and bisexual rights.
Crime, violence and social policy.
Language, language rights and the dynamics of power.
Gender equity, reproductive rights.
Local impact of macro level economic and political change.
Racial and ethnic conflict.

Review: Each submission will be read by a committee of two members.  In
case a  disagreement among them arises,  the editors will call for the
opinion of a third member..

Format:  Submit three hard copies of a 12 size font, double spaced of no
more than thirty 8 X 11.5 pages.  This includes  references.  Each paper
must have an abstract of no more than one, double space, 8 X 11.5 page.
On a separate card  of 3 X 5 (approximately) include title, your name,
affiliation, local address, telephone numbers, fax and electronic mail,
to contact you.

Deadline: Submission must be in our office by Monday, May 6th, 1996.  No
contributions will be accepted after this date.  The accepted papers will
be part of  a panel for AERA '97.

Address: c/o Professor Pedro  Noguera
        University of California at Berkeley
        School of Education
        Social and Cultural Studies
        4501 Tolman Hall
        Berkeley, 94720

------------------------------

Date: Mon, 11 Dec 1995 01:26:25 -0500 (EST)
From: russ@NAVIGATORS.COM(Russ Haynal)
Subject: 4--DC-ISOC Meeting - 1/18/95

The Washington DC Chapter of the Internet Society (DC-ISOC)
announces its next event, co-sponsored by the Office of the Senior
Information Officer of the Smithsonian Institution.

 "New Year, Fresh Look: The Internet and Legislation"

        When:   Thursday, January 18, 1996
                7:00 - 9:00 pm

        Where:  Eugene and Agnes E. Meyer Auditorium
                Freer Gallery of Art
                Independence Ave and 12 St., S.W.
                Washington, D.C.

As the title suggests, this meeting will discuss how the Internet and
Legislation will continue to "Interact"    Please mark this date on your
calendar.
A follow-up meeting announcement with additional details (speakers, topics,
etc.) will be made in January.

On a related note: As you may have heard, on Wednesday December 6, 1995,
the House Conference Committee on Telecommunications Reform approved
legislation which has been a topic of debate throughout the Internet.

Several organizations are sponsoring "A NATIONAL INTERNET DAY OF PROTEST"
on Tuesday, December 12.  Rather than re-distribute that announcement in
this forum, anyone interested in this protest, or the details of the
legislation can visit several web sites such as:

        Voters Telecommunications Watch (http://www.vtw.org/)
        Electronic Frontier Foundation (http://www.eff.org/)

-------------- Meeting Location Information ---------------------------

This event will be held in the Freer Gallery of Art in Washington, D.C., e
northeast corner of Independence Avenue and 12th St., SW. Use the entrance
on the Independence Avenue side of the building (there is a street-level
wheelchair entrance as well).

Metro:
Smithsonian metro stop on the Blue or Orange lines.
Take the Independence Ave./Holocaust museum exit.  The
Freer Gallery is diagonally across the street.

Street parking is available after 6:30 pm on the Mall,
on Independence Avenue and on l'Enfant Promenade.

---------------------- About DC-ISOC ---------------------------

DC-ISOC was formed to meet unique needs of Washington, DC-area Internet
planners, builders, and users, and to help represent the Internet  to the
U.S. government.  (For additional information visit:
http://www.dcisoc.org/about.html)

Individuals who are interested in becoming members of DC-ISOC can do so by
joining the Internet Society.  See their web site at http://www.isoc.org
(or call 703-648-9888) for more information

Feel free to forward this announcement to anyone who might be interested.
If you would like to receive future DC-ISOC announcements directly (i.e.
this message was forwarded to you), please register with DC-ISOC at
http://www.dcisoc.org/register.html
--------------------------------------------------------------------------

Our last several meetings have included "door prizes" for attendees.
Please contact me if your organization would like to donate any
Internet-related items for the meeting.




______________________________________________________________
Russ Haynal - Internet Consultant, Instructor, Author, Speaker
"Helping organizations gain the most benefit from the Internet"
E-Mail: russ@navigators.com             Business: 703-729-1757
              http://www.clark.net/pub/rhaynal

------------------------------

Date: Mon, 18 Dec 1995 18:31:01 -0500 (EST)
From: "Declan B. McCullagh" <declan+@CMU.EDU>
Subject: 5--AP/WP/NYT: Online Smut and Bogus Net Stats

December 15, 1995

        RICHLAND, Wash. (AP) -- Nearly 100 employees at a federally
funded laboratory are being disciplined for using their work
computers to access sexually explicit Internet sites, officials
said Friday.
        Pacific Northwest National Laboratory suspended the 21 workers
who used the sites most frequently. Another 77 workers will receive
written reprimands...
        The usage was discovered when Battelle Memorial Institute, which
operates the lab, was trying to determine its Internet capacity for
a new building. The sexually explicit addresses showed up on
Internet records.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

December 15, 1995

        HARTFORD, Conn. (AP) -- A city man has pleaded guilty to a
federal child pornography charge involving pictures transmitted on
the American Online service.
        David H. Gillon, 43, pleaded guilty to interstate distribution
of child pornography in U.S. District Court on Thursday. He
admitted to transmitting a pornographic picture over America Online
in August.

  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

   New York Times [Forwarded]
   December 18, 1995

   "The prospect of Internet censorship raises troubling
   issues for business." Denise Caruso's column.

      While most of the outcry has raised valid concerns about
      the First Amendment and civil liberties, little of the
      discussion has focused on how censorship could cripple
      much of the Internet's commercial potential. "This
      proposal will have more than a chilling effect," Ms.
      Fulton said. "It may well mean a cold death for everyone
      except very rich and very cautious media companies."

  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The Washington Post
December 18, 1995
Editorial

How Many Netheads?

   IT SOUNDS like a minor statistical dispute, but one whose results take
   on more significance as claims and counterclaims proliferate about the
   Internet and its importance. How many people are actually signing on?
   A survey done for the Nielsen Co. earlier this fall found surprisingly
   high numbers of net and e-mail users -- about 24 million "affluent"
   adult users in the United States and Canada alone. But one of that
   survey's academic advisers says the data were processed wrongly, and
   the number should be more like 10 million. It seems that serious and
   habitual Internet use will remain a difficult activity to track with
   any certainty.

   Vanderbilt University business Prof. Donna L. Hoffman says the
   surveyors made some statistical miscalls in characterizing the
   technical comfort level of the people who were asked to answer
   questions about their Internet use. Thus, she argued in criticism
   first reported in the New York Times, those less likely to use or own
   computers ended up dropping out of the sample, skewing the attempts to
   generalize to the larger population. But the mathematical arguments
   here are less interesting than the chasm they point to in discussions
   of the Internet generally. The distance between life as it looks to
   users "on-line" and life as it looks elsewhere is hard to measure and
   in some cases hard to see.

   You could see this gap, for instance, in the efforts Internet users
   have made in recent weeks to express their opposition to the
   restrictive Exon provisions concerning pornography in cyberspace. A
   much-touted "day of protest" on-line could cause a Net denizen to
   believe that the entire sentient world was rocked by storms of
   outrage, while those who don't habitually sign on or don't know how to
   do so -- including, in all likelihood, many lawmakers -- could be
   unaware of the outcry. Reports have multiplied of the initial
   fascination and obsessive focus that the possibilities of on-screen
   contact produce in so-called "newbies," not to mention the tendency of
   some habitual net-users to refer dismissively to everything outside
   the screen as mere "RL," or Real Life.

   Most predictions of the Internet's usefulness and importance rely on
   the assumption -- again borne out in most accounts -- that this
   initial intensity wanes for most users and that e-mail, the World Wide
   Web and other Internet functions will end up as a broad, everyday tool
   rather than the province of an insular or obsessive subculture. That
   era of wide and ordinary usage, though, may creep up and be hard to
   measure until it has truly arrived.

------------------------------

From: hsu@VA.PUBNIX.COM(Dave Hsu)
Date: Tue, 19 Dec 1995 18:26:17 -0500
Subject: 6--Employees Disciplined for accessing Internet "porn"

In Cu-D 7.97, galkin@aol.com notes:
>Rather than trying to define the right to privacy at this point, it is better
>to look at some  circumstances where such a right might arise:
...
>(2) Where government agencies or private entities are lawfully collecting
>personal data, but more data is collected than is needed to accomplish the
>purpose of  the data collection. The collection of this excess data might
>amount to an invasion of privacy, even though the data is never misused.

Not having seen any mention of this yet in the Digest (and
understanding the caveat that not all discussions so float up) I bring
to your attention a story buried in the "A" section of Sunday's
Washington Post on a recent disciplinary action at Pacific Northwest
Laboratories taken against several dozen employees accused of using
government resources to visit "pornographic" sites.

As the story was rather brief, I'll sum up to say that Battelle, which
operates the laboratories, claims to have been measuring Internet
usage at the facility to estimate new capacity requirements for some
new space when they found these accesses in their logs.  Presumably,
their investigation was comprehensive, as the Post article mentions
that the twenty or so biggest users were singled out for additional
action.  Ignoring the ethical question of misappropriating their
employer's resources, which I believe is not in dispute, I ask if
anyone has seen a report with more detail about the accounting methods
used, and the ethical problems with selective these particular
employees apparently solely on the basis of the _content_ of the sites
visited.

[As I am not a list member, I will watch the Digest for any ensuing
discussion]

------------------------------

Date: Sun, 17 Dec 1995 20:38:38 -0800
From: Michael Hollomon, Jr. <mhollomo@ix.netcom.com>
Subject: 7--OPEN LETTER TO NEWT GINGRICH

OPEN LETTER TO NEWT GINGRICH, SPEAKER OF THE HOUSE:

Dear Mr. Speaker:

I know that congress is currently debating legislation aimed at protecting
children from pornography on the Internet.  I feel it my duty as an American
to make my views known to someone who is in a position to have an impact on
this potentially far-reaching issue.

First of all I would like to make it clear to you that I am _not_ a
pornographer.  I neither produce nor nor indulge in the use of pornography.
In fact, if it is relevant to the issue at all, I am a Bible believing
Christian who feels that pornography is detrimental not only to America's
children, but also to the men who choose consume it. I think it would be a
wonderful thing to be able to insure that my children are not exposed to
obscene or pornographic material, by computer or by any other means.

However, I cannot lend support to any of the legislation currently being
considered by Congress to censor communication on the Internet, obscene or
otherwise.  I will forewarn you that this correspondence is going to be
rather lengthy, but I beg your indulgence and I hope that you will take time
from your busy schedule to hear me out.

By way of a very brief history, the Internet is the first ever
communications technology created by "the people" for "the people."  It's
structure and protocols were created and implemented by diverse groups of
people for the purpose of sharing materials and resources and making
information freely available to other persons on the inter network.  It is
the result of one of the rare _truly_ democratic dynamics ever encountered
on such a large scale.

There has never been any form of centralized control over the Internet.  The
policing of the Internet has always been carried out by local systems
administrators ("sysadmins").  However this "police power" was exercised by
the sysadmin only over her/his own local system.  No one sysadmin had the
authority to monitor content or activity on any system on the Internet, save
her/his own.  Admittedly, the Internet has a rather anarchic structure, but
it is one that has worked quite well and, in the absence of any centralized
regulation whatsoever, the Internet has grown to the incredibly useful,
informative and entertaining concentration of digital information and
resources that it is today.

As is to be expected with any frontier devoid of a central governing and
police authority, there have arisen some areas on the Internet that are not
suitable for children.  In fact, it could easily be argued that these
"places" on the 'net are not suitable for responsible _adults_.  While
pornography on the Internet is the topic which gets most of the press, and
therefore public attention, there are several other types of information
available on the 'net which many Americans would find offensive.  Examples
include inflammatory speech by members or aficionados of this or that hate
group, and information of a more palpably dangerous ilk (i.e., how to build
explosives and other weaponry).

Should any of this type of information be accessible to our children?  The
answer is an obvious "no."  Should this information be accessed by
consenting adults?  Perhaps not.  But then more than a few "reasonable"
adults would argue, quite persuasively, that they should be entitled to
access any public information that they choose.  My point is simply that I
heartily agree with anyone who takes the position that our children should
be shielded from such unsavory material.

Why then do I not support the currently proposed legislation to censor this
type of material on the Internet?  My reasons are several:

1.  NOT EVERYONE ON THE INTERNET IS SUBJECT TO U.S. LAW

As you and your colleagues no doubt realize, the Internet is a truly global
phenomenon.  People access the Internet from over a hundred different
nations and from virtually every continent around the world.  U.S.
legislation to censor the Internet would be equivalent to Canadian
legislation regulating what I as an American can and cannot say in an
international telephone call from the U.S. to someone in Canada, or even in
a telephone call from California to Alaska that happened to use lines which
cross Canadian territory.  Stated simply, there would be a very sticky
problem of personal jurisdiction in attempting to enforce such legislation
upon a foreign violator.

How can the U.S. prevent someone in Finland from posting a pornographic
picture to any given Usenet newsgroup?  The simple truth is that, no matter
how repulsive the post may be to our sensibilities, there is simply _no_
workable way to prevent foreigners from posting offensive material to the
international Internet.  And, once material is posted, wherever from, there
is nothing to prevent anyone in the U.S., child or adult, who has Internet
access from accessing that material.  It has often been stated that the
Internet interprets censorship as damage and routes around it.  This
resilience to blockage was intentionally built into the Internet by its
early U.S. military-backed developers.  The idea was to develop a
communications technology that would be virtually impervious to a large
scale nuclear strike.  This fact may be contemporarily seen as unfortunate,
but the fact nonetheless remains.

2.  WIDESPREAD FLOUTING OF UNENFORCEABLE LAW WILL ENGENDER DISRESPECT FOR
    THE LAW

Because of the unenforceability of censorship legislation on foreign
violators, any such legislation will have little or no effect on the type of
information contained on the Internet.  The only real change that such
legislation might have would be that offensive material would only be, or
appear to be, posted from foreign sources.  Law abiding Americans wouldn't
post illegal material.  But there would be nothing preventing Americans from
accessing illegal material posted by foreigners.

For this reason, any U.S. legislation which attempts to regulate the content
of the Internet will have an inherent loop-hole in it large enough "to drive
a truck through."  A loop-hole so large, in fact, as to subsume the
underlying legislation.  The routine disobedience (or technical avoidance)
of such legislation would result in our children being no more shielded from
harmful material than they would be in the absence of any such legislation.
This would no doubt lead to the kind of disregard and disrespect for
legislation (and legislators) which followed the advent of the prohibition
of alcohol in this country (legislation that ultimately the government had
to concede was completely unworkable).  Do we really need an "information
prohibition?"  If it passes, do you want to be responsible for it?

3.  UNREASONABLE "CHILL" ON PROTECTED SPEECH

Even assuming that it was possible to legislatively control content
available on the Internet (which I firmly believe it is not), at what cost
would such control come?  For fear of subjecting themselves to criminal
liability for the offending posts of their members or customers, every
sysadmin, BBS system operator ("sysop"), online service and Internet service
provider, would have to become a de facto police agent, thoroughly
inspecting every piece of email or other electronic correspondence made.
This would effectively mean the end of any semblance of digital privacy for
law abiding Americans on the 'net.

There are of course myriad ways to avoid such eavesdropping (i.e. strong
encryption, foreign anonymous remailers and the like), however in order for
censoring legislation to have any meaning whatsoever I would assume that the
legislature would outlaw these measures as well.  Then only criminals would
be able to enjoy private electronic communications in America.  (The gun
control slogan comes to mind: "Make it a crime to own a gun and only the
criminals will have guns.")

The Federal courts have routinely struck down laws as unconstitutional where
the legislation's regulation of unprotected speech affects an unreasonable
"chill" on constitutionally protected free speech.  Knowing that _every_
electronic communication that I send will be read by any number of
intervening systems administrators will without doubt make me much more
circumspect about my electronic communications.  No longer would I feel free
to discuss matters of any personal nature, much less matters concerning
confidential business information.  In fact _every_ electronic communication
would have to be considered by the sender as an open letter to the public.
To describe such a scenario as having a chill upon free speech would, I
think, be a definite understatement.

4.  THE U.S. MAY WELL FORFEIT ITS ENVIABLE POSITION IN THE FOREFRONT OF
    THE INFORMATION REVOLUTION

The Internet was originated in America by Americans.  The present Internet
is a direct legatee of the ARPAnet developed in the U.S. by the Advanced
Research Projects Agency.  *Almost 3/4 of all Internet hosts today are
located in North America (the _great_ majority of those are certainly in the
U.S.). Many of the technological and social innovations which make the
Internet the phenomenal success that it is were implemented by American free
thinkers who were allowed to think freely with few, if any, constraints upon
their ideas save the effectiveness of the ideas themselves.  The greatest
financial beneficiaries of the success of the Internet to date have been
U.S. companies providing Internet access, advertising and/or doing business
on the Internet.

Once Congress starts imposing legislative restrictions on electronic
information, the only people which will be hindered by those restrictions
will be citizens of the U.S.  This will leave citizens of foreign countries
in potentially advantageous competitive positions to U.S. citizens.  The
U.S. just might go from being the country to emulate in information
technology to being the country to surpass.  Granted, such results are not
likely solely from a single piece of obscenity legislation.  But one bad
law, more times than not, leads to another.  It may only take a single
ill-advised law to start our esteemed Congress on such a precarious trend.


Having said all of the foregoing, are there any workable solutions to
protecting children from offensive material over the Internet?  In fact,
there are.  At this point, let me state my position that, among the several
responsibilities that come with being a parent, is the responsibility to
monitor the materials and information accessible to your children.  The
information available to children should, without question, be regulated.
That regulation, however, should be performed by parents and guardians,
_not_ by Congress.  I realize that there are many "computer illiterate"
parents who have technologically knowledgeable children.  However, there is
help even for these parents in regulating what their children experience online.

Most of the major online services have restrictions of some sort on the
seamier sites available on the internet and/or other safeguards which allow
parents to control the types of material which their children can access
online.  In addition, there are other resources, apart from the major
commercial online services, which assist parents in this regard.  There are
software and commercial services which inform parents of unsuitable
materials available on the Internet and assist parents with Internet
accounts in restricting unauthorized access to those areas by their children.

Of course, there will always be those parents who are intimidated by the
technology, or simply don't want to take the time to understand it.  These
parents will certainly sleep a little easier knowing that Congress is
stepping in and attempting to protect their children from obscene material.
These people, in my opinion, are inexcusably lazy parents who, if they are
not going to monitor their children's online communications, should _not_
permit their children to go online.

In closing, I would strongly urge that you and the other members of Congress
look closely into the several available alternative options of regulating
online materials available to children, as Internet censorship simply will
not work.  Thank you for your time.



*Wired magazine, issue 3.12, page 70.

------------------------------

Date: 21 Nov 1995 08:49:06 GMT
From: JeanBernard Condat <JeanBernard_Condat@eMail.FranceNet.fr>
Subject: 8--New authorization to put all people in a secret file...

New official authorisation to put all people in a secret file...

November 16th, 1995: In middle of the strike period in France, the
Ministry of the Army publish a text dated November 9th giving the
authorisation to the Army to put all available data in local files
for future uses.  The available data mind political, philosophical,
religion... opinions of a person called "terrorist" or "victim of a
terrorist."  :-|]

After some hard reactions of certain kinds of persons in France, the
French Governmement announce Decembre 16th the complete suppression
of this text. Note that the CNIL (Commission Nationale Infortique et
Libertes) formed to look at abusive use of laws... have given a
positive authorisation to publish the following text...

UNCREDIBLE !

> Decret n%95-1211 du 9 novembre 1995 portant application des dispositions
> de l'article 31 de la loi n%78-17 du 6 janvier 1978 aux fichiers mis en
oeuvre
> par la direction generale de la gendarmerie nationale.
>
> Le Premier Ministre,
> Sur le rapport du ministre de la defense,
>
> (...)
>
> Vu l'avis conforme de la Commission nationale de l'informatique et des
libertes
> en date du 25 avril 1995 ;
> Le Conseil d'Etat (Section des finances) entendu,
>
> Decrete :
>
> Art. 1er. - Pour l'exercice de sa mission, la gendarmerie nationale est
autorisee a
> collecter, conserver et traiter, dans les fichiers regionaux, les
informations nominatives
> qui, etant relatives aux personnes majeures enumerees a l'alinea ci-apres,
> mentionnent les signes physiques particuliers, objectifs et inalterables
comme
> elements de signalement, ou font apparaitre, directement ou indirectement,
les opinions
> politiques, philosophiques ou religieuses ainsi que les appartenances
syndicales de ces
> personnes.
>
>La collecte, la conservation et le traitement des informations enoncees a
l'alinea precedent
> ne peuvent concerner que :
>
> 1-- Les personnes qui peuvent, en raison de leur activite individuelle et
collective, porter
> atteinte a la surete de l'Etat ou a la securite publique par le recours ou
le soutien actif
> apporte a des actes de terrorisme definis aux articles 421-1 et 421-2 du
Code Penal ;
>
> 2-- Celles qui entretiennent ou sont entretenu avec elles des relations
durables et non fortuites ;
>
> 3-- Les personnes qui sont victimes d'actes de terrorisme ou paraissent
etre particulierement
> exposees a de tels actes.
>
> (...)
> Fait a Paris, le 9 novembre 1995
>
> Par le Premier Ministre                               ALAIN JUPPE
>
> Le ministre de la defense,

>    CHARLES MILLON

------------------------------

Date: 4 Dec 1995 10:33:51 -0500
From: "Dave Banisar" <banisar@EPIC.ORG>
Subject: 9--PRIVACY WATCHDOG OUTS BIG BROTHER...

MEDIA RELEASE

Contact: Simon Davies, Privacy International
Davies@privint.demon.co.uk

PRIVACY WATCHDOG OUTS BIG BROTHER COMPANIES

New report uncovers a massive international surveillance trade
funded by the arms industry and led by the UK

On Monday 4 December, Privacy International will publish Big
Brother Incorporated, a 150 page report which investigates the
global trade in repressive surveillance technologies. The report, to
be published on several Web sites on the Internet,  shows how
technology companies in Europe and North America provide the
surveillance infrastructure for the secret police and military
authorities in such countries as China, Indonesia, Nigeria, Angola,
Rwanda and Guatemala

The reports primary concern is the flow of sophisticated
computer-based technology from developed countries to
developing countries  - and particularly to non-democratic regimes.
The report demonstrates how these companies have strengthened
the lethal authority of the world's most dangerous regimes.

The report lists the companies, their directors, products and exports.
In each case, source material is meticulously cited.
Privacy International is publishing the report in digital form in
several sites on the Internet to ensure its accessability by interested
parties anywhere in the world.

Surveillance technologies are defined as technologies which can
monitor, track and assess the movements, activities and
communications of individuals.  More than 80 British companies are
involved, making the UK the world leader in this field. Other
countries, in order of significance, are the United States, France,
Israel, the Netherlands and Germany.

_Big Brother Incorporated_ is the first investigation ever conducted
into this trade.  Privacy International intends to update the report
from time to time using trade fair documents and leaked information
from whistleblowers.

The surveillance trade is almost indistinguishable from the arms
trade. More than seventy per cent of companies manufacturing and
exporting surveillance technology also export arms, chemical
weapons, or military hardware.  Surveillance is a crucial element
for the maintenance of any  non-democratic infrastructure, and is an
important activity in the pursuit of intelligence and political control.
Many countries in transition to democracy also rely heavily on
surveillance to satisfy the demands of police and military. The
technology described in the report makes possible mass
surveillance of populations.  In the past, regimes relied on targeted
surveillance.

Much of this technology is used to track the activities of dissidents,
human rights activists, journalists, student leaders, minorities, trade
union leaders, and political opponents. It is also useful for
monitoring larger sectors of the population. With this technology,
the financial transactions, communications activity and geographic
movements of millions of people can be captured, analysed and
transmitted cheaply and efficiently.

Western surveillance technology is providing invaluable support to
military and totalitarian authorities throughout the world.  One
British computer firm provided the technological infrastructure to
establish the South African automated Passbook system, upon
which much of the functioning of the Apartheid regime  British
surveillance cameras were used in Tianamen Square against the
pro-democracy demonstrators.  In the 1980s,  an Israeli company
developed and exported the technology for the computerised death
list used by the Guatemalan police. Two British companies
routinely provide the Chinese authorities with bugging equipment
and telephone tapping devices.

        Privacy International was formed in 1990 as a non-government, non-profit
organisation.  It brings together privacy experts, human rights advocates and
technology experts in more than 40 countries, and works toward the goal of
promoting privacy issues worldwide.  The organisation acts as an impartial
watchdog
on surveillance activities by governments and corporations.

For further information or interview, contact Simon
Davies in London at davies@privint.demon.co.uk.  The address of the web
site is  http://www.privacy.org/pi/reports/big_bro/

------------------------------

Date:         Wed, 13 Dec 1995 00:32:02 -0600
From:         Stephen Smith <libertas@COMP.UARK.EDU>
Subject: 10--     Computer, Freedom and Privacy 1996

               ****************************************
                      Please redistribute widely
               ****************************************

The Sixth Conference on Computers, Freedom, and Privacy will take
place at the Massachusetts Institute of Technology on March 27-30,
1996.  CFP96 is hosted by MIT and by the World Wide Web Consortium.

You can register for CFP96 by US Mail, by fax, or via the World Wide
Web.

Conference attendance will be limited.  Due to the enormous public
interest in CFP issues over the past year, we encourage you to
register early.

SPECIAL NOTE TO STUDENTS: There are a limited number of places
available at a special student rate.  These will be allotted on a
first-come first-served basis, so register as soon as possible.

For more information, see the CFP96 Web page at

                       http://web.mit.edu/cfp96

or send a blank email message to

                          cfp96-info@mit.edu

Since its inception in 1991, the series of CFP conferences has brought
together experts and advocates from the fields of computer science,
law, business, public policy, law enforcement, government, and many
other areas to explore how computer and telecommunications
technologies are affecting freedom and privacy.

Events planned for this year's conference include:

    - Federal prosecutors square off against civil-liberties lawyers
      in a mock Supreme Court test of the "Cryptography Control Act of
      1996", which criminalizes non-escrowed encryption.

    - Authors Pat Cadigan, Tom Maddox, Bruce Sterling,
      and Vernor Vinge divine the future of privacy.

    - College administrators, students, lawyers, and journalists
      role-play scenarios that plumb the limits of on-line expression
      on campus networks.

    - Panels on international issues in privacy and encryption; on the
      struggle to control controversial content on the Internet; on
      tensions between copyright of digital information and freedom of
      expression; on threats posed by electronic money to law
      enforcement, privacy, and freedom; on mass communication versus
      mass media.

------------------------------

Date: Thu, 14 Dec 1995 11:45:36 EST
From: "Rob Slade, the doting grandpa of Ryan Hoff"
Subject: 11--"The Underground Guide to Computer Security" by Alexander

BKUNCMSC.RVW   951129

"The Underground Guide to Computer Security", Michael Alexander, 1996, 0-201-
48918-X, U$19.95/C$27.00
%A   Michael Alexander
%C   1 Jacob Way, Reading, MA   01867-9984
%D   1996
%G   0-201-48918-X
%I   Addison-Wesley Publishing Co.
%O   U$19.95/C$27.00 416-447-5101 fax: 416-443-0948 markj@aw.com
%O   bkexpress@aw.com 800-822-6339 617-944-3700 Fax: (617) 944-7273
%P   239
%T   "The Underground Guide to Computer Security"


This book is intended to address the security needs of personal (or
desktop) computers, and is one of the few that does.  The content
addresses those vulnerabilities which *do* plague workstations, and
is generally free of "big iron" paranoia and concerns.

Alexander's style is a bit flippant, but not at the expense of the
information being conveyed.  The organization is a trifle odd.  (The
first half of the "Safe Desktops and Laptops" chapter deals
exclusively with passwords, even though few standalone machines use
them.  Password generators and challenge/response systems, however,
are covered in the chapter on networks.) Technical details and
specific suggestions do have a number of errors, particularly when
dealing with MS-DOS.  For those in the know, the chapter on viruses
has some oddities, but nothing that would be dangerous to the user.

Data security is a tedious and often confusing field.  This book is
only a start, but could be quite helpful to the non-specialist.

copyright Robert M. Slade, 1995   BKUNCMSC.RVW   951129

------------------------------

Date: Wed, 20 Dec 1995 15:30:02 -0600
From: Frosty  <sotmesc@DATASYNC.COM>
Subject: 12--SotMESC Information

     The SotMESC is a Non-Profit organization founded in 1989 to
secure the freedom and privacy of computers and the networks they
reside upon.  We (the SotMESC) publish a monthly newsletter to our
members detailing information about applications and news occuring
within our realm and provide educational services to the public for
free to increase the awareness of the computing realm.  We also
provide a scholarship program to promote understanding of computing
and the cultures that reside upon them in the hopes of advancing the
potential of society in education.  We provide funding as a legal
defense for those in need that are taking positions that complement
our position in the computing fields.  In the interest of promoting
equal technological benefits to those that are poor, we have relocated
computing systems that were discarded or donated to us into usable
systems and given to potential business leaders and scholaries of low
financial livings.  We are also the only organization to promote the
'Hacking for Humanity' award, given each year in various fields to
those persons displaying exemplary work to promote the computing
fields and networks in the name of mankind without formal corporate or
organizational roots.


     If there are any details you would like to learn more about,
please feel free to get in touch and ask us.

                 Frosty, aka R.E.Jones, ilKhan of the SotMESC
                     http://www.datasync.com/sotmesc/gcms

------------------------------

Date: Sun, 16 Dec 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: 13--Cu Digest Header Info (unchanged since 16 Dec, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.98  - END OF VOLUME 7
************************************