Computer underground Digest Wed Aug 30, 1995 Volume 7 : Issue 71 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson CONTENTS, #7.71 (Wed, Aug 30, 1995) File 1--Symposium on Security File 2--EFF, Mike Godwin, Cliff Stoll File 3--WebSite Wins Dvorak Award File 4--NIST Statement re "New" Crypto Policy File 5--eye on Silicon Snake Oil (eye Reprint) File 6--Russian Hackers hit Citibank (Risks-Forum Digest reprint) File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sat, 19 Aug 1995 14:39:03 +1494730 (PDT) From: Christopher Klaus Subject: File 1----Symposium on Security Network System Operating Threats from Hackers, Crackers, Sniffers "Exploring the Hostile Cyberspace" Sponsored By: NASA Lewis Research Center Information Systems Security Association Information Systems Audit & Control Association National Computer Security Association (NCSA) Cleveland Airport Marriott September 11-13, 1995 Featuring Winn Schwartau Author of "Information Warfare - Chaos on the Electronic Superhighway" Dr. Peter Tippett Keynote Address. President, National Computer Security Association Christopher Klaus Author of The Internet Security Scanner will conduct a mini-penetration workshop. and a host of public and private sector experts. Symposium Coordinator: New Dimensions International P. O. Box 897, Cardiff, CA 92007 (619) 436-5618 Fax: (619) 436-1241 Email: ndi@aol.com Agenda MONDAY 11 SEPTEMBER - THE GLOBAL THREAT TO CONFIDENTIALITY 0800 Welcome and Opening Remarks 0830 Addressing the National Problem: The Emerging Role of the CIO John Lynn, NASA Chief Information Officer 0900 Keynote Address - The Challenge to our National Computer Resources Dr. Peter Tippett, President, National Computer Security Association 1020 The Researchers Dilemma: Distributed Freedom or Controls? Deputy Director, NASA Lewis Research Center 1035 Featured Speaker - Winn Schwartau, author of "Information Warfare" 1140 Luncheon (Mr. Schwartau will autograph his book throughout the day) 1300 National Defense Perspective Ken Van Wyck, Defense Information Systems Agency (invited) 1430 The Iceberg Paradigm - Loss of Technology Pam Kotlenz, Lewis Research Center 1500 Trends, Analysis and Industry Technical Response Ron Tencati, Industry Specialist 1700 Adjourn Executive Panel: "Emerging Leadership Roles in Cyberspace " (Board Room) TUESDAY 12 SEPTEMBER - VULNERABILITIES AND TECHNO-BUSTERS 0800 Raising Awareness - Information Systems Security Association 0815 Mini-Penetration Workshop Christopher Klaus, author of the "Internet Security Scanner" 1030 Hacker Techniques; Tracking the Intruder; A Sniffer Case Study Brent Mead, Jet Propulsion Laboratory 1200 Lunch 1315 The National Information Infrastructure and NASA Incident Response (NASIRC) Richard Carr, NASA Information Technology Security Manager 1600 The Impact on Industry George Valente, Information Systems Audit & Control Association 1700 Adjourn WEDNESDAY 13 SEPTEMBER - CATCHING AND CONVICTING COMPUTER CRIMINALS 0830 Keynote Speaker "The Law Enforcement Perspective" Scott Charney, Department of Justice 1010 National Trends and Responses to Computer Crimes Richard Ress, FBI National Computer Crime Squad 1145 Lunch 1315 Investigating Computer Penetrations 1450 Panel Discussions moderated by Fred Villella, NDI 1600 Adjourn For reservations, call: New Dimensions International (619) 436-5618 Symposium Registration Fee: $345.00 SYMPOSIUM REGISTRATION FORM Please return completed form to: New Dimensions International P.O. Box 897, Cardiff, CA 92007. (619) 436-5618 or fax (619) 436-1241 Name: Title: Agency: Address: City: State: Zip: Office Phone: Fax: Hotel Requirements: YES NO Room Rate: $67/night Arrival: Departure: o This symposium draws together some of the best computer security practitioners from the public and private sectors. Experts will discuss the nature of the growing menace from computer penetrations, the serious magnitude of this threat and the potential consequences. o Actual cases will be discussed and the growing "Hacker" culture and criminal uses of hacker techniques will be described. There are emerging challenges to today's operational personnel and the leadership of tomorrow. The presentations in this symposium will provide strong justification for improved organizational response to curb losses and potentially consequential damages to operating and developmental systems. o Some of the more revealing details will describe the vulnerability of the personal computer in the privacy of our homes. We will learn how celebrated "Master Hackers" penetrate even home computers. We will discover the exponential rate of new Internet subscribers in other nations and the potential impact on our network operating systems. Upcoming Conferences: Sunnyvale, California September 19-21* Nashua, New Hampshire October 24-26* Palm Springs, California November 6-8* * Speakers will vary by location. For detailed information and list of speakers for specific locations, please contact New Dimensions International -- Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431 Internet Security Systems, Inc. "Internet Scanner lets you find 2000 Miller Court West, Norcross, GA 30071 your network security holes Web: http://iss.net/ Email: cklaus@iss.net before the hackers do." ------------------------------ Date: Sat, 19 Aug 1995 16:18:05 -0700 From: Andre Bacard Subject: File 2----EFF, Mike Godwin, Cliff Stoll *** PLEASE REDISTRIBUTE FREELY *** Hello CyberFolks, Wednesday, August 16th BayFF (Bay Area Chapter of EFF) held a meeting in San Francisco with speakers Mike Godwin and Cliff Stoll. Attached are a few notes for those of you who missed the opportunity to attend. See you in the future, Andre Bacard ====================================================================== abacard@well.com Bacard wrote "The Computer Privacy Stanford, California Handbook" [Intro by Mitchell Kapor]. http://www.well.com/user/abacard Published by Peachpit Press, (800) Enjoy your privacy... 283-9444, ISBN # 1-56609-171-3. ======================================================================= Notes from the BayFF Semi-Underground Authorized by Andre Bacard Wednesday, August 16, 1995, I found myself cruising through Golden Gate Park. Suddenly I swerved into the right lane and shouted "Eureka." For those who don't know, Eureka is the California state motto which, in the tradition of the Gold Rush, means "I found it!" In San Francisco IT means a parking place. Feeling euphoric about my good fortune, I started the short walk long on memories towards the Haight-Ashbury district. It was delightful and fogless. The salty air was cool. The smell of grass (the type that city gardener's mow) was fresh. Passing a guitarist, I thought of the Grateful Dead's Jerry Garcia, recently deceased. My mind flashed back twenty-five years ago when I first visited Haight-Ashbury. Twenty- five years ago at the dawn of the Computer Age... So many silicon chips under the bridge... I thought of all the people in the Haight mourning Garcia and donating to the Haight-Ashbury Free Clinic in Garcia's memory. I flashed back upon my first meeting with John Perry Barlow, lyricist for the Grateful Dead and co-founder of EFF. That meeting helped inspire me to write COMPUTER PRIVACY HANDBOOK. Such were a few of the images that danced through my mind as I entered the Cole & Page Street Public Library... It was appropriate to be attending an EFF meeting. John Gilmore, EFF Board Member, was the first person I saw. Gilmore reminds me of a lean Chesire cat. He has a mischievous smile as if to say, "You won't believe what just happened." Maybe we'll never discover what just happened with John, since he's so much into crypto. In any case, Gilmore introduced Mike Godwin as "The first lawyer in Cyberspace and EFF's first employee." Mike Godwin ("a cool guy who survived law school with his personality intact" according to an anonymous EFF publicist) spoke for 90 minutes about how to deal with reporters and, more specifically, about his role in trying to correct the damage done to cyberspace by TIME's infamous "CyberPorn" cover story. Godwin detailed many flaws in Carnegie Mellon University undergraduate Mr. Rimm's study of cyberporn that led to the "CyberPorn" piece. Godwin said of Rimm's paper: "It's as if you surveyed the bookstores in Times Square in Manhattan and generalized to all bookstores in America." Cliff Stoll ("a wild and crazy guy with interesting hair" according to the same anonymous EFF publicist) is the author of the best-selling book SILICON SNAKE OIL. Stoll personifies the eccentric heritage of the San Francisco counter-culture. With lots of humor and drama, Stoll presented a critical view of the Internet. "The Internet is a perfect diversion from learning" and "The Internet opens many doors that lead to empty rooms" were two of his many memorable lines. Stoll noted that wisdom and experience play little role in the Computer Cult (i.e., all the Hype surrounding the Information Superhighway). The EFF events that I've attended at WIRED's office in the San Francisco Mission District and last night are well worth the hassle of hunting down a parking place. To learn more about future monthly BayFF meetings, send this e-mail: To--listserv@eff.org Subject--[ignore] subscribe BayFF See you at future events, Andre Bacard P.S. I'm the guy with the fedora hat who people mistake for Indiana Jones. ------------------------------ Date: Mon, 21 Aug 1995 15:55:12 -0700 From: Ellen Elias Subject: File 3----WebSite Wins Dvorak Award O'REILLY & ASSOCIATES WINS PRESTIGIOUS DVORAK AWARD FOR EXCELLENCE Sebastopol, CA, August 21, 1995 -- O'Reilly & Associates' WebSite (TM) has received the prestigious 1995 John C. Dvorak Award for Excellence in PC Telecommunications, it was announced at ONE BBSCON's annual conference in Tampa, Florida on Saturday, August 19. WebSite won the award for Outstanding Web Server Software, a new category this year. More than 40,000 nominations for this year's fourteen award categories were received by internationally known writer John Dvorak and his committee. WebSite is a 32-bit World Wide Web server software package for Windows 95 and Windows NT which offers an easy-to-use, completely graphical interface, from setup through administration and Web building. WebSite was developed collaboratively by O'Reilly & Associates, independent developer Bob Denny, and a team at Enterprise Integration Technologies (EIT) headed up by Jay Weber. Tim O'Reilly, President of O'Reilly & Associates, expressed his pride in receiving the award. "In many ways, this is an award to the Internet's open systems philosophy. The driving idea behind WebSite was that the Internet has always been a peer-to-peer network. For the Web to continue that tradition, everyone who has a Web browser ought to have access to a Web server. That belief set the standards for price, availability and ease of use. What's more, the net brought together the people who developed the product, connected them during the development process, and provided the network of thousands of beta testers who validated the product." O'Reilly & Associates joins respected organizations and individuals such as NCSA Mosaic, San Jose Mercury News, Delphi, America Online, and Dennis Hayes (Hayes Microcomputer Products) which have received Dvorak awards during the past four years. Historically, these awards are presented to the individual and corporate pioneers in the telecommunications industry whose vision and commitment have most significantly contributed to the advancement of PC telecommunications over the preceding twelve months. Accepting the award for WebSite were Gina Blaber, Director of O'Reilly & Associates' Software Products Group, Robert Denny, WebSite developer, and Atul Arora, member of EIT development team. O'Reilly & Associates is recognized worldwide for its definitive books on the Internet and UNIX, and more recently for its development of online content and software. Bob Denny created Win httpd, the 16-bit server for Windows 3.1 which has been available on the net and widely praised since early 1994. EIT, long-time developer of software tools for Web server administration, also founded TERISA Systems, the leader in Web security technology, and the CommerceNet Consortium, driving deployment of Internet electronic commerce. ------------------------------ Date: Fri, 18 Aug 1995 09:52:06 -0500 From: sobel@EPIC.ORG(David L. Sobel) Subject: File 4----NIST Statement re "New" Crypto Policy EMBARGOED FOR RELEASE: NIST 95-24 3 p.m. EDT, Thursday, Aug. 17, 1995 Contact: Anne Enright Shepherd COMMERCE'S NIST ANNOUNCES (301) 975-4858 PROCESS FOR DIALOGUE ON KEY ESCROW ISSUES Furthering the Administration's commitment to defining a workable key escrow encryption strategy that would satisfy government and be acceptable to business and private users of cryptography, the Commerce Department's National Institute of Standards and Technology announced today renewed dialogue on key escrow issues. A Sept. 6-7 workshop will convene industry and government officials to discuss key escrow issues, including proposed liberalization of export control procedures for key escrow software products with key lengths up to 64 bits, which would benefit software manufacturers interested in building secure encryption products that can be used both domestically and abroad. Key escrow encryption is part of the Administration's initiative to promote the use of strong techniques to protect the privacy of data and voice transmissions by companies, government agencies and others without compromising the government's ability to carry out lawful wiretaps. In a July 1994 letter to former Rep. Maria Cantwell, Vice President Gore said that the government would work on developing exportable key escrow encryption systems that would allow escrow agents outside the government, not rely on classified algorithms, be implementable in hardware or software, and meet the needs of industry as well as law enforcement and national security. Since that time, discussions with industry have provided valuable guidance to the Administration in the development of this policy. For example, many companies are interested in using a corporate key escrow system to ensure reliable back-up access to encrypted information, and the renewed commitment should foster the development of such services. Consideration of additional implementations of key escrow comes in response to concerns expressed by software industry representatives that the Administration's key escrow policies did not provide for a software implementation of key escrow and in light of the needs of federal agencies for commercial encryption products in hardware and software to protect unclassified information on computer and data networks. Officials also announced a second workshop at which industry is invited to help develop additional Federal Information Processing Standards for key escrow encryption, specifically to include software implementations. This standards activity would provide federal government agencies with wider choices among approved key escrow encryption products using either hardware or software. Federal Information Processing Standards provide guidance to agencies of the federal government in their procurement and use of computer systems and equipment. Industry representatives and others interested in joining this standards-development effort are invited to a key escrow standards exploratory workshop on Sept. 15 in Gaithersburg, Md. This workshop is an outgrowth of last year's meetings in which government and industry officials discussed possible technical approaches to software key escrow encryption. The Escrowed Encryption Standard, a Federal Information Processing Standard for use by federal agencies and available for use by others, specifies use of a Key Escrow chip (once referred to as "Clipper chip") to provide strong encryption protection for sensitive but unclassified voice, fax and modem communications over telephone lines. Currently, this hardware-based standard is the only FIPS-approved key escrow technique. NIST officials anticipate proposing a revision to the Escrowed Encryption Standard to allow it to cover electronic data transmitted over computer networks. Under this revised federal standard, the Capstone chip and other hardware-based key escrow techniques developed for use in protecting such electronic data also will be approved for use by federal agencies. As a non-regulatory agency of the Commerce Department's Technology Administration, NIST promotes U.S. economic growth by working with industry to develop and apply technology, measurements and standards. ------------------------------ Date: Wed, 09 Aug 1995 19:25:49 -0400 From: kkc@INTERLOG.COM(K.K. Campbell) Subject: File 5----eye on Silicon Snake Oil (eye Reprint) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ eye WEEKLY July 20 1995 Toronto's arts newspaper .....free every Thursday ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ eye.NET eye.NET NETNEWS BLUES by K.K. CAMPBELL Ya read 15 megs, and whaddaya get? Another day older and deeper in debt. St Peter dontchya call me, coz I can't go... Just got 10 megs more from a bunch of assholes. -- lyrics copyright 1995 Howling (In The Wires) Wolf aka K.K. Burnett Last week, I penetrated the Eglinton Rd. event horizon and spent six days on Georgian Bay. Among many astonishing adventures, I found our dog -- a puppy we got from the River St. Humane Society in '87 -- is actually a German shepherd-otter crossbreed. What the FAQ has this to do with the net? Well, not only were there no computers up there, there weren't even phones. Even if I'd had a laptop, I couldn't have jacked into the net. I purposely only took one slim book. Cold Turkey from email and netnews... And it was glorious. Which brings us to Cliff Stoll's new book, _Silicon Snake Oil: Second Thoughts On The Information Highway_ (Doubleday, $29.95 cloth). It's a reaction to the Info Shock phenomenon typical among netters. A call to unplug, if only for a while, for a fresher perspective. Cliff lights a match to the Star-Spangled Info Highway rhetoric about democracy and "giving the homeless laptops." You might recall Stoll as author of the (now classic) non-fiction computer-espionage thriller _The Cuckoo's Egg_ -- buy it, consume it. In that '89 book, Stoll writes about snaring an unknown intruder who slid into his UNIX network at California's Lawrence Livermore research labs. A Hanover hacker netted from a University of Bremen computer to a German Datex-P network, then via satellite link to a defence contractor computer in McClean, Va., where he used a Tymnet switching system to enter Stoll's Berkeley machine, which was on the Arpanet/Milnet (U.S. military nets). He then hit maybe 400 military computers. The book pisses all over _WarGames_, that homage to the Disney-esque hacker. So after a literary hiatus -- and scads of convention appearances -- Cliff's back. And he's cranky, dammit. Stoll's out to broadside anything that twitches in cyberspace. He's collected all the hype and rebuts it relentlessly. But don't be fooled. Stoll's not really trashing cyberspace. Behind the pages of (well-deserved) jibes at (what passes for) overt net.culture, Cliff remains right on-board. Wouldn't surprise me to see him flogging IBM wares as a "net.spokesperson" in a year or three. He's never been your "typical" anything. He's sort of a leftover hippie, without the anti-tech hard-on -- an astronomer by education, hacker by inclination. His ideal weekend: staring at stars, consuming homemade cookies and shakes and sleeping beside his UNIX system. He's kinda what you'd get if Scotty were fucked up on Saurian Brandy (that blue swill) and beamed Albert Einstein, Pauly Shore and Phiber Optik aboard as a single person. In _Silicon Snake Oil_, Stoll remains unpretentiously charming. It's far more meandering and anecdotal. Travel with teenage Cliff as he spelunks. Follow an acquaintance who scoots around abandoned tracks in a little hand-built railcar. The result: a book as readable as the first, but far less important. It's more like Uncle Cliffy rocking on the cottage porch, sharing some homespun phee-los-oh-phee, whilst drawing on his pipe and scanning the lake. Not surprisingly you end up with some simplistic social theory -- like suggesting a kid's use of the net is what alienates him from his family: "Kids that interact with computers rather than their parents miss out on the most important part of growing: being close to their families." He's rather confusing cause and effect. But it's enjoyable. I finished it over a weekend. *.GENERAL HOSPITAL During lunch the following Tuesday I speed-scanned the tube. The remote came to a screeching stop. I asked myself: "Did I just see some zany-haired guy who looked like Cliff Stoll playing with a yo-yo on TV?" I threw the remote into reverse and crawled back maybe 10 channels. I answered myself: "Yes. Yes, you did. You did see some zany-haired guy who looks like Cliff Stoll playing with a yo-yo on TV." It _was_ Cliff. On CITY-TV's _LunchTelevision_. Book promo tour. The host held the book. Cliff held a yo-yo. And he was trying to make that baby sing. "Shit, Cliff," I muttered, fumbling for volume. "Are you suggesting to these yahoos that yo-yos are one of the lost pleasures human beings would rediscover if they disconnected?" Yo-yos and antics like hiding behind TV monitors aside, Cliff did make one solid point about keeping citizens docile in an Info Society: overload them. "The way to control people's thoughts is not to lock them out of information, but feed them a steady diet of dross." It's a tactic familiar to journalists: government and business bury critical data in a sea of sludge. As info is becoming "cheaper" all the time, the general public can now share the same wonderous experience by reading Usenet newsgroups -- especially unmoderated, ill-defined newsgroups. "The quality of information drops yearly -- the quantity goes up," Stoll notes. He's hardly the first to notice this. As one netter wrote me in email: "Every so often I feel this compulsion to bail on all the local newsgroups [like tor.* and ont.*] due to their somewhat soap-opera-ish nature.... However, if I did, I'd be depriving myself of a nightly chuckle. Do ya think all the local groups all over the world are as resplendant with idiots as tor.general and ont.general are? You could just subscribe to *.general, and probably have a bigger laugh than any of the alt.* groups." So listen to Uncle Cliff. Unsubscribe from wanker.general! Put down that 2,700-page _Holy Precepts of UNIX Technobabble Revealed, 3rd Initiate_! Get out yer yo-yos! http://www.interlog.com/eye ------------------------------ Date: Thu, 22 Aug 1995 22:51:01 EDT From: CuD Moderators Subject: File 6----Russian Hackers hit Citibank (Risks-Forum Digest reprint) Date--Mon, 21 Aug 95 7:51:22 PDT From--"Peter G. Neumann" Subject--Russian Hackers From - Risks-Forum Digest Monday 21 August 1995 Volume 17 : Issue 28 Court documents were unsealed on 18 Aug 1995 that implicated Russian computer hackers in about 40 transfers totalling more than $10 million from the Citibank electronic funds transfer system, between June and October, 1994. The hackers were caught as they were trying to move $2.8M. The bank indicated only $400,000 was actually transferred -- which at first reading would seem to contradict the $10 million figure, except for the fact that Citibank noted that none of its clients lost any money, and that all of the transfers were either blocked or reversed. Six people have been arrested. 24-year-old Vladimir Levin (who worked for AOSaturn, a Russian software house, and who is currently under arrest in London) apparently had figured out how to get around or through the Citibank security system. [Source: An Associated Press item in the San Francisco Chronicle, 19 Aug 1995, D1.] Sounds like another case of reusable (fixed) passwords biting the dust? [Christopher Klaus added the following info, based on a report of Voice of America correspondent Breck Ardery: The other five include two people in the U.S., two in The Netherlands, and one in Israel. PGN] ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators Subject: File 7----Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.71 ************************************