Computer underground Digest    Sun  Apr 20, 1997   Volume 9 : Issue 31
                          ISSN  1004-042X

      Editor: Jim Thomas ([email protected])
      News Editor: Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Field Agent Extraordinaire:   David Smith
      Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.31 (Sun, Apr 20, 1997)

File 1--XT clone for donation or sale (Sun Devil Redux)
File 2--ACLU Cyber-Liberties Update
File 3--Technology and Society (from NETFUTURE #45)
File 4--Texas ISPs Targed in Secessionist Case
File 5--Crack DES Challenge
File 6--(Fwd) A listserv joke
File 7--Family-Friendly Internet Access Act of 1997
File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Thu, 10 Apr 1997 09:18:48 -0500 (CDT)
From: Bob Izenberg <[email protected]>
Subject: File 1--XT clone for donation or sale (Sun Devil Redux)

((MODERATORS' NOTE: Back in the dark days of early 1990, when
the US Secret Service "discovered" TGHM (The Great Hacker Menace),
Bob Izenberg was one of the system administrators caught up
in the Kafkaesque nightmare of legal limbo. He was never
arrested, indicted, or accused of wrong-doing, but his
computer equipment was seized and prosecutors left him
limbo for years. In part, it seemed that, like Dr Ripco and
some others, the feds weren't sure what to do with him,
and personnel changes amongts the feds added to the confusion
on both sides. Finally, somebody in the USSS figured out that
maybe, just maybe, somebody should close the case and return
his equipment.
For a summary of what all the fuss was about back in 1990,
go out and buy Bruce Sterling's THE HACKER CRACKDOWN,
which remains the best source of information for the period)).

       The United States Secret Service has returned to me the PC-XT
clone system seized at my residence in February of 1990.  It still
works, which surprised me, but of course its disk had been wiped.
It wasn't bad for an XT by the standards of the day:  2Mb EEMS
memory card, Perstor disk controller, full-height 70Mb MFM fixed
disk, NEC V20 processor.  Today, of course, it's a doorstop.
Anyway, as Ron Roberts and many other taxpayers graciously paid
for its storage for all these years, it's the least that I can do
to give it away to a worthy cause.  Or even an un-worthy cause,
just to get it out from under the desk.  No, it won't run Windows
95 or any software written in at least the last five years.  No
warranty is offered, other than an assurance that seven years
stored next to the Ark of the Covenant in Illinois hasn't damaged
(or improved) it one bit.  First come, first served, and you pay
the shipping.  After May 1st, it's history if nobody's claimed it.

Bob
--
================  "We make the Internet work."  ================
  bob izenberg                          phone: +1 512 306-0700
  sig.net network operations                       [email protected]

------------------------------

Date: Wed, 16 Apr 1997 20:19:36 GMT
From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
Subject: File 2--ACLU Cyber-Liberties Update

                       ACLU Cyber-Liberties Update
                       Wednesday, April 16, 1997

* Act Now to Restore Telephone Privacy - Fax Congress

The FBI is using a 1994 law (CALEA, or the "Communications Assistance to
Law Enforcement Act") to force telecommunications companies to change
their equipment and facilities to weaken privacy protection and provide
enhanced wiretap access for government agents. In 1994, Congress
authorized a half-billion dollars to pay for changes in old technology
but blocked actual funding until last year when Congress both set up a
special "slush fund" using excess funds from intelligence and law
enforcement agencies and said the FBI could spend part of the money
authorized in 1994. But Congress prohibited spending any money until the
FBI submitted an implementation plan approved by Congress.

The annual appropriations process gives us yet another chance to tell
Congress not to allow this unprecedented attack on our privacy. Let your
own representative and senators know that you want them to oppose funding
this attack on your telephone privacy.

Use the ACLU web site action fax page to send a fax to your members of
Congress telling them not to fund CALEA! The free web-to-fax gateway will
allow you to look up your representatives on Capitol Hill and send faxes
right to their offices. It can be found at:

http://www.aclu.org/action/calea_act.html

  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Privacy Risks Shut Down Government Web site

The Social Security Administration recently announced that it had shut
down an Internet site that supplied information about people's personal
income and retirement benefits because of concerns that it might violate
privacy rights, the New York Times reports.

Thousands of people have obtained such data on the World Wide Web by
requesting "personal earnings and benefit estimate statements."  A
computer user seeking the information need only  supply a name, address,
telephone number, place of birth, social security number and mother's
maiden name.  Experts on computer and privacy law expressed concern that
such safeguards were not enough to keep people from obtaining
confidential electronic data about others.

"It remains unclear exactly where SSA officials were trying to go with
this program, but in any case they ran over the privacy of 140 million
Americans to get there,"said Don Haines, legislative counsel on privacy
and cyberspace issues for the Washington national office of the American
Civil Liberties Union.

"We appreciate that the agency was trying to expand access to public
information, but in doing so, it made the information a little too
public.  Without providing appropriate safeguards, the agency had no way
of insuring that private information was only available to those entitled
to have access."

Haines said that with confidential information open to ex-spouses,
landlords, employers, co workers, intrusive neighbors and credit
agencies, the potential for abuse was enormous. The ACLU is working with
members of Congress on legislation to correct the problem.

Acting Commissioner of Social Security John J. Callahan said the agency
would hold public forums around the country in the next 60 days to hear
from beneficiaries and experts on privacy and computer security.

This is just the most recent case of problems with the privacy of records
held by the Social Security Administration. Almost exactly a year ago, in
what computer experts said might be one of the biggest breaches of
security of personal data held by the Federal government, Federal
prosecutors in New York  revealed that several employees of the Social
Security Administration passed information on more than 11,000 people to
a credit-card fraud ring.  That information, the prosecutors said in
court papers, included social security numbers and mothers' maiden names,
and allowed the ring to activate cards stolen from the mail and run up
huge bills at merchants ranging from J&R Music world to Bergdorf Goodman.



The Internet address of the Social Security Administration is
http://www.ssa.gov.  General information about Social Security programs
is still available there.



 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Witnesses testify in New York State Cyber-censorship case. Oral
Arguments scheduled for April 22.


       In hearings last week, witnesses representing an online arts group,a
library, a gay issues forum and the American Civil Liberties Union  all
testified that a New York statute barring "indecency" on the Internet
could  subject them to criminal prosecution.

      Their testimony on Monday April 7 concluded three days of
courtroom hearings before Judge Loretta A. Preska in  ALA v. Pataki, the
challenge to New York`s Internet censorship law brought by the American
Civil Liberties Union, the New York Civil Liberties Union, the American
Library Association, and others.

      The groups argue that the law, which imposes criminal sanctions of
up to four years in jail for  communicating so-called "indecency" to a
minor, would reduce all speech on the Internet to a level suitable  for a
six-year-old. The ACLU successfully challenged a similar federal law in
Reno v. ACLU, currently under review by the Supreme Court.

      "We think we were able to demonstrate the disastrous effect the
New York law -- like the federal CDA --  would have on individual
speakers and non-profit groups who communicate on the Internet both
within and outside the state of New York," said Ann Beeson, an ACLU
national staff attorney who conducted direct  examination of several
plaintiff witnesses. "A long line of well-established Supreme Court
decisions  demonstrate that government cannot ban protected speech for
adults in the name of shielding children."

       Beeson is profiled in this week`s New York Magazine, in an article that
raises, and answers in the affirmative, the question "Could it be that
New York`s redundant, unconstitutional Internet-indecency law is more
useful for scoring political points for protecting children?"

       Judge Preska has scheduled oral arguments in the case for April 22.
Argument will begin at 2:00pm in room 12A at 500 Pearl Street, New York
City.

       Full information on the New York Internet censorship case, including
links to transcripts, can be found at
http://www.aclu.org/news/nycdahome.html

 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


ACLU Cyber-Liberties Update Editor:
Lisa Kamm ([email protected])
American Civil Liberties Union National Office
132 West 43rd Street
New York, New York 10036

To subscribe to the ACLU Cyber-Liberties Update, send a message
to [email protected] with "subscribe Cyber-Liberties" in the
body of your message. To terminate your subscription, send a
message to [email protected] with "unsubscribe Cyber-Liberties"
in the body.

The Cyber-Liberties Update is archived at
http://www.aclu.org/issues/cyber/updates.html

For general information about the ACLU, write to [email protected].
PGP keys can be found at http://www.aclu.org/about/pgpkeys.html

------------------------------

Date: Wed, 9 Apr 1997 17:19:23 -0400
From: Steve Talbott <[email protected]>
Subject: File 3--Technology and Society (from NETFUTURE #45)

((MODERATORS' NOTE: We came across NETFUTURE and were impressed
by it. Here's a sample of the articles that Steve Talbott, the
editor, runs. This E-Zine is worth taking a look it!))

                         +++++++++++++

                  Technology and Human Responsibility

------------------------------------------------------------------
Issue #45      Copyright 1997 Bridge Communications          April 9, 1997
-----------------------------------------------------------------
Opinions expressed here belong to the authors, not Bridge Communications.

                      Editor:  Stephen L. Talbott

NETFUTURE on the Web:  http://www.ora.com/people/staff/stevet/netfuture/
   You may redistribute this newsletter for noncommercial purposes.


From Steve Talbott <[email protected]>

           The evidence of our hollowing out as human beings
                       is staring us in the face.

                            Is anyone home?

These days no article about technology and society seems complete without
at least one reference to the accelerating pace of change.  But, despite
their ubiquity, a number of these references have particularly jumped out
at me in recent weeks.  Here are a few examples:

*   An article about Cisco in the *Boston Globe* described that company's
   current, top-of-the-line router, the model 7500, which sells for some
   $100,000 "fully loaded," and routes a million packets per second.
   "For a while," the article noted, "that capacity set the industry
   standard.  But within months of the 7500's release in 1996, some Cisco
   customers were describing the machine as `long in the tooth' and
   `dinky.'"

*   The *EE Times* carried a piece about a new generation of fast Internet
   protocols.  A high-tech executive is quoted as saying, "This is not a
   little, incremental shift.  It's a major disruption of everything
   that's going on in the industry."

*   Princeton University vice president, Ira Fuchs, on Internet II:  "It's
   not as simple as `You change the backbone and all will be well.'  For
   individual users to take full advantage of the change in the
   infrastructure, you'll have to change everything."  Also, "the
   technology is advancing so rapidly that by the time the computer you
   originally asked for is finally delivered, you don't want that
   computer any more."

*   From *Publisher's Weekly*:  Database vendors serving libraries "have
   become frustrated with the number of new platforms they have to
   support.  It cost one company $2 million to convert its databases to
   SGML for CD-ROM.  Then the Web and HTML came along, costing $100,000
   more for conversion, and now they must ready themselves for Java."

*   The *Economist*:  A venture capitalist who sits on the boards of
   several small Internet companies says that "`a major strategic
   decision' is taken at virtually every meeting.  This nimbleness is
   prompted by fear.  The technology market changes so quickly that any
   company which fails to adjust will get pushed out."  The magazine goes
   on to report that "age and experience, which elsewhere get people
   promoted, are no help in [Silicon] valley; on the contrary, there is a
   distinct bias in favor of youth.  Nowadays the average software-
   engineering qualification becomes obsolete in around five years, so a
   student fresh out of college may be more valuable to a company than a
   40-year-old.  Many of the new Internet firms are headed by people in
   their mid-20s."

Here closer to home, I find that my text-only Lynx browser is rapidly
becoming a cripple on today's Web.  Many sites now require frame support,
which my browser does not have.  Other sites, such as MSNBC, immediately
hang the window in which I'm working; Lynx compatibility is simply not
something Web site managers worry about.  Apparently, as a sixteen-year
veteran of the Net who would rather not spend his time downloading cutesy
graphics, I've gotten myself a little behind the curve.  I might as well
be a dinosaur.

The browser problem illustrates, I think, one striking fact about many Web
sites:  they are content providers for whom content scarcely matters.
They do not begin with something important to say, and then seek the most
effective vehicle for saying it.  Rather, they are enamored of the vehicle
(latest model only!) and are looking for something to say with it.  Not
surprisingly, the result is a lot of pandering.  The message is there only
to serve alien purposes.

This is no eccentric reading of my own.  It is the explicit acknowledgment
of an entire industry that begins by producing and playing with whatever
is technically feasible, and then hopes for a "killer app" to fasten the
technical innovations upon the body social.  Here, too, some recent news
reports have leapt out at me:

*   Speaking of the high-tech transformation of the U.S. military, the
   *Economist* writes:  "This embryonic revolution, unlike the
   development of nuclear weapons, has not emerged in response to any
   particular threat to the United States or its allies.  It has come
   about because it is there -- that is, because generals want to play
   with new technologies in case a future threat emerges."

*   *Internet World* tells corporate executives they must embrace
   intranets for no other reason than that they are happening.  "You can
   catch the Intranet wave and ride it or let your firm and your LAN be
   overwhelmed by the tides of change."  The argument?  None seems to be
   necessary.  It's enough that intranets are *there*, and are deemed to
   represent a technical advance.  "By now, you've gathered that
   intranets can be pricey and, in some ways, hard to manage.  Are they
   worth it?  The answer is yes.  The future clearly belongs to the
   intranet model.  Proprietary LANs ... have run their course.  The
   future belongs to intranets, where getting information anywhere and
   anytime is possible for your users."

*   And the *Economist* again:  "By 2000 customers will have shelled out a
   total of $200 billion on networking software and related equipment;
   but most forecasts for revenues from Internet-related activities, such
   as advertising on websites, are no more than $35 billion -- hardly a
   quick return."

If you build the technology, a killer app will eventually come -- such is
the reigning faith.  Of course, as long as the rest of us are willing to
go along with this backward game, chasing after the latest gadgetry
regardless of need, it works quite well.  Out of this willingness, the
technological "necessity" that so many perceive in these matters is born.

It's a strange infatuation that has a mature society hitching itself with
uncritical enthusiasm to whatever happens to issue from the endless rows
of cubicles where programmers -- often college students -- exercise their
technically constrained and hopelessly uneducated imaginations.  The
cubicles themselves, I suppose, are a pretty good image of the inevitable
result.  We always mirror our inner worlds in the outer.


The Loss of Purpose
  -------------------

So, what is going on here?

Technical innovation -- the devising of new tools -- is surely a desirable
activity.  But unless there is a balance between our fascination with
tools and our concern for the ends they may help us achieve, the tool
becomes tyrannical.  What stares us in the face today is the startling
fact that, not only has the balance been upset, but one of its terms has
virtually disappeared.  Technological innovation now proceeds for its own
sake, driven by its own logic, without reference to human need.  We are a
society obsessed with new tools, but incapable of asking in any serious
way, "what are we developing these tools *for*?"

It's rather as if a musician became so enamored of new instruments capable
of generating novel sounds that he lost all interest in seeking the kind
of disciplined musical inspiration that makes his art finally worthwhile.

What I'm talking about here -- and what the preceding quotations testify
to -- is a reversal of ends and means.  I previously (NF #39 and NF #40)
tried to show what this reversal looks like within the individual company,
where the pursuit of worthwhile ends under the discipline of economics
eventually gets twisted around to a pursuit of profits as an end in
themselves.  Now, however, I'm talking about society as a whole, driven as
it increasingly is by the high-tech industry.

A society obsessed by tools and technology without a balancing focus upon
ends is a society whose members are being hollowed out.  It is, after all,
in establishing and pursuing higher values -- something we can only do
from within ourselves -- that we assert our humanity.  Otherwise, we
merely react, machine-like, without internal compass.  That is, we become
like the programmed machines to which we devote so much of our energy.

I for one would not want to quarrel with those who recognize a certain
necessity in the one-sided tool focus of the past few hundred years.  Nor
would I want to insist that the U.S. military cease pushing its technical
capabilities to the practical limit.  And surely there is in any case
little likelihood that the foreseeable future will bring a significant
slowing of the overall, furious extension of the technical reach of our
tools.

What this means is that everything hinges upon our ability to
counterbalance the prevailing technical mania with a strengthened inner
compass.  We must, wherever possible, be all the more forceful in asking,
What is this tool *for* -- how does it relate to the deepest needs and
yearnings of the human being?  The stronger the tendency of the high-
tech/commercial matrix to drive itself forward in terms of its own
inherent logic, the more we must appeal to needs, values, and human ends
in order to reign in and guide this logic.

In making this effort we can hardly be satisfied with the hollow
platitudes of those who would sell us an endless array of new gadgets.
Our pressing need is *not* for more information, or faster access to
information, or more connectivity.  Our decisive problems arise -- as many
others have noted -- from the lack of meaningful, value-centered contexts
to which new information can be assimilated, and from those connections to
other people we already have, but do not know how to deepen and make
healthy.  Adding new information and additional connections where these
fundamental problems have not been solved only carries us further from
ourselves and each other.

Yet within the high-tech industry itself the platitudes have a certain
validity.  Any company that does not develop new technology fast enough --
human needs and purposes be damned -- will not likely survive for long.
This industry, in other words, has itself become machine-like, hollowed
out, lacking all evidence of the guiding human interior.  Its employees
and owners and investors sleepwalk through their working lives, bringing
full consciousness only to the technical dimensions of their jobs.  And we
who buy their products in a similar trance contribute our fair share to
the undermining of society.

Do not underestimate the potential evils of a society that worships every
new tool in forgetfulness of its own inner purposes through which alone
the tools can be justified.  Hollow men and women, whether educated or
not, whether technically competent or not, can never sustain a healthy
society, and are capable of unimagined monstrosities.

Eventually we will have to recognize the symptoms of our hollowness in
unexpected places.  For example, in the burgeoning commercialized sex
industry, where external presentations (now greatly aide by technology)
substitute for profound connection between human beings.  Or in the
deranged excesses at the fringes of the fast-growing New Age movements,
where the meaning so conspicuously absent from the social mainstream is
sought in borderline experiences -- and even, as with the Heaven's Gate
community, in death.  Or in the outrages committed against man and nature
by commercially driven biotechnologists.  Or in the politics of appearance
without principle.  Or in the fragmentation of society, with the economic
disfranchisement of large groups.

Our only escape from the tyranny of the tool as an end in itself lies in
our becoming *more* than our tools.  Only we ourselves can supply the
ends, and we can do so only by waking up to our own inner resources.  The
prevailing notion that the logic of high-tech development will itself
guide society into a better future amounts to an abdication of our
humanity.  After all, a society with abundant technical means and no
governing values and purposes can only become a hellish and dangerous
place.  On the other hand, a society struggling toward its own governing
values is a society on its way toward healing.

Which is it?  Personally, I see little basis for optimism.  But it may
well be that I've just been leafing through too many trade rags lately.

 ------------------------------------------------------------
*** About this newsletter (29 lines)

NETFUTURE is a newsletter concerning technology and human responsibility.
Publication occurs roughly once per week.  Editor of the newsletter is
Steve Talbott, a senior editor at O'Reilly & Associates.  Where rights are
not explicitly reserved, you may redistribute this newsletter for
noncommercial purposes.

Current and past issues of NETFUTURE are available on the Web:

   http://www.ora.com/people/staff/stevet/netfuture/

To subscribe to NETFUTURE, send an email message like this:

   To: [email protected]

   subscribe netfuture yourfirstname yourlastname

No Subject line is needed.  To unsubscribe, the second line shown above
should read instead:

   unsubscribe netfuture

To submit material to the editor for publication in the forum, place the
material in an email message and address it to:

   [email protected]

Send general inquiries to [email protected].

------------------------------

Date: Tue, 15 Apr 1997 10:02:45 EDT
From: Martin Kaminer <[email protected]>
Subject: File 4--Texas ISPs Targed in Secessionist Case

Date--Sat, 12 Apr 1997 11:10:22 -0500
From--FringeWare News Network <[email protected]>

Sent from: Jon Lebkowsky <[email protected]>

[ mod's note: ROT information can be found at
http://www.flash.net/~robertk/
]

Texas ISPs Targeted in Secessionist Case
by Ashley Craddock

5:55pm  11.Apr.97.PDT

Saying the Texas attorney general is violating the electronic privacy
rights of their subscribers, two Lone Star Internet service providers
have refused to turn over information about members of a secessionist
movement who use their services.

The movement, known as the Republic of Texas, holds that Congress' 1845
annexation of the independent state was illegal and that only a citizen
vote can legalize its status as part of the Union. Charging everyone
>from Governor George Bush Jr. to private citizens with the illegal
seizure of property, the Republic has flooded state courts with liens
that have been declared illegal.

In a counterattack, Attorney General Dan Morales - of what the movement
calls "the de facto state of Texas" - on 2 April served subpoenas on 10
ISPs who do business with the members of the group that state officials
seem to delight in calling ROT.

The subpoenas demand copies of all members' email, login and user IDs,
subscriber applications, and billing information - including credit
card and checking-account numbers. The court order was filed as part of
a civil case, Morales v. Van Kirk et al., that the attorney general
brought last June to stop the movement from posing as a government
entity and clogging the courts with liens.

Eight of the ISPs have agreed to comply with the subpoenas. Two others,
Internet Texoma Inc.  and the Overland Network, have refused. Both say
the subpoenas violate a portion of the federal Electronic
Communications Privacy Act stipulating that the information sought must
be "relevant and material to an ongoing criminal investigation."

In a Friday letter to the attorney general, W. Scott McCollough, the
Texas Internet Service Providers Association attorney representing both
ISPs, stated that the subpoenas "do not overcome our ... federal
obligations."

"This is a civil, not a criminal case," McCollough said. "Plus, the
AG's office hasn't gone through due process in requesting the
information. They didn't serve us with a search warrant. And if my
clients turned over the information without a warrant, there's always
the possibility that these people could sue us. I don't know if they
would since they don't acknowledge the court system, but they could."

Attorney general's spokesman Ward Tisdale said on Friday that since the
"Republic of Texas folks do most of their communication over the
Internet, we're simply taking the reasonable steps to gather all the
information we need in the course of our investigation."

Responding to McCollough's letter, the attorney general's office took a
slightly different tack in an effort to skirt the issue of the federal
privacy law. It called off the subpoenas and told McCollough it will
file a civil investigative demand, a less-stringent request for
material relevant to ongoing litigation.

------------------------------

Date: Thu, 10 Apr 1997 10:41:58 -0500 (CDT)
From: "Robert A. Hayden" <[email protected]>
Subject: File 5--Crack DES Challenge

I'm just forwarding along.  Check out the web page towards the end for all
the relevant software and such.

- --

                           FOR IMMEDIATE RELEASE:

                     DESCHALL Group Searches for DES Key

  Sets out to prove that one of the world's most popular encryption
  algorithms is no longer secure.

  COLUMBUS, OH (April 9, 1997). In answer to RSA Data Security, Inc.'s
  "Secret Key Challenge," a group of students, hobbyists, and
  professionals of all varieties is looking for a needle in a haystack
  2.5 miles wide and 1 mile high. The "needle" is the cryptographic key
  used to encrypt a given message, and the "haystack" is the huge pile
  of possible keys: 72,057,594,037,927,936 (that's over 72 quadrillion)
  of them.

  The point? To prove that the DES algorithm -- which is widely used in
  the financial community and elsewhere -- is not strong enough to
  provide protection from attackers. We believe that computing
  technology is sufficiently advanced that a "brute-force" search for
  such a key is feasible using only the spare cycles of general purpose
  computing equipment, and as a result, unless much larger "keys" are
  used, the security provided by cryptosystems is minimal. Conceptually,
  a cryptographic key bears many similarities to the key of a typical
  lock. A long key has more possible combinations of notches than a
  short key. With a very short key, it might even be feasible to try
  every possible combination of notches in order to find a key that
  matches a given lock. In a cryptographic system, keys are measured in
  length of bits, rather than notches, but the principle is the same:
  unless a long enough key is used, computers can be used to figure out
  every possible combination until the correct one is found.

  In an electronic world, cryptography is how both individuals and
  organizations keep things that need to be private from becoming public
  knowledge. Whether it's a private conversation or an electronic funds
  transfer between two financial institutions, cryptography is what
  keeps the details of the data exchange private. It has often been
  openly suggested that the US Government's DES (Data Encryption
  Standard) algorithm's 56-bit key size is insufficient for protecting
  information from either a funded attack, or a large-scale coordinated
  attack, where large numbers of computers are used to figure out the
  text of the message by brute force in their idle time: that is, trying
  every possible combination.

  Success in finding the correct key will prove that DES is not strong
  enough to provide any real level of security, and win the first person
  to report the correct solution to RSA $10,000.

  Many more participants are sought in order to speed up the search. The
  free client software (available for nearly every popular computer
  type, with more on the way) is available through the web site. One
  simply needs to follow the download instructions to obtain a copy of
  the software. Once this has been done, the client simply needs to be
  started, and allowed to run in the background. During unused cycles,
  the computer will work its way through the DES keyspace, until some
  computer cooperating in the effort finds the answer.

  If you can participate yourself, we urge you to do so. In any case,
  please make those you know aware of our effort, so that they might be
  able to participate. Every little bit helps, and we need all the
  clients we can get to help us quickly provide an answer to RSA's
  challenge.

Contact Information

    * Media Contact
      Matt Curtin +1 908 431 5300 x295
      <[email protected]>
    * Alternate Contact
      Rocke Verser, Contract Programmer, +1 970 663 5629
      <[email protected]>
    * Web Site
      http://www.frii.com/~rcv/deschall.htm
    * Mailing List
      [email protected]
      To subscribe, send the text subscribe deschall to
      <[email protected]> and you'll be emailed
      instructions.
    * RSA Data Security Secret Key Challenge '97 Site
      http://www.rsa.com/rsalabs/97challenge/

------------------------------

Date: Thu, 17 Apr 1997 09:43:14 -0500
From: "Julia N. Visor" <[email protected]
Subject: File 6--(Fwd) A listserv joke

Q:  How many internet mail list subscribers does it take
    to change a light bulb?


A:  1,331:
        1 to change the light bulb and to post to the mail
          list that the light bulb has been changed
       14 to share similar experiences of changing light
          bulbs and how the light bulb could have been
          changed differently.
        7 to caution about the dangers of changing light bulbs.
       27 to point out spelling/grammar errors in posts about
          changing light bulbs.
       53 to flame the spell checkers
      156 to write to the list administrator complaining about
          the light bulb discussion and its inappropriateness
          to this mail list.
       41 to correct spelling in the spelling/grammar flames.
      109 to post that this list is not about light bulbs and
          to please take this email exchange to alt.lite.bulb
      203 to demand that cross posting to alt.grammar,
          alt.spelling and alt.punctuation about changing
          light bulbs be stopped.
      111 to defend the posting to this list saying that we
          all use light bulbs and therefore the posts
          **are** relevant to this mail list.
      306 to debate which method of changing light
          bulbs is superior, where to buy the best light bulbs,
          what brand of light bulbs work best for this
          technique, and what brands are faulty.
       27 to post URLs where one can see examples of
          different light bulbs
       14 to post that the URLs were posted incorrectly, and
          to post corrected URLs.
        3 to post about links they found from the URLs that
          are relevant to this list which makes light bulbs
          relevant to this list.
       33 to concatenate all posts to date, then quote
          them including all headers and footers, and then
          add "Me Too."
       12 to post to the list that they are unsubscribing
          because they cannot handle the light bulb
          controversey.
       19 to quote the "Me Too's" to say, "Me Three."
        4 to suggest that posters request the light bulb FAQ.
        1 to propose new alt.change.lite.bulb newsgroup.
       47 to say this is just what alt.physic.cold_fusion
          was meant for, leave it here.
      143 votes for alt.lite.bulb.

------------------------------

Date: Sat, 12 Apr 1997 02:50:49 -0400
From: "Robert A. Costner" <[email protected]>
Subject: File 7--Family-Friendly Internet Access Act of 1997

Source -  [email protected]

On March 20th, a national bill similar to the Texas law was introduced.
The substantial part of the law is as follows:

  ------------------------------------

http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.1180:

(d) OBLIGATIONS OF INTERNET ACCESS PROVIDERS- An Internet access provider
shall, at the time of entering an agreement with a customer for the
provision of Internet access services, offer such customer screening
software that is designed to permit the customer to limit access to
material that is unsuitable for children. Such software shall be provided
either at no charge or for a fee that does not exceed the cost of such
software to such provider.

    ------------------------------------

The above amendment to 47 USC 230 uses language that indicates an ISP is
not a common carrier (see the link for definitions).  Unlike the Texas law,
this applies to all providers, not just the for pay providers.  Also unlike
the Texas law, the amendment provides  for what is to be blocked - material
that is unsuitable for children.  Unlike the Texas law, this does not
provide an exclusion for the ISP if the blocking software does not work
properly.

The term "limit access to material" would be up for debate, but I assume
that a partial reduction in improper material would be fine.   However, I
assume that there is a requirement to block all areas, not just web sites.

If this law has a prayer of passing, I'd prefer to see the Texas version
instead.

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <[email protected]>
Subject: File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

    SUBSCRIBE CU-DIGEST
Send the message to:   [email protected]

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

        In ITALY: ZERO! BBS: +39-11-6507540
        In LUXEMBOURG: ComNet BBS:  +352-466893

 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
   Web-accessible from: http://www.etext.org/CuD/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #9.31
************************************