Computer underground Digest Sun Feb 28 1999 Volume 11 : Issue 13


Computer underground Digest    Sun  28 Feb, 1999   Volume 11 : Issue 13
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Commie Radiator:   Etaion Shrdlu, Mssr.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #11.13 (Sun, 28 Feb, 1999)


File 1--"There is no such thing as Information" (Netfuture #84)
File 2--Islands in the Clickstream. The Enemy Within (Real Y2K Bug)
File 3--"First-Hand Lesson in Censorship"  - SSU (D. McCullah)
File 4--Re: SUU student punished for visiting Hitler site
File 5--Spanish Government Censors Net
File 6--Virginia criminalizes "Up Yours"
File 7--SB 881 Virginia Computer Crimes Act; electronic mail.
File 8--Breaking News: Netscape browser security hole
File 9--Cu Digest Header Info (unchanged since 10 Jan, 1999)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 9 Feb 1999 16:23:24 -0500
From: Stephen Talbott 
Subject: File 1--"There is no such thing as Information" (Netfuture #84)

Source: Issue #84 /  February 9, 1999
Technology and Human Responsibility

             Editor:  Stephen L. Talbott (stevet@oreilly.com)

           On the Web: http://www.oreilly.com/~stevet/netfuture/
     You may redistribute this newsletter for noncommercial purposes.
                  THERE IS NO SUCH THING AS INFORMATION

In NF #81 ("Here's to the Information Age: A Toast") I pointed out our
curious usage of the word "information".  On the one hand, it can mean
anything and everything -- "stuff", as many are apt to put it.  Of course,
"stuff" is a perfectly legitimate word, and so is "information".  When, at
the end of a conversation, I say "Okay, send me the information", both
parties know what is being referred to, since the context has made it
clear.  Similarly, when I say "Okay, give me that stuff", there's not
likely to be any confusion.

But while it may be useful to have a word meaning not much more than
"whatever it is we were just talking about", you wouldn't expect such a
spineless and inconsequential term to carry around a halo of glory.  You
wouldn't expect to hear, for example, about the "Age of Stuff".  Yet we
hear every day about the "Age of Information".  What is going on?


Where Information Shines
 -----------------------

This is where the second aspect of "information" comes into the picture --
the halo-bearing aspect.  Let's look at its distinguishing marks:

** Information comes, first of all, in discrete entities of some sort --
in "bits" or "pieces" -- which we can store in databases.  It's nicely
countable, so that we can talk, for example, about doubling the size of
our databases.  (See "The Great Knowledge Implosion" below.)

** Second, information is thought to be sharp-edged and unambiguous.  It
is valid or invalid, up-to-date or out-of-date, true or false.

** Also, information can be conveyed without loss or distortion from one
place to another.  In this way databases can be exactly duplicated.

** And, lastly, information is subject to precise manipulation and control
-- which, of course, is what information-processing tools are all about.

Now, I hope all this puts you in mind of the preceding discussions of the
polar relation between accuracy and meaning.  And, if it does, you will
doubtless have noticed that the idea of information described here looks
very much like another attempt at a "one-pole magnet".  If, in
communication, you achieve absolute accuracy -- if the "information" you
communicate is something you can control and count and transmit reliably,
bit by well-defined bit, from one database to another -- then you're no
longer talking about communication at all.  That is, your accurate terms
aren't any longer *about* anything, just as the p's and q's of the pure
logician are no longer about anything.

The text you transmit may be, say, the text of the Emancipation
Proclamation.  But the text is not its meaning.  (It's amazing how
naturally we lose sight of this distinction today.)  The text can be
reliably transmitted, but the significance of the text cannot.  Meaning,
Owen Barfield has remarked, cannot be conveyed; it can only be suggested.


Information as Statistical Artifact
 ----------------------------------

In a sense, none of this is as controversial as you might think.  The
criteria for information listed above derive historically from the
mathematical theory of communication, developed at mid-century by Norbert
Wiener and Claude Shannon, among others.  Their aim was for reliability,
precision, and control, but along the way a funny thing happened:  meaning
disappeared from view.

As Warren Weaver famously put it in one of the first essays explicating
the new theory of communication:  in a given context the word "yes" might
well represent the same "amount" of information as the entire text of the
King James Bible.  (See Shannon and Weaver, *The Mathematical Theory of
Communication*.)  That's just the way the theory works.  Information,
according to this theory, is a statistical artifact of the communication
process and must not be confused with the content of communication, or
with meaning.

The upshot of this fact is that the easiest way to maximize the amount of
information over a communication line (in the theory's terms) is to hook
up a random noise generator to it.  (You will be forgiven the thought that
the Internet is just one massive attempt to illustrate this point.)
Weaver, when mentioning the direct connection between noise and
information, goes on to remark that this connection "beautifully
illustrates the semantic trap into which one can fall if he does not
remember that `information' is used here with a special meaning".

The trap is one few people any longer care to avoid.  While the earlier
theorists were careful to point out (again, in Weaver's words) that
"information must not be confused with meaning", the term quickly
overleapt all such hedges, even as the speakers tried to retain the mantle
of authority derived from the technical theory.


Toward the Destruction of Polarity
 ---------------------------------

So we come back to those observations by Russell and Einstein.  (See
"Please Don't Love Me Only for My Architecture" above.)  You can drive
single-mindedly toward the pole of accuracy only by excluding meaning from
consideration.  Perfectly quantified relationships are precise,
unambiguous -- and empty.  Bring their meaningful content into view, and
they're no longer empty, but neither are they any longer precise and
unambiguous.

Finding our way into the productive interplay of these polar opposites is
part of our job today.  We *must* seek the greatest accuracy possible in
all our cognitive undertakings.  And we *must* probe the deepest meaning
of the terms we are trying to be accurate about.

This is not a simple trade-off -- a polarity never is.  It's not that you
have to give up one or the other pole.  Magnets *can* be strengthened; you
strengthen one pole by also strengthening the other.  It's a matter of
struggling to hold the two poles together in unity despite the ever
greater tension between them.  This work, of course, gets harder and
harder the further we carry it, but it is the work we are called to do.
It is, most fundamentally, the way our minds need to work.

The problem is that nearly everything in the technological society presses
toward the destruction of this polar tension and balance.  We find
ourselves on a series of impossible quests for a one-pole magnet, as
indicated by many of the most prestigious keywords of our day:
information, efficiency, precision, productivity, logic .... Even when a
polar dynamic is glimpsed, it is almost immediately denied.  In *The
Mathematical Theory of Communication*, Weaver articulates

   the vague feeling that information [mathematically defined] and meaning
   may prove to be something like a pair of canonically conjugate
   variables in quantum theory, they being subject to some joint
   restriction that condemns a person to the sacrifice of the one as he
   insists on having much of the other.

I was shocked when I first came across these words.  Had this pillar of
conventional science actually discerned the richly textured polarity that
underscores the drive toward emptiness in so many scientific disciplines?
But, no, it immediately became clear that Weaver didn't "get it" at all.
For in the same essay, when he is imagining how one might begin to treat
meaning theoretically, he foresees our being able to talk about the "sum
of message meaning plus semantic noise", and also the "statistical
semantic characteristics" of a message.  Clearly this was not a person who
recognized a polar interplay between quantifiable precision and some
opposing principle.  Rather, he believed that any such opposing principle
could itself be quantified.  What was going to enable his information-
related numbers to be *about* something was merely another set of numbers.
Given this fact, we can only shake our heads at Weaver's expression of
hope:

   The concept of information developed in this theory at first seems
   disappointing and bizarre -- disappointing because it has nothing to do
   with meaning, and bizarre because it deals not with a single message
   but rather with the statistical character of a whole ensemble of
   messages, bizarre also because in these statistical terms the two words
   *information* and *uncertainty* find themselves to be partners.

   I think, however, that these should be only temporary reactions; and
   that one should say, at the end, that this analysis has so
   penetratingly cleared the air that one is now, perhaps for the first
   time, ready for a real theory of meaning.

Almost exactly fifty years later we are still waiting for this theory from
cognitive scientists who, despite their protestations, remain fixated on
mathematics, logic, and syntax -- "one-pole researchers".  Signs of
progress are hard to find.


The Loss of Balance
 ------------------

This brings us back to the two aspects of "information":  on the one hand,
"stuff", and on the other hand, all the glamor of an influential technical
usage -- but one in which the notion of information has been stripped of
meaning.  In both popular and scientific discourse, these two usages are
mixed up in a hopelessly incoherent way.  We want the prestige of the
technical theory, but we also want to believe we're talking about the
meaningful content of communication rather than an obscure statistical
feature of the communication process.  Unfortunately, we can't have both.

But that doesn't keep us from trying.  Every laudatory reference to "The
Age of Information" is an attempt to have it both ways.  The only thing to
be said about this contradictory, informational currency of the modern age
is that it doesn't exist.

The one-sided drive toward a purely mathematical grasp of something pre-
empts the polar balance of thought required for all understanding, and
finally deprives us of the "thing" we began to investigate in the first
place.  But the human mind cannot function entirely without content, so we
inevitably import some sort of content through the back door, illicitly.
You will often find that even those who are explicating the technical
theory of information occasionally slip into a usage whereby information
becomes a content that can be transmitted -- an outrage against the
theory.

I think you have here a pretty good picture of the imbalance of the
technological society.  At the pole of accurate abstraction and precise
manipulation, we find a well developed technical theory of information,
with its terms relatively sharp-edged and unambiguous.  But at the other
pole, where we might hope to penetrate the depths of meaning with a
muscular "polar logic", we find Weaver's hope unfulfilled.  Instead, we
see a word like "information" -- so far as it *does* aim toward meaningful
context -- dissolving into the limp shapelessness of "stuff".  And we see
everywhere the confused assumption that, if we just concentrate a little
harder on the glamorous pole of precision, somehow profound revelation
will follow.

The alternative is to arrest the drive toward quantification before it
becomes absolute and destructive, and to bring it into tension with the
qualities of mind that give us content.  We need to pursue meaning with
the kind of intensity that can counter and elevate our pursuit of
quantity, logic, and syntax.

Actually, while we do not have the theory of meaning Weaver hoped for (the
very idea of such a theory may be a contradiction), we do have some
remarkable *elucidations* of the meaning of meaning in the work of Owen
Barfield (see "Announcements and Resources" below), and I suspect that the
puzzles of the information age will yield to nothing less than a serious
reckoning with his work.

   =================================================================

                          ABOUT THIS NEWSLETTER

NETFUTURE is a freely distributed newsletter dealing with technology and
human responsibility.  It is published by The Nature Institute, 169 Route
21C, Ghent NY 12075 (tel: 518-672-0116).  The list server is hosted by the
UDT Core Programme of the International Federation of Library
Associations.  Postings occur roughly every couple of weeks.  The editor
is Steve Talbott, author of *The Future Does Not Compute: Transcending the
Machines in Our Midst*.

Copyright 1999 by The Nature Institute.

You may redistribute this newsletter for noncommercial purposes.  You may
also redistribute individual articles in their entirety, provided the
NETFUTURE url and this paragraph are attached.

NETFUTURE is supported by user contributions.  For details, see
http://www.oreilly.com/~stevet/netfuture/support.html.

Current and past issues of NETFUTURE are available on the Web:

   http://www.oreilly.com/~stevet/netfuture/
   http://www.ifla.org/udt/nf/          (mirror site)
   http://ifla.inist.fr/VI/5/nf/        (mirror site)

To subscribe to NETFUTURE send the message, "subscribe netfuture
yourfirstname yourlastname", to listserv@infoserv.nlc-bnc.ca .  No subject
line is needed.  To unsubscribe, send the message, "signoff netfuture".

Send comments or material for publication to Steve Talbott
(stevet@oreilly.com).

If you have problems subscribing or unsubscribing, send mail to:
netfuture-request@infoserv.nlc-bnc.ca

------------------------------

Date: Thu, 18 Feb 1999 18:31:47 -0600
From: Richard Thieme 
Subject: File 2--Islands in the Clickstream. The Enemy Within (Real Y2K Bug)

Islands in the Clickstream:
The Enemy Within

The Enemy Within, a column on the human dimension of Y2K, was
published in the January 1999 issue of Information Security.
Copyright Information Security. It is available for
re-publication in company newsletters, but please email for
permission.

The Enemy Within
The real Y2K bug has a painfully familiar look.

BY RICHARD THIEME

Y2K is a planetary event, a bright radioactive dye in the arteries of our
hive mind. And these days, the hive is buzzing.

Our species can look pretty stupid. The comic strip "Dilbert" is a hit
because everybody in it looks dumb from the point of view of the one smart
person in the room: you, the reader. Y2K looks that way too, except it
isn't just a room. It's the whole planet.

And yet...what looks stupid is often an evolutionary adaptation that helps
us survive. Like short-term thinking.

The Human Side of the Cyborg

Denial is one of our best defenses, keeping us from being overwhelmed while
we process data at deeper levels. Many individuals, businesses and
countries ignored Y2K because it wasn't an immediate threat. This includes
the programmers who set up an entire civilization for a fall.

So although we "knew," on some level, that computer code and embedded chips
were two digits short of a full year, we skipped merrily through the woods
like Little Red Riding Hood. But now a real wolf is at the door, and we've
finally learned to pay attention.

But that's only part of the story. Many people have been working on Y2K for
years. They understood that Y2K is not so much a computer problem as a
project management problem, a war against a familiar enemy: our short-term
thinking. We are now marshalling our forces and coordinating logistical
support for the duration of that war.

But chips and computer code define only half the battlefield. The other
half is the head and heart of every community affected by the bug, from a
technical workgroup to a planetary civilization.

In all wars, the best-laid plans explode into chaos on the battlefield. As
foot soldiers cope with real bullets, the news back home must be managed so
civilians are enlisted in the cause, their resources mobilized, rather than
paralyzed by terror. The truth must be told in ways that call forth our
best efforts.

Y2K broke into our consciousness with a rash of alarming reports predicting
the breakdown of society. Journalists, televangelists and purveyors of
survivalist gear exploited the ignorance and fear of their various digital
flocks.

Questions from clients and online readers grew fearful: Should I convert
cash to gold? Buy guns? Move to a commune defended by its own militia? As
the first line of collective defense--denial, minimization,
rationalization--gave way, fight-or-flight kicked in. But fight what? That
left flight. But where should I run? Where should I hide?
Ironically, primordial responses such as these were triggered even more
strongly in sophisticated intellectuals who thought they were beyond them.
Their hidden "shadow selves" made them easy prey for millennium fever. Now
they've headed for the 'Net, TV and print the way many fled for the hills a
thousand years ago, the last time we imagined that the universe ticked to
our little culture's symbolic clock.

To Tell the Truth

Now, the first mass adrenaline rush has just about played out. Profiteers
will do their best to keep it alive. Meanwhile, utilities and banks, local
governments and military forces continue their mundane tasks, fixing
billions of lines of code, replacing millions of chips and switches.

But wars also require leaders that inspire the troops, keep civilians
enlisted in the cause, and see clearly through the smoke and confusion of
the battlefield. Their task is to articulate a vision of possibility and
promise linked to our real experience, then close the gap between them.

Human beings are remarkably resilient. Once we realize that a threat is
real and break it down into bite-sized chunks, our capacity for heroic
response is remarkable. All those doomsday scenarios projected into the
future forgot that feedback loops enable an organism to self-correct.

Some critical systems may very well not be ready. Redundant backup plans
for every contingency have been developed, from worldwide social unrest to
a few dark nights here and there. The human dimension is critical now,
because that will determine what happens next year.

Too much anxiety and fear can shut us down, making us feel helpless. Fritz
Perls said excitement is nothing but anxiety plus oxygen. So the task is to
pump up that anxiety and short-circuit the hardwired fight-or-flight
response.
In any list of coping skills, the fact of community is always at the top.
Community works. If the enemy is us, as Pogo said, the task of leadership
is to turn the enemy into an ally. We are the problem, but we are also the
solution. Once the truth of the battlefield is out and we know what we're
really up against, the best as well as the worst of humanity can show up.

(BULLETS)

We don't know what we don't know. Yes, there will be disruptions. Yes, the
stock market will (over)react. Yes, millennial fever will be contagious.
But a "time out" from our frantic pursuits isn't all bad. We can see things
in the dark when we are quiet that we can't see when the lights are on.

Hey, this is Planet Earth, not a Hollywood set. The universe can be
dangerous. Stars explode, galaxies collide. Better let go of things we
can't control and manage the rest.

Successful project management includes the human dimension. Managers and
leaders are responsible for telling the truth in a way that mobilizes our
resources and shifts us from an us/them mentality to "we have a problem."

In an insecure world, security begins with the acceptance of insecurity.
Then we can build structures that create security from the inside
out--structures of collaboration, threaded with feedback loops, in which we
are all held accountable to agreed-up goals and values.



**********************************************************************

Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.

Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.

To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.

Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.

Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.

ThiemeWorks on the Web: 	http://www.thiemeworks.com

ThiemeWorks  P. O. Box 17737  Milwaukee WI 53217-0737  414.351.2321

------------------------------

Date: Wed, 24 Feb 1999 22:41:00 -0600 (CST)
From: Jim Thomas 
Subject: File 3--"First-Hand Lesson in Censorship"  - SSU (D. McCullah)

WIRED MAGAZINE

Declan McCullagh --> First-Hand Lesson in Censorship
by Declan McCullagh

9:00 a.m.  23.Feb.99.PST
Michaun Jensen's troubles began innocently enough in a computer lab at
Southern Utah University. She was researching a sociology paper
on censorship of offensive words and images.

Her first offense was viewing an erotic Web site. A student
complained. The lab monitor walked over to Jensen's computer and
warned her.

"He said, 'You need to stop,'" said Jensen, a 19-year-old junior.

Then she followed links to a Hitler Was A Pagan site, which
features a photo of Adolf Hitler alongside Italian dictator
Benito Mussolini with arm extended in a Fascist salute.

That was enough to prompt Gary Stewart, the student overseeing
the computer lab, to kick her out for violating the university's
rules on computer use.

It also fueled a campus debate -- including a front-page article
last week in the school newspaper -- that began simmering last
year over the breadth, scope, and constitutionality of the
policy, which bars students from downloading or viewing
"objectionable material."

Of course, Southern Utah University, nestled in conservative
Cedar City, Utah, is not alone in drawing up such rules. Many
administrators have grown nervous about Internet use, and in
their recent book, The Shadow University Alan Kors and Harvey
Silverglate list dozens of fear reaching examples.

Southern Utah University draws an unusually clear line, however,
barring computer users from reading controversial newspapers or
books online, even if the same publication appears in the school
library.  The university says neither faculty members nor
students may use computers to "acquire, store, or display"
material that is "racially offensive" or "objectionable."

Jensen's professor argues that the school's library offers plenty
of books about Hitler, as well as microfiche copies of Playboy
going as far back as 1953.

------------------------------

Date: Wed, 24 Feb 1999 12:31:11 -0800 (PST)
From: Carl M. Kadie 
Subject: File 4--Re: SUU student punished for visiting Hitler site

Some news (also available from http://www.eff.org/CAF):

The Southern Utah University has replaced the online version Computer
Policy with "The current policy is under review."
          -- http://www.suu.edu/pub/policies/pp52acce.html

A report from the University Journal, the SUU student newspaper, is
now available online. It was originally published before the other
newspaper articles.
          -- http://www.eff.org/CAF/cases/uj-ssu-edu.htm

------------------------------

Date: Wed, 24 Feb 1999 22:13:15 +0100
From: Jim Watt 
Subject: File 5--Spanish Government Censors Net

Spanish Government Censors Net
 ---------------------------

Around three hundred years ago, the territory of Gibraltar became
British.  Despite the fact that todays Gibraltarians  reject  any
suggestion  of  Spanish annexation, the Government in  Madrid  is
currently  attempting  an  economic  blockade  following  in  the
footsteps  of General Franco in the sixties, who closed the  land
frontier.

Today  we  live in the world of the Internet, and  in   a  recent
initiative  the Gibraltar Government sponsored a web camera  site
so that everyone can see what happens in real time.

The  Spanish, who complained bitterly when they  found  Gibraltar
had an ISO country code of .gi and who still refuse to accept the
existance  of international  telephone code 350,  have  responded
by  erecting blinds in front of the cameras, so that the world is
unable  to  see  'what  goes on'  at  a  border  where  motorists
suddenly  have  to queue for three hours to cross a  few  hundred
yards from one EU territory to another.

However,  the  issue  is  really  censorship  at  its  worst,   a
government  that is afraid to have its actions seen by the  world
has something to hide.

Take  a  look  at what the Spanish censor will allow  you  see  at
http://frontier.gibnet.gi

'What have they got to hide?'

------------------------------

Date: Wed, 24 Feb 1999 13:40:07 -0500
From: Jamie McCarthy 
Subject: File 6--Virginia criminalizes "Up Yours"

Source --  fight-censorship@vorlon.mit.edu

"Up Yours" and a hundred other stupid programs like it are
mailbombing tools.  Some kid with a half a brain sat down and
wrote a program to send out a flood of unsolicited mail with a
forged return address;  it takes advantage of open mail servers.

Yesterday, the Virginia State Legislature passed a law which makes
spamming a misdemeanor along with the more traditional forms of
computer theft:  breaking into systems, erasing data, and so on.
Oh yes -- and if you distribute software which "facilitates"
spamming, you are subject to twice the penalties:  $1000 per
offense, that is, per download of the software.

Thousands of ftp sites around the world that happen to host "Up
Yours" or similar programs will be operated by criminals, once the
governor signs this into law.  Running an anonymous remailer that
fails to take steps to eliminate "bulk" mail abuse is probably
also illegal, since they "falsify" the header information.

The summary:

   The bill provides for statutory civil damages of at least $500
   for each and every illegal and unsolicited bulk electronic mail
   message transmitted or actual damages, whichever is greater or
   $1000 for each and every violation of the prohibition on
   selling or distributing software which makes possible the
   transmission of false e-mail.

The law:

   B. It shall be unlawful for any person to sell, give or
   otherwise distribute or possess with the intent to sell, give
   or distribute software which facilitates or enables the
   falsification of electronic mail header information or other
   Internet routing information for the purpose of sending
   unsolicited bulk electronic mail through or into the facilities
   of an electronic mail service provider or its subscribers.

http://leg1.state.va.us/cgi-bin/legp504.exe?ses=991&typ=bil&val=sb881
http://leg1.state.va.us/cgi-bin/legp504.exe?991+ful+SB881

The ACLU is challenging the law.

http://www.zdnet.com/zdnn/stories/news/0,4586,2215334,00.html

--
        Jamie McCarthy
        jamie@mccarthy.org
 http://jamie.mccarthy.org/

------------------------------

Date: Wed, 24 Feb 1999 22:19:00 -0600 (CST)
From: Jim Thomas 
Subject: File 7--SB 881 Virginia Computer Crimes Act; electronic mail.


SB 881 Virginia Computer Crimes Act; electronic mail.
     __________________________________________________________

   Patron-William C. Mims


   Summary as passed Senate:
   Virginia Computer Crimes Act; electronic mail. Redefines
   "computer services" for the purposes of the Virginia Computer
   Crimes Act to include electronic mail or electronic message
   services of an electronic mail service provider. The bill also
   adds the following to the list of those acts constituting use
   without authority or computer trespass: (i) using the services
   of anelectronic mail service provider in contravention of the
   authority granted by or in violation of the policies set by
   the electronic mail service provider; (ii) falsifying e-mail
   transmission information in connection with the transmission
   of unsolicited bulk e-mail; and (iii) selling or distributing
   software which makes possible the transmission of false e-mail
   with the intent to facilitate the transmission of false
   e-mail. The bill provides for statutory civil damages of at
   least $500 for each and every illegal and unsolicited bulk
   electronic mail message transmitted or actual damages,
   whichever is greater or $1000 for each and every violation of
   the prohibition on selling or distributing software which
   makes possible the transmission of false e-mail.

------------------------------

Date: Wed, 24 Feb 1999 15:52:00 -0600
From: Bennett Haselton 
Subject: File 8--Breaking News: Netscape browser security hole

There is a headline story on News.com at:

http://www.news.com/News/Item/0,4,32864,00.html?st.ne.fd.gif.d

about a security hole that I found and told them about a few
hours ago, in Netscape Communicator 4.x.  The security hole
allows you to view any file on a person's hard drive if they use
Netscape Communicator for Windows.

Of the different browser bugs that ever been found, bugs that
allow you to read the contents of a person's hard drive are
considered *by far* the most serious.  Only a handful have ever
actually been discovered.

The News.com article links to a page on Peacefire.org that
demonstrates the security hole at
http://www.peacefire.org/readfile/

(Note: this is *not* the same as the security hole that I found
in HotMail a few weeks ago, which you may have also gotten an
e-mail about.)

This is off the beaten path from the anti-Internet-censorship
issues that Peacefire works on (and that I usually send out
e-mails about), but I thought you might be interested since this
story is less than an hour old.

------------------------------

Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators 
Subject: File 9--Cu Digest Header Info (unchanged since 10 Jan, 1999)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

CuD is readily accessible from the Net:
  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #11.13
************************************

<--">Return to the Cu Digest homepage

Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu