733 lines
34 KiB
Plaintext
733 lines
34 KiB
Plaintext
|
|
||
|
|
||
|
Computer underground Digest Wed May 3, 1995 Volume 7 : Issue 35
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Emo X-editor: Judy Tenuta
|
||
|
|
||
|
CONTENTS, #7.35 (Wed, May 3, 1995)
|
||
|
|
||
|
File 1--CuD WWW additions and a one-week break
|
||
|
File 2--SB 314 -- _The_Criminalization_of_Free_Speech
|
||
|
File 3--SotMESC Announcement
|
||
|
File 4--CFP - Advanced Surveillance
|
||
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Wed, 3 May 1995 22:32:21 CDT
|
||
|
From: Jim Thomas <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 1--CuD WWW additions and a one-week break
|
||
|
|
||
|
A few additional 'Zines have been added to the CuD www site.
|
||
|
Phracks (thru #46) and Crypt Newsletter are now available,
|
||
|
as well as a few additional pointers to other cyber-related
|
||
|
homepages.
|
||
|
|
||
|
The CuD URL IS:
|
||
|
|
||
|
http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
CuD will likely not come out for another week to ten days.
|
||
|
For some unknown reason, I assigned 10 page term papers to
|
||
|
a class of 300 students, and will be spending the next week or
|
||
|
so grading, giving exams, and dealing with the end of the
|
||
|
term. But, keep the articles comin, and #735 should be out
|
||
|
on either May 10 or 14.
|
||
|
|
||
|
jt
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 28 Apr 1995 18:59:40 GMT
|
||
|
From: kurz4768@ELAN.ROWAN.EDU(BRIAN KURZYNOWSKI)
|
||
|
Subject: File 2--SB 314 -- _The_Criminalization_of_Free_Speech
|
||
|
|
||
|
_Outline_
|
||
|
|
||
|
I. The provisions set forth in S.314 that will become law if passed.
|
||
|
A. "Sexually explicit material" is no longer allowed to be
|
||
|
transmitted from telecommunications devices, and
|
||
|
doing so is punishable by law.
|
||
|
B. Harassment over telecommunications media is illegal, and
|
||
|
punishable by law.
|
||
|
C. Telecommunications service providers whose customers violate the
|
||
|
law will also be held responsible.
|
||
|
D. Violators of this law will be punished with
|
||
|
1. up to two years in prison.
|
||
|
2. up to $100,000 in fines.
|
||
|
II. Senator Exon, the creator of the legistation, gives the purpose
|
||
|
in his introduction speech, and in his editorial.
|
||
|
III.There are problems with S.314.
|
||
|
A. There are legal problems.
|
||
|
1. Anything that violated the Constitution of the United
|
||
|
States is unconstitutional.
|
||
|
a. S.314 violates the First Amendment.
|
||
|
b. S.314 violates the Fourth Amendment.
|
||
|
c. S.314 is unconstitutional.
|
||
|
2. There are legal questions that have yet to be answered by
|
||
|
the courts.
|
||
|
B. There are practical problems with S.314.
|
||
|
1. The Internet is too big to impose laws on because it is
|
||
|
global.
|
||
|
2. Service providers would be forced to screen messages for
|
||
|
sexual content before they are sent, and such a huge
|
||
|
amount of information is sent through the National
|
||
|
Information Infrastructure daily that checking every bit of
|
||
|
data is all but impossible.
|
||
|
IV. The possible effects of passing S.314 are negative.
|
||
|
A. The violation of any constitutional guarantee weakens the
|
||
|
document.
|
||
|
B. There would be a decline in the popularity of the Internet.
|
||
|
C. The free-speech and democracy represented by the Internet would
|
||
|
come to a halt.
|
||
|
D. It would put a damper on the economy.
|
||
|
V. There are possible alternatives to S.314
|
||
|
A. The monitoring of public forums as opposed to invading privacy.
|
||
|
B. Narrowing down sexually explicit material to something like
|
||
|
child porn.
|
||
|
C. Removing the threat of prosecution from service providers, and
|
||
|
limiting it to violators.
|
||
|
D. The investigation of technology for parents to restrict their
|
||
|
children's Internet access,
|
||
|
thereby leaving the decision of what is fit for minors up to the
|
||
|
parent's, and not up to the
|
||
|
government.
|
||
|
E. Let the citizens of the Internet take care of themselves, and
|
||
|
decide what is fit and what is not.
|
||
|
|
||
|
Thesis: S.314 has legal problem, practical problems, and
|
||
|
poses some negative all around effects, and therefore should not be
|
||
|
passed into law.
|
||
|
|
||
|
The Communications Decency Act of 1995, aka The Cyberspace Bill,
|
||
|
aka S.314 is a bill recently introduced to the Congress of The United
|
||
|
States. It is intended to curb sexually explicit
|
||
|
materials being sent from one place to another electronically, or
|
||
|
through telecommunications media. This includes such forms of
|
||
|
communication as telephone systems, computer "nets," and
|
||
|
even private electronic mail systems. However, the provisions set
|
||
|
forth in S.314 pose problems. S.314 is unconstitutional, impractical,
|
||
|
and has some possible negative side effects, and therefore
|
||
|
should not be allowed to pass into law.
|
||
|
S.314 is not a law onto itself. It edits currently standing
|
||
|
legislature, particularly the Communications Act of 1934 (47 U.S.C.),
|
||
|
even more particularly, section 223. After the current
|
||
|
law is edited, the provisions are the following. Any communications
|
||
|
that are "obscene, lewd, lascivious, filthy, or indecent" are
|
||
|
prohibited from being transferred over any telecommunications device.
|
||
|
Any communications which are intended to harass, threaten, or
|
||
|
annoy are prohibited as well. Anybody who transmits over a
|
||
|
telecommunications device any of the prohibited material above shall
|
||
|
be fined up to $100,000, or spend up to two years in prison.
|
||
|
Whoever "permits any telecommunications faculty under their control
|
||
|
to be used for any purpose prohibited in this section (223) shall be
|
||
|
fined" up to $100,000, or spend up to two years in
|
||
|
prison (47 U.S.C. 223 (a)).
|
||
|
These are the basic provisions set up S.314. Before the
|
||
|
problems with the legislation are discussed, let us look at the
|
||
|
purpose of the bill. Senator Exon, the creator of the bill, states
|
||
|
his purpose in several places. In his introduction speech, according
|
||
|
to Pfohl, Exon states "I want to keep the Information Superhighway
|
||
|
from resembling a red-light district (1)." Exon also
|
||
|
wrote an editorial to the Washington Post explaining himself and his
|
||
|
legislature. He says that the Communications Decency act "modernizes"
|
||
|
current laws against harassment, indecency, and obscenity for computer
|
||
|
users. He says that S.314 is intended to make the Internet safer for
|
||
|
all users. According to Exon, The Communications Decency Act offers
|
||
|
the same protection to computer users that has been offered to
|
||
|
telephone users for years. It is supposed to curb the fear,
|
||
|
harm and annoyance associated with the obscene computer message. He
|
||
|
ends the article with a question. Should we give up, let Americans be
|
||
|
subjected to pornography and smut on the Internet, and blame it on
|
||
|
the First Amendment (A 20)? While his intentions are noble, what
|
||
|
he's doing is reducing all of the information on the Internet to
|
||
|
information suitable for children. There are many problems with his
|
||
|
plan.
|
||
|
The first problem with S.314 is the most obvious. It has to do
|
||
|
with whether or not the bill is even legal. The Constitution of the
|
||
|
United States is the backbone of our legal structure. If a law
|
||
|
goes against the Constitution, it is unconstitutional, and is
|
||
|
therefore invalid. S.314 violates at least two of the Constitutional
|
||
|
Amendments. According to Crowley, "Civil rights groups say
|
||
|
legislation would create enormous new intrusion of privacy and free
|
||
|
speech (A1)." The amendments that deal with these rights are the
|
||
|
First and Fourth Amendments.
|
||
|
The First Amendment states the "Congress shall make no law . .
|
||
|
. abridging the freedom of speech . . .." And, it is a
|
||
|
Constitutional requirement that any free-speech censorship be as
|
||
|
unrestrictive as possible ("On-line Censorship" 2). Exon's
|
||
|
amendment clearly places limits on free-speech. Also, it is very
|
||
|
broad in that it bars the use of any sexually explicit language.
|
||
|
This law forbids too much free speech to be considered even close to
|
||
|
legal. It is definitely not as unrestrictive as possible, and it
|
||
|
violates the First Amendment.
|
||
|
Holding service providers responsible for the actions of their
|
||
|
customers also violates the Constitution. Holding them responsible
|
||
|
would force service providers to screen all messages
|
||
|
before they were sent. This would be to protect themselves against
|
||
|
prosecution. Forcing them to do this violates the Fourth Amendment,
|
||
|
which is "The right of the people to be secure in their
|
||
|
persons, houses, papers, and effects, against unreasonable searches
|
||
|
and seizures . . .." The Fourth is our guarantee to the right of
|
||
|
privacy, which S.314 clearly goes against. Forcing service
|
||
|
providers may, in fact, violate the Eighth Amendment, which is that
|
||
|
no excessive bail or fines be imposed, or cruel and unusual
|
||
|
punishment inflicted. Isn't it excessive to fine someone for a
|
||
|
crime they didn't commit, or even know about? I feel that this would
|
||
|
be an unusual punishment.
|
||
|
There aren't only legal problems with S.314, but there are
|
||
|
practical problems with the bill as well. One problem is that our
|
||
|
government is trying to put restrictions on an information
|
||
|
infrastructure that doesn't only exist in the United States, but is
|
||
|
global. To an internet user, it is not hard to set up an internet
|
||
|
account overseas, where pornography is legal, fill it with sexually
|
||
|
explicit and obscene materials, and leave it open to the public.
|
||
|
Because of today's technology, this is a piece of cake. It isn't
|
||
|
practical to have a law that can be circumnavigated without
|
||
|
blinking an eye.
|
||
|
Another practical problem is the sheer volume of messages sent
|
||
|
through the Internet daily. According to Seiger, service providers
|
||
|
would have to closely look at every private communication, E-mail
|
||
|
message, public forum post, mailing list document, and file archive
|
||
|
carried by its network (1). On Prodigy, just one of at least a
|
||
|
dozen commercial service providers, approximately 75,000 messages are
|
||
|
transmitted daily (Yang 71). The number of transmitions in the
|
||
|
Unites States daily is so high that nobody even wants to speculate on
|
||
|
the number. Just who is going to do all of this reading of messages?
|
||
|
It's just not practical to censor 75,000 multiplied by 12 messages
|
||
|
every day. And that is only commercial access providers.
|
||
|
There are many private service providers as well. According to
|
||
|
Seiger, bulletin board services account for one-third of all netizens
|
||
|
(internet citizens) (2). File archives in the United Stated
|
||
|
contain billions of files, all of which would have to be gone
|
||
|
through, piece by piece, to eliminate any prohibited material. The
|
||
|
amount of information available on, and sent through the National
|
||
|
Information Infrastructure is too enormous to be controlled.
|
||
|
In addition to legal problems, S.314 could create some other
|
||
|
negative results. The first problem that could be created is, in
|
||
|
fact, because of the legal problems that are present. If this
|
||
|
bill is allowed into law, although it completely violates two
|
||
|
amendments and may violate a third, it would weaken the Constitution.
|
||
|
Each time the Constitution is violated, it is easier and easier to
|
||
|
violate it again. That is a bad thing. The Constitution is the main
|
||
|
piece of paper that upholds our legal system. The rights granted to
|
||
|
us in the Constitution are ours as Americans, and should be
|
||
|
protected to the fullest. The Constitution is for the people, and
|
||
|
the government is by the people, and therefore, the people should get
|
||
|
the rights guaranteed them. Our rights are precious, and
|
||
|
nobody has the right to take them away.
|
||
|
According to a poll I took of Internet users, there would also
|
||
|
be a decline in the popularity on the Internet. I put out a poll, and
|
||
|
the results showed that 76% of people in various Usenet News
|
||
|
discussion groups said that if S.314 is passed, they would either use
|
||
|
the Internet less, or stop using it altogether. Further, 42 out of
|
||
|
the 60 bulletin board operators and system operators that responded
|
||
|
to the on-line questionaire said that they would have to severely
|
||
|
restrict their internet access, or cut it out completely. That is a
|
||
|
big cut in the population of the Internet.
|
||
|
Because of such a decline in Internet popularity, A variety of
|
||
|
other problems are possible. The free-speech and democracy
|
||
|
represented in the Internet would come to a halt. One of the
|
||
|
features that makes the Internet so popular is that it puts people
|
||
|
around the world in touch. One example of how the Internet was used
|
||
|
in democracy is a nationwide protest against the bill. Through
|
||
|
discussion groups and E-mail, organizers of the protest
|
||
|
reached students on over 100 campuses. Because of the speed and ease
|
||
|
with which the protest was started, and because of the
|
||
|
"broad coalitions of student groups" reached, are evidence,
|
||
|
organizers say, of how the Internet has changed communication and
|
||
|
democracy. Without the number of people currently on the
|
||
|
Internet, (which would drop) this type of speed isn't possible
|
||
|
(Herszenhorn A 29).
|
||
|
Another example of the democracy available on the Internet is
|
||
|
the petition against S.314 that can be signed through electronic mail.
|
||
|
If this bill is passed, the Internet as we know it would not
|
||
|
be the same. The Internet, as it stands now is a powerful democratic
|
||
|
force, and most of the people who use it do not want to see it change.
|
||
|
One other possible change that would be brought about by S.314
|
||
|
is negative on the economy. All of the people that use the Internet
|
||
|
pay for the service. Wether they pay for it in tuition, pay
|
||
|
per hour, or pay a once a month fee, they pay. It would make sense
|
||
|
that if fewer people are on the Internet, there would be less spending
|
||
|
on the Internet, and the less money people spend, the worse it is for
|
||
|
the economy. With such a decrease in the popularity of the
|
||
|
Internet (a major advertising strategies of computer vendors), there
|
||
|
would also be less spending on computers and high-tech equipment.
|
||
|
Thirty-eight percent of all economic growth in the U.S. since 1990 has
|
||
|
been due to business and consumer spending on high-tech equipment
|
||
|
(Mandel 22). While there are no estimates on how badly the economy
|
||
|
would be affected by the passing of the bill, clearly the effects
|
||
|
would be negative.
|
||
|
There are, however possible alternatives to S.314. The
|
||
|
government could re-draft the bill, which they are considering, to fit
|
||
|
within First and Fourth Amendment guidelines. To do this, the
|
||
|
speech regulated would have to be significantly narrowed. For
|
||
|
example, child pornography and such materials that are currently
|
||
|
illegal to sell and possess in the U.S. would be prohibited. To fit
|
||
|
within Fourth Amendment rights, only public forums such as the Usenet
|
||
|
Newsgroups would be monitored for illegal materials. The Fourth
|
||
|
Amendment would have to be protected, and public forums are fair game
|
||
|
to prosecutors. Another piece that would need to be taken care of is
|
||
|
the provision that calls for the prosecution of service providers.
|
||
|
You can't hold one person responsible for the actions of another.
|
||
|
Another alternative to the bill would be to drop it altogether.
|
||
|
Then the government could invest in technology that would let parents
|
||
|
control what kind of material is available to their children.
|
||
|
Electronic lockout devices would be feasible for this type
|
||
|
of control.
|
||
|
One other possible alternative would be to let the Internet
|
||
|
Users, being that the Internet is worldwide, govern themselves. It is
|
||
|
working so-far. I have seen at least 25 people already turn
|
||
|
in fellow Internet users for hate-mail and child pornography.
|
||
|
Internet users do not want to see the Information Superhighway turned
|
||
|
into a red-light district, just as much as Exon doesn't want to see
|
||
|
it. Let us set the standards for what is suitable for our net.
|
||
|
With all of the problems related to S.314, it would not be a
|
||
|
good idea for it to become law. The bill's language is too
|
||
|
restrictive, and the language restricted is too broad. It isn't
|
||
|
practical to regulate a world wide computer net, and the sheer volume
|
||
|
of notes transmitted daily in the U.S. makes it ridiculous to control.
|
||
|
Furthermore, the provisions of S.314 are not in accordance with
|
||
|
the Constitution. And to top off all of that, there are some very
|
||
|
possible, and very real, negative side effects that could come from
|
||
|
the passing of S.314. While the bill is intended to protect
|
||
|
children and adults from being harassed and being offended, there
|
||
|
must be another way to do it. Evidently S.314 is not the route to
|
||
|
clean up the Information Superhighway.
|
||
|
|
||
|
_Works Cited_
|
||
|
Bruce, James and Richard Pfhol. "Analysis-S.314, The Communications
|
||
|
Decency Act of 1995." INTERNET. Electronic Messaging Association.
|
||
|
2/7/95.
|
||
|
|
||
|
Crowley, Stephen. "Senate Panel Backs Smut Ban on Internet."
|
||
|
_The_New_York_Times_. 24 March, 1995. A1+.
|
||
|
|
||
|
Exon, James. "We Can't Allow Smut on the Internet." Editorial.
|
||
|
_The_Washington_Post_. 9 March, 1995. A20.
|
||
|
|
||
|
"Fight Online Censorship." _ACLU_CyberLiberties_Alert_. INTERNET.
|
||
|
ACLU Information. 2/23/95.
|
||
|
|
||
|
Herszenhorn, David. "Students Turn to Internet for Nationwide
|
||
|
Protest Planning." _The_New_York_Times_. 29 March, 1995. A29.
|
||
|
|
||
|
Mandel, Michael. "The Digital Juggernaut." _BusinessWeek_. The
|
||
|
Information Revolution. 22+.
|
||
|
|
||
|
Seiger, John. "Senator Exon Introduces Online Indecency
|
||
|
Legislation." _CDT_Policy_Post. INTERNET. News: alt.talk.EFF.
|
||
|
2/9/95.
|
||
|
|
||
|
United States Congress. "Communications Act of 1934." U.S.C. 223.
|
||
|
Washington, DC: GOP, 1934.
|
||
|
|
||
|
United Stated Congress. Senate. "Communications Decency Act of
|
||
|
1995." 104th Congress. S.314 Washington, DC: GOP, 1995.
|
||
|
|
||
|
_United_States_Constitution_. Amendment One.
|
||
|
|
||
|
_United_States_Constitution_. Amendment Four.
|
||
|
|
||
|
_United_States_Constitution_. Amendment Eight.
|
||
|
|
||
|
Written By,
|
||
|
Brian Kurzynowski
|
||
|
kurz4768@elan.rowan.edu
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 1 May 1995 18:56:47 -0500
|
||
|
From: Robert E. Jones <rejones@whale.st.usm.edu>
|
||
|
Subject: File 3--SotMESC Announcement
|
||
|
|
||
|
SotMESC
|
||
|
P.O. Box 573
|
||
|
Long Beach, Ms 39560
|
||
|
|
||
|
http://www.mindvox.com/~king
|
||
|
|
||
|
Founded in 1989, this organization is dedicated to preserving the
|
||
|
integrity and cohesion of the computing society. By promoting computer
|
||
|
education, liberties and efficiency, we believe we can secure freedoms
|
||
|
for all computer users while retaining privacy.
|
||
|
|
||
|
Every month more services, networks, countries and facilities are integrated
|
||
|
into the world-wide networks than ever before. The demand is increasing.
|
||
|
Future network implementations and schemes need to be formulated and put
|
||
|
into place to meet this demand so that everyone can be online throughout
|
||
|
the world. Let us be united together in information and communication.
|
||
|
|
||
|
Join Today !!!
|
||
|
|
||
|
Name:
|
||
|
Address:
|
||
|
|
||
|
Student/Military: $20+ Citizens: $40+ Corporations: $1,000+
|
||
|
Overseas: add $10
|
||
|
|
||
|
All memberships will receive the SotMESC Newsletter to keep informed.
|
||
|
|
||
|
Projects :::
|
||
|
|
||
|
Providing scholarships to promote educated users.
|
||
|
Keeping members informed via the newsletter on events.
|
||
|
Providing Legal commentary to those members with such needs.
|
||
|
Working towards being able to provide a machine to members to gain
|
||
|
-accounts on and Internet services.
|
||
|
Attending conventions and providing reports to the members
|
||
|
-of the SotMESC via the newsletter.
|
||
|
Attending debates to dispute computer roles and cultures.
|
||
|
Providing and conducting panels and debates at conventions.
|
||
|
Recycling used computers and reintroducing them to a societies' needs.
|
||
|
|
||
|
The SotMESC NewsLetter :::
|
||
|
|
||
|
A most informative array of articles and notices. Convention topics
|
||
|
and dates, along with ongoing activities. Computer news on the Network
|
||
|
community. Advice on preventing Government intervention and infiltration.
|
||
|
Networking information and sites. BBS prospects. Monthly mailings.
|
||
|
Internet applications and sites to utilize, free programs listed.
|
||
|
|
||
|
A -MUST- for anyone with a Modem !!! Etc . . .
|
||
|
|
||
|
The SotMESC is a network/bbs/computer affectionado group of people that
|
||
|
wish to protect their services they freely enjoy. This involves goals along
|
||
|
the line of keeping the Internet open to the public and encouraging a wide range
|
||
|
of applications for it, promoting BBS services, protecting privacy, watching
|
||
|
the government and private business to ensure no foul-play, and the like.
|
||
|
|
||
|
Our scholaraship is open to those with interests in the computer
|
||
|
realm to get a chance to broaden their horizons and get an opportunity to
|
||
|
apply themselves by going to college. We are promoting this to the users
|
||
|
in the hacker community who do not get such a chance as often as their
|
||
|
intelligence would dispute.
|
||
|
|
||
|
Our notable members include: Pentagon personnel, Hacker convention
|
||
|
organizers, Members of various hacker organizations, Security consultants,
|
||
|
International representatives and others associated with these fields,
|
||
|
Commercial owners, legal representatives, and site Administrators.
|
||
|
|
||
|
I hope this helps explain some things we do . . And what we are.
|
||
|
|
||
|
|
||
|
SotMESC
|
||
|
P.O. Box 573
|
||
|
Long Beach, Ms 39560
|
||
|
|
||
|
Anyone on the networks, bulletin boards or familiar with the issues
|
||
|
of the computer realm can now get more information in an up-to-date
|
||
|
format by joining the SotMESC. Our newsletters come out on a monthly
|
||
|
basis and feature articles about current computer legislation, conventions,
|
||
|
Internet sites and information, bulletin board numbers of value, and
|
||
|
details of the activities we are conducting to promote computer usage
|
||
|
over the lines, networks and courts.
|
||
|
|
||
|
Getting this newsletter is conditional to joining the SotMESC in
|
||
|
helping us provide programs and funding for projects to secure computer
|
||
|
usage and education. These projects include our scholarship fund,
|
||
|
computer relocation program for discarded systems, counseling, promoting
|
||
|
responsible laws for computer usage, and associated activities.
|
||
|
|
||
|
To get this information, and your membership in the SotMESC,
|
||
|
send your contributions to the address above.
|
||
|
|
||
|
Students - $20 Citizen - $40 Corporate - $1,000
|
||
|
|
||
|
If you are interested in keeping up with what is happening on the
|
||
|
Internet, and the multitudes of networks incorporated, you need to join
|
||
|
the SotMESC. Our newsletter is packed with information on a monthly
|
||
|
basis full of FTP Sites, Gopher information, Telnet access, mosaic, other
|
||
|
services and applications, and many events occurring.
|
||
|
|
||
|
This service is a virtual history of who is doing what when and where.
|
||
|
Never be lost again on finding applications, programs or help. And the best
|
||
|
part is, a portion of all proceeds put into our organization goes back into
|
||
|
the Internet. We have hosted conferences at conventions, on networks and
|
||
|
in work groups. For students, we have initiated a scholarship program to
|
||
|
promote the literacy of network cooperation. And as we grow, we hope that
|
||
|
one day we can provide a free server on the Internet to all members to
|
||
|
utilize to its fullest extent.
|
||
|
|
||
|
As the Internet grows, grow with it. Subscribe today.
|
||
|
|
||
|
SotMESC
|
||
|
P.O. Box 573
|
||
|
Long Beach, Ms 39560
|
||
|
|
||
|
F R E E D O M P R I V A C Y
|
||
|
|
||
|
Beliefs :::
|
||
|
|
||
|
We oppose the Clipper Chip and secret encryption techniques.
|
||
|
We believe in Freedom on the networks for public access.
|
||
|
We believe in Privacy for every individual on the networks.
|
||
|
We oppose the restriction of information on the networks.
|
||
|
We approve of the advancement of technology and intelligence.
|
||
|
We strive for a higher education for all via the networks.
|
||
|
We work to integrate the world in cooperation on the networks.
|
||
|
|
||
|
--Distribute to those that wish to know more about the Internet--
|
||
|
|
||
|
The SotMESC scholarship fund is to advance those that wish to
|
||
|
learn more about the computer sciences, their applications and
|
||
|
cultures.
|
||
|
|
||
|
The qualifications are for the person desiring such a scholarship
|
||
|
to print a 15-20 page report in APA 4.0 detail an aspect of
|
||
|
computing culture.
|
||
|
|
||
|
All entries will be judged and measured by the SotMESC Scholarship
|
||
|
committee. Those that are accepted will be summarily reviewed by a
|
||
|
second group from the SotMESC and those that are deemed of quality will
|
||
|
receive scholarships based on their weighted averages.
|
||
|
|
||
|
This scholarship is open to anyone. All submissions will become
|
||
|
the property of the SotMESC. All authors will be recognized for their
|
||
|
submissions. Any and all references should be cited.
|
||
|
|
||
|
This fund is open and applicable to all accredited colleges and universities.
|
||
|
The amount of the scholarship and terms will vary accordingly.
|
||
|
|
||
|
|
||
|
SotMESC
|
||
|
P.O. Box 573
|
||
|
Long Beach, Ms 39560
|
||
|
|
||
|
|
||
|
-- Distribute this document freely as you see fit --
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: 29 Apr 1995 13:22:30 -0400
|
||
|
From: "Dave Banisar" <banisar@EPIC.ORG>
|
||
|
Subject: File 4--CFP - Advanced Surveillance
|
||
|
|
||
|
CALL FOR PAPERS
|
||
|
|
||
|
Advanced Surveillance Technologies
|
||
|
|
||
|
Sponsored by
|
||
|
|
||
|
Privacy International, and
|
||
|
Electronic Privacy Information Center
|
||
|
|
||
|
4 September 1995
|
||
|
|
||
|
Copenhagen, Denmark
|
||
|
|
||
|
|
||
|
Overview
|
||
|
|
||
|
Over the past decade, fundamental changes have taken place in the
|
||
|
nature and the environment of surveillance. New information systems
|
||
|
offer an unprecedented ability to identify, monitor and track a
|
||
|
virtually limitless number of individuals. Some leading-edge
|
||
|
technologies are likely to revolutionize the practice of
|
||
|
surveillance. The factors of cost, scale, size, location and
|
||
|
distance have, in many instances, become largely irrelevant.
|
||
|
|
||
|
The impact of political and economic change throughout the world has
|
||
|
also created unforeseen dimensions to surveillance. The evolution of
|
||
|
a Global Information Infrastructure will have a profound impact on
|
||
|
the scope of potential surveillance of individuals. The end of the
|
||
|
cold war and the privatization of public sector activities has
|
||
|
magnified the impact of change. The merging of technologies has also
|
||
|
created new opportunities for wide-scale surveillance.
|
||
|
|
||
|
The nature of surveillance has changed to the extent that modern
|
||
|
information systems involve a pre-requisite of general surveillance
|
||
|
of populations. The pursuit of perfect identity has created a rush
|
||
|
to develop systems which create an intimacy between people and
|
||
|
technology. Advanced biometric identification and sophisticated ID
|
||
|
card systems combine with geographic tracking to create the
|
||
|
potential to pinpoint the location of any individual. The use of
|
||
|
distributed databases and data matching programs makes such tracking
|
||
|
economically feasible on a large scale.
|
||
|
|
||
|
Extraordinary advances have recently been made in the field of
|
||
|
visual surveillance. Closed Circuit Television (CCTV) systems can
|
||
|
digitally scan, record, reconfigure and identify human faces, even
|
||
|
in very poor light conditions. Remote sensing through advanced
|
||
|
satellite systems can combine with ground databases and
|
||
|
geodemographic systems to create mass surveillance of human
|
||
|
activity.
|
||
|
|
||
|
The globalization of information systems will take information once
|
||
|
and for all away from the protection and jurisdiction of national
|
||
|
boundaries. The development of data havens and rogue data states is
|
||
|
allowing highly sensitive personal information to be processed
|
||
|
outside any legal protection.
|
||
|
|
||
|
At a more intimate level, research is underway in more than a dozen
|
||
|
countries with the aim of implanting microchip technology directly
|
||
|
into the human brain. US and European medical institutes have
|
||
|
already conducted many such operations. The creation of a direct
|
||
|
link between the human brain and computer technology is at an
|
||
|
advanced stage. Such procedures are initially aimed at stimulating
|
||
|
dead senses and paralyzed limbs. Within two decades, it is possible
|
||
|
that such implants will be at a sufficiently advanced stage to
|
||
|
enable complex interaction between the brain and external
|
||
|
technology.
|
||
|
|
||
|
The science of nanotechnology, which involves the re-configuration
|
||
|
of individual atoms and molecules, will present the potential for
|
||
|
virtually undetectable covert surveillance.
|
||
|
|
||
|
These and other developments are changing the nature and meaning of
|
||
|
surveillance. Law has scarcely had time to address even the most
|
||
|
visible of these changes. Public policy lags behind the technology
|
||
|
by many years. The repercussions for privacy and for numerous other
|
||
|
aspects of law and human rights need to be considered sooner rather
|
||
|
than later.
|
||
|
|
||
|
This one day conference will present an overview of these
|
||
|
leading-edge technologies, and will assess the impact that they may
|
||
|
have in the immediate future. Experts and analysts will discuss the
|
||
|
nature and application of the new technologies, and the public
|
||
|
policy that should be developed to cope with their use.
|
||
|
|
||
|
The conference theme is unique, and interest in the event has
|
||
|
already been expressed from throughout the world.
|
||
|
|
||
|
|
||
|
Program contents
|
||
|
|
||
|
The first session will assess new dimensions in current surveillance
|
||
|
technologies. The remainder of the day will be devoted to exploring
|
||
|
technologies which are in the formative stage of development.
|
||
|
|
||
|
Preliminary List of Topics:
|
||
|
|
||
|
o Advanced Satellite Surveillance
|
||
|
o Microchip Implants
|
||
|
o Nanotechnology
|
||
|
o Biometrics and perfect identity
|
||
|
o Advanced Geodemographic Systems
|
||
|
o Data Havens and Rogue Data States
|
||
|
o Information Warfare
|
||
|
o Cryptography
|
||
|
|
||
|
The conference will be held in Copenhagen, and is timed to coincide
|
||
|
with the 17th annual international meeting of privacy and data
|
||
|
protection commissioners.
|
||
|
|
||
|
Number of participants : approximately one hundred
|
||
|
|
||
|
Cost: US $75 - Individuals/non-profit organizations
|
||
|
$175 - Commercial organizations
|
||
|
|
||
|
Privacy International and the Electronic Privacy Information Center
|
||
|
are now requesting abstracts for papers. Papers should be directed
|
||
|
at a general audience, and should either present an overview of an
|
||
|
aspect of advanced surveillance technology, or they should discuss
|
||
|
the likely use and impact of the technology.
|
||
|
|
||
|
Abstracts or papers can be emailed to Privacy International at:
|
||
|
pi@privacy.org
|
||
|
|
||
|
Alternatively, they can be sent to :
|
||
|
|
||
|
Privacy International Washington Office
|
||
|
666 Pennsylvania Ave, SE, Suite 301
|
||
|
Washington, DC 20003 USA
|
||
|
1-202-544-9240 (phone)
|
||
|
1-202-547-5482 (fax)
|
||
|
|
||
|
|
||
|
Web address: http://privacy.org/pi/
|
||
|
gopher/ftp cpsr.org /cpsr/privacy/privacy_international/
|
||
|
|
||
|
==================================================================
|
||
|
|
||
|
David Banisar (Banisar@epic.org) * 202-544-9240 (tel)
|
||
|
Electronic Privacy Information Center * 202-547-5482 (fax)
|
||
|
666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org
|
||
|
Washington, DC 20003 * HTTP://epic.digicash.com/epic
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.35
|
||
|
************************************
|
||
|
|