845 lines
44 KiB
Plaintext
845 lines
44 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Oct 18, 1992 Volume 4 : Issue 52
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Copy Editor: Etaion Jhrdleau, Sr.
|
|||
|
|
|||
|
CONTENTS, #4.52 (Oct 18, 1992)
|
|||
|
File 1--Fixed Problems With The AOTD Mailserver
|
|||
|
File 2--More on Inslaw -- Justice Dept response
|
|||
|
File 3--The Essence of Programming
|
|||
|
File 4-- CPSR Social Action Report
|
|||
|
File 5--Making the News and Bookstands (Reprint)
|
|||
|
File 6--Legion Of Doom Connection With 911 Attacks Denied
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
|||
|
anonymous ftp from ftp.eff.org (192.88.144.4), ftp.ee.mu.oz.au
|
|||
|
and red.css.itd.umich.edu -- the texts are in /cud.
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 16 Oct 1992 18:13:55 EDT
|
|||
|
From: Chris Cappuccio <chris%aotnet@mcnnet.mi.org>
|
|||
|
Subject: File 1--Fixed Problems With The AOTD Mailserver
|
|||
|
|
|||
|
Ok, well after I got my computer connected with UUCP (I'm still not a
|
|||
|
registered system but soon I expect to register with the local UUCP
|
|||
|
stuff and also get a domain name in mi.org), I tried to subscribe to
|
|||
|
the AOTD list with my account on my machine (aotnet) but I couldn't.
|
|||
|
It turned out, because we put some more security from people using the
|
|||
|
mailing list, that Mike also accidentaly changed the list name. Well
|
|||
|
this is fixed now. To subscribe to Art of Technology Digest, do
|
|||
|
*exactly* this:
|
|||
|
|
|||
|
mail mailserv@batpad.lgb.ca.us Leave the "Subject" line blank Put this
|
|||
|
in the text of your message: SUBSCRIBE AOTD
|
|||
|
|
|||
|
and you will be put on the mailing list. You should wait 1-24 hours
|
|||
|
for a response. I am not using my computer as the mailserver because I
|
|||
|
only have a 2400 baud (or bps, whatever you like) modem and no
|
|||
|
mailserver software. Oh, one more thing, you can get back issues of
|
|||
|
AoT-D from wuarchive.wustl.edu under directory: /pub/aot/. Enjoy!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 15 Oct 1992 22:58:43 -0700
|
|||
|
From: James I. Davis <jdav@WELL.SF.CA.US>
|
|||
|
Subject: File 2--More on Inslaw -- Justice Dept response
|
|||
|
|
|||
|
From-- Nigel.Allen@lambada.oit.unc.edu
|
|||
|
Subject-- U.S. Justice Department Statement on Inslaw Affair
|
|||
|
To-- Multiple recipients of list ACTIV-L
|
|||
|
|
|||
|
Here is a press release from the U.S. Department of Justice.
|
|||
|
|
|||
|
Justice Department Releases Statement
|
|||
|
To: National Desk
|
|||
|
Contact: U.S. Department of Justice, Public Affairs, 202-514-2007
|
|||
|
|
|||
|
WASHINGTON, Oct. 13 -- The Department of Justice released today
|
|||
|
the following statement:
|
|||
|
|
|||
|
Attorney General William P. Barr today told the House Committee on
|
|||
|
the Judiciary that he will not seek the appointment of an Independent
|
|||
|
Counsel as requested in a Sept. 10 letter from a majority of the
|
|||
|
committee's Democratic members. His reasons for this decision were
|
|||
|
set forth in a letter to the Committee. Under the Independent Counsel
|
|||
|
statute, only the committee can make these materials public, and the
|
|||
|
attorney general has asked that it do so.
|
|||
|
|
|||
|
The Sept. 10 letter requested the appointment of an independent
|
|||
|
counsel to investigate allegations contained in a report adopted by
|
|||
|
the committee's Democratic majority members entitled, "The Inslaw
|
|||
|
Affair" (Report).
|
|||
|
|
|||
|
The independent counsel statute was designed to apply to certain
|
|||
|
exceptional cases. Accordingly, the statute's specialized procedures
|
|||
|
are triggered in two specifically defined circumstances -- one
|
|||
|
mandatory and one discretionary.
|
|||
|
|
|||
|
The mandatory provision, 28 U.S.C. 591 (a), requires the attorney
|
|||
|
general to apply the procedures of the statute if and when he receives
|
|||
|
specific and credible information sufficient to warrant a criminal
|
|||
|
investigation of a "covered person." Covered persons' are a small
|
|||
|
group of the most senior officials in the Executive Branch who are
|
|||
|
specifically listed in the statute.
|
|||
|
|
|||
|
The discretionary provision of the statute, 28 U.S.C. 591 (c),
|
|||
|
authorizes, but does not require, the Attorney General to proceed
|
|||
|
under the statute if: (1) he receives specific and credible
|
|||
|
information sufficient to warrant a criminal investigation of someone
|
|||
|
other than a "covered person"; and (2) he determines that an
|
|||
|
investigation or prosecution of that person by the Attorney General or
|
|||
|
other officer of the Department "may result in a personal, financial
|
|||
|
or political conflict of interest."
|
|||
|
|
|||
|
The department has concluded that the report contains no specific
|
|||
|
information that any "covered person" has committed a crime.
|
|||
|
|
|||
|
Regarding "non-covered" persons, long before the committee
|
|||
|
completed its report, Attorney General Barr appointed retired U.S.
|
|||
|
District Judge Nicholas J. Bua as special counsel to investigate all
|
|||
|
matters related to INSLAW. Judge Bua has had an outstanding judicial
|
|||
|
career which has spanned almost thirty years. He has served on the
|
|||
|
county, circuit and appellate courts in Illinois, and in 1977,
|
|||
|
President Carter appointed him to the U.S. District Court in Chicago.
|
|||
|
|
|||
|
Judge Bua has full authority to conduct a thorough and complete
|
|||
|
investigation of all INSLAW allegations -- including the power to
|
|||
|
issue subpoenas and to convene grand juries. He is conducting his
|
|||
|
investigation in a fair and impartial manner. The attorney general's
|
|||
|
instructions included from the outset of this investigation for Judge
|
|||
|
Bua to notify him of any information implicating the independent
|
|||
|
counsel statute. Judge Bua found no evidence to support invoking the
|
|||
|
mandatory or discretionary provisions of the independent counsel
|
|||
|
statute before the report was issued, or since reviewing the report.
|
|||
|
|
|||
|
After an exhaustive review of the allegations, in accordance with
|
|||
|
the requirements of the statute, the Attorney General will not seek
|
|||
|
the appointment of an Independent Counsel at this time. The
|
|||
|
department invites the committee, Congress, or any other source, to
|
|||
|
provide any new information that warrants invoking the independent
|
|||
|
counsel statute.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 13 Oct 92 01:15:59
|
|||
|
From: The Dark Adept <drkadpt@DRKTOWR.CHI.IL.US>
|
|||
|
Subject: File 3--The Essence of Programming
|
|||
|
|
|||
|
The Essence of Programming
|
|||
|
by The Dark Adept
|
|||
|
|
|||
|
What exactly is a computer program? Why do people wish to copyright
|
|||
|
it? Why do people wish to patent its effects? Why do programmers
|
|||
|
enjoy programming?
|
|||
|
|
|||
|
A lot of these questions cannot be answered in a straightforward
|
|||
|
manner. Most people would give you a different answer for each, but
|
|||
|
there is an indirect answer: the essence of programming.
|
|||
|
|
|||
|
In a recent CuD issue a question was raised about Cyberspace being a
|
|||
|
culture. I am no sociologist, but it is apparent to me that every
|
|||
|
culture has some form of artistic expression. Cyberspace is no
|
|||
|
different. Beneath every piece of E-mail, beneath every USENET post,
|
|||
|
beneath every word typed into a word processor is an underlying piece
|
|||
|
of art hidden from the user's eyes: the computer program.
|
|||
|
|
|||
|
"A computer program is art? Is this guy nuts?" Well, yes and no in
|
|||
|
that order ;) Art has many different definitions, but a few things
|
|||
|
are apparent about true art. True art is an extension of the artist.
|
|||
|
It is his view of the world around him. It contributes to his world,
|
|||
|
not only aesthetically, but by influencing people. This is true
|
|||
|
whether the art form is music, sculpture, photography, dance, etc.
|
|||
|
True art is also created. It fulfills the artist's need to create.
|
|||
|
It is no less his creation and part of him than his own child.
|
|||
|
|
|||
|
The source code for a computer program is art pure and simple.
|
|||
|
Whether it is written by one programmer or many. Each programmer
|
|||
|
takes his view of the world the art will exist in (the core memory of
|
|||
|
the computer and the other programs around it), and shapes the program
|
|||
|
according to that view. No two programmers program exactly alike just
|
|||
|
as no two authors will use the same exact sentence to describe the
|
|||
|
same thing.
|
|||
|
|
|||
|
And the computer program will influence people. Aesthetic value may
|
|||
|
come from either video games, fractal generators, or even a hot new
|
|||
|
GUI (graphical user interface -- like MS-Windows(tm)). But it does
|
|||
|
more than this. It changes how people work, how people think. The
|
|||
|
typist of the 1920's most certainly would look upon his work much
|
|||
|
differently than the word processing secretary of the 1990's would
|
|||
|
look upon his. No longer is the concern restricted to "should I
|
|||
|
single- or double-space," but also to "what font should I use? What
|
|||
|
size?"
|
|||
|
|
|||
|
Furthermore a computer program is interactive art. Once the program
|
|||
|
is written and executed, people interact with it. Other machines
|
|||
|
interact with it. Other programs interact with it. In fact, it is
|
|||
|
not only interactive art, but *living* art. It reaches its fullest
|
|||
|
not when looked at and appreciated, but put to use and appreciated.
|
|||
|
It is not created to sit in the corner and be enjoyed, but also to be
|
|||
|
interacted with and brought to life.
|
|||
|
|
|||
|
And just as the literary world had artists whose influence upon
|
|||
|
society was negative instead of positive, their works are also art.
|
|||
|
Hitler, Manson, Machiavelli, etc. all wrote great works whose
|
|||
|
influence tore apart society and crippled it. However, even though
|
|||
|
their work caused evil, it is nonetheless a form of art. _Mein Kampf_
|
|||
|
caused more deaths in this world than almost any other publication.
|
|||
|
For one piece of printed text to have this great of an effect on
|
|||
|
society, the soul of the writer must be within those words. In another
|
|||
|
vein, think of the Bible. Wars have been fought over it, miracles
|
|||
|
have happened because of it, people have laughed and cried over it.
|
|||
|
The reason is that the soul of the reader is stirred by the authors'
|
|||
|
souls who are in the work itself. In any case, even thought _Mein
|
|||
|
Kampf_ caused much evil, no one can deny that it was a powerful work
|
|||
|
full of Hitler's soul, and deserves study and thought.
|
|||
|
|
|||
|
The negative art of the programming world would most certainly be
|
|||
|
viruses and worms. Whether the author follows from Hitler and is bent
|
|||
|
on the destruction of all unlike him, or is more of a scientist trying
|
|||
|
to create life that is autonomous from the creator and it gets out of
|
|||
|
hand like Dr. Frankenstein's, they are still great works. The
|
|||
|
miniscule amount of "words" in a virus program can cause a greater
|
|||
|
effect on people than the millions of "words" used to create DOS.
|
|||
|
There is an elegant evil to them like there is to Machiavelli's _The
|
|||
|
Prince_ which deserves study and thought.
|
|||
|
|
|||
|
To ban viruses, to ban worms is to ban the free expression and the
|
|||
|
free thought of the artist. Yes, they should be stopped, but so
|
|||
|
should the genocide proscribed in _Mein Kampf_. However, neither the
|
|||
|
writing of _Mein Kampf_ nor the writing of viruses should be
|
|||
|
disallowed and neither should their reading be restricted since if
|
|||
|
nothing else both serve as a warning of what could happen if a
|
|||
|
brilliant madman bent on killing and destruction is given an
|
|||
|
opportunity to fulfill those psychotic fantasies.
|
|||
|
|
|||
|
For those programmers out there who have dabbled in Object Oriented
|
|||
|
Programming (OOP), this relationship between art and programming
|
|||
|
should be even clearer. In OOP, each part of the program is an actor
|
|||
|
("who struts and frets" -- thanks, Bill) whose dialogue with the other
|
|||
|
actors (objects) creates the play. Each object has his own
|
|||
|
personality and capabilities, and, sadly enough, tragic flaws as well.
|
|||
|
|
|||
|
Now as for copyrighting and patenting and other such topics, I give
|
|||
|
you this to think about. Who is the truer author of a great work:
|
|||
|
Jackie Collins or Edgar Allen Poe? Why would each copyright? One
|
|||
|
would copyright to protect their income, the other to protect their
|
|||
|
child borne of their artistic expression. Computer programs should be
|
|||
|
allowed protection in various forms, but to protect the inspiration
|
|||
|
and expression within and not the dollar value generated by them. To
|
|||
|
do so cheapens them and turns them into nothing more than trash
|
|||
|
romance novels. Both may serve their purpose and be useful, but only
|
|||
|
one is a great work -- the intent of the author comes from his soul as
|
|||
|
well as his work, and only those of the purest origins will be great
|
|||
|
while the others may only be useful.
|
|||
|
|
|||
|
Like many artists, the programmer pours his blood and sweat, his heart
|
|||
|
and soul into his work. It is his child, a creation from his brow and
|
|||
|
hand, and he loves it as such.
|
|||
|
|
|||
|
The essence of programming is the essence of the artist within the
|
|||
|
programmer. To cheapen it by calling it a "product" is like calling
|
|||
|
the "Mona Lisa" a product. Sure a price value can be placed on the
|
|||
|
Mona Lisa, but the value stems from the affect that Leo's paint has
|
|||
|
upon the observer, and not a sum cost of materials and labor so that a
|
|||
|
profit of an acceptable margin is met and maintained.
|
|||
|
|
|||
|
Those who aren't programmers may not understand what I am talking
|
|||
|
about, and there are programmers out there who may not understand what
|
|||
|
I am talking about. However a select few may understand what I am
|
|||
|
saying, and they are the true programmers and the true artists of
|
|||
|
Cyberspace. Within them is the essence of the programmer and within
|
|||
|
their source code is the essence of programming: their souls.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 9 Oct 1992 13:40:01 EDT
|
|||
|
From: Jeff Johnson <jjohnson@HPLJAJ.HPL.HP.COM>
|
|||
|
Subject: File 4-- CPSR Social Action Report
|
|||
|
|
|||
|
TOWARDS A GUIDE TO SOCIAL ACTION FOR COMPUTER PROFESSIONALS
|
|||
|
|
|||
|
By Jeff Johnson, Chair, and Evelyn Pine, Managing Director,
|
|||
|
Computer Professionals for Social Responsibility (CPSR)
|
|||
|
|
|||
|
Introduction
|
|||
|
|
|||
|
"Being a typical nerd programmer, it's always been comforting
|
|||
|
to believe that somehow whatever I was working on in the
|
|||
|
darkness of my cubicle would eventually benefit the world. ...
|
|||
|
I focused on what was interesting to me, assuming that it
|
|||
|
would also be important to the world. But the events in L.A.
|
|||
|
have forced me to think that maybe it doesn't work that way;
|
|||
|
and to confront the question: what can I, as a professional
|
|||
|
in the HCI field, do to help change what's going on in the
|
|||
|
world?" -- a CHI'92 attendee.
|
|||
|
|
|||
|
The Rodney King video, trial, verdict, and subsequent riots jolted
|
|||
|
Americans in many ways besides showing us acts of violence committed
|
|||
|
by police and citizens. It also made the inequities of American
|
|||
|
society painfully clear, and provided a clear response to Langston
|
|||
|
Hughes' question: "What happens to a dream deferred?" Answer: it
|
|||
|
explodes. This caused many people to rethink how they are conducting
|
|||
|
their lives, and how we are conducting our neighborhoods, our cities,
|
|||
|
our states, and our nation.
|
|||
|
|
|||
|
Computer professionals have a relatively comfortable position in this
|
|||
|
society. For the most part, we are well-paid, and our jobs are more
|
|||
|
secure than most. As a result, we live in nicer neighborhoods, send
|
|||
|
our kids to better schools, eat healthier food, use better tools, and
|
|||
|
have access to better health care. Because of this, some of us feel a
|
|||
|
responsibility to help those in our society who aren't so well-off,
|
|||
|
and some of us don't.
|
|||
|
|
|||
|
However, computer professionals are not just another well-paid segment
|
|||
|
of society. We, more than people in most other lines of work, create
|
|||
|
world-changing technology, technology that profoundly affects how
|
|||
|
people live, work, and die. We can create technology that, e.g., can
|
|||
|
be used to improve neighborhoods, education, food production and
|
|||
|
distribution, tools, and health care. We can also create technology
|
|||
|
that can be used to keep the poor out of our neighborhoods and
|
|||
|
schools, produce and sell junk food and worthless tools, and limit
|
|||
|
access to health care, as well as keep the lid on discontent and even
|
|||
|
kill people more efficiently.
|
|||
|
|
|||
|
Computer technology can help reduce inequity and it can also help
|
|||
|
exacerbate it. The public learned of the King beating because of
|
|||
|
technology in the hands of citizens. Today anyone with a PC, an
|
|||
|
ink-jet printer, and a copier can produce documents that political
|
|||
|
activists of just thirty years ago, cranking out smelly typewritten
|
|||
|
ditto copies, never imagined. Citizens of China and Thailand used
|
|||
|
fax, video, and electronic mail to document government repression of
|
|||
|
democratic movements. Computer technology is a crucial ingredient of
|
|||
|
all of the above, in their design and manufacture as well as in the
|
|||
|
tools themselves.
|
|||
|
|
|||
|
Unfortunately, the effect of introducing computer technology has more
|
|||
|
often been to increase the stratification of society. Let's face it:
|
|||
|
computer systems often lead to loss of jobs. Furthermore, as the
|
|||
|
infrastructure upon which society is based becomes more dependent upon
|
|||
|
computer technology, those without technical skills are left behind.
|
|||
|
The end of the Cold War and the recession, combined with the
|
|||
|
introduction of computer technology, have served to exacerbate
|
|||
|
joblessness and hopelessness for those who have been rendered
|
|||
|
superfluous and don't have the education to become "knowledge
|
|||
|
workers."
|
|||
|
|
|||
|
"How many of the projects that are funded will have a net result of
|
|||
|
reducing jobs -- particularly jobs for less-educated people? ... I
|
|||
|
find many in the computer industry have defensive rationalizations
|
|||
|
for the fact that their own labor will result in the loss of jobs
|
|||
|
to society. ... The up and coming area of software that I myself
|
|||
|
work in -- workflow -- will automate people out of work. ... How
|
|||
|
do we deal with this?" -- A CHI'92 attendee.
|
|||
|
|
|||
|
This special relationship between computer technology and society
|
|||
|
gives those who develop it -- us -- responsibilities beyond any that
|
|||
|
arise merely from our comfortable economic status. To quote from the
|
|||
|
statement of purpose of Computer Professionals for Social
|
|||
|
Responsibility (CPSR): "Decisions regarding the development and use
|
|||
|
of computers ... have far-reaching consequences and reflect basic
|
|||
|
values and priorities. We believe that computer technology should
|
|||
|
make life more enjoyable, productive, and secure."
|
|||
|
|
|||
|
The King riots jolted us, causing many of us to reflect on whether we
|
|||
|
are living up to our responsibilities as citizens and as computer
|
|||
|
professionals. The contrast between the world we inhabit, of which
|
|||
|
the CHI'92 conference is a part, and the one that exploded into
|
|||
|
violence and flames the week before the conference, caused some of us
|
|||
|
to feel a certain alienation from our work, as the opening quotation
|
|||
|
of this article illustrates. Are we part of the solution, or part of
|
|||
|
the problem? Also, as the effects of the riots rapidly spread to
|
|||
|
surrounding neighborhoods, other cities, and even the presidential
|
|||
|
campaign, it became obvious that the two "worlds" aren't really
|
|||
|
separate. That burning society we saw on TV wasn't someone else's, it
|
|||
|
was ours.
|
|||
|
|
|||
|
What Can I Do? -- The CPSR/CHI'92 "Social Issues" Session
|
|||
|
|
|||
|
In the midst of the worst period of rioting, as many of us were
|
|||
|
preparing to head to Monterey, the site of CHI'92, Prof. Chris Borgman
|
|||
|
of U.C.L.A. sent an e-mail message to several of her acquaintances
|
|||
|
across the country, describing what was going on in L.A. and how she
|
|||
|
and her friends there felt about it (see Shneiderman, 1992). Prof.
|
|||
|
Ben Shneiderman was especially touched by the message. He contacted
|
|||
|
the CHI'92 Co-Chairs, Jim Miller and Scooter Morris, and expressed his
|
|||
|
desire that the conference should not run its course without
|
|||
|
acknowledging the riots and the events that led up to them. Even
|
|||
|
though the riots were not directly CHI- or computer-related, he felt
|
|||
|
that ignoring them constituted burying our heads in the sand, and
|
|||
|
would be morally wrong. Jim and Scooter agreed that something should
|
|||
|
be done, but of course by that point the conference schedule was set.
|
|||
|
They suggested a special session, during the lunch break just after
|
|||
|
the official opening plenary session on Tuesday. Jim also suggested
|
|||
|
that CPSR Chair Jeff Johnson be invited to help plan the session.
|
|||
|
|
|||
|
On Monday evening, Ben and Jeff met to plan the session. What quickly
|
|||
|
emerged was a desire not only to acknowledge the distressing external
|
|||
|
events and give people a chance to vent their spleens, but also to
|
|||
|
help give people the wherewithal to act. To Ben and Jeff, it seemed
|
|||
|
that many of their colleagues were angry, upset, worried, or
|
|||
|
frightened about what was going on, but didn't know what to do about
|
|||
|
it, or even how to find out. They decided that the session should be
|
|||
|
an opportunity for people to share ideas on how computer
|
|||
|
professionals, their employers, and their professional societies can
|
|||
|
help address social problems of the sort that led to the riots. Jeff
|
|||
|
proposed that to facilitate the capture and sharing of ideas, session
|
|||
|
attendees be asked to submit ideas on paper as well as presenting them
|
|||
|
verbally. CPSR volunteered to collect and compile the responses and
|
|||
|
issue a report back to the attendees. Later that night, he created a
|
|||
|
form for action-ideas, labeled "Constructive Responses to Events in
|
|||
|
L.A. and Elsewhere," and made about 60 copies to cover the expected
|
|||
|
audience.
|
|||
|
|
|||
|
The next morning, at the opening plenary session, Jim Miller announced
|
|||
|
the special session. This was the first that the approximately 2500
|
|||
|
attendees at CHI had heard of it.
|
|||
|
|
|||
|
At the announced time, despite the late notice and the conflict with
|
|||
|
lunch, approximately 300 people showed up. Student volunteers quickly
|
|||
|
went to make more copies of the "Constructive Responses..." form. Ben
|
|||
|
Shneiderman expressed his delight at the number of people who had come
|
|||
|
and opened the session, describing his feelings about the riots,
|
|||
|
reading Chris Borgman's e-mail message, and giving the intent of the
|
|||
|
session. Prof. Borgman then spoke, elaborating on her message and
|
|||
|
giving her ideas about what people might do. She was followed by Jeff
|
|||
|
Johnson, who talked about growing up in South Central L.A., what it is
|
|||
|
like for his relatives who live there now, and about CPSR and some of
|
|||
|
its
|
|||
|
programs.
|
|||
|
|
|||
|
Members of the audience were then invited to the microphone to share
|
|||
|
their ideas about what can be done to resolve social inequities. At
|
|||
|
first, people were hesitant to speak, but within fifteen minutes or so
|
|||
|
there were more people waiting to speak than there was time for. Some
|
|||
|
people described volunteer work they do, some named organizations they
|
|||
|
support, some talked about what companies do or should do, and some
|
|||
|
talked about what various government bodies should be, but aren't,
|
|||
|
doing.
|
|||
|
|
|||
|
Beyond CHI'92
|
|||
|
|
|||
|
One hundred and ten members of the audience wrote suggestions on the
|
|||
|
forms and turned them in. After the conference, CPSR began the
|
|||
|
process of compiling the responses and producing the promised report.
|
|||
|
We found volunteers to put the responses on-line. We created an
|
|||
|
e-mail distribution list consisting of respondents who had provided
|
|||
|
e-mail addresses. We took a quick pass through the data, to see if it
|
|||
|
contained ideas worth publishing and sharing. It did.
|
|||
|
|
|||
|
On the basis of our initial look at the responses, the report began to
|
|||
|
take shape in our minds. We didn't think it would suffice to simply
|
|||
|
list all of the ideas that the session attendees had written. A quick
|
|||
|
query sent to the e-mail list confirmed this: session participants
|
|||
|
didn't want the raw data or even lightly-digested data; they wanted a
|
|||
|
well-digested, well-organized guide to social action, a resource
|
|||
|
booklet that goes beyond what people put on their response forms. Not
|
|||
|
everyone has been a volunteer or activist, and even those of us who
|
|||
|
have can benefit from a complete guidebook on how to make a positive
|
|||
|
contribution to society.
|
|||
|
|
|||
|
Producing such a comprehensive report presented CPSR with a challenge,
|
|||
|
for it would require a significant amount of work. For instance, many
|
|||
|
respondents mentioned organizations, but it was up to us to provide
|
|||
|
contact addresses. We also found some suggestions to be out-of-date,
|
|||
|
e.g., organizations that have changed policies. The research
|
|||
|
necessary to produce such a report in the months following CHI'92
|
|||
|
exceeds what CPSR's small staff and volunteer-base can deliver. To
|
|||
|
produce the full report would require funding to allow us to pay for
|
|||
|
some of the labor. We made some initial efforts to get funding, so
|
|||
|
far without success. Nonetheless, we were committed to producing a
|
|||
|
timely report for the CHI'92 session attendees. With encouragement
|
|||
|
from Ben Shneiderman, the two of us decided to write a brief version
|
|||
|
of the report for SIGCHI Bulletin. Hopefully, this brief initial
|
|||
|
report will help attract funding for a full report.
|
|||
|
|
|||
|
This report is therefore intended to be the first deliverable of a
|
|||
|
possible new CPSR project that would, if funded, provide computer
|
|||
|
professionals with information and guidance on how to become "part of
|
|||
|
the solution" to pressing social problems. Depending upon funding,
|
|||
|
subsequent deliverables may include:
|
|||
|
|
|||
|
- a moderated e-mail discussion list on social involvement, - an
|
|||
|
e-mail archive/server for information on social involvement, - the
|
|||
|
aforementioned booklet: "A Guide to Social Action" for computer
|
|||
|
professionals, suitable for companies to distribute to employees,
|
|||
|
containing an overview of the ways to get involved, a categorized
|
|||
|
list of ideas, a directory of organizations, some success examples,
|
|||
|
with a sprinkling of interesting quotes from attendees of the CHI'92
|
|||
|
special session. - a clearinghouse service to help computer
|
|||
|
professionals and companies down the road toward social involvement.
|
|||
|
|
|||
|
In this initial report, we chose to focus on a few of the
|
|||
|
most-commonly-suggested ideas, rather than present a shallow overview
|
|||
|
of all of them. A more complete list will have to wait until the
|
|||
|
booklet. We begin with some comments on what we have learned from
|
|||
|
this exercise, then summarize a few of the suggestions, and conclude.
|
|||
|
|
|||
|
What have we learned from this?
|
|||
|
|
|||
|
"Tell me how I can help." -- a CHI'92 attendee.
|
|||
|
|
|||
|
Despite the stereotype of the apolitical, work-obsessed nerd, computer
|
|||
|
professionals do care about what goes on in the world. Many are
|
|||
|
already involved in volunteer projects, political action, and
|
|||
|
critically examining the impact of their work. More importantly, many
|
|||
|
more are looking for ways to get involved. The King riots really
|
|||
|
shook up a lot of people.
|
|||
|
|
|||
|
The respondents see potential in themselves, their companies, and
|
|||
|
their professional associations, but are concerned that social issues
|
|||
|
often get lost in the shuffle of busy people and companies.
|
|||
|
|
|||
|
CHI conference attendees may not be representative of computer
|
|||
|
professionals in general. Their professional focus on the interaction
|
|||
|
between people and machines may make them more likely to be concerned
|
|||
|
about social issues. However, CPSR members nationwide -- who are not
|
|||
|
predominantly CHI members -- have been proving for over a decade that
|
|||
|
a computer career and interest in social issues are not mutually
|
|||
|
exclusive.
|
|||
|
|
|||
|
There is no shortage of good ideas about how to get involved. The
|
|||
|
hundred and ten respondents in the CPSR-CHI special session have
|
|||
|
provided a first glimpse, but our feeling is that many more good ideas
|
|||
|
remain to be suggested.
|
|||
|
|
|||
|
Many individuals, organizations, and companies are already doing
|
|||
|
things that we can learn from. We needn't design from scratch.
|
|||
|
|
|||
|
Summary of Responses
|
|||
|
|
|||
|
"Education is the single most effective and powerful way to change
|
|||
|
the situation in a permanent way." -- a CHI'92 attendee.
|
|||
|
|
|||
|
Our respondents overwhelmingly saw education as fundamental. They
|
|||
|
believe that individuals, companies, professional societies, and
|
|||
|
various levels of government could be doing much more to support
|
|||
|
education than they now are. For example:
|
|||
|
|
|||
|
- Individuals can tutor disadvantaged kids, teach computer courses
|
|||
|
or run computer labs in schools, and speak in schools about their
|
|||
|
company and their work.
|
|||
|
- Companies can adopt a school, donate equipment and software, and
|
|||
|
establish programs in which students visit the workplace to learn what
|
|||
|
computer professionals do and what skills they need.
|
|||
|
- Professional societies can provide scholarships for high school
|
|||
|
kids, encourage individuals and companies to develop education
|
|||
|
applications of computer technology, and advocate greater public
|
|||
|
funding of education.
|
|||
|
|
|||
|
Many respondents suggested that individuals and companies donate new
|
|||
|
and used computer equipment to schools, community centers, and
|
|||
|
non-profit organizations. However, some pointed out that giving
|
|||
|
antiquated, unreliable, or inappropriate equipment is almost worse
|
|||
|
than unhelpful, in that it can drain valuable time and energy from the
|
|||
|
important work that these organizations do. Accordingly, many
|
|||
|
non-profits will not accept equipment for which they can no longer
|
|||
|
find software, documentation, and maintenance support. To help insure
|
|||
|
that donated equipment is effectively used, computer professionals can
|
|||
|
donate time and expertise. Otherwise, donated equipment may just sit
|
|||
|
in a
|
|||
|
corner.
|
|||
|
|
|||
|
Not surprisingly, volunteerism is strongly advocated by our
|
|||
|
respondents. Some of their suggestions are:
|
|||
|
|
|||
|
- Individuals can volunteer in computer labs, get involved with a
|
|||
|
organizations that link volunteers with non-profit groups (e.g.,
|
|||
|
CompuMentor), or even teach reading in an urban library. A frequent
|
|||
|
comment was that literacy is more important than computer literacy.
|
|||
|
- Companies can encourage volunteerism by helping match willing
|
|||
|
employees with worthy organizations, by allowing employees to share
|
|||
|
their skills on company time, and by honoring employees' volunteer
|
|||
|
efforts.
|
|||
|
- Professional societies can encourage volunteerism among
|
|||
|
professionals by developing mentor programs in which members work with
|
|||
|
urban youth, and by developing computer curricula that professionals
|
|||
|
can take into volunteer teaching situations.
|
|||
|
|
|||
|
"I read to primary students one-half hour per week. I get more out
|
|||
|
of that time than the kids, but their focus on me tells me they are
|
|||
|
getting a lot out of my time also." -- a CHI'92 attendee.
|
|||
|
|
|||
|
Several respondents who are involved in volunteer work noted that
|
|||
|
volunteering has value far beyond that of the actual work that
|
|||
|
volunteers do. It helps build much-needed understanding and trust
|
|||
|
between ethnic and socioeconomic groups. It also is beneficial to the
|
|||
|
volunteers themselves: they gain teaching experience, social skills,
|
|||
|
and a broader perspective on the society in which they live, and often
|
|||
|
have fun while doing it.
|
|||
|
|
|||
|
Computer professionals have learned that access to on-line
|
|||
|
communication and information services is a powerful tool for their
|
|||
|
own education, communication, and activism. We found that many of
|
|||
|
them believe that on-line access would be just as empowering for the
|
|||
|
public at large. Middle-class Americans are already beginning to get
|
|||
|
on-line, but individuals, companies, and professional societies can
|
|||
|
make an extra effort to assure that the poor are not cut out of the
|
|||
|
loop. Individuals, companies, and professional societies can help put
|
|||
|
communities on-line, as has been done in Berkeley (Community Memory
|
|||
|
Project) and Santa Monica (Public Education Network). Such networks
|
|||
|
can facilitate communication and discussion not only with other
|
|||
|
citizens of a local community, but, depending on how they are
|
|||
|
connected to larger networks, with information service providers and
|
|||
|
even elected representatives.
|
|||
|
|
|||
|
"Companies can actively recruit blacks and other minorities. I
|
|||
|
have been at CHI for 2 1/2 days and have seen only two blacks with
|
|||
|
CHI name tags." -- a CHI'92 attendee.
|
|||
|
|
|||
|
More of a commitment to affirmative action in hiring and promotion is
|
|||
|
seen as a major way in which companies can help overcome social
|
|||
|
inequities. This means making an extra effort to find qualified
|
|||
|
minorities and women to fill jobs, and, when candidates are equally
|
|||
|
qualified (i.e., the difference in their estimated ability to perform
|
|||
|
the job is less than the margin of error of the assessment process),
|
|||
|
giving the benefit of the doubt to minorities and women. Some
|
|||
|
respondents suggested, for example, that companies hold outreach
|
|||
|
activities in poor communities to find potential employees.
|
|||
|
|
|||
|
The respondents recommended awards as a way to encourage computer
|
|||
|
companies, academic research projects, and individuals to get
|
|||
|
involved.
|
|||
|
Each year, CPSR recognizes a computer scientist who, in addition to
|
|||
|
making important contributions to the field, has demonstrated an
|
|||
|
ongoing commitment to working for social change. (ACM activist and
|
|||
|
IBM researcher Barbara Simons is CPSR's 1992 Norbert Wiener Award
|
|||
|
winner.) Many respondents suggested that SIGCHI or ACM offer an award
|
|||
|
for companies that demonstrate a similar commitment through community
|
|||
|
projects, encouraging employee volunteerism, or other good works.
|
|||
|
|
|||
|
The CHI conference itself emerged as an important potential focus of
|
|||
|
social action work. Respondents recommended that CHI organizers seek
|
|||
|
ways to have a positive impact upon the host community. Local
|
|||
|
students -- high-school and college -- could be given tours of
|
|||
|
exhibits or scholarships to attend the conference. Equipment used at
|
|||
|
the conference could be donated to local schools and organizations.
|
|||
|
Respondents also suggested paper and poster sessions devoted to
|
|||
|
applying technology to social problems or to understanding social
|
|||
|
issues related to computer technology.
|
|||
|
|
|||
|
"What's underneath are not wounds, but faults -- lines of fracture,
|
|||
|
of discontinuity, in society, which periodically relieve their
|
|||
|
stress in these violent ways. What can we do about that?" -- a
|
|||
|
CHI'92 attendee.
|
|||
|
|
|||
|
Although our respondents provided a wealth of ideas for how we, as
|
|||
|
computer professionals and concerned citizens, can offer our time and
|
|||
|
skills for the betterment of society, a number of them acknowledged
|
|||
|
that charity, volunteering, and technology alone cannot solve
|
|||
|
political and social problems. Closing the gap between rich and poor,
|
|||
|
educated and illiterate, empowered and disenfranchised will require
|
|||
|
changes in basic priorities at the local, state, national, and
|
|||
|
international levels. Accordingly, many respondents recommended
|
|||
|
attempting to influence the political process, either individually,
|
|||
|
through professional associations, or through organizations like CPSR.
|
|||
|
|
|||
|
Conclusions
|
|||
|
|
|||
|
"Thanks for the noontime meeting on Tuesday! It was motivating to
|
|||
|
see such a strong response." -- a CHI'92 attendee.
|
|||
|
|
|||
|
"Thank you, thank you, thank you for organizing this forum and
|
|||
|
bringing some heart and spirit into this cold, albeit exciting,
|
|||
|
environment. Onwards and upwards, I'm with you all the way!" -- a
|
|||
|
CHI'92 attendee.
|
|||
|
|
|||
|
"What a wonderful experience to find a humanistic island at a
|
|||
|
professional conference!" -- a CHI'92 attendee.
|
|||
|
|
|||
|
The unexpectedly large response to the noontime session at CHI'92 was
|
|||
|
extremely gratifying. Also gratifying is the degree of concern that
|
|||
|
members of the CHI community have about social inequities and the
|
|||
|
seriousness with which they addressed themselves to overcoming them.
|
|||
|
Hopefully, with this report as inspiration, many computer
|
|||
|
professionals will begin to take action.
|
|||
|
|
|||
|
"I'll go back and start asking questions in my company." -- a
|
|||
|
CHI'92 attendee.
|
|||
|
|
|||
|
The foregoing has only scratched the surface of the ideas that emerged
|
|||
|
from the CHI'92 social issues session. As described above, CPSR hopes
|
|||
|
to expand this report into a widely-circulated Social Action Guide,
|
|||
|
and eventually provide on-line services to help computer professionals
|
|||
|
take action.
|
|||
|
|
|||
|
To learn more about Computer Professionals for Social Responsibility,
|
|||
|
or to get involved in the preparation of the full Social Action Guide,
|
|||
|
contact cpsr@csli.stanford.edu.
|
|||
|
|
|||
|
References
|
|||
|
|
|||
|
Shneiderman, B. "Socially Responsible Computing I: A Call to Action
|
|||
|
Following the L.A. Riots" SIGCHI Bulletin, July, 1992, 24(3), pages
|
|||
|
14-15.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 16 Oct 92 23:59:59 GMT
|
|||
|
From: jbcondat@ATTMAIL.COM
|
|||
|
Subject: File 5--Making the News and Bookstands (Reprint)
|
|||
|
|
|||
|
MAKING THE NEWS AND BOOKSTANDS
|
|||
|
(From "Intelligence Newsletter", No. 202 (Oct. 8, 1992), Page 5,
|
|||
|
by O. Schimdt)
|
|||
|
|
|||
|
The computer virus "threat" is back in the news with a new study by
|
|||
|
IBM specialist Jeffrey O. Kephart and on the bookstands with a French
|
|||
|
do-it-yourself build-your-own manual on viruses. According to Kephart
|
|||
|
of IBM's High Integrity Computing Laboratory, most previous theories
|
|||
|
on the "social structure of computer use and networks were faulty":
|
|||
|
not every machine could make contact with every other machine in one,
|
|||
|
two or three "steps". Most individual computers are not connected to
|
|||
|
others systems but only to their nearest neighbors. Therefore, most
|
|||
|
infections take place not through networks, but through the physical
|
|||
|
exchange of disks. Moreover, many of the 1,500 known viruses are not
|
|||
|
good replicators and many are not destructive. Even the remaining
|
|||
|
good replicators are "almost all defeated by normal anti-virus
|
|||
|
programs." To advance knowledge such as this concerning viruses, Chaos
|
|||
|
Computer Club France (CCCF) has decided to publish the French
|
|||
|
trans-lation of "The Black Book of Computer Virus" by Mark Ludwig
|
|||
|
"which was censored in the U.S." (French title, "C'est decide! J'ecris
|
|||
|
mon virus," Editions Eyrolles). [...] The book contains "computer
|
|||
|
codes for writing your own virus," but according to CCCF any such
|
|||
|
virus can be defeated by normal anti-virus programs. Moreover, there
|
|||
|
is no French law forbidding the publication of virus computer codes.
|
|||
|
The book is intended for "responsible adults" and bears the warning
|
|||
|
"Forbidden for readers not 18 years old".
|
|||
|
*****
|
|||
|
Jean-Bernard CONDAT (General Secretary)------Chaos Computer Club France [CCCF]
|
|||
|
B.P. 8005, 69351 Lyon Cedex 08// France //43 rue des Rosiers, 93400 Saint-Ouen
|
|||
|
Phone: +33 1 40101775, Fax.: +33 1 40101764, Hacker's BBS (8x): +33 1 40102223
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 16 Oct 1992 23:33:18 CDT
|
|||
|
From: John F. McMullen <mcmullen@well.sf.ca.us>
|
|||
|
Subject: File 6--Legion Of Doom Connection With 911 Attacks Denied
|
|||
|
|
|||
|
NEW YORK, NEW YORK, U.S.A., 1992 OCT 16(NB) -- Members of the
|
|||
|
well publicized group of computer hackers, The Legion of Doom, have
|
|||
|
denied any connection with the recent alleged tampering with US and
|
|||
|
Canadian 911 emergency systems. They have also told Newsbytes that the
|
|||
|
Legion OT Doom (LOD) group has been defunct for a number of years.
|
|||
|
|
|||
|
The recent publicized quote by an arrested 23 year old New Jersey
|
|||
|
man, identified only as Maverick, that he was a member of the Legion
|
|||
|
of Doom and that the group's intent was "to attempt to penetrate the
|
|||
|
911 computer systems and inflect them with viruses to cause havoc" has
|
|||
|
infuriated many of the original group.
|
|||
|
|
|||
|
"Lex Luthor", one of the founders of LOD, told Newsbytes "As far as I
|
|||
|
am concerned the LOD has been dead for a couple of years never to be
|
|||
|
revived. Maverick was never in LOD. There have been 2 lists of
|
|||
|
members (one in phrack and another in the lod tj) and those lists are
|
|||
|
the final word on membership. There has been no revival of lod by me
|
|||
|
nor other ex- members. We obviously cannot prevent copy-cats from
|
|||
|
saying they are in lod. When there was an LOD, our goals were to
|
|||
|
explore and leave systems as we found them. The goals were to expose
|
|||
|
security flaws so they could be fixed before REAL criminals and
|
|||
|
vandals such as this Maverick character could do damage. If this
|
|||
|
Maverick character did indeed disrupt E911 service he should be not
|
|||
|
only be charged with computer trespassing but also attempted murder.
|
|||
|
911 is serious business."
|
|||
|
|
|||
|
Lex continued "I am obviously not affiliated with any type of illegal
|
|||
|
activities whatever especially those concerning computer systems.
|
|||
|
However, I do try to keep up with what's going on and have 2 articles
|
|||
|
on computer security being prepared to be published. I won't say where
|
|||
|
or what name I am using because if the editors know an ex-hacker is
|
|||
|
trying to help society and help secure computer systems they probably
|
|||
|
would not accept the article."
|
|||
|
|
|||
|
Captain James Bourque of the Chesterfield County, Virginia police and
|
|||
|
the person who had quoted Maverick to the press, told Newsbytes that
|
|||
|
Lex's comments were probably correct. He said "I don't think that
|
|||
|
there is a connection with the original group. I think that this group
|
|||
|
sort of took on the Legion of Doom Name and the causes that they think
|
|||
|
the Legion of Doom might have been involved in."
|
|||
|
|
|||
|
Bourque also said "This group tried to publicize their activities by
|
|||
|
calling the local ABC station here as well as ABC in New York. It was
|
|||
|
not unusual for four or five of these individuals to set up a
|
|||
|
telephone conference and then to try to bring down our local 911
|
|||
|
system here by monopolizing the system -- it never worked but they
|
|||
|
continued to try."
|
|||
|
|
|||
|
Bourgue told Newsbytes that the continuing investigation is being
|
|||
|
carried out by local law enforcement agencies and that an investigator
|
|||
|
from his organization was in Newark reviewing the evidence against
|
|||
|
Maverick. He said "It's possible that the Secret Service will become
|
|||
|
involved after the presidential election is over. They are very busy
|
|||
|
now."
|
|||
|
|
|||
|
Mike Godwin , in-house counsel of the Electronic Frontier Foundation.
|
|||
|
(EFF), an organization that has been involved in a number of cases
|
|||
|
involving admitted LOD members, commented to Newsbytes "I don't
|
|||
|
believe for a minute that this has anything to do with the real Legion
|
|||
|
of Doom."
|
|||
|
|
|||
|
Phiber Optic, another ex-LOD member, told Newsbytes that he was
|
|||
|
disturbed that the media accepted the designation of Maverick as LOD,
|
|||
|
saying "If he said that he was a Martian, would they have put in the
|
|||
|
paper that he was a Martian?"
|
|||
|
|
|||
|
Phiber had previously posted a comment on the Whole Earth 'Lectronic
|
|||
|
Link (WELL) on the LOD announcement and it is reprinted with his
|
|||
|
permission:
|
|||
|
|
|||
|
1) Kids prank 911.
|
|||
|
2) Kids get caught for being jackasses.
|
|||
|
3) One kid just happens to have a computer.
|
|||
|
4) Now it's suddenly a 'hacker crime'.
|
|||
|
5) Kid foolishly decides he's in the 'Legion of Doom' when he's
|
|||
|
questioned,because he probably always wanted to be (his heroes!).
|
|||
|
6) Media pukes on itself. ("This is a HEADLINE!!!")
|
|||
|
There. Can we all grow up and move along now?
|
|||
|
|
|||
|
Emmanuel Goldstein, publisher of 2600 Magazine: The Hacker Quarterly,
|
|||
|
also took issued with the designation of those arrested in New
|
|||
|
Jersey and Canada as "hackers", telling Newsbytes "No where have I
|
|||
|
seen any indication that these people were inside of a telephone
|
|||
|
company computer. They were allegedly making vocal calls to the 911
|
|||
|
services and trying to disrupt them. You certainly don't have to
|
|||
|
be a genius to do that. Let's not demean hackers by associating them
|
|||
|
with the kind of behavior that is alleged."
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.52
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|