790 lines
33 KiB
Plaintext
790 lines
33 KiB
Plaintext
![]() |
Computer underground Digest Wed Sep 8, 1994 Volume 6 : Issue 79
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Retiring Shadow Archivist: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Urban Legend Editor: E. Greg Shrdlugold
|
||
|
|
||
|
CONTENTS, #6.79 (Wed, Sep 8, 1994)
|
||
|
|
||
|
File 1--New indecency rules proposed for all online services (fwd)
|
||
|
File 2--Sex, the Internet and the Idiots
|
||
|
File 3--Symposium Announcement & Call for Papers
|
||
|
File 4--Reaffirming Life through an Online Death
|
||
|
File 5--Cu Digest Header Information (unchanged since 9-1-94)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Thu, 1 Sep 1994 11:52:49 -0400 (EDT)
|
||
|
From: Mike Godwin <mnemonic@EFF.ORG>
|
||
|
Subject: File 1--New indecency rules proposed for all online services (fwd)
|
||
|
|
||
|
(MODERATORS' NOTE: In CuD 6.76 we ran a post on the Exon Amendment to
|
||
|
S 1822. S.AMDT.2404, sponsored by Senator J. James Exon (D. Neb.),
|
||
|
raised concerns that proposed federal restrictions on "indecency"
|
||
|
could adversely affect computer communications by placing the onus of
|
||
|
liability on the carrier. Contrary to some reports, the EFF does not
|
||
|
approve of the amendment. For those wishing further information, the
|
||
|
full Bill is: S. 1822 (Sponsored by Sen. Ernest F. Hollings, D., S.
|
||
|
Car.). Official Title: A BILL TO FOSTER THE FURTHER DEVELOPMENT OF THE
|
||
|
NATION'S TELECOMMUNICATIONS INFRASTRUCTURE AND PROTECTION OF THE
|
||
|
PUBLIC INTEREST, AND FOR OTHER PURPOSES. At last report, the Bill
|
||
|
(with the amendment) has been referred to the Senate Committee on
|
||
|
Commerce (on 26 July). We're not aware of subsequent action taken
|
||
|
since. The following fowarded post clarifies the amendment)).
|
||
|
|
||
|
>From farber@eff.org Thu Sep 1 10:47:31 1994
|
||
|
Posted-Date--Thu, 1 Sep 1994 09:29:09 -0400
|
||
|
|
||
|
Date--Thu, 25 Aug 1994 14:32:40 -0600
|
||
|
From--djw@eff.org (Daniel J. Weitzner)
|
||
|
|
||
|
|
||
|
I. Overview
|
||
|
|
||
|
During the final hours before the Senate telecommunications
|
||
|
bill (S.1822) was marked-up by the Senate Commerce Committee, a
|
||
|
provision was added which would expand the current FCC regulation on
|
||
|
obscene and indecent audiotext (900 number) services to virtually all
|
||
|
electronic information services, including commercial online service
|
||
|
providers, the Internet, and BBS operators. This proposal, introduced
|
||
|
by Senator Exon, would require all information service providers and
|
||
|
all other electronic communication service providers, to take steps to
|
||
|
assure that minors do not have access to obscene or indecent material
|
||
|
through the services offered by the service provider.
|
||
|
|
||
|
Placing the onus, and criminal liability, on the carrier, as
|
||
|
opposed to the originator of the content, threatens to limit the free
|
||
|
flow of all kinds of information in the online world. If carriers are
|
||
|
operating under the threat of criminal liability for all of the
|
||
|
content on their services, they will be forced to pre-screen all
|
||
|
messages and limit both the privacy and free expression of the users
|
||
|
of these services. Senator Exon's amendment raises fundamental
|
||
|
questions about the locus on liability for harm done from content in
|
||
|
new digital communications media. These questions must be discussed
|
||
|
in a way that assures the free flow of information and holds content
|
||
|
originators responsible for their actions.
|
||
|
|
||
|
II. Summary of Exon Amendment
|
||
|
|
||
|
The Exon amendment which is now part of S.1822, expands section
|
||
|
of the Communications Act to cover anyone who "makes, transmits, or
|
||
|
otherwise makes available" obscene or indecent communication. It
|
||
|
makes no distinction between those entities which transmit the
|
||
|
communications from those which create, process, or use the
|
||
|
communication. This section of the Communications Act was originally
|
||
|
intended to criminalize harassment accomplished over interstate
|
||
|
telephone lines, and to require telephone companies that offer
|
||
|
indecent 900 number services to prevent minors from having access to
|
||
|
such services. The 900 number portions are known as the Helms
|
||
|
Amendments, having been championed by Senator Jesse Helms. These
|
||
|
sections have been the subject of extension constitutional litigation.
|
||
|
|
||
|
If enacted into law, these amendments would require that anyone
|
||
|
who "makes, transmits, or otherwise makes available" indecent
|
||
|
communication take prescribed steps to assure that minors are
|
||
|
prevented from having access to these communications. In the case of
|
||
|
900 numbers, acceptable procedures include written verification of a
|
||
|
subscriber's age, payment by credit card, or use of a scrambling
|
||
|
device given to the subscriber after having verified his or her age.
|
||
|
Failure to do so would result in up to a $100,000 fine or up to two
|
||
|
years imprisonment.
|
||
|
|
||
|
III. Carrier Liability and Threats to the Free Flow of Information
|
||
|
|
||
|
These provisions raise serious First Amendment concerns. (Note
|
||
|
that we use the term 'carrier' here to refer to a wide range of
|
||
|
information and communication service providers. This does not
|
||
|
suggest that these entities are, or should be, common carriers in the
|
||
|
traditional sense of the term.)
|
||
|
|
||
|
Overbroad carrier liability forces carriers to stifle the free
|
||
|
flow of information on their systems and to act as private censors
|
||
|
|
||
|
If carriers are responsible for the content of all information
|
||
|
and communication on their systems, then they will be forced to
|
||
|
attempt to screen all content before it is allowed to enter the
|
||
|
system. In many cases, this would be simply impossible. But even
|
||
|
where it is possible, such pre-screening can severely limit the
|
||
|
diversity and free flow of information in the online world. To be
|
||
|
sure, some system operators will want to offer services that
|
||
|
pre-screen content. However, if all systems were forced to do so, the
|
||
|
usefulness of digital media as communication and information
|
||
|
dissemination systems would be drastically limited. Where possible,
|
||
|
we must avoid legal structures which force those who merely carry
|
||
|
messages to screen their content.
|
||
|
|
||
|
Carriers are often legally prohibited from screening messages
|
||
|
|
||
|
In fact, under the Electronic Communications Privacy Act of
|
||
|
1986, electronic communication service providers are generally
|
||
|
prohibited from examining the contents of messages or information
|
||
|
carrier from one subscriber to another.
|
||
|
|
||
|
Extension of the 900 number rules to all electronic information
|
||
|
services may be unconstitutional
|
||
|
|
||
|
The regulation of indecent 900 number programming was only
|
||
|
accomplished after nearly a decade of constitutional litigation, with
|
||
|
rules being overturned by the Supreme Court. The regulations were
|
||
|
finally found constitutional only after being substantially narrowed
|
||
|
to meet First Amendment scrutiny. Since the access methods offered by
|
||
|
online service providers are significantly different than simple
|
||
|
telephone access to 900 services, we doubt that the same
|
||
|
constitutional justifications would support the newly expanded rules.
|
||
|
This issue requires considerable study and analysis.
|
||
|
|
||
|
Content creators, or those who represent the content as their
|
||
|
own, should be responsible for liability arising out of the content
|
||
|
|
||
|
In sum, it should be content originators, not carriers, who are
|
||
|
responsible for their content. Any other approach will stifle the
|
||
|
free flow of information in the new digital media.
|
||
|
|
||
|
IV. Next Steps
|
||
|
|
||
|
Having only just received the language offered by Senator Exon,
|
||
|
EFF still needs to do further analysis, and consult with others in the
|
||
|
online community. We also hope to speak with Senator Exon's staff to
|
||
|
understand their intent. Another important hearing will be held on
|
||
|
S.1822 in mid-September by the Senate Judiciary Committee. By that
|
||
|
time, we hope to have this issue resolved. While we agree that these
|
||
|
carrier liability problems are in need of Congressional consideration,
|
||
|
we do not believe that the time is ripe to act. Before any action is
|
||
|
taken, hearings must be held and careful evaluation of all the issues,
|
||
|
not just indecency, must be undertaken.
|
||
|
|
||
|
Daniel J. Weitzner, Deputy Policy Director, Electronic Frontier Foundation,
|
||
|
1001 G St. NW Suite 950 East, Washington, DC 20001 +1 202-347-5400(v)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 2 Sep 1994 11:06:39 -0400 (EDT)
|
||
|
From: eye WEEKLY <eye@IO.ORG>
|
||
|
Subject: File 2--Sex, the Internet and the Idiots
|
||
|
|
||
|
eye WEEKLY August 4 1994
|
||
|
Toronto's arts newspaper .....free every Thursday
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
EYE NET EYE NET
|
||
|
|
||
|
SEX, THE INTERNET AND THE IDIOTS
|
||
|
|
||
|
by
|
||
|
K.K. CAMPBELL
|
||
|
|
||
|
|
||
|
There are two breeds of moron attracted to the Internet's relation to
|
||
|
sex -- reporters and wankers. These categories may overlap, but that's
|
||
|
beside the point.
|
||
|
|
||
|
Canadian newsmedia owe a great deal of Internet education to Judge
|
||
|
Francis Kovacs and his infamous Karla Homolka trial publication ban.
|
||
|
That elevated the Internet to headline material. It is humorous to
|
||
|
watch reporters/editors grope for net.literacy. Talk with Justin
|
||
|
Wells (stem@sizone.pci.on.ca) and Ken Chasse
|
||
|
(root@sizone.pci.on.ca), the chaps who created alt.fan.karla-homolka
|
||
|
as a lark, then found themselves hounded by reporters asking for
|
||
|
"banned information, please." Or check out The Star's early stories,
|
||
|
where Usenet newsgroups are called "computer billboards" --
|
||
|
whatever the hell those are.
|
||
|
|
||
|
MEDIA MORONS
|
||
|
|
||
|
Mainstream journalists without a rallying issue like a trial ban
|
||
|
invariably end up with nothing better to do then bang the drum about
|
||
|
the 3 Ps: pedophilia, piracy and pornography.
|
||
|
|
||
|
Take the recent Internet "child molesters" silliness. Some teen
|
||
|
somewhere is enticed into sex with an adult -- through America On
|
||
|
Line, not the Internet -- and we have an "epidemic." Chicago's Harlan
|
||
|
Wallach (wallach@mcs.com) reported in alt.internet.media-coverage
|
||
|
how some dink named James Coates wrote a column for the July 15
|
||
|
Chicago Tribune called "Beware cybercreeps lurking on the Internet."
|
||
|
True enough. But Coates' purpose is to frighten the middle class with
|
||
|
some probably made-up story about "Vito," who cruises the net
|
||
|
hoping "to have sex with children in wheelchairs."
|
||
|
|
||
|
I understand Coates' pain. I can't spend 10 minutes in Internet Relay
|
||
|
Chat (IRC) before someone asks if I'm a child in a wheelchair looking
|
||
|
for a sex partner. Wallach told eye Coates has been going like this
|
||
|
for months now -- "a master at work."
|
||
|
|
||
|
Couple of weeks ago, California nuclear research facility Lawrence
|
||
|
Livermore Labs discovered one computer held some dirty pictures.
|
||
|
An employee gave away a password. Someone used that access to
|
||
|
store the images. People could connect and get them. Nothing was
|
||
|
hacked. Big deal.
|
||
|
|
||
|
But on July 13, CNN reporter Don Knapp swooped in to whip up
|
||
|
hysteria. Doom was clearly imminent.
|
||
|
|
||
|
"Computer security specialists were surprised to find what may be
|
||
|
the largest computer collection ever of hardcore pornography at the
|
||
|
nation's top nuclear weapons and research laboratory," Knapp
|
||
|
intoned ominously. Almost 2000 megs! Gol-ly! (Incidentally, 99 per
|
||
|
cent of it was individual shots of nude/semi-nude women, no
|
||
|
sexually explicit acts. Playboy stuff.)
|
||
|
|
||
|
CNN rang Wired magazine writer Brian Behlendorf (brian@wired.com)
|
||
|
and woke him at home, excited about "a big break-in at Laurence
|
||
|
Livermore." Hackers and porno! If CNN was lucky, the hacker was a
|
||
|
child molester. Behlendorf consented to an interview. CNN
|
||
|
immediately asked him to "find some pictures of naked women on
|
||
|
the Net for us." Behlendorf recounted the incident: "I really wasn't
|
||
|
interested in doing that. I don't know of any FSP/FTP sites offhand
|
||
|
anyways, and really didn't want to be associated with pictures of
|
||
|
NEKKID GRRLS."*
|
||
|
|
||
|
But amiable Behlendorf slid over to alt.binaries.pictures.supermodels
|
||
|
and grabbed a picture of a model in a swimsuit. He also picked up a
|
||
|
landscape, a race car and a Beatles album cover "to show that other
|
||
|
images get sent over Usenet as well," naively thinking this point
|
||
|
would be made -- though he stresses he by no means condones
|
||
|
distributing copyrighted images, "clean" or otherwise. Behlendorf was
|
||
|
then made to sit beside a terminal displaying Ms String-Bikini
|
||
|
throughout all his comments. "They made me keep returning to that damn
|
||
|
bikini image ... over and over."
|
||
|
|
||
|
But intrepid reporter Don Knapp assured us all is well -- for now.
|
||
|
"Spokespeople for the national laboratories insist that at no time
|
||
|
were the pornographers, nor the software pirates, able to cross over
|
||
|
from the research network into the classified network. The labs say
|
||
|
that, while they are embarrassed, national security was not
|
||
|
breached."
|
||
|
|
||
|
Whew.
|
||
|
|
||
|
YOU'RE GETTING VERY STUP- ERR, SLEEPY...
|
||
|
|
||
|
Then you have regular net.wankers. Whoever said, "Never
|
||
|
underestimate the intelligence of the American public," must read
|
||
|
alt.sex.* newsgroups.
|
||
|
|
||
|
For instance, the charismatic Aabid (aabid@elm.circa.ufl.edu) wrote
|
||
|
a touching post called "I would like an enema myself!" to newsgroup
|
||
|
sci.chem (science: chemistry). "Looking for a Middle Eastern M or F
|
||
|
to help me with my enema desires. If you can be of assistance please
|
||
|
email me." Readers of sci.chem were very intrigued and Aabid has
|
||
|
made many interesting new friends.
|
||
|
|
||
|
The greatest example of alt.sex stupidity is: The Hypnosis Program.
|
||
|
|
||
|
As a joke, Indiana's Steve Salter (ssalter@silver.ucs.indiana.edu)
|
||
|
posted to alt.sex.stories that he had a "hypnosis program" -- which
|
||
|
you cleverly slip onto another person's computer where it will so
|
||
|
mesmerize the unsuspecting target, he/she becomes your SEXUAL
|
||
|
PLAYTHING, BENDING TO YOUR EVERY WHIM! For weeks after, global
|
||
|
village idiots pestered him for copies.
|
||
|
|
||
|
"I must have received over a hundred requests via private email or in
|
||
|
alt.sex.stories for a copy of the program," Salter told eye. He had to
|
||
|
publicly post a reply to stem the tide: "No offense, but get a rather
|
||
|
large clue. There is no such animal. That was a joke. I thought it was
|
||
|
obvious. How many people out there really want to hypnotize someone
|
||
|
secretly? What the fuck is wrong with all of you?! What age group are
|
||
|
we dealing with here? There is no such program!!! Sheesh..."
|
||
|
|
||
|
Personally, I'm in agreement with David Romm
|
||
|
(71443.1447@compuserve.com) who wrote: "I really liked the hypnosis
|
||
|
program. It was much better than Cats."
|
||
|
|
||
|
MASSAGE MY MEDIUM
|
||
|
|
||
|
To get your own porn, there are lots of sites. Ask for the latest in
|
||
|
the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a
|
||
|
few images. For text erotica, read in alt.sex.stories .
|
||
|
|
||
|
If you can't access alt.sex groups because, say, your university is
|
||
|
run by prudes, write (ahem) "Hot Stuff" (anon1ea3@nyx10.cs.du.edu)
|
||
|
for details about his mail-server. He makes available hundreds of
|
||
|
stories. We at eye have yet to sample this collection but are
|
||
|
intrigued by two items: "Perils of Red Tape," which we assume
|
||
|
reveals the lust-riddled world of civil service, and "Tales from the
|
||
|
Network," the story of lonely boys sitting around Friday nights
|
||
|
fingering their groins in IRC, praying someone with a female-
|
||
|
sounding alias drops by.
|
||
|
|
||
|
|
||
|
* FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker-
|
||
|
speak. This language can be learned by hanging around newsgroups
|
||
|
like alt.2600 . To convince others you are a deadly cool net.cruiser,
|
||
|
write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than
|
||
|
ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it
|
||
|
to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy
|
||
|
because PCs are the most common computer and you will reach a wider
|
||
|
audience. If you can manage it, post through an anonymous account
|
||
|
and leave your personal signature with real address in the text of
|
||
|
the message.
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++++++++
|
||
|
Retransmit freely in cyberspace Author holds standard copyright
|
||
|
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
|
||
|
Mailing list available http://www.io.org/eye
|
||
|
eye@io.org "Break the Gutenberg Lock..." 416-971-8421
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 24 Aug 1994 18:12:38 GMT
|
||
|
From: shallit@GRACELAND.UWATERLOO.CA(Jeffrey Shallit)
|
||
|
Subject: File 3--Symposium Announcement & Call for Papers
|
||
|
|
||
|
Final Announcement and Call for Papers
|
||
|
Symposium
|
||
|
|
||
|
"Free Speech and Privacy in the Information Age"
|
||
|
|
||
|
Davis Centre
|
||
|
University of Waterloo
|
||
|
200 University Avenue, West
|
||
|
Waterloo, Ontario N2L 3G1
|
||
|
Canada
|
||
|
|
||
|
Saturday, November 26, 1994
|
||
|
|
||
|
RATIONALE:
|
||
|
|
||
|
The "information superhighway" will have a profound effect on our lives
|
||
|
and the way we communicate in the 21st century. But how will it transform
|
||
|
and be transformed by our understanding of traditional freedoms,
|
||
|
such as free speech and privacy?
|
||
|
|
||
|
This one-day symposium is intended to address the ethical, philosophical,
|
||
|
and legal implications of the Internet and related communications
|
||
|
technologies. Expert speakers from industry, academia, government,
|
||
|
and the legal profession will discuss free speech and privacy in the
|
||
|
information age. A wide spectrum of opinion will be represented.
|
||
|
|
||
|
The symposium will host a poster session for contributed papers; see below
|
||
|
for submission information.
|
||
|
|
||
|
During the symposium, there will also be demonstrations, conducted by
|
||
|
University library staff, of the Internet and its applications
|
||
|
as a research and communications tool.
|
||
|
|
||
|
|
||
|
WHO SHOULD ATTEND:
|
||
|
|
||
|
* University and public librarians;
|
||
|
|
||
|
* local, provincial, and federal government officials concerned
|
||
|
with information and communication technology;
|
||
|
|
||
|
* Internet users and computer system administrators from industry
|
||
|
and academia;
|
||
|
|
||
|
* feminists concerned with impact of the new technology;
|
||
|
|
||
|
* lawyers interested in information and communication technology;
|
||
|
|
||
|
* journalists from print, radio, television, and other media;
|
||
|
|
||
|
* professors and students of sociology, philosophy, law, ethics,
|
||
|
computer science, and electrical engineering.
|
||
|
|
||
|
|
||
|
SYMPOSIUM PROGRAM:
|
||
|
|
||
|
8:00 - 9:00 AM Registration, coffee, and doughnuts
|
||
|
Internet demonstration by library staff
|
||
|
|
||
|
9:00 AM Opening and Official Welcome
|
||
|
|
||
|
9:10 AM Professor JAY WESTON, Carleton University and the Ottawa
|
||
|
Freenet: "Old Freedoms and New Technologies: The Evolution
|
||
|
of Community Networking".
|
||
|
|
||
|
9:50 AM Professor URSULA M. FRANKLIN, FRSC, Massey College, University of
|
||
|
Toronto: "Global Gossip, Homeless Information, and the Notion of
|
||
|
Public Health".
|
||
|
|
||
|
10:45 AM Break
|
||
|
|
||
|
11:00 AM HENRY SPENCER, SP Systems and University of Toronto: "Computer
|
||
|
System Administration in an Age of Uncontrolled Information Flow".
|
||
|
|
||
|
11:40 AM Professor GAILE POHLHAUS, Women's Studies and Theology and
|
||
|
Religious Studies, Villanova University: "The Use of the Internet
|
||
|
as a Vehicle for Pornography - Do We Really Care?"
|
||
|
|
||
|
12:20 PM Lunch
|
||
|
Internet demonstration by library staff
|
||
|
|
||
|
2:10 PM (Keynote Address) The Honourable Mr. Justice JOHN SOPINKA,
|
||
|
Canadian Supreme Court: "Freedom of Speech and the Protection of
|
||
|
Privacy under the *Charter* in the Information Age".
|
||
|
|
||
|
3:05 PM Professor MARGARET ANN WILKINSON, Faculty of Law and Graduate School
|
||
|
of Library and Information Science, University of Western Ontario:
|
||
|
"Perceptual Differences in Approaches to Censorship: Information
|
||
|
Intermediaries and the Implementation of Law".
|
||
|
|
||
|
3:45 PM Break
|
||
|
|
||
|
4:00 PM PARKER BARSS DONHAM, Political Columnist, Halifax Sunday Daily
|
||
|
News and CBC Political Panellist, Nova Scotia: "A Free and
|
||
|
Unshackled Internet -- If Joseph Howe Were Designing Cyberspace".
|
||
|
|
||
|
4:40 PM Professor Emeritus THELMA McCORMACK, Department of Sociology,
|
||
|
York University: "Must We Buy Into Technological Determinism?".
|
||
|
|
||
|
5:20 PM Closing Remarks
|
||
|
|
||
|
|
||
|
|
||
|
CALL FOR PAPERS:
|
||
|
|
||
|
There will be a poster session for contributed papers. Contributed
|
||
|
papers should be no more than 10 pages in length, and on a topic
|
||
|
relevant to the symposium's theme. Submit contributed papers BEFORE
|
||
|
October 31, 1994 to:
|
||
|
|
||
|
Free Speech and Privacy Symposium
|
||
|
c/o Prof. Jeffrey Shallit
|
||
|
Department of Computer Science
|
||
|
University of Waterloo
|
||
|
Waterloo, Ontario N2L 3G1 Canada
|
||
|
|
||
|
You will be notified of the decision by telephone, fax, or electronic
|
||
|
mail.
|
||
|
|
||
|
|
||
|
|
||
|
SPONSORSHIP:
|
||
|
|
||
|
The symposium is being sponsored by the Institute for Computer Research,
|
||
|
University of Waterloo; the Department of Computer Science, University
|
||
|
of Waterloo; the Dean of the Arts Faculty, University of Waterloo; and
|
||
|
Electronic Frontier Canada.
|
||
|
|
||
|
|
||
|
ORGANIZING COMMITTEE:
|
||
|
|
||
|
Prof. Harriet Lyons, Women's Studies and Anthropology,
|
||
|
University of Waterloo
|
||
|
|
||
|
Prof. Jeffrey Shallit, Computer Science, University of
|
||
|
Waterloo
|
||
|
|
||
|
|
||
|
GETTING THERE:
|
||
|
|
||
|
The symposium will be held at the William G. Davis Computer
|
||
|
Research Centre at the University of Waterloo in Waterloo,
|
||
|
Ontario.
|
||
|
|
||
|
Waterloo is approximately 80 minutes west of Toronto, Ontario, and
|
||
|
is accessible from Toronto via car, airport limousine, bus, and rail.
|
||
|
|
||
|
By Air: The nearest airport is Toronto. Airways Transit limousine
|
||
|
serves the Waterloo area from Toronto airport. Reservations
|
||
|
must be made at least 24 hours in advance by calling
|
||
|
(519) 886-2121. The regular one-way fare is $43. There is
|
||
|
a special symposium fare of $23 one-way; specify the "Free
|
||
|
Speech Symposium" when making reservations, and be sure to
|
||
|
have complete flight information ready when you call.
|
||
|
|
||
|
By Car: From Detroit/Windsor/London: take Highway 401 east.
|
||
|
(*) Exit at Route 8 west. Follow Route 8 to Route 7 east.
|
||
|
Take Route 7 to 86 North, and exit at University Avenue West.
|
||
|
Follow University Avenue approximately 3 km to the main
|
||
|
entrance of the University (200 University Ave. West).
|
||
|
|
||
|
From Toronto: take Highway 401 west, and follow the
|
||
|
directions beginning with (*) above.
|
||
|
|
||
|
From Buffalo: take the QEW to Highway 403 West. Exit the
|
||
|
403 at Highway 6 North. Take Highway 6 North to the 401
|
||
|
West, and follow the directions beginning with (*) above.
|
||
|
|
||
|
By Bus: From Toronto: Kitchener is served by Greyhound Bus Service;
|
||
|
about 10 buses a day, each direction. For schedule
|
||
|
information, call (800) 661-8747.
|
||
|
|
||
|
From London: Kitchener is served by Cha-co Trails; about
|
||
|
3 buses a day, each direction. For schedule information,
|
||
|
call (800) 265-9460.
|
||
|
|
||
|
Once at the Kitchener bus terminal, Kitchener Transit runs
|
||
|
buses every 10-30 minutes to the University of Waterloo.
|
||
|
Take buses 7D or 8B from the terminal. Travel time is
|
||
|
approximately 25 minutes.
|
||
|
|
||
|
By Rail: VIA rail has infrequent service to Kitchener from Chicago/London
|
||
|
and Toronto. For schedule information, contact them at
|
||
|
(800) 361-1235 (Ontario only).
|
||
|
|
||
|
|
||
|
ACCOMMODATIONS:
|
||
|
|
||
|
Symposium attendees should make their own hotel reservations.
|
||
|
|
||
|
The Waterloo Inn (475 King St. North, Waterloo) has reserved
|
||
|
a block of rooms for the symposium until October 26, at the
|
||
|
special symposium rate of $70 (CDN) for a single room and $76
|
||
|
for a double room. Contact them at (519) 884-0220, and specify
|
||
|
the "block ID Free100".
|
||
|
|
||
|
Other hotels/motels reasonably near the Waterloo campus include:
|
||
|
|
||
|
* Destination Inn, 547 King St. North, Waterloo,
|
||
|
(519) 884-0100. Single $53, Double $63.
|
||
|
|
||
|
* Comfort Inn, 190 Weber St. North, Waterloo,
|
||
|
(519) 747-9400. Request the corporate rate of
|
||
|
Single $60, Double $69.
|
||
|
|
||
|
* Best Western Walper Terrace Hotel, 1 King St. West,
|
||
|
Kitchener, (519) 745-4321. Near Kitchener Bus
|
||
|
Terminal. Request the corporate rate of Single
|
||
|
$69, Double $69.
|
||
|
|
||
|
|
||
|
REGISTRATION:
|
||
|
|
||
|
|
||
|
Last Name: ____________________ First Name: ___________________
|
||
|
|
||
|
Organization: ____________________________________________________
|
||
|
|
||
|
Address: ____________________________________________________
|
||
|
|
||
|
City: ___________________ Province/State: __________________
|
||
|
|
||
|
Postal Code: _______________ Country: _________________________
|
||
|
|
||
|
Phone: _____________________ Fax: ____________________________
|
||
|
|
||
|
E-mail: ___________________________________________________________
|
||
|
|
||
|
|
||
|
Registration fees:
|
||
|
|
||
|
Before October 31 After October 31
|
||
|
StudentCDN $20 / US $16 CDN $30 / US $24
|
||
|
GeneralCDN $75 / US $60 CDN $90 / US $72
|
||
|
|
||
|
Registration fee includes admission to all sessions, Internet
|
||
|
demonstration, lunch, two coffee breaks, copies of printed
|
||
|
material, and GST. (GST No. = R119260685)
|
||
|
|
||
|
Registration payment:
|
||
|
|
||
|
If paying by cheque, please make cheque out to "University of
|
||
|
Waterloo", payable in either US or Canadian Funds, and mail to:
|
||
|
|
||
|
"Free Speech and Privacy Symposium"
|
||
|
c/o Wendy Rush
|
||
|
Department of Computer Science
|
||
|
University of Waterloo
|
||
|
Waterloo, Ontario N2L 3G1
|
||
|
Canada
|
||
|
|
||
|
You can also use a credit card. Please provide the following
|
||
|
information:
|
||
|
|
||
|
Card name (Visa, Mastercard, or American Express):
|
||
|
Card number:
|
||
|
Expiry date:
|
||
|
Amount (Specify in Canadian dollars ONLY):
|
||
|
Cardholder's Name (please print):
|
||
|
|
||
|
Cardholder's Signature: ___________________________________________
|
||
|
|
||
|
|
||
|
|
||
|
FOR FURTHER INFORMATION:
|
||
|
|
||
|
Contact Wendy Rush at (519) 885-1211 ext. 3688, or Jeffrey
|
||
|
Shallit at (519) 888-4804. Fax inquiries can be sent to
|
||
|
(519) 885-1208. E-mail inquiries can be sent to:
|
||
|
|
||
|
sfsp@graceland.uwaterloo.ca
|
||
|
|
||
|
On the Internet, you can get a copy of this program by
|
||
|
typing "finger sfsp@graceland.uwaterloo.ca".
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 7 Sep 1994 21:18:54 CDT
|
||
|
From: Jim Thomas <jthomas@well.sf.ca.us>
|
||
|
Subject: File 4--Reaffirming Life through an Online Death
|
||
|
|
||
|
kj died.
|
||
|
On August 21, about 10:30 p.m.
|
||
|
Kathleen Johnston was a nudge shy of 50, rather lonely and unhappy.
|
||
|
Brilliant, articulate, and rather shy in person, she was a dynamic
|
||
|
extrovert online. Her health prevented her from applying her
|
||
|
Wellesley background and an M.A. and Ph.d in physical sciences toward
|
||
|
a full-time professional career. So, in her final years, she immersed
|
||
|
herself in The Well, the bay area electronic community populated by
|
||
|
equally bright and articulate folk. There, she made friends, found
|
||
|
foes, provoked, nurtured, challenged, baited, and both earned respect
|
||
|
and generated animosity from those she encountered. What made kj's
|
||
|
death different from most deaths was that, when she was no longer able
|
||
|
to participate fully on The Well, she wrote her own death notice, a
|
||
|
simple statement, and posted it in the Well's obituary topic on June
|
||
|
25.
|
||
|
|
||
|
Kathleen Johnston. September 29, 1945 - July or August, 1994.
|
||
|
|
||
|
The days are dwindling, as is my energy, so I won't be around to
|
||
|
correct your copious errors in logic. It's been fun.
|
||
|
|
||
|
Of metastatic cancer.
|
||
|
|
||
|
kj
|
||
|
|
||
|
&;-)
|
||
|
|
||
|
kj's post generated scores of immediate responses, and a second topic
|
||
|
was opened. Nearly 400 additional posters offered their poems,
|
||
|
sympathy, and tear-stained well-wishes. Almost 300 more appeared
|
||
|
immediately after her death. The event drew media attention:
|
||
|
|
||
|
In his ONLINE column in the San Francisco Chronicle (1 Sept, '94: THE
|
||
|
SAN FRANCISCO CHRONICLE, 9/1/94 "Death Leaves Well Bewildered")
|
||
|
observed:
|
||
|
|
||
|
That's kj's death is famous now was just luck. Two years
|
||
|
ago, or two years hence, she could have died just like
|
||
|
anyone else, without making the papers.
|
||
|
|
||
|
But right now what happens online is new and different.
|
||
|
That an ordinary citizen named Kathleen Johnston should die
|
||
|
of cancer is not fodder for Time and the Washington Post.
|
||
|
But that kj on the WELL should die -- and that her death
|
||
|
provoke the online response that it did -- that makes news.
|
||
|
We're just beginning to get a handle on the idea of living
|
||
|
online, after a decade or so of making it up as we go along.
|
||
|
This inevitably includes deciding, in the chaotic way that
|
||
|
collective decisions get made online, how we are going to
|
||
|
respond to death.
|
||
|
|
||
|
The thing is, we just don't know what to do. Americans have
|
||
|
always tended to improvise. This works for things like
|
||
|
technology, marketing, or statecraft. But it serves us
|
||
|
poorly where death is concerned.
|
||
|
|
||
|
Time Magazine (5 Sept, '94: p. 18) was more straight-forward:
|
||
|
|
||
|
CHRONICLES: WELL-WISHERS ON THE INTERNET
|
||
|
|
||
|
Is cyberspace as cold and anonymous as it is reputed to be?
|
||
|
Members of the WELL, a San Francisco-based computer bulletin
|
||
|
board, recently found out. On June 29, Adele Framer, who
|
||
|
calls herself tigereye, posted a message: "Kathleen
|
||
|
Johns((t))on -- kj -- on the WELL, who's housebound in the
|
||
|
final stages of cancer, could use a little help with light
|
||
|
meals once or twice a week." The following are excerpts from the
|
||
|
exchange that followed. KJ herself is noticeably absent. She was
|
||
|
in no shape to take part in a message board.
|
||
|
|
||
|
The Time piece added 17 posts believed to typify the spirit of the
|
||
|
discussion.
|
||
|
|
||
|
But, the media, I think, missed the real story. kj's was much more
|
||
|
than a death around which a community commiserated electronically.
|
||
|
This should not be a story about posts. It's a story of people coming
|
||
|
together, sharing experiences, grieving, squabbling, learning, and
|
||
|
growing. The real story is that the electronic medium, while
|
||
|
certainly of value in helping a stunned community cope with the grief
|
||
|
of losing one of their own through an E-death watch, provided the
|
||
|
means to reach out more tangibly to kj. And, more importantly, to
|
||
|
reach out to each other.
|
||
|
|
||
|
The real story is how one woman devoted her energy to organizing
|
||
|
meals and assuring that kj would be cared for. How a male, often in
|
||
|
mortal online combat with kj, visited her and together in her final
|
||
|
days experienced a mutual growth and understanding. How others, who
|
||
|
fought with kj in public, were uneasy about participating in the
|
||
|
online or physical events prior to the death. It's about the
|
||
|
rallying, about the phone calls, about the supportive e-mail sent to
|
||
|
kj, about the visits at home. It's about friends, acquaintances and
|
||
|
strangers visiting in the hospice in the final days, comforting her,
|
||
|
reading to her, holding her hand.
|
||
|
|
||
|
Most of all, the story is not about death, it's about life. It's
|
||
|
about how online antagonists recognize their own demons and with pain
|
||
|
and self-reflection confront them. It's about how friends and
|
||
|
strangers give of themselves in ways that transcend the ASCII world in
|
||
|
which they normally meet. It's about the courage to make peace, the
|
||
|
sacrifice of care-giving, the shared community of grieving.
|
||
|
|
||
|
Most of all, the story is about how the electronic medium brings
|
||
|
people together, face-to-face, heart-to-heart, even in death. The
|
||
|
media saw and reported only ASCII, and made invisible the mandala
|
||
|
that gave it soul.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 13 Aug 1994 22:51:01 CDT
|
||
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
|
Subject: File 5--Cu Digest Header Information (unchanged since 9-1-94)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #6.79
|
||
|
************************************
|
||
|
|