900 lines
39 KiB
Plaintext
900 lines
39 KiB
Plaintext
![]() |
|
||
|
|
||
|
Computer underground Digest Wed Mar 8, 1995 Volume 7 : Issue 19
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Semi-retiring Shadow Archivist: Stanton McCandlish
|
||
|
Correspondent Extra-ordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Monster Editor: Loch Nesshrdlu
|
||
|
|
||
|
CONTENTS, #7.19 (Wed, Mar 8, 1995)
|
||
|
|
||
|
File 1--Re: Cu Digest, #7.18
|
||
|
File 2--Acm-IIT Computers Seized by Ill. Institute of Tech (fwd)
|
||
|
File 3--Cu in the news
|
||
|
File 4--Role-playing adventure BBS starting New game
|
||
|
File 5--"You all support child porn" and other rubbish
|
||
|
File 6--Alert #1: Fifth Conference on Computers, Freedom and Privacy
|
||
|
File 7--CMC Magazine March Issue
|
||
|
File 8--TIME WARNER ELECTRONIC PUBLISHING
|
||
|
File 9--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
----------------------------------------------------------------------
|
||
|
|
||
|
Date: Tue, 07 Mar 1995 22:54:34 -0500
|
||
|
From: spaf@CS.PURDUE.EDU(Gene Spafford)
|
||
|
Subject: File 1--Re: Cu Digest, #7.18
|
||
|
|
||
|
Re: the review of "Virus Creation Labs" and the excerpt by George
|
||
|
Smith.
|
||
|
|
||
|
I gather from the tone of the excerpt and the review that Mr. Smith
|
||
|
has lumped together all kinds of PCs and therefore likewise all
|
||
|
developers? If so, it is both a technical and a social error, at the
|
||
|
least.
|
||
|
|
||
|
For instance, Macintosh systems are PCs, in the true sense that they
|
||
|
are personal computers. They also have less than 2 dozen viruses
|
||
|
written for them, ever. The Mac anti-virus community cooperates,
|
||
|
quiety and without publicity. The world's only successful prosecution
|
||
|
of computer virus writers was brought about by the Mac anti-virus
|
||
|
community. And there have been two very complete and wonderful FREE
|
||
|
programs that deal with Mac viruses: Disinfectant and Gatekeeper.
|
||
|
Even the competing commercial vendors praise them and sometimes help
|
||
|
their authors.
|
||
|
|
||
|
Thus, in the Mac virus arena at least, we have not seen any evidence
|
||
|
of a "...bizarre Pirandellian world of inflated egos, malicious
|
||
|
territorialism, questionable ethics, and avarice, about equally
|
||
|
divided between the moral entrepreneurs amongst virus fighters and
|
||
|
their nemesis, the virus writers." There is no "phalleocentric
|
||
|
anti-virus community" (thank heavens!).
|
||
|
|
||
|
In fact, outside of the IBM MS-DOS arena, I would question if the view
|
||
|
described exists elsewhere. I have not heard anything resembling
|
||
|
these same descriptions applied to those working with viruses in
|
||
|
Atari, Amiga, or (almost non-existant) Unix environments. From my
|
||
|
perspective, which reaches back to where I think I was principal
|
||
|
author of the second or third book written on viruses (not counting
|
||
|
Cohen's dissertation as a book), even the MS-DOS community was not
|
||
|
always as described. A few greedy and self-serving people changed the
|
||
|
field for the vendors, and a few destructive virus authors changed it
|
||
|
for everyone else. Even so, there are some people in the MS-DOS
|
||
|
anti-virus field who are not malicious, territorial, or avaricious.
|
||
|
Ken van Wyk, Vesselin Bontchev, David Ferbrache, and Fridrick Skulason
|
||
|
all come to mind without much effort as good examples of community
|
||
|
spirit and cooperative effort. There have been, and are, others.
|
||
|
|
||
|
I don't doubt that Mr. Smith's view is entertaining and informative.
|
||
|
I hope that it is more balanced and fair, however, in its presentation
|
||
|
than I might imagine from the review and the excerpt. The attitudes
|
||
|
and behaviors discussed could more likely be blamed on repeated
|
||
|
exposure to MS-DOS than to viruses or personal computers, especially
|
||
|
when we look at the record of behavior of others. It would be a pity
|
||
|
if the book presents a local phenomenon as the global picture.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 7 Mar 1995 12:13:20 -0600
|
||
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
||
|
Subject: File 2--Acm-IIT Computers Seized by Ill. Institute of Tech (fwd)
|
||
|
|
||
|
ACM-IIT COMPUTERS SEIZED BY ILLINOIS INSTITUTE OF TECHNOLOGY
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
ACM - The First Society in Computing
|
||
|
|
||
|
"AND LET IT BE KNOWN THROUGHOUT THE WORLD WHAT WAS DONE THIS DAY..."
|
||
|
|
||
|
DATELINE TUESDAY JANUARY 17, 1995
|
||
|
|
||
|
Today sometime before noon today, the Illinois Institute of Technology
|
||
|
seized the computer systems of the Association for Computing Machinery
|
||
|
student chapter at IIT.
|
||
|
|
||
|
700 Student and Faculty users are not happy. And are now without their
|
||
|
Email and other private files. The locations of the ACM-IIT systems is
|
||
|
currently unknown, and the security of the system and the accounts on
|
||
|
it is highly questionable, as it was quite literally riped out of the
|
||
|
wall. ( a piece of the modem was found lying on the table ).
|
||
|
|
||
|
The reasons given by IIT where that members of ACM-IIT are suspected
|
||
|
of hacking into the computer of another IIT student group, and pulling
|
||
|
several pranks.
|
||
|
The memo sent to the Dean of Students details the hacking attempt, but
|
||
|
no evidence points to ACM-IIT's systems or to any of their users, but
|
||
|
the memo does make several unbacked accusations. And at this time, we
|
||
|
can see no reason ACM-IIT would even be tied to the events. However
|
||
|
because ACM-IIT members are suspect, the systems where unlawfully
|
||
|
seized by IIT.
|
||
|
|
||
|
|
||
|
IIT has no legal right to seize ACM-IIT's systems, nor anyone else, as
|
||
|
they contain private accounts, files, and Email.
|
||
|
Such rights are protected under the Electronic Communications Privacy
|
||
|
Act (ECPA), which extended most of the protections of the federal
|
||
|
Wiretap Act ("Title III") to electronic mail.
|
||
|
Precidence was established in the case Secret Service vs. Steve
|
||
|
Jackson Games decided March 12, 1993 in favor of SJG (1) (2)
|
||
|
|
||
|
Needless to say, ACM-IIT members are not too happy about all of this.
|
||
|
And the other 700 people don't seem happy either.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE WEDNESDAY JANUARY 18, 1995
|
||
|
* Members realize that along with Troll, which is physicaly
|
||
|
considered IIT's property even tho it was purchased with student
|
||
|
funds, property of ACM-IIT members was also seized includind a
|
||
|
network card, SIMM modules, and the modem that was broken by IIT
|
||
|
during the seizure.
|
||
|
* ACM recieves writen copy of allegations and supposed proof that
|
||
|
ACM systems where used in the attempt. However the evidence
|
||
|
clearly shows that other IIT owned systems where used and NOT
|
||
|
ACM-IIT's systems.
|
||
|
* Electronic Frontier Foundation is called and informed of the
|
||
|
situation, and begins investigating the situation.
|
||
|
* ACM-IIT hears that the computer system is in the process of being
|
||
|
searched by IIT staff, and ACM-IIT members now consider the
|
||
|
system compromised. Still no evidence showing ACM-IIT
|
||
|
involvement.
|
||
|
* Word continues to spread amung the IIT community, many more
|
||
|
students and faculty are outraged about the seizure of their
|
||
|
accounts and files.
|
||
|
* Continued stress to students due to the lack of access to their
|
||
|
Email, addressbooks, and other files. Email is now being lost in
|
||
|
mass due to the ACM-IIT systems removal, much of which is
|
||
|
considered critical by many people.
|
||
|
* ACM-IIT members miss the ACM Chicago Chapter meeting due to the
|
||
|
fact that all the info concerning time/location was stored on the
|
||
|
seized systems.
|
||
|
|
||
|
|
||
|
|
||
|
More info on previous legal cases involving seizure of systems and the
|
||
|
data they contain.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE THURSDAY JANUARY 19, 1995
|
||
|
|
||
|
|
||
|
|
||
|
Everyone waits for the Dean of Students hearing friday morning...
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE FRIDAY JANUARY 20, 1995
|
||
|
|
||
|
|
||
|
|
||
|
* IIT agrees to put ACM-IIT's computer back online "late next week"
|
||
|
provided ACM-IIT is on it's own subnet, and IIT gets root access
|
||
|
to the machine, and can take the machines offline at anytime.
|
||
|
* ACM-IIT meets in an emergency meeting, and unanimously votes that
|
||
|
the terms are completely unreasonable and that ACM-IIT cannot
|
||
|
continue to operate machines on the internet under IIT's
|
||
|
conditions and maintain services and security.
|
||
|
+ ACM-IIT mobalizes to aquire donatated or private machines to
|
||
|
provide services on, so that hopefully at least some legal
|
||
|
rights will have to be respected by IIT.
|
||
|
+ Calls will be made Monday to INTERNIC to hopefully expedite
|
||
|
ACM-IIT's applications mailed in several weeks ago for IP
|
||
|
space and the domain name acm-iit.org
|
||
|
+ Searching begins for a site with a T1 line or better to host
|
||
|
ACM-IIT's systems, since IIT will not assure that ACM-IIT
|
||
|
will have access to the net at all times, and wants student
|
||
|
groups off of IIT's backbone. This means several services
|
||
|
cannot be offered by ACM-IIT, but at least most can.
|
||
|
* On the matter of the disciplinary action without any proof, the
|
||
|
Dean of Students makes the statement "This isn't a court of law,
|
||
|
we don't need proof." Several students including the acused start
|
||
|
looking at other schools, looking for someplace they will be
|
||
|
allowed to make a difference.
|
||
|
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE MONDAY JANUARY 23, 1995
|
||
|
|
||
|
|
||
|
|
||
|
Various people and organizations now helping ACM-IIT with the
|
||
|
situation, but it has yet to resolve itself. Several additional
|
||
|
courses of action are proposed as ACM-IIT seeks to get back online
|
||
|
ASAP.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE TUESDAY JANUARY 24, 1995
|
||
|
|
||
|
|
||
|
|
||
|
At the Student Leadership Committee meeting, the issue is brought up
|
||
|
and a subcommittee is formed to investigate the actions taken buy the
|
||
|
Dean of Students office and IIT.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE FRIDAY JANUARY 27, 1995
|
||
|
|
||
|
|
||
|
|
||
|
After another Meeting with the Dean of Students, ACM members are
|
||
|
finally allowed to take back the privately owned property in the
|
||
|
machine, and also are allowed to take the hard drive. ACM-IIT now has
|
||
|
possesion of all the data/files/Email on the system. Plans to get
|
||
|
ACM-IIT back onto the internet ASAP with the help of Ripco
|
||
|
Communications, Inc. a local Internet Provider are made.
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE SATURDAY/SUNDAY JANUARY 28-29, 1995
|
||
|
|
||
|
|
||
|
|
||
|
ACM-IIT members attempt to gather the needed PC hardware to restore
|
||
|
services. Corporate donations are sought, and many friends are called.
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE JANUARY 30TH - FEBRUARY 9TH, 1995
|
||
|
* On February 1st IIT agreed to allow users files and Email to be
|
||
|
placed back online for users to download, however ACM-IIT will not
|
||
|
be allowed to administrate systems directly attached to IIT
|
||
|
networks.
|
||
|
* Due to problems coordinating with IIT staff, ACM-IIT systems are
|
||
|
still offline, but will hopefully be online somewhere relatively
|
||
|
soon.
|
||
|
* ACM-IIT submitted a proposal to IIT to allow ACM-IIT back online
|
||
|
to run their systems if a firewall could be acquired, but has
|
||
|
still not heard back from IIT officials.
|
||
|
* ACM-IIT members continue to attempt to gather enough PC hardware
|
||
|
to leave IIT's network for another site where the systems will be
|
||
|
secure.
|
||
|
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
DATELINE FEBRUARY 15TH, 1995
|
||
|
* The ACM-IIT system is placed back online for users to download
|
||
|
their files pending a permanent solution to the problem.
|
||
|
* However the system is again rendered inaccessable when the
|
||
|
nameserver entries are rechanged, and some IIT machine is told to
|
||
|
respond as if it where ACM's system and refuse connections.
|
||
|
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
|
||
|
|
||
|
This document would be on the ACM-IIT Web site, but we don't have one
|
||
|
anymore.
|
||
|
|
||
|
|
||
|
So now it lives at http://xtreme.acc.iit.edu:4242/~bebeada/ and is
|
||
|
mirrored at http://rci.ripco.com:8080/~bebeada/ACM.html
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: 07 Mar 95 17:59:53 EST
|
||
|
From: Gordon Meyer <72307.1502@compuserve.com>
|
||
|
Subject: File 3--Cu in the news
|
||
|
|
||
|
Harris-steria?
|
||
|
=========
|
||
|
A recently-spotted ad for an Internet firewall begins with the
|
||
|
ominious proclimation that "Every 20 seconds, a network is
|
||
|
infiltrated. Vital files are sabotaged. Corporate secrets, financial
|
||
|
data and sensitive customer information are stolen, and all traces of
|
||
|
the intrusion are erased. The futures of companies which took years to
|
||
|
build are terminated in a few short seconds".
|
||
|
|
||
|
Every 20 seconds? That amounts to 4320 companies having their futures
|
||
|
"terminated" every 24 hours (we all know hackers never sleep). In
|
||
|
February alone that would be over 108,000 companies, assuming that
|
||
|
most hackers took Valentine's Day off. Yearly calculations are left
|
||
|
as an exercise for the reader.
|
||
|
|
||
|
===============================================================
|
||
|
|
||
|
The Software Publishers Association (SPA) reports that of the calls
|
||
|
they received on their "piracy hot line", they took action against 447
|
||
|
organizations in the U.S. That's 23% fewer actions then in 1993. The
|
||
|
SPA "actions" include 197 audits aned lawsuits, netting $2.7 million
|
||
|
in penalties. (Datamation. March 1, 1995. pg 26)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 26 Feb 95 02:53:04 +0200
|
||
|
From: RMthawanji@UNIMA.WN.APC.ORG
|
||
|
Subject: File 4--Role-playing adventure BBS starting New game
|
||
|
|
||
|
For about six months I've been running a role-playing adventure on
|
||
|
my BBS the message areas. I got a lot of response and all the people
|
||
|
playing had a pretty good time. I've decided to open the next
|
||
|
adventure to ANYONE with an E-mail account for no charge. The games
|
||
|
ruling systems will be Warhammer Fantasy Role-Play based, with some small
|
||
|
variation into other role playing systems. Its ideal for all modem-literate
|
||
|
Games workshop junkies!!
|
||
|
|
||
|
_Anyone_ intrested in joining the game should mail me at:
|
||
|
Email: Rmthawanji@unima.wn.apc.org
|
||
|
Fido: 5:7231/1.113 (FIDO)
|
||
|
Please include somwhere in the body of your message, your most frequently
|
||
|
used email address and your age. Also, as a matter of intrest, please
|
||
|
include any other role playing systems you've played & details.
|
||
|
|
||
|
I am also looking for a server to run this via Email off (ie. a listserv
|
||
|
of some sort). I'm not familiar with the basics of running something off
|
||
|
a list server, but I'm pretty sure I'll be able to get to grips with it
|
||
|
pretty quickly. If there's anyone willing to explain how use a listserver
|
||
|
to run the adventure off, and show me one to use, please do contact me..
|
||
|
I'm also looking for someone to post this in all relevant USENET news
|
||
|
groups - if you find the time to do so, just let me know once its posted.
|
||
|
|
||
|
The first adventure will start as soon as I get 10 players ready to go.
|
||
|
Players joining after the adventure has began should Email me as normal,
|
||
|
and I will reply and brief them on the on going adventure, give them
|
||
|
their characters & start them up as soon as possible. The second adventure
|
||
|
will begin when there are 15 players, who've opted for it ,ready to go.
|
||
|
|
||
|
Yes as you've noticed, I'm running TWO adventures, from the brief
|
||
|
descriptions below please decide NOW, which you want to join and
|
||
|
state that somewhere in your Email.
|
||
|
|
||
|
<1> - The Tower Of Despair - Delve into another dimension of danger &
|
||
|
excitement as a terrible evil unfolds
|
||
|
across the empire!
|
||
|
<2> - The Legions Undead - Bretonnia, a kingdom previously of great
|
||
|
beauty & tranquility. Now the dead all
|
||
|
across the land groan and writhe in their
|
||
|
tombs as peril befalls the land ...
|
||
|
|
||
|
From the list below, select a career class for your character and include
|
||
|
that in your email.
|
||
|
|
||
|
1) Warrior
|
||
|
2) Rogue
|
||
|
3) Ranger
|
||
|
4) Academic (cleric, druids etc.)
|
||
|
- these are only the basic choices the rest is determined randomly -
|
||
|
|
||
|
Once I've generated your character, I'll send a copy to you to keep
|
||
|
and modify between each turn. You'll then be required to send
|
||
|
a short and un-exaggerated piece on your characters background and
|
||
|
description matching your characters stats.
|
||
|
|
||
|
To play the adventure you'll need a map, I'll place a GIF map on an
|
||
|
FTP site and inform all users who've joined the adventure. Eventually,
|
||
|
once the adventure is complete, I'll compile it into a story and put
|
||
|
it on a couple of FTP sites & BBSes for others to see.
|
||
|
|
||
|
If you use PGP, please send your Public key along with your Email.
|
||
|
Looking forward to a pretty mad adventure ... the whole thing will
|
||
|
be pretty informal so tag along, it should be good (famous last
|
||
|
words. )
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 4 Mar 1995 22:25:58 +1000
|
||
|
From: Rhys Weatherley <rhys@FIT.QUT.EDU.AU>
|
||
|
Subject: File 5--"You all support child porn" and other rubbish
|
||
|
|
||
|
Frankly, I'm getting a little sick of views such as the following, which
|
||
|
seem to crop up with regularity in the free speech vs censorship debate:
|
||
|
|
||
|
> If you want it to be legal for people to use email, or web pages, or
|
||
|
> improvised FidoNets or whatever to send around JPGs of perverts raping
|
||
|
> 6 year olds, or detailed descriptions of rape/murder/torture fantasies
|
||
|
> with people's real names for the victims, or GIFs of people having sex
|
||
|
> involving excrement, carving knives, and/or animals ... well, then say
|
||
|
> so!
|
||
|
|
||
|
Brad Hicks was the author of that little gem, but there are many more
|
||
|
like it all the Net over.
|
||
|
|
||
|
Very few free speech supporters, myself included, want that kind of
|
||
|
crap distributed on the Internet or anywhere. Most of it takes an
|
||
|
actual physical crime to produce the information. It is therefore not
|
||
|
free speech by any stretch of the imagination. It is a crime, and
|
||
|
should be punished to the full extent of the law.
|
||
|
|
||
|
However, by raising these little gems, Brad and those like him do the
|
||
|
anti-Net-censorship movement a great disservice. Those are extreme
|
||
|
examples which are easily dealt with by after-the-fact complaints and
|
||
|
clean-up mechanisms, handing the perpetrators off to the cops at the
|
||
|
earliest opportunity. Before the fact scanning is not required, yet
|
||
|
S.314 certainly seems to require it.
|
||
|
|
||
|
It is all the other things, which are NOT extreme, which the free speech
|
||
|
advocates want people to be able to say and do without reprisal. Whilst
|
||
|
some of the non-extreme things may not be in the best of taste, they do not
|
||
|
involve physical crimes to make the information. Heavy handed control and
|
||
|
scanning is not required to deal with this. Personal choice, parental
|
||
|
supervision, kill files, and the unsubscribe function are plenty good
|
||
|
enough. Yet S.314 still seems to require scanning.
|
||
|
|
||
|
Raising the extreme examples twists the debate and paints the supporters
|
||
|
of free speech as criminals, and only serves to frighten those people who
|
||
|
do not understand the true implication of a monitored and scanned
|
||
|
society: "we may get rid of what most ordinary people don't like, but
|
||
|
what else will we get rid of in the process?".
|
||
|
|
||
|
I recently spent an interesting afternoon attending a panel on censorship
|
||
|
given by 4 Australian authors. The first 3 said a lot of very good
|
||
|
things about anti-censorship. The last, a very staunch Australian feminist,
|
||
|
gets up and says "I support free speech. However defamation is not free
|
||
|
speech." So far so good (more or less). Then she says "Pornography is
|
||
|
defamation against women. Therefore pornography is not free speech and
|
||
|
we should ban it, especially on the Internet". She was seeking to
|
||
|
redefine what she didn't like as something else so that she could ban it.
|
||
|
And this is a free speech supporter!
|
||
|
|
||
|
Interestingly, she trotted out all of the extreme examples (child porn,
|
||
|
degrading sex scenes, etc, etc, etc) to justify her case, snowing the
|
||
|
audience into thinking that all of it is like that. My efforts, and those
|
||
|
of a couple of others in the audience didn't really help to dissuade her.
|
||
|
Probably because we were men. :-( I left feeling that the rest of the
|
||
|
audience (mostly women) had bought her line, because they didn't realise
|
||
|
that she was using extremes to justify her case.
|
||
|
|
||
|
The danger that I see in S.314, and proposals currently before the Australian
|
||
|
Federal Government, is that they seek to blame first, ask questions later.
|
||
|
Yes, the word "knowingly" is in there, but how is that going to help the
|
||
|
Internet-on-a-shoestring provider pay their legal costs to point the finger
|
||
|
at their users? Will they go bankrupt trying to prove their aren't liable,
|
||
|
or will they get fined or go to jail because they are financial nobodies?
|
||
|
Make no mistake about it: the big Internet providers will be protected.
|
||
|
No one will bother hauling them into court. But the little providers will
|
||
|
get it in the neck because they are easy targets. Is this how we want
|
||
|
the future of law enforcement to operate? Targeting the weak because the
|
||
|
police can get away with it?
|
||
|
|
||
|
Eventually laws may be needed to deal with the extreme examples. But this
|
||
|
can only happen after we clear up the liability question. When police make
|
||
|
it a matter of policy of targetting users first, and only targetting
|
||
|
providers when evidence of conspiracy comes to light, then we can start
|
||
|
to have some sanity in laws about the net. Until then, S.314 and its ilk
|
||
|
are very dangerous things to have on the law books.
|
||
|
|
||
|
So, please cut the crap about the extreme examples. It isn't helping.
|
||
|
It merely diverts attention away from the real issues that free speech
|
||
|
advocates are trying to raise. Most of us do NOT consider the extremes
|
||
|
free speech. Stop trying to claim that we do.
|
||
|
|
||
|
Cheers,
|
||
|
|
||
|
Rhys Weatherley, President of BrisNet, an Internet service provider in
|
||
|
Brisbane, Australia. Also the head of the Australian Computer Society
|
||
|
and Electronic Frontiers Australia task force on "Freedom in Cyberspace".
|
||
|
E-mail rhys@brisnet.org.au for details.
|
||
|
|
||
|
P.S. I have a lot of respect for the feminist movement and the quest for
|
||
|
equality. My intention was not to debate the merits of the feminist
|
||
|
movement but merely to point out that some people are using extremes
|
||
|
to sidetrack the censorship debate because of personal distaste for
|
||
|
certain things. In the long run, this is a diversion, not a solution.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 1 Mar 1995 03:22:05 -0800
|
||
|
From: ceh@LELAND.STANFORD.EDU(Carey Heckman)
|
||
|
Subject: File 6--Alert #1: Fifth Conference on Computers, Freedom and Privacy
|
||
|
|
||
|
* WHY CFP
|
||
|
* WHAT'S NEW FOR '95?
|
||
|
* EARLY REGISTRATION DEADLINE: FEBRUARY 24
|
||
|
* PAEAN TO UNSUNG HEROES
|
||
|
* THE WHOLE WORLD WILL BE WATCHING
|
||
|
* CONNECTING TO CFP'95
|
||
|
|
||
|
WHY CFP
|
||
|
|
||
|
Never has the need for a conference on computers, freedom,
|
||
|
and privacy been so urgent.
|
||
|
|
||
|
New laws are being proposed. New commercial ventures are
|
||
|
being launched. New arrests are being made. New conceptions
|
||
|
(and misconceptions) are being spread by newspapers,
|
||
|
magazines, books, and broadcast media. New lawsuits are being
|
||
|
filed. New databases are being created.
|
||
|
|
||
|
In short, new threats are emerging and new crises are brewing,
|
||
|
all while new opportunities are evolving.
|
||
|
|
||
|
Exploring and better understanding the definition of our
|
||
|
rights at this crucial crossroads of the Information Age
|
||
|
requires a balanced public forum that includes participants
|
||
|
from computer science, law, business, research, information,
|
||
|
library science, health, public policy, law enforcement,
|
||
|
public advocacy, and others.
|
||
|
|
||
|
That's the Fifth Conference on Computers, Freedom and
|
||
|
Privacy. March 28-31, 1995. Burlingame, California.
|
||
|
|
||
|
WHAT'S NEW FOR '95?
|
||
|
|
||
|
If you have attended a previous Conference on Computers,
|
||
|
Freedom and Privacy, you have some idea of the high quality
|
||
|
and diversity of people the conference attracts as speakers
|
||
|
and attendees. CFP'95 continues that tradition, but breaks
|
||
|
new ground as well.
|
||
|
|
||
|
Topics: CFP'95 covers the critical issues of the day,
|
||
|
including those that touch on freedom of speech, privacy,
|
||
|
access to public records, freedom of association, and fair
|
||
|
access to computer and telecommunications technologies. The
|
||
|
program gives particular emphasis to how the growth of
|
||
|
computer and data communications into the mainstream expands
|
||
|
and threatens our freedoms.
|
||
|
|
||
|
Speakers: With more than half of the CFP'95 Program Committee
|
||
|
new to organizing the conference, it should come as no
|
||
|
surprise that CFP'95 is far from a gathering of the usual
|
||
|
suspects.
|
||
|
|
||
|
Among this year's featured speakers are John Morgridge, chairman
|
||
|
of Cisco Systems; Roger Wilkins a Pulitzer Prize-winning
|
||
|
commentator for National Public Radio and Professor of History
|
||
|
and American Culture at George Mason University; Margaret Jane
|
||
|
Radin, a Stanford Law School professor and expert on property
|
||
|
law and political philosophy; and Esther Dyson, founder of EDventure
|
||
|
Holdings, editor of Release 1.0., co-chair of the National
|
||
|
Information Infrastructure Advisory Council's Information Privacy
|
||
|
and Intellectual Property Subcommittee, and among the leading
|
||
|
experts on computers, software, and computer communications in
|
||
|
Eastern Europe and the former Soviet Union.
|
||
|
|
||
|
Also included in the CFP'95 program are
|
||
|
|
||
|
* Kent Walker, the Assistant United States Attorney who
|
||
|
led the investigation and arrest of Kevin Mitnick.
|
||
|
|
||
|
* Brock Meeks, the journalist who defended himself from
|
||
|
an Internet libel lawsuit earlier this year.
|
||
|
|
||
|
* Pamela Samuelson, the University of Pittsburgh law professor
|
||
|
who co-authored the manifesto urging a radical redefinition
|
||
|
of legal protection for computer software.
|
||
|
|
||
|
* Roger Karraker, the director of the Santa Rosa Junior
|
||
|
College journalism program where the tension between
|
||
|
free speech and sexual harassment on computer bulletin
|
||
|
boards became a national news story.
|
||
|
|
||
|
* Virginia Rezmierski, the advisor on policy to the Vice
|
||
|
Provost for Information Technology at the University of
|
||
|
Michigan where Jake Baker was indicted for publishing a
|
||
|
story on the Internet.
|
||
|
|
||
|
Formats: The issues discussed at CFP'95 have two or more
|
||
|
sides, and rather than have panel of speakers after panel of
|
||
|
speakers, the session formats have been designed to showcase
|
||
|
different perspectives and stimulate audience interaction.
|
||
|
|
||
|
For example, Thursday afternoon features a Socratic forum on free
|
||
|
speech and responsibility, led by professional moderator Professor
|
||
|
Kim Taylor-Thompson of Stanford Law School. A Socratic forum assembles
|
||
|
experts from various disciplines who role play themselves in a
|
||
|
hypothetical scenario. The moderator fires questions and stokes
|
||
|
discussion between the experts to create a bright light of information
|
||
|
(as well as some white hot heat of controversy).
|
||
|
|
||
|
EARLY REGISTRATION DEADLINE: FEBRUARY 24
|
||
|
|
||
|
Register this week to save as much as $175 in registration
|
||
|
fees. You can do this by mail, phone, fax, or electronic
|
||
|
mail. See the contact information below for how to get
|
||
|
registration information.
|
||
|
|
||
|
PAEAN TO UNSUNG HEROES
|
||
|
|
||
|
Each Conference on Computers, Freedom, and Privacy is a non-
|
||
|
profit, non-commercial event. CFP'95 is no exception.
|
||
|
Volunteer Coordinator Judi Clark has already assembled a
|
||
|
remarkable corps of volunteers who will be staffing the
|
||
|
registration desk, making sure sessions go smoothly, taking
|
||
|
photographs, and a host of other indispensable functions.
|
||
|
|
||
|
Many thanks in advance to Judi and the rest of the volunteers
|
||
|
for making CFP'95 possible.
|
||
|
|
||
|
THE WHOLE WORLD WILL BE WATCHING
|
||
|
|
||
|
Media Coordinator Scott Nicholas reports active press interest in CFP'95.
|
||
|
Requests for press credentials have already been received from national
|
||
|
newspapers, newsweeklies, broadcast media, foreign publications, and a
|
||
|
variety of trade magazines. Past CFPs have attracted CNN, the New York
|
||
|
Times, The Washington Post, and USA Today.
|
||
|
|
||
|
CONNECTING TO CFP'95
|
||
|
|
||
|
Registration and other information about CFP'95 is readily
|
||
|
available from many sources:
|
||
|
|
||
|
By WWW: URL=http://www-techlaw.stanford.edu/CFP95.html
|
||
|
By Gopher: www-techlaw.stanford.edu
|
||
|
By FTP: www-techlaw.stanford.edu
|
||
|
By Email: Info.CFP95@forsythe.stanford.edu
|
||
|
By Fax: (415) 548-0840
|
||
|
By Telephone: (415) 548-9673
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 1 Mar 1995 06:28:08 -0500
|
||
|
From: Kevin Douglas Hunt <huntk@RPI.EDU>
|
||
|
Subject: File 7--CMC Magazine March Issue
|
||
|
|
||
|
The March Issue of COMPUTER-MEDIATED COMMUNICATION MAGAZINE
|
||
|
has hit the Web. Look for it here:
|
||
|
|
||
|
http://sunsite.unc.edu/cmc/mag/current/toc.html
|
||
|
|
||
|
Here's a look at what's inside the March issue:
|
||
|
|
||
|
|
||
|
|
||
|
COMPUTER-MEDIATED COMMUNICATION MAGAZINE
|
||
|
|
||
|
ISSN 1076-027X / Volume 2, Number 3 / March 1, 1995
|
||
|
___________________________________________________________________
|
||
|
|
||
|
|
||
|
Editor's Page
|
||
|
|
||
|
COVER STORY
|
||
|
E-Literacies: Politexts, Hypertexts, and Other Cultural
|
||
|
Formations in the Late Age of Print
|
||
|
|
||
|
In her novel Pintamento, Lillian Hellman advises her best
|
||
|
friend Julia to "Take Chances!!" Now, it's your turn. Writer,
|
||
|
educator, artist, and hypertext theorist Nancy Kaplan presents us
|
||
|
with an intriguing challenge to explore the creative
|
||
|
possibilities of hypertext.
|
||
|
|
||
|
|
||
|
CMC NEWS
|
||
|
Are You Decent?
|
||
|
|
||
|
Senator James Exon's new Senate Bill, the Communications Decency
|
||
|
Act of 1995, is causing an uproar in the online community. Some
|
||
|
netizens are calling it the greatest challenge yet to the First
|
||
|
Amendment. Kirsten Cooke's news report sheds light on the issue
|
||
|
and the varied responses to it.
|
||
|
|
||
|
|
||
|
The Cutting Edge: News in Brief
|
||
|
|
||
|
Chief Correspondent Chris Lapham rounds up the latest in CMC
|
||
|
News: the seizure of a Finnish Postnews server by Interpol, the
|
||
|
resurrection of the WebAnts project, and the first G7
|
||
|
International Communications Policy conference.
|
||
|
|
||
|
|
||
|
FEATURES
|
||
|
Book Excerpt:
|
||
|
Computer-Mediated Communication and Community
|
||
|
|
||
|
We are creating new worlds, and our imaginations and thoughts
|
||
|
will be the forces that colonize the electronic frontier: Steve
|
||
|
Jones's romantic vision of a wired society is artfully presented
|
||
|
in this introductory chapter from his new book of essays,
|
||
|
CyberSociety: Computer-Mediated Communication and Community.
|
||
|
|
||
|
|
||
|
Book Excerpt:
|
||
|
Computer-Mediated Communication and the Online Classroom in
|
||
|
Higher Education
|
||
|
|
||
|
A look at the introduction to the second of three volumes by Zane
|
||
|
Berge and Mauri Collins, which examines computers in the
|
||
|
educational environment.
|
||
|
|
||
|
|
||
|
Well-Constructed Gophers: Is Your Gopher Golden?
|
||
|
|
||
|
The Internet Gopher has proven to be a popular tool for
|
||
|
delivering information, but how do you make a "golden" Gopher?
|
||
|
Jeff Kosokoff presents a schema for appraising and improving
|
||
|
Gopher servers.
|
||
|
|
||
|
|
||
|
Electronic Feedback: CMC Magazine Visits The Netoric Cafe
|
||
|
|
||
|
You are cordially invited to "eavesdrop" on the virtual debates
|
||
|
that followed our January special issue, "Previews, Predictions,
|
||
|
Prognostications." Various "technorhetoricians" met in MOOspace
|
||
|
to discuss pedagogical issues with Netoric founders Tari
|
||
|
Fanderclai and Greg Siering.
|
||
|
|
||
|
|
||
|
REVIEW
|
||
|
Cybersmith: Tales of the First Coffee Shop on the Infobahn
|
||
|
|
||
|
CMC Magazine Graphics Editor Jason Teague reviews what he calls
|
||
|
"the latest evolution of cyberspace," a coffee-klatch
|
||
|
establishment in Cambridge, Mass. called "Cybersmith." It's a
|
||
|
place where technojunkies go to combine the two C's which keep
|
||
|
them all moving -- computers and coffee, but in a public space
|
||
|
rather than a basement apartment.
|
||
|
|
||
|
|
||
|
DEPARTMENTS
|
||
|
|
||
|
From the Nets . . .
|
||
|
Women on the Web by Lisa Schmeiser
|
||
|
Of Style and Substance by Lisa Schmeiser
|
||
|
|
||
|
Mbox
|
||
|
Vic Moberg responds to Laura Gurak's February Last Link.
|
||
|
|
||
|
|
||
|
The Last Link:
|
||
|
Ubiquitous Computing vs. Radical Privacy: A Reconsideration of
|
||
|
the Future
|
||
|
|
||
|
Consider Porush's Law: "Participating in the newest
|
||
|
communications technologies becomes compulsory if you want to
|
||
|
remain part of the culture." David Porush embarks on a Talmudic
|
||
|
journey toward understanding "future culture" in his response to
|
||
|
Steve Doheny-Farina's October, 1994 Last Link.
|
||
|
|
||
|
|
||
|
___________________________________________________________________
|
||
|
|
||
|
Kevin Hunt (huntk@rpi.edu)
|
||
|
Assistant Editor, *Computer-Mediated Communication Magazine*
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: 02 Mar 95 16:48:17 EST
|
||
|
From: "Kelly L. O'Keefe" <76711.1476@COMPUSERVE.COM>
|
||
|
Subject: File 8--TIME WARNER ELECTRONIC PUBLISHING
|
||
|
|
||
|
FOR IMMEDIATE RELEASE
|
||
|
|
||
|
CONTACT: Kelly Leonard O'Keefe, TWEP Publicity, 212-522-4643
|
||
|
|
||
|
TIME WARNER ELECTRONIC PUBILISHING ANNOUNCES
|
||
|
PARTNERSHIP WITH LEARN TECHNOLOGIES, INC.
|
||
|
|
||
|
Product Development and Creative Partnership Deal Signed
|
||
|
|
||
|
|
||
|
NEW YORK, NY, March 2, 1995 -- A partnership between Time Warner
|
||
|
Electronic Publishing (TWEP) and Learn Technologies, Inc. (LTI), in
|
||
|
conjunction with Warner Books Multimedia Corp., a subsidiary of Warner
|
||
|
Books, Inc., has been announced today by Andrew Lerner, Director of
|
||
|
TWEP, and Luyen Chou, President and CEO of LTI. LTI's partnership
|
||
|
with TWEP, the multimedia arm of Warner Books and Little, Brown and
|
||
|
Company, has created Learn Technologies Interactive.
|
||
|
|
||
|
In tandem with TWEP, Learn Technologies Interactive will design,
|
||
|
develop and publish cutting-edge entertainment, educational and
|
||
|
informational multimedia CD-ROM products. Drawing on LTI founders'
|
||
|
experience in educational technologies and TWEP's content and
|
||
|
distribution resources, the partnership will focus on developing and
|
||
|
distributing interactive titles for home and institutional use. The
|
||
|
products will combine the production quality and design standards of
|
||
|
the most sophisticated interactive games with the latest in
|
||
|
interactive learning concepts.
|
||
|
|
||
|
"Educational products have largely failed to live up to their promise.
|
||
|
The partnership's goal is to create truly interactive products that
|
||
|
excite and provoke," said Chou. "We expect educational multimedia to
|
||
|
propel the rapid growth in CD-ROM sales the industry will see over the
|
||
|
next several years, and we intend to be at the forefront of this
|
||
|
trend."
|
||
|
|
||
|
Several titles are currently under development in collaboration with
|
||
|
museums, cable television networks, publishers and other information
|
||
|
providers. Release dates are scheduled for the 1995 holiday season. A
|
||
|
sampling of projects includes:
|
||
|
|
||
|
* Bartlett's Familiar Quotations, Electronic Edition-- 140 years in
|
||
|
the making, Bartlett's Familiar Quotations on CD-ROM expands the
|
||
|
concept of quotation to include picture, sound, and video quotes. The
|
||
|
powerful search engine gives easy access to 2,550 authors and over
|
||
|
20,000 quotations, making Bartlett's the '90s reference tool for
|
||
|
expression.
|
||
|
|
||
|
* Dynasty--A photo-realistic adventure game set in the tomb of Qin
|
||
|
Shi Huang Di, the first emperor of China. Playing the role of a daring
|
||
|
archaeologist, the user will solve riddles and brave ancient traps to
|
||
|
discover the tomb's secrets. Based upon the best scholarly guesses on
|
||
|
the contents and structure of this as-yet unexcavated site, the
|
||
|
program will also include an on-line library of Qin culture, Chinese
|
||
|
history, archaeology and historiography.
|
||
|
|
||
|
* A Search for Justice: CaseMaker I--The Rodney King Case--Created in
|
||
|
collaboration with Courtroom Television Network, L.P., the first title
|
||
|
in the series is based upon the Rodney King case. Users argue for the
|
||
|
defense or the prosecution by constructing multimedia presentations
|
||
|
from a wealth of primary materials on the CD-ROM. Seventh-graders,
|
||
|
Harvard Law students and practicing attorneys have already given
|
||
|
Casemaker an enthusiastic response.
|
||
|
|
||
|
"With LTI's creative talent, brain power, and academic know-how and
|
||
|
TWEP's content, acquisition and retail distribution power," commented
|
||
|
Lerner, "this partnership puts us in a tremendous position for the
|
||
|
future of entertainment and educational multimedia products."
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 26 Feb 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 9--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB <your name>
|
||
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.19
|
||
|
************************************
|
||
|
|