868 lines
40 KiB
Plaintext
868 lines
40 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed Mar 10 1993 Volume 5 : Issue 19
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Eater: Etaion Shrdlu, Senior
|
||
|
||
CONTENTS, #5.19 (Mar 10 1993)
|
||
File 1--Author responds to Shopping Mall criticism
|
||
File 2--Re: Hackers in the News (CuD #5.18)
|
||
File 3--Internet Talk Radio (fwd)
|
||
File 4--Call for Stories -- Reasons to Build the NII
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210;
|
||
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
red.css.itd.umich.edu (141.211.182.91) in /cud
|
||
halcyon.com( 192.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Wed, 10 MAR 93 13:27:55 GMT
|
||
From: CAROLINA@VAX.LSE.AC.UK
|
||
Subject: File 1--Author responds to Shopping Mall criticism
|
||
|
||
CuD 5.07 published my article "Scenes of Passive Resistance at a
|
||
Shopping Mall" which presented a legal strategy based on accounts of
|
||
the Washington 2600 incident. I have received a good deal of feedback
|
||
since then and CuD has published two detailed responses. I felt that
|
||
it would be appropriate to respond to a few of the criticisms raised.
|
||
|
||
In CuD 5.08, ims@beach.kalamazoo.mi.us had a number of things to say
|
||
about lawyers -- many not very positive. While I appreciate his/her
|
||
generally favorable response to the article, there were three points I
|
||
wish to respond to. The first deals with a lawyer's duty to a client.
|
||
|
||
>Also, see Corpus Juris Secundum (CJS), Volume 7, Section 4,
|
||
>Attorney & client: "The attorney's first duty is to the courts and
|
||
>the public, NOT TO THE CLIENT, and wherever the duties to his
|
||
>client conflict with those he owes as an officer of the court in
|
||
>the administration of justice, THE FORMER MUST YIELD TO THE
|
||
>LATTER." (emphasis mine) I trust this needs no further
|
||
>explanation.
|
||
|
||
Unfortunately, this requires a great deal more explanation. First,
|
||
the statement in CJS (which is a legal encyclopedia, and not positive
|
||
law) must be offset by the law regarding a lawyer's duty to his
|
||
client. In every U.S. jurisdiction I am aware of, a lawyer owes a
|
||
duty to zealously advocate the client's position within the bounds of
|
||
the law. Additionally, a lawyer must maintain client confidences
|
||
under all but the most strained of circumstances. For example, if a
|
||
client confesses that he murdered someone, the attorney can counsel
|
||
the client to turn himself in, but MUST NOT reveal the confession. In
|
||
fact, if the attorney breaks this rule and testifies against the
|
||
client, the testimony will be inadmissible. If a lawyer feels that he
|
||
or she cannot continue as counsel, his or her only recourse is to
|
||
resign from the case without disclosing the reason and ask the court
|
||
to appoint a new attorney. (Before I am flooded by mail from other
|
||
lawyers, please understand that this is a gross oversimplification.
|
||
If you are curious, ask a practicing criminal attorney or a law
|
||
student taking a class in professional responsibility.)
|
||
|
||
I think that this statement from CJS, standing on its own, does not
|
||
give an accurate portrayal of a lawyer's duty to a client. I would
|
||
also caution anyone about trying to discern the state of the law by
|
||
reading statements in isolation taken from old Supreme Court
|
||
decisions, legal encyclopedias, hornbooks, casebooks, etc. Law, like
|
||
programming, can be a tricky business. Parts that look clear at first
|
||
glance can be influenced by other bits you do not see at first. Would
|
||
you try to predict the operation of a ten million line program by
|
||
studying the source code of only one sub-module?
|
||
|
||
I want to highlight two smaller issues raised by ims. First:
|
||
|
||
>>A really smart cop might say to the guard, "I will not make the
|
||
>>search, but I won't stop you if you search." Stand your ground
|
||
>>at this point. Tell the real cop that you REFUSE to allow the
|
||
>>search unless the real cop orders the search to take place.
|
||
>
|
||
>Excellent suggestion, but be sure to take the above precautions
|
||
>regarding true identity and lawful authority before you think about
|
||
>"consenting".
|
||
|
||
I should clarify what I wrote -- NEVER consent. Always make it clear
|
||
that you OBJECT to a search, but your objection cannot rise to the
|
||
level of physical violence. If a police officer orders you to open
|
||
your bag, you will have to open it.
|
||
|
||
Next:
|
||
|
||
>>The only words you should utter after being arrested are "I want to
|
||
>>speak with a lawyer."
|
||
|
||
>Change this to, "I demand counsel of my choice." The 6th Amendment
|
||
>is your authority. If the court tries to force you to use a "licensed
|
||
>lawyer" or a "public defender", it is not counsel of your choice.
|
||
|
||
The reason I suggested the phrase "I want to speak with a lawyer"
|
||
is that under the rapidly disappearing _Miranda_ rule, this is
|
||
the magic phrase which tells police officers that they are no
|
||
longer allowed to ask you any questions. As an aside, ims' 6th
|
||
Amendment argument has been tried with mixed success. At best,
|
||
courts have been told that they MAY allow a defendant to
|
||
represent herself, but it is by no means an absolute right. (I use
|
||
"herself" since the leading case involved the trial of attempted
|
||
Presidential assassin Squeaky Frome.)
|
||
|
||
I obviously have radically different views from
|
||
ims@beach.kalamazoo.mi.us about whether having a lawyer in court is a
|
||
good idea. I tend to believe that having a lawyer is the best way of
|
||
staying out of jail or at least minimizing the time spent there. Of
|
||
course, you would expect me to say that since I am a lawyer. :-)
|
||
|
||
In CuD 5.12, Steve Brown <70511.3424@COMPUSERVE.COM> had two broad
|
||
criticisms of the article. In his first criticism, he asks why I am
|
||
urging confrontation with security guards. To quote:
|
||
|
||
|
||
>>Third, recognize that a mall IS private property and the mall
|
||
>>operators can throw you out for little or no reason. Fourth,
|
||
>>mall cops are not government agents, and as such, their conduct
|
||
>>is (mostly) not governed by the Constitution. So what does this
|
||
>>all mean? Basically, Ghandi was right. The ticket to dealing
|
||
>>with obstreperous uniformed mall cops is polite, passive
|
||
>>resistance. The key here is POLITE. At all times, assure the
|
||
>>mall cop that you will obey all lawful instructions. Do not give
|
||
>>the uniforms any reason whatsoever to escalate the scene.
|
||
>>
|
||
>>If you are confronted by a group of threatening looking mall
|
||
>>cops and they hassle you, ask if you are being ejected from the
|
||
>>mall. If yes, then wish the officers a nice day and head for the
|
||
>>nearest exit. If no, then wish the officers a nice day and head
|
||
>>for the nearest exit. (Do you see a pattern emerging? Remember,
|
||
>>you do not generally have a "right" to stay in a mall. Thus,
|
||
>>your best defense from ignorant mall cops is to get the hell off
|
||
>>of their turf.)
|
||
>
|
||
>"The mall operators can throw you out for
|
||
>little or no reason." So if that's the case, why would you even want
|
||
>to stay and ask a bunch of unintelligent questions. As for your
|
||
>strategy, I think Ghandi would tell you to forget about being polite.
|
||
>I think he'd tell you to "get the hell out of Dodge." Why you would
|
||
>encourage anyone to confront "obstreperous uniformed mall cops with
|
||
>polite, passive resistance" is beyond me.
|
||
|
||
I think that I failed to clearly express myself on this point. By all
|
||
means, I would encourage someone to leave the mall if that is
|
||
possible. My understanding of the 2600 incident is that the attendees
|
||
may have been detained by force, and my encouragement of polite
|
||
passive resistance is restricted to this kind of situation only. I am
|
||
NOT suggesting a 60's style sit-in as sponsored by civil rights
|
||
groups, and thus I am not urging anyone to "confront" guards with
|
||
passive resistance. The strategy -- as I see it -- is for use only
|
||
when the guards make it clear that you are being detained. In fact,
|
||
the opening parts of the strategy are designed to determine whether or
|
||
not a forceful detention is in progress.
|
||
|
||
|
||
In Mr Brown's second and larger criticism, he begins by reminding me
|
||
that law enforcement officials have used the term "hacker" as a
|
||
dehumanizing shorthand to lump all computer users into one big
|
||
malicious group. He compares this practice with my use of the term
|
||
"uniform" to describe all security guards and police officers. In his
|
||
words:
|
||
|
||
>My biggest concern is your attempt to dehumanize the police in a
|
||
>similar way. Whether you know it or not (maybe you don't really
|
||
>care), you have employed the same dehumanizing method in your
|
||
>effort to portray law enforcement. The computer world should not
|
||
>alienate its "enemy" through the use of name calling.
|
||
>
|
||
>Your effort seems to have been to inform people of their legal
|
||
>recourses during an incident similar to the "2600 Harassment"
|
||
>incident. The strength of the legal advise given, however, was
|
||
>weakened by the strategy you chose to use. You have probably
|
||
>confused a good many people in your attempt to explain sound
|
||
>legal ideas. A GUARD is a guard. A LAW ENFORCEMENT OFFICER
|
||
>(police, cop) is a law enforcement officer.
|
||
>
|
||
>A uniform unfortunately is what many ignorant people see. It is
|
||
>a way to dehumanize a person who gives you a ticket when you
|
||
>speed, prevents you from driving home after a fun night of
|
||
>partying, rushes your child to the hospital while he or she
|
||
>bleeds to death in a patrol car, and risks his life to protect
|
||
>yours during a robbery. Occasionally, he or she has to arrest an
|
||
>individual whether it be for a crime committed with a computer or
|
||
>not. Often when a police officer is killed in the line of duty,
|
||
>the news passes like a cold wind. It's much easier to put a
|
||
>bullet through a uniform than someone with a wife or husband and
|
||
>children.
|
||
|
||
I have quoted Mr Brown rather extensively because I feel he has raised
|
||
a very valid point. My use of the term "uniform" to describe both
|
||
security guards and police officers was ill-advised and I apologize if
|
||
anyone has taken offence. People who wear uniforms often have
|
||
difficult jobs to perform, and we should always remember that
|
||
underneath they are people, too.
|
||
|
||
The second point raised by this criticism is that I equivocated guards
|
||
and police officers when in fact they have very different training and
|
||
goals. I plead guilty -- I should have been more careful with the
|
||
distinction. In my defense, I will point out that part of the
|
||
strategy is to get a police officer on the scene if at all possible.
|
||
As I stated, police officers have been trained about the scope of
|
||
Constitutional protections and can often be useful in defusing
|
||
situations like this.
|
||
|
||
I will be the first to admit that police officers have a very
|
||
difficult, and often thankless, job to perform. I, for one, am always
|
||
glad to see a police officer on patrol when I am driving at night.
|
||
(These days, my wife and I feel better when we pass a Bobby on foot
|
||
patrol in London.) I am glad that Mr Brown called me on my
|
||
insensitive use of the term "uniform", and I also hope that when
|
||
confronted by police officers (or any person) we remember to act in a
|
||
civilized fashion -- even if confronted with what we perceive to be
|
||
incivility.
|
||
|
||
Disclaimer: This is not presented as a legal opinion and should not be
|
||
relied upon as such. If you have questions, please contact a lawyer
|
||
in your jurisdiction.
|
||
|
||
/s/Rob Carolina
|
||
ROBERT A. CAROLINA
|
||
Member, Illinois State Bar Association
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 9 Mar 93 13:00 PST
|
||
From: john%zygot.ati.com@HARVUNXW.BITNET(John Higdon)
|
||
Subject: File 2--Re: Hackers in the News (CuD #5.18)
|
||
|
||
Having been a guest on a Los Angeles radio talk show with a
|
||
representative from Thrifty Tel, I can give you the real reason that
|
||
company keeps its totally insecure five-digit access codes. The
|
||
"hacker tariff" (which the CPUC approved, bypassing normal hearings,
|
||
etc.) is a major profit center for the company. Thrifty Tel stays in
|
||
business because of the money that it extorts from its "hacker trap",
|
||
not from its third-rate reselling operation.
|
||
|
||
The claim that adding a couple of digits to the access codes would
|
||
inconvenience customers is utter nonsense. The calls are placed using
|
||
dialers, and at 50 ms dialing rates the addition of five more digits
|
||
to the code would increase the call setup time by less than one-half
|
||
second. As a reseller, I would never consider using less than ten
|
||
digits for an access code, which happens now to be the industry norm.
|
||
|
||
But no one should be taken in by Thrifty Tel's self-righteousness. The
|
||
company has no desire whatsoever to eliminate its "hacker problem". On
|
||
the contrary, it is the constant supply of "new meat"--kids that have
|
||
not yet heard about the infamous Thrifty Tel--that keeps the doors
|
||
open on that despicable operation. I would even be willing to bet that
|
||
there are many open codes that are not even assigned to customers to
|
||
make it even easier for those nasty hackers to fall into the trap.
|
||
|
||
While I give no quarter to people who steal computer and telephone
|
||
services, I have even less respect for the Thrifty Tels of the world
|
||
who exploit the problem for self-enrichment.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 4 Mar 1993 00:26:59 EST
|
||
From: mkovacs%mcs.kent.edu@KENTVM.KENT.EDU
|
||
Subject: File 3--Internet Talk Radio (fwd)
|
||
|
||
Originally from nis@cerf.net via Bernard.A.Galler@um.cc.umich.edu
|
||
Reprinted with permission from ConneXions,
|
||
|
||
ConneXions--The Interoperability Report is published monthly by:
|
||
Interop Company
|
||
480 San Antonio Road, Suite 100
|
||
Mountain View, CA 94040
|
||
USA
|
||
Phone: (415) 941-3399 FAX: (415) 949-1779
|
||
Toll-free (in USA): 1-800-INTEROP
|
||
E-mail: connexions@interop.com
|
||
|
||
Free sample issue and list of back issues available upon request."
|
||
|
||
Internet Talk Radio
|
||
Carl Malamud (carl@radio.com)
|
||
|
||
Over the past few years, two trends have come together to
|
||
present an opportunity for a new type of journalism. On the one hand,
|
||
the trade press has focused on marketing and product reviews, leaving
|
||
an ever-larger gap for a general-interest, technically-oriented
|
||
publication focused on the Internet. At the same time, the Internet
|
||
has made great progress in supporting multimedia communication,
|
||
through standards such as IP multicasting and MIME messaging.
|
||
|
||
Internet Talk Radio attempts to fuse these two trends and form
|
||
a new type of publication: a news and information service about the
|
||
Internet, distributed on the Internet. Internet Talk Radio is modeled
|
||
on National Public Radio and has a goal of providing in-depth
|
||
technical information to the Internet community. The service is made
|
||
initially possible with support from Sun Microsystems and O'Reilly &
|
||
Associates. Our goal is to provide a self-sufficient, financially
|
||
viable public news service for the Internet community.
|
||
|
||
Head: Flame of the Internet
|
||
|
||
The product of Internet Talk Radio is an audio file,
|
||
professionally produced and freely available on computer networks. To
|
||
produce these files, we start with the raw data of any journalistic
|
||
endeavor: speeches, conference presentations, interviews, and essays.
|
||
|
||
This raw information is taped using professional-quality
|
||
microphones, mixers, and DAT recorders. The information is then
|
||
brought back to our studios, and edited and mixed with music, voice
|
||
overs, and the other elements of a radio program. The "look and feel"
|
||
we strive for is akin to "All Things Considered" or other programs
|
||
that appeal to the general interest of the intelligent listener.
|
||
|
||
Our goal is hit the topics that don't make it into the trade
|
||
press. Instead of SNMP-compliant product announcements, we want to
|
||
present descriptions of SNMP. Instead of articles on GOSSIP, we want
|
||
to describe the latest Internet Drafts and place them in perspective.
|
||
Instead of executive promotions, we want to give summaries of mailing
|
||
list activity and network stability. Instead of COMDEX, we want to
|
||
cover the IETF.
|
||
|
||
Head: Town Crier to the Global Village
|
||
|
||
The result of Internet Talk Radio's journalistic activities is
|
||
a series of audio files. The native format we start with is the Sun
|
||
Microsystems .au format, closely related to the NeXT .snd format.
|
||
This format consists of the CCITT Pulse Code Modulation (PCM) standard
|
||
of 8 bits per sample and a sampling rate of 8000 samples per second,
|
||
using the u-law [ed. use greek letter mu] encoding (a logarithmic
|
||
encoding of 8 bit data equivalent to a 14 bit linear encoding). A
|
||
half-hour program would thus consist of 64,000 bits per second or 15
|
||
Mbytes total.
|
||
|
||
Programs are initially spool on UUNET, the central machines of
|
||
the Alternet network. Files are then moved over to various regional
|
||
networks for further distribution. For example, EUnet, a commercial
|
||
network provider for Europe with service in 24 countries, will act as
|
||
the central spooling area for the European region. The Internet
|
||
Initiative Japan (IIJ) company will provide the same service for
|
||
Japanese networks.
|
||
|
||
The goal of coordinated distribution is to reduce the load on
|
||
key links of the network. Transferring a 15 Mbyte file over a 64 kbps
|
||
link does not make sense during peak times. On the other hand, a
|
||
leased line has the attribute that a bit unused is a bit forever gone.
|
||
Transferring large files at low priority in non-peak times has little
|
||
or no incremental cost.
|
||
|
||
Files thus move from the UUNET central spool area, to regional
|
||
spools, to national and local networks. We anticipate most of this
|
||
transfer to be done using the FTP protocols, but some networks are
|
||
discussing the use of NNTP news groups and MIME-based distribution
|
||
lists.
|
||
|
||
It is important to note that Internet Talk Radio is the source
|
||
of programming and does not control the distribution. These files are
|
||
publicly available, subject only to the simple license restrictions of
|
||
no derivative work and no commercial resale.
|
||
|
||
Distribution is controlled, as with all other data, by the
|
||
individual networks that make up the Internet. We intend to work
|
||
closely with networks all over the world to ensure that there is some
|
||
coordination of distribution activity, but ultimate control over this
|
||
data is in the hands of those people who finance, manage, and use
|
||
networks.
|
||
|
||
We don't believe indiscriminate use of anonymous FTP is the
|
||
proper method for distributing large archives. Previous experience
|
||
with ITU standards, with RFC repositories, and with large software
|
||
archives such as the X Windows System indicates that setting up a
|
||
top-level distribution hierarchy goes a long way towards alleviating
|
||
network load.
|
||
|
||
Even with a top-level hierarchy, however, there will always be
|
||
anonymous FTP sites and there will always be people that go to the
|
||
wrong FTP server. This behavior is largely mitigated by setting up
|
||
enough "local" servers and publicizing their existence. Like any
|
||
large distributor of data, we are mindful of the load on the
|
||
transcontinental and regional infrastructures and will take aggressive
|
||
steps to help minimize that load.
|
||
|
||
Head: Asynchronous Times, Asynchronous Radio
|
||
|
||
Once files have made their way to a local or regional network,
|
||
they are moved to the desktop and played. Once again the individual
|
||
users of the network decide how to present data. We hope to see a
|
||
wide variety of different ways of having our files played and only
|
||
list a few of the more obvious methods.
|
||
|
||
The simplest method to play a .au file on a Sparcstation is to
|
||
type "play filename." If the file is placed on a Network File System
|
||
(NFS) file system on a central server, the user simply mounts the file
|
||
system and plays the file. Alternatively, the user copies the file to
|
||
a local disk and plays it.
|
||
|
||
More adventuresome playing of files uses multicasting. A
|
||
simple multicast program called "radio" for a local Ethernet is
|
||
available from CWI, the mathematics institute of the Netherlands. A
|
||
more sophisticated approach, IP multicasting, allows a program to
|
||
reach far beyond the confines of the Ethernet.
|
||
|
||
IP multicasting might be used on a local basis, or can have a
|
||
global reach. There is a consortium of regional networks that have
|
||
formed the Multicast Backbone (MBONE), used for audio and video
|
||
programming of key conferences such as the Internet Engineering Task
|
||
Force.
|
||
|
||
Internet Talk Radio does not assume use of the MBONE for
|
||
playing files. Needless to say, the operators of the MBONE are free
|
||
to play Internet Talk Radio files (and we would be delighted if this
|
||
happens), but it is up to the local network affiliates to determine
|
||
how and when they distribute this audio data.
|
||
|
||
In many cases, people will want to play files on a wide
|
||
variety of different platforms. The Sound Exchange (SOX) program is a
|
||
publicly-available utility that easily transforms a file from one
|
||
format to another. Using this utility, the Macintosh, Silicon
|
||
Graphics, DECstation, PC, and many other platforms can play Internet
|
||
Talk Radio files.
|
||
|
||
Head: Geek of the Week
|
||
|
||
In the spirit of dignified, conservative programming, the
|
||
first production from Internet Talk Radio is dubbed Geek of the Week.
|
||
Geek of the Week features technical interviews with key personalities
|
||
on the Internet. Some of the people who have agreed to appear on Geek
|
||
of the Week include Daniel Karrenberg of the RIPE NCC, Dr. Marshall T.
|
||
Rose of Dover Beach Consulting, Milo Medin of the NASA Science
|
||
Internet, and Daniel Lynch of Interop Company.
|
||
|
||
Geek of the Week focuses on technical issues facing the
|
||
Internet. This initial program is sponsored by Sun Microsystems and
|
||
O'Reilly & Associates. Their support makes it possible for Geek of
|
||
the Week to be produced professionally and then to be distributed at
|
||
no charge.
|
||
|
||
One of the issues that Internet Talk Radio faces are the
|
||
vestiges of Appropriate Use Policies (AUPs) that linger from the
|
||
original ARPANET days. While Sun Microsystems and O'Reilly &
|
||
Associates view Internet Talk Radio in terms of an investigation of
|
||
on-line publishing, of multicasting, and other engineering issues, we
|
||
feel it important that our sponsors are given due credit in the
|
||
programs.
|
||
|
||
At first glance, this smacks of the crass and commercial.
|
||
Indeed, it smacks of advertising. Jumping to that conclusion, however
|
||
would be a simplistic mistake. The Appropriate Use Policies were
|
||
formulated to guarantee that networks are used for the purposes
|
||
envisioned by the funding agents. In the case of an AUP-constrained
|
||
networks such as the NSFNET, this means that use of the network must
|
||
benefit U.S. science and engineering.
|
||
|
||
We feel that an in-depth interview with Internet architects
|
||
clearly falls within the purview of all AUP policies. However, we
|
||
understand that certain networks may not accept certain types of
|
||
programming. For this reason, our central spool areas are carefully
|
||
picked so they are AUP-free. This way, if a network feels the
|
||
programming is inappropriate, they can simply inform their users not
|
||
to obtain or play the files.
|
||
|
||
It should be noted that one advantage of supporting the
|
||
professional dissemination of news and information up-front is that
|
||
the user is not directly charged. Somebody has to pay for information
|
||
to be produced, and the sponsorship model means that copy protection,
|
||
accounting, security, and all the other complications of a charging
|
||
model are avoided and that high-quality news and information becomes
|
||
increasingly available on the Internet.
|
||
|
||
Head: The Medium is the Message
|
||
|
||
While Geek of the Week is our flagship program, we intend to
|
||
intersperse mini-features throughout. The Incidental Tourist, for
|
||
example, will feature restaurant reviews and other travel information
|
||
for sites throughout the world. The Internet Hall of Flame will
|
||
highlight non-linear behavior on mailing lists, and we will have
|
||
periodic book reviews by Dan Dorenberg, one of the founders of
|
||
Computer Literacy Books.
|
||
|
||
The logical extension to Geek of the Week is to begin coverage
|
||
of industry functions. To date, we have received permission to tape
|
||
for later rebroadcast sessions and presentations at the European RIPE
|
||
meetings, the IETF, and at the INTEROP Conferences. We are
|
||
negotiating with other industry forums to try and establish permission
|
||
to cover additional conferences.
|
||
|
||
Our hope is to begin providing news summaries of these key
|
||
conferences. If you can't make it to the IETF, for example, Internet
|
||
Talk Radio would like to provide a half-hour news summary describing
|
||
what happened on each day.
|
||
|
||
The next logical step is to begin producing analysis of key
|
||
technical topics. Here, we look at in-depth (e.g., 15 minute)
|
||
summaries of technical topics such as MIME, proposals for the next IP,
|
||
SNMP v. 2, or the architecture of the Global Internet Exchange (GIX).
|
||
We would also furnish analysis of political topics, such as the POISED
|
||
effort to reorganize the Internet standards process, or the background
|
||
of the IPv7 debate.
|
||
|
||
Eventually, our hope is to combine all these reports together
|
||
and form a daily news broadcast to the Internet. When you walk in and
|
||
start reading your mail, you simply click on the "radio" icon and
|
||
listen to Geek of the Week while deleting messages from the more
|
||
hyperactive mailing lists.
|
||
|
||
Head: Tomorrow is the Future
|
||
|
||
The "radio" metaphor was carefully chosen. We wanted an
|
||
alternative to plain ASCII files, yet did not feel that the Internet
|
||
infrastructure was ready for regular video feeds. Production of video
|
||
or true multimedia required an order-of-magnitude higher investment in
|
||
production facilities. After all, we know bad TV since we see so much
|
||
of it.
|
||
|
||
Eventually, Internet Talk Radio wants to go beyond the
|
||
confines of the simple radio metaphor. Already, we describe the
|
||
service as asynchronous radio, recognizing that our listeners can
|
||
start, stop, rewind, or otherwise control the operation of the radio
|
||
station.
|
||
|
||
As a multicasting infrastructure gets deployed throughout the
|
||
Internet, we see the opportunity to expand the radio metaphor and
|
||
begin the creation of a truly new news medium. Multicast groups and
|
||
videoconferencing tools allow the creation of an Internet Town Hall, a
|
||
moderated forum with a very wide reach or games shows like Name That
|
||
Acronym where everybody gets to play.
|
||
|
||
Because we are on the Internet, we can add a wide variety of
|
||
different programming techniques. While listening to a series of
|
||
interviews about MIME messaging, for example, you might also scroll
|
||
through a series of Gopher menus that hold more information about the
|
||
MIME standards, or search a WAIS database for a biography of the
|
||
speakers.
|
||
|
||
We hope that Internet Talk Radio will be the first of many
|
||
such information services on the Internet, supplementing the random
|
||
anarchy of news and mailing lists with professionally produced news
|
||
and information. Indeed, we hope that Internet Talk Radio forms the
|
||
first of many "desktop broadcasting" efforts.
|
||
|
||
Internet Talk Radio debuts at the Columbus IETF at the end of
|
||
March. Stay tuned for more information.
|
||
|
||
Head: For More Information
|
||
|
||
Guido van Rossum, FAQ: Audio File Formats,
|
||
ftp.cwi.nl:/pub/AudioFormats2.10. An excellent introduction to
|
||
audio formats, encoding, and other information about sound files
|
||
on different platforms. This same site also has copies of the
|
||
SoundExchange (SOX) program for translating files into different
|
||
audio formats, and the Radio program for playing a sound file on
|
||
an Ethernet.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 19 Feb 1993 13:08:37 EDT
|
||
From: "by way of Terry Winograd <breeden@farnet.org>"
|
||
Subject: File 4--Call for Stories -- Reasons to Build the NII
|
||
|
||
Please circulate this announcement to any person or list you think
|
||
would be interested in responding. We're looking forward to hearing
|
||
your stories!
|
||
|
||
With thanks,
|
||
Laura Breeden
|
||
Executive Director
|
||
FARNET
|
||
>=-=-==-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
=
|
||
|
||
CALL FOR STORIES:
|
||
51 Reasons to Invest in the National Information Infrastructure
|
||
|
||
FARNET (the Federation of American Research Networks) is launching a
|
||
national search for good stories about how and why people use the
|
||
Internet in education, research, health care, libraries and
|
||
manufacturing.
|
||
|
||
Right now, Congress is considering ways to expand and build upon the
|
||
successes of the Internet. The stage is being set for the creation of
|
||
a 'national information infrastructure' computer and communications
|
||
sytems that will make it possible for Americans to access and use all
|
||
kinds of electronic information in the 21st century. Your stories
|
||
will help set the agenda for the national information infrastructure.
|
||
|
||
We must receive your story submission by March 31, 1993. Because
|
||
critical information policy issues are already being debated, the
|
||
timetable for the
|
||
first round of the project is short.
|
||
|
||
This summer a collection of the stories including at least one from each
|
||
state and the District of Columbia will be published in an illustrated
|
||
booklet and delivered to members of Congress, other elected officials, and
|
||
project participants.
|
||
|
||
Every story submitted that satisfies the criteria for publication will be
|
||
included in a public database, accessible from the Internet and indexed so
|
||
that it is easy to retrieve all stories from a particular region or about a
|
||
particular topic.
|
||
|
||
WHAT to Submit
|
||
|
||
Each story should focus on only one use of the Internet, or one
|
||
network-supported project. For instance, it might describe a collaboration
|
||
between bilingual eighth-grade classes in different states, or a rural
|
||
health-information delivery system. The story should be short (600 words
|
||
or fewer) and should describe the use of the network and explain how the
|
||
ability to use the network was of direct benefit to the activity supported.
|
||
|
||
Specific details, examples and quotations will make the story more
|
||
readable. Do not include material that does not support the
|
||
narrative.
|
||
|
||
Photographs and illustrations will be included in the printed booklet
|
||
but not in the story database (for the first round). To submit a
|
||
graphic, please mail camera-ready artwork (for charts, illustrations,
|
||
or graphs) or photographic prints (any size, in black and white or
|
||
color) to the address below.
|
||
|
||
We welcome submissions of videos, software, computer graphics,
|
||
documentation, and other supporting information and will index these
|
||
as part of the story database.
|
||
|
||
WHO Should Submit
|
||
|
||
Anyone may submit a story for consideration.
|
||
|
||
HOW to Submit
|
||
|
||
We prefer that you submit stories electronically to the Internet
|
||
address below. You may also submit them by fax or postal mail. You
|
||
must use the Story Submission Form at the end of this announcement so
|
||
that we can readily enter the stories into the database.
|
||
|
||
FARNET's address is:
|
||
|
||
Email: stories@farnet.org
|
||
Postal mail: FARNET, 100 Fifth Avenue, Waltham, MA 02154
|
||
Phone: (800) 72-FARNET
|
||
Fax: (617) 890-5117
|
||
|
||
CRITERIA for Publication
|
||
|
||
To be included in the database, stories must describe how access to or
|
||
use of the Internet for education, research, health care, libraries or
|
||
manufacturing resulted in one or more of the following:
|
||
|
||
Innovative or improved ways of doing things
|
||
More equitable access to technology or electronic information
|
||
Creation of new ideas, products, or services
|
||
Technology transfer
|
||
Local investment in, commitment to, and control of network-based
|
||
activities
|
||
Leverage of public funding
|
||
Volunteer contributions of time and energy
|
||
Partnerships between public sector and private sector organizations
|
||
Other social, economic or educational benefits
|
||
|
||
THE PANEL of Reviewers
|
||
|
||
The review panel for the stories to be included in the booklet will
|
||
consist of eight people representing key public sector interests in
|
||
networking, including libraries, education, health care, and economic
|
||
development. One of these representatives will be named by FARNET.
|
||
The others will be named by other national organizations, including
|
||
the Coalition for Networked Information, the Consortium for School
|
||
Networking, Educom's NTTF, and the Science and Technology Council of
|
||
the States.
|
||
|
||
NOTIFICATION of Acceptance
|
||
|
||
All submissions will be acknowledged upon receipt. If a submission is
|
||
incomplete, the author will receive a comment sheet and will have the
|
||
opportunity to amend the submission for inclusion in the database.
|
||
|
||
COPYRIGHT
|
||
|
||
The Story Submission Form requires each author to grant FARNET a
|
||
non-exclusive, royalty-free copyright license to use his or her story
|
||
for the purposes described in this Call for Stories. All stories must
|
||
be original with the author, and the author must have obtained
|
||
permission to use the names of any person or organization identified
|
||
in the story.
|
||
|
||
WHAT is FARNET?
|
||
|
||
FARNET is a national non-profit association dedicated to advancing the
|
||
use of computer networks for research and education. Its members are
|
||
network service providers and other organizations that support its
|
||
mission.
|
||
|
||
PROJECT Underwriters (to date)
|
||
|
||
Coalition for Networked Information
|
||
Interop, Inc.
|
||
National Science Foundation
|
||
|
||
--- cut here ---
|
||
|
||
Story Submission Form
|
||
|
||
1. Your name
|
||
Title:
|
||
Department:
|
||
Organization:
|
||
Street address:
|
||
City, State, ZIP:
|
||
Phone:
|
||
Fax :
|
||
Email:
|
||
|
||
2. Person to contact for more information, if different from above
|
||
Name:
|
||
Title:
|
||
Department:
|
||
Organization:
|
||
Street address:
|
||
City, State, ZIP:
|
||
Phone:
|
||
Fax :
|
||
Email:
|
||
|
||
3. Put an "X" before the category of use or user that this story
|
||
focuses on:
|
||
.......Education, K12
|
||
.......Education, higher
|
||
.......Education, continuing or distance
|
||
.......Research, academic
|
||
.......Research, government
|
||
.......Research, commercial
|
||
.......Economic development
|
||
.......Health care/health services
|
||
.......Manufacturing technology
|
||
.......Opportunities for people with disabilities
|
||
.......Library
|
||
.......Museums, arts
|
||
.......Other
|
||
|
||
4. Put an "X" before all the criteria that you believe this story
|
||
addresses:
|
||
.......Innovative or improved ways of doing things
|
||
.......More equitable access to technology or electronic information
|
||
.......Creation of new ideas, products, or services
|
||
.......Technology transfer
|
||
.......Local commitment to network-based activities
|
||
.......Leverage of public funding
|
||
.......Volunteer contributions of time and energy
|
||
.......Partnerships between public and private sector
|
||
|
||
5. Story text (600 word maximum): Please include the
|
||
organization(s) involved, the objectives of the project and the
|
||
benefits. Use full names of people, places and organizations.
|
||
Don't forget to address at least one of the areas listed above
|
||
in the criteria for inclusion.
|
||
|
||
6. Put an "X" in front of all categories of supporting information
|
||
available:
|
||
.......Video
|
||
.......Software
|
||
.......Documentation
|
||
.......Slides/photographs
|
||
.......Audio recordings
|
||
.......Computer graphic images, such as GIF files
|
||
.......CD/ROM
|
||
.......Other
|
||
|
||
|
||
7. Story site if different from contact information:
|
||
Town or City:
|
||
State:
|
||
|
||
8. COPYRIGHT LICENSE AND WARRANTY
|
||
|
||
I, the author listed below, hereby grant to FARNET, Inc., and
|
||
its sublicensees, the following non-exclusive, royalty-free
|
||
irrevocable licenses with respect to the enclosed story (the "Story")
|
||
submitted in response to FARNET's solicitation dated February 12, 1993
|
||
entitled "51 Reasons to Build the National Information
|
||
Infrastructure:"
|
||
|
||
To edit, copy, distribute, and make the Story generally accessible
|
||
through one or more free public databases; and,
|
||
|
||
(At FARNET's option) to edit, copy, and distribute the Story in one or
|
||
more printed collections of stories for non-commercial use consistent
|
||
with FARNET's organizational purposes.
|
||
|
||
My grant of these rights is in consideration of FARNET's
|
||
agreement to make the Story available on a public database as
|
||
described in the first subparagraph above if the Story meets FARNET's
|
||
criteria.
|
||
|
||
I will retain copyright in the Story. (It is understood that
|
||
FARNET's right to modify the Story is limited to non-substantive
|
||
editorial modifications.) FARNET will, through appropriate copyright
|
||
notices and other legends, reasonably attempt to restrict any
|
||
commercial use of the Story, but FARNET will not be liable to me if
|
||
another party does not abide by these attempted restrictions. FARNET
|
||
may grant to other noncommercial organizations sublicenses to any of
|
||
the rights granted by me to FARNET.
|
||
|
||
I acknowledge and warrant to FARNET and its sublicensees that
|
||
Story is original with me, and that I have permission to use the names
|
||
and/or descriptions of any individuals or organizations which are
|
||
identified in the Story. I give FARNET and its sublicensees
|
||
permission to use my name in connection with the rights granted above.
|
||
|
||
I HAVE READ AND AGREE TO THE ABOVE COPYRIGHT LICENSE AND WARRANTY.
|
||
|
||
.................................
|
||
(Sign name, if submitting by postal mail; otherwise, typing
|
||
your name for Email transmission constitutes the equivalent of your
|
||
signature)
|
||
|
||
|
||
FARNET's address is:
|
||
|
||
Email: stories@farnet.org
|
||
Mail: FARNET, 100 Fifth Avenue, Waltham, MA 02154
|
||
Phone: (800) 72-FARNET
|
||
Fax: (617) 890-5117
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.19
|
||
************************************
|
||
|
||
|
||
|
||
|