891 lines
40 KiB
Plaintext
891 lines
40 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed Oct 6 1993 Volume 5 : Issue 78
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copie Editor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.78 (Oct 6 1993)
|
||
File 1--The Elansky Case (A Response to CuD's Editors)
|
||
File 2--CuD and the Elansky Case (Response to L. Detweiler)
|
||
File 3--CA state Legislative Info Bill
|
||
File 4--U. Minn. Campus Police Investigate Software Theft Ring
|
||
File 5--Computers & Writing Call for Proposals
|
||
File 6--ACTIVIST ALERT-CPSR Solicits CLIPPER/SKIPJACK comments
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Tue, 28 Sep 93 02:23:12 -0600
|
||
From: "L. Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU>
|
||
Subject: File 1--The Elansky Case (A Response to CuD's Editors)
|
||
|
||
Editor: your theories on the "hacker culture" among adolescents,
|
||
including the ideas of unique vocabulary and initiation ceremonies
|
||
etc. in the line of sophisticated and evolved social customs, are
|
||
interesting, and certainly have some degree of validity in general and
|
||
apropos application to the Elansky case in particular.
|
||
|
||
Nevertheless, your agenda in painting Elansky as a clear cut "victim"
|
||
is very obvious. Now, I agree that the Elansky case shows some rather
|
||
outrageous excesses of the legal system and the rooted paranoias
|
||
therein. In particular, I find the latest news that Elansky is
|
||
languishing" and that the extraordinary bail of $500K has not been
|
||
challenged or revised quite shocking.
|
||
|
||
However, I'm writing because you note in a previous newsletter that
|
||
Elansky supposedly had a record of breaking into a high school science
|
||
supply room to steal chemicals. Now this is an extremely incriminating
|
||
action that you wholly failed to address. In fact, you skipped right
|
||
over this piece of information almost without comment. It really
|
||
rather significantly damages your argument and portrayal of Elansky as
|
||
nothing but a victimized BBS operator with nothing but an academic
|
||
interest in explosives recipes. To the contrary, your own academic
|
||
bias is revealed.
|
||
|
||
Very rarely are we ever afforded an opportunity to have such clear cut
|
||
villains and heroes as in, say, the Steve Jackson Games case.
|
||
Polarized accounts condemning law enforcement for various overreaction
|
||
that selectively present various data are not a service to *any*
|
||
community. If you wish to continue to adhere to high academic
|
||
standards in your own published analyses and opinions, please exercise
|
||
the utmost impartiality. In burying the information about Elansky's
|
||
possible breaking-and-entering crime, and failing to follow it up as
|
||
diligently as all the other claims that tend to extenuate his guilt,
|
||
this standard has been compromised to the detriment of your own
|
||
journalistic, editorial, and academic integrity. I'm hopeful you will
|
||
rectify this partiality in future editorials.
|
||
|
||
Sincerely,
|
||
L. Detweiler
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 6 Oct, 1993 21:18:20 CDT
|
||
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 2--CuD and the Elansky Case (Response to L. Detweiler)
|
||
|
||
In criticizing CuD comments on the Elansky/Hartford case, in which
|
||
which Michael Elansky, a BBS sysop was arrested for two having to
|
||
"anarchist" text files on his board (see CuD #5.69, 5.71), "L.
|
||
Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU> (previous file)
|
||
writes:
|
||
|
||
>However, I'm writing because you note in a previous
|
||
>newsletter that Elansky supposedly had a record of breaking
|
||
>into a high school science supply room to steal chemicals.
|
||
>Now this is an extremely incriminating action that you
|
||
>wholly failed to address. In fact, you skipped right over
|
||
>this piece of information almost without comment. It really
|
||
>rather significantly damages your argument and portrayal of
|
||
>Elansky as nothing but a victimized BBS operator with
|
||
>nothing but an academic interest in explosives recipes. To
|
||
>the contrary, your own academic bias is revealed.
|
||
|
||
His above post perceives some unspecified "obvious agenda" that we
|
||
presumably hide, challenges our integrity, and objects to an
|
||
"academic bias," whatever that might mean. We thank him for sharing
|
||
his opinion. However, we're less charitable toward his beliefs that
|
||
more should have been mentioned of Elansky's previous legal troubles
|
||
and that the lack of primacy of previous charges, unrelated to the BBS
|
||
anarchist files, somehow subverts CuD commentary on the case and
|
||
weakens any First Amendment issues the case raises.
|
||
|
||
The basic facts in the Elansky case: 1) Elansky was arrested in early
|
||
August, '93, for making to common anarchy files available; 2)
|
||
According to existing public information, the arrest was solely for the
|
||
two anarchy files, written four years ago by a 15 year old teenager;
|
||
3) Elansky's bond for this offense was set at half a million dollars;
|
||
4) Elansky remains in jail as of October 6, awaiting his next hearing
|
||
on October 10. In CuD 5.72, we reprinted the Connecticut laws under
|
||
which Elansky was charged. Although both are felonies, neither
|
||
justifies the excessive bond. CuD explicitly summarized Elansky's
|
||
previous legal problems. Despite current evidence that those offenses
|
||
may have been far less serious than the language of the charges
|
||
indicates, they are not the issue. Cud was careful to qualify comments
|
||
by acknowledging that, because the relevant court documents are
|
||
sealed, it is always possible that the prosecutor possesses evidence
|
||
of more serious behavior. We think we were sufficiently clear: THE
|
||
ISSUE IS NOT ELANSKY, BUT THE CRIMINALIZATION OF TEXT FILES THAT ONLY
|
||
THE HARTFORD PROSECUTOR DEEMS ILLEGAL. This is a First Amendment
|
||
issue, pure and simple, and whether Elansky is a serial murder or a
|
||
squeaky-clean choirboy is irrelevant.
|
||
|
||
Elansky, we repeat for those who skipped the first 50 lines, was
|
||
arrested and remains in jail for posting two anarchist files on his
|
||
BBS. CuDs 5.69, 5.71 and 5.72 summarized the case, reprinted the
|
||
anarchy files, and reprinted what apparently was an investigation
|
||
report justifying the arrest. The files do not support the charges.
|
||
|
||
The two "anarchy" files in question are not only legal, and therefore
|
||
protected by the First Amendment, but they are, by "anarchy"
|
||
standards, considered mild, even "lame." As any highschool graduate
|
||
should know, the files contain little that cannot be constructed from
|
||
a highschool chemistry course. They contain absolutely nothing that
|
||
cannot be found in over-the-counter literature and television. The
|
||
_Anarchists' Cookbook_, in it's 29th printing since 1971, contains
|
||
hundreds of recipes for home-made weapons, pyrotechnics, and
|
||
psychedelics. It is legal. We note with amusement that the latest
|
||
catalogue from Delta Press, Ltd (PO Box 1625 Dept 93W; 215 S.
|
||
Washington St., El Dorado, AR 71731; fax (501) 862-9671; voice: (501)
|
||
862-4984) is available, along with its contents, without obvious
|
||
restrictions to anybody with the purchase price for publications.
|
||
Delta Press's inventory includes:
|
||
|
||
CIA Explosives for Sabotage ($9.00)
|
||
Improvised Munitions from Ammonium Nitrate ($7.50)
|
||
Death by Deception: Advanced Improvised Booby Traps ($14.00)
|
||
Terrorist Explosives Handbook ($6.95)
|
||
Counterbomb ("assassination by explosives") ($14.00)
|
||
Improvised Land Mines ($12.00)
|
||
Improvised Explosives ($12.00)
|
||
Boobytraps ($8.00)
|
||
|
||
The list is extensive. It includes manuals on full-auto conversion
|
||
and silencer construction for weapons; military manuals;
|
||
poaching manuals; killing manuals; survival manuals;
|
||
blowing-people-away manuals; poisoning manuals. They are legal. They
|
||
appear easily accessible. Yet, Elansky posts two juvenile files
|
||
demonstrably written by others, both of which are "lame," and he's
|
||
arrested and slapped with a $500,000 bond. This is the issue.
|
||
|
||
Is CuD off-base in the assessment of the case? Perhaps. If so, though,
|
||
we're in excellent company.
|
||
|
||
Lance Rose, perhaps the most knowledgeable legal guru on BBS law, and
|
||
columnist for BOARDWATCH MAGAZINE, calls the case "ridiculous." He
|
||
summarizes the facts of the case in his October, '93, column, and
|
||
alludes to Elansky's cat-and-mouse game with local police. He
|
||
concludes:
|
||
|
||
Regardless of their motivations, however, the police made a
|
||
big mistake in jailing Elansky for a text file on his BBS.
|
||
The 1ST AMENDMENT prohibits government officials from acting
|
||
against anyone for distributing material containing
|
||
political content. If, as Elansky's parents claim, he did
|
||
not even know the file was on his BBS until after he was
|
||
arrested, then he is entitled to even greater legal
|
||
protection from prosecution, such as accorded to book stores
|
||
and magazine distributors. Distributors are not responsible
|
||
for materials like obscene or infringing publications, unless
|
||
they are specifically aware of the material in question. This
|
||
rule is necessary to assure the smooth flow of 1st Amendment
|
||
materials through mass distribution systems for both printed
|
||
and electronic materials.
|
||
......
|
||
Even if Elansky made bombs all those years as the police
|
||
believe, this gives no support to jailing him based on the BBS
|
||
file. The police acted criminally in penalizing him for
|
||
speech on his BBS.
|
||
|
||
The Harford Courant, on September 17 (pp A1, A3: "Free Speech and
|
||
Computers Central to Bomb-Recipe Case," by John M. Moran), was equally
|
||
adamant. The reporter, John Moran, is an experienced user of the Net
|
||
and of BBSes, and it shows in a thoughtful and incisive commentary.
|
||
Moran, too, distinguishes between Elansky's run-ins with the police
|
||
and the issues underlying his arrest. His well-researched article
|
||
alludes to the availability of _The Anarchists' Cookbook_ in local
|
||
bookstores and libraries, and concludes by raising what appears to be
|
||
the double standard between Constitutional protections granted to
|
||
print and electronic media:
|
||
|
||
This apparent double standard between printed text and The
|
||
Deth Vegetable's ((the author of the disputed files))
|
||
computer text files is precisely what makes the Ionizer
|
||
((Elansky's BBS handle)) so important, say public interest
|
||
groups familiar with the Elansky case.
|
||
|
||
"It's pretty clear that the First Amendment's been trampled
|
||
on the way to the riot in this case," said David Banisar, a
|
||
policy analyst for Computer Professionals for Social
|
||
Responsibility. "It appears that the prosecutor doesn't
|
||
realize that electronic publications have the same
|
||
protection as printed publications."
|
||
|
||
Ralph G. Elliot, a Hartford lawyer who has represented The
|
||
Courant on First Amendment issues, agreed that the Elansky
|
||
case does raise free-speech questions. He likened it to a
|
||
well-known case in which The Progressive, a Wisconsin
|
||
magazine, was found to have the right to publish publicly
|
||
available information about how to construct a nuclear bomb.
|
||
|
||
Mike Godwin, legal counsel for the Electronic Frontier
|
||
Foundation, another advocacy group, said Connecticut's
|
||
"inciting injury to persons or property" charge is
|
||
unconstitutional.
|
||
|
||
"Traditionally, we've understood the First Amendment to
|
||
apply to all forms of expression," Godwin said. "I think the
|
||
prosecutor in this case has shown monstrous disregard for
|
||
the Constitution that he has sworn to uphold."
|
||
|
||
"There are very few law-enforcement actions that qualify as
|
||
genuinely evil, but I think this is one of them," he said.
|
||
|
||
The relevance of this case for cyberspace lies in the danger of any
|
||
local prosecutor to define Constitutionally protected electronic forms
|
||
of expression as illegal. If Elansky is guilty of crimes, then it is
|
||
those crimes for which he should be charged. However, on no account
|
||
ought prosecutors be allowed to subvert the Constitution in order to
|
||
develop a case against any U.S. citizen, regardless of what other
|
||
offenses they might be *suspects*. To compound the error with an
|
||
excessive bond while the suspect languishes in jail strikes us as a
|
||
gross abuse of prosecutorial power. Perhaps the wrong people are in
|
||
jail.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 30 Sep 1993 20:00:09 GMT
|
||
From: kiddyr@GALLANT.APPLE.COM(Ray Kiddy)
|
||
Subject: File 3--CA state Legislative Info Bill
|
||
|
||
Here is the text of the bill that is waiting on Gov Pete Wilson's desk.
|
||
i hope other states begin to use this as a model.
|
||
|
||
thanx - ray kiddy, ray@ganymede.apple.com
|
||
|
||
|
||
AMENDED IN SENATE AUGUST 30, 1993
|
||
|
||
AMENDED IN SENATE AUGUST 25, 1993
|
||
|
||
AMENDED IN SENATE AUGUST 16, 1993
|
||
|
||
AMENDED IN SENATE JUNE 17, 1993
|
||
|
||
AMENDED IN ASSEMBLY MAY 18, 1993
|
||
|
||
CALIFORNIA LEGISLATURE--1993-94 REGULAR SESSION
|
||
|
||
ASSEMBLY BILL No. 1624
|
||
|
||
Introduced by Assembly Member Bowen
|
||
(Principal coauthor: Senator Torres)
|
||
(Coauthors: Assembly Members Areias, Bornstein,
|
||
Goldsmith, Isenberg, Johnson, Karnette, Katz
|
||
Mountjoy, Nolan, Polanco, Speier, and
|
||
Vasconcellos)
|
||
(Coauthors: Senators Dills, Hayden, Killea, Morgan, and
|
||
Rosenthal)
|
||
|
||
March 4, 1993
|
||
|
||
An act to add Section 10248 to the Government Code,
|
||
relating to the Legislature;
|
||
|
||
LEGISLATIVE COUNSELUS DIGEST
|
||
|
||
AB 1624, as amended, Bowen. Legislature: legislative
|
||
information: access by computer network.
|
||
Under existing law, all meetings of a house of the Legislature
|
||
or a committee thereof are required to be open and public, unless
|
||
specifically exempted, and any meeting that is required to be open
|
||
and public, including specified closed sessions, may be held only
|
||
after full and timely notice to the public as provided by the
|
||
Joint Rules of the Assembly and Senate.
|
||
This bill would make a legislative finding that it is desirable
|
||
to make information regarding matters pending before the Legislature
|
||
and its proceedings available to the citizens of this state,
|
||
irrespective of where they reside, in a timely manner and for the
|
||
least possible cost.
|
||
This bill would require the Legislative Counsel, with the advice
|
||
of the Assembly Committee on Rules and the Senate Committee on Rules,
|
||
to make available to the public, by means of access by way of the
|
||
largest nonproprietary, nonprofit cooperative public computer network,
|
||
specified information concerning bills, the proceedings of the
|
||
houses and committees of the Legislature, statutory enactments,
|
||
and the California Constitution.
|
||
Vote: majority. Appropriation: no. Fiscal committee: yes.
|
||
State-mandated local program: no.
|
||
|
||
The people of the State of California do enact as follows:
|
||
|
||
1 SECTION 1. The Legislature finds and declares that
|
||
2 it is now possible and feasible in this electronic age to
|
||
3 more widely distribute legislative information by way of
|
||
4 electronic communication in order to better inform the
|
||
5 public of the matters pending before the Legislature and
|
||
6 its proceedings. The Legislature further finds that it is
|
||
7 desirable to make information regarding these matters
|
||
8 and proceedings available to the citizens of this state,
|
||
9 irrespective of where they reside, in a timely manner and
|
||
10 for the least possible cost.
|
||
11 Sec. 2. Section 10248 is added to the Government
|
||
12 Code, to read:
|
||
22 (a) The Legislative Counsel shall, with the advice of
|
||
|
||
1 the Assembly Committee on Rules and the Senate
|
||
2 Committee on Rules, make all of the following
|
||
3 information available to the public in electronic form:
|
||
4 (1) The
|
||
5 legislative calendar, the
|
||
6 schedule of legislative committee hearings, a list of
|
||
7 matters pending on the floors of both houses of the
|
||
8 Legislature, and a list of the committees of the
|
||
9 Legislative and their members.
|
||
10 (2) The text of each bill introduced in each current
|
||
11 legislative session, including each amended, enrolled,
|
||
12 and chaptered form of each bill.
|
||
13 (3) The bill history of each bill introduced and
|
||
14 amended in each current legislative session.
|
||
15 (4) The bill status of each bill introduced and
|
||
16 amended in each current legislative session.
|
||
17 (5) All bill analyses prepared by legislative
|
||
18 committees in connection with each bill in each current
|
||
19 legislative session.
|
||
20 (6) All vote information concerning each bill in each
|
||
21 current legislative session.
|
||
22 (7) Any veto messages concerning a bill in each
|
||
23 current legislative session.
|
||
24 (8) The California Codes.
|
||
25 (9) The California Constitution.
|
||
26 (10) All statutes enacted on or after
|
||
27 January 1, 1993.
|
||
34 (b) The
|
||
36 information identified in
|
||
37 subdivision (a) shall be made available to the public by
|
||
38 means of access by way of the largest nonproprietary,
|
||
39 nonprofit cooperative public computer network.
|
||
40 The
|
||
|
||
1 information shall be made available in one or more
|
||
2 formats and by one or more means in order to provide the
|
||
3 greatest feasible access to the general public in this state.
|
||
4 Any person who accesses the information may access all
|
||
5 or any part of the information. The information may also
|
||
6 be made available by any other means of access that
|
||
7 would facilitate public access to the information.
|
||
11 The information that is maintained in the
|
||
12 legislative information center that is operated and
|
||
13 maintained by the Legislative Counsel shall be made
|
||
14 available
|
||
15 in the shortest feasible after
|
||
16 the information is available in the information system.
|
||
17 The information that is not maintained in the information
|
||
18 system shall be made available in the shortest feasible
|
||
19 time after it is available to the Legislative Counsel.
|
||
26 (c) Any documentation that describes the electronic
|
||
27 digital formats of the information identified in
|
||
28 subdivision (a) and is available to the public shall be
|
||
29 made available by means of access by way of the
|
||
30 computer network specified in subdivision (b).
|
||
|
||
2 Personal information
|
||
3 concerning a person who accesses the information may
|
||
4 be maintained only for the purpose of providing service
|
||
5 to the person.
|
||
6 (e) No fee or other charge may be imposed by
|
||
7 the Legislative Counsel as a condition
|
||
8 of accessing the information that is accessible by way of
|
||
9 the computer network specified in subdivision (b).
|
||
10 (f) The electronic public access provided by
|
||
11 way of the computer network specified in
|
||
12 subdivision (b) shall be in addition to other electronic or
|
||
13 print distribution of the information.
|
||
14 (g) No action taken pursuant to this section shall be
|
||
15 deemed to alter or relinquish any copyright or other
|
||
16 proprietary interest or entitlement of the State of
|
||
17 California relating to any of the information made
|
||
18 available pursuant to this section.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 02 Oct 93 04:15:34 EDT
|
||
From: jackmcnac@AOL.COM
|
||
Subject: File 4--U. Minn. Campus Police Investigate Software Theft Ring
|
||
|
||
Minnesota Campus Police Investigating Software Theft Ring
|
||
By Nancy Livingston
|
||
Saint Paul Pioneer Press
|
||
|
||
Sep. 30--Call it a hijacking on the nation's information
|
||
superhighway - a crime of the 90s.
|
||
|
||
University of Minnesota police are investigating allegations that
|
||
a group of university students have copied computer software games and
|
||
other programs protected by copyright and sold them via Internet, the
|
||
international computer network.
|
||
|
||
Internet is a global network of 1.7 million computers used by 15
|
||
million to 30 million people. Growing by one million users a month,
|
||
Internet has been dubbed the information superhighway. It is heavily
|
||
used in academia for research, electronic mail, software transfer and
|
||
other purposes, and many faculty members and students have accounts to
|
||
use the Internet.
|
||
|
||
Last May, a supervisor in the Institute of Technology computer lab
|
||
became concerned when he noticed that the amount of disk space on the
|
||
lab's Sun Microsystems computer system was running low.
|
||
|
||
A search for users who had taken up unusual amounts of disk space
|
||
revealed that three users had a large amount of commercial software in
|
||
their files that cannot be used on the Sun computer. It was stored in
|
||
a format for transmission over the Internet.
|
||
|
||
The university supervisor surmised that the students were selling
|
||
the software in violation of Minnesota law, and he locked the
|
||
accounts.
|
||
|
||
More extensive checking turned up six more users with what
|
||
appeared to be a large amount of commercial software in their
|
||
directories along with a large amount of mail. Their accounts were
|
||
also locked and police were contacted.
|
||
|
||
University police Capt. Francis Gernandt obtained a search warrant
|
||
in June to gain access to the computer files in question, but he did
|
||
not receive the information he needed until this week. The delay was
|
||
due to a change in personnel at the computer lab.
|
||
|
||
Gernandt said Wednesday that he will be asking university computer
|
||
experts to help him analyze the computer files. Meanwhile, Gernandt is
|
||
checking on the whereabouts of nine students who had the commercial
|
||
software in their files. He is also looking into how much the software
|
||
is worth and how the students came to possess it.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 11 Sep 1993 16:04:37 CDT
|
||
From: Eric Crump <C509379@MIZZOU1.BITNET>
|
||
Subject: File 5--Computers & Writing Call for Proposals
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
Please forward this announcement to appropriate mailing
|
||
lists, newsgroups, bbs, and individuals.
|
||
***Heartfelt apologies to those poor souls who see this
|
||
announcement several million times***
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
====================================
|
||
Call for Proposals
|
||
|
||
The Tenth
|
||
|
||
COMPUTERS AND WRITING CONFERENCE
|
||
====================================
|
||
|
||
Hosted by the University of Missouri
|
||
Columbia, MO
|
||
May 20-23, 1994
|
||
|
||
THEME:
|
||
The Global Web of Writing Technologies
|
||
|
||
THE CONFERENCE
|
||
This conference serves a growing and diverse community of writing
|
||
teachers, students, and scholars who are interested in the
|
||
convergence of computer technology and writing education. Many
|
||
schools are now poised for their first leap into computer writing
|
||
instruction, while in other places writing teachers and their
|
||
students are making forays into new domains such as the wide world
|
||
of the Internet. This conference brings together people from those
|
||
extremes and from all points on the intervening continuum to share
|
||
their ideas, research, and experiences. ************************
|
||
---------------- * Tight travel budget? *
|
||
************************|
|
||
ELECTRONIC ACCESS |
|
||
The program for this year's conference will emphasize the role of |
|
||
the wide-area academic networks in writing education. And |
|
||
electronic access will, we hope, make attending the event possible|
|
||
to people who for some reason cannot travel to Columbia. It seems |
|
||
only appropriate that conferences--especially those that are |
|
||
concerned with computers and computer networks--should employ |
|
||
the reach of the Internet in order to give more people access |
|
||
to the conversation. ******************** <--|
|
||
---------------- * Attend C&W94 via *
|
||
* the Internet (at *
|
||
* a reduced fee) *
|
||
********************
|
||
PROPOSALS
|
||
We invite proposals that pertain in some way to the use of
|
||
computers at any level of writing education, K-12 to community
|
||
colleges to colleges and large universities, from technologically
|
||
rich environments to places where instruction with computers is
|
||
just getting started. Hands-on sessions, demonstrations, or any
|
||
other format that encourages audience participation and interaction
|
||
are particularly welcome. Here is a short list from among
|
||
innumerable possible topics:
|
||
|
||
--The latest reports from teachers and students--K-12 through
|
||
college level--who are exploring the possibilities of networked
|
||
classrooms
|
||
|
||
--Tales of adventure from teachers and students who are venturing
|
||
from the classroom into the wider network world
|
||
|
||
--Help taking the first steps toward incorporating computers into
|
||
writing instruction and research
|
||
|
||
--Possibilities for using computers to forge better connections
|
||
between K-12 and college educators
|
||
|
||
--Hypertext theory, its classroom applications and cultural
|
||
implications
|
||
|
||
--Hypermedia applications and their impact on how we view "text,"
|
||
"rhetoric," and "writing"
|
||
|
||
--Writing in distance education programs
|
||
|
||
--Computers and networks in writing across the curriculum programs
|
||
|
||
--The legal, economic, and cultural impact of computer technology
|
||
|
||
--The latest studies of and experiences with word processing and
|
||
computer-assisted instruction programs
|
||
|
||
--The impact of computer technology on writing and editing in
|
||
journalism
|
||
|
||
--How global information networks may affect the nature of journalism
|
||
|
||
--Hypertext and network collaboration and new shapes in creative
|
||
writing
|
||
|
||
--The changing relationship between writers and information
|
||
sources: libraries and librarians of the future
|
||
|
||
SPECIAL FOCUS
|
||
--The history and future of the computers and writing field
|
||
|
||
The tenth Computers and Writing Conference seems like an
|
||
appropriate place and time in which to indulge in some
|
||
retrospection, introspection, and prognostication. We hope veterans
|
||
and novices in the field will suggest opportunities for exploring
|
||
the State of the Field, whether via special forums or by weaving
|
||
the subject into regular sessions.
|
||
|
||
VIRTUAL SESSIONS?
|
||
We hope to have adequate access to a multiple user environment
|
||
(MediaMOO, probably, or Internet Relay Chat) for conference
|
||
activities. Presenters who are interested in trying something
|
||
rather new might want to consider proposing sessions that include
|
||
realtime conferencing over the Internet using these systems.
|
||
|
||
CW94:FORUM
|
||
The electronic forum offered this year by the University of
|
||
Michigan was a great success, and we plan to continue the
|
||
practice. Although the technical details have not yet been
|
||
nailed down, we expect to make available a similar bulletin-
|
||
board-type conferencing system that will allow participants
|
||
to read presentation summaries and discuss the issues they
|
||
raise well in advance of the May 20-23 gathering in Columbia.
|
||
|
||
Presenters whose proposals are accepted will be asked to
|
||
submit longer versions for use in conjunction with the
|
||
electronic conference. Details will be included in
|
||
acceptance notices.
|
||
--------------------------------------------------
|
||
|
||
Proposals for sessions on any subject related to computers and
|
||
writing will be accepted from August 1 to November 1, 1993. We
|
||
encourage electronic submission, but acceptance is not in any way
|
||
contingent upon it. Submissions can also be made in print or on 3.5
|
||
inch computer disks, initialized either in Macintosh or IBM format,
|
||
as long as the text is saved in ASCII (text) format. Notification
|
||
will be made in January 1994.
|
||
|
||
Please submit a 200- to 300-word abstract plus title for individual
|
||
presentations, for poster sessions, and for each portion of panel
|
||
presentations. For roundtables, think tanks, and readings (creative
|
||
writing, for example), please submit a single 300-word abstract with
|
||
names and addresses of each participant along with descriptions of the
|
||
contribution each participant will make. For workshops, please include,
|
||
in addition to a single 300-word abstract, an estimated timetable of
|
||
activities.
|
||
|
||
We also invite alternative session formats to the ones listed
|
||
here. Past conference-goers have expressed interest in more
|
||
of the hands-on and demo-type sessions, but presenters should
|
||
also feel free to suggest presentation formats that best fit
|
||
their work (although in the interest of the organizers' sanity,
|
||
it might be good to also suggest standard options in case the
|
||
preferred version simply can't be made to fit the program).
|
||
|
||
Include name, institutional affiliation, postal address, and electronic
|
||
mail address for each presenter.
|
||
|
||
Each submission should include a description, as precise as possible,
|
||
of equipment needs, if any. We do not guarantee absolutely that
|
||
equipment requests will be fulfillable, but we will do our best to
|
||
provide excellent technical support and will work with presenters to
|
||
make the best arrangements we can. Computer classrooms and labs
|
||
sporting IBM 55s with OS/2 2.1 or DOS 6.0 and Macintosh Centris
|
||
computers with System 7.1 will be available. Any additional hardware
|
||
or software requirements will need to be arranged on a case-by-case
|
||
basis.
|
||
|
||
Send electronic submissions (and any other correspondence) to: Eric Crump
|
||
at LCERIC@mizzou1.bitnet or LCERIC@mizzou1.missouri.edu. Please include
|
||
somewhere in the subject line: CWC94.
|
||
|
||
Send disks and print submissions to: Eric Crump, 231 Arts & Science,
|
||
University of Missouri. Columbia, MO 65211.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 24 Sep 1993 17:35:54 -0400
|
||
From: ssimpson@EFF.ORG(Sarah L Simpson)
|
||
Subject: File 6--ACTIVIST ALERT-CPSR Solicits CLIPPER/SKIPJACK comments
|
||
|
||
ACTIVIST ALERT - The Government Is Messin' With Your Privacy!
|
||
|
||
Computer Professionals for Social Responsibility (CPSR) posted the
|
||
following call for comments to the Net. As the deadline for comments on
|
||
the proposed Escrow Encryption Standard (CLIPPER/SKIPJACK) looms near, EFF
|
||
wholeheartedly supports CPSR's work to bring attention to the proposal and
|
||
encourages everyone who reads this to respond with comments.
|
||
|
||
We have added a sample letter and additional information at the end of the
|
||
CPSR post.
|
||
|
||
====================
|
||
text of CPSR post
|
||
====================
|
||
Call for Clipper Comments
|
||
|
||
The National Institute of Standards and Technology (NIST) has
|
||
issued a request for public comments on its proposal to establish
|
||
the "Skipjack" key-escrow system as a Federal Information
|
||
Processing Standard (FIPS). The deadline for the submission of
|
||
comments is September 28, 1993. The full text of the NIST notice
|
||
follows.
|
||
|
||
CPSR is urging all interested individuals and organizations to
|
||
express their views on the proposal and to submit comments
|
||
directly to NIST. Comments need not be lengthy or very detailed;
|
||
all thoughtful statements addressing a particular concern will
|
||
likely contribute to NIST's evaluation of the key-escrow proposal.
|
||
|
||
The following points could be raised about the NIST proposal
|
||
(additional materials on Clipper and the key escrow proposal may
|
||
be found at the CPSR ftp site, cpsr.org):
|
||
|
||
* The potential risks of the proposal have not been assessed and
|
||
many questions about the implementation remain unanswered. The
|
||
NIST notice states that the current proposal "does not include
|
||
identification of key escrow agents who will hold the keys for the
|
||
key escrow microcircuits or the procedures for access to the
|
||
keys." The key escrow configuration may also create a dangerous
|
||
vulnerability in a communications network. The risks of misuse of
|
||
this feature should be weighed against any perceived benefit.
|
||
|
||
* The classification of the Skipjack algorithm as a "national
|
||
security" matter is inappropriate for technology that will be used
|
||
primarily in civilian and commercial applications. Classification
|
||
of technical information also limits the computing community's
|
||
ability to evaluate fully the proposal and the general public's
|
||
right to know about the activities of government.
|
||
|
||
* The proposal was not developed in response to a public concern
|
||
or a business request. It was put forward by the National
|
||
Security Agency and the Federal Bureau of Investigation so that
|
||
these two agencies could continue surveillance of electronic
|
||
communications. It has not been established that is necessary for
|
||
crime prevention. The number of arrests resulting from wiretaps
|
||
has remained essentially unchanged since the federal wiretap law
|
||
was enacted in 1968.
|
||
|
||
* The NIST proposal states that the escrow agents will provide the
|
||
key components to a government agency that "properly demonstrates
|
||
legal authorization to conduct electronic surveillance of
|
||
communications which are encrypted." The crucial term "legal
|
||
authorization" has not been defined. The vagueness of the term
|
||
"legal authorization" leaves open the possibility that court-
|
||
issued warrants may not be required in some circumstances. This
|
||
issue must be squarely addressed and clarified.
|
||
|
||
* Adoption of the proposed key escrow standard may have an adverse
|
||
impact upon the ability of U.S. manufacturers to market
|
||
cryptographic products abroad. It is unlikely that non-U.S. users
|
||
would purchase communication security products to which the U.S.
|
||
government holds keys.
|
||
|
||
|
||
Comments on the NIST proposal should be sent to:
|
||
|
||
Director, Computer Systems Laboratory
|
||
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
||
Technology Building, Room B-154
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, MD 20899
|
||
|
||
Submissions must be received by September 28, 1993. CPSR has
|
||
asked NIST that provisions be made to allow for electronic
|
||
submission of comments.
|
||
|
||
Please also send copies of your comments on the key escrow
|
||
proposal to CPSR for inclusion in the CPSR Internet Library, our
|
||
ftp site. Copies should be sent to <clipper@washofc.cpsr.org>.
|
||
===================
|
||
end of CPSR post
|
||
===================
|
||
|
||
|
||
EFF joins with CPSR in urging you to send your comments to NIST as soon as
|
||
possible. To help get your creative juices flowing, we're attaching a
|
||
sample letter. You will probably want to personalize any letter you
|
||
actually send.
|
||
|
||
And because time is so tight, EFF has set up an Internet address where you
|
||
can send your electronic comments in lieu of mailing them through the U.S.
|
||
Postal Service. Send your letters to:
|
||
|
||
cryptnow@eff.org
|
||
|
||
We will be printing out all letters and hand-delivering them before the
|
||
deadline, so please make sure to send us any letter you want included no
|
||
later than 8pm on Monday, September 27.
|
||
|
||
If you would like additional background materials, you can browse the
|
||
pub/EFF/crypto area of our anonymous ftp site (ftp.eff.org). The original
|
||
solicitation of comments can be found there and is called
|
||
NIST-escrow-proposal.
|
||
|
||
DO NOT WAIT TO WRITE YOUR COMMENTS! TIME IS SHORT!
|
||
|
||
|
||
======================
|
||
<<your name>>
|
||
<<your organization>>
|
||
<<your street address>>
|
||
<<your city, state, zip>>
|
||
|
||
<<date>>
|
||
|
||
|
||
National Institute for Standards and Technology (NIST)
|
||
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
||
Technology Building, Room B-154
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, MD 20899
|
||
|
||
Mr. Director:
|
||
|
||
I am writing to oppose the Proposed Federal Information Processing Standard
|
||
(FIPS) for and Escrowed Encryption Standard, docket # 930659-3159.
|
||
|
||
Encryption is vital for the protection of individual privacy in the
|
||
Information Age. As more and more personal information flows around
|
||
electronic networks, we all need strong encryption to safeguard information
|
||
from unwanted intrusion
|
||
|
||
NIST should not be moving forward with technical standards specification
|
||
until critical policy decisions are made. These policy issues include:
|
||
|
||
o Continued Legal Use of All Forms of Encryption: When the Clinton
|
||
Administration announced the Clipper Chip, it assured the public that this
|
||
would be a purely voluntary system. We must have legal guarantees that
|
||
Clipper isn't the first step toward prohibition against un-escrowed
|
||
encryption.
|
||
|
||
o Legal Rights of Escrow Users: If people choose to deposit their
|
||
keys with the government or any other escrow agent, they must have some
|
||
legal recourse in the event that those keys are improperly released. The
|
||
most recent draft of the escrow procedures specifically states, however:
|
||
|
||
"These procedures do not create, and are not intended to create,
|
||
any substantive rights for individuals intercepted through electronic
|
||
surveillance, and noncompliance with these procedures shall not provide the
|
||
basis for any motion to suppress or other objection to the introduction of
|
||
electronic surveillance evidence lawfully acquired."
|
||
|
||
Leaving users with no recourse will discourage use of the system
|
||
and is a tacit acceptance of unscrupulous government behavior.
|
||
|
||
o Open Standards: People won't use encryption unless they trust it.
|
||
Secret standards such as Clipper cannot be evaluated by independent experts
|
||
and do not deserve the public trust.
|
||
|
||
In addition, the current proposed technical standard is incomplete.
|
||
It should not be approved until further comment on the complete proposal is
|
||
possible
|
||
|
||
o Operating Procedures Unclear: The full operating procedures for
|
||
the escrow agents has yet to be issued. Public comment must be sought on
|
||
the complete procedures, not just the outline presented in the draft FIPS.
|
||
Even the government-selected algorithm review group has declared that it
|
||
needs more information on the escrow process.
|
||
|
||
o Identity of Escrow Agents: The identity of one or both of the
|
||
escrow agents has not been firmly established.
|
||
|
||
o Algorithm Classified: Asking for comments on an algorithm that is
|
||
classified makes a mockery of citizen participation in government
|
||
decision-making.
|
||
|
||
NIST will be involved in making many critical decisions regarding the
|
||
National Information Infrastructure. The next time NIST solicits public
|
||
comments, it should be ready to accept reply by electronic mail in addition
|
||
to paper-based media.
|
||
|
||
Sincerely,
|
||
|
||
<<name>>
|
||
<<title>>
|
||
******************************
|
||
Sarah L. Simpson
|
||
Membership Coordinator
|
||
Electronic Frontier Foundation
|
||
1001 G Street, NW
|
||
Suite 950 East
|
||
Washington, DC 20001
|
||
202/347-5400 tel
|
||
202/393-5509 fax
|
||
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.78
|
||
************************************
|
||
|
||
|
||
|