875 lines
37 KiB
Plaintext
875 lines
37 KiB
Plaintext
|
|
|
|
Computer underground Digest Thu May 25, 1995 Volume 7 : Issue 42
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Goddess of Judyism Editor: J. Tenuta
|
|
|
|
CONTENTS, #7.42 (Thu, May 25, 1995)
|
|
|
|
File 1--From EFFector Online 08.06--NEW Petition against Exon Bill!
|
|
File 2--ACLU's Analysis of Revised Exon
|
|
File 3--CTHEORY homepage - E-journal of Computer Culture Reviews
|
|
File 4--Advertising on CuD? Say it isn't so...
|
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Mon, 22 May 1995 21:36:24 -0400
|
|
From: editor@EFF.ORG
|
|
Subject: File 1--From EFFector Online 08.06--NEW Petition against Exon Bill!
|
|
|
|
CAMPAIGN TO STOP THE EXON/GORTON COMMUNICATIONS DECENCY ACT
|
|
|
|
Update: -Bill is on the Senate floor
|
|
-Please act to help Leahy stop the Exon censorship bill
|
|
|
|
PETITION TO HELP SENATOR LEAHY STOP THE UNCONSTITUTIONAL
|
|
COMMUNICATIONS DECENCY ACT
|
|
May 19, 1995
|
|
|
|
PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
|
|
REDISTRIBUTE ONLY UNTIL June 9, 1995
|
|
REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS
|
|
|
|
Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
CONTENTS
|
|
The Time Is Now
|
|
Another Petition?
|
|
What Is Sen. Leahy Proposing?
|
|
How To Sign The Petition
|
|
The Petition Statement
|
|
Signing the petition from Fidonet or FTN systems
|
|
For More Information
|
|
List Of Participating Organizations
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
THE TIME IS NOW
|
|
|
|
HELP SENATOR LEAHY STOP THE EXON COMMUNICATIONS DECENCY ACT
|
|
|
|
The Senate is expected to on vote the Communications Decency Act (CDA,
|
|
a.k.a. the Exon Bill) within the next three weeks.
|
|
|
|
The Communications Decency Act, in its current form, would severely
|
|
restrict your rights to freedom of speech and freedom of expression
|
|
online, and represents a grave threat to the very nature and existence
|
|
of the Internet as we know it today. Without your help now, the
|
|
Communications Decency Act will likely pass and the net may never be
|
|
the same again.
|
|
|
|
Although the CDA has been revised to limit the liability of online
|
|
service providers, it would still criminalize the transmission of any
|
|
content deemed "obscene, lewd, lacivious, filthy, or indecent,"
|
|
including the private communications between consenting adults. Even
|
|
worse, some conservative pro-censorship groups are working to amend the
|
|
CDA to make it even more restrictive.
|
|
|
|
Currently, Senator Exon is negotiating with pro-censorship groups and
|
|
commercial entities that would be affected by the CDA. The voices of
|
|
Internet users must be heard now. We need to demonstrate that we are a
|
|
political force to be reckoned with.
|
|
|
|
In an effort to preserve your rights in cyberspace, Senator Patrick
|
|
Leahy (D-VT) has introduced the only legislative alternative to the
|
|
Communications Decency Act. Senator Leahy is willing to offer his bill
|
|
as a substitute for the CDA, but needs your support behind his
|
|
efforts.
|
|
|
|
Senator Leahy's legislation would commission a study to examine the
|
|
complex issues involved in protecting children from controversial
|
|
content while preserving the First Amendment, the privacy rights of
|
|
users, and the free flow of information in cyberspace.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
ANOTHER PETITION?
|
|
|
|
Yes. With a strong showing of support from the net.community, Senator
|
|
Leahy can offer his bill as a substitute for the Communications Decency
|
|
Act when the Senate votes on the issue later this month. Senator Leahy
|
|
needs and wants to demonstrate to his colleagues in the Senate that the
|
|
net.community is behind him in his efforts. We must rise to the task
|
|
and demonstrate that we will not sit idly by as our rights are
|
|
threatened.
|
|
|
|
Senator Leahy, a strong civil liberties advocate, has been the Senate's
|
|
most vocal critic of the Exon/Gorton Communications Decency Act, and
|
|
has taken a leading role in defending the rights and civil liberties of
|
|
Internet users. Senator Leahy has taken a great political risk in
|
|
representing the interests of Internet users on Capitol Hill. The time
|
|
has come for us to show our appreciation and our support for his
|
|
efforts.
|
|
|
|
The previous petition against the Communications Decency Act generated
|
|
over 108,000 signatures, and was instrumental in Senator Leahy's
|
|
decision to offer his alternative As the Senate moves to vote on the
|
|
CDA, we must act quickly to ensure that our collective voice continues
|
|
to be heard.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
WHAT IS LEAHY PROPOSING?
|
|
|
|
Senator Leahy's bill, S. 714, would direct the Department of Justice
|
|
and the Department of Commerce to commence a 5 month study to examine:
|
|
|
|
* Current law enforcement authority to prosecute the distribution of
|
|
pornography over computer networks;
|
|
|
|
* Whether any additional law or law enforcement resources are necessary;
|
|
|
|
* The availability of technological capabilities, consistent with the
|
|
First Amendment and the free flow of information in Cyberspace, to
|
|
protect children from accessing controversial commercial and non-
|
|
commercial content;
|
|
|
|
* Ways to promote the development and deployment of such technologies.
|
|
|
|
After conducting the study, the Justice Department must report to Congress
|
|
on its findings, and, if necessary, recommend changes in current law.
|
|
|
|
Leahy's bill represents the only substantive legislative alternative to the
|
|
Communications Decency Act, and will buy important time to have a detailed
|
|
and rational discussion about the issues involved in protecting children
|
|
from controversial content, and avoid the rush to censorship which is
|
|
occurring now on the Senate Floor.
|
|
|
|
Without a strong show of support for Leahy's bill, the Communications
|
|
Decency Act is very likely to pass.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
WHAT CAN I DO?
|
|
|
|
Please Sign the petition in support of Senator Leahy's alternative.
|
|
There are two ways to sign:
|
|
|
|
1. World Wide Web:
|
|
|
|
URL:http://www.cdt.org/petition.html
|
|
|
|
Please follow all instructions carefully. Please also put a link
|
|
to this page on your homepage.
|
|
|
|
2. email:
|
|
|
|
send email to petition@cdt.org.
|
|
|
|
Please provide the following information EXACTLY AS SHOWN.
|
|
INCORRECT SUBMISSIONS CANNOT NOT BE COUNTED!
|
|
|
|
Be sure that you make a carriage return at the end of each line
|
|
|
|
Your Name
|
|
Your email address
|
|
Are you a US Citizen (yes or no) (** IF NO, skip to last line)
|
|
Your Street Address (** USE ONLY ONE LINE)
|
|
Your City
|
|
Your State
|
|
Your Zip Code (**VERY IMPORTANT)
|
|
Country
|
|
|
|
PRIVACY POLICY: Information collected during this campaign will not be
|
|
used for any purpose other than delivering a list of signers to
|
|
Congress and compiling counts of signers from particular states and
|
|
Congressional districts. It will not be reused, sold, rented, loaned,
|
|
or available for use for any other purpose. All records will be
|
|
destroyed immediately upon completion of this project.
|
|
|
|
--- sample email submission ---
|
|
|
|
To: petition@cdt.org
|
|
From: everybody@ubiquitous.net
|
|
Subject--signed
|
|
|
|
Every Body
|
|
everybody@ubiqutious.net
|
|
YES
|
|
1111 State Street, Apt. 31 B
|
|
Any Town
|
|
CA
|
|
94320
|
|
USA
|
|
|
|
--- sample email submission ---
|
|
|
|
Multiple signatures will not be counted, so please only sign once.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
THE PETITION STATEMENT
|
|
|
|
We the undersigned users of the Internet are strongly opposed to the
|
|
"Communications Decency Act" (Title IV of S. 652), which is currently
|
|
pending before the Senate. This legislation will severely restrict our
|
|
rights to freedom of speech and privacy guaranteed under the
|
|
constitution.
|
|
|
|
Based on our Nation's longstanding history of protecting freedom of
|
|
speech, we believe that the Federal Government should have no role in
|
|
regulating the content of constitutionally protected speech on the
|
|
Internet.
|
|
|
|
We urge the Senate to halt consideration of the Communications Decency
|
|
Act and consider in its place S. 714, the "Child Protection, User
|
|
Empowerment, and Free Expression In Interactive Media Study Bill", an
|
|
alternative approach offered by Senator Patrick Leahy (D-VT).
|
|
|
|
Signed:
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
SIGNING THE PETITION FROM FIDONET OR FTN SYSTEMS
|
|
|
|
To sign the petition from FidoNet or other FTN systems, create a
|
|
netmail message to your local UUCP host. Search the nodelist for the
|
|
GUUCP flag, and use the address of that system:
|
|
|
|
To: UUCP, [GUUCP system's address here. "To:" name MUST be set to UUCP]
|
|
From: [you]
|
|
Subject--signed
|
|
_________________________________________________________________________
|
|
To: petition@cdt.org
|
|
|
|
Every Body
|
|
everybody@ubiqutious.net
|
|
YES
|
|
1111 State Street, Apt. 31 B
|
|
Any Town
|
|
CA
|
|
94320
|
|
USA
|
|
|
|
[Message starts on 3rd line. The second "To:" line with the internet
|
|
email address MUST be the first line of the message body, and the blank
|
|
line following that is REQUIRED. Mail will not be delivered by the gateways
|
|
without it.]
|
|
|
|
If you are unsure whether your FTN has an Internet gateway, or suspect it
|
|
may use something other than a GUUCP nodelist flag, ask your network
|
|
coordinators.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
PETITION RATIONALE
|
|
|
|
We oppose the "Communications Decency Act", sponsored by Senators James
|
|
Exon (D-NE) and Slade Gorton (R-WA), for the following reasons:
|
|
|
|
* It criminalizes the transmission of constitutionally protected speech,
|
|
including the private communications between consenting individuals;
|
|
|
|
* It would violate privacy rights by protecting system administrators
|
|
who take steps to ensure that their networks are not being used to
|
|
transmit prohibited content, even if those steps include reading all
|
|
messages, in violation of the Electronic Communications Privacy Act
|
|
(ECPA).
|
|
|
|
* It fails to account for the unique characteristics of interactive
|
|
media, including the tremendous control users have over the content
|
|
they or their children receive.
|
|
|
|
* It would give the Federal Communications Commission jurisdiction over
|
|
online speech by giving the FCC authority to establish rules
|
|
governing the distribution of content online;
|
|
|
|
The Internet and other interactive communications technologies offer a
|
|
unique opportunity for the free exchange of information and ideas, and
|
|
embody the very essence of our nation's democratic traditions of
|
|
openness, diversity and freedom of speech.
|
|
|
|
As users of these technologies, we know perhaps better than anyone that
|
|
there are other, less restrictive ways to protect children from
|
|
controversial materials while preserving the First Amendment and the
|
|
free flow of information.
|
|
|
|
Senator Leahy's bill provides an opportunity to address the issues
|
|
raised by the Communications Decency Act without restricting the free
|
|
speech and privacy rights of users.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
FOR MORE INFORMATION
|
|
|
|
Petition updates will be posted to appropriate newsgroups and other
|
|
forums on a regular basis.
|
|
|
|
To have the latest status report sent to you automatically, send email
|
|
to: p-update@cdt.org
|
|
|
|
If you have specific questions, or if you are interested in mirroring
|
|
the petition page, contact Jonah Seiger <jseiger@cdt.org>
|
|
|
|
Other petition related information can be found on the CDT petition
|
|
page.
|
|
|
|
URL:http://www.cdt.org/petition.html
|
|
|
|
For More information on the Communications Decency Act issue:
|
|
|
|
Web Sites
|
|
|
|
URL:http://www.cdt.org/cda.html
|
|
URL:http://www.eff.org/pub/Alerts/
|
|
URL:http://www.panix.com/vtw/exon/
|
|
|
|
FTP Archives
|
|
|
|
URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
|
|
URL:ftp://ftp.eff.org/pub/Alerts/
|
|
|
|
Gopher Archives:
|
|
|
|
URL:gopher://gopher.eff.org/11/Alerts
|
|
URL:gopher://gopher.panix.com/11/vtw/exon
|
|
|
|
Information By auto-reply email:
|
|
|
|
If you don't have www/ftp/gopher access, you can get up-to-date
|
|
information from the following autobots:
|
|
|
|
General information on the CDA issue cda-info@cdt.org
|
|
Current status of the CDA issue cda-stat@cdt.org
|
|
Chronology of events of the CDA issue vtw@vtw.org with the
|
|
subject "send events"
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
LIST OF PARTICIPATING ORGANIZATIONS
|
|
|
|
In order to use the net more effectively, several organizations have
|
|
joined forces on a single Congressional net campaign to stop the
|
|
Communications Decency Act.
|
|
|
|
In alphabetical order:
|
|
|
|
Californians Against Censorship Together BobbyLilly@aol.com
|
|
Center For Democracy And Technology (CDT) info@cdt.org
|
|
Electronic Frontier Foundation (EFF) info@eff.org
|
|
Feminists For Free Expression (FFE) FFE@aol.com
|
|
Florida Coalition Against Censorship pipking@mail.firn.edu
|
|
Hands Off! The Net baby-x@phanton.com
|
|
Inner Circle Technologies, Inc. aka. NovaLink
|
|
League for Programming Freedom lpf@uunet.uu.net
|
|
National Libertarian Party 73163.3063@compuserve.com
|
|
Marijuana Policy Project MPProject@AOL.com
|
|
MindVox system@phantom.com
|
|
National Public Telecomputing Network (NPTN) info@nptn.org
|
|
National Writers Union (UAW Local 1981 AFL-CIO) kip@world.std.com
|
|
Panix Public Access Internet info@panix.com
|
|
People for the American Way jlessern@reach.com
|
|
Society for Electronic Access sea@sea.org
|
|
The WELL info@well.com
|
|
Voters Telecommunications Watch (VTW) vtw@vtw.org
|
|
|
|
If you would like to add your organization to this list, contact Shabbir
|
|
Safdar at VTW <shabbir@vtw.org>
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 May 1995 16:49:42 -0400
|
|
From: ACLUNATL@AOL.COM
|
|
Subject: File 2--ACLU's Analysis of Revised Exon
|
|
|
|
ACLU Cyber-Liberties Analysis:
|
|
Revised Exon Amendment
|
|
May 25, 1995
|
|
----------------------------------------------
|
|
|
|
The American Civil Liberties Union has previously expressed its strong
|
|
opposition to the "Communications Decency Act," introduced by Senator Exon as
|
|
S. 314 and adopted by the Senate Commerce Committee as an amendment to
|
|
the Telecommunications Competition and Deregulation Act of 1995.
|
|
|
|
Yesterday, we obtained a revised version of the Exon Amendment, which
|
|
was apparently written by members of Senator Exon's staff in
|
|
consultation with representatives of online service providers, the
|
|
Department of Justice, and pro-censorship lobbying groups. The
|
|
following analysis presents the ACLU's objections to the revised draft
|
|
and clarifies the ACLU's continuing concern that the Exon amendment,
|
|
in its existing or revised form, violates both free speech and privacy
|
|
rights.
|
|
|
|
I. Interactive Cyberspace Must Not Be Constricted by Old Media Models
|
|
|
|
The most fundamental flaw of the revised Exon amendment is that it
|
|
still wrongly attempts to force the new interactive environment of
|
|
cyberspace and online services into the censorship straitjacket
|
|
foisted on old media. In fact, the Exon amendment even uses as its
|
|
model the most restrictive of the old media.
|
|
|
|
This is wrong-headed policy. It is also a violation of the Free Speech
|
|
and Privacy guarantees of the Constitution and therefore
|
|
unconstitutional.
|
|
|
|
The Exon amendment would make the interactive environment one of the
|
|
most censored segments of communications media when logic dictates
|
|
that cyberspace, with its emphasis on user-choice and user-control,
|
|
should make it the least censored. At a minimum, the extremely
|
|
limited rules of content-regulation for print media, and the
|
|
safeguards against censorship for print materials, should be applied
|
|
to online communications. The ACLU, moreover, believes that the
|
|
characteristics of cyberspace, including the private and interactive
|
|
nature of the communication, dictates that cyberspace should be even
|
|
more free than print.
|
|
|
|
We stress that there is no revision of the Exon amendment -- no
|
|
tinkering of its censorship provisions -- that eliminates this
|
|
problem. The Exon amendment cannot be "fixed." It must be rejected.
|
|
|
|
II. The Exon Amendment Would Still Restrict Online Communications to
|
|
Those Appropriate for Children
|
|
|
|
Section (d) of the revised Exon amendment would still
|
|
unconstitutionally restrict all online content to that which is
|
|
suitable for children.
|
|
|
|
Even under existing case law, non-obscene speech that is deemed
|
|
"indecent" is protected by the First Amendment. _Sable Communications
|
|
v. FCC_, 492 U.S. 115 (1989). The Government may only regulate
|
|
indecent speech if it establishes a compelling governmental interest
|
|
in the regulation AND narrowly tailors the restriction to achieve that
|
|
interest. _Id._ at 125. See also _Pacifica Foundation v. FCC_, 438
|
|
U.S. 726 (1978); _Carlin Communications v. FCC_, 749 F.2d 113 (2d
|
|
Cir. 1984) (Carlin I); _Carlin Communications v. FCC_, 787 F.2d 846
|
|
(2d Cir. 1986) (Carlin II); _Dial Information Services v. Thornburg_,
|
|
938 F.2d 1535 (2d Cir. 1991).
|
|
|
|
Indeed, much of what consenting adults prize about some of their
|
|
personal communications could well be deemed by outsiders as
|
|
"indecent" if addressed to a child.
|
|
|
|
The revised draft, like the original Exon amendment, is
|
|
unconstitutional because requiring users and content providers to
|
|
reduce their content to what is suitable for children is not the least
|
|
restrictive means for protecting minors from indecent material. The
|
|
"justifications" for regulation of indecency in broadcasting and
|
|
telephone audiotext services do not apply to interactive
|
|
communications, in which users - including parents - have much more
|
|
control over the content of the messages they receive. We are also
|
|
prepared to argue that the "justifications" asserted for censorship in
|
|
any of the old media, including print, do not apply to cyberspace.
|
|
|
|
III. Some Specific Problems in the Revised Exon Draft
|
|
|
|
Again, the ACLU strongly believes that the anti-cyberliberty Exon
|
|
amendment cannot be "fixed." It needs to be defeated. So, even if
|
|
all of these specific problems were solved, the Exon amendment would
|
|
still be a terrible idea. Still, it may be useful to consider briefly
|
|
some of the specific problems in the revised Exon draft.
|
|
|
|
*Revised section (d) outlaws the online transmission of obscene
|
|
materials without defining "obscenity." Using the test for obscenity
|
|
articulated in Miller v. California, 413 U.S. 1 (1973), the federal
|
|
government has chosen to stage prosecutions of online obscenity cases
|
|
in conservative jurisdictions in order to take advantage of more
|
|
restrictive "community standards." See Thomas v. United States, U.S.
|
|
Court of Appeals for the Sixth Circuit, No. 94-6648 and No. 94-6649.
|
|
This trend poses a severe threat that online users and providers will
|
|
be forced to reduce content to that which would be acceptable under
|
|
the "community standards" of the most conservative jurisdiction. The
|
|
ACLU has filed an amicus brief in the Thomas case strongly opposing
|
|
the government's misuse of the censorship laws.
|
|
|
|
*Revised sections (d) and (e) extend liability for transmission
|
|
of obscene or indecent communications to non-commercial in addition to
|
|
commercial providers. This change would render the revised draft more
|
|
restrictive of free speech than the original Exon amendment.
|
|
|
|
*While revised section (f) provides some defenses for online
|
|
service providers, these defenses place smaller system operators at
|
|
risk because they cannot afford to assert the defenses in court.
|
|
Moreover, the defenses are incomplete and many larger service
|
|
providers would likely find themselves in jeopardy at the hands of
|
|
prosecutors motivated by the political advantages of currying favor
|
|
with certain pro-censorship groups.
|
|
|
|
*Revised section (f)(2) fails to protect providers who cede
|
|
editorial control to an entity "which the defendant knows or had
|
|
reason to know intends to engage in conduct that is likely to violate
|
|
this section." This could pose serious problems for Internet
|
|
providers that may have "reason to know" that certain sites are likely
|
|
to contain communications deemed to be obscene or indecent.
|
|
|
|
*Revised section (f)(3) gives the Federal Communications
|
|
Commission the power to issue regulations regarding methods in which
|
|
providers may restrict access in order to avoid liability. Giving
|
|
federal regulators the authority to determine the rules for
|
|
distributing online content will radically affect the freedom of
|
|
cyberspace and will have a severe direct effect and an equally severe
|
|
chilling effect on online speech.
|
|
|
|
*Revised section (f)(4) could still make it impossible for users
|
|
or content providers to remedy a violation of rights by an online
|
|
service provider if the service claimed it was attempting to comply
|
|
with the Exon amendment.
|
|
|
|
Conclusion
|
|
|
|
The revised Exon draft continues to subject an industry that has
|
|
blossomed without government control to an unprecedented amount of
|
|
interference and intrusion over content. It gravely threatens the
|
|
free flow of information and the diversity of content transmitted over
|
|
online networks.
|
|
|
|
To achieve the liberating potential of the information superhighway,
|
|
Congress must ensure that interactive technologies enhance rather than
|
|
stifle democratic values.
|
|
|
|
The American Civil Liberties Union therefore opposes the Exon
|
|
amendment, both in its original form and as revised.
|
|
-------------------------------------------------
|
|
|
|
ACLU Free Reading Room
|
|
gopher://aclu.org:6601
|
|
|
|
**NEW** ACLU Constitution Hall on AmericaOnline: keyword ACLU
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 6 May 1995 15:12:31 -0500
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 3--CTHEORY homepage - E-journal of Computer Culture Reviews
|
|
|
|
((MODERATORS NOTE: We came across the following homepage that
|
|
journalists, academics, and other researchers might find useful.
|
|
You can access at the www site listed, or you can access it
|
|
through the CuD homepage at http://www.soci.niu.edu/~cudigest))
|
|
|
|
CTHEORY is an international, electronic review of books on theory,
|
|
technology and culture. Sponsored by the Canadian Journal of
|
|
Politicaland Social Theory, reviews are posted periodically of key
|
|
books incontemporary discourse as well as theorisations of major
|
|
"event-scenes"in the mediascape.
|
|
|
|
You may also view CTHEORY by volume.
|
|
_________________________________________________________________
|
|
|
|
ARTICLES
|
|
* Americans Have No Identity, But They Do Have Wonderful Teeth, Jon
|
|
Epstein.
|
|
* Cyberwar, God And Television: Interview with Paul Virilio, Louise
|
|
Wilson.
|
|
* Digital City, Amsterdam, Shuschen Tan.
|
|
* European Borders: History Of Space / Space Of History, J. Peter
|
|
Burgess.
|
|
* From False Consciousness To Viral Consciousness, Dianne Rothleder.
|
|
* Gay Life/Queer Art, Fredrick Corey.
|
|
* Hystericizing the Millennium, Jean Baudrillard.
|
|
* Infobahn Blues, Robert Adrian.
|
|
* The Kafka Chronicles Excerpt, Mark Amerika.
|
|
* The Information War, Hakim Bey.
|
|
* Kate Bornstein: A Transgender Transsexual Postmodern Tiresias,
|
|
Shannon Bell.
|
|
* The Language Of The Body, Kathy Acker.
|
|
* Nietzsche at the Mall: Deconstructing the Consumer, Daniel R.
|
|
White and Gert Hellerick.
|
|
* No Reprieve For Sarajevo, Jean Baudrillard.
|
|
* Pataphysics of Year 2000, Jean Baudrillard.
|
|
* The Political Economy Of Virtual Reality: Pan-Capitalism, Arthur
|
|
Kroker and Michael A. Weinstein.
|
|
* Reversion of History, Jean Baudrillard.
|
|
* Rise Of The Void Towards The Periphery, Jean Baudrillard.
|
|
* Stories From The Bloodhut, Cynthia Meier, Kim Lowry, Lori Scheer,
|
|
Jamie Lantz, Rhonda Hallquist,and Audrey Joy.
|
|
* Strike Of Events, Jean Baudrillard.
|
|
* The Technology Of Uselessness, Critical Art Ensemble.
|
|
* Thawing Of The East, Jean Baudrillard.
|
|
* Useless Technology, Critical Art Ensemble.
|
|
* Venus In Microsoft: male mas(s)ochism and cybernetics, Stephen
|
|
Pfohl.
|
|
|
|
EVENT-SCENES
|
|
* Autopsy Of A Non-Event: The German Election, Dirk vom Lehn.
|
|
* Catastrophe Field: The LA Quake, David Cook.
|
|
* Declaration For A Free And Unified Sarajevo, City Assembly of
|
|
Sarajevo.
|
|
* Death Is Dead, m-angle-angel.
|
|
* The Hyper-Texted Body, Or Nietzsche Gets A Modem, Arthur Kroker
|
|
and Michael Weinstein.
|
|
* The Media Gesture Of Data Dandyism, Geert Lovink.
|
|
* Michael Jordan Mogadishu, Arthur Kroker.
|
|
* The Murder Trial: Genre Or Event-Scene?, Anita Brenner.
|
|
* The One Idea System, Ignacio Ramonet.
|
|
* Speed(racing): Ecstasy And Fascination, Javier Santiago-Lucerna.
|
|
* Taiwan Data Heaven, Arthur Kroker.
|
|
* Turkish (Retro-Fascist) Olympics, Michael A. Weinstein.
|
|
* U/R, Mark A. Lunt.
|
|
|
|
REVIEWS
|
|
* Auto-Eulogy For The Citizen-Activist, Richard DeLaurell.
|
|
Chantal Mouffe, ed. Dimensions of Radical Democracy:
|
|
Pluralism,Citizenship, Community
|
|
* Baudrillard's Remainder, Andrew Wernick.
|
|
Jean Baudrillard, The Transparency Of Evil: Essays On Extreme
|
|
Phenomena
|
|
Mike Gane, ed., Baudrillard Live: Selected Interviews
|
|
* A Cartesian View From Nowhere, Ken Hillis.
|
|
Barbara Maria Stafford, Body Criticism: Imaging the Unseen in
|
|
Enlightenment Art and Medicine
|
|
* Celebrity As Simulacrum, Deena Weinstein.
|
|
Joshua Gamson, Claims To Fame: Celebrity In Contemporary America
|
|
* The Cinemachine, m-angle-angel.
|
|
Steven Shaviro, The Cinematic Body
|
|
* Describing Writing Describing, Ellen Zweig.
|
|
Alberto Perez-Gomez, Polyphilo, or The Dark Forest Revisited
|
|
* Detournement For Fun And [Political] Profit, W. Ted Rogers.
|
|
Sunil Gupta, ed. Disrupted Borders: An Intervention In Definitions
|
|
Of Boundaries.
|
|
* Review: Digitaler Schein, Geert Lovink.
|
|
Florian Roetzer, ed., Digitaler Schein, Aesthetik der
|
|
Electronischen Medien
|
|
* Diplomatics, J. Peter Burgess.
|
|
James Der Derian, Antidiplomacy: Spies, Terror, Speed, and War
|
|
* Draculaland, m-angle-angel.
|
|
subREAL, Draculaland
|
|
* Drug Hysteria: U.S.A., Critical Art Ensemble.
|
|
John Strausbaugh and Donald Blaise, eds., The Drug User: Documents
|
|
1840-1960
|
|
* Farewells To American Culture, Work And Competition, David Cook.
|
|
Lester Thurow, Head To Head
|
|
Robert B. Reich, The Work Of Nations
|
|
John Kenneth Galbraith, The Culture Of Contentment
|
|
* Farewells To Justice, God, Politics And The European Way, David
|
|
Cook.
|
|
Heinrich Boll, Women In A River Landscape
|
|
Albert Camus, The Fall
|
|
Friedrich Durrenmatt, The Execution Of Justice
|
|
Graham Greene, Dr. Fischer Of Geneva Or The Bomb Party
|
|
* Feminism and Post (19th Century) History in Eastern Europe, Alexis
|
|
Gosselin.
|
|
Barbara Einhorn, Cinderella Goes to Market: Citizenship, Gender
|
|
and Women's Movements in East Central Europe
|
|
* Foucault's Virtual Passion, Hart Murphy.
|
|
James Miller, The Passion of Michel Foucault
|
|
* Fractured Flesh, Ken Hillis.
|
|
Scott Bukatman, Terminal Identity: The Virtual Subject in
|
|
Post-Modern Science Fiction
|
|
* Review: Hard War/Soft War, Geert Lovink.
|
|
Martin Stingelin and Wolfgang Scherer, eds., Hard War/Soft War,
|
|
Krieg Und Medien
|
|
* John Rawls: A Calvinist After-Image, Michael Weinstein.
|
|
John Rawls, Political Liberalism
|
|
* The Last Camus, David Cook.
|
|
Albert Camus, Le premier homme
|
|
* Lenin In Ruins, Alexis Gosselin.
|
|
David Remnick, Lenin's Tomb: The Last Days of the Soviet Empire
|
|
* Live Aronowitz: Dead Theories, David Cook.
|
|
Stanley Aronowitz, The Politics of Identity
|
|
Stanley Aronowitz, Roll over Beethoven
|
|
Stanley Aronowitz, Dead artists: Live theories
|
|
* Modernity, Postmodernity, Social Marginality, Kenneth Mostern.
|
|
Phillip Bryan Harper,Framing the Margins: The Social Logic of
|
|
Postmodern Culture
|
|
Paul Gilroy, The Black Atlantic: Modernity and Double
|
|
Consciousness
|
|
* Neither Liberal Nor Communitarian: Feminism, Political Theory,
|
|
Possibility, LeonardWilliams.
|
|
Elizabeth Frazer And Nicola Lacey, The Politics Of Community: A
|
|
Feminist Critique Of The Liberal-Communitarian Debate
|
|
* Review: On Justifying The Hypothetical Nature Of Art, Geert
|
|
Lovink.
|
|
Robert Fleck, ed., On Justifying The Hypothetical Nature Of Art
|
|
And The Non-Identicality Within The Object World
|
|
* A Poet's Eye View Of The Uncommon Market, Tom P. Abeles.
|
|
Jacques Darras, Beyond the Tunnel of History
|
|
* Post Panoptic Mirrored Worlds, Kimberly Anne Sawchuk.
|
|
David Gelertner, Mirror Worlds; or the day software puts the
|
|
universe in a shoe box...how it will happen and what it willmean
|
|
* Public Policy Of Eugenics, Eileen Manion.
|
|
Christine Overall, Human Reproduction: Principles, Practices,
|
|
Policies
|
|
Gwynne Basen, Margrit Eichler, Abby Lippman, eds., Misconceptions:
|
|
The Social Construction of Choice and the New Reproductive
|
|
Technologies,Volume One
|
|
* The Revolution Will Be Televised, W. Ted Rogers.
|
|
Richard Stivers, The Culture of Cynicism: American Morality In
|
|
Decline
|
|
* RU Wetware?: Television as Cybernetics, Arthur Kroker.
|
|
Tony Fry, ed., RUATV? Heidegger And The Televisual
|
|
Geert Lovink and Rik Delhaas, eds., Wetware
|
|
* The Spectacle Of Secrecy, Len Bracken.
|
|
Guy Debord, Treatise on Secrets: Commentaires sur la societe du
|
|
spectacle
|
|
* Stolen Childhoods Redreamed, Stephen Pfohl.
|
|
Kathy Acker, My Mother: Demonology, A Novel
|
|
* Textual Power, Robert Moskal.
|
|
Gunnar Olsson, Lines of Power/Limits of Language
|
|
* Two Instances of Musical Postmodernism in Britain, Steve Gibson.
|
|
his name is alive, Mouth By Mouth
|
|
Gavin Bryars, Jesus' Blood Never Failed Me Yet
|
|
* We Go Round and Round in the Night and Are Consumed by Fire,
|
|
Stephen Pfohl.
|
|
Guy Debord, In Girum Imus Nocte Et Consumimurm Igni: a Film
|
|
* Will The Opposable Thumb Become The Appendix Of The Future?, Tom
|
|
Abeles.
|
|
Kevin Kelly, Out of Control
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
CTHEORY is published with the assistance of the Dean of Arts and
|
|
Scienceand the Department of Political Science, Concordia University,
|
|
Montreal,Canada. The World Wide Web edition is made available through
|
|
the kindassistance of the members of the English Server Collective at
|
|
CarnegieMellon.
|
|
|
|
Editors: Arthur and Marilouise Kroker, <ctheory@vax2.concordia.ca>
|
|
|
|
Editorial Board: Kathy Acker, Jean Baudrillard, Bruce Sterling,
|
|
DavidCook, Berkeley Kaite, William Leiss, Geert Lovink, EileenManion,
|
|
Hans Mohr, Alberto Perez-Gomez, Stephen Pfohl, Andrew Ross,
|
|
KimSawchuk, Deena Weinstein, Michael Weinstein, AndrewWernick, Gail
|
|
Valaskakis.
|
|
|
|
Editorial Assistant: Michael Boyle
|
|
Artists in Residence: STELARC (Australia), Art in Ruins (UK), Mark
|
|
Lewis(Canada), subReal (Romania), Critical Art Ensemble (USA)
|
|
World Wide Web Editor: Carl Steadman, <carl@cdtl.umn.edu>
|
|
CD-ROM/Multi-Media Editor: Steve Gibson
|
|
|
|
|
|
The disk (DOS/Mac) version of CTHEORY may be ordered from CJPST,
|
|
Concordia University, 1455 de Maisonneuve, O., Montreal, Canada,
|
|
H3G1M8. Institutional orders may be placed through UMI, Ann Arbor,
|
|
Michigan.
|
|
|
|
CTHEORY is indexed in International Political Science
|
|
Abstracts/Documentation politique international, Sociological
|
|
AbstractInc., Advance Bibliography of Contents: Political Science
|
|
andGovernment, Canadian Periodical Index, and Film and Literature
|
|
Index.
|
|
_________________________________________________________________
|
|
|
|
5 March 1995
|
|
Carl Steadman / <carl@cdtl.umn.edu>
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 25 May 1995 11:19:34 -0500 (CDT)
|
|
From: jerryw@IMAGINE.CONVEX.COM(Jerry Whelan)
|
|
Subject: File 4--Advertising on CuD? Say it isn't so...
|
|
|
|
I just read the latest CuD (7.41) and had to wonder about the O'Reilly
|
|
press release. O'Reilly is generally a good netizen, but I don't see
|
|
how their $500 web server has much to do with the topics that that CuD
|
|
deals with. After all, I don't remember seeing Netscape's press release
|
|
for their servers in the CuD...
|
|
|
|
===========
|
|
|
|
((MODERATORS' RESPONSE: Jerry Whelan raises a legitimate point that
|
|
deserves an answer. CuD policy is to try to run articles that we
|
|
believe are of interest to the dramatically diverse readership.
|
|
Sometimes, these are promotional posts. Most promos are inappropriate.
|
|
But, in some cases, and O'Reilly is one of them, there is interest in
|
|
what they're doing, whether a promo or not. O'Reilly puts out the
|
|
best line of Unix texts around, and that, coupled with the generally
|
|
informative nature of much of their promo material, makes many of
|
|
their promos newsworthy.
|
|
|
|
We should point out that we have run promos for web browsers,
|
|
such as Slipknot. We haven't run Netscape because they have
|
|
not provided us with any information.
|
|
|
|
We agree with Jerry's concern that there is no place for blatant
|
|
hucksterism in CuD, and we thank him for helping us try to maintain
|
|
the delicate balance while walking that thin line between readership
|
|
interest and inappropriate commercialism.
|
|
|
|
For the cynics, no, CuD receives no compensation of any kind for
|
|
run promos or any other post.))
|
|
|
|
------------------------------
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.42
|
|
************************************
|
|
|