974 lines
52 KiB
Plaintext
974 lines
52 KiB
Plaintext
|
|
Computer underground Digest Tue Jan 30, 1996 Volume 8 : Issue 09
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.09 (Tue, Jan 30, 1996)
|
|
|
|
File 1--Bernie S. 1/26 hearing
|
|
File 2--Default gateway to .fidonet.org going down (fwd)
|
|
File 3--The "Space" of Cyberspace (fwd)
|
|
File 4--Privacy in the Workplace
|
|
File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 30 Jan 1996 05:50:36 -0500 (EST)
|
|
From: Emmanuel Goldstein <emmanuel@2600.COM>
|
|
Subject: File 1--Bernie S. 1/26 hearing
|
|
|
|
The events of 1/26/96 were about as unbelievable as the events that
|
|
have transpired throughout this case. The only positive development
|
|
is that more people are slowly starting to realize what's happening.
|
|
|
|
Two and a half hours after the sentencing was to be held, the judge
|
|
arrived in the courtroom. His demeanor seemed significantly more
|
|
upbeat and open than his previous appearances. Perhaps this had to
|
|
do with the fact that Ed's lawyer and members of the press were in
|
|
attendance. The judge allowed everyone involved in the case to speak:
|
|
Probation Officer Scott Hoak, Haverford Township Detective John K.
|
|
Morris, Secret Service Agent Thomas L. Varney, Ed's attorney (Ken
|
|
Trujillo), and Ed himself.
|
|
|
|
Throughout the hearing, the main issue was whether or not Cummings
|
|
was a threat to the community. Varney was adament in his assessment
|
|
of Cummings as a danger but when pressed by Trujillo could come
|
|
up with nothing more substantive than the books found in Cummings'
|
|
home. These books came from publishers like Loompanix and dealt
|
|
with such things as making bombs and establishing false identities.
|
|
The other damning evidence was a list of Secret Service frequencies
|
|
(from an issue of Monitoring Times), a copy of a magazine article
|
|
that listed Secret Service codenames for President Reagan (dated 1983),
|
|
and a material that the Secret Service had suspected was C4 but which
|
|
later turned out not to be. For some reason they feel compelled to
|
|
mention this at each hearing as if C4 had actually been found when in
|
|
fact the substance was something dentists use to mold dentures (the
|
|
owner of the house was a dentist).
|
|
|
|
Trujillo successfully managed to get Varney to admit that no guns or
|
|
explosives of any sort were found. No evidence was presented to indicate
|
|
that Cummings was ever a threat of any sort to anybody. What's more,
|
|
Cummings proved his responsibility by immediately getting a job after
|
|
the Secret Service locked him up for most of last year and also by
|
|
dutifully showing up for each hearing that was scheduled in Easton,
|
|
even though the threat of more prison time loomed.
|
|
|
|
Cummings apologized to the court for his "odd curiosity" of the past,
|
|
insisting that he merely collected books and information and never
|
|
caused harm to anyone. His lawyer pleaded with the judge to allow
|
|
Cummings to pick up the pieces of his life and not be subjected to
|
|
any more inhumane treatment.
|
|
|
|
In the end, the judge was not interested in whether or not Cummings
|
|
posed a threat. He saw a probation violation and therefore withdrew
|
|
the probation. Sentencing was postponed to March 5th. But the judge
|
|
showed some compassion. He lowered the $250,000 bail to $100,000.
|
|
|
|
Currently Cummings is imprisoned in the maximum wing of the prison
|
|
where people with the highest bail are kept. He's with murderers and
|
|
rapists. Conditions are appalling. One of the prisoners is on death
|
|
row - his name is Joseph Henry and he bit off a woman's nipples and
|
|
clitoris before strangling her with a slinky. These are the kinds of
|
|
people the Secret Service has condemned Cummings to be with.
|
|
|
|
When Cummings was originally put on probation years ago, the probation
|
|
officer told him he thought the whole thing was a big waste of time.
|
|
The only thing he was accused of, after all, was taking batteries out
|
|
of a tone dialer that a cop was questioning him about. And the really
|
|
ironic part was that Cummings wasn't even the person who took the
|
|
batteries out - it was one of his friends. But he was not about to
|
|
turn a friend in for something so absurd. After all, this was a very
|
|
minor thing - he paid a fine of nearly $3,000 and was put on probation
|
|
and that was it.
|
|
|
|
When the Secret Service threw Cummings in prison for possession of
|
|
a red box in early 1995, they knew he could be screwed again when he
|
|
finally got out since being arrested is a probation violation. And
|
|
Special Agent Thomas Varney spent a great deal of effort to see that
|
|
this is exactly what happened. He made multiple trips to Easton and
|
|
convinced the local authorities to lock Cummings up as if he were the
|
|
most sadistic of killers.
|
|
|
|
On Friday, Cummings' probation officer did an aboutface and told the
|
|
court that he thought Cummings represented a very great danger to the
|
|
community. Outside the courtroom, he and the other local law enforcement
|
|
people crowded around Varney like kids surrounding a rock star. He was
|
|
their hero and maybe one day they would be just like him.
|
|
|
|
It would be good to say that the press showed up and the rest of the
|
|
world finally got to see one of the greatest injustices perpetrated
|
|
by the Secret Service. But the only headlines to come out of this
|
|
charade said things like "Judge Hangs Up On Phone Hacker - Bail
|
|
Revoked After He Continues To Commit Telecom Fraud". Not only has
|
|
Cummings never been convicted of any kind of fraud - he's never
|
|
even been accused of it. This is a case based entirely on perceptions
|
|
and a sick vendetta by a government agency that has turned into a
|
|
genuine threat against free thinking people everywhere.
|
|
|
|
When Cummings is sentenced on March 5th, he could be put into prison
|
|
for years. This is what the Secret Service will attempt to ensure.
|
|
They have to be stopped and they have to be held accountable for what
|
|
they've already done. We need to be able to protect individual rights
|
|
against this kind of abuse and so far we have all failed miserably.
|
|
We have little more than a month to get it right.
|
|
|
|
------------------------------
|
|
|
|
From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
|
|
Date: Sat, 27 Jan 1996 22:45:21 CDT
|
|
Subject: File 2--Default gateway to .fidonet.org going down (fwd)
|
|
|
|
--- (fwd) ---
|
|
|
|
|
|
|
|
*** The Free Ride is Over! ***
|
|
=====================
|
|
|
|
Effective March 1, 1996, the Internet Gateway at 1:1/31 will
|
|
be *shutting down*. At that point, there will be NO MORE "default"
|
|
gateway for E-Mail coming INbound from the Internet for Zone-1.
|
|
|
|
The reasons for this termination of service are numerous ...
|
|
|
|
o Most recently, an excommunicated SysOp has gone on a rampage of
|
|
forging subscription messages to subscribe numerous FidoNet addresses
|
|
to numerous unwanted Internet mailing-lists in a deliberate attempt
|
|
to "break" the FidoNet routing structure and the gateway structure.
|
|
Many of the other gateways have already shut down operations.
|
|
|
|
o Many of the *C routing systems have taken it upon themselves to
|
|
either "bounce" (many doing it improperly addressed) or to
|
|
deliberately "bit-bucket" NetMail coming from the gateway.
|
|
I can no longer deal with the voluminous NetMail being received
|
|
from End-Nodes querying what has happened to their inbound E-Mail
|
|
coming thru the gateway.
|
|
|
|
o The gateways systems and the "f###.n###.z#.fidonet.org" address
|
|
syntax was designed for "casual mail", not for subscribing to
|
|
massive mailing-lists and such. Many people have found ways to
|
|
deliberately by-pass the controls at the gateways and subscribe
|
|
to mailing-lists, forcing the inbound traffic to route in thru
|
|
the gateways and clogging up the FidoNet routing structures.
|
|
These days, it is fairly easy and inexpensive to get an account
|
|
with any of the many Internet Service Providers thoughout the
|
|
country. Those that really need to subscribe to mailing-lists
|
|
should go that route.
|
|
|
|
o The original intent of setting up the .fidonet.org domain was to
|
|
have gateways situated geographically close to the Nodes they
|
|
serve so that the load would be distributed and routing problems
|
|
on the FidoNet side would be reduced.
|
|
As of this writing, there are only 34 Nets out of the 431 Nets
|
|
in Zone-1 which have their INbound E-Mail coming in via gateways
|
|
other than the "default" gateway. The existing gateway operators
|
|
and gateway software authors have always been willing to help
|
|
a new gateway with their setup. The *Cs at the Net level just
|
|
haven't done their part to strive for getting local gateways in
|
|
place in their Nets. It just doesn't seem fair to me to keep
|
|
relying on ONE gateway and the Backbone routing structure to handle
|
|
over 90% of the Zone's traffic, does it?
|
|
|
|
o People have been writing software which does NOT conform to
|
|
proper addressing specs which have severly impacted operations
|
|
of the gateway without even consulting me or even letting me
|
|
know that their programs exist.
|
|
|
|
o I find that I no longer have the time nor inclination to keep
|
|
supporting a gateway where folks continue to break the rules
|
|
of its use and bypass the controls.
|
|
FidoNet in general has taken this service for granted for far too
|
|
long. People seem to feel that Free use of Internet E-Mail is
|
|
something they get automatically when they are granted a Node Number
|
|
in FidoNet.
|
|
|
|
o The I.E.E.E., the organization who has been providing the resources
|
|
and bandwidth for the flow of all this traffic can no longer
|
|
support the endeavor.
|
|
|
|
Some services *will* CONTINUE to be provided ...
|
|
|
|
o The Domain-Name-Service, which tells the Internet world where to
|
|
send traffic for destinations within the .fidonet.org domain
|
|
(and which defines which addresses are 'valid') will continue
|
|
to be operated. However, the "default MX-record" which sent
|
|
all undefined traffic for those Nets which did not otherwise have
|
|
another gateway declared, will be DELETED!
|
|
|
|
o We will continue to operate the DNS until such time as the InterNIC
|
|
removes the .fidonet.org domain.
|
|
Since the InterNIC will expect and annual service fee of $50.00 for
|
|
the domain in March, it is possible that the .fidonet.org domain
|
|
may dissappear. I do not plan on paying this fee out of my own
|
|
pocket.
|
|
|
|
o We will continue to operate the gateway at 1:13/10 (our other
|
|
gateway address) on a REGISTERED-ONLY basis. This means that
|
|
there will be a process whereby INDIVIDUAL Zone-1 Nodes will be
|
|
able to Register to use the gateway and have an Internet address
|
|
assigned. Incoming E-Mail for all REGISTERED systems will be
|
|
packed on HOLD and must be picked up by direct Poll.
|
|
NOTHING will be routed via the Backbone (except Bounces back
|
|
to UNregistered Nodes).
|
|
(Please see instructions below for Registering to use 1:13/10)
|
|
|
|
|
|
How to Register to use the Gateway at 1:13/10
|
|
---------------------------------------------
|
|
|
|
To register your system to use the gateway services at 1:13/10,
|
|
simply send a File-Request for REGISTER to 1:13/10.
|
|
This will pass your Primary address into a function process that will
|
|
dynamically re-configure the related configuration files and routing
|
|
during the next hourly update process. After that, you should be able
|
|
to use the gateway and any E-Mail coming INbound from the Internet will
|
|
be packed on *HOLD* at 1:13/10 for your system to pickup.
|
|
|
|
Note that your system is assigned a special address, which is NOT
|
|
in the old 'f###.n###.z#.fidonet.org' syntax. Do NOT advertise
|
|
that address as it will NOT be valid.
|
|
|
|
Point systems may NOT register and may NOT use this gateway.
|
|
|
|
Burt Juda
|
|
Postmaster/Hostmaster
|
|
|
|
(Feel free to distribute this as widely as possible)
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 02 Dec 95 15:32:15
|
|
From: Jim Thomas <jthomas@sun.soci.niu.edu>
|
|
Subject: File 3--The "Space" of Cyberspace (fwd)
|
|
|
|
--- fwd message ---
|
|
|
|
Date--Tue, 28 Nov 1995 21:21:00 -0600
|
|
From--lemaitre monique j <tc0mjl1@corn.cso.niu.edu>
|
|
Subject--The "Space" of Cyberspace
|
|
|
|
This is a very long text, so you may want to press the "D" button (the
|
|
author's name and address appear at the end.) I thought it was
|
|
relevant to several themes which appeared briefly on the list such as
|
|
the "gender-lessness" of the NET...It also brought back echoes of
|
|
Gilles Deleuze whose untimely death a few weeks ago was never
|
|
mentioned on this list...Saludos!ML.
|
|
|
|
|
|
THE "SPACE" OF CYBERSPACE: Body Politics, Frontiers and Enclosures
|
|
|
|
The following comments were prompted by the reading of Laura Miller
|
|
"Women and Children First: Gender and the Settling of the Electronic
|
|
Frontier", one of the essays in James Brook and Iain A. Boal,
|
|
RESISTING THE VIRTUAL LIFE: The Culture and Politics of Information,
|
|
San Franciso: City Lights, 1995. Miller's essay is the first and only
|
|
one I have read after buying the book. I was drawn to it by the
|
|
circumstance that I have been revising an essay of my own on the
|
|
terrain of electronic communication in the Zapatista struggle for
|
|
autonomy and democracy. In my own writing I had used the metaphor of
|
|
the "frontier" and for that reason was curious about Miller's essay.
|
|
|
|
Miller's essay critiques the metaphor of "frontier" as part of a
|
|
discussion of how the assumption that traditional gender roles are
|
|
simply reproduced in cyberspace might help provide a rationale for
|
|
state regulation. Her point of departure is the word "frontier" in
|
|
the name of the "Electronic Frontier Foundation", a well-known
|
|
institution that argues for self-regulation and fights against
|
|
government interference in cyberspace. She makes two
|
|
arguments which interest me. First, she argues that the adoption of
|
|
the metaphor of "frontier" is a problematic extension of the
|
|
traditional American spacial concept to what is actually a non-spacial
|
|
phenomena: The Net. Second, she warns that applying traditional
|
|
American notions of the "frontier" --such as those embodied in
|
|
classical Western narratives-- risks an unconscious reproduction of
|
|
the social roles (gender) characteristic of those notions.
|
|
|
|
Spaceless cyberspace?
|
|
|
|
With respect to the first of these arguments, she writes: "The Net on
|
|
the other hand, occupies precisely no physical space (although the
|
|
computers and phone lines that make it possible do). It is a
|
|
completely bodiless, symbolic thing with no discernable boundaries or
|
|
location. . . . Unlike land, the Net was created by its pioneers." (p.
|
|
51) She also refers to the Net as "an artifact" (p. 51) and as
|
|
"incorporeal" (p. 57). While this concept of the Net fits in nicely
|
|
with the title of the book in which the essay appears (Resisting the
|
|
Virtual Life), the rest of her essay demonstrates how its formulation
|
|
misleads.
|
|
|
|
The problem with the characterization is that it treats the Net as if
|
|
it were a system of machines (computers and phone lines) whereas it
|
|
has only existed and only continues to exist in the communicative
|
|
actions of the humans who created and continue to recreate it. This
|
|
particular system of machines is just like any other system of
|
|
machines: a moment of human social relationships. While the machine
|
|
system is truly an "artifact so humanly constructed", the machine
|
|
system is not "the Net"; it is only the sinew or perhaps the nervous
|
|
system of a Net constituted by human interactions. As an evolving
|
|
series of human interactions the Net occupies precisely the space of
|
|
those participating human beings. Humans as corporeal beings always
|
|
occupy space and their personal and collective interactions structure
|
|
and restructure that space. One of the things that discussion of
|
|
cyberspace requires is a recognition of its "body politics"
|
|
--something Miller clearly understands in the later part of her essay
|
|
although she doesn't bring it to bear in this characterization of the
|
|
Net.
|
|
|
|
While arguing against the overstatement of women's vulnerability to
|
|
aggression on line, she points to important differences between
|
|
"cyber-rapists" and real rapists. "I see my body", she writes, "as the
|
|
site of my heightened vulnerability as a woman. But on line --where I
|
|
have no body and neither does anyone else-- I consider rape to be
|
|
impossible." But of course, she does have a body and when she is on
|
|
line her body is seated in front of a computer terminal, alone or in
|
|
company, comfortably or uncomfortably, with her fingers punching a
|
|
mouse button or banging on a keyboard, her eyes more or less glued to
|
|
the screen and her mind flickering back and forth from the images on
|
|
the screen to the rest of her physical existence. The very real
|
|
"corporality" not only of the Net but of all computer work has been
|
|
pointed out by all those concerned with the various ways in which the
|
|
use of computers has involved very real bodily harm. (This issue is
|
|
apparently treated in the same book in a separate essay by Dennis
|
|
Hayes on "Digital Palsy".) The most immediately salient aspect of
|
|
Miller's body's situation, however, is that it cannot be touched
|
|
physically by any would-be cyber-rapists --except through the
|
|
mediation of typed words and her reception of them, which she
|
|
considers ought to be and are in fact under her control. In her
|
|
vigorous argument that a great many women are quite able to hold their
|
|
own in "the rough and tumble of public discourse" --and that women who
|
|
can't should learn to-- she suggests ways in which women's activities
|
|
on the Net are actually "blurring" and thus overcoming crippling
|
|
gender divisions rather than reproducing them. Thus in the very midst
|
|
of her central argument about gender, Miller's argument implicitly
|
|
recognizes that the Net constitutes a set of interrelationships among
|
|
bodies, a mediated and relatively "safe" set, but a set of
|
|
relationships among bodies nevertheless.
|
|
|
|
Herein can be found one obvious source of the appeal of spacial
|
|
concepts such as cyber"space" or "frontier". In as much as the Net
|
|
only exists as active human interactions, humans necessarily
|
|
experience their activity on the Net in terms of their own sensual
|
|
activity (which only exists in space) interacting in a mediated way
|
|
with that of others. The immediate "space" of the Net is not even all
|
|
that hard to define. It consists of the local spaces of participation
|
|
in the Net and everything that connects them, not just the
|
|
telecommunications technologies but the interactions themselves. The
|
|
form of the interaction matters in understanding its character, its
|
|
advantages and limitations, but that is true in ALL forms of human
|
|
interaction as those who study them are well aware. Those local
|
|
spaces and even those connections can quite definitely be "locatable"
|
|
in time and space. The problem of "boundaries" appears only when we
|
|
begin to study the "space" of the Net as including not only those who
|
|
participate directly but those who participate indirectly: those
|
|
working in the computer and telecommunications industry, those
|
|
influencing or influenced by the participants of the Net, those
|
|
standing "outside" of it but worrying about it, commenting on it,
|
|
trying to ignore it, and so on. The treatment of the Net as
|
|
"incorporeal" just won't do. The complexity of the space which it
|
|
constitutes calls for analysis as well as body and social politics.
|
|
Miller knows this even if she doesn't like the spacial metaphors; her
|
|
essay is a form of participation in those social politics. I would
|
|
just argue that such metaphors ARE helpful. Like any metaphor they
|
|
have their limitations --which is why we use so many different ones.
|
|
But, by focusing our attention on many of the very real, quite
|
|
material aspects of the Net, they help us think about this new
|
|
fluctuating set of human activities, their interactions, dangers and
|
|
opportunities.
|
|
|
|
Frontiers
|
|
|
|
The second aspect of her argument, in which she critiques the
|
|
treatment of historical, geographical frontiers in American popular
|
|
culture, I read as essentially an argument about ideology. She wants
|
|
us to think about how the old Western frontier was perceived and
|
|
conceptualized in order to get us to think more deeply about the use
|
|
of the concept "frontier" vis a vis the Net. While I find her
|
|
critique a rich and useful one, I also think that beyond the issue of
|
|
ideological representations there is the question of other,
|
|
non-ideological, historical parallels between the Western frontier and
|
|
current "frontiers" in cyberspace.
|
|
|
|
Her first concern is the image of the frontier as space of freedom.
|
|
She writes "The frontier, as a realm of limitless possibilities and
|
|
few social controls, hovers, grail-like, in the American psyche, the
|
|
dream our national identity is based on, but a dream that's always,
|
|
somehow, just vanishing away. . . . For central to the idea of the
|
|
frontier is that it contains no (or very few) other people --fewer
|
|
than two per square mile according to the nineteeth-century historian
|
|
Frederick Turner. The freedom the frontier promises is a liberation
|
|
from the demands of society . . ." (pp. 50-51) She then goes on to
|
|
argue that the Net is so full of people that it "has nothing but
|
|
society to offer" (p. 51) and therefore the use of the concept of
|
|
frontier to talk about the Net is inappropriate.
|
|
|
|
The problem with this conceptualization is that it is a very
|
|
culturally biased misrepresentation of the Western frontier. It's not
|
|
that Turner was wrong about population density but that the
|
|
characterization ignores the social dynamics of the frontier. In the
|
|
first place, as Miller mentions, the frontier was a "frontier" only
|
|
for the European invaders; it was already inhabited by the indigenous
|
|
peoples of the Americas. Moreover, as historical works on their
|
|
cultures have made clear, the frontier was densely inhabited --given
|
|
the character of their ways of life. With hunting and gathering and
|
|
shifting agriculture much larger physical space is required on a per
|
|
capita basis than in human societies based on sedentary agriculture
|
|
and urbanized trade and industry. The view of the frontier as "empty"
|
|
space was definitely that of the invaders moving West out of an
|
|
increasingly urbanized capitalist society and was a view that either
|
|
failed to understand the indigenous culture or dismissed it as
|
|
invalid. If the indigenous would "sell" the land and move out quietly
|
|
the market would serve. More frequently, the armed might of the state
|
|
was used to drive them out.
|
|
|
|
Beyond this question of perspective (European versus indigenous), the
|
|
material underpinnings of the view of the frontier as an "empty" space
|
|
into which one can escape "from the demands of society" requires more
|
|
analysis than Miller gives it. It was more than an ideological
|
|
construct. It might be seen as expressing the views of individuals,
|
|
either anti-social or just adventurous, who did "go West" to escape
|
|
various "demands of society". For the individual trapper or hunter,
|
|
for instance, the land might well have appeared "empty". However, it
|
|
seems more likely that such lone wanderers frequently met and
|
|
interacted with the existing indigenous peoples and one of the
|
|
reccurrent themes of both history and myth is how they often crossed
|
|
over to participate in these very different cultures. This was
|
|
apparently as true of gauchos in the Argentine pampas as it was of
|
|
mountain men in North America. In colonial language, they "went
|
|
native". Even Hollywood has repeately woven this theme into its
|
|
cinemagraphic treatments of the frontier; a film like Dances with
|
|
Wolves being a recent example.
|
|
|
|
Setting aside this source of the view of the frontier as "emptiness",
|
|
we should recognize that the colonization of the frontier by invaders
|
|
from the East was very much a social process. The vast majority of
|
|
people who "went West" did so in groups --in families, in wagon
|
|
trains, by the boatload, or trainfull--with the object not only of
|
|
getting land, but of building and participating in new communities.
|
|
The totally isolated trapper or homesteading family was the exception,
|
|
not the rule. Even when farms or ranches were large, the local
|
|
neighbors and town formed a social context for family activity. After
|
|
the very first "settlers", the vast majority of those who colonized
|
|
"the frontier" took land immediately adjacent to that which was
|
|
already taken, not in the midst of some lost, pristine wilderness.
|
|
The classic Western narratives that Miller refers us to have often
|
|
portrayed just such sociality. The usual experience of the pioneer
|
|
colonizer of the West was not of "emptiness" but of collective
|
|
activity, of people working together to found new communities. When
|
|
Miller writes "Unlike real space, cyberspace must be shared.", she is
|
|
misrepresenting the reality of the frontier in which much of the
|
|
social dynamics of the Westward movement involved the sharing of
|
|
space, not with the indigenous for the most part, but among the
|
|
colonizers themselves.
|
|
|
|
More to the point, perhaps, with respect to the Western frontier as
|
|
with the electronic frontier, is the notion of "escaping" from the
|
|
"demands of society". When taken at a social rather than individual
|
|
level, the history of the European colonization of the West can be
|
|
seen to have involved a great deal of movement "away from" the
|
|
hardships, repression and exploitation of capitalism which emerged in
|
|
the Atlantic basin. American ideology celebrates escape from
|
|
religious persecution, but that was interwoven with other
|
|
persecutions.
|
|
|
|
A great many of those who "went West", whether across the ocean or
|
|
across the American continents, did so because their lands had been
|
|
stolen by others. That theft was accomlished to a considerable degree
|
|
through processes of "enclosure" of the land in which its one-time
|
|
inhabitants were driven out. This was part of what Marxists call
|
|
"primitive accumulation", i.e., the genesis of new class relations
|
|
based on excluding the possibility of self-determination for most
|
|
people so that they would be forced to prostitute themselves in the
|
|
emerging capitalist labor market. Others emmigrated because the new
|
|
conditions of both economic and political life in industrializing
|
|
European (and then American) cities were so hard. Low wages and awful
|
|
living conditions could drive families West for land. So too could
|
|
political repression, such as that which followed the 1848 revolutions
|
|
in Europe, lead people to seek elsewhere for better opportunities.
|
|
|
|
The "demands of society" which such immigrants were escaping were not
|
|
simply those of living together, but were the demands of an untamed
|
|
capitalism for their life energies under oppressive conditions which
|
|
often killed. This was part of the actual history of the "Western"
|
|
frontier, not just an ideologically constructed myth. The dream of
|
|
"limitless possibilities and few social controls" is certainly part of
|
|
the enduring myths of the "American psyche". But the myth endures
|
|
precisely because realization of the dream has demanded an open-ended
|
|
social situation for which generations have fought and struggled.
|
|
|
|
Although I have made no systematic study of the "classic Western
|
|
narratives" to which Millar alludes, it seems to me rather rare that
|
|
"the frontier is [portrayed as] a lawless society of men . . . [a]
|
|
romance of individualistic masculinity". With the affirmation that
|
|
Hollywood films and Western novels pay homage to "individualistic
|
|
masculinity", I would agree. On the other hand, I find it difficult
|
|
to think of films that deal purely with a "lawless society of men"
|
|
--with the possible exception of Sergio Leone's spagetti Westerns.
|
|
Even films like the Wild Bunch --in which the central group is both
|
|
lawless and masculine-- such activity is situated within a larger
|
|
social setting so that the Wild Bunch appear as pathological misfits.
|
|
Miller juxtaposes the "frontier" and "civilization", associating the
|
|
later with the arrival of women and children. But as indicated above,
|
|
for the most part men and women and children arrived together. The
|
|
"frontier" was the frontier OF civilization, its cutting edge, its
|
|
invading intrusion into other people's life spaces. I also find her
|
|
analysis of the portrayal of the gender dynamics of many Western
|
|
narratives quite accurate: the presentation of women and children as
|
|
victims or potential victims, needing to be protected (and dominated)
|
|
by men. But in describing and analysing these relationships, Miller
|
|
passes over to the analysis of social dynamics --especially between
|
|
men and women-- and leaves the whole issue of the "emptiness" of the
|
|
frontier behind.
|
|
|
|
In terms of thinking about the process of pushing out the "frontiers"
|
|
of cyberspacial civilization, I think the most important thing about
|
|
the parallel with the Western frontier is the central process of
|
|
creation. Miller notes that "Unlike land, the Net was created by its
|
|
pioneers." Yet, one of the appeals of the metaphor of the frontier is
|
|
just this myth --and reality-- of creation. In the case of the
|
|
Western frontier, no new piece of the earth was created whole cloth.
|
|
Those who went West because their own lands had been "enclosed" in the
|
|
East, imposed a new set of enclosures on the land of Native Americans.
|
|
Nevertheless, it was certainly true that from the point of view of the
|
|
colonizers, they created a "new land". They did this by transforming
|
|
the land from a state that supported hunting and gathering cultures to
|
|
one that supported sedentary agriculture and urbanization. The "land"
|
|
of capitalist civilization was not the same "land" as that of the
|
|
indigneous people. A plowed and fertilized field is not a prairie. A
|
|
town organized physically by fixed buildings is not a "camp" set up
|
|
for a season by a geographically mobile tribe. The social and
|
|
political life of fields and towns is clearly not the same as that of
|
|
indigenous cultures. For good or bad, not only a new kind of land was
|
|
created but also a new kind of society. The fact that this "creation"
|
|
amounted to a "destruction" from the point of view of the indigenous
|
|
doesn't wipe out the process of creation, it only critiques it.
|
|
|
|
"The frontier", Miller writes, "exists beyond the edge of settled or
|
|
owned land. As the land that doesn't belong to anybody (or to people
|
|
who 'don't count' like Native Americans), it is on the verge of being
|
|
acquired; currently unowned, but still ownable." This view of the
|
|
frontier, which I take to be an aspect of "frontier" ideology to which
|
|
Miller points (rather than her own point of view), clearly embodies a
|
|
capitalist perspective not only on land but on society. Not only is
|
|
it well known that many indigenous peoples had no notion of "owning"
|
|
land, but the assertion of "ownership" by colonizers was one of those
|
|
aspects of the frontier that made it the cutting edge of capitalist
|
|
civilization. In the few cases where the new arrivals accepted the
|
|
indigenous culture's value systems and merely exercised usufruct of
|
|
the land, they were examples of "going native" and could hardly be
|
|
considered part of the advancing Western capitalist civilization.
|
|
There were also utopian communities created quite intentionally as
|
|
something different, hopefully better, than the repressive capitalism
|
|
from which their founders had fled. But these were exceptions,
|
|
precisely because "going West" was a social process in which people
|
|
brought the acquired habits and institutions of their past with them.
|
|
|
|
However much they may have been fleeing adverse material conditions,
|
|
those same conditions tended to catch up with them all too quickly
|
|
--precisely because they carried the germs of those conditions with
|
|
them, especially "ownership". The early pioneers of the Western
|
|
frontier sought their own freedom in land enclosed from the
|
|
indigenous. But when they took and then claimed ownership rights they
|
|
instituted a property system in the frontier that would eventually
|
|
overwhelm them. In a few years, or a few generations at most, their
|
|
ownership would be lost to other owners. Powerful railroad or mining
|
|
interests would drive them out or buy them out and usurp their
|
|
property in land, or bankers and suppliers would take advantage of
|
|
their debts during economic downturns, foreclose, evict them and seize
|
|
their lands. Close on the heels of the pioneers of the frontier was
|
|
the same class of lords of property from whom they had fled.
|
|
|
|
The same was true of the frontier artisans and merchants who helped to
|
|
build the towns and set up businesses there. Libertarians often
|
|
celebrate such "entrepreneurs" just as they sometimes lament the
|
|
arrival of monopolistic corporations that absorb or drive such
|
|
entrepreneurs out of business. But as with the farmers who staked
|
|
property claims in land, such independent businessmen and women
|
|
carried with them the seeds of their own downfall. For the
|
|
"entrepreneur", whether on the Western frontier or the electronic
|
|
frontier is caught in a double bind. On the one hand, they may be
|
|
dedicated and inventive workers plying their skills to create
|
|
something new, whether a 19th Century blacksmithy or a late 20th
|
|
Century software operation. But if they seek their independence
|
|
within the framework of the rules of "private property", they are
|
|
forced to work within the logic of the market. While a few may
|
|
survive to become powerful capitalists in their own right, most have
|
|
been and will continue to fall before the workings of those rules and
|
|
that logic --according to which the stronger capitalist drives out or
|
|
takes over the weaker. The thoroughly modern version of enclosure is
|
|
the expropriation of businesses by businesses. Moreover, whether they
|
|
succeed or fail, all who play by the rules lose their autonomy as each
|
|
"frontier" is reduced to just another integrated section of the
|
|
invading capitalist economy.
|
|
|
|
This fundamental dynamic of the old West demonstrates one reason why
|
|
the metaphor of the "frontier" is useful, even indispensible, for
|
|
thinking about the socio-political dynamics of the Net and the rest of
|
|
the informational society. The metaphor has been widely used vis a
|
|
vis the Net not only because people, working sometimes alone but
|
|
always within a social fabric of interconnections, have created and
|
|
settled new electronic spaces but also because hard on their heels
|
|
have come the lords of capital using all means possible to takeover,
|
|
incorporate and valorize those spaces. The subordination of the Net
|
|
to commercial and industrial profit has become the name of the game.
|
|
The "dream" of "limitless possibilities and few social controls"
|
|
doesn't just "somehow", "vanish away"; it has been repeatedly
|
|
destroyed through corporate enclosure and complementary state
|
|
repression.
|
|
|
|
But just as pioneers on the Western frontier resisted the enclosure of
|
|
their lands or the takeover of their small businesses by corporate
|
|
interests, so too do the pioneers of cyberspace resist the
|
|
commercialization of the Net. Like other free spirits (e.g., some
|
|
musicians and artists) the pioneers of cyberspace can create new
|
|
spaces for their own (very social) purposes (pleasure, politics, etc)
|
|
as part of a process of self-valorization that at least initially
|
|
threatens or transcends existing norms of capitalist society.
|
|
Corporate capital then tries either to enclose their spaces by
|
|
commercializing them if they look profitable, or to crush them with
|
|
the state if they look dangerous. (If it just ignores them we can
|
|
conclude either that their space is not profitable or that it is not
|
|
dangerous to the capitalist game. Indeed, it may be playing a useful
|
|
role --such as keeping workers off the streets and the market
|
|
growing-- in ways compatible with the social logic of capitalist
|
|
society.)
|
|
|
|
One increasingly important zone on the electronic frontier has been
|
|
that of the circulation of political struggles of various groups and
|
|
movements fighting against exploitation and for new ways of being.
|
|
These sub-spaces provide opportunities not only for the
|
|
experimentation with alternatives to current institutions but also for
|
|
attacking the larger capitalist system.
|
|
|
|
One such group is the Zapatista Army of National Liberation whose
|
|
uprising began in the mountains of Chiapas, the southernmost state of
|
|
Mexico, but whose political message has spread around the globe
|
|
through the electronic circulation of information. E-mail, soon
|
|
complemented by gopher and web sites, both produced and then linked a
|
|
highly effective international mobilization in support of the
|
|
Zapatistas and against the Mexican government's attempts to belittle
|
|
and attack them.
|
|
|
|
When, in the wake of the peso crisis in December 1994, the Zapatistas
|
|
were seen as threatening the interests of international investors in
|
|
Mexico, some (e.g., Chase Manhattan Bank) called for their
|
|
"elimination". The Mexican government, in point of fact, ordered an
|
|
army force of 50,000 to invade Zapatista territory in Chiapas and wipe
|
|
out the uprising. (It failed.) Others in the circuit of investment
|
|
capital sought to tap the flow of information among the networks of
|
|
solidarity for their own purposes. They sought out individuals within
|
|
the Net who were involved in producing and circulating that
|
|
information and offered them lots of money to redirect those flows to
|
|
corporate investors who would pay for the "inside scoop" about the
|
|
investment climate in Mexico and points South. The offers were
|
|
refused so this autonomous "frontier" of resistance and discussion of
|
|
the Zapatista alternative continues. Had those approached sold out,
|
|
the autonomy of the activity would have become illusory as little by
|
|
little the information being circulated became more geared to what
|
|
investors need to know and less to what is needed to struggle against
|
|
them.
|
|
|
|
The metaphor of the frontier allows us to understand this dynamic in a
|
|
way that appreciates both the energy and imagination of the pioneers
|
|
and the dangers which beset them. Criticizing the comparison of the
|
|
clipper chip (which would give government the ability to eavesdrop on
|
|
all encrypted computer communications) with the imposition of barbed
|
|
wire on the prairie, Miller suggests that the metaphor implies a
|
|
necessary surrender to fate. But the metaphor survives such critique
|
|
because it evokes not surrender but resistance. No matter how many
|
|
frontiers have been taken over and subordinated, no matter how many
|
|
pioneers have been forced or induced to surrendering their freedom,
|
|
the metaphor lives on. It survives not just because ideology
|
|
preserves the myth but because the dream lives and the struggle lives.
|
|
Each time some new space and time of human endeavor is colonized and
|
|
taken over by the work/profit logic of capital, there are always
|
|
people who break away and create new spaces and new times where they
|
|
can be freer to elaborate their own lives in the manner they see fit.
|
|
The ability of capital to enclose (commercialize) or crush those new
|
|
spaces is never assured. The consequences of each such confrontation
|
|
remain open. And in a period in which there are an extraordinarily
|
|
large number of breakaways and a multiplicity of acts of creation, the
|
|
threat to the survival of the system grows and the potential to
|
|
realize an array of alternatives is great. That is the excitment of
|
|
any frontier and that is the reason the metaphor survives.
|
|
|
|
Harry Cleaver
|
|
Austin,Texas
|
|
hmcleave@eco.utexas.edu
|
|
http://www.eco.utexas.edu:80/Homepages/Faculty/Cleaver/index.html
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 28 Dec 1995 11:10:58 -0500
|
|
From: Galkin@AOL.COM
|
|
Subject: File 4--Privacy in the Workplace
|
|
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
THE COMPUTER LAW REPORT
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
December 28, 1995 [#15]
|
|
|
|
=====================================
|
|
GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
|
|
free and is prepared by William S. Galkin, Esq. The Report is designed
|
|
specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
|
|
All information contained in The Computer Law Report is for the benefit of
|
|
the recipients, and should not be relied on or considered as legal advice.
|
|
Copyright 1995 by William S. Galkin.
|
|
=====================================
|
|
ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
|
|
Mills, Maryland (which is a suburb of Baltimore). He has been an adjunct
|
|
professor of Computer Law at the University of Maryland School of Law and has
|
|
concentrated his private practice in the Computer Law area since 1986. He
|
|
represents small startup, midsized and large companies, across the U.S. and
|
|
internationally, dealing with a wide range of legal issues associated with
|
|
computers and technology, such as developing, marketing and protecting
|
|
software, purchasing and selling complex computer systems, and launching and
|
|
operating a variety of online business ventures. He also enjoys writing about
|
|
computer law issues!
|
|
|
|
===> Mr. Galkin is available for consultation with individuals and companies,
|
|
wherever located, and can be reached as follows: E-MAIL:
|
|
galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
|
|
Circle, Suite 400, Owings Mills, Maryland 21117. Articles in The Report are
|
|
available to be published as columns in both print and electronic
|
|
publications. Please contact Mr. Galkin for the terms of such usage.
|
|
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
|
|
*^*^ THIS WEEK'S SPONSOR *^*^
|
|
|
|
This week's sponsor is Challenge Press, publisher of the soon to be released
|
|
"INTERNET CHALLENGE GUIDE TO COPYRIGHTS." This publication provides
|
|
well-organized and detailed information essential for people either doing or
|
|
thinking about doing business online, or who are advising or assisting others
|
|
concerning doing business online. The price is only $45 plus $3.50 handling
|
|
and shipping (in the U.S.). Reserve your copy now by calling Challenge Press
|
|
at (800) 963-5297 or by sending e-mail to ChallengeP@aol.com, or by mail at
|
|
P.O. Box 20862, Baltimore, MD 21209.
|
|
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
|
|
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
ELECTRONIC PRIVACY RIGHTS: THE WORKPLACE
|
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
|
|
|
[This is the second of a series of articles discussing privacy rights in the
|
|
digital age.]
|
|
|
|
With the rise of technology there arose a fear of surveillance. However,
|
|
George Orwell's 1984 passed us by without noticeable big brother control, and
|
|
the national concern over espionage diminished with the demise of the
|
|
U.S.S.R.
|
|
|
|
These past threats were concerns over the use of technology by governments
|
|
that had sufficient resources to use the technology for sinister purposes.
|
|
The new threat is not technology in the hands of government, it is technology
|
|
alone. What once required massive manpower, now requires merely a personal
|
|
computer. Technology has made the power to monitor others widely available,
|
|
whether to governments, private enterprise or individuals. This article
|
|
discusses some of the laws applicable to the monitoring of employees in the
|
|
private workplace.
|
|
|
|
An employee, by the very nature of the employment relationship, must be
|
|
subject to some level of monitoring by the employer. However, this monitoring
|
|
has limits. Courts have held that it is a tortuous invasion of privacy for
|
|
an employer to monitor employee telephone conversions. Similarly, mail
|
|
carried through the U.S. postal service is granted a high level of
|
|
protection.
|
|
|
|
However, much employee communication now takes place over private and public
|
|
networks via e-mail, or voice mail. These forms of communication are very
|
|
different from telephone calls and letters. For example, after transmission
|
|
and receipt, these communications are stored for an indefinite period of time
|
|
on equipment under the exclusive control of the employer. Additionally, these
|
|
communications can be examined without the knowledge of the communicators. As
|
|
is often the case, the law has difficulty keeping pace with the issues raised
|
|
by fast changing technology.
|
|
|
|
Electronic Communications Privacy Act -
|
|
|
|
In the federal sphere, only the Electronic Communications Privacy Act of 1986
|
|
(ECPA) directly prohibits the interception of e-mail transmissions. The ECPA
|
|
prohibits the interception by (1) unauthorized individuals or (2) individuals
|
|
working for a government entity, acting without a proper warrant. The ECPA is
|
|
mostly concerned with the unauthorized access by employees or corporate
|
|
competitors trying to find out valuable information. However, while there is
|
|
no specific prohibition in the ECPA for an employer to monitor the e-mail of
|
|
employees, the ECPA does not specifically exempt employers.
|
|
|
|
The ECPA has several exceptions to the application of the prohibition of
|
|
interception of electronic communications. The three most relevant to the
|
|
workplace are (1) where one party consents, (2) where the provider of the
|
|
communication service can monitor communications, and (3) where the
|
|
monitoring is done in the ordinary course of business.
|
|
|
|
The first exception, consent, can be implied or actual. Several courts have
|
|
placed a fairly high standard for establishing implied consent. For example
|
|
one court held that "knowledge of the capability of monitoring alone cannot
|
|
be considered implied consent." Accordingly, for an employer to ensure the
|
|
presence of actual consent, it should prepare, with advice of counsel, a
|
|
carefully worded e-mail Policy Statement which explains the scope of employer
|
|
monitoring. This Policy Statement should be signed by the employees. One
|
|
example of how this Policy Statement needs to be carefully written is that if
|
|
it states that personal communications will be monitored only to determine
|
|
whether there is business content in the communications, then this would
|
|
probably not amount to consent to review the full text of personal
|
|
communications. Additionally, notice that communications might be monitored
|
|
may have a significantly different legal affect than a notice stating that
|
|
communications will be monitored.
|
|
|
|
The second exemption is that the ECPA exempts from liability the person or
|
|
entity providing the communication service. Where this service is provided by
|
|
the employer, the ECPA has been interpreted as permitting the employers broad
|
|
discretion to read and disclose the contents of e-mail communications,
|
|
without the employee's consent. However, employers should not rely on this
|
|
exception, because it might not apply in all cases, such as to incoming (as
|
|
opposed to internal e-mail) if the e-mail service is provided by a common
|
|
carrier (e.g., America Online or MCI mail, which are not provided by the
|
|
employer).
|
|
|
|
Under the third exception, courts will analyze whether the content of the
|
|
interception was business or personal and allow the interception of only
|
|
business-content communications.
|
|
|
|
State laws -
|
|
|
|
State tort laws are often viewed as the primary sources of protection for
|
|
privacy of electronic communications. The most common tort that would apply
|
|
is the tort of invasion of privacy. This tort occurs where "one who
|
|
intentionally intrudes, physically or otherwise, upon the solitude or
|
|
seclusion of another or his private affairs or concerns, is subject to
|
|
liability to the other for invasion of his privacy, if the intrusion would be
|
|
highly offensive to a reasonable person."
|
|
|
|
This tort does not require that personal information be actually acquired,
|
|
disclosed or used. However, the intrusion must be intentional and highly
|
|
offensive to a reasonable person. Additionally, there must be a reasonable
|
|
expectation of privacy by the employee.
|
|
|
|
Employees often believe that their communications are private because they
|
|
have a password which they can select and change independently or because
|
|
they are communicating through outside common carriers. Cases have often
|
|
turned upon whether this belief was reasonable given the fact that the
|
|
employer had the ability all along to access the files, though the employees
|
|
were not aware of this. In determining the outcome, courts will weigh the
|
|
reasonableness of the employee's expectation of privacy against the business
|
|
interest of the employer in monitoring the communication. However, it is
|
|
important to emphasize that in the final analysis courts have traditionally
|
|
held that legitimate business interests permit employers to intercept
|
|
communications.
|
|
|
|
Additionally, state constitutions might provide some protection. A number of
|
|
state constitutions provide a specific right of privacy. But, only California
|
|
has specifically determined that its constitution provides a cause of action
|
|
against nongovernmental entities. However, even in California, the courts
|
|
will give significant weight to the business interests of the employer.
|
|
|
|
Conclusion -
|
|
|
|
As discussed, much of the law of privacy in the workplace turns on the
|
|
reasonable expectation of privacy. When evaluating different situations, it
|
|
is important to keep in mind that the law in this area is a moving target, as
|
|
recently expressed by Professor David Post of Georgetown University Law
|
|
Center (in The American Lawyer, October 1995) "until we have all spent more
|
|
time in this new electronic environment, who can say what our expectations
|
|
really are --let alone whether they are reasonable?"
|
|
|
|
In the workplace, federal and state laws provide some protection to employee
|
|
communications. However, this protection is quite limited. Until the law
|
|
develops further, employers should prepare carefully drafted Policy
|
|
Statements that explain how the employer intends to monitor employee
|
|
communications. And employees, even in the absence of such Policy Statements,
|
|
would be well advised to consider their communications available and
|
|
accessible to the employer. Also, where privacy is an issue, employees and
|
|
employers can create a more productive work environment if they work together
|
|
to jointly develop a Policy Statement that balances the legitimate interests
|
|
of both the employer and the employees.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 16 Dec 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.09
|
|
************************************
|
|
|