895 lines
39 KiB
Plaintext
895 lines
39 KiB
Plaintext
|
|
Computer underground Digest Wed May 22, 1996 Volume 8 : Issue 38
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.38 (Wed, May 22, 1996)
|
|
|
|
File 1-- FBI Releases Digital Telephony Wiretap Report
|
|
File 2--CyberAngels Mission Statement and C.o.C (fwd)
|
|
File 3--ACLU: GA Prohibits Web Links?
|
|
File 4--Rough Draft: Guide for Organizing Online
|
|
File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-)
|
|
File 6--Job Position for Manager of Network Services
|
|
File 7--Dutch Internet Hotline agains Child Pornography online (fwd)
|
|
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 21 May 1996 16:02:49 -0500
|
|
From: "David Sobel" <sobel@EPIC.ORG>
|
|
Subject: File 1-- FBI Releases Digital Telephony Wiretap Report
|
|
|
|
Volume 3.10 May 21, 1996
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
================================================================
|
|
|
|
The Federal Bureau of Investigation has finally released its
|
|
long-overdue report on implementation on the controversial "digital
|
|
telephony" wiretap statute. The report, which the FBI was legally
|
|
required to release by November 30, 1995, was transmitted to Congress
|
|
on April 11, 1996. EPIC had made several congressional inquiries
|
|
concerning the FBI's failure to comply with the statutory reporting
|
|
requirement.
|
|
|
|
The bottom line: the digital telephony program is broke, which may
|
|
explain the Bureau's tardiness in issuing the report. When Congress
|
|
enacted the Communications Assistance to Law Enforcement Act (CALEA)
|
|
in late 1994, it authorized $500 million to reimburse
|
|
telecommunications carriers for the cost of retro-fitting their
|
|
networks to facilitate electronic surveillance. Since that time, EPIC
|
|
has led an effort to block the actual appropriation of those funds.
|
|
To date, Congress has declined to make the money available. As the FBI
|
|
report notes,
|
|
|
|
No funding was appropriated in Fiscal Year 1995 for
|
|
CALEA; therefore, no payments were made to telecommuni-
|
|
cations carriers during the period October 1, 1994,
|
|
through September 30, 1995 ...
|
|
|
|
To date, no funding has been appropriated for Fiscal
|
|
Year 1996 for payments to telecommunications carriers. ...
|
|
|
|
Major switch manufacturers, upon whom telecommunications
|
|
carriers must rely for most required technological
|
|
solutions, have advised the FBI that timely development
|
|
of interception features is technically feasible; however,
|
|
the development and deployment of such features are
|
|
directly dependent upon the availability of funding if
|
|
the statutory deadlines are to be met.
|
|
|
|
The wiretap budget battle will continue. The FBI is still trying to
|
|
gain approval of $100 million for FY 1996, "to be generated through a
|
|
surcharge on civil fines and penalties." The report also notes that
|
|
"the President's Fiscal Year 1997 budget request proposes $100 million
|
|
in funding for telephone carrier compliance through a direct
|
|
appropriation."
|
|
|
|
More information on digital telephony and wiretapping is available at:
|
|
|
|
http://www.epic.org/privacy/wiretap/
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 May 1996 16:17:55 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 2--CyberAngels Mission Statement and C.o.C (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Sun, 19 May 1996 00:39:11 -0700
|
|
From--CyberAngels Director --Colin Gabriel Hatcher <angels@wavenet.com>
|
|
To--angels@wavenet.com
|
|
Subject--CyberAngels Mission Statement and C.o.C
|
|
|
|
CYBERANGELS MISSION STATEMENT
|
|
v.2.0, May 1, 1996
|
|
written by Colin Gabriel Hatcher, CyberAngels Director
|
|
|
|
CyberAngels an all-volunteer Internet safety patrol and monitoring project
|
|
started in June of 1995 by senior members of the world famous crime
|
|
prevention organization, The International Alliance of Guardian Angels.
|
|
|
|
CyberAngels membership unites more than 1000 users worldwide in 30
|
|
countries, sharing a common mission: to be a Cyberspace Neighborhood Watch
|
|
and to fight Internet crime.
|
|
|
|
By being role models for self-regulation and responsibility, we are working
|
|
hard to make the Internet a safer and more enjoyable place to work and
|
|
play.
|
|
|
|
We are dedicated to:
|
|
|
|
FIGHTING CRIME ON THE INTERNET
|
|
in particular criminal activity where there are clear victims and/or
|
|
at-risk users.
|
|
|
|
PROTECTING OUR CHILDREN FROM ONLINE CRIMINAL ABUSE
|
|
by fighting against the trade in child pornography and by working to deter
|
|
sexual predators online.
|
|
|
|
|
|
SUPPORTING AND ADVISING ONLINE VICTIMS
|
|
of hate mail, harassment, and sexual abuse by referring them to
|
|
professional assistance, and helping guide them through the complaints and
|
|
reporting processes.
|
|
|
|
|
|
PROMOTING, PRESERVING, PROTECTING NETIQUETTE
|
|
Netiquette is the collection of common rules of polite conduct that govern
|
|
our use of the Internet. We believe in courtesy and respect for others. We
|
|
support Internet Service Providers (ISPs) who have clearly defined Terms Of
|
|
Service (TOS) for their users, and who are prepared and willing to enforce
|
|
that TOS.
|
|
|
|
HELPING PRESERVE INTERNET FREEDOM OF SPEECH
|
|
by showing global governments that the citizens of the Internet Community
|
|
are prepared and willing to take both the responsibility and the actions
|
|
necessary to preserve their online personal safety, and in particular, the
|
|
online safety of their children.
|
|
|
|
|
|
CYBERANGELS CODES OF CONDUCT
|
|
v.1.0, May 18, 1996
|
|
written by Colin Gabriel Hatcher, CyberAngels Director
|
|
|
|
1) CyberAngels should not flame, neither in email nor in newsgroups.
|
|
|
|
2) At all times CyberAngels understand that they speak and act only for
|
|
themselves and are fully responsible for their words and actions.
|
|
|
|
3) The CyberAngels Organization will acknowledge and defend you only if you
|
|
act in accordance with our Mission Statement and with our Codes of Conduct.
|
|
|
|
4) CyberAngels should not use anonymous or pseudo-anonymous remailers to
|
|
communicate with ISPs, Federal authorities or Law Enforcement, as the use
|
|
of anonymity in these cases will undermine the credibility of your
|
|
complaint or report.
|
|
|
|
5) CyberAngels should be courteous and respectful in their communications
|
|
with others.
|
|
|
|
6) CyberAngels should phrase all complaints and reports as questions.
|
|
Remember you are neither judge, jury nor executioner - you are a witness to
|
|
a suspect and a possible crime.
|
|
|
|
7) CyberAngels should be capable of telling the difference between material
|
|
or activity that may be crime evidence and material or activity that
|
|
personally offends their morals or beliefs.
|
|
|
|
8) CyberAngels should always observe the Netiquette of whatever group or
|
|
channel they are in.
|
|
|
|
9) CyberAngels should not spam replies, opinions or information.
|
|
|
|
10) CyberAngels should never use any form of electronic harassment, e.g.,
|
|
mail-bombs, virii, spoofing mail headers, spamming etc.
|
|
|
|
11) CyberAngels should avoid humiliating suspects either in public or in
|
|
private. Gloating over their impending arrest or taunting them with the
|
|
Feds is unacceptable conduct.
|
|
|
|
12) All suspects are innocent until proven guilty.
|
|
|
|
13) All complaints and reports sent in to authorities by CyberAngels should
|
|
maintain privacy and confidentiality. Reports are the business of the
|
|
CyberAngel, the receiving authority and the CyberAngels Organization.
|
|
|
|
14) Remember:
|
|
a) Headers can be spoofed (forged) on email and on Usenet postings.
|
|
b) In live channels the user you are dealing with may not be the account
|
|
holder of the access account.
|
|
c) Impersonation is common in IRC / Live Chat
|
|
d) Without crime evidence, it is just your opinion.
|
|
e) Just because you don't like something, that doesn't make it criminal.
|
|
|
|
15) Sting operations (e.g. when you work undercover, masquerading as a
|
|
pedophile in order to gather crime evidence) may obtain you crime evidence,
|
|
but that evidence may later be ruled inadmissible in court, on the grounds
|
|
that it was obtained by unlawful means. Study your country's / state's
|
|
laws carefully on this matter, or contact your local law enforcement to
|
|
discuss this.
|
|
|
|
16) No CyberAngel should offer child pornography images to trade, even if
|
|
the purpose is to gather more crime evidence.
|
|
|
|
17) Received graphic files should be viewed before forwarding them to
|
|
appropriate Internet Administration (e.g. the sender's Internet Service
|
|
Provider) or Law Enforcement (e.g. US Customs or FBI). CyberAngels
|
|
checking graphic files should follow the procedure below:
|
|
a) Download and decode file to a floppy disk.
|
|
b) View file and confirm your suspicions.
|
|
c) Forward original file to relevant authorities.
|
|
d) Reformat your floppy disk to permanently erase all trace of the
|
|
downloaded file.
|
|
|
|
If you are downloading to a Hard Drive, then after deleting the file you
|
|
should erase your Hard Drive's free space, or reformat free space, so as to
|
|
make the file unrecoverable.
|
|
|
|
18) CyberAngels should avoid storing archives of child pornography in any
|
|
format whatsoever. If you store this material you run the risk of being
|
|
accused of collecting it for your own personal use.
|
|
|
|
19) A CyberAngel may identify themselves publicly only if they support our
|
|
Mission Statement and follow our Codes of Conduct.
|
|
|
|
20) In live channels like IRC or in the Live Chat areas of the big in-house
|
|
providers like AOL, Compuserve and Prodigy, CyberAngels have the following
|
|
2 options when entering a channel:
|
|
a) Identify yourself as a CyberAngel on patrol immediately.
|
|
b) Say nothing about your being a CyberAngel.
|
|
|
|
a) Identify yourself as a CyberAngel on patrol immediately.
|
|
Advantage: everyone on the channel knows you are available to assist if
|
|
there is a problem. Also you will act as an effective visual deterrent if
|
|
a crime is about to take place.
|
|
Disadvantage: In IRC if the Channel Op is hostile, then you will be
|
|
immediately kicked off the channel. Also criminal activity will move
|
|
somewhere else away from your eyes, so you will be unable to witness
|
|
criminal activity. Also, once your userid becomes known, you will be
|
|
unable to operate anonymously in the future.
|
|
b) Say nothing about your being a CyberAngel.
|
|
Advantage: Criminal activity is more likely to take place if no one knows
|
|
what you are doing, therefore your ability to gather crime evidence will be
|
|
enhanced.
|
|
Disadvantage: Since no one knows who you are, no one can identify you
|
|
immediately as someone offering assistance. Also CyberAngels gets no
|
|
visibility if all its patrolling members are anonymous.
|
|
|
|
21) If suspected criminal activity, like child pornography trading, is
|
|
observed in a live channel, CyberAngels have 4 options:
|
|
a) Immediately identify yourself as a CyberAngel and ask the person to desist.
|
|
b) Immediately notify an online channel guardian / sysop / host / guide to
|
|
come and deal with the problem
|
|
c) Remain silent and gather information / evidence, without requesting it,
|
|
to report later to relevant authority.
|
|
d) Participate in the activity, and masquerade as a pedophile, so as to
|
|
infiltrate the operation.
|
|
|
|
a) Immediately identify yourself as a CyberAngel and ask the person
|
|
politely to desist.
|
|
Advantage: You will rid the channel immediately of the problem. Also you
|
|
will let others in the channel know you are there to help if needed.
|
|
Disadvantage: Criminal activity will move and continue in a secret or
|
|
private channel. In IRC you may even be kicked off the channel.
|
|
b) Immediately notify an online channel guardian / sysop / host / guide to
|
|
come and deal with the problem
|
|
Advantage: Summoning the online administrators of a live area is always a
|
|
good idea if you have a problem.
|
|
Disadvantage: none.
|
|
c) Remain silent and gather information / evidence, without requesting it,
|
|
to report later to relevant authority.
|
|
Advantage: You may get placed on a trading list of users on the channel as
|
|
pictures are often spammed out, even if you don't personally request any,
|
|
thus you will obtain crime evidence as other users trade in return and
|
|
reply to all. This method of obtaining material is less likely to be ruled
|
|
inadmissible later in court, as it was not unlawfully requested. You also
|
|
avoid flames and hate mail and other harassment that may follow a public
|
|
bust.
|
|
Disadvantage: You may be mistaken for a pedophile yourself.
|
|
d) Participate in the activity, and masquerade as a pedophile, so as to
|
|
infiltrate the operation.
|
|
Advantage: You can gain a lot of crime evidence and understanding of the
|
|
operation if you infiltrate it.
|
|
Disadvantage: You may be mistaken for a pedophile yourself. Also your
|
|
evidence may be ruled inadmissible later in court.
|
|
|
|
22) All CyberAngels should keep logs of their activities, detailing logon
|
|
and logoff times, channels / URLs / sites visited, with time of arrival and
|
|
departure from sites, logs of suspicious conversations, postings and
|
|
records of what, if any, actions were taken. CyberAngels may store headers
|
|
from postings as reference, but should avoid storing graphic files that may
|
|
be criminal to possess.
|
|
|
|
23) Copies of correspondence with all Authorities, relevant Usenet postings
|
|
or email, should all be cc'd to angels@wavenet.com.
|
|
|
|
24) How does a CyberAngel decide what material or activity to complain about?
|
|
|
|
When on patrol you should consider the following responses to material or
|
|
activity that you witness:
|
|
a) Harm
|
|
b) Fear
|
|
c) Distress
|
|
d) Inconvenience
|
|
e) Offense
|
|
f) Concern
|
|
|
|
These categories give you a ladder of responses to what you are finding.
|
|
You may choose to complain about / report *anything* that causes you or
|
|
others Harm, Fear, Distress, Inconvenience, Offense or Concern, regardless
|
|
of whether it is criminal or not. The right to question what you see and
|
|
to bring it to the attention of the proper authorities is your civil, legal
|
|
and human right. In the USA this is Constitutionally protected.
|
|
|
|
These are subjective judgments, based on the way you personally feel about
|
|
what you see, or what happens to you. The fact that they are subjective in
|
|
no way invalidates them. You have a right to your response.
|
|
|
|
a) Harm - Harm is something that hurts you or another. On the Net it is
|
|
not possible to physically harm someone, but you may still be a witness to
|
|
harm. In the case of child pornography you are witnessing a record of harm
|
|
done to a child when the picture was taken. A child has been sexually
|
|
abused for the gratification of adults. So if you witness child
|
|
pornography you are witness to a record of actual bodily harm - sexual
|
|
abuse or child abuse.
|
|
|
|
b) Fear - Fear means that you are witness to something that frightens you,
|
|
that is puts you in fear for your physical or mental well-being. You may
|
|
receive a death threat by email from someone who has located your home
|
|
address; you may become aware of a child arranging a liaison with an adult
|
|
online, and giving that adult personal information like the child's
|
|
telephone number. You may fear that something will happen in the future.
|
|
|
|
c) Distress - Hate mail causes distress. Distress means anything that
|
|
makes you feel upset, e.g., makes you cry or feel like crying. A 13 year
|
|
old Korean girl not long ago committed suicide as a result of hatred and
|
|
abuse directed at her in IRC. Clearly she was distressed by what had
|
|
happened to her online.
|
|
|
|
d) Inconvenience - Inconvenience means your life is disrupted by some
|
|
outside cause. All forms of electronic harassment cause inconvenience:
|
|
having your account terminated for no reason, receiving a mail bomb or a
|
|
virus, or having your mailbox filling up with spam. The emotion that goes
|
|
with inconvenience is usually anger.
|
|
|
|
e) Offense - There are plenty of things that you might come across on the
|
|
Net that you may find offensive. With offense comes anger and outrage.
|
|
Many people find all forms of pornography offensive, or some of the more
|
|
bad taste newsgroups, or even someone's foul language. Christians find
|
|
Satanists offensive, and vice versa. Offensive activity is more of a
|
|
personal issue for you and your conscience, since it is very hard to
|
|
objectively define "offensive".
|
|
|
|
f) Concern - Concern is not usually the product of anger or distress.
|
|
Concern means that you are worried about something, e.g. the easy access
|
|
children have to pornography on the Net. If something concerns you, you
|
|
should feel that you have a right to express your concern.
|
|
|
|
The right and the choice to complain is yours. CyberAngels should aim to
|
|
complain to the appropriate place. It is inappropriate for example to
|
|
complain to the FBI because you are offended by someone cursing online.
|
|
But you have every right to complain a) to the abuser and b) to the
|
|
abuser's service provider. You might even choose to write a letter to your
|
|
Senator or Congressperson, expressing your feelings about rudeness and foul
|
|
language on the Net. The point is that you seek appropriate ways to
|
|
express your feelings.
|
|
|
|
25) Whether any of the above categories are criminal in nature can not be
|
|
decided by a CyberAngel, nor even by the Police. The determination of
|
|
guilt or innocence can only be made by a court of law. This should be
|
|
borne in mind when you are considering what to do and who to contact. Even
|
|
if you have a good working knowledge of the relevant laws, and CyberAngels
|
|
should educate themselves in this area, you are still not qualified to
|
|
decide guilt or innocence.
|
|
|
|
26) If you decide to take a matter further, a CyberAngel should phrase a
|
|
letter of complaint in the first person. It is far better to say "I
|
|
believe this to be criminal" than to say "This is criminal". "I am
|
|
offended" is better than "This is offensive". Own your own words.
|
|
|
|
27) The main focus of CyberAngel activity is on material and activities
|
|
that are harmful, distressing and inconvenient. These are activities where
|
|
there are real-life victims, i.e. people.
|
|
|
|
28) On the Internet people are free to do what they want. They are also
|
|
free to take the consequences of their actions. Each user, whether they
|
|
like it or not, is bound by the laws of the country they are logging in
|
|
from. This fact applies to CyberAngels equally. CyberAngels have no
|
|
special powers or privileges on the Internet.
|
|
|
|
29) All CyberAngels should recognize that we are a worldwide umbrella
|
|
organization of people from many different cultures. We believe in and
|
|
practise tolerance, and as long as our Mission Statement and Codes of
|
|
Conduct are followed, we have no problem working together with people who
|
|
in other respects have very different views from our own.
|
|
|
|
29) All CyberAngels should strive to be role-models for self-regulation and
|
|
responsibility. In this way we seek to protect and preserve the very
|
|
wonderful world that we inhabit, that we call Cyberspace or the Internet.
|
|
|
|
=================================================
|
|
Proposals to enhance, expand or revise these Codes of Conduct are welcome.
|
|
Please send your feedback to angels@wavent.com
|
|
|
|
Copyright Colin Gabriel Hatcher, May 18, 1996
|
|
|
|
|
|
*********************************************************
|
|
Colin Gabriel Hatcher - CyberAngels Director
|
|
|
|
angels@wavenet.com
|
|
|
|
http://www.safesurf.com/cyberangels/
|
|
http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html
|
|
|
|
"All that is required for the triumph of evil is
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 May 1996 10:12:50 -0700
|
|
From: blackbox@BBOX.COM
|
|
Subject: File 3--ACLU: GA Prohibits Web Links?
|
|
|
|
Date--Thu, 16 May 1996 13:55:45 GMT
|
|
From--ACLU.Newsfeed-Owner
|
|
----------------------------------------------------------------
|
|
*Georgia Law Could Prohibit Web Links*
|
|
|
|
Legislation recently signed into law by Georgia Governor Zell
|
|
Miller is aimed at preventing fraud in cyberspace, but the
|
|
Chronicle of Higher Education recently reported that critics say
|
|
it could force developers of World Wide Web pages to remove links
|
|
to other pages.
|
|
|
|
The law, the Chronicle reported, makes it a crime to "falsely
|
|
identify" oneself on the Net, or to direct people to someone else's
|
|
computer without the other person's explicit permission.
|
|
|
|
The ACLU said the Georgia law raises serious questions.
|
|
|
|
"The Georgia law -- like the federal Communications Decency Act -
|
|
- is just another example of legislators rushing to criminallize
|
|
communication in the online medium before they even begin to
|
|
understand how it operates," said Ann Beeson, an ACLU expert on
|
|
cyberspace.
|
|
|
|
"In the process," Beeson continued, "they have violated the free
|
|
speech rights of cybercitizens and have drastically hindered a
|
|
democratizing medium that enables people to communicate and share
|
|
information around the world in a way never previously possible."
|
|
|
|
----------------------------------------------------------------
|
|
ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE
|
|
----------------------------------------------------------------
|
|
ACLU Freedom Network Web Page: http://www.aclu.org.
|
|
America Online users should check out our live chats, auditorium
|
|
events, *very* active message boards, and complete news on civil
|
|
liberties, at keyword ACLU.
|
|
|
|
----------------------------------------------------------------
|
|
ACLU Newsfeed
|
|
American Civil Liberties Union National Office
|
|
132 West 43rd Street
|
|
New York, New York 10036
|
|
|
|
To subscribe to the ACLU Newsfeed, send a message to
|
|
majordomo@aclu.org with "subscribe News" in the body of the
|
|
message. To terminate your subscription, send a message to
|
|
majordomo@aclu.org with "unsubscribe News" in the body of the
|
|
message.
|
|
|
|
For general information about the ACLU, write to info@aclu.org. -
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 21 May 1996 09:15:38 -0700 (PDT)
|
|
From: jonl@well.com
|
|
Subject: File 4--Rough Draft: Guide for Organizing Online
|
|
|
|
NOTE: This is a VERY incomplete initial draft on which a longer guide for
|
|
creating local online organizations will be based. It's also very U.S.
|
|
oriented in this version. If you have comments or suggestions, send to
|
|
jonl@hotwired.com or jonl@well.com...
|
|
|
|
Why organize locally/regionally? Why not join a national organization?
|
|
|
|
Do join one or more national or international organizations, but organize
|
|
locally, as well. Only local groups can monitor local politics "Freedom
|
|
and Privacy" are local as well as national issues. Freedom can be
|
|
threatened as readily on a muncipal as a state or national level, so it's
|
|
as important to have a network of empowered activists organizing cities as
|
|
it is to have activists working `inside the Beltway.'
|
|
|
|
In fact, though some disaffected citizens imagine that a monolithic
|
|
Federal government churns on ignoring the wishes of John Q. America,
|
|
government tends to be a bottom-up proposition in the U.S. Most
|
|
legislators really do listen to their constituents, and are sensitive to
|
|
their input when they hear it. If we want `em to hear, we have to turn
|
|
the volume up...the way you do that is to get numbers with faces, and get
|
|
`em organized locally, so that the pols will see and hear them during
|
|
home-turf visits. Beyond that, it wouldn't hurt (as Jerry Berman once
|
|
advised me) to load a busfull of local activists and drive them to
|
|
Washington to drop in on the legislative offices for the area's
|
|
representatives.
|
|
|
|
Distribution: Local groups create and (most important) maintain membership
|
|
lists that are potential distribution nodes for evolving grassroots
|
|
networks. This allows for hierarchical, moderated distribution of
|
|
essential information from national sources, and for organization on a
|
|
local level in the `think globally, act locally' mode.
|
|
|
|
Board of Directors: Find 4-5 individuals who will commit to the
|
|
organization and work to meet its goals. Find persons with skills you can
|
|
use: attorney, system administrator, writer/editor, accountant. Establish
|
|
a Board of Directors and Incorporate Take special care in creating your
|
|
mission statement. Look at mission statements for groups like EFF and
|
|
EFF-Austin Also look at bylaws and articles of incorporation for existing
|
|
groups Articles of incorporation will include your mission. Here's
|
|
EFF-Austin's:
|
|
|
|
(a) to engage in and support educational activities that
|
|
increase understanding of the opportunities and challenges posed by
|
|
computing and telecommunications, and related civil liberties issues.
|
|
|
|
(b) to foster a clearer social understanding of the issues
|
|
underlying free and open telecommunications; and
|
|
|
|
(c) to facilitate and encourage communication between
|
|
individuals interested in computer and telecommunication
|
|
technology and related social and legal issues.
|
|
|
|
* Consider whether you want to apply for 501(c)3 classification so that
|
|
donations to the group are tax deductible. This decision has pros
|
|
(facilitates fund raising) and cons (501(c)3 corporations can't overtly
|
|
lobby). EFF-Austin to date has not completed the paperwork for 501(c)3.
|
|
|
|
* Find volunteers for core tasks within the BOD and membership base
|
|
|
|
* In addition to officers, you need someone to handle public relations,
|
|
someone to take responsibility for the membership database, and someone to
|
|
handle the online presence
|
|
|
|
* Establish an online presence
|
|
|
|
* Find an ISP or other system that will provide a comp account
|
|
|
|
* Set up an email list for members and interested persons
|
|
|
|
* Set up aliases for the board of directors, advisory board, perhaps others
|
|
|
|
* Create a web page
|
|
|
|
* Include a membership form on the web page
|
|
|
|
* Establish a membership base
|
|
|
|
* Recruit members online and in meatspace.
|
|
|
|
* Keep dues low
|
|
|
|
* Offer value to members
|
|
|
|
* Hold monthly BOD and membership meetings
|
|
|
|
* Get to know your local police: EFF-Austin has a police liaison (Bruce
|
|
Sterling). One of his jobs is to ensure that the police know who we are
|
|
and will call us for consultation.
|
|
|
|
* Get to know the press
|
|
|
|
* Create focus events that are well-blurbed
|
|
|
|
* Find cooperating attorneys
|
|
|
|
* Talk to other like-minded groups
|
|
|
|
* Minimize costs
|
|
|
|
* Leverage computer-mediated communication
|
|
|
|
* Know your enemies
|
|
|
|
* Know your friends
|
|
|
|
* Know your rights
|
|
|
|
* Always challenge bad press
|
|
|
|
* Always encourage good press
|
|
|
|
* Take public positions
|
|
|
|
--
|
|
|
|
Jon Lebkowsky <jonl@wired.com> http://www.well.com/~jonl
|
|
Electronic Frontiers Forum, 7PM PST Thursdays <http://www.hotwired.com/eff>
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 18 May 1996 14:18:13 -0700
|
|
From: Jim Warren <jwarren@well.com>
|
|
Subject: File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-)
|
|
|
|
[Inflicted on you because you know me. Redistrib as desired.]
|
|
|
|
Computer nerds and nerd-alikes might wish to mark June 12th on their calendars.
|
|
|
|
PBS will air "Triumph of the Nerds" nationally on Wednesday, June 12th --
|
|
as a 3-hour special that they will be promoting as *the* PBS event for
|
|
June. The host is Infoworld's "Robt Cringely" (a pseudonym) and is based
|
|
mo'less on his book, _Accidental Empires_, that discloses how many personal
|
|
computing personalities stumbled into successes.
|
|
|
|
In the show, Cringely interviews a number of microcomputing's "pioneers" --
|
|
including Bill Gates ... and even li'l ol' me -- seeking candid insights
|
|
and tales about the early daze <sic> of personal computing.
|
|
|
|
The 3-hour premier show will include scenes that will *not* appear in later
|
|
re-airings by various PBS stations, in snipped-down one-hour segments, nor
|
|
will they be included in the "Nerds" videotapes that PBS will offer for
|
|
sale.
|
|
|
|
My understanding is that, among other things, the one-time-only showing
|
|
will include some comments about Gates' notorious mid-1970s letter to
|
|
editors accusing computer hobbyists of being thieves, pirating the
|
|
life-blood of his little software company (i.e., duplicating the
|
|
paper-tapes of Microsoft's first BASIC interpreter that -- if memory serves
|
|
-- they were trying to sell for $350, for the MITS Altair 808-based
|
|
computer kit that cost $395). Donno what other morstels will be included.
|
|
|
|
|
|
NERDS IN THE NUDE
|
|
|
|
Although the show was taped last fall, it follows a "tradition" later
|
|
developed for pubic figures in the San Francisco Bay area:
|
|
|
|
* In December, shortly before San Francisco's mayorial election, ex-police
|
|
chief and then-Mayor Frank Jordan held a somewhat unusual photo-op. He was
|
|
featured on front pages and teevee doing a nude shower interview with two
|
|
local disk-jockeys. The shots were tastefully(?) clipped slightly above the
|
|
jockey-shorts that Jordon was obviously not wearing.
|
|
|
|
* Earlier this month, Stanford computer instructor and local
|
|
microprocessor consultant/author/wizard John Wharton gained national fame
|
|
as "Shower Man" when Dave Letterman chose him out of his Late Show audience
|
|
to send to the showers -- broadcasting Wharton continent-wide,
|
|
well-lathered in Letterman's shower where the show was produced during a
|
|
week's visit in San Francisco.
|
|
|
|
So ...
|
|
|
|
|
|
When the "Nerds" producers first interviewed me last year, planning what
|
|
they were going shoot with which of whom, I suggested doing the interview
|
|
in my [large] hot tub -- on my redwooded San Francisco Peninsula ridgetop,
|
|
overlooking about 100 miles of the Pacific.
|
|
|
|
I mean, after *all* -- we Silicon Valley / Californica <sic> types *do*
|
|
have our reputations to maintain.
|
|
|
|
(Actually, I had more in mind doing the initial *off*-camera interview with
|
|
the producer and very attractive assistant producer, who had properly
|
|
oooh'ed and ahhh'ed over the ho'tub and vistas, as I was showing them
|
|
around my mountaintop -- but that detracts from the story. :-)
|
|
|
|
|
|
They discussed the idea and came back saying that Cringely would just
|
|
*love* to do the ON-camera interview in the buff ... uh, in the ho'tub.
|
|
(Woppps! -- my bluff was called.)
|
|
|
|
I first said that I'd do it if all the video crew -- including, of course,
|
|
the attractive assistant producer -- were also sans threads ... but it was
|
|
a cool morning with wisps of fog flitting about, and for some strange
|
|
reason they seemed disinclined, so I relented.
|
|
|
|
|
|
Reasoned I: I *should* honor the origins of my [questionable claims] to
|
|
such fame and accidental fortune. After all --
|
|
|
|
* I never would have gotten into computing in 1968, had I not been looking
|
|
for work ... after resigning (upon request) from chairing the Math Dept at
|
|
the College of Notre Dame, a catholic girls' college where the nun who was
|
|
President somehow felt that the huge nude parties I was convening at my
|
|
mountain home, not far from the area's nude beach, were somehow
|
|
incompatible with the philosophy of a Catholic girls' school -- especially
|
|
after rumors about the events began to spread through the student body [so
|
|
to speak] ... in a college where many of the parents appeared to be doing
|
|
everying possible to delay daughters' becoming women long enough to marry
|
|
them off.
|
|
|
|
[Hey! -- remember ... those hippie '60s were different times, back when
|
|
Newt was smokin' dope and Willie wasn't inhaling. And no, I did not make a
|
|
practice of inviting my students, and not even one of the Sisters ever
|
|
attended -- though some of the lay faculty joined in.]
|
|
|
|
* And for the seven years that I ran the Computer Faires and
|
|
InfoWorld-to-be -- or they ran me -- clothing was always optional around
|
|
our mountaintop compound, and the pool and ho'tub were popular in slack
|
|
times, often sans slacks (ahhh, to return to the girth of those times :-).
|
|
|
|
[You shoulda seen the UPS delivery guy when he walked into the office one
|
|
day, only to find my completely-tanned, voluptuous young bookeeper and me
|
|
consulting in the all-together with my office manager -- whom he knew was
|
|
also my bookeeper's mother, and my next-door neighbor and good friend! We
|
|
just turned casually, smiled brightly, and pointed to the outgoing
|
|
packages.]
|
|
|
|
|
|
[Back on topic] So with their "Nerds" camera rolling, Cringely and I began
|
|
chatting about ISDN versus Frame Relay ... and stripped to zip. Once in
|
|
the ho'tub, in place of coy camera angles, I turned on the bubbles for
|
|
strategic opacity ("Bubbles, Bob?", asked I :-).
|
|
|
|
You'll have to watch PBS on June 12th to, uh, see the rest.
|
|
|
|
Somehow, I suspect that Bellevue Bill's interview was probably conducted
|
|
with more mundane "style" ... but who knows. Guess we'll just have to wait
|
|
for the movie.
|
|
|
|
|
|
And oh yes -- Cringely tells me:
|
|
>The shows have already run in England to great acclaim (our tub scene was
|
|
>especially popular). The series has also been sold to networks in Ireland,
|
|
>Norway, Sweden, Iceland, Holland, Czech & Slovak Reps, Croatia, Hong Kong,
|
|
>Singapore, Thailand, Taiwan, South Africa, British Airways (inflight), and
|
|
>a couple of others I can't remember.
|
|
|
|
|
|
I guess this will sorta blow my cover. :-) But then again, I'm not
|
|
planning to run for office ... and I *am* a WYSIWYG sorta guy.
|
|
|
|
--jim
|
|
Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com)
|
|
345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request>
|
|
|
|
[puffery: John Dvorak Lifetime Achievement Award (1995); James Madison
|
|
Freedom-of-Information Award, Soc. of Prof. Journalists - Nor.Cal. (1994);
|
|
Hugh M. Hefner First-Amendment Award, Playboy Foundation (1994);
|
|
Pioneer Award, Electronic Frontier Foundation (its first year, 1992);
|
|
founded the Computers, Freedom & Privacy confs, InfoWorld; blah blah blah :-).]
|
|
|
|
|
|
Hmmm, I wonder if ex-Mayor Jordon would like to come to my next nude party
|
|
-- now that Willie Brown is Mayor. (Come to think of it though, by
|
|
reputation, Willie would probably be the one more likely to attend. :-)
|
|
|
|
------------------------------
|
|
|
|
Date: 21 May 96 09:57:04 -0500
|
|
From: George_Wang-G11992@email.mot.com
|
|
Subject: File 6--Job Position for Manager of Network Services
|
|
|
|
Since I know that many readers of the CU digest are real
|
|
network/computer "gurus" I thought I would see if there are any
|
|
network experts there who beyond traditional system admin, has very
|
|
strong "theoretical" networking skills in the "emerging" technologies
|
|
such as ATM, FDDI, Cellular/Switched Packet Networks, Satellite,
|
|
Cable, etc, etc.
|
|
|
|
I work for Motorola University's Emerging Technologies Group and we
|
|
are looking to find a Manager of Network Services who has very strong
|
|
networking "design" skills to develop efficient network systems to
|
|
distribute multimedia and other forms of training.
|
|
|
|
If anyone is interested please email me at georgew@mot.com and I will
|
|
send you the job description requirements. I don't think it's
|
|
appropriate to add extra bandwidth to the digest for the description.
|
|
|
|
Thanks,
|
|
George
|
|
Staff Engineer
|
|
Motorola University
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 18 May 1996 01:25:09 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 7--Dutch Internet Hotline agains Child Pornography online (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
Dutch Internet Hotline Against Child Pornography
|
|
|
|
|
|
As of today it is possible to report child pornography postings
|
|
originating from the Netherlands to a special hotline,
|
|
meldpunt@xs4all.nl.
|
|
|
|
If you see any child pornography pictures on Internet, posted by a
|
|
dutch user, then the hotline is the right place to report a complaint.
|
|
We will warn the user about his posting, and ask him to cancel any
|
|
illegal materials that where posted by him. If the warning is ignored,
|
|
then the hotline will forward any available information to the
|
|
vice-squad of the local police, so they can prosecute the distributor
|
|
of child pornography pictures.
|
|
|
|
If you spot a child pornography picture in a Usenet posting,
|
|
then check the headers, especially the NNTP-Posting-Host:.
|
|
If that header contains a domain-name adress that terminates on
|
|
'.nl' then send us the headers of that message, so we can
|
|
investigate the report.
|
|
|
|
|
|
*** Reports can be sent to meldpunt@xs4all.nl ***
|
|
|
|
More information about the hotline against child pornography on
|
|
Internet can be found at: http://www.xs4all.nl/~meldpunt
|
|
|
|
This hotline is a self-regulating Internet initiative by the foundation
|
|
for Dutch Internetproviders (NLIP), the Dutch National Criminal
|
|
Intelligence Service (CRI), Internet users, a psychologist and the National
|
|
Bureau against Racism (LBR).
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.38
|
|
************************************
|
|
|