678 lines
32 KiB
Plaintext
678 lines
32 KiB
Plaintext
|
|
Computer underground Digest Sun Nov 9, 1997 Volume 9 : Issue 82
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.82 (Sun, Nov 9, 1997)
|
|
|
|
File 1--Fwd: study of women hackers
|
|
File 2--Re: Governance in Cyberspace
|
|
File 3--Re: CuD, #9.77, - Digital Copyright Controversy
|
|
File 4--The Internet as scab
|
|
File 5--Police forsee 'scary' electronic crimes
|
|
File 6--Invitation to try cyberjournal list
|
|
File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?
|
|
File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
|
|
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 4 Nov 97 17:45:59 -0800
|
|
From: "Gordon R. Meyer" <grmeyer@RICOCHET.NET>
|
|
Subject: File 1--Fwd: study of women hackers
|
|
|
|
---------------- Begin Forwarded Message ----------------
|
|
Date-- 10/31 5:47 PM
|
|
Received-- 11/04 11:33 AM
|
|
From-- Phil Agre, pagre@weber.ucsd.edu
|
|
|
|
[Paul Edwards is an interesting and nice guy who wrote a good book on
|
|
the early history of AI entitled "The Closed World". His new project
|
|
concerns women hackers, and he's looking for relevant information and
|
|
potential interviewees. I'd much appreciate if you could forward this
|
|
to anyone who might be able to help him.]
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
This message was forwarded through the Red Rock Eater News Service (RRE).
|
|
Send any replies to the original author, listed in the From: field below.
|
|
You are welcome to send the message along to others but please do not use
|
|
the "redirect" command. For information on RRE, including instructions
|
|
for (un)subscribing, send an empty message to rre-help@weber.ucsd.edu
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
Date--Fri, 31 Oct 1997 12:38:37 -0500
|
|
From--"Paul N. Edwards" <pedwards@pcd.stanford.edu>
|
|
Subject--Pre-1985 Women Hackers?
|
|
|
|
I'm a historian of technology. Most of my work concerns the political,
|
|
social, and cultural history of computers and their uses. Members of this
|
|
list may know my book The Closed World: Computers and the Politics of
|
|
Discourse in Cold War America (Cambridge, MA: MIT Press, 1996). More
|
|
information about me is available on WWW at the URL below.
|
|
|
|
I'm now working on a historical article about women hackers, based largely
|
|
on email and telephone interviews. The purpose of the article is to
|
|
investigate myths and realities surrounding the role of women in
|
|
computing,
|
|
especially during the 1960s and 1970s, when most authors have argued that
|
|
hacking was more or less exclusively male. As I've met more and more women
|
|
recently who describe themselves as hackers, I've become interested in the
|
|
particular experiences of the small minority of hackers who were female.
|
|
(NB: I am purposely leaving the definition of the term up to respondents.)
|
|
|
|
I'd like to hear from women who fit any of the following categories:
|
|
|
|
1) self-identified hackers;
|
|
2) women who have had extensive involvement with hacker communities in
|
|
some
|
|
way, while not necessarily identifying as hackers; and
|
|
3) women computer professionals who have done serious thinking about the
|
|
gender roles of hackers.
|
|
|
|
I'm especially (but not exclusively) interested in women whose experience
|
|
dates from the period prior to 1985. I would like to interview as many of
|
|
you as possible, either by telephone, or by email. I've prepared a short
|
|
(but broad) questionnaire that can be the basis for either oral or written
|
|
responses. Interviews can be confidential, if desired.
|
|
|
|
I'm also looking for:
|
|
|
|
4) documents relating to women hackers. These might include, for example,
|
|
old email, other correspondence, newsgroup postings, or published
|
|
literature. Again, I'm primarily but not exclusively interested in the
|
|
period before 1985.
|
|
|
|
Hope you'll be interested. I will be happy to send you a copy of the
|
|
questionnaire or to interview you by phone. It would also be helpful to
|
|
have names/emails of other women who might be willing to participate.
|
|
|
|
Paul
|
|
|
|
---------------------------------------------------------
|
|
Paul N. Edwards
|
|
Senior Research Scholar and Lecturer
|
|
Program in Science, Technology, and Society, Stanford University
|
|
http://www.stanford.edu/group/STS/edwards.html
|
|
Director, Information Technology & Society Project
|
|
http://www.stanford.edu/group/itsp/
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 05 Nov 1997 11:08:40 +0100
|
|
From: Felipe Rodriquez <felipe@xs4all.nl>
|
|
Subject: File 2--Re: Governance in Cyberspace
|
|
|
|
Governance in Cyberspace (or what the EU calls the Information Society)
|
|
does not adapt to traditional power structures. These structures,
|
|
that we usually refer to as authorities, are in essence almost
|
|
always regionally bound; their authority and influence stops at
|
|
the regions- or countries border. One of the unique, and
|
|
unchangeable, properties of Cyberspace is that it moves over those
|
|
borders, and thus in many ways rejects the concept of local
|
|
authority.
|
|
|
|
Information in Cyberspace is distributed, and thus power is
|
|
distributed. There is no single entity that can change the way
|
|
things work on the Internet. But if there's a consensus about
|
|
something, change happens.
|
|
|
|
An example; The technical fundament of the Internet, the Request
|
|
For Comment (RFC) series, that form the underlying structure of
|
|
protocol standards, have been created mostly in a consensus
|
|
process. The people that created these standards where mostly
|
|
volunteers and scientists, although initially some where
|
|
commissioned by the US Advanced Research Projects Agency (ARPA).
|
|
These's RFC's today are basically created by Internet Engineering
|
|
Task force working groups, which are made up by people interested
|
|
in the topic; anyone can join an IETF working-group and
|
|
participate in the creation of a new Internet standard. There is
|
|
some loose coordination of these developments by the Internet
|
|
Architecture Board, connected to the Internet Society, but no-one
|
|
can pretend to control the course of events; in other words no-one
|
|
can pretend to govern the Internet. It is governed by broad
|
|
consensus.
|
|
|
|
Restriction of information in Cyberspace has proved to be
|
|
impossible, and assuming that power and information are
|
|
interconnected we could say that restriction of power in
|
|
Cyberspace to a government is impossible.
|
|
|
|
There's numerous examples that show how information flows in
|
|
unrestricted ways; the German government wants to prevent the
|
|
circulation of a certain document, called Radikal. The document is
|
|
published on a web site in the Netherlands, where it is not
|
|
considered to be illegal. The German Prosecutor General ordered
|
|
German providers to block this page. Immediately afterwards the
|
|
banned document is copied to 50 places on the Internet, all over
|
|
the world. A year after the German attempt to censor the document,
|
|
Germans can still easily access it on the Internet unrestricted by
|
|
censorship. This example demonstrates the limits that are imposed
|
|
on the power of the German government; they could not prevent
|
|
their citizens from accessing a document the government did not
|
|
want them to read. The power in this case was distributed, at the
|
|
expense of the power of government; it was given to the German
|
|
citizens who can now decide themselves if they want to access and
|
|
read this document or not.
|
|
|
|
Another example; the government in Singapore is very anxious to
|
|
control the information it's citizens access on the Internet. To
|
|
obtain a level of control they've installed several gateways that
|
|
are under the influence of the government. There's also a number
|
|
of mandatory proxies that filter certain addresses. People inside
|
|
Singapore have demonstrated that despite the attempt to control
|
|
access to certain information, this information is easy to obtain;
|
|
it proves to be impossible for the Singapore government to control
|
|
al the content on the Internet. There's now an estimated 1 billion
|
|
pages on the World Wide Web. It impossible to know the content of
|
|
all these pages and selectively filter them at the national proxy.
|
|
Even if this level of control would be possible for Singapore,
|
|
there's a famous phrase used by many on the Net; Internet routes
|
|
around censorship. If Singapore would accomplish a 'total-control'
|
|
system, it would still be possible to route around the
|
|
control-mechanisms by using second-level proxy servers outside
|
|
Singapore, or so-called anonimizers. Not to mention remailers and
|
|
other technology. The Singapore example shows a government that
|
|
tries to maintain power in the traditional way; by restricting
|
|
information. And reality shows that it does not work, only the
|
|
illusion of control is maintained.
|
|
|
|
The last example of free flow of information concerns PGP. PGP
|
|
stands for Pretty Good Privacy, this is encryption software one
|
|
can use to protect email and other documents. The encryption used
|
|
in this program is so strong, that it cannot be exported from the
|
|
USA to other countries (export of strong crypto is illegal in the
|
|
US). But since the first version of PGP, version 1.0, it has been
|
|
available all over the world. People simply downloaded the
|
|
software from the US, and distributed it around the world.
|
|
Version 2.0 was created in Europe to avoid US export restrictions;
|
|
this version has also been distributed around the world. The
|
|
latest version of PGP, version 5.0, was created in the US by the
|
|
company PGP Inc. In a matter of days after publication of this
|
|
software it was available in Europe, despite US export
|
|
restrictions. Later on people scanned in the source-code, to
|
|
create a legal' copy of the program (export of source code is not
|
|
illegal in the US, it is considered free-speech). Just a few days
|
|
ago version 5.5 of PGP was published in the US, and it is already
|
|
available outside the US. PGP has demonstrated that export
|
|
restrictions of data and software are impossible to maintain. Even
|
|
the US government cannot control the free flow of information, and
|
|
the distribution of power that is a consequence of this free flow.
|
|
|
|
Governments are easily tempted to create systems of control on the
|
|
Internet, or to try and sanction policy. These attempts are taking
|
|
place in various shapes and forms, like self-regulation by the
|
|
market, and content-labelling initiatives.
|
|
|
|
In the EU a lot of effort is invested in self-regulation by the
|
|
market. The market, and the companies in the marketplace, are
|
|
easier to control than the chaotic mess of individuals, because
|
|
economic instruments can be used to force the players in the
|
|
market into a certain direction. By self regulation the
|
|
authorities shift part of power to the marketplace in an attempt
|
|
to maintain order and stability in Cyberspace. When self
|
|
regulation is closely watched one sees that it comes down to
|
|
companies governing their customers. Self regulation in practice
|
|
means that an internetprovider has to prevent the questionable
|
|
expressions of his customers. Self regulation could also be called
|
|
the privatization of authority. The concept of self regulation of
|
|
Internet by the marketplace shows the decline of state-authority,
|
|
and may, in an extreme situation, lead to its downfall. Self
|
|
regulation is dangerous; the market will always try to avoid
|
|
obvious risks. A customer that expresses dubious statements is a
|
|
risk; a company prefers to 'selfregulate' and prevent the
|
|
expression of this customer, rather than risk a legal procedure.
|
|
The company may be held liable in some way, and liability costs
|
|
precious money. Self regulation can easily lead to restriction of
|
|
established rights, like the right on freedom of expression. This
|
|
may sound extreme, but it is not. Reality proves this argument;
|
|
when the German providers where asked to prevent the publication
|
|
of 1 document originating in the Netherlands, they did not have
|
|
the technical means to single out this document. Thus they
|
|
obstructed an entire web server, with more than 10.000 other
|
|
resources on-line. They did this because they where afraid of
|
|
prosecution; that would harm their image and cost a lot of money
|
|
in legal fees. Thus it was preferred to 'self-regulate' and
|
|
prevent the document, and 10.000 other resources, to be accessed
|
|
by German citizens. Not only did this act of 'self-regulation'
|
|
infringe the right of free-expression, it also obstructed the free
|
|
flow of goods and information within the European Union. Similar
|
|
examples exist all over the world; providers prefer to disconnect
|
|
their customers before allowing them their right of free
|
|
expression. Freedom of expression is in many cases regarded as
|
|
risk instead of a universal right.
|
|
|
|
Another attempt to establish more control on the Internet is the
|
|
technology of labelling and filtering. Content labelling and
|
|
filtering techniques are propagated to protect children, and to
|
|
achieve 'downstream' filtering of content (filtering by the user).
|
|
Many question if such technology would achieve a safer Internet
|
|
for children; the Internet is basically an adult zone, and very
|
|
difficult to turn into a safe haven for children. But if labelling
|
|
and filtering technology is implemented, it could easily be used
|
|
for 'upstream' filtering; by the provider, government or other
|
|
organizations. A country like Singapore would of course consider
|
|
such technology to be a gift from heaven, because it allows better
|
|
control of what information the citizen accesses. It establishes
|
|
the traditional way of government control; restriction of
|
|
information, and is thus an attempt to keep things the way they
|
|
where in the industrial era. Earlier in this message I stated
|
|
that on the Internet things are achieved by consensus, and not by
|
|
authority; thus content-labelling and filtering technology will
|
|
not be implemented. Only a fraction of people want this
|
|
technology, most people do not. Most likely labelling will not
|
|
happen because the consensus is absent.
|
|
|
|
Traditional structures of authority increasingly lose their value
|
|
in a worldwide networked environment, no single regional authority
|
|
can establish total control in Cyberspace. Control is distributed
|
|
to its citizens. In many ways this is beneficial for the citizen.
|
|
In some ways it may not be. But at this moment it is not clear
|
|
where problems may arise, and where action should be taken to
|
|
avoid these problems. We are in a transition phase, where only few
|
|
things are clear. Only time can tell where this development will
|
|
bring us, but it will profoundly change the way governance works.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 1 Nov 1997 19:10:00 -0800 (PST)
|
|
From: "Bruce J. Bell" <bruce@ugcs.caltech.edu>
|
|
Subject: File 3--Re: CuD, #9.77, - Digital Copyright Controversy
|
|
|
|
I'm sure this CuD has stirred up a lot of controversy; here I am to
|
|
add my $.02 to the fray....
|
|
|
|
Permission granted to edit for size and publish in CuD.
|
|
|
|
>Date--Sun, 26 Oct 1997 13:46:48 -0600 (CST)
|
|
>From--Wade Riddick <riddick@MAIL.LA.UTEXAS.EDU>
|
|
>Subject--Telerights II - Current Digital Copyright Controversy
|
|
>
|
|
> Open Letter to Chairman Tauzin Concerning
|
|
> the Current Digital Copyright Controversy
|
|
>
|
|
> (c) 1997 By Wade Riddick
|
|
> All rights reserved
|
|
> Circulate freely without alteration
|
|
|
|
[from the introductory section of the letter]
|
|
|
|
> My research goal has been to discover and then advocate such
|
|
>methods in the hopes that we can return to more of an open market in
|
|
>intellectual property. I believe that if someone buys a book in
|
|
>hardback, they ought tobe able to buy, 'own' and resell its digital
|
|
>'copy' in exactly the same fashion they can with the physical
|
|
>document. Decisions like 'renting' software are most efficiently
|
|
>left to free enterprise and not mandated in the law. Once
|
|
>intellectual property is open to rental, lease, outright purchase
|
|
>and even bundling like financial options-just as any other form of
|
|
>property-then its market will expand as fruitfully as other capital
|
|
>markets have in the last decade. The more flexible the law is in
|
|
>rewarding entrepreneurs, the more complex, developed and profitable
|
|
>the marketplace will become.
|
|
|
|
First off, this doesn't sound like a "research goal" per se. It
|
|
sounds like Mr. Riddick has an idea what he would *like* to be true,
|
|
whether or not research actually indicates it to be feasible. This
|
|
is reflected in the content of his letter, where he consistently ignores
|
|
the question of whether the prerequisites necessary for his proposals
|
|
can (or should) be met.
|
|
|
|
Since this prerequisite is, effectively, "design all computers to
|
|
refuse to duplicate data with a copyright notice", one might
|
|
reasonably ask how this will be accomplished.
|
|
|
|
As wonderful as Mr. Riddick's vision for the future of
|
|
intellectual property may be, I expect that even if it were
|
|
possible, the negative consequences of enforcing this requirement
|
|
would dwarf the possible positive consequences of the resulting
|
|
commerce.
|
|
|
|
|
|
The idea of adding a "copyright chip" to all computers, and all
|
|
its ancillary requirements of implementation and enforcement is by
|
|
no means new. I can't think of any specific references, but the
|
|
idea is certainly old-hat to me; the reason it isn't discussed
|
|
much is mainly that it's such a dumb idea on its face. It sounds
|
|
like an exerpt from the paranoid speculations of Richard Stallman,
|
|
though if it is ever implemented, it would of course mean that
|
|
those speculations were in fact justified...
|
|
|
|
Certainly, it's much more invasive than the "Clipper Chip"
|
|
proposal was, so it fails for the same reason that initiative did:
|
|
why would anybody buy crippled computers when un-crippled ones are
|
|
available? And how can you possibly reduce the availability of
|
|
un-crippled computers without banning their sale and manufacture?
|
|
|
|
Although I'm sure this kind of proposal is a wet-dream to people
|
|
in the recording industry, the movie industry, and the FBI, I
|
|
doubt it will receive any kind of welcome from the computer
|
|
industry, or from ISP's, or from the lowly consumer. I
|
|
particularly note the implication that "liability" be used as a
|
|
stick to drive consumers into cooperation with this scheme, as
|
|
well as ISP's, and (presumably) the computer industry in general.
|
|
|
|
At the consumer level, aside from questions of overall
|
|
desirability, the proposal that digital signatures and watermarks
|
|
be used to track down and punish the owner of the "original copy"
|
|
of a work that is distributed outside this proposed copyright
|
|
system seems doubtful.
|
|
|
|
Consider that deliberate "pirates" could take the simple expedient
|
|
of finding multiple copies of the original work. Any elements in
|
|
the plaintext that are identical between all instances could not
|
|
be used to identify the original purchaser; while elements that
|
|
differ are those that may contain purchaser information, and can
|
|
be scrambled, deleted, or even ignored if the "pirates" themselves
|
|
are untracable.
|
|
|
|
Digital watermarking is an interesting concept, and it may be
|
|
useful for some things, but it is not useful as a copy-protection
|
|
scheme.
|
|
|
|
|
|
Aside from this, the proposal relies on the copy-protected data
|
|
being distributed in digitally-signed encrypted form, and somehow
|
|
deleted after being viewed. Consider that any software for
|
|
displaying or manipulating such copyrighted data in an "approved"
|
|
manner will necessarily have to deal with the data in a plaintext
|
|
format.
|
|
|
|
No matter what auxiliary "tamper-resistant" hardware is installed
|
|
on the computer, once the data is in a form suitible for display
|
|
and manipulation by the software, there is no practical way this
|
|
hardware can keep the software from saving the plaintext data.
|
|
|
|
Unless, that is, all software permitted to run on computers must
|
|
be pre-approved by some agency as secure in this respect, and
|
|
digitally signed so that the computer will recognize and execute
|
|
it. Note that for practical purposes, this will prohibit private
|
|
individuals from writing and executing their own programs to run
|
|
on the computer. Note also the difficulty of producing programs
|
|
that are bug-free, much less "secure"...
|
|
|
|
Another possibility is that an entirely new, highly secure OS be
|
|
designed that prevents programs permitted access to copyrighted
|
|
information from storing any data in a generally-accessible
|
|
format. Again, assuming such an OS is designed with no bugs or
|
|
security holes, all other OS's must necessarily be forbidden, and
|
|
no modified, unapproved versions can be tolerated. It will also
|
|
be inconvenient to use, since many possible features of programs
|
|
will be prohibited. (e.g., copyright-enabled programs will be
|
|
unable to store anything...)
|
|
|
|
A question that Mr. Riddick asks, but does not effectively answer,
|
|
is: who will pay for developing this software? He suggests that
|
|
"It can be bundled into the general expense of developing the
|
|
'information superhighway.'" The above problems suggest that that
|
|
this cost is enormously greater than he has considered.
|
|
|
|
Also, there is no "information superhighway" general expense
|
|
account. (the mere fact that Mr. Riddick would mention such a
|
|
cockeyed concept as a putative source of funding is astounding)
|
|
The question of who would pay the costs for such a program is not
|
|
trivial. I submit that no software developer would accept the
|
|
requirements and limitations necessary for this proposal, even if
|
|
they could sell it in a market where software without these
|
|
limitations is available. Perhaps they, too, must be made liable
|
|
for all users of their product...
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 28 Oct 1997 13:58:51 -0500
|
|
From: Andy Oram <andyo@ORA.COM>
|
|
Subject: File 4--The Internet as scab
|
|
|
|
An interesting article appeared in the October 28 Boston Globe about
|
|
striking teachers in the province of Ottawa. The strike is over
|
|
typical work rules ("class size, length of the school day, and number
|
|
of hours of teaching time"). But one paragraph in particular caught my
|
|
eye:
|
|
|
|
If the strike continues, provincial authorities said,
|
|
they will urge parents to educate their children at home
|
|
using assignments and learning aids provided on the
|
|
Internet.
|
|
|
|
-----------------------------------------------------------
|
|
Andy Oram O'Reilly & Associates, Inc. email: andyo@oreilly.com
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 3 Nov 1997 23:51:17 -0500 (EST)
|
|
From: Stunt Pope <markjr@shmooze.net>
|
|
Subject: File 5--Police forsee 'scary' electronic crimes
|
|
|
|
In the Nov/3/97 Toronto Star, staff writer Cal Millar penned an
|
|
article headlined "Police forsee 'scary' electronic crimes". This
|
|
sentiment came out of the International Association of Chiefs of
|
|
Police conference last week where the chiefs of the 50 largest
|
|
cities in North America were given "confidential briefings".
|
|
Toronto police chief David Boothby said in an interview "Expect to
|
|
find frauds we never imagined". Alas, he could not reveal "details
|
|
of confidential meetings", but he further elucidated the situation
|
|
as "pretty scary".
|
|
|
|
Boothby went on to say that organized criminals will be able to
|
|
electronically steal from accounts and use scrambled
|
|
communications to plan crimes.
|
|
|
|
Mission accomplished in convincing my town's top cop of the evils
|
|
of secure crypto, from the sounds of it. The rest of the attendees
|
|
seem to concur, as they asked the telecommunications industry "to
|
|
provide technology to let police intercept scrambled communication
|
|
from criminals who use high-tech cellular and other transmission
|
|
systems to thwart law enforcement efforts and avoid detection."
|
|
|
|
All this makes perfect sense from the point of view of federal law
|
|
enforcement officials, politicians and lobbyists who oppose secure
|
|
crypto and are slugging it out to have it banned: get all the
|
|
chiefs together in a room, scare them sh*tless with tales of child
|
|
porn rings and a-bomb schematics being transmitted heavily
|
|
encrypted all over the place and then send them home to spread the
|
|
word.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 5 Nov 1997 11:32:36 GMT
|
|
From: "Richard K. Moore" <rkmoore@iol.ie>
|
|
Subject: File 6--Invitation to try cyberjournal list
|
|
|
|
|
|
I'd like to an extend an invitation to join the cyberjournal list, at least
|
|
on a trial basis - the traffic is not heavy. Cj was featured as TipWorld's
|
|
Mailing List of the Day for 10/23/97. They described the list as follows:
|
|
|
|
CYBERJOURNAL
|
|
CJ for short, this is one of many lists sponsored by the Computer
|
|
Professionals for Social Responsibility. A moderated forum to talk
|
|
about anything you want, recent posts include juicy conspiracy
|
|
theories about Princess Diana's death, the increasing emergence
|
|
of global monopolies, and international corruption. Perspectives
|
|
from around the world, specially written articles, quotes, and
|
|
cross-postings of other newsletters are common.
|
|
|
|
In fact cj is more like a "journal" than a "talk forum", and the focus is
|
|
on globalization, the changing architecture of world systems, political
|
|
realism, propaganda and mind control, democracy, and the opportunities and
|
|
challenges for progressive activism.
|
|
|
|
Coming up on cj will be a new series of articles/essays which will make up
|
|
the first-draft of a book aimed at comprehensively exposing the true nature
|
|
of globalization: "Globalization and the New World Order - democracy at a
|
|
crossroads". Interspersed with this series will be items of special
|
|
interest and responses/contributions from subscribers.
|
|
|
|
To join cyberjournal, simply send:
|
|
To--listserv@cpsr.org
|
|
Subject--(ignored)
|
|
---
|
|
sub cyberjournal John Doe <-- your name there
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 6 Nov 1997 14:00:36 -0700 (MST)
|
|
From: Ken Arromdee <karromde@nyx.net
|
|
Subject: File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?
|
|
|
|
> ROPER: So now you'd give the Devil benefit of law!
|
|
>
|
|
> MORE: Yes. What would you do? Cut a great road through the law
|
|
> to get after the Devil?
|
|
>
|
|
> ROPER: I'd cut down every law in England to do that!
|
|
>
|
|
> MORE: Oh? And when the last law was down, and the Devil turned
|
|
> round on you--where would you hide, Roper, the laws all being flat?
|
|
> This country's planted thick with laws from coast to coast--man's
|
|
> laws, not God's--and if you cut them down--and you're just the man to
|
|
> do it--d'you really think you could stand upright in the winds that
|
|
> would blow then? Yes, I'd give the Devil benefit of law, for my own
|
|
> safety's sake.
|
|
>
|
|
> --Robert Bolt "A Man For All Seasons"
|
|
|
|
The above quote that tallpall used to head his message is rather
|
|
ironic in context. Fascism is certainly a devil. And yes, I'd
|
|
give the devil benefit of law, for my own sake. This quote
|
|
expresses _exactly_ why fascists should be allowed free speech,
|
|
and should not be forced off the net in any shape or form. It's
|
|
not because I particularly like fascists, it's because if you
|
|
restrict free speech in order to get rid of the fascists, you
|
|
pave the road towards restricting free speech for anyone.
|
|
|
|
And contrary to his claim that people who arguing for the rights
|
|
of fascists are not potential victims, I am Jewish.
|
|
|
|
It's also interesting to actually check out the list of FBI cases
|
|
and compare to how he describes it--the cemetery defacement case
|
|
was at the top of the page, but nothing suggests that the cases
|
|
on the page are listed in order from most to least important.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 03 Nov 97 05:36:19 EST
|
|
From: steenburger@hotmail.com
|
|
Subject: File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
|
|
Computer Privacy Digest Mon, 03 Nov 97 Volume 11 : Issue: 017
|
|
<snip>
|
|
|
|
Council Vice-President Chuck Busse offered an alternative to filtering:
|
|
making the names of people who access porn via city libraries public.
|
|
According to an article in the Detroit News: "under Busse's proposal,
|
|
which was not acted on, pornography viewers' names could be published
|
|
in newspapers, on the city Web site or made available to anyone who
|
|
files a Freedom of Information request through the city attorney's
|
|
office. The names would be gathered from city computer records and made
|
|
available to the public. Only people who call up sex sites on library
|
|
screens would be identified." I guess then the mob would know where to
|
|
gather and whose house to burn down. A couple of (other) problems come
|
|
to mind. One is that a login system would have to be set up so that
|
|
files accessed could could be matched to the patron viewing them. Woe
|
|
to the person who forgets to log off! Especially if the next person to
|
|
use the terminal is one of the city's porn addicts or a neo-nazi. I
|
|
hear the city has plenty of both. Of course all the sites accessed
|
|
would show up in a log file, not just the porn sites (as if it would be
|
|
easy to tell which were which), thus creating some of the biggest
|
|
privacy violations in the history of the United States.
|
|
|
|
Well, Warren city attorneys are used to being on the losing side of
|
|
costly litigation. Was this a serious suggestion? Did he think a lot
|
|
about this before hand or did he just blurt it out in haste so that
|
|
Gloria Sankuer would not be the only one to get credit for saving our
|
|
culture from decay? It looks as if Busse knows even less about the
|
|
internet and libraries than Sankuer. That's probably why he wasn't one
|
|
of the two council members appointed to work with the library board in
|
|
search of an internet filter. That honor went to St. Pierre, and the
|
|
council's internet expert Sankuer.
|
|
|
|
http://members.aol.com/neofrant/index.html
|
|
|
|
http://www.detnews.com/1997/macomb/9710/15/10150169.htm
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.82
|
|
************************************
|
|
|
|
|