845 lines
44 KiB
Plaintext
845 lines
44 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Oct 18, 1992 Volume 4 : Issue 52
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Copy Editor: Etaion Jhrdleau, Sr.
|
||
|
||
CONTENTS, #4.52 (Oct 18, 1992)
|
||
File 1--Fixed Problems With The AOTD Mailserver
|
||
File 2--More on Inslaw -- Justice Dept response
|
||
File 3--The Essence of Programming
|
||
File 4-- CPSR Social Action Report
|
||
File 5--Making the News and Bookstands (Reprint)
|
||
File 6--Legion Of Doom Connection With 911 Attacks Denied
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4), ftp.ee.mu.oz.au
|
||
and red.css.itd.umich.edu -- the texts are in /cud.
|
||
Back issues also may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Fri, 16 Oct 1992 18:13:55 EDT
|
||
From: Chris Cappuccio <chris%aotnet@mcnnet.mi.org>
|
||
Subject: File 1--Fixed Problems With The AOTD Mailserver
|
||
|
||
Ok, well after I got my computer connected with UUCP (I'm still not a
|
||
registered system but soon I expect to register with the local UUCP
|
||
stuff and also get a domain name in mi.org), I tried to subscribe to
|
||
the AOTD list with my account on my machine (aotnet) but I couldn't.
|
||
It turned out, because we put some more security from people using the
|
||
mailing list, that Mike also accidentaly changed the list name. Well
|
||
this is fixed now. To subscribe to Art of Technology Digest, do
|
||
*exactly* this:
|
||
|
||
mail mailserv@batpad.lgb.ca.us Leave the "Subject" line blank Put this
|
||
in the text of your message: SUBSCRIBE AOTD
|
||
|
||
and you will be put on the mailing list. You should wait 1-24 hours
|
||
for a response. I am not using my computer as the mailserver because I
|
||
only have a 2400 baud (or bps, whatever you like) modem and no
|
||
mailserver software. Oh, one more thing, you can get back issues of
|
||
AoT-D from wuarchive.wustl.edu under directory: /pub/aot/. Enjoy!
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 15 Oct 1992 22:58:43 -0700
|
||
From: James I. Davis <jdav@WELL.SF.CA.US>
|
||
Subject: File 2--More on Inslaw -- Justice Dept response
|
||
|
||
From-- Nigel.Allen@lambada.oit.unc.edu
|
||
Subject-- U.S. Justice Department Statement on Inslaw Affair
|
||
To-- Multiple recipients of list ACTIV-L
|
||
|
||
Here is a press release from the U.S. Department of Justice.
|
||
|
||
Justice Department Releases Statement
|
||
To: National Desk
|
||
Contact: U.S. Department of Justice, Public Affairs, 202-514-2007
|
||
|
||
WASHINGTON, Oct. 13 -- The Department of Justice released today
|
||
the following statement:
|
||
|
||
Attorney General William P. Barr today told the House Committee on
|
||
the Judiciary that he will not seek the appointment of an Independent
|
||
Counsel as requested in a Sept. 10 letter from a majority of the
|
||
committee's Democratic members. His reasons for this decision were
|
||
set forth in a letter to the Committee. Under the Independent Counsel
|
||
statute, only the committee can make these materials public, and the
|
||
attorney general has asked that it do so.
|
||
|
||
The Sept. 10 letter requested the appointment of an independent
|
||
counsel to investigate allegations contained in a report adopted by
|
||
the committee's Democratic majority members entitled, "The Inslaw
|
||
Affair" (Report).
|
||
|
||
The independent counsel statute was designed to apply to certain
|
||
exceptional cases. Accordingly, the statute's specialized procedures
|
||
are triggered in two specifically defined circumstances -- one
|
||
mandatory and one discretionary.
|
||
|
||
The mandatory provision, 28 U.S.C. 591 (a), requires the attorney
|
||
general to apply the procedures of the statute if and when he receives
|
||
specific and credible information sufficient to warrant a criminal
|
||
investigation of a "covered person." Covered persons' are a small
|
||
group of the most senior officials in the Executive Branch who are
|
||
specifically listed in the statute.
|
||
|
||
The discretionary provision of the statute, 28 U.S.C. 591 (c),
|
||
authorizes, but does not require, the Attorney General to proceed
|
||
under the statute if: (1) he receives specific and credible
|
||
information sufficient to warrant a criminal investigation of someone
|
||
other than a "covered person"; and (2) he determines that an
|
||
investigation or prosecution of that person by the Attorney General or
|
||
other officer of the Department "may result in a personal, financial
|
||
or political conflict of interest."
|
||
|
||
The department has concluded that the report contains no specific
|
||
information that any "covered person" has committed a crime.
|
||
|
||
Regarding "non-covered" persons, long before the committee
|
||
completed its report, Attorney General Barr appointed retired U.S.
|
||
District Judge Nicholas J. Bua as special counsel to investigate all
|
||
matters related to INSLAW. Judge Bua has had an outstanding judicial
|
||
career which has spanned almost thirty years. He has served on the
|
||
county, circuit and appellate courts in Illinois, and in 1977,
|
||
President Carter appointed him to the U.S. District Court in Chicago.
|
||
|
||
Judge Bua has full authority to conduct a thorough and complete
|
||
investigation of all INSLAW allegations -- including the power to
|
||
issue subpoenas and to convene grand juries. He is conducting his
|
||
investigation in a fair and impartial manner. The attorney general's
|
||
instructions included from the outset of this investigation for Judge
|
||
Bua to notify him of any information implicating the independent
|
||
counsel statute. Judge Bua found no evidence to support invoking the
|
||
mandatory or discretionary provisions of the independent counsel
|
||
statute before the report was issued, or since reviewing the report.
|
||
|
||
After an exhaustive review of the allegations, in accordance with
|
||
the requirements of the statute, the Attorney General will not seek
|
||
the appointment of an Independent Counsel at this time. The
|
||
department invites the committee, Congress, or any other source, to
|
||
provide any new information that warrants invoking the independent
|
||
counsel statute.
|
||
|
||
------------------------------
|
||
|
||
Date: 13 Oct 92 01:15:59
|
||
From: The Dark Adept <drkadpt@DRKTOWR.CHI.IL.US>
|
||
Subject: File 3--The Essence of Programming
|
||
|
||
The Essence of Programming
|
||
by The Dark Adept
|
||
|
||
What exactly is a computer program? Why do people wish to copyright
|
||
it? Why do people wish to patent its effects? Why do programmers
|
||
enjoy programming?
|
||
|
||
A lot of these questions cannot be answered in a straightforward
|
||
manner. Most people would give you a different answer for each, but
|
||
there is an indirect answer: the essence of programming.
|
||
|
||
In a recent CuD issue a question was raised about Cyberspace being a
|
||
culture. I am no sociologist, but it is apparent to me that every
|
||
culture has some form of artistic expression. Cyberspace is no
|
||
different. Beneath every piece of E-mail, beneath every USENET post,
|
||
beneath every word typed into a word processor is an underlying piece
|
||
of art hidden from the user's eyes: the computer program.
|
||
|
||
"A computer program is art? Is this guy nuts?" Well, yes and no in
|
||
that order ;) Art has many different definitions, but a few things
|
||
are apparent about true art. True art is an extension of the artist.
|
||
It is his view of the world around him. It contributes to his world,
|
||
not only aesthetically, but by influencing people. This is true
|
||
whether the art form is music, sculpture, photography, dance, etc.
|
||
True art is also created. It fulfills the artist's need to create.
|
||
It is no less his creation and part of him than his own child.
|
||
|
||
The source code for a computer program is art pure and simple.
|
||
Whether it is written by one programmer or many. Each programmer
|
||
takes his view of the world the art will exist in (the core memory of
|
||
the computer and the other programs around it), and shapes the program
|
||
according to that view. No two programmers program exactly alike just
|
||
as no two authors will use the same exact sentence to describe the
|
||
same thing.
|
||
|
||
And the computer program will influence people. Aesthetic value may
|
||
come from either video games, fractal generators, or even a hot new
|
||
GUI (graphical user interface -- like MS-Windows(tm)). But it does
|
||
more than this. It changes how people work, how people think. The
|
||
typist of the 1920's most certainly would look upon his work much
|
||
differently than the word processing secretary of the 1990's would
|
||
look upon his. No longer is the concern restricted to "should I
|
||
single- or double-space," but also to "what font should I use? What
|
||
size?"
|
||
|
||
Furthermore a computer program is interactive art. Once the program
|
||
is written and executed, people interact with it. Other machines
|
||
interact with it. Other programs interact with it. In fact, it is
|
||
not only interactive art, but *living* art. It reaches its fullest
|
||
not when looked at and appreciated, but put to use and appreciated.
|
||
It is not created to sit in the corner and be enjoyed, but also to be
|
||
interacted with and brought to life.
|
||
|
||
And just as the literary world had artists whose influence upon
|
||
society was negative instead of positive, their works are also art.
|
||
Hitler, Manson, Machiavelli, etc. all wrote great works whose
|
||
influence tore apart society and crippled it. However, even though
|
||
their work caused evil, it is nonetheless a form of art. _Mein Kampf_
|
||
caused more deaths in this world than almost any other publication.
|
||
For one piece of printed text to have this great of an effect on
|
||
society, the soul of the writer must be within those words. In another
|
||
vein, think of the Bible. Wars have been fought over it, miracles
|
||
have happened because of it, people have laughed and cried over it.
|
||
The reason is that the soul of the reader is stirred by the authors'
|
||
souls who are in the work itself. In any case, even thought _Mein
|
||
Kampf_ caused much evil, no one can deny that it was a powerful work
|
||
full of Hitler's soul, and deserves study and thought.
|
||
|
||
The negative art of the programming world would most certainly be
|
||
viruses and worms. Whether the author follows from Hitler and is bent
|
||
on the destruction of all unlike him, or is more of a scientist trying
|
||
to create life that is autonomous from the creator and it gets out of
|
||
hand like Dr. Frankenstein's, they are still great works. The
|
||
miniscule amount of "words" in a virus program can cause a greater
|
||
effect on people than the millions of "words" used to create DOS.
|
||
There is an elegant evil to them like there is to Machiavelli's _The
|
||
Prince_ which deserves study and thought.
|
||
|
||
To ban viruses, to ban worms is to ban the free expression and the
|
||
free thought of the artist. Yes, they should be stopped, but so
|
||
should the genocide proscribed in _Mein Kampf_. However, neither the
|
||
writing of _Mein Kampf_ nor the writing of viruses should be
|
||
disallowed and neither should their reading be restricted since if
|
||
nothing else both serve as a warning of what could happen if a
|
||
brilliant madman bent on killing and destruction is given an
|
||
opportunity to fulfill those psychotic fantasies.
|
||
|
||
For those programmers out there who have dabbled in Object Oriented
|
||
Programming (OOP), this relationship between art and programming
|
||
should be even clearer. In OOP, each part of the program is an actor
|
||
("who struts and frets" -- thanks, Bill) whose dialogue with the other
|
||
actors (objects) creates the play. Each object has his own
|
||
personality and capabilities, and, sadly enough, tragic flaws as well.
|
||
|
||
Now as for copyrighting and patenting and other such topics, I give
|
||
you this to think about. Who is the truer author of a great work:
|
||
Jackie Collins or Edgar Allen Poe? Why would each copyright? One
|
||
would copyright to protect their income, the other to protect their
|
||
child borne of their artistic expression. Computer programs should be
|
||
allowed protection in various forms, but to protect the inspiration
|
||
and expression within and not the dollar value generated by them. To
|
||
do so cheapens them and turns them into nothing more than trash
|
||
romance novels. Both may serve their purpose and be useful, but only
|
||
one is a great work -- the intent of the author comes from his soul as
|
||
well as his work, and only those of the purest origins will be great
|
||
while the others may only be useful.
|
||
|
||
Like many artists, the programmer pours his blood and sweat, his heart
|
||
and soul into his work. It is his child, a creation from his brow and
|
||
hand, and he loves it as such.
|
||
|
||
The essence of programming is the essence of the artist within the
|
||
programmer. To cheapen it by calling it a "product" is like calling
|
||
the "Mona Lisa" a product. Sure a price value can be placed on the
|
||
Mona Lisa, but the value stems from the affect that Leo's paint has
|
||
upon the observer, and not a sum cost of materials and labor so that a
|
||
profit of an acceptable margin is met and maintained.
|
||
|
||
Those who aren't programmers may not understand what I am talking
|
||
about, and there are programmers out there who may not understand what
|
||
I am talking about. However a select few may understand what I am
|
||
saying, and they are the true programmers and the true artists of
|
||
Cyberspace. Within them is the essence of the programmer and within
|
||
their source code is the essence of programming: their souls.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 9 Oct 1992 13:40:01 EDT
|
||
From: Jeff Johnson <jjohnson@HPLJAJ.HPL.HP.COM>
|
||
Subject: File 4-- CPSR Social Action Report
|
||
|
||
TOWARDS A GUIDE TO SOCIAL ACTION FOR COMPUTER PROFESSIONALS
|
||
|
||
By Jeff Johnson, Chair, and Evelyn Pine, Managing Director,
|
||
Computer Professionals for Social Responsibility (CPSR)
|
||
|
||
Introduction
|
||
|
||
"Being a typical nerd programmer, it's always been comforting
|
||
to believe that somehow whatever I was working on in the
|
||
darkness of my cubicle would eventually benefit the world. ...
|
||
I focused on what was interesting to me, assuming that it
|
||
would also be important to the world. But the events in L.A.
|
||
have forced me to think that maybe it doesn't work that way;
|
||
and to confront the question: what can I, as a professional
|
||
in the HCI field, do to help change what's going on in the
|
||
world?" -- a CHI'92 attendee.
|
||
|
||
The Rodney King video, trial, verdict, and subsequent riots jolted
|
||
Americans in many ways besides showing us acts of violence committed
|
||
by police and citizens. It also made the inequities of American
|
||
society painfully clear, and provided a clear response to Langston
|
||
Hughes' question: "What happens to a dream deferred?" Answer: it
|
||
explodes. This caused many people to rethink how they are conducting
|
||
their lives, and how we are conducting our neighborhoods, our cities,
|
||
our states, and our nation.
|
||
|
||
Computer professionals have a relatively comfortable position in this
|
||
society. For the most part, we are well-paid, and our jobs are more
|
||
secure than most. As a result, we live in nicer neighborhoods, send
|
||
our kids to better schools, eat healthier food, use better tools, and
|
||
have access to better health care. Because of this, some of us feel a
|
||
responsibility to help those in our society who aren't so well-off,
|
||
and some of us don't.
|
||
|
||
However, computer professionals are not just another well-paid segment
|
||
of society. We, more than people in most other lines of work, create
|
||
world-changing technology, technology that profoundly affects how
|
||
people live, work, and die. We can create technology that, e.g., can
|
||
be used to improve neighborhoods, education, food production and
|
||
distribution, tools, and health care. We can also create technology
|
||
that can be used to keep the poor out of our neighborhoods and
|
||
schools, produce and sell junk food and worthless tools, and limit
|
||
access to health care, as well as keep the lid on discontent and even
|
||
kill people more efficiently.
|
||
|
||
Computer technology can help reduce inequity and it can also help
|
||
exacerbate it. The public learned of the King beating because of
|
||
technology in the hands of citizens. Today anyone with a PC, an
|
||
ink-jet printer, and a copier can produce documents that political
|
||
activists of just thirty years ago, cranking out smelly typewritten
|
||
ditto copies, never imagined. Citizens of China and Thailand used
|
||
fax, video, and electronic mail to document government repression of
|
||
democratic movements. Computer technology is a crucial ingredient of
|
||
all of the above, in their design and manufacture as well as in the
|
||
tools themselves.
|
||
|
||
Unfortunately, the effect of introducing computer technology has more
|
||
often been to increase the stratification of society. Let's face it:
|
||
computer systems often lead to loss of jobs. Furthermore, as the
|
||
infrastructure upon which society is based becomes more dependent upon
|
||
computer technology, those without technical skills are left behind.
|
||
The end of the Cold War and the recession, combined with the
|
||
introduction of computer technology, have served to exacerbate
|
||
joblessness and hopelessness for those who have been rendered
|
||
superfluous and don't have the education to become "knowledge
|
||
workers."
|
||
|
||
"How many of the projects that are funded will have a net result of
|
||
reducing jobs -- particularly jobs for less-educated people? ... I
|
||
find many in the computer industry have defensive rationalizations
|
||
for the fact that their own labor will result in the loss of jobs
|
||
to society. ... The up and coming area of software that I myself
|
||
work in -- workflow -- will automate people out of work. ... How
|
||
do we deal with this?" -- A CHI'92 attendee.
|
||
|
||
This special relationship between computer technology and society
|
||
gives those who develop it -- us -- responsibilities beyond any that
|
||
arise merely from our comfortable economic status. To quote from the
|
||
statement of purpose of Computer Professionals for Social
|
||
Responsibility (CPSR): "Decisions regarding the development and use
|
||
of computers ... have far-reaching consequences and reflect basic
|
||
values and priorities. We believe that computer technology should
|
||
make life more enjoyable, productive, and secure."
|
||
|
||
The King riots jolted us, causing many of us to reflect on whether we
|
||
are living up to our responsibilities as citizens and as computer
|
||
professionals. The contrast between the world we inhabit, of which
|
||
the CHI'92 conference is a part, and the one that exploded into
|
||
violence and flames the week before the conference, caused some of us
|
||
to feel a certain alienation from our work, as the opening quotation
|
||
of this article illustrates. Are we part of the solution, or part of
|
||
the problem? Also, as the effects of the riots rapidly spread to
|
||
surrounding neighborhoods, other cities, and even the presidential
|
||
campaign, it became obvious that the two "worlds" aren't really
|
||
separate. That burning society we saw on TV wasn't someone else's, it
|
||
was ours.
|
||
|
||
What Can I Do? -- The CPSR/CHI'92 "Social Issues" Session
|
||
|
||
In the midst of the worst period of rioting, as many of us were
|
||
preparing to head to Monterey, the site of CHI'92, Prof. Chris Borgman
|
||
of U.C.L.A. sent an e-mail message to several of her acquaintances
|
||
across the country, describing what was going on in L.A. and how she
|
||
and her friends there felt about it (see Shneiderman, 1992). Prof.
|
||
Ben Shneiderman was especially touched by the message. He contacted
|
||
the CHI'92 Co-Chairs, Jim Miller and Scooter Morris, and expressed his
|
||
desire that the conference should not run its course without
|
||
acknowledging the riots and the events that led up to them. Even
|
||
though the riots were not directly CHI- or computer-related, he felt
|
||
that ignoring them constituted burying our heads in the sand, and
|
||
would be morally wrong. Jim and Scooter agreed that something should
|
||
be done, but of course by that point the conference schedule was set.
|
||
They suggested a special session, during the lunch break just after
|
||
the official opening plenary session on Tuesday. Jim also suggested
|
||
that CPSR Chair Jeff Johnson be invited to help plan the session.
|
||
|
||
On Monday evening, Ben and Jeff met to plan the session. What quickly
|
||
emerged was a desire not only to acknowledge the distressing external
|
||
events and give people a chance to vent their spleens, but also to
|
||
help give people the wherewithal to act. To Ben and Jeff, it seemed
|
||
that many of their colleagues were angry, upset, worried, or
|
||
frightened about what was going on, but didn't know what to do about
|
||
it, or even how to find out. They decided that the session should be
|
||
an opportunity for people to share ideas on how computer
|
||
professionals, their employers, and their professional societies can
|
||
help address social problems of the sort that led to the riots. Jeff
|
||
proposed that to facilitate the capture and sharing of ideas, session
|
||
attendees be asked to submit ideas on paper as well as presenting them
|
||
verbally. CPSR volunteered to collect and compile the responses and
|
||
issue a report back to the attendees. Later that night, he created a
|
||
form for action-ideas, labeled "Constructive Responses to Events in
|
||
L.A. and Elsewhere," and made about 60 copies to cover the expected
|
||
audience.
|
||
|
||
The next morning, at the opening plenary session, Jim Miller announced
|
||
the special session. This was the first that the approximately 2500
|
||
attendees at CHI had heard of it.
|
||
|
||
At the announced time, despite the late notice and the conflict with
|
||
lunch, approximately 300 people showed up. Student volunteers quickly
|
||
went to make more copies of the "Constructive Responses..." form. Ben
|
||
Shneiderman expressed his delight at the number of people who had come
|
||
and opened the session, describing his feelings about the riots,
|
||
reading Chris Borgman's e-mail message, and giving the intent of the
|
||
session. Prof. Borgman then spoke, elaborating on her message and
|
||
giving her ideas about what people might do. She was followed by Jeff
|
||
Johnson, who talked about growing up in South Central L.A., what it is
|
||
like for his relatives who live there now, and about CPSR and some of
|
||
its
|
||
programs.
|
||
|
||
Members of the audience were then invited to the microphone to share
|
||
their ideas about what can be done to resolve social inequities. At
|
||
first, people were hesitant to speak, but within fifteen minutes or so
|
||
there were more people waiting to speak than there was time for. Some
|
||
people described volunteer work they do, some named organizations they
|
||
support, some talked about what companies do or should do, and some
|
||
talked about what various government bodies should be, but aren't,
|
||
doing.
|
||
|
||
Beyond CHI'92
|
||
|
||
One hundred and ten members of the audience wrote suggestions on the
|
||
forms and turned them in. After the conference, CPSR began the
|
||
process of compiling the responses and producing the promised report.
|
||
We found volunteers to put the responses on-line. We created an
|
||
e-mail distribution list consisting of respondents who had provided
|
||
e-mail addresses. We took a quick pass through the data, to see if it
|
||
contained ideas worth publishing and sharing. It did.
|
||
|
||
On the basis of our initial look at the responses, the report began to
|
||
take shape in our minds. We didn't think it would suffice to simply
|
||
list all of the ideas that the session attendees had written. A quick
|
||
query sent to the e-mail list confirmed this: session participants
|
||
didn't want the raw data or even lightly-digested data; they wanted a
|
||
well-digested, well-organized guide to social action, a resource
|
||
booklet that goes beyond what people put on their response forms. Not
|
||
everyone has been a volunteer or activist, and even those of us who
|
||
have can benefit from a complete guidebook on how to make a positive
|
||
contribution to society.
|
||
|
||
Producing such a comprehensive report presented CPSR with a challenge,
|
||
for it would require a significant amount of work. For instance, many
|
||
respondents mentioned organizations, but it was up to us to provide
|
||
contact addresses. We also found some suggestions to be out-of-date,
|
||
e.g., organizations that have changed policies. The research
|
||
necessary to produce such a report in the months following CHI'92
|
||
exceeds what CPSR's small staff and volunteer-base can deliver. To
|
||
produce the full report would require funding to allow us to pay for
|
||
some of the labor. We made some initial efforts to get funding, so
|
||
far without success. Nonetheless, we were committed to producing a
|
||
timely report for the CHI'92 session attendees. With encouragement
|
||
from Ben Shneiderman, the two of us decided to write a brief version
|
||
of the report for SIGCHI Bulletin. Hopefully, this brief initial
|
||
report will help attract funding for a full report.
|
||
|
||
This report is therefore intended to be the first deliverable of a
|
||
possible new CPSR project that would, if funded, provide computer
|
||
professionals with information and guidance on how to become "part of
|
||
the solution" to pressing social problems. Depending upon funding,
|
||
subsequent deliverables may include:
|
||
|
||
- a moderated e-mail discussion list on social involvement, - an
|
||
e-mail archive/server for information on social involvement, - the
|
||
aforementioned booklet: "A Guide to Social Action" for computer
|
||
professionals, suitable for companies to distribute to employees,
|
||
containing an overview of the ways to get involved, a categorized
|
||
list of ideas, a directory of organizations, some success examples,
|
||
with a sprinkling of interesting quotes from attendees of the CHI'92
|
||
special session. - a clearinghouse service to help computer
|
||
professionals and companies down the road toward social involvement.
|
||
|
||
In this initial report, we chose to focus on a few of the
|
||
most-commonly-suggested ideas, rather than present a shallow overview
|
||
of all of them. A more complete list will have to wait until the
|
||
booklet. We begin with some comments on what we have learned from
|
||
this exercise, then summarize a few of the suggestions, and conclude.
|
||
|
||
What have we learned from this?
|
||
|
||
"Tell me how I can help." -- a CHI'92 attendee.
|
||
|
||
Despite the stereotype of the apolitical, work-obsessed nerd, computer
|
||
professionals do care about what goes on in the world. Many are
|
||
already involved in volunteer projects, political action, and
|
||
critically examining the impact of their work. More importantly, many
|
||
more are looking for ways to get involved. The King riots really
|
||
shook up a lot of people.
|
||
|
||
The respondents see potential in themselves, their companies, and
|
||
their professional associations, but are concerned that social issues
|
||
often get lost in the shuffle of busy people and companies.
|
||
|
||
CHI conference attendees may not be representative of computer
|
||
professionals in general. Their professional focus on the interaction
|
||
between people and machines may make them more likely to be concerned
|
||
about social issues. However, CPSR members nationwide -- who are not
|
||
predominantly CHI members -- have been proving for over a decade that
|
||
a computer career and interest in social issues are not mutually
|
||
exclusive.
|
||
|
||
There is no shortage of good ideas about how to get involved. The
|
||
hundred and ten respondents in the CPSR-CHI special session have
|
||
provided a first glimpse, but our feeling is that many more good ideas
|
||
remain to be suggested.
|
||
|
||
Many individuals, organizations, and companies are already doing
|
||
things that we can learn from. We needn't design from scratch.
|
||
|
||
Summary of Responses
|
||
|
||
"Education is the single most effective and powerful way to change
|
||
the situation in a permanent way." -- a CHI'92 attendee.
|
||
|
||
Our respondents overwhelmingly saw education as fundamental. They
|
||
believe that individuals, companies, professional societies, and
|
||
various levels of government could be doing much more to support
|
||
education than they now are. For example:
|
||
|
||
- Individuals can tutor disadvantaged kids, teach computer courses
|
||
or run computer labs in schools, and speak in schools about their
|
||
company and their work.
|
||
- Companies can adopt a school, donate equipment and software, and
|
||
establish programs in which students visit the workplace to learn what
|
||
computer professionals do and what skills they need.
|
||
- Professional societies can provide scholarships for high school
|
||
kids, encourage individuals and companies to develop education
|
||
applications of computer technology, and advocate greater public
|
||
funding of education.
|
||
|
||
Many respondents suggested that individuals and companies donate new
|
||
and used computer equipment to schools, community centers, and
|
||
non-profit organizations. However, some pointed out that giving
|
||
antiquated, unreliable, or inappropriate equipment is almost worse
|
||
than unhelpful, in that it can drain valuable time and energy from the
|
||
important work that these organizations do. Accordingly, many
|
||
non-profits will not accept equipment for which they can no longer
|
||
find software, documentation, and maintenance support. To help insure
|
||
that donated equipment is effectively used, computer professionals can
|
||
donate time and expertise. Otherwise, donated equipment may just sit
|
||
in a
|
||
corner.
|
||
|
||
Not surprisingly, volunteerism is strongly advocated by our
|
||
respondents. Some of their suggestions are:
|
||
|
||
- Individuals can volunteer in computer labs, get involved with a
|
||
organizations that link volunteers with non-profit groups (e.g.,
|
||
CompuMentor), or even teach reading in an urban library. A frequent
|
||
comment was that literacy is more important than computer literacy.
|
||
- Companies can encourage volunteerism by helping match willing
|
||
employees with worthy organizations, by allowing employees to share
|
||
their skills on company time, and by honoring employees' volunteer
|
||
efforts.
|
||
- Professional societies can encourage volunteerism among
|
||
professionals by developing mentor programs in which members work with
|
||
urban youth, and by developing computer curricula that professionals
|
||
can take into volunteer teaching situations.
|
||
|
||
"I read to primary students one-half hour per week. I get more out
|
||
of that time than the kids, but their focus on me tells me they are
|
||
getting a lot out of my time also." -- a CHI'92 attendee.
|
||
|
||
Several respondents who are involved in volunteer work noted that
|
||
volunteering has value far beyond that of the actual work that
|
||
volunteers do. It helps build much-needed understanding and trust
|
||
between ethnic and socioeconomic groups. It also is beneficial to the
|
||
volunteers themselves: they gain teaching experience, social skills,
|
||
and a broader perspective on the society in which they live, and often
|
||
have fun while doing it.
|
||
|
||
Computer professionals have learned that access to on-line
|
||
communication and information services is a powerful tool for their
|
||
own education, communication, and activism. We found that many of
|
||
them believe that on-line access would be just as empowering for the
|
||
public at large. Middle-class Americans are already beginning to get
|
||
on-line, but individuals, companies, and professional societies can
|
||
make an extra effort to assure that the poor are not cut out of the
|
||
loop. Individuals, companies, and professional societies can help put
|
||
communities on-line, as has been done in Berkeley (Community Memory
|
||
Project) and Santa Monica (Public Education Network). Such networks
|
||
can facilitate communication and discussion not only with other
|
||
citizens of a local community, but, depending on how they are
|
||
connected to larger networks, with information service providers and
|
||
even elected representatives.
|
||
|
||
"Companies can actively recruit blacks and other minorities. I
|
||
have been at CHI for 2 1/2 days and have seen only two blacks with
|
||
CHI name tags." -- a CHI'92 attendee.
|
||
|
||
More of a commitment to affirmative action in hiring and promotion is
|
||
seen as a major way in which companies can help overcome social
|
||
inequities. This means making an extra effort to find qualified
|
||
minorities and women to fill jobs, and, when candidates are equally
|
||
qualified (i.e., the difference in their estimated ability to perform
|
||
the job is less than the margin of error of the assessment process),
|
||
giving the benefit of the doubt to minorities and women. Some
|
||
respondents suggested, for example, that companies hold outreach
|
||
activities in poor communities to find potential employees.
|
||
|
||
The respondents recommended awards as a way to encourage computer
|
||
companies, academic research projects, and individuals to get
|
||
involved.
|
||
Each year, CPSR recognizes a computer scientist who, in addition to
|
||
making important contributions to the field, has demonstrated an
|
||
ongoing commitment to working for social change. (ACM activist and
|
||
IBM researcher Barbara Simons is CPSR's 1992 Norbert Wiener Award
|
||
winner.) Many respondents suggested that SIGCHI or ACM offer an award
|
||
for companies that demonstrate a similar commitment through community
|
||
projects, encouraging employee volunteerism, or other good works.
|
||
|
||
The CHI conference itself emerged as an important potential focus of
|
||
social action work. Respondents recommended that CHI organizers seek
|
||
ways to have a positive impact upon the host community. Local
|
||
students -- high-school and college -- could be given tours of
|
||
exhibits or scholarships to attend the conference. Equipment used at
|
||
the conference could be donated to local schools and organizations.
|
||
Respondents also suggested paper and poster sessions devoted to
|
||
applying technology to social problems or to understanding social
|
||
issues related to computer technology.
|
||
|
||
"What's underneath are not wounds, but faults -- lines of fracture,
|
||
of discontinuity, in society, which periodically relieve their
|
||
stress in these violent ways. What can we do about that?" -- a
|
||
CHI'92 attendee.
|
||
|
||
Although our respondents provided a wealth of ideas for how we, as
|
||
computer professionals and concerned citizens, can offer our time and
|
||
skills for the betterment of society, a number of them acknowledged
|
||
that charity, volunteering, and technology alone cannot solve
|
||
political and social problems. Closing the gap between rich and poor,
|
||
educated and illiterate, empowered and disenfranchised will require
|
||
changes in basic priorities at the local, state, national, and
|
||
international levels. Accordingly, many respondents recommended
|
||
attempting to influence the political process, either individually,
|
||
through professional associations, or through organizations like CPSR.
|
||
|
||
Conclusions
|
||
|
||
"Thanks for the noontime meeting on Tuesday! It was motivating to
|
||
see such a strong response." -- a CHI'92 attendee.
|
||
|
||
"Thank you, thank you, thank you for organizing this forum and
|
||
bringing some heart and spirit into this cold, albeit exciting,
|
||
environment. Onwards and upwards, I'm with you all the way!" -- a
|
||
CHI'92 attendee.
|
||
|
||
"What a wonderful experience to find a humanistic island at a
|
||
professional conference!" -- a CHI'92 attendee.
|
||
|
||
The unexpectedly large response to the noontime session at CHI'92 was
|
||
extremely gratifying. Also gratifying is the degree of concern that
|
||
members of the CHI community have about social inequities and the
|
||
seriousness with which they addressed themselves to overcoming them.
|
||
Hopefully, with this report as inspiration, many computer
|
||
professionals will begin to take action.
|
||
|
||
"I'll go back and start asking questions in my company." -- a
|
||
CHI'92 attendee.
|
||
|
||
The foregoing has only scratched the surface of the ideas that emerged
|
||
from the CHI'92 social issues session. As described above, CPSR hopes
|
||
to expand this report into a widely-circulated Social Action Guide,
|
||
and eventually provide on-line services to help computer professionals
|
||
take action.
|
||
|
||
To learn more about Computer Professionals for Social Responsibility,
|
||
or to get involved in the preparation of the full Social Action Guide,
|
||
contact cpsr@csli.stanford.edu.
|
||
|
||
References
|
||
|
||
Shneiderman, B. "Socially Responsible Computing I: A Call to Action
|
||
Following the L.A. Riots" SIGCHI Bulletin, July, 1992, 24(3), pages
|
||
14-15.
|
||
|
||
------------------------------
|
||
|
||
Date: 16 Oct 92 23:59:59 GMT
|
||
From: jbcondat@ATTMAIL.COM
|
||
Subject: File 5--Making the News and Bookstands (Reprint)
|
||
|
||
MAKING THE NEWS AND BOOKSTANDS
|
||
(From "Intelligence Newsletter", No. 202 (Oct. 8, 1992), Page 5,
|
||
by O. Schimdt)
|
||
|
||
The computer virus "threat" is back in the news with a new study by
|
||
IBM specialist Jeffrey O. Kephart and on the bookstands with a French
|
||
do-it-yourself build-your-own manual on viruses. According to Kephart
|
||
of IBM's High Integrity Computing Laboratory, most previous theories
|
||
on the "social structure of computer use and networks were faulty":
|
||
not every machine could make contact with every other machine in one,
|
||
two or three "steps". Most individual computers are not connected to
|
||
others systems but only to their nearest neighbors. Therefore, most
|
||
infections take place not through networks, but through the physical
|
||
exchange of disks. Moreover, many of the 1,500 known viruses are not
|
||
good replicators and many are not destructive. Even the remaining
|
||
good replicators are "almost all defeated by normal anti-virus
|
||
programs." To advance knowledge such as this concerning viruses, Chaos
|
||
Computer Club France (CCCF) has decided to publish the French
|
||
trans-lation of "The Black Book of Computer Virus" by Mark Ludwig
|
||
"which was censored in the U.S." (French title, "C'est decide! J'ecris
|
||
mon virus," Editions Eyrolles). [...] The book contains "computer
|
||
codes for writing your own virus," but according to CCCF any such
|
||
virus can be defeated by normal anti-virus programs. Moreover, there
|
||
is no French law forbidding the publication of virus computer codes.
|
||
The book is intended for "responsible adults" and bears the warning
|
||
"Forbidden for readers not 18 years old".
|
||
*****
|
||
Jean-Bernard CONDAT (General Secretary)------Chaos Computer Club France [CCCF]
|
||
B.P. 8005, 69351 Lyon Cedex 08// France //43 rue des Rosiers, 93400 Saint-Ouen
|
||
Phone: +33 1 40101775, Fax.: +33 1 40101764, Hacker's BBS (8x): +33 1 40102223
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Oct 1992 23:33:18 CDT
|
||
From: John F. McMullen <mcmullen@well.sf.ca.us>
|
||
Subject: File 6--Legion Of Doom Connection With 911 Attacks Denied
|
||
|
||
NEW YORK, NEW YORK, U.S.A., 1992 OCT 16(NB) -- Members of the
|
||
well publicized group of computer hackers, The Legion of Doom, have
|
||
denied any connection with the recent alleged tampering with US and
|
||
Canadian 911 emergency systems. They have also told Newsbytes that the
|
||
Legion OT Doom (LOD) group has been defunct for a number of years.
|
||
|
||
The recent publicized quote by an arrested 23 year old New Jersey
|
||
man, identified only as Maverick, that he was a member of the Legion
|
||
of Doom and that the group's intent was "to attempt to penetrate the
|
||
911 computer systems and inflect them with viruses to cause havoc" has
|
||
infuriated many of the original group.
|
||
|
||
"Lex Luthor", one of the founders of LOD, told Newsbytes "As far as I
|
||
am concerned the LOD has been dead for a couple of years never to be
|
||
revived. Maverick was never in LOD. There have been 2 lists of
|
||
members (one in phrack and another in the lod tj) and those lists are
|
||
the final word on membership. There has been no revival of lod by me
|
||
nor other ex- members. We obviously cannot prevent copy-cats from
|
||
saying they are in lod. When there was an LOD, our goals were to
|
||
explore and leave systems as we found them. The goals were to expose
|
||
security flaws so they could be fixed before REAL criminals and
|
||
vandals such as this Maverick character could do damage. If this
|
||
Maverick character did indeed disrupt E911 service he should be not
|
||
only be charged with computer trespassing but also attempted murder.
|
||
911 is serious business."
|
||
|
||
Lex continued "I am obviously not affiliated with any type of illegal
|
||
activities whatever especially those concerning computer systems.
|
||
However, I do try to keep up with what's going on and have 2 articles
|
||
on computer security being prepared to be published. I won't say where
|
||
or what name I am using because if the editors know an ex-hacker is
|
||
trying to help society and help secure computer systems they probably
|
||
would not accept the article."
|
||
|
||
Captain James Bourque of the Chesterfield County, Virginia police and
|
||
the person who had quoted Maverick to the press, told Newsbytes that
|
||
Lex's comments were probably correct. He said "I don't think that
|
||
there is a connection with the original group. I think that this group
|
||
sort of took on the Legion of Doom Name and the causes that they think
|
||
the Legion of Doom might have been involved in."
|
||
|
||
Bourque also said "This group tried to publicize their activities by
|
||
calling the local ABC station here as well as ABC in New York. It was
|
||
not unusual for four or five of these individuals to set up a
|
||
telephone conference and then to try to bring down our local 911
|
||
system here by monopolizing the system -- it never worked but they
|
||
continued to try."
|
||
|
||
Bourgue told Newsbytes that the continuing investigation is being
|
||
carried out by local law enforcement agencies and that an investigator
|
||
from his organization was in Newark reviewing the evidence against
|
||
Maverick. He said "It's possible that the Secret Service will become
|
||
involved after the presidential election is over. They are very busy
|
||
now."
|
||
|
||
Mike Godwin , in-house counsel of the Electronic Frontier Foundation.
|
||
(EFF), an organization that has been involved in a number of cases
|
||
involving admitted LOD members, commented to Newsbytes "I don't
|
||
believe for a minute that this has anything to do with the real Legion
|
||
of Doom."
|
||
|
||
Phiber Optic, another ex-LOD member, told Newsbytes that he was
|
||
disturbed that the media accepted the designation of Maverick as LOD,
|
||
saying "If he said that he was a Martian, would they have put in the
|
||
paper that he was a Martian?"
|
||
|
||
Phiber had previously posted a comment on the Whole Earth 'Lectronic
|
||
Link (WELL) on the LOD announcement and it is reprinted with his
|
||
permission:
|
||
|
||
1) Kids prank 911.
|
||
2) Kids get caught for being jackasses.
|
||
3) One kid just happens to have a computer.
|
||
4) Now it's suddenly a 'hacker crime'.
|
||
5) Kid foolishly decides he's in the 'Legion of Doom' when he's
|
||
questioned,because he probably always wanted to be (his heroes!).
|
||
6) Media pukes on itself. ("This is a HEADLINE!!!")
|
||
There. Can we all grow up and move along now?
|
||
|
||
Emmanuel Goldstein, publisher of 2600 Magazine: The Hacker Quarterly,
|
||
also took issued with the designation of those arrested in New
|
||
Jersey and Canada as "hackers", telling Newsbytes "No where have I
|
||
seen any indication that these people were inside of a telephone
|
||
company computer. They were allegedly making vocal calls to the 911
|
||
services and trying to disrupt them. You certainly don't have to
|
||
be a genius to do that. Let's not demean hackers by associating them
|
||
with the kind of behavior that is alleged."
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.52
|
||
************************************
|
||
|
||
|
||
|