837 lines
34 KiB
Plaintext
837 lines
34 KiB
Plaintext
|
|
|
|
Computer underground Digest Sun April 30, 1995 Volume 7 : Issue 34
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copy Desecrator: Emo Shrdlu
|
|
|
|
CONTENTS, #7.34 (Sun, April 30, 1995)
|
|
|
|
File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
|
|
File 2--Clipper paper available for anon FTP
|
|
File 3--New Maillist battles Omnibus Terrorism Bill/Join NOW! (fwd)
|
|
File 4--Ohio Job Opening
|
|
File 5--making reality acceptable: cybercafe @ compress
|
|
File 6--Playing to Win in DC June 1-4
|
|
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 27 Apr 1995 02:14:46 -0400
|
|
From: "Robert A. Rosenberg" <hal9001@PANIX.COM>
|
|
Subject: File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
|
|
|
|
((MODERATORS' NOTE: We've received number of posts regarding the
|
|
so-called "Good Times" virus, and "warnings" have appeared on
|
|
many of the news groups we read. The following is unlikely to
|
|
end it until it's time to pay the modem tax)).
|
|
|
|
|
|
Originally from: <AMEND1-L%UAFSYSB.BITNET@UGA.CC.UGA.EDU>
|
|
|
|
At 18:04 4/26/95, 00bawhelchel@bsuvc.bsu.edu wrote:
|
|
[Another "Good Times" Virus Warning]
|
|
|
|
|
|
Here we go again <g>.
|
|
|
|
The "Good Times Virus" is a Urban Legend. In reality it is composed of the
|
|
mass mailing of spurious warnings like the above from those who
|
|
(admittedly) are trying to be helpful.
|
|
|
|
Here is the real story (Note that date on the warning to see how long this
|
|
BS has been going on).
|
|
|
|
================================================================
|
|
|
|
CIAC Notes
|
|
|
|
Number 94-04c:December 8, 1994
|
|
|
|
Welcome to the fourth issue of CIAC Notes! This is a special edition
|
|
to clear up recent reports of a "good times" virus-hoax. Let us know
|
|
if you have topics you would like addressed or have feedback on what
|
|
is useful and what is not. Please contact the editor, Allan L. Van
|
|
Lehn, CIAC, 510-422-8193 or send E-mail to ciac@llnl.gov.
|
|
|
|
Reference to any specific commercial product does not necessarily
|
|
constitute or imply its endorsement, recommendation or favoring by
|
|
CIAC, the University of California, or the United States Government.
|
|
|
|
|
|
THE "Good Times" VIRUS IS AN URBAN LEGEND
|
|
|
|
In the early part of December, CIAC started to receive information
|
|
requests about a supposed "virus" which could be contracted via
|
|
America OnLine, simply by reading a message. The following is the
|
|
message that CIAC received:
|
|
|
|
Here is some important information. Beware of a file called Goodtimes.
|
|
|
|
Happy Chanukah everyone, and be careful out there. There is a virus on America
|
|
Online being sent by E-Mail. If you get anything called "Good Times",
|
|
DON'T read it or download it. It is a virus that will erase your hard
|
|
drive. Forward this to all your friends. It may help them a lot.
|
|
|
|
THIS IS A HOAX. Upon investigation, CIAC has determined that this message
|
|
originated from both a user of America Online and a student at a university
|
|
at approximately the same time, and it was meant to be a hoax.
|
|
|
|
CIAC has also seen other variations of this hoax, the main one is that
|
|
any electronic mail message with the subject line of "xxx-1" will
|
|
infect your computer.
|
|
|
|
This rumor has been spreading very widely. This spread is due mainly
|
|
to the fact that many people have seen a message with "Good Times" in
|
|
the header. They delete the message without reading it, thus
|
|
believing that they have saved themselves from being attacked.
|
|
These first-hand reports give a false sense of credibility to the
|
|
alert message.
|
|
|
|
There has been one confirmation of a person who received a message
|
|
with "xxx-1" in the header, but an empty message body. Then, (in a
|
|
panic, because he had heard the alert), he checked his PC for viruses
|
|
(the first time he checked his machine in months) and found a
|
|
pre-existing virus on his machine. He incorrectly came to the
|
|
conclusion that the E-mail message gave him the virus (this particular
|
|
virus could NOT POSSIBLY have spread via an E-mail message). This
|
|
person then spread his alert.
|
|
|
|
As of this date, there are no known viruses which can infect merely
|
|
through reading a mail message. For a virus to spread some program
|
|
must be executed. Reading a mail message does not execute the mail
|
|
message. Yes, Trojans have been found as executable attachments to
|
|
mail messages, the most notorious being the IBM VM Christmas Card
|
|
Trojan of 1987, also the TERM MODULE Worm (reference CIAC Bulletin
|
|
B-7) and the GAME2 MODULE Worm (CIAC Bulletin B-12). But this is not
|
|
the case for this particular "virus" alert.
|
|
|
|
If you encounter this message being distributed on any mailing lists,
|
|
simply ignore it or send a follow-up message stating that this is a
|
|
false rumor.
|
|
|
|
Karyn Pichnarczyk
|
|
CIAC Team
|
|
ciac@llnl.gov
|
|
|
|
|
|
WHO IS CIAC?
|
|
|
|
CIAC is the U.S. Department of Energy's Computer Incident Advisory Capability.
|
|
Established in 1989, shortly after the Internet Worm, CIAC provides
|
|
various computer security services free of charge to employees and
|
|
contractors of the DOE, such as: Incident Handling consulting,
|
|
Computer Security Information, On-site Workshops, White-hat Audits.
|
|
|
|
CIAC is located at Lawrence Livermore National Laboratory and is a
|
|
part of its Computer Security Technology Center. CIAC is also a
|
|
founding member of FIRST, the Forum of Incident Response and Security
|
|
Teams, a global organization established to foster cooperation and
|
|
coordination among computer security teams worldwide.
|
|
|
|
|
|
CONTACTING CIAC
|
|
|
|
If you require additional assistance or wish to report a
|
|
vulnerability, call CIAC at 510-422-8193, fax messages to 510-423-8002
|
|
or send E-mail to ciac@llnl.gov.
|
|
|
|
ATTENTION: For emergencies and off-hour assistance, CIAC is available 24-hours
|
|
a day to DOE and DOE contractors via an integrated voicemail and
|
|
SKYPAGE number. To use this service, dial 1-510-422-8193 or
|
|
1-800-759-7243 (SKYPAGE). The primary SKYPAGE PIN number, 8550070 is
|
|
for the CIAC duty person. A second PIN, 8550074 is for the CIAC
|
|
Project Leader. Keep these numbers handy.
|
|
|
|
CIAC's ELECTRONIC PUBLICATIONS
|
|
|
|
Previous CIAC Bulletins and other information are available via
|
|
anonymous FTP from ciac.llnl.gov.
|
|
|
|
CIAC has several self-subscribing mailing lists for electronic publications:
|
|
|
|
1. CIAC-BULLETIN for Advisories, highest priority - time critical
|
|
information, and Bulletins, important computer security information;
|
|
2. CIAC-NOTES for Notes, a collection of computer security articles;
|
|
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
|
|
software updates, new features, distribution and availability;
|
|
4. SPI-NOTES, for discussion of problems and solutions regarding the
|
|
use of SPI products.
|
|
|
|
Our mailing lists are managed by a public domain software package called
|
|
ListProcessor, which ignores E-mail header subject lines. To subscribe
|
|
(add yourself) to one of our mailing lists, send requests of the
|
|
following form:
|
|
|
|
subscribe list-name LastName, FirstName PhoneNumber
|
|
|
|
as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES,
|
|
SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for
|
|
"LastName" "FirstName" and "PhoneNumber." Send to:
|
|
ciac-listproc@llnl.gov (NOT to: ciac@llnl.gov)
|
|
|
|
e.g.,
|
|
|
|
subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36
|
|
subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36
|
|
|
|
You will receive an acknowledgment containing address and initial PIN,
|
|
and information on how to change either of them, cancel your
|
|
subscription, or get help.
|
|
|
|
To subscribe an address which is a distribution list, first subscribe
|
|
the person responsible for your distribution list. You will receive an
|
|
acknowledgment (as described above). Change the address to the
|
|
distribution list by sending a second E-mail request. As the body of
|
|
this message, substitute valid information for "list-name," "PIN", and
|
|
"address of the distribution list" when sending
|
|
|
|
E-mail to ciac-listproc@llnl.gov:
|
|
|
|
set list-name address PIN distribution_list_address
|
|
e.g., set ciac-notes address 001860 remailer@tara.georgia.orb
|
|
|
|
To be removed from a mailing list, send the following request via
|
|
|
|
E-mail to ciac-listproc@llnl.gov:
|
|
|
|
unsubscribe list-name
|
|
e.g., unsubscribe ciac-notes
|
|
|
|
For more information, send the following request:
|
|
|
|
help
|
|
|
|
If you have any questions about this list, you may contact the list's owner:
|
|
listmanager@cheetah.llnl.gov.
|
|
|
|
This document was prepared as an account of work sponsored by an agency of the
|
|
United States Government. Neither the United States Government nor the
|
|
University of California nor any of their employees, makes any
|
|
warranty, express or implied, or assumes any legal liability or
|
|
responsibility for the accuracy, completeness, or usefulness of any
|
|
information, apparatus, product, or process disclosed, or represents
|
|
that its use would not infringe privately owned rights. Reference
|
|
herein to any specific commercial products, process, or service by
|
|
trade name, trademark, manufacturer, or otherwise, does not
|
|
necessarily constitute or imply its endorsement, recommendation or
|
|
favoring by the United States Government or the University of
|
|
California. The views and opinions of authors expressed herein do not
|
|
necessarily state or reflect those of the United States Government or
|
|
the University of California, and shall not be used for advertising or
|
|
product endorsement purposes.
|
|
|
|
End of CIAC Notes Number 94-04c 94_12_08
|
|
UCRL-MI-119788
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 27 Apr 1995 15:24:59 -0400 (EDT)
|
|
From: Michael Froomkin <mfroomki@UMIAMI.IR.MIAMI.EDU>
|
|
Subject: File 2--Clipper paper available for anon FTP
|
|
|
|
My paper, "The Metaphor is the Key: Cryptography, the Clipper Chip, and
|
|
the Constitution" is now available for anonymous FTP. It is about 180pp.
|
|
long, and contains more than 800 references.
|
|
|
|
I would welcome your feedback on this paper -- even (especially?)
|
|
contributions to the inevitable errata sheet.
|
|
|
|
(Please note this docment resides at what is officially a "temporary"
|
|
site, so that if you create a web link to it, please let me know so that
|
|
I can notify you when it moves).
|
|
|
|
Contents of FTP://acr.law.miami.edu/pub/..
|
|
|
|
File Type
|
|
--------------- ----------
|
|
clipper.asc ASCII
|
|
clipper.wp WP 5.1/Dos
|
|
clipperwp.zip Pkzipped version of clipper.wp
|
|
clipper.ps My best effort at Postscript. YMMV. (approx. 7Mb.)
|
|
clipperps.zip Pkzipped version of clipper.ps
|
|
clipper.ps.gz Gzipped version of clipper.ps
|
|
|
|
Ports provided by nice people (please note I have not checked these)
|
|
------------------------------------------------------------------------
|
|
clipper.ps.Z Unix compressed version of clipper.ps with carriage
|
|
returns removed -- courtesy of Whit Diffie
|
|
clipperMSW.sea.hqx Binhexed self-extracting Microsoft Word 5.1 for
|
|
Macintosh version of clipper.wp -- courtesy
|
|
of Ted Byfield
|
|
|
|
None of these files contains correct and final page numbers, and there are
|
|
generally trivial typos that were corrected in the printed version. The
|
|
printed version appears at 143 U.Penn.L.Rev. 709 (1995).
|
|
|
|
I intend to put up a web version presently. The .index file in the above
|
|
directory will have details when a clean copy is ready for prime time. A
|
|
link to an experimental and highly buggy HTMLized version may appear at
|
|
erratic intervals at http://acr.law.miami.edu at the very bottom of the
|
|
homepage.
|
|
|
|
A.Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
|
|
Associate Professor of Law |
|
|
U.Miami Law School | MFROOMKI@UMIAMI.IR.MIAMI.EDU
|
|
PO Box 248087 |
|
|
Coral Gables, FL 33146 USA | It's warm here.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 28 Apr 95 13:18:13 EDT
|
|
From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
|
|
Subject: File 3--New Maillist battles Omnibus Terrorism Bill (fwd)
|
|
|
|
Obviously, CUD would be impacted by this legislation if enacted,
|
|
as would we all.
|
|
===========================
|
|
|
|
W. K. Gorman <bj496@Cleveland.Freenet.Edu>
|
|
|
|
Copyright (C) 1995 by W. K. Gorman.
|
|
With explicit reservation of all rights, exclusively and without prejudice,
|
|
per UCC 1-207. Any commercial or for-profit use of all or any part of this
|
|
message, in any form, is expressly forbidden. Opinions are my own.
|
|
----------------------------Original message----------------------------
|
|
Date--Fri, 28 Apr 1995 03:43:29 -0400
|
|
From--pc-man@netaxs.com (Howard L. Bloom)
|
|
Subject--New Maillist battles Omnibus Terrorism Bill/Join NOW!
|
|
|
|
The Omnibus Counterterrorism Bill was languishing in Congress before
|
|
The Oklahoma Bombing. It is now on the fast track and needs to be stopped
|
|
or at least changed drastically so that it does not infringe on our
|
|
rights as Citizens. A concise description of what this bill represents
|
|
follows the subscribe information to this list.
|
|
|
|
Please post information relevant to fighting or making this bill more
|
|
constitutional as this bill in both the house and senate makes a mockery
|
|
of the constituiton. This is a non-partison issue that has people on
|
|
the right, the left and the middle raising eyebrows. THIS IS NOT A
|
|
RIGHT WING ANGRY WHITE MALE ISSUE!
|
|
|
|
The listowner (me) is an Angry White Jewish Male who sees grave dangers
|
|
should it be voted on in its present state. This list is not going to be
|
|
a discussion list about whether the bill is good or bad, I think it is bad
|
|
and it is my list. So, if you think it is good, then feel free to join, but
|
|
do not inhibit or dilute the momentum of this list. I am a private
|
|
individual who pays for the list traffic on the webcom.com service.
|
|
|
|
If you would like to join you must decide whether you wish to join the
|
|
reflected list where each message sent creates a new message in your
|
|
mailbox, or the digest which lumps them all together for the day and
|
|
sends many messages in one email post.
|
|
|
|
To Join, send a message to one of the following addresses:
|
|
|
|
Tono-terrorism-bill-request@webcom.com (this is the refelected list)
|
|
Tono-terrorism-bill-digest-request@webcom.com (this is the digest)
|
|
Fromyou
|
|
Subject(please leave the subject blank)
|
|
-------------------------------------------------
|
|
in the body of the message put just one word, the word "subscribe"
|
|
|
|
You do not have to put your name or email address.
|
|
|
|
And now a description of the Terrorism Bill
|
|
|
|
|
|
Omnibus Counterterrorism Bill - S. 390 and H.R. 896
|
|
|
|
New FBI Charter To Investigate Political Groups
|
|
|
|
February 10, 1995 the Omnibus Counterterrorism Bill was
|
|
introduced as S. 390 into the Senate and as H.R. 896 in the
|
|
House. It was initiated by the FBI, and passed on by the Justice
|
|
Department and the White House. Senators Biden (D-DE) and Specter
|
|
(R-PA) initiated it in the Senate, Rep. Schumer (D-NY) and Dicks
|
|
(D-WA) in the House. It has bipartisan support and could get
|
|
expedited action.
|
|
|
|
Summary
|
|
|
|
* This is a general charter for the FBI and other agencies,
|
|
including the military, to investigate political groups and
|
|
causes at will. The bill is a wide-ranging federalization of
|
|
different kinds of actions applying to both citizens and
|
|
non-citizens. The range includes acts of violence (attempts,
|
|
threats and conspiracies) as well as giving funds for
|
|
humanitarian, legal activity.
|
|
|
|
* It would allow up to 10 year sentences for citizens and
|
|
deportation for permanent resident non-citizens for the "crime"
|
|
of supporting the lawful activities of an organization the
|
|
President declares to be "terrorist", as the African National
|
|
Congress, FMLN in El Salvador, IRA in Northern Ireland, and PLO
|
|
have been labelled. It broadens the definition of terrorism. The
|
|
President's determination of who is a terrorist is unappealable,
|
|
and specifically can include groups regardless of any legitimate
|
|
activity they might pursue.
|
|
|
|
* It authorizes secret trials for immigrants who are not charged
|
|
with a crime but rather who are accused of supporting lawful
|
|
activity by organizations which have also been accused of
|
|
committing illegal acts. Immigrants could be deported1) using
|
|
evidence they or their lawyers would never see; 2) in secret
|
|
proceedings; 3) with one sided appeals; 4) using illegally
|
|
obtained evidence.
|
|
|
|
* It suspends posse comitatus - allowing the use of the military
|
|
to aid the police regardless of other laws.
|
|
|
|
* It reverses the presumption of innocence - the accused is
|
|
presumed ineligible for bail and can be detained until trial.
|
|
|
|
* It loosens the rules for wiretaps. It would prohibit probation
|
|
as a punishment under the act - even for minor nonviolent
|
|
offenses.
|
|
|
|
Implications
|
|
|
|
* Those who remember the McCarran Walter Act will recognize this
|
|
bill, only in some ways this is broader and potentially more
|
|
dangerous.
|
|
|
|
* This bill is highly politicalthe President can determine who
|
|
is a terrorist and change his/her mind at will and even for
|
|
economic reasons. The breadth of its coverage would make it
|
|
impossible for the government to prosecute all assistance to
|
|
groups around the world that have made or threatened to commit
|
|
violent acts of any sort. Necessarily its choices would be
|
|
targeted at organizations the government found currently
|
|
offensive. People to be deported would be chosen specifically
|
|
because of their political associations and beliefs.
|
|
|
|
* The new federal crimeinternational terrorism doesn't cover
|
|
anything that is not already a crime. As the Center for National
|
|
Security Studies notes"Since the new offense does not cover
|
|
anything that is not already a crime, the main purpose of the
|
|
proposal seems to be to avoid certain constitutional and
|
|
statutory protections that would otherwise apply."
|
|
|
|
* While many provisions of this bill could well be found
|
|
unconstitutional after years of litigation, in the mean time the
|
|
damage could be enormous to the First Amendment and other
|
|
constitutional rights including presumption of innocence and
|
|
right to bail.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 27 Apr 1995 08:14:50 -0700
|
|
From: Peter Miller <ptwnd@IGC.APC.ORG>
|
|
Subject: File 4--Ohio Job Opening
|
|
|
|
Job Posting -- Please Distribute:
|
|
================================
|
|
|
|
Ohio Community Computing Center Network Coordinator
|
|
|
|
The Ohio Community Computing Center Network (OCCCN) will be establishing
|
|
14 computer centers in low-income neighhborhoods in Cleveland, Columbus,
|
|
Dayton, Akron, Toledo, Youngstown, and Marietta. Funding for these
|
|
centers comes from the settlement of the Ameritech Alternative
|
|
Regulation case before the Ohio Public Utilities Commission. The OCCCN
|
|
seeks to hire a part-time Coordinator to assist these centers in
|
|
becoming operational and to provide ongoing support and coordination.
|
|
|
|
The OCCCN Coordinator will be based in Columbus and provide program and
|
|
technical assistance to each center, do outreach throughout the state,
|
|
and perform statewide administrative duties, under the direction of the
|
|
OCCCN Coordinating Committee, as follows:
|
|
|
|
|
|
1. Provide Ohio community computing centers with:
|
|
|
|
* assistance in becoming operational;
|
|
|
|
* assistance in making telecommunications arrangements for connecting
|
|
centers to each other and to the national information infrastructure;
|
|
|
|
* organization development assistance: planning and proposal
|
|
development, fundraising, publicity, and board development;
|
|
|
|
* program support: activities suggestions, technical support,
|
|
assistance in choosing software, hardware and consultants, and in
|
|
developing volunteer program;
|
|
|
|
* arrange for and participate in on-site visits and regional and
|
|
statewide gatherings/workshops.
|
|
|
|
|
|
2. Do outreach:
|
|
|
|
* identify and establish contact with similar programs;
|
|
|
|
* develop a pool of associates for the OCCCNetwork and coordinate
|
|
involvement of those doing related work in the region;
|
|
|
|
* attend regional meetings and conferences as appropriate.
|
|
|
|
|
|
3. Perform administrative duties statewide:
|
|
|
|
* actively facilitate and participate in online conferences for the
|
|
OCCCN;
|
|
|
|
* work with funders in developing financial support for statewide
|
|
and local coordination;
|
|
|
|
* participate in discussion of directions and goals for OCCCN and
|
|
involve involve centers in those discussions;
|
|
|
|
* review periodic financial and performance reports from each center;
|
|
summarize and report to the committee.
|
|
|
|
* provide timely reports regarding activity in the above roles.
|
|
|
|
The OCCCN Coordinators should be familiar with telecommunications and
|
|
with either Mac or IBM-compatible systems, their basic applications, and
|
|
trouble-shooting skills. The Coordinator should have community
|
|
organizing experience and orientation; educational and related community
|
|
technology experience will be particularly useful.
|
|
|
|
Please send resume and cover letter by May 12 to Ellis Jacobs, OCCCN
|
|
Coordinating Committee, Legal Aid Society of Dayton, Inc., 333 West
|
|
First St., Suite 500, Dayton, OH 45402.
|
|
|
|
===========================================================
|
|
Peter Miller
|
|
Playing to Win Network Director
|
|
Education Development Center 617/969-7101 x2727
|
|
55 Chapel St. FAX: 617/ 969-4902
|
|
Newton, MA 02158 ptwnd@igc.apc.org
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 30 Apr 1995 19:57:07 +0000
|
|
From: heath@CYBERCAFE.ORG(heath bunting)
|
|
Subject: File 5--making reality acceptable: cybercafe @ compress
|
|
|
|
cybercafe @ compress
|
|
|
|
when the external can not be understood
|
|
we DESIRE its transformation into our internal form
|
|
|
|
if you have anything you can not cope with
|
|
(e.g. ideas/people/cultures)
|
|
please send them to cybercafe and we will restructure them
|
|
for your pleasant CONSUMPTION
|
|
|
|
this will be accomplished using the new technique of
|
|
private SUBJECTIVE compression instead of public objectivity
|
|
|
|
(compression is the process of interpretation often resulting in LOSS)
|
|
|
|
subjective compression works through SELF reference and paradox.
|
|
searching recursively for the WHOLE in smaller and smaller
|
|
sections of itself, until all you have left is YOU.
|
|
|
|
when the world is like us we will no longer desire CHANGE
|
|
|
|
send the undigestible to:
|
|
4 egmont house
|
|
116 shaftesbury ave
|
|
london wv1 7dj
|
|
uk
|
|
|
|
or via our web form
|
|
http://www.cybercafe.org/cybercafe/compress.html
|
|
|
|
heath
|
|
|
|
cybercafe aims to promote/create spaces/situations in which
|
|
people can create/behave/express/experience
|
|
in ways unavailable in currently existing places
|
|
|
|
Domains of activity radio/tv/telephones/fax/
|
|
mailart/flyposting/performance/computer.
|
|
|
|
=-=-=-=-=-=-=-=-=-= uphold dignity/creativity =-=-=-=-=-=-=-=-=-=
|
|
|
|
heath@cybercafe.org vox 44 171 437 8584
|
|
http://www.cybercafe.org/cybercafe/ mbl 44 374 823 840
|
|
flat 4, 116 shaftesbury ave bbs 44 171 439 3998
|
|
london w1v 7dj UK
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 27 Apr 1995 08:23:46 -0700
|
|
From: Peter Miller <ptwnd@IGC.APC.ORG>
|
|
Subject: File 6--Playing to Win in DC June 1-4
|
|
|
|
For Immediate Distribution:
|
|
|
|
PLAYING TO WIN COMMUNITY COMPUTING CENTER NETWORK
|
|
Hosts 4th Annual Meeting in Washington DC
|
|
Friday, June 2 - Sunday, June 4, 1995
|
|
Future Center at the Capital Children's Museum
|
|
800 Third Street NE -- near Union Station
|
|
|
|
Thursday, June 1, 7:30 pm Kick Off with
|
|
Working Group Against Information Redlining Forum on
|
|
"Disenfranchised Communities and the Information Superhighway"
|
|
|
|
=======================================================================
|
|
|
|
Summary Program Schedule
|
|
|
|
Preliminary Program Thursday, June 1 7:30-9:30 - see below
|
|
|
|
Friday, June 2 - 9:00 am to 7:00 pm
|
|
|
|
Registration & Continental Breakfast
|
|
Panel presentation:
|
|
Issues of Access: The Best of Times, The Worst of Times --
|
|
* Mario Marino, Chairman, The Morino Institute, Reston, VA
|
|
* Laura Breeden, Director, Telecommunications and
|
|
Information Assistance Program, Washington, DC
|
|
* James Ferguson, Executive Director, National Coalition on
|
|
Black Voter Participation, Washington, DC
|
|
* Lauren-Glenn Davitian, Coordinator, Chittenden Community
|
|
Television, Burlington, VT
|
|
Focus Groups
|
|
Keynote Speaker: Elliot Soloway, Ph.D., Associate Professor of
|
|
Electrical Engineering & Computer Science, Artificial Intelligence
|
|
Lab, University of Michigan
|
|
Concurrent Presentations & Workshops:
|
|
Starting a Community Technology Center
|
|
Technology and Literacy
|
|
Managing Community Technology Programs
|
|
The PTW Network -- IGC Training for New Users
|
|
Role of Math and Science in Community Technology Programs
|
|
Volunteers: How to Find Them/How to Keep Them
|
|
Reception sponsored by The Morino Institute
|
|
|
|
Saturday, June 3 9:00 am to 5:45 pm
|
|
|
|
Registration & Continental Breakfast
|
|
Affiliate Presentations & Workshops:
|
|
The Whys and Hows of Public Access
|
|
Multimedia Projects
|
|
Integrating Technology: Video and Computers
|
|
IGC Telecommunications Training for Experienced Users
|
|
Role of Telecommunications in Community Technology Programs
|
|
Exploring Internet Resources
|
|
Telecommunication Projects
|
|
Tools Play: Using basic computer tools to create learning games
|
|
Math & Science Projects and Resources
|
|
Program Assessment and Evaluation
|
|
The PTW Network Agenda: 1995-96 and Beyond
|
|
|
|
Sunday, June 4 9:00 am to 1:00 pm
|
|
|
|
Regional and Steering Committee Meetings
|
|
|
|
+ + + + + + + + + + + + + + + + + + + +
|
|
|
|
Conference co-sponsors: The Capital Children's Museum, The Morino
|
|
Institute, The Legent Corporation, the National Science Foundation,
|
|
and Playing To Win, Inc.
|
|
|
|
Goals:
|
|
|
|
To provide opportunities for personal networking and for exchanging
|
|
information and experiences.
|
|
|
|
To enhance community-based technology programs by providing
|
|
technical training and program development information.
|
|
|
|
To explore and understand issues related to providing equity in
|
|
technology access at the local, regional and national levels.
|
|
|
|
Description:
|
|
|
|
The Annual All-Affiliates Meeting of The Playing To Win Network
|
|
brings together Network affiliate members, potential affiliates,
|
|
associates, friends, supporters and other persons interested in
|
|
learning more about how community-based technology programs can and
|
|
do provide technology access to underserved and disenfranchised
|
|
peoples. In addition to gaining practical program development
|
|
information, participants will learn how programs throughout the PTW
|
|
Network are working and collaborating to open the doors to
|
|
technology in their communities. Panel discussions, workshops, and
|
|
training sessions will be led by affiliate members, PTW Network
|
|
project staff and consultants, as well as representatives from
|
|
public policy and public interest organizations. Opportunities for
|
|
informal socializing will include group lunches and a Friday night
|
|
reception sponsored by The Morino Institute.
|
|
|
|
Registration and Lodging:
|
|
|
|
Representatives of the PTW Network and conference presenters do not
|
|
pay a registration fee. All other participants are charged $25 to
|
|
attend the conference ($35 at the door). To register in advance for
|
|
any day of the conference, contact Ruth Rappaport at RuthR@edc.org,
|
|
or 800/225-4276 x2329, with your name, address, organization, and
|
|
phone, and note whether you would like to take advantage of any of
|
|
the reserved lodging and for what dates. A block of rooms has been
|
|
reserved at the Radison Barcelo ($100 single; $113 double) and
|
|
Carlyle Suites ($89; $99) Hotels. A detailed conference information
|
|
packet will be mailed to all registered participants in May. This
|
|
packet will include the final program, schedule, maps, and
|
|
transportation information.
|
|
|
|
Travel:
|
|
|
|
Discounted airfare is available from US Air. Contact: Sally Kahn,
|
|
Stewart International Travel, 800-441-8666. Tell her you are attending
|
|
the PTW Network Conference in Washington DC.
|
|
|
|
|
|
=======================================================================
|
|
|
|
DISENFRANCHISED COMMUNITIES AND THE INFORMATION SUPERHIGHWAY
|
|
Co-Sponsored with
|
|
THE WORKING GROUP AGAINST INFORMATION REDLINING
|
|
|
|
Thursday, June 1st, 7:30 -- 9:30 p.m.
|
|
Radison Barcelo Hotel
|
|
2121 "P" St. NW
|
|
|
|
The Working Group Against Information Redlining, a coalition of
|
|
primarily Washington-based organizations concerned with low-income
|
|
community access to the National Information Infrastructure (NII),
|
|
and the Playing to Win Network of community technology centers invite
|
|
you to join us on June 1, from 7:30 to 9:30 p.m. to exchange ideas
|
|
and information on our efforts to ensure that the gap between the
|
|
haves and have-nots is not replicated (much less widened) in the
|
|
deployment of the Information Superhighway.
|
|
|
|
At the meeting on June 1st, we will distribute information about the
|
|
proposed community telecommunication forums and resources we are both
|
|
planning. We will want to discuss with you your possible
|
|
participation and your ideas about content and community needs.
|
|
|
|
WHAT WE ARE ABOUT:
|
|
|
|
Universal access has become a major concern in building the NII.
|
|
Community-based non-profits in rural and disdvantaged areas lack
|
|
affordable access to the information superhighway as well as a voice
|
|
in the development of the content it will carry. Will the
|
|
information be relevant to community needs? Will people have the
|
|
capacities and resources to make use of it and be active
|
|
contributors? If so, how will that be determined?
|
|
|
|
There is growing interest in people speaking for and about low-income
|
|
and other disenfranchised individuals. However, there is little in
|
|
the way of these individuals speaking for themselves in order to
|
|
shape the debate and policies in ways beneficial to them. In the
|
|
long run, empowering affected populations to speak for themselves
|
|
will be essential. Resources for using the NII are limited: when and
|
|
where communities have come to understand the real opportunities this
|
|
"highway" could open up for them -- access to education and
|
|
educational resources, access to medical information and (potentially
|
|
treatment), access to needed governmental information and benefits,
|
|
training opportunities, job opportunities -- they don't have the
|
|
resources (financial, human, or technical) to take advantage of what
|
|
is already available. Capacity building will be an essential
|
|
component even if the NII is technically designed to reach all
|
|
people.
|
|
|
|
Toward this end, the Working Group Against Information Redlining has
|
|
been meeting on a monthly basis since May 1994. The groups
|
|
participating -- OMB Watch, RTK NET (the Right-to-Know Network), the
|
|
Benton Foundation, Alliance for Public Technology, Alliance for
|
|
Community Media, the National Council of Nonprofit Associations, the
|
|
National Trust for the Development of African American Men, the
|
|
National Consumer Law Center and numerous others -- have developed a
|
|
proposal for community forums on non-profit access to and use of the
|
|
NII. The Playing to Win Network, consisting of over 50 neighborhood
|
|
community technology programs, is currently planning a program
|
|
focusing on using telecommunications to heighten participants'
|
|
interest in and involvement with local, state, and national policies
|
|
upon which their technology access rests.
|
|
|
|
These community forums and center resource projects will be discussed
|
|
at the June 1st gathering. For more information on the June 1st
|
|
program or either project, contact:
|
|
|
|
Patrice McDermott Peter Miller
|
|
OMB Watch Playing to Win Network
|
|
patricem@CapAccess.org ptwnd@igc.apc.org
|
|
202/234-8494 800/225-4276 x2727
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.34
|
|
************************************
|
|
|