719 lines
33 KiB
Plaintext
719 lines
33 KiB
Plaintext
|
|
Computer underground Digest Wed Feb 19, 1997 Volume 9 : Issue 10
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.10 (Wed, Feb 19, 1997)
|
|
|
|
File 1--Moldova Internet Scam
|
|
File 2--Clipper is dead, as we knew all along...
|
|
File 3--Re: Cu Digest, #9.09, Sun 16 Jan 97
|
|
File 4--Re: The Guardian Angels' The Face Project
|
|
File 5--Cyberpatrol now blocks my site
|
|
File 6--Internic DNS glitches
|
|
File 7--TIIAP Announces Availability of 1997 Funds
|
|
File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
Date: Thu, 20 Feb 1997 10:15:29 -0500 (EST)
|
|
From: Audrey Helou <audrey@angus.mystery.com>
|
|
Subject: File 1--Moldova Internet Scam
|
|
|
|
The Detroit Free Press ran an article that may be of interest to CuD
|
|
subscibers. It appears in the February 20, 1997 edition of the Detroit
|
|
News and is entitled "Feds expose Internet ring that cost thousands in
|
|
phone bills."
|
|
|
|
According to the article, the federal government busted an Internet scam
|
|
offering "free" erotic photos that came with software that secretly took
|
|
over users' computers and ran up huge international long-distance phone
|
|
bills.
|
|
|
|
It seems that some sites, such as www.beavisbutthead.com and
|
|
www.sexygirls.com had advertizements for "all nude all free" pictures.
|
|
However, getting the pictures required down a Windows 95 software
|
|
program that once installed, took control of the modem, cut off the
|
|
local Internet service provider, and dialed a number in the former
|
|
Soviet republic of Moldova, in Eastern Europe. The user, unaware of a
|
|
change, would continue to surf the web while racking up foreign line
|
|
toll charges of $2 to $3 a minute. According to the article, the modem
|
|
kept the connection, even after the user had logged off, until the
|
|
computer was itself turned off.
|
|
|
|
Profits were shared between the Moldovan phone company and the scam
|
|
artists.
|
|
|
|
The scheme was discovered by AT&T Corp. through its consumer watch
|
|
bureau, which monitors clients' phone bills for irregularities.
|
|
Consumers, whom the FTC says were defrauded of perhaps $1 million, may
|
|
get some money back, since the FTC won a U.S. District Court order in
|
|
New York seizing assets of the defendants: Audiotex Connect Inc., Promo
|
|
Line Inc., Electronics Form Management and the people associated with
|
|
them, Anna Grella, William Gannon and David Zeng.
|
|
|
|
------------------------------
|
|
|
|
Date: 19 Feb 97 11:09:19 EST
|
|
From: "K. N. Cukier" <100736.3602@CompuServe.COM>
|
|
Subject: File 2--Clipper is dead, as we knew all along...
|
|
|
|
From -- Fight Censorship <FIGHT-CENSORSHIP@vorlon.mit.edu>
|
|
|
|
Here's an article that ran on the death of the Clipper Chip (as
|
|
if anyone really thought the idea was still afloat...). I'm
|
|
unsure of the significance of the news -- my first impression is
|
|
that we sort of knew this. On the other hand, there are a few
|
|
whacky things in the article, it seems to me. First, they say
|
|
that Clipper will now be marketed to civilians -- yeah right;
|
|
sellers and users are smarter than that, and have much better
|
|
crypto options, obviously. Secondly, the article states that key
|
|
recovery doesn't access users' keys without their knowledge --
|
|
I'm not sure what systems the writers have in mind, but it's not
|
|
any system on this planet. Indeed, key recovery systems for the
|
|
export of strong crypto (where key recovery *matters* to the
|
|
government), as they have been approved by the US Department of
|
|
Commerce, aims to do just that: allow for secretive lawful access
|
|
of keys.
|
|
|
|
-- KNC
|
|
------------
|
|
|
|
FEBRUARY 17, 1997
|
|
Federal Computer Week
|
|
|
|
DOD sinks the Clipper
|
|
BY COLLEEN O'HARA AND HEATHER HARRELD
|
|
|
|
The Defense Department plans to remove the government key escrow
|
|
software from its Fortezza cards used on the Defense Message System, a
|
|
move that signals the death of the Clinton administration's
|
|
controversial Clipper initiative and one that should encourage
|
|
civilian use of the cryptographic cards.
|
|
|
|
A DOD spokeswoman confirmed the decision to remove the key escrow but
|
|
would not provide further details.
|
|
|
|
The DOD decision, which will be formalized in a policy expected out
|
|
shortly, is in response to the administration's decision last October
|
|
to support key recovery technology instead of the controversial
|
|
Clipper initiative. Each agency must decide how it will implement the
|
|
government's policy internally. A technical advisory committee will
|
|
develop standards for a federal key management infrastructure.
|
|
|
|
The so-called Clipper initiative proposed a nationwide standard for
|
|
encryption hardware that would have used a classified algorithm with
|
|
built-in law enforcement access. It is this built-in access - which
|
|
law enforcement agencies claimed was vital to their jobs - that will
|
|
be removed from the cards. It most likely will be replaced by emerging
|
|
commercial key recovery technology that does not have the same
|
|
built-in access.
|
|
|
|
DOD has for years pressured civilian agencies to use government escrow
|
|
technology, but the agencies were wary of the law enforcement access.
|
|
Stephen Walker, president and chief executive officer of Trusted
|
|
Information Systems Inc. (TIS), said the policy will remove the last
|
|
remnants of the Clipper and serve as an official endorsement of key
|
|
recovery technology.
|
|
|
|
"This is the end of Clipper,'' Walker said. "This is a very positive
|
|
move because it puts the Defense Department in a posture of using
|
|
commercial products instead of Defense Department products. If the
|
|
Defense Department is moving away from key escrow, no one else is
|
|
going to feel obligated to have key escrow either."
|
|
|
|
Civilian Agency Appeal? Removing government key escrow from Fortezza
|
|
cards, which are designed to provide authentication, integrity and
|
|
confidentiality to DMS users, could prompt civilian agencies to deploy
|
|
the cards to secure electronic mail or other communications, said
|
|
Santish Chok-hani, CEO of Cygnacom Solutions, a security consulting
|
|
company.
|
|
|
|
"If you take out the key escrow from Fortezza, that would mean a
|
|
broader set of civilian agencies and commercial folks could use the
|
|
technology without worrying that someone is copying their keys," he
|
|
said.
|
|
|
|
The main difference in government key escrow - now in place in
|
|
Fortezza cards - and key recovery technologies is the ability of law
|
|
enforcement agencies to secretly decrypt encrypted files after
|
|
obtaining a warrant.
|
|
|
|
There is a private key (needed to decrypt data) embedded in each
|
|
Fortezza card chip. When the Fortezza chip is manufactured, the
|
|
private key is split; one half goes to the National Institute of
|
|
Standards and Technology and the other to the Treasury Department.
|
|
|
|
If a law enforcement agent obtains permission from a court to decrypt
|
|
information of a Fortezza card user, he can obtain both parts of the
|
|
private key from the two federal agencies and decrypt the data without
|
|
the knowledge of the user.
|
|
|
|
Key recovery is a technology that allows for the recovery of a private
|
|
encryption key if it is lost or damaged. This private key, however, is
|
|
kept by the user or user's organization, not by government agencies.
|
|
Law enforcement agencies still can obtain a warrant for a user's
|
|
private key, but they could not secretly decrypt the information
|
|
without the user's knowledge.
|
|
|
|
Sources said DOD's move was targeted to increase the appeal of the
|
|
Fortezza card to users outside DOD.
|
|
|
|
Bruce McConnell, chief of information policy at the Office of
|
|
Management and Budget, said the move would make Fortezza cards more
|
|
attractive, but he cited different reasons. "It does encourage people
|
|
to use it because it moves toward the commercial approach that's being
|
|
taken," he said.
|
|
|
|
------------------------------
|
|
|
|
Subject: File 3--Re: Cu Digest, #9.09, Sun 16 Jan 97
|
|
From: shadow@KRYPTON.RAIN.COM(Leonard Erickson)
|
|
Date: Tue, 18 Feb 1997 13:09:02 PST
|
|
|
|
Re - File 1--Cyber Angels FACES Project
|
|
>
|
|
> ------- Excerpt Begins -------
|
|
>
|
|
<snip>
|
|
> what our FACE UNIT is all about. Our volunteers spend time each week
|
|
> finding child pornography posts on the Usenet, and cropping the picture so
|
|
> that just the child's face is left. These faces - the faces of innocent
|
|
> children who are the victims of abuse crimes by adults - are then passed
|
|
> with the full header reference to our FACE UNIT Leader.
|
|
<snip>
|
|
>
|
|
> ---- Excerpt Ends ----
|
|
>
|
|
> I feel such a database would be a case of "double victimization" --
|
|
> that someone who was the victim of child pornography would not want
|
|
> pictures of their faces openly distributed. No one I've spoken to
|
|
> thinks this is a good idea.
|
|
|
|
Agreed!
|
|
|
|
> In an exchange of e-mail, Gabriel Hatcher (gabriel@cyberangels.org) politely
|
|
> disagreed, suggesting that their project would identify children
|
|
> who are currently being abused and thus rescue/save them from
|
|
> suffering. He's heard nothing but positive feedback, and is working
|
|
> with various law enforcement officials to make sure the project is
|
|
> done properly.
|
|
|
|
They are also ignoring the fact that with any decent morphing program
|
|
you can transform a picture of an adult into an apparent "child". And
|
|
while some people are pushing laws that make this illegal, it is *not
|
|
currently illegal, *and* there is no way to determine whether a picture
|
|
is "real" or morphed.
|
|
|
|
Since some states make failure to co-operate in prosecuting even "old"
|
|
cases of child abuse a crime, the potential exists for some adult model
|
|
to be prosecuted for failure to co-operate in tracking down the
|
|
*non-existent* people who "abused" him or her.
|
|
|
|
Face it, the same software that lets us "age" photos of missing
|
|
children, and "un-age" bodies to match against old bodies *will* let
|
|
you turn photos of adults into *apparent* "child pornography".
|
|
|
|
And with a bit more effort, such photos can be produced without
|
|
involving *any* children. Given this, I say that the emphasis needs to
|
|
be changed from "child pornography" to "child abuse".
|
|
|
|
Of course, the main reason for going after "kiddie porn" in the first
|
|
place is that it is *easier* than actually catching abusers. And
|
|
entrapment is common. So I hold out little hope for any *real*
|
|
improvement.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 18 Feb 1997 04:19:20 -0500 (EST)
|
|
From: Charles Platt <cp@panix.com>
|
|
Subject: File 4--Re: The Guardian Angels' The Face Project
|
|
|
|
On Tue, 18 Feb 1997, Cu Digest wrote:
|
|
|
|
> To help on this unit you need to have cropping ability - in other words the
|
|
> ability to take a jpg image and cut out the child's face and make a new jpg
|
|
> out of it.
|
|
>
|
|
> NB For legal reasons the FACE UNIT accepts only volunteers 18 years old and
|
|
> above. You may like to know that this work follows guidelines given to us
|
|
> by Federal Authorities.
|
|
|
|
Indeed. Please tell me more about these so-reassuring "guidelines." I am
|
|
also interested in any legal protection that may be offered to the
|
|
volunteers who assist in this supposedly worthy cause. If I go digging
|
|
around for child porn online, with the pure intention of cropping out the
|
|
sexy parts (after I spend a few minutes looking at them of course), how am
|
|
I protected from triggering a typical sting operation? Bear in mind,
|
|
federal agents are a leading source of child pornography as they go about
|
|
their happy business of entrapmemt. Who calls off the FBI (or pays for my
|
|
legal defense) when I become known as someone looking for illegal
|
|
pictures? Possession of three pieces of child pornography is sufficient to
|
|
earn substantial jail time. Will there be a list of "do-gooder" volunteers
|
|
who are granted automatic immunity from prosecution? If so, how will
|
|
genuine pedophiles be prevented from joining this fine crusade and getting
|
|
their names added to the list so they can go trolling for kiddieporn
|
|
without fear of retribution?
|
|
|
|
And assuming a list of volunteers IS maintained somehow, how can the feds
|
|
guarantee that the list will be known and respected by all state
|
|
authorities? They have their anti-child-porn laws, too.
|
|
|
|
Lastly, if I should have a playful attitude, what's to stop me from
|
|
sending to Uncle Colin several pictures of perfectly normal, unmolested,
|
|
innocent children, which he will unwittingly add to his collection when I
|
|
assure him that I just cropped out some unspeakable sex acts? How will
|
|
Uncle Colin protect himself when the families of these innocent children
|
|
discover their little cuties in the Gallery of Abused and sue him for
|
|
very substantial damages?
|
|
|
|
Like most Guardian Angels schemes, this seems fundamentally dim-witted
|
|
and riddled with potential legal problems.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 17 Feb 1997 20:24:57 -0800
|
|
From: Jonathan Wallace <jw@bway.net>
|
|
Subject: File 5--Cyberpatrol now blocks my site
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
I was informed tonight by a friend that Cyberpatrol now blocks my
|
|
web pages pertaining to the book, Sex, Laws and Cyberspace, which
|
|
I co-authored with Mark Mangan (Henry Holt, 1996).
|
|
|
|
I couldn't be more surprised. The pages contain serious
|
|
discussion of Internet censorship issues and ought not to be
|
|
blocked under any conceivable theory. While the duel with Solid
|
|
Oak has been an enjoyable sideshow, Microsystems, publishers of
|
|
Cyberpatrol, is supposed to be a more mainstream company. Their
|
|
product is used by Compuserve and has just been purchased by the
|
|
Boston library system.
|
|
|
|
Here is the letter I just sent them at cyberinf@microsys.com.
|
|
>
|
|
> I was just really shocked to learn that Cyberpatrol blocks
|
|
> my web pages pertaining to my book, Sex, Laws and Cyberspace,
|
|
> http://www.spectacle.org/freespch/.
|
|
>
|
|
> Published by Henry Holt, the book is a history of
|
|
> Internet censorship. It has received excellent reviews
|
|
> in the New York Times, Washington Post, Chicago Tribune
|
|
> and other publications. The Times called it "required reading"
|
|
> for anyone interested in freedom of speech.
|
|
>
|
|
> I cannot imagine anything on my web pages which would
|
|
> cause you to block them. Have we now reached the
|
|
> point where we must censor speech about censorship?
|
|
> The pages are a serious and
|
|
> scholarly effort to cover the evolving law and ethics of
|
|
> free speech on the Net--as is the book itself.
|
|
>
|
|
> I am writing in the hope that you will immediately respond
|
|
> that this is a serious error on your part, and will
|
|
> correct it.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 18 Feb 1997 17:57:24 -0500
|
|
From: "W. K. (Bill) Gorman" <nitehawk@NETHAWK.COM>
|
|
Subject: File 6--Internic DNS glitches
|
|
|
|
You may find this of interest if it isn't old news by now.
|
|
|
|
>----- Begin Included Message -----
|
|
>Date--Mon Feb 17 23:41:27 1997
|
|
>Subject--listowners-d--ANNOUNCEMENTS--name service problems explained
|
|
>
|
|
>For the last week or so there have been many complaints from people
|
|
>who have received an unusual amount or bounced mail. Mail that bounced
|
|
>with "unknown host" errors, particularly. I responded to a number of
|
|
>these messages explaining that it was not IC Group's fault. I said
|
|
>that it was the fault of either the providers whose namer server
|
|
>records appeared to be missing or the fault of the internic run root
|
|
>name servers.
|
|
>
|
|
>It turns out that it is the fault of the internic-run root name
|
|
>servers.
|
|
>
|
|
>When any machine on the Net wants to find any other machine on the Net
|
|
>it checks first with its cache - its short term memory - to see if it
|
|
>knows where the other machine is. If it can't find the information in
|
|
>its memory it asks the root servers. The root servers then point it at
|
|
>the servers for the particular top level domain (.com, .edu, etc). The
|
|
>server for that TLD then sends the machine to the appropriate
|
|
>authoritative name-server run by the provider.
|
|
>
|
|
>The root name-servers have been very unreliable recently. Last week, on
|
|
>Thursday and Friday, several of the root name-server broke down
|
|
>completely. They started giving out bad information. Several of them
|
|
>lost the entire .com top level domain and returns "host unknown"
|
|
>errors to any query ending in .com.
|
|
>
|
|
>The people at the internic are working to resolve the fundamental
|
|
>problems in the way the root name servers work. The problems won't be
|
|
>fixed soon. The problems last week were far worse than usual, but
|
|
>there could be problems with those servers again.
|
|
>
|
|
>A number of people on the net are advocating 'TRUE' root server
|
|
>strategies. Right now the root servers don't always send people off to
|
|
>the TLD (top level domain) server but answer a number of requests
|
|
>themselves. This contributes to their unreliability.
|
|
>
|
|
>One alternate strategy that some people like is eDNS
|
|
>(http://www.edns.net). Many people report that eDNS works very well
|
|
>and has far fewer problems than the internic run root servers. I've
|
|
>switched majordomo.pobox.com to the eDNS strategy to see how well that
|
|
>works for us. If you have problems please send mail to
|
|
>pobox@pobox.com complaining and quoting your bounce messages.
|
|
>
|
|
>Hopefully this will help. I understand your frustrations when you see
|
|
>bounce message for providers that seem to be up a few minutes
|
|
>later. The eDNS solution is temporary. Being able to use InterNIC run
|
|
>nameservers is preferable because the InterNIC can be held responsible
|
|
>- to some extent - for problems while eDNS is a completely independent
|
|
>project not recognized by the National Science Foundation. Hopefully
|
|
>the InterNIC will gets its act together and their root servers will be
|
|
>come more reliable sometime soon.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 4 Feb 1997 09:10:55 -0600
|
|
From: Norman Stahl <Stahl@niu.edu
|
|
Subject: File 7--TIIAP Announces Availability of 1997 Funds
|
|
|
|
Date--Mon, 3 Feb 1997 07:51:50 -0500
|
|
From--Kirk_Winters@ed.gov (Kirk Winters)
|
|
|
|
|
|
THE FOURTH ANNUAL ROUND of the Telecommunications &
|
|
Information Infrastructure Assistance Program (TIIAP) was
|
|
announced on January 27. About $18.5 million in grants will
|
|
be awarded this year under the program, which is administered
|
|
by the Commerce Department's National Telecommunications &
|
|
Information Administration (NTIA). Applications must be
|
|
received by March 27, 1997.
|
|
|
|
The 1997 TIIAP will support projects in 5 areas:
|
|
* Community-Wide Networking
|
|
* Education & Lifelong Learning
|
|
* Government & Community Services
|
|
* Health
|
|
* Public Safety
|
|
|
|
You'll find the press release & official *notice* announcing
|
|
the program, "Guidelines for Preparing Applications,"
|
|
information on outreach workshops, & more at the TIIAP web
|
|
site:
|
|
http://www.ntia.doc.gov/otiahome/tiiap/current.htm
|
|
|
|
A few excerpts from the TIIAP web site are below. For
|
|
complete information, please visit the TIIAP web site or
|
|
contact NTIA at:
|
|
|
|
U.S. Department of Commerce
|
|
National Telecommunications & Information Administration
|
|
Office of Telecommunications & Information Applications
|
|
TIIAP, Room 4092
|
|
1401 Constitution Avenue, NW
|
|
Washington, DC 20230
|
|
|
|
Telephone: (202) 482-2048
|
|
Fax: (202) 501-5136
|
|
E-mail: tiiap@ntia.doc.gov
|
|
|
|
**************************************
|
|
A Few Excerpts from the TIIAP Web Site
|
|
**************************************
|
|
|
|
Background on TIIAP -- TIIAP is a highly-competitive, merit-
|
|
based grant program that was conceived as part of the
|
|
President's National Information Infrastructure (NII)
|
|
initiative. It provides seed money for innovative,
|
|
practical projects that extend the benefits of advanced
|
|
telecommunications and information technology to rural and
|
|
urban underserved Americans. Since its inception in 1994, it
|
|
has awarded more than $79 million in matching grant funds to
|
|
non-profit organizations, such as schools, libraries,
|
|
hospitals, public safety entities, and state and local
|
|
governments. has leveraged more than $133 million in local
|
|
matching funds. TIIAP projects funded in previous years are
|
|
providing innovations in education; helping create more
|
|
responsive public institutions; enhancing economic
|
|
development in rural and disadvantaged areas; and increasing
|
|
access to health care.
|
|
|
|
Eligible Organizations -- State, local, and Indian tribal
|
|
governments, colleges and universities, and non-profit
|
|
entities are eligible to apply. However, individuals and
|
|
for-profit organizations are not eligible.
|
|
|
|
Matching Funds Requirements -- Grant recipients under this
|
|
program will be required to provide matching funds toward
|
|
the total project cost. Applicants must document the
|
|
capacity to supply matching funds. Matching funds may be in
|
|
the form of cash or in-kind contributions. Grant funds under
|
|
this program will be released in direct proportion to local
|
|
matching funds utilized and documented as having been
|
|
expended. NTIA will supply up to 50% of the total project
|
|
cost, unless the applicant can document extraordinary
|
|
circumstances warranting a grant of up to 75%. Federal funds
|
|
(such as grants) generally may not be used as matching
|
|
funds, except as provided by federal statute. For
|
|
information about whether particular federal funds may be
|
|
used as matching funds, the applicant should contact the
|
|
federal agency that administers the funds in question.
|
|
|
|
Outreach Workshops -- Workshops designed to assist
|
|
applicants & potential applicants will be held on February
|
|
14, in Alexandria, Virginia; February 19, in Nashua, New
|
|
Hampshire; February 26, in Chicago, Illinois; March 4, in
|
|
New Orleans, Louisiana; and March 6, in Phoenix, Arizona.
|
|
|
|
Evaluation Criteria -- Criteria for evaluating TIIAP
|
|
applications change from year to year. This year's
|
|
applications will be evaluated on criteria in this year's
|
|
Notice (http://www.ntia.doc.gov/otiahome/tiiap/ffinal.htm).
|
|
|
|
Last Year's Awards -- In fiscal year 1996, NTIA received 809
|
|
applications, collectively requesting $260 million in grant
|
|
funds. From these 809 applications, the Department of
|
|
Commerce announced 67 TIIAP awards totaling $18.6 million in
|
|
federal funds (for descriptions of the 67 projects, please
|
|
see http://www.ntia.doc.gov/otiahome/tiiap/frames.htm).
|
|
Based on past grant rounds, the average size of each grant
|
|
award will be approximately $300,000, although an applicant
|
|
may request up to $750,000 in federal support.
|
|
|
|
Project Length -- Successful applicants will have between 12
|
|
and 36 months to complete their projects. While the
|
|
completion time will vary depending on the complexity of the
|
|
project, applicants should take special care to justify a
|
|
project lasting longer than 24 months.
|
|
|
|
Five Application Areas -- This year's TIIAP will support
|
|
projects in five application areas: Community-Wide
|
|
Networking; Education, Culture, and Lifelong Learning;
|
|
Health; Public and Community Services; and Public Safety.
|
|
Each application in a particular application area will be
|
|
compared against other applications in that same area:
|
|
|
|
Community-Wide Networking -- This area focuses on
|
|
multi-purpose projects that help a broad range of
|
|
community residents and organizations to communicate,
|
|
share information, and participate in civic activities,
|
|
and that promote economic development. Community-Wide
|
|
Networking projects typically link services or provide
|
|
information across multiple application areas. Examples
|
|
may include, but would not be limited to: community-
|
|
wide information and communication services available
|
|
to residents of a local community; projects enabling a
|
|
diverse array of organizations to share information
|
|
infrastructure and resources; and networks or
|
|
information services that promote community or regional
|
|
economic development.
|
|
|
|
Education, Culture, and Lifelong Learning -- Projects
|
|
in this area seek to improve education and training for
|
|
learners of all ages and provide cultural enrichment
|
|
through the use of information infrastructure in both
|
|
traditional and non-traditional settings. Examples may
|
|
include, but would not be limited to: projects that
|
|
explore creative approaches to integrating computer-
|
|
based learning and network resources in K-12
|
|
classrooms; projects providing children, youth, and
|
|
adult learners with educational and training
|
|
opportunities in community centers and other non-
|
|
traditional settings; projects that forge stronger
|
|
links among educators, students, parents, and others in
|
|
the community; projects linking workplaces and job-
|
|
training sites to educational institutions; distance
|
|
learning networks providing continuing education for
|
|
professionals in remote areas; projects that enrich
|
|
communities by providing broad access to arts, science,
|
|
and cultural resources; delivery of on-line
|
|
informational, educational, and cultural services from
|
|
public libraries, museums, and other cultural centers;
|
|
and projects that support the teaching of literacy to
|
|
adult learners.
|
|
|
|
Health -- Projects in this area involve the use of
|
|
information infrastructure in the delivery of health and
|
|
mental health services, public health, home health care
|
|
and the provision of health information to the public.
|
|
Examples of projects may include, but would not be
|
|
limited to: telemedicine systems that offer new
|
|
approaches to extending medical expertise to rural or
|
|
underserved urban areas; community health information
|
|
networks for sharing clinical, financial, and/or
|
|
administrative information among hospitals, clinics,
|
|
public health departments, and other organizations; home
|
|
health care systems that improve the care and treatment
|
|
of patients in the home environment; and networks or
|
|
information services aimed at disease prevention and
|
|
health promotion.
|
|
|
|
Public and Community Services -- Projects in this area
|
|
aim to empower individuals and communities and to
|
|
improve the delivery of services to people with a range
|
|
of social service needs. This area includes social
|
|
services such as housing, child welfare, food
|
|
assistance, employment counseling, and others,
|
|
typically delivered by state and local governments or
|
|
by community-based non-profit organizations. Examples
|
|
of projects may include but would not be limited to:
|
|
projects that use information technology creatively to
|
|
promote self-sufficiency among individuals and
|
|
families; networks that facilitate coordination and
|
|
collaboration among public and/or community-based
|
|
agencies; electronic information and referral services
|
|
that provide information on a variety of community-
|
|
based or government services; projects that make public
|
|
agencies more accessible and responsive to community
|
|
residents; electronic benefits transfer projects; and
|
|
projects that employ community or geographic
|
|
information systems to study demographic or
|
|
environmental trends and target community
|
|
interventions.
|
|
|
|
Public Safety -- Projects in this area will seek to
|
|
increase the effectiveness of law enforcement agencies,
|
|
emergency, rescue, and fire departments, or other
|
|
entities involved in providing safety services.
|
|
Examples may include, but would not be limited to,
|
|
projects that facilitate information exchange among
|
|
public safety agencies located in a single geographic
|
|
area to increase efficiency and share resources, or
|
|
those that provide information in a timely manner to
|
|
"first-response officials," such as police officers,
|
|
emergency medical technicians, and firefighters. Other
|
|
examples could include projects that help public safety
|
|
agencies provide community outreach services, projects
|
|
that develop innovative ways to share scarce spectrum
|
|
resources, and projects that aim to increase the safety
|
|
and security of children.
|
|
|
|
TIIAP will support projects that promote the
|
|
accessibility and usability of the NII for persons
|
|
with disabilities. Such projects are expected to
|
|
fall under one of the five application areas
|
|
described above.
|
|
|
|
For descriptions of the kinds of projects TIIAP
|
|
will *not* fund, see "Scope of Proposed Project"
|
|
http://www.ntia.doc.gov/otiahome/tiiap/ffinal.htm
|
|
|
|
Program Funding Priorities -- NTIA has significantly
|
|
changed the structure of the funding categories for
|
|
TIIAP and applicants who have previously applied to
|
|
the program should carefully note this change. For
|
|
the 1997 fiscal year, the TIIAP review process will
|
|
not distinguish among access, demonstration and
|
|
planning projects. All applications will be judged
|
|
according to a single set of evaluation criteria
|
|
(described in the Notice) and all rules set forth in
|
|
the Notice will apply to all applications. This
|
|
change does not imply a change in the scope of
|
|
projects that will be considered for support; the
|
|
change only reflects NTIA's decision not to
|
|
differentiate among different categories of projects.
|
|
|
|
|
|
========================================================
|
|
To subscribe to (or unsubscribe from) EDInfo, address an
|
|
email message to: listproc@inet.ed.gov Then write
|
|
either SUBSCRIBE EDINFO YOURFIRSTNAME YOURLASTNAME in the
|
|
message, or write UNSUBSCRIBE EDINFO (if you have a
|
|
signature block, please turn it off). Then send it!
|
|
========================================================
|
|
|
|
Kirk Winters
|
|
U.S. Department of Education
|
|
kirk_winters@ed.gov
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.10
|
|
************************************
|
|
|