884 lines
40 KiB
Plaintext
884 lines
40 KiB
Plaintext
|
|
Computer underground Digest Sun July 13, 1997 Volume 9 : Issue 56
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.56 (Sun, July 13, 1997)
|
|
|
|
File 1--Cyber Patrol Bans Crpyt Newsletter
|
|
File 2--ALA Council Resolution on the Use of Filtering Software
|
|
File 3--An Economic Basis for SPAM Control
|
|
File 4--French "English Only" Web Site Suit Dismissed
|
|
File 5--UFOs and the Net (fwd Islands in the Clickstream)
|
|
File 6--Oil City Officials Worry About Link To Web Page
|
|
File 7--Call for Commentaries on CuD Special Issue of Net & Education
|
|
File 8--Star Wars, Fanfiction, and Big Eight Newsgroup Creation
|
|
File 9--Anti-solicitation laws and anti-spam "opt-in" mailing lists
|
|
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 20 Jun 97 01:53:31 EDT
|
|
From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM>
|
|
Subject: File 1--Cyber Patrol Bans Crpyt Newsletter
|
|
|
|
((CuD MODERATORS' COMMENT: George Smith learned the danger of
|
|
blocking software. As he explains, the homepage of
|
|
Crypt Newsletter was blocked. Why? Because another homepage on
|
|
the server, the American Society of Criminology's Critical
|
|
Criminology Division homepage at
|
|
http://www.soci.niu.edu/~critcrim, includes a copy of the
|
|
Unabomer Manifesto. The Crit Crim page is a well-established and
|
|
busy resource, especially for criminologists, and the Unabomer
|
|
Manifesto is relevant to the research resources the page
|
|
provides. Unfortunately, all homepages on the system beginning
|
|
with ~cr were blocked. Although the problem apparently has been
|
|
resolved for now, risks of future blocking remain. Because
|
|
libraries and schools use Cyber Patrol, the consequence of the
|
|
blocking may be to exclude students from the ability to access a
|
|
valuable homepage for assigments)).
|
|
|
|
Banned by Cyber Patrol
|
|
June 19, 1997
|
|
|
|
Hey, buddy, did you know I'm a militant extremist? Cyber Patrol, the
|
|
Net filtering software designed to protect your children from
|
|
cyberfilth, says so. Toss me in with those who sleep with a copy of
|
|
"The Turner Diaries" under their pillows and those who file nuisance
|
|
liens against officials of the IRS. Seems my Web site is dangerous
|
|
viewing.
|
|
|
|
I discovered I was a putative militant extremist while reading a
|
|
story on Net censorship posted on Bennett Haselton's PeaceFire
|
|
Web site. Haselton is strongly critical of Net filtering software and
|
|
he's had his share of dustups with vendors like Cyber Patrol, who
|
|
intermittently ban his site for having the temerity to be a naysayer.
|
|
|
|
Haselton's page included some links so readers could determine what
|
|
other Web pages were banned by various Net filters. On a lark, I typed
|
|
in the URL of the Crypt Newsletter, the publication I edit. Much to my
|
|
surprise, I had been banned by Cyber Patrol. The charge? Militant
|
|
extremism. Cyber Patrol also has its own facility for checking if a
|
|
site is banned, called the CyberNOT list. Just to be sure, I
|
|
double-checked. Sure enough, I was a CyberNOT.
|
|
|
|
Now you can call me Ray or you can call me Joe, but don't ever call me
|
|
a militant extremist! I've never even seen one black helicopter
|
|
transporting U.N. troops to annex a national park.
|
|
|
|
However, nothing is ever quite as it seems on the Web and before I
|
|
went into high dudgeon over political censorship--the Crypt Newsletter
|
|
has been accused of being "leftist" for exposing various
|
|
government, academic, and software industry charlatans--I told some of
|
|
my readership. Some of them wrote polite--well, almost polite--letters
|
|
to Debra Greaves, Cyber Patrol's head of Internet research. And
|
|
Greaves wrote back almost immediately, indicating it had all been a
|
|
mistake.
|
|
|
|
My Web site was blocked as a byproduct of a ban on another page on the
|
|
same server. "We do have a [blocked] site off of that server with a
|
|
similar directory. I have modified the site on our list to be more
|
|
unique so as to not affect [your site] any longer," she wrote.
|
|
|
|
Perhaps I should have been reassured that Cyber Patrol wasn't banning
|
|
sites for simply ridiculing authority figures, a favorite American
|
|
past time. But if anything, I was even more astonished to discover th
|
|
company's scattershot approach to blocking. It doesn't include precise
|
|
URLs in its database. Instead, it prefers incomplete addresses that
|
|
block everything near the offending page. The one that struck down
|
|
Crypt News was "soci.niu.edu/~cr," a truncated version of my complete
|
|
URL. In other words: any page on the machine that fell under "~cr" was
|
|
toast.
|
|
|
|
Jim Thomas, a sociology professor at Northern Illinois University,
|
|
runs this particular server, and it was hard to imagine what would be
|
|
militantly extreme on it. Nevertheless, I ran the news by Thomas. It
|
|
turns out that the official home page of the American Society of
|
|
Criminology's Critical Criminology Division, an academic resource,
|
|
was the target. It features articles from a scholarly criminology
|
|
journal and has the hubris to be on record as opposing the death
|
|
penalty but didn't appear to have anything that would link it with
|
|
bomb-throwing anarchists, pedophiles, and pornographers.
|
|
|
|
There was, however, a copy of the Unabomber Manifesto on the page.
|
|
|
|
I told Thomas I was willing to bet $1,000 cash money that Ted
|
|
Kaczynski's rant was at the root of Cyber Patrol's block.
|
|
Thomas confirmed it, but I can't tell you his exact words. It
|
|
might get this page blocked, too.
|
|
|
|
What this boils down to is that Cyber Patrol is banning writing on the
|
|
Web that's been previously published in a daily newspaper: The
|
|
Washington Post. It can also be said the Unabomber Manifesto already
|
|
has been delivered to every corner of American society.
|
|
|
|
If the ludicrous quality of this situation isn't glaring enough,
|
|
consider that one of Cyber Patrol's partners, CompuServe, promoted the
|
|
acquisition of electronic copies of the Unabomber Manifesto after it
|
|
published by the Post. And these copies weren't subject to any
|
|
restrictions that would hinder children from reading them. In fact,
|
|
I've never met anyone from middle-class America who said, "Darn those
|
|
irresponsible fiends at the Post! Now my children will be inspired to
|
|
retreat to the woods, write cryptic essays attacking techno-society,
|
|
and send exploding parcels to complete strangers."
|
|
|
|
Have you?
|
|
|
|
So, will somebody explain to me how banning the Unabomber Manifesto,
|
|
the ASC's Critical Criminology home page, and Crypt Newsletter
|
|
protects children from smut and indecency? That's a rhetorical
|
|
question.
|
|
|
|
Cyber Patrol is strongly marketed to public libraries, and has been
|
|
acquired by some, in the name of protecting children from Net
|
|
depravity.
|
|
|
|
Funny, I thought a public library would be one of the places you'd be
|
|
more likely to find a copy of the Unabomber Manifesto.
|
|
|
|
_George Smith is the author of The Virus Creation Labs, a book about
|
|
computer virus writers and the antivirus industry._
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 9 Jul 1997 10:28:11 -0800
|
|
From: "--Todd Lappin-->" <telstar@wired.com>
|
|
Subject: File 2--ALA Council Resolution on the Use of Filtering Software
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
From: "Craig A. Johnson" <caj@tdrs.com>
|
|
|
|
|
|
AMERICAN LIBRARY ASSOCIATION
|
|
|
|
This resolution was adopted by ALA Council at the annual conference.
|
|
|
|
RESOLUTION ON THE USE OF FILTERING SOFTWARE IN LIBRARIES
|
|
|
|
WHEREAS, On June 23, 1997, the United States Supreme court issued a
|
|
sweeping re-affirmation of core First Amendment principles and held
|
|
that communications over the Internet deserve the highest level of
|
|
Constitutional protection; and
|
|
|
|
WHEREAS, The Court's most fundamental holding is that communications
|
|
on the Internet deserve the same level of Constitional protection as
|
|
books, magazines, newspapers, and speakers on a street corner
|
|
soapbox. The Court found that the *Internet constitutes a vast
|
|
platfrom from which to address and hear from a world-wide audience of
|
|
millions of readers, viewers, researchers, and buyers,* and that *any
|
|
person with a phone line can become a town crier with a voice that
|
|
resonates farther than it could from any soapbox*; and
|
|
|
|
WHEREAS, For libraries, the most critical holding of the Supreme
|
|
Court is that libraries that make content available on the Internet
|
|
can continue to do so with the same Constitutional protections tha
|
|
apply to the books on libraries' shelves; and
|
|
|
|
WHEREAS, The Court's conclusion *that the vast democratic fora of the
|
|
Internet* merit full constitutional protection will also serve to
|
|
protect libraries that provide their patrons with access to the
|
|
Internet; and
|
|
|
|
WHEREAS, The Court recognized the importance of enabling individuals
|
|
to receive speech from the entire world and to speak to the entire
|
|
world. Libraries provide these opportunities to many who would not
|
|
otherwise have them; and
|
|
|
|
WHEREAS, The Supreme Court's decision will protect that access; and
|
|
|
|
WHEREAS, The use in libraries of software filters which block
|
|
Constitutionally protected speech is inconsistent with the United
|
|
States Constitution and federal law and may lead to legal exposure
|
|
for the library and its governing authorities; now, therefore, be it
|
|
|
|
RESOLVED, That the American Library Association affirms that the use
|
|
of filtering software by libaries to block access to constitutionally
|
|
protected speech violates the Library Bill of Rights.
|
|
|
|
Adopted by the ALA Council, July 2, 1997
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 09 Jul 97 09:59:10 EST
|
|
From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU>
|
|
Subject: File 3--An Economic Basis for SPAM Control
|
|
|
|
((SOURCE - Computer Privacy Digest, Vol 11, #002:, Wed 8 July:
|
|
The Computer Privacy Digest is a forum for discussion on the effect of
|
|
technology on privacy or vice versa. The digest is moderated and
|
|
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
|
|
Submissions should be sent to comp-privacy@uwm.edu and administrative
|
|
requests to comp-privacy-request@uwm.edu.
|
|
|
|
Web browsers will find it at http://www.uwm.edu/org/comp-privacy/))
|
|
|
|
=========
|
|
|
|
From--Steve Schear <azur@netcom.com>
|
|
Date--02 Jul 1997 18:02:07 -0700
|
|
Subject--An Economic Basis for SPAM Control
|
|
|
|
There are three approaches being publicly discussed to regulate
|
|
unwanted email: regulatory, opt-in and opt-out. Due to subtle, but
|
|
important differences between fax and email, I believe the legal
|
|
approach will be difficult to craft without facing First Amendment
|
|
challenges. Both the opt-in and opt-out appear to create more
|
|
bureaucratic overhead and may be difficult to satisfactorily
|
|
administer. There is a fourth approach, economic, which has received
|
|
scant attention.
|
|
|
|
Postage costs are what, quite effectively, keep our snail-mail boxes
|
|
from overflowing with junk. Since email is essentially free, or
|
|
almost, there has been no incentive for SPAMers to better target their
|
|
ads, as is financially required for snail-mail advertising.
|
|
|
|
One economic approach is to enhance email software (either at the ISP
|
|
or client end) that would filter incoming messages in two ways: to
|
|
determine if the sender was known to the recipient (i.e., from previous
|
|
correspondence) or to determine if sufficient postage was placed within
|
|
the message header.
|
|
|
|
The email software could automate building the 'known sender' list from
|
|
email responses and other user input (in this way electronic mailing
|
|
lists would should not be affected). Messages not from known parties
|
|
and without sufficient postage would be rejected: returned to sender or
|
|
discarded. The email software could refund postage--e.g., by explicit
|
|
recipient action or in the next reply email--so non-SPAM senders would
|
|
not be left out-of-pocket for d-postage. SPAMers would have their
|
|
d-postage pocketed by the recipient.
|
|
|
|
There are at least two Digital Postage (d-postage) approaches: e-cash
|
|
based d-postage and sender-generated d-postage (hashcash).
|
|
|
|
E-cash based postage is an obvious choice. Like today's postal stamps,
|
|
the sender would need to purchase the e-cash and include it in the
|
|
header of outgoing mail to recipients to whom the sender was unknown.
|
|
However, e-cash isn't widely used nor is it certain that current and
|
|
proposed e-cash systems could economically and architecturally scale to
|
|
address Net d-postage.
|
|
|
|
An alternative is to use 'stamps' created by the sender. Called
|
|
'hashcash,' it was first put forward as a way to reduce remailer
|
|
abuse. With hascash the sender must perform a mathematical operation
|
|
which is very computationally intensive when generating the 'stamp'
|
|
(the more complex the higher the stamp value) but which is quick for
|
|
the recipient to check. Each stamp value is intimately related to the
|
|
recipient's address, so a SPAMer can't reproduce a stamp and send them
|
|
to different addressees.
|
|
|
|
Hashcash is elegant in its simplicity and scalability due to its lack
|
|
of a centralized issuing or clearing facility. Hascash-based d-postage
|
|
could also seed the development of commercial distributed computing Net
|
|
industry, as SPAMers elect to purchase hashcash rather than generating
|
|
it themselves-the idea isn't to eliminate SPAM, just place it on
|
|
similar economic footing with junk snailmail. (See
|
|
http://www.dcs.ex.ac.uk/~aba/hashcash/).
|
|
|
|
------------------------------
|
|
|
|
Date: Tuesday, June 10, 1997
|
|
From: user45@@anonymous.nosys.com
|
|
Subject: File 4--French "English Only" Web Site Suit Dismissed
|
|
|
|
Source: Reuters.
|
|
Dateline: PARIS
|
|
|
|
FRENCH INTERNET SUIT DISMISSED
|
|
ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE
|
|
|
|
The first test of whether France's disputed language law
|
|
applies to the Internet ended in a fiasco Monday when a court
|
|
threw out the case against an overseas branch of Georgia Tech on
|
|
a technicality.
|
|
Two state-approved watchdogs promoting the use of the French
|
|
language had filed a complaint against the Georgia Institute of
|
|
Technology's French campus for using English only on its Web
|
|
site.
|
|
The plaintiffs, Defense of the French Language and Future of
|
|
the French Language, accused Georgia Tech Lorraine of breaking a
|
|
1994 law requiring all advertising in France to be in French.
|
|
The Paris police court dismissed the lawsuit, saying the two
|
|
private groups should have notified a public prosecutor first.
|
|
The legislation, named after then-Culture Minister Jacques
|
|
Toubon, was part of a battle to protect the tongue of Moliere and
|
|
Racine from the growing international use of English.
|
|
"The central question, the most interesting one, has not been
|
|
decided today; only a procedural matter has," said Marc Jobert,
|
|
lawyer for the two groups, which had demanded that the Internet
|
|
site be translated into French.
|
|
While supporters of Internet say the World Wide Web should be
|
|
free of national restraints, many governments have asserted
|
|
their authority over cyberspace to try to block pornography or
|
|
to silence political dissent.
|
|
"The court did not address the underlying issue and has left
|
|
us wanting more," said Jacques Schaefer, lawyer for Georgia Tech
|
|
Lorraine, which is based in Metz, in eastern France.
|
|
"It's a total victory in the sense that we were cleared of
|
|
all accusations," he said, but the university would rather have
|
|
won on substance than on procedure.
|
|
Georgia Tech President Wayne Clough said the drive to apply
|
|
the Toubon law to the Web ignores its "interconnected nature."
|
|
"The Web is the personification of the global economy. It does
|
|
not recognize national or linguistic borders," he said.
|
|
Georgia Tech argued at a January hearing that communications
|
|
on the Web are like telephone calls. It said its Web site is in
|
|
English because all of its courses are taught in the language and
|
|
students are required to be fluent in English.
|
|
Two weeks ago, Georgia Tech Lorraine made its Web site
|
|
available in French and German as well but denied the lawsuit was
|
|
the reason.
|
|
It said that technological advances in the global computer
|
|
network had made it easier to provide the translation and that it
|
|
"wanted to be more European."
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 12 Jul 1997 21:37:40 -0500
|
|
From: Richard Thieme <rthieme@thiemeworks.com>
|
|
Subject: File 5--UFOs and the Net (fwd Islands in the Clickstream)
|
|
|
|
Islands in the Clickstream:
|
|
UFOs and the Internet
|
|
|
|
|
|
[This summer marks the 50th anniversaries of the first modern
|
|
publicized report of UFO phenomena by Kenneth Arnold in June 1947
|
|
and the "Roswell incident" in July 1947. This column is much
|
|
abridged from the articles "How to Build a UFO ... Story"
|
|
(Internet Underground: November 1996) and "Stalking the UFO Meme
|
|
on the Internet" (South Africa Computer Magazine: April 1997).
|
|
The article was also included in Digital Delirium (eds. Arthur
|
|
and Marilouise Kroker: St. Martin's Press: 1997). A full copy
|
|
will be archived on the ThiemeWorks web site -- coming this
|
|
summer.]
|
|
|
|
|
|
"We are convinced that Roswell took place. We've had too
|
|
many high ranking military officials tell us that it happened,
|
|
that told us that it was clearly not of this earth."
|
|
|
|
Don Schmitt, co-author, "The Truth About the UFO Crash
|
|
at Roswell," in an interview on the Internet
|
|
|
|
|
|
|
|
That "interview with a real X-Filer" can be found on one of
|
|
the hundreds of web sites -- in addition to Usenet groups,
|
|
gopher holes stuffed with hundreds of files, and clandestine BBSs
|
|
where abductees meet to compare "scoop marks" -- that make up the
|
|
virtual world of flying saucers.
|
|
The UFO subculture or -- for some -- the UFO religion on the
|
|
Internet is a huge supermarket of images and words. Everything is
|
|
for sale -- stories, pictures, entire belief systems. But are we
|
|
buying a meal? Or a menu?
|
|
When Schmitt uses the word "Roswell," he is not merely
|
|
identifying a small town in New Mexico that put itself on the map
|
|
with a terrific UFO story. He uses it to MEAN the whole story --
|
|
the one that says a UFO crashed in 1947 near the Roswell Army Air
|
|
Field, after which alien bodies were recovered and a cosmic
|
|
Watergate initiated.
|
|
That story is scattered on the Internet like fragments of an
|
|
exploding spaceship. Do the pieces fit together to make a
|
|
coherent puzzle? Or is something wrong with this picture?
|
|
|
|
|
|
Stalking the UFO meme on the Internet
|
|
|
|
Memes are contagious ideas that replicate like viruses from
|
|
mind to mind. On the Internet memes multiply rapidly. Fed by
|
|
fascination, incubated in the feverish excitement of devotees
|
|
transmitting stories of cosmic significance, the UFO meme mutates
|
|
into new forms, some of them wondrous and strange.
|
|
"The Roswell incident" is one variation of the UFO meme.
|
|
On the Internet, Schmitt's words are hyperlinked to those of
|
|
other UFO sleuths and legions of interested bystanders fascinated
|
|
by the psychodynamics of the subculture as well as the "data."
|
|
Before we examine a few fragments, let's pause to remember
|
|
what the Internet really is.
|
|
|
|
|
|
Copies of copies -- or copies of originals?
|
|
|
|
The Internet represents information through symbols or
|
|
icons. So does speech, writing, and printed text, but the symbols
|
|
on the Net are even further removed from the events and context
|
|
to which they point.
|
|
The power of speech gave us the ability to lie, then writing
|
|
hid the liar from view. That's why Plato fulminated at writing --
|
|
you couldn't know what was true if you didn't have the person
|
|
right there in front of you.
|
|
The printing press made it worse. Now digital images and
|
|
text are on the Net. Pixels can be manipulated. Without
|
|
correlation with other data, no digital photo or document can be
|
|
taken at face value. There's no way to know if we're looking at a
|
|
copy of an original, a copy of a copy, or a copy that has no
|
|
original.
|
|
In addition, certain phenomena elicit powerful projections.
|
|
Because projections are unconscious, we don't know if we're
|
|
looking at iron filings obscuring a magnet or the magnet.
|
|
Carl Jung said UFOs invite projections because they're
|
|
mandalas -- archetypal images of our deep Selves. Unless we
|
|
separate what he think we see from what we see, we're bound to be
|
|
confused.
|
|
Hundreds of cross-referenced links on the Web create a
|
|
matrix of credibility. In print, we document assertions with
|
|
references. Footnotes are conspicuous by their absence on the
|
|
Web. Information is self-referential. Symbols and images point to
|
|
themselves like a ten-dimensional dog chasing its own tails.
|
|
Are there "eight firsthand witnesses who saw the bodies,"
|
|
"many high-ranking military officials who said it was not of this
|
|
earth," or "550 witnesses stating that this was not from this
|
|
earth?" Schmitt makes all of those statements in the same
|
|
interview. He uses the word "witness" the way Alice in Wonderland
|
|
uses words, to mean what she wants them to mean.
|
|
Tracking down the truth about the "Roswell incident" is like
|
|
hunting the mythical Snark in the Lewis Carroll poem. The closer
|
|
one gets to the "evidence," the more it isn't there.
|
|
There is in fact not one "witness" to the "Roswell incident"
|
|
in the public domain, not one credible report that is not
|
|
filtered through a private interview or privileged communication.
|
|
There are, though, lots of people making a living from it --
|
|
makers of the Ray Santilli "autopsy film," guides for tours of
|
|
the rival crash sites in Roswell, television producers and book
|
|
publishers. It all gets very confusing.
|
|
Is any of the confusion intentional?
|
|
|
|
Ready for a Headache?
|
|
|
|
Are government agents using the subculture to manipulate
|
|
public opinion? To cover up what they know? Are UFO investigators
|
|
spies, "useful idiots" (as they're known in the spy trade), or
|
|
just in it for the buck?
|
|
An online adventure illustrates the difficulty of getting
|
|
answers.
|
|
A woman in Hamilton, Montana, was speaking to Peter
|
|
Davenport, head of the National UFO Reporting Center in Seattle
|
|
about a UFO she said was above her house. She said she heard
|
|
beeps on the radio when it was hovering. As they spoke, some
|
|
beeps sounded.
|
|
"There!" she said. "What is that?"
|
|
I recorded the beeps and posted a message on a hacker's
|
|
Internet group asking for help.
|
|
I received an offer of assistance from the LoD, the Legion
|
|
of Doom, a well-known hacker name. I emailed the beeps as an
|
|
audio file to them. They examined the switching equipment used by
|
|
the Montana telco and reported that the signals did not originate
|
|
within the system. They could say what the signals were not, but
|
|
not what they were.
|
|
In another email, a writer said he had heard similar tones
|
|
over telephone lines and shortwave radio near White Sands Missile
|
|
Range. He said friends inside the base had given him "some info
|
|
that would be of great interest.
|
|
"The documentation and info that I am getting are going to
|
|
basically confirm what a member of the team has divulged to me
|
|
[about UFO occupants].
|
|
"They are here and they are not benign."
|
|
|
|
Into the Twilight Zone
|
|
|
|
Without corroboration, that's as far as the Internet can
|
|
take us.
|
|
Words originate with someone -- but who? Is the name on the
|
|
email real? Is the account real? Was the White Sands source who
|
|
he said he was? Were his contacts telling the truth? Or was he a
|
|
bored kid killing time?
|
|
The UFO world is a hall of mirrors. The UFO world on the
|
|
Internet is a simulation of a hall of mirrors. The truth is out
|
|
there ... but how can we find it?
|
|
Plato was right. We need to know who is speaking to evaluate
|
|
the data.
|
|
|
|
The Bottom Line
|
|
|
|
A number of years ago, I volunteered to be Wisconsin state
|
|
director of the Mutual UFO Network in order to listen firsthand
|
|
to people who claimed to have encountered UFOs. I brought sixteen
|
|
years' experience as a counsellor to the project. I listened to
|
|
people from all walks of life.
|
|
My interest in the phenomena had quickened in the 1970s
|
|
during a conversation with a career Air Force officer, a guy with
|
|
all the "right stuff."
|
|
A fellow B47 pilot told him of an unusual object that flew
|
|
in formation with him for a while, then took off at an incredible
|
|
speed. The co-pilot verified the incident. Neither would report
|
|
it and risk damage to their careers.
|
|
That was the first time I heard a story like that from
|
|
someone I knew well. I remember how he looked as he told that
|
|
story. Usually confident, even cocky, he looked puzzled,
|
|
helpless. That was the first time I saw that look, too, but it
|
|
wouldn't be the last.
|
|
I have seen that look many times since as credible people --
|
|
fighter pilots, commercial air line pilots, intelligence
|
|
officers, and just plain folk fishing on an isolated lake or
|
|
walking in the woods after dark -- recounted an experience they
|
|
can't forget. They don't want publicity. They don't want money.
|
|
They just want to know what they saw.
|
|
Data has been accumulating for fifty years. Some is on the
|
|
Internet. Some is trustworthy. Much of it isn't.
|
|
Are we hunting a Snark, only to be bamboozled by a boojum?
|
|
Or are we following luminous breadcrumbs through the forest to
|
|
the Truth that is Out There?
|
|
The Net is one place to find answers, but only if our
|
|
pursuit of the truth is conducted with discipline, a rigorous
|
|
methodology and absolute integrity.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
**********************************************************************
|
|
|
|
Islands in the Clickstream is a weekly column written by
|
|
Richard Thieme exploring social and cultural dimensions
|
|
of computer technology. Comments are welcome.
|
|
|
|
Feel free to pass along columns for personal use, retaining this
|
|
signature file. If interested in (1) publishing columns
|
|
online or in print, (2) giving a free subscription as a gift, or
|
|
(3) distributing Islands to employees or over a network,
|
|
email for details.
|
|
|
|
To subscribe to Islands in the Clickstream, send email to
|
|
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
|
body of the message. To unsubscribe, email with "unsubscribe
|
|
islands" in the body of the message.
|
|
|
|
Richard Thieme is a professional speaker, consultant, and writer
|
|
focused on the impact of computer technology on individuals and
|
|
organizations.
|
|
|
|
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
|
|
|
|
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
|
*********************************************************************
|
|
|
|
------------------------------
|
|
|
|
Date: 9 Jul 1997 13:34:47 GMT
|
|
From: glr@RIPCO.COM(Glen Roberts)
|
|
Subject: File 6--Oil City Officials Worry About Link To Web Page
|
|
|
|
AP 06-30-97 12:11 PMT
|
|
AM-PA-BRF--Oil City-Internet,150
|
|
Oil City officials worry about link to web page
|
|
|
|
Eds: Note Internet address at end.
|
|
|
|
OIL CITY, Pa. (AP) Officials in this northwestern Pennsylvania
|
|
city say they do not want to be linked to an Internet site
|
|
including electronic rants against religions, blacks, women and
|
|
homosexuals.
|
|
The ``Outrage'' page is maintained by Glen Roberts, who also
|
|
posts advertisements for Oil City on his home page in cyberspace.
|
|
Oil City Mayor Malachy McMahon and other officials are afraid
|
|
people might think the page reflects the views of city residents.
|
|
Roberts has a reputation as a spokesman for Internet privacy
|
|
issues and once posted the Social Security numbers of Indiana
|
|
University employees to make a point about privacy.
|
|
He said the opinions on his page are not his own, but rather
|
|
those of anonymous people who wish to express a viewpoint.
|
|
``The whole Internet is based on people being able to say what
|
|
they want,'' Roberts said. ``It's different than a newspaper, whose
|
|
letters are filtered through editors and publishers.''
|
|
=
|
|
The Internet address for Roberts' site is:
|
|
http://www.glr.com/outrage.html.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 13 Jul 97 16:39 CDT
|
|
From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
|
|
Subject: File 7--Call for Commentaries on CuD Special Issue of Net & Education
|
|
|
|
Over the past year or two, CuD has received queries about how the
|
|
Net can be, or is being, used in classrooms, how the "virutal
|
|
university" concept is being developed, and in general, what's
|
|
going on at the K-12 and higher education levels.
|
|
|
|
This isn't a topic CuD has addressed in its 8 years of covering
|
|
cyberculture, but the number of inquiries convinces us that we
|
|
should make up for this omission. Because CuD has several
|
|
hundred thousand readers, we assume that a substantive number of
|
|
them are educators who use the Net.
|
|
|
|
We will start with a special issue in about two or three weeks,
|
|
and we solicit substantive commentaries (10-35 K) on such issues
|
|
as:
|
|
1) Innovative uses of the Net in classrooms
|
|
2) Problems/pitfalls in using the Net in teaching
|
|
3) Book reviews of Net-based pedagogy
|
|
4) Lists of URLs elated to Net pedagogy
|
|
5) Strengths/weaknesses of Virtual Universities
|
|
6) Critical essays on whether Net pedagogy is
|
|
a dilution of education
|
|
|
|
The above are suggestive. Readers will likely have other topics
|
|
of interest, so feel free to send them over for consideration.
|
|
Commentaries should be sent to: cudigest@sun.soci.niu.edu
|
|
|
|
------------------------------
|
|
|
|
Date: 10 Jul 1997 02:48:17 -0700
|
|
From: Russ Allbery <rra@stanford.edu>
|
|
Subject: File 8--Star Wars, Fanfiction, and Big Eight Newsgroup Creation
|
|
|
|
The policy of the current Big Eight newsgroup creation system on
|
|
newsgroups devoted to fanfiction has recently been criticized here. (The
|
|
Big Eight are the comp, humanities, misc, news, rec, sci, soc, and talk
|
|
hierarchies.) Here's what that policy actually is and a little background
|
|
on the reason for it.
|
|
|
|
First of all, please realize that the Big Eight is not all of Usenet. It
|
|
is just eight specific Usenet hierarchies; there are many, *many* more.
|
|
Each hierarchy is created for a different purpose and has a different set
|
|
of rules for creating new groups in that hierarchy.
|
|
|
|
A major goal of the Big Eight is to provide a relatively small set of
|
|
widely useful newsgroups that are maintained by a central newsgroup
|
|
creation system. Ideally, every system carrying the Big Eight will have
|
|
precisely the same set of newsgroups; solid propagation and consistency
|
|
across different news servers are the major feature of this sort of
|
|
approach to newsgroup creation. Obviously this procedure does *not* work
|
|
for all topics, given that a voting procedure is involved (and therefore
|
|
the possibility of a group being voted down for political reasons exists)
|
|
and given that news administrators may not want certain types of groups
|
|
created automatically without their review. This is precisely why alt.*
|
|
was created originally; alt.* has a wide-open creation policy and
|
|
therefore is home to the sorts of groups that couldn't be created in the
|
|
Big Eight for whatever reason. (The tradeoff, of course, being that alt.*
|
|
groups are often subject to manual review at each site and tend to be much
|
|
less consistent across different news sites.)
|
|
|
|
Now, about the proposed Star Wars stories group. Fanfiction (fiction
|
|
using trademarked or copyrighted characters and backgrounds without the
|
|
permission of the owners) has always been of questionable legality and
|
|
subject to the occasional lawsuit in the United States and elsewhere. Due
|
|
to the way intellectual property laws work in the United States,
|
|
fanfiction *may* be illegal and if a news site is knowingly carrying a
|
|
newsgroup devoted solely to fanfiction, it *may* be possible to sue them
|
|
as well as the authors for the violation.
|
|
|
|
No, it's probably not very *likely* that a news site would be sued. But
|
|
this *has* been an often-stated concern by news administrators in the
|
|
past.
|
|
|
|
Keep in mind the purpose of the Big Eight, namely to create a set of
|
|
useful newsgroups that can be created automatically at all the subscribing
|
|
sites. Due to this *possible* legal concern, a large number of news
|
|
administrators do not want newsgroups devoted to fanfiction automatically
|
|
created on their news servers, and therefore would not be able to just let
|
|
the Big Eight newsgroup creation process run automatically on their
|
|
servers if the Big Eight includes those groups. This directly hurts one
|
|
of the primary purposes of the hierarchies. Therefore, newsgroups which
|
|
are devoted to fanfiction are against the rules of the Big Eight unless
|
|
the proponent can show reasonable evidence that the groups would not cause
|
|
a legal problem.
|
|
|
|
Some proponents do in fact do precisely that. rec.arts.anime.creative
|
|
exists because anime and manga companies do not, as a matter of general
|
|
policy, prosecute fanfiction, so the legal concern is minimal.
|
|
rec.arts.comics.creative exists because its charter requires that stories
|
|
posted there use original characters. Other groups have been proposed
|
|
with no problems before because they would have been for parody. The
|
|
proponents of the Star Wars group were considering changing their charter
|
|
to require parody or original characters and background, which would make
|
|
the group fine under those rules.
|
|
|
|
If a group can't fit under those rules, it most certainly isn't censored.
|
|
It simply needs to be created in a different hierarchy that has looser
|
|
rules, such as alt.*. People create fanfiction groups in alt.* routinely
|
|
and some of them are quite successful.
|
|
|
|
Also, please note that no *post* is refused. The newsgroup creation
|
|
system has nothing to do with individual posts; it has to do with
|
|
newsgroups. One can post pretty much anything one wishes to any
|
|
unmoderated group, and the newsgroup creation system doesn't affect that
|
|
in the slightest. The only thing this policy affects is whether a
|
|
newsgroup devoted to fanfiction can be created in this particular set of
|
|
hierarchies.
|
|
|
|
Finally, this policy obviously doesn't affect discussion, including
|
|
discussion of fanfiction, as should be obvious from the five existing
|
|
discussion groups devoted to Star Wars. Discussion of fanfiction is
|
|
certainly on-topic in rec.arts.sf.starwars.misc and absolutely nothing
|
|
prevents it from being posted there.
|
|
|
|
Hopefully this clarifies the situation somewhat. This policy, just like
|
|
all other Big Eight newsgroup creation policies, tends to get discussed
|
|
periodically on news.groups, and anyone with questions or concerns about
|
|
it is certainly welcome to raise the issue there or contact me directly.
|
|
|
|
--
|
|
Russ Allbery (rra@stanford.edu) <URL:http://www.eyrie.org/~eagle/>
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 10 Jul 1997 23:45:11 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 9--Anti-solicitation laws and anti-spam "opt-in" mailing lists
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
One of the tactics advocated by anti-spam activists is that of an
|
|
"opt-in" mailing list. That is, I can't send you commercial
|
|
speech via e-mail unless you request the information or we have a
|
|
prior business relationship.
|
|
|
|
I read the following article in First Amendment Legal Watch
|
|
(excerpted below) where an anti-solicitation law aimed at real
|
|
estate brokers was ruled by a district judge as a violation of
|
|
the First Amendment.
|
|
|
|
I'm not very familiar with anti-solicitation laws. Are there
|
|
other decisions about statutes that have been upheld or
|
|
over-turned?
|
|
|
|
------- Begin Article -------
|
|
|
|
3. Anti-Solicitation Law Violates First Amendment
|
|
|
|
A federal district court judge recently struck down an Illinois
|
|
real-estate anti-solicitation law in a case that has gone on for
|
|
more than 10 years. The statute prohibited real-estate brokers
|
|
from soliciting home sales or listings from owners who had
|
|
provided notice that they did not wish to be solicited.
|
|
|
|
After being fined $100 for calling certain Chicago homeowners who
|
|
had signed an anti-solicitation petition, a brokerage firm and
|
|
several brokers challenged the law in federal court.
|
|
|
|
The case has a long and convoluted history. Initially, federal
|
|
district court Judge Brian Barnett Duff denied the brokerage
|
|
firm's motion to enjoin the law. During the appeals process, the
|
|
case eventually reached the U.S. Supreme Court, which sent it back
|
|
down to Judge Duff for reevaluation under a different
|
|
constitutional standard. In April 1996, the parties had a bench
|
|
(non-jury) trial which resulted in this recent opinion.
|
|
|
|
Judge Duff ruled the law violated real-estate brokers' free-speech
|
|
and due-process rights. Analyzing the law under the commercial
|
|
free-speech doctrine, the Court found that the Illinois attorney
|
|
general failed to show that the anti-solicitation law "materially
|
|
and directly advanced" the state's interests in protecting
|
|
residential privacy and preventing blockbusting-a real-estate
|
|
practice in which brokers encourage owners to sell their homes by
|
|
exploiting fears of racial change in the neighborhood.
|
|
|
|
According to the judge, blockbusting is an outdated practice in
|
|
today's society that could, in any event, be properly punished
|
|
under other laws. He also found that real-estate solicitation
|
|
constituted only a small portion of messages residents encounter.
|
|
For this reason, the judge found that the law restrained too much
|
|
speech while only marginally protecting privacy concerns.
|
|
|
|
The judge also determined the law violated due process because the
|
|
law failed to define the term "solicit. " According to the court
|
|
opinion, a broker could unwittingly violate the law by harmlessly
|
|
handing out business cards to someone who has signed an
|
|
anti-solicitation petition.
|
|
|
|
<snip>
|
|
|
|
First Amendment Legal Watch Contact Info --
|
|
|
|
copyright 1997 First Amendment Center
|
|
|
|
To subscribe to the Legal Watch mailing list send an email to
|
|
legalwatch-join@truman.fac.org
|
|
|
|
To unsubscribe send an email to legalwatch-off@truman.fac.org
|
|
|
|
Legal Watch is available on our Web site (http://www.fac.org) in
|
|
HTML format and Adobe Acrobat format for printing.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.56
|
|
************************************
|
|
|