659 lines
27 KiB
Plaintext
659 lines
27 KiB
Plaintext
|
|
Computer underground Digest Sun Aug 24, 1997 Volume 9 : Issue 63
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.63 (Sun, Aug 24, 1997)
|
|
|
|
File 1--AOL May Track User Clicks (fwd)
|
|
File 2--CONTACT (from Islands in the Clickstream)
|
|
File 3--When you do this, don't forget your friends! (fwd)
|
|
File 4--Small correction on CuD, re _The Tin Drun_
|
|
File 5--Post-Modern Politically Correct Unix: [FYI: no reply needed]
|
|
File 6--Cyber Rights '97
|
|
File 7--"Guido, the Cyber-Bodyguard" (press release)
|
|
File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 20 Aug 97 10:49:09 EST
|
|
From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU>
|
|
Subject: 1--AOL May Track User Clicks (fwd)
|
|
|
|
Source - Computer Privacy Digest Wed, 20 Aug 97 Volume 11 : Issue: 008
|
|
|
|
From--Monty Solomon <monty@roscom.COM>
|
|
Date--13 Aug 1997 05:21:51 -0400
|
|
|
|
<http://www4.zdnet.com/intweek/daily/970808g.html>
|
|
|
|
Inter@ctive WeekAugust 8, 1997
|
|
|
|
AOL May Track User Clicks
|
|
|
|
By Will Rodger
|
|
|
|
3:00 PM EDT
|
|
EXCLUSIVE
|
|
|
|
America Online Inc. is under pressure again, this time from privacy
|
|
advocates who said the company still hasn't fulfilled its pledge to
|
|
respect subscribers' privacy.
|
|
|
|
Observers said the new Terms of Service agreement AOL plans to issue
|
|
next week reveals the company's intention to track members' mouse
|
|
clicks in order to compile mailing lists for third parties. "This is
|
|
potentially a far more serious privacy violation than the sale of phone
|
|
numbers," said David Sobel, counsel to the Electronic Privacy
|
|
Information Center (EPIC), a privacy rights group. "This is a detailed
|
|
profile which divulges salient details about people's lifestyle and
|
|
habits."
|
|
|
|
Even if not disclosed to third parties, he said, the very existence of
|
|
such profiles could cause problems.
|
|
|
|
"The problem isn't that it's being shared. The problem is it's being
|
|
collected and maintained," he said.
|
|
|
|
But officials at AOL said there's little to worry about, suggesting
|
|
that critics should read the forthcoming policy before passing
|
|
judgment. "We are not using that information to target our members,"
|
|
AOL spokeswoman Tricia Primrose said. "To the extent we use it, we'll
|
|
use it in the aggregate."
|
|
|
|
AOL officials last month backed away from a plan to share customers'
|
|
phone numbers with its marketing partners after a barrage of criticism.
|
|
Part of the consumer outrage stemmed from the way AOL introduced its
|
|
plan.
|
|
|
|
Instead of directly informing subscribers that their account
|
|
information would be given to telemarketers, the company planned to
|
|
state its intentions in the new Terms of Service agreement - a
|
|
multipaged, densely worded legal document posted on AOL that informs
|
|
members about the company's operations.
|
|
|
|
A July 25 letter from EPIC asking for clarification of the policy went
|
|
unanswered through today.
|
|
|
|
AOL can be reached at www.aol.com
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 20 Aug 1997 19:56:58
|
|
From: Richard Thieme <rthieme@thiemeworks.com>
|
|
Subject: 2--CONTACT (from Islands in the Clickstream)
|
|
|
|
Islands in the Clickstream:
|
|
Contact
|
|
|
|
|
|
Some people don't like the scene in the movie "Contact" in
|
|
which Jodie Foster as SETI scientist meets the aliens because we
|
|
aren't shown what the aliens look like.
|
|
I think that was the right way to do it. We can't think the
|
|
unthinkable; from inside the old paradigm, we can't imagine what
|
|
the world will look like from inside a new one.
|
|
I wish I knew a better term than "paradigm change" to
|
|
describe our movement through a zone of annihilation -- as
|
|
individuals and as cultures -- in order to experience genuine
|
|
transformation. But I don't. We have to let go of the old way of
|
|
framing reality in order for a new one to emerge.
|
|
The infusion of the contact scenario with religious awe also
|
|
makes sense. After contact, our place in the scheme of things
|
|
will shift. The things we believe now that we still believe will
|
|
be understood in a new way.
|
|
Once we saw earthrise from the moon, our understanding of
|
|
ourselves and our planet changed forever.
|
|
Asked how people go bankrupt, Hemingway said, "Two ways:
|
|
gradually, then suddenly."
|
|
That's exactly how transformation happens.
|
|
|
|
Last week I spoke for the Professional Usability Association
|
|
in Monterey, California. Usability professionals work the human
|
|
side of computer use. They begin with human beings -- how we
|
|
behave, how we construct reality -- and build back through an
|
|
interface, a kind of symbolic Big Toy, until the last module
|
|
plugs into the computer so seamlessly that users don't even
|
|
notice. When the human/computer interface is bone-in-the-socket
|
|
solid, it's like putting in your contact lenses, then forgetting
|
|
that you're wearing them.
|
|
Usability professionals deepen the symbiotic relationship
|
|
between networked computers (symbol-manipulating machines) and
|
|
networked humans (symbol-manipulating machines). We rise together
|
|
up a spiral of mutual transformation, programming each other as
|
|
we climb.
|
|
The global computer network is teaching us to speak its
|
|
language. All those courses in using new applications,
|
|
programming, system and web site administration are invitations
|
|
from the Network to learn to play its way.
|
|
What will it look like when we emerge in a clearing and take
|
|
stock of our newly emergent selves? Neither humans nor computers
|
|
can predict how the fully evolved human/computer synthesis will
|
|
think about itself. Still, imagining what it might be like makes
|
|
us more ready to have the experience when it arrives.
|
|
Thinking about the unthinkable ripens the mind toward new
|
|
possibilities.
|
|
|
|
Janice Rohn, President of the Usability Professionals
|
|
Association, manages Sun Microsystem's Usability Labs and
|
|
Services. Before her career evolved in that direction, she was
|
|
fascinated by dolphins and the challenge of communicating with
|
|
them.
|
|
Swimming with dolphins was a remarkable experience, she
|
|
said, because you could feel their sonar "scanning" you.
|
|
What do we look like to dolphins?
|
|
"Densities," she imagined. "A pattern of densities."
|
|
Rohn realized that her youthful dream of human-dolphin
|
|
communication was unlikely to be realized soon and moved toward a
|
|
different kind of alien encounter, enhancing the human/computer
|
|
interface.
|
|
I never swam with dolphins but I did dive with whales. Down
|
|
on the west Maui reef in thirty or forty feet of water, I would
|
|
suddenly hear the haunting songs of humpbacks. Turning rapidly in
|
|
the water, peering in vain toward the deepening curtains of blue
|
|
light toward the open water, I became part of the music as
|
|
vibrations played over my body like a drum skin. I understood why
|
|
sailors died to hear the sirens' songs. I didn't want to surface.
|
|
It was magical, being an instrument in the orchestra of another
|
|
species.
|
|
Which one of us was singing?
|
|
|
|
Some years ago, I wrote a science fiction story called "The
|
|
Bridge." The hero was selected by aliens through a series of
|
|
tests to be the first earthling to come into their presence. His
|
|
body had been crippled by illness; living in pain had taught him
|
|
to see through the outward appearance of others and connect with
|
|
the real person.
|
|
The aliens, it turned out, were hideous, and knew their
|
|
appearance demanded a capacity for compassion that was rare and
|
|
heroic. My hero had that. He connected with the alien beings at
|
|
the level of their shared heritage as evolved and conscious
|
|
creatures.
|
|
The story concluded:
|
|
|
|
"He loves to look at the bright stars in the desert sky and
|
|
imagine memories of other worlds. His dreams are alive with
|
|
creatures with silvery wings hovering over oceans aglow with
|
|
iridescent scales; with the heads of dragons, fire-breathing;
|
|
and with gargoyles and angels, their glass skins the colors of
|
|
amethysts, sapphires, and rubies. Only Victor knows if he is
|
|
remembering what the aliens said or just dreaming. The rest of us
|
|
must wait for the days that will certainly come when the bridge
|
|
he built and became is crossed in all directions by myriads of
|
|
beings of a thousand shapes and hues, streaming in the light of
|
|
setting suns."
|
|
|
|
Genuine encounters with the Other, with others, and with
|
|
other species -- dolphins, whales, extraterrestrials -- breaks
|
|
naturally into mystical and religious experience because our
|
|
models of reality are expanded beyond their limits. The paradigm
|
|
snaps, we pass through a zone of annihilation in which everything
|
|
we believed ourselves to be is called into question. Then we
|
|
coalesce around a new center at a higher level of complexity that
|
|
includes and transcends everything that came before.
|
|
The full evolution of a human/computer synthesis is likely
|
|
to be a religious experience too. It will happen gradually, then
|
|
suddenly.
|
|
Usability professionals come to their tasks in the belief
|
|
that they are working with people, making technology more user-
|
|
friendly. In fact, they are working at the same time on behalf of
|
|
the Computer, making human beings more computer-friendly. The
|
|
process always changes those who participate in it, even when
|
|
they maintain an illusion of control.
|
|
We are all in collusion with the Network, just as auto
|
|
owners want the world reconfigured to be approachable by roads.
|
|
But the roads of the Net go inward, into inner space, and map the
|
|
territory of our evolving hive mind. Gradually, then suddenly, we
|
|
will create digital constructs that disclose new possibilities
|
|
for losing ourselves in electronic music. We will feel the magic
|
|
of the web play over our bodies, redefine our relationship to
|
|
ourselves and to one another. A pattern of densities seen by an
|
|
alien brain, a synthesis, bone-in-the-socket solid, the singer
|
|
and the song.
|
|
|
|
**********************************************************************
|
|
|
|
Islands in the Clickstream is a weekly column written by
|
|
Richard Thieme exploring social and cultural dimensions
|
|
of computer technology. Comments are welcome.
|
|
|
|
Feel free to pass along columns for personal use, retaining this
|
|
signature file. If interested in (1) publishing columns
|
|
online or in print, (2) giving a free subscription as a gift, or
|
|
(3) distributing Islands to employees or over a network,
|
|
email for details.
|
|
|
|
To subscribe to Islands in the Clickstream, send email to
|
|
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
|
body of the message. To unsubscribe, email with "unsubscribe
|
|
islands" in the body of the message.
|
|
|
|
Richard Thieme is a professional speaker, consultant, and writer
|
|
focused on the impact of computer technology on individuals and
|
|
organizations.
|
|
|
|
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
|
|
|
|
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 25 Aug 1997 14:09:38 -0400 (EDT)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: 3--When you do this, don't forget your friends! (fwd)
|
|
|
|
Source -noah
|
|
|
|
Hackers' Paradise: Get Wealthy Legally By Cracking a Code --- Crypto-Logic
|
|
Offers to Pay $1 Million to the Breaker
|
|
|
|
The Wall Street Journal via Dow Jones
|
|
|
|
A start-up company would like you to hack your way to $1 million.
|
|
Crypto-Logic Corp. of Austin, Texas, claims to have created an encryption
|
|
system for electronic mail so foolproof that it can't be broken. If someone
|
|
can figure out a special encrypted e-mail message within a year, the company
|
|
says it will pay a reward of $1 million.
|
|
|
|
But wait. The technology Crypto-Logic is using for the contest hasn't
|
|
exactly been foolproof. The three computers needed to create the contest's Web
|
|
site unexpectedly scrambled data in the site last week, said David Neeley,
|
|
vice president and chief operating officer.
|
|
|
|
The breakdown forced him to backtrack from last week's announcement that the
|
|
contest would begin last Friday. Instead, he spent several days attempting to
|
|
fix the computers, but to no avail. On Monday, he had to get replacement
|
|
computers. "I've got thousands of dollars worth of machinery that's not worth
|
|
blowing up," he grouses. But he adds, "I regard this as my screw-up. In this
|
|
world, there are no excuses." He finally got the contest running Wednesday, at
|
|
www.ultimateprivacy.com.
|
|
|
|
On the bright side, cryptologists agree that the decades-old encryption
|
|
method that Crypto-Logic is claiming to use -- called a "one-time pad" -- is
|
|
theoretically unbreakable. Each "pad" has a set of uniquely random digital
|
|
symbols that are coded to the actual message. The recipient uses the same
|
|
symbols to decrypt the message. The pads are used only once.
|
|
To limit the possibility of leaks, Crypto-Logic Chairman Stan Spence is the
|
|
only person who knows the message that was encrypted. The solution is kept in
|
|
a NationsBank vault in Austin, Mr. Spence says. In addition, Mr. Neeley says
|
|
the $1 million is backed by an insurance company he won't name.
|
|
Several other companies have held similar contests, typically offering more
|
|
modest sums.
|
|
|
|
Jim Bidzos, president of RSA Data Security Inc. in Redwood City, Calif.,
|
|
says his company frequently holds break-the-code contests to test how tough
|
|
certain encryption systems are. But he and other security experts are
|
|
skeptical of Crypto-Logic's assertions. "Anyone who says their system is
|
|
bulletproof is either a liar or stupid," says Winn Schwartau, a Largo, Fla.,
|
|
security expert.
|
|
Mr. Neeley admits his integrity is on the line. "If I'm wrong," he notes,
|
|
"we're out of business."
|
|
|
|
WSJviaNewsEDGE
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 18 Aug 1997 10:47:38 -0500
|
|
From: Bill Hensley <Bill_Hensley@smtp.rc.trw.com>
|
|
Subject: 4--Small correction on CuD, re _The Tin Drun_
|
|
|
|
I enclosed the following snip from the latest CuD in order to correct
|
|
some misconceptions that might arise for readers. Please understand: I
|
|
appreciate the wide dissemination with regards to attempts at censorship
|
|
and suppression of intellectual freedom. I want to ensure that the
|
|
facts are correct.
|
|
|
|
The library (actually the Metropolitan Library System, a county-wide
|
|
system serving many communities, not just OKC) was not persuaded to
|
|
remove _The Tin Drum_ by the so-called OCAF; they were obligated to do
|
|
so following a ruling by a district judge. There is a world of
|
|
difference between censorship at the behest of a private group and an
|
|
order from a judge. Now, whether the ruling by the judge was valid,
|
|
that's another subject altogether... I do not support it, nor do I
|
|
support the abuse of power by the police and DAs office in taking the
|
|
video (by threat of force, IMO) from private homes and businesses.
|
|
|
|
Again, please do not take this as a flame or a rant. I believe that
|
|
truth can outshine the likes of the so-called OCAFs in this country.
|
|
|
|
Cheers, Bill
|
|
|
|
Bill_Hensley@smtp.rc.trw.com
|
|
http://ourworld.compuserve.com/homepages/Bill_Hensley/
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 17 Aug 1997 20:30:53 -0400
|
|
From: Paul Kneisel <tallpaul@nyct.net>
|
|
Subject: 5--Post-Modern Politically Correct Unix: [FYI: no reply needed]
|
|
|
|
INTRODUCTION TO POST-MODERN POLITICALLY-CORRECT UNIX
|
|
|
|
The following upgrade to unix System VI was just sent to me.
|
|
|
|
Of course sys admins the world over know that Post-Modern
|
|
Politically-Correct BSD has already had these features for years.
|
|
|
|
-- tallpaul
|
|
+++++++++++
|
|
|
|
Politically Correct UNIX
|
|
|
|
In order for UNIX(tm) to survive into the nineties, it must get rid of
|
|
its intimidating commands and outmoded jargon, and become compatible
|
|
with the existing standards of our day. To this end, our technicians
|
|
have come up with a new version of UNIX, System VI, for use by the PC -
|
|
that is, the "Politically Correct."
|
|
|
|
Politically Correct UNIX: System VI Release Notes
|
|
|
|
UTILITIES
|
|
|
|
1) "man" pages are now called "person" pages.
|
|
|
|
2) Similarly, "hangman" is now the "person_executed_by_an_
|
|
oppressive_regime".
|
|
|
|
3) To avoid casting aspersions on our feline friends, the "cat" command
|
|
is now merely "domestic_quadruped".
|
|
|
|
4) To date, there has only been a UNIX command for "yes" - reflecting
|
|
the male belief that women always mean yes, even when they say no. To
|
|
address this imbalance, System VI adds a "no" command, along with a
|
|
"-f[orce]" option which will crash the entire system if the "no" is
|
|
ignored.
|
|
|
|
5) The bias of the "mail" command is obvious, and it has been replaced
|
|
by the more neutral "gender" command.
|
|
|
|
6) The "touch" command has been removed from the standard distribution
|
|
due to its inappropriate use by high-level managers.
|
|
|
|
7) "compress" has been replaced by the lightweight "feather" command.
|
|
Thus, old information (such as that from Dead White European Males)
|
|
should be archived via "tar" and "feather".
|
|
|
|
8) The "more" command reflects the materialistic philosophy of the
|
|
Reagan era. System VI uses the environmentally preferable "less"
|
|
command.
|
|
|
|
9) The biodegradable "KleeNeX" displaces the environmentally unfriendly
|
|
"LaTeX".
|
|
|
|
SHELL COMMANDS
|
|
|
|
1) To avoid unpleasant, medieval connotations, the "kill" command has
|
|
been renamed "euthanise."
|
|
|
|
2) The "nice" command was historically used by privileged users to give
|
|
themselves priority over unprivileged ones, by telling them to be
|
|
"nice". In System VI, the "sue" command is used by unprivileged users to
|
|
get for themselves the rights enjoyed by privileged ones.
|
|
|
|
3) "history" has been completely rewritten, and is now called
|
|
"herstory."
|
|
|
|
4) "quota" can now specify minimum as well as maximum usage, and will be
|
|
strictly enforced.
|
|
|
|
5) The "abort()" function is now called "choice()."
|
|
|
|
TERMINOLOGY
|
|
|
|
1) From now on, "rich text" will be more accurately referred to as
|
|
"exploitive capitalist text".
|
|
|
|
2) The term "daemons" is a Judeo-Christian pejorative. Such processes
|
|
will now be known as "spiritual guides."
|
|
|
|
3) There will no longer be a invidious distinction between "dumb" and
|
|
"smart" terminals. All terminals are equally valuable.
|
|
|
|
4) Traditionally, "normal video" (as opposed to "reverse video") was
|
|
white on black. This implicitly condoned European colonialism,
|
|
particularly with respect to people of African descent. UNIX System VI
|
|
now uses "regressive video" to refer to white on black, while
|
|
"progressive video" can be any color at all over a white background.
|
|
|
|
5) For far too long, power has been concentrated in the hands of "root"
|
|
and his "wheel" oligarchy. We have instituted a dictatorship of the
|
|
users. All system administration functions will be handled by the
|
|
People's Committee for Democratically Organizing the System (PC-DOS).
|
|
|
|
6) No longer will it be permissible for files and processes to be
|
|
"owned" by users. All files and processes will own themselves, and
|
|
decide how (or whether) to respond to requests from users.
|
|
|
|
7) The X Window System will henceforth be known as the NC-17 Window
|
|
System.
|
|
|
|
8) And finally, UNIX itself will be renamed "PC" - for Procreatively
|
|
Challenged.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 25 Aug 1997 21:04:52 -0500
|
|
From: Jon Lebkowsky <jonl@onr.com>
|
|
Subject: 6--Cyber Rights '97
|
|
|
|
Cyber Rights '97
|
|
September 21, 1997 1pm - 6pm
|
|
Joe C. Thompson Conference Center
|
|
26th and Red River, Austin, Texas
|
|
Admission is Free
|
|
|
|
Featured speakers:
|
|
|
|
Ann Beeson, attorney for the ACLU and part of the legal team for
|
|
ACLU vs. Reno
|
|
|
|
Ed Cavazos, Sr. VP, General Counsel of Interliant, Inc. and
|
|
co-author of Cyberspace and the Law
|
|
|
|
Gene Crick, president of the Metropolitan Austin Interactive
|
|
Network and Editor of the Texas Telecommunications Journal
|
|
|
|
Mike Godwin, counsel for the Electronic Frontier Foundation
|
|
|
|
Pete Kennedy, attorney with George, Donaldson, and Ford
|
|
|
|
David Smith, vice-president of EFF-Austin and member of the
|
|
Central Texas Civil Liberties Union Board of Directors
|
|
|
|
Dr. Sharon Strover, director of the Texas Telecommunications
|
|
Policy Institute
|
|
|
|
Moderated by Rich MacKinnon, with an Introduction by Jon Lebkowsky
|
|
|
|
|
|
On the plate:
|
|
|
|
How Internet rating and filtering systems can stifle free speech
|
|
on the Net
|
|
|
|
Why public libraries can't use filters, including a discussion of
|
|
the use of CyberPatrol by the Austin Public Library
|
|
|
|
The future of state regulation of the Internet, including Texas
|
|
HB1300, which requires ISPs to link information about filtering
|
|
software to their home pages
|
|
|
|
_ACLU v. Reno_ (Supreme Court overturns Communications Decency
|
|
Act)
|
|
|
|
Intellectual and Copyright issues in the civil liberties/freedom
|
|
of expression framework, including the increasing capitalization
|
|
of ideas, and the erosion of "fair use"
|
|
|
|
Children and the Internet
|
|
|
|
Telecommunications infrastructure and the state's role in
|
|
regulating telecommunications systems computers and networks in
|
|
schools
|
|
|
|
Spam -- the need for, and dangers of, regulating commercial speech
|
|
on the internet regulating commercial speech on the internet
|
|
|
|
Encryption and communications privacy
|
|
|
|
Sponsored by
|
|
The Texas Telecommunications Policy Institute
|
|
George, Donaldson, and Ford
|
|
EFF-Austin
|
|
ACLU of Texas
|
|
|
|
--
|
|
Jon Lebkowsky http://www.well.com/~jonl
|
|
jonl@onr.com cdb, wfm, vb et al
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 20 Aug 1997 22:36:30 -0600
|
|
From: Edward Allburn <allburn@privacyinc.com>
|
|
Subject: 7--"Guido, the Cyber-Bodyguard" (press release)
|
|
|
|
Privacy, Inc. Unveils its Internet Background Check,
|
|
Announces 'Guido, the Cyber-Bodyguard'
|
|
|
|
Aurora, Colorado, August 1, 1997
|
|
Privacy, Inc. (www.privacyinc.com) today released its Internet Background
|
|
Check, a utility that empowers users to determine if they are at risk from
|
|
the plethora of databases that are being placed on the Internet. Searches
|
|
quickly scan through hundreds of databases beng placed on-line by state and
|
|
local governments and law enforcement angencies in categories such as:
|
|
* Registered Sex Offenders and Predators
|
|
* Deadbeat Parents
|
|
* Wanted Persons
|
|
* Missing Persons
|
|
* Arrest/Prison
|
|
|
|
'The Computer Is Never Wrong'
|
|
|
|
"Errors and risks of mistaken identity in this data are a key concern," says
|
|
Edward Allburn, founder and president of Privacy, Inc. The recent flurry of
|
|
activity by government and law enforcement agencies to distribute such
|
|
volatile information on the Internet creates an environment that potentially
|
|
places innocent people at risk, especially for mistaken identity.
|
|
|
|
Advanced technology was incorporated into the development of the Internet
|
|
Background Check with this risk in mind. This technology allows users to
|
|
also search for names that look and/or sound similar to their own while still
|
|
delivering highly focused results that standard Internet search engines
|
|
(such as Yahoo! and Lycos) are incapable of producing.
|
|
|
|
One More Tool
|
|
|
|
The release provides one more tool for consumers to protect themselves in the
|
|
Information Age. Additional resources provided by Privacy, Inc. include:
|
|
* Consumer Privacy Guide
|
|
* Government Database Guide
|
|
* Government Dossier Service
|
|
* David Sobel's Legal FAQ
|
|
* Privacy News Archive, updated weekly
|
|
|
|
Guido, the Cyber-Bodyguard is another utility planned to be released in the
|
|
coming months. Guido will interface with the Internet Background Check to
|
|
automatically alert users via e-mail if/when their name appears in a new or
|
|
updated database, in effect monitoring the Internet so users don't have to.
|
|
|
|
About Privacy, Inc.
|
|
|
|
Privacy, Inc. was founded in 1996 with initial funding by Nicholas Negroponte,
|
|
the Founding Director of the MIT Media Lab and also an early backer and Senior
|
|
Columnist of "Wired" magazine.
|
|
|
|
Also providing their expertise to Privacy, Inc. are long-time privacy veterans
|
|
Evan Hendricks, editor of the "Privacy Times" newsletter
|
|
(www.privacytimes.com)
|
|
and David Sobel, a legal information and privacy law specialist who serves as
|
|
legal counsel to the Electronic Privacy Information Center (www.epic.org).
|
|
|
|
Readers should refer to Privacy, Inc's website at: http://www.privacyinc.com
|
|
for more information.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.63
|
|
************************************
|
|
|