738 lines
34 KiB
Plaintext
738 lines
34 KiB
Plaintext
|
|
Computer underground Digest Sun Apr 12, 1998 Volume 10 : Issue 22
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.22 (Sun, Apr 12, 1998)
|
|
|
|
File 1--Digital wiretapping in the Netherlands
|
|
File 2--Fwd: Canada Hacker Arrested in NASA Case
|
|
File 3--US Govt wants to "tag" color printers
|
|
File 4--E-mail 'Spammer' Settles Lawsuit For $2 Million
|
|
File 5--Shareware and Persuasion (fwd)
|
|
File 6--"Web Security: A Step-by-Step Reference Guide", L.D. Stein
|
|
File 7--Information Trumps Reality (From NETFUTURE #68)
|
|
File 8--APRIL 16 -- FANTASTIC CPSR/Chicago program (fwd)
|
|
File 9--Cu Digest Header Info (unchanged since 7 Apr, 1998)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
From: "Maurice Wessling" <maurice@XS4ALL.NL>
|
|
Date: Tue, 7 Apr 1998 10:51:18 +0000
|
|
Subject: File 1--Digital wiretapping in the Netherlands
|
|
|
|
PRESS RELEASE
|
|
XS4ALL Internet
|
|
Monday, April 6th 1998
|
|
|
|
Dutch parliament about to approve tapping paragraph after
|
|
pressure from Internal Security Agency.
|
|
|
|
A letter from the Internal Security Agency (BVD) to the leaders
|
|
of the four largest parties in parliament has played a key role
|
|
in ensuring that in all likelyhood, a majority of dutch
|
|
parliament will vote to include a controversial paragraph in the
|
|
new telecommunications law. In an attempt to secure government
|
|
access to telecommunication between citizens, the new
|
|
telecommunications law includes a paragraph that, among other
|
|
things, forces ISPs to make their networks tappable, at their
|
|
own expense.
|
|
|
|
In the letter, the BVD stresses the need for expansion of its
|
|
tapping capabilities. The dutch labour party (PvdA), the largest
|
|
party in The Netherlands, withdrew its objections against the law
|
|
upon receiving the letter.
|
|
|
|
Internet Service Providers, legal experts, business community
|
|
representatives, and the dutch government privacy watchdog
|
|
organization have expressed concern over the extention of tapping
|
|
capabilities for police and intelligence organizations. The new
|
|
law places a large financial burden on providers. Furthermore,
|
|
the necessity to expand the tapping capabilities was not
|
|
documented or argumented for.
|
|
|
|
XS4ALL, one of the countries largest ISPs has appealed to
|
|
parliament on several occasions to postpone the tapping paragraph
|
|
(chapter 13 of the new law) until the minister properly documents
|
|
the need for such radical changes. Of the large parties, only
|
|
D'66 will vote for postponing the tapping paragraph
|
|
|
|
|
|
Maurice Wessling <maurice@xs4all.nl>
|
|
Public Affairs
|
|
XS4ALL Internet
|
|
Amsterdam, Netherlands
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 7 Apr 1998 22:59:58 EDT
|
|
From: Cu digest <Cudigest@aol.com>
|
|
Subject: File 2--Fwd: Canada Hacker Arrested in NASA Case
|
|
|
|
Canada Hacker Arrested in NASA Case
|
|
|
|
.c The Associated Press
|
|
|
|
SUDBURY, Ontario (AP) - A 22-year-old man faces dozens of charges
|
|
in a case involving the cracking of the computer security codes at
|
|
top aerospace facilities in the United States.
|
|
|
|
The Royal Canadian Mounted Police, which conducted a 14-month
|
|
investigation, say a hacker broke into the computer systems at the
|
|
National Aeronautics and Space Administration Center, the National
|
|
Oceanographic and Atmospheric Association and Hughes STC, an
|
|
aerospace firm.
|
|
|
|
(The article notes that in one case, $50,000 damage was
|
|
caused to files and that access was also gained into several
|
|
private and university computer systems in Canada and the U.S.)
|
|
|
|
<snip>
|
|
|
|
Jason Mewhiney, 22, of Val Caron, is charged with mischief by
|
|
willfully obstructing, interrupting and interfering with the
|
|
lawful use of data. He is to appear in court May 13.
|
|
|
|
------------------------------
|
|
|
|
Date: 06 Apr 1998 15:29:44 -0400
|
|
From: Mark Atwood <mra@POBOX.COM>
|
|
Subject: File 3--US Govt wants to "tag" color printers
|
|
|
|
A recent news article has made me a bit nervous.
|
|
|
|
In Yahoo News in a Reuters article dated Tuesday March 31 2:25 PM EST
|
|
and titled "Lawmakers Press for Anti-Counterfeit Measures"..
|
|
|
|
The anticounterfeiting officers of the US Fed Govt, along with
|
|
Rep. Michael Castle, (R-DE), are "concerned" with the increasing use
|
|
of scanners and color printers to do "small batch" counterfeiting, and
|
|
want to change the laws a bit. I guess the existing laws are targetedd
|
|
at the "olddays" of making counterfeit plates, and running off a few
|
|
million dollars, not some small time operation of making a few
|
|
thousand in $50 bills. Castle said "previous sentencing guidelines
|
|
based on total amounts of counterfeit notes seized should not apply".
|
|
|
|
I can understand and support that.
|
|
|
|
BUT, the article goes on to say:
|
|
|
|
"In addition, Castle said, practical and realistic measures to tag
|
|
scanners and printers must be considered, in order to identify the
|
|
source of the counterfeit notes."
|
|
|
|
In other words, he wants every color printer to embed some sort of
|
|
signature into its output, so that the "authorities" can determine
|
|
where it came from.
|
|
|
|
I remember, back in high school civics, one of the bits of patriotic
|
|
propaganda that was dispenced to us, was that the USSR required all
|
|
photocopiers to embed a machine id and page number into its output, so
|
|
that the "authorites" could control their use as publishing tools.
|
|
|
|
Now the USA wants to do the same thing.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 31 Mar 1998 01:56:21 -0500 (EST)
|
|
From: editor@TELECOM-DIGEST.ORG
|
|
Subject: File 4--E-mail 'Spammer' Settles Lawsuit For $2 Million
|
|
|
|
((MODERATORS' NOTE: For those not familiar with Pat Townson's
|
|
TELECOM DIGEST, it's an exceptional resource. From the header
|
|
of TcD:
|
|
"TELECOM Digest is an electronic journal devoted mostly but
|
|
not exclusively to telecommunications topics. It is
|
|
circulated anywhere there is email, in addition to various
|
|
telecom forums on a variety of public service systems and
|
|
networks including Compuserve and America On Line. It is also
|
|
gatewayed to Usenet where it appears as the moderated
|
|
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
|
|
qualified organizations and individual readers. Write and tell
|
|
us how you qualify:
|
|
* ptownson@massis.lcs.mit.edu * ======" ))
|
|
==================
|
|
|
|
|
|
Source: TELECOM Digest Tue, 31 Mar 98 - Volume 18 : Issue 48
|
|
|
|
Date--Mon, 30 Mar 1998 08:42:44 -0500
|
|
From--The Old Bear <oldbear@arctos.com>
|
|
|
|
LOS ANGELES (AP) - March 29, 1998 - A company that once sent as
|
|
many as 25 million unsolicited e-mail ads a day has agreed to pay
|
|
$2 million to settle a lawsuit aimed at ending the so-called
|
|
"spamming."
|
|
|
|
Under a consent decree filed in Los Angeles County Superior Court,
|
|
Cyber Promotions Inc. also must stop sending unsolicited bulk
|
|
e-mailings to customers of Earthlink Network Inc., {The New York
|
|
Times} reported Sunday, citing documents that Earthlink released
|
|
Friday.
|
|
|
|
"The most important benefit of this judgment is the message we've
|
|
sent to spammers that illegally tap our resources and clog up the
|
|
Internet with this trash -- we won't stand for it," said Charles
|
|
Garry Betty, chief executive of the Pasadena-based Earthlink,
|
|
which provides Internet service to more than 450,000 people.
|
|
|
|
Cyber Promotions, based in Dresher, Pennsylvania, was considered
|
|
the largest purveyor of unsolicited e-mail ads. A similar
|
|
injunction against the company was issued last year in a lawsuit
|
|
filed by America Online, the world's largest online service.
|
|
|
|
Cyber Promotions has been inactive for several months since its
|
|
own Internet provider refused to continue providing a connection,
|
|
the Times said.
|
|
|
|
Critics complain that the junk e-mails slow down receipt of genuine
|
|
messages and invade the privacy of e-mail users. Programmers
|
|
continually are upgrading computer programs designed to block
|
|
the unwanted messages.
|
|
|
|
California is one of about a dozen states considering laws to limit
|
|
unsolicited commercial e-mail. Last week, Washington became the
|
|
first state to enact such legislation. Congress also is looking
|
|
into the matter.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 6 Apr 98 18:56:06 -0700
|
|
From: Gordon Meyer <gordon@g2meyer.com>
|
|
Subject: File 5--Shareware and Persuasion (fwd)
|
|
|
|
Shareware and Persuasion
|
|
|
|
Scott J. Kleper
|
|
Stanford University
|
|
PO Box 3167
|
|
Stanford, CA 94309 USA
|
|
+1 650 497 1972
|
|
klep@cs.stanford.edu
|
|
|
|
|
|
ABSTRACT
|
|
|
|
Shareware programs generally achieve less than a 1% rate of registration.
|
|
Authors have tried to augment their software with various techniques
|
|
employing a variety of theories of persuasion, for encouraging users to
|
|
register. This paper attempts to formalize how persuasion is applied to
|
|
shareware, determine which methods work best, and analyze why. Based on
|
|
previous studies, it has been shown that crippling a program results in
|
|
the best returns. I attribute these results to the use of positive
|
|
reinforcement in crippleware.
|
|
Keywords
|
|
shareware, persuasion, Captology.
|
|
|
|
INTRODUCTION
|
|
|
|
As a business model, shareware is a very unique venture. A successful
|
|
author must not only product good software, but must also convince the
|
|
user that the software they have obtained for free is worth paying for.
|
|
While most people are morally responsible and do not intend to steal,
|
|
they often need an extra push to send in a shareware payment.
|
|
Quantification of shareware registration habits relative to the
|
|
techniques of persuasion employed may reveal the effectiveness of the
|
|
various theories of persuasion as they relate to software.
|
|
|
|
REGISTRATION VEHICLES
|
|
|
|
The three main vehicles for shareware registration-nagscreens,
|
|
crippleware, and time bombs, apply different techniques of persuasion.
|
|
|
|
Nagscreens
|
|
A software nagscreen is typically a dialog box that appears for a set
|
|
amount of time periodically (generally when the application is launched).
|
|
The purpose is to remind the user that they have not paid for this
|
|
product and will be forced to wait for the screen to disappear each time
|
|
they run the program until they pay for it. This relatively simple
|
|
technique shows several elements of persuasion. Many nagscreens invoke a
|
|
subtle feeling of guilt within the user, who may have thought that
|
|
payment was not important. For example, one of my programs declares, "I'm
|
|
currently a student at Stanford and I can't continue to release cool
|
|
software unless the Mac community continues to support me." The screen
|
|
also makes a threat that it will return while providing an incentive (its
|
|
removal) for the user to pay for the program. This is a form of negative
|
|
reinforcement. By sending in the registration check, the user is able to
|
|
remove the unwanted nagscreen.
|
|
|
|
Nagscreens, when implemented properly, can serve as reminders to users.
|
|
Rick Holzgrafe, Macintosh shareware author, writes that nagscreens "work
|
|
because so many people really are honest but forgetful."[2]
|
|
Unfortunately, it is difficult to predict how a user will react to a
|
|
nagscreen.
|
|
|
|
Nagscreens often invoke reactions that make persuasion more difficult.
|
|
Users who intend to pay for the product if they like it are annoyed by
|
|
what they see as a threat. Even worse, users who have sent in their money
|
|
but have not received feedback from the author yet can become frustrated
|
|
that this program has no knowledge of their recent purchase. Nagscreens
|
|
tend to work best with products that users may not even consider paying
|
|
for (like games) or when the screen provides additional information like
|
|
the number of hours the program has been in use. A very clever
|
|
implementation I once saw told the user the number of hours the program
|
|
had been used as well as the amount of money per hour they would be
|
|
paying if they registered. Realizing that a program would only cost
|
|
twelve cents for every minute it had been used appeals to the user's
|
|
practical side.
|
|
|
|
Crippleware
|
|
Crippleware is the term given to shareware which has limited
|
|
functionality but which can be unlocked to provide additional features.
|
|
Crippleware takes incentive much further than nagscreens. The user is
|
|
presented with a program that works but told that if she likes it and
|
|
pays for it, she will get an even better program. By not paying, the user
|
|
is locked out of certain features. After paying, the user obtains new
|
|
features that make the program more useful.
|
|
|
|
The main problem with crippleware is that since users aren't able to test
|
|
the entire program, they often don't even consider registering. As
|
|
Holzgrafe notes, "If you sell crippleware, be prepared for some
|
|
battles."[1] One of my most successful products, "HTML Markup," is
|
|
crippleware. The shareware version is fully-working and contains many
|
|
features. The registered version, however, adds a few extra goodies which
|
|
I view as a bonus for people who pay. Some users don't see it this way
|
|
however. I once received email from an angry user who had downloaded the
|
|
program and glanced at the documentation. As soon as he saw that he did
|
|
not have the full version, he sent me a message telling me that he would
|
|
never pay because shareware is not supposed to be crippled. After I
|
|
explained that he had a fully-working version and that the registered
|
|
version was a superset of it, he apologized and eventually paid for the
|
|
software.
|
|
|
|
Time Bombs
|
|
Many shareware authors come up with a period of time that they consider
|
|
reasonable for testing. While most shareware authors give a specific
|
|
trial period somewhere in their documentation, some authors keep track of
|
|
the usage so that the program will cease to function after the given
|
|
amount of time. Such "time bomb" techniques offer little in the way of
|
|
persuasion except to present the user with a do-or-die choice. If the
|
|
user wants to continue with the program, she must pay.
|
|
|
|
While time bombs can ensure that nearly all users of a program actually
|
|
pay for it, they significantly decrease the number of users who actually
|
|
try the program. Many users feel as though they are being accused of
|
|
theft before they even run the program once. Knowing that they will have
|
|
to pay for the product eventually, many users convince themselves not to
|
|
get used to the product. As Peter Lewis, one of the most successful
|
|
shareware authors, puts it, "time bombing the program forces the user to
|
|
make a choice of paying now or never, and they will often choose never
|
|
when they would have chosen later if you'd left that as an option."[2]
|
|
|
|
OPINIONS
|
|
|
|
Opinions among shareware authors vary greatly regarding which methods are
|
|
the best. The Association of Shareware Professionals specifically forbids
|
|
its members from releasing crippled shareware or shareware with
|
|
nagscreens that interfere with the operation of the program.[3] The ASP
|
|
will only certify software that complies with these guidelines because
|
|
they believe that it gives shareware a more professional image. Yet by
|
|
denying the fact that people need to be persuaded to register, the ASP
|
|
probably reduces its members' payments and its own membership rates.
|
|
|
|
Many authors who get a taste of how few users of their programs really
|
|
pay for it are tempted to use time bomb strategies because it is the most
|
|
effective for preventing illegal use of their software. Others use
|
|
nagscreens because they are easy to implement and usually do not limit
|
|
the program in any way. Crippleware is often viewed as a compromise
|
|
because they limit a program slightly and prevent illegal use of the
|
|
fully-working version.
|
|
|
|
A STUDY IN SHAREWARE REGISTRATION
|
|
|
|
Shareware author Colin Messitt performed an informal experiment to
|
|
quantify shareware payment habits. By releasing the same product in two
|
|
versions-one crippled and one using nagscreens, Messitt was able to keep
|
|
track of how many registrations he received for each version. The clear
|
|
winner was the version that employed crippleware techniques, which
|
|
outsold the other version five-to-one. In this experiment, it appears as
|
|
though positive reinforcement with incentive won out over negative
|
|
reinforcement with incentive.[4]
|
|
|
|
I believe that these findings are a result of one unique feature of
|
|
crippleware-when the user pays for crippleware, they are actually buying
|
|
something (extra features). With time-bomb shareware, a paying user is
|
|
put in the position of a thief caught with a television set in his hands.
|
|
Nagscreens may be ineffective simply because they annoy users. If a user
|
|
does not have the time to put up with software that nags them, she will
|
|
not have time to get used to it and see the need to buy it.
|
|
|
|
ANALYSIS
|
|
|
|
In his article entitled "Hookware," Kee Nethery summarizes the best way
|
|
to get users to pay. "Bug them just enough to get them to pay but not so
|
|
much that they stop using your software." There is obviously a tradeoff
|
|
between making users happy and making them pay.
|
|
|
|
My own shareware experiences agree with Messitt's findings. HTML Markup,
|
|
which is slightly crippled, continues to have strong sales. My latest
|
|
program, NetBots, has far more downloads and generates far more feedback.
|
|
The sales are good, but a smaller percentage of the users who download
|
|
NetBots register it than HTML Markup. I believe this is partially because
|
|
NetBots just gives a gentle reminder that it is shareware.
|
|
|
|
People are often amazed when I tell them that shareware can make money.
|
|
Considering that someone could use any of my programs quite happily and
|
|
legally without paying for them, it is striking that so many people
|
|
actually do pay. While some people just feel that it is the right thing
|
|
to do, I think that there is definitely an element of persuasion
|
|
involved. The success of shareware shows that while many people are
|
|
honest, a little push using the right techniques can bring that honesty
|
|
out.
|
|
|
|
ACKNOWLEDGMENTS
|
|
|
|
I would like to offer my thanks to BJ Fogg for introducing me to
|
|
Captology and to Phil King for relating Captology to shareware.
|
|
|
|
REFERENCES
|
|
|
|
Holzgrafe, Rick. "Successful Shareware."
|
|
<http://www2.Semicolon.com/Rick/ShareSuccess/Shareware1.html>
|
|
Lewis, Peter. "Writing Shareware for a Living."
|
|
<http://www.stairways.com/programming/sharewareauthor.html>
|
|
Association of Shareware Professionals. <http://www.asp-shareware.org>
|
|
Messitt, Colin. "Why Do People Register?"
|
|
<http://www.shareware.org/gazer7/why.htm>
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 8 Apr 1998 07:57:47 -0800
|
|
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
|
|
Subject: File 6--"Web Security: A Step-by-Step Reference Guide", Lincoln D. Stein
|
|
|
|
BKWEBSEC.RVW 980201
|
|
|
|
"Web Security: A Step-by-Step Reference Guide", Lincoln D. Stein,
|
|
1998, 0-201-62489-9, U$29.95
|
|
%A Lincoln D. Stein stein@genome.wi.mit.edu
|
|
%C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8
|
|
%D 1998
|
|
%G 0-201-62489-9
|
|
%I Addison-Wesley Publishing Co.
|
|
%O U$29.95 416-447-5101 fax: 416-443-0948 bkexpress@aw.com
|
|
%P 448 p.
|
|
%T "Web Security: A Step-by-Step Reference Guide"
|
|
|
|
As it happened, this book came off the stack on a night when I wanted
|
|
nothing more than to wander off to bed. Despite my sleep deprivation
|
|
I managed not only to finish the book, but even to enjoy it. Any
|
|
technical book with security in the title that can hold interest like
|
|
that has to have something going for it.
|
|
|
|
The book covers all aspects of Web security, as laid out in chapter
|
|
one: the client or browser concern for privacy and safety of active
|
|
content, the Web server concern for availability of service and
|
|
prevention of intrusion, and the concern that both share for
|
|
confidentiality and fraud. Chapter two provides a brief but accurate
|
|
overview of cryptography as the backbone of secure systems operating
|
|
over unsecured channels. (There is only one oddity that I noted, when
|
|
512 bit RSA public key encryption was compared in strength with 40 bit
|
|
RC2 and RC4 systems.) More of the basics like Secure Sockets Layer
|
|
(SSL) and Secure Electronic Transactions (SET) are described in
|
|
chapter three, along with various forms of digital cash.
|
|
|
|
Part two looks at client-side security, with further discussions of
|
|
the use of SSL in chapter four. Chapter five details active content,
|
|
with particular attention to ActiveX and Java. "Web Privacy," in
|
|
chapter six, is an excellent and practical guide to the realities and
|
|
myths about information that can be gleaned from your browsing
|
|
activities. Included are practical tips about keeping your system
|
|
from finking on you. (Windows users should note that the files
|
|
referred to are not always in the paths specified, due to the variety
|
|
of ways that Windows programs can be installed.)
|
|
|
|
The bulk of the book, as might be expected, deals with server-side
|
|
security, this being the slightly more complex side of the issue.
|
|
Chapter seven provides an overview of the various vulnerabilities and
|
|
loopholes to watch and plug. UNIX and Windows NT servers are dealt
|
|
with in chapters eight and nine respectively. These chapters don't
|
|
assume much familiarity with the system security functions of the
|
|
systems, but do stick primarily to the server specific topics. Access
|
|
control is a major part of any security setup, and is covered in
|
|
chapter ten. Encryption and certificates are revisited in chapter
|
|
eleven, concentrating on use in access control. CGI (Common Gateway
|
|
Interface) scripting has been a major source of Web security risks,
|
|
and chapter twelve points out safe, and unsafe, practices in
|
|
programming scripts. Chapter thirteen discusses remote authoring and
|
|
administration. Firewalls are often seen as the be-all and end-all of
|
|
Internet security, and Stein covers the reality in chapter fourteen.
|
|
|
|
Each chapter contains references to both online and printed sources of
|
|
information, and these resources are all of high quality and useful.
|
|
|
|
As noted, the book is not only readable, but even enjoyable. The
|
|
writing is clear and accurate, giving the reader both concepts and
|
|
practical tasks in minimum time with maximum comprehension. Although
|
|
the bulk of the book is for Webmasters, the casual user can not only
|
|
read it but get a great deal of value from it. Any ISP that does not
|
|
have it on their customer support bookshelf should held criminally
|
|
negligent.
|
|
|
|
copyright Robert M. Slade, 1998 BKWEBSEC.RVW 980201
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 31 Mar 1998 12:41:54 -0500
|
|
From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
|
|
Subject: File 7--Information Trumps Reality (From NETFUTURE #68)
|
|
|
|
Source: NETFUTURE: Technology and Human Responsibility
|
|
|
|
Issue #68 Copyright 1998 Bridge Communications March 31, 1998
|
|
Editor: Stephen L. Talbott (stevet@oreilly.com)
|
|
|
|
On the Web: http://www.oreilly.com/people/staff/stevet/netfuture/
|
|
You may redistribute this newsletter for noncommercial purposes.
|
|
|
|
Information Trumps Reality
|
|
--------------------------
|
|
|
|
You may have seen the story awhile back, but I'll bet you passed over its
|
|
significance. Look again; what you're seeing in this little scenario is
|
|
the perfect symbol of the Information Age:
|
|
|
|
A young woman hobbles painfully onto the college basketball court and
|
|
positions herself by her team's basket. The whistle sounds, a teammate
|
|
throws her the ball, and -- while the opposing players stand and watch
|
|
-- she puts the ball through the hoop. Then the young woman hobbles
|
|
back off the court and the other team shoots a basket, similarly
|
|
unopposed. With the score now 2-2, the real game begins. But the
|
|
young woman, whose college career-ending injury had left her one point
|
|
shy of the scoring record, now has her record. Everyone feels
|
|
wonderful (with the possible exception of the previous record holder).
|
|
|
|
There you see the mystical power of information. The fact in the database
|
|
takes precedence over the brilliant, real-life career supposedly being
|
|
honored. Of course, the career was actually being dishonored. The
|
|
supporters of the pre-game exercise said, in effect, "The young lady's
|
|
career lacked its own intrinsic meaning and value. None of us will
|
|
sufficiently appreciate her without the additional two points in the
|
|
database, however artificial and disconnected from her achievement they
|
|
may be."
|
|
|
|
The idea of it all is brutally clear: manipulate a human life so as to
|
|
produce a bit of stored information, which then becomes the basis for
|
|
appreciating the life. Information today less and less *derives* from
|
|
real life; more and more it *defines* real life.
|
|
|
|
The Net, of course, is the primary Kingdom of Information. Many of its
|
|
current policy debates can be seen as expressions of the following
|
|
problem: when our "presence" on the Net dissolves (as it tends to do)
|
|
into decontextualized bits of information, what distortions affect the
|
|
various recontextualizations that occur? That is, how do our lives get
|
|
redefined?
|
|
|
|
The data harvester with a product to sell redefines us one way, the bank's
|
|
loan department assessing our credit data redefines us another way, the
|
|
politician analyzing survey data with an eye on the upcoming reelection
|
|
redefines us yet another way, the security cracker looking for an opening,
|
|
the lonely person looking for a conversation, the haranguer looking for a
|
|
soap box ... each finds it all too natural to cultivate a reduced image of
|
|
the human being on the other end of the channel.
|
|
|
|
The same danger certainly occurs off the Net as well. But there is no
|
|
denying that the more thorough and easy the decontextualization -- and the
|
|
Net is a veritable engine of decontextualization -- the more difficult it
|
|
is to remain faithful to the real-life depth of persons and communities in
|
|
our various reconstructions. Information, fragmented though it be, takes
|
|
on a life of its own.
|
|
|
|
That is unfortunate, because information is not so much the beginning of
|
|
understanding as the end of it. Information is the last, abstracted
|
|
residue of what once was living knowledge. In the case of basketball, it
|
|
is the reduction to mute number of moves to the hoop that only a poet,
|
|
physiologist, mechanical engineer, sports analyst, and artist, combining
|
|
their insights, could capture with any justice.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 9 Apr 1998 07:55:40 -0500 (CDT)
|
|
From: Netiva Caftori <N-Caftori@neiu.edu>
|
|
Subject: File 8--APRIL 16 -- FANTASTIC CPSR/Chicago program (fwd)
|
|
|
|
Date--Wed, 18 Mar 98 18:53:14 CST
|
|
From--donald goldhamer <dhgo@midway.uchicago.edu>
|
|
Subject--APRIL 16 -- FANTASTIC CPSR/Chicago program
|
|
|
|
THURSDAY, APRIL 16
|
|
|
|
INTERNET GOVERNANCE
|
|
|
|
TWO FANTASTIC SPEAKERS and a HOT DISCUSSION
|
|
|
|
|
|
CPSR/Chicago's April program will explore the topic of Internet Governance,
|
|
which is the major issue for this year chosen by CPSR's National board.
|
|
|
|
|
|
FIRST: "One Planet, One Net campaign of CPSR is testing Chicago" -- a report
|
|
presented by Midwest Regional representative Netiva Caftori.
|
|
Please come to hear and discuss the principles of socially responsible
|
|
Internet Governance. (see details below)
|
|
|
|
SECOND: "The Internet and Self-governance for the Generic Top Level Domain
|
|
Name System" presented by David W. Maher, chair of the Policy
|
|
Oversight Committee (successor to the International Ad Hoc Committee)
|
|
that is restructuring the rules for Internet domain names. (see
|
|
details below)
|
|
|
|
THIRD: We'll discuss the issues, including gTLD restructuring, in the context
|
|
of the principles of Internet Governance.
|
|
|
|
TIME: 6:00pm to 7:00pm -- eat and chat (bring your dinner or ask us to order)
|
|
7:00pm to 9:00pm -- program (we can go even a bit later if necessary)
|
|
|
|
WHERE: 25 E. Pearson Building
|
|
Loyola University Chicago
|
|
Room 1467, 14th floor.
|
|
|
|
For more details, contact: Don Goldhamer (cpsr-chicago@cpsr.org, 773-702-7166)
|
|
or Netiva Caftori (n-caftori@neiu.edu, 773-794-2739)
|
|
------------------------------------------------------------------------------
|
|
|
|
THE ONE PLANET, ONE NET CAMPAIGN OF CPSR
|
|
|
|
CPSR's Board has launched a year-long focus on Internet governance. As a
|
|
result of an intensive strategic planning process, CPSR is undertaking a broad
|
|
examination of the issues in standards development, content development and
|
|
control, and access to the Internet.
|
|
|
|
CPSR will continue our policy advocacy on issues such as proposed changes to
|
|
the Domain Name System (DNS). We will continue to monitor and defend privacy
|
|
issues. CPSR was involved in direct government advocacy and testimony in the
|
|
recent encryption legislation and in the struggle over online ratings systems.
|
|
We participated at all levels in the Communications Decency Act legislative
|
|
process and as a co- plaintiff in Reno v. ACLU.
|
|
|
|
CPSR is focusing our main program initiative for the next year to strengthen
|
|
citizen input in the Internet governance dialogue now dominated by the
|
|
government and business sectors.
|
|
|
|
As a first step, the Board developed and issued "One Planet, One Net:
|
|
Principles for the Internet Era." This is an internet-draft document in the
|
|
IETF publication process. Please skim through those principles if you have
|
|
the time. They are to be linked from our web page at http://www.cpsr.org
|
|
|
|
Discussion of the draft will be about basic Internet issues -- who owns it?
|
|
what values will prevail? who will have access? who will decide how it is
|
|
governed? Participation in the discussion is through the CPSR listserv at
|
|
onenet-discuss@cpsr.org. We strongly urge CPSR members and others interested
|
|
in Internet governance issues to join in the discussion.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
THE INTERNET AND SELF-GOVERNANCE FOR THE GENERIC TOP LEVEL DOMAIN NAME SYSTEM
|
|
|
|
The commercial exploitation of the Internet has created great controversy
|
|
about the assignment of domain names and related trademark use and
|
|
infringement issues. This will be a presentation by the chair of the Policy
|
|
Oversight Committee (successor to the International Ad Hoc Committee) that is
|
|
restructuring the rules for Internet domain names. The presentation will focus
|
|
on the task of building a system that accommodates divergent interests and
|
|
provides a rational basis for worldwide Internet activity.
|
|
|
|
The presentation will also cover intellectual property issues on the
|
|
Internet. The growth of the Internet has led to increasing numbers of
|
|
conflicts between trademark owners and users of domain names. The present
|
|
system is chaotic, with national courts rendering decisions on many disputes
|
|
in accordance with national law, without regard to the global nature of the
|
|
Internet. In addition, there is a private U.S. dominated system for resolving
|
|
disputes in .com, .net and .org. The Policy Oversight Committee, in
|
|
cooperation with the World Intellectual Property Organization, has developed
|
|
an administrative system that is designed to apply neutral principles in an
|
|
efficent and cost-effective manner without interfering with the jurisdiction
|
|
of national courts.
|
|
|
|
David Maher is the Chair of the Policy Oversight Committee and was appointed
|
|
to the Committee by the Internet Society. He is a patent lawyer in private
|
|
practice in Chicago, Illinois, and is a senior partner in the law firm,
|
|
Sonnenschein, Nath & Rosenthal. A more detailed biography is available from
|
|
CPSR/Chicago.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 Apr 1998 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 Apr, 1998)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.22
|
|
************************************
|
|
|