home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jan 11, 1998 Volume 10 : Issue 02
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.02 (Sun, Jan 11, 1998)
-
- File 1--Urgent Action: WA state HOUSE BILL 2209
- File 2--Washington HR 2209 (computer workers as "Professionals")
- File 3--CA anti-spam bill
- File 4--Fwd: America Online Files Suit Against Three Junk E-mail Firms
- File 5--ACM (POLICY98) Conference Announcement
- File 6--If Big Brother Has Been Dismembered, Are We Safe?
- File 7--CPSR's Year 2000 Rumors Web Site
- File 8--US vs Microsoft
- File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 19 Dec 1997 21:05:37 -0800 (PST)
- From: "T.L. Kelly" <room101@TELEPORT.COM>
- Subject: File 1--Urgent Action: WA state HOUSE BILL 2209
-
- ((MODERATORS' NOTE: The following is a bit late, but the issue of
- defining computer workers as "professionals" and thus exempt from
- minimum wage law is sufficiently important to warrant discussion.
- The full text of the law follows this post)).
-
- The WSDMA, a "labor" organization, has quietly asked the Washington Dept.
- of Labor and Industry to strip computer professionals making over $27.63
- an hour of their overtime.
-
- Furthermore, the proposed law is written in such a way as to exempt "Any
- employee who is a computer system analyst, computer programmer, software
- engineer, software developer or other similarly skilled worker" even from
- the minimum wage provisions of Washington state law.
-
- If approved, the law will be adopted Dec. 31, 1997, and become effective
- Feb. 1, 1998.
-
- The WSDMA's largest member is Microsoft, the largest employer of computer
- contractors in the region with an estimated 3-5,000 such employees. The
- company recently lost a labor case brought by a group of contract workers.
- It is the company's acknowledged policy to employ contract workers to
- avoid the cost of benefits, vacation, etc.
-
- Recent applicants have confirmed to me that Microsoft explicitly
- *requires* all contract workers to work "a minimum of 50-55 hours a week".
-
- The Boeing Company is also a member of the WSDMA.
-
- The WSDMA's legal move was kept secret. The "request" was not reported in
- the local press until the day AFTER the public comment period had ended.
- The author of that story has acknowledged he learned of the proposal in
- October, but did not cover it because he "didn't appreciate the
- significance". One wonders how he manages to cross the street
- successfully.
-
- The "public" hearing was scheduled for the Tuesday before Thanksgiving
- from 10 am to noon -- in Tumwater, WA, several miles south of Olympia.
- The vast majority of the state's contract workers live in Seattle and
- neighboring communities far to the north.
-
- The WSDMA's own street-level membership was not informed of the move, let
- alone invited to comment.
-
- It should be noted that computer professionals are already barred from
- labor organizing by a Cold War-era federal law. It seems the time has
- come to work to get that law overturned on Constitutional grounds. But
- first...
-
-
- THE PERIOD FOR PUBLIC COMMENT ON THE OVERTIME LAW HAS BEEN EXTENDED UNTIL
- DEC. 19 -- NEXT FRIDAY.
-
- Management and owners have had nearly two months to comment, we have less
- than a week. Please make it count.
-
- Comments can be sent to Linda Merz of the Washington State Dept. of Labor
- and Industry at (360) 902-5403 or merl235@lni.wa.gov
-
- Please be clear, relatively brief, and most importantly courteous (even if
- firm).
-
- Comments of up to 10 pages may be faxed to (360) 902-5300 or snail mailed
- to:
-
- Greg Mowat, Program Manager
- Employment Standards
- Department of Labor and Industries
- P.O. Box 4-4510
- Olympia, WA 98504-4510
-
-
- Below is an excerpt from the proposed law, HOUSE BILL 2209. As you can
- see, it applies to just about anyone working in the computer and web
- industries.
-
- (source: http://www.wa.gov/lni/pa/w128-535.htm )
-
- (1) Any employee who is a computer system analyst, computer programmer,
- software engineer, software developer or other similarly skilled worker
- will be considered a "professional employee" and will be exempt from the
- minimum wage and overtime provisions of the Washington Minimum Wage Act
- if:
-
- (i) Applying systems analysis techniques and procedures to determine
- hardware, software, or system functional specifications for any user of
- such services; or
-
- (ii) Following user or system design specifications to design, develop,
- document, analyze, create, test or modify any computer system, application
- or program, including prototypes; or
-
- (iii) Designing, documenting, testing, creating or modifying computer
- systems, applications or programs for machine operation systems; or
-
- (iv) Any combination of the above primary duties whose performance
- requires the same skill level [...]
-
-
-
- RESOURCES ONLINE
-
- News Stories (both of 'em -- literally)
-
- Temporary software workers to lose OT
- http://www.seattletimes.com/extra/browse/html97/temp_120597.html
-
- Software temps gain time to fight OT changes
- http://www.seattletimes.com/extra/browse/html97/temp_121097.html
-
- Info from WA State Dept of L&I
- http://www.wa.gov/lni/pa/over.htm
- http://www.wa.gov/lni/pa/w128-535.htm
-
- HOUSE BILL 2209 as posted on the WA Legislature Site
- http://leginfo.leg.wa.gov/pub/billinfo/house/2200-2224/2209_022697
-
- WA Legislature Site
- http://leginfo.leg.wa.gov/
-
- WSDMA
- http://www.wsdma.org
-
- ------------------------------
-
- Date: Fri, 9 Jan 1998 16:23:35 -0600
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 2--Washington HR 2209 (computer workers as "Professionals")
-
- SOURCE:
- http://www.wa.gov/lni/pa/w128-535.htm
-
- (Washington HR 2209)
-
- NEW SECTION
-
- WAC 296-128-535 Are professional computer employees exempt from the
- Washington Minimum Wage Act? (1) Any employee who is a computer
- system analyst, computer programmer, software engineer, software
- developer or other similarly skilled worker will be considered a
- "professional employee" and will be exempt from the minimum wage and
- overtime provisions of the Washington Minimum Wage Act if:
-
- (a) Their primary duty is of one of the following:
-
- (i) Applying systems analysis techniques and procedures to determine
- hardware, software, or system functional specifications for any user
- of such services; or
-
- (ii) Following user or system design specifications to design,
- develop, document, analyze, create, test or modify any computer
- system, application or program, including prototypes; or
-
- (iii) Designing, documenting, testing, creating or modifying computer
- systems, applications or programs for machine operation systems; or
-
- (iv) Any combination of the above primary duties whose performance
- requires the same skill level; and
-
- (b) Their rate of pay is at least $27.63 per hour.
-
- (2) This professional exemption only applies to highly skilled
- employees who:
-
- (a) Possess a high degree of theoretical knowledge and understanding
- of computer system analysis, programming and software engineering; and
-
-
- (b) Have the ability to practically apply that theoretical knowledge
- and understanding to highly specialized computer fields; and
-
- (c) Generally attain the necessary level of expertise and skill to
- qualify for an exemption through a combination of education and
- experience in the field; and
-
- (d) Consistently exercise discretion and judgment in the application
- of their special knowledge as opposed to performing purely mechanical
- or routine tasks; and
-
- (e) Engage in work that is predominantly intellectual and inherently
- varied in character as opposed to work that is routinely mental,
- manual, mechanical, or physical.
-
- (3) While many employees who qualify for this exemption hold a
- bachelor's or higher degree, no degree is required for this exemption.
-
-
- (4) This professional exemption does not apply to:
-
- (a) Trainees or employees in entry level positions learning to become
- proficient in computer systems analysis, programming and software
- engineering; or
-
- (b) Employees in computer systems analysis, programming and software
- engineering positions who have not attained a level of skill and
- expertise which allows them to generally work independently and
- without close supervision; or
-
- (c) Employees engaged in the operation of computers; or
-
- (d) Employees engaged in the manufacture, repair or maintenance of
- computer hardware and related equipment; or
-
- (e) Employees covered by a collective bargaining agreement.
-
-
-
- []
- _________________________________________________________________
-
-
-
- This rule was adopted as written Dec. 31, 1997. It will become
- effective Feb. 1, 1998. See news release: Dec. 31, 1998 - State adopts
- rule exempting computer professional overtime pay rate
-
- To access the department's response to public comments received about
- the proposed rule, press here: Concise explanatory statement regarding
- overtime and minimum wage exemption for professional computer
- employees
-
-
-
-
- _________________________________________________________________
-
- Labor and Industries is an Equal Opportunity and Affirmative Action
- employer. The department complies with all federal rules and
- regulations and shall not discriminate on the basis of race, color,
- national origin, sex, creed, marital status, sexual orientation, age,
- disabled, disabled or Vietnam-era veteran, religion or disability as
- defined by applicable state and/or federal statutes or regulations.
-
- Washington State Department of Labor and Industries
- What's New|L&I Services|
- Press Releases |Training | Directory| Links
- Publications| Calendar| Site Index| Search
- L&I Home
-
- Page last revised: 01-05-1998 - 5:10 PM
-
- ------------------------------
-
- Date: Wed, 07 Jan 1998 18:17:53 -0800
- From: Greg Broiles <gbroiles@netbox.com>
- Subject: File 3--CA anti-spam bill
-
- Here's the text of AB 1629, introduced in the California State Assembly
- yesterday:
-
- ----
-
-
- BILL NUMBER: AB 1629 INTRODUCED
- BILL TEXT
-
-
- INTRODUCED BY Assembly Member Miller
-
- JANUARY 5, 1998
-
- An act to add Section 17538.45 to the Business and Professions
- Code, relating to advertising.
-
-
- LEGISLATIVE COUNSEL'S DIGEST
-
-
- AB 1629, as introduced, Miller. Advertising: electronic mail.
- Existing law prohibits a person conducting business in this state
- from faxing unsolicited advertising material, unless certain
- conditions are satisfied.
- This bill would also prohibit a person conducting business in the
- state from using a computer or other electronic device to send an
- unsolicited advertisement to an electronic mail address within the
- state unless (1) that person has a preexisting and ongoing business
- or personal relationship with the recipient, or absent that
- relationship, the recipient has previously provided express consent
- or permission with respect to the advertisement and (2) that person
- provides certain identifying information at the beginning of the
- advertisement. It would also authorize any person with legal
- standing to bring an action in a court of competent jurisdiction to
- enjoin any violation of these prohibitions, or to recover civil
- damages, as specified, or to seek both of those remedies. It would
- also provide that the prevailing party in any of those actions shall
- be entitled to recover reasonable attorney's fees.
- Existing law provides for the regulation of advertising and
- provides that any violation of those provisions is a crime. This
- bill, by creating additional prohibitions with regard to advertising,
- would expand the scope of an existing crime, thereby imposing a
- state-mandated local program.
- The California Constitution requires the state to reimburse local
- agencies and school districts for certain costs mandated by the
- state. Statutory provisions establish procedures for making that
- reimbursement.
- This bill would provide that no reimbursement is required by this
- act for a specified reason.
- Vote: majority. Appropriation: no. Fiscal committee: yes.
- State-mandated local program: yes.
-
-
- THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:
-
-
- SECTION 1. Section 17538.45 is added to the Business and
- Professions Code, to read:
- 17538.45. (a) No person conducting business in this state shall
- use any computer or other electronic device to send an unsolicited
- advertisement to an electronic mail address within the state unless
- each of the following requirements are satisfied:
- (1) That person has a preexisting and ongoing business or personal
- relationship with the recipient, or absent that relationship, the
- recipient has previously provided express consent or permission with
- respect to the advertisement.
- (2) That person clearly provides, at the beginning of the
- unsolicited advertisement, the date and time the message was sent,
- the identity of the person sending the message, and the return
- electronic mail address of that person.
- (b) (1) Notwithstanding Sections 17535 and 17536, any person who
- has legal standing may bring an action in a court of competent
- jurisdiction for either or both of the following purposes:
- (A) To enjoin any violation of this section.
- (B) To recover civil damages in an amount equal to the actual
- monetary loss suffered by that person by reason of any violation, or
- five hundred dollars ($500) for each violation, whichever amount is
- greater. However, if the court finds that a violation of this
- section was willful or knowing, the court may, in its discretion,
- award up to three times the amount of those civil damages.
- (2) The prevailing party in any action brought under paragraph (1)
- shall be entitled to recover reasonable attorney's fees.
- SEC. 2. No reimbursement is required by this act pursuant to
- Section 6 of Article XIIIB of the California Constitution because the
- only costs that may be incurred by a local agency or school district
- will be incurred because this act creates a new crime or infraction,
- eliminates a crime or infraction, or changes the penalty for a crime
- or infraction, within the meaning of Section 17556 of the Government
- Code, or changes the definition of a crime within the meaning of
- Section 6 of Article XIIIB of the California Constitution.
- Notwithstanding Section 17580 of the Government Code, unless
- otherwise specified, the provisions of this act shall become
- operative on the same date that the act takes effect pursuant to the
- California Constitution.
-
- ------------------------------
-
- Date: Fri, 09 Jan 98 15:02 CST
- From: Cu Digest <TK0JUT2@mvs.cso.niu.edu>
- Subject: File 4--Fwd: America Online Files Suit Against Three Junk E-mail Firms
-
- Source - AOL News <AOLNews@aol.com>
-
- America Online Files Suit Against Three Junk E-mail Firms
-
- DULLES, Va.--(BUSINESS WIRE)--Jan. 7,
- 1998--America Online Inc. Tuesday filed suit against three junk
- e-mail firms in its continuing battle against unsolicited bulk
- e-mail, also known as "spam."
-
- The suit was filed in U.S. District Court for the Eastern
- District of Virginia and seeks an injunction to prevent the
- companies from continuing their practice of sending large
- quantities of unsolicited junk e-mail to AOL members. The suit
- also seeks damages from all three companies.
-
- The companies named in the suit are: IMS of Knoxville, Tenn.;
- Gulf Coast Marketing of Baton Rouge, La.; and TSF Marketing and
- TSF Industries of Riverside, Calif. This suit follows on the
- heels of a federal court ruling in favor of AOL in its suit
- against junk e-mail firm Over the Air Equipment Inc.
-
- In that case, AOL won a court order barring Over the Air
- Equipment from sending unsolicited e-mail to AOL members. Later,
- Over the Air Equipment dropped its challenge to the order barring
- it from spamming and agreed to pay AOL a substantial sum of
- money in damages. AOL's new suit builds on the precedent
- established in the Over the Air Equipment case.
-
- <snip>
-
- ------------------------------
-
- Date: Fri, 9 Jan 1998 14:29:16 -0500
- From: David Banisar <banisar@EPIC.ORG>
- Subject: File 5--ACM (POLICY98) Conference Announcement
-
- ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE
-
- * * * POLICY98 * * *
- "Shaping Policy in the Information Age"
-
- Washington, DC, Renaissance Hotel
- May 10-12, 1998
-
- Preliminary Notice
-
- For Conference and Registration information see:
- http://www.acm.org/usacm/events/policy98/
-
- The ACM Annual Conference will focus on public policy issues
- affecting future applications of computing. Our goal is to
- forge stronger links between computing professionals and policy
- makers. Attendees will interact with prominent leaders from
- academia, industry, Congress, and Executive agencies, and
- participate in debates on policy issues including Universal
- Access, Electronic Commerce, Intellectual Property, and
- Education Online.
-
- The conference will promote more regular engagement of computing
- professionals in democratic processes related to productive use
- of computing and information processing innovations. A blend of
- technical skills and policy insights are essential to cope with
- the inherent opportunities and dangers of any transformational
- technology. Continuing collaborations between computing
- professionals and policy makers will benefit citizens, consumers,
- entrepreneurs, researchers, and students. You can make a difference!
-
- May 10: Ethical and social impacts papers and panels
- May 11-12: Public policy panels and featured speakers
-
- All Policy98 attendees are invited to the Annual ACM Awards Banquet
- on Sunday evening May 10th, and a conference reception on Monday
- evening May 11th.
-
- +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- PANEL TOPICS AND COORDINATORS
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
-
- Universal Service: Ollie Smoot
- What can be done to promote widespread access to the benefits of
- the Internet? What is the role of government and the role of the
- private sector in wiring schools, libraries, and medical facilities?
-
- Electronic Commerce: Jim Horning
- How much public policy does EComm need? What problems would
- inadequate, excessive, or misguided policies cause? Can compromises
- in areas like fair trade practices, fraud prevention, security, privacy,
- law enforcement, and taxation advance the interests of all stakeholders?
-
- Intellectual Property in Cyberspace: Pam Samuelson
- What will be the impact of the WIPO agreements on copyright in
- cyberspace? How should intellectual property be protected and what
- safeguards are necessary to protect libraries and academic institutions?
-
- Education Online: Charles N. Brownstein
- The Internet offers unparalleled opportunities for learning and teaching.
- What public policy and technical challenges must be met to realize
- these prospects?
-
-
- +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- CONFERENCE CO-CHAIRS
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
-
- Ben Shneiderman, USACM (U.S. Public Policy Committee)
- C. Dianne Martin, SIGCAS (ACM Special Interest Group
- on Computers & Society)
-
- +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- PROGRAM COMMITTEE CHAIRS
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
-
- Marc Rotenberg, Public Policy
- Keith Miller, Ethics and Social Impacts
-
- +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- REGISTRATION INFORMATION
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- For more information, contact: policy98@acm.org
- or to register electronically, see:
- http://www.acm.org/usacm/events/policy98/reginfo.html
- Early registrants and ACM members receive discounts.
-
- ------------------------------
-
- Date: Mon, 1 Dec 1997 14:32:06 -0500
- From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
- Subject: File 6--If Big Brother Has Been Dismembered, Are We Safe?
-
- NETFUTURE
-
- Technology and Human Responsibility
-
- Source: Netfuture - Issue #61 December 1 1997
- COPYRIGHT 1995 BRIDGE COMMUNICATIONS
- Editor: Stephen L. Talbott (stevet@oreilly.com)
-
- On the Web: http://www.oreilly.com/people/staff/stevet/netfuture/
- You may redistribute this newsletter for noncommercial purposes.
-
-
- If Big Brother Has Been Dismembered, Are We Safe?
- -------------------------------------------------
-
- In "No Place To Hide" (*Forbes*, September 22, 1997) Ann Marsh offers a
- useful survey of the potentials and current realities of electronic
- surveillance. Among the items she ticks off:
-
- * Travel information from electronic toll booths in New York, originally
- off limits to law enforcement agencies without a subpoena, is now
- routinely available for the investigation of all serious crimes.
-
- * As cars are fitted with satellite-tracking services, General Motors
- has already felt the need to issue a disclaimer: "We will tell the
- police where a vehicle is, but not just any individual. We do not
- want to be a national detective service."
-
- * Passive tracking devices as small as a rice grain reveal their data in
- the presence of a scanner (as at a toll booth or retailer's exit).
- They can be (and have been) implanted under the skin of humans to
- store and report medical data. They could equally well be used as
- security passes.
-
- * In a few years all cellular phone companies will be required to report
- the location of 911 callers.
-
- * Unmanned spy planes ("drones") can photograph the ground with twelve-
- inch resolution. Other drones as small as a paper plane can survey an
- area from just a few hundred feet up. "On the drawing board are some
- vehicles that can fly through an open door, perch inside a building,
- and quietly observe their surroundings."
-
- But Marsh also looks at the positive side: tracking lost kids and
- Alzheimer patients; nabbing criminals by installing tiny transmitters in
- cars and store merchandise, or in stacks of money given to bank robbers;
- automatically dialing 911 and reporting the location of car accidents;
- tracking salmon migrations; and using drones to sniff out airborne
- pollutants.
-
- Like it or not, Marsh concludes,
-
- The world is becoming smaller and smaller and ever more transparent.
- Your fenced-in yard won't be quite as private as it used to be. But
- neither will the dark alley near your bank teller machine. Tradeoff,
- tradeoff, tradeoff.
-
- Yes, but the notion of tradeoffs can lead us to stop thinking too soon.
- It's not simply a matter of looking at a particular piece of technology
- and saying, "Gee, it could be used this way (which is good) and it could
- be used that way (which is bad) -- and let's make the bad illegal." Given
- the complex interrelationship of all technologies, we have little choice
- but to seek larger and deeper patterns.
-
- Once we do that, we will not always find neatly offsetting facts on
- opposite sides of the balance. It is not as simple as seeing which set of
- facts outweighs the other. There may be *some* patterns that are
- reinforced by both sides of a supposed tradeoff.
-
- In particular, chip implants for tracking Alzheimer patients, while
- obviously helpful for some purposes, would not necessarily prove benign in
- the larger picture. The devices could easily encourage the continuing
- depersonalization of care for the elderly -- especially in a society
- already moving in that direction. The more easily you can electronically
- monitor a person, the more invisible he tends to become *as a person* --
- and long-term social policy toward invisible people is rarely benign.
-
- Similarly, medical data stored on chip implants may save some lives. But
- as this data gets electronically transmitted from here to there for
- analysis, the risk is that the individual, flesh-and-blood patient in all
- his particularity will be replaced by the sum of his data. So the medical
- benefit, to the degree it entails disregard of the individual, is not
- unrelated to various abuses on the other side of the balance. For
- example, violations of data privacy become much more likely once the
- patient has been lost sight of.
-
- And, as I have pointed out before, the ability to nab criminals through
- high-tech tracking devices is occurring as part of a general trend toward
- the technical mediation of human relations. This in turn -- if we do not
- counter the trend with a strong consciousness of community -- leads to the
- weakening of the social matrix that is the most effective barrier to
- crime. So even the benefits of the tracking devices may be part of a
- distinctly unhealthy pattern that negates the benefits.
-
- In her article, Marsh mentions the Orwellian, dictatorial potentials of
- the new technologies, and sets them in the balance against the freeing
- potentials. But, as I argued in "Distributing Big Brother's Intelligence"
- (NF #59), we need to be alert to the possibilities of a "distributed
- tyranny" requiring no dictatorial center. Both sides of the balance in
- which we usually assess the issues may weigh in favor of such a tyranny.
-
- While Marsh mentions Saddam Hussein in passing, it is worth remarking that
- nearly all her examples of dangerous technical implementations come from
- the United States. It is hard to imagine that Americans will succumb to
- an old-style dictator in the foreseeable future. But it is quite
- imaginable that we will continue succumbing to the "necessities" of
- progress -- the very necessities that lock us in debate about what may in
- some cases be lose-lose tradeoffs.
-
- When hidden cameras in public places, electronic surveillance of
- employees, and the tracking of individual product purchases are on the
- increase, it is not because we are heading toward a centralized
- dictatorship, but rather because the entire fabric of corporate business,
- law enforcement, and public consumption seems to require these things.
- Here the immediate necessity is rooted in economics, there in personal
- health; here in law enforcement; there in the needs of the disabled.
-
- I am not sure to what degree we might avoid pursuing the various technical
- implementations that sustain the threats. Who, after all, would deny to
- the disabled the latest technical assist? But I *am* sure that we had
- better step back and take a hard look at the overall shape of the puzzle
- pieces slowly assembling themselves all around us.
-
- I can't help thinking of those coarsely scanned images that, from close
- up, yield nothing recognizable, but from a distance betray a human
- countenance. Let us hope that the face now taking shape in the pattern of
- our technologically transformed lives is not the dismembered and
- redistributed face of Big Brother. But if it is, our only hope for
- recognizing the fact is to gain some objective distance between ourselves
- and the "inevitable" progress of technology.
-
- (Quotations are from the online version of Marsh's article:
- http://www.forbes.com/forbes/97/0922/6006226a.htm.)
-
- ------------------------------
-
- Date: Fri, 2 Jan 1998 12:24:35 -0800
- From: Susan Evoy <sevoy@Sunnyside.COM>
- Subject: File 7--CPSR's Year 2000 Rumors Web Site
-
- News Release CPSR Y2k Web Site Launched
-
- News Release
- For more information contact:
- Norman Kurland, chair, CPSR Y2k Working Group
- kurlandn@crisny.org; phone 518-439-9065
-
- YEAR 2000 RUMORS ADDRESSED ON NEW WEB SITE
-
- There are just two years until January 1, 2000 -- two years to make sure
- that computers can tell that 00 means 2000 and not 1900. During these
- two years businesses, governments and individuals are going to be working
- with increasing urgency to fix the so-called Y2k problem or minimize its
- impact on their operations.
-
- Even as the pace of work on the problem accelerates, so too will the
- rumors. Already there are rumors that elevators will stop running,
- electrical utilities will fail, the international financial system will
- grind to a halt and Social Security checks will be late and incorrect.
- To help sort fact from fiction CPSR (Computer Professionals for Social
- Responsibility) has established a Y2k Rumor Center on its new Y2k Web
- site: http://www.cpsr.org/program/y2k/.
-
- The site is intended to provide guidance to small organizations that have
- not initiated their Y2k remediation efforts and to help everyone
- understand the social and economic consequences of this seemingly simple
- problem. CPSR is hopeful that its effort will help prevent people from
- panicking as they hear unsubstantiated rumors about what might happen.
-
- CPSR is a public-interest alliance of computer scientists and others
- concerned about the impact of computer technology on society. It works to
- influence decisions regarding the development and use of computers.
-
- CPSR is deeply concerned about the serious threat posed to individuals,
- organizations, governments, and economies by the Year 2000 computer
- problem, a threat that could disrupt our economic and social systems.
- The Y2k Working Group was formed to help promote awareness of
- the problem and assist in finding solutions. Its focus is on segments
- of society which do not have extensive resources or organized groups
- to speak for them. It seeks to foster a sense of urgency at all levels
- local, national and global, while helping the public and the media understand
- and prepare for the impact of the Y2k problem.
-
- The Working Group maintains the Web site as the place to go for
- individuals and smaller organizations seeking understanding and help with
- Y2k. The site includes a simple explanation of the the Y2k problem and
- practical suggestions on how to respond to it, including a checklist of
- things to do now.
-
-
- > --
- > Susan Evoy * Deputy Director
- > http://www.cpsr.org/home.html
- > Computer Professionals for Social Responsibility
- > P.O. Box 717 * Palo Alto * CA * 94302
-
- ------------------------------
-
- Date: Fri, 2 Jan 1998 20:47:31 EST
- From: MRand33609 <MRand33609@aol.com>
- Subject: File 8--US vs Microsoft
-
- Is Microsoft Evil?
-
- How is it that in the United States -- the home of such men
- as Thomas Edison, Henry Ford and the Wright Brothers -- could that
- question even be reasonably postulated? Bill Gates the most
- productive man in the United States, is actually being persecuted
- for being productive . . . . for running the largest
- computer-software company in the world.
-
- To me, this issue should not even be discussed between
- rational people. It would be like debating over the answer
- to a simple arithmetic problem or the shape the Earth. But this
- is an issue; an issue that has been avoided for the last century
- in this country.
-
- Think; if it were evil to create better products at lower
- prices, then would that imply that building the worst products at
- outrageous prices
- is good.
-
- I once thought that Ayn Rand was exaggerating when she
- claimed that people held the phrase, From each according to his
- ability, to each according to his needs as a moral ideal. But
- once again the Ralph Nadar and Janet Reno are proving that
- they do.
-
- Imagine penalizing Bill Gates 1 million dollars a day for
- running a good business.
-
- What' next? Failing Johnny because he got all the answers
- right on his test, while giving Steve a full ride to Harvard
- because he never went to class.
-
- To learn more about the specifics of the Justice Department'
- vendetta against Mr. Gates and Microsoft visit the following
- website;
-
- http://www.capitalism.org/microsoft
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.02
- ************************************
-
-
-