home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Mar 8, 1998 Volume 10 : Issue 17
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #10.17 (Sun, Mar 8, 1998)
-
- File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98)
- File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98)
- File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98)
- File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES *
- File 5-- In Re - European Parliment STOA Program
- File 6--"USAG Reno pushes for computer security" (infoworld fwd)
- File 7--"Computers, Freedom, Privacy"
- File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 5 Mar 1998 06:42:45 -0800 (PST)
- From: "Robert J. Woodhead (AnimEigo)" <trebor@ANIMEIGO.COM>
- Subject: File 1--Re: Brian Milburn (Cu Digest, #10.16, Wed 4 Mar 98)
-
- >The question is, why should we have to work to get around Brian Milburn's
- >censorship, (or should I say Focus on the Family, to think I used to be
- >intimately involved with them?)? You and I may be able to create an
- >application that could send CyberSitter every URL listed on Yahoo, but the
- >average parent can't and doesn't want to. The average parent should be able
- >to pick and choose what is blocked -- if they choose to block anything. As
- >usual, in this type of debate, the fact that a child who is supervised
- >while using the Internet by their parent has the best "filter" of all
- >installed is never mentioned.
-
- As to pick-n-choose, I agree. Insofar as censorware has a use, it should
- be parent-configurable - with the current settings readable by the user.
- The problem isn't so much with the idea of censorware, but the current
- implementations - and the current implementors (!)
-
- So, if you really want to piss off Bruce Milburn, write a totally
- configurable censorware product, and make it freeware, with a "Prejudice
- Construction Kit" that lets every nutgroup in the world build a module that
- eradicates their particular infidels from their kids view of the internet.
-
- Then, of course, spam the net to announce it ;^)
-
- Finally, consider that the *publication* of CyberSitter's settings (as
- reverse engineered) would be illuminating.
-
- >No offense to anyone else out there, but it is beginning to seem -- with
- >this filterware debate -- that I spend more time supervising my dog, Lady
- >Joyous of Shasta, CD (Golden Retriever, the 'CD' means 'companion dog' and
- >is a result of winning obedience trials), than they do supervising their
- >kids.
-
- Intelligent parents (of which I am hopefully one, with computer-literate
- but not yet surfing kids) tend to view censorware as a first-cut "spam" (or
- "scum") filter. Anyone who has kids know they are a 24-7 proposition, and
- an exhausting one at that. Labor saving devices are seized upon, so that
- the time can be spent on hopefully more important parenting tasks.
-
- I personally would want one that blocked spelling and grammar errors, so
- that my kids aren't corrupted by bad writing. Of course, this would mean
- they couldn't visit their daddy's pages...
-
- >This all seems like too much work. The persons who are able to do this,
- >won't want to take the time to do it, because they won't buy into Milburn's
- >tripe and the others, well, unfortunately, they will probably buy his tripe
- >and be none the wiser. By the way, I am still not convinced that breaking
- >the weak encryption on CyberSitter's software for your own information
- >would be illegal, either criminally or tortiously.
-
- Maybe not, but I doubt Mr. Milburn will agree with your legal analysis.
- Lawsuits are so pesky, so why not simply be more elegant?
-
- (that rustling sound is Bruce Milburn checking his clickwrap agreement to
- see if he's got that base covered...)
-
- ------------------------------
-
- Date: Thu, 5 Mar 1998 12:15:26 -0500 (EST)
- From: "Bill Michaelson" <bill@COSI.COM>
- Subject: File 2--Re: Censorware (Cu Digest, #10.16, Wed 4 Mar 98)
-
- > >Regarding the various censorware programs... everyone seems to be
- > >making the assumption that parents _do_ have the right to censor
- > >what their children see. But is this truly the case, in ethics if
- > >not in law?
-
- It's not strictly the case, as you have ably pointed out.
-
- BTW, I'm not one of "everyone", although I agree that most people seem to
- accept as a basic premise that children should be shielded from certain
- types of information. We who believe otherwise are in a very tiny minority.
-
- I suppose this doctrine is firmly embedded in our culture, with
- movie rating schemes and similar filtering/censoring devices all
- around. It's practically apostasy to suggest that children can
- handle any information with proper guidance. But having been a child
- who was allowed access to any type of information, I find this
- censorship quite repugnant.
-
- It is comforting to me to believe that we are very concerned with child
- welfare, but I am cynical because of the many who apparently trot
- out the child welfare issue as justification for their political agendas.
-
- I think children are far more resilient than we give them credit
- for being. We only stunt their intellectual growth when we withhold
- information (of any kind) from them. And when some claim that children
- are not "ready" for information, it is really the *adults* who are not
- ready or willing to discuss the issues with their children.
-
- > If I don't have the right to control and monitor the information my
- > children receive, than who does? The guvmint? No one?
-
- Controlling and monitoring are distinct activities. I heartily approve
- of monitoring (and editorializing upon) the information children receive.
- I do not approve of controlling it to the extent that any information
- is excluded.
-
- Regardless, I would give you the right to do both with your children,
- just so that I could live in peace with you. I wouldn't necessarily
- approve, and we might clash at the school board meeting occasionally.
-
- In the end, I suppose my child would then have a competitive advantage
- over yours.
-
- > >We do not allow parents to keep their children from getting an
- > >education. We do not allow this even though that education can lead
- > >to those children learning things that will cause them to disagree
- > >with their parents.
- >
- > Parents do not have the right to keep their children from an education
- > but with things like the PTA and school board meetings we do have some
- > control on the content of that education.
-
- And the PTA and the school board, et al, battle it out, and the kids are
- taught the resulting curriculum over some parents' objections. That
- was the original poster's point.
-
- > > We do not allow this even though that education
- > >can lead to those children learning things that will shock them -
- > >such as about war.
- >
- > War is a fact and cannot be hidden, however are you going to show photos
- > of Aushwitz to a 3rd grade class or pictures of liberated villages whose
- > people are glad that some one stood up to fight when it was necessary.
-
- Is that how you choose to introduce the concept of war to children? Show
- them the glory before you show them the horror? I'm getting a fresh
- perspective on why war has persisted through the ages.
-
- > Showing a little child pictures of horror will not end wars
-
- Not by itself it won't.
-
- > in the future but it will frighted, shock, and disturb him. Is this
- > the way we want our small children to feel?
-
- Yes. That is exactly how I want our small children to feel about war.
- Frightened, shocked and confused. That's how I feel about war. What
- about you?
-
- > I don't and will do everything I can to
- > block such sights from them until I think they're ready.
-
- "Ready", how? Ready to accept such sights unemotionally?
-
- Interesting to me that you use Aushwitz and third grade as an example.
- That's when I first learned about the Holocaust. I was about 7 or 8 years
- old when I pulled a history book off my aunt's shelf while looking for
- entertainment and found graphic descriptions of what man does to man in the
- photos of liberated Nazi concentration camps. Yeah, I was disturbed and
- confused. It was the weirdest shit I'd ever seen, and it took me years
- to digest it. But I was old enough to go seeking information in history
- books, so I found history, in a dosage exactly proportional to my
- perceptual abilities at the time. Later, when I heard about this
- guy called Hitler, it really meant something to me.
-
- I disagree with the notion that showing a child pictures of horror will
- not end war. It will require a lot of factors to end war, but at the
- core of our motivation will be a visceral revulsion of it. Short of
- first-hand experience (which would be self-defeating), how are people
- to acquire such revulsion through sanitized presentations at only
- "appropriate" times?
-
- Through a picture is the best way for a child to see a war, and it should
- be seen, as early as possible, as far as I'm concerned. A child can
- then contrast it with the reality of the decent civilized community within
- which (hopefully) they live. They need to see the possibilities while
- they're young and it will make the most lasting impression. This is
- important stuff to learn while young.
-
- > Violence is a fact of life but it is my job as a parent to protect my
- > children from violence as long as I can. I fail to see how teaching
-
- So protect them from violence. Don't "protect" them from knowledge.
-
- > self-defence to an eight year old can protect them from violence from an
- > adult. I must and do teach my kids what they can do in a bad situation,
- > but I also try to teach them that in many instances violence is not as
- > ubiquitious as the media portrays. I don't hide the fact of violence and
- > hate from them but if I left it up to them to learn on their own, would
- > they not learn that it is unavoidable, everyone is evil, and they can do
- > nothing to escape it? Wouldn't it be more traumatic for my kids to live
- > paranoid and afraid? Because of the sensational nature of the really
- > heinous crimes, might they not think they are more prevelant then they
- > actually are? Of course I'm going to keep some of this from my kids
- > until I, no one else, decide that they are ready to handle it.
-
- So you are seeking a sense of balance in how media portrays life for your
- child. That's sensible. Supervise and mediate, advise and consult. Help
- them think critically. Don't let them live in a fantasy world shaped by
- television and video games. You sound like a concerned, well-meaning and
- loving parent.
-
- But don't prohibit them from learning about ANYTHING. You can't stop it,
- and if you try, you'll lose some of their trust. They're very smart, and
- if you think you are keeping information from them, then it's almost
- certain that THEY are or will be keeping information from YOU. Believe it.
-
- > >Yes, as a previous poster said, a 10-year-old searching for
- > >information under "American Girl" may see things that will remain
- > >with that child for the rest of his or her life. But there is no
- > >evidence that this harms the child; there are a _lot_ of things that
- > >remain with people throughout their lives. Parents have the
- > >opportunity to do a lot of things that have this characteristic;
- > >should they be able to shut children off from others doing the same,
- > >if no harm is done to the child?
- >
- > Maybe this stuff will do no permanent harm but they can be confusing to
- > a child without the maturity to handle it. The little folks have enough
-
- That's how maturity is acquired.
-
- > problems living in the big folks world as it is. So I will keep things
- > from my kids that I don't think they are ready for.
-
- Like the military draft was something my mother thought I wasn't ready
- to handle at the tender age of 18, I'm sure.
-
- Events march on, and you can't stop them.
-
- You're not helping the kids. I suspect that it is you who are not ready
- to face these issues with your kids. It's tough to explain to a child why
- someone would hang a person from their skull on a meathook. In fact, I
- don't really know how to explain it, or whether it merits explanation so
- much as it calls for introspection. But if you have kids, you're stuck with
- this sort of problem, if you accept the responsibility. Your kids will
- know when you are hiding something, or are too squeamish to talk to them
- about it. That does not foster trust. Get over it before the gulf gets wide.
-
- > It boils down to a matter of values, not the PC "Family Values" that are
- > being touted but the values that I've learned over the years and have
- > put into my own life. I will try to instill those values in my children
- > until such time as they are ready to develop their own. And I will do it
- > by "censorship" if I think that is the way it should be done.
-
- You lead by example. Regardless of your motives, the value you are
- instilling is to control people by limiting their access to information.
- Perhaps they will learn this lesson well, and use it on you. Watch out
- for the teen years.
-
- But that's your privilege. Keep your kids off the 'net until you think
- they're "ready". Or supervise them. But don't surrender your parental
- responsibilities to someone else with their own social agenda, like a
- censorware software maker.
-
- I'm willing to pay the school tax for your kids, and to subsidize your
- extra tax write-offs. No problem. But don't ask me to pay the cost of
- your parenting responsibilities with my freedom of speech, or the freedom
- to seek information of *any* sort. Don't lend support to cockamamie rating
- systems that will sterilize the 'net.
-
- I don't mind too much if some parents choose to keep their kids ignorant,
- but not anyone else's, and certainly not the world at large.
-
- ------------------------------
-
- Date: Thu, 5 Mar 1998 20:56:07 +0000
- From: Dave Bird---St Hippo of Augustine <DevNull@XEMU.DEMON.CO.UK>
- Subject: File 3--Re: Net Disruption (Cu Digest, #10.16, Wed 4 Mar 98)
-
- >If serious net disruption does occur, for whatever reason, it is critically
- >important to observe certain common-sense protocols in the use of phone and
- >fax numbers. Effective anarchic communications require a certain finesse
- >and forethought.
-
- It's worth pointing that the UK, only, has a system by which the
- telephone system could be "pulled" in time of crisis. This has been
- publicised in various books by Duncan Campbell, but OTOH it is one
- of the things which under the voluntary censorship system papers
- and broadcasters have agreed not to mention. Exchanges have
- "telephone preference" which can be switched to three (all numbers),
- two (political and military numbers in time of civil crisis), or
- one (military only in the run up to a war threatening the home
- territory). The supposed justification is that people making extra
- panic calls in time of crisis would jam the system for priority
- callers. Not that they may be supporting the general strike, or
- protesting the coming war, of course. Though actually using it
- would bring its existence to widespread notice, and probably cause
- more panic than it cured! Still, it is hard to make contingency
- plans against interefrence with communications in a country
- that repressive.
-
- If you use this, use it as "Name withheld, UK."
-
- The knowledge is not particularly secret, but I don't
- want to be targeted for mentioning it.
-
- ------------------------------
-
- Date: Thu, 5 Mar 1998 23:11:36 PST
- From: shadow@KRYPTON.RAIN.COM(Leonard Erickson)
- Subject: File 4--Re: *ALERT* Internet Vulnerability * COUNTERMEASURES *
-
- In Cu Digest, #10.16, Wed 4 Mar 98, "Richard K. Moore" <rkmoore@iol.ie>
- writes:
-
- > The next step is to contact those people NOW - while you still can
- > conveniently - and exchange with them your phone numbers, fax numbers, and
- > postal addresses. You might even go so far as to make preliminary
- > arrangements for "phone-tree" or "photocopy-tree" protocols for
- > distributing information, but most of us probably won't get around to that,
- > life being what it is. The important thing is to have the necessary data
- > on hand well in advance of need.
-
- I suggest checking out Fidonet. Unlike the Internet, Fidonet is *based*
- on a "phone directory" (the nodelist) that permits *direct* exchange of
- email and files between sites. It also has some elementary security
- provisions, such as pre-arranged session passwords.
-
- If a system attempts to connect to my node (1:105/51) and claims to be
- a node I have a session passwortd with, it has to include the proper
- password in the session handshake. Failure to do so will get the
- connection rejected.
-
- Denial of service requires attack dialing my node's phone number, which
- is easily reported to the telephone company, who will cheerfully nail
- any non-government entity doing such a thing.
-
- Also, I can simply hook my hardware up to a different phone line and
- poll the nodes that I expect mail from.
-
- While Fidonet can learn (and has!) a lot from the Internet, I think we
- have some features that the Internet could stand to adopt. (e.g. we
- *explicitly* make sites responsible for content entering the network
- from them. "Spam" doesn't happen except via spoofing non-passworded
- links.)
-
- ------------------------------
-
- Date: Thu, 05 Mar 1998 14:14:21 +0100
- From: Gisle Hannemyr <gisle@hannemyr.no>
- Subject: File 5-- In Re - European Parliment STOA Program
-
- In a recent edition of Computer underground Digest (#10.08, Sun,
- Feb 1, 1998) Felipe Rodriquez <felipe@xs4all.nl> reported on
- a recent working paper for the European Parliement STOA
- Programme (File 4--National & International Communications
- Interceptions Networks).
-
- The working paper "AN APPRAISAL OF TECHNOLOGIES OF POLITICAL
- CONTROL" by Steve Wright of the Momega Foundation, Manchester,
- is now available from several wev locations, e.g.
-
- http://www.telepolis.de/tp/deutsch/inhalt/te/1393/anchor1.html
-
- As a survey of various techonologies that may be used of political
- control, the report is well worth reading.
-
- But read (as most media have) as a piece of journalism, reporting
- on current affairs, I find it less trustworthy. In that
- context, it suffers from Wright's inability to distinguish
- speculation from fact, and from his limited understanding of
- technology and telecommunications infrastructure. These problems,
- for example, becomes appearent in his treatment of Project ECHELON,
- which Wright introduces thusly;
-
- "a global surveillance system that stretches around the
- world to form a targeting system on all of the key
- Intelsat satellites used to convey most of the world's
- satellite phone calls, internet, email, faxes and
- telexes" [Wright, 1998]
-
- Unfortunately (or fortunately) this paints a picture of the
- world's telecommunication infrastructure that is at least
- ten years out of date. Today most of the world's phone calls,
- Internet traffic, email, faxes and telexes are _not_ carried
- by satelite, but by copper cables and optical fibres, and is
- therefore _not_ vulnerable to the surveillance techniques
- attributed to Project ECHELON, which was based upon erecting
- listening stations within the telecom.-satelites "footprint"
- and picking unencrypted data out of the ether.
-
- I have no reason to doubt that such a thing as Project ECHELON
- existed and maybe still even exists, but from a privacy point
- of view, it is now only of historical interests. Newspapers all
- over the globe covering Wrights paper seems to focus on Project
- ECHELON as a _current_ privacy problem. If it works as described
- in Wright's paper, this is simply not the case.
-
- Further, Wright's reading of his sources seems in places a bit
- sloppy in places. For instance, in the quote above, Wright
- includes telephony in what is monitored by ECHELON. As his
- source for information on Project Echelon he lists the book
- "Secret Power" by New Zealand based peace activist Nicky
- Hager. That book, however, states that:
-
- "Echelon is used only to intercept written communications:
- fax, e-mail, and telex." [Hager, 1996]
-
- which is much more believable. A key element in ECHELON seems
- to be automatic monitoring of communication streams by looking
- for certain keywords (known as "NSA-fodder" in hacker lore).
- While this is technically feasable to do this with text based
- communication streams, I know of no technology that with
- even moderate reliability can recognize more than a handful
- of keywords fed with continious speech in real-time from an
- un-cooperative and unknown speaker.
-
-
- References:
-
- Nicky Hager:
- Secret Power -- New Zealand's Role in the International
- Spy Network; Craig Potton Publishing, 1996
- <http://www.fas.org/irp/eprint/sp/>
- Steve Wright:
- An Appraisal of Technologies of Political Control; European
- Parliament, The STOA Programme, 1998
-
- ------------------------------
-
- Date: Sat, 7 Mar 1998 22:24:54 -0800 (PST)
- From: Jim Thomas <jthomas@WELL.COM>
- Subject: File 6--"USAG Reno pushes for computer security" (infoworld fwd)
-
- By Torsten Busse
- InfoWorld Electric
-
- Posted at 3:07 PM PT, Mar 5, 1998
- U.S. Attorney General Janet Reno has announced an interagency effort
- to track and analyze electronic threats to the nation's critical
- infrastructures, such as communications, transportation, and energy
- networks.
-
- The new National Infrastructure Protection Center (NIPC), headed by
- Associate Deputy Attorney General Michael Vatis, will include the
- Computer Investigations and Infrastructure Threat Assessment Center of
- the U.S. Federal Bureau of Investigation, and will add real-time
- intrusion-detection capabilities for cyberattacks directed at various
- national, electronic infrastructures.
-
- "Our telecommunications systems are more vulnerable than ever before
- as we rely on technology more than ever before," Reno said.
-
- The NIPC will coordinate the efforts of a number of government
- agencies in setting up and operating defenses against cyberspace
- intrusions from both inside and outside the borders of the United
- States. Effective defense will depend on that cooperation, Reno said.
-
- Reno will ask the U.S. Congress to commit $64 million for the NIPC in
- fiscal year 1999, a sum that will allow the establishment of six
- additional computer investigation centers in U.S. cities.
-
- <snip>
-
- ------------------------------
-
- Date: Tue, 24 Feb 1998 12:03:06
- From: Richard Thieme <rthieme@thiemeworks.com>
- Subject: File 7--"Computers, Freedom, Privacy"
-
- Islands in the Clickstream:
- Computers, Freedom, and Privacy
-
-
- A conference on computers, freedom, and privacy might be the last
- place one expects to find the deepest expressions of the quest
- for meaning in our lives, yet there it was, all over the place.
- So was evidence of new possibilities for what I call the human-
- computer symbiot, that new kind of community generated by our
- symbiotic relationship to our electronic sensory extensions and
- intelligent networks.
-
- The choices we make now as we take the reins of our own evolution
- more securely in our hands -- with fear and trembling at the
- perilous task before us -- will determine the kind of world we
- bequeath to our children.
-
- The quest for meaning would not be an issue if our lives were
- obviously meaningful. Every foreground is defined by a
- background. The threat of meaninglessness posed by an entropic
- universe headed toward heat death makes us ask if the evolution
- of complexity of form and consciousness is evidence of
- consciousness that is the source as well as the goal of evolution
- -- or merely something that happened to happen. Either way, the
- existential choices are the same, and the fact that they exist is
- the definition of freedom.
-
- The battle for freedom is not being fought in wars far from home
- but in the policies and decisions we make personally and
- professionally about how we will live in a wired world. If those
- decisions are conscious, deliberate, and grounded in our real
- values and commitments, we will build communities on-line and off
- that are open, evolving, and free. If we are manipulated into
- fearing fear more than the loss of our own power and
- possibilities, then our communities will be constricted, rigidly
- controlled, over-determined.
-
- Privacy is key to these choices.
-
- There is no such thing as a guaranteed private conversation any
- more. We used to be able to walk out behind a tree and know we
- could not be overheard. Now the information that is broadcast by
- everything we say and do is universally available for cross-
- referencing and mining for hidden patterns. Those patterns, as
- Solveig Singleton of the Cato Institute observed, are in the eye
- of the beholder, determined by their needs and ultimate
- intentions -- an eye that half-creates and half-perceives, as
- Wordsworth said, constructing reality in accordance with its
- wishes and deepest beliefs.
-
- What we deeply believe, and how we allow others and our
- intentional communities to reinforce our beliefs and values,
- determines our actions and commitments. The choices we make
- downstream will emerge upstream when the river widens.
-
- In a conversation with a career intelligence officer about the
- actions of various US agencies, I made this appeal: "There is a
- cry for justice in a child's heart," I suggested, "that is eroded
- over time by the way we sometimes have to live. Yet the day comes
- when we look at what we have done with our lives and its
- relationship to that cry for compassion."
-
- He disagreed. "I long ago set aside the sentiments of my
- childhood religion," he said....
-
- In order to do the things he had to do.
-
- And the growing sophistication of technologies of torture, that
- enable governments to leave fewer marks, fewer clear memories in
- the minds of victims?
-
- "A sign of growing sensitivity to world opinion," he said. "At
- least they're moving in the right direction."
-
- How we do hear that cry for compassion, when the foggy weather in
- our own minds works to obscure it? Would it help, I asked Patrick
- Ball of the American Association for the Advancement of Science,
- to have audio clips on the web of what happens in those
- interrogation rooms?
-
- "No," he said with conviction. "The descriptions I've read are
- sufficiently graphic."
-
- What I cannot represent in words is the look in his eyes as his
- brain did a quick sort of the hundreds of detailed torture
- scenarios he had studied. Nor can I say how the face of that
- intelligence professional went suddenly wooden and his eyes
- looked away as he remembered what he had done as part of his job.
-
- How wide do we draw the circle? A Department of Justice attorney
- arguing for weak encryption stopped at the border. Catching
- criminals inside America is his sole priority, so he wants a back
- door into every electronic conversation in the world. Ball draws
- a wider circle, including those in Guatemala, Ethiopia, or Turkey
- who might be alive if they had had a possibility of engaging in a
- private conversation. Ball favors strong encryption as a way to
- support human rights worldwide.
-
- Our knowledge of "how things really work" pushes the conversation
- further. Seldom have intelligence agents told me they worry about
- abuse of the information they gather. They trust the system.
-
- "We abide by the law," said a CIA professional. He added that
- even the NSA can not intercept conversations inside our borders.
-
- They don't have to, said another. Our special friends in New
- Zealand or Canada listen to American traffic as we listen to
- theirs. Good friends, he added, help one another.
-
- So ... granted that we live in a real world in which data
- gathered for one purpose finds its way into other nets, in which
- anything that has value will be bought and sold ... what are the
- limits we can place on the inordinate desires in the human heart
- to be in control, to know more than we have a right to know? How
- can technology serve the need for secure boundaries that
- guarantee citizens of a civil society the freedom they need?
- Knowing what human beings do to one another, how can we constrain
- our baser desires and make it less likely that they will
- determine policy and behavior?
-
- Conferences like CFP generate more questions than answers. But as
- long as the questions are raised, we maintain the margin between
- necessity and possibility that defines human freedom.
-
- That margin may be narrowing, but so long as it exists, our
- passion for freedom, justice, and compassion can still manifest
- itself in action as well as words.
-
-
-
-
-
-
-
-
-
- **********************************************************************
-
- Islands in the Clickstream is a weekly column written by
- Richard Thieme exploring social and cultural dimensions
- of computer technology. Comments are welcome.
-
- Feel free to pass along columns for personal use, retaining this
- signature file. If interested in (1) publishing columns
- online or in print, (2) giving a free subscription as a gift, or
- (3) distributing Islands to employees or over a network,
- email for details.
-
- To subscribe to Islands in the Clickstream, send email to
- rthieme@thiemeworks.com with the words "subscribe islands" in the
- body of the message. To unsubscribe, email with "unsubscribe
- islands" in the body of the message.
-
- Richard Thieme is a professional speaker, consultant, and writer
- focused on the impact of computer technology on individuals and
- organizations.
-
- Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.
-
- ThiemeWorks on the Web: http://www.thiemeworks.com
-
- ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #10.17
- ************************************
-
-
-