home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Thu Sep 16 1993 Volume 5 : Issue 72
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cookie Editor: Etaoin Shrdlu, III
-
- CONTENTS, #5.72 (Sep 16 1993)
- File 1--Still more on the Elansky/Hartford BBS Case
- File 2--Thoughts on the Elansky Case - A Response
- File 3--Attitude TV show about hackers in Australia
- File 4--CuNews
- File 5--CPSR Annual Meeting
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES:
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 16 Sep 1993 15:23:41 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Still more on the Elansky/Hartford BBS Case
-
- Michael Elansky, sysop of The Ware House BBS in West Hartford, Ct.,
- remains in jail, and will likely be there for awhile, at least until
- his pre-trial hearing on Sept. 23. As information continues to trickle
- in, the First Amendment implications of the case grow. For those not
- following the case (see CuD #5.69 and #5.71), Elansky was arrested and
- is being held on $500,000 bond, excessive even by the standards of
- violent criminals in West Hartford (see IIRG file below). Elansky's
- primary sin seems to be that he ran a BBS that made "anarchy" text
- files available, something to which the prosecutor took exception.
-
- While it may be premature to argue that there is no other evidence to
- substantiate the charges, and that other illegal behavior might not be
- alleged at a later date, it increasingly appears that the existence of
- "anarchy" files is being used to create the image that Elansky is a
- potential social menace. It certainly appears that Hartford Superior
- Court Judge Richard A. Damiani may have been premature in his rebuke
- of Elansky's appeal for reduced bail. According to the Hartford
- Courant (August 7, B5), the judge argued that Elansky was where he
- belonged: In jail. The Courant quotes the judge as saying that,
- initially:
-
- I felt that Mr. Elansky was not a peron we should utilize a
- bed in prison for when we're dealing with rapists and
- murders.
-
- The judge said that the new "anarchy" charges changed his opinion:
-
- One could equate this with what's going on in New York, where
- terrorists are targeting particular buildings...I think he's
- more of a danger to society than a rapist in prison. He
- belongs in jail."
-
- Because of the lack of public disclosure of details in the case, the
- basis for the judge's comments remain unclear. Nothing other than the
- anarchy files has surfaced as evidence in the case.
-
- If the facts, which continue to be unchallenged, are as presented by
- Elansky, his parents, the defense attorney, the prosecutor's summary
- given to the media, and the document we reproduce in this file, then
- the case has a chilling effect on all media. But, electronic media
- especially--including BBSes, Usenet, and the Internet in
- general--could become vulnerable to prosecutorial discretion. The
- case could likely require a dramatic revision of BBS and related law
- by restricting freedom of expression.
-
- CuD received the following by mail, which we are told is an unsworn
- officer's report adduced to substantiate the charges. The language of
- the document includes wording identical to wording in a document the
- Hartford Courant (Aug 7, 1993, B5) cited as contained in the arrest
- warrant, which indicates that it provided the basis for at least the
- most dramatic prosecutor claims. The apparent typos, convoluted
- phrases, and other language occur in the copy that we received.
- Because of the awkward end of the "excerpts" section in the document,
- it is possible that a page or more of "excerpts" from the files has
- been omitted or withheld. If so, readers can refer to CuD 5.71 for the
- reprints of the files. Although actual instructions were deleted in
- our published version, readers can find the information in any similar
- "anarchy" file on thousands of BBSes across the country, as well as in
- conventional print media. The file we received reads:
-
- That I, Richard Aniolowski, am a member of the West Hartford
- Police Department and have been for ten years and 7 months
- and was promoted to Detective in September 1990.
-
- That on June 14, 1993, assistant state's attorney, Joan
- Alexander GA 14 assigned me to assist her in an
- investigation of a computer bulletin board that is
- disseminating information on how to manufacture explosives,
- bombs, and how to evade bomb squad technicians when they
- attempt to disarm such devices. The information included
- explicit and ((sic)) instructions on how to construct such
- devices with only laymans knowledge, and involved the
- promotion and encouragement of constructing such devices for
- purpose ((sic)) of "maiming or mortally wounding" law
- enforcement officials.
-
- That presently Michael Elansky has a court appearance for
- violation of probation. This probation is the result of an
- arrest for manufacturing explosives. In October, 1992,
- Michael Elansky was arrested for a burglary at Hall High
- School in which several dangerous chemicals were stolen. The
- chemicals stolen were sulfuric acid, hydrochloric acid and
- nitric acid. All of these chemicals can be used to
- manufacture explosives. That it was on May 28, 1993 that
- Detective Goodrow of the Hartford Police Department gained
- access to the "Warehouse", a modem accessible computer
- bulletin board that can be reached over regular telephone
- lines, ((sic)) The Warehouse is operated and controlled
- solely and exclusively by Michael Elansky. Elansky as the
- operator of the bulletin board system (BBS), is the only
- person who can delete files from the bulletin board, and is
- the only person who can determine which user may access the
- system and what level of access they may obtain. The user in
- this case were ((sic)) carefully screened and were required
- to make application to Elansky in order to be allowed
- access.
-
- The computer bulletin board in this case originates from the
- computer of Michael Elansky in the home of Michael Elansky
- ((address deleted by CuD)), West Hartford, Ct. Elansky being
- the authorized user of the bulletin board had a code name
- that identified him to the users of this bulletin board. The
- code name used by Elansky is "IONIZER."
-
- That Goodrow said the "Anarchy'" ((sic)) file he obtained
- access to the Warehouse bulletin board through one of the
- users systems.
-
- The file Anarchy that Goodrow accessed gave detailed
- instructions on how to manufacture explosives, bombs and
- went on to instruct the reader on how to evade police bomb
- squads in dismantling of bombs.
-
- That I supplied a photocopy of the file that Detective
- Goodrow downloaded from Michael Elansky Warehouse Bulletin
- Board.
-
- Some authorized users of Michael Elansky's are minors, a
- fact known to Elansky since he required that name, address
- and age prior to being allowed to access the bulletin board.
-
- The phone number used by Detective Goodrow to access
- "Warehouse" Bulletin Board put out by Elansky ((number
- deleted by CuD)). I obtained from SNETCO Security that the
- phone line belongs to Michael Elansky (address deleted by
- CuD)), West Hartford, CT.
-
- ((name deleted by CuD)) of Bloomfield, a University of Hartford
- student, and a user of bulletin board says the person who
- runs the bulletin board identifies himself as the "IONIZER"
- and is a student of The university of Hartford.
-
- On June 20, 1993 I interviewed and obtained a written
- statement from ((name deleted by CuD)) of East Hartford,
- he is 14 years of age. He said he has spoken with Michael
- Elansky by phone on several occasions.
-
- Several hours after speaking with ((name deleted by CuD)) I
- received a phone call from Michael Elansky asking why I was
- investigating him.
-
- That ((sic)) I spoke with ((name deleted by CuD)), 17 years
- of age who downloaded but deleted.
-
- ((name deleted by CuD)) of Newington downloaded "ANARCHY" from the
- warehouse bulletin board. The material was downloaded onto a
- floppy disc for the police department.
-
- Elansky does promote, encourage and praise the manufacture
- of explosives such as pipe bombs and goes one step further
- in promoting techniques on how to evade, injure and kill
- bomb technicians attempting to neutralize the bomb.
-
- _EXCERPTS_
-
- To any law enforcement agency "FUCK OFF this file is
- intended to promote general havoc and *ANARCHY*, and you
- can't do a damn thing about it PIGS...instructions of making
- pipe bombs. materials needed 6" pipes, drill
-
- ((CuD Moderators' Note: Were "instructions" withheld?))
-
- That in October 1992 the West Hartford Police Department
- conducted a search warrant at the home of Michael Elansky.
- The seizure included, pipes, approximately 6" long that had
- been capped and had been drilled into.
-
- Issue warrant...violation of Section 53a-179a inciting
- injury to persons or property and 53-21 risk of injury to a
- minor.
-
- dated July 26, 1993
-
- The files in question were reprinted (sans actual instructions) in CuD
- 5.71, and we saw in them no evidence that Elansky or anybody else
- advocated violence against the public or against law enforcement. Nor
- do the excerpts from the report make any such claim. The
- interpretation of the files by police stretches credibility. There are
- instructions for making pipe and other bombs, as the report indicates,
- but the instructions are superficial and do not target police or
- others. We could also not find any instructions in either file for
- "maiming or mortally wounding" law enforcement officials, for
- booby-trapping against disposal experts, or anything else. There are
- numerous other files that might suggest this, most available on
- "anarchy" and other BBSes. CuD possesses many megs of such files
- accumulated over the years, and they are written primarily by young,
- rebellious, teenagers. The files, as we argued in CuD 5.69, are
- better understood as a form of cultural rebellion and identity
- formation in the maturation process of teenagers than as a literal
- blueprint for "havoc" and violence.
-
- That files written by a 15 year old nearly four years ago can cause so
- much distress among law enforcement demonstrates the technophobia of
- law enforcement and the public. The media do not help combat these
- fears by appealing to the lowest common denominator in finding a
- dramatic angle. We note that no major media have written on this
- story. Perhaps if Elansky was also dating four women he met on his
- board, the print media would cover it on the front page. However, the
- story only raises fundamental First Amendment issues, which are boring
- and fail to capture the public interest.
-
- To CuDs knowledge, there has been only one reported incident of a
- serious incident involving youths attempting to build pyrotechnic
- devices from instructions obtained from BBS files. This occurred in
- Washington, D.C. (circa 1990) when two users of the old Atlantis BBS
- experimented with tragic results. One incident is one too many.
- Perhaps there have been others that have not been drawn to our
- attention. But, the point is that there is no evidence over the past
- decade of an increase in injuries or damages directly resulting
- from accessing such files. Existing evidence, drawn from BBSes,
- textfiles, and user-provided information over the years, suggests that
- these files are symbols of a youth subculture, and hardly a literal
- blueprint for action. When Axl Rose is pictured on MTV wearing a
- t-shirt that says "Kill your Idols" with a picture of Jesus, most
- observers recognize this as simply the rebellion of the heavy metal
- set. Although many commentators find the lyrics of rap disturbing,
- there are no arrests of radio station personnel who develop the
- playlists or the DJs who play them. Perhaps, in West Hartford, this
- will soon occur.
-
- THE LAWS THAT WERE VIOLATED
-
- What were the laws that posting of anarchy files violated?
- Chapter 952, Title 53a-179a of the Connecticut Penal code
- constitutes a class C felony, punishable up to ten years in
- prison:
-
- s 53a-179a. Inciting injury to persons or property:
-
- (a) A person is guilty of inciting injury to persons or
- property when, in public or private, orally, in writing, in
- printing or in any other manner, he advocates, encourages,
- justifies, praises, incites or solicits the unlawful
- burning, injury to or destruction of any public or private
- property or advocates, encourages, justifies, praises,
- incites or solicits any assault upon any organization of
- the armed forces of the United States, as defined by
- section 27-103, or of this state, as defined by section
- 27-2, or the police force of this or any other state or
- upon any officer or member thereof or the organized police
- or fire departments of any municipality or any officer or
- of any individual.
-
- s 53-21. Injury or risk of injury to, or impairing morals
- of, children
-
- Any person who willfully or unlawfully causes or permits
- any child under the age of sixteen years to be placed in
- such a situation that its life or limb is endangered, or its
- health is likely to be injured, or its morals likely to be
- impaired, or does any act likely to impair the health or
- morals of any such child, shall be fined not more than five
- hundred dollars or imprisoned not more than ten years or
- both.
-
- The broad scope of both laws could apply to a substantial amount of
- literature and television programming. If applied to the "anarchy"
- files that provide the "evidence" for Elansky's arrest, the
- implications would undermine freedom of expression by providing the
- justification for bringing felony criminal charges by over-zealous
- prosecutors against virtually all media. Instead of time-consuming
- Congressional hearings and debates on violence in media, why not just
- slap a few producers, writers, and Connecticut television personnel in
- jail with a $500,000 bond? And, because numerous books advocating,
- promoting, justifying, or glorifying violence or insurrection are
- available in, or accessible through, most book stores to anyone with
- the money to purchase them, perhaps the West Hartford police should
- continue their sweep and charge local book dealers as well. And,
- because the information is exchanged systematically in a coordinated
- network of sales and distribution, it might be wise to invoke
- conspiracy laws. Use of the "access devices" to obtain such
- information from BBSes, and interstate networks for other media
- obviously move into federal jurisdiction, so let's involve the U.S.
- Secret Service as well.
-
- Or, we could recognize that the "anarchy" files in question and others
- like them, along with other forms of expression that many of us find
- unwise or offensive, are simple part of the price of a First
- Amendment.
-
- The documents in the case remain sealed, which we find troubling. If
- there is more to the Elansky case, then the relevant information
- should be unsealed. If Michael Elansky is, in fact, the next
- potential World Trade Center bomber, as law enforcement officials
- suggest, then evidence should be produced and the judicial process
- should do its thing. However, if--as the case seems--Michael Elansky
- is "guilty" simply of distributing legal files on a BBS, then he
- should be released immediately and the charges against him dropped.
-
- CuD continues to use qualifiers such as "if the facts are as they
- seem." We simply find it inconceivable that even the most inept or
- mean-spirited law enforcement agents would proceed with a case and
- impose such a bond primarily on the basis of the anarchy files. Yet,
- without unsealing the documents, we just don't know. Given the facts
- publicly available, the evidence seems to mount against the
- prosecutor's judgment in this case. By using "anarchy" files as the
- basis of prosecution under the cited laws, he seems to have grossly
- over-reacted. The result is that it appears that not only has he done
- an injustice to Elansky, but he has put all media--electronic and
- otherwise--at risk of felony prosecution at the arbitrary discretion
- of law enforcement.
-
- Whatever the ultimate facts, the First Amendment issues will not
- disappear. CuD is in full accord with those who are uncomfortable with
- the ability of the new information technology to make texts and images
- freely available to minors and others. The accessibility of "adult"
- gifs, ultra-violent video games, graphic or potentially dangerous
- texts, virus and related sourcecode, and other material raises serious
- ethical and policy questions. Those with children are concerned that
- minors, especially young ones, not be exposed to certain types of
- material so readily. Those with the capacity to distribute the
- material face the challenge of balancing social responsibility with
- freedom of expression and information access. The underlying issues
- require discussion, debate, and recognition of legitimate, if
- competing, interests. We come down unequivocally on the side of
- responsible access. However, we absolutely reject the abuse of law as
- a means of stifling expression. Those who argue that "If just one life
- can be saved by curtailing the First Amendment a bit, then it's worth
- it" somehow seem to miss the point: Public education and responsible
- media reporting/dialogue are far better antidotes to the dangers
- potentially harmful information than subverting the First Amendment to
- suppress it.
-
- ------------------------------
-
- Date: Thu, 16 Sep 1993 14:18:59 EDT
- From: IIRG Group <rune@world.std.com>
- Subject: File 2--Thoughts on the Elansky Case - A Response
-
- IIRG RESPONSE TO CuD 5.71 (File 1)
- Presented By Mercenary - President/IIRG
-
- In CuD 5.71 (File 1), there appears a letter by Alan Dunkin titled
- "Law enforcement in the Elansky case". At this time we'd like to
- express our feelings on the content of this letter.
-
- Now Mr. Dunkin says, and we quote:
-
- "The International Information Retrieval Guild (IIRG), which
- Elansky belongs to, is trying to raise funds for bond. However,
- it burned me to see the IIRG lines in file 3 of CuD issue 5.69:
-
- "Buy His Freedom, Stop Government Censorship"
- "If we do not stop the government in its attempts
- to censor the public, we have abandoned what it
- truly means to be a Freedom Loving American".
-
- Government censorship really has nothing to do with the arrest,
- was you claim it was the West Hartford Police Department, which
- hardly qualifies to be the government. Plus, this is not
- censorship, it's the police trying to protect the public."
-
- Now apparently Mr. Dunkin seems to feel that the West Hartford Police
- Department doesn't qualify as a valid branch of government.
-
- Im sure they'll be happy to hear that.
-
- Earlier in his letter he was quick to quote the Webster's Dictionary,
- we'd like to advise him to flip to the definition of police.
-
- Police - "The governmental department (of a city,state,etc.) organized
- for keeping order and for preventing,detecting,and punishing
- crimes."
-
- This definition certainly looks like Government to us.
-
- Mr. Dunkin also makes the statement that "this is not censorship,
- it's the police trying to protect the public." Now this may be a nice
- idea in theory, but lets look at the plain cold facts of the matter.
-
- 1. Mike was a BBS Sysop, with a clearly presented disclaimer
- on his system that the files offered on the Ware House
- were for Entertainment purposes only.
-
- 2. Who were the police protecting? Mike endangered no
- individual or property, there were no "terrorist" acts
- committed by any user of the Ware House. If the police had
- simply asked him to remove any offensive files, We're sure
- he would have Obliged. (Although this would be censorship
- in itself)
-
- 3. Mike's bail is set at $500,000 dollars, the average
- murderer in Connecticut receives a $100,000 bail and just
- yesterday on Sep 13th, 2 bank robbers received a $250,000
- bail. Mike has been approached by a TV program that wants
- to air his side of the story. By making his bail so high
- that it cannot be made, they are censoring him from
- presenting his story.
-
- 4. When any governmental agency decides what is "acceptable"
- to read, this is defined as censorship. And by arresting
- Mike Elansky for having so called "questionable" text
- files on his system. The West Hartford Police (a
- Governmental Agency), is censoring a sysops rights of what
- he may have online.
-
- ------------------------------
-
- Date: 9 Sep 93 09:01:39 GMT
- From: rhys@CS.UQ.OZ.AU(Rhys Weatherley)
- Subject: File 3--Attitude TV show about hackers in Australia
-
- On the 8th of September, the Australian Broadcasting Corporation
- broadcast an episode in their "Attitude" series of programs. This
- episode concentrated on hackers, the cyberpunk movement, law enforcement,
- cyberart, youth being empowered by technology, and lots of other things
- (my memory fails me on all the details). As the CuD editors are always
- on the lookout for perceptions of hackers by the media, I thought I'd
- send this overview in. Other Aussies who saw the show may be able to
- add to what I've said below, or correct my errors.
-
- Basically, the show presented a fairly consistent angle on the hacker
- issue. Unfortunately, its angle was the "cracker" aspect, which is what
- we've come to expect from the media, sadly. It did touch on issues of
- Freedom of Information, hacker ethics, and the interviews with convicted
- or accused hackers were good. One of the hackers interviewed told a
- familiar story for CuD readers: the police confiscated his equipment,
- no charges have yet been laid, and he can't get his equipment back.
- Others stated how easy it was to walk through systems.
-
- The recent "Hacking at the End of the Universe" conference in the
- Netherlands made an appearance, but computer-illiterate viewers would
- be forgiven for thinking that this was a big cracker get together to
- swap tips on breaking into systems. The difference between a hacker
- of the old school and the cracker variety was never spelt out.
-
- Here is your typical hacker profile as presented by the show: they
- start their hacking life with a computer and a modem getting into
- pirate bulletin boards downloading cracked games, and eventually
- move onto the Internet. A hacker is playful and explorative by
- nature.
-
- A little bit of confusion between USENET and Internet got in, but it
- was brief, and they seemed to want to talk about IRC more, probably
- because real-time chatting is trendier than netnews. :-) The perception
- I got of the Internet (if I hadn't known any better) was that it exists
- for the exchange of hacker (i.e. cracker) material. *sigh*
-
- They interviewed a cyberfeminist, who espoused the "male-dominated
- network" view (I'm not on any side here: maybe it's true, maybe it
- isn't). She and 3 friends are apparently working on a video game for
- females. More power to them I say. Some cyberartists were also
- interviewed ("Cyber Da Da" I think their name was: could be wrong).
-
- Bruce Stirling was interviewed and made an interesting comment about law
- enforcement attitudes (paraphrased): "if they have lots of computer
- equipment, and a copy of Neuromancer, then they must be up to something".
- Gee, I better burn my copy right now! :-) At one point, they did a
- little bit of a "fast forward effect" on Bruce speaking (could have been
- someone else): it made me wonder if some "good hacker" stuff was in the
- fast forwarded section and was edited out.
-
- The Australian Federal Police also got a look-in (also paraphrased):
- "we may not bust down your door now, but we are just busy on other cases,
- and we'll get around to you later". Another interviewed person made
- the comment that hackers are usually one step ahead of law enforcement
- because they can specialize, whereas law enforcement can't. Good comment.
-
- Computer porn only got a brief 5 second slot, which was a relief considering
- some of the newspaper stories that have been doing the rounds in Australia
- recently. It still had the obligatory picture though.
-
- All in all, I don't think the show did the network or the hacker communities
- any real favours, but it wasn't overly militant about it either.
-
- ------------------------------
-
- Date: Fri, 10 Sep 93 03:12:00 BST
- From: grmeyer@GENIE.GEIS.COM
- Subject: File 4--CuNews
-
- If It's Blurry You Shouldn't Be Watching
- ========================================
- A patented digital technology from VideoFreedom Systems (San Diego, CA)
- may be the key to getting an intrusive Congress off their censorship
- bandwagon. The technology would allow television (and movie theatres!)
- to blur objectionable scenes and sounds. Much the same way the news
- programs can distort the voice and image of a confidential source who wishes
- to remain that way. The technology would allow those viewers who want to see
- "the good parts" to clean-up the image to their tastes.
- (Information Week August 16, 1993 pg 10)
-
- Hackers Need Not Apply
- ======================
- Information Week magazine recently conducted a "fax vote" self-selected
- survey of readers. The questions asked about policies, thoughts, and
- practices regarding hiring ex-hackers to help out with computer security.
- Of the those who choose to respond, 15% said they had been approached for
- a job by a hacker. Only 6% said they had ever hired a hacker to test
- security. Of their concerns about doing so, over half said "they might
- compromise security". About 35% expressed concerns over "legal
- problems".
-
- Some of the write-in comments included:
-
- "Their crimes are difficult to prove and almost impossible to prosecute.
- Not only do they go unpunished, but hiring them makes crime pay."
-
- "What happened to our idea of ethics and morality? I don't believe only
- felon hackers are smart enough to foolproof our computer systems."
-
- "They could sell ideas back to your competitor. These people will do
- anything for a buck".
-
- Refer to Information Week, August 16, 1993 pg 29 for full details.
-
- This Tag Line Meets Corporate Standards
- =======================================
- Duke Power Company (Charlotte, NC) has issued a memo to supervisors and
- managers that forbids employees from expressing their religious or political
- opinions over the company's Email, voice mail, or fax machines. The company
- says the memo arises out of problems with people using 'tag lines' (short
- sentences at the end of messages) on the company's Profs mail system. The
- company did not forbid tag lines, but issued guidelines for their content.
- According to the company few of its 18,000 employees see the rules as a
- restriction of free speech.
- (Information Week. August 16, 1993 pg 60)
-
- Woodstock for Hackers and Phreaks
- =================================
- Newsweek magazine (Aug 16, 1993 pg 47) features a story on the End of The
- Universe conference in the Netherlands. According the Information Week's
- summary, the Newsweek article reports that attendees had at least one thing
- in common with the Woodstock guests....they believe that rules were meant
- to be broken. (IW's summary is on pg. 64, August 16, 1993)
-
- Don't Copy That (Microsoft) Floppy!
- ===================================
- Information Week reports that an article in the San Francisco paper THE
- REVOLVER (Aug 9, pg 1) says some lawyers claim that Microsoft might enjoy
- too much influence over federal prosecutors. It seems that an unusually
- high number of cases against software pirates are launched on Microsoft's
- behalf. The number is higher compared with Lotus or WordPerfect for example.
- (Information Week. August 1, 1993. pg 64)
-
- Feds file Kiddie-Porn charges
- =============================
- Charges have been brought against six people in an effort to shut down
- an international child pornography ring. Dept of Justice officials allege
- that the Bamse BBS, based in Denmark, offers a variety of child-related
- porno in the form of graphics, text, and computer games.
- (Computerworld. September 6, 1993. pg16)
-
- 20th Annual Computer Security Conference and Exhibition
- =======================================================
- The Computer Security Institute's conference will be held November 8 - 10,
- 1993 in Anaheim, California. The Anaheim Hilton and Towers is the site
- for the meetings. Contact the C.S.I. at (415) 905-2626 for full details.
- Some of the proceedings scheduled include:
- Unix Security for Bert and Ernie
- (Cheryl Jaksha, Coca-Cola Foods)
- Identification and Protection of Computer Evidence
- (Walter Manning, Techno Crime Services)
- Horror Stories and How to Use Them
- (Dan Erwin, Dow Chemical)
- Security Awareness for the Unwilling
- (Cheryl Jaksha, Coca-Cola Foods)
- Information Security: The Human Dimension
- (Vic Maconachy, Ph.D., US DoD)
- The Golden Rule and Computer Viruses
- (Genevieve Burns, Monsanto Company)
- Why PBX Fraud Continues
- (Ed Blackwell, Information Security Consultant)
- Fax Security Facts
- (Steve Skolochenko, US Postal Service)
- Cryptographic Policy Issues
- (F. Lynn McNulty, NIST)
- Penetration Testing
- (Richard W. Owen, Jr., Janus Software)
-
- Please Deposit 25 cents for the next 64000 bytes
- ================================================
- New York residents and companies might have to start paying a tax for using
- on-line services. An amendment to the NY state budget added a 5% sales tax
- to 900-number "phone sex" providers. Critics, however, say the law is so
- vague that it may end up applying to on-line services and bulletin boards.
- (Information Week. Sept 6, 1993 pg 14)
-
- UK Data Protection Act
- ======================
- Great Britain's data protection registrar is attempting to establish a
- national policy concerning the types of information employers can retain,
- and sell, about their employees. The investigation was spurred by a story
- in the Times of London which claimed that banks, retailers, and insurance
- firms stored information about their employees and customers sex lives
- and voting records.
- (Information Week. Sept 6, 1993 pg46)
-
- ------------------------------
-
- From: "James I. Davis" <jdav@WELL.SF.CA.US>
- Subject: File 5--CPSR Annual Meeting
- Date: Thu, 2 Sep 1993 09:43:10 -0700
-
- COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
- ANNUAL MEETING
-
- October 16 - 17, 1993
-
- University of Washington, South Campus Center
- Seattle, Washington, USA
-
- Envisioning the Future:
-
- A National Forum on the
-
- National Information Infrastructure and Community Access
-
-
- Co-sponsored by the American Society for Information Science
- Pacific Northwest Chapter (ASIS-PNC)
-
- ************************************************************************
-
- The National Information Infrastructure (NII) is the proposed medium or
- "electronic highway" that will connect schools, libraries, government
- agencies, and citizens using state-of-the-art computer and communications
- technology. Media, computer, and telecommunications companies are also
- acutely interested in the NII as it dramatically increases their
- opportunity for delivery of communication, services, and entertainment.
- CPSR is convening this meeting for both computer professionals and the
- informed public to discuss the broad range of choices facing society
- regarding the NII.
-
-
- Saturday, October 16th
-
-
- 8:00 - 9:00 Registration/Coffee & Tea
-
- 9:00 - 9:15 Welcome to the CPSR Annual Meeting - Aki Namioka
-
- 9:15 - 10:15 Keynote Address - Bruce McConnell,
- Office of Management and Budget
-
- "Shaping Nationl Information Infrastructure Policy"
-
- Bruce McConnell, Chief of Information Policy at the Office of
- Information and Regulatory Affairs in the Office of Management and
- Budget (OMB), will present his views on the major NII issues now
- facing the administration. He has been with OMB since 1985 and
- became head of Information Policy in 1992. He now chairs the
- inter-agency task force responsible for developing federal
- information policy for the Information Infrastructure Task Force.
-
-
- 10:15 - 10:45 Break
-
-
- 10:45 - 12:15 Panel Discussion - Moderated by Eric Roberts
-
- "Public Access to Internetworks"
-
- Public access to the Internet (and other major networks) is a critical
- issue in any discussion about an "electronic highway". Panelists
- representing a wide variety of perspectives, including representatives
- from the Pacific Northwest, will present their views.
-
- Panelists:
- Phil Bereano, College of Engineering, University of Washington
- Eric Hood, NorthWestNet
- Kenneth Kay, Computer Science Policy Project
- Jim Taylor, Coordinator Automated Services, Seattle Public Library
-
-
- 12:15 - 1:45 Lunch Break
-
-
- 1:45 - 3:00 Panel Discussion - Moderated by Andrew Gordon
-
- "Municipal Information Infrastructure"
-
- City and other government agencies are exploring possibilities for
- developing municipal networks. In this panel a city official as well as a
- representative from the state regulatory agency and a representative of
- commercial interests will offer their insights and interests.
-
- Panelists:
- Joe Hommel - Washington Utilities and Transportation Commission
- A representative from the Department of Administrative Services for
- the City of Seattle
-
-
- 3:00 - 4:30 Panel Discussion - Moderated by Doug Schuler
-
- "Networking in the Community"
-
- Community networks exist and are being developed all over the U.S.
- Panelists from various community networks will present their
- perspectives on the state of community networking now and in the future.
-
- Panelists:
- Tom Grundner, National Public Telecomputing Network
- Parker Lindner, New Media Matters
- Evelyn Pine, CPSR/Berkeley member and former Executive Director of the
- Community Memory Project
- Roy Sahali, CLAMDYP (Computing Literacy and Access Making a Difference for
- Youth Projects)
-
-
- 4:30 - 4:45 Break
-
-
- 4:45 - 6:15 Panel Discussion - Moderated by Marc Rotenberg
-
- "Computers and Democracy - What's the Connection?"
-
- How might computers facilitate the democratic process? How might they
- pervert it? "Electronic Democracy" is currently in the public eye and
- aspects of it will probably be tested soon. What can be done to promote
- wise uses of computers in this critical area?
-
- Panelists:
- Jeff Chester, Center for Media Education
- Jamie Love, Taxpayers Assets Project
- Leah Lievrouw, Department of Telecommunication and Film,
- University of Alabama
-
- 6:15 - 6:30 Closing Remarks - Jeff Johnson
-
-
- ************************************************************************
-
- 7:00 - 7:30 No Host Bar at Banquet Site
-
- 7:30 CPSR Banquet - Fundraiser - Waterfront Activities Center
- (Vegetarian food will be available)
-
- + Presentation of the 1993 Norbert Wiener Award to The Institute
- for Global Communications (IGC)
- Presenter: Eric Roberts
-
- The CPSR Board of Directors has chosen to award the 1993 Wiener
- Award to IGC in recognition of the work the organization has done to
- use network technology to empower previously disenfranchised
- individuals and groups working for progressive change. Geoff Sears,
- IGC's Executive Director, will be present to accept the award.
-
- + Banquet Address and Interactive Event - Kit Galloway, Electronic
- Cafe International
-
- Kit Galloway of Electronic Cafe International in Santa Monica,
- California will present his innovative approach to electronic
- communication using phone lines, slow-scan television, and other
- technology. Using videotapes and a live demonstration with CPSR
- chapters in Los Angeles and other locations, Kit will discus how the
- Electronic Cafe concept has been used in a variety of settings.
- Electronic Cafe International has staged global events with poets,
- children, and communities in France, Nicaragua, Japan, as well as a
- variety of American cities.
-
- Be sure to attend the banquet and participate in this provocative
- encounter with multimedia community networks !!
-
- ************************************************************************
-
- Sunday, October 17th
-
- The second day of the conference will feature a more interactive format
- including several workshops, a discussion of CPSR's NII vision, and
- a special - free and open to the public - panel discussion on "Privacy
- Implications of Health Care Reform" Sunday evening.
-
-
- 8:30 - 9:30 Coffee & Tea
-
- 9:30 - 11:30 Workshop Sessions
-
- Gender Relations in Networking
- - Judi Clark
-
- Information Policy: A Framework for Action
- - Karen Sy
-
- Computer Professionals and Social Action
- - Jeff Johnson
-
- 11:30 - 1:00 Lunch Break
-
- 1:00 - 2:30 CPSR Discussion
-
- 2:30 - 3:00 Break
-
- 3:00 - 4:30 CPSR NII Vision Document Discussion - Moderated by Todd Newman
-
- 4:30 - 5:00 Closing Remarks - Future CPSR NII Program - Marc Rotenberg
-
-
- 7:30 - 9:30 Special Panel Discussion
- "Health Care Reform and the National Information
- Infrastructure: Opportunities and Risks"
-
- This special event is free and open to the public.
- Kane 210, University of Washington
-
- ************************************************************************
-
- ABOUT CPSR
-
- Computer Professionals for Social Responsibility stands alone as the only
- national, non-partisan, public-interest organization dedicated to
- understanding and directing the impact of computers on society. Decisions
- regarding the use of this technology have far-reaching consequences that
- necessarily reflect the basic values and priorities of the people who govern
- their use.
-
- Founded in 1981, CPSR has 2000 members from all over the world and 22
- chapters across the country. Each of our members is an important participant
- in the dialogue that is helping to shape the future use of computers in the
- United States. Our National Advisory Board includes one Nobel laureate and
- three winners of the Turing Award, the highest honor in computer science.
-
- We believe that as the influence of computers continues to permeate every
- aspect of our society, it is important that professionals become active
- participants in formulating the policy that governs computer use and access.
- CPSR welcomes any and all who share our convictions.
-
- +++++++++++++++++++++++++++++++++++
-
- Registration Form
-
- Please pre-register by September 30 to guarantee seating. Registrations at
- the door will be accepted pending space.
-
- Name _________________________________________________________________
-
- Address ______________________________________________________________
-
- City _______________________________ State _____________ Zip _________
-
- Telephone __________________________ E-mail_____________________________
-
- CPSR member $55 _______
-
- Non member $75 _______
-
- 1 year CPSR membership & registration $100 _______
-
- Low income/student $25 _______
-
- Banquet ticket $40 X ___ = _______
-
- Additional donation to further CPSR's work _______
-
- Total enclosed _______
-
- For more information contact CPSR, 415-322-3778, draper@csli.stanford.edu,
- or Aki Namioka, 206-865-3249, aki@cpsr.org. Send completed registration
- form with check to: CPSR, P.O. Box 717, Palo Alto, CA 94301
-
- ------------------------------
-
- End of Compuer Underground Digest #5.72
- ************************************
-