home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Dec 5 1993 Volume 5 : Issue 91
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Editor: Tamen O. DeSchrew, III
-
- CONTENTS, #5.91 (Dec 5 1993)
- File 1--Anarchy Gone Awry
- File 2--PC Security books reprints material from AIS (Review)
- File 3--Apple Computers bitten by Conservatives
- File 4--GAO Report on Computers and Privacy
- File 5--New Docs Reveal NSA Role in FBI Digital Tele Proposal
- File 6--REMINDER: CFP '94 SCHOLARSHIP DEADLINE APPROACHING
- File 7--DIAC-94 Call for Participation
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
- KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 02 Dec 93 04:36:10 -0700
- From: "L. Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU>
- Subject: File 1--Anarchy Gone Awry
-
- Mr. Leichter raises some extremely pivotal issues in CUD #5.90 related
- to the `anarchy' of the Internet. B.Sterling is the author of one of
- the most brilliantly colorful characterizations and metaphors of the
- Internet as `anarchic', comparing its evolution and development to that
- of the English language:
-
- > The Internet's `anarchy' may seem strange or even unnatural, but
- > it makes a certain deep and basic sense. It's rather like the
- > `anarchy' of the English language. Nobody rents English, and
- > nobody owns English. As an English-speaking person, it's up
- > to you to learn how to speak English properly and make whatever
- > use you please of it (though the government provides certain
- > subsidies to help you learn to read and write a bit).
- > Otherwise, everybody just sort of pitches in, and somehow the
- > thing evolves on its own, and somehow turns out workable. And
- > interesting. Fascinating, even. Though a lot of people earn
- > their living from using and exploiting and teaching English,
- > `English' as an institution is public property, a public good.
- > Much the same goes for the Internet. Would English be improved
- > if the `The English Language, Inc.' had a board of directors
- > and a chief executive officer, or a President and a Congress?
- > There'd probably be a lot fewer new words in English, and a lot
- > fewer new ideas.
-
- Unfortunately, though, having attended a lecture by Mr. Sterling and
- having read `The Hacker Crackdown', I think he has a tendency to
- overdramatize and glorify quasi-criminal behavior and rebellious,
- subversive, revolutionary aspects of social structures, including those
- of the Internet. In my view, to the contrary the Internet is largely
- held together with the glue of social cohesion and human civility, and
- ingredients that are destructive to that order are likewise toxic to
- Cyberspace, and that, conversely, virtually all of the excruciating
- poison in the bloodstream today can be traced to violations and
- perversions of that trust. (Unfortunately, the English language is
- itself subject to unpleasant, corrupt, or toxic uses such as for
- profanity, disinformation, and lies, which are prevented or at least
- minimized through rejections by honest people.) I agree with Mr.
- Leichter in the belief (to paraphrase Twain) that `reports of the
- anarchy on the Internet are greatly exaggerated'.
-
- Leichter:
- >The Internet has been
- >described as an anarchy, but in fact only relatively small parts of
- >the Internet are actually anarchic.
-
- I would like to go further than this and suggest that the Internet has
- been over-promoted as `anarchic' by certain subversive, quasi-criminal
- segments that have found a tenacious hold there, namely extremist
- libertarians and `Cryptoanarchists'. The Cryptoanarchist cause is
- closely associated with the Cypherpunk founders E.Hughes and T.C.May
- (characterized particularly by the latter's infamous signature), who in
- my view appear to promote not merely `privacy for the masses' and `the
- cryptographic revolution', but at least condone or tolerate the use of
- collections of imaginary identities to manipulate and deceive others,
- and even to evade legitimate government actions such as criminal
- prosecutions. My most strident requests for their position, personal
- knowledge, and potential involvement in this practice have gone
- unanswered, evaded, and repressed over many weeks, but I have many
- statements from followers that might be regarded as `cult fanatics'
- about the Liberating Effects of `pseudoanonymity', which they exalt as
- True Anonymity.
-
- In my opinion, in this regard of the ease of creating fake identities,
- the `anarchic' vulnerability of the Internet reaches its peak in
- undesirable and socially poisonous consequences, which people are
- bloodily battling daily on many diverse mailing lists and Usenet
- groups. In my experience, the Internet inhabitants I have found who
- most fanatically worship the Internet `anarchy' seem to be closely
- associated with criminally subversive aims of pornography distribution,
- tax evasion, black marketeering, and overthrow of governments, goals
- which are all masked in much of the eloquent Cryptoanarchist dogma and
- rhetoric. While some of us have glimpsed various hideous corners of
- Cyberspatial Hell, those who subscribe to the Liberating Religion of
- Anarchy are in their Paradise on the Internet As We Know It. I call
- their Utopia a Ticking Time Bomb and a Recipe for an Apocalypse.
-
- I have come to these (admittedly melodramatic) conclusions after ~10
- months and ~3500 messages of generally unpleasant and at times
- excruciatingly troubling and painful reading and participation on the
- Cypherpunks list and many personal communications with the Cypherpunk
- leaders including E.Hughes, T.C.May, and J.Gilmore. In fact, in my
- opinion the `Psychopunk Manifesto' parody in CUD #5.89, which longtime
- cypherpunk list subscriber P.Ferguson describes in 5.90 as having `made
- its rounds in the cyberspatial world', actually in many ways comes
- closer to delineating the actual cypherpunk agenda than the one
- authored by founder E.Hughes on soda.berkeley.edu:
- /pub/cypherpunks/rants/A_Cypherpunk's_Manifesto. The satire is
- actually a reformulated version of the original Manifesto, and the
- former's amazing meme-virus penetration of the into the cyberspatial
- psyche that P.Ferguson alludes to is indicative of its resonance over the
- latter.
-
- I gave the Cypherpunks the most extraordinary benefit of the doubt for
- months, far beyond that of a reasonable cyberspatial inhabitant. But
- now I must warn everyone who can hear me that if they assign the
- `cypherpunks' as an organization the same credibility as a group like
- EFF or CPSR they are dangerously, perhaps disastrously, misguided. They
- appear to me to the contrary to be the cultivators of a flourishing
- conspiracy and essentially the first Cyberspatial guerilla and
- terrorist group! The Psychopunk satirization of the Cryptoanarchists is
- representative of this Internet Anarchy Gone Awry.
-
- More information on the CryptoAnarchist & Cypherpunk agenda can be
- found in RISKS 15.25, 15.27, and 15.28x (FTP crvax.sri.com, directory
- RISKS:). I also have an essay `Joy of Pseudospoofing', regarding the
- dangerous consequences and poisonous effects of the manipulations of
- fake cyberspatial identities such as on the Internet by
- Cryptoanarchists, available to anyone who requests it from me by email
- at <ld231782@longs.lance.colostate.edu>.
-
- * * *
-
- I think that many people have mistaken the word `anarchic,' implying no
- overseeing authority or order (which the Internet is less) with the
- word `decentralized' (which the Internet is more). Again, the
- Internet has many regulatory and self-governing systems and orders.
- For example, connecting sites are required to implement a certain
- minimum set of software standards and prevent or even root out
- corruptions in their local sites and software. We have centralized
- databases that require the registration of domains for fees. A complex
- network of agreements and policies governs interconnectivity and
- communication, and a complicated interplay of elements affects basic
- content such as `commercial vs. academic.' Lack of some of these
- regulations and protocols would be disastrous.
-
- Leichter:
- >Most of the Internet, in fact, is
- >better described as self-governing. There are a variety of social
- >norms concerning network use and interactions. One doesn't post
- >messages to unrelated groups. One doesn't evade moderation
- >restrictions. One maintains a certain (rather limited, it must be
- >admitted) degree of restraint in how one describes other network
- >participants. There are few effective mechanisms for enforcing these
- >norms, and they are certainly broken on an all-too-regular basis; but
- >the network continues to function because social pressure *can* be
- >applied to those who become too annoying; and in the most outrageous
- >cases, it's possible to remove the offenders' access to the net.
-
- I advocate that we build new formal mechanisms to enforce this order!
- We have for too long pretended that a central element of the Internet
- is not integral to it, namely that of the `degree of restraint over
- network participants' exerted through `social pressure'. Let us codify
- and formalize these `norms concerning network use and interactions' and
- develop systems that enforce them! I believe such systems can be
- developed that do not stray from the sacred Internet tradition of
- decentralization of control and freedom from censorship. Why should we
- continue to subject ourselves to the torture of `few effective
- mechanisms for enforcing these norms broken on an all-too-regular basis'?
-
- One of my most enduring Cyberspatial hallucinations is that of a
- Ratings server. A Ratings server would be a massive distributed network
- for the propagation of information similar to Usenet, and could
- conceivably be built upon it. But the Ratings server is not
- Information, as Usenet is, it is Information about Information. Anyone
- can post an arbitrary message to the Ratings server that refers to
- Information somewhere else in Cyberspace. It is in a sense a Rating of
- that Information. The Information could be *anything* -- a mailing
- list, a person, a particular Usenet posting, an FTP site. But postings
- on the Ratings server can be perused by anyone, and anyone can
- contribute Ratings to the server or indicate their own opinion on the
- existing Ratings. Different mechanisms exist such that some Ratings are
- `local' and some are updated globally.
-
- The fantastic possibilities of this system are evident upon some
- reflection and consideration. We could establish arbitrary new groups
- that have *formal* requirements that are matched by Ratings servers.
- For example, we could require that new sites that enter the Internet be
- `trusted' by an existing site. We could require that membership in
- certain groups requires a certain amount of collateral peer approval,
- with automatic suspension or expulsion as the consequences for
- violating it! We could have *meaningful* polls on arbitrary issues. We
- could have news servers that automatically sort and archive articles
- according to their passing certain Ratings thresholds. We could
- restrict the influence of troublemakers! These are all examples of
- strengthening and formalizing the informal social orders that are, in
- my opinion, today just barely holding the Internet together. With a
- Ratings system, I think the civility of the Internet would increase to
- a fantastic degree. In short, we could have our *own* cyberspatial government!
-
- Note that there is no centralized authority or unfair influence in this
- system, unless people corrupt their servers. When everyone who has
- joined a group *individually* decides to screen their postings of
- messages that fail to meet a certain `quality' or posters who have a
- certain `reputation', that is not Orwellian Censorship but the
- beautiful Internet freedom and right of Bozo Filtering. When everyone
- who joins a group *agrees* to a charter that may bar troublemakers
- based on Ratings, no one can claim they are being unfairly oppressed.
-
- Other extremely interesting implementation issues in the use of the
- Ratings servers can be addressed in detail. For example, the use of
- cryptographic protocols to ensure the integrity of voting or privacy of
- certain entries will certainly prove invaluable and even critical to
- their development. The optimal protocols for the localization or
- distribution of votes will surely be subject to extremely fascinating
- and fruitful research. In my view the concept of a Ratings server is
- wide open territory and holds some immensely promising potential in
- finally, valiantly slaying the dreaded, ugly, vicious Signal to Noise
- Monsters harassing, terrorizing, and torturing us everywhere on the
- Internet, to be replaced with Shining Castles.
-
- I urge anyone interested in developing `civilized systems for
- cyberspace' to subscribe to a new group I have helped start with
- J.Helgingius (owner of the popular and revolutionary anon.penet.fi
- anonymous server) called the Cypherwonks, dedicated to openness,
- honesty, and cooperation on the Internet, and building sophisticated
- new systems to promote social harmony in Future Cyberspace. We are
- particularly fascinated with the possibilities of `Electronic
- Democracy'. (Send a message to `MajorDomo@lists.eunet.fi' with the body
- the commands `info' or `subscribe cypherwonks'.)
-
- I fervently hope that the glorifications and manipulations of Internet
- Anarchy by mouth-frothing libertarian extremists, Cryptoanarchists,
- and sympathizers can be adequately controlled and minimized in the
- future, and some harmonious systems and effective countermeasures
- along the lines of the Rating server can be established by visionaries
- and tinkerers, but in any case, for the sake of humanity's integrity,
- sanity, and well-being, I pray that Future Cyberspace is far less
- Anarchic than the Current Internet.
-
- ------------------------------
-
- Date: 24 Nov 93 15:32:40 EST
- From: Urnst Kouch - Crypt Newsletter <70743.1711@COMPUSERVE.COM>
- Subject: File 2--PC Security books reprints material from AIS (Review)
-
- "NETWORK SECURITY SECRETS" BENEFITS FROM PUBLIC ACCESS INFORMATION ON
- THE DEPARTMENT OF TREASURY'S 'UNDERGROUND' SECURITY BULLETIN BOARD
- SYSTEM
-
- "Network Security Secrets," by David Stang, Ph.D., and Sylvia Moon,
- (IDG Books, $49.95) is the first mainstream publication which benefits
- directly from the accumulated data on Kim Clancy's Dept. of Treasury
- bulletin board system (AIS), gagged earlier this year.
-
- board supervised by the Department of Treasury contained unadulterated
- hacker files which were given to callers interested in the material.
- Other computer security workers and anti-virus developers mounted a
- smear campaign which landed in the pages of The Washington Post,
- causing the system to withdraw the information. The original argument
- had been that it was information which would most benefit security
- managers unable to find the material elsewhere. The publication of
- "Network Security Secrets," proves the argument a valid one, although
- it tries hard to deny it.
-
- In keeping with the political correctness of the times (read
- _hypocrisy_), the book fails to directly cite the material gathered
- from the Dept. of Treasury system while reprinting portions of it
- essentially verbatim.
-
- Of course, this makes "Network Security Secrets" a very interesting
- read.
-
- One of Stang's central points in "Security Secrets" is that good
- security stems from bringing necessary information to the workers
- employed where the rubber meets the road. This practice, he writes,
- is often opposed to management interested only in imposing a rigid
- heirarchical structure on the workplace. The workers who will have to
- deal with security problems such as intrusion from desk-top dial-ups,
- password and access control plus the occasional virus aren't thought
- to be trustworthy enough to be brought into the information loop.
-
- "Network Security Secrets" says this is bad and it's correct.
-
- Consequently, where does quality information come from; where is it
- gathered?
-
- In the chapter "Bulletin Boards and Security" under "Looking at the
- Dark Side," Stang published a screen display taken from the Department
- of Treasury, of which he says, "We doubt the agency was aware of this
- part of its board," which presumes quite a bit, incorrectly, I might
- add.
-
- In any case, "This part of the board" lists the hacking files culled
- from PHRACK and other underground journals and BBS's. The data
- addresses viruses, telephonic and network security concerns. "Manly
- Hacking" is one such entry. Written by "Shit-Kicking Jim," it was
- only found on Clancy's system prior to publication in a later issue of
- PHRACK.
-
- "Network Security Secrets" also reprints an underground document
- gained from AIS called "Hacking Novell Local Area Networks" and marks
- it with one of those happy little icons computer books are seeded with
- to satisfy readers whose reading comprehension is deemed not much
- beyond "First Grade Coloring Book Exercises."
-
- The icon is a treasure chest marked "Secret: This icon points to
- information which gives some special insight into network security."
-
- The book also republishes material on network hacking programs
- NETCRACK and GETIT, a resident password and keystroke leech, all
- gained from AIS.
-
- So that answers the question: Yes, information written by the computer
- underground is valuable, worthy of exposure in a $50 mainstream
- computer volume.
-
- By the same token, Stang writes, "This is a sensitive subject, and
- some may argue the information may land into the wrong hands. We'll
- argue that it's already in the wrong hands and the 'good guys' need to
- know what they're up against." And that's the same argument Treasury
- used to defend AIS, a system Stang labels from "the Dark Side." What a
- poor sport!
-
- Stang and Moon wrestle on and off with the idea of information access
- throughout the book, coming down more in favor of those who weirdly
- think that by publishing such information, you somehow endorse it.
-
- They mention book publishers who specialize in so-called fringe
- subjects as lock-picking and personal revenge. "No, we won't give you
- their address!" they write.
-
- In the same paragraph "Network Security" mentions "Make 'Em Pay," one
- paperback devoted to practical jokes and payback techniques.
- Published by Lyle Stuart, I found "Make 'Em Pay" in the humor section
- of Crown Books, the largest generic bookstore chain in California. So
- much for the stone reality of access control, a reality which
- corporate management appears to work hard to ignore.
-
- Despite these major idiosyncracies, "Network Security Secrets" is
- still a better than average book on the subject. Stang works hard to
- avoid jargon, failing only when he hands off to someone else in a
- chapter on encryption: ". . . the DES was promulgated by NIST to
- provide a system that protects the confidentiality and integrity of
- the federal government's sensitive unclassified computer information.
- FIPS PUB 46 is based on work at IBM and has been approved as the
- American National Standard X3.92-1981/R1987." Sadly, it appears there
- will never be a shortage of computer writers who specialize in
- jargo-hackese.
-
- "Network Security Secrets" also sports a slight, dry sense of humor.
- On bulletin boards, Stang writes "Does the software include the use of
- a SYSOP-editable trashcan file of caller names that are immediately
- ejected ('hacker,' 'crap,' 'John Dvorak," and so on)?" I had to laugh
- at that one.
-
- At $50, even with two diskettes, "Network Security" isn't cheap. But
- it does give you your money's worth as a reasonably detailed overview
- of PC network security.
-
- [Addendum: Stang, who represents Norman Data Defense Systems, was the
- man the Secret Service called when its networks were contaminated with
- the Satan Bug virus.]
-
- ------------------------------
-
- Date: Wed, 1 Dec 1993 09:47:07 -0600 (CST)
- From: Charles Stanford <cstanfor@BIGCAT.MISSOURI.EDU>
- Subject: File 3--Apple Computers bitten by Conservatives
-
- ((MODERATORS' NOTE: The following was also reported on PBS' All
- Things Considered)).
-
- +--------- Forwarded message ----------
- Date--Wed, 1 Dec 1993 08:06:04 -0600
- From--"G. D. Mitchell" <mitchell@SEAS.SMU.EDU>
-
- As a side note, Apple was originally considering building a plant in
- Texas, just north of Austin (the state capital). However, the county
- in which the plant was to be built decided not to extend the usual tax
- break to Apple because of their policy of extending benefits to
- non-married partners of Apple employees, both hetero- and homosexual.
-
- I heard county officials stating that the communities involved were
- less concerned about the possible jobs they would lose, and more
- concerned with "family values". I think this is taking place in
- Williamson County, fyi. There's so many damn counties in Texas that I
- probably don't know more than a fourth of them :) so I may be wrong.
-
- I was a little pissed about this when I heard the news yesterday.
- Apple was going to bring 700 jobs to Texas, but these rednecks were
- too afraid that having a few gay couples in the neighborhood might
- make little Johnny queer. It's stupid socially and economically. And
- to think, there are times when I can almost forget that Texas IS a
- backwards state.
-
- Anyone ready to start that Nation of Freaks I was raving about a year
- ago? :)
-
- ------------------------------
-
- Date: Fri, 3 Dec 1993 17:09:20 -0600
- From: Jerry Whelan <guru@STASI.BRADLEY.EDU>
- Subject: File 4--GAO Report on Computers and Privacy
-
- ((MODERATORS' NOTE: Thanks to Jerry Whelan for forwarding over teh GAO
- report on "Communications Privacy." Here, we reprint the introduction.
- The entire document can be retrieved from the CuD ftp sites or the ftp
- sites listed below)).
-
- To--rsaref-users@RSA.COM
- Acknowledge-To-- KH3@NIHCU.BITNET
-
- GAO recently issued a report "Communications Privacy: Federal Policy
- and Actions", GAO/OSI-94-2, dated November 4, 1993, that may be of
- interest to members of your group. The report focused on the
- following issues:
-
- --The need for information privacy in computer and communications
- systems--through such means as encryption, or conversion of
- clear text to an unreadable form--to mitigate the threat of
- economic espionage to U.S. industry;
-
- --federal agency authority to develop cryptographic standards for
- the protection of sensitive, unclassified information and the
- actions and policies of the National Security Agency (NSA),
- Department of Defense, and of the National Institute of
- Standards and Technology (NI ST), Department of Commerce,
- regarding the selection of federal cryptographic standards;
-
- --roles, actions, and policies of NSA and the Department of State
- related to export controls for products with encryption
- capabilities and industry rationale for requesting
- liberalization of such controls; and
-
- --the Federal Bureau of Investigation's (FBI) legislative proposal
- regarding telephone systems that use digital communications
- technology.
-
- I have placed an electronic version of the report named OSI-94-2.TXT
- in the GAO-REPORTS anonymous FTP directory at NIH (ftp.cu.nih.gov).
-
- Joe Sokalski, GAO--Los Angeles
- kh3@cu.nih.gov
-
- ------------------------------
-
- Date: Wed, 1 Dec 1993 14:54:51 EST
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 5--New Docs Reveal NSA Role in FBI Digital Tele Proposal
-
- New Docs Reveal NSA Involvement in Digital Telephony Proposal
- From the CPSR Alert 2.06 (Dec. 1, 1993)
-
- A series of memoranda received by CPSR from the Department of Commerce
- last week indicate that the National Security Agency was actively
- involved in the 1992 FBI Digital Telephony Proposal. Two weeks ago,
- documents received by CPSR indicated that the FBI proposal, code named
- "Operation Root Canal," was pushed forward even after reports from the
- field found no cases where electronic surveillance was hampered by new
- technologies. The documents also revealed that the Digital Signature
- Standard was viewed by the FBI as "[t]he first step in our plan to
- deal with the encryption issue."
-
- The earliest memo is dated July 5, 1991, just a few weeks after the
- Senate withdrew a Sense of Congress provision from S-266, the Omnibus
- Crime Bill of 1991, that encouraged service and equipment providers to
- ensure that their equipment would "permit the government to obtain the
- plain text contents of voice, data and other communications...." The
- documents consist of a series of fax transmittal sheets and memos from
- the Office of Legal Counsel in the Department of Commerce to the
- National Security Agency. Many attachments and drafts, including more
- detailed descriptions of the NSA's proposals, were withheld or
- released with substantial deletions.
-
- Also included in the documents is a previously released public
- statement by the National Telecommunications and Information
- Administration entitled "Technological Competitiveness and Policy
- Concerns." The document was requested by Rep. Jack Brooks and states
- that the proposal could obstruct or distort telecommunications
- technology development by limiting fiber optic transmission, ISDN,
- digital cellular services and other technologies until they are
- modified, ... could impair the security of business communications ...
- that could facilitate not only lawful government interception, but
- unlawful interception by others, [and] could impose industries ability
- to offer new services and technologies.
-
- CPSR is planning to appeal the Commerce Department's decision to
- withhold many of the documents.
-
- To subscribe to the Alert, send the message:
-
- "subscribe cpsr <your name>" (without quotes or brackets) to
- listserv@gwuvm.gwu.edu. Back issues of the Alert are available at the
- CPSR Internet Library FTP/WAIS/Gopher cpsr.org /cpsr/alert
-
- Computer Professionals for Social Responsibility is a national,
- non-partisan, public-interest organization dedicated to understanding
- and directing the impact of computers on society. Founded in 1981,
- CPSR has 2000 members from all over the world and 22 chapters across
- the country. Our National Advisory Board includes a Nobel laureate and
- three winners of the Turing Award, the highest honor in computer
- science. Membership is open to everyone.
-
- For more information, please contact: cpsr@cpsr.org or visit the CPSR
- discussion conferences on The Well (well.sf.ca.us) or Mindvox
- (phantom.com).
-
- ------------------------------
-
- Date: Sat, 4 Dec 1993 18:32:54 CST
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 6--REMINDER: CFP '94 SCHOLARSHIP DEADLINE APPROACHING
-
- ((MODERATORS' NOTE: The DEADLINE for applications for scholarships to
- the Computer Freedom and Privacy '94 Conference at the Palmer House in
- Chicago is 31 December. DO NOT WAIT UNTIL THE LAST MINUTE. We are
- reprinting the earlier announcement for those who may have missed it
- last month.
-
- For applicants who do not ultimately receive scholarships, the
- conference organizers are attempting to find inexpensive lodging
- within walking distance to the Palmer House, which is located in the
- center of The Loop)).
-
- The Conference on Computers, Freedom & Privacy (CFP'94) is
- pleased to announce that it will once again provide a number of
- full tuition scholarships for attendance at the conference. The
- conference will be held in Chicago, IL from March 23rd through
- March 26th, 1994 and will be hosted by the John Marshall Law
- School under the chairmanship of George Trubow.
-
- The conference traditionally attracts an extremely diverse group
- of persons concerned with issues relating to the rapid
- development of the "information society"; civil libertarians,
- information providers, law enforcement personnel, privacy
- advocates, "hackers", sociologists, educators and students,
- computer professionals, cryptography advocates, government policy
- makers and other interested parties have all played major roles
- in the three previous conference.
-
- Speakers at previous conferences have included Electronic
- Frontier Foundation (EFF) co-founders John Perry Barlow and Mitch
- Kapor, FBI Deputy Director William A. "Al" Bayse, writer Bruce
- Sterling, privacy advocate Simon Davies, Harvard University law
- professor Lawrence Tribe, hacker "Phiber Optik", Georgetown
- University's Dorothy Denning, "Cuckoo's Egg" author Clifford
- Stoll, Prodigy counsel George Perry, USA Today founder Al
- Neuwith, former FCC Chairman Nicholas Johnson, Computer
- Professionals for Social Responsibility (CPSR)'s Marc Rotenberg,
- Arizona prosecutor Gail Thackeray, and Bay Area Women in
- Computing's Judi Clark.
-
- The scholarships are intended to provide access to the conference
- to those that would like to attend the conference but are unable
- to afford the tuition. They are available to undergraduate and
- graduate students in any discipline (previous student attendees
- have come from computer science, law, sociology, liberal arts,
- journalism, and womens' studies backgrounds), law enforcement
- personnel, hackers, social scientists, and others interested in
- the future of the information society.
-
- Persons interested in a scholarship should send the following
- information (e-mail greatly preferred) to:
-
- John F. McMullen
- CFP'94 Scholarship Chair
- Perry Street
- Jefferson Valley, NY 10535
-
- mcmullen@panix.com
- (914) 245-2734 (voice)
- (914) 245-8464 (fax)
-
- 1. Personal Information -- Name, Addresses (including e-mail),
- Phone Numbers, School and/or Business Affiliation
-
- 2. Short Statement explaining what the applicant helps to get
- from CFP'94 and what impact that attendance may have in the
- applicant's community or future work.
-
- 3. Stipulation that the applicant understands that he/she is
- responsible for transportation and lodging expenses related to
- the conference. The scholarship includes tuition and those meals
- included with the conference.
-
- 4. Stipulation that the applicant would not be able to attend the
- conference if a scholarship is not granted.
-
- 5. Stipulation that the applicant, if granted a scholarship, will
- attend the conference.
-
- 6. Stipulation that the applicant, if granted a scholarship, will
- provide a written critique of the conference to the scholarship
- committee by April 30, 1994.
-
- Applications will be accepted until December 31, 1993 and
- scholarship winners will be notified by approximately February 1,
- 1994.
-
- Please contact John McMullen at the above e-mail address or phone
- numbers with any questions.
-
- John F. McMullen mcmullen@mindvox.phantom.com Consultant,
- knxd@maristb.bitnet mcmullen@well.sf.ca.us Writer,
-
- ------------------------------
-
- Date: Thu, 2 Dec 1993 17:49:50 EDT
- From: Paul Hyland <PHYLAND@GWUVM.BITNET>
- Subject: File 7--DIAC-94 Call for Participation
-
- Please post and distribute to interested colleagues.
-
- Call for Workshop Proposals
-
- Developing an Effective and Equitable Information Infrastructure
-
- Directions and Implications of Advanced Computing (DIAC-94) Symposium
- Cambridge, MA, USA
- April 23 - 24, 1994
-
- The National Information Infrastructure (NII) is being proposed as the
- next-generation "information superhighway" for the 90's and beyond.
- Academia, libraries, government agencies, as well as media and
- telecommunication companies are involved in the current development.
- Computer Professionals for Social Responsibility (CPSR) and other
- organizations believe that critical issues regarding the use of the
- NII deserve increased public visibility and participation and is using
- the DIAC Symposium to help address this concern.
-
- The DIAC-94 symposium is a two-day symposium and will consist of
- presentations on the first day and workshops on the second day. The
- DIAC Symposia are held biannually and DIAC-94 will be CPSR's fifth
- such conference. We encourage your participation both through
- attending and through conducting a workshop. We are currently
- soliciting workshop proposals. We suggest proposals on the following
- themes but any topic relating to the symposium theme is welcome.
-
- Systems and Services Policy
- + Community networks + Funding
- + Information services + Role of government
- + Delivery of social services + Economic modelling of networks
- + Privacy (including medical) + Commercialization of the NII
- + Educational support + Universal access
- + Meeting diverse needs + Freedom of expression and
- community standards
-
- Electronic Democracy Directions and Implications
- + Access to information + Ubiquitous computing
- + Electronic town meetings + Global hypertext and multimedia
- + Threats to democracy + Computing in the workplace
- + Economic and class disparities + Computing and the environment
-
- International Issues Traditional and Virtual Communities
- + Language differences + MUDs
- + Cultural diversity + Communication ethics, values, and styles
- + National and international + Gender relations in cyberspace
- priorities
- + Cooperative projects + Networking for indigenous peoples
-
- Workshops will be an hour and half in length. The proposal should
- include title, presenter, purpose of workshop, references, and plan.
- Workshops should substantially involve the audience and proposals in
- which some group product or action plan is created are preferred. As
- the proposals may be collected into a book, workshop proposals should
- be clear and informative to people who don't participate in the
- workshop. Proposals are due February 15, 1994 and acceptance and
- rejection notices will be sent by March 15, 1994. To discuss
- workshops or to submit proposals for workshops contact the program
- chair, Doug Schuler, doug.schuler@cpsr.org. Electronic submissions
- are encouraged but paper versions are also acceptable (send them to
- CPSR/Seattle - - - - DIAC '94 Workshop Submission, P.O. Box 85481,
- Seattle, WA 98145-1481).
-
- Sponsored by Computer Professionals for Social Responsbility
-
- Potential co-sponsors are being sought. Please contact us if your
- organization would like to help with this event. For more information
- on co-sponsorship or on general issues, contact conference chair,
- Coralee Whitcomb, cwhitcomb@bentley.edu.
-
- ------------------------------
-
- End of Computer Underground Digest #5.91
- ************************************
-