home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Nov 30, 1994 Volume 6 : Issue 101
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Fruit-loop editor: Carnegie Melon
-
- CONTENTS, #6.101 (Wed, Nov 30, 1994)
-
- File 1--Holocaust revisionism goes up in flame wars
- File 2--Addition to alt.revisionism story
- File 3--USSC Rules "Defendants must Know" in Child Porn Cases
- File 4--Law, Science and Society Conference
- File 5--CPSR Discounted Membership
- File 6--CU in the News
- File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)
- File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Mon, 14 Nov 1994 00:01:47 -0500
- From: eye@INTERLOG.COM(eye WEEKLY)
- Subject: File 1--Holocaust revisionism goes up in flame wars
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY November 10 1994
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- EYE.NET EYE.NET
-
- .SIG HEIL
- Holocaust revisionism goes up in flame wars
-
- by
- K.K. CAMPBELL
-
-
- It was 56 years ago today that Germans awoke to find the Nazis had
- spent the night terrorizing Jews and destroying property in something
- called "Crystal Night." It was a test-run pogrom for the Holocaust to
- follow.
-
- Once upon a time, net.news (the Internet's public discussion forums)
- was swamped with flame wars about the Holocaust. They'd be found
- anywhere -- in newsgroups like alt.conspiracy, soc.history,
- soc.culture.canada, misc.headlines, alt.individualism etc.
-
- One of the most persistent Nazi-apologists, Dan Gannon
- (dgannon@banished.com), wildly spammed Holocaust-denying material,
- either not understanding or not caring about netiquette -- that is, you
- post appropriate material to appropriate groups. Thousands, from dozens
- of newsgroups, complained. Gannon's posts were bad enough, but they
- always brought rebuttal and endlessly repeated arguments.
-
- Today, most of these debates are found in one newsgroup:
- alt.revisionism -- dedicated to discussing "Holocaust revisionism," the
- claim that the Nazi extermination of Jews and other distinct peoples is
- a "hoax" exacted upon millions of unwary non-Jews.
-
- Anti-racist and anti-fascist online activists continue to track Gannon
- and his pals around the 9,000-odd newsgroups. One such hunter is
- Canada's Ken McVay (kmcvay@oneb.almanac.bc.ca). McVay, 53, came to
- Canada in 1967 from the U.S. and is now a Canadian citizen (holds dual
- citizenship). He's Canada's foremost online anti-revisionist warrior.
-
- I've been reading his stuff for years.
-
- TRUE COLORS
-
- "When I first got started on this, everyone was sort of out there on
- their own," McVay told eye in a phone interview from his Vancouver
- Island home. "Almost by accident, working groups started coordinating
- their efforts." McVay works closely with Danny Keren (dzk@cs.brown.edu)
- and Jamie McCarthy (k044477@hobbes.kzoo.edu), among others.
-
- The goal is not censorship. "I am absolutely, unequivocally opposed to
- any kind of censorship," McVay says.
-
- This is a real shift in McVay's thinking. I vividly recall reading
- McVay his posts from about two years ago, where he'd vehemently defend
- Canadian anti-hate speech laws.
-
- "I don't anymore. I think it's the biggest possible mistake." What
- changed his mind? "Dealing with these guys on a daily basis for over
- two years. Seeing how easy it is to shoot them down. And it is. The
- most intellectual among them are stupid and completely inept when it
- comes to historical research. And, of course, they are liars. That
- being the case, why on Earth would anyone want to shut them up or force
- them underground? I want to know who I'm dealing with. I want to know
- where they are. And I want to know how their minds work."
-
- To see their true colors, McVay and compatriots badger and prod
- revisionists until they drop the scholarly pretense by, say, calling
- McVay a "Jew-lover" or complaining Hitler unfortunately missed the
- parents of some Jewish netter. It happens regularly.
-
- "These online discussions are not aimed at getting Gannon and his pals
- to change their minds," McVay says. "That ain't gonna happen. It's to
- reach the rest - - such as the new users that pop up every September in
- universities and stumble on this stuff. Many don't know how Nazis
- operate. Most racists don't go around with a little patch on their
- shoulder proclaiming: `I hate Jews, or blacks, or natives.' But it's
- there. We work to bring it out in the open."
-
- A.R. AS TESTING GROUND
-
- McVay and company are working on putting together a book, a primer on
- Holocaust-denial techniques. (He hasn't approached a publisher yet.)
- You often see the results of this ongoing research in alt.revisionism .
- McVay chuckles about having rabid anti-Semites ever at hand to help
- write it.
-
- "We throw out a chapter when we think it's done, content-wise. If the
- revisionists ignore it completely, then we know it's finished. If they
- respond, we say, `Ah! We missed that trick, calling a maple tree a
- Porsche.' So we add that argument in." A month later, they upload the
- chapter again.
-
- McVay says the "classic" revisionist tactic is misrepresentation of
- text. Outright lies.
-
- "They'll cite a historical text: `K.K. Campbell says on page 82 of his
- famous book that nobody died at Auschwitz.' Then you go to the Library
- of Congress and look up K.K. Campbell, page 82, and what you find he
- really said was, `It was a nice day at Dachau.' They get away with this
- because they know goddamn well most people don't have time to rush off
- to the Library of Congress. But people read that and say to themselves,
- `Who would lie about such a thing when it's so easy to prove them
- wrong? They must be telling the truth.' "
-
- The years of refutation have resulted in anti-revisionists transcribing
- mass amounts of death camp evidence and testimony into computer text
- files. McVay saved them. Soon netters requested the material. It began
- to take up so much time, he automated the process. You send an email
- request, the computer sends you back the file(s).
-
- The archive is now maybe 60 megs and may swell to over a gig in 1995.
- Write email to ADDRESS TK with the message GET HOLOCAUST/INDEX --
- you'll be sent a huge index of Holocaust files (other files, too, on
- fascist racist-right groups). If you like the convenience of gopher,
- check out jerusalem1.datasrv.co.il .
-
- Revisionists often assert McVay secretly gets operating funds from
- Jews.
-
- "I don't," McVay says. "The hard-drives are spread out on a table with
- a Canadian Tire fan blowing right at them. I can't afford to replace
- things, if it breaks, it's gone. However, I'm upfront -- if I get
- support money, I'll take it, Jewish or not. The fact that a Jewish
- organization would offer several grand to help wouldn't change the
- value of the historical data." He'd like to put it all on CD-ROM.
-
- "The Internet has to be a revisionist's worst communications
- nightmare," McVay says. "They can't ignore it, because, as you and I
- know, in 10-15 years everyone in North America is going to read stuff
- through the Internet.
-
- "And that's the beauty of the Internet: once it's refuted in an honest
- and academic fashion, you can't run away from it," McVay says.
-
- When the latest revisionist recruit charges in with the same old
- pamphlets, it's almost effortless for anyone to request a file and
- reply: "We covered this two years ago. Here is the massive refutation
- of that so-called scholarly report."
-
- It's there. For everyone. Forever.
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Retransmit freely in cyberspace Author holds standard copyright
- Full issues of eye in archive gopher://interlog.com
- Coupla Mailing lists available http://www.interlog.com/eye
- eye@interlog.com "Break the Gutenberg Lock..." 416-971-8421
-
- ------------------------------
-
- From: eye@INTERLOG.COM(eye WEEKLY)
- Subject: File 2--Addition to alt.revisionism story
- Date: Sun, 20 Nov 1994 00:10:25 -0500
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY November 17 1994
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- EYE.NET EYE.NET
-
- RANKING THE ALT.REVISIONISTS
-
- by
- K.K. CAMPBELL
-
-
- Last week, eye Net focused on Ken McVay, battle-hardened
- anti-revisionist warrior against net.Nazis and holocaust deniers alike
- who cruise the net.
-
- McVay and cohorts endeavor to demonstrate that under every single
- Holocaust denier you find an anti-Semite/racist/fascist -- no matter
- how "scholarly" a front may be presented.
-
- Newsgroup alt.revisionism has housed a changing cast of Holocaust
- deniers over the years. To help guide the newcomer through the raging
- flame wars, eye presents the current crew rated for denial motivations
- and cyberspace posting style.
-
- eye surveyed two dozen contributors who wage war with Holocaust deniers
- on a regular or semi-regular basis. While some polled were inclined to
- just give all revisionists 1 in smarts, it was understood this wouldn't
- be very useful to newcomers. More importantly, if all rated 1, then
- it's impossible to measure the intelligence of Tim McCarthy.
-
- This chart will be posted permanently in eye's online Web site --
- http://www.interlog.com/eye/Misc/Alt.revisionism/Rev.html . The chart
- can be updated, ratings recalculated, as new net.nazis and kin wander
- in. Useful tool for a.r newcomers.
-
- (McVay suggests eye add a new category -- the BSI or Berg Spittle
- Index. Using Friedrich Berg as a perfect 10 in spluttering vitriol, he
- says Gannon would come in at 9.9 and Hoffman at 7.5. These are, of
- course, but the most preliminary of ratings...)
-
- TOP TEN NET.HOLOCAUST-DENIERS
-
- | A | B | C | D || E | F | G | H |
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Friedrich Berg | 7 | 9 | 9 | 9 || 5 | 7 | 3 | 5 |
- (bergf@iia.org)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Dan Gannon | 7 | 8 | 7 | 9 || 2 | 4 | 4 | 3 |
- (dgannon@banished.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Michael A Hoffman | 7 | 8 | 8 | 8 || 4 | 4 | 4 | 3 |
- (hoffman2nd@delphi.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Milton Kleim | 9 | 9 |10a| 9 || 4 | 7 | 3 | 2 |
- (hermann@tigger.stcloud.msus.edu)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Tim McCarthy | 9 | 9 | 8 |10 || 1b| 3 | 1 | 1 |
- (landpost@clark.net)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- ? | 7 | 8 | 8 | 9 || 2 | 3 | 2 | 1 |
- (murungu@delphi.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Greg Raven | 4 | 5 | 5 | 5 || 5 | 8 | 8 | 4 |
- (greg.ihr@kaiwan.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Rick Savage | 9 |10 | 8 | 9 || 2 | 2 | 2 | 1 |
- (rsavage@netcom.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Bradley R. Smith | 5 | 5 | 5 | 5 || 6 | 7 | 7 | 4 |
- (bradleyrs@aol.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Ross Vicksell | 3 | 4 | 5 | 5 || 6 | 7 | 8 | 3 |
- (codfish@netcom.com)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Ratings are from 1-10 --10 high. (All rounded to nearest whole number.)
-
- MOTIVATIONAL TRAITS
-
- A = RACISM (10 = Christian Identity; 1 = indifferent)
- B = ANTI-SEMITISM (10 = pure visceral hate; 1 = dispassionate)
- C = FASCISM/NAZISM (10 = Sieg Heil; 1 = politically clueless)
- D = CONSPIRACISM (10 = "I have PROOF Jew-controlled Robot
- Icebergs sank the Titanic!!!!!!"; 1 = ya right, like any of them
- are 1s)
-
- PERSONAL TRAITS
-
- E = INTELLIGENCE (10 = snort, as if; 1 = "Bend over?! Jawohl, Mein
- Fuhrer!!!")
- F = COMPOSITION (10 = properly formatted paragraphs; 1 = forget
- computers, yet to master holding pencil)
- G = CIVILITY (10 = courteous; 1 = "FUKKK YOUU JOOOO!!!!111")
- H = ACADEMIC RESOURCES (10 = constant citations; 1 = "My dad told
- me that ...")
-
- NOTES
-
- a = Kleim rated 10 from all respondents; only one to achieve a perfect
- score in any category.
-
- b = McCarthy only person to receive several ZERO ratings for
- intelligence; these registered as 1 in computation.
-
- KILL (FILE) THE NAZIS
-
- Deborah Lipstadt argues in her recent book Denying The Holocaust
- (Penguin, $13.99, paper) that anti-revisionists should not just yell,
- but should refute revisionists --and then ridicule will issue forth
- from that. This is particularly relevant to cyberspace, which has no
- "central office."
-
- Netters who simply don't wanna see net.Nazi shit can use the all-
- important kill files. You'll find a copy of the Kill File FAQ
- (Frequently Asked Questions) in eye archives to help explain to you how
- to use them. (Use gopher or Web and look in eye's Miscellaneous
- directory.)
-
- A kill file "tells" your news reader (the software that organizes all
- those net.news/Usenet posts) to filter out specific articles. You can
- kill all posts coming from a particular person, or a particular site,
- or on a particular subject.
-
- To help you ascertain which net.personalities are common kill file
- bait, eye introduces its series of KILL FILE TRADING CARDS! Instant
- collector's item! Trade with friends! Collect the set!
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Retransmit freely in cyberspace Author holds standard copyright
- Issues of eye in archive gopher://interlog.com
- Coupla Mailing lists available http://www.interlog.com/eye
- eye@interlog.com "Break the Gutenberg Lock..." 416-971-8421
-
-
- ------------------------------
-
- Date: Wed, 30 Nov 1994 18:22:43 PST
- From: Anonymous <cudigest@mindvox.phantom.com>
- Subject: File 3--USSC Rules "Defendants must Know" in Child Porn Cases
-
- ((MODERATORS' Note: The following USSC decision should make sysops
- breathe a bit easier, because it requires that prosecutors show that
- defendants in "child pornography" cases know that the subjects are
- minors)).
-
- Source: Chicago Tribune, Nov 30 1994 (p. 10)
-
- CHILD PORNOGRAPHY LAW UPHELD
- IN 7-2 RULING, SUPREME COURT EDITS INEXACT PHRASING
-
- The Supreme Court salvaged the federal law against child
- pornography Tuesday by editing it to make clear that the government
- must prove that a defendant knew that the performers in sexually
- explicit photographs or films were under the age of 18.
-
- Congress almost certainly intended to include a knowledge
- requirement even though "the most natural grammatical reading" of the
- densely written law does not find one, Chief Justice William
- Rehnquist said in a 7-2 decision. The chief justice said that when
- Congress wrote the law in 1977 and amended it in 1984, it was aware of
- ((The story notes that USSC precedents have held that
- obscenity laws are unconstitutional unless they require
- proof that defendants know the nature of the material.
- Justice Scalia, joined by Justice Thomas, dissented)).
-
- The decision overturned a 1992 ruling by a federal appeals court in
- San Francisco, which had declared the law, the Protection of Children
- Against Sexual Exploitation Act, unconstitutional on its face because
- it omitted a knowledge requirement.
-
- The statute's linguistic problem is the placement of the word
- "knowingly." The law provides that anyone who "knowingly transports or
- ships" or who "knowingly receives or distributes" visual depictions of
- a minor engaged in sexually explicit conduct has committed a federal
- crime.
-
- Taken literally, the law requires only that the transporting,
- shipping, receiving or distributing be intentional, without reference
- to the sexually explicit contents or to the age of the performers.
-
- ((Rehnquist noted that a literal interpretation of the law
- would produce off, even absurd results)):
-
- Among the examples he gave of innocent violators of the law's
- literal meaning was "a retail druggist who returns an uninspected roll
- of developed film to a customer" and who thereby "knowingly
- distributes" a "visual depiction" that might turn out to show children
- engaged in sexually explicit conduct.
-
- ------------------------------
-
- Date: Wed, 30 Nov 1994 12:26:44 -0600
- From: Stephen Smith <libertas@COMP.UARK.EDU>
- Subject: File 4--Law, Science and Society Conference
-
- LAW, SCIENCE AND SOCIETY
-
- the 11th annual higher education conference
- sponsored by the
- American Bar Associaton
- Commission on College and University Legal Studies
-
-
- WHERE: Detroit, Michigan
- [at The Atheneum Suite Hotel, a new hotel located in the
- revitalized Greektown area of Detroit, near Renaissance
- Center]
-
- WHEN: April 28-30, 1995 (Friday - Sunday)
-
- THEMES: The conference will explore a variety of relationships
- between law and science, including law's contribution to
- medical and ethical debates (e.g., reproduction, death and
- dying, genetics), the role of scientific and forensic
- evidence in the courtroom, environmental regulation, law
- and psychiatry, and the impact of technology on legal
- concepts and ideas of justice. Workshops will provide an
- opportunity to discuss curriculum, teaching, and learning
- within the context of law/science perspectives.
-
- WHO: This is an invitational conference. We seek a diverse
- group of about 75 faculty and other educators from the
- social sciences, humanities, and professional fields --
- e.g., philosophy, sociology, history, political science,
- psychology, mental health, criminal justice, law, medicine,
- nursing and the health sciences, etc.
-
- COSTS: The ABA will pay for two nights of lodging at the Hotel for
- 40 invitees. As many as 30 additional applicants will be
- invited without a lodging subsidy. Preference for
- subsidies will be given to faculty whose interests bear
- most directly upon conference themes and who have not
- previously been subsidized at a Commission conference. A
- $75 registration fee ($40 for commuters) includes a
- complete set of conference materials, receptions, and group
- meals.
-
- TO APPLY: College and university faculty, deans, and organization-
- based educators wishing to apply should send a c.v. and a
- cover letter describing their interests by January 31, 1995
- to: John Ryan, ABA Commission on College & University Legal
- Studies, 541 N. Fairbanks Ct., Chicago, IL 60611-3314;
- fax: 312/988-5032; or email: abaculs@attmail.com
-
-
- Please direct any questions or applications to this conference to the
- abaculs@attmail.com address, not the mailing list. Thanks.
-
-
- Anthony Star
- American Bar Asssociation, Commission on College and University Legal Studies
- 541 N. Fairbanks Court, Chicago, IL 60611-3314; 312/988-5736
- abaculs@attmail.com (work); astar@netcom.com (home)
-
- ------------------------------
-
- Date: Thu, 10 Nov 1994 13:40:47 -0800
- From: email list server <listserv@SUNNYSIDE.COM>
- Subject: File 5--CPSR Discounted Membership
-
- ------------------------------------------------------
- Second in a series of clever come-ons to entice you to join CPSR
- ------------------------------------------------------
- Take advantage of this SPECIAL OFFER. Join before Janurary 1st.
- ------------------------------------------------------
- Approved for distribution by The Cyberian Winds... Feel free!
- ------------------------------------------------------
-
-
- COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
-
- ELIGIBILITY TEST
-
-
- As you know, CPSR is an organization that is dedicated to understanding
- and influencing the implications of computer technology. We have
- devised a short test below (estimated time to complete: 19.3 seconds) to
- help you determine (in the privacy of your own home) whether you have
- what it takes to join this effort.
-
- If you choose the *correct* answer for all four true / false statements
- below, then you are eligible to join CPSR! It's that EASY!
-
-
-
- Simply answer T (for True) or False (for False) for each
- statement below.
-
- 1. It is important for citizens to become involved in the development
- of the "Information Superhighway" to ensure that it addresses
- educational and other critical needs.
-
- 2. Privacy considerations might be overlooked in the next-generation
- computing systems if organizations like CPSR aren't especially
- vigilant.
-
- 3. I am concerned that the "Information Superhighway" might become an
- "Information Supertollway" - a shopping mall rather than a public
- commons. I'm concerned about first amendment rights in cyberspace!
-
- 4. I would like to help support Computer Professionals for Social
- Responsibility and help support the development of democratic
- and responsible technology.
-
-
- [If you answered T to all four questions, you are eligible to join CPSR!]
-
-
- CPSR Isn't Just for Computer Scientists!
-
- CPSR was started in 1981 by computer scientists and, to this day, has
- many computer scientists within its ranks. At that time, CPSR's
- mission - that of informing the people as to the risks of using
- computers in automated nuclear weapons systems - was quite complex.
- Times have changed considerably since 1981. Computers are much more
- prevalent. Also as computing technology becomes more an integral part
- of modern life, the voice of the computer scientist - although
- important - becomes one voice among many others that needs to enter
- into the discussion on the future of computing technology.
-
- While computers offer great opportunities for enhanced communication
- with community and civic networks, they also offer grave threats.
- Computers allow privacy violations to occur virtually unchecked
- as transfer of personal information can occur almost instantaneously.
- Prospects of the Clipper Chip, National ID cards, and unchecked
- collecting and sharing of millions of K-12 records are looming
- omininously in the future unless we act now to prevent them.
-
- Today, in 1994, with computers playing vital roles in virtually all
- areas of society, it is important that educators, students, librarians,
- policy makers, engineers, social workers, activists, and business
- people, among many others with important viewpoints participate in
- these vital discussions. For that reason we are currently making a
- special effort to introduce all of these groups to CPSR.
-
-
- **********************************************************************
- *********** SPECIAL DISCOUNT ON FIRST TIME MEMBERSHIPS **************
- **********************************************************************
-
- To help people participate, We are lowering our membership fees by $10
- for both our regular and and our contributing membership categories
- (first time members only please) for the remainder of 1994! Take
- advantage of this special offer today and join the discussion!
-
- If your interest is the National Information Infrastructure, privacy,
- civil liberties, national identification cards, privacy of student
- records, community networking, computers in the workplace, or any
- number of important issues, please consider joining us.
-
-
- **********************************************************************
- ******************** CPSR Membership Form *************************
- **********************************************************************
-
- Here are my membership dues to help support Computer Professionals for
- Social Responsibility and bring the message of socially responsible
- computing to the profession, policymakers, and the public.
-
- Name ___________________________________________________________
-
- Address ___________________________________________________________
-
- ___________________________________________________________
-
- City/State/Zip _____________________________________________________
-
- Home phone _____________________ Work phone ______________________
-
- Company / Institution ________________________________________________
-
- Type of work ______________________________________________________
-
- E-mail address _____________________________________________________
-
- CPSR Chapter
- __ Acadiana __ Austin __ Berkeley
- __ Boston __ Chicago __ Denver/Boulder
- __ Los Angeles __ Loyola/New Orleans
- __ Madison __ Maine __ Milwaukee
- __ Minnesota __ New Haven __ New York
- __ Palo Alto __ Philadelphia __ Pittsburgh
- __ Portland __ San Diego __ Santa Cruz
- __ Seattle __ Washington, DC __ No chapter in my area
-
-
-
- CPSR Membership Categories
- [Note SPECIAL Discounts!]
-
- >From now until the end of 1994, CPSR is offering a $10.00 DISCOUNT
- on their Regular and Basic membership levels for new members.
-
- __ $ 20 Student/Low income membership
-
- Basic Membership
- WAS $50 Now just ==>> __$40 (for first time members)
-
- REGULAR MEMBERSHIP
- WAS $75 Now just ==>> __$65 (for first time members) (receive a mousepad)
-
- __ $200 Supporting membership (receive totebag)
- __ $500 Sponsoring membership (receive mousepad and totebag)
- __ $1000 Lifetime membership (receive book, totebag, and mousepad)
-
- __ Electronic Funds Transfer Membership $__ per month
-
- Please consider a donation to help expand the CPSR program.
-
- __ $50 __ $75 __ $100 __ $250 __ $500 __ $1000 __ Other
-
- Total Enclosed: $ ________
-
-
- Interests
-
- __ National Information Infrastructure
- __ Privacy & Civil Liberties __ Participatory Design
- __ Working in Industry __ Community Networks
- __ Social Action __ Weapons & Peace
- __ Intellectual Property __ Computer & Environment
- __ Education __ Workplace
- __ International __ K-12 Student Privacy
-
-
- Please make check out to CPSR.
-
- Mail form with check to: CPSR, P.O. Box 717, Palo Alto, CA 94302-9917
-
- We welcome comments that you have about the CPSR Program.
-
- Privacy Notice. The CPSR membership database is never sold, rented,
- loaned, exchanged, or put to use for anything other than official CPSR
- activity. CPSR may elect to send members mailings with information from
- other groups, but the mailings will always originate with CPSR.
-
- ************************************************************************
- **************** JOIN CPSR'S ELECTRONIC MAILING LIST **************
- ************************************************************************
-
- Placing yourself on CPSR's list server gives you access to a
- library of materials dealing with CPSR issues and CPSR
- documents. It is accessible via Internet and anyone can join.
- To subscribe, send email to:
-
- listserv@cpsr.org
-
- Your message needs to contain only one line:
- SUBSCRIBE CPSR-ANNOUNCE <your first name><your last name>
-
- You will get a return message that confirms your subscription.
- The message also explains how to use the list server to request
- materials and how to use the index of CPSR's archives.
-
- If you have a problem with the list server, please contact
- ftp-admin@cpsr.org
-
- CPSR also maintains a number of email lists that focus on
- various issues and projects. To find out what email lists are
- available and how to join them, send an email containing the
- message LIST to listserv@cpsr.org
-
- You can also request assistance by using the HELP command. If
- you have trouble contact ftp-admin@cpsr.org
-
- We hope you enjoy this new service.
-
-
- ------------------------------------------------------
- If you didn't answer correctly, please feel free to study the materials
- and try again. Good luck!
-
- ------------------------------
-
- Date: 30 Nov 94 15:44:29 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 6--CU in the News
-
- Online Libel Lawsuits
- =====================
- ComputerWorld reports that the flame wars of the electronic frontier
- have finally spilled over into the courts. Prodigy has been sued for
- $200 million over a message that called a stock offering a criminal
- fraud. There is speculation that Prodigy's zealous control of its
- message boards, especially in terms of obscenity and topic control,
- may result in the company being held to a standard higher than
- services who don't so tightly monitor user activity. The article also
- discusses Kodak's policy of not allowing employees to post on
- discussion groups when using a Kodak address.
- (ComputerWorld. Nov. 21, 1994 pg 1+)
-
- Sounding Off about Business Use of Internet
- ===========================================
- Two cogent and articulate writers "sound off" about the
- commercialization of the 'net in the Nov. 21, 1994 issue of
- ComputerWorld. One writer is a researcher/academic, the other a
- business consultant. Their arguments have been heard before, but
- having both side-by-side makes for a though-provoking piece.
- (ComputerWorld. Nov. 21, 1994. pg 116+)
-
- Cyberspace and The Law reviewed
- ===============================
- Datamation offers a short blurb about _Cyberspace and The Law: Your
- Rights and Duties in the Online World_. The reviewer found it to be a
- "well-written, well-organized primer meant for people who have more
- experience with he Internet then with the law." The book is by Edward
- Carvazos and Gavino Morin, MIT Press.
- (Datamation. Nov. 15, 1994 pg 100)
-
- ------------------------------
-
- Date: Wed, 30 Nov 1994 18:19:20 PST
- From: Anonymous <cudigest@mindvox.phantom.com>
- Subject: File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)
-
- ((MODERATORS' Comment: File this one under "another clueless reporter
- discovers the Internet." The opening paragraph says it all. We invite
- comments))
-
- Privacy under siege in the heart of the Internet
- By Nathaniel Sheppard Jr. Tribune Staff Writer
-
- Source: The Chicago Tribune, Nov. 30, '94 (p. 1, 12)
-
- WASHINGTON--They're terrorists with names such as the Legion of Doom
- and Masters of Deception. But unlike the Red Guard or Symbionese
- Liberation Army of a previous era, their weapon of choice is a
- keyboard, not an assault rifle.
-
- They're among the subversives launching sporadic attacks on the
- information superhighway and raising troubling questions about
- security and privacy for individuals, corporations and federal law
- enforcement agencies.
-
- ((The article notes that electronic invaders compromised
- passwords, stole data, and are increasingly able to monitor
- telephone calls))
-
- Perhaps most alarming are the attacks against Internet, a global grid
- of computer networks, and the widespread distribution over the
- internet of intrusion tool kits, the hacker's equivalent of the
- burglar's black bag. The tool kits contain "sniffer" programs that
- attach themselves to the hub of computer networks and copy user
- passwords and other log-in data.
-
- ((The story quotes a computer security expert, Earl Boebert
- in Roseville, Minn, as saying that there's a convergence of
- traditional areas of concern--protecing individuals' personal
- data from organizations and protecting intellectual property
- from theft, and some individuals are going after organizatins
- that keep personal data records. The story notes that sniffer
- programs are used by intruders, and recent targets this year
- included Milnet)).
-
- A Defense Department spokeswoman said intruders captured the
- identification codes of about 100,000 users and were able to "steal,
- alter or erase information on the affected computers and to shut
- computers down or alter them in such a way as to allow further
- undetected access to the compromised systems."
-
- "Attacks on the infrastructure are becoming increasingly more
- significant," said Barbara Fraser, manager of product development for
- the Computer Emergency Response Team, a federally funded project based
- at Carnegie Mellon University in Pittsburgh that helps computer users
- cope with intrusion problems.
-
- The agency was set up in 1988 after a young hacker named Robert Morris
- Jr. introduced a "worm" into Internet, compromising an estimated
- 6,000 "host" or primary systems.
-
- ((Cert handled more than 1,300 incidents last year, the story
- says. It alludes to the MCI calling card scheme, and repeats
- the questionable facts reported by earlier media sources))
-
- The incidents are part of a rash of attacks by underground groups of
- hackers with names such as the Legion of Doom, groups made up largely
- of college students.
-
- Crackers, as the more malevolent hackers are called, have become very
- sophisticated. They focus their attacks on known weaknesses in systems
- or probe for back doors, said Scott Charney, director of the Justice
- Department's computer crimes unit.
-
- "Cases involving the Legion of Doom and the Masters of Deception
- really went to the heart of the system," he said.
-
- The legion is a group of about 20 hackers spread around the country.
- Beginning in 1987 three members of the group in Atlanta used pilfered
- passwords and old identification cards to gain access to computers at
- BellSouth, the regional phone company serving southeastern states.
-
- The three men, who subsequently pleaded guilty to computer fraud
- charges, eavesdropped on telephone conversations, re-routed calls, and
- are believed by authorities to have planted electronic messages in
- telephone facilities in Atlanta, Denver and New Jersey that could have
- knocked out 911 emergency and long distance service.
-
- In July 1992, members of a rival group of crackers, the Masters of
- Deception, allegedly broke into computers at BellSouth, TRW
- Information Services, Timenet, Nynex and other data carriers and stole
- credit reports and other confidential information that was sold to
- private investigators.
-
- The increase in attacks may be in part due to the proliferation of
- intrusion kits, Fraser said. "Tool kits for intruding on systems are
- being posted to bulletin boards all over the world," he said. "This
- allows even novices to enter network systems."
-
- ((The article notes that electronic theft of software is also
- increasing. It gives the exaple of TIE Fighter, based on Star
- Wars movies, that an employee made available to "software
- pirates" two weeks before the scheduled release. The article
- notes that some companies are hiring ex-hackers for security
- advice. The article also finds great significance in the "finger"
- command on Unix as a means of aiding to stalking or harassment of
- women)).
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Thu, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the NIU
- Sociology gopher at:
- URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.101
- ************************************
-
-
-