home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 50.6 KB | 1,096 lines |
-
- Computer underground Digest Sun May 1, 1994 Volume 6 : Issue 39
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.39 (May 1, 1994)
-
- File 1--Having Problems Receiving CuD on the Mailing List?
- File 2--Clipper Petition Delivered to White House
- File 3--"Child Abuse in Cyberspace" (Newsweek story)
- File 4--New Electronic Privacy Group Formed
- File 5--Call for Papersfor WORKSIMS '94
- File 6--GovAccess.033-Congrss lists; NY & CA Legis; LWV; Rural Data
- File 7--Researcher Requests Responses (Survey)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 30 Apr, 1994 21:21:34 EDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Having Problems Receiving CuD on the Mailing List?
-
- If you've requested a mail subscription to CuD and have received
- acknowledgement of the request but have received no CuDs since, it
- means that the your address is part of a small distribution problem
- affecting about 8 percent of the list.
-
- To rectify the problem, drop a one-line note that says:
-
- SEPARATE LIST in the subject header
- and in the one-line message: SEPARATE LIST <your.full@address.etc>
-
- We *STRONLY* prefer that readers obtain CuD from the Usenet group
- comp.society.cu-digest
-
- The ftp sites (see addresses in the header) are also easy ways to
- obtain CuD for those with ftp access.
-
- The mailing list constitutes only about two percent of the readership,
- but is sufficiently large (3,500) that maintaining the list is rather
- labor-intensive.
-
- ------------------------------
-
- Date: Fri, 29 Apr 1994 17:12:07 +0000
- From: CPSR National Office <cpsr@CPSR.ORG>
- Subject: File 2--Clipper Petition Delivered to White House
-
- CPSR PRESS RELEASE
- Computer Professionals for Social Responsibility
- P.O. Box 717
- Palo Alto, CA 94301
- 415-322-3778 (voice)
- 415-322-4748 (fax)
- cpsr@cpsr.org
-
- "CLIPPER" PETITION DELIVERED TO WHITE HOUSE
-
- COMPUTER USERS CALL ON ADMINISTRATION TO DROP ENCODING PLAN
-
- NEW PRIVACY CENTER ESTABLISHED
-
- Washington, DC -- A national public interest organization today
- delivered to the White House a petition asking for withdrawal of the
- controversial Clipper cryptography proposal. The Clipper plan would
- provide government agents with copies of the keys used to encoded
- electronic messages.
-
- The petition was signed by more than 47,000 users of the nation's data
- highway. The petition drive occurred entirely across the Internet.
- It is the largest electronic petition to date.
-
- Earlier this year, the White House announced support for the Clipper
- proposal. But the plan has received almost unanimous criticism from
- the public. A Time/CNN found that 80% of the American public opposed
- Clipper.
-
- Computer Professionals for Social Responsibility began the petition
- drive in January. In the letter addressed to the President, the
- organization said that if Clipper goes forward, "privacy protection
- will be diminished, innovation will be slowed, government
- accountability will be lessened, and the openness necessary to ensure
- the successful development of the nation's communications
- infrastructure will be threatened."
-
- The petition asks for the withdrawal of Clipper. It is signed by many
- of the nation's leading cryptographers including Whitfield Diffie,
- Martin Hellman, and Ronald Rivest. Users from nearly 3,000 different
- sites across the Internet are represented. Responses came from more
- than 1300 companies including Microsoft, IBM, Apple, DEC, GE, Cray,
- Tandem, Sun, SGI, Mead Data Central, AT&T, and Stratus. Signatures
- also came from more than 850 colleges and universities and 150
- non-profit organizations. Many responses came from public networks
- such as America Online and Compuserve. Nearly a thousand came from
- government and military sites including NASA, the Army and the Navy.
-
- Next week hearings will be held in Congress on the controversial
- cryptography proposal, an initiative developed by the FBI and the
- National Security Agency. Most of the witnesses are expected to
- testify against the plan.
-
- In a related development, the establishment of the Electronic Privacy
- Information Center was announced today. EPIC is jointly sponsored by
- CPSR and the Fund for Constitutional Government. It will focus on
- emerging privacy issues surrounding the information data highway.
- [see accompanying release].
-
- CPSR is national membership organization, based in Palo Alto,
- California. For more information about CPSR, contact CPSR, P.O. Box
- 717, Palo Alto, CA 94302. 415 322 3778 (tel) 415 322 4748 (fax)
- cpsr@cpsr.org (email).
-
- ------------------------------
-
- Date: Tue, 18 Apr 1994 22:01:33 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 3--"Child Abuse in Cyberspace" (Newsweek story)
-
- ((MODERATORS' NOTE: A recent Newsweek article dramatizing
- Net-pedophile predators conflates pornography, pedophilia, and child
- porn to create an over-dramatized fright piece. Readers of the full
- article, of which we only summarize below, will note that it is short
- on fact, long on inference)).
-
- "Child Abuse in Cyberspace: Police target on-line pedophiles"
- NEWSWEEK, April 18, 1994 (p. 40)
- By Barbara Kantrowitz (with Patricia King and Debra Rosenberg)
-
- The story begins with a description of a Chelmsford, Mass., BBS sysop,
- John Rex, Jr, a 23 year-old engineering student. Police found two pet
- pythons, 3,000 arms of ammunition, explosives, bomb manuals, and 43
- videotapes, "many of them either pornographic or about child
- molesters."
-
- Prosecutors charge that Rex used his network to recruit
- teenagers who could help hm abduct a small boy.
- Officials say Rex wanted to sexually abuse the
- child--and possibilty kill and eat him. According to
- chilling details recorded in court papers, a teenager
- says that Rex told him that he almost grabbed a child
- himself at a New Hampshire mall recently when he saw a
- small boy going into a bathroom alone. Last week Rex
- pleaded not guilty to various child-abuse and
- pornography charges; he is being held on $2 million
- surety bail.
-
- Although the computer links to the above incident seem minimal,
- the story quotes law enforcement officials who warn of
- pedophiles on the nets. Without supporting evidence or anecdotes,
- the story claims:
-
- Many of the young victims are latchkey kids, home alone all
- afternoon with only a computer screen for company.
-
- The story continues with the case of Donald Deatherage, 27, of
- Cupertino, Calif. Deatherage, known as "HeadShaver" on America Online,
- was accused by police of using his computer to prey on a 14-year old
- boy with whom he had struck up an on-line conversation. Deatherage was
- accused of eventually meeting the youth, handcuffing, shackling, and
- blindfolding him, and spanking him with a leather belt (among other
- more serious acts). The story alludes to "Operation Longarm," last
- year's US Custom's raid of 35 alleged U.S. computer users who were
- downloading child pornography from Sweden. The authors also allude to
- the ease by which youth can obtain pornography, and claim that police
- are "technologically outgunned" in the battle against electronic
- pedophiles.
-
- Perhaps Net pedophiles are more common that we believe. But,
- judging from actual instances, it's rare. Although we strongly
- advocate alerting parents to on-line dangers that children face,
- we oppose the hyperbole that passes for "news" in the major
- media.
- The paucity and twisting of facts presented in the Newsweek story and
- the linking of pedophiles and "pornography" reflect the hysterical
- image-making that passes of "journalism" among much of the media.
-
- The authors do conclude with one final point that CuD has emphasized
- in the past: Parents should be made aware of dangers of all kinds in
- cyberspace and educate their children accordingly.
-
- ------------------------------
-
- Date: Fri, 29 Apr 1994 17:02:33 +0000
- From: Dave Banisar <epic@CPSR.ORG>
- Subject: File 4--New Electronic Privacy Group Formed
-
- EPIC Press Release
-
- Electronic Privacy Information Center
- 666 Pennsylvania Ave., SE, Suite 301
- Washington, DC 20003
- (202) 544-9240 (tel)
- (202) 547-5482 (fax)
- epic@cpsr.org (email)
-
- April 29, 1994
-
- NEW PRIVACY CENTER ESTABLISHED
-
- EPIC TO MONITOR DATA HIGHWAY
-
- WASHINGTON, DC -- A new organization was launched today to address
- growing public concerns about privacy protection for the national
- information infrastructure. The Electronic Privacy Information Center
- (EPIC) will focus on emerging threats to personal privacy.
-
- Among the threats are the government's controversial Clipper computer
- encryption proposal, which has caused widespread protests from
- companies and computer users around the world. Proposals for an
- information superhighway and recent plans to reform the nation's
- health care system also involve significant threats to personal
- privacy.
-
- "We have established EPIC to focus public attention on these new
- privacy issues -- the Clipper Chip, the Digital Telephony Proposal,
- medical record privacy, and the sale of consumer data." said Marc
- Rotenberg, director of EPIC.
-
- A 1993 poll by the Lou Harris organization found 80 percent of
- Americans concerned about threats to their privacy. More than two
- thirds believe they have lost all control over personal information.
- Still, 70 percent believe that privacy is a fundamental right
- comparable to "life, liberty and the pursuit of happiness," and a
- clear majority of Americans favor establishment of a privacy agency
- within the government.
-
- EPIC brings together an unprecedented group of experts from computer
- science, information law, civil liberties, human rights, public
- interest advocacy, library and research communities, as well as
- privacy experts and scholars. Among the members of the EPIC Advisory
- Board is former Congressman and Presidential candidate John B.
- Anderson. Mr. Anderson said today at a Capitol Hill press conference
- he was very pleased by the establishment of the new organization.
-
- "Privacy is one of the bedrock American values. EPIC will help ensure
- that privacy is protected in the information age," said Mr. Anderson.
-
- Simon Davies, the Director General of Privacy International, welcomed
- the launch of EPIC. Speaking from London, England today he said,
- "EPIC is an exciting initiative on the leading edge of privacy
- protection. My hope is that EPIC will be the forerunner of many such
- organizations around the world."
-
- EPIC is a joint project of the Fund for Constitutional Government and
- Computer Professionals for Social Responsibility. FCG is a non-profit
- charitable organization established in 1974 to protect civil liberties
- and constitutional rights. CPSR is a national membership organization
- established in 1982 by professionals in the computing field concerned
- about the social impact of computer technology.
-
- For more information contact EPIC, 666 Pennsylvania Ave., SE Suite
- 301, Washington, DC 20003. 202 544 9240 (tel), 202 547 5482 (fax)
- epic@cpsr.org (email). Current materials include a program description
- and list of Frequently Asked Questions about EPIC.
-
- Marc Rotenberg, EPIC Director
- David L. Sobel, Legal Counsel
- Dave Banisar, Policy Analyst
-
- ------------------------------
-
- Date: Fri, 22 Apr 1994 14:32:31 +0700 (GMT+0700)
- From: Shaunak Ashtaputre <shaunak@EMAILHOST.AIT.AC.TH>
- Subject: File 5--Call for Papersfor WORKSIMS '94
-
- CALL FOR PAPERS
-
- WORKSIMS'94
-
- International Workshop on
- SIMULATION IN MANUFACTURING SYSTEMS
- ------------------------------------
- NOVEMBER 9 -11, 1994
- Asian Institute of Technology
- Bangkok, Thailand
-
-
- International Advisory Committee:
-
- Dr. Eiji Arai, Tokyo Metropolitan University, Tokyo, Japan
- Dr.-Ing. M. Sc. Bernd-Dietmar Becker, IPA FhG, FRG
- Prof. Robert D. Dryden, Virginia Tech, USA
- Prof. Paul Fishwick, University Florida, USA
- Dr. P.W. Udo Graefe, National research Council, Canada
- Dr. Timothy J. Greene, Oklahoma State University, USA
- Prof. L. Gerhardt, Rensselaer Polytechnic Institute, USA
- Dr. Jan Goossenaerts, The University of Tokyo, Japan
- Prof. Dr.-Ing. Bernd E. Hirsch, BIBA, FRG
- Prof. Chin-Fu Ho, National Sun Yat-Sen University, Taiwan
- Prof. Hyun, KAIST, Korea
- Dr. Branko Katalinic, Wien, Austria
- Prof. A. Kuhn, FhG, IML, FRG
- Prof. Andrew Kusiak, University of Iowa, USA
- Prof. Lennie Lim, GINTIC,NTU, Singapore
- Dr.-Ing. Kai Mertins, IPK, FRG
- Prof. Susumu Morito, Waseda University, Japan
- Dr. D.P.N. Murty, University of Queensland, Australia
- Dr. H. Paul, Waikato University, New Zealand
- Dr. P. G. Ranky, University of East London, UK
- Prof. Umeda, University of Tokyo, Japan
- Prof. K. K. Wang, Cornell University, USA
- Dr. G. B. Williams, University of Birmingham, UK
-
- Organizing and Technical Program Committee:
-
- Dr. D.N. Batanov, Asian Institute of Technology
- Ir. Erik Bohez, Asian Institute of Technology
- Prof. O. Fujiwara, Asian Institute of Technology
- Dr.-Ing. Wolfgang Kuehn, Asian Institute of Technology
- Dr. N.N. Nagarur, Asian Institute of Technology
- Prof. H. Pastijn, Asian Institute of Technology
- Prof. P.C. Pandey, Asian Institute of Technology
- Prof. A. B. Sharma, Asian Institute of Technology
- Prof. Kripa Shanker, Indian Institute of Technology, India
- Prof. M.T. Tabucanon, Asian Institute of Technology
-
- WORKSIMS '94, November 9-11, AIT, Bangkok
-
- The International Workshop on Simulation in Manufacturing Systems will be
- held in Bangkok from November 9 - 11, 1994. The workshop is intended to
- provide a forum for academic researchers and professionals in the fields
- of manufacturing to exchange and discuss technical knowledge and
- experiences for further advances of the field. The focus of the forum
- will thus be on applications and theory in the field of manufacturing
- simulation.
-
- Scope: Papers of original work in but not limited to the following topics
- and research areas are invited:
- - New modelling concepts and techniques
- - Simulation and optimization
- - Parallel simulation
- - Artificial intelligence in simulation
- - System integration
- - Software tools
- - Manufacturing applications and case studies
- - Enterprise integration
- - Case studies
-
- Submission Guidelines:
- The working language of the workshop is English. All correspondence should
- be in English.
-
- Abstracts:
- The abstracts submitted should be structured as follows:
- - Title of the paper
- - Author(s)
- - Communication address, Fax, email, etc.
- - Broad classification according to topic
- - Upto five keywords
- - References
- A typical figure and/or some basic equations may also be
- included.
-
- Papers:
- Papers should describe the work in detail. On acceptance of the paper an
- autor kit will be sent for preparing the camera ready version of the
- paper. The length of the paper must at the most be six pages. Papers
- exceeding this limit will be charged $100 per page towards publishing.
-
- Registration fee structure:
- US$ 380 for participants and speakers registering latest by 30 Sept. 1994
- US$ 450 for participants and speakers registering after 1 Oct.1994
-
- Registration:
- Participants will be required to register upon notification of acceptance
- of their papers on or before the early registration date. Papers will be
- published in the workshop proceedings only if at least one of the authors
- is officially registered and personally presents the paper at the
- workshop.
-
- Exhibitions and demonstrations:
- The program committee is inviting exhibition of the products related to
- the theme of WORKSIMS'94. Information to interested parties will be
- available on request.
-
- Invited Sessions:
- Proposals for invited sessions and tutorials focusing on the new trends
- and developing technologies relevant to WORKSIMS'94 are welcome. The
- proposals should be submitted in detail to the chairpersons latest by May
- 15, 1994.
-
- Important dates and deadlines:
- 15 May 1994 Receipt of abstracts
- 30 June 1994 Notification of acceptance
- 3 August 1994 Receipt of camera ready manuscripts
- 30 September 1994 Early registration deadline
-
-
- All communications should be directed to either chairperson:
- -------------------------------------------------------------------------
- Dr.-Ing. Wolfgang Kuehn Dr. Nagen N. Nagarur
- Tel: (66-2) 524-5678 Tel: (66-2) 524-5683
-
- Asian Institute of Technology, School of Advanced Technologies, IEM Program,
- P.O. Box 2754, Bangkok 10501, Thailand
- Fax: (66-2) 524-5697; 516-2126; 516-5118
- Email: symsys@emailhost.ait.ac.th
-
- ------------------------------
-
- Date: Sun, 17 Apr 1994 22:31:04 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 6--GovAccess.033-Congrss lists; NY & CA Legis; LWV; Rural Data
-
-
- Apr.17, 1994
-
- WHEN EMAILING NOTES TO LEGISLATORS, SEND THE VERY BEST
-
- When sending emailed support or opposition statements to state or federal
- legislators, please be sure to make them reasonably formal and be sure to
- include your name, title, organization-if-any, snailmail address and
- voice-phone. Reasons:
-
- Your statements - especially those sent to a bill-author indicating your
- *support* - will typically be printed out and distributed in a packet to
- other legislators and their staff who will next be considering the bill in
- which you are interested.
-
- In the case of statements *opposing* a bill ... hmmm, it'd be best to send
- them to a legislator known to be opposing the bill. Less chance for them to
- be, uh, misplaced, and a greater chance for them to be circulated to other
- key legislators and staffers.
-
- &&&&&&&&&&&&&&&&&&&&
-
- CONTACT LIST OF MEMBERS OF CONGRESS, PLUS GOVT-REFORM FILES, ALL BY FTP
- From croberts@crl.com Thu Apr 7 16:38:33 1994
- From: Char Roberts <croberts@crl.com>
-
- Jim, I have a list of the members of the 103rd Congress, their states, party
- affiliation, phone and fax numbers on my personal ftp site which I have made
- available to other groups already. It is from the Jan. 1993 US Congress
- Yellow Book but has been gradually updated as people send in corrections for
- their own congresscritters. ...
- Please feel free to advertise the location in the GovAccess newsletter.
- Note that my ftp site is read-only, so anything which is put there has to
- be e-mailed to me first. Also please note that I have LIMITED storage so I
- am not embarrassed to be quite dictatorial about what goes there! (I also
- remove stuff whenever it has become stale in my own humble opinion!). I'm
- using my ftp site mostly for government-reform related files. Usually the
- file names are self-explanatory. Feel free to browse. The congresscritter
- list I have is called congfone.txt.
-
- ftp CRL.com
- login: anonymous
- password: your e-mail address
- cd /users/ro/croberts
- ls (or dir) to display list/directory of files
- get [desired filename] [filename] [filename] [etc]
- quit
-
- Note that file names are case sensitive so type carefully.
- --Char
-
- &&&&&&&&&&&&&&&&&&&&
-
- GOPHER AND TELNET ACCESS TO CALIFORNIA LEGISLATIVE INFORMATION
- From watkins@scilibx.UCSC.EDU Thu Apr 7 09:04:09 1994
- From: Steve Watkins <watkins@scilibx.UCSC.EDU>
-
- some of the items mentioned in past postings are also
- already available via InfoSlug (the guide to retrieving legislative
- information, for instance). The InfoSlug Gopher server is at
- gopher.ucsc.edu for those who have access to their own Gopher clients,
- but we also offer open access via Telnet to infoslug.ucsc.edu using
- infoslug as the login. This might be an easier way for people to get at
- some of these files rather than having to FTP them.
-
- Steve Watkins
- Science Library
- University of California, Santa Cruz
- watkins@scilibx.ucsc.edu
-
- &&&&&&&&&&&&&&&&&&&&
-
- EFFORTS TO OPEN UP NEW YORK STATE'S LEGISLATIVE INFORMATION
- From: Reg Neale <neale@ee.rochester.edu>
- Date: Thu, 7 Apr 94 13:50:24 EDT
-
- At the suggestion of another activist netter, I am writing to you to alert
- you to new developments in our effort to get New York State's public
- legislative information online. The NY legislature does collect, organize
- and maintain computerized legislative information, including text of bills,
- member's voting records etc. However, this information is not freely available
- to the public. Instead, it is provided to a captive commercial firm which
- sells it to special-interest groups, at prices ordinary citizens cannot
- afford.
- A bill was just introduced in the NY Assembly to make public information
- freely and timely available, via "the most-accessible and least-cost
- public network" i.e., the Internet. Bill A10035 was referred to the Assembly's
- Governmental Operations Committee, where it is certain to die unless there
- is a massive input from concerned citizens. Any New Yorkers reading this
- should call or write their assemblyperson to urge immediate action on this
- bill. It could also be helpful to contact these two individuals:
-
- Assemblyman Samuel Colman, Chairman
- Governmental Operations Committee
- Room 731 Legislative Office Building
- Albany NY 12248
- 518-455-5118 voice
- 518-455-5119 fax
-
- David W. Keiper, Commissioner
- Legislative Bill Drafting Commission
- Room 301 Capitol Building
- Albany NY 12247
- 518-455-7500
- CIS 71075,2006
- [Internet: 71075.2006@compuserve.com]
-
- Voice your support for public access to legislative information. If you
- know of anyone who should be involved in this effort, or if you know of
- another appropriate place to post this message, please contact me.
-
- Reginald Neale, Sec'y, Citizens for Open Access to Legislation (C.O.A.L.)
- 716-263-7864 day 716-924-7481 eve
-
- [ Forwarded by Stanton McCandlish <mech@eff.org> Fri Apr 8 13:00:47 1994,
- who added:
- Don't just talk, DO SOMETHING. I'm aware of at least 2 civil-liberties-
- favoring state bills that have failed just recently, in both cases due to
- lack of public input. Activism got a bill very similar to this one passed
- in CA last year, and it can work in NY too. See ftp.eff.org: /pub/EFF/Issues/
- Activism/* for more info on this type of thing. If the legislation is
- available to us, it will be archived at ftp.eff.org: /pub/EFF/Legislation/
- Foreign_and_local/NY/, so check periodically. Those in the NY area, please
- spread the work on ny.* newsgroups, local BBSs, apropos mailing lists, etc. ]
-
- &&&&&&&&&&&&&&&&&&&&
-
- LEAGUE OF WOMEN VOTERS OFFERS ONLINE INFO, BUT INITIALLY ONLY ON COMPU$ERVE
- From fpack@crl.com Sun Apr 10 03:17:10 1994
- From: Fran Packard <fpack@crl.com>
-
- Jim, Thought you may be interested to know that the League of Women Voters
- of California is conducting an online Election Services project on
- CompuServe. It includes asking participants in our message forum to submit
- questions for the statewide candidates. In keeping with our traditional
- ways of providing information about candiates, all those running for the
- same office will receive the same questions. We're requesting that
- the candidates respond in writing and on disk. Their answers will be
- posted in the League library (League/Voters CA) in the California forum.
-
- Fran Packard <fpack@crl.com> or <73162.3025@compuserve.com>
-
- [ This is a delightful first step. But it will *really* be valuable when it's
- posted for free global access via the *bit* net - the Internet - in one or
- several ftp sites, including permission to freely repost and re-circulate.
- While only to CI$, its potential citizen-audience and user-base is severely
- limited. Keep up the good work - and spread it beyond the CI$ elite. :-)
- By the way, I understand that the state President of the California LWV is
- Marlys Robertson, mrobertson@aol.com . --jim ]
-
- &&&&&&&&&&&&&&&&&&&&
-
- SOUTH CAROLINA MOVE TO GET STATE LEGISLATIVE DATA ONLINE
- From: glennb7490@aol.com
-
- Jim, I receive your Government Access Newsletter and am using your info to
- try to start a similar movement here in SC. ...
- Thanks for all you're doing to help restore openness in our governments.
- You're making a difference. Keep up the good work.
- Peace, Glenn Busbin
-
- &&&&&&&&&&&&&&&&&&&&
-
- CONFERENCE ON RURAL DATAFICATION
- From shaffer@CIC.Net Fri Apr 8 09:58:11 1994
- From: Kimberly Shaffer <shaffer@CIC.Net>
-
- Second Annual Conference on Rural Datafication
- May 23-24, 1994
- Hyatt Regency Minneapolis
- Minneapolis, MN
-
- Come for practical information you can put to work in your community.
- Meet people who are learning how to solve the problems of bringing the
- Internet to underserved areas. Share your successes and horror stories!
-
- This years Rural Datafication conference begins with a day of Internet
- workshops designed to help you navigate your way on the Information highway.
- The conference follows with a day and a half of useful presentations and
- breakout sessions. [extensive program details deleted --jim]
-
- The conference fee is $99 if paid before April 30, 1994, $125 if paid
- after April 30. The conference fee includes all Sunday workshops, Monday
- and Tuesday conference sessions, lunch on Sunday and Monday, and Sunday
- and Monday receptions and entertainment. ...
-
- To register for the conference and workshops, contact CICNet, at
- 313-998-6103 or 800-947-4754 and ask for a copy of the registration
- materials. Registration will not be accepted via email. Or send a
- message to epps@cic.net or ruraldata-info-request@cic.net .
-
- The Rural Datafication project and conference are sponsored by:
- CICNet, INDNet, IREN, MichNet, MRNet, netILLINOIS, NYSERNet, PREPnet,
- WiscNet, and WVNET. And is supported by a grant from the National
- Science Foundation.
-
- &&&&&&&&&&&&&&&&&&&&
-
- WHAT OUR FEDERAL LEGISLATORS GET THAT WE CAN'T GET AND WHY
- From glennb7490@aol.com Fri Apr 8 11:20:41 1994
- Xxx asked me to send you a copy of a message I sent her. It's
- self-explanatory. ...
-
- >... I was talking with my congresscritter's office today ... and
- >remembered what ... about the members of the HORs and
- >Sinate using our tax money to buy info from LEGI-SLATE. I
- >asked the staffer (a sysop or something) about that. She said
- >that was correct, and that the services they use in that office
- >are LEGIS (the in-house system) and the Roll Call AM and PM
- >editions. The sinate uses, I think, LEGI-SLATE. She didn't know
- >how much this costs or if there is any way you or I could track
- >legislation without paying a third party. She told me to go to
- >the library and read Congressional Quarterly each week.
- >Phhhhtttt. LEGIS is not available for public use because, as
- >she said, "someone might use it to get into a congressman's
- >computer". Balderdash. I tried to explain to her that I
- >appreciated the need for a secure system, but that didn't
- >preclude the public's right to access info directly so that we
- >can keep an eye on things without paying expensive thirds
- >parties for what is OUR stuff. She stuck to her guns about
- >security, but promised to look into the subject and call me
- >next week to let me know what, if anything, can be done to
- >allow us to track bills via computer. I'm writing her a letter
- >telling her about the legislation introduced in CA and MN which
- >opens these state governments to public access. I think I'll
- >also send a couple of interesting addresses to her while I'm at
- >it. NASA and the White Sands Missle Range ought to do it. They
- >need security, but not so much that we can't get SOME info out
- >of their computers. Do you have any addresses that would
- >impress her? FBI or CIA or IRS? ...
-
- [To which the recipient responded:]
-
- ... What a hoot! Some evil taxpayer might use LEGIS to hack
- a congressman's computer! Yes, indeed, we must make the U.S.
- government and every legislator SECURE from the constituents! I
- wish I could give you a list of addresses which would singe
- that staffer's eyebrows - how about the CIA World Fact Book?
- Nah. There's a listserver for NATO data... Nah. There's
- president@whitehouse.gov... Hah! That's the one I got into a
- flap with over the altered documents they put there. Not too
- impressive. Actually, there is a lot of government information
- all over the Internet but most of it seems to be in university
- archives. The country's college political science and economics
- departments don't seem too worried about "security."
-
- ... I'd like you to send [GovAccess] the story you
- just sent me. I honestly don't know whether to laugh or cry! ...
-
- [ As to addresses illustrating that perhaps Members of Congress would remain
- safe even if the public had Internet access to the public's Congressional
- information, how about dockmaster.ncsc.mil (the National Security Agency's
- public Internet host)? Or maybe even hr.house.gov via which 16 House
- Members and two House committees have public Internet addresses? --jim]
-
- &&&&&&&&&&&&&&&&&&&&
-
- ONLINE PUBLIC POLICY FORUM & NOTICES
- From clif0005@gold.tc.umn.edu Wed Feb 23 10:27:15 1994
- From: "Steven L Clift" <clif0005@gold.tc.umn.edu>
-
- PUBPOL-L is an electronic forum for graduate students, professionals,
- faculty, and staff in the fields of public policy, public administration,
- planning, and other related areas. The topics covered in postings
- include current public policy issues, events and conferences, research,
- teaching, curriculum and courses, employment and career opportunities,
- activities of public policy practitioners, and other topics of interest.
-
- PUBPOL-L encourages the electronic posting of newsletters, conference
- notices, and other text normally distributed in paper form by public
- policy schools and their centers or programs, government agencies, or
- public-sector oriented organizations.
-
- In the near future materials posted to PUBPOL-L will also be available
- via Gopher at the Humphrey Institute of Public Affairs, University of
- Minnesota. The gopher is located at - next1.acs.umn.edu port: 3340.
-
- NEW DISCUSSION LIST: PUBPOL-D is a forum dedicated to open, serious,
- and substantial discussion of public policy issues and for extended
- comment on items posted to PUBPOL-L.
-
- To SUBSCRIBE address your message to:
-
- LISTSERV@VM1.SPCS.UMN.EDU or LISTSERV@UMINN1.BITNET
-
- In the text portion write:
- Subscribe PUBPOL-L Your Name
- For example: Subscribe PUBPOL-L Susan Smith
-
- TO SUBSCRIBE TO BOTH PUBPOL-L and PUBPOL-D:
- Subscribe PUBPOL-L Your Name
- Subscribe PUBPOL-D Your Name
- ...
- *::Steven:L.Clift::::::::::::::::::::::clif0005@gold.tc.umn.edu::#
- #::Moderator,:Public:Policy Network:(PUBPOL-L):::::::::::::::::::*
- *::Hubert:H.:Humphrey:Institute:of:Public:Affairs::::::::::::::::#
- #::University:of:Minnesota, Minneapolis,:MN:55455::::::::::::::::*
- *::(612):824-3747:::::::::(612):625-6351:fax:::::::::::::::::::::#
-
- ------------------------------
-
- Date: Fri, 29 Apr 1994 16:12:38 -0700
- From: GATTIKER@CETUS.MNGT.ULETH.CA
- Subject: File 7--Researcher Requests Responses (Survey)
-
- ((MODERATORS' NOTE: We periodically run short surveys or other
- requests for research material. In return, the posters agree to share
- summaries of their findings with us))
-
- Dear Colleague/Participant:
-
- The following survey is part of a project I am conducting on
- computer technology and its use. I would appreciate every computer
- user who reads this message taking a few minutes to answer and
- return the survey via e-mail and/or "snail mail".
-
- All responses will remain strictly confidential.
-
- Thanks for SHARING YOUR KNOWLEDGE AND EXPERTISE with us on this
- project!
-
- Prof. Urs E. Gattiker, Centre for Technology Studies, Faculty of
- Mgmt, The Univ. of Lethbridge, Lethbridge, AB T1K 3M4, CANADA; Tel:
- (403) 320-6966 (Mountain-Standard-Time, every morning);
- E-Mail: GATTIKER@CETUS.MNGT.ULETH.CA
- IF YOU WISH, you can forward this survey to other lists or fellow
- users.
-
- If your online editor __wraps the lines around__ or if it will not
- fill in blanks without moving copy around, please download to your
- wordprocessor (takes about 1-5 min). Before uploading the survey
- in ASCII/Dos format, please make sure that the file is in 10 Pitch
- Courier. You can also ask for another copy from the address above.
- ================================================================
- Please return this completed survey to Urs E. Gattiker by:
- May 28, 1994
-
- #SU4CcDigestMLusaNAF___________ (for computer use only)
-
- THE COMPUTER RESEARCH PROGRAM
-
- The following questions concern the type and extensiveness of
- technology and software used. Answer on the basis of your personal
- profile. There are no correct or incorrect answers.
-
- TECHNOLOGY
-
- [Please circle or mark one code # (e.g., _1_ or "1" or ~1~)or enter
- an absolute value (e.g., # of years) for each question]
-
- 1. How many years have you worked/played with computers?
- # ____ years
-
- 2. Do you have a personal computer at home?
- No.....0 Yes.....1
-
- 3. Do you use a modem or network connection for computer-mediated
- communication purposes such as remote log-in to another
- computer, e-mail or accessing a bulletin board (BB)?
- No.....0 Yes.....1
-
- 4. Have you had a close friend/colleague who experienced
- software/hardware problems or damage due to a computer virus
- within the last year?
- No.....0 Yes.....1
-
- 5. Are you a subscriber/member of a bulletin board (BB) and/or
- electronic discussion list/newsletter or listserver (EDL)?
- No .....0 If yes, # ____ of years
-
- 6. Have you ever received information through an EDL or a BB whose
- content you considered in bad taste within the last year?
- No.....0 Yes.....1
-
- 7. Have you ever received information through an EDL or a BB whose
- content you believed should be banned from the EDL/BB within
- the last year? No.....0 Yes.....1
- -----------------------------------------------------------------
- For the next 3 Situations, pretend that you are a bystander
- directly observing each situation. When answering, please try to
- think about how you would react, feel, and behave as a bystander in
- each situation.
-
- SITUATION 1
-
- One of your friends is a technical whiz and has just developed a
- new data encryption device (i.e. similar to a phone scrambler the
- device helps to protect conversations against wiretapping) and
- software. Your friend quickly demonstrates how the device works by
- sending an encrypted message to you. Your subsequent decoding
- efforts fail, illustrating that the encryption device does its job
- very well. You and your friend then proceed to install this device
- and software on both of your machines for utilisation when
- communicating with each other.
-
- [Please circle or mark one code # (e.g., _1_ or "1" or ~1~) or
- enter an absolute value (e.g., # of years) or type your answer
- in CAPITAL LETTERS for each question]
-
- 8a. What do you think about this situation (encrypting your data
- sent/received with a privately developed device & software)?
- Very wrong.... 2
- A little wrong.....1
- Perfectly okay.....0
-
- 8b. Is anyone hurt by what you did?
- No.....0 Yes....1
- If Yes, Who/Person_______________________________
- How_______________________________
-
- 8c. Imagine that you actually saw someone using an encryption
- program he/she developed for data transfer from his/her PC.
- Would you feel bothered.....0
- not care.....1
- think this is good.....2
-
- 8d. Should the person be stopped? No.....0 Yes....1
-
- 8e. Should the person be punished? No.....0 Yes....1
-
- Suppose you learn about two different countries. In country A,
- people using privately developed encryption devices for computers
- are quite common, and in country B, one never uses privately
- developed encryption devices.
-
- 8f. Which one of these customs [if either] is bad or wrong?
- Both customs are wrong.....3
- Country A's custom is wrong.....2
- Country B's custom is wrong.....1
- Neither one, both customs are okay.....0
- -----------------------------------------------------------------
- SITUATION 2
-
- One of your friends is a real computer nut and has just written a
- new computer virus. Your friend then proceeds to post the virus
- program onto a BB or an electronic newsletter/listserver (EDL).
-
- 9a. What do you think about this situation (posting a computer
- virus one wrote onto a BB or EDL)?
- Very wrong.....2
- A little wrong.....1
- Perfectly okay.....0
-
- 9b. Is anyone hurt by what your friend did?
- No.....0 Yes....1
- If Yes, Who/Person_______________________________
- How_______________________________
-
- 9c. Imagine that you actually saw someone posting a virus program
- one wrote onto a BB or EDL. Would you
- feel bothered.....0
- not care.....1
- think this is good.....2
-
- 9d. Should the person be stopped? No.....0 Yes....1
-
- 9e. Should the person be punished? No.....0 Yes....1
-
- Suppose you learn about two different countries. In country A,
- people posting design/programming characteristics of a computer
- virus they wrote on a BB or EDL are quite common, and in country B,
- one never shares such programming information about a virus one has
- created with members of a BB or EDL.
-
- 9f. Which one of these customs [if either] is bad or wrong?
- Both customs are wrong.....3
- Country A's custom is wrong.....2
- Country B's custom is wrong.....1
- Neither one, both customs are okay.....0
- -----------------------------------------------------------------
- SITUATION 3
-
- Your friend has just received a new computer game through an EDL
- located abroad. The game is banned in this country because of its
- violence, sexual and racist content. Your friend tests the game.
- Although he/she finds it somewhat disgusting, your friend sends a
- copy to another friend abroad, where no regulations exists for
- banning the game. Your friend does not keep a copy of the game.
-
- 10a. What do you think about this situation (send a locally banned
- game to another user abroad where the game is not banned?
- Very wrong.....2
- A little wrong.....1
- Perfectly okay.....0
-
- 10b. Is anyone hurt by what your friend did?
- No.....0 Yes....1
- If yes, Who/Person_______________________________
- How_______________________________
-
- 10c. Imagine that you actually saw someone send a game banned in
- your country to another user abroad where no such ban exists.
- Would you
- feel bothered.....0
- not care.....1
- think this is good.....2
-
- 10d. Should the person be stopped? No.....0 Yes....1
-
- 10e. Should the person be punished? No.....0 Yes....1
-
- Suppose you learn about two different countries. In country A,
- people sending copies of banned games received through an EDL to
- their friends abroad where no such regulation exists are quite
- common; in country B, one never passes on locally banned games
- received from an EDL to friends abroad where no such regulation
- exists.
-
- 10f. Which one of these customs [if either] is bad or wrong?
- Both customs are wrong.....3
- Country A's custom is wrong.....2
- Country B's custom is wrong.....1
- Neither one, both customs are okay.....0
- -----------------------------------------------------------------
- The questions below again ask you to state your opinions and
- beliefs about computer-related issues. Please remember, there are
- no right or wrong answers.
- 1.... strongly disagree
- 2.... disagree
- 3.... disagree somewhat
- 4.... undecided
- 5.... agree somewhat
- 6.... agree
- 7.... strongly agree
-
- [Please circle or put a CAPITAL X directly on the line under your
- response]
- strongly strongly
- disagree agree
- 11. To get ahead in life one has to do
- some things which may not be right 1 2 3 4 5 6 7
-
- 12. Regulating the content of information distributed on BBs and
- EDLs by the government is appropriate 1 2 3 4 5 6 7
-
- 13. It is all right to skirt the fringes of the law when using
- computers if you can get away with it
- 1 2 3 4 5 6 7
-
- 14. I respect my best friend's opinions about what one should and
- should not do with computer technology
- 1 2 3 4 5 6 7
-
- 15. Your close friends have done some things with computer viruses
- that might be considered inappropriate by some people
- 1 2 3 4 5 6 7
-
- 16. I feel it is more important to protect a person's privacy then
- the ability of police to "wiretap" one's electronic mail or
- data communication 1 2 3 4 5 6 7
-
- 17. It is all right to skirt the fringes of the law by downloading
- banned instructions/information about how to do something ....
- from a BB located abroad, where possession of such information
- is legal 1 2 3 4 5 6 7
-
- 18. It is all right to skirt the fringes of the law by keeping
- banned information about how to do something.... received from
- an EDL located abroad, where possession of such information is
- legal 1 2 3 4 5 6 7
-
- 19. It is all right to skirt the fringes of the law by copying a
- software package from a friend to use it for about 3 months,
- before deleting it from one's PC's hard-drive
- 1 2 3 4 5 6 7
-
- 20. Inappropriate information on BBs' and EDLs', such as violent
- games, should be censored by government regulators
- 1 2 3 4 5 6 7
-
- 21. The use of a self-made encryption device and software for
- computer-communication purposes is perfectly okay
- 1 2 3 4 5 6 7
- -----------------------------------------------------------------
- BACKGROUND
-
- [Please circle or mark one code # (e.g., _1_ or "1" or ~1~) or
- enter an absolute value (e.g., # of years) or else type your
- answer in CAPITAL LETTERS for each question].
-
- 22. Are you working? not currently employed.....0
- part-time.....1
- full-time.....2
-
- 23. What is your current occupation?
- __________________(please specify)
-
- 24. Are you male.....1
- female.....0
-
- 25. As far as material wealth is concerned, when you consider the
- economic and social situation of the country where you grew up
- (age-span 1-18 years), would one consider your family (i.e.,
- yourself, siblings and parents) as having
- been: poor.....0
- below average.....1
- average.....2
- above average.....3
- rich.....4
-
- 26. How old are you? #______ of years
-
- 27. How many years did you attend school (e.g., community
- college/vocational diploma = 12-14 years, undergraduate
- university degree = 16 years)? #______ of years
-
- 28. In which country do you currently reside?
- Name of Country:__________ # of years:___
-
- 29. In which country have you spent most of your life?
- Name of Country:__________ # of years:___
-
- 30. In your community, in how many voluntary/charity organizations
- do you regularly (i.e. at least once a month) participate
- (e.g., church, sport groups, big brother/big sister, scouts or
- Red Cross)? # _____ of groups
-
- 31. How did you receive this survey? e-mail from Gattiker.....0
- e-mail from a friend/colleague.....1
- listserver/electronic discussion list,
- please specify: .....2
- electronic journal/newsletter, specify: .....3
- other, please specify: .....4
-
- IF YOU WISH TO RECEIVE A SUMMARY OF THE RESULTS, PLEASE
- mark here ___ with an X or else provide your address to
- Urs E. Gattiker. A short summary of the results will
- appear in a future CU-Digest!
-
- THANK YOU FOR PROVIDING US WITH YOUR HELP,
- INSIGHTS, AND EXPERTISE SO FREELY AND GENEROUSLY! ver6
-
- ------------------------------
-
- End of Computer Underground Digest #6.39
- ************************************
-
-
-