home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 23, 1995 Volume 7 : Issue 32
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Desecrator: Emo Shrdlu
-
- CONTENTS, #7.32 (Sun, Apr 23, 1995)
-
- File 1--ACLU Files Amicus Brief in U.S. v Thomas (AABBC Case)
- File 2--ex-Public Safety Officer Charged w/Distrib. of BBS "Obscenity"
- File 3--New list: CACI--Children Accessing Controversial Info (fwd)
- File 4--Supreme Court opinion reaffirming right to comm anonymity
- File 5--Summercon Info...
- File 6--** The Cyberspace Society **
- File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 21 Apr 1995 16:29:11 -0400
- From: ACLU Information <infoaclu@ACLU.ORG>
- Subject: File 1--ACLU Files Amicus Brief in U.S. v Thomas (AABBC Case)
-
- For Immediate Release
- April 17, 1995
-
- ACLU Files In Groundbreaking Computer Obscenity Case;
- Friend-of-the-Court Brief Seeks to Overturn Tennessee Conviction
-
- NEW YORK, April 17 -- The American Civil Liberties Union, seeking to
- secure the future of free communication on the Internet, has filed a
- friend-of-the-court brief in what is believed to be the first case
- involving the cross-country prosecution and conviction of computer
- bulletin board operators.
-
- In its brief, filed with the U.S. Court of Appeals for the Sixth
- Circuit in Tennessee, the ACLU urges the court to overturn the
- conviction of Robert Thomas and Carleen Thomas of Milpitas,
- California. The Thomases own and operate a computer bulletin board
- that specializes in the posting of sexually explicit words and
- pictures.
-
- The couple was indicted and convicted in the U.S. District Court in
- Tennessee because a U.S. postal inspector learned of their bulletin
- board and filed a fake application seeking access to its contents.
- Once he obtained access, the postal inspector downloaded several
- pictures from the California-based bulletin board, which a U.S.
- Attorney then deemed to be ~obscene~ under the "local community
- standards" of Tennessee.
-
- In its brief, which was also filed on behalf of the ACLU affiliates
- in Tennessee and Northern California and the National Writers Union,
- Feminists for Free Expression and the Thomas Jefferson Center for the
- Protection of Free Expression, the ACLU charges that the government is
- engaged in a "clumsy attempt to censor communications in cyberspace
- through application of an obscenity law and standards wholly
- inappropriate for this new medium."
-
- "Computer networks have created vast new fora for the exchange of
- ideas," the ACLU's brief said. "They have created new communities with
- new opportunities for people with similar interests to communicate
- with each other.
-
- "Until now," the brief continues, "computer networks have been
- faithful to the values of the First Amendment. They have fostered,
- encouraged and even nurtured the robust exchange of ideas.In this case
- the government seeks to use a criminal law never intended to apply to
- computer communications, to put a brake on that development, to stifle
- the explosive creativity and breadth of expression occuring on
- computer networks."
-
- The full text of the ACLU~s brief in Thomas vs. United States of
- America is available in the ACLU's Free Reading Room, a gopher site
- (address below) in the Court section, under National Office
- litigation.
-
- --
- ACLU Free Reading Room | American Civil Liberties Union
- gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036
- mailto:infoaclu@aclu.org| "Eternal vigilance is the
- ftp://ftp.pipeline.com | price of liberty"
-
- ------------------------------
-
- Date: Mon, 24 Apr 1995 10:50:11 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 2--ex-Public Safety Officer Charged w/Distrib. of BBS "Obscenity"
-
- Question : This is very much like the Tony Davis case in Oklahoma, who
- was arrested for the same charge of distribution of obscene images from
- CD-Roms bought from the back of national magazines. Why are the CD-Rom
- manufacturers never charged with distributing obscene material?
-
- -- david
-
-
- ---------- Forwarded message ----------
-
- NEWS RELEASE
-
- FOR IMMEDIATE RELEASE:
- April 18,1995
-
- A VETERAN DPS OFFICER GIVES HIS SIDE
-
- The ex-Department of Public Safety Officer who is charged with the
- distribution of obscene materials on his computer bulletin board
- system plead "not guilty" this morning. Lorne Shantz, a 17-year
- veteran police officer, was arraigned at the Maricopa County
- Superior Court.
-
- Shantz operated an electronic bulletin board system called "The
- Wishbook" as a hobby and public service. There were close to 4,000
- users, of which approximately 400 financially contributed. This was
- a non-mandatory contribution. The money contributed was used to
- defray operating costs of the bulletin board. The other 3,600 users
- were casual users who didn't give any financial support.
-
- The 400 users who did contribute were given more access to the
- system that included Internet access, CD-ROM files and more time
- on-line each day.
-
- The files the County Attorney's Office is alleging to be obscene
- were not available to the general public. In fact, every effort was
- made by Shantz to prevent obscene files from existing on the system.
- Shantz purchased commercial CD-ROMS from a national distributor.
- According to the County Attorney's Office, the alleged files are
- found on the CD-ROMS, not on Shantz's hard drive system. Users of
- "The Wishbook" who wanted access to the adult area had to submit a
- written application and a photocopy of identification to verify they
- were adults. At no time did Shantz knowingly allow the distribution
- of obscene materials on his bulletin board.
-
- "It defies logic why Lorne Shantz would risk his career, his
- livelihood, his retirement, his reputation and his family to
- distribute disgusting and unwanted files on his bulletin board.
- Clearly, these files are not of a general interest," said Peter
- Balkan, Shantz's attorney.
-
- The bulletin board had nearly 500,000 files, of which almost 40,000
- were of adult nature. The alleged files made up less than
- one/one-thousandth (.001) of one percent of all files.
-
- At the time of his termination, Shantz was classified as an
- Officer III and had been an employee with DPS for nearly 15 years.
- Prior to working at DPS, Shantz was a Yavapai County Deputy Sheriff
- for two years and a reserve Deputy for one year. Shantz was eligible
- for retirement in July of 1998, just three years from now.
-
- Jeffrey Adcock, Shantz's brother-in-law, has set up a defense fund
- to help Shantz defend himself. "I've known Lorne for seven years and
- have had the opportunity to ride as a civilian observer with him
- while he was on duty. He was a good cop who took his job seriously.
- He has spent all of his adult life trying to protect other people.
- These allegations are outrageous and untrue."
-
- People wishing to contribute to the defense fund can send donations
- to The Lorne Shantz Defense Fund, c/o Jeffrey Adcock, P.O.Box 273,
- Litchfield Park, Arizona, 85340.
-
- -End of Press Release-
-
- The contents of this official News Release, are made available at no
- cost by The JCCS Multiline BBS, whose owners and staff fully support
- Lorne Shantz Defense Fund.
-
- ------------------------------
-
- Date: Tue, 18 Apr 1995 00:18:30 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--New list: CACI--Children Accessing Controversial Info (fwd)
-
- ---------- Forwarded message ----------
-
- ANNOUNCING CACI:
- a mailing list devoted to discussing
- Children Accessing Controversial Information
- through computer networks
-
- A lot of kids are getting online these days--sharing data about acid
- rain, talking about social issues, meeting adults as well as kids, and
- learning about other cultures. Computer networks hold tremendous
- promise, but also raise difficult issues which need to be discussed
- openly. Unfortunately, much of the publicity related to these issues
- has only dealt with potential dangers--and it has not encouraged
- reflection on solutions.
-
- Can children be prevented from accessing materials which are
- controversial? Is preventing access even desirable? We believe
- censorship is not the answer. What alternatives do we have or could
- we provide? How do we talk with children about these issues? What
- can we say to concerned parents and school administrators? How and by
- whom are community standards set?
-
- The stakes are clear: if we don't find ways to manage these difficult
- issues, parents and school administrators may choose to deny children
- access to networking in an attempt to protect them. And prohibitions
- against undirected exploration through networking could prevent many
- of the benefits which the technology could support.
-
- We hope to form a community of people interested in discussing these
- issues and developing helpful materials. Complementing the ongoing
- online discussion, a round table discussion will be held at the
- upcoming American Educational Research Association conference in San
- Francisco. (12:25 pm on Wednesday, April 19th. See our web page for
- more information.)
-
- To subscribe:
- Send email to: caci-request@media.mit.edu
- The body of the message should say: subscribe
- If you have difficulty, email caci-owner@media.mit.edu
-
- This announcement as well as additional information may be found at
- http://mevard.www.media.mit.edu/people/mevard/caci.html
- using any web browser.
-
- Please forward this announcement to others who may be interested.
-
- -- Amy Bruckman and Michele Evard, MIT Media Lab
-
- ------------------------------
-
- Date: Mon, 24 Apr 1995 01:22:18 -0500
- From: jim thomas <tk0jut1@CS.NIU.EDU>
- Subject: File 4--Supreme Court opinion reaffirming right to comm anonymity
-
- ((MODERATORS' NOTE: The following was provided by Mike Godwin)
-
- The Supreme Court reaffirmed yesterday the right to anonymity in
- communications.
-
- Here's the syllabus of the opinion:
-
- SUPREME COURT OF THE UNITED STATES
-
- Syllabus
-
- McINTYRE, executor of ESTATE OF McINTYRE,
- DECEASED v. OHIO ELECTIONS COMMISSION
- certiorari to the supreme court of ohio
- No. 93-986. Argued October 12, 1994-Decided April 19, 1995
-
- After petitioner's decedent distributed leaflets purporting to express
- the views of ``CONCERNED PARENTS AND TAX PAYERS'' oppos-
- ing a proposed school tax levy, she was fined by respondent for
- violating 3599.09(A) of the Ohio Code, which prohibits the distribu-
- tion of campaign literature that does not contain the name and
- address of the person or campaign official issuing the literature.
- The Court of Common Pleas reversed, but the Ohio Court of Ap-
- peals reinstated the fine. In affirming, the State Supreme Court
- held that the burdens 3599.09(A) imposed on voters' First Amend-
- ment rights were ``reasonable'' and ``nondiscriminatory'' and therefore
- valid. Declaring that 3599.09(A) is intended to identify persons
- who distribute campaign materials containing fraud, libel, or false
- advertising and to provide voters with a mechanism for evaluating
- such materials, the court distinguished Talley v. California, 362
- U. S. 60, in which this Court invalidated an ordinance prohibiting
- all anonymous leafletting.
- Held: Section 3599.09(A)'s prohibition of the distribution of anony-
- mous campaign literature abridges the freedom of speech in viola-
- tion of the First Amendment. Pp. 7-24.
- (a) The freedom to publish anonymously is protected by the First
- Amendment, and, as Talley indicates, extends beyond the literary
- realm to the advocacy of political causes. Pp. 7-9.
- (b) This Court's precedents make abundantly clear that the Ohio
- Supreme Court's reasonableness standard is significantly more
- lenient than is appropriate in a case of this kind. Although Talley
- concerned a different limitation than 3599.09(A) and thus does not
- necessarily control here, the First Amendment's protection of ano-
- nymity nevertheless applies. Section 3599.09(A) is not simply an
- election code provision subject to the ``ordinary litigation'' test set
- forth in Anderson v. Celebrezze, 460 U. S. 780, and similar cases.
- Rather, it is a regulation of core political speech. Moreover, the
- category of documents it covers is defined by their content-only
- those publications containing speech designed to influence the voters
- in an election need bear the required information. See, e.g., First
- Nat. Bank of Boston v. Bellotti, 435 U. S. 765, 776-777. When a
- law burdens such speech, the Court applies ``exacting scrutiny,''
- upholding the restriction only if it is narrowly tailored to serve an
- overriding state interest. See, e.g., id., at 786. Pp. 9-14.
- (c) Section 3599.09(A)'s anonymous speech ban is not justified by
- Ohio's asserted interests in preventing fraudulent and libelous
- statements and in providing the electorate with relevant informa-
- tion. The claimed informational interest is plainly insufficient to
- support the statute's disclosure requirement, since the speaker's
- identity is no different from other components of a document's
- contents that the author is free to include or exclude, and the
- author's name and address add little to the reader's ability to
- evaluate the document in the case of a handbill written by a private
- citizen unknown to the reader. Moreover, the state interest in
- preventing fraud and libel (which Ohio vindicates by means of other,
- more direct prohibitions) does not justify 3599.09(A)'s extremely
- broad prohibition of anonymous leaflets. The statute encompasses
- all documents, regardless of whether they are arguably false or
- misleading. Although a State might somehow demonstrate that its
- enforcement interests justify a more limited identification require-
- ment, Ohio has not met that burden here. Pp. 14-20.
- (d) This Court's opinions in Bellotti, 435 U. S., at 792, n.
- 32-which commented in dicta on the prophylactic effect of requiring
- identification of the source of corporate campaign advertising-and
- Buckley v. Valeo, 424 U. S. 1, 75-76-which approved mandatory
- disclosure of campaign-related expenditures-do not establish the
- constitutionality of 3599.09(A), since neither case involved a prohi-
- bition of anonymous campaign literature. Pp. 20-23.
- 67 Ohio St. 3d 391, 618 N. E. 2d 152, reversed.
- Stevens, J., delivered the opinion of the Court, in which O'Connor,
- Kennedy, Souter, Ginsburg, and Breyer, JJ., joined. Ginsburg, J.,
- filed a concurring opinion. Thomas, J., filed an opinion concurring in
- the judgment. Scalia, J., filed a dissenting opinion, in which Rehn-
- quist, C. J., joined.
-
- ------------------------------
-
- Date: Sat, 22 Apr 1995 18:21:41 -0500
- From: Phrack Magazine <phrack@FC.NET>
- Subject: File 5--Summercon Info...
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- Phrack Magazine and Computer Security Technologies proudly present:
-
- The 1995 Summer Security Conference
-
-
- "SUMMERCON"
-
- June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia
-
- This is the official announcement and open invitation to the 1995
- incarnation of Summercon. In the past, Summercon was an invite-only
- hacker gathering held annually in St. Louis, Missouri. Starting
- with this incarnation, Summercon is open to any and all interested
- parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
- Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
- Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
- Programmers, Conspiracy Nuts, Musicians and Nudists.
-
- LOCATION:
-
- The Clarion Hotel is located in downtown Atlanta, 9 miles from
- Hartsfield International Airport and just a few blocks from the
- Peachtree Center MARTA Station.
-
-
- Considering the exorbitant expenses involved with attending other
- conferences of this type, Rooms at Summercon are reduced to
-
- $65 per night for Single or Double Occupancy
-
- The Clarion Hotel Downtown, Courtland at 70 Houston St., NE,
- Atlanta, GA 30303
- (404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax)
-
-
- No one likes to pay a hundred dollars a night. We don't expect you
- to have to. Spend your money on room service, drinks in the hotel bar,
- or on k-rad hacker t-shirts. Remember: Mention that you are attending
- Summercon in order to receive the discount.
-
- DIRECTIONS
-
- 75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland
- then turn left on Houston (John Wesley Dobbs Ave.)
- 20 East - Exit 75/85 North at International. Turn Left on Courtland at
- Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.)
- 20 West - Exit 75/85 North at International. One block to Courtland
- and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.)
-
- Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's
- International Airport will drop you off at many hotels in the downtown
- area, including the Clarion. The shuttle should be no more than 12
- dollars. Fares may be paid at the Airport Shuttle in the Ground
- Transportation area of the Airport Terminal.
-
- MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a
- convenient and inexpensive way to negotiate most of the Atlanta area.
- Take the MARTA train from the Airport to the Peach Tree Center Station.
- Walk three blocks down Houston to the intersection of Houston and
- Courtland. The MARTA fare will be roughly 2 dollars.
-
- Taxis - The average cab fare from Atlanta's Airport to the downtown area
- is roughly 30 dollars.
-
- CONFERENCE INFO
-
- It has always been our contention that cons are for socializing.
- "Seekret Hacker InPh0" is never really discussed except in private
- circles, so the only way anyone is going to get any is to meet new people
- and take the initiative to start interesting conversations.
-
- Because of this, the formal speaking portion of Summercon will be
- held on one day, not two or three, leaving plenty of time for people
- to explore the city, compare hacking techniques, or go trashing and
- clubbing with their heretofore unseen online companions.
-
- The "Conference" will be held on June 3rd from roughly 11:00 am until
- 6:00 pm with a 1 hour lunch break from 1:00 to 2:00.
-
- NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping
- and still photography will be permitted.
-
-
- CURRENT LIST OF SPEAKERS:
-
- Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source
- Solutions (a private sector intelligence firm)
-
- Topic: Hackers from the Intelligence Perspective
-
- Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise",
- Publisher of Security Insider Report, and noted security
- expert
-
- Topic: Electromagnetic Weaponry
-
- Bob Stratton - Information Security Expert from one of America's largest
- Internet service providers
-
- Topic: The Future of TCP/IP Security
-
- Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks"
-
- Topic: Cryptography, Banking, and Commerce
-
- Annaliza Savage - London-based Director/Producer
-
- Topic: Discussion of her documentary "Unauthorized Access"
- (Followed by a public screening of the film)
-
- Chris Goggans - Editor of Phrack Magazine and Summercon M.C.
-
- Topic: introductions, incidentals and a topic which is sure
- to culminate in an international incident.
-
-
- (Other Speakers May Be Added - Interested parties may contact scon@fc.net)
-
- COSTS
-
- Since other cons of this type have been charging from 25 to 40 dollars
- entry fees, we are only charging 10 dollars. Yes, that's correct,
- TEN (10) dollars in US currency. Money is far too scarce among the
- hacker community to fleece everyone for money they will probably need
- to eat with or pay for their hotel rooms.
-
-
- WHAT TO DO IN ATLANTA:
-
- To attempt to make everyone's stay in Atlanta more exciting, we are
- contacting local establishments to arrange for special discounts and/or
- price reductions for Summercon attendees. Information will be handed
- out regarding these arrangements at the conference.
-
- Atlanta is a happening town.
-
- Touristy Stuff Party Time
-
- The World of Coca-Cola Buckhead
- Underground Atlanta The Gold Club
- Georgia Dome (Baseball?) (Countless Other Clubs and Bars)
- Six Flags
-
- CONTACTING SUMMERCON SPONSORS
-
- You can contact the Summercon sponsors by several means:
-
- E-mail: scon@fc.net
-
- WWW: http://www.fc.net/scon.html
-
- Snail Mail: Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
-
- If deemed severely urgent, you can PGP your email with the following PGP
- key:
-
- - -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.6
-
- mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
- Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
- Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
- tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
- =evjv
- - -----END PGP PUBLIC KEY BLOCK-----
-
-
- See you in Atlanta!
-
-
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6
-
- iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4
- 46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q
- mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5
- uRix2FrftCY=
- =m/Yt
- -----END PGP SIGNATURE-----
-
- ------------------------------
-
- Date: 21 Apr 1995 00:06:14 -0700
- From: rkmoore@iol.ie (Richard K. Moore)
- Subject: File 6--** The Cyberspace Society **
-
- Dear Cyber Citizens,
-
- I am pleased to forward this annoucement of the formation of The
- Cyberspace Society. As you will see below, CS is a quite different
- kind of endeavor than the Cyber Rights Campaign. CS is an initiative
- aimed at transforming the very governance of the world, in the
- direction of what I would call "enlightened democracy".
-
- Is this so ambitious as to be not worth attempting? I think not. If
- selfish economic interests, representing only a handfull of wealthy
- individuals, can attempt to create a New World Order catering to their
- avarice, why can't the rest of us -- the overwhelming majority --
- pursue instead a vision more conducive to global justice and economic
- sustainability?
-
- As computer visionary Alan Kay is wont to say: "A great project is not
- much more difficult than good project; why not go for greatness?"
-
- Please be assured that my attention and focus will remain with
- cyber-rights and cyberjournal. I have no moderation or administrative
- duties in the Cyberspace Society.
-
-
- In Solidarity,
- Richard
-
-
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- Date--Sun, 16 Apr 1995 22:55:46 -0400 (EDT)
- From--Vigdor Schreibman - FINS <fins@access.digex.net>
- To--Vigdor Schreibman - FINS <fins@access.digex.net>
- Subject--Global Grass Roots "Cyberspace Society" Launched
-
-
- -----------------Cyberspace Society Charter---------------------
- ------------------Republication Authorized----------------------
-
-
- THE
- _ _ __ __ __ __ ^ _ __ __---__
- / \/ |_\ |_ |_/ \ |_\ /_\ / |_ - | -
- \_ | |_/ |_ | \ _\ | / \ \_ |_ - | -
- - /|\ -
- SOCIETY -_/ | \_-
- ---
- making the world safe for enlightened democracy
-
- April 17, 1995
-
-
- SPEAK TRUTH TO POWER:
- A Call For Establishment of "The Cyberspace Society"
- By Vigdor Schreibman, W. Curtiss Priest, and Richard K. Moore
-
- The moving sociopolitical forces presently shaping the Information Age
- includes industry groups such as computer, information,
- telecommunications, broadcasting, and cable. They have colossal
- monopoly and oligopoly-based resources of, perhaps, half a trillion
- dollars with which to plan for their future and acquire the necessary
- political influence to implement such plans.
-
- Similar coalitions of mega-corporate interests are behind the various
- efforts to create super-national organizations based on treaty-status
- agreements such as NAFTA, GATT, and Maastricht. These agreements seek
- to supersede national sovereignty by un-elected commissions dominated
- by corporate representatives. However we may criticize the
- governments of the various Western Democracies, they at least include
- a modicum of popular representation, and should be much-preferred to
- the corporate commissions that threaten to replace them.
-
- In the US, the UK, Mexico, and in many other countries, governments
- are using their positions of temporary power to commit their nations
- to agreements, which surrender sovereignty to these commissions, and
- thereby limit the ability of future governments to fulfill their
- democratic representational mandates. For years, large corporations
- have been consolidating their control over these governments and the
- electoral process and are now cashing in their chips in an attempt to
- achieve global hegemony for corporate power, to replace democracy,
- such as it is, with a new form of Feudalism. Ideology is used as a
- tool to manipulate the political process. So called "conservatives"
- in the US with a new style of political leadership are now attempting
- to massively restructure American public life along reactionary lines.
- Syndicated columnist Jonathan Yardly wrote in an article in The
- Washington Post Dec. 26, 1994, that these leaders "would have us
- believe ... that they are 'conservatives,' but in truth the ideology
- they espouse has virtually nothing to do with conservativism as it is
- properly understood and almost everything to do with avarice,
- jingoism, intolerance, boosterism, moral relativism, religiosity and
- just plain meanness." New insight to turn the new world order away
- from its present course toward more enlightened purposes is now of
- greater urgency than ever.
-
- For the most part, people get their reading of these events through
- the corporate-dominated media. The larger pattern of events is
- intentionally concealed by this media, whose owners tend to be the
- same corporate forces engineering the changes. Internet provides a
- unique vehicle for 'going around' the mass media and providing for
- ourselves an independent means of sharing information and views.
- Unfortunately, the democratic openness of Internet itself is also
- under attack by these same forces, who seem determined to restrict
- freedom of expression on Internet, and replace the participatory
- Internet culture with yet another corporate-controlled,
- commercialized, mass-media channel.
-
- But while the open Internet remains in existence, twenty million
- networked souls throughout the world provide the basis for "gathering
- together" people of good will and democratic spirit more effectively
- than ever before in history. Non-trivial as a voting block in their
- own right, the political potency of network organizing is even more
- powerful in terms of the leverage it offers as an organizing
- infrastructure, which can extend its reach by linking up in coalition
- with traditional political organizations, local media, etc.
-
- The threatening transformation that is now emerging in the US can be
- resisted and, perhaps, even reversed by strong democratization of
- Cyberspace. A significant role in future US national elections could
- be realized by only 6 to 12 million voters, who represent 5 to 10
- percent of total voters in the 1992 USA Presidential elections,
- according to the calculations of Jim Warren, Net-based grassroots
- political action wizard. This "voter arithmetic" applies to the USA
- and to all other democratic nations with significant participation in
- Cyberspace.
-
- Among these 20 million are surely many who would welcome the
- opportunity to join with others to help find the path toward a
- democratic future for the world as we enter the era of the global
- economy and the Information Age.
-
- --------------------
-
- We hereby call for the creation of a ** Cyberspace Society **, to join
- together such people of good will, people who are concerned with the
- survival of humanity and the enrichment of the quality of life, and
- who agree that a genuine democratic process is the surest hope for a
- just and prosperous future.
-
- The Cyberspace Society would at once be an evolving prototype/model
- for the democratic process, an enlightened forum for the discussion of
- democratic movements in the broader political world, and the forum of
- strategies and coalitions to further the practice and benefits of
- democracy in the world.
-
- The strategic mission of Cyberspace Society would be to educate
- ourselves and build the human capacity and strong democratic
- institutional support systems during the period from 1995 to 2000,
- designed to reclaim mastery over the political powers, as are
- guaranteed to Americans by the US Constitution, and belong by natural
- right to the citizens of all nations, and are in many cases guaranteed
- by the laws and constitutions of those nations.
-
- It is appropriate that a Cyberspace-based movement linked and
- committed to serving the real world be encouraged for two reasons.
- First, Cyberspace will become an increasingly significant "public
- space," and if it is governed by narrow business self-interests, will
- have momentous adverse effects on public discourse. Second,
- Cyberspace--linked to the real world--provides the citizenry with an
- incredibly potent instrument for education, collaboration, planning,
- organization and global consensus building.
-
- A strategic planning group is now being formed to establish a
- framework for "The Cyberspace Society" based on: A) the Cyberspace
- Ethic; and B) the Cyberspace Social Contract. Founding members of the
- planning group include: Vigdor Schreibman, editor and publisher of
- the Federal Information News Syndicate; W. Curtiss Priest, Ph.D.,
- director of the Center for Information, Technology, and Society; and
- Richard K. Moore, writer, and chairman of the Cyber-Rights Campaign of
- Computer Professionals for Social Responsibility.
-
-
- * DRAFT * VISION STATEMENT FOR PLANNING A DESIRABLE FUTURE
- BY CITIZENS OF "THE CYBERSPACE SOCIETY"
-
- A. The Cyberspace Ethic
- The new institution should educate citizens of Cyberspace, pursuant to an
- enlightened democratic ethic for the future of the Information Age. As Ralph
- Barton Perry, the philosopher of education, wrote "Democracy is that form
- of social organization which most depends on ... the cultivation of
- enlightened good will in the body of its citizens." John Warfield, a design
- visionary, has observed that enlightened good will means the capacity to
- analyze and resolve the issues facing society "through synthesis of ideas,
- to arrive at positions that promote the general welfare of the society in
- deference to selfish postures of individual pressure groups." There is now
- available a body of knowledge and experience that has been applied
- successfully in a large variety of academic and real-world situations, which
- can facilitate collaborative group inquiry and action required under the
- Cyberspace Ethic. A cellular structure will be used, and group work will be
- systematically organized so as to include the desirable dimensions of
- knowledge and perspective of the Cyberspace Society, including system
- designers, system insiders, and system outsiders.
-
- B. The Cyberspace Social Contract
- The proposed social contract for Cyberspace should promote citizenship in
- "The Cyberspace Society" that is responsive to that ethic. This must be
- supported by instrumental measures that effectively support the paramount
- social needs of the society and global environment in forms that are not
- subject to countervailing profit pressures, which have traditionally
- disregarded or even undermined desired social goods. The choice of such
- measures would be made exclusively by the citizens of the Cyberspace Society.
- The role of the strategic planners will not be to make such decisions but to
- assist in the organization and facilitation of free and fair citizen choice.
-
- A 3-part design is proposed:
- 1) a 3-level infrastructure,
- 2) a bill of rights, and
- 3) a set of applications constituting global challenges:
-
- 1. Cyberspace infrastructure -- three virtual networks --
- interconnected to one another, but each operating with an independent
- economic model and social purpose:
- a. A public information infrastructure (PII) to assure that core
- Government publications are made available in all useful formats for the free
- use of the general public. PII would be developed and operated by a central
- government institution in close collaboration with all government agencies,
- libraries, colleges and universities, schools and other not-for-profit
- entities throughout the nation;
- b. A global "sustainable development" infrastructure (GSDI) to assure
- preservation and restoration of the integrity of natural systems which
- sustain both economic prosperity and life itself, and to foster economic
- growth, environmental protection, and social equity as interdependent,
- mutually reinforcing national goals. GSDI would follow the successful
- Internet/NREN model using leveraged government funding, together with direct
- financial support and management by not-for-profit and private institutions
- at local, state, regional, national, and global levels. Access to GSDI would
- be governed by an authorized use policy (AUP), connecting schools, libraries,
- hospitals, and local governments to each other and to the Internet/GSDI for
- those purposes; and
- c. A global information infrastructure (GII), funded and managed by
- private industry to provide free market access to voice, data, and video
- telecommunications services. The GII would embrace the following six
- principles: encourage private investment; promote competition; create a
- flexible regulatory framework; provide open access to the network for all
- information service providers; ensure universal service; and protect and
- promote the free exchange of information and ideas on the GII.
-
- 2. Cyberspace bill of rights e.g.:
- a. Common carrier structure, separating conduit and
- content;
- b. Equal access and affordable service;
- c. Freedom of expression, privacy, security, and copyright
- protection;
-
- 3. Cyberspace global challenges applications e.g.:
- a. Disease prevention and health promotion;
- b. News and citizen discussion of issues in virtual communities
- c. Distance learning, child development, worker retraining;
- d. Manufacturing, and others.
-
- --------------------
-
- Members of "The Cyberspace Society," are invited to support, criticize, or
- amend the draft vision statement, for the betterment of humanity. Charter
- membership in "The Cyberspace Society"--for individuals only--costs $10.00.
- To become a charter member, send your check or money order to The Cyberspace
- Society, c/o FINS, 18 - 9th Street, NE #206, Washington, DC 20002-6042.
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.32
-
-