home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun April 30, 1995 Volume 7 : Issue 34
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Desecrator: Emo Shrdlu
-
- CONTENTS, #7.34 (Sun, April 30, 1995)
-
- File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
- File 2--Clipper paper available for anon FTP
- File 3--New Maillist battles Omnibus Terrorism Bill/Join NOW! (fwd)
- File 4--Ohio Job Opening
- File 5--making reality acceptable: cybercafe @ compress
- File 6--Playing to Win in DC June 1-4
- File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 27 Apr 1995 02:14:46 -0400
- From: "Robert A. Rosenberg" <hal9001@PANIX.COM>
- Subject: File 1-- ***VIRUS INFO*** (GOOD TIMES VIRUS A HOAX, FOLKS!)
-
- ((MODERATORS' NOTE: We've received number of posts regarding the
- so-called "Good Times" virus, and "warnings" have appeared on
- many of the news groups we read. The following is unlikely to
- end it until it's time to pay the modem tax)).
-
-
- Originally from: <AMEND1-L%UAFSYSB.BITNET@UGA.CC.UGA.EDU>
-
- At 18:04 4/26/95, 00bawhelchel@bsuvc.bsu.edu wrote:
- [Another "Good Times" Virus Warning]
-
-
- Here we go again <g>.
-
- The "Good Times Virus" is a Urban Legend. In reality it is composed of the
- mass mailing of spurious warnings like the above from those who
- (admittedly) are trying to be helpful.
-
- Here is the real story (Note that date on the warning to see how long this
- BS has been going on).
-
- ================================================================
-
- CIAC Notes
-
- Number 94-04c:December 8, 1994
-
- Welcome to the fourth issue of CIAC Notes! This is a special edition
- to clear up recent reports of a "good times" virus-hoax. Let us know
- if you have topics you would like addressed or have feedback on what
- is useful and what is not. Please contact the editor, Allan L. Van
- Lehn, CIAC, 510-422-8193 or send E-mail to ciac@llnl.gov.
-
- Reference to any specific commercial product does not necessarily
- constitute or imply its endorsement, recommendation or favoring by
- CIAC, the University of California, or the United States Government.
-
-
- THE "Good Times" VIRUS IS AN URBAN LEGEND
-
- In the early part of December, CIAC started to receive information
- requests about a supposed "virus" which could be contracted via
- America OnLine, simply by reading a message. The following is the
- message that CIAC received:
-
- Here is some important information. Beware of a file called Goodtimes.
-
- Happy Chanukah everyone, and be careful out there. There is a virus on America
- Online being sent by E-Mail. If you get anything called "Good Times",
- DON'T read it or download it. It is a virus that will erase your hard
- drive. Forward this to all your friends. It may help them a lot.
-
- THIS IS A HOAX. Upon investigation, CIAC has determined that this message
- originated from both a user of America Online and a student at a university
- at approximately the same time, and it was meant to be a hoax.
-
- CIAC has also seen other variations of this hoax, the main one is that
- any electronic mail message with the subject line of "xxx-1" will
- infect your computer.
-
- This rumor has been spreading very widely. This spread is due mainly
- to the fact that many people have seen a message with "Good Times" in
- the header. They delete the message without reading it, thus
- believing that they have saved themselves from being attacked.
- These first-hand reports give a false sense of credibility to the
- alert message.
-
- There has been one confirmation of a person who received a message
- with "xxx-1" in the header, but an empty message body. Then, (in a
- panic, because he had heard the alert), he checked his PC for viruses
- (the first time he checked his machine in months) and found a
- pre-existing virus on his machine. He incorrectly came to the
- conclusion that the E-mail message gave him the virus (this particular
- virus could NOT POSSIBLY have spread via an E-mail message). This
- person then spread his alert.
-
- As of this date, there are no known viruses which can infect merely
- through reading a mail message. For a virus to spread some program
- must be executed. Reading a mail message does not execute the mail
- message. Yes, Trojans have been found as executable attachments to
- mail messages, the most notorious being the IBM VM Christmas Card
- Trojan of 1987, also the TERM MODULE Worm (reference CIAC Bulletin
- B-7) and the GAME2 MODULE Worm (CIAC Bulletin B-12). But this is not
- the case for this particular "virus" alert.
-
- If you encounter this message being distributed on any mailing lists,
- simply ignore it or send a follow-up message stating that this is a
- false rumor.
-
- Karyn Pichnarczyk
- CIAC Team
- ciac@llnl.gov
-
-
- WHO IS CIAC?
-
- CIAC is the U.S. Department of Energy's Computer Incident Advisory Capability.
- Established in 1989, shortly after the Internet Worm, CIAC provides
- various computer security services free of charge to employees and
- contractors of the DOE, such as: Incident Handling consulting,
- Computer Security Information, On-site Workshops, White-hat Audits.
-
- CIAC is located at Lawrence Livermore National Laboratory and is a
- part of its Computer Security Technology Center. CIAC is also a
- founding member of FIRST, the Forum of Incident Response and Security
- Teams, a global organization established to foster cooperation and
- coordination among computer security teams worldwide.
-
-
- CONTACTING CIAC
-
- If you require additional assistance or wish to report a
- vulnerability, call CIAC at 510-422-8193, fax messages to 510-423-8002
- or send E-mail to ciac@llnl.gov.
-
- ATTENTION: For emergencies and off-hour assistance, CIAC is available 24-hours
- a day to DOE and DOE contractors via an integrated voicemail and
- SKYPAGE number. To use this service, dial 1-510-422-8193 or
- 1-800-759-7243 (SKYPAGE). The primary SKYPAGE PIN number, 8550070 is
- for the CIAC duty person. A second PIN, 8550074 is for the CIAC
- Project Leader. Keep these numbers handy.
-
- CIAC's ELECTRONIC PUBLICATIONS
-
- Previous CIAC Bulletins and other information are available via
- anonymous FTP from ciac.llnl.gov.
-
- CIAC has several self-subscribing mailing lists for electronic publications:
-
- 1. CIAC-BULLETIN for Advisories, highest priority - time critical
- information, and Bulletins, important computer security information;
- 2. CIAC-NOTES for Notes, a collection of computer security articles;
- 3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
- software updates, new features, distribution and availability;
- 4. SPI-NOTES, for discussion of problems and solutions regarding the
- use of SPI products.
-
- Our mailing lists are managed by a public domain software package called
- ListProcessor, which ignores E-mail header subject lines. To subscribe
- (add yourself) to one of our mailing lists, send requests of the
- following form:
-
- subscribe list-name LastName, FirstName PhoneNumber
-
- as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES,
- SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for
- "LastName" "FirstName" and "PhoneNumber." Send to:
- ciac-listproc@llnl.gov (NOT to: ciac@llnl.gov)
-
- e.g.,
-
- subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36
- subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36
-
- You will receive an acknowledgment containing address and initial PIN,
- and information on how to change either of them, cancel your
- subscription, or get help.
-
- To subscribe an address which is a distribution list, first subscribe
- the person responsible for your distribution list. You will receive an
- acknowledgment (as described above). Change the address to the
- distribution list by sending a second E-mail request. As the body of
- this message, substitute valid information for "list-name," "PIN", and
- "address of the distribution list" when sending
-
- E-mail to ciac-listproc@llnl.gov:
-
- set list-name address PIN distribution_list_address
- e.g., set ciac-notes address 001860 remailer@tara.georgia.orb
-
- To be removed from a mailing list, send the following request via
-
- E-mail to ciac-listproc@llnl.gov:
-
- unsubscribe list-name
- e.g., unsubscribe ciac-notes
-
- For more information, send the following request:
-
- help
-
- If you have any questions about this list, you may contact the list's owner:
- listmanager@cheetah.llnl.gov.
-
- This document was prepared as an account of work sponsored by an agency of the
- United States Government. Neither the United States Government nor the
- University of California nor any of their employees, makes any
- warranty, express or implied, or assumes any legal liability or
- responsibility for the accuracy, completeness, or usefulness of any
- information, apparatus, product, or process disclosed, or represents
- that its use would not infringe privately owned rights. Reference
- herein to any specific commercial products, process, or service by
- trade name, trademark, manufacturer, or otherwise, does not
- necessarily constitute or imply its endorsement, recommendation or
- favoring by the United States Government or the University of
- California. The views and opinions of authors expressed herein do not
- necessarily state or reflect those of the United States Government or
- the University of California, and shall not be used for advertising or
- product endorsement purposes.
-
- End of CIAC Notes Number 94-04c 94_12_08
- UCRL-MI-119788
-
- ------------------------------
-
- Date: Thu, 27 Apr 1995 15:24:59 -0400 (EDT)
- From: Michael Froomkin <mfroomki@UMIAMI.IR.MIAMI.EDU>
- Subject: File 2--Clipper paper available for anon FTP
-
- My paper, "The Metaphor is the Key: Cryptography, the Clipper Chip, and
- the Constitution" is now available for anonymous FTP. It is about 180pp.
- long, and contains more than 800 references.
-
- I would welcome your feedback on this paper -- even (especially?)
- contributions to the inevitable errata sheet.
-
- (Please note this docment resides at what is officially a "temporary"
- site, so that if you create a web link to it, please let me know so that
- I can notify you when it moves).
-
- Contents of FTP://acr.law.miami.edu/pub/..
-
- File Type
- --------------- ----------
- clipper.asc ASCII
- clipper.wp WP 5.1/Dos
- clipperwp.zip Pkzipped version of clipper.wp
- clipper.ps My best effort at Postscript. YMMV. (approx. 7Mb.)
- clipperps.zip Pkzipped version of clipper.ps
- clipper.ps.gz Gzipped version of clipper.ps
-
- Ports provided by nice people (please note I have not checked these)
- ------------------------------------------------------------------------
- clipper.ps.Z Unix compressed version of clipper.ps with carriage
- returns removed -- courtesy of Whit Diffie
- clipperMSW.sea.hqx Binhexed self-extracting Microsoft Word 5.1 for
- Macintosh version of clipper.wp -- courtesy
- of Ted Byfield
-
- None of these files contains correct and final page numbers, and there are
- generally trivial typos that were corrected in the printed version. The
- printed version appears at 143 U.Penn.L.Rev. 709 (1995).
-
- I intend to put up a web version presently. The .index file in the above
- directory will have details when a clean copy is ready for prime time. A
- link to an experimental and highly buggy HTMLized version may appear at
- erratic intervals at http://acr.law.miami.edu at the very bottom of the
- homepage.
-
- A.Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
- Associate Professor of Law |
- U.Miami Law School | MFROOMKI@UMIAMI.IR.MIAMI.EDU
- PO Box 248087 |
- Coral Gables, FL 33146 USA | It's warm here.
-
- ------------------------------
-
- Date: Fri, 28 Apr 95 13:18:13 EDT
- From: "W. K. (Bill) Gorman" <34AEJ7D@CMUVM.CSV.CMICH.EDU>
- Subject: File 3--New Maillist battles Omnibus Terrorism Bill (fwd)
-
- Obviously, CUD would be impacted by this legislation if enacted,
- as would we all.
- ===========================
-
- W. K. Gorman <bj496@Cleveland.Freenet.Edu>
-
- Copyright (C) 1995 by W. K. Gorman.
- With explicit reservation of all rights, exclusively and without prejudice,
- per UCC 1-207. Any commercial or for-profit use of all or any part of this
- message, in any form, is expressly forbidden. Opinions are my own.
- ----------------------------Original message----------------------------
- Date--Fri, 28 Apr 1995 03:43:29 -0400
- From--pc-man@netaxs.com (Howard L. Bloom)
- Subject--New Maillist battles Omnibus Terrorism Bill/Join NOW!
-
- The Omnibus Counterterrorism Bill was languishing in Congress before
- The Oklahoma Bombing. It is now on the fast track and needs to be stopped
- or at least changed drastically so that it does not infringe on our
- rights as Citizens. A concise description of what this bill represents
- follows the subscribe information to this list.
-
- Please post information relevant to fighting or making this bill more
- constitutional as this bill in both the house and senate makes a mockery
- of the constituiton. This is a non-partison issue that has people on
- the right, the left and the middle raising eyebrows. THIS IS NOT A
- RIGHT WING ANGRY WHITE MALE ISSUE!
-
- The listowner (me) is an Angry White Jewish Male who sees grave dangers
- should it be voted on in its present state. This list is not going to be
- a discussion list about whether the bill is good or bad, I think it is bad
- and it is my list. So, if you think it is good, then feel free to join, but
- do not inhibit or dilute the momentum of this list. I am a private
- individual who pays for the list traffic on the webcom.com service.
-
- If you would like to join you must decide whether you wish to join the
- reflected list where each message sent creates a new message in your
- mailbox, or the digest which lumps them all together for the day and
- sends many messages in one email post.
-
- To Join, send a message to one of the following addresses:
-
- Tono-terrorism-bill-request@webcom.com (this is the refelected list)
- Tono-terrorism-bill-digest-request@webcom.com (this is the digest)
- Fromyou
- Subject(please leave the subject blank)
- -------------------------------------------------
- in the body of the message put just one word, the word "subscribe"
-
- You do not have to put your name or email address.
-
- And now a description of the Terrorism Bill
-
-
- Omnibus Counterterrorism Bill - S. 390 and H.R. 896
-
- New FBI Charter To Investigate Political Groups
-
- February 10, 1995 the Omnibus Counterterrorism Bill was
- introduced as S. 390 into the Senate and as H.R. 896 in the
- House. It was initiated by the FBI, and passed on by the Justice
- Department and the White House. Senators Biden (D-DE) and Specter
- (R-PA) initiated it in the Senate, Rep. Schumer (D-NY) and Dicks
- (D-WA) in the House. It has bipartisan support and could get
- expedited action.
-
- Summary
-
- * This is a general charter for the FBI and other agencies,
- including the military, to investigate political groups and
- causes at will. The bill is a wide-ranging federalization of
- different kinds of actions applying to both citizens and
- non-citizens. The range includes acts of violence (attempts,
- threats and conspiracies) as well as giving funds for
- humanitarian, legal activity.
-
- * It would allow up to 10 year sentences for citizens and
- deportation for permanent resident non-citizens for the "crime"
- of supporting the lawful activities of an organization the
- President declares to be "terrorist", as the African National
- Congress, FMLN in El Salvador, IRA in Northern Ireland, and PLO
- have been labelled. It broadens the definition of terrorism. The
- President's determination of who is a terrorist is unappealable,
- and specifically can include groups regardless of any legitimate
- activity they might pursue.
-
- * It authorizes secret trials for immigrants who are not charged
- with a crime but rather who are accused of supporting lawful
- activity by organizations which have also been accused of
- committing illegal acts. Immigrants could be deported1) using
- evidence they or their lawyers would never see; 2) in secret
- proceedings; 3) with one sided appeals; 4) using illegally
- obtained evidence.
-
- * It suspends posse comitatus - allowing the use of the military
- to aid the police regardless of other laws.
-
- * It reverses the presumption of innocence - the accused is
- presumed ineligible for bail and can be detained until trial.
-
- * It loosens the rules for wiretaps. It would prohibit probation
- as a punishment under the act - even for minor nonviolent
- offenses.
-
- Implications
-
- * Those who remember the McCarran Walter Act will recognize this
- bill, only in some ways this is broader and potentially more
- dangerous.
-
- * This bill is highly politicalthe President can determine who
- is a terrorist and change his/her mind at will and even for
- economic reasons. The breadth of its coverage would make it
- impossible for the government to prosecute all assistance to
- groups around the world that have made or threatened to commit
- violent acts of any sort. Necessarily its choices would be
- targeted at organizations the government found currently
- offensive. People to be deported would be chosen specifically
- because of their political associations and beliefs.
-
- * The new federal crimeinternational terrorism doesn't cover
- anything that is not already a crime. As the Center for National
- Security Studies notes"Since the new offense does not cover
- anything that is not already a crime, the main purpose of the
- proposal seems to be to avoid certain constitutional and
- statutory protections that would otherwise apply."
-
- * While many provisions of this bill could well be found
- unconstitutional after years of litigation, in the mean time the
- damage could be enormous to the First Amendment and other
- constitutional rights including presumption of innocence and
- right to bail.
-
- ------------------------------
-
- Date: Thu, 27 Apr 1995 08:14:50 -0700
- From: Peter Miller <ptwnd@IGC.APC.ORG>
- Subject: File 4--Ohio Job Opening
-
- Job Posting -- Please Distribute:
- ================================
-
- Ohio Community Computing Center Network Coordinator
-
- The Ohio Community Computing Center Network (OCCCN) will be establishing
- 14 computer centers in low-income neighhborhoods in Cleveland, Columbus,
- Dayton, Akron, Toledo, Youngstown, and Marietta. Funding for these
- centers comes from the settlement of the Ameritech Alternative
- Regulation case before the Ohio Public Utilities Commission. The OCCCN
- seeks to hire a part-time Coordinator to assist these centers in
- becoming operational and to provide ongoing support and coordination.
-
- The OCCCN Coordinator will be based in Columbus and provide program and
- technical assistance to each center, do outreach throughout the state,
- and perform statewide administrative duties, under the direction of the
- OCCCN Coordinating Committee, as follows:
-
-
- 1. Provide Ohio community computing centers with:
-
- * assistance in becoming operational;
-
- * assistance in making telecommunications arrangements for connecting
- centers to each other and to the national information infrastructure;
-
- * organization development assistance: planning and proposal
- development, fundraising, publicity, and board development;
-
- * program support: activities suggestions, technical support,
- assistance in choosing software, hardware and consultants, and in
- developing volunteer program;
-
- * arrange for and participate in on-site visits and regional and
- statewide gatherings/workshops.
-
-
- 2. Do outreach:
-
- * identify and establish contact with similar programs;
-
- * develop a pool of associates for the OCCCNetwork and coordinate
- involvement of those doing related work in the region;
-
- * attend regional meetings and conferences as appropriate.
-
-
- 3. Perform administrative duties statewide:
-
- * actively facilitate and participate in online conferences for the
- OCCCN;
-
- * work with funders in developing financial support for statewide
- and local coordination;
-
- * participate in discussion of directions and goals for OCCCN and
- involve involve centers in those discussions;
-
- * review periodic financial and performance reports from each center;
- summarize and report to the committee.
-
- * provide timely reports regarding activity in the above roles.
-
- The OCCCN Coordinators should be familiar with telecommunications and
- with either Mac or IBM-compatible systems, their basic applications, and
- trouble-shooting skills. The Coordinator should have community
- organizing experience and orientation; educational and related community
- technology experience will be particularly useful.
-
- Please send resume and cover letter by May 12 to Ellis Jacobs, OCCCN
- Coordinating Committee, Legal Aid Society of Dayton, Inc., 333 West
- First St., Suite 500, Dayton, OH 45402.
-
- ===========================================================
- Peter Miller
- Playing to Win Network Director
- Education Development Center 617/969-7101 x2727
- 55 Chapel St. FAX: 617/ 969-4902
- Newton, MA 02158 ptwnd@igc.apc.org
-
- ------------------------------
-
- Date: Sun, 30 Apr 1995 19:57:07 +0000
- From: heath@CYBERCAFE.ORG(heath bunting)
- Subject: File 5--making reality acceptable: cybercafe @ compress
-
- cybercafe @ compress
-
- when the external can not be understood
- we DESIRE its transformation into our internal form
-
- if you have anything you can not cope with
- (e.g. ideas/people/cultures)
- please send them to cybercafe and we will restructure them
- for your pleasant CONSUMPTION
-
- this will be accomplished using the new technique of
- private SUBJECTIVE compression instead of public objectivity
-
- (compression is the process of interpretation often resulting in LOSS)
-
- subjective compression works through SELF reference and paradox.
- searching recursively for the WHOLE in smaller and smaller
- sections of itself, until all you have left is YOU.
-
- when the world is like us we will no longer desire CHANGE
-
- send the undigestible to:
- 4 egmont house
- 116 shaftesbury ave
- london wv1 7dj
- uk
-
- or via our web form
- http://www.cybercafe.org/cybercafe/compress.html
-
- heath
-
- cybercafe aims to promote/create spaces/situations in which
- people can create/behave/express/experience
- in ways unavailable in currently existing places
-
- Domains of activity radio/tv/telephones/fax/
- mailart/flyposting/performance/computer.
-
- =-=-=-=-=-=-=-=-=-= uphold dignity/creativity =-=-=-=-=-=-=-=-=-=
-
- heath@cybercafe.org vox 44 171 437 8584
- http://www.cybercafe.org/cybercafe/ mbl 44 374 823 840
- flat 4, 116 shaftesbury ave bbs 44 171 439 3998
- london w1v 7dj UK
-
- ------------------------------
-
- Date: Thu, 27 Apr 1995 08:23:46 -0700
- From: Peter Miller <ptwnd@IGC.APC.ORG>
- Subject: File 6--Playing to Win in DC June 1-4
-
- For Immediate Distribution:
-
- PLAYING TO WIN COMMUNITY COMPUTING CENTER NETWORK
- Hosts 4th Annual Meeting in Washington DC
- Friday, June 2 - Sunday, June 4, 1995
- Future Center at the Capital Children's Museum
- 800 Third Street NE -- near Union Station
-
- Thursday, June 1, 7:30 pm Kick Off with
- Working Group Against Information Redlining Forum on
- "Disenfranchised Communities and the Information Superhighway"
-
- =======================================================================
-
- Summary Program Schedule
-
- Preliminary Program Thursday, June 1 7:30-9:30 - see below
-
- Friday, June 2 - 9:00 am to 7:00 pm
-
- Registration & Continental Breakfast
- Panel presentation:
- Issues of Access: The Best of Times, The Worst of Times --
- * Mario Marino, Chairman, The Morino Institute, Reston, VA
- * Laura Breeden, Director, Telecommunications and
- Information Assistance Program, Washington, DC
- * James Ferguson, Executive Director, National Coalition on
- Black Voter Participation, Washington, DC
- * Lauren-Glenn Davitian, Coordinator, Chittenden Community
- Television, Burlington, VT
- Focus Groups
- Keynote Speaker: Elliot Soloway, Ph.D., Associate Professor of
- Electrical Engineering & Computer Science, Artificial Intelligence
- Lab, University of Michigan
- Concurrent Presentations & Workshops:
- Starting a Community Technology Center
- Technology and Literacy
- Managing Community Technology Programs
- The PTW Network -- IGC Training for New Users
- Role of Math and Science in Community Technology Programs
- Volunteers: How to Find Them/How to Keep Them
- Reception sponsored by The Morino Institute
-
- Saturday, June 3 9:00 am to 5:45 pm
-
- Registration & Continental Breakfast
- Affiliate Presentations & Workshops:
- The Whys and Hows of Public Access
- Multimedia Projects
- Integrating Technology: Video and Computers
- IGC Telecommunications Training for Experienced Users
- Role of Telecommunications in Community Technology Programs
- Exploring Internet Resources
- Telecommunication Projects
- Tools Play: Using basic computer tools to create learning games
- Math & Science Projects and Resources
- Program Assessment and Evaluation
- The PTW Network Agenda: 1995-96 and Beyond
-
- Sunday, June 4 9:00 am to 1:00 pm
-
- Regional and Steering Committee Meetings
-
- + + + + + + + + + + + + + + + + + + + +
-
- Conference co-sponsors: The Capital Children's Museum, The Morino
- Institute, The Legent Corporation, the National Science Foundation,
- and Playing To Win, Inc.
-
- Goals:
-
- To provide opportunities for personal networking and for exchanging
- information and experiences.
-
- To enhance community-based technology programs by providing
- technical training and program development information.
-
- To explore and understand issues related to providing equity in
- technology access at the local, regional and national levels.
-
- Description:
-
- The Annual All-Affiliates Meeting of The Playing To Win Network
- brings together Network affiliate members, potential affiliates,
- associates, friends, supporters and other persons interested in
- learning more about how community-based technology programs can and
- do provide technology access to underserved and disenfranchised
- peoples. In addition to gaining practical program development
- information, participants will learn how programs throughout the PTW
- Network are working and collaborating to open the doors to
- technology in their communities. Panel discussions, workshops, and
- training sessions will be led by affiliate members, PTW Network
- project staff and consultants, as well as representatives from
- public policy and public interest organizations. Opportunities for
- informal socializing will include group lunches and a Friday night
- reception sponsored by The Morino Institute.
-
- Registration and Lodging:
-
- Representatives of the PTW Network and conference presenters do not
- pay a registration fee. All other participants are charged $25 to
- attend the conference ($35 at the door). To register in advance for
- any day of the conference, contact Ruth Rappaport at RuthR@edc.org,
- or 800/225-4276 x2329, with your name, address, organization, and
- phone, and note whether you would like to take advantage of any of
- the reserved lodging and for what dates. A block of rooms has been
- reserved at the Radison Barcelo ($100 single; $113 double) and
- Carlyle Suites ($89; $99) Hotels. A detailed conference information
- packet will be mailed to all registered participants in May. This
- packet will include the final program, schedule, maps, and
- transportation information.
-
- Travel:
-
- Discounted airfare is available from US Air. Contact: Sally Kahn,
- Stewart International Travel, 800-441-8666. Tell her you are attending
- the PTW Network Conference in Washington DC.
-
-
- =======================================================================
-
- DISENFRANCHISED COMMUNITIES AND THE INFORMATION SUPERHIGHWAY
- Co-Sponsored with
- THE WORKING GROUP AGAINST INFORMATION REDLINING
-
- Thursday, June 1st, 7:30 -- 9:30 p.m.
- Radison Barcelo Hotel
- 2121 "P" St. NW
-
- The Working Group Against Information Redlining, a coalition of
- primarily Washington-based organizations concerned with low-income
- community access to the National Information Infrastructure (NII),
- and the Playing to Win Network of community technology centers invite
- you to join us on June 1, from 7:30 to 9:30 p.m. to exchange ideas
- and information on our efforts to ensure that the gap between the
- haves and have-nots is not replicated (much less widened) in the
- deployment of the Information Superhighway.
-
- At the meeting on June 1st, we will distribute information about the
- proposed community telecommunication forums and resources we are both
- planning. We will want to discuss with you your possible
- participation and your ideas about content and community needs.
-
- WHAT WE ARE ABOUT:
-
- Universal access has become a major concern in building the NII.
- Community-based non-profits in rural and disdvantaged areas lack
- affordable access to the information superhighway as well as a voice
- in the development of the content it will carry. Will the
- information be relevant to community needs? Will people have the
- capacities and resources to make use of it and be active
- contributors? If so, how will that be determined?
-
- There is growing interest in people speaking for and about low-income
- and other disenfranchised individuals. However, there is little in
- the way of these individuals speaking for themselves in order to
- shape the debate and policies in ways beneficial to them. In the
- long run, empowering affected populations to speak for themselves
- will be essential. Resources for using the NII are limited: when and
- where communities have come to understand the real opportunities this
- "highway" could open up for them -- access to education and
- educational resources, access to medical information and (potentially
- treatment), access to needed governmental information and benefits,
- training opportunities, job opportunities -- they don't have the
- resources (financial, human, or technical) to take advantage of what
- is already available. Capacity building will be an essential
- component even if the NII is technically designed to reach all
- people.
-
- Toward this end, the Working Group Against Information Redlining has
- been meeting on a monthly basis since May 1994. The groups
- participating -- OMB Watch, RTK NET (the Right-to-Know Network), the
- Benton Foundation, Alliance for Public Technology, Alliance for
- Community Media, the National Council of Nonprofit Associations, the
- National Trust for the Development of African American Men, the
- National Consumer Law Center and numerous others -- have developed a
- proposal for community forums on non-profit access to and use of the
- NII. The Playing to Win Network, consisting of over 50 neighborhood
- community technology programs, is currently planning a program
- focusing on using telecommunications to heighten participants'
- interest in and involvement with local, state, and national policies
- upon which their technology access rests.
-
- These community forums and center resource projects will be discussed
- at the June 1st gathering. For more information on the June 1st
- program or either project, contact:
-
- Patrice McDermott Peter Miller
- OMB Watch Playing to Win Network
- patricem@CapAccess.org ptwnd@igc.apc.org
- 202/234-8494 800/225-4276 x2727
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.34
-