home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Thu May 25, 1995 Volume 7 : Issue 42
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Goddess of Judyism Editor: J. Tenuta
-
- CONTENTS, #7.42 (Thu, May 25, 1995)
-
- File 1--From EFFector Online 08.06--NEW Petition against Exon Bill!
- File 2--ACLU's Analysis of Revised Exon
- File 3--CTHEORY homepage - E-journal of Computer Culture Reviews
- File 4--Advertising on CuD? Say it isn't so...
- File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Mon, 22 May 1995 21:36:24 -0400
- From: editor@EFF.ORG
- Subject: File 1--From EFFector Online 08.06--NEW Petition against Exon Bill!
-
- CAMPAIGN TO STOP THE EXON/GORTON COMMUNICATIONS DECENCY ACT
-
- Update: -Bill is on the Senate floor
- -Please act to help Leahy stop the Exon censorship bill
-
- PETITION TO HELP SENATOR LEAHY STOP THE UNCONSTITUTIONAL
- COMMUNICATIONS DECENCY ACT
- May 19, 1995
-
- PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
- REDISTRIBUTE ONLY UNTIL June 9, 1995
- REPRODUCE THIS ALERT ONLY IN RELEVANT FORUMS
-
- Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
-
- ------------------------------------------------------------------------
-
- CONTENTS
- The Time Is Now
- Another Petition?
- What Is Sen. Leahy Proposing?
- How To Sign The Petition
- The Petition Statement
- Signing the petition from Fidonet or FTN systems
- For More Information
- List Of Participating Organizations
-
- ------------------------------------------------------------------------
-
- THE TIME IS NOW
-
- HELP SENATOR LEAHY STOP THE EXON COMMUNICATIONS DECENCY ACT
-
- The Senate is expected to on vote the Communications Decency Act (CDA,
- a.k.a. the Exon Bill) within the next three weeks.
-
- The Communications Decency Act, in its current form, would severely
- restrict your rights to freedom of speech and freedom of expression
- online, and represents a grave threat to the very nature and existence
- of the Internet as we know it today. Without your help now, the
- Communications Decency Act will likely pass and the net may never be
- the same again.
-
- Although the CDA has been revised to limit the liability of online
- service providers, it would still criminalize the transmission of any
- content deemed "obscene, lewd, lacivious, filthy, or indecent,"
- including the private communications between consenting adults. Even
- worse, some conservative pro-censorship groups are working to amend the
- CDA to make it even more restrictive.
-
- Currently, Senator Exon is negotiating with pro-censorship groups and
- commercial entities that would be affected by the CDA. The voices of
- Internet users must be heard now. We need to demonstrate that we are a
- political force to be reckoned with.
-
- In an effort to preserve your rights in cyberspace, Senator Patrick
- Leahy (D-VT) has introduced the only legislative alternative to the
- Communications Decency Act. Senator Leahy is willing to offer his bill
- as a substitute for the CDA, but needs your support behind his
- efforts.
-
- Senator Leahy's legislation would commission a study to examine the
- complex issues involved in protecting children from controversial
- content while preserving the First Amendment, the privacy rights of
- users, and the free flow of information in cyberspace.
-
- ------------------------------------------------------------------------
-
- ANOTHER PETITION?
-
- Yes. With a strong showing of support from the net.community, Senator
- Leahy can offer his bill as a substitute for the Communications Decency
- Act when the Senate votes on the issue later this month. Senator Leahy
- needs and wants to demonstrate to his colleagues in the Senate that the
- net.community is behind him in his efforts. We must rise to the task
- and demonstrate that we will not sit idly by as our rights are
- threatened.
-
- Senator Leahy, a strong civil liberties advocate, has been the Senate's
- most vocal critic of the Exon/Gorton Communications Decency Act, and
- has taken a leading role in defending the rights and civil liberties of
- Internet users. Senator Leahy has taken a great political risk in
- representing the interests of Internet users on Capitol Hill. The time
- has come for us to show our appreciation and our support for his
- efforts.
-
- The previous petition against the Communications Decency Act generated
- over 108,000 signatures, and was instrumental in Senator Leahy's
- decision to offer his alternative As the Senate moves to vote on the
- CDA, we must act quickly to ensure that our collective voice continues
- to be heard.
-
- ------------------------------------------------------------------------
-
- WHAT IS LEAHY PROPOSING?
-
- Senator Leahy's bill, S. 714, would direct the Department of Justice
- and the Department of Commerce to commence a 5 month study to examine:
-
- * Current law enforcement authority to prosecute the distribution of
- pornography over computer networks;
-
- * Whether any additional law or law enforcement resources are necessary;
-
- * The availability of technological capabilities, consistent with the
- First Amendment and the free flow of information in Cyberspace, to
- protect children from accessing controversial commercial and non-
- commercial content;
-
- * Ways to promote the development and deployment of such technologies.
-
- After conducting the study, the Justice Department must report to Congress
- on its findings, and, if necessary, recommend changes in current law.
-
- Leahy's bill represents the only substantive legislative alternative to the
- Communications Decency Act, and will buy important time to have a detailed
- and rational discussion about the issues involved in protecting children
- from controversial content, and avoid the rush to censorship which is
- occurring now on the Senate Floor.
-
- Without a strong show of support for Leahy's bill, the Communications
- Decency Act is very likely to pass.
-
- ------------------------------------------------------------------------
-
- WHAT CAN I DO?
-
- Please Sign the petition in support of Senator Leahy's alternative.
- There are two ways to sign:
-
- 1. World Wide Web:
-
- URL:http://www.cdt.org/petition.html
-
- Please follow all instructions carefully. Please also put a link
- to this page on your homepage.
-
- 2. email:
-
- send email to petition@cdt.org.
-
- Please provide the following information EXACTLY AS SHOWN.
- INCORRECT SUBMISSIONS CANNOT NOT BE COUNTED!
-
- Be sure that you make a carriage return at the end of each line
-
- Your Name
- Your email address
- Are you a US Citizen (yes or no) (** IF NO, skip to last line)
- Your Street Address (** USE ONLY ONE LINE)
- Your City
- Your State
- Your Zip Code (**VERY IMPORTANT)
- Country
-
- PRIVACY POLICY: Information collected during this campaign will not be
- used for any purpose other than delivering a list of signers to
- Congress and compiling counts of signers from particular states and
- Congressional districts. It will not be reused, sold, rented, loaned,
- or available for use for any other purpose. All records will be
- destroyed immediately upon completion of this project.
-
- --- sample email submission ---
-
- To: petition@cdt.org
- From: everybody@ubiquitous.net
- Subject--signed
-
- Every Body
- everybody@ubiqutious.net
- YES
- 1111 State Street, Apt. 31 B
- Any Town
- CA
- 94320
- USA
-
- --- sample email submission ---
-
- Multiple signatures will not be counted, so please only sign once.
-
- ------------------------------------------------------------------------
-
- THE PETITION STATEMENT
-
- We the undersigned users of the Internet are strongly opposed to the
- "Communications Decency Act" (Title IV of S. 652), which is currently
- pending before the Senate. This legislation will severely restrict our
- rights to freedom of speech and privacy guaranteed under the
- constitution.
-
- Based on our Nation's longstanding history of protecting freedom of
- speech, we believe that the Federal Government should have no role in
- regulating the content of constitutionally protected speech on the
- Internet.
-
- We urge the Senate to halt consideration of the Communications Decency
- Act and consider in its place S. 714, the "Child Protection, User
- Empowerment, and Free Expression In Interactive Media Study Bill", an
- alternative approach offered by Senator Patrick Leahy (D-VT).
-
- Signed:
-
- ------------------------------------------------------------------------
-
- SIGNING THE PETITION FROM FIDONET OR FTN SYSTEMS
-
- To sign the petition from FidoNet or other FTN systems, create a
- netmail message to your local UUCP host. Search the nodelist for the
- GUUCP flag, and use the address of that system:
-
- To: UUCP, [GUUCP system's address here. "To:" name MUST be set to UUCP]
- From: [you]
- Subject--signed
- _________________________________________________________________________
- To: petition@cdt.org
-
- Every Body
- everybody@ubiqutious.net
- YES
- 1111 State Street, Apt. 31 B
- Any Town
- CA
- 94320
- USA
-
- [Message starts on 3rd line. The second "To:" line with the internet
- email address MUST be the first line of the message body, and the blank
- line following that is REQUIRED. Mail will not be delivered by the gateways
- without it.]
-
- If you are unsure whether your FTN has an Internet gateway, or suspect it
- may use something other than a GUUCP nodelist flag, ask your network
- coordinators.
-
- ------------------------------------------------------------------------
-
- PETITION RATIONALE
-
- We oppose the "Communications Decency Act", sponsored by Senators James
- Exon (D-NE) and Slade Gorton (R-WA), for the following reasons:
-
- * It criminalizes the transmission of constitutionally protected speech,
- including the private communications between consenting individuals;
-
- * It would violate privacy rights by protecting system administrators
- who take steps to ensure that their networks are not being used to
- transmit prohibited content, even if those steps include reading all
- messages, in violation of the Electronic Communications Privacy Act
- (ECPA).
-
- * It fails to account for the unique characteristics of interactive
- media, including the tremendous control users have over the content
- they or their children receive.
-
- * It would give the Federal Communications Commission jurisdiction over
- online speech by giving the FCC authority to establish rules
- governing the distribution of content online;
-
- The Internet and other interactive communications technologies offer a
- unique opportunity for the free exchange of information and ideas, and
- embody the very essence of our nation's democratic traditions of
- openness, diversity and freedom of speech.
-
- As users of these technologies, we know perhaps better than anyone that
- there are other, less restrictive ways to protect children from
- controversial materials while preserving the First Amendment and the
- free flow of information.
-
- Senator Leahy's bill provides an opportunity to address the issues
- raised by the Communications Decency Act without restricting the free
- speech and privacy rights of users.
-
- ------------------------------------------------------------------------
-
- FOR MORE INFORMATION
-
- Petition updates will be posted to appropriate newsgroups and other
- forums on a regular basis.
-
- To have the latest status report sent to you automatically, send email
- to: p-update@cdt.org
-
- If you have specific questions, or if you are interested in mirroring
- the petition page, contact Jonah Seiger <jseiger@cdt.org>
-
- Other petition related information can be found on the CDT petition
- page.
-
- URL:http://www.cdt.org/petition.html
-
- For More information on the Communications Decency Act issue:
-
- Web Sites
-
- URL:http://www.cdt.org/cda.html
- URL:http://www.eff.org/pub/Alerts/
- URL:http://www.panix.com/vtw/exon/
-
- FTP Archives
-
- URL:ftp://ftp.cdt.org/pub/cdt/policy/freespeech/00-INDEX.FREESPEECH
- URL:ftp://ftp.eff.org/pub/Alerts/
-
- Gopher Archives:
-
- URL:gopher://gopher.eff.org/11/Alerts
- URL:gopher://gopher.panix.com/11/vtw/exon
-
- Information By auto-reply email:
-
- If you don't have www/ftp/gopher access, you can get up-to-date
- information from the following autobots:
-
- General information on the CDA issue cda-info@cdt.org
- Current status of the CDA issue cda-stat@cdt.org
- Chronology of events of the CDA issue vtw@vtw.org with the
- subject "send events"
-
- -----------------------------------------------------------------------
-
- LIST OF PARTICIPATING ORGANIZATIONS
-
- In order to use the net more effectively, several organizations have
- joined forces on a single Congressional net campaign to stop the
- Communications Decency Act.
-
- In alphabetical order:
-
- Californians Against Censorship Together BobbyLilly@aol.com
- Center For Democracy And Technology (CDT) info@cdt.org
- Electronic Frontier Foundation (EFF) info@eff.org
- Feminists For Free Expression (FFE) FFE@aol.com
- Florida Coalition Against Censorship pipking@mail.firn.edu
- Hands Off! The Net baby-x@phanton.com
- Inner Circle Technologies, Inc. aka. NovaLink
- League for Programming Freedom lpf@uunet.uu.net
- National Libertarian Party 73163.3063@compuserve.com
- Marijuana Policy Project MPProject@AOL.com
- MindVox system@phantom.com
- National Public Telecomputing Network (NPTN) info@nptn.org
- National Writers Union (UAW Local 1981 AFL-CIO) kip@world.std.com
- Panix Public Access Internet info@panix.com
- People for the American Way jlessern@reach.com
- Society for Electronic Access sea@sea.org
- The WELL info@well.com
- Voters Telecommunications Watch (VTW) vtw@vtw.org
-
- If you would like to add your organization to this list, contact Shabbir
- Safdar at VTW <shabbir@vtw.org>
-
- ------------------------------
-
- Date: Thu, 25 May 1995 16:49:42 -0400
- From: ACLUNATL@AOL.COM
- Subject: File 2--ACLU's Analysis of Revised Exon
-
- ACLU Cyber-Liberties Analysis:
- Revised Exon Amendment
- May 25, 1995
- ----------------------------------------------
-
- The American Civil Liberties Union has previously expressed its strong
- opposition to the "Communications Decency Act," introduced by Senator Exon as
- S. 314 and adopted by the Senate Commerce Committee as an amendment to
- the Telecommunications Competition and Deregulation Act of 1995.
-
- Yesterday, we obtained a revised version of the Exon Amendment, which
- was apparently written by members of Senator Exon's staff in
- consultation with representatives of online service providers, the
- Department of Justice, and pro-censorship lobbying groups. The
- following analysis presents the ACLU's objections to the revised draft
- and clarifies the ACLU's continuing concern that the Exon amendment,
- in its existing or revised form, violates both free speech and privacy
- rights.
-
- I. Interactive Cyberspace Must Not Be Constricted by Old Media Models
-
- The most fundamental flaw of the revised Exon amendment is that it
- still wrongly attempts to force the new interactive environment of
- cyberspace and online services into the censorship straitjacket
- foisted on old media. In fact, the Exon amendment even uses as its
- model the most restrictive of the old media.
-
- This is wrong-headed policy. It is also a violation of the Free Speech
- and Privacy guarantees of the Constitution and therefore
- unconstitutional.
-
- The Exon amendment would make the interactive environment one of the
- most censored segments of communications media when logic dictates
- that cyberspace, with its emphasis on user-choice and user-control,
- should make it the least censored. At a minimum, the extremely
- limited rules of content-regulation for print media, and the
- safeguards against censorship for print materials, should be applied
- to online communications. The ACLU, moreover, believes that the
- characteristics of cyberspace, including the private and interactive
- nature of the communication, dictates that cyberspace should be even
- more free than print.
-
- We stress that there is no revision of the Exon amendment -- no
- tinkering of its censorship provisions -- that eliminates this
- problem. The Exon amendment cannot be "fixed." It must be rejected.
-
- II. The Exon Amendment Would Still Restrict Online Communications to
- Those Appropriate for Children
-
- Section (d) of the revised Exon amendment would still
- unconstitutionally restrict all online content to that which is
- suitable for children.
-
- Even under existing case law, non-obscene speech that is deemed
- "indecent" is protected by the First Amendment. _Sable Communications
- v. FCC_, 492 U.S. 115 (1989). The Government may only regulate
- indecent speech if it establishes a compelling governmental interest
- in the regulation AND narrowly tailors the restriction to achieve that
- interest. _Id._ at 125. See also _Pacifica Foundation v. FCC_, 438
- U.S. 726 (1978); _Carlin Communications v. FCC_, 749 F.2d 113 (2d
- Cir. 1984) (Carlin I); _Carlin Communications v. FCC_, 787 F.2d 846
- (2d Cir. 1986) (Carlin II); _Dial Information Services v. Thornburg_,
- 938 F.2d 1535 (2d Cir. 1991).
-
- Indeed, much of what consenting adults prize about some of their
- personal communications could well be deemed by outsiders as
- "indecent" if addressed to a child.
-
- The revised draft, like the original Exon amendment, is
- unconstitutional because requiring users and content providers to
- reduce their content to what is suitable for children is not the least
- restrictive means for protecting minors from indecent material. The
- "justifications" for regulation of indecency in broadcasting and
- telephone audiotext services do not apply to interactive
- communications, in which users - including parents - have much more
- control over the content of the messages they receive. We are also
- prepared to argue that the "justifications" asserted for censorship in
- any of the old media, including print, do not apply to cyberspace.
-
- III. Some Specific Problems in the Revised Exon Draft
-
- Again, the ACLU strongly believes that the anti-cyberliberty Exon
- amendment cannot be "fixed." It needs to be defeated. So, even if
- all of these specific problems were solved, the Exon amendment would
- still be a terrible idea. Still, it may be useful to consider briefly
- some of the specific problems in the revised Exon draft.
-
- *Revised section (d) outlaws the online transmission of obscene
- materials without defining "obscenity." Using the test for obscenity
- articulated in Miller v. California, 413 U.S. 1 (1973), the federal
- government has chosen to stage prosecutions of online obscenity cases
- in conservative jurisdictions in order to take advantage of more
- restrictive "community standards." See Thomas v. United States, U.S.
- Court of Appeals for the Sixth Circuit, No. 94-6648 and No. 94-6649.
- This trend poses a severe threat that online users and providers will
- be forced to reduce content to that which would be acceptable under
- the "community standards" of the most conservative jurisdiction. The
- ACLU has filed an amicus brief in the Thomas case strongly opposing
- the government's misuse of the censorship laws.
-
- *Revised sections (d) and (e) extend liability for transmission
- of obscene or indecent communications to non-commercial in addition to
- commercial providers. This change would render the revised draft more
- restrictive of free speech than the original Exon amendment.
-
- *While revised section (f) provides some defenses for online
- service providers, these defenses place smaller system operators at
- risk because they cannot afford to assert the defenses in court.
- Moreover, the defenses are incomplete and many larger service
- providers would likely find themselves in jeopardy at the hands of
- prosecutors motivated by the political advantages of currying favor
- with certain pro-censorship groups.
-
- *Revised section (f)(2) fails to protect providers who cede
- editorial control to an entity "which the defendant knows or had
- reason to know intends to engage in conduct that is likely to violate
- this section." This could pose serious problems for Internet
- providers that may have "reason to know" that certain sites are likely
- to contain communications deemed to be obscene or indecent.
-
- *Revised section (f)(3) gives the Federal Communications
- Commission the power to issue regulations regarding methods in which
- providers may restrict access in order to avoid liability. Giving
- federal regulators the authority to determine the rules for
- distributing online content will radically affect the freedom of
- cyberspace and will have a severe direct effect and an equally severe
- chilling effect on online speech.
-
- *Revised section (f)(4) could still make it impossible for users
- or content providers to remedy a violation of rights by an online
- service provider if the service claimed it was attempting to comply
- with the Exon amendment.
-
- Conclusion
-
- The revised Exon draft continues to subject an industry that has
- blossomed without government control to an unprecedented amount of
- interference and intrusion over content. It gravely threatens the
- free flow of information and the diversity of content transmitted over
- online networks.
-
- To achieve the liberating potential of the information superhighway,
- Congress must ensure that interactive technologies enhance rather than
- stifle democratic values.
-
- The American Civil Liberties Union therefore opposes the Exon
- amendment, both in its original form and as revised.
- -------------------------------------------------
-
- ACLU Free Reading Room
- gopher://aclu.org:6601
-
- **NEW** ACLU Constitution Hall on AmericaOnline: keyword ACLU
-
- ------------------------------
-
- Date: Sat, 6 May 1995 15:12:31 -0500
- From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 3--CTHEORY homepage - E-journal of Computer Culture Reviews
-
- ((MODERATORS NOTE: We came across the following homepage that
- journalists, academics, and other researchers might find useful.
- You can access at the www site listed, or you can access it
- through the CuD homepage at http://www.soci.niu.edu/~cudigest))
-
- CTHEORY is an international, electronic review of books on theory,
- technology and culture. Sponsored by the Canadian Journal of
- Politicaland Social Theory, reviews are posted periodically of key
- books incontemporary discourse as well as theorisations of major
- "event-scenes"in the mediascape.
-
- You may also view CTHEORY by volume.
- _________________________________________________________________
-
- ARTICLES
- * Americans Have No Identity, But They Do Have Wonderful Teeth, Jon
- Epstein.
- * Cyberwar, God And Television: Interview with Paul Virilio, Louise
- Wilson.
- * Digital City, Amsterdam, Shuschen Tan.
- * European Borders: History Of Space / Space Of History, J. Peter
- Burgess.
- * From False Consciousness To Viral Consciousness, Dianne Rothleder.
- * Gay Life/Queer Art, Fredrick Corey.
- * Hystericizing the Millennium, Jean Baudrillard.
- * Infobahn Blues, Robert Adrian.
- * The Kafka Chronicles Excerpt, Mark Amerika.
- * The Information War, Hakim Bey.
- * Kate Bornstein: A Transgender Transsexual Postmodern Tiresias,
- Shannon Bell.
- * The Language Of The Body, Kathy Acker.
- * Nietzsche at the Mall: Deconstructing the Consumer, Daniel R.
- White and Gert Hellerick.
- * No Reprieve For Sarajevo, Jean Baudrillard.
- * Pataphysics of Year 2000, Jean Baudrillard.
- * The Political Economy Of Virtual Reality: Pan-Capitalism, Arthur
- Kroker and Michael A. Weinstein.
- * Reversion of History, Jean Baudrillard.
- * Rise Of The Void Towards The Periphery, Jean Baudrillard.
- * Stories From The Bloodhut, Cynthia Meier, Kim Lowry, Lori Scheer,
- Jamie Lantz, Rhonda Hallquist,and Audrey Joy.
- * Strike Of Events, Jean Baudrillard.
- * The Technology Of Uselessness, Critical Art Ensemble.
- * Thawing Of The East, Jean Baudrillard.
- * Useless Technology, Critical Art Ensemble.
- * Venus In Microsoft: male mas(s)ochism and cybernetics, Stephen
- Pfohl.
-
- EVENT-SCENES
- * Autopsy Of A Non-Event: The German Election, Dirk vom Lehn.
- * Catastrophe Field: The LA Quake, David Cook.
- * Declaration For A Free And Unified Sarajevo, City Assembly of
- Sarajevo.
- * Death Is Dead, m-angle-angel.
- * The Hyper-Texted Body, Or Nietzsche Gets A Modem, Arthur Kroker
- and Michael Weinstein.
- * The Media Gesture Of Data Dandyism, Geert Lovink.
- * Michael Jordan Mogadishu, Arthur Kroker.
- * The Murder Trial: Genre Or Event-Scene?, Anita Brenner.
- * The One Idea System, Ignacio Ramonet.
- * Speed(racing): Ecstasy And Fascination, Javier Santiago-Lucerna.
- * Taiwan Data Heaven, Arthur Kroker.
- * Turkish (Retro-Fascist) Olympics, Michael A. Weinstein.
- * U/R, Mark A. Lunt.
-
- REVIEWS
- * Auto-Eulogy For The Citizen-Activist, Richard DeLaurell.
- Chantal Mouffe, ed. Dimensions of Radical Democracy:
- Pluralism,Citizenship, Community
- * Baudrillard's Remainder, Andrew Wernick.
- Jean Baudrillard, The Transparency Of Evil: Essays On Extreme
- Phenomena
- Mike Gane, ed., Baudrillard Live: Selected Interviews
- * A Cartesian View From Nowhere, Ken Hillis.
- Barbara Maria Stafford, Body Criticism: Imaging the Unseen in
- Enlightenment Art and Medicine
- * Celebrity As Simulacrum, Deena Weinstein.
- Joshua Gamson, Claims To Fame: Celebrity In Contemporary America
- * The Cinemachine, m-angle-angel.
- Steven Shaviro, The Cinematic Body
- * Describing Writing Describing, Ellen Zweig.
- Alberto Perez-Gomez, Polyphilo, or The Dark Forest Revisited
- * Detournement For Fun And [Political] Profit, W. Ted Rogers.
- Sunil Gupta, ed. Disrupted Borders: An Intervention In Definitions
- Of Boundaries.
- * Review: Digitaler Schein, Geert Lovink.
- Florian Roetzer, ed., Digitaler Schein, Aesthetik der
- Electronischen Medien
- * Diplomatics, J. Peter Burgess.
- James Der Derian, Antidiplomacy: Spies, Terror, Speed, and War
- * Draculaland, m-angle-angel.
- subREAL, Draculaland
- * Drug Hysteria: U.S.A., Critical Art Ensemble.
- John Strausbaugh and Donald Blaise, eds., The Drug User: Documents
- 1840-1960
- * Farewells To American Culture, Work And Competition, David Cook.
- Lester Thurow, Head To Head
- Robert B. Reich, The Work Of Nations
- John Kenneth Galbraith, The Culture Of Contentment
- * Farewells To Justice, God, Politics And The European Way, David
- Cook.
- Heinrich Boll, Women In A River Landscape
- Albert Camus, The Fall
- Friedrich Durrenmatt, The Execution Of Justice
- Graham Greene, Dr. Fischer Of Geneva Or The Bomb Party
- * Feminism and Post (19th Century) History in Eastern Europe, Alexis
- Gosselin.
- Barbara Einhorn, Cinderella Goes to Market: Citizenship, Gender
- and Women's Movements in East Central Europe
- * Foucault's Virtual Passion, Hart Murphy.
- James Miller, The Passion of Michel Foucault
- * Fractured Flesh, Ken Hillis.
- Scott Bukatman, Terminal Identity: The Virtual Subject in
- Post-Modern Science Fiction
- * Review: Hard War/Soft War, Geert Lovink.
- Martin Stingelin and Wolfgang Scherer, eds., Hard War/Soft War,
- Krieg Und Medien
- * John Rawls: A Calvinist After-Image, Michael Weinstein.
- John Rawls, Political Liberalism
- * The Last Camus, David Cook.
- Albert Camus, Le premier homme
- * Lenin In Ruins, Alexis Gosselin.
- David Remnick, Lenin's Tomb: The Last Days of the Soviet Empire
- * Live Aronowitz: Dead Theories, David Cook.
- Stanley Aronowitz, The Politics of Identity
- Stanley Aronowitz, Roll over Beethoven
- Stanley Aronowitz, Dead artists: Live theories
- * Modernity, Postmodernity, Social Marginality, Kenneth Mostern.
- Phillip Bryan Harper,Framing the Margins: The Social Logic of
- Postmodern Culture
- Paul Gilroy, The Black Atlantic: Modernity and Double
- Consciousness
- * Neither Liberal Nor Communitarian: Feminism, Political Theory,
- Possibility, LeonardWilliams.
- Elizabeth Frazer And Nicola Lacey, The Politics Of Community: A
- Feminist Critique Of The Liberal-Communitarian Debate
- * Review: On Justifying The Hypothetical Nature Of Art, Geert
- Lovink.
- Robert Fleck, ed., On Justifying The Hypothetical Nature Of Art
- And The Non-Identicality Within The Object World
- * A Poet's Eye View Of The Uncommon Market, Tom P. Abeles.
- Jacques Darras, Beyond the Tunnel of History
- * Post Panoptic Mirrored Worlds, Kimberly Anne Sawchuk.
- David Gelertner, Mirror Worlds; or the day software puts the
- universe in a shoe box...how it will happen and what it willmean
- * Public Policy Of Eugenics, Eileen Manion.
- Christine Overall, Human Reproduction: Principles, Practices,
- Policies
- Gwynne Basen, Margrit Eichler, Abby Lippman, eds., Misconceptions:
- The Social Construction of Choice and the New Reproductive
- Technologies,Volume One
- * The Revolution Will Be Televised, W. Ted Rogers.
- Richard Stivers, The Culture of Cynicism: American Morality In
- Decline
- * RU Wetware?: Television as Cybernetics, Arthur Kroker.
- Tony Fry, ed., RUATV? Heidegger And The Televisual
- Geert Lovink and Rik Delhaas, eds., Wetware
- * The Spectacle Of Secrecy, Len Bracken.
- Guy Debord, Treatise on Secrets: Commentaires sur la societe du
- spectacle
- * Stolen Childhoods Redreamed, Stephen Pfohl.
- Kathy Acker, My Mother: Demonology, A Novel
- * Textual Power, Robert Moskal.
- Gunnar Olsson, Lines of Power/Limits of Language
- * Two Instances of Musical Postmodernism in Britain, Steve Gibson.
- his name is alive, Mouth By Mouth
- Gavin Bryars, Jesus' Blood Never Failed Me Yet
- * We Go Round and Round in the Night and Are Consumed by Fire,
- Stephen Pfohl.
- Guy Debord, In Girum Imus Nocte Et Consumimurm Igni: a Film
- * Will The Opposable Thumb Become The Appendix Of The Future?, Tom
- Abeles.
- Kevin Kelly, Out of Control
-
-
- _________________________________________________________________
-
- CTHEORY is published with the assistance of the Dean of Arts and
- Scienceand the Department of Political Science, Concordia University,
- Montreal,Canada. The World Wide Web edition is made available through
- the kindassistance of the members of the English Server Collective at
- CarnegieMellon.
-
- Editors: Arthur and Marilouise Kroker, <ctheory@vax2.concordia.ca>
-
- Editorial Board: Kathy Acker, Jean Baudrillard, Bruce Sterling,
- DavidCook, Berkeley Kaite, William Leiss, Geert Lovink, EileenManion,
- Hans Mohr, Alberto Perez-Gomez, Stephen Pfohl, Andrew Ross,
- KimSawchuk, Deena Weinstein, Michael Weinstein, AndrewWernick, Gail
- Valaskakis.
-
- Editorial Assistant: Michael Boyle
- Artists in Residence: STELARC (Australia), Art in Ruins (UK), Mark
- Lewis(Canada), subReal (Romania), Critical Art Ensemble (USA)
- World Wide Web Editor: Carl Steadman, <carl@cdtl.umn.edu>
- CD-ROM/Multi-Media Editor: Steve Gibson
-
-
- The disk (DOS/Mac) version of CTHEORY may be ordered from CJPST,
- Concordia University, 1455 de Maisonneuve, O., Montreal, Canada,
- H3G1M8. Institutional orders may be placed through UMI, Ann Arbor,
- Michigan.
-
- CTHEORY is indexed in International Political Science
- Abstracts/Documentation politique international, Sociological
- AbstractInc., Advance Bibliography of Contents: Political Science
- andGovernment, Canadian Periodical Index, and Film and Literature
- Index.
- _________________________________________________________________
-
- 5 March 1995
- Carl Steadman / <carl@cdtl.umn.edu>
-
- ------------------------------
-
- Date: Thu, 25 May 1995 11:19:34 -0500 (CDT)
- From: jerryw@IMAGINE.CONVEX.COM(Jerry Whelan)
- Subject: File 4--Advertising on CuD? Say it isn't so...
-
- I just read the latest CuD (7.41) and had to wonder about the O'Reilly
- press release. O'Reilly is generally a good netizen, but I don't see
- how their $500 web server has much to do with the topics that that CuD
- deals with. After all, I don't remember seeing Netscape's press release
- for their servers in the CuD...
-
- ===========
-
- ((MODERATORS' RESPONSE: Jerry Whelan raises a legitimate point that
- deserves an answer. CuD policy is to try to run articles that we
- believe are of interest to the dramatically diverse readership.
- Sometimes, these are promotional posts. Most promos are inappropriate.
- But, in some cases, and O'Reilly is one of them, there is interest in
- what they're doing, whether a promo or not. O'Reilly puts out the
- best line of Unix texts around, and that, coupled with the generally
- informative nature of much of their promo material, makes many of
- their promos newsworthy.
-
- We should point out that we have run promos for web browsers,
- such as Slipknot. We haven't run Netscape because they have
- not provided us with any information.
-
- We agree with Jerry's concern that there is no place for blatant
- hucksterism in CuD, and we thank him for helping us try to maintain
- the delicate balance while walking that thin line between readership
- interest and inappropriate commercialism.
-
- For the cynics, no, CuD receives no compensation of any kind for
- run promos or any other post.))
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.42
- ************************************
-
-