home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed May 22, 1996 Volume 8 : Issue 38
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.38 (Wed, May 22, 1996)
-
- File 1-- FBI Releases Digital Telephony Wiretap Report
- File 2--CyberAngels Mission Statement and C.o.C (fwd)
- File 3--ACLU: GA Prohibits Web Links?
- File 4--Rough Draft: Guide for Organizing Online
- File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-)
- File 6--Job Position for Manager of Network Services
- File 7--Dutch Internet Hotline agains Child Pornography online (fwd)
- File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 21 May 1996 16:02:49 -0500
- From: "David Sobel" <sobel@EPIC.ORG>
- Subject: File 1-- FBI Releases Digital Telephony Wiretap Report
-
- Volume 3.10 May 21, 1996
-
- Published by the
- Electronic Privacy Information Center (EPIC)
- Washington, D.C.
- ================================================================
-
- The Federal Bureau of Investigation has finally released its
- long-overdue report on implementation on the controversial "digital
- telephony" wiretap statute. The report, which the FBI was legally
- required to release by November 30, 1995, was transmitted to Congress
- on April 11, 1996. EPIC had made several congressional inquiries
- concerning the FBI's failure to comply with the statutory reporting
- requirement.
-
- The bottom line: the digital telephony program is broke, which may
- explain the Bureau's tardiness in issuing the report. When Congress
- enacted the Communications Assistance to Law Enforcement Act (CALEA)
- in late 1994, it authorized $500 million to reimburse
- telecommunications carriers for the cost of retro-fitting their
- networks to facilitate electronic surveillance. Since that time, EPIC
- has led an effort to block the actual appropriation of those funds.
- To date, Congress has declined to make the money available. As the FBI
- report notes,
-
- No funding was appropriated in Fiscal Year 1995 for
- CALEA; therefore, no payments were made to telecommuni-
- cations carriers during the period October 1, 1994,
- through September 30, 1995 ...
-
- To date, no funding has been appropriated for Fiscal
- Year 1996 for payments to telecommunications carriers. ...
-
- Major switch manufacturers, upon whom telecommunications
- carriers must rely for most required technological
- solutions, have advised the FBI that timely development
- of interception features is technically feasible; however,
- the development and deployment of such features are
- directly dependent upon the availability of funding if
- the statutory deadlines are to be met.
-
- The wiretap budget battle will continue. The FBI is still trying to
- gain approval of $100 million for FY 1996, "to be generated through a
- surcharge on civil fines and penalties." The report also notes that
- "the President's Fiscal Year 1997 budget request proposes $100 million
- in funding for telephone carrier compliance through a direct
- appropriation."
-
- More information on digital telephony and wiretapping is available at:
-
- http://www.epic.org/privacy/wiretap/
-
- ------------------------------
-
- Date: Sun, 19 May 1996 16:17:55 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 2--CyberAngels Mission Statement and C.o.C (fwd)
-
- ---------- Forwarded message ----------
- Date--Sun, 19 May 1996 00:39:11 -0700
- From--CyberAngels Director --Colin Gabriel Hatcher <angels@wavenet.com>
- To--angels@wavenet.com
- Subject--CyberAngels Mission Statement and C.o.C
-
- CYBERANGELS MISSION STATEMENT
- v.2.0, May 1, 1996
- written by Colin Gabriel Hatcher, CyberAngels Director
-
- CyberAngels an all-volunteer Internet safety patrol and monitoring project
- started in June of 1995 by senior members of the world famous crime
- prevention organization, The International Alliance of Guardian Angels.
-
- CyberAngels membership unites more than 1000 users worldwide in 30
- countries, sharing a common mission: to be a Cyberspace Neighborhood Watch
- and to fight Internet crime.
-
- By being role models for self-regulation and responsibility, we are working
- hard to make the Internet a safer and more enjoyable place to work and
- play.
-
- We are dedicated to:
-
- FIGHTING CRIME ON THE INTERNET
- in particular criminal activity where there are clear victims and/or
- at-risk users.
-
- PROTECTING OUR CHILDREN FROM ONLINE CRIMINAL ABUSE
- by fighting against the trade in child pornography and by working to deter
- sexual predators online.
-
-
- SUPPORTING AND ADVISING ONLINE VICTIMS
- of hate mail, harassment, and sexual abuse by referring them to
- professional assistance, and helping guide them through the complaints and
- reporting processes.
-
-
- PROMOTING, PRESERVING, PROTECTING NETIQUETTE
- Netiquette is the collection of common rules of polite conduct that govern
- our use of the Internet. We believe in courtesy and respect for others. We
- support Internet Service Providers (ISPs) who have clearly defined Terms Of
- Service (TOS) for their users, and who are prepared and willing to enforce
- that TOS.
-
- HELPING PRESERVE INTERNET FREEDOM OF SPEECH
- by showing global governments that the citizens of the Internet Community
- are prepared and willing to take both the responsibility and the actions
- necessary to preserve their online personal safety, and in particular, the
- online safety of their children.
-
-
- CYBERANGELS CODES OF CONDUCT
- v.1.0, May 18, 1996
- written by Colin Gabriel Hatcher, CyberAngels Director
-
- 1) CyberAngels should not flame, neither in email nor in newsgroups.
-
- 2) At all times CyberAngels understand that they speak and act only for
- themselves and are fully responsible for their words and actions.
-
- 3) The CyberAngels Organization will acknowledge and defend you only if you
- act in accordance with our Mission Statement and with our Codes of Conduct.
-
- 4) CyberAngels should not use anonymous or pseudo-anonymous remailers to
- communicate with ISPs, Federal authorities or Law Enforcement, as the use
- of anonymity in these cases will undermine the credibility of your
- complaint or report.
-
- 5) CyberAngels should be courteous and respectful in their communications
- with others.
-
- 6) CyberAngels should phrase all complaints and reports as questions.
- Remember you are neither judge, jury nor executioner - you are a witness to
- a suspect and a possible crime.
-
- 7) CyberAngels should be capable of telling the difference between material
- or activity that may be crime evidence and material or activity that
- personally offends their morals or beliefs.
-
- 8) CyberAngels should always observe the Netiquette of whatever group or
- channel they are in.
-
- 9) CyberAngels should not spam replies, opinions or information.
-
- 10) CyberAngels should never use any form of electronic harassment, e.g.,
- mail-bombs, virii, spoofing mail headers, spamming etc.
-
- 11) CyberAngels should avoid humiliating suspects either in public or in
- private. Gloating over their impending arrest or taunting them with the
- Feds is unacceptable conduct.
-
- 12) All suspects are innocent until proven guilty.
-
- 13) All complaints and reports sent in to authorities by CyberAngels should
- maintain privacy and confidentiality. Reports are the business of the
- CyberAngel, the receiving authority and the CyberAngels Organization.
-
- 14) Remember:
- a) Headers can be spoofed (forged) on email and on Usenet postings.
- b) In live channels the user you are dealing with may not be the account
- holder of the access account.
- c) Impersonation is common in IRC / Live Chat
- d) Without crime evidence, it is just your opinion.
- e) Just because you don't like something, that doesn't make it criminal.
-
- 15) Sting operations (e.g. when you work undercover, masquerading as a
- pedophile in order to gather crime evidence) may obtain you crime evidence,
- but that evidence may later be ruled inadmissible in court, on the grounds
- that it was obtained by unlawful means. Study your country's / state's
- laws carefully on this matter, or contact your local law enforcement to
- discuss this.
-
- 16) No CyberAngel should offer child pornography images to trade, even if
- the purpose is to gather more crime evidence.
-
- 17) Received graphic files should be viewed before forwarding them to
- appropriate Internet Administration (e.g. the sender's Internet Service
- Provider) or Law Enforcement (e.g. US Customs or FBI). CyberAngels
- checking graphic files should follow the procedure below:
- a) Download and decode file to a floppy disk.
- b) View file and confirm your suspicions.
- c) Forward original file to relevant authorities.
- d) Reformat your floppy disk to permanently erase all trace of the
- downloaded file.
-
- If you are downloading to a Hard Drive, then after deleting the file you
- should erase your Hard Drive's free space, or reformat free space, so as to
- make the file unrecoverable.
-
- 18) CyberAngels should avoid storing archives of child pornography in any
- format whatsoever. If you store this material you run the risk of being
- accused of collecting it for your own personal use.
-
- 19) A CyberAngel may identify themselves publicly only if they support our
- Mission Statement and follow our Codes of Conduct.
-
- 20) In live channels like IRC or in the Live Chat areas of the big in-house
- providers like AOL, Compuserve and Prodigy, CyberAngels have the following
- 2 options when entering a channel:
- a) Identify yourself as a CyberAngel on patrol immediately.
- b) Say nothing about your being a CyberAngel.
-
- a) Identify yourself as a CyberAngel on patrol immediately.
- Advantage: everyone on the channel knows you are available to assist if
- there is a problem. Also you will act as an effective visual deterrent if
- a crime is about to take place.
- Disadvantage: In IRC if the Channel Op is hostile, then you will be
- immediately kicked off the channel. Also criminal activity will move
- somewhere else away from your eyes, so you will be unable to witness
- criminal activity. Also, once your userid becomes known, you will be
- unable to operate anonymously in the future.
- b) Say nothing about your being a CyberAngel.
- Advantage: Criminal activity is more likely to take place if no one knows
- what you are doing, therefore your ability to gather crime evidence will be
- enhanced.
- Disadvantage: Since no one knows who you are, no one can identify you
- immediately as someone offering assistance. Also CyberAngels gets no
- visibility if all its patrolling members are anonymous.
-
- 21) If suspected criminal activity, like child pornography trading, is
- observed in a live channel, CyberAngels have 4 options:
- a) Immediately identify yourself as a CyberAngel and ask the person to desist.
- b) Immediately notify an online channel guardian / sysop / host / guide to
- come and deal with the problem
- c) Remain silent and gather information / evidence, without requesting it,
- to report later to relevant authority.
- d) Participate in the activity, and masquerade as a pedophile, so as to
- infiltrate the operation.
-
- a) Immediately identify yourself as a CyberAngel and ask the person
- politely to desist.
- Advantage: You will rid the channel immediately of the problem. Also you
- will let others in the channel know you are there to help if needed.
- Disadvantage: Criminal activity will move and continue in a secret or
- private channel. In IRC you may even be kicked off the channel.
- b) Immediately notify an online channel guardian / sysop / host / guide to
- come and deal with the problem
- Advantage: Summoning the online administrators of a live area is always a
- good idea if you have a problem.
- Disadvantage: none.
- c) Remain silent and gather information / evidence, without requesting it,
- to report later to relevant authority.
- Advantage: You may get placed on a trading list of users on the channel as
- pictures are often spammed out, even if you don't personally request any,
- thus you will obtain crime evidence as other users trade in return and
- reply to all. This method of obtaining material is less likely to be ruled
- inadmissible later in court, as it was not unlawfully requested. You also
- avoid flames and hate mail and other harassment that may follow a public
- bust.
- Disadvantage: You may be mistaken for a pedophile yourself.
- d) Participate in the activity, and masquerade as a pedophile, so as to
- infiltrate the operation.
- Advantage: You can gain a lot of crime evidence and understanding of the
- operation if you infiltrate it.
- Disadvantage: You may be mistaken for a pedophile yourself. Also your
- evidence may be ruled inadmissible later in court.
-
- 22) All CyberAngels should keep logs of their activities, detailing logon
- and logoff times, channels / URLs / sites visited, with time of arrival and
- departure from sites, logs of suspicious conversations, postings and
- records of what, if any, actions were taken. CyberAngels may store headers
- from postings as reference, but should avoid storing graphic files that may
- be criminal to possess.
-
- 23) Copies of correspondence with all Authorities, relevant Usenet postings
- or email, should all be cc'd to angels@wavenet.com.
-
- 24) How does a CyberAngel decide what material or activity to complain about?
-
- When on patrol you should consider the following responses to material or
- activity that you witness:
- a) Harm
- b) Fear
- c) Distress
- d) Inconvenience
- e) Offense
- f) Concern
-
- These categories give you a ladder of responses to what you are finding.
- You may choose to complain about / report *anything* that causes you or
- others Harm, Fear, Distress, Inconvenience, Offense or Concern, regardless
- of whether it is criminal or not. The right to question what you see and
- to bring it to the attention of the proper authorities is your civil, legal
- and human right. In the USA this is Constitutionally protected.
-
- These are subjective judgments, based on the way you personally feel about
- what you see, or what happens to you. The fact that they are subjective in
- no way invalidates them. You have a right to your response.
-
- a) Harm - Harm is something that hurts you or another. On the Net it is
- not possible to physically harm someone, but you may still be a witness to
- harm. In the case of child pornography you are witnessing a record of harm
- done to a child when the picture was taken. A child has been sexually
- abused for the gratification of adults. So if you witness child
- pornography you are witness to a record of actual bodily harm - sexual
- abuse or child abuse.
-
- b) Fear - Fear means that you are witness to something that frightens you,
- that is puts you in fear for your physical or mental well-being. You may
- receive a death threat by email from someone who has located your home
- address; you may become aware of a child arranging a liaison with an adult
- online, and giving that adult personal information like the child's
- telephone number. You may fear that something will happen in the future.
-
- c) Distress - Hate mail causes distress. Distress means anything that
- makes you feel upset, e.g., makes you cry or feel like crying. A 13 year
- old Korean girl not long ago committed suicide as a result of hatred and
- abuse directed at her in IRC. Clearly she was distressed by what had
- happened to her online.
-
- d) Inconvenience - Inconvenience means your life is disrupted by some
- outside cause. All forms of electronic harassment cause inconvenience:
- having your account terminated for no reason, receiving a mail bomb or a
- virus, or having your mailbox filling up with spam. The emotion that goes
- with inconvenience is usually anger.
-
- e) Offense - There are plenty of things that you might come across on the
- Net that you may find offensive. With offense comes anger and outrage.
- Many people find all forms of pornography offensive, or some of the more
- bad taste newsgroups, or even someone's foul language. Christians find
- Satanists offensive, and vice versa. Offensive activity is more of a
- personal issue for you and your conscience, since it is very hard to
- objectively define "offensive".
-
- f) Concern - Concern is not usually the product of anger or distress.
- Concern means that you are worried about something, e.g. the easy access
- children have to pornography on the Net. If something concerns you, you
- should feel that you have a right to express your concern.
-
- The right and the choice to complain is yours. CyberAngels should aim to
- complain to the appropriate place. It is inappropriate for example to
- complain to the FBI because you are offended by someone cursing online.
- But you have every right to complain a) to the abuser and b) to the
- abuser's service provider. You might even choose to write a letter to your
- Senator or Congressperson, expressing your feelings about rudeness and foul
- language on the Net. The point is that you seek appropriate ways to
- express your feelings.
-
- 25) Whether any of the above categories are criminal in nature can not be
- decided by a CyberAngel, nor even by the Police. The determination of
- guilt or innocence can only be made by a court of law. This should be
- borne in mind when you are considering what to do and who to contact. Even
- if you have a good working knowledge of the relevant laws, and CyberAngels
- should educate themselves in this area, you are still not qualified to
- decide guilt or innocence.
-
- 26) If you decide to take a matter further, a CyberAngel should phrase a
- letter of complaint in the first person. It is far better to say "I
- believe this to be criminal" than to say "This is criminal". "I am
- offended" is better than "This is offensive". Own your own words.
-
- 27) The main focus of CyberAngel activity is on material and activities
- that are harmful, distressing and inconvenient. These are activities where
- there are real-life victims, i.e. people.
-
- 28) On the Internet people are free to do what they want. They are also
- free to take the consequences of their actions. Each user, whether they
- like it or not, is bound by the laws of the country they are logging in
- from. This fact applies to CyberAngels equally. CyberAngels have no
- special powers or privileges on the Internet.
-
- 29) All CyberAngels should recognize that we are a worldwide umbrella
- organization of people from many different cultures. We believe in and
- practise tolerance, and as long as our Mission Statement and Codes of
- Conduct are followed, we have no problem working together with people who
- in other respects have very different views from our own.
-
- 29) All CyberAngels should strive to be role-models for self-regulation and
- responsibility. In this way we seek to protect and preserve the very
- wonderful world that we inhabit, that we call Cyberspace or the Internet.
-
- =================================================
- Proposals to enhance, expand or revise these Codes of Conduct are welcome.
- Please send your feedback to angels@wavent.com
-
- Copyright Colin Gabriel Hatcher, May 18, 1996
-
-
- *********************************************************
- Colin Gabriel Hatcher - CyberAngels Director
-
- angels@wavenet.com
-
- http://www.safesurf.com/cyberangels/
- http://www.proaxis.com/~safetyed/CYBERANGELS/cyberangels01.html
-
- "All that is required for the triumph of evil is
-
- ------------------------------
-
- Date: Fri, 17 May 1996 10:12:50 -0700
- From: blackbox@BBOX.COM
- Subject: File 3--ACLU: GA Prohibits Web Links?
-
- Date--Thu, 16 May 1996 13:55:45 GMT
- From--ACLU.Newsfeed-Owner
- ----------------------------------------------------------------
- *Georgia Law Could Prohibit Web Links*
-
- Legislation recently signed into law by Georgia Governor Zell
- Miller is aimed at preventing fraud in cyberspace, but the
- Chronicle of Higher Education recently reported that critics say
- it could force developers of World Wide Web pages to remove links
- to other pages.
-
- The law, the Chronicle reported, makes it a crime to "falsely
- identify" oneself on the Net, or to direct people to someone else's
- computer without the other person's explicit permission.
-
- The ACLU said the Georgia law raises serious questions.
-
- "The Georgia law -- like the federal Communications Decency Act -
- - is just another example of legislators rushing to criminallize
- communication in the online medium before they even begin to
- understand how it operates," said Ann Beeson, an ACLU expert on
- cyberspace.
-
- "In the process," Beeson continued, "they have violated the free
- speech rights of cybercitizens and have drastically hindered a
- democratizing medium that enables people to communicate and share
- information around the world in a way never previously possible."
-
- ----------------------------------------------------------------
- ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE
- ----------------------------------------------------------------
- ACLU Freedom Network Web Page: http://www.aclu.org.
- America Online users should check out our live chats, auditorium
- events, *very* active message boards, and complete news on civil
- liberties, at keyword ACLU.
-
- ----------------------------------------------------------------
- ACLU Newsfeed
- American Civil Liberties Union National Office
- 132 West 43rd Street
- New York, New York 10036
-
- To subscribe to the ACLU Newsfeed, send a message to
- majordomo@aclu.org with "subscribe News" in the body of the
- message. To terminate your subscription, send a message to
- majordomo@aclu.org with "unsubscribe News" in the body of the
- message.
-
- For general information about the ACLU, write to info@aclu.org. -
-
- ------------------------------
-
- Date: Tue, 21 May 1996 09:15:38 -0700 (PDT)
- From: jonl@well.com
- Subject: File 4--Rough Draft: Guide for Organizing Online
-
- NOTE: This is a VERY incomplete initial draft on which a longer guide for
- creating local online organizations will be based. It's also very U.S.
- oriented in this version. If you have comments or suggestions, send to
- jonl@hotwired.com or jonl@well.com...
-
- Why organize locally/regionally? Why not join a national organization?
-
- Do join one or more national or international organizations, but organize
- locally, as well. Only local groups can monitor local politics "Freedom
- and Privacy" are local as well as national issues. Freedom can be
- threatened as readily on a muncipal as a state or national level, so it's
- as important to have a network of empowered activists organizing cities as
- it is to have activists working `inside the Beltway.'
-
- In fact, though some disaffected citizens imagine that a monolithic
- Federal government churns on ignoring the wishes of John Q. America,
- government tends to be a bottom-up proposition in the U.S. Most
- legislators really do listen to their constituents, and are sensitive to
- their input when they hear it. If we want `em to hear, we have to turn
- the volume up...the way you do that is to get numbers with faces, and get
- `em organized locally, so that the pols will see and hear them during
- home-turf visits. Beyond that, it wouldn't hurt (as Jerry Berman once
- advised me) to load a busfull of local activists and drive them to
- Washington to drop in on the legislative offices for the area's
- representatives.
-
- Distribution: Local groups create and (most important) maintain membership
- lists that are potential distribution nodes for evolving grassroots
- networks. This allows for hierarchical, moderated distribution of
- essential information from national sources, and for organization on a
- local level in the `think globally, act locally' mode.
-
- Board of Directors: Find 4-5 individuals who will commit to the
- organization and work to meet its goals. Find persons with skills you can
- use: attorney, system administrator, writer/editor, accountant. Establish
- a Board of Directors and Incorporate Take special care in creating your
- mission statement. Look at mission statements for groups like EFF and
- EFF-Austin Also look at bylaws and articles of incorporation for existing
- groups Articles of incorporation will include your mission. Here's
- EFF-Austin's:
-
- (a) to engage in and support educational activities that
- increase understanding of the opportunities and challenges posed by
- computing and telecommunications, and related civil liberties issues.
-
- (b) to foster a clearer social understanding of the issues
- underlying free and open telecommunications; and
-
- (c) to facilitate and encourage communication between
- individuals interested in computer and telecommunication
- technology and related social and legal issues.
-
- * Consider whether you want to apply for 501(c)3 classification so that
- donations to the group are tax deductible. This decision has pros
- (facilitates fund raising) and cons (501(c)3 corporations can't overtly
- lobby). EFF-Austin to date has not completed the paperwork for 501(c)3.
-
- * Find volunteers for core tasks within the BOD and membership base
-
- * In addition to officers, you need someone to handle public relations,
- someone to take responsibility for the membership database, and someone to
- handle the online presence
-
- * Establish an online presence
-
- * Find an ISP or other system that will provide a comp account
-
- * Set up an email list for members and interested persons
-
- * Set up aliases for the board of directors, advisory board, perhaps others
-
- * Create a web page
-
- * Include a membership form on the web page
-
- * Establish a membership base
-
- * Recruit members online and in meatspace.
-
- * Keep dues low
-
- * Offer value to members
-
- * Hold monthly BOD and membership meetings
-
- * Get to know your local police: EFF-Austin has a police liaison (Bruce
- Sterling). One of his jobs is to ensure that the police know who we are
- and will call us for consultation.
-
- * Get to know the press
-
- * Create focus events that are well-blurbed
-
- * Find cooperating attorneys
-
- * Talk to other like-minded groups
-
- * Minimize costs
-
- * Leverage computer-mediated communication
-
- * Know your enemies
-
- * Know your friends
-
- * Know your rights
-
- * Always challenge bad press
-
- * Always encourage good press
-
- * Take public positions
-
- --
-
- Jon Lebkowsky <jonl@wired.com> http://www.well.com/~jonl
- Electronic Frontiers Forum, 7PM PST Thursdays <http://www.hotwired.com/eff>
-
- ------------------------------
-
- Date: Sat, 18 May 1996 14:18:13 -0700
- From: Jim Warren <jwarren@well.com>
- Subject: File 5--Triumph of the Nerds, 3-hour PBS Jun.12th special (R-rated? :-)
-
- [Inflicted on you because you know me. Redistrib as desired.]
-
- Computer nerds and nerd-alikes might wish to mark June 12th on their calendars.
-
- PBS will air "Triumph of the Nerds" nationally on Wednesday, June 12th --
- as a 3-hour special that they will be promoting as *the* PBS event for
- June. The host is Infoworld's "Robt Cringely" (a pseudonym) and is based
- mo'less on his book, _Accidental Empires_, that discloses how many personal
- computing personalities stumbled into successes.
-
- In the show, Cringely interviews a number of microcomputing's "pioneers" --
- including Bill Gates ... and even li'l ol' me -- seeking candid insights
- and tales about the early daze <sic> of personal computing.
-
- The 3-hour premier show will include scenes that will *not* appear in later
- re-airings by various PBS stations, in snipped-down one-hour segments, nor
- will they be included in the "Nerds" videotapes that PBS will offer for
- sale.
-
- My understanding is that, among other things, the one-time-only showing
- will include some comments about Gates' notorious mid-1970s letter to
- editors accusing computer hobbyists of being thieves, pirating the
- life-blood of his little software company (i.e., duplicating the
- paper-tapes of Microsoft's first BASIC interpreter that -- if memory serves
- -- they were trying to sell for $350, for the MITS Altair 808-based
- computer kit that cost $395). Donno what other morstels will be included.
-
-
- NERDS IN THE NUDE
-
- Although the show was taped last fall, it follows a "tradition" later
- developed for pubic figures in the San Francisco Bay area:
-
- * In December, shortly before San Francisco's mayorial election, ex-police
- chief and then-Mayor Frank Jordan held a somewhat unusual photo-op. He was
- featured on front pages and teevee doing a nude shower interview with two
- local disk-jockeys. The shots were tastefully(?) clipped slightly above the
- jockey-shorts that Jordon was obviously not wearing.
-
- * Earlier this month, Stanford computer instructor and local
- microprocessor consultant/author/wizard John Wharton gained national fame
- as "Shower Man" when Dave Letterman chose him out of his Late Show audience
- to send to the showers -- broadcasting Wharton continent-wide,
- well-lathered in Letterman's shower where the show was produced during a
- week's visit in San Francisco.
-
- So ...
-
-
- When the "Nerds" producers first interviewed me last year, planning what
- they were going shoot with which of whom, I suggested doing the interview
- in my [large] hot tub -- on my redwooded San Francisco Peninsula ridgetop,
- overlooking about 100 miles of the Pacific.
-
- I mean, after *all* -- we Silicon Valley / Californica <sic> types *do*
- have our reputations to maintain.
-
- (Actually, I had more in mind doing the initial *off*-camera interview with
- the producer and very attractive assistant producer, who had properly
- oooh'ed and ahhh'ed over the ho'tub and vistas, as I was showing them
- around my mountaintop -- but that detracts from the story. :-)
-
-
- They discussed the idea and came back saying that Cringely would just
- *love* to do the ON-camera interview in the buff ... uh, in the ho'tub.
- (Woppps! -- my bluff was called.)
-
- I first said that I'd do it if all the video crew -- including, of course,
- the attractive assistant producer -- were also sans threads ... but it was
- a cool morning with wisps of fog flitting about, and for some strange
- reason they seemed disinclined, so I relented.
-
-
- Reasoned I: I *should* honor the origins of my [questionable claims] to
- such fame and accidental fortune. After all --
-
- * I never would have gotten into computing in 1968, had I not been looking
- for work ... after resigning (upon request) from chairing the Math Dept at
- the College of Notre Dame, a catholic girls' college where the nun who was
- President somehow felt that the huge nude parties I was convening at my
- mountain home, not far from the area's nude beach, were somehow
- incompatible with the philosophy of a Catholic girls' school -- especially
- after rumors about the events began to spread through the student body [so
- to speak] ... in a college where many of the parents appeared to be doing
- everying possible to delay daughters' becoming women long enough to marry
- them off.
-
- [Hey! -- remember ... those hippie '60s were different times, back when
- Newt was smokin' dope and Willie wasn't inhaling. And no, I did not make a
- practice of inviting my students, and not even one of the Sisters ever
- attended -- though some of the lay faculty joined in.]
-
- * And for the seven years that I ran the Computer Faires and
- InfoWorld-to-be -- or they ran me -- clothing was always optional around
- our mountaintop compound, and the pool and ho'tub were popular in slack
- times, often sans slacks (ahhh, to return to the girth of those times :-).
-
- [You shoulda seen the UPS delivery guy when he walked into the office one
- day, only to find my completely-tanned, voluptuous young bookeeper and me
- consulting in the all-together with my office manager -- whom he knew was
- also my bookeeper's mother, and my next-door neighbor and good friend! We
- just turned casually, smiled brightly, and pointed to the outgoing
- packages.]
-
-
- [Back on topic] So with their "Nerds" camera rolling, Cringely and I began
- chatting about ISDN versus Frame Relay ... and stripped to zip. Once in
- the ho'tub, in place of coy camera angles, I turned on the bubbles for
- strategic opacity ("Bubbles, Bob?", asked I :-).
-
- You'll have to watch PBS on June 12th to, uh, see the rest.
-
- Somehow, I suspect that Bellevue Bill's interview was probably conducted
- with more mundane "style" ... but who knows. Guess we'll just have to wait
- for the movie.
-
-
- And oh yes -- Cringely tells me:
-
- >The shows have already run in England to great acclaim (our tub scene was
- >especially popular). The series has also been sold to networks in Ireland,
- >Norway, Sweden, Iceland, Holland, Czech & Slovak Reps, Croatia, Hong Kong,
- >Singapore, Thailand, Taiwan, South Africa, British Airways (inflight), and
- >a couple of others I can't remember.
-
-
- I guess this will sorta blow my cover. :-) But then again, I'm not
- planning to run for office ... and I *am* a WYSIWYG sorta guy.
-
- --jim
- Jim Warren, GovAccess list-owner/editor, advocate & columnist (jwarren@well.com)
- 345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax/<# upon request>
-
- [puffery: John Dvorak Lifetime Achievement Award (1995); James Madison
- Freedom-of-Information Award, Soc. of Prof. Journalists - Nor.Cal. (1994);
- Hugh M. Hefner First-Amendment Award, Playboy Foundation (1994);
- Pioneer Award, Electronic Frontier Foundation (its first year, 1992);
- founded the Computers, Freedom & Privacy confs, InfoWorld; blah blah blah :-).]
-
-
- Hmmm, I wonder if ex-Mayor Jordon would like to come to my next nude party
- -- now that Willie Brown is Mayor. (Come to think of it though, by
- reputation, Willie would probably be the one more likely to attend. :-)
-
- ------------------------------
-
- Date: 21 May 96 09:57:04 -0500
- From: George_Wang-G11992@email.mot.com
- Subject: File 6--Job Position for Manager of Network Services
-
- Since I know that many readers of the CU digest are real
- network/computer "gurus" I thought I would see if there are any
- network experts there who beyond traditional system admin, has very
- strong "theoretical" networking skills in the "emerging" technologies
- such as ATM, FDDI, Cellular/Switched Packet Networks, Satellite,
- Cable, etc, etc.
-
- I work for Motorola University's Emerging Technologies Group and we
- are looking to find a Manager of Network Services who has very strong
- networking "design" skills to develop efficient network systems to
- distribute multimedia and other forms of training.
-
- If anyone is interested please email me at georgew@mot.com and I will
- send you the job description requirements. I don't think it's
- appropriate to add extra bandwidth to the digest for the description.
-
- Thanks,
- George
- Staff Engineer
- Motorola University
-
- ------------------------------
-
- Date: Sat, 18 May 1996 01:25:09 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 7--Dutch Internet Hotline agains Child Pornography online (fwd)
-
- ---------- Forwarded message ----------
-
- Dutch Internet Hotline Against Child Pornography
-
-
- As of today it is possible to report child pornography postings
- originating from the Netherlands to a special hotline,
- meldpunt@xs4all.nl.
-
- If you see any child pornography pictures on Internet, posted by a
- dutch user, then the hotline is the right place to report a complaint.
- We will warn the user about his posting, and ask him to cancel any
- illegal materials that where posted by him. If the warning is ignored,
- then the hotline will forward any available information to the
- vice-squad of the local police, so they can prosecute the distributor
- of child pornography pictures.
-
- If you spot a child pornography picture in a Usenet posting,
- then check the headers, especially the NNTP-Posting-Host:.
- If that header contains a domain-name adress that terminates on
- '.nl' then send us the headers of that message, so we can
- investigate the report.
-
-
- *** Reports can be sent to meldpunt@xs4all.nl ***
-
- More information about the hotline against child pornography on
- Internet can be found at: http://www.xs4all.nl/~meldpunt
-
- This hotline is a self-regulating Internet initiative by the foundation
- for Dutch Internetproviders (NLIP), the Dutch National Criminal
- Intelligence Service (CRI), Internet users, a psychologist and the National
- Bureau against Racism (LBR).
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.38
- ************************************
-
-
-