home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue Jul 23, 1996 Volume 8 : Issue 55
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.55 (Tue, Jul 23, 1996)
-
- File 1--(fwd) lecture about internet and censorship (fwd)
- File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
- File 3--Online Dispute Resolution, etc. (fwd)
- File 4--Re: Response to CUD re: selling wind
- File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
- File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
- File 7--(Fwd) $50K Hacker challenge
- File 8--Access control, Censorship, and Precision
- File 9--Computer Literacy Bookshops events
- File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sun, 9 Jun 1996 13:26:59 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--(fwd) lecture about internet and censorship (fwd)
-
- This is a speech on internet censorship given by the managing director of
- the Dutch Internet Service Provider which created the child pornography
- "hotline" that I forwarded about a month ago.
-
- ---------- Forwarded message ----------
- From--felipe@xs4all.nl (Felipe Rodriquez)
- Date--8 Jun 1996 17:29:50 GMT
-
- A lecture i gave at the international liberals congress:
-
-
- Hello,
-
- I am Felipe Rodriquez, Managing director of Xs4all Internet, a mayor
- dutch provider, and Im also chairman of the dutch foundation of
- internet providers.
-
- I was asked to do a short lecture about Internet and censorship.
-
- Internet is an emerging market, and at the same time an exciting new
- social environment. A space of communications between people of
- different nations, with different habits, traditions and legal codes.
-
- Internet is a place without borders. Information travels from one
- country to another in a split second. From here to the United States it
- takes 100 milliseconds. To Japan the information travels within 300
- milliseconds. Nicaragua takes 250 milliseconds and to Australia it
- takes the bits and bytes 400 milliseconds. Information crosses many
- borders on its path to the final destination.
-
- This challenges the concept of regionally defined cultures. The world
- becomes a global village of many cultures. Those cultures are not
- necessarily confined to a certain region or location. They are on the
- Net, and thus independent of location.
-
- The environment and conditions on the Net change quickly. New
- possibilities of communicating with other people emerge on an almost
- daily basis. Today people can sound-talk over the Internet, play games
- together, send pictures, send video transmissions, radio et cetera.
- Never before have people been communicating so massively, on an
- intenational scale. Every person is a medium that generates network
- traffic.
-
- This mash of global cultures, all communicating with eachother, creates
- a culture shock. Every culture has its own traditions and codes, and
- naturally tries to protect and nurture these values.The traditional way
- of protecting ones culture and traditions has always been through
- legislation and social control. It is legislation that now threatens
- most of the worldwide cultures on Internet.
-
- Legislation on Internet is a slippery road. A communication technology
- on this scale is a new concept. It is difficult to legislate a global
- social environment. The main problem is the fact that countries try to
- legislate a global environment through their own culturally defined
- moral codes.
-
- Different things are allowed in different countries. In the US it is
- allowed to make racist comments, in Holland it is not. So you see a
- migration of the information that dutch neo-nazi groups put on the
- Internet. Vice versa the United States has strict laws against
- obsenity, that are much more tolerant in Holland. Now you see a
- migration of pornographic material towards Holland. From both countries
- the information is published on a world wide scale. Implementation of
- law for Internet should include a harmonisation of some kind in the
- area of international legislation.
-
- The United States has implemented the Communications Decency Act. This
- law defines unacceptable speech on Internet. You can be criminally
- prosecuted for saying the word fuck or other indecent words, if you are
- an American. Anything indecent is being supressed. This proves to be a
- law that is impossible to uphold.
-
- The United States government webservers violate the Communications
- Decency Act. On the White House webserver there is a picture of a
- painting that is displayed. The painting shows a family of a mother
- with her two children. One of the children is nude. According to the
- Decency Act it is forbidden to display this image on the Internet.
- There are similar examples on other government systems in the US.
-
- This communications decency act is now being challenged as being
- unconstitutional by a group of organisations on Internet that has more
- than 40.000 supporters.
-
- Other countries like China, Vietnam and Saudi Arabia have even stricter
- guidelines for Internet. No one can use the Internet without prior
- government permission. These governments introduce strict control on
- the gateways that connect them to the Net. These countries are afraid
- that Internet will give their citizens access to information against
- their government and political structure. The Internet is too
- democratic for them.
-
- Germany had ordered Compuserve to block off all groups about sex, and
- Compuserve then had no other way to shut these groupsdown worldwide.
- Eventually the german ambassador had to explain this action to
- President Clinton. A local law was influencing cultures in other
- countries.
-
- France arrested two internet-providers a couple of weeks ago. They
- where held responsible for the publication of child-pornography that
- was foumd on the Net. They did not distribute it themselves, but it was
- available somewhere on Internet. After global concern, the french
- minister of Interior admitted the arrests where a mistake, and that the
- providers could not be held liable.
-
- Prudence is needed because experience must first be aquired. You cannot
- legislate something you do not know anything about, but it happens
- everywhere on Internet. Resulting in unworkable situations, and
- repression of the people and the market.
-
- Many problems on Internet can be dealt with today. One of those
- problems is Child Pornography. In Holland we have started a hotline
- against child pornography on Internet. If we get a report about a dutch
- user that is transmitting child-pornography, then we send him a
- warning. If that does not stop him, we report that user to the police.
- The user gets his chance to test the legal system. The hotline does not
- censor, it warns and reports. This project is a cooperation between
- the foundation of dutch internetproviders, the dutch criminal
- intelligence agency, a psychologist, a couple of internet users and the
- national bureau against racial discrimination. The hotline is based on
- existing law, and proves that no extra law is needed to fight
- child-pornography on Internet. Im a firm believer of first trying all
- the intruments that the existing legislation has to offer. Why bother
- about new laws if existing rules are sufficient ?
-
- One of the common concerns is the availabality of obscene and violent
- information to children. This is the main argument in the United Stated
- to impose strict rules for the Net. But there are already techniques
- that can protect children from seeing any these materials. There is
- software that is especially made for the purpose of creating a safe
- Internet. There is a demand from the market to create these programs,
- and thus they are created.
-
- Protection of the children on the Net is not a government task, but an
- educational task of the parents of the children. Instead of regulating
- a worldwide network one could also think of imposing an age limit.
-
- Pridence is needed to find solutions for these new problems. Business
- can only thrive in a stable environment. And rushing in all kinds of
- repressive measures is not a stabilising factor. It is often easier to
- impose new legislation, than it is to repair old bad legislation.
-
- Thank you !
-
-
-
- --
- Felipe Rodriquez - XS4ALL Internet - finger felipe@xs4all.nl for
- http://xs4all.nl/~felipe/ - Managing Director - pub pgp-key 1024/A07C02F9
-
- pgp Key fingerprint = 32 36 C3 D9 02 42 79 C6 D1 9F 63 EB A7 30 8B 1A
-
- ------------------------------
-
- Date: Sun, 14 Jul 1996 18:25:52 -0700 (PDT)
- From: baby-X <baby-x@zoom.com>
- Subject: File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
-
- You've probably already seen this elsewhere, but I figured I'd send it
- your way directly.
-
-
- ----------------------------------------------------------------------------
- Christopher D. Frankonis - Rootless Cosmopolitan
- cyberPOLIS - Communicate This Culture
-
- Draft "Cyber-Rights" Platform Plank
- http://www.cypher.net/cyberPOLIS/platform-plank.html
-
-
- ---------- Forwarded message ----------
-
- Submissions of platform proposals to both the Democratic and Republican
- Parties are due by the first week of August. The Libertarians have already
- held their convention, but will receive a copy of this plank proposal
- anyway, as will Perot's Reform Party if it can ever be determined who to
- send it to.
-
- Therefore, I am opening a final period of discussion on the proposed
- "cyber-rights" platform plank -- beginning at the start of Sunday, July
- 14, and ending at the close of Wednesday, July 17.
-
- Please try to focus the discussion in the following locations (although I
- will be tracking the entire handful of lists and groups this announcement
- is being posted to):
-
- the Bonfire mailing list
- (see http://www.well.com/user/jonl/bonfire.html)
- the cyberPOLIS mailing list
- (see http://www.cypher.net/cyberPOLIS/discussion.html)
- alt.culture.internet
- alt.politics.datahighway
- comp.org.eff.talk
-
- At the close of the final discussion period, the draft platform plank will
- be considered to be in a fixed state; development will be over.
-
- For the two weeks between Wednesday, July 17, and Wednesday, July 31, an
- email address will be made available for collecting the names of
- individuals and groups which wish to signify their support for the plank.
- The collection of names will be appended to the plank proposal, and sent
- along with the text of the plank to each of the four parties being
- targeted. Note: Do NOT send me any of this now. When the time comes, I
- will announce the appropriate address.
-
- And so, without further explanation, here is the current version (the
- 2nd, in fact) of the proposed "cyber-rights" platform plank:
-
-
- [ Respect for Freedom in the Information Age ]
-
- "As the most participatory form of mass speech yet developed, the
- Internet deserves the highest protection from government intrusion."
-
- - Judge Stewart Dalzell
-
- The [BLANK] Party takes special recognition of the unique
- characteristics of computer-mediated communication. As the nation and
- the world experience the Information Revolution, we must rise to the
- challenge of embracing the achievements and the promise of the global
- Internet.
-
- To this end, we affirm that the new world of cyberspace calls for a
- commitment to these essential values of American liberty:
-
- * The right to speak, express oneself, and associate freely.
- * The right to privacy, whether through the use of anonymity,
- pseudonymity, encryption, or other means.
- * The right of the individual to control both the information they
- access and the information they provide.
-
- As the people of America and those of nations around the world come
- closer together through the power of computer networking, the [BLANK]
- Party embraces the spirit of freedom embodied by this new medium.
-
- ------------------------------
-
- Date: Tue, 16 Jul 1996 21:46:13 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--Online Dispute Resolution, etc. (fwd)
-
- ---------- Forwarded message ----------
- Date-- Thu, 11 Jul 1996 13:09:43 -0400
- From-- Ethan Katsh <katsh@LEGAL.UMASS.EDU>
-
- Some members of this list may have in interest in (or know someone
- who has a need for) the Online Ombuds Office, which can be found at
- http://www.ombuds.org. This is a pilot project aimed at using online tools
- to try to resolve disputes arising out of online activities (and even
- non-online activities). There is no charge for the use of the service,
- since most of our costs are covered by a grant from the National Center
- for Automated Information Research.
-
- If you belong to any listservs or newsgroups where disputes
- arising out of online activities are discussed, I'd be most grateful if
- you would mention the project and our URL.
-
- We are particularly interested in disputes involving copyrights,
- domain names, First Amendment, online service providers, and harassment.
- Our home page even describes a little reward for the parties in the first
- disputes that we settle in these areas.
-
- !~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~!
- ! Ethan Katsh Internet: Katsh@Legal.umass.edu !
- ! Professor VOICE: 413-545-5879 !
- ! Department of Legal Studies FAX: 413-545-1640 !
- ! University of Massachusetts !
- ! 216 Hampshire House !
- ! Amherst, MA 01003 !
- ! Co-Director, Online Ombuds Office !
- ! http://www.ombuds.org !
-
- ------------------------------
-
- Date: Tue, 9 Jul 1996 13:52:38 -0700
- From: Barry Gold <bgold@platinum.com>
- Subject: File 4--Re: Response to CUD re: selling wind
-
- To: Roland Dobbins,
-
- Seems to me that CUD is being about as balanced as usual. They
- published your "right-wing rant", just as they published the
- "left-wing rant" you were objecting to.
-
- You are quite correct about the "liberal" Clinton administration
- trying to foist key-escrow (like Clipper), "anti-terrorism"
- legislation that uses guilt-by-association, and has violated the
- rights of individuals in their quest to force various "militias" to
- submit. (Although I'm not sure that the Clinton admin can really be
- blamed for Ruby Ridge -- that was already planned before he took
- office, and bureaucracies have a certain inertia.) In any case, if
- they are to be blamed for the idiocies at Ruby Ridge and Waco, they
- are equally entitled to take credit for learning from past mistakes
- and working out a negotiated settlement with the "Free Men".
-
- I'm not sure about "filegate". Maybe it's an enemies list. But it
- seems just as likely to me (a computer professional) that it resulted
- from somebody searching an outdated list of white-house employees.
- Seems to me if Clinton wanted to keep an enemies list, he could have
- picked a better list than a bunch of former white-house employees and
- applicants. However, I maintain an open mind on this, as additional
- evidence may turn at any time.
-
- But I really must take issue with your bringing up SDI. Yes, weapons
- are made to be used. That's one reason why we maintained and continue
- to maintain our own weapons. It lets any foreign power who might think
- of using such weapons on the U.S. know that the result will be the total
- destruction of whatever country they are ruling.
-
- But the SDI was, and remains, a chimera. Vaporware, impossible to
- build. I just happen to have a relevant LA Times column, which I will
- quote part of:
-
- David L. Parnas(1) spent two days listening to Air Force
- briefings, then in June 1985 he resigned from the advisory panel,
- concluding that the fundamental computer requirements for
- strategic defense could never be satisfied.
-
- ...
-
- His basic points are simple and unalterable: By its nature,
- strategic ballistic missile defense cannot be tested in its
- conditions of use -- we can't fire a missile at Los Angeles
- to see if our defense works. And no computer system of even
- modest complexity has ever been considered reliable without
- extensive testing in actual conditions of use.
- ...
- National ballistic missile defense, of course, would require
- computer software of both unimaginable(sic) complexity and
- infallible trustworthiness -- and it would have to work
- correctly the first time it was ever used.
-
- ...
-
- Furthermore, the long lead time and elaborate facilities
- required to build an intercontinental missile mean that the
- U.S. and its allies would be able to deal with such a threat(2)
- from a rogue state in others(sic) ways -- via a preemptive
- strike, for example.
-
- Above quoted from "Innovation" column, by Gary Chapman, Los Angeles
- Times, Monday, July 8, 1996, page D6.
-
- I note that Chapman ignores the many missiles left in the former
- Soviet Union. These are mostly controlled by the Russian military,
- regardless of where they are physically located. And Russia seems to
- have other things than intercontinental war on its mind. This could
- change in the future, of course. But I suspect it would be cheaper to
- just buy the missiles than to build even the prototype SDI ($31-60
- billion; we have spent over "$100 billion on ... research so far, without
- noticeable progress."(ibid))
-
- Also ignored by proponents of SDI is that there are other methods of
- delivering weapons of mass destruction than ICBMs. If Russia _did_
- become a threat again, they could use submarine-launched missiles,
- which are harder to defend against because they travel tens or hundreds
- of miles instead of thousands. And the smaller "rogue states" that
- indulge in terrorism could get quite satisfactory results by smuggling
- the weapons into the U.S. and assembling them in whichever city they
- want to destroy.
-
- It would be difficult to completely destroy the U.S. with short range
- or smuggled in weapons, but you could certainly deliver a lot of
- terror, just the sort of thing those dictators would enjoy. Except
- for one thing -- the retaliatory strike would leave them radioactive
- dust, or if they happened to have a deep enough bunker to survive it,
- no army and a radioactive wasteland to "rule" over. The same thing
- would happen to anyone who launched a more massive missile strike, of
- course.
-
- So, who are we to fear? Anyone who is weighing risks against gains
- will see there is nothing to be gained by using such weapons against
- U.S. territory. And in spite of propaganda labelling Hussein and
- Kaddafi "madmen", they are quite sane, just working from goals we
- don't understand. And if someone crazy does come to power (Hitler,
- perhaps), SDI will not prevent him from smuggling in weapons.
-
- In fact, assuming such a ruler (or a stateless terrorist group for
- that matter) could lay hands on enough fissionables, this would be at
- least as efficient a method of using them as launching missiles.
- Missiles have a way of failing, their payloads refusing to go off.
- Worse, after you've figured out how to build a fission bomb (not that
- difficult, most of the info is now available in libraries), you
- _still_ have to figure out how to build the missiles, a much more
- difficult task. (Or spend a lot of money to buy them, then hope you
- can maintain them in working condition until its time to use them.)
-
- Thank you, I'd rather use the 31-60 billion to lower taxes or reduce
- the national debt.
-
-
- ---
-
- (1) a famous software engineer and a member of the panel charged with
- looking at the computer requrirements for an SDI system.
-
- (2) e.g., the occasional threats by the current rulers of North Korea,
- Iraq, and Libya.
-
- ------------------------------
-
- Date: Wed, 17 Jul 1996 19:59:47 -0700 (PDT)
- From: Declan McCullagh <declan@well.com>
- Subject: File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
-
- The New York Times, July 17, 1996, p. A10.
-
- 16 Indicted On Charges Of Internet Pornography
- Allegations of Molestation Are Also Filed
-
- By Tim Golden
-
- San Jose, Calif., July 16 -- [...]
-
- Today, Federal officials said the girl in a small central
- California town had led them to one of the more distant
- frontiers of sexual crime.
-
- In an indictment handed up here, a Federal grand jury
- charged 16 people in the United States and abroad with
- joining in a pornography ring that was effectively an
- on-line pedophilia club. Its members shared homemade
- pictures, recounted their sexual experiences with children
- and even chatted electronically as two of the men molested
- a 10-year-old girl, the authorities said.
-
- The case appeared likely to heighten concerns about the
- spread of child pornography over the Internet. Debate has
- grown steadily over whether or how the government should
- impose obscenity standards in cyberspace, and Republican
- leaders have increasingly attacked the Clinton
- Administration for being insufficiently vigorous in the
- prosecution of on-line pornography cases.
-
- [...]
-
- In addition to 13 men arrested around the United States,
- officials said the group included members in Finland,
- Canada and Australia. Although arrest warrants have been
- issued for those three, officials said they were still only
- known by their computer aliases.
-
- [...]
-
- With help from Customs Service investigators in Silicon
- Valley, F.B.I. agents eventually uncovered computer files
- that began to trace the scope of the Orchid Club, one of
- the thousands of virtual conference rooms of Internet Relay
- Chat.
- Officials said they did not have to conduct wire-tap
- surveillance or break into encrypted files; two of the
- accused conspirators collaborated with investigators, going
- on-line in the presence of law-enforcement agents to help
- track other members of the club.
-
- ------------------------------
-
- Date: Mon, 8 Jul 1996 08:56:51 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
-
- U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM
- The federal government is planning a centralized emergency response team to
- respond to attacks on the U.S. information infrastructure. The Computer
- Emergency Response Team at Carnegie Mellon University, which is financed
- through the Defense Department, will play a major role in developing the new
- interagency group, which will handle security concerns related to the
- Internet, the telephone system, electronic banking systems, and the
- computerized systems that operate the country's oil pipelines and electrical
- power grids. (Chronicle of Higher Education 5 Jul 96 A19)
-
- AT&T TARGETS CYBERSPACE
- AT&T's recent investment in Nets Inc., through its spin-off of New Media
- Services to Jim Manzi's Industry.Net, signals its plans to become a one-stop
- shop for electronic communications -- from e-mail and Internet access to
- cellular calling and satellite TV. The company's primary strategy is to
- sign up millions of customers for its WorldNet Internet access service. The
- company will also provide its corporate customers a "hosting" service called
- EasyCommerce, which will create and operate corporate Web sites. At the
- same time, the company has scrapped Network Notes and is looking to get rid
- of its Imagination Network, an online gaming service; it's also considering
- phasing out Personalink, a messaging service that uses General Magic
- technology. (Business Week 8 Jul 96 p120)
-
- ------------------------------
-
- Date: Thu, 18 Jul 1996 23:10:49 +0000
- From: David Smith <bladex@bga.com>
- Subject: File 7--(Fwd) $50K Hacker challenge
-
- I saw this article in a recent edition of Online Business Today.
-
- ------- Forwarded Message Follows -------
- Date-- Tue, 25 Jun 1996 09:08:17 -0400 (EDT)
- From-- Home Page Press <obt@hpp.com>
-
- <sections snipped>
-
- **************************************************
-
- Hackers $50K challenge to break Net security system
-
- World Star Holdings in Winnipeg, Canada is looking for
- trouble. If they find it, they're willing to pay $50,000 to the
- first person who can break their security system. The
- company has issued an open invitation to take the "World
- Star Cybertest '96: The Ultimate Internet Security Challenge,"
- in order to demonstrate the Company's Internet security
- system.
-
- Personal email challenges have been sent to high profile
- names such as Bill Gates, Ken Rowe at the National Center
- for Super Computing, Dr. Paul Penfield, Department of
- Computer Science at the M.I.T. School of Engineering and
- researchers Drew Dean and Dean Wallach of Princeton
- University.
-
- OBT's paid subscription newsletter Online Business
- Consultant has recently quoted the Princeton team in several
- Java security reports including "Deadly Black Widow On The
- Web: Her Name is JAVA," "Java Black Widows---Sun
- Declares War," Be Afraid. Be Very Afraid" and "The
- Business Assassin." To read these reports go to Home Page
- Press http://www.hpp.com and scroll down the front page.
-
- Brian Greenberg, President of World Star said, "I personally
- signed, sealed and emailed the invitations and am very
- anxious to see some of the individuals respond to the
- challenge. I am confident that our system is, at this time, the
- most secure in cyberspace."
-
- World Star Holdings, Ltd., is a provider of interactive
- "transactable" Internet services and Internet security
- technology which Greenberg claims has been proven
- impenetrable. The Company launched its online contest
- offering more than $50,000 in cash and prizes to the first
- person able to break its security system.
-
- According to the test's scenario hackers are enticed into a
- virtual bank interior in search of a vault. The challenge is to
- unlock it and find a list of prizes with inventory numbers and
- a hidden "cyberkey" number. OBT staff used Home Page
- Press's Go.Fetch (beta) personal agent software to retrieve the
- World Star site and was returned only five pages.
-
- If you're successful, call World Star at 204-943-2256. Get to
- it hackers. Bust into World Star at http://205.200.247.10 to
- get the cash!
-
- **************************************************
- ============================
- ============================
- ONLINE BUSINESS TODAY(TM)
- NEWSLETTER: Vol 2 (#6)
- MORNING FINAL
- THURSDAY, JUNE 24, 1996
- OBT@HPP.COM
-
- ------------------------------
-
- Date: Mon, 15 Jul 96 07:30:34 GMT
- From: "David G. Bell" <dbell@zhochaka.demon.co.uk>
- Subject: File 8--Access control, Censorship, and Precision
-
- For me, the most disturbing part of the Meeks story about control of
- access to parts of the Internet was the allegation of a lack of
- precision in defining controlled sites, so that sites with a similar,
- but not identical, URL could be blocked.
-
- I imagine that a smart lawyer could make a case for damages out of that
- one.
-
- Contrast it with the iSTAR story. The list of newsgroups they have
- refused to handle is pretty clear, and while different countries, even
- different States in the USA, have different limits, pretty well all of
- the newsgroups have names which strongly suggest an illegal content in
- many jurisdictions.
-
- About the only one which I was surprised to see was the newsgroup for
- pictures of cheerleaders, but on an international network of networks,
- it isn't hard to find differences in age limits, which would make a
- picture of a 17-year-old legal in one country, and illegal in another.
-
- At least the censors and controllers have a reason for their actions,
- and one which I believe can be defended. The danger in both the stories
- is that so much is being done in secret, and these actions should be
- challenged, should be publically debated, rather than imposed in secret.
-
- Here in the UK we have what is officially a film _classification_
- system, backed by law. Mostly, it seems to work pretty well. There are
- stories about scenes being cut from films to get a less restrictive
- classification. It has also been claimed that no film can be released
- in the UK which shows the use of nunchaku, because of some decision
- taken by the current head of the BBFC.
-
- It can be argued that too many people on the Internet fail to accept
- responsibility for what they make available. The scary thing about the
- secrecy surrounding efforts to classify or censor material, is that it
- suggests that the people taking the decisions are afraid to accept their
- responsibilities.
- Date: Thu, 18 Jul 1996 23:23:16 -0400 (EDT)
- From: Noah <noah@enabled.com>
- Subject: File 9--Computer Literacy Bookshops events
-
- From -Noah
-
- noah@enabled.com
-
- ---------- Forwarded message ----------
- Date--Thu, 18 Jul 96 18:05:19 PDT
- From--CLB Event Accounement <announce@clbooks.com>
-
- AN EVENT AT COMPUTER LITERACY BOOKSHOPS
-
- -----------------------------------------------------------
- Logical Synthesis with Verilog HDL
- ---------------------------------------------------------
-
- a free presentation by Samir Palnitkar
-
- What is?
- Logic Synthesis
- Impact of Logic Synthesis
- Synthesis Design Flow Sequential Circuit Synthesis Example
-
- Samir Palnitkar is the president of Indus Consulting Services, Inc.
- in Sunnyvale, CA; a company which offers training and consulting
- services for chip design and verification.
-
- As a member of the technical staff at Sun Microsystems, he was
- involved in several successful microprocessor, ASIC and system
- design projects. He's also been a consultant to chip design
- companies, semiconductor houses and EDA companies. He has also
- taught Verilog and Synthesis courses to engineers at various
- companies. Samir has published several technical papers and is the
- holder of two U.S. Patents.
-
- Mr. Palnitkar is the author of
- "Verilog HDL: A Guide to Design and Synthesis.
-
- Date: Tuesday, July 30, 1996
- Time: 6:30 p.m. to 8:30 p.m.
-
- Location: Computer Literacy Bookshop
- 2590 N First St (at Trimble)
- San Jose, (408) 435-1118
-
- DID YOU KNOW THAT OUR EVENTS ARE POSTED ON OUR WEB PAGE?
- http://www.clbooks.com/
-
- Stay tuned. There are more events to come.
-
- August 7, 1996
- Tons of Practial Experience with the Shlaer-Mellor Method
- with Leon Starr
-
- August 17, 1996
- Power of Ignorance (C++ Templates)
- with Andrew Koenig
-
- August 21, 1996
- Web Multimedia Techniques
- with Tay Vaughan
-
- Events at our stores are always free.
-
- ------------------------------------------------------------
- If you would like to receive e-mail announcements for upcoming store
- events, simply write to:
-
- events_ca-request@clbooks.com (for events held at our California stores)
- events_va-request@clbooks.com (for events held at our Virginia store)
- --------------------------------------------------------------
-
- If you have signed up for email announcements but have not received any,
- or wish to be removed from this list, please contact us. We add names
- by request only.
-
- ****************************************************
- Computer Literacy Bookshops, Inc.
-
- Cherrie C. Chiu
- eventinfo_va@clbooks.com
- (408) 435-5015 x116
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.55
- ************************************
-
-
-