home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 19, 1997 Volume 9 : Issue 21
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.21 (Wed, Mar 19, 1997)
-
- File 1--Cyber Angels' Antiporn ("FACES") Database Dies (From WIRED)
- File 2--Apologies for Duplicates of the last issue
- File 3--STUDY ON CONTENT-RELATED INTERNET LIABILITY
- File 4--Japanese Internet Users May Need Magician
- File 5--InfoWarCon 7 ~~ Call for Papers ~~ (fwd)
- File 6--Re - Maryland online "harassment" bill
- File 7--Coos Bay search and seizure
- File 8--Re: File 6--Cyber Promotions, Evil, Evil, EVIL
- File 9--Re: CuD 9.15 - "Do-Gooders" ??
- File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 19 Mar 1997 16:38:18 -0600
- From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
- Subject: File 1--Cyber Angels' Antiporn ("FACES") Database Dies (From WIRED)
-
- ((MODERATORS' NOTE: It appears that the CyberAngels "FACES"
- project has been cancelled, according to the following
- report from WIRED NEWS' Janelle Brown)).
- CuD readers and others contributed to the ill-conceived
-
- From Wired News Archives:
-
- Cyber Angels' Antiporn Database Dies
- by Janelle Brown
-
- 2:57pm 14.Mar.97.PST The Internet is chock-full of sexual
- predators, pedophiles, and free hard-core porn, and according
- to the Cyber Angels, not enough is being done about it. Thus,
- the self-described "Internet safety organization" spent six
- months developing the FACES project, a database of information
- to help identify children who might be suffering sexual abuse.
- But the recent demise of the ambitious project, which would
- have included cropped pictures of children believed to be
- victims of porn, highlights serious concerns about netizens
- taking matters into their own hands.
-
- ..................
-
- The database project, which would have been publicly
- accessible, had become entangled in moral and legal issues.
- "Although we were able to build a small database of faces,
- most child porn available is unsuitable for the project," says
- [Colin "Gabriel" ] Hatcher. "The children are in distress so
- you can't get a straight face from it, or the pictures are too
- old - they are from the 1970s and the kids are adults now."
-
- ..................
-
- While Hatcher says that the issues brought up in the Cu Digest
- debate were ones that the Cyber Angels were aware of, the
- anger that surrounded news of the project highlights netizen
- concerns about citizen-organized Net-policing. The CyberAngels
- say they are simply trying to help federal authorities by
- pointing out "probable cause," but some feel that an
- organization of thousands citizens out to patrol the Net with
- quasi-cop intentions is troublesome. It is the same criticism
- some have of the Guardian Angels patrolling city streets for
- crime.
-
- ...........................
-
- With the dissolution of the project, the Cyber Angels will
- refocus their attention on education issues, aiding netizens
- who need help, and continuing to patrol Usenet to prevent
- trouble. With over 200 requests for help coming in each week,
- they've got plenty to keep them busy - as well as the
- continuing public debate about whether they are qualified to
- do what they are doing.
-
- ------------------------------
-
- Date: Thu, 20 Mar 1997 01:15:57 +0900 (JST)
- From: Cu Digest <cudigest@sun.soci.niu.edu>
- Subject: File 2--Apologies for Duplicates of the last issue
-
- Some groups received duplicates of the last issue, the
- overview of the Internet in Japan. Because of its length,
- it was inconvenient for some folks, and we apologize for the
- miscue. Thanks to readers for pointing it out. Here's Jim
- Schweizer's explanation of the cause:
-
- ===============
-
- > I'm sorry about causing an extra edition of the
- > Japanese-Internet cu-digest. Apparently the Linux XFMail program
- > doesn't strip the header from forwarded mail and this caused a
- > second copy of my forward to the Tokyo Linux Users Group to go
- > to CU-DIGEST subscribers.
- >
- > Please accept my apology and if appropriate pass it along to
- > other subscribers.
- >
- > Regards,
- >
- > Jim Schweizer
-
- ------------------------------
-
- Date: Tue, 18 Mar 1997 15:31:03 -0500
- From: Dov Wisebrod <dov@CATALAW.COM>
- Subject: File 3--STUDY ON CONTENT-RELATED INTERNET LIABILITY
-
- The study is now available on Industry Canada's site in Adobe PDF
- format.
-
- The study (a 300+ page/1004Kb document - including a 23 page/79Kb
- summary) was commissioned in the summer of 1996. It provides an
- analysis of how Canadian law applies to content-related Internet
- liability in the areas of copyright and trade-marks, privacy and
- defamation, obscenity, child pornography and hate literature.
-
- You can access it at:
-
- http://strategis.ic.gc.ca/nme (English)
- http://strategis.ic.gc.ca/nmd (French)
-
- Dov Wisebrod dov@catalaw.com www.CataLaw.com/dov
- 11:52 Digital Doomsday Clock www.CataLaw.com/doom
- CataLaw Metaindex of Law and Government www.CataLaw.com
- LoGIC Legal Group for the Internet in Canada www.CataLaw.com/logic
-
- ------------------------------
-
- Date: Wed, 05 Mar 1997 02:07:35 -0500
- From: Ari Herzog <ari@ici.net>
- Subject: File 4--Japanese Internet Users May Need Magician
-
- http://www.yahoo.com/headlines/970304/tech/stories/plugged_1.html
- Taken from Reuters story
- ----------------------------------------------------------------------
-
- Tuesday March 4 10:06 AM EST
-
- Japanese Internet Users May Need Magician
-
- By Russell Blinch
-
- TOKYO - "What is a wizard?"
-
- It was a question asked by Aya Ishihara, general manager of a Japanese
- Internet
- service provider run by SSK & RCY Corp., during a recent conversation.
-
- Microsoft and other companies have recently introduced "Wizards" --
- programs that,
- seemingly with the powers of a magician, can help frustrated personal
- computer users
- load programs and undertake other tasks.
-
- While the 29-year-old Ishihara had an inkling of what the Wizard metaphor
- was all
- about, her question illustrated why the Japanese are having trouble signing
- on to the
- Internet.
-
- So, like, wow, they don't know how to surf over to Yahoo on their browsers
- and hot link
- to some really cool homepage?
-
- "Many Japanese are against these kinds of terms," Ishihara said.
-
- It may seem ironic that a country that has flabbergasted the world with so
- many
- electronic innovations would be trailing other countries when it comes to
- the Internet.
-
- But many Japanese Internet players believe their country is badly trailing
- the United
- States, Canada and even Europe.
-
- "Compared with the U.S., it's really behind -- maybe three years," said
- Masahiro Inoue,
- president of Yahoo Japan.
-
- Internet idiom was a challenge for just about all users when they first
- took their baby
- steps on the World Wide Web. It could be argued, however, that North Americans
- familiar enough with the surf -- or snow -- boarding culture probably had a
- leg up when it
- came to adapting to the Web culture.
-
- According to the Japan Economic Almanac, there are one million Japanese Web
- surfers, which is absurdly low for a highly-industrialized country of 125
- million.
-
- Even Canada, with a population of 30 million, has been estimated to have a Web
- surfing populace of more than double that.
-
- Another barrier to the Internet looming as large as Mount Fuji is the high
- cost of Web
- surfing in Japan.
-
- The Japanese do not have the luxury of a flat rate system for local phone
- charges, as
- surfers enjoy in North America. Instead they must pay a charge per three
- minutes on a
- local call. So when an Internet charge is factored in along with local
- tolls, the cost of
- fairly moderate surfing can run skyward.
-
- An official at the Canadian embassy in Tokyo explained that it was easy to
- incur a
- charge of more than 12,000 yen ($100) a month for Internet use -- which is
- about three
- to four times what a North American might pay for access.
-
- Nevertheless, a number of Japanese players don't believe they can afford to
- move to
- flat rate pricing, because it might lead to other problems. They seem well
- educated in
- the woes America Online has been facing with congested access to their
- network.
-
- "Maybe flat rate will lead to a chaotic solution," mused Ishihara, who at
- the same time
- saw the need for lower fees.
-
- There are many signs, however, that the pace of Net development is about to
- speed up
- significantly here.
-
- A number of Japanese players in the Web community liken the situation to
- the use of
- wireless phones.
-
- Initially, the West was far ahead in the head count of street corner phone
- yakkers, but
- now it looks like the Japanese have taken a collective decision that
- miniature, wireless
- phones are indispensable tools for the urban dweller.
-
- The phones really took off in 1995 with the introduction of the Personal
- Handy Phone
- system (PHS) and a pricing structure that many realized was too good to
- pass up in
- Japan's highly regulated communications system.
-
- Many online players believe the Internet might be ready for a similar
- explosion in
- demand.
-
- Officials at Fujitsu Ltd. and Nippon Telegraph and Telephone believe that
- there are
- probably more than five million Japanese Netizens when the number of people
- are
- counted that log on from the office.
-
- People are using the Net at lunchtime, perhaps largely because it is still
- too expensive
- for many Japanese to maintain accounts from home.
-
- Many Japanese Internet players are very optimistic that use of the Internet
- in the office
- will grow and spread to the home. And it would be this kind of growth that
- might spur a
- kind of collective wisdom or even "wizardry" from Japan -- as we have seen
- many times
- in the past from this country -- that will result in innovation benefiting
- not only Japan but
- the entire Internet community.
-
- -- For ideas or comments on the weekly Plugged In column contact:
- russell.blinch+reuters.com.
-
- Copyright, Reuters Ltd. All rights reserved
-
- **********************************************************************
- Ari Herzog
- ari@ici.net
-
- Ari's Simple List of Record Labels
- http://aleph0.clarku.edu/~aherzog/links/rec_lab.html
-
- "Anything that is too stupid to be spoken is sung."
- -- Voltaire
-
- "We are the music makers and we are the dreamers of dreams."
- -- Arthur O'Shaugnessey
-
-
-
- ------------------------------
-
- Date: Sun, 16 Mar 1997 08:26:32 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 5--InfoWarCon 7 ~~ Call for Papers ~~ (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Fri, 14 Mar 1997 14:58:44 -0500
- From--"Betty G. O'Hearn" <betty@infowar.com>
- Subject--InfoWarCon 7 ~~ Call for Papers ~~
-
-
- Defensive Information Warfare
- And Systems Assurance
- For Community, Company and Country
- September 11-12, 1997
- Sheraton Premier, Tysons Corner, VA
-
- Call for Papers
-
-
- Sponsors:
- National Computer Security Association
- http://www.ncsa.com
- and
- Winn Schwartau, Interpact, Inc.
- http://www.infowar.com
- http://www.info-sec.com
-
- Interested parties from government, law enforcement, academia,
- corporations and individuals from all nations are invited to submit
- papers
- or concepts for papers/presentation to be given at InfoWarCon 7 and
- published on http://www.infowar.com. The following Solutions Oriented
- topics are of special interest to the conference, but all papers will
- be
- considered:
-
- Case studies and real world successes are strongly encouraged.
-
- New technologies, systems, models and approaches to provide higher
- levels of information and systems assurance in a world where conflict
- has
- moved to Cyberspace. (Commercial, Law Enforcement and
- Government).
-
- Detect and Response Solutions
- Denial of Service Methods and Protection
- New Info-Sec Models for Local and Global Enterprises
- Demonstrations of New Emerging Technologies
- Encryption, Access Control, and Identification
-
- The technical and social convergence of the military, law enforcement
- and private sectors in the interest of National Security: defensive
- mechanisms, policies and cooperative efforts.. (Commercial and
- Government)
-
- Electronic Civil Defense Policies
- Alternative National Defense and Intelligence Mechanisms
- National vs. International Policy Development
- Educating Populations for Support
- Dealing with the Non-nation State Actor
-
- Cooperative legal, ethical and political means by which to interest,
- create
- and sustain international cooperation for the discovery and prosecution
- of
- computer crimes and cyber-terrorism. (Law enforcement and
- Government)
-
- Redefining the State
- Case Studies of Prosecution; Successful and Not
- Corporate Vigilantism and Self-Preservation
- Electronic Bills of Rights for Nation States
- United Nations of Cyberspace
- Legal Conundra
-
- Multi-media presentations, real-time scenarios or gaming, audience
- participation and highly interactive topics are more likely to be
- accepted.
- English is the conference language and all sessions will be
- unclassified.
-
- Submissions are to be in Word 6.0 or greater, Powerpoint, or other
- popular formats, sent by email to: betty@infowar.com
-
- Submission Deadline: May 16, 1997
- Acceptance Date: June 9, 1997
-
- For complete information on attendance:
- Registration: Conferences@ncsa.com
- Sponsorships: Sponsors@ncsa.com
-
- Questions/Help: betty@infowar.com
-
- ------------------------------
-
- Date: Sat, 15 Mar 1997 09:20:33 -0500
- From: Hitchcock <AreaWoman@JUNO.COM>
- Subject: File 6--Re - Maryland online "harassment" bill
-
- I was dismayed to read that this bill is being thought of as
- censorship -- it is not. What Mr. Jackson failed to mention in
- his article is that I testifed ON BEHALF of House Bill 778. Yes,
- some of the words are not applicable and will probably be struck
- from the final bill if it is passed, but I feel strongly that
- online harassers MUST be punished. All you have to do is go to
- the web site in my signature below to see what I've been through
- and I had no one I could contact for help. The local police
- couldn't help me, the FBI couldn't -- no one. So this bill WILL
- help victims of online harassment, even if it means starting with
- those who harass via e-mail. I intend on seeing this kind of
- statute pass, not only in Maryland, but nationwide if I have to.
-
- Jayne Hitchcock
-
- Read about an Internet Harasser:
- http://www.geocities.com/~hitchcockc/woodside.html
-
- ------------------------------
-
- Date: Wed, 12 Mar 1997 18:04:27 -0500 (EST)
- From: baby-X <baby-x@slowdog.com>
- Subject: File 7--Coos Bay search and seizure
-
- I'm not in a position to tell you a sense of this statement's validity or
- whatnot. But I was asked to pass it along, and figured that if there's
- anything there, one of you guys might be able to find out, if so inclined.
-
-
- baby-X
-
- ---------- Forwarded message ----------
- From--Killarney <kill@millennium-cafe.com>
- Date--Wed, 12 Mar 1997 14:48:40 -0800 (PST)
- Subject--the press release (fwd)
-
-
- this happened at this place down in Coos Bay over the weekend. My friend,
- who lives there, wants to help spread the word, and get this out to as
- many people as possible to get the media interested. Forward it to whoever
- you know.
-
- kill
-
-
- ---------- Forwarded message ----------
- Date--Mon, 10 Mar 1997 07:28:42 -0800
- From--Scott <szaz@harborside.com>
- To--Andraea.Carman@blitz.emc.maricopa.edu
- Cc--kxm281@psu.edu
- Subject--the press release
-
- Ok,here's the press release about all that's been going on here,whether you
- were expecting it or not. If you could do me and everyone here huge,huge
- favors by passing this on to anyone you can,media where you are or
- net-connected people, I and others,especially the guy accused,would really
- really appreciate it. Later.
-
- Background Fact Sheet on the Raid on 700 Commercial Ave, Coos Bay, Oregon on
- 4/6/96 @ 0800am
-
- The Issues:
-
- Where is the line drawn between a legally issued (though flawed) physical
- search warrant for a single individual's computer files and/or
- non-electronic evidence when it is executed in an computer-networked
- multi-residential building.
-
- A Synopsis:
-
- A contingent of local Coos Bay, Oregon and State Police, in search of
- evidence in an alleged computer crime during December 1996 against Koala
- Computers of Coos Bay, executed a search warrant at 700 Commercial Avenue
- in Coos Bay on 06Mar97.
-
- The search warrant (copies available on request) served by Oregon State
- Police Detective In Charge, Randy Becker, initiated a total building search
- lasting eight and one half hours, including the private residences of the
- twenty people living there, even though the warrant lists only one resident,
- Dan Parker, as a suspect in the alleged crime and is addressed only to Mr.
- Parker.
-
- The four story ex-hospital houses a hi-tech community and staff for a
- future, not-for-profit, cultural center and is slated to be the new home for
- the CyberCat Cafe, a computer coffee house recently forced to vacate its
- previous locale due to a notice to vacate their prior location without a
- written cause. Additional technologically-based businesses have applied to
- lease space to operate from the location once zoning issues are settled with
- city officials.
-
- The in-house computer network in question was installed in late February
- 1997 and provides Internet connectivity to the residents as well as access
- to a shared printer. It does not provide file server functionality which is
- the the ability to share files between computers. Mr. Parker was attached
- to the network for a total of three days prior to the raid.
-
- Although Mr. Parker neither owned nor had access to the other computers on
- the network, inhabitants were detained in their residences until they were
- removed during the search, which entailed the copying of hard drives and
- other storage media as well as a physical search of the individual premises.
-
- Vacant rooms in the building where the network does not extend and which
- contain no computers were also searched. No residents were allowed to
- witness the search of their living quarters or property. Additionally, one
- corporate entity in the building, after threatening legal action subsequent
- to a physical search, had their computers left untouched.
-
- Floor plans detailing the commercial and residential space were submitted to
- Coos Bay city officials as part of a zoning review three weeks prior to the
- raid. The same plans, which provide both the inhabitant's name and their
- location within the building have been available on a web page since early
- January 1997.
-
- Additional Background: CyberCat Cafe
-
- Owner: Andrea Wasson
- 700 Commercial Avenue
- Coos Bay, Oregon xxxxxx
- (541) 269-7491
- e-mail: admin@cybrcat.com
-
- Business: The CyberCat Habitat , an Internet Coffee House (currently
- closed) struggling through zoning issues to reopen in a new location in Coos
- Bay, Oregon as the only all ages business that offers indoor activities to
- area teens and their families, in a well supervised, drug and alcohol-free
- environment).
-
- History: Opened April 1996 at 184 Market Avenue in Coos Bay, Oregon,
- offering computer access, espresso, coffee, soft drinks, juices, and
- prepackaged snacks, plus acoustical entertainment on Friday/Saturday
- evenings, and Saturday afternoons. Customer base highly varied,
- including teens, college age, siblings, parents, senior citizens. In other
- words, people of various racial, ethnic, sexual orientation, physical
- abilities, and economic backgrounds within the community. The CyberCat was
- immediately discovered by area youth and was busy from its inception.
-
- Pressure is applied by several area police officers within
- a couple months of opening for Ms. Wasson, as a business owner, to assume
- responsibility for controlling the actions or suspected actions of any and
- all teens in the general area of the business, regardless of their
- participation or lack of participation in the business as customers. Several
- initiatives by Ms. Wasson for a joint effort between the CyberCat and
- members of City Hall to find a solution for this problem are politely but
- bureaucratically ignored prior to receiving a notice to vacate and being
- forced to close the doors in October 1996.
-
- Several police "encounters" with both younger customers and the owner of
- the business, lead to a filing a complaint with the city of harassment
- against the police department after these encounters directly or indirectly
- provoked the notice to vacate from the landlord at that location. The
- building manager refused an actual written reason for the lease termination
- but implied that the interest in CyberCat activities by the Coos Bay Police
- Department (CBPD) was a determining factor.
-
- An internal investigation of the complaint found that neither CyberCat,
- certain customers, nor the CBPD was guilty of any wrong doing and that all
- of us were "mere victims of different people's perceptions". Statements making
- reference to interviews done during that investigation proved to be less
- than truthful, as many who were listed as interviewed in the process of that
- investigation claim they were never approached for interviews. Letters of
- support bearing witness to the harassment events which were sent to city
- hall during the investigation were ignored.
-
- Following the CyberCat's closing, Ms. Wasson and several volunteering
- residents set out to renovate a large, unproductive building located at 700
- Commercial Avenue to create a not-for-profit, cultural activity center for
- area youth, a project directly motivated by experiences encountered through
- interaction with area youth at the coffeehouse.
-
- The volunteers range in age from 18-67, and number at thirteen adults and
- three children. Additionally, four people related to the current building
- owners with whom Ms. Wasson is negotiating the sale, also reside within the
- building.
-
- Each person/ or family has independent living quarters within the building,
- clearly defined in their mailing addresses and on a floor map posted on the
- Internet on a public access page which until the first week in March 1997,
- also outlined the group's intentions for the building. This page is being
- updated after receipt of a notice of zoning issues was received from the
- city regarding the need for a conditional use permit in order to reopen the
- coffeehouse here. However, the basic information remains up on the web.
-
- Additional Background: The Raid
-
- Pertinent questions are:
-
- If this warrant was to secure evidence against one person, why were the
- rights , personal property and/or computer files of 19 other people in the
- building impacted and in my opinion, their civil rights violated?
-
- Why did the warrant offer no definition of the crimes suspected and more
- specific information of the evidence that was sought clearly outlined?
-
- This "investigation" had been ongoing for over 2 months according to State
- Police Press releases, why were no female officers dispatched when it was
- known that women would be included in the raid?
-
- Why was a generic search warrant issued against a whole building when
- separate living quarters were well defined in a publicly accessible forum,
- in the possession of city officials and also explained first hand to the
- officers on the scene?
-
- Why were people within the building refused the right to basic privacy to
- get dressed when ordered from their beds, forced to be publicly humiliated
- while dressing in front of officers on the scene? If all residents were to
- be impacted by the warrant, why were ALL residents not included and given
- copies of the warrant?
-
- Where does the 4th amendment rights regarding search and seizure stop in
- regards to a network connection to the Internet when no file sharing
- capabilities are built into that system?
-
-
- Additional Background: Dan Parker
-
- It is interesting to note that there is a current conflict in process
- between Dan and Koala Computers, his prior employer and the company filing
- the charges of unauthorized access of a system against him.
-
- All of his personal files which were maintained on an in-house terminal at
- the business (which they claim were deleted through remote access in
- December 1996) were in fact deleted prior to his leaving their employment.
-
- Dan has been seeking payment from them for software programs he developed
- for them under a separate contract since his employment was terminated and a
- letter demanding payment for these programs was issued to them via
- registered mail approximately one month ago after several personal contacts
- demanding
- payment failed. He has been aggressively seeking resolution via legal channels
- regarding this dispute.
-
- ------------------------------
-
- Date: Mon, 24 Feb 1997 10:51:48 -0800 (PST)
- From: Cedric Beust <beust@ILOG.FR>
- Subject: File 8--Re: File 6--Cyber Promotions, Evil, Evil, EVIL
-
- Danny Burstein <dannyb@panix.com> writes:
-
- : "What people are doing is jumping around from one (Internet
- : provider) toanother, and they don't have a secure home. We're
- : going to give them a home," said Cyber Promotion founder Sanford
- : Wallace.
-
- It seems very scary at first sight, but when I think of it, I
- have the impression it will help users such like us to filter
- this junk away.
-
- The main problem with spam is that unless it titles some
- well-known Subject--(uppercase, $ signs, "money", "read this",
- etc...) or emanates from a notorious spamming domain, it is
- impossible to filter it automatically. And while it only takes a
- second to read and hit "delete", it's still both money and time
- wasted.
-
- Now, the spam king (no capital) is saying all the spams will
- come from one same domain : his. Great ! On an individual basis,
- it will allow us to tune our filter software more accurately. On
- a broader basis (a whole domain, or an ISP), I am persuaded that
- sysadmins will be easily convinced to completely block receipts
- of mails from this (these) domain, avoiding users to pay for
- junk mail since it will never reach their mailbox.
-
- Now, there is a real threat behind all this, though : if the
- spam king realizes this, and decides to change regularly the
- domain from which spams are issued. Registering a new domain name
- say, each week, is a no-cost for a successful company, and I'm
- afraid he *will* be successful... Sigh.
-
- ------------------------------
-
- Date: Tue, 11 Mar 1997 22:41 EDT
- From: "E. Allen Smith" <EALLENSMITH@mbcl.rutgers.edu>
- Subject: File 9--Re: CuD 9.15 - "Do-Gooders" ??
-
- From: IN%"dryden@Radix.Net" "Tracy S. Dryden" 10-MAR-1997 19:28:20.79
-
- >>To the degree that "do-gooder" is treated negatively on CuD, it
- >>is because of such phenomena as "we're from the government and
- >>we're here to help you." Only organizations (e.g., the Red Cross)
- >>with a history of competent, helpful action should be free from
- >>this suspicion; neither the CyberAngels nor their parent
- >>organization the Guardian Angels match this description.
- >>Cooperation between the CyberAngels and such government
- >>organizations.
-
- (As long as I'm replying, I'd like to mention that I seem to have
- accidentally deleted (including in the version sent to CuD) the last
- section of that last sentence - it was supposed to have been
- "Cooperation between the CyberAngels and such government organizations
- as the FBI does not discourage the dread of the aforementioned
- phenomenon.")
-
- >The Red Cross (at least the American Red Cross) has many times been referred to
- >as a "do-gooder" organization. Additionally, it's actions have _not_ always
- >been "competent and helpful." A case in point: Many years ago my ex-wife used
-
- [...]
-
- >donations of money, with which they would buy _new_ clothing. Even after all
- >these years I still find this attitude appallingly "dim-witted," as well as
- >wasteful - attitudes frequently attributed to so-called "do-gooder"
- >organizations.
-
- Thank you for this information; I will avoid thinking of the Red Cross as
- competent in the future. In the specific context - namely, how the
- phrase in question was _allegedly_ applied to CuDigest participants - my
- definition, related to the imposition of regulations (or cooperation in
- the imposition of regulations) for allegedly beneficial purposes, does
- appear to still be valid.
-
- >Be very careful when you start generalizing, and defining terms for people.
-
- It is admittedly possible that "Gabriel" was instead meaning an accusation
- against CuDigest participants for being suspicious of the _competencies_,
- not intentions, of the CyberAngels. Given that he did not cite any
- examples of opposition to _non-regulatory_ agency "do-gooding", this
- interpretation would make his point even more invalid. (In other words,
- he claimed that CuDigest participants were generally disparaging of
- "do-gooding." If, by this, he accused CuDigest participants of a cynical
- distrust of anyone trying to help (instead of my more specific
- interpretation of anyone trying to help via regulation), he would need
- to bring up examples of such alleged distrust when not dealing with
- regulatory agencies and proponents.)
-
- >Meddle not in the affairs of Dragons -
- >For you are crunchy, and good with mustard.
-
- I prefer the "Wizards" variant, myself... :-}
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.21
- ************************************
-
-
-