home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Mar 30, 1997 Volume 9 : Issue 26
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.26 (Sun, Mar 30, 1997)
-
- File 1--SUMMERCON 97 (fwd)
- File 2--[HIP] ("hacking in progress") - How you can help
- File 3--Reps. White and Bliley: requesting comments on crypto policy
- File 4--COMMENTARY: Katz on Kids and the CDA
- File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 19 Mar 1997 16:53:23
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 1--SUMMERCON 97 (fwd)
-
- Source -Noah
-
- The 1997 Summer Security Conference
-
- "SUMMERCON IX.V"
-
- May 31st, 1997
-
- Atlanta, GA
-
- This is the official announcement and open invitation to the nine
- and 1/2 summer security conference, Summercon. A long time ago,
- Summercon was an invite-only hacker gathering held annually in St.
- Louis, Missouri. Starting in 1995, SummerCon became an open event to
- any and all interested parties: Hackers, Phreaks, Pirates, Virus
- Writers, System Administrators, Law Enforcement Officials,
- Vigilantes, Neo-Hippies, Secret Agents, Teachers, Disgruntled
- Employees, Telco Flunkies, Journalists, New Yorkers, Programmers,
- Conspiracy Nuts, Musicians, Nudists, and Rug Sucking Wannabes.
- This con is going to be different than previous SummerCons. First
- off, there are two other major cons happening this summer, Defcon
- and Beyond HOPE. If you want to see good technical speakers, meet a
- ton of hackers, and have a good time for a couple days, I suggest
- you go to one or both of those cons. DefCon information is at
- http://www.defcon.org, Beyond HOPE info is at http://www.2600.com.
-
- So why have SummerCon at all? Well, its a tradition, and most
- of the people I talked to said we should have it anyways. But,
- because of the other 2 cons, I am really aiming just to make this
- a fun weekend with yer friends in a new city, not a technical
- hacker gala. If you want to learn something, go to HOPE or
- Defcon. If you want to meet hackers, go to HOPE or DefCon. If
- you have to choose one con to go to this summer, this one should
- NOT be it. If you are already going to DefCon and HOPE, and still
- have one more weekend you want to waste this summer, this is the
- perfect place for you.
- If you are a criminal, if you are an anarchist, if you are
- interested in pulling fire alarms or breaking things, don't come
- to this con; we don't want you here and you wouldn't like us
- anyhow.
- Why 9.5? Well, SummerCon X should be this huge major security
- conference, but with HOPE this year, we didn't think it was the
- right year to do another one of those. So, we'll have SummerCon X
- next year, this one is just going to be a little party.
-
-
- LOCATION
-
- It will be held in Atlanta, GA, but we haven't actually figured
- out WHERE in Atlanta. That's because this is a pre-release of the
- announcement, when this becomes official, we'll fill in the
- details.
-
-
- DIRECTIONS
-
- Fly to Hartsfield International Airport, look for the hackers.
-
-
- CONFERENCE INFO
-
- It has always been our contention that cons are for socializing.
- "Seekret Hacker InPh0" is never really discussed except in private
- circles, so the only way anyone is going to get any is to meet new
- people and take the initiative to start interesting conversations.
-
- Because of this, the formal speaking portion of Summercon will be
- held on one day, not two or three, leaving plenty of time for
- people to explore the city, compare hacking techniques, or go
- trashing and clubbing with their heretofore unseen online
- companions. Futhermore, except for maybe getting Mudge up on
- stage to blow us all away with some cool technical details, it is
- probably a pretty good bet that the speeches will end up being
- boring, long, and a complete waste of time. Don't come to
- SummerCon to learn anything, because you won't.
-
- If you are coming from out of town and want the full
- hacker/tourist experience, we will be having a specially scheduled
- 2600 meeting Friday, May 30th, at 6pm at Lenox Mall food court.
- If you don't know how to get there, just ask, everyone in Atlanta
- knows.
-
- The formal conference will be held on Saturday, May 31st, 1997,
- from 10am to 5pm (with a break for lunch). There will be a
- variety of speakers, panel discussions, demonstrations, and other
- events that will hopefully keep everyone entertained; if not you
- can always start drinking early.
-
- No video or audio tapes will be allowed in the conference room.
- No still photography will be permitted in the conference room
- without prior permission of all those being photographed.
- Violation of these policies will result in you being asked to
- leave the conference.
-
- There will be no selling of t-shirts, disks, firewalls, payphones,
- etc. in or around the conference area without prior permission of
- the organizers, and you WON'T get permission. We can't keep you
- from selling t-shirts in your hotel room, but we can keep you away
- from the actual conference area, and we can probably get you
- kicked out of the hotel for soliciting, and if we can, we will.
- T-Shirt sales is where we make up all the money we spend putting
- on the conference, and so we will be the only ones selling them.
- If you want to sell t-shirts, go have your own con.
-
- If you are interested in demoing or selling something, please
- contact us at the address listed at the bottom. If you offer us
- money, we might let you do it.
-
-
- SPEAKERS
-
- The speakers list for Summercon X is still being finalized, but it
- is sure to be much less interesting than previous years. In fact,
- right now we have NO speakers, and probably we won't until the day
- of the con. So again, don't come to summercon for the speakers.
-
- If you are an expert in some aspect of computer, network, or telco
- security and are interested in speaking at Summercon, please
- contact us to discuss the possibility further at the address
- listed at the end of this document.. We won't pay you, don't ask.
-
- We are also going to be having short speeches by real hackers or
- phreakers giving their own perspective on some issue or insight
- into a new technology. This is an open invitation for you hackers
- to be heard; just provide us with a brief outline of the topic you
- will be covering and the amount of time you will take (suggested:
- 5 - 15 minutes) at the address listed below.
-
-
- COSTS
-
- Costs for SummerCon X are as follows, these are same rates as last
- year, which I think is pretty good. There will be NO refunds, and
- if you annoy any of the organizers, we reserve the right to throw
- you out, and you won't get your money back.
-
- Secret Service / FBI Rate: $500.00
- Government / Institutional Rate: $ 80.00
- Hacker / Individual Rate: $ 20.00
-
-
- Members of the United States Secret Service or Federal Bureau of
- Investigations, and anyone that has in the past or currently is
- providing information or services to the Secret Service or FBI are
- required to pay the 'Secret Service / FBI Rate'.
-
- Employees of a local, state, or federal government, members and
- associates of any L.E.O., must pay the 'Government / Institutional
- Rate'.
-
- Anyone that does not fit into one of the above categories is
- eligible for the 'Individual / Hacker Rate'.
-
- Due to historical lack of interest, there will not be
- pre-registration for the conference. Registration will begin at
- 10am the day of the conference, and will continue for the duration
- of the conference or until the meeting facilities have reached their
- capacity. Since the latter is likely to occur, it is suggested you
- don't oversleep.
-
- No purchase orders, checks, money orders, foreign currency, stock
- certificates, IOUs, or coins will be accepted for registration.
- Secret Service agents, small unmarked bills only, please.
-
- Bring money for t-shirts, they are cool, and this year we will make
- enough for everyone (we hope).
-
- HOTEL INFORMATION
-
- Still working on this part.
-
- The cost for a double occupancy room at the hotel is $XX. There is
- no special conference rate, there is no need to mention you are with
- a conference at all, the people in reservations probably won't know
- what you are talking about anyhow.
-
- If the hotel is damaged in any manner, you are going to pay for it,
- and you will probably end up in jail. And even if you are lucky
- enough to get away with it, the rest of the hackers staying at the
- hotel will end up paying for it, and I'm sure that's going to make
- you a well-liked and respected hacker, especially among some of the
- bigger hackers who might feel tempted to inflict bodily harm on
- someone who causes any damage to the hotel. Please act responsibly,
- don't drink and drive, chew all your food before you swallow, don't
- swallow your gum, and recycle.
-
- Anyhow, if you pull a fire alarm, if you damage a room, if you spit
- on the floor, and any of the organizers, or any of their friends
- find out, we are going to call the police and have you arrested. In
- fact, we are making a game out of it. If anyone does any damage to
- the hotel, we will give whoever tells us what person or persons did
- it $100 in cash if we are able to get that person taken to jail.
-
-
- CONTACTING SUMMERCON ORGANIZERS
-
-
- You can contact the Summercon organizers through e-mail. If you
- haven't figured out e-mail yet, you probably shouldn't be coming to
- Summercon.
-
- As a final note, if you are planning on coming to Summercon, we
- would appreciate you sending e-mail to us with the subject of "GOING
- TO SCON" or something similar, just so that we have a rough idea of
- how many people are going to show up.
-
-
- E-mail: scon@2600.com
-
- ------------------------------
-
- Date: Wed, 19 Mar 1997 19:02:26 +0000
- From: Hacking In Progress <info@hip97.nl>
- Subject: File 2--[HIP] ("hacking in progress") - How you can help
-
- --== Hacking In Progress ==--
-
- 8th, 9th and 10th of August 1997
- Near Almere, Netherlands
-
- http://www.hip97.nl/
- info@hip97.nl
-
-
-
- Welcome to the HIP announcement list. We are not
- alone! More than 1600 (!) of you subscribed to this
- list.
-
- As you probably already know what HIP is about, this
- announcement will focus on how you can help us and how
- you can stay informed about HIP. Please read the FAQ
- for more common questions.
-
-
- What is HIP?
- ------------
-
- HIP is a place for hackers, artists, activists and
- many, many others to network themselves, both in the
- social and electronic sense of the word. HIP is a
- do-it-yourself event. We, the organizers, will provide
- the infrastructure, such as large tents, showers,
- toilets and large amounts of reliable electrical power
- and network connectivity. We'll also arrange for a
- basic set of workshops and lectures, mainly dealing
- with the social and political aspects of information
- technology, security, Internet, access to technology,
- new developments, cryptography and other 'hacker-
- related' topics that come to mind. We are open to
- suggestions for other fields of interest.
-
- At this moment we are working on discussions and
- workshops about smartcard security, Tempest attacks,
- the SPAM threat, virtual communities, cryptography and
- the law (Trusted Third Parties and Key Recovery), a
- tele-presence experiment, activism on the Net, and
- much more.
-
-
- A do-it-yourself event?
- -----------------------
-
- We will absolutely need your help setting up
- everything once we're there. HIPcamp will open on
- August 5th, three days before HIP starts. If you
- decide to join in that early expect some pretty
- primitive circumstances. If you don't care about that,
- or think that's the best part, you can help build
- HIPnet and all other facilities.
-
- We also urgently need you to think now about what it
- is you would like to see and do at HIP. Just like
- Hacking at the End of the Universe in 1993, we need
- lots of people that have ideas for organizing their
- own small part of HIP and the organizational talent to
- do this without too much help from us.
-
- One of the proven recipes for fun:
-
- * GET a group of friends together in an early stage;
- arrange how you're going to get there if you're far
- away.
-
- * THINK: Is there something you and your friends would
- like to show others, discuss or do there?
-
- * If so: TELL us about it, so we can coordinate, help
- or announce things.
-
- * Maybe BUY a nice big army surplus tent for almost
- nothing.
-
- * BRING lots of computers and other electronics.
-
- * HOOK it all up once you get there.
-
- * Check out what others have been doing and MEET nice
- people, hang out, have fun!
-
- Of course you can also come alone and have lots of
- fun, and there will be a huge exhibition tent to set
- up computers in. In another big tent there will be
- near to a thousand chairs where you can listen to and
- participate with panel discussions.
-
- This event will be big, and as said, in this stage
- we're looking for people to organize their own chaotic
- little part of it. So don't mail us saying "put me on
- the list, I want to be a volunteer" when you could say
- "I'm xxx and I'd like to do yyy." Tell us what you
- need us to do. We could put your workshop or whatever
- it is you'd like to do in one of our announcements and
- on the website, so people can communicate with you
- beforehand. We could make sure there is enough room if
- your project requires a lot of space. You name it.
-
- You can use the newsgroup alt.hacking.in.progress to
- find people to work with at HIP. Or you can use the
- notice board at the website to search for someone to
- travel with to HIP. Use it to ask for help or offer
- some.
-
- As the days get longer, there will be parts of the
- overall organization that need coordination with
- volunteers some time before the actual event (workshop
- coordination, audiovisual stuff, registration-desk,
- bar, network), but now is not yet the time.
-
- This isn't going to be passive entertainment, we all
- work together to make it work. Also: HIP is not the
- event to buy a computer or get advice on buying one,
- and there're not going to be any beginner courses on
- using the Internet. If you're not into networking of
- some sort, you'll think it's boring.
-
- But if you're very technically inclined, part of some
- remote community on the edge of the net, or if the
- politics surrounding information technology are just
- your thing, HIP is definitely made for you (and by
- you, we hope).
-
- HIPcamp will open on August 5th, three days before HIP
- starts. If you decide to join in that early expect pretty
- primitive circumstances. If you don't care about that,
- or think that's the best part, you can help build HIPnet
- and all other facilities.
-
-
- How to stay in contact:
- -----------------------
-
- * Check out the website http://www.hip97.nl/
- * Participate in alt.hacking.in.progress
- * Read the FAQ on the website or the newsgroup
- * Mail us at info@hip97.nl
-
- Snailmail us at:
-
- HIP
- Postbus 1035
- 1000 BA Amsterdam
- Netherlands
-
- Tel. +31 20 5352081
- Fax. +31 20 5352082
-
- ------------------------------
-
- Date: Mon, 24 Mar 1997 19:33:06 -0500
- From: Declan McCullagh <declan@well.com>
- Subject: File 3--Reps. White and Bliley: requesting comments on crypto policy
-
- Source - fight-censorship@vorlon.mit.edu
-
- Reps. Rick White (R-Washington) and Tom Bliley (R-Virginia) have
- been busy sending out letters requesting comments on encryption
- policy -- and asking pointed questions. The letters have gone to:
-
- Lieutenant General Kenneth Minihan, Director of the National Security Agency
-
- Secretary William Daley, United States Department of Commerce
-
- Director Louis Freeh, Federal Bureau of Investigation
-
- Ambassador David Aaron, U.S. Special Envoy for Cryptology
-
- Robert Holleyman, President of the Business Software Association
-
- Ken Wasch, President of the Software Publishers Association
-
- Kathy Kincaid, Director of I/T Security Programs at IBM
-
- Attached is the one to the NSA.
-
- -Declan
-
- *******************
-
- March 21, 1997
-
- Lieutenant General Kenneth A. Minihan
- Director
- National Security Agency/Central Security Service
- 9800 Savage Road
- Fort George G. Meade, MD 20755-6000
-
-
- Dear General Minihan:
-
- The Committee on Commerce has jurisdiction over all matters
- relating to interstate and foreign commerce, including commerce
- transacted over electronic mediums. One vehicle for interstate and
- foreign electronic commerce, the Internet, has experienced
- unexpected and exceptional growth. Our Committee has an obligation
- to ensure that the growth of electronic commerce over the Internet
- and other networks is not stifled by unnecessary or harmful
- regulation or policies. Thus, the Committee will be discussing
- what policies best promote electronic commerce over the Internet
- and other networks.
-
- The growth and success of the Internet and the World Wide Web as
- both a communications tool, and a medium for electronic commerce
- is unprecedented. Leading industry estimates indicate that the
- number of people using the Internet is increasing at the rate of
- more than 100% per year -- few technologies have had such quick
- acceptance into the daily activities of Americans. However, the
- full potential of the Internet as a means for conducting business
- transactions, or electronic commerce, has yet to be achieved. Most
- leading experts agree that a developed Internet, and corresponding
- intranets, have the capability to be engines for economic growth
- for those offering services over the Internet, and also have the
- capability to be a means for transforming business operations from
- one of paper-intensity to one conducted solely through electronic
- communications and transactions.
-
- Unlocking the full potential of the Internet and thus, promoting
- the use of electronic commerce has been difficult, in part,
- because of existing and perceived barriers, e.g., many consumers
- and businesses are concerned with the security and privacy of
- transactions that would occur over the Internet. A belief in the
- security of information passed over the Internet and through
- on-line services that use the public switched network will foster
- the continued growth of electronic commerce. Fortunately, the use
- of cryptography or encryption, either hardware or software, may
- provide a technological aid in the promotion of electronic
- commerce. We believe, however, that a sound encryption policy for
- both interstate and foreign electronic commerce must balance
- users= privacy interests with society=s interest in legitimate law
- enforcement and investigative needs and the needs to preserve
- national security.
-
- As you know, the U.S. has export restrictions on certain
- encryption products that may or may not interfere with the
- development of encryption products designed to secure
- communications and transactions. These restrictions have been the
- subject of recently proposed legislation in committees in both the
- House and Senate.
-
- Because of our responsibility over electronic commerce, we seek to
- have your views on a number of the issues related to the various
- bills. Therefore, we request that you provide written answers to
- the following questions by April 25, 1997: (1) With the
- understanding that there are no domestic restrictions on
- encryption products, please provide examples where national
- security may be jeopardized by the relaxation of current American
- export restriction policy, as incorporated in Executive Order
- 13026 and implemented, in part, in the corresponding Bureau of
- Export Administration rules of December 30, 1996. Are there
- remedies other than export restrictions that would provide the
- United States government the access it needs to encrypted
- communications, e.g., increased funding for new advanced
- computers? (2) How significant is your agencies= consultive role
- with the Department of Commerce within the current export
- restrictions? Should this role be strengthened or is it even
- necessary? How much additional application process time does your
- agencies= consultive role add to the Department of Commerce=s
- procedures? (3) It is commonly accepted that current encryption
- export restrictions imposed by the Administration will delay the
- proliferation of advanced encryption products, but that it is
- inevitable that advanced encryption products will be developed
- world-wide. In your opinion, do export restrictions prevent the
- development and distribution of advanced encryption products? (4)
- Are foreign import restrictions consistent with the
- Administration=s policy? Please identify the countries that have
- import restrictions and those that have stated their intent not to
- have any import restrictions. If the United States relaxes its
- export restrictions, do you anticipate that foreign nations will
- increase their import restrictions?
-
- In addition, we request that your staff analyze and submit their
- comments on the following: (1) the current export restrictions;
- (2) the congressional bills introduced that would alter export
- policy (H.R. 695, S. 376, S. 377); and (3) any other analysis
- related to encryption export policy your organization has
- prepared.
-
- Please have your staff contact John Morabito or Tricia Paoletta of
- the Commerce Committee staff at (202) 225-2927 if you have any
- questions regarding the above request. We thank you in advance for
- your assistance. With kindest regards, we are
-
- Sincerely,
-
-
-
- Tom Bliley
-
- Chairman
-
-
- Rick White
-
- Member of Congress
-
-
-
-
-
- -------------------------
- Time Inc.
- The Netly News Network
- Washington Correspondent
- http://netlynews.com/
-
- ------------------------------
-
- Date: Mon, 24 Mar 1997 15:02:09 -0800
- From: --Todd Lappin-- <telstar@wired.com>
- Subject: File 4--COMMENTARY: Katz on Kids and the CDA
-
-
- THE CDA DISASTER NETWORK
- March 24, 1997
-
- Amid all the banter and bluster about the Communications Decency Act,
- children have been caught in the crossfire. The CDA, though ostensibly
- aimed at protecting young'uns from the dangers of online smut, may also
- severely curtail their access to valuable information such as AIDS
- education materials and many classic works of literature. But even more
- ominously, as a government lawyer admitted before the Supreme Court last
- week, the CDA could turn kids into criminals if they discuss issues of
- sexuality online with other kids.
-
- As Jon Katz writes in his Netizen column today, "That a high-ranking
- government official would consider "unfiltered" access to Penthouse or
- Hustler a far greater danger to society than turning healthy, otherwise
- law-abiding older kids into criminals for talking about sexuality is as
- powerful a commentary as anybody could make about how irrational the
- discussion in America has become about new media, technology, morality, and
- children."
-
- Jon's piece -- and the unhappy comments about the CDA he's gotten from
- Net-savvy kids -- are thought-provoking, so I've included the full text of
- his column below.
-
- Work the network!
-
- --Todd Lappin-->
- Section Editor
- WIRED Magazine
-
- ----------------------------------------
-
- FROM: http://www.netizen.com
-
- 24 March 97
- Media Rant
-
- by Jon Katz
- <JDKatz@aol.com>
-
- Youth speak for themselves about the CDA
-
-
- Real children are voiceless and invisible even as they are ostensibly at
- the center of the raging national debate about ensuring their safety
- from media, technology, advertising, and pornography. Even though
- champions of the Communications Decency Act of 1996 characterize the
- Internet as a danger, and a "revolutionary means for displaying patently
- offensive, sexually explicit material to children in the privacy of
- their homes," no children are ever heard from in discussions about their
- safety.
-
- Adults, politicians, and journalists feel free to define kids, delineate
- dangers facing them, curb other people's freedom in the name of
- protecting them - yet they are eerily absent from discussions about
- their welfare. And if you spend any time talking to them, it's clear
- why. They aren't afraid of new media, and aren't in danger from it.
-
- In more than six weeks of touring to discuss children, morality, and old
- and new media on behalf of my book Virtuous Reality, I never saw or
- heard from a single young person on more than 150 radio and television
- appearances, almost every one of which talked about kid's cultural lives
- and the many "dangers" arising from TV, movies, and the Internet.
-
- In the oral arguments before the Supreme Court in Washington on
- Wednesday discussing the constitutionality of the CDA, US Supreme Court
- Justice Stephen Breyer elicited a shocking admission from government
- lawyers - buried deep in most media reports - that the CDA would
- criminalize countless teenagers who speak about their sexual lives, real
- or imagined, over email or other Net forums.
-
- Breyer asked Deputy Solicitor General Seth Waxman if the CDA "would
- suddenly make large numbers of high school students across the country
- guilty of federal crimes."
-
- That might be the case, argued Waxman, who added that the prospect of
- turning hundreds of thousands of teens into federal criminals because
- they yak about sex was "a small price to pay" to protect children from
- unfettered access to Penthouse, Hustler, and other sexually explicit
- material.
-
- That a high-ranking government official would consider "unfiltered"
- access to Penthouse or Hustler a far greater danger to society than
- turning healthy, otherwise law-abiding older kids into criminals for
- talking about sexuality is as powerful a commentary as anybody could
- make about how irrational the discussion in America has become about new
- media, technology, morality, and children.
-
- Given the willingness of politicians and government officials to brand
- adolescent sexual discussion as criminal behavior, it seems all the more
- outrageous that media and politicians have completely excluded the young
- from this discussion. But then, kids won't tell them what they want to
- hear. Children are presumed by politicians and journalists to be too
- stupid, vulnerable, and powerless to join in discussions involving their
- cultural lives and welfare. This is a huge mistake for both politics and
- media. An entire generation of kids is growing up seeing politicians and
- reporters as both clueless and useless. Both of these institutions seem
- to have forgotten that these are future voters and future consumers. But
- these kids may have long memories, judging from the email I get.
-
- If the Net is about anything, it's about giving voice and expression to
- people who haven't had much, especially in mainstream journalism and
- politics.
-
- Writing about the rights of children in the digital age in a Wired magazine
- article, about music sanitization at Wal-Mart, kids and
- pornography and other issues, I've gotten a lot of email from people
- under 18. Some of these kids email me regularly. Some volunteered their
- opinions about the CDA this week, and I emailed others asking what they
- thought about it.
-
- All the first names and cities are real. So are all the quotes. I
- cleaned up some misspellings and edited out some sentences for space.
- Otherwise, they are quoted directly from email posts. Not one of the
- children I corresponded with felt the Internet was dangerous or felt
- there was a need for federal policing of "decency" on the Internet.
- Almost all wondered why the government didn't move as aggressively to
- tackle the real problems many of them see every day.
-
- Jim from Kansas City, 14, writes: "I don't feel I need protection from
- the Internet. Why hasn't anybody asked kids like me? I'd love to go in
- front of the Supreme Court and tell them how great the Internet is. My
- parents taught me not to give out my name, address, or send anything to
- somebody I don't know. They taught me that when I was 10. I've been
- approached once by somebody who asked me if I wanted to send him some
- pictures for money, and that was in a Usenet group. I said no. It's
- obvious that wouldn't be a good idea."
-
- Patricia from San Jose, 16: "They say this law is supposed to protect
- me, when it would put me in jail for talking with my camp roommates
- about sex? Who are they kidding? They aren't trying to protect me.
- They're trying to control my life and keep power for themselves. I'm not
- stupid. I can take care of myself. Why don't they take care of people
- with real problems?"
-
- Donna, 15, from Philadelphia: "I have rights. I have freedoms, too. Why
- are all these old white men telling me what is moral for me?"
-
- Arrow from New York City, 9: "The Internet is a great place. I'm not
- scared of it all. Nobody has ever showed me a dirty picture, and I
- wouldn't give anybody my address or telephone number, and nobody has
- asked. I go into AOL chats, and I've seen dirty words, but I used them
- anyway, before I ever went onto a computer. The kids in my school use
- them. I don't think that hurts me. Mostly online I email my pen pals
- from other countries and go onto movie and TV Web sites and play games.
- My life is so cool since the Internet. I do my homework there, too."
-
- Heather from Minneapolis, 14: "Kids in my school form gangs. They carry
- guns. Guns are easy to get, but they want to make it a crime to talk
- dirty on the Internet? Brother! These kids really hurt each other,
- because they don't have parents who will take care of them and watch out
- for them. My parents watch out for me. They got me a computer because my
- mom didn't want me to have trouble getting into a good school and
- getting a good job. She did it because she loves me. She had to work
- hard to buy me this computer. If these people in Washington want to help
- kids, why don't they train them to find jobs, and take guns off the
- streets, and make it a crime to have children when you can't take care
- of them. If they try to tell me what to say on a computer, they'll be
- surprised, because my friends and I will never let them do that. I can
- speak freely on the computer. I can't in school. They should be ashamed
- of themselves."
-
- JimmyD from Arkansas, 12: "No wonder everybody hates Washington. They're
- incredibly stupid and clueless. Penthouse isn't dangerous for me.
- Getting killed by a gun is dangerous to me. Don't they have anything to
- do there but to worry about whether I use dirty words? My father yelled
- at me and asked me if I ever looked at Playboy online. I asked him if he
- ever looked at Playboy when he was my age, and he sent me to my room.
- There are a lot of hypocrites in the world. And most of them live in
- Washington. That's what the CDA teaches me."
-
- Patricia from Brooklyn, 12: "There are a lot of scary people in the
- world, I think. My friend Arquette was shot in the street. But a
- computer [her grandmother bought her one] is the safest thing I do. I
- love it. I can get dirty pictures anywhere. But online, I have new
- friends from everywhere. I can handle some dirty words. Bullets and
- knives scare me."
-
- Andreas from New Orleans, 11: "What's with these people, man? I do
- homework online. I use my computer to write. I have friends from all
- over the world, and I live in a tiny apartment! If I use a dirty word -
- OK, I've seen some naked women - is that a crime? Why can't I look at a
- picture of a naked woman? I get good grades. I don't hurt anybody. I
- don't need protection from the FBI when I go online. My dad told me
- never to give out my phone number or the place where I live. I don't.
- That ain't hard."
-
- Sandy from Chicago, 13: "My biggest fear? No jobs when I grow up. My
- sister has been looking for work for five years. It's hard out there,
- she says. The Internet isn't scary. It's fun and interesting. There's
- sexual stuff out there, sure. But you don't have to go looking for it,
- and you can avoid it. My mom told me if I ever see anything I don't like
- or understand, turn the computer off and go get her. That's pretty easy.
- Five kids got beat up at the school dance last week. One of them had a
- knife. That's scary. I'd take a computer anytime."
-
- According to the Center for Missing and Exploited Children, fewer than
- 30 young people have been harmed as the result of online encounters in
- the history of the Internet, which encompasses billions of interactions
- involving children every week. Of these, most were adolescents and
- teenagers who were drawn into dangerous and unhealthy relationships. In
- l995, nearly 5,000 American children were killed by guns, which are
- available from Wal-Mart and other fine stores.
-
-
- Copyright =A9 1994, 1995, 1996, 1997 HotWired, Inc. All rights reserved.
-
- ###
-
- +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
- This transmission was brought to you by....
-
- THE CDA DISASTER NETWORK
-
- The CDA Disaster Network is a moderated distribution list providing
- up-to-the-minute bulletins and background on efforts to overturn the
- Communications Decency Act.
-
- To SUBSCRIBE, send email to <majordomo@wired.com> with "subscribe
- cda-bulletin" in the message body. To UNSUBSCRIBE, send email to
- <info-rama@wired.com> with "unsubscribe cda-bulletin" in the message body.
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.26
- ************************************
-
-
-