home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Sep 21, 1997 Volume 9 : Issue 70
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.70 (Sun, Sep 21, 1997)
-
- File 1--Possible story--Clinton / pager interception
- File 2--Anti-Spam Bills in Congress
- File 3--Spammers Sued In Michigan (Chip Cryderman)
- File 4--Cyber Promotions tossed offline (fwd)
- File 5--ALERT: Call Congress on 9/22 to Stop Big Brother!!
- File 6--Fwd: Designing Effective Action Alerts for the Internet
- File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 20 Sep 1997 23:11:21 -0500
- From: cudigest@SUN.SOCI.NIU.EDU (Cu Digest)
- Subject: File 1--Possible story--Clinton / pager interception
-
- ((MODERATORS' NOTE: The following post, along with additional
- related material, arrived a bit garbled, and the original header
- and some of the content was deleted. Apologies to the original
- poster)).
-
- -------
-
- 19 September 1997
- Source: David Wagner
- _________________________________________________
-
- To--jya@pipeline.com
- From--David Wagner <daw@cs.berkeley.edu>
- Subject--Possible story--Clinton / pager interception
- Date--Fri, 19 Sep 1997 13:28:23 -0700 (PDT)
-
- Hello-- I have a possible news story tip, and I thought you might be
- interested.
-
- A hacker today announced the interception of Pres. Clinton's pager
- messages (along with pager messages destined for staff, Secret Service
- agents, and other members of his entourage) during his recent trip to
- Philadelphia. This is coming as an embarassment to the administration's
- policy on communications privacy and encryption.
-
- The lengthy transcript of pager messagers was published on the Internet
- today to demonstrate that the pager infrastructure is highly insecure.
-
- (Apparently the Pres.'s entourage relies a lot on pagers for
- communications. There are messages from Hilary and Chelsea; a
- Secret Service scare; late-breaking basketball scores for the
- Pres.; staffers exchanging romantic notes; and other amusements.)
-
- This comes at quite an embarassing time for the administration,
- given their policy on encryption. Strong encryption is the one
- technology that could have protected Pres. Clinton's private pager
- messages, but the administration has been fighting against strong
- encryption. Top FBI officials have been giving many classified
- briefings to House members, asking them to ban all strong
- encryption in the US. These proposals are expected to reach the
- House floor soon, attached to the (originally pro-encryption) SAFE
- bill.
-
- An anonymous White House staffer was quoted as saying that it
- would be "an expensive and complicated proposition" to put
- encryption into pagers and cellphones. This quote is interesting,
- because it's the White House's crypto policies that have made it
- so complicated and expensive to add strong encryption -- the
- cellphone and pager industries have wanted to add strong
- encryption for privacy and security, but the administration has
- forcefully dissuaded them from doing so.
-
- Anyhow, the press release is at
-
- http://www.inch.com/~esoteric/pam_suggestion/formal.html
-
- The transcript of the pager messages (complete with basketball
- scores for the Pres, messages to call wifey, two phone calls from
- Chelsea --who got put on hold, staff romances, a Secret Service
- scare, etc.) is at
-
- http://www.inch.com/~esoteric/pam_suggestion/output.html
-
- Feel free to get in touch by email (daw@cs.berkeley.edu) or by
- phone (510-643-9435) with me if you'd like more information,
- quotes, or the like.
-
- ------------------------------
-
- Date: Tue, 2 Sep 1997 15:51:59 GMT
- From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
- Subject: File 2--Anti-Spam Bills in Congress
-
- Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997
-
- Unsolicited e-mail advertisement, or "spam," has few fans on the
- net. Court battles have been waged between service providers, such
- as AOL and Compuserve, and spam advertisers, including Cyber
- Promotions, over whether the thousands of messages sent to user
- e-mails can be blocked. Congress and several state legislatures
- have also stepped into the debate and have introduced some bills
- fraught with First Amendment problems because they ban commercial
- speech altogether or are content specific.
-
- Traditionally, commercial speech restrictions on telemarketing
- calls and unsolicited fax advertisements have passed First
- Amendment challenges but direct mail and door-to-door
- solicitations enjoy much greater protection. Given the Supreme
- Court decision in ACLU v. Reno, on-line messages should receive
- the same First Amendment protection given traditional print media,
- which includes commercial mailings. Thus, while netizens may laud
- efforts to curb spam, it is unclear whether some of the
- unsolicited commercial e-mail bills can pass constitutional
- muster.
-
- Even more troubling are the state spam bills which create
- different rules for each state that advertisers will have to
- follow. Under some state bills, if a spam message is sent or made
- available to a resident in one state, it could confer jurisdiction
- over the sender and could subject them to liability if they are in
- violation of local law. A federal judge recently ruled that state
- control or regulation of Internet communications violates the
- Commerce Clause of the Constitution. In the decision in ALA v.
- Pataki, which involved a challenge by the ACLU to a New York
- Internet decency law, federal district Judge Loretta Preska
- declared that states are prohibited from regulating an interstate
- communication which merely passes through their borders. Judge
- Preska warned of the extreme danger that state regulation would
- pose to the Internet, rejecting the state's argument that the
- statute would even be effective in preventing so-called
- "indecency" from reaching minors. Hence, state spam bills will
- probably not withstand constitutional challenges.The decision in
- ALA v. Pataki is available at
- <http://www.aclu.org/court/nycdadec.html>
-
- Below is a synopsis of the federal bills and the first state
- enacted law on spam from Nevada. The ACLU objected to an earlier,
- even broader version of the Nevada law before its enactment and is
- considering participating in a challenge to the law. The Nevada
- law, as enacted contains broad definitions of e-mail that may
- include advertisements on web sites and other on-line forums. Full
- text of the federal bills is available at
- <http://www.jmls.edu/cyber/statutes/email/>
-
- Netizens Protection Act of 1997, Introduced May 22,1997 (H.R.
- 1748):
-
- Sponsored by Rep. Chris Smith (R-N.J.) would amend the Telephone
- Consumer Protection Act of 1991, ("TCPA") which regulates
- telemarketing and junk-faxes to include unsolicited e-mail
- advertisements. The bill would ban unsolicited e-mail and only
- permit the sending of commercial messages where there is a
- pre-existing relationship between the sender and recipient, or
- when the recipient has requested the information. The bill
- provides for hefty penalties for violations.
-
- Unsolicited Commercial Electronic Mail Choice Act of 1997, (S.
- 771):
-
- Sponsored by Sen. Frank Murkowski (R-AL) the bill would require
- senders to label content of a commercial e-mail message as an
- "advertisement" and to honor recipient "opt-out" requests within
- 48 hours, and put the burden of blocking spam on ISPs. Failure by
- ISPs to filter out messages would result in liability and steep
- penalties for providers, not spammers.
-
- Electronic Mailbox Protection Act of 1997, introduced June 11,1997
- (S.875):
-
- Sponsored by Sen. Robert Torricelli (D-NJ) the bill would restrict
- the use of false e-mail addresses or domain names to avoid
- filtering by commercial advertisers. Spammers would also be
- required to honor recipient "opt-out" requests, and violators
- would be hit with civil penalties up to $5,000.
-
- Data Privacy Act of 1997, introduced July 31, 1997 (H.R. 2368):
-
- Sponsored by Rep. Tauzin the bill would create an industry working
- group to draft voluntary guidelines with incentives for
- advertisers who adopt them to: limit the collection and use, for
- commercial marketing purposes, of personally identifiable
- information obtained from individuals through any interactive
- computer service; require unsolicited e-mail advertisers to
- identify the sender, including a valid reply address; disclose
- when such information is gathered; provide a consumer opt-out
- provision; limit the display of social security numbers and
- prohibit the commercial marketing and use of medical information.
-
- Nevada Anti-Spam Law: Senate Bill 13 , enacted July 8, 1997 and
- goes into effect on July 1, 1998:
-
- Under the law, transmitting commercial advertisements in the form
- of e-mail may subject the sender to civil fines and provides that
- a recipient may enjoin the sender from such future conduct and may
- receive restitution. The law defines an advertisement as material
- that advertises for commercial purposes the availability or the
- quality of real property, goods or services; or is designed or
- intended to solicit a person to purchase real property, goods or
- services. The law also imposes liability upon Internet Service
- Providers since it applies to any party that causes to be
- transmitted commercial mail.
-
- The exception to the law permits sending commercial e-mail where:
- (a) The person has a preexisting business or personal relationship
- with the recipient; (b) The recipient has expressly consented to
- receive the item or (c) The advertisement is readily identifiable
- as promotional, or contains a statement providing that it is an
- advertisement, and clearly and conspicuously provides: (1) The
- legal name, complete street address and electronic mail address of
- the person transmitting the electronic mail; and (2) A notice that
- the recipient may decline to receive additional electronic mail
- that includes an advertisement from the person transmitting the
- electronic mail and the procedures for declining such electronic
- mail.
-
- The full text of the Nevada law is available at
- <http://www.leg.state.nv.us/97bills/SB/SB13_EN.HTM>
-
- ------------------------------
-
- Date: Fri, 5 Sep 1997 09:10:19 -0400 (EDT)
- From: editor@TELECOM-DIGEST.ORG
- Subject: File 3--Spammers Sued In Michigan (Chip Cryderman)
-
- Source - TELECOM Digest Volume 17 : Issue 233
- (Editor: Patrick A. Townson)
-
- ((MODERATORS' NOTE: For those not familiar with Pat Townson's
- TELECOM DIGEST, it's an exceptional resource. From the header
- of TcD:
- "TELECOM Digest is an electronic journal devoted mostly but
- not exclusively to telecommunications topics. It is
- circulated anywhere there is email, in addition to various
- telecom forums on a variety of public service systems and
- networks including Compuserve and America On Line. It is also
- gatewayed to Usenet where it appears as the moderated
- newsgroup 'comp.dcom.telecom'. Subscriptions are available to
- qualified organizations and individual readers. Write and tell
- us how you qualify:
- * ptownson@massis.lcs.mit.edu * ======" ))
- ==================
-
- From--ccryderman@ccm.frontiercorp.com (Chip Cryderman)
- Date--Thu, 04 Sep 97 17:19:23 -0500
-
- Pat,
-
- In today's {Detroit Free Press} there was an article about an ISP,
- RustNet, based in Livonia, MI. who has filed suit in US. District
- Court.
-
- US District Court Judge Paul Borman issued a restraining order against
- brothers, Benjamin & Randell Bawkon, owners of Bawkon Development
- Company, forbidding them from engaging in any spamming. Their computer
- records were sized by federal Marshals last Friday.
-
- RustNet President Steve Corso claims in his suit that the brothers
- sent out hundreds of thousands of e-mails in August falsely using
- RustNet's return address. According to the article, RustNet has been
- getting thousands of complaints and has even lost customers to these
- spams.
-
- I hope he takes them to the cleaners. I hope the case goes to court
- and RustNet gets their homes and cars and anything else they may have
- a value. Hell, maybe the brothers can start a tag team in prison.
-
-
- Chip Cryderman
-
- ---
-
- [TELECOM Digest Editor's Note: That's great! It really is good news
- in the fight against the insects and rodents who have infested the
- net over the past couple years. I hope if they have a victory in
- court it will serve as encouragement for other ISP's to use the
- same tactics. PAT]
-
- ------------------------------
-
- Date: Sun, 21 Sep 1997 15:33:58 -0500
- From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 4--Cyber Promotions tossed offline (fwd)
-
- Source - News Com at http://www.news.com/News/Item/0,4,14429,00.html?owv
-
- ............
-
- Cyber Promotions tossed offline
- By Janet Kornblum
- September 19, 1997, 1:25 p.m. PT
-
- Cyber Promotions, antispammers' enemy No. 1 on the Net, has once again
- been dumped by its access provider.
-
- Backbone provider AGIS cut off Cyber Promotions Wednesday, and the
- company has been scrambling for another ISP since.
-
- It was unclear exactly why Cyber Promotions was cut off, but an
- employee who answered the phone at AGIS's main switchboard declined to
- comment beyond the following: "They were in violation of security, and
- that's as far as I can go with it." No one else at AGIS would comment,
- either, the employee added.
-
- .................
-
- Wallace said today that Cyber Promotions found itself cut off from
- AGIS Wednesday and that it took two days to find other providers where
- the company could mount portions of its service. But some of its
- clients are still without service, he added.
-
- ....................
-
- "Ping-flood attacks observed originating from the West Coast into AGIS
- and directed to the Washington and Philadelphia routers severely
- degraded AGIS network performance to [an] unacceptable level...AGIS
- had no alternative but to shut off services to Cyber Promotions,"
- reads a statement that Wallace put on his page. He alleged that the
- statement came from an AGIS engineer.
-
- ....................
-
- ------------------------------
-
- Date: Thu, 18 Sep 1997 15:48:58 -0400
- From: Jonah Seiger <cdt-editor@CDT.ORG>
- Subject: File 5--ALERT: Call Congress on 9/22 to Stop Big Brother!!
-
- Please forward where appropriate until September 28, 1997
-
- This alert brought to you by
- The Voters Telecommunications Watch, The Center for Democracy & Technology,
- the Electronic Frontier Foundation, Wired Magazine,
- and Americans for Tax Reform
- STOP THE GOVERNMENT FROM BUILDING BIG BROTHER INTO THE INTERNET
-
- In 1948, George Orwell described a future world in which Big Brother
- peaked over the shoulder of every citizen -- watching every move and
- listening to every word.
-
- Now, in 1997, the FBI is pushing the United States Congress to pass
- legislation which would make George Orwell's frightening vision a reality.
-
- Next week the House Commerce Committee will meet to consider a
- proposal that would require all Americans to provide the government
- guaranteed access to their private online communications and business
- transactions. Taking a page out of Orwell's 1984, the FBI-spawned
- proposal would require that every part of the Internet -- from the
- software on your computer to the network provider that carries your
- messages around the net -- be jury-rigged to divulge your private
- conversations immediately on request by the FBI (see below).
-
- Unfortunately, this is not a work of fiction.
-
- The amendment, to be offered by Representatives Mike Oxley (R-OH) and
- Thomas Manton (D-NY), is a serious threat to your privacy and represents
- the first and final step in the construction of a National Surveillance
- Infrastructure.
-
- A vote is expected on September 25. The future of privacy and security
- in the information age is in the hands of the Commerce Committee, and
- they need to know that folks are watching and care about the outcome.
-
- On Monday September 22, please join thousands of Internet users all across
- the country as we call on Congress to stop big brother. With your help and
- support, we can ensure that George Orwell's 1984 does not become a reality.
-
- All the information you need is attached below.
-
- _____________________________________________________________
- WHAT YOU CAN DO
-
- 1. ON MONDAY SEPTEMBER 22, pick up the phone and call as many of the four
- leading members of the Commerce committee as you can:
-
- Chairman Thomas Bliley (R-VA) (202) 225-2815
- Ranking member John Dingell (D-MI) (202) 225-4071
- Rep. Tauzin (R-LA) (202) 225-4031
- Rep. Markey (D-MA) (202) 225-2836
-
- 2. Ask for the staffer that handles the encryption issue.
-
- 3. Say that you're calling to urge the Congressman to pass SAFE (HR695)
- without amendments.
-
- Specifically, say that you "OPPOSE THE OXLEY/MANTON BIG BROTHER AMENDMENT.
- Americans should not be required to give the government keys to the front
- door of their house, and they shouldn't be required to give the government
- the keys to unlock their private online communications."
-
- Other amendments may be proposed. Please urge the Congressman to pass SAFE
- "as is" and oppose any amendments. Feel free to use your own words though
- here are some points you might want to stress:
-
- - Oxley/Manton is a dramatic expansion of law enforcement power. It would
- give law enforcement "immediate" access to private online communications
- and business transactions without any notice or knowledge to the user.
-
- - Oxley/Manton is NOT A BALANCE BETWEEN PRIVACY INTERESTS AND LAW
- ENFORCEMENT CONCERNS, as some supporters have argued. It gives the FBI
- broad new power while stripping Americans of their Fourth Amendment right
- to be secure from unreasonable searches and seizures.
-
- - Oxley/Manton would give the Attorney General authority to dictate the
- design of Internet services and software to suit the needs of law
- enforcement.
-
- - Oxley/Manton would not stop crime. Strong encryption without "immediate
- access" features is available today at home and abroad.
-
- - Oxley/Manton would increase opportunities for cybercrime as criminal hackers
- attack vulnerabilities in the key recovery access system.
-
- 4. Let us know how it went! Go to one of the following web pages, depending
- on who you called, and tell us about the conversation.
-
- Rep. Bliley http://www.crypto.com/member/meet.cgi?membid=va07
- Rep. Dingell http://www.crypto.com/member/meet.cgi?membid=mi16
- Rep. Tauzin http://www.crypto.com/member/meet.cgi?membid=la03
- Rep. Markey http://www.crypto.com/member/meet.cgi?membid=ma07
-
- 5. Forward this ALERT to your friends and colleagues.
-
- 6. Feel good about yourself! Know that you've stood up for privacy, and
- contacting Congress is more than most people take the time to do!
-
- ____________________________________________________________
- BACKGROUND
-
- The House Commerce Committee is considering a bill known as the "Security and
- Freedom through Encryption Act" (HR 695, a.k.a. SAFE). SAFE would
- encourage the widespread availability of strong, easy-to-use encryption
- technologies in order to protect privacy and promote electronic commerce on
- the Internet. SAFE enjoys broad support from Internet users, civil
- liberties advocates, and over 250 members of Congress.
-
- Last week, the Commerce Committee delayed its vote on the SAFE bill in
- order to give the Committee more time to study the implications of the
- Oxley/Manton amendment, which would change SAFE to ban encryption which
- does not contain features that provide law enforcement with "immediate
- access" to the plain text of encrypted information, including private
- communications and business transactions (visit
- http://www.crypto.com/safe_bill/)
-
- The Oxley/Manton amendment would for the first time impose sweeping
- restrictions on the ability of American citizens to protect their privacy
- on US soil. Specifically, the amendment would:
-
- * PROHIBIT THE DOMESTIC MANUFACTURE AND SALE OF ENCRYPTION PRODUCTS OR
- SERVICES WHICH DO NOT PROVIDE INSTANT ACCESS FOR LAW ENFORCEMENT: The
- proposal would prohibit the manufacture, sale, import, or distribution
- within the United States of any encryption product unless it allows
- "immediate access" to the plain text of any user's messages or files
- without the user's knowledge.
-
- * GRANT BROAD NEW AUTHORITY FOR THE ATTORNEY GENERAL TO SET TECHNICAL
- STANDARDS FOR ENCRYPTION PRODUCTS: The proposal allows the Attorney
- General to set standards for what are and are not acceptable
- encryption products. The proposal's requirement of immediate access to
- plain text would seem to seriously limit the options available to
- encryption manufacturers seeking approval of their products.
-
- The amendment does not specify whether the immediate access "features"
- could be activated (or not) at the option of the purchaser or end user.
- Nonetheless, requiring that such a capability be installed in all domestic
- communications networks and encryption products is the equivalent of
- enabling a national surveillance infrastructure and asserts unprecedented
- control over the design of Internet software, hardware, and services.
-
- The amendment is analogous to the government requiring surveillance cameras
- in every new house built in the United States, which could be turned on
- remotely by the police if you were ever suspected of committing a crime.
-
- Worse yet, such "key escrow" or "key recovery" technologies pose
- significant risk to the security of the Internet -- providing new
- points of vulnerability for hackers, terrorists, and industrial spies
- to exploit. A recent study by 11 of the worlds leading cryptographers
- concluded that the large scale deployment of such technologies would be
- too complex and too insecure to meet the needs of an Information Age
- society (see http://www.crypto.com/key_study/)
-
- Despite widespread opposition from Internet users, civil liberties
- groups, privacy advocates, and the computer and communications
- industries, Oxley and Manton plan to push for this FBI spawned amendment
- at the Commerce Committee vote. If it is adopted, it would
- represent the first and final step in the development of a national
- surveillance infrastructure.
-
- ____________________________________________________________
- ABOUT THIS ALERT
-
- This message was brought to you by the Center for Democracy and
- Technology (http://www.cdt.org), the Voters Telecommunications Watch
- (http://www.vtw.org/), the Electronic Frontier Foundation
- (http://www.eff.org/), Wired Magazine (http://www.wired.com/), and
- Americans for Tax Reform (http://www.atr.org/) who have joined together
- on this alert.
-
- ------------------------------
-
- Date: Thu, 18 Sep 97 09:37:18 -0000
- From: Gordon Meyer <grmeyer@apple.com>
- Subject: File 6--Fwd: Designing Effective Action Alerts for the Internet
-
-
- ---------------- Begin Forwarded Message ----------------
- Date-- 09/18 2:34 AM
- From-- Phil Agre, pagre@weber.ucsd.edu
- Reply-To-- rre-maintainers@weber.ucsd.edu
-
- Designing Effective Action Alerts for the Internet
-
- Phil Agre
- Department of Communication
- University of California, San Diego
- La Jolla, California 92093-0503
- USA
-
- pagre@ucsd.edu
- http://communication.ucsd.edu/pagre/
-
- Version of 17 September 1997. Copyright 1997, all rights
- reserved. You are welcome to forward this article in electronic
- form to anyone for any non-commercial purpose.
-
-
- An action alert is a message that someone sends out to the net
- asking for a specific action to be taken on a current political
- issue. Well-designed action alerts are a powerful way to invite
- people to participate in the processes of a democracy. Having
- seen many action alerts in my twenty years on the Internet, I have
- tried to abstract some guidelines for people who wish to use them.
- Even if you do not plan to construct any action alerts yourself, I
- do not recommend that you forward anybody else's alerts unless
- they conform to at least the spirit of these guidelines. If I
- sometimes seem stern or didactic in my prescriptions, please
- forgive me. It's just that I've seen badly designed action alerts
- do an awful lot of damage.
-
- Although an Internet action alert should always be part of an
- issue campaign with a coherent strategy and clear goals, I won't
- discuss the larger strategic questions here. Instead, I will
- simply divide action alerts into two categories, single messages
- and structured campaigns. Single alerts are broadcast in the hope
- that they will propagate to the maximum possible number of
- sympathetic Internet users. Structured campaigns are typically
- conducted through mailing lists specially constructed for the
- purpose, and their intended audience may include either the whole
- Internet universe or a narrower group of already-mobilized
- partisans.
-
- Both types of action alerts are obviously modeled on things that
- have been happening on paper, through telephone trees, and lately
- via fax machines, for a long time. What computer networks do is
- make them a lot cheaper. A networked alert can travel far from
- its origin by being forwarded from friend to friend and list to
- list, without any additional cost being imposed on the original
- sender. This phenomenon of chain-forwarding is important, and it
- behooves the would-be author of an action alert, whether a single
- message or a whole campaign, to think through its consequences:
-
- (1) Establish authenticity. Bogus action alerts -- such as the
- notorious "modem tax" alert -- travel just as fast as real ones.
- Don't give alerts a bad name. Include clear information about the
- sponsoring organization and provide the reader with several ways
- of tracing back to you -- e-mail address, postal address, URL,
- phone number, etc. Including this contact information makes sense
- anyway -- you want people to join your movement, and this means
- establishing contact with you. One way to establish authenticity
- is by appending a digital signature, presumably using PGP. Few
- people will check the signature, though, and many people will
- remove the signature when they forward your message to others. So
- there's no substitute for clearly explaining who you are and
- giving people a way to reach you.
-
- (2) Put a date on it. Paper mail and faxes get thrown away
- quickly, but action alerts can travel through the Internet
- forever. Even if an alert seems to have faded away, it can sleep
- in someone's mailbox for months or years and then suddenly get a
- new life as the mailbox's owner forwards it to a new set of lists.
- Do not count on the message header to convey the date (or anything
- else); people who forward Internet messages frequently strip off
- the header. Even better, give your recommended action a clearly
- stated time-out date, e.g., "Take this action until February 17,
- 1998". If you think there will be follow-up actions, or if you
- want to convey that this is part of an ongoing campaign, say so.
- That way, people will contact you or look out for your next alert.
-
- (3) Include clear beginning and ending markers. You can't prevent
- people from modifying your alert as they pass it along.
- Fortunately, at least in my experience, this only happens
- accidentally, as extra commentary accumulates at the top and
- bottom of the message as it gets forwarded. So put a bold row of
- dashes or something similar at the top and bottom so extra stuff
- will look extra. That way it will be very clear what you and your
- credibility are standing behind.
-
- (4) Beware of second-hand alerts. Although it is uncommon for
- someone to modify the text of your alert, sometimes people will
- foolishly send out their own paraphrase of an alert, perhaps based
- on something they heard verbally. These second-hand alerts
- usually contain exaggerations and other factual inaccuracies, and
- as a result they can easily be used to discredit your alert. If
- you become aware of inaccurate variants of your alert, you should
- immediately notify relevant mailing lists of the existence of
- these second-hand alerts. Explain clearly what the facts are and
- aren't, implore the community not to propagate the misleading
- variants, and provide pointers to accurate information including a
- copy of your own alert. This action has two virtues: first, it
- may help to suppress the mistaken reports; and second, it
- positions you (accurately, I hope) as a responsible person who
- cares about the truth.
-
- (5) Think about whether you want the alert to propagate at all.
- If your alerts concern highly sensitive matters, for example the
- status of specifically named political prisoners, then you will
- probably want to know precisely who is getting your notices, and
- how, and in what context. If so, include a prominent notice
- forbidding the alert's recipients from forwarding it.
-
- (6) Make it self-contained. Don't presuppose that your readers
- will have any context beyond what they'll get on the news. Your
- alert will probably be read by people who have never heard of you
- or your cause. So define your terms, avoid references to previous
- messages on your mailing list, and provide lots of background, or
- at least some simple instructions for getting useful background
- materials. In fact, you might consider making the e-mailed alert
- relatively short and include the URL for a Web page that provides
- the full details. Your most important audience consists of people
- who are sympathetic to your cause and want to learn more about it
- before they can take action. Write your alert with that type of
- reader in mind, not the complete insider or the apathetic
- stranger.
-
- (7) Ask your reader to take a simple, clearly defined, rationally
- chosen action. For example, you might ask people to call their
- representatives and express a certain view on an issue. In this
- case, you should provide a way to find that representative's name
- and number, and explain how to conduct the conversation: what to
- say, how to answer certain likely questions, and so on. The
- purpose of such a script is not to impose your thinking but to
- help people to learn a skill that might otherwise be intimidating.
- Decide whether to ask for e-mail messages (which can be huge in
- number but near-zero in effect), written letters (which will be
- fewer but more effective), or phone calls (which fall in between).
- Consider other options as well: perhaps the sole purpose of your
- alert is to solicit contacts from a small number of committed
- activists, or to gather information, or to start a mailing list to
- organize further actions.
-
- (8) Make it easy to understand. It is absolutely crucial to begin
- with a good, clear headline that summarizes the issue and the
- recommended action. Use plain language, not jargon. Check your
- spelling. Use short sentences and simple grammar. Choose words
- that will be understood worldwide, not just in your own country or
- culture. Solicit comments on a draft before sending it out.
-
- (9) Get your facts straight! Your message will circle the earth,
- so double-check. Errors can be disastrous. Even a small mistake
- can make it easy for your opponents to dismiss your alerts -- and
- Internet alerts in general -- as "rumors". Once you do discover a
- mistake, it will be impossible to issue a correction -- the
- correction will probably not get forwarded everyplace that the
- original message did.
-
- (10) Start a movement, not a panic. Include a phrase like "post
- where appropriate" toward the beginning so that people aren't
- encouraged to send your alert to mailing lists where it doesn't
- belong. Do not say "forward this to everyone you know". Do not
- overstate. Do not plead. Do not say "Please Act NOW!!!". Do not
- rant about the urgency of telling everyone in the world about your
- issue. You're not trying to address "everyone"; you're trying to
- address a targeted group of people who care about the issue. And
- if the issue really is time-critical then just explain why, in
- sober language. Do not get obsessed with the immediate situation
- at hand. Your message may help avoid some short-term calamity,
- but it should also contribute to a much longer-term process of
- building a social movement. Maintaining a sense of that larger
- context will help you and your readers from becoming dispirited in
- the event that you lose the immediate battle.
-
- (11) Tell the whole story. Most people have never heard of your
- issue, and they need facts to evaluate it. Facts, facts, facts.
- For example, if you think that someone has been unjustly convicted
- of a crime, don't just give one or two facts to support that view;
- most people will simply assume they are getting half the truth.
- If your opponents have circulated their own arguments, you'll need
- to rebut them, and if they have framed the facts in a misleading
- way then you'll need to explain why. On the other hand, you need
- to write concisely. Even if you're focused on the actions, good
- explanations count more. After all, one of the benefits of your
- action alert -- maybe the principal one -- is that it informs
- people about the issue. Even if they don't act today, your
- readers will be more aware of the issue in the future, provided
- that you don't insult their intelligence today.
-
- (12) Don't just preach to the converted. When you are very caught
- up in your cause, it is easy to send out a message in the language
- you use when discussing the issue with your fellow campaigners.
- Often this language is a shorthand that doesn't really explain
- anything to an outsider. If you really care about your issue,
- you'll take the time to find language that is suitable for a much
- broader audience. This can take practice.
-
- (13) Avoid polemics. Your readers should not have to feel they
- are being hectored to go along with something from the pure
- righteousness of it. Some people seem to associate non-polemical
- language with deference, as if they were being made to bow at the
- feet of the king. This is not so. You will not succeed unless
- you assume that your readers are reasonable people who are willing
- to act if they are provided with good reasons.
-
- (14) Make it easy to read. Use a simple, clear layout with lots
- of white space. Break up long paragraphs and use bullets and
- section headings to avoid visual monotony. If your organization
- plans to send out action alerts regularly, use a distinctive
- design so that everyone can recognize your "brand name" instantly.
- Use only plain ASCII characters, which are the common denominator
- among Internet character sets. Just to make sure, do not use a
- MIME-compliant mail program to send the message; use a minimal
- program such as Berkeley mail. MIME is great, but not everybody
- uses it and you don't want your recipients getting distracted from
- your message by weird control codes. Format the message in 72
- columns or even fewer; otherwise it is likely to get wrapped
- around or otherwise mutilated as people forward it around the net.
-
- (15) DO NOT use a chain-letter petition. A chain-letter petition
- is an action alert that includes a list of names at the end,
- inviting people to add their own name, send in the petition if
- their name is the 30th or 60th or etc, and in any case forward the
- resulting alert-plus-signature-list to everyone they know. This
- idea sounds great on the surface, but it really doesn't work. The
- problem is that most of the signatures will never reach their
- destination, since the chain will fizzle out before reaching the
- next multiple of 30 (or whatever) in length. What's even worse, a
- small proportion of the signatures will be received in the
- legislator's office many times, thus annoying the staff and
- persuading them that they're dealing with an incompetent movement
- that can never hold them accountable.
-
- (16) Urge people to inform you of their actions. If you are
- calling on people to telephone a legislator's office, for example,
- you should provide an e-mail address and invite them to send you a
- brief message. Explain that you'll use these messages to count
- the number of callers your alert has generated, and that this
- information will be invaluable when you speak with the
- legislator's staffers later on.
-
- (17) Don't overdo it. Action alerts might become as unwelcome as
- direct-mail advertising. Postpone that day by picking your fights
- and including some useful, thought-provoking information in your
- alert message. If you're running a sustained campaign, set up
- your own list. Then send out a single message that calls for some
- action and include an advertisement for your new list. If you
- must send out multiple alerts on the same issue, make sure each
- one is easily distinguishable from the others and provides fresh,
- useful information.
-
- (18) Do a post-mortem. When the campaign is over, try to derive
- some lessons for others to use. Even if you're burned out, take a
- minute right away while the experience is still fresh in mind.
- What problems did you have? What mistakes did you make? What
- unexpected connections did you make? Who did you reach and why?
- Which mailing lists was your alert forwarded to, and which of
- these forwardings actually caused people to take action? Good
- guesses are useful too.
-
- (19) Don't mistake e-mail for organizing. An action alert is not
- an organization. If you want to build a lasting political
- movement, at some point you'll have to gather people together.
- The Internet is a useful tool for organizing, but it's just one
- tool and one medium among many that you will need, and you should
- evaluate it largely in terms of its contribution to larger
- organizing goals. Do the people you reach through Internet alerts
- move up into more active positions in your movement? Do you draw
- them into conferences, talk to them by phone, meet them in person,
- become accountable to them to provide specific information and
- answer questions? If not, why do you keep reaching out to them?
-
- (20) Encourage good practices. The Internet is a democratic
- medium that provides us all with the time and space to do the
- right thing. So let's use the Internet in a positive way and
- encourage others to do the same. You can help by passing these
- guidelines along to others who might benefit from them (including
- people who have sent out badly designed alerts), and refrain from
- propagating alerts that do not conform to them. Remember,
- forwarding a badly designed action alert actually harms the cause
- that it is supposed to support. Modeling thoughtf
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.70
- ************************************
-
-
-