home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Nov 9, 1997 Volume 9 : Issue 82
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.82 (Sun, Nov 9, 1997)
-
- File 1--Fwd: study of women hackers
- File 2--Re: Governance in Cyberspace
- File 3--Re: CuD, #9.77, - Digital Copyright Controversy
- File 4--The Internet as scab
- File 5--Police forsee 'scary' electronic crimes
- File 6--Invitation to try cyberjournal list
- File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?
- File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
- File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 4 Nov 97 17:45:59 -0800
- From: "Gordon R. Meyer" <grmeyer@RICOCHET.NET>
- Subject: File 1--Fwd: study of women hackers
-
- ---------------- Begin Forwarded Message ----------------
- Date-- 10/31 5:47 PM
- Received-- 11/04 11:33 AM
- From-- Phil Agre, pagre@weber.ucsd.edu
-
- [Paul Edwards is an interesting and nice guy who wrote a good book on
- the early history of AI entitled "The Closed World". His new project
- concerns women hackers, and he's looking for relevant information and
- potential interviewees. I'd much appreciate if you could forward this
- to anyone who might be able to help him.]
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- This message was forwarded through the Red Rock Eater News Service (RRE).
- Send any replies to the original author, listed in the From: field below.
- You are welcome to send the message along to others but please do not use
- the "redirect" command. For information on RRE, including instructions
- for (un)subscribing, send an empty message to rre-help@weber.ucsd.edu
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Date--Fri, 31 Oct 1997 12:38:37 -0500
- From--"Paul N. Edwards" <pedwards@pcd.stanford.edu>
- Subject--Pre-1985 Women Hackers?
-
- I'm a historian of technology. Most of my work concerns the political,
- social, and cultural history of computers and their uses. Members of this
- list may know my book The Closed World: Computers and the Politics of
- Discourse in Cold War America (Cambridge, MA: MIT Press, 1996). More
- information about me is available on WWW at the URL below.
-
- I'm now working on a historical article about women hackers, based largely
- on email and telephone interviews. The purpose of the article is to
- investigate myths and realities surrounding the role of women in
- computing,
- especially during the 1960s and 1970s, when most authors have argued that
- hacking was more or less exclusively male. As I've met more and more women
- recently who describe themselves as hackers, I've become interested in the
- particular experiences of the small minority of hackers who were female.
- (NB: I am purposely leaving the definition of the term up to respondents.)
-
- I'd like to hear from women who fit any of the following categories:
-
- 1) self-identified hackers;
- 2) women who have had extensive involvement with hacker communities in
- some
- way, while not necessarily identifying as hackers; and
- 3) women computer professionals who have done serious thinking about the
- gender roles of hackers.
-
- I'm especially (but not exclusively) interested in women whose experience
- dates from the period prior to 1985. I would like to interview as many of
- you as possible, either by telephone, or by email. I've prepared a short
- (but broad) questionnaire that can be the basis for either oral or written
- responses. Interviews can be confidential, if desired.
-
- I'm also looking for:
-
- 4) documents relating to women hackers. These might include, for example,
- old email, other correspondence, newsgroup postings, or published
- literature. Again, I'm primarily but not exclusively interested in the
- period before 1985.
-
- Hope you'll be interested. I will be happy to send you a copy of the
- questionnaire or to interview you by phone. It would also be helpful to
- have names/emails of other women who might be willing to participate.
-
- Paul
-
- ---------------------------------------------------------
- Paul N. Edwards
- Senior Research Scholar and Lecturer
- Program in Science, Technology, and Society, Stanford University
- http://www.stanford.edu/group/STS/edwards.html
- Director, Information Technology & Society Project
- http://www.stanford.edu/group/itsp/
-
- ------------------------------
-
- Date: Wed, 05 Nov 1997 11:08:40 +0100
- From: Felipe Rodriquez <felipe@xs4all.nl>
- Subject: File 2--Re: Governance in Cyberspace
-
- Governance in Cyberspace (or what the EU calls the Information Society)
- does not adapt to traditional power structures. These structures,
- that we usually refer to as authorities, are in essence almost
- always regionally bound; their authority and influence stops at
- the regions- or countries border. One of the unique, and
- unchangeable, properties of Cyberspace is that it moves over those
- borders, and thus in many ways rejects the concept of local
- authority.
-
- Information in Cyberspace is distributed, and thus power is
- distributed. There is no single entity that can change the way
- things work on the Internet. But if there's a consensus about
- something, change happens.
-
- An example; The technical fundament of the Internet, the Request
- For Comment (RFC) series, that form the underlying structure of
- protocol standards, have been created mostly in a consensus
- process. The people that created these standards where mostly
- volunteers and scientists, although initially some where
- commissioned by the US Advanced Research Projects Agency (ARPA).
- These's RFC's today are basically created by Internet Engineering
- Task force working groups, which are made up by people interested
- in the topic; anyone can join an IETF working-group and
- participate in the creation of a new Internet standard. There is
- some loose coordination of these developments by the Internet
- Architecture Board, connected to the Internet Society, but no-one
- can pretend to control the course of events; in other words no-one
- can pretend to govern the Internet. It is governed by broad
- consensus.
-
- Restriction of information in Cyberspace has proved to be
- impossible, and assuming that power and information are
- interconnected we could say that restriction of power in
- Cyberspace to a government is impossible.
-
- There's numerous examples that show how information flows in
- unrestricted ways; the German government wants to prevent the
- circulation of a certain document, called Radikal. The document is
- published on a web site in the Netherlands, where it is not
- considered to be illegal. The German Prosecutor General ordered
- German providers to block this page. Immediately afterwards the
- banned document is copied to 50 places on the Internet, all over
- the world. A year after the German attempt to censor the document,
- Germans can still easily access it on the Internet unrestricted by
- censorship. This example demonstrates the limits that are imposed
- on the power of the German government; they could not prevent
- their citizens from accessing a document the government did not
- want them to read. The power in this case was distributed, at the
- expense of the power of government; it was given to the German
- citizens who can now decide themselves if they want to access and
- read this document or not.
-
- Another example; the government in Singapore is very anxious to
- control the information it's citizens access on the Internet. To
- obtain a level of control they've installed several gateways that
- are under the influence of the government. There's also a number
- of mandatory proxies that filter certain addresses. People inside
- Singapore have demonstrated that despite the attempt to control
- access to certain information, this information is easy to obtain;
- it proves to be impossible for the Singapore government to control
- al the content on the Internet. There's now an estimated 1 billion
- pages on the World Wide Web. It impossible to know the content of
- all these pages and selectively filter them at the national proxy.
- Even if this level of control would be possible for Singapore,
- there's a famous phrase used by many on the Net; Internet routes
- around censorship. If Singapore would accomplish a 'total-control'
- system, it would still be possible to route around the
- control-mechanisms by using second-level proxy servers outside
- Singapore, or so-called anonimizers. Not to mention remailers and
- other technology. The Singapore example shows a government that
- tries to maintain power in the traditional way; by restricting
- information. And reality shows that it does not work, only the
- illusion of control is maintained.
-
- The last example of free flow of information concerns PGP. PGP
- stands for Pretty Good Privacy, this is encryption software one
- can use to protect email and other documents. The encryption used
- in this program is so strong, that it cannot be exported from the
- USA to other countries (export of strong crypto is illegal in the
- US). But since the first version of PGP, version 1.0, it has been
- available all over the world. People simply downloaded the
- software from the US, and distributed it around the world.
- Version 2.0 was created in Europe to avoid US export restrictions;
- this version has also been distributed around the world. The
- latest version of PGP, version 5.0, was created in the US by the
- company PGP Inc. In a matter of days after publication of this
- software it was available in Europe, despite US export
- restrictions. Later on people scanned in the source-code, to
- create a legal' copy of the program (export of source code is not
- illegal in the US, it is considered free-speech). Just a few days
- ago version 5.5 of PGP was published in the US, and it is already
- available outside the US. PGP has demonstrated that export
- restrictions of data and software are impossible to maintain. Even
- the US government cannot control the free flow of information, and
- the distribution of power that is a consequence of this free flow.
-
- Governments are easily tempted to create systems of control on the
- Internet, or to try and sanction policy. These attempts are taking
- place in various shapes and forms, like self-regulation by the
- market, and content-labelling initiatives.
-
- In the EU a lot of effort is invested in self-regulation by the
- market. The market, and the companies in the marketplace, are
- easier to control than the chaotic mess of individuals, because
- economic instruments can be used to force the players in the
- market into a certain direction. By self regulation the
- authorities shift part of power to the marketplace in an attempt
- to maintain order and stability in Cyberspace. When self
- regulation is closely watched one sees that it comes down to
- companies governing their customers. Self regulation in practice
- means that an internetprovider has to prevent the questionable
- expressions of his customers. Self regulation could also be called
- the privatization of authority. The concept of self regulation of
- Internet by the marketplace shows the decline of state-authority,
- and may, in an extreme situation, lead to its downfall. Self
- regulation is dangerous; the market will always try to avoid
- obvious risks. A customer that expresses dubious statements is a
- risk; a company prefers to 'selfregulate' and prevent the
- expression of this customer, rather than risk a legal procedure.
- The company may be held liable in some way, and liability costs
- precious money. Self regulation can easily lead to restriction of
- established rights, like the right on freedom of expression. This
- may sound extreme, but it is not. Reality proves this argument;
- when the German providers where asked to prevent the publication
- of 1 document originating in the Netherlands, they did not have
- the technical means to single out this document. Thus they
- obstructed an entire web server, with more than 10.000 other
- resources on-line. They did this because they where afraid of
- prosecution; that would harm their image and cost a lot of money
- in legal fees. Thus it was preferred to 'self-regulate' and
- prevent the document, and 10.000 other resources, to be accessed
- by German citizens. Not only did this act of 'self-regulation'
- infringe the right of free-expression, it also obstructed the free
- flow of goods and information within the European Union. Similar
- examples exist all over the world; providers prefer to disconnect
- their customers before allowing them their right of free
- expression. Freedom of expression is in many cases regarded as
- risk instead of a universal right.
-
- Another attempt to establish more control on the Internet is the
- technology of labelling and filtering. Content labelling and
- filtering techniques are propagated to protect children, and to
- achieve 'downstream' filtering of content (filtering by the user).
- Many question if such technology would achieve a safer Internet
- for children; the Internet is basically an adult zone, and very
- difficult to turn into a safe haven for children. But if labelling
- and filtering technology is implemented, it could easily be used
- for 'upstream' filtering; by the provider, government or other
- organizations. A country like Singapore would of course consider
- such technology to be a gift from heaven, because it allows better
- control of what information the citizen accesses. It establishes
- the traditional way of government control; restriction of
- information, and is thus an attempt to keep things the way they
- where in the industrial era. Earlier in this message I stated
- that on the Internet things are achieved by consensus, and not by
- authority; thus content-labelling and filtering technology will
- not be implemented. Only a fraction of people want this
- technology, most people do not. Most likely labelling will not
- happen because the consensus is absent.
-
- Traditional structures of authority increasingly lose their value
- in a worldwide networked environment, no single regional authority
- can establish total control in Cyberspace. Control is distributed
- to its citizens. In many ways this is beneficial for the citizen.
- In some ways it may not be. But at this moment it is not clear
- where problems may arise, and where action should be taken to
- avoid these problems. We are in a transition phase, where only few
- things are clear. Only time can tell where this development will
- bring us, but it will profoundly change the way governance works.
-
- ------------------------------
-
- Date: Sat, 1 Nov 1997 19:10:00 -0800 (PST)
- From: "Bruce J. Bell" <bruce@ugcs.caltech.edu>
- Subject: File 3--Re: CuD, #9.77, - Digital Copyright Controversy
-
- I'm sure this CuD has stirred up a lot of controversy; here I am to
- add my $.02 to the fray....
-
- Permission granted to edit for size and publish in CuD.
-
- >Date--Sun, 26 Oct 1997 13:46:48 -0600 (CST)
- >From--Wade Riddick <riddick@MAIL.LA.UTEXAS.EDU>
- >Subject--Telerights II - Current Digital Copyright Controversy
- >
- > Open Letter to Chairman Tauzin Concerning
- > the Current Digital Copyright Controversy
- >
- > (c) 1997 By Wade Riddick
- > All rights reserved
- > Circulate freely without alteration
-
- [from the introductory section of the letter]
-
- > My research goal has been to discover and then advocate such
- >methods in the hopes that we can return to more of an open market in
- >intellectual property. I believe that if someone buys a book in
- >hardback, they ought tobe able to buy, 'own' and resell its digital
- >'copy' in exactly the same fashion they can with the physical
- >document. Decisions like 'renting' software are most efficiently
- >left to free enterprise and not mandated in the law. Once
- >intellectual property is open to rental, lease, outright purchase
- >and even bundling like financial options-just as any other form of
- >property-then its market will expand as fruitfully as other capital
- >markets have in the last decade. The more flexible the law is in
- >rewarding entrepreneurs, the more complex, developed and profitable
- >the marketplace will become.
-
- First off, this doesn't sound like a "research goal" per se. It
- sounds like Mr. Riddick has an idea what he would *like* to be true,
- whether or not research actually indicates it to be feasible. This
- is reflected in the content of his letter, where he consistently ignores
- the question of whether the prerequisites necessary for his proposals
- can (or should) be met.
-
- Since this prerequisite is, effectively, "design all computers to
- refuse to duplicate data with a copyright notice", one might
- reasonably ask how this will be accomplished.
-
- As wonderful as Mr. Riddick's vision for the future of
- intellectual property may be, I expect that even if it were
- possible, the negative consequences of enforcing this requirement
- would dwarf the possible positive consequences of the resulting
- commerce.
-
-
- The idea of adding a "copyright chip" to all computers, and all
- its ancillary requirements of implementation and enforcement is by
- no means new. I can't think of any specific references, but the
- idea is certainly old-hat to me; the reason it isn't discussed
- much is mainly that it's such a dumb idea on its face. It sounds
- like an exerpt from the paranoid speculations of Richard Stallman,
- though if it is ever implemented, it would of course mean that
- those speculations were in fact justified...
-
- Certainly, it's much more invasive than the "Clipper Chip"
- proposal was, so it fails for the same reason that initiative did:
- why would anybody buy crippled computers when un-crippled ones are
- available? And how can you possibly reduce the availability of
- un-crippled computers without banning their sale and manufacture?
-
- Although I'm sure this kind of proposal is a wet-dream to people
- in the recording industry, the movie industry, and the FBI, I
- doubt it will receive any kind of welcome from the computer
- industry, or from ISP's, or from the lowly consumer. I
- particularly note the implication that "liability" be used as a
- stick to drive consumers into cooperation with this scheme, as
- well as ISP's, and (presumably) the computer industry in general.
-
- At the consumer level, aside from questions of overall
- desirability, the proposal that digital signatures and watermarks
- be used to track down and punish the owner of the "original copy"
- of a work that is distributed outside this proposed copyright
- system seems doubtful.
-
- Consider that deliberate "pirates" could take the simple expedient
- of finding multiple copies of the original work. Any elements in
- the plaintext that are identical between all instances could not
- be used to identify the original purchaser; while elements that
- differ are those that may contain purchaser information, and can
- be scrambled, deleted, or even ignored if the "pirates" themselves
- are untracable.
-
- Digital watermarking is an interesting concept, and it may be
- useful for some things, but it is not useful as a copy-protection
- scheme.
-
-
- Aside from this, the proposal relies on the copy-protected data
- being distributed in digitally-signed encrypted form, and somehow
- deleted after being viewed. Consider that any software for
- displaying or manipulating such copyrighted data in an "approved"
- manner will necessarily have to deal with the data in a plaintext
- format.
-
- No matter what auxiliary "tamper-resistant" hardware is installed
- on the computer, once the data is in a form suitible for display
- and manipulation by the software, there is no practical way this
- hardware can keep the software from saving the plaintext data.
-
- Unless, that is, all software permitted to run on computers must
- be pre-approved by some agency as secure in this respect, and
- digitally signed so that the computer will recognize and execute
- it. Note that for practical purposes, this will prohibit private
- individuals from writing and executing their own programs to run
- on the computer. Note also the difficulty of producing programs
- that are bug-free, much less "secure"...
-
- Another possibility is that an entirely new, highly secure OS be
- designed that prevents programs permitted access to copyrighted
- information from storing any data in a generally-accessible
- format. Again, assuming such an OS is designed with no bugs or
- security holes, all other OS's must necessarily be forbidden, and
- no modified, unapproved versions can be tolerated. It will also
- be inconvenient to use, since many possible features of programs
- will be prohibited. (e.g., copyright-enabled programs will be
- unable to store anything...)
-
- A question that Mr. Riddick asks, but does not effectively answer,
- is: who will pay for developing this software? He suggests that
- "It can be bundled into the general expense of developing the
- 'information superhighway.'" The above problems suggest that that
- this cost is enormously greater than he has considered.
-
- Also, there is no "information superhighway" general expense
- account. (the mere fact that Mr. Riddick would mention such a
- cockeyed concept as a putative source of funding is astounding)
- The question of who would pay the costs for such a program is not
- trivial. I submit that no software developer would accept the
- requirements and limitations necessary for this proposal, even if
- they could sell it in a market where software without these
- limitations is available. Perhaps they, too, must be made liable
- for all users of their product...
-
- ------------------------------
-
- Date: Tue, 28 Oct 1997 13:58:51 -0500
- From: Andy Oram <andyo@ORA.COM>
- Subject: File 4--The Internet as scab
-
- An interesting article appeared in the October 28 Boston Globe about
- striking teachers in the province of Ottawa. The strike is over
- typical work rules ("class size, length of the school day, and number
- of hours of teaching time"). But one paragraph in particular caught my
- eye:
-
- If the strike continues, provincial authorities said,
- they will urge parents to educate their children at home
- using assignments and learning aids provided on the
- Internet.
-
- -----------------------------------------------------------
- Andy Oram O'Reilly & Associates, Inc. email: andyo@oreilly.com
-
- ------------------------------
-
- Date: Mon, 3 Nov 1997 23:51:17 -0500 (EST)
- From: Stunt Pope <markjr@shmooze.net>
- Subject: File 5--Police forsee 'scary' electronic crimes
-
- In the Nov/3/97 Toronto Star, staff writer Cal Millar penned an
- article headlined "Police forsee 'scary' electronic crimes". This
- sentiment came out of the International Association of Chiefs of
- Police conference last week where the chiefs of the 50 largest
- cities in North America were given "confidential briefings".
- Toronto police chief David Boothby said in an interview "Expect to
- find frauds we never imagined". Alas, he could not reveal "details
- of confidential meetings", but he further elucidated the situation
- as "pretty scary".
-
- Boothby went on to say that organized criminals will be able to
- electronically steal from accounts and use scrambled
- communications to plan crimes.
-
- Mission accomplished in convincing my town's top cop of the evils
- of secure crypto, from the sounds of it. The rest of the attendees
- seem to concur, as they asked the telecommunications industry "to
- provide technology to let police intercept scrambled communication
- from criminals who use high-tech cellular and other transmission
- systems to thwart law enforcement efforts and avoid detection."
-
- All this makes perfect sense from the point of view of federal law
- enforcement officials, politicians and lobbyists who oppose secure
- crypto and are slugging it out to have it banned: get all the
- chiefs together in a room, scare them sh*tless with tales of child
- porn rings and a-bomb schematics being transmitted heavily
- encrypted all over the place and then send them home to spread the
- word.
-
- ------------------------------
-
- Date: Wed, 5 Nov 1997 11:32:36 GMT
- From: "Richard K. Moore" <rkmoore@iol.ie>
- Subject: File 6--Invitation to try cyberjournal list
-
-
- I'd like to an extend an invitation to join the cyberjournal list, at least
- on a trial basis - the traffic is not heavy. Cj was featured as TipWorld's
- Mailing List of the Day for 10/23/97. They described the list as follows:
-
- CYBERJOURNAL
- CJ for short, this is one of many lists sponsored by the Computer
- Professionals for Social Responsibility. A moderated forum to talk
- about anything you want, recent posts include juicy conspiracy
- theories about Princess Diana's death, the increasing emergence
- of global monopolies, and international corruption. Perspectives
- from around the world, specially written articles, quotes, and
- cross-postings of other newsletters are common.
-
- In fact cj is more like a "journal" than a "talk forum", and the focus is
- on globalization, the changing architecture of world systems, political
- realism, propaganda and mind control, democracy, and the opportunities and
- challenges for progressive activism.
-
- Coming up on cj will be a new series of articles/essays which will make up
- the first-draft of a book aimed at comprehensively exposing the true nature
- of globalization: "Globalization and the New World Order - democracy at a
- crossroads". Interspersed with this series will be items of special
- interest and responses/contributions from subscribers.
-
- To join cyberjournal, simply send:
- To--listserv@cpsr.org
- Subject--(ignored)
- ---
- sub cyberjournal John Doe <-- your name there
-
- ------------------------------
-
- Date: Thu, 6 Nov 1997 14:00:36 -0700 (MST)
- From: Ken Arromdee <karromde@nyx.net
- Subject: File 7--Re: "HATE SPEECH" / 5th HORSEMAN OF THE APOCALYPSE?
-
- > ROPER: So now you'd give the Devil benefit of law!
- >
- > MORE: Yes. What would you do? Cut a great road through the law
- > to get after the Devil?
- >
- > ROPER: I'd cut down every law in England to do that!
- >
- > MORE: Oh? And when the last law was down, and the Devil turned
- > round on you--where would you hide, Roper, the laws all being flat?
- > This country's planted thick with laws from coast to coast--man's
- > laws, not God's--and if you cut them down--and you're just the man to
- > do it--d'you really think you could stand upright in the winds that
- > would blow then? Yes, I'd give the Devil benefit of law, for my own
- > safety's sake.
- >
- > --Robert Bolt "A Man For All Seasons"
-
- The above quote that tallpall used to head his message is rather
- ironic in context. Fascism is certainly a devil. And yes, I'd
- give the devil benefit of law, for my own sake. This quote
- expresses _exactly_ why fascists should be allowed free speech,
- and should not be forced off the net in any shape or form. It's
- not because I particularly like fascists, it's because if you
- restrict free speech in order to get rid of the fascists, you
- pave the road towards restricting free speech for anyone.
-
- And contrary to his claim that people who arguing for the rights
- of fascists are not potential victims, I am Jewish.
-
- It's also interesting to actually check out the list of FBI cases
- and compare to how he describes it--the cemetery defacement case
- was at the top of the page, but nothing suggests that the cases
- on the page are listed in order from most to least important.
-
- ------------------------------
-
- Date: Mon, 03 Nov 97 05:36:19 EST
- From: steenburger@hotmail.com
- Subject: File 8--Warren Coucilman Wants Library Porn Surfers Names Made Public
- Computer Privacy Digest Mon, 03 Nov 97 Volume 11 : Issue: 017
- <snip>
-
- Council Vice-President Chuck Busse offered an alternative to filtering:
- making the names of people who access porn via city libraries public.
- According to an article in the Detroit News: "under Busse's proposal,
- which was not acted on, pornography viewers' names could be published
- in newspapers, on the city Web site or made available to anyone who
- files a Freedom of Information request through the city attorney's
- office. The names would be gathered from city computer records and made
- available to the public. Only people who call up sex sites on library
- screens would be identified." I guess then the mob would know where to
- gather and whose house to burn down. A couple of (other) problems come
- to mind. One is that a login system would have to be set up so that
- files accessed could could be matched to the patron viewing them. Woe
- to the person who forgets to log off! Especially if the next person to
- use the terminal is one of the city's porn addicts or a neo-nazi. I
- hear the city has plenty of both. Of course all the sites accessed
- would show up in a log file, not just the porn sites (as if it would be
- easy to tell which were which), thus creating some of the biggest
- privacy violations in the history of the United States.
-
- Well, Warren city attorneys are used to being on the losing side of
- costly litigation. Was this a serious suggestion? Did he think a lot
- about this before hand or did he just blurt it out in haste so that
- Gloria Sankuer would not be the only one to get credit for saving our
- culture from decay? It looks as if Busse knows even less about the
- internet and libraries than Sankuer. That's probably why he wasn't one
- of the two council members appointed to work with the library board in
- search of an internet filter. That honor went to St. Pierre, and the
- council's internet expert Sankuer.
-
- http://members.aol.com/neofrant/index.html
-
- http://www.detnews.com/1997/macomb/9710/15/10150169.htm
-
- ------------------------------
-
- Date: Thu, 7 May 1997 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.82
- ************************************
-
-
-