Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 02 Issue 08

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.08 (October 20, 1990) **
****************************************************************************

MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag
File 3: Prodigy, Problems, and Censorship
File 4: Censorship on the Nets
File 5: PC's & Political Action

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
*** CuD #2.08, File 1 of 5: Moderator's corner ***
********************************************************************

From: Moderators
Subject: Moderators' Corner
Date: October 20, 1990

++++++++++
In this file:
1. RIGGS SENTENCING
2. NEW FTP SITE

+++++++++++++++
Riggs Sentencing
+++++++++++++++

Sentencing of Robert Riggs has again been postponed for administrative
reasons. Sentencing has been rescheduled for November 16 in Atlanta. We
are told that both delays are fairly routine and administrative and not the
result of any snags or surprises in the case.

+++++++++++++
Additional CuD FTP Site
+++++++++++++

A second ftp site for CuD archives will be available within a week, which
should increase the ease of obtaining back issues and other documents.

We **URGE** readers who come across conference papers or other information
that others would find helpful to pass them along so we can add them to the
archives. We assume that, because the bulk of the readers are
professionals, that many attend and present papers at conferences. If you
are one of these, please send along your papers.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Various Contributors
Subject: From the Mailbag
Date: October 20, 1990

********************************************************************
*** CuD #2.08: File 2 of 5: From the Mailbag ***
********************************************************************

From: groundzero@TRONSBOX.XEI.COM
Subject: ATI and bounced mail
Date: Oct 15 '90

Ati #51 has been sent out, and anyone who hasn't received it yet should
email me again with an alternate address. About 10 addresses bounced back
when I tried to mail ATI to them.

Alt.society.ati has been created and people can read ATI that way instead
of having it mailed to them.
ATI's editors can be reached at: groundzero@TRONSBOX.XEI.COM

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: Toxic Shock Group
Comments: New user
Date: Thu, 18 Oct 90 12:11:47 EDT

I was surprised at the voluminous amounts of mail we received because of
the article I submitted to CuD (#2.07, file 7) recently... However, I was
even more surprised at the number of people asking about subscriptions and
what have you to the publication "Toxic Shock."

"What we have here is a failure to communicate."

Toxic Shock is a group, *NOT* a publication.
We write text files in which we give our views/opinions, and sometimes
just have fun.
We occasionally send out a newsletter entitled The Flaming Fetus, which
is essentially an electronic newsletter. It is put out on a *VERY*
irregular schedule right now...
We DO want new members/writers, and we DO try to educate, inform, and
piss off, but we do this through our text files and the occasional
newsletter. We do not have the finances available to make an actual
magazine for our views (but would gladly do so if the finances were
available to us, hint hint), and our views are probably not the kind
that the government would allow to be printed for very long.

I hope this clears up the misunderstanding...It was an easy mistake...

-Bloody Afterbirth-

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

From: gilham@CSL.SRI.COM(Fred Gilham)
Subject: Re: Professional Crackers
Date: 21 Sep 90 15:26:46 GMT
To: EFF-NEWS@NETSYS.COM

Mike Godwin writes:

>I was at a bookstore on Saturday that had a $55 book called COMPUTER CRIME
>(it may be a textbook). In looking through the book, which is aimed at
>system administrators, MIS guys, and the heads of small businesses, I
>noticed no references at all to the kinds of young explorers we often
>"hackers" or "crackers." Instead, the the book seemed based on the a priori
>proposition that ALL of the computer crime that sysadmins would be dealing
>with would be of the intercorporate or disgruntled employee sort. The
>book's copyright date was 1989.

Several authors argue that the major financial impact of computer crime
comes from inside jobs. In the March 1990 Communications of the ACM, the
president's letter has the following example:

Take for example the case of Harold Smith and Sammie Marshall. Between
1976 and 1981, they embezzled $21.3 million from Wells Fargo Bank. The
fraud was nothing but standard old check kiting. Check kiting is cashing a
check on an account whose only deposit is a check that has not cleared yet
and then covering the draft on the other account with another rubber check
from the first bank, which is covered by a rubber check from the second
bank, etc. etc. This can go on indefinitely. It is a game that anyone can
play. A major national brokerage house was recently fined by the federal
government for doing the same thing on a massive scale. Smith and Marshall
played the game from inside the bank. Instead of using ordinary checks,
they used the bank's branch settlement system to keep a steadily growing
mountain of fraud in circulation within the branch settlement system.

You'd have to make a lot of free phone calls to match that.
--
Fred Gilham gilham@csl.sri.com

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Karl Lehenbauer <karl@sugar.hackercorp.com>
Subject: Prodigy, Problems, and Censorship
Date: Sun, 30 Sep 90 12:08:43 CDT

********************************************************************
*** CuD #2.08: File 3 of 5: Prodigy, Problems, and Censorship ***
********************************************************************

%The following author responded to a netnote by warning of the problems of
holding sysops liable for the message content of their systems. He raises a
number of important issues, especially the danger of censorship if
corporations or other groups feel the need to restrict the substance on
"open systems" (moderators)%
++++++++++++

If sysops were held liable for message content, it would be the end of
Usenet. Further, it would have a chilling effect on free speech via
bulletin boards. As a sysop, I would have to be very careful to never
allow anything out that was in the least bit controversial, and would
always want to err on the side of not allowing a message to go out unless I
was really sure there was no chance of me getting in trouble for it.

Shouldn't the poster of the message be accountable for its contents?

Or by this reasoning, shouldn't the phone company have to listen to *all*
the phone conversations going on at any time to make sure nothing illicit
was being said, done or planned? They tried this in Eastern Europe, you
know.

Further, this would be a new and time-consuming burden on sysops and
introduce potentially long delays in messages getting out.

If a sysop let a bad message go out and it was gatewayed to a bunch of
other machines, or one was forged or somehow illicitly injected into the
network, by this reasoning wouldn't the owner/sysops of all the machines
the message went to be liable? If that were the case, it would definitely
be the end, because nobody has the resources to monitor, for example, all
the traffic on the Usenet.

I used Prodigy several times, and it is a heavily censored system, i.e.
Prodigy's censors examine every article posted before it goes into the
message base, and people on it were complaining that the censors were
capricious, arbitrary and would not state reasons why specific articles had
been censored.

Not only is there nothing like talk.religion.*, talk.politics.*, soc.motss
on Prodigy (they dropped a forum in which fundamentalist Christians and
homosexuals and homosexual rights advocates were going at it, although they
claimed it was for a different reason), but you can't even mention or talk
about most products by name because advertising is a big part of their
revenue base (about 20% of your display is permanently dedicated to
advertising when using it -- ads are continually updated in this area the
whole time you're on) and they don't want anyone to get free advertising.
Consequently messages of the "Yeah, I bought a Frobozz 917 and it works
really well" are censored. If this is IBM's view of the future of personal
electronic communications (Prodigy is a joint-venture of IBM and Sears),
and there is every reason to believe it is since this is what they chose to
provide, it is a bleak future indeed. (The reason they do this, I think,
is that Prodigy is supposed to be a "family" system. Under your one
account you can set up logins for your other family members. So they don't
want anything in there that some kid is going to read. But that restricts
everything on the system to a very low common denominator, namely that
every message must be so inoffensive that *nobody* is going to be offended
by it... and that is censorship.

This occured a few months ago and I am not aware of their current policies.
It's also worth mentioning that they're giving away free subscription kits
and maybe a month free to everyone who buys a PS/1.

Another complaint I have about their system that isn't relevant to a
censorship posting but is still worth mentioning is how incredibly clunky
and limiting their interface is. While it is cool that you run their
terminal program software when accessing their system (so displays are
cached, it displays graphics, etc), the interface is totally closed in
terms of being able to get a piece of data off their system and onto your
disk. No downloads, no stock quotes pulled into your spreadsheet... You
can copy it by hand from your display or print it on your printer, and
that's it.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Moderators
Subject: Censorship on the Nets
Date: Sat, 13 Oct 90 02:44 CDT

********************************************************************
*** CuD #2.08: File 4 of 5: Comment on Censorship and BBSs ***
********************************************************************

The previous author raised serious questions about censorship. What are
the dangers when a large corporation, one that might be intimidated by
advertisers or other external powers, assumes control or excessive influence
over a system? If university systems allow free and unconstrained dialogue
across the nets, there is likely to be substantive content that some find
objectionable. When posters resort to racially derogatory posts, invoke the
"seven words" prohibited by the FCC, or exchange materials that, for
example, a major government agency finds unacceptable, should that
university restrict access by users or the content of material? Those who
subscribe to many of the various hotlines or news groups have seen content
that goes well beyond that generally tolerated by most of us. Generally,
problems are readily dealt with informally. But, what happens when pressure
comes from an external source? In the MARS incident, the NSF flexed its
fiscal muscles (according to those on the receiving end). The following two
posts excerpted from MARS are typical of the response of those who may not
appreciate some material but who find censorship even more objectionable:


The gifs were obviously deleted. I am not sorry to see them
gone either. The MARS hotel was shut down because of complaints
about "offensive" pictures on this bbs. (Or at least that was
the latest from my source.) Frankly, I don't care if they are
here or not, I just don't see why people are complaining about
them. If you don't like them, then don't look. (IGNORE IT!!!!)
I also don't like the idea of the university having to censor
this board to suit the narrow-minded leanings of a few people
who evidently have nothing better to do than hunt for stuff to
come down on.

Just my two cents worth.

+++++++++++++++++++++++++

I see that the repulsive head of CENSORSHIP has raised it's ugly
head once more. I thought the dark ages were over but
apparently a few still cling to the past. If these pictures
were offensive to anyone then all that had to be done was ignore
them. To impose ones views on a group of people simple because
YOU think it is wrong is tantmount to hitler slaughtering the
jews because they weren't his TYPE oF SUPREME BEING.

Again i am sorry that CENSORSHIP found its way into another
democratic haven of society but alas it will always be found
where the residents don't conform to the STANDARDS of the MORAL
MAJORITY ( i use the term sarcasticly).

++++++++++++++++++++++

According to posts and conversations, Washington University (in St. Louis)
has also experienced problems. The following note was posted on MARS and
summarizes the response to the apparent intrusion of net-censors:

++++(Begin post)++++

Ok users,

wuarchive.wustl.edu has also been forced to remove all their r,x-rated GIFS!
this is why:

++++++++++++++++++++++++++++++
README
++++++++++++++++++++++++++++++

Questions have been raised regarding the appropriateness of maintaining
this material as part of a university archive and making the material
available over the NSF network. The material has been removed pending the
outcome of an investigation.

If your organization uses this material for academic or research purposes,
and would be willing to provide written evidence for our investigation,
please send e-mail to archive@wuarchive.wustl.edu.

Please read the file 'WHY' to get an unofficial explanation of what's going
on.

++++++++++++++++++++++++++++++
WHY
++++++++++++++++++++++++++++++

This all started in February 1990 when the Washington University
Chancellor's Office received a letter from an irate individual who claimed
that Washington University was committing a grave offense by making
available a collection of GIF pictures which more-or-less explicitly
depicted sexual acts (as implied by the name of the directory). The claims
included things such as aiding and abetting sexual harassment, misuse of
resources, unprofessional conduct, and placing %obviously unethical'
individuals in a position of trust.

The reaction of the Chancellor's Office was "Please let us know what is
going on, this must be replied to..." The ball was passed on the the
Office of the Network Coordinator, which owns and operates wuarchive.
After a long series of "we don't want to be involved in censorship"
statements by everyone involved, an investigation was launched into the
legal ramifications of making such material available.

What it comes down to is this:

1) Making the material available is perfectly legal, according to the
University's legal counsel (they cited 1-900 numbers as an excellent
example).

2) These GIF pictures are hardly the highest priority material in the
archives, and resources would be devoted to them only as long as they
didn't interfere with the more valuable services.

3) University personnel were not involved in the maintenance of this section
of the archives. The GIF archives are entirely maintained by a student of
another University.

4) We can't make the material available unless we can show that it has some
academic or research value. All sites which join the Internet must sign
a contract which states, in part, that all use of the Internet will be in
support of research or education. It is the feeling that virtually all of
the material in the archives could be justified except the R_X_rated GIFs.

*ALL* of the people who work with the archives *EMPHATICALLY* do NOT
support censorship in any form. However, we are bound by the contracts our
employers have signed regarding this matter.

If you are a professor at an institution of higher learning, or a
legitimate researcher, and feel that this material would be useful for your
teaching or research, please send a letter ON UNIVERSITY OR CORPORATE
LETTERHEAD to this address:

Washington University
Office of the Network Coordinator
One Brookings Drive
Campus Box 1048
Saint Louis, MO 63130-4899
USA

If you are a student or individual in a non-academic or non-research
position, PLEASE don't waste our time... The archivers put a lot of
personal time into keeping wuarchive one of the best archives in the world
and we don't appreciate being called names or spending our time reading
junk mail.

Be aware that if you DO write a letter supporting this material, you may
one day be called upon to support your position. It is a very sensitive
issue and will undoubtedly some day be considered by highly-placed
government officials, and subjected to public scrutiny.

Signed,
The Maintainers of Wuarchive

++++(End Post)++++

We have not yet had the chance to look into the WU situation or to dig out
information on other systems that have had similar problems. The above
examples deal with x/r-rated material, which some may find an issue not
sufficiently important to worry about. There is, of course, a sticky area
in making freely available adult-oriented contents that are accessibility by
juveniles. But, the issue is *NOT* cyber-porn! Rather, it is one of how
e-space shall be controlled, if at all. Who determines what shall be
permitted and what shall not be? Can a few angry letters to a federal
bureaucrat invoke threats of fiscal blackmail? Should there be an appeals
process? Can an angry letter in one state be justification to censor
materials in another? Recent federal prosecutions and application of RICO
to close down an entire establishment, upheld this week by the U.S. Supreme
Court, has serious implications for BBS sysops. It would seem that
officials could confiscate the equipment of a sysop who maintained adult
.gif/.gl files. We have also seen in other prosecutions who "wire fraud"
and other inter-state "crimes" can be cleverly used to bring criminal
charges that far exceed the alleged wrong-doing.

The issue confronting modemists is that of how statutes will be enacted and
enforced in the coming decade. The logic underlying intrusion into boards
that contain adult material can also be applied to other material as well.
The questions is not whether we support "pornography," but whether
cyber-space shall be free or whether it shall be regulated. A recent
article in the Federal Communications Law Journal (E. Jensen, "An
Electronic Soapbox: Computer Bulletin Boards and the First Amendment,"
Vol. 39: 217-258) raised the spectre of "licensing" BBSs. Although this is
not currently a realistic option, the potential risks of such an approach,
and others that restrict freedom of communication across the lines, should
be met head-on and not after restrictive laws or policies are in effect.

It seems that government controls over e-space are creeping slowly into
electronic communications in ways that, if done in other media would invoke
immediate public outrage.

Until early 1990, there has been no organized constituency to lobby for
legislative changes or to guard against the inflammatory rhetoric of *some*
officials and journalists. In the past six months, modemists have become
more aware of the potential problems in the electronic frontier and have
mobilized. Although EFF and CPSR have received most of the attention, other
individuals and groups have also been active in organizing conferences,
delivering lectures, or in just contributing to the dialogues about the
problems of creating a responsible modem community on one hand and
preventing unnecessary governmental encroachment on the other. The bottom
line is that this is *NOT* a "computer problem." It is a POLITICAL problem,
and PC/modem users should recognize that unless they become politically
involved, the new frontier may be quickly closed.

Among many others, Jim Warren has been active in developing political
strategies to address many of these issues. In the following file Jim
raises a number of crucial points.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

From: well!jwarren@APPLE.COM(Jim Warren)
Subject: pc's & political action
Date: Sat, 13 Oct 90 16:04:10 pdt

********************************************************************
*** CuD #2.08: File 5 of 5: PC's and Political Action ***
********************************************************************


Jim Thomas recently asked me to write about computers and political action.
This is a slightly edited version of materials I wrote for a recent online
interview on the WELL -- Whole Earth 'Lectronic Link -- in Sausalito CA.
-- Jim Warren, jwarren@well.sf.ca.us, (415)851-7075/voice

LOCAL & NATIONAL POLITICAL POWER THROUGH PERSONAL COMPUTING

Most folks feel powerless to change the direction of public and political
events around them -- in their town, state or their nation. In fact, using
computers, we can have political impact far beyond what is otherwise possible
for most "middle-income" individuals. I state this from repeated personal
experience and success. Here are some suggestions:

First, I need to review some essential "modern math" that every successful
politician knows by heart. Thereafter, I'll give specific examples of its
application, greatly empowered by computer usage.

POLITICIANS' BASIC ARITHMETIC

An illustrative hypothetical:

Consider a voting district of, say, 600,000 population -- perhaps a city-wide
or county-wide district. More than likely about half of its population will
be of voting age AND registered to vote. Therefore:
600,000 population = 300,000 registered voters
But, only 40%-70% will vote (low-end for local and school board elections;
high-end for tight Presidential and Gubernatorial elections). Therefore:
300,000 registered voters = 120,000 to 210,000 actual voters
Now, the goodie! Most elections for an open seat are won by less than a 5%
margin. And, almost all "professional" politicians will run for several
open seats during their political career. (Even if they are an incumbent,
now, they plan to run for a higher open seat, later.) Therefore:
120,000 voters = 6,000 swing-vote for a minor election
210,000 voters = 10,500 swing-vote for a major or Presidential election
But, if there are only two candidates, only one half of the swing vote needs
to be switched from one candidate to the other. Therefore:

In a 2-candidate race for an open seat in a district of 600,000-population,
*YOU* need only affect 3,000-5,250 votes to change the election. That is, a
single individual need only switch 1/2-to-1 percent of the voters. Your
power becomes even greater when there are more than two candidates.

And, all of these figures scale, up or down, for the size of *your*
target-of-interest, uh, District.
And, there's a hueristic for which there is less objective proof:
One person, actively interested in an election, will critically influence
20 voters -- if the person does no more than pursue casual political
discussion in the course of normal business and social interaction.

Aside: Perhaps the definitive periodical for practical politiking is
CAMPAIGNS & ELECTIONS, published 7 times yearly, $29.95/year,
C&E, 1835 K St NW Suite 403, Washington DC 20006. It has carried a
"Campaigns & Computers" section for about ten years or more. This is the
BYTE Magazine of effective political action. [For those who want to
accomplish political change; not just bitch about it.]

POLITICAL ACTION: TUTORIAL PREFACE


The uniform wisdom among political campaign managers is that the following
are effective campaign tools -- listed in approximate order of importance:
0. Face-to-face contact, by candidate or supporter, door to door and in
public places. Yeah, I know, I wouldn't do it, either -- mentioned, here,
only for completeness as *the* most effective thing someone can do.

1. "Dear friend" notes and cards, distributed by candidates' supporters to
people who know the writer. I.e., the best advertising is still word-of-
mouth recommendations from someone you know -- even though they may be the
mildest of aquaintences. ("This guy, Charlie somebody, told me a Yugo was
*much* better than a Honda, and ...")

[2. Candidate statements included in ballot materials. <specific to Calif.>
These optional statements have a word limit, are written by the candidates
(i.e., they have broad latitude in, uh, "accuracy"), and their printing
costs are shared equally among the candidates choosing to have such
statements distributed as part of the official ballot materials. These are
the most read by voters and are given the greatest credence by the voters --
in spite of the fact that they are candidates' "un-refereed" statements.
This is something an outside activist can't do, except possibly in the FOR
and AGAINST statements for a ballot initiative. It's something over which
outsiders have no control. Mentioned for completeness and importance.]

3. Directly-distributed materials -- letters, brochures, leaflets, etc.
(Hot pads and videotapes have been interesting tools in recent elections.)
These are usually distributed by direct-mail, but are also commonly distrib-
uted by hand, door to door.

4. Television advertising can be powerful, but only for creating emotional
bias -- for or against. And, it ain't for average-income folks.

5. Radio advertising runs a distant fifth, and is often considered almost
useless outside of drive-time ads -- which are costly. Not for citizen
activists -- though call-in's to talk-shows can be effective.

6. Signs and posters are uniformly considered to be almost completely
useless except for encouraging the candidate's volunteer campaign workers --
who want to see 'em and want to display 'em. Ditto for lapel buttons. Junk!

I.e., effective political action hinges on targeted communications with/to
large numbers of people. [Surprise! Politics involves people!]
"Target" and "large numbers" imply that computers are applicable.
And how!

[Please note: Anyone who recognizes these political realities has more
potential political power than those who are unaware of them. Anyone who
utilizes this information enhances their political power in comparison to
those who fail to use 'em. All of it takes work and effort; most of it can
be used by rich and poor, alike; none of it requires computers -- but much
of it can be greatly enhanced by computer-assistance.]

EFFECTIVE CITIZEN/POLITICAL ACTION #1: "DEAR FRIEND ..."

Send out *lots* of "Dear friend" cards or notes. They can be very brief
-- little more than, "I support XXX and hope you will, too." And, the need
your [apparantly original] signature. If the recipient's likely to at least
vaguely remember your name, it's worth sending 'em a note.
The note or message can be printed from original copy -- typewritten is
perhaps best; legible *brief* hand-written notes are probably second best
(which can still be xeroxed or quick-copy printed); fancy typeset notes
are least effective for communications intended to have a personal flavor.
(Dear friends don't typeset notes to dear friends!)

COMPUTER-ASSISTED CREATION & DISTRIBUTION

Of *course*, you maintain your personal and business address book on
your personal computer -- making addressing easy. And your letter-quality
or lasersetter can crank out the notes -- and have 'em seem highly
individualized! (Folks know about form letters -- but not from friends and
aquaintences.)
A computer greatly enhances this political power over the alternative of
hand-writing or hand-typing -- more productivity per unit of time or effort.

EFFECTIVE CITIZEN/POLITICAL ACTION #2: MASS DISTRIBUTION

OK -- you contacted your friends (both of 'em, heh!), but want to have a
still greater impact. I mean *serious* impact!

POWER OF THE [PRINTING] PRESS

Remember that directly-distributed written materials remain one of
the most effective tools for campaigning -- distributed by hand, or by mail.
Such materials from anyone *other* than the candidates and their campaign
committees -- clearly identified as "independent" -- are even *more*
effective. So:

Write and distribute your own note, letter, leaflet, newsletter or tabloid
newspaper. Cover your neighborhood ("My family and I live nearby and feel
this is so important that we've hand-delivered this to you. ..."). Distrib-
ute it to your business clients. *If* it is a sufficiently sincere and
effectively written item, you might risk putting it on automobile wind-
shields (the risk is recipients' irratation factor; But, I used to paper
Silicon Valley with "Windshield Editions" of the Silicon Gulch Gazette and
received *no* complaints -- to my considerable amazement).

Finally, round up the loot and blitz-mail it throughout the voting
district you want to impact. Do it as a newsletter or tabloid newspaper.
Businesses sympathetic to your "cause" can be significant underwriters of
the expense, by placing advertisements -- and writing 'em off as a business
expense. But, all that takes a minor but serious publishing operation.

POWER OF THE [COMPUTER% PRESS

**Desktop publishing on personal computers *greatly* empower such efforts.**

TARGETING PROBLEM

However, this is a "shotgun" approach. Figure about half the homes you
reach won't have a resident who goes and votes. That means lots of time
wasted if doing hand distribution; or %50-cents per useful contact by mail
-- before the next postage-rate hike.

PERSONAL COMPUTER TARGETING SOLUTIONS

So far, people can get the lists of registered voters from the Registrar
of Voters -- in [marginally useful] paper form or [powerful!] computerized
form (magtape, floppies, perhaps online -- depends on the budget and service
orientation of the Registrar). <true in California and *some* other states>

PRIVACY ADVOCATES, BEWARE!

God help us if and when those who are in power prohibit citizen access to
such essential citizen-action information -- probably enacting such
prohibitions under the guise of "privacy protection".
Don't want to bother them voters with any o' that distrubing information
from non-incumbants. ;-)

COMPUTER *POWER* FOR THE PEOPLE

With the voter reg data in your computer, you can generate "walking order"
lists of voters and their addresses. This allows neighborhood leafleting
volunteers to expend their limited time and energy efficiently.
The voter reg data, of course, forms a mailing list base -- trivially
processed to limit only to favorable party registrants, addresses/areas,
perhaps age groups (information often in the lists), etc.
Merge-purged with other lists of interest, the utility per piece of
literature-n-postage can be further enhanced.

COMMUNITY & HOMEOWNER/RENTER EMPOWERMENT

When I fought for equitable, community-oriented treatment of mountain and
rural residents and homeowners in unincorporated San Mateo County, I
used the County's property assessment lists, in electronic form -- public
records, rightfully so. Each parcel record indicated name and address of
the owner -- the first-cut mailing list. Many lived outside the County;
deleted to reduce useless mailings. Homeowner exemptions were flagged --
which I used for mailings targeted for homeowners. Those flagged as having
residential improvements but without homeowner flags were targets for
material concerning renter interests.

When I wanted to address property-based voter-action, the logical
intersection of voter and assessor lists produced a powerful target list.
For construction-related issues, I added the state lists of licensed
building contractors, real estate brokers, and real estate salespeople.
These records are available in many states *by law*.

PUBLIC RECORDS POWER

At least in California, all these records are open to the public under
the State's *potent* Public Records Act, and -- by explicit terms of that
Act -- copies are available for no more than the direct cost of duplication.
Further refinements -- power enhancements -- are possible by marrying
different versions of these records over time (longer-term residents, more
experienced builders, brokers, etc.).

PUBLIC RECORDS CAVEAT

One fly that occasionally appears in California's public records availabil-
ity ointment: Because the Public Records Act is vague on the issue, some
repressive agencies respond to requests for copies -- which they must
furnish -- by offering only paper copies. Even when the records are
maintained in electronic form and copies of large public-records bases
are clearly of limited value in paper form.
*Access to digital copies of digitally-maintained public records -- for no
more than direct duplication costs -- needs to be explicitly and rigorously
required in states' Public Records Acts.*

COMPUTER-ASSISTED PERSONAL POLITICAL EMPOWERMENT

Professional political campaign support companies often charge naive cam-
paigners and candidates big bux for such lists and list processing. In fact,
computer-capable folks can generate 'em on their [robust] personal computer
-- for their use and for use by underfunded candidates and causes (there's
no such thing as an overfunded candidate or cause -- except those you
oppose; sorta like good taxes and bad taxes).

NEW TWIST: COMMUNITY POWER BY FAXMODEM

More and more folks can now receive messages by fax. Increasingly, those
who have personal computers also have fax'es. Coupled with a fax-modem in
the computer, this adds a powerful new tool for organizing fast community
action -- often needed as self-serving bureaucrats and arrogant elected
officials seek to ram through policies before the impacted public can defend
themselves (a consistant pattern in my San Mateo County ... and elsewhere!).
In the past year, my rural and mountain neighbors and I have begun
organizing an increasingly broad and effective fax network. With a
fax-modem (an Interfax 24/96) plugged into the phone-port on my Mac, it's
trivial to draft a notice and have it faxed to *lots* of folks who have
expressed interest in these issues -- without ever having to touch hard-copy
(much less re-feed it, over and over, through a manual fax).
This supplements an additional wrinkle in community activism: Many of the
recipients have lowcost copiers at home. Many of them have agreed to make
copies of the notices as soon as the receive 'em, and pass 'em along to
neighbors or post 'em on local community bulletin boards.

This gets around the serious problems of weekly community newspapers being
too slow and/or too unwilling to provocatively publicize impending
politicians' plans. **Really *neat* community action!**

[Hope this wan't too boring or too long-winded. Actually, there's *lots*
more to say -- especially about how to design effective direct-distribution
written materials. But, that's more concerned with writing than computers.]

ASIDE, RE "THE COMPUTER ELITE" & COMPUTER EGALITARIANISM

Anyone capable of utilizing a computer can utilize it for significant
personal political empowerment. But, it *does* require that (a) they have
access to a computer, and (b) they be competent at utilizing it. Both of
these entry barriers are non-trivial; the latter emphasizes the need for
computer education -- it's for personal empowerment, just as is drivers'
education and social studies.

Folks who can't drive are considerably less empowered than those who can.
Folks who can't use computers are considerably less enabled for acquiring
and utilizing valuable information for astute decision-making and effective
personal action, than those who can use computers.
This is not an elitist view -- it is simply a statement of reality as I
see it.

These issues are part of why I feel that it is essential to teach kids
-- all kids, rich and poor, "elite" and "slum" -- how to use computers. To
the extent that we know how to use a computer (or how to drive) we have the
potential of greatly increased personal empowerment. To the extent that we
have that use-knowledge and can gain access to a computer (or a car, or the
net, inaccessible to most folks), then we can implement that potential
empowerment.

Personal computers -- essentially defined, exclusively, as meaning computers
that can be afforded by individual people -- provide access to information-
processing power, for individuals, that was previously available only to
corporations, government and the very wealthy. (Nonetheless, multi-thousand
dollar "personal" computer systems remain financially un-ownable by folks on
very limited income -- though they can often gain access through schools,
loaners, donors, complimentary online accounts, etc. This is no different --
nor more elitist, nor less egalitarian, than the fact that multi-thousand
dollar cars are equally unavailable to folks on very limited income.)

The particular issue I am raising is that folks who know how to use
computers, and have access to computers, can also have much more political
power than most of them realize -- far in excess of folks who don't know
how to use computers or don't choose to use 'em (regardless of how poor or
wealthy they may be).

--jim

********************************************************************

------------------------------

**END OF CuD #2.08**
********************************************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT