Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 72

  



Computer underground Digest Thu Sep 16 1993 Volume 5 : Issue 72
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cookie Editor: Etaoin Shrdlu, III

CONTENTS, #5.72 (Sep 16 1993)
File 1--Still more on the Elansky/Hartford BBS Case
File 2--Thoughts on the Elansky Case - A Response
File 3--Attitude TV show about hackers in Australia
File 4--CuNews
File 5--CPSR Annual Meeting

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
UNITED STATES:
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
ftp.eff.org (192.88.144.4) in /pub/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Thu, 16 Sep 1993 15:23:41 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--Still more on the Elansky/Hartford BBS Case

Michael Elansky, sysop of The Ware House BBS in West Hartford, Ct.,
remains in jail, and will likely be there for awhile, at least until
his pre-trial hearing on Sept. 23. As information continues to trickle
in, the First Amendment implications of the case grow. For those not
following the case (see CuD #5.69 and #5.71), Elansky was arrested and
is being held on $500,000 bond, excessive even by the standards of
violent criminals in West Hartford (see IIRG file below). Elansky's
primary sin seems to be that he ran a BBS that made "anarchy" text
files available, something to which the prosecutor took exception.

While it may be premature to argue that there is no other evidence to
substantiate the charges, and that other illegal behavior might not be
alleged at a later date, it increasingly appears that the existence of
"anarchy" files is being used to create the image that Elansky is a
potential social menace. However, it also appears that Hartford Superior
Court Judge Richard A. Damiani may have been premature in his rebuke
of Elansky's appeal for reduced bail. According to the Hartford
Courant (August 7, B5), the judge argued that Elansky was where he
belonged: In jail. The Courant quotes the judge as saying that,
initially:

I felt that Mr. Elansky was not a peron we should utilize a
bed in prison for when we're dealing with rapists and
murders.

The judge said that the new "anarchy" charges changed his opinion:

One could equate this with what's going on in New York, where
terrorists are targeting particular buildings...I think he's
more of a danger to society than a rapist in prison. He
belongs in jail."

Because of the lack of public disclosure of details in the case, the
basis for the judge's comments remain unclear. Nothing other than the
anarchy files has surfaced as evidence in the case.
WHAT'S GOING ON??

If the facts, which continue to be unchallenged, are as presented by
Elansky, his parents, the defense attorney, the prosecutor's summary
given to the media, and the document we reproduce in this file, then
the case has a chilling effect on all media. But, electronic media
especially--including BBSes, Usenet, and the Internet in
general--could become vulnerable to prosecutorial discretion. The
case could likely require a dramatic revision of BBS and related law
by restricting freedom of expression.

CuD received the following by mail, which we are told is an unsworn
officer's report adduced to substantiate the charges. The language of
the document includes wording identical to wording in a document the
Hartford Courant (Aug 7, 1993, B5) cited as contained in the arrest
warrant, which indicates that it provided the basis for at least the
most dramatic prosecutor claims. The apparent typos, convoluted
phrases, and other language occur in the copy that we received.
Because of the awkward end of the "excerpts" section in the document,
it is possible that a page or more of "excerpts" from the files has
been omitted or withheld. If so, readers can refer to CuD 5.71 for the
reprints of the files. Although actual instructions were deleted in
our published version, readers can find the information in any similar
"anarchy" file on thousands of BBSes across the country, as well as in
conventional print media. The file we received reads:

That I, Richard Aniolowski, am a member of the West Hartford
Police Department and have been for ten years and 7 months
and was promoted to Detective in September 1990.

That on June 14, 1993, assistant state's attorney, Joan
Alexander GA 14 assigned me to assist her in an
investigation of a computer bulletin board that is
disseminating information on how to manufacture explosives,
bombs, and how to evade bomb squad technicians when they
attempt to disarm such devices. The information included
explicit and ((sic)) instructions on how to construct such
devices with only laymans knowledge, and involved the
promotion and encouragement of constructing such devices for
purpose ((sic)) of "maiming or mortally wounding" law
enforcement officials.

That presently Michael Elansky has a court appearance for
violation of probation. This probation is the result of an
arrest for manufacturing explosives. In October, 1992,
Michael Elansky was arrested for a burglary at Hall High
School in which several dangerous chemicals were stolen. The
chemicals stolen were sulfuric acid, hydrochloric acid and
nitric acid. All of these chemicals can be used to
manufacture explosives. That it was on May 28, 1993 that
Detective Goodrow of the Hartford Police Department gained
access to the "Warehouse", a modem accessible computer
bulletin board that can be reached over regular telephone
lines, ((sic)) The Warehouse is operated and controlled
solely and exclusively by Michael Elansky. Elansky as the
operator of the bulletin board system (BBS), is the only
person who can delete files from the bulletin board, and is
the only person who can determine which user may access the
system and what level of access they may obtain. The user in
this case were ((sic)) carefully screened and were required
to make application to Elansky in order to be allowed
access.

The computer bulletin board in this case originates from the
computer of Michael Elansky in the home of Michael Elansky
((address deleted by CuD)), West Hartford, Ct. Elansky being
the authorized user of the bulletin board had a code name
that identified him to the users of this bulletin board. The
code name used by Elansky is "IONIZER."

That Goodrow said the "Anarchy'" ((sic)) file he obtained
access to the Warehouse bulletin board through one of the
users systems.

The file Anarchy that Goodrow accessed gave detailed
instructions on how to manufacture explosives, bombs and
went on to instruct the reader on how to evade police bomb
squads in dismantling of bombs.

That I supplied a photocopy of the file that Detective
Goodrow downloaded from Michael Elansky Warehouse Bulletin
Board.

Some authorized users of Michael Elansky's are minors, a
fact known to Elansky since he required that name, address
and age prior to being allowed to access the bulletin board.

The phone number used by Detective Goodrow to access
"Warehouse" Bulletin Board put out by Elansky ((number
deleted by CuD)). I obtained from SNETCO Security that the
phone line belongs to Michael Elansky (address deleted by
CuD)), West Hartford, CT.

((name deleted by CuD)) of Bloomfield, a University of Hartford
student, and a user of bulletin board says the person who
runs the bulletin board identifies himself as the "IONIZER"
and is a student of The university of Hartford.

On June 20, 1993 I interviewed and obtained a written
statement from ((name deleted by CuD)) of East Hartford,
he is 14 years of age. He said he has spoken with Michael
Elansky by phone on several occasions.

Several hours after speaking with ((name deleted by CuD)) I
received a phone call from Michael Elansky asking why I was
investigating him.

That ((sic)) I spoke with ((name deleted by CuD)), 17 years
of age who downloaded but deleted.

((name deleted by CuD)) of Newington downloaded "ANARCHY" from the
warehouse bulletin board. The material was downloaded onto a
floppy disc for the police department.

Elansky does promote, encourage and praise the manufacture
of explosives such as pipe bombs and goes one step further
in promoting techniques on how to evade, injure and kill
bomb technicians attempting to neutralize the bomb.

_EXCERPTS_

To any law enforcement agency "FUCK OFF this file is
intended to promote general havoc and *ANARCHY*, and you
can't do a damn thing about it PIGS...instructions of making
pipe bombs. materials needed 6" pipes, drill

((CuD Moderators' Note: Were "instructions" withheld?))

That in October 1992 the West Hartford Police Department
conducted a search warrant at the home of Michael Elansky.
The seizure included, pipes, approximately 6" long that had
been capped and had been drilled into.

Issue warrant...violation of Section 53a-179a inciting
injury to persons or property and 53-21 risk of injury to a
minor.

dated July 26, 1993

The files in question were reprinted (sans actual instructions) in CuD
5.71, and we saw in them no evidence that Elansky or anybody else
advocated violence against the public or against law enforcement. Nor
do the excerpts from the report make any such claim. The
interpretation of the files by police stretches credibility. There are
instructions for making pipe and other bombs, as the report indicates,
but the instructions are superficial and do not target police or
others. We could also not find any instructions in either file for
"maiming or mortally wounding" law enforcement officials, for
booby-trapping against disposal experts, or anything else. There are
numerous other files that might suggest this, most available on
"anarchy" and other BBSes. CuD possesses many megs of such files
accumulated over the years, and they are written primarily by young,
rebellious, teenagers. The files, as we argued in CuD 5.69, are
better understood as a form of cultural rebellion and identity
formation in the maturation process of teenagers than as a literal
blueprint for "havoc" and violence.

That files written by a 15 year old nearly four years ago can cause so
much distress among law enforcement demonstrates the technophobia of
law enforcement and the public. The media do not help combat these
fears by appealing to the lowest common denominator in finding a
dramatic angle. We note that no major media have written on this
story. Perhaps if Elansky was also dating four women he met on his
board, the print media would cover it on the front page. However, the
story only raises fundamental First Amendment issues, which are boring
and fail to capture the public interest.

To CuDs knowledge, there has been only one reported incident of a
serious incident involving youths attempting to build pyrotechnic
devices from instructions obtained from BBS files. This occurred in
Washington, D.C. (circa 1990) when two users of the old Atlantis BBS
experimented with tragic results. One incident is one too many.
Perhaps there have been others that have not been drawn to our
attention. But, the point is that there is no evidence over the past
decade of an increase in injuries or damages directly resulting
from accessing such files. Existing evidence, drawn from BBSes,
textfiles, and user-provided information over the years, suggests that
these files are symbols of a youth subculture, and hardly a literal
blueprint for action. When Axl Rose is pictured on MTV wearing a
t-shirt that says "Kill your Idols" with a picture of Jesus, most
observers recognize this as simply the rebellion of the heavy metal
set. Although many commentators find the lyrics of rap disturbing,
there are no arrests of radio station personnel who develop the
playlists or the DJs who play them. Perhaps, in West Hartford, this
will soon occur.

THE LAWS THAT WERE VIOLATED

What were the laws that posting of anarchy files violated?
Chapter 952, Title 53a-179a of the Connecticut Penal code
constitutes a class C felony, punishable up to ten years in
prison:

s 53a-179a. Inciting injury to persons or property:

(a) A person is guilty of inciting injury to persons or
property when, in public or private, orally, in writing, in
printing or in any other manner, he advocates, encourages,
justifies, praises, incites or solicits the unlawful
burning, injury to or destruction of any public or private
property or advocates, encourages, justifies, praises,
incites or solicits any assault upon any organization of
the armed forces of the United States, as defined by
section 27-103, or of this state, as defined by section
27-2, or the police force of this or any other state or
upon any officer or member thereof or the organized police
or fire departments of any municipality or any officer or
of any individual.

s 53-21. Injury or risk of injury to, or impairing morals
of, children

Any person who willfully or unlawfully causes or permits
any child under the age of sixteen years to be placed in
such a situation that its life or limb is endangered, or its
health is likely to be injured, or its morals likely to be
impaired, or does any act likely to impair the health or
morals of any such child, shall be fined not more than five
hundred dollars or imprisoned not more than ten years or
both.

The broad scope of both laws could apply to a substantial amount of
literature and television programming. If applied to the "anarchy"
files that provide the "evidence" for Elansky's arrest, the
implications would undermine freedom of expression by providing the
justification for bringing felony criminal charges by over-zealous
prosecutors against virtually all media. Instead of time-consuming
Congressional hearings and debates on violence in media, why not just
slap a few producers, writers, and Connecticut television personnel in
jail with a $500,000 bond? And, because numerous books advocating,
promoting, justifying, or glorifying violence or insurrection are
available in, or accessible through, most book stores to anyone with
the money to purchase them, perhaps the West Hartford police should
continue their sweep and charge local book dealers as well. And,
because the information is exchanged systematically in a coordinated
network of sales and distribution, it might be wise to invoke
conspiracy laws. Use of the "access devices" to obtain such
information from BBSes, and interstate networks for other media
obviously move into federal jurisdiction, so let's involve the U.S.
Secret Service as well.

Or, we could recognize that the "anarchy" files in question and others
like them, along with other forms of expression that many of us find
unwise or offensive, are simple part of the price of a First
Amendment.

The documents in the case remain sealed, which we find troubling. If
there is more to the Elansky case, then the relevant information
should be unsealed. If Michael Elansky is, in fact, the next
potential World Trade Center bomber, as law enforcement officials
suggest, then evidence should be produced and the judicial process
should do its thing. However, if--as the case seems--Michael Elansky
is "guilty" simply of distributing legal files on a BBS, then he
should be released immediately and the charges against him dropped.

CuD continues to use qualifiers such as "if the facts are as they
seem." We simply find it inconceivable that even the most inept or
mean-spirited law enforcement agents would proceed with a case and
impose such a bond primarily on the basis of the anarchy files. Yet,
without unsealing the documents, we just don't know. Given the facts
publicly available, the evidence seems to mount against the
prosecutor's judgment in this case. By using "anarchy" files as the
basis of prosecution under the cited laws, he seems to have grossly
over-reacted. The result is that it appears that not only has he done
an injustice to Elansky, but he has put all media--electronic and
otherwise--at risk of felony prosecution at the arbitrary discretion
of law enforcement.

Whatever the ultimate facts, the First Amendment issues will not
disappear. CuD is in full accord with those who are uncomfortable with
the ability of the new information technology to make texts and images
freely available to minors and others. The accessibility of "adult"
gifs, ultra-violent video games, graphic or potentially dangerous
texts, virus and related sourcecode, and other material raises serious
ethical and policy questions. Those with children are concerned that
minors, especially young ones, not be exposed to certain types of
material so readily. Those with the capacity to distribute the
material face the challenge of balancing social responsibility with
freedom of expression and information access. The underlying issues
require discussion, debate, and recognition of legitimate, if
competing, interests. We come down unequivocally on the side of
responsible access. However, we absolutely reject the abuse of law as
a means of stifling expression. Those who argue that "If just one life
can be saved by curtailing the First Amendment a bit, then it's worth
it" somehow seem to miss the point: Public education and responsible
media reporting/dialogue are far better antidotes to the dangers
potentially harmful information than subverting the First Amendment to
suppress it.

------------------------------

Date: Thu, 16 Sep 1993 14:18:59 EDT
From: IIRG Group <rune@world.std.com>
Subject: File 2--Thoughts on the Elansky Case - A Response

IIRG RESPONSE TO CuD 5.71 (File 1)
Presented By Mercenary - President/IIRG

In CuD 5.71 (File 1), there appears a letter by Alan Dunkin titled
"Law enforcement in the Elansky case". At this time we'd like to
express our feelings on the content of this letter.

Now Mr. Dunkin says, and we quote:

"The International Information Retrieval Guild (IIRG), which
Elansky belongs to, is trying to raise funds for bond. However,
it burned me to see the IIRG lines in file 3 of CuD issue 5.69:

"Buy His Freedom, Stop Government Censorship"
"If we do not stop the government in its attempts
to censor the public, we have abandoned what it
truly means to be a Freedom Loving American".

Government censorship really has nothing to do with the arrest,
was you claim it was the West Hartford Police Department, which
hardly qualifies to be the government. Plus, this is not
censorship, it's the police trying to protect the public."

Now apparently Mr. Dunkin seems to feel that the West Hartford Police
Department doesn't qualify as a valid branch of government.

Im sure they'll be happy to hear that.

Earlier in his letter he was quick to quote the Webster's Dictionary,
we'd like to advise him to flip to the definition of police.

Police - "The governmental department (of a city,state,etc.) organized
for keeping order and for preventing,detecting,and punishing
crimes."

This definition certainly looks like Government to us.

Mr. Dunkin also makes the statement that "this is not censorship,
it's the police trying to protect the public." Now this may be a nice
idea in theory, but lets look at the plain cold facts of the matter.

1. Mike was a BBS Sysop, with a clearly presented disclaimer
on his system that the files offered on the Ware House
were for Entertainment purposes only.

2. Who were the police protecting? Mike endangered no
individual or property, there were no "terrorist" acts
committed by any user of the Ware House. If the police had
simply asked him to remove any offensive files, We're sure
he would have Obliged. (Although this would be censorship
in itself)

3. Mike's bail is set at $500,000 dollars, the average
murderer in Connecticut receives a $100,000 bail and just
yesterday on Sep 13th, 2 bank robbers received a $250,000
bail. Mike has been approached by a TV program that wants
to air his side of the story. By making his bail so high
that it cannot be made, they are censoring him from
presenting his story.

4. When any governmental agency decides what is "acceptable"
to read, this is defined as censorship. And by arresting
Mike Elansky for having so called "questionable" text
files on his system. The West Hartford Police (a
Governmental Agency), is censoring a sysops rights of what
he may have online.

------------------------------

Date: 9 Sep 93 09:01:39 GMT
From: rhys@CS.UQ.OZ.AU(Rhys Weatherley)
Subject: File 3--Attitude TV show about hackers in Australia

On the 8th of September, the Australian Broadcasting Corporation
broadcast an episode in their "Attitude" series of programs. This
episode concentrated on hackers, the cyberpunk movement, law enforcement,
cyberart, youth being empowered by technology, and lots of other things
(my memory fails me on all the details). As the CuD editors are always
on the lookout for perceptions of hackers by the media, I thought I'd
send this overview in. Other Aussies who saw the show may be able to
add to what I've said below, or correct my errors.

Basically, the show presented a fairly consistent angle on the hacker
issue. Unfortunately, its angle was the "cracker" aspect, which is what
we've come to expect from the media, sadly. It did touch on issues of
Freedom of Information, hacker ethics, and the interviews with convicted
or accused hackers were good. One of the hackers interviewed told a
familiar story for CuD readers: the police confiscated his equipment,
no charges have yet been laid, and he can't get his equipment back.
Others stated how easy it was to walk through systems.

The recent "Hacking at the End of the Universe" conference in the
Netherlands made an appearance, but computer-illiterate viewers would
be forgiven for thinking that this was a big cracker get together to
swap tips on breaking into systems. The difference between a hacker
of the old school and the cracker variety was never spelt out.

Here is your typical hacker profile as presented by the show: they
start their hacking life with a computer and a modem getting into
pirate bulletin boards downloading cracked games, and eventually
move onto the Internet. A hacker is playful and explorative by
nature.

A little bit of confusion between USENET and Internet got in, but it
was brief, and they seemed to want to talk about IRC more, probably
because real-time chatting is trendier than netnews. :-) The perception
I got of the Internet (if I hadn't known any better) was that it exists
for the exchange of hacker (i.e. cracker) material. *sigh*

They interviewed a cyberfeminist, who espoused the "male-dominated
network" view (I'm not on any side here: maybe it's true, maybe it
isn't). She and 3 friends are apparently working on a video game for
females. More power to them I say. Some cyberartists were also
interviewed ("Cyber Da Da" I think their name was: could be wrong).

Bruce Stirling was interviewed and made an interesting comment about law
enforcement attitudes (paraphrased): "if they have lots of computer
equipment, and a copy of Neuromancer, then they must be up to something".
Gee, I better burn my copy right now! :-) At one point, they did a
little bit of a "fast forward effect" on Bruce speaking (could have been
someone else): it made me wonder if some "good hacker" stuff was in the
fast forwarded section and was edited out.

The Australian Federal Police also got a look-in (also paraphrased):
"we may not bust down your door now, but we are just busy on other cases,
and we'll get around to you later". Another interviewed person made
the comment that hackers are usually one step ahead of law enforcement
because they can specialize, whereas law enforcement can't. Good comment.

Computer porn only got a brief 5 second slot, which was a relief considering
some of the newspaper stories that have been doing the rounds in Australia
recently. It still had the obligatory picture though.

All in all, I don't think the show did the network or the hacker communities
any real favours, but it wasn't overly militant about it either.

------------------------------

Date: Fri, 10 Sep 93 03:12:00 BST
From: grmeyer@GENIE.GEIS.COM
Subject: File 4--CuNews

If It's Blurry You Shouldn't Be Watching
========================================
A patented digital technology from VideoFreedom Systems (San Diego, CA)
may be the key to getting an intrusive Congress off their censorship
bandwagon. The technology would allow television (and movie theatres!)
to blur objectionable scenes and sounds. Much the same way the news
programs can distort the voice and image of a confidential source who wishes
to remain that way. The technology would allow those viewers who want to see
"the good parts" to clean-up the image to their tastes.
(Information Week August 16, 1993 pg 10)

Hackers Need Not Apply
======================
Information Week magazine recently conducted a "fax vote" self-selected
survey of readers. The questions asked about policies, thoughts, and
practices regarding hiring ex-hackers to help out with computer security.
Of the those who choose to respond, 15% said they had been approached for
a job by a hacker. Only 6% said they had ever hired a hacker to test
security. Of their concerns about doing so, over half said "they might
compromise security". About 35% expressed concerns over "legal
problems".

Some of the write-in comments included:

"Their crimes are difficult to prove and almost impossible to prosecute.
Not only do they go unpunished, but hiring them makes crime pay."

"What happened to our idea of ethics and morality? I don't believe only
felon hackers are smart enough to foolproof our computer systems."

"They could sell ideas back to your competitor. These people will do
anything for a buck".

Refer to Information Week, August 16, 1993 pg 29 for full details.

This Tag Line Meets Corporate Standards
=======================================
Duke Power Company (Charlotte, NC) has issued a memo to supervisors and
managers that forbids employees from expressing their religious or political
opinions over the company's Email, voice mail, or fax machines. The company
says the memo arises out of problems with people using 'tag lines' (short
sentences at the end of messages) on the company's Profs mail system. The
company did not forbid tag lines, but issued guidelines for their content.
According to the company few of its 18,000 employees see the rules as a
restriction of free speech.
(Information Week. August 16, 1993 pg 60)

Woodstock for Hackers and Phreaks
=================================
Newsweek magazine (Aug 16, 1993 pg 47) features a story on the End of The
Universe conference in the Netherlands. According the Information Week's
summary, the Newsweek article reports that attendees had at least one thing
in common with the Woodstock guests....they believe that rules were meant
to be broken. (IW's summary is on pg. 64, August 16, 1993)

Don't Copy That (Microsoft) Floppy!
===================================
Information Week reports that an article in the San Francisco paper THE
REVOLVER (Aug 9, pg 1) says some lawyers claim that Microsoft might enjoy
too much influence over federal prosecutors. It seems that an unusually
high number of cases against software pirates are launched on Microsoft's
behalf. The number is higher compared with Lotus or WordPerfect for example.
(Information Week. August 1, 1993. pg 64)

Feds file Kiddie-Porn charges
=============================
Charges have been brought against six people in an effort to shut down
an international child pornography ring. Dept of Justice officials allege
that the Bamse BBS, based in Denmark, offers a variety of child-related
porno in the form of graphics, text, and computer games.
(Computerworld. September 6, 1993. pg16)

20th Annual Computer Security Conference and Exhibition
=======================================================
The Computer Security Institute's conference will be held November 8 - 10,
1993 in Anaheim, California. The Anaheim Hilton and Towers is the site
for the meetings. Contact the C.S.I. at (415) 905-2626 for full details.
Some of the proceedings scheduled include:
Unix Security for Bert and Ernie
(Cheryl Jaksha, Coca-Cola Foods)
Identification and Protection of Computer Evidence
(Walter Manning, Techno Crime Services)
Horror Stories and How to Use Them
(Dan Erwin, Dow Chemical)
Security Awareness for the Unwilling
(Cheryl Jaksha, Coca-Cola Foods)
Information Security: The Human Dimension
(Vic Maconachy, Ph.D., US DoD)
The Golden Rule and Computer Viruses
(Genevieve Burns, Monsanto Company)
Why PBX Fraud Continues
(Ed Blackwell, Information Security Consultant)
Fax Security Facts
(Steve Skolochenko, US Postal Service)
Cryptographic Policy Issues
(F. Lynn McNulty, NIST)
Penetration Testing
(Richard W. Owen, Jr., Janus Software)

Please Deposit 25 cents for the next 64000 bytes
================================================
New York residents and companies might have to start paying a tax for using
on-line services. An amendment to the NY state budget added a 5% sales tax
to 900-number "phone sex" providers. Critics, however, say the law is so
vague that it may end up applying to on-line services and bulletin boards.
(Information Week. Sept 6, 1993 pg 14)

UK Data Protection Act
======================
Great Britain's data protection registrar is attempting to establish a
national policy concerning the types of information employers can retain,
and sell, about their employees. The investigation was spurred by a story
in the Times of London which claimed that banks, retailers, and insurance
firms stored information about their employees and customers sex lives
and voting records.
(Information Week. Sept 6, 1993 pg46)

------------------------------

From: "James I. Davis" <jdav@WELL.SF.CA.US>
Subject: File 5--CPSR Annual Meeting
Date: Thu, 2 Sep 1993 09:43:10 -0700

COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
ANNUAL MEETING

October 16 - 17, 1993

University of Washington, South Campus Center
Seattle, Washington, USA

Envisioning the Future:

A National Forum on the

National Information Infrastructure and Community Access


Co-sponsored by the American Society for Information Science
Pacific Northwest Chapter (ASIS-PNC)

************************************************************************

The National Information Infrastructure (NII) is the proposed medium or
"electronic highway" that will connect schools, libraries, government
agencies, and citizens using state-of-the-art computer and communications
technology. Media, computer, and telecommunications companies are also
acutely interested in the NII as it dramatically increases their
opportunity for delivery of communication, services, and entertainment.
CPSR is convening this meeting for both computer professionals and the
informed public to discuss the broad range of choices facing society
regarding the NII.


Saturday, October 16th


8:00 - 9:00 Registration/Coffee & Tea

9:00 - 9:15 Welcome to the CPSR Annual Meeting - Aki Namioka

9:15 - 10:15 Keynote Address - Bruce McConnell,
Office of Management and Budget

"Shaping National Information Infrastructure Policy"

Bruce McConnell, Chief of Information Policy at the Office of
Information and Regulatory Affairs in the Office of Management and
Budget (OMB), will present his views on the major NII issues now
facing the administration. He has been with OMB since 1985 and
became head of Information Policy in 1992. He now chairs the
inter-agency task force responsible for developing federal
information policy for the Information Infrastructure Task Force.


10:15 - 10:45 Break


10:45 - 12:15 Panel Discussion - Moderated by Eric Roberts

"Public Access to Internetworks"

Public access to the Internet (and other major networks) is a critical
issue in any discussion about an "electronic highway". Panelists
representing a wide variety of perspectives, including representatives
from the Pacific Northwest, will present their views.

Panelists:
Phil Bereano, College of Engineering, University of Washington
Eric Hood, NorthWestNet
Kenneth Kay, Computer Science Policy Project
Jim Taylor, Coordinator Automated Services, Seattle Public Library


12:15 - 1:45 Lunch Break


1:45 - 3:00 Panel Discussion - Moderated by Andrew Gordon

"Municipal Information Infrastructure"

City and other government agencies are exploring possibilities for
developing municipal networks. In this panel a city official as well as a
representative from the state regulatory agency and a representative of
commercial interests will offer their insights and interests.

Panelists:
Joe Hommel - Washington Utilities and Transportation Commission
A representative from the Department of Administrative Services for
the City of Seattle


3:00 - 4:30 Panel Discussion - Moderated by Doug Schuler

"Networking in the Community"

Community networks exist and are being developed all over the U.S.
Panelists from various community networks will present their
perspectives on the state of community networking now and in the future.

Panelists:
Tom Grundner, National Public Telecomputing Network
Parker Lindner, New Media Matters
Evelyn Pine, CPSR/Berkeley member and former Executive Director of the
Community Memory Project
Roy Sahali, CLAMDYP (Computing Literacy and Access Making a Difference for
Youth Projects)


4:30 - 4:45 Break


4:45 - 6:15 Panel Discussion - Moderated by Marc Rotenberg

"Computers and Democracy - What's the Connection?"

How might computers facilitate the democratic process? How might they
pervert it? "Electronic Democracy" is currently in the public eye and
aspects of it will probably be tested soon. What can be done to promote
wise uses of computers in this critical area?

Panelists:
Jeff Chester, Center for Media Education
Jamie Love, Taxpayers Assets Project
Leah Lievrouw, Department of Telecommunication and Film,
University of Alabama

6:15 - 6:30 Closing Remarks - Jeff Johnson


************************************************************************

7:00 - 7:30 No Host Bar at Banquet Site

7:30 CPSR Banquet - Fundraiser - Waterfront Activities Center
(Vegetarian food will be available)

+ Presentation of the 1993 Norbert Wiener Award to The Institute
for Global Communications (IGC)
Presenter: Eric Roberts

The CPSR Board of Directors has chosen to award the 1993 Wiener
Award to IGC in recognition of the work the organization has done to
use network technology to empower previously disenfranchised
individuals and groups working for progressive change. Geoff Sears,
IGC's Executive Director, will be present to accept the award.

+ Banquet Address and Interactive Event - Kit Galloway, Electronic
Cafe International

Kit Galloway of Electronic Cafe International in Santa Monica,
California will present his innovative approach to electronic
communication using phone lines, slow-scan television, and other
technology. Using videotapes and a live demonstration with CPSR
chapters in Los Angeles and other locations, Kit will discus how the
Electronic Cafe concept has been used in a variety of settings.
Electronic Cafe International has staged global events with poets,
children, and communities in France, Nicaragua, Japan, as well as a
variety of American cities.

Be sure to attend the banquet and participate in this provocative
encounter with multimedia community networks !!

************************************************************************

Sunday, October 17th

The second day of the conference will feature a more interactive format
including several workshops, a discussion of CPSR's NII vision, and
a special - free and open to the public - panel discussion on "Privacy
Implications of Health Care Reform" Sunday evening.


8:30 - 9:30 Coffee & Tea

9:30 - 11:30 Workshop Sessions

Gender Relations in Networking
- Judi Clark

Information Policy: A Framework for Action
- Karen Sy

Computer Professionals and Social Action
- Jeff Johnson

11:30 - 1:00 Lunch Break

1:00 - 2:30 CPSR Discussion

2:30 - 3:00 Break

3:00 - 4:30 CPSR NII Vision Document Discussion - Moderated by Todd Newman

4:30 - 5:00 Closing Remarks - Future CPSR NII Program - Marc Rotenberg


7:30 - 9:30 Special Panel Discussion
"Health Care Reform and the National Information
Infrastructure: Opportunities and Risks"

This special event is free and open to the public.
Kane 210, University of Washington

************************************************************************

ABOUT CPSR

Computer Professionals for Social Responsibility stands alone as the only
national, non-partisan, public-interest organization dedicated to
understanding and directing the impact of computers on society. Decisions
regarding the use of this technology have far-reaching consequences that
necessarily reflect the basic values and priorities of the people who govern
their use.

Founded in 1981, CPSR has 2000 members from all over the world and 22
chapters across the country. Each of our members is an important participant
in the dialogue that is helping to shape the future use of computers in the
United States. Our National Advisory Board includes one Nobel laureate and
three winners of the Turing Award, the highest honor in computer science.

We believe that as the influence of computers continues to permeate every
aspect of our society, it is important that professionals become active
participants in formulating the policy that governs computer use and access.
CPSR welcomes any and all who share our convictions.

+++++++++++++++++++++++++++++++++++

Registration Form

Please pre-register by September 30 to guarantee seating. Registrations at
the door will be accepted pending space.

Name _________________________________________________________________

Address ______________________________________________________________

City _______________________________ State _____________ Zip _________

Telephone __________________________ E-mail_____________________________

CPSR member $55 _______

Non member $75 _______

1 year CPSR membership & registration $100 _______

Low income/student $25 _______

Banquet ticket $40 X ___ = _______

Additional donation to further CPSR's work _______

Total enclosed _______

For more information contact CPSR, 415-322-3778, draper@csli.stanford.edu,
or Aki Namioka, 206-865-3249, aki@cpsr.org. Send completed registration
form with check to: CPSR, P.O. Box 717, Palo Alto, CA 94301

------------------------------

End of Computer Underground Digest #5.72
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...

guest's profile picture
@guest
2 Nov 2024
What is certain is that the first Greek geographer to clearly place the Pillars of Hercules at Gibraltar was Eratosthenes (who lived between ...

guest's profile picture
@guest
1 Nov 2024
Disquieting thc drinks has been quite the journey. As someone keen on unpretentious remedies, delving into the in every respect of hemp has ...

guest's profile picture
@guest
29 Oct 2024
hi Good day I am writing to inform you of recent developments that may impact our ongoing operations. This morning, global news outlets hav ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT