Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 05 Issue 50

  



Computer underground Digest Wed July 7 1993 Volume 5 : Issue 50
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Editor: Etaoin Shrdlu, Seniur

CONTENTS, #5.50 (July 7 1993)
File 1--New information on Public Key Patents
File 2--Galactic Hacker Party, '93
File 3--On-Line Congressional Hearing
File 4--Hacker Listens to Secretary's Aides
File 5--Virtually no Reality in "Virtual Reality"
File 6--Donation Distinctions (By E-Zine Editors/Moderators)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

ANONYMOUS FTP SITES:
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
ftp.warwick.ac.uk in pub/cud (United Kingdom)

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Mon, 28 Jun 1993 17:59:54 -0800 (PDT)
From: ygoland@HURRICANE.SEAS.UCLA.EDU
Subject: File 1--New information on Public Key Patents

Date--Mon, 28 Jun 93 17:25:32 edt
From--friedman@gnu.ai.mit.edu (Noah Friedman)
Subject--Digital Signature Scandal

[The following is an official announcement from the League for
Programming Freedom. Please redistribute this as widely as possible.]

Digital Signature Scandal

Digital signature is a technique whereby one person (call her J. R.
Gensym) can produce a specially encrypted number which anyone can
verify could only have been produced by her. (Typically a particular
signature number encodes additional information such as a
date and time or a legal document being signed.) Anyone can decrypt
the number because that can be done with information that is
published; but producing such a number uses a "key" (a password) that
J. R. Gensym does not tell to anyone else.

Several years ago, Congress directed the NIST (National Institute of
Standards and Technology, formerly the National Bureau of Standards)
to choose a single digital signature algorithm as a standard for the
US.

In 1992, two algorithms were under consideration. One had been
developed by NIST with advice from the NSA (National Security Agency),
which engages in electronic spying and decoding. There was widespread
suspicion that this algorithm had been designed to facilitate some
sort of trickery.

The fact that NIST had applied for a patent on this algorithm
engendered additional suspicion; despite their assurances that this
would not be used to interfere with use of the technique, people could
imagine no harmless motive for patenting it.

The other algorithm was proposed by a company called PKP, Inc., which
not coincidentally has patents covering its use. This alternative had
a disadvantage that was not just speculation: if this algorithm were
adopted as the standard, everyone using the standard would have to pay
PKP.

(The same patents cover the broader field of public key cryptography,
a technique whose use in the US has been mostly inhibited for a decade
by PKP's assiduous enforcement of these patents. The patents were
licensed exclusively to PKP by the Massachusetts Institute of
Technology and Stanford University, and derive from taxpayer-funded
research.)

PKP, Inc. made much of the suspect nature of the NIST algorithm and
portrayed itself as warning the public about this.

On June 8, NIST published a new plan which combines the worst of both
worlds: to adopt the suspect NIST algorithm, and give PKP, Inc. an
*exclusive* license to the patent for it. This plan places digital
signature use under the control of PKP through the year 2010.

By agreeing to this arrangement, PKP, Inc. shows that its concern to
protect the public from possible trickery was a sham. Its real desire
was, as one might have guessed, to own an official national standard.
Meanwhile, NIST has justified past suspicion about its patent
application by proposing to give that patent (in effect) to a private
entity.

Instead of making a gift to PKP, Inc., of the work all of us have paid
for, NIST and Congress ought to protect our access to it--by pursuing
all possible means, judicial and legislative, to invalidate or annul
the PKP patents. If that fails, even taking them by eminent domain is
better (and cheaper in the long run!) than the current plan.

You can write to NIST to object to this giveaway. Write to:

Michael R. Rubin
Active Chief Counsel for Technology
Room A-1111, Administration Building,
National Institute of Standards and Technology
Gaithersburg, Maryland 20899
(301) 975-2803.

The deadline for arrival of letters is around August 4.

Please send a copy of your letter to:

League for Programming Freedom
1 Kendall Square #143
P.O.Box 9171
Cambridge, Massachusetts 02139

(The League for Programming Freedom is an organization which defends
the freedom to write software, and opposes monopolies such as patented
algorithms and copyrighted languages. It advocates returning to the
former legal system under which if you write the program, you are free
to use it. Please write to the League if you want more information.)

Sending copies to the League will enable us to show them to elected
officials if that is useful.

This text was transcribed from a fax and may have transcription
errors. We believe the text to be correct but some of the numbers
may be incorrect or incomplete.

+++++++++

** The following notice was published in the Federal Register, Vol.
58, No. 108, dated June 8, 1993 under Notices **

National Institute of Standards and Technology

Notice of Proposal for Grant of Exclusive Patent License

This is to notify the public that the National Institute of
Standards and Technology (NIST) intends to grant an exclusive
world-wide license to Public Key Partners of Sunnyvale, California
to practice the Invention embodied in U.S. Patent Application No.
07/738.431 and entitled "Digital Signature Algorithm." A PCT
application has been filed. The rights in the invention have been
assigned to the United States of America.

The prospective license is a cross-license which would resolve a
patent dispute with Public Key Partners and includes the right to
sublicense. Notice of availability of this invention for licensing
was waived because it was determined that expeditious granting of
such license will best serve the interest of the Federal Government
and the public. Public Key Partners has provided NIST with the
materials contained in Appendix A as part of their proposal to
NIST.

Inquiries, comments, and other materials relating to the prospec-
tive license shall be submitted to Michael R. Rubin, Active Chief
Counsel for Technology, Room A-1111, Administration Building,
National Institute of Standards and Technology, Gaithersburg,
Maryland 20899. His telephone number is (301) 975-2803. Applica-
tions for a license filed in response to this notice will be
treated as objections to the grant of the prospective license.
Only written comments and/or applications for a license which are
received by NIST within sixty (60) days for the publication of this
notice will be considered.

The prospective license will be granted unless, within sixty (60)
days of this notice, NIST receives written evidence and argument
which established that the grant of the license would not be
consistent with the requirements of 35 U.S.C. 209 and 37 CFR 404.7.

Dated: June 2, 1993.

Raymond G. Kammer
Acting Director, National Institute Standards and Technology.

Appendix "A"

The National Institute for Standards and Technology ("NIST") has
announced its intention to grant Public Key Partners ("PKP")
sublicensing rights to NIST's pending patent application on the
Digital Signature Algorithm ("DSA").

Subject to NIST's grant of this license, PKP is pleased to declare
its support for the proposed Federal Information Processing
Standard for Digital Signatures (the "DSS") and the pending
availability of licenses to practice the DSA. In addition to the
DSA, licenses to practice digital signatures will be offered by PKP
under the following patents:

Cryptographic Apparatus and Method ("Diffie-Hellman")
No. 4,200,770
Public Key Cryptographic Apparatus and Method
("Hellman-Merkle") No. 4,315,552
Exponential Cryptographic Apparatus and Method
("Hellman-Pohlig") No. 4,434,414
Method For Identifying Subscribers And For Generating
And Verifying Electronic Signatures In A Data Exchange
System ("Schnorr") No. 4,995,082

It is PKP's intent to make practice of the DSA royalty free for
personal, noncommercial and U.S. Federal, state and local
government use. As explained below, only those parties who enjoy
commercial benefit from making or selling products, or certifying
digital signatures, will be required to pay royalties to practice
the DSA.

PKP will also grant a license to practice key management, at no
additional fee, for the integrated circuits which will implement
both the DSA and the anticipated Federal Information Processing
Standard for the "key escrow" system announced by President Clinton
on April 16, 1993.

Having stated these intentions, PKP now takes this opportunity to
publish its guidelines for granting uniform licenses to all parties
having a commercial interest in practicing this technology:

First, no party will be denied a license for any reason other that
the following:

(i) Failure to meet its payment obligations,
(ii) Outstanding claims of infringement, or
(iii) Previous termination due to material breach.

Second, licenses will be granted for any embodiment sold by the
licensee or made for its use, whether for final products software,
or components such as integrated circuits and boards, and regard-
less of the licensee's channel of distribution. Provided the
requisite royalties have been paid by the seller on the enabling
component(s), no further royalties will be owned by the buyer for
making or selling the final product which incorporates such
components.

Third, the practice of digital signatures in accordance with the
DSS may be licensed separately from any other technical art covered
by PKP's patents.

Fourth, PKP's royalty rates for the right to make or sell products,
subject to uniform minimum fees, will be no more than 2 1/2% for
hardware products and 5% for software, with the royalty rate
further declining to 1% on any portion of the product price
exceeding $1,000. These royalty rates apply only to noninfringing
parties and will be uniform without regard to whether the licensed
product creates digital signatures, verifies digital signatures or
performs both.

Fifth, for the next three (3) years, all commercial services which
certify a signature's authenticity for a fee may be operated
royalty free. Thereafter, all providers of such commercial
certification services shall pay a royalty to PKP of $1.00 per
certificate for each year the certificate is valid.

Sixth, provided the foregoing royalties are paid on such products
or services, all other practice of the DSA shall be royalty free.

Seventh, PKP invites all of its existing licensees, at their
option, to exchange their current licenses for the standard license
offered for DSA.

Finally, PKP will mediate the concerns of any party regarding the
availability of PKP's licenses for the DSA with designated
representatives of NIST and PKP. For copies of PKP's license
terms, contact Michael R. Rubin, Acting Chief Counsel for Technolo-
gy, NIST, or Public Key Partners.

Dated: June 2, 1993.

Robert B. Fougner, Esq.,
Director of Licensing, Public Key Partners,
310 North Mary Avenue, Sunnyvale, CA 94033

[FR Doc. 93-13473 Filed 8-7-93; 8:45 am]

+++++++++++++++
Forwarded by:
++++
Jim Gillogly
Trewesday, 21 Forelithe S.R. 1993, 20:56

------------------------------

Date: Wed, 23 Jun 1993 18:22:31 (EDT)
From: Crypt Newsletter <70743.1711@COMPUSERVE.COM>
Subject: File 2--Galactic Hacker Party, '93

Remember the Galactic Hacker Party back in 1989? Ever wonder what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!

That's right. On august 4th, 5th and 6th 1993, we're organising a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers,
hardware freaks, techno-anarchists, communications junkies,
cyberpunks, system managers, stupid users, paranoid androids, Unix
gurus, whizz kids, warez dudes, law enforcement officers (appropriate
undercover dress required), guerilla heating engineers and other
assorted bald, long-haired and/or unshaven scum. And all this in the
middle of nowhere (well, the middle of Holland, actually, but that's
the same thing) at the Larserbos campground four metres below sea
level.

The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking, viruses,
paranoia, legal sanctions against hacking in Holland and elsewhere and
much, much more. English will be the lingua franca for this event,
although some workshops may take place in Dutch. There will be an
Internet connection, an internet ethernet and social interaction
(both electronic and live). Included in the price are four nights in
your own tent. Also included are inspiration, transpiration, a
shortage of showers (but a lake to swim in), good weather (guaranteed
by god), campfires and plenty of wide open space and fresh air. All of
this for only 100 dutch guilders (currently around US$70).

We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.

H O W ?

++++

Payment: In advance only. Even poor techno-freaks like us would like
to get to the Bahamas at least once, and if enough cash comes in we
may just decide to go. So pay today, or tomorrow, or yesterday, or in
any case before Friday, June 25th 1993. Since the banks still haven't
figured out why the Any key doesn't work for private international
money transfers, you should call, fax or e-mail us for the best way to
launder your currency into our account. We accept American Express,
even if they do not accept us. But we are more understanding than they
are. Foreign cheques go directly into the toilet paper recycling bin
for the summer camp, which is about all they're good for here.

H A !

+++++

Very Important: Bring many guitars and laptops.

M E ?

+++++

Yes, you! Busloads of alternative techno-freaks fromanet will descend
on this event. You wouldn't want to miss that, now, would you?

Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organising your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize this during the
congress. In whatever way you wish to participate, call, write,
e-mail or fax us soon, and make sure your money gets here on time.
Space is limited.

S O :

+++++

> 4th, 5th and 6th of August
> Hacking at the En (a hacker summer congress)

> ANWB groepsterrein Larserbos
(Flevopolder, Netherlands)

> Cost: fl. 100,- (+/- 70 US$) per person

(including 4 nights in your own tent)

M O R E I N F O :

++++++++++++++++++++++++

Hack-Tic
Postbus 22953
1100 DL Amst Netherlands
tel : +31 20 6001480
fax : +31 20 6900968
E-mail : heu@hacktic.nl

------------------------------

Date: Tue, 6 Jul 1993 16:25:47 CDT
From: Jim Milles <MILLESJG@SLUVCA.SLU.EDU>
Subject: File 3--On-Line Congressional Hearing

Forwarded by Gleason Sackman, net-happenings moderator
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

++++++++++ Text of forwarded message ++++++++++
Date--Mon, 5 Jul 93 14:28:25 -0400
From--hearing-info@trystero.malamud.com
To--com-priv@psi.com
Subject--On-Line Congressional Hearing

Station--Internet Multicasting Service
Channel--Internet Town Hall
Program--On-Line Congressional Hearing
Release--July 5, 1993
Content--First Announcement/On-Line Congressional Hearing

On July 26 at 9:30AM EDT, the Subcommittee on Telecommunications
and Finance of the U.S. House of Representatives will hold the first
Congressional Hearing ever held over a computer network. The oversight
hearing on "The Role of Government in Cyberspace" will take place in
the Grand Ballroom of the National Press Club at 14th and F Streets,
N.W., Washington, D.C. The hearing is open to the public. An open
house will be held from 3-5PM on the same day in the same location and
is also open to the public.

Chairman Markey has asked that this historic occasion demonstrate
the potential and diversity of the global Internet. Thirty Sparcstations
will be in the hearing room, allowing members of Congress, staff, and
their guests to read e-mail, use Gopher menus, read testimony in WAIS
databases, browse the World Wide Web, and otherwise use the resources
of the global Internet as part of the hearing.

Some witnesses for the hearing will testify remotely, sending audio
and video over the Internet. Audio and video of the hearing will also
be multicast over the Multicast Backbone (MBONE). We are hoping that
C-SPAN and other traditional media will also carry the event. *MORE
DETAILS ON MBONE AND OTHER WAYS TO WATCH THE HEARINGS REMOTELY WILL BE
FORTHCOMING SHORTLY.*

One of the primary points that we are hoping to demonstrate is
the diversity and size of the Internet. We have therefore established
an electronic mail address by which people on the Internet can communicate
with the Subcommittee before and during the hearing:

congress@town.hall.org

We encourage you to send your comments on what the role of government
should be in the information age to this address. Your comments to this
address will be made part of the public record of the hearing. Feel free
to carry on a dialogue with others on a mailing list, cc'ing the e-mail
address.

Your cards and letters to congress@town.hall.org will help
demonstrate that there are people who use the Internet as part of their
personal and professional lives. We encourage you to send comments on
the role of government in cyberspace, on what role cyberspace should play
in government (e.g., whether government data be made available on the
Internet), on how the Internet should be built and financed, on how you
use the Internet, and on any other topic you feel is appropriate. This
is your chance to show the U.S. Congress that there is a constituency
that cares about this global infrastructure.

If you would like to communicate with a human being about the
hearing, you may send your comments and questions to:

hearing-info@town.hall.org

Support for the Internet Town Hall is provided by Sun Microsystems
and O'Reilly & Associates. Additional support for the July 26 on-line
congressional hearing is being provided by ARPA, BBN Communications,
the National Press Club, Xerox PARC, and many other organizations.

Network connectivity for the Internet Town Hall is provided by
UUNET Technologies.

------------------------------

From: adunkin@SDF.LONESTAR.ORG(Alan Dunkin)
Subject: File 4--Hacker Listens to Secretary's Aides
Date: Sat, 3 Jul 93 14:59:35 CDT

TELEPHONE HACKER LISTENS TO SECRETARY OF STATE'S AIDES


This morning (July 2nd, 1993) the _Dallas Morning News_
reiterated a _Business Week_ report dated Thursday that "an
electronic hacker eavesdropped on telephone conversations of
aides to Secretary of State Warren Christopher concerning
Sunday's missile attack on Baghdad, Iraq".

The magazine claimed it received a tape of calls by aides on
Saturday, before President Clinton's announcement of the
cruise missile attack.

The state department said no comment was to be made about any
private conversations.

------------------------------

Date: Wed, 23 Jun 1993 18:22:31 (EDT)
From: Crypt Newsletter <70743.1711@COMPUSERVE.COM>
Subject: File 5--Virtually no Reality in "Virtual Reality"

((MODERATORS' NOTE: The following is reprinted from CRYPT NEWSLETTER
#15. We're waiting for the "Virtual Reality" comic books, perhaps
patterned after the mercifully defunct "Hacker Chronicles," and the
Saturday morning cartoon series brought to the kiddies by some frosted
cereal)).

"Virtual reality. What a concept." Yup, we kid you not - that's the
lead to the June Popular Science's cover story on the buzz-concept of
1993. But what concept does the story deliver? None, except more
phlogiston and shopworn photos on Virtuality's Dactyl Nightmare game -
the same press-release photos and animations that, uh, you've already
read in TIME, OMNI, MONDO 2000, OMNI, WIRED, MONDO 2000, NEWSWEEK,
TIME and POPULAR SCIENCE. Is there an echo in here? And THEN
reporter Michael Antonoff burbles about the exciting new SEGA "virtual
reality" helmet which is about to pop off the assembly line. It will
replace the TV with the usual goofy-looking, Nazi-helmet which the
company brags, will deliver a "feeling of total immersion in a
completely realistic 360-degree game world." That's if you consider
SEGA games realistic, of course.

Next comes the Virtual Kitchen, we are told. Why, you'll even be able
to turn on the faucet and listen to running water. Wow. We're really
pushing the boundaries of science, now. And there's virtual skiing as
a possibility, writes Antonoff. You won't really learn how to ski, but
it will be fun.

The story wraps up with 30 socko column inches on the usual wild
speculation on "Virtual Reality" applications in everything from
medicine to alchemy. Much of this talk is reminiscent of the inflated
claims which surrounded the science of molecular genetics in the
mid-'80's and persists to this day. Molecular biology was going to
cure cancer, eliminate viral and inherited illness and provide
everything from miracle drugs to custom-made enzymes which would
eliminate the threat of oil spills while replacing The Hair Club for
Men.

It was bullshit then and it's bullshit now. The theories are nice, but
nature doesn't yield her secrets easily just because
science/entertainment reporters have decided to be flacks for newly
minted professaurus's seeking tenure and grant money.

Of course, molecular biology HAS provided a key to understanding
cellular mechanisms at a very low level. However, it hasn't set the
world on edge. Despite superhuman effort, diseases like malaria,
although well understood, aren't playing dead.

And we suspect, so it will be with "virtual reality." A lot of idiots
will throw a ton of money at it and they'll get what they already
have: games and sex toys.

Even the tabloid TV journalists of the salacious "Hard Copy" sneered
at the "Virtual Reality" mavens on a recent evening segment. A couple
of women, whose names we forget, bleated on about "virtual sex" and
wound up showing Darth Vader-style helmets, rushes from "The Lawnmower
Man" and the kind of animations which tipped over Max Speegle's apple
cart. Crypt editors couldn't help jeering along with the "Hard Copy"
anchormen at the oh-so-novel idea of attaching "data gloves" to the
schlong. (Actually, such tools have been around for a long time. You
find them listed under "Penisator" in magazines published by Larry
Flynt.)

Indeed, if you think a minute you realize there is no such thing as
"virtual sex". It's like being "slightly pregnant." Or having a
"minor" case of gonorrhea. You either have sex with another person,
skin to skin, or you don't. "Virtual sex" is just another fluffy,
meaningless euphemism for computerized team masturbation. The Crypt
Newsletter supports the use of "virtual hooker" or "virtual love
automaton" if you must have jargon; the latter is better, particularly
if you're in need of some reassuring corporate-mumble for conning a
roomful of investment bankers. The mind reels at the possibilities.
Imagine the Michelangelo virus, or some descendant of it, activating
on Ted and Alice's Virtual Sex PC, crashing the system and causing a
"virtual" convulsion in their "data gloves" just as they're booting up
for some afternoon delight. Ouch. Lawsuit. So the next time someone
mentions the word "virtual" to you in dinner conversation, gracefully
dump your side-plate of collard greens into their lap.

And, lo, just as this issue of the Crypt Newsletter went to the
electronic press Newsweek magazine trumped Popular Science with a
cover story on "interactive" - that curious admixture of virtual
reality, information superhighways and CD-ROM squeaking/talking books.
"Virtual reality," claimed the magazine, ". . . with a mighty computer
and New Age goggles . . . you'll eventually be able to simulate sex,
drugs, rock and roll and just about every other human activity." Even
sicking up on your date after a night of too many Long Island Iced
Teas?

------------------------------

Date: Thu, 1 Jul 93 14:49 PDT
From: john@ZYGOT.ATI.COM(John Higdon)
Subject: File 6--Donation Distinctions (By E-Zine Editors/Moderators)

((MODERATORS' NOTE: John Higdon's post raises important issues
involving the status of moderators of digests. His comments focus on
the recent *FALSE* rumors announcing the elimination of CuD from one
of the ftp sites and the the difference between solicitation of funds
to maintain an organization and solicitation of funds by private
individuals who may need external support to enable them to eke out a
living while moderating digests.

Editors of electronic journals/digest are in an odd position. Unlike
organizations, they have no formal constituency that they represent.
Therefore, collecting "dues," "subscription fees," or other
compensation seems tacky. On the other hand, editing a journal such as
Telecom Digest (or CuD), which comes out several times a week,
requires a considerable investment of time and resources. Hard-copy
editors receive a living wage for their efforts. E-zine editors
generally perform the same tasks, reach a larger audience, and require
capital investment of equipment for which they receive no
compensation. Some electronic publishers are fortunate enough to be
tenured professors at a state university. This allows them to pursue
editorship as part of their "service." Others are not so fortunate.
Editing or moderating an electronic publication dramatically eats into
time that might otherwise be spent pursuing their livelihood.
Organizations, such as CPSR or EFF, have paid staff whose duties
include dissemination of newsletters or digests. Most other digests
do not.

How should e-Zine editors be compensated (if at all)? Is it proper for
editors to ask for compensation for efforts that are materially (and
substantially) rewarded in other forums? Should editors/moderators of
forums such as RISKS or TELECOM DIGEST receive compensation?

For now, we only raise the question without laying out the arguments.
At issue here is where altruism ends and reasonable compensation
begins. We would like to here from others: Should moderators/editors
request "donations?"

We must note that CuD editors have no material stake in the outcome of
such a discussion, because we are disallowed from receiving any form
of remuneration. However, we are well aware of the investment of time
and other resources that moderators and editor contribute, and we feel
that some discussion of of the issues are necessary.))

+++

The following remarks concern issues and fact that should be obvious to
everyone, but need to be said in the absence of comment by others.

Recently, there was a rumor that the EFF was dumping its archives of
CuD. The Telecom Digest moderator grabbed this opportunity to deliver
yet another diatribe condemning those who support the EFF and its work,
and casting aspersions on the motives behind the policies and practices
of the EFF itself. Further, he complained that there seemed to be a
dual standard when it came to the practices of the EFF and its fund
raising vs the Digest and the moderator's attempt to drum up cash.

Note: The rumor was a gross distortion in that it was indeed Phrack
that was offloaded to another site for reasons most aptly cited by
Mitch Kapor himself.

The overriding consideration is that the EFF is not in any way to be
compared with Telecom Digest. Leaving the legal definitions aside, the
EFF is an organization, staffed with experts and support personnel,
that has taken on the responsibility of observing, guiding, and even
changing laws that affect everyone in the telecommunications and
computing industry. It supports a paid staff, offices, communications
facilities, and has as its output legal consultations, legal
presentations, legislative commentary (formal and informal), and
provides invaluable assistance to those caught in the vacuum of
cyberspace non-protections. The organization maintains its own Internet
site with the attendant costs, issues hard publications and has,
incidental to its divergent operations, a newsletter (or digest if you
will).

The Telecom Digest is a mailing list. It is maintained on facilities
provided and paid for by a university. The moderator spends time
editing and transmitting issues of the Digest (a job done voluntarily
by moderators all over the Internet world). The Digest is the only
output. The $195/month office is strictly an option, as most mailing
lists are edited by people from their job worksites or their homes. The
same goes for the telephone expenses.

These comments are not to be construed to in any way minimize the work
done by the moderator of Telecom Digest (or any other moderator). But
there is hardly any comparison between the work done by an organization
such as the EFF and that done by the moderator of a mailing list. It is
obvious that there is also a difference between the request for funds
by a fully-qualified activist organization and someone who needs money
to pay the rent. Not everyone agrees with the positions taken by the
EFF or any other activist group and it is certainly anyone's right to
contribute to those with whom he agrees. But be it the EFF or the NRA,
the output of bonafide organizations on behalf of members and those
whose interests fall within an organization's scope of activity is
substantially more significant and appropriate to the consumption of
donated money than that of a simple e-publication, regardless of how
well it is produced.

I subscribe to many, many mailing lists and have done so for many
years. At no time has anyone who was in charge of any of them (except
one) suggested that funds were needed to keep the list going. Neither
direct contributions nor suggestions to buy resold products have been
mentioned in any way, with that one exception.

Whether it is appropriate for a moderator to solicit funds in this
manner I leave for others to debate. But to compare those solicitations
to those of an organization with the prestige and stature of the EFF is
most inappropriate by any standard of consideration. It seems obvious
that it is much more useful and more within the purposes of the net to
contribute money so that important cases get a fairer hearing rather
than so that a mailing list coordinator can be saved the inconvenience of
going out and getting a real job. If the powers that be determine that
the latter is within the scope of the intent of the Internet, then I
bow to that determination.

But let us all be clear on the important distinctions between mailing
lists and hard-working activist organizations.

++
John Higdon | P. O. Box 7648 | +1 408 264 4115 | FAX:
john@ati.com | San Jose, CA 95150 | 10288 0 700 FOR-A-MOO | +1 408 264 4407

------------------------------

End of Computer Underground Digest #5.50
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT