Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 05 Issue 91
Computer underground Digest Sun Dec 5 1993 Volume 5 : Issue 91
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Editor: Tamen O. DeSchrew, III
CONTENTS, #5.91 (Dec 5 1993)
File 1--Anarchy Gone Awry
File 2--PC Security books reprints material from AIS (Review)
File 3--Apple Computers bitten by Conservatives
File 4--GAO Report on Computers and Privacy
File 5--New Docs Reveal NSA Role in
File 6--REMINDER: CFP '94 SCHOLARSHIP DEADLINE APPROACHING
File 7--DIAC-94 Call for Participation
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
CuD is also available via Fidonet File Request from 1:11/70; unlisted
nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
ANONYMOUS FTP SITES:
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
UNITED STATES:
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
ftp.eff.org (192.88.144.4) in /pub/cud
halcyon.com( 202.135.191.2) in /pub/mirror/cud
ftp.warwick.ac.uk in pub/cud (United Kingdom)
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: Thu, 02 Dec 93 04:36:10 -0700
From: "L. Detweiler" <ld231782@LONGS.LANCE.COLOSTATE.EDU>
Subject: File 1--Anarchy Gone Awry
Mr. Leichter raises some extremely pivotal issues in CUD #5.90 related
to the %anarchy' of the Internet. B.Sterling is the author of one of
the most brilliantly colorful characterizations and metaphors of the
Internet as %anarchic', comparing its evolution and development to that
of the English language:
> The Internet's %anarchy' may seem strange or even unnatural, but
> it makes a certain deep and basic sense. It's rather like the
> %anarchy' of the English language. Nobody rents English, and
> nobody owns English. As an English-speaking person, it's up
> to you to learn how to speak English properly and make whatever
> use you please of it (though the government provides certain
> subsidies to help you learn to read and write a bit).
> Otherwise, everybody just sort of pitches in, and somehow the
> thing evolves on its own, and somehow turns out workable. And
> interesting. Fascinating, even. Though a lot of people earn
> their living from using and exploiting and teaching English,
> %English' as an institution is public property, a public good.
> Much the same goes for the Internet. Would English be improved
> if the %The English Language, Inc.' had a board of directors
> and a chief executive officer, or a President and a Congress?
> There'd probably be a lot fewer new words in English, and a lot
> fewer new ideas.
Unfortunately, though, having attended a lecture by Mr. Sterling and
having read %The Hacker Crackdown', I think he has a tendency to
overdramatize and glorify quasi-criminal behavior and rebellious,
subversive, revolutionary aspects of social structures, including those
of the Internet. In my view, to the contrary the Internet is largely
held together with the glue of social cohesion and human civility, and
ingredients that are destructive to that order are likewise toxic to
Cyberspace, and that, conversely, virtually all of the excruciating
poison in the bloodstream today can be traced to violations and
perversions of that trust. (Unfortunately, the English language is
itself subject to unpleasant, corrupt, or toxic uses such as for
profanity, disinformation, and lies, which are prevented or at least
minimized through rejections by honest people.) I agree with Mr.
Leichter in the belief (to paraphrase Twain) that %reports of the
anarchy on the Internet are greatly exaggerated'.
Leichter:
>The Internet has been
>described as an anarchy, but in fact only relatively small parts of
>the Internet are actually anarchic.
I would like to go further than this and suggest that the Internet has
been over-promoted as %anarchic' by certain subversive, quasi-criminal
segments that have found a tenacious hold there, namely extremist
libertarians and %Cryptoanarchists'. The Cryptoanarchist cause is
closely associated with the Cypherpunk founders E.Hughes and T.C.May
(characterized particularly by the latter's infamous signature), who in
my view appear to promote not merely %privacy for the masses' and %the
cryptographic revolution', but at least condone or tolerate the use of
collections of imaginary identities to manipulate and deceive others,
and even to evade legitimate government actions such as criminal
prosecutions. My most strident requests for their position, personal
knowledge, and potential involvement in this practice have gone
unanswered, evaded, and repressed over many weeks, but I have many
statements from followers that might be regarded as %cult fanatics'
about the Liberating Effects of %pseudoanonymity', which they exalt as
True Anonymity.
In my opinion, in this regard of the ease of creating fake identities,
the %anarchic' vulnerability of the Internet reaches its peak in
undesirable and socially poisonous consequences, which people are
bloodily battling daily on many diverse mailing lists and Usenet
groups. In my experience, the Internet inhabitants I have found who
most fanatically worship the Internet %anarchy' seem to be closely
associated with criminally subversive aims of pornography distribution,
tax evasion, black marketeering, and overthrow of governments, goals
which are all masked in much of the eloquent Cryptoanarchist dogma and
rhetoric. While some of us have glimpsed various hideous corners of
Cyberspatial Hell, those who subscribe to the Liberating Religion of
Anarchy are in their Paradise on the Internet As We Know It. I call
their Utopia a Ticking Time Bomb and a Recipe for an Apocalypse.
I have come to these (admittedly melodramatic) conclusions after %10
months and %3500 messages of generally unpleasant and at times
excruciatingly troubling and painful reading and participation on the
Cypherpunks list and many personal communications with the Cypherpunk
leaders including E.Hughes, T.C.May, and J.Gilmore. In fact, in my
opinion the %Psychopunk Manifesto' parody in CUD #5.89, which longtime
cypherpunk list subscriber P.Ferguson describes in 5.90 as having %made
its rounds in the cyberspatial world', actually in many ways comes
closer to delineating the actual cypherpunk agenda than the one
authored by founder E.Hughes on soda.berkeley.edu:
/pub/cypherpunks/rants/A_Cypherpunk's_Manifesto. The satire is
actually a reformulated version of the original Manifesto, and the
former's amazing meme-virus penetration of the into the cyberspatial
psyche that P.Ferguson alludes to is indicative of its resonance over the
latter.
I gave the Cypherpunks the most extraordinary benefit of the doubt for
months, far beyond that of a reasonable cyberspatial inhabitant. But
now I must warn everyone who can hear me that if they assign the
%cypherpunks' as an organization the same credibility as a group like
EFF or CPSR they are dangerously, perhaps disastrously, misguided. They
appear to me to the contrary to be the cultivators of a flourishing
conspiracy and essentially the first Cyberspatial guerilla and
terrorist group! The Psychopunk satirization of the Cryptoanarchists is
representative of this Internet Anarchy Gone Awry.
More information on the CryptoAnarchist & Cypherpunk agenda can be
found in RISKS 15.25, 15.27, and 15.28x (FTP crvax.sri.com, directory
RISKS:). I also have an essay %Joy of Pseudospoofing', regarding the
dangerous consequences and poisonous effects of the manipulations of
fake cyberspatial identities such as on the Internet by
Cryptoanarchists, available to anyone who requests it from me by email
at <ld231782@longs.lance.colostate.edu>.
* * *
I think that many people have mistaken the word %anarchic,' implying no
overseeing authority or order (which the Internet is less) with the
word %decentralized' (which the Internet is more). Again, the
Internet has many regulatory and self-governing systems and orders.
For example, connecting sites are required to implement a certain
minimum set of software standards and prevent or even root out
corruptions in their local sites and software. We have centralized
databases that require the registration of domains for fees. A complex
network of agreements and policies governs interconnectivity and
communication, and a complicated interplay of elements affects basic
content such as %commercial vs. academic.' Lack of some of these
regulations and protocols would be disastrous.
Leichter:
>Most of the Internet, in fact, is
>better described as self-governing. There are a variety of social
>norms concerning network use and interactions. One doesn't post
>messages to unrelated groups. One doesn't evade moderation
>restrictions. One maintains a certain (rather limited, it must be
>admitted) degree of restraint in how one describes other network
>participants. There are few effective mechanisms for enforcing these
>norms, and they are certainly broken on an all-too-regular basis; but
>the network continues to function because social pressure *can* be
>applied to those who become too annoying; and in the most outrageous
>cases, it's possible to remove the offenders' access to the net.
I advocate that we build new formal mechanisms to enforce this order!
We have for too long pretended that a central element of the Internet
is not integral to it, namely that of the %degree of restraint over
network participants' exerted through %social pressure'. Let us codify
and formalize these %norms concerning network use and interactions' and
develop systems that enforce them! I believe such systems can be
developed that do not stray from the sacred Internet tradition of
decentralization of control and freedom from censorship. Why should we
continue to subject ourselves to the torture of %few effective
mechanisms for enforcing these norms broken on an all-too-regular basis'?
One of my most enduring Cyberspatial hallucinations is that of a
Ratings server. A Ratings server would be a massive distributed network
for the propagation of information similar to Usenet, and could
conceivably be built upon it. But the Ratings server is not
Information, as Usenet is, it is Information about Information. Anyone
can post an arbitrary message to the Ratings server that refers to
Information somewhere else in Cyberspace. It is in a sense a Rating of
that Information. The Information could be *anything* -- a mailing
list, a person, a particular Usenet posting, an FTP site. But postings
on the Ratings server can be perused by anyone, and anyone can
contribute Ratings to the server or indicate their own opinion on the
existing Ratings. Different mechanisms exist such that some Ratings are
%local' and some are updated globally.
The fantastic possibilities of this system are evident upon some
reflection and consideration. We could establish arbitrary new groups
that have *formal* requirements that are matched by Ratings servers.
For example, we could require that new sites that enter the Internet be
%trusted' by an existing site. We could require that membership in
certain groups requires a certain amount of collateral peer approval,
with automatic suspension or expulsion as the consequences for
violating it! We could have *meaningful* polls on arbitrary issues. We
could have news servers that automatically sort and archive articles
according to their passing certain Ratings thresholds. We could
restrict the influence of troublemakers! These are all examples of
strengthening and formalizing the informal social orders that are, in
my opinion, today just barely holding the Internet together. With a
Ratings system, I think the civility of the Internet would increase to
a fantastic degree. In short, we could have our *own* cyberspatial government!
Note that there is no centralized authority or unfair influence in this
system, unless people corrupt their servers. When everyone who has
joined a group *individually* decides to screen their postings of
messages that fail to meet a certain %quality' or posters who have a
certain %reputation', that is not Orwellian Censorship but the
beautiful Internet freedom and right of Bozo Filtering. When everyone
who joins a group *agrees* to a charter that may bar troublemakers
based on Ratings, no one can claim they are being unfairly oppressed.
Other extremely interesting implementation issues in the use of the
Ratings servers can be addressed in detail. For example, the use of
cryptographic protocols to ensure the integrity of voting or privacy of
certain entries will certainly prove invaluable and even critical to
their development. The optimal protocols for the localization or
distribution of votes will surely be subject to extremely fascinating
and fruitful research. In my view the concept of a Ratings server is
wide open territory and holds some immensely promising potential in
finally, valiantly slaying the dreaded, ugly, vicious Signal to Noise
Monsters harassing, terrorizing, and torturing us everywhere on the
Internet, to be replaced with Shining Castles.
I urge anyone interested in developing %civilized systems for
cyberspace' to subscribe to a new group I have helped start with
J.Helgingius (owner of the popular and revolutionary anon.penet.fi
anonymous server) called the Cypherwonks, dedicated to openness,
honesty, and cooperation on the Internet, and building sophisticated
new systems to promote social harmony in Future Cyberspace. We are
particularly fascinated with the possibilities of %Electronic
Democracy'. (Send a message to %MajorDomo@lists.eunet.fi' with the body
the commands %info' or %subscribe cypherwonks'.)
I fervently hope that the glorifications and manipulations of Internet
Anarchy by mouth-frothing libertarian extremists, Cryptoanarchists,
and sympathizers can be adequately controlled and minimized in the
future, and some harmonious systems and effective countermeasures
along the lines of the Rating server can be established by visionaries
and tinkerers, but in any case, for the sake of humanity's integrity,
sanity, and well-being, I pray that Future Cyberspace is far less
Anarchic than the Current Internet.
------------------------------
Date: 24 Nov 93 15:32:40 EST
From: Urnst Kouch - Crypt Newsletter <70743.1711@COMPUSERVE.COM>
Subject: File 2--PC Security books reprints material from AIS (Review)
"NETWORK SECURITY SECRETS" BENEFITS FROM PUBLIC ACCESS INFORMATION ON
THE DEPARTMENT OF TREASURY'S 'UNDERGROUND' SECURITY BULLETIN BOARD
SYSTEM
"Network Security Secrets," by David Stang, Ph.D., and Sylvia Moon,
(IDG Books, $49.95) is the first mainstream publication which benefits
directly from the accumulated data on Kim Clancy's Dept. of Treasury
bulletin board system (AIS), gagged earlier this year.
board supervised by the Department of Treasury contained unadulterated
hacker files which were given to callers interested in the material.
Other computer security workers and anti-virus developers mounted a
smear campaign which landed in the pages of The Washington Post,
causing the system to withdraw the information. The original argument
had been that it was information which would most benefit security
managers unable to find the material elsewhere. The publication of
"Network Security Secrets," proves the argument a valid one, although
it tries hard to deny it.
In keeping with the political correctness of the times (read
_hypocrisy_), the book fails to directly cite the material gathered
from the Dept. of Treasury system while reprinting portions of it
essentially verbatim.
Of course, this makes "Network Security Secrets" a very interesting
read.
One of Stang's central points in "Security Secrets" is that good
security stems from bringing necessary information to the workers
employed where the rubber meets the road. This practice, he writes,
is often opposed to management interested only in imposing a rigid
heirarchical structure on the workplace. The workers who will have to
deal with security problems such as intrusion from desk-top dial-ups,
password and access control plus the occasional virus aren't thought
to be trustworthy enough to be brought into the information loop.
"Network Security Secrets" says this is bad and it's correct.
Consequently, where does quality information come from; where is it
gathered?
In the chapter "Bulletin Boards and Security" under "Looking at the
Dark Side," Stang published a screen display taken from the Department
of Treasury, of which he says, "We doubt the agency was aware of this
part of its board," which presumes quite a bit, incorrectly, I might
add.
In any case, "This part of the board" lists the hacking files culled
from PHRACK and other underground journals and BBS's. The data
addresses viruses, telephonic and network security concerns. "Manly
Hacking" is one such entry. Written by "Shit-Kicking Jim," it was
only found on Clancy's system prior to publication in a later issue of
PHRACK.
"Network Security Secrets" also reprints an underground document
gained from AIS called "Hacking Novell Local Area Networks" and marks
it with one of those happy little icons computer books are seeded with
to satisfy readers whose reading comprehension is deemed not much
beyond "First Grade Coloring Book Exercises."
The icon is a treasure chest marked "Secret: This icon points to
information which gives some special insight into network security."
The book also republishes material on network hacking programs
NETCRACK and GETIT, a resident password and keystroke leech, all
gained from AIS.
So that answers the question: Yes, information written by the computer
underground is valuable, worthy of exposure in a $50 mainstream
computer volume.
By the same token, Stang writes, "This is a sensitive subject, and
some may argue the information may land into the wrong hands. We'll
argue that it's already in the wrong hands and the 'good guys' need to
know what they're up against." And that's the same argument Treasury
used to defend AIS, a system Stang labels from "the Dark Side." What a
poor sport!
Stang and Moon wrestle on and off with the idea of information access
throughout the book, coming down more in favor of those who weirdly
think that by publishing such information, you somehow endorse it.
They mention book publishers who specialize in so-called fringe
subjects as lock-picking and personal revenge. "No, we won't give you
their address!" they write.
In the same paragraph "Network Security" mentions "Make 'Em Pay," one
paperback devoted to practical jokes and payback techniques.
Published by Lyle Stuart, I found "Make 'Em Pay" in the humor section
of Crown Books, the largest generic bookstore chain in California. So
much for the stone reality of access control, a reality which
corporate management appears to work hard to ignore.
Despite these major idiosyncracies, "Network Security Secrets" is
still a better than average book on the subject. Stang works hard to
avoid jargon, failing only when he hands off to someone else in a
chapter on encryption: ". . . the DES was promulgated by NIST to
provide a system that protects the confidentiality and integrity of
the federal government's sensitive unclassified computer information.
FIPS PUB 46 is based on work at IBM and has been approved as the
American National Standard X3.92-1981/R1987." Sadly, it appears there
will never be a shortage of computer writers who specialize in
jargo-hackese.
"Network Security Secrets" also sports a slight, dry sense of humor.
On bulletin boards, Stang writes "Does the software include the use of
a SYSOP-editable trashcan file of caller names that are immediately
ejected ('hacker,' 'crap,' 'John Dvorak," and so on)?" I had to laugh
at that one.
At $50, even with two diskettes, "Network Security" isn't cheap. But
it does give you your money's worth as a reasonably detailed overview
of PC network security.
[Addendum: Stang, who represents Norman Data Defense Systems, was the
man the Secret Service called when its networks were contaminated with
the Satan Bug virus.]
------------------------------
Date: Wed, 1 Dec 1993 09:47:07 -0600 (CST)
From: Charles Stanford <cstanfor@BIGCAT.MISSOURI.EDU>
Subject: File 3--Apple Computers bitten by Conservatives
((MODERATORS' NOTE: The following was also reported on PBS' All
Things Considered)).
+--------- Forwarded message ----------
Date--Wed, 1 Dec 1993 08:06:04 -0600
From--"G. D. Mitchell" <mitchell@SEAS.SMU.EDU>
As a side note, Apple was originally considering building a plant in
Texas, just north of Austin (the state capital). However, the county
in which the plant was to be built decided not to extend the usual tax
break to Apple because of their policy of extending benefits to
non-married partners of Apple employees, both hetero- and homosexual.
I heard county officials stating that the communities involved were
less concerned about the possible jobs they would lose, and more
concerned with "family values". I think this is taking place in
Williamson County, fyi. There's so many damn counties in Texas that I
probably don't know more than a fourth of them :) so I may be wrong.
I was a little pissed about this when I heard the news yesterday.
Apple was going to bring 700 jobs to Texas, but these rednecks were
too afraid that having a few gay couples in the neighborhood might
make little Johnny queer. It's stupid socially and economically. And
to think, there are times when I can almost forget that Texas IS a
backwards state.
Anyone ready to start that Nation of Freaks I was raving about a year
ago? :)
------------------------------
Date: Fri, 3 Dec 1993 17:09:20 -0600
From: Jerry Whelan <guru@STASI.BRADLEY.EDU>
Subject: File 4--GAO Report on Computers and Privacy
((MODERATORS' NOTE: Thanks to Jerry Whelan for forwarding over teh GAO
report on "Communications Privacy." Here, we reprint the introduction.
The entire document can be retrieved from the CuD ftp sites or the ftp
sites listed below)).
To--rsaref-users@RSA.COM
Acknowledge-To-- KH3@NIHCU.BITNET
GAO recently issued a report "Communications Privacy: Federal Policy
and Actions", GAO/OSI-94-2, dated November 4, 1993, that may be of
interest to members of your group. The report focused on the
following issues:
--The need for information privacy in computer and communications
systems--through such means as encryption, or conversion of
clear text to an unreadable form--to mitigate the threat of
economic espionage to U.S. industry;
--federal agency authority to develop cryptographic standards for
the protection of sensitive, unclassified information and the
actions and policies of the National Security Agency (NSA),
Department of Defense, and of the National Institute of
Standards and Technology (NI ST), Department of Commerce,
regarding the selection of federal cryptographic standards;
--roles, actions, and policies of NSA and the Department of State
related to export controls for products with encryption
capabilities and industry rationale for requesting
liberalization of such controls; and
--the Federal Bureau of Investigation's (FBI) legislative proposal
regarding telephone systems that use digital communications
technology.
I have placed an electronic version of the report named OSI-94-2.TXT
in the GAO-REPORTS anonymous FTP directory at NIH (ftp.cu.nih.gov).
Joe Sokalski, GAO--Los Angeles
kh3@cu.nih.gov
------------------------------
Date: Wed, 1 Dec 1993 14:54:51 EST
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
Subject: File 5--New Docs Reveal NSA Role in
New Docs Reveal NSA Involvement in Digital Telephony Proposal
From the CPSR Alert 2.06 (Dec. 1, 1993)
A series of memoranda received by CPSR from the Department of Commerce
last week indicate that the National Security Agency was actively
involved in the 1992 FBI Digital Telephony Proposal. Two weeks ago,
documents received by CPSR indicated that the FBI proposal, code named
"Operation Root Canal," was pushed forward even after reports from the
field found no cases where electronic surveillance was hampered by new
technologies. The documents also revealed that the Digital Signature
Standard was viewed by the FBI as "[t]he first step in our plan to
deal with the encryption issue."
The earliest memo is dated July 5, 1991, just a few weeks after the
Senate withdrew a Sense of Congress provision from S-266, the Omnibus
Crime Bill of 1991, that encouraged service and equipment providers to
ensure that their equipment would "permit the government to obtain the
plain text contents of voice, data and other communications...." The
documents consist of a series of fax transmittal sheets and memos from
the Office of Legal Counsel in the Department of Commerce to the
National Security Agency. Many attachments and drafts, including more
detailed descriptions of the NSA's proposals, were withheld or
released with substantial deletions.
Also included in the documents is a previously released public
statement by the National Telecommunications and Information
Administration entitled "Technological Competitiveness and Policy
Concerns." The document was requested by Rep. Jack Brooks and states
that the proposal could obstruct or distort telecommunications
technology development by limiting fiber optic transmission, ISDN,
digital cellular services and other technologies until they are
modified, ... could impair the security of business communications ...
that could facilitate not only lawful government interception, but
unlawful interception by others, [and] could impose industries ability
to offer new services and technologies.
CPSR is planning to appeal the Commerce Department's decision to
withhold many of the documents.
To subscribe to the Alert, send the message:
"subscribe cpsr <your name>" (without quotes or brackets) to
listserv@gwuvm.gwu.edu. Back issues of the Alert are available at the
CPSR Internet Library FTP/WAIS/Gopher cpsr.org /cpsr/alert
Computer Professionals for Social Responsibility is a national,
non-partisan, public-interest organization dedicated to understanding
and directing the impact of computers on society. Founded in 1981,
CPSR has 2000 members from all over the world and 22 chapters across
the country. Our National Advisory Board includes a Nobel laureate and
three winners of the Turing Award, the highest honor in computer
science. Membership is open to everyone.
For more information, please contact: cpsr@cpsr.org or visit the CPSR
discussion conferences on The Well (well.sf.ca.us) or Mindvox
(phantom.com).
------------------------------
Date: Sat, 4 Dec 1993 18:32:54 CST
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
Subject: File 6--REMINDER: CFP '94 SCHOLARSHIP DEADLINE APPROACHING
((MODERATORS' NOTE: The DEADLINE for applications for scholarships to
the Computer Freedom and Privacy '94 Conference at the Palmer House in
Chicago is 31 December. DO NOT WAIT UNTIL THE LAST MINUTE. We are
reprinting the earlier announcement for those who may have missed it
last month.
For applicants who do not ultimately receive scholarships, the
conference organizers are attempting to find inexpensive lodging
within walking distance to the Palmer House, which is located in the
center of The Loop)).
The Conference on Computers, Freedom & Privacy (CFP'94) is
pleased to announce that it will once again provide a number of
full tuition scholarships for attendance at the conference. The
conference will be held in Chicago, IL from March 23rd through
March 26th, 1994 and will be hosted by the John Marshall Law
School under the chairmanship of George Trubow.
The conference traditionally attracts an extremely diverse group
of persons concerned with issues relating to the rapid
development of the "information society"; civil libertarians,
information providers, law enforcement personnel, privacy
advocates, "hackers", sociologists, educators and students,
computer professionals, cryptography advocates, government policy
makers and other interested parties have all played major roles
in the three previous conference.
Speakers at previous conferences have included Electronic
Frontier Foundation (EFF) co-founders John Perry Barlow and Mitch
Kapor, FBI Deputy Director William A. "Al" Bayse, writer Bruce
Sterling, privacy advocate Simon Davies, Harvard University law
professor Lawrence Tribe, hacker "Phiber Optik", Georgetown
University's Dorothy Denning, "Cuckoo's Egg" author Clifford
Stoll, Prodigy counsel George Perry, USA Today founder Al
Neuwith, former FCC Chairman Nicholas Johnson, Computer
Professionals for Social Responsibility (CPSR)'s Marc Rotenberg,
Arizona prosecutor Gail Thackeray, and Bay Area Women in
Computing's Judi Clark.
The scholarships are intended to provide access to the conference
to those that would like to attend the conference but are unable
to afford the tuition. They are available to undergraduate and
graduate students in any discipline (previous student attendees
have come from computer science, law, sociology, liberal arts,
journalism, and womens' studies backgrounds), law enforcement
personnel, hackers, social scientists, and others interested in
the future of the information society.
Persons interested in a scholarship should send the following
information (e-mail greatly preferred) to:
John F. McMullen
CFP'94 Scholarship Chair
Perry Street
Jefferson Valley, NY 10535
mcmullen@panix.com
(914) 245-2734 (voice)
(914) 245-8464 (fax)
1. Personal Information -- Name, Addresses (including e-mail),
Phone Numbers, School and/or Business Affiliation
2. Short Statement explaining what the applicant helps to get
from CFP'94 and what impact that attendance may have in the
applicant's community or future work.
3. Stipulation that the applicant understands that he/she is
responsible for transportation and lodging expenses related to
the conference. The scholarship includes tuition and those meals
included with the conference.
4. Stipulation that the applicant would not be able to attend the
conference if a scholarship is not granted.
5. Stipulation that the applicant, if granted a scholarship, will
attend the conference.
6. Stipulation that the applicant, if granted a scholarship, will
provide a written critique of the conference to the scholarship
committee by April 30, 1994.
Applications will be accepted until December 31, 1993 and
scholarship winners will be notified by approximately February 1,
1994.
Please contact John McMullen at the above e-mail address or phone
numbers with any questions.
John F. McMullen mcmullen@mindvox.phantom.com Consultant,
knxd@maristb.bitnet mcmullen@well.sf.ca.us Writer,
------------------------------
Date: Thu, 2 Dec 1993 17:49:50 EDT
From: Paul Hyland <PHYLAND@GWUVM.BITNET>
Subject: File 7--DIAC-94 Call for Participation
Please post and distribute to interested colleagues.
Call for Workshop Proposals
Developing an Effective and Equitable Information Infrastructure
Directions and Implications of Advanced Computing (DIAC-94) Symposium
Cambridge, MA, USA
April 23 - 24, 1994
The National Information Infrastructure (NII) is being proposed as the
next-generation "information superhighway" for the 90's and beyond.
Academia, libraries, government agencies, as well as media and
telecommunication companies are involved in the current development.
Computer Professionals for Social Responsibility (CPSR) and other
organizations believe that critical issues regarding the use of the
NII deserve increased public visibility and participation and is using
the DIAC Symposium to help address this concern.
The DIAC-94 symposium is a two-day symposium and will consist of
presentations on the first day and workshops on the second day. The
DIAC Symposia are held biannually and DIAC-94 will be CPSR's fifth
such conference. We encourage your participation both through
attending and through conducting a workshop. We are currently
soliciting workshop proposals. We suggest proposals on the following
themes but any topic relating to the symposium theme is welcome.
Systems and Services Policy
+ Community networks + Funding
+ Information services + Role of government
+ Delivery of social services + Economic modelling of networks
+ Privacy (including medical) + Commercialization of the NII
+ Educational support + Universal access
+ Meeting diverse needs + Freedom of expression and
community standards
Electronic Democracy Directions and Implications
+ Access to information + Ubiquitous computing
+ Electronic town meetings + Global hypertext and multimedia
+ Threats to democracy + Computing in the workplace
+ Economic and class disparities + Computing and the environment
International Issues Traditional and Virtual Communities
+ Language differences + MUDs
+ Cultural diversity + Communication ethics, values, and styles
+ National and international + Gender relations in cyberspace
priorities
+ Cooperative projects + Networking for indigenous peoples
Workshops will be an hour and half in length. The proposal should
include title, presenter, purpose of workshop, references, and plan.
Workshops should substantially involve the audience and proposals in
which some group product or action plan is created are preferred. As
the proposals may be collected into a book, workshop proposals should
be clear and informative to people who don't participate in the
workshop. Proposals are due February 15, 1994 and acceptance and
rejection notices will be sent by March 15, 1994. To discuss
workshops or to submit proposals for workshops contact the program
chair, Doug Schuler, doug.schuler@cpsr.org. Electronic submissions
are encouraged but paper versions are also acceptable (send them to
CPSR/Seattle - - - - DIAC '94 Workshop Submission, P.O. Box 85481,
Seattle, WA 98145-1481).
Sponsored by Computer Professionals for Social Responsbility
Potential co-sponsors are being sought. Please contact us if your
organization would like to help with this event. For more information
on co-sponsorship or on general issues, contact conference chair,
Coralee Whitcomb, cwhitcomb@bentley.edu.
------------------------------
End of Computer Underground Digest #5.91
************************************