Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 06 Issue 90
Computer underground Digest Sun Oct 16, 1994 Volume 6 : Issue 90
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Urban Legend Editor: E. Greg Shrdlugold
CONTENTS, #6.90 (Sun, Oct 16, 1994)
File 1--"Operation Sundevil" is finally over for Dr. Ripco
File 2--Turing Test Conference
File 3--Internet Security: Secure Comm over Untrusted Networks
File 4--CPSR Award to Antonia Stone
File 5--"Tastes like Chicken" ("chicken" domain explanation/Canada)
File 6--More Gems from Spam-meister Siegel (NYT Excerpts)
File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
----------------------------------------------------------------------
Date: Sat, 8 Oct 1994 00:57:06 -0500 (CDT)
From: bje@RIPCO.COM(Bruce Esquibel)
Subject: File 1--"Operation Sundevil" is finally over for Dr. Ripco
((MODERATORS' NOTE: I first learned of Operation Sundevil, part of
the US Secret Service's "hacker crackdown" of 1990 described by Bruce
Sterling in the book of the same name, the day after it happened.
I called RIPCO BBS in Chicago and received a voice message instead of
the familiar computer tone. Dr. Ripco and Ripco BBS had been busted,
and he bade farewell to us all:
This is 528-5020.
As you are probably aware, on May 8, the Secret Service
conducted a series of raids across the country. Early news
reports indicate these raids involved people and computers
that could be connected with credit card and long distance
toll fraud. Although no arrests or charges were made, Ripco
BBS was confiscated on that morning. It's involvement at
this time is unknown. Since it is unlikely that the system
will ever return, I'd just like to say goodbye, and thanks
for your support for the last six and a half years. It's
been interesting, to say the least.
Talk to ya later. %Dr. Ricpo%
The raiders carted off Dr. Ripco's BBS-related computer hardware,
books, posters, and other possessions. No computer-related charges
were filed against Dr Ripco then or since. Nor was he given any
indication that he was under suspicion for any offense. For over four
years, he remained in legal limbo, while over $15,000 worth of
computer equipment depreciated in government possession.
Because of its lively and diverse message boards, the large
cross-section of users, and the exceptional competence of Dr. Ripco as
a sysop, the BBS became one of the most popular "underground" boards
in the country in the 1980s. Despite its reputation as a "hacker
haven," Ripco was an open system with at that time one of the best
collection of text files in the nation. As we reported in CuD 3.02 in
1991, it also attracted an informant known as "The Dictator," also
identified as "Dale Drew." According to court documents, "The
Dictator's" reports were the primary "evidence" to justify the Ripco
raid.
When announcing the news of Operation Sundevil, Secret Service
spokespersons lauded its scope--150 USSS agents in addition to local
law enforcement support, 13 cities, 28 search warrants, 23,000 seized
computer disks--they had no reason to suspect that their
then-perceived "success" would quickly turn into a major embarrassment
of comic proportions (see CuD 1.09 for Sundevil news). A few
eventual arrests--some of which were not Sundevil dependant--were
the only demonstrable outcome. Even these were tarnished by USSS and
others' hyperbole and similar excesses: The ludicrous claim that this
"group" was responsible for what one newspaper reported as "up to $50
million" in fraud costs, the questionable use of an informant, the
seemingly indiscriminate manner in which equipment was seized, the
lack of subsequent information to convince a skeptical community that
the raids' excesses were warranted--soon had Sundevil operatives on
the defensive. Some of those responsible for Sundevil, such as USDA
Bill Cook and USSS special agent Tim Foley, were successfully sued in
civil court for their excesses in raiding Steve Jackson Games a few
months earlier. One high-profile state prosecutor closely associated
with Sundevil often cautioned critics to "wait until all the facts
come out," presumably because the operation and those who planned it
would be vindicated.
After over four years, vindicating facts have not yet emerged. Quite
the opposite: Sundevil was costly, had few significant results,
produced few directly-related indictments or convictions, proved a
major public relations disaster, and messed up some innocent lives.
Sundevil did, however, have some significant unintended
consequences. It galvanized the cybercommunity, increased the
visibility of The Electronic Frontier Foundation (EFF) and Computer
Professionals for Social Responsibility (CPSR), and led to the
involvement of many individuals and groups in monitoring and shaping
legislation affecting the "information infrastructure."
Ripco BBS returned to operation a few months after the raid more
popular than ever, and has since evolved into a sophisticated system
linked to the Internet. The original telephone number is the same,
although it now has multiple lines to accommodate all the users.
And, for Dr. Ripco, Operation Sundevil has finally come to a close.
His equipment was finally returned, although the original files
were erased. Ripco can be reached at (312) 528-5020.))
== Dr. Ripco's report on events this week ==
Hiya Jim,
Besides offering greetings I just wanted to let you know that
Operation Sundevil is officially closed, I guess.
Ripco (the original) came home to roost, the SS finally released the
seized hardware and I picked it up today. From what I gathered I was
the last one to get out of their hair.
I know SJ had some problems but surprisingly, everything seems to be
in fairly good shape. My guess is it all probably just sat in storage.
Although it physically is back, the system isn't. One condition was to
have all the data erased prior to return because of the copyrighted
pirate warez lurking about. The guy from the justice department said
it wouldn't look right to just return it, would put the feds in the
light that it was ok to have it with their blessing.
I suppose I could of cut some deal leaving the non-warez intact but
after seeing it take 4 1/2 years just to make up their mind to return
it, I didn't feel like waiting another 4 for someone to sort
everything out. A few pieces of the hardware still have some value
today, the old bbs would only have historical value.
It would also appear (Secret Service agents) Foley & Golden are/were
the butt of some inside joke.
Every time their names were mentioned, someone either rolled their eyes or
engaged in jest. The new guy in charge (Greg Meyer) seemed pretty cool
overall. I know, never trust a fed, but it was interesting he had the same
attitude like the guy in D.C. (Josuha Silverman), a hint of
embarrassment and total lack of logic behind the whole thing. It
appears the computer fraud division, at least here in the Chicago
office is more aiming at counterfeiting.
Anyway, I wanted to say thanks for everything. I don't know what would
have happened if we didn't communicate early on, but it's unlikely
things would have ended in a whimper like it did. I'm totally
convinced the efforts of CuD, the EFF and CPSR made a major impact on
all of this; it put the feds in a defensive position instead of
offensive. Things could always have come out better but you have to be
grateful for what you have.
Thanks much Jim, all your efforts and assistance is deeply
appreciated.
Bruce Esquibel (Dr. Ripco)
bje@ripco.com
------------------------------
Date: Thu, 8 Sep 1994 00:10:27 -0700 (PDT)
From: Robert Epstein <repstein@NUNIC.NU.EDU>
Subject: File 2--Turing Test Conference
**********************************************************************
NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEWS
For Immediate Release September 1, 1994
**********************************************************************
INTERNATIONAL QUEST FOR THINKING COMPUTER
TO BE HELD IN SAN DIEGO
(Human vs. Computers on December 16th)
In the very near future, many believe that human beings will be
joined by an equally intelligent species -- computers so smart that they
can truly think, converse, and perhaps even feel.
To expedite the search for this new species, the fourth annual
Loebner Prize Competition in Artificial Intelligence will be held at
the new San Marcos campus of California State University on Friday,
December 16th, 1994. The Loebner Prize pits humans against
computers in what the Wall Street Journal described as "a groundbreaking
battle." The first three competitions drew national and international
media coverage.
In the event, human judges converse at computer terminals and
attempt to determine which terminals are controlled by fellow humans and
which by computers. For the 1994 competition, conversation will be
restricted to certain topics. This year, as in 1993, all judges will be
members of the national press. The 1993 judges represented TIME
Magazine, Popular Science, PBS, the Voice of America, and elsewhere. The
contest has drawn media attention around the world, including coverage on
CNN television, PBS television, the New York Times (front page), the
Washington Post, the London Guardian, The Economist, the San Diego Union
Tribune (front page), Science News, and many periodicals in the computer
field, including Computerworld and AI Magazine (cover story).
"Surprisingly, in early competitions, some of the computers fooled
some of the judges into thinking they were people," said Dr. Robert
Epstein, Research Professor at National University, Director Emeritus of
the Cambridge Center for Behavioral Studies, and the organizer and
director of the three previous contests.
The author of the winning software of this year's event will receive
$2,000 and a bronze medal. In 1995, Epstein said, the first open-ended
contest -- one with no topic restrictions -- will be conducted. When a
computer can pass an unrestricted test, the grand prize of $100,000 will
be awarded, and the contest will be discontinued.
The competition is named after benefactor Dr. Hugh G. Loebner of New
York City and was inspired by computer pioneer Alan Turing, who in 1950
proposed a test like the Loebner contest as a way to answer the question:
Can computers think?
Transcripts of conversations during the first three competitions are
available from the Cambridge Center for Behavioral Studies (telephone
617-491-9020). Diskettes that will play back the conversations in real
time may also be purchased.
A partial list of sponsors of previous competitions includes: Apple
Computers, Computerland, Crown Industries, GDE Systems, IBM Personal
Computer Company's Center for Natural Computing, Greenwich Capital
Markets, Motorola, the National Science Foundation, The Alfred P. Sloan
Foundation, and The Weingart Foundation.
Application guidelines: Official rules and an application may be
obtained by contacting Dr. Robert Epstein, Contest Director, 933
Woodlake Drive, Cardiff by the Sea, CA 92007-1009 Tel: 619-436-4400
Fax: 619-436-4490 Internet: repstein@nunic.nu.edu * The deadline for
receipt of applications is November 1, 1994. * Applications must be
accompanied by printed protocols recording actual interaction between the
system to be entered and one or more humans. The protocols may not
exceed ten double-spaced pages. * Applications must specify a single
domain of discourse in which the computer system is proficient. The
domain must be expressed by an English phrase containing no more than
five words. * Each entry must communicate using approximations of
natural English, and it must be prepared to communicate for an indefinite
period of time. * Computer entries may contain standard or customized
hardware and software. The hardware may be of any type as long as it is
inorganic and as long as its replies are not controlled by humans
responding in real time to the judges' inputs. * Entrants must be
prepared to interface their systems to standard computer terminals over
telephone lines at 2400 baud. * The prize will be awarded if there is
at least one entry.
Advance notice of new guidelines for 1995: The 1995 event will be
an unrestricted Turing Test, requiring computer entries to be able to
converse for an indefinite period of time with no topic restrictions. In
1995, entries may be required to run on hardware located at the
competition site.
For further information: Complete transcripts and IBM-compatible
diskettes that play the 1991, 1992, and 1993 conversations in real-time
are available for purchase from the Cambridge Center for Behavioral
Studies (tel: 617-491-9020). Sponsorship opportunities are available.
************************
CONTACTS:
Dr. Robert Epstein
Contest Director
619-436-4400 (fax 4490)
repstein@nunic.nu.edu
Dr. Hugh G. Loebner
Prize Donor
201-672-2277 (fax 7536)
loebner@acm.org
------------------------------
From: voidstar@NETCOM.COM(Scott Corcoran)
Subject: File 3--Internet Security: Secure Comm over Untrusted Networks
Date: Thu, 22 Sep 1994 08:35:44 GMT
INTERNET SECURITY
SECURE COMMUNICATIONS OVER UNTRUSTED NETWORKS
A one-day seminar on November 12, 1994
Embarcadero Hyatt Regency Hotel in San Francisco.
Methods of achieving authentication, authorization,
confidentiality, integrity, and nonrepudiation are key to the
successful realization of the National Information
Infrastructure (NII). Today's Internet is a proving ground for
what will become the NII.
The San Francisco Chapter of the IEEE Computer Society has put
together an outstanding program on encryption, intrusion
detection, firewalls, architectures, and protocols for Internet
Security. Speakers in this seminar will describe several of
the main techniques that exist today and the directions in
which they are evolving. The seminar will be helpful to
engineers, engineering managers and product planners seeking
current knowledge of Internet Security.
PROGRAM
8:30 a.m. Registration opens
9:00 a.m. Introduction
9:05 a.m. Keynote Address James Bidzos, President of RSA
9:45 a.m. Steven Bellovin, Ph.D., Bell Labs
"Firewalls for Computer Security"
11:00 a.m. Teresa Lunt, SRI
"Intrusion Detection"
11:45 a.m. Round Table Lunch (incl. with registration)
1:00 p.m. Professor Martin E. Hellman, Ph.D., Stanford
"Cryptography: The Foundation of Secure Networks"
2:00 p.m. Dan Nessett, Ph.D.,
SunSoft and PSRG
"Future Internet Security Architecture"
3:00 p.m. Matt Blaze, Ph.D., Bell Labs
"Protocols: Security Without Firewalls"
4:00 p.m. "Public Safety vs. Private Liberty"
A Panel Discussion on the Social
Implications of Internet Security
Rex Buddenberg NPS
Alan McDonald FBI
Stewart Baker formerly of the NSA
James Bidzos President of RSA
Matt Blaze Bell Labs
Martin Hellman Stanford
A one day seminar in San Francisco, on Saturday, November 12th,
covering private and public-key encryption, key-escrow,
fire-walls, architecture and protocols for security,
intrustion detection, and a spirited panel discussion on
"Public Safety vs. Private Liberty" !
SEATING IS LIMITED. PRE-REGISTER BY OCTOBER 15TH.
9:05 Keynote Address
James Bidzos, President of RSA
James Bidzos, President of RSA Data Security, will present the
keynote address. Mr. Bidzos heads a company whose encryption
technologies are licensed for products ranging from computer
operating systems, to software copy protection, to electronic
mail, to secure telephones. RSA has licensed several million
copies of its encryption software, and has become a focal point
for debate on appropriate application of cryptography.
Mr. Bidzos has gained a unique perspective on the requirements
of effective cryptographic systems. He will highlight the
problem of providing strong encryption for users of computer
networks while meeting the legitimate needs of law enforcement
9:45 Steven Bellovin, Ph.D., Bell Labs
"Firewalls for Computer Security"
When you connect your computer to the Internet, you also create
a channel into your computer. Clever vandals, thieves and
industrial spies have found ways to abuse most of the Internet
protocols from FTP and Telnet to the World Wide Web and
Network Time Protocols. Short of pulling the plug, firewalls
provide the surest defense. The firewall administrator must
keep abreast of new methods of attack and understand how
firewalls can mitigate the threat. Steven M. Bellovin, Ph.D.,
is a senior researcher at AT&T's Bell Laboratories and
co-author of the well known guide "Firewalls and Internet
Security: Repelling the Wily Hacker." As one responsible for
protecting "the phone company" from Internet hackers, Dr. Bellovin
can describe from firsthand experience how firewalls can be
constructed to screen them out. Dr. Bellovin will join us in a
live video teleconference from Bell Laboratories.
11:00 Teresa Lunt, SRI "Intrusion Detection"
Inevitably, someone will try to breach your firewall and might
succeed. The time it takes you to discover the intrusion and
catch the culprit depends on the event logging you have
established. However, logging the many different transactions
that might expose trespassing produces mountains of data.
Automatic digestion of the logs is the only hope of monitoring
them all. Teresa F. Lunt, Director of Secure Systems Research
at SRI's Computer Systems Laboratory, directs work in
multilevel database systems and intrusion detection. Ms. Lunt
will describe intrusion detection and demonstrate automated
tools developed at SRI to analyze audit data for suspicious
behavior.
1:00 Professor Martin E. Hellman, Ph.D., Stanford
"Cryptography: The Foundation of Secure Networks"
Data in transit across unsecured networks like the Internet
are subject to wiretapping attacks and impersonation.
Moreover, privacy of communication and authentication of the
sender's message are essential to Internet commerce, with
exchange of contracts, receipts, credit card drafts and the
like increasingly commonplace. Encryption can solve some of
these problems, but what kind of encryption? Authentication
only or encrypted messages? Secret key or public key, or
both? Will you need a giant key ring for mes sage keys,
session keys, file keys, and passwords? Martin E. Hellman,
Ph.D., Professor of Electrical Engineering at Stanford
University, is co-inventor of public key cryptography with
Whitfield Diffie and Ralph Merkle. He was elected a Fellow of
the IEEE for contributions to cryptography. Dr. Hellman will
explore threats to communication and costs of electronic
countermeasures. He will explain the importance and means of
authenticating electronic messages, and he will survey public key
cryptography. Dr. Hellman will describe public key techniques
including Rivest-Shamir-Adleman (RSA), Diffie-Hellman, ElGamal
and Digital Signature Standard (DSS). He will also describe
the current status of export control and encryption standards
such as the Data Encryption Standard (DES), Escrowed
Encryption Standard (EES) and its encryption algorithm,
Skipjack, which is implemented in Clipper and Capstone chips.
2:00 Dan Nessett, Ph.D., SunSoft and PSRG
"Future Internet Security Architecture"
Dan Nessett, Ph.D., of the SunSoft Division of Sun
Microsystems, and until recently with Lawrence Livermore
National Laboratory, has worked extensively in local area
networks, distributed operating systems and distributed systems
security. He is a member of the Privacy and Security Research
Group (PSRG), which is convened under the auspices of the
Internet Society. Dr. Nessett will explain the emerging
Internet security architecture work undertaken by the PSRG.
The architecture will guide the development of security
mechanisms used in Internet standards.
3:00 Matt Blaze, Ph.D., Bell Labs
"Protocols: Security Without Firewalls"
We use firewalls because Internet protocols are not inherently
secure. Can we rehabilitate the Internet protocols to produce
protocols which are secure, not computationally prohibitive,
and compatible with existing protocols? Matt Blaze, Ph.D., of
Bell Laboratories will talk about the problems of integrating
cryptographic protection into large-scale network infrastructure.
Dr. Blaze is the author of "A Cryptographic
File System for Unix," presented at the 1993 ACM Conference on
Communications and Computer Security, and co-author with John
Ioann idis of "The Architecture and Implementation of
Network-Layer Security Under UNIX," which describes "swIPe," a
network-layer security protocol for the IP protocol suite.
Dr. Blaze will address issues concerning network security
protoc ols, key management and distribution, and threats and
models for cryptographic engineering.
4:00 A Panel Discussion on the Social Implications of
Internet Security "Public Safety vs. Private Liberty"
At one end of an imagined security spectrum lies the
information police-state. Through traffic analysis,
mandatory personal ID numbers and escrowed encryption, and
the ability to record all messages and commerce carried out
on the Information Superhighway, governments could maintain
dossiers on every aspect of the personal life and business
of its citizens. Privacy advocates fear that a corrupt government
could use such information against its political enemies and to
subvert personal freedoms. At the other extreme lies information
anarchy. Through the use of digital cash, anonymous remailers,
and strong non-escrowed encryption, the Information
Superhighway could become a hide-out for criminals and
national security threats. The potential for black-market
activity and the associated tax-evasion is so enormous that
some have speculated that governments could eventually
collapse. Law-enforcem ent advocates fear that they will be
unable to keep up with criminals and terrorists who ply their
trade electronically. Our distinguished panel will provide
insight into the interplay between the rights of individuals
to privacy and freedom, the rights of companies to conduct
unrestrained trade, and the ability of law enforcement and
security agencies to perform their functions efficiently.
This conclusion to the seminar will put into perspective
the social changes that might be wrought by the technical
advances discussed earlier in the day.
Panelists include:
Rex Buddenberg NPS
Alan McDonald FBI
Stewart Baker formerly of the NSA
James Bidzos President of RSA
Matt Blaze Bell Labs
Martin Hellman Stanford
Rex Buddenberg, Instructor of information systems architecture
and applied networking at the Naval Postgraduate School, will
moderate the panel. Mr. Buddenberg is a maritime command,
communication, control and intelligence (C3I) consultant and a
computer networking author. As a C3I architect for the U.S.
Coast Guard, he developed plans and specifications for
extending Internet connectivity to oceanographic ships. Mr.
Buddenberg contemplates the means and effects of net warfare as
both the good guys and bad guys share the same network.
Alan McDonald, Special Counsel for Electronic Surveillance Matters,
Information Resources Division, Federal Bureau of Investigation,
is a specialist in the law and policy concerning electronic
surveillance, Digital Telephony, and encryption issues.
He frequently represents the FBI's view of law enforcement equities
in light of advanced telecommunications and encryption.
Stewart Baker is a former General Counsel to the NSA and
a partner in Steptoe & Johnson, a Washington, DC law firm.
His expertise is in telecommunications, computer export policy,
security of national information infrastructure and encryption.
Mr. Baker brings direct experience with the problem that strong
encryption creates for the NSA in protecting our national
security.
QUESTIONS? CALL (415)-327-6622.
Cut-off and complete this form, enclose your check payable to
the IEEE SFCS, and mail to: IEEE Council Office 701 Welch
Rd. #2205 Palo Alto, CA. 94304
To qualify for the reduced Pre-registration fees, your
application with check must be postmarked no later than Oct.
15, 1994. Registration fee includes lunch, refreshments, and
parking. Seating is limited. To make sure the seminar is
not sold out, call (415) 327-6622.
please check the appropriate box
Fees on or before Oct. 15th:
___ IEEE Member $ 110
___ Non-member $ 120
___ Student $ 85
Fees after Oct. 15th:
___ IEEE Member $ 125
___ Non-member $ 145
___ Student $ 100 (students must present ID)
The seminar location is the Hyatt Regency Embarcadero Hotel,
near the Ferry Building, in San Francisco.
Your registration fee includes the all day seminar, lunch,
and convenient parking in the garages underneath adjacent
Embarcadero Centers 1, 2, or 3. (Keep your ticket for validation).
Please print clearly:
Name : __________________________________________
Title : __________________________________________
Company: __________________________________________
Address: __________________________________________
__________________________________________
_______________________________ ___ ______
Day phone #:(___)_____-_______
IEEE member (or affiliate) #:_______ ____ (for discount)
College/University (if student):___________________
___ Vegetarian lunch option
Refunds will be honored through October 22nd, substitutions
any time. Additional information can be obtained by telephoning
the IEEE Bay Area Council Office: (415)327-6622.
IEEE SFCS RESERVES THE RIGHT TO MAKE CHANGES TO THE SEMINAR
Sponsored by the San Francisco Chapter of the IEEE Computer
Society. The IEEE is a non-profit organization.
------------------------------
Date: Fri, 7 Oct 94 16:27:22 PDT
From: email list server <listserv@SUNNYSIDE.COM>
Subject: File 4--CPSR Award to Antonia Stone
Playing To Win Founder Antonia Stone
Wins Prize for Social Responsibility
Palo Alto, Calif., October 6, 1994 - Computer Professionals for Social
Responsibility (CPSR), the national public interest organization based here,
announced today that Playing to Win founder Antonia Stone is the 1994
winner of the Norbert Wiener Award for Social and Professional
Responsibility. The award is presented annually to a distinguished
computer professional who has, through personal example, demonstrated a
deep commitment to the socially responsible use of computing technology.
"The greatest danger on the horizon for the National Information
Infrastructure is that we will be left with two societies: a privileged classs
that enjoys the benefits of the information age, and another that is left
behind with none of those advantages," said Stanford professor and CPSR
board president Eric Roberts. "Through her work with Playing To Win,
Antonia Stone has been fighting for years to achieve the equality of access
necessary to empower all of us together."
"I'm thrilled," said Stone. "I believe that CPSR, in recognizing the work
I've been doing by honoring me with the Norbert Wiener award,
emphasizes the importance of a grass-roots effort towards real equity of
technology access, and the need to offer opportunities for learning about
and hands-on use of technology to those who otherwise wouldn't have such
an opportunity."
Stone will be presented with the Wiener award at CPSR's annual meeting
banquet in San Diego, California, on Saturday, October 8th. This year's
annual meeting is a two-day conference entitled "Organizing for Access: A
National Forum on Computer Networking, Community Action and
Democracy", that will bring together local, regional and national activists
and decision makers to take a critical look at some of the social implications
of the NII.
Stone has worked in the area of computer learning since the 1970s. After
an intense period of fundraising and outreach, she opened a computer
center in a basement room of a Harlem housing project. Starting from that
base, with Stone serving as Executive Director from 1980 through 1992, the
Playing to Win network has grown to over 45 affiliates located across the
US as well as in Poland and Northern Ireland.
The PTW network of non-profit groups is dedicated to promoting and
providing equitable technology access and education for economically,
socially, and geographically disadvantaged people. PTW seeks to establish a
national community of neighborhood technology access providers
dedicated to true universal technological enfranchisement. Each PTW
community computer center shares a belief that everyone can learn as
long as they are allowed to follow their own motivational path and develop
according to their own interests.
The Wiener Award was established in 1987 in memory of Norbert Wiener,
the originator of the field of cybernetics and a pioneer in looking at the
social and political consequences of computing. Author of the book, The
Human Use of Human Beings, Wiener began pointing out the dangers of
nuclear war and the role of scientists in developing more powerful
weapons shortly after Hiroshima.
Past recipients of the Wiener Award have been: Dave Parnas, 1987, in
recognition of his courageous actions opposing the Strategic Defense
Initiative; Joe Weizenbaum, 1988, for his pioneering work emphasizing the
social context of computer science; Daniel McCracken, 1989, for his work
organizing computer scientists against the Anti Ballistic Missiles
deployment during the 1960s; Kristen Nygaard of Norway, 1990, for his
work in participatory design; Severo Ornstein and Laura Gould, 1991, in
recognition of their tireless energy guiding CPSR through its early years;
Barbara Simons, 1992, for her work on human rights, military funding, and
the U.C. Berkeley reentry program for women and minorities; and the
Institute for Global Communications, 1993, for their work to use network
technology to empower previously disenfranchised individuals and groups
working for progressive change.
Founded in 1981, CPSR is a national, non-profit, public interest
organization of computer scientists and other professionals concerned with
the impact of computer technology on society. The mission of CPSR is to
provide the public and policymakers with realistic assessments of the
power, promise, and problems of information technology. As concerned
citizens, CPSR members work to direct public attention to critical choices
concerning the applications of information technology and how those
choices affect society.
For more information about CPSR, the annual meeting, or the awards
banquet, call 415-322-3778 or send email to cpsr@cpsr.org.
------------------------------
Date: Fri, 2 Sep 1994 11:15:17 -0400 (EDT)
From: eye WEEKLY <eye@IO.ORG>
Subject: File 5--"Tastes like Chicken" ("chicken" domain explanation/Canada)
A little item that we've received a fair number of queries about.
kkc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY August 18 1994
Toronto's arts newspaper .....free every Thursday
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYENET EYENET
TASTES JUST LIKE CHICKEN!!!
by
K.K.Campbell
On July 21, we found this email awaiting us:
address I'm using to send you this message [i.e., eye@io.org] on one
of your postings in rec.arts.books . In a recent book, E-mail
Addresses Of The Rich And Famous, by Seth Godin (Addison-Wesley,
1994) eye is listed as eye@chicken.planet.org (page 75). Strangely,
almost every Canadian address in the book ends with
@chicken.planet.org, including Jean Chretien's, and those of many
other govt officials and departments. I have a strong suspicion that
this is a hoax. Do you know who might have perpetrated it?"
Indeed, in the same month, New York Times Magazine was compelled
to ask: "Why do the email addresses of so many Canadian government
officials end in @chicken.planet.org ?"
Here's the story: chicken.planet.org was a "fax gateway," known as
Digital Chicken. Run by Toronto's Rob Riley (riley@gold.interlog.com),
it died last May. Riley distributed a list of maybe 100
people/organizations reachable through Digital Chicken. By writing
email to, say, ontatg@chicken.planet.org , a fax would be sent to
Ontario Attorney-General Marion Boyd.
The list of chicken.planet.org addresses "is all over the place, I still
get mail about it," says Riley in a phone interview. "I've put out
posts saying the service is no longer operating, but it's apparently
not getting spread as rapidly as the original list."
Godin thought it was a list of email addresses and included them in
the book without verifying the list by contacting Riley or Digital
Chicken.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace Author holds standard copyright
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
Mailing list available http://www.io.org/eye
eye@io.org "Break the Gutenberg Lock..." 416-971-8421
------------------------------
Date: Sun, 16 Oct 1994 17:21:01 PDT
From: Anonymous <cudigest@mindvox.phantom.com>
Subject: File 6--More Gems from Spam-meister Siegel (NYT Excerpts)
"SPAMMING' ON THE INTERNET BRINGS FAME AND FORTUNE
Source: New York Times, Sunday Oct 16, 1994 (Business, p. 9)
Author: Laurie Flynn
((Here are some extracts from a NYT story in spam artists. The story
begins by noting that Laurence Canter and Martha Siegel have been
heavily criticized since their "Green Card" advertisement on April 12
was sent to thousands of Internet targets. Laurence Canter and Martha
Siegel have been the focus of intense criticism on computer networks
since April 12, when they posted an advertisement offering their
immigration legal services on thousands of Internet bulletin boards,
called Usenet news groups.))
The episode forced the debate about commercialism and free
speech on the global computer network, which is not governed
by any single regulating body. It also earned the pair, who
are married, $100,000 in new legal business.
((The article explains that Canter and Siegel abandoned their law
careers to help businesses and individuals market on the Internet. It
notes how they have written a book on it. The book, called "How to
Make a Fortune on the Information Superhighway" is scheduled to appear
in November.))
Some quotes from Siegel:
Question: Are you really the ones who ought to be writing
such a book?
Answer: Ms. Siegel: Who would be better? We know exactly
what's going on. We know exactly how it should be done.
Canter: We know all the pros and cons we experienced
everything positive and negative.
Q: Do you think that people who follow the advice in your
book, the almost step-by-step instructions, are going to get
the same reaction you did?
Ms. Siegel. I think the same small group of people will
continue to react that way, but it's important to understand
that they are a small group. The people who were in favor of
us, who sent us requests for information, makes up the
overwhelming majority, and they will react in the same way
again, too. We got 20,000 to 25,000 positive requests for
information. In direct mail terms, that's an incredibly
positive response.
Canter. There were probably somewhere between 20,000 and
25,000 flames that we received but they were not from 20,000
to 25,000 people. There were individuals who sent us
hundreds and thousands. There was one guy who sent us close
to 1,000 a day. As far as the positive responses, we did get
slightly over 1,000 paying clients out of it.
Q. Has the commercialization of the information highway
become a personal cause rather than merely a business
opportunity?
Ms. Siegel. Freedom of speech has become a cause for us. I
continue to be personally appalled at the disrespect for
freedom of speech by this handful of individuals who would
take over the net if they could.
Canter. The Internet is a very powerful communications
vehicle, and it should be available for everyone. The
problem we have is the few people and in some cases
companies trying to control it for their own benefits.
Q. So you believe many of the people trying to protect the
Internet are really just trying to horde the profits for
themselves?
Ms. Siegel. I think there are two parts to this group. There
are the wild-eyed zealots who view the Usenet as their home.
They don't view it as just for recreation or a place where
you exchange information. To them it's become a womb
practically, and they're defending their home. They have a
very exaggerated sense of importance of the Usenet in their
lives, that the average person doesn't share.
I think that the other group is people like Wired magazine,
who want to be the ones who make money off it. They can do
that; but if they believe they're going to control everyone
who comes in, they've overstepped their boundaries.
Q. You founded Cybersell a few months ago. How many clients
do you have?
Canter: We have over 100 people who are involved with us
now. We plan to have a grand opening soon, primarily on a
Web site.
Q. What's going to happen with advertising on the Internet?
Ms. Siegel. I think the debate is going to go away quite
fast.
Canter. We put advertising guidelines in the book. I think
if people follow all those, in particular designating
something as an ad so somebody clearly knows it's an
advertisement, I don't see there's really an valid
objections. The most common objection I hear, that on the
surface makes sense, is how it's going to clog everything
up.
The truth is what's clogging up the Usenet and the Internet
is that there are just too many people on it.
((The article notes that Canter was born on June 24, 1953, and Siegal was
born on June 9, 1948. The article also adds some of their personal
history)).
------------------------------
------------------------------
Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 7--Cu Digest Header Information (unchanged since 10 Sept 1994)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #6.90
************************************