Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 10 Issue 02
Computer underground Digest Sun Jan 11, 1998 Volume 10 : Issue 02
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #10.02 (Sun, Jan 11, 1998)
File 1--Urgent Action: WA state HOUSE BILL 2209
File 2--Washington HR 2209 (computer workers as "Professionals")
File 3--CA anti-spam bill
File 4--Fwd: America Online Files Suit Against Three Junk E-mail Firms
File 5--ACM (POLICY98) Conference Announcement
File 6--If Big Brother Has Been Dismembered, Are We Safe?
File 7--CPSR's Year 2000 Rumors Web Site
File 8--US vs Microsoft
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 19 Dec 1997 21:05:37 -0800 (PST)
From: "T.L. Kelly" <room101@TELEPORT.COM>
Subject: File 1--Urgent Action: WA state HOUSE BILL 2209
((MODERATORS' NOTE: The following is a bit late, but the issue of
defining computer workers as "professionals" and thus exempt from
minimum wage law is sufficiently important to warrant discussion.
The full text of the law follows this post)).
The WSDMA, a "labor" organization, has quietly asked the Washington Dept.
of Labor and Industry to strip computer professionals making over $27.63
an hour of their overtime.
Furthermore, the proposed law is written in such a way as to exempt "Any
employee who is a computer system analyst, computer programmer, software
engineer, software developer or other similarly skilled worker" even from
the minimum wage provisions of Washington state law.
If approved, the law will be adopted Dec. 31, 1997, and become effective
Feb. 1, 1998.
The WSDMA's largest member is Microsoft, the largest employer of computer
contractors in the region with an estimated 3-5,000 such employees. The
company recently lost a labor case brought by a group of contract workers.
It is the company's acknowledged policy to employ contract workers to
avoid the cost of benefits, vacation, etc.
Recent applicants have confirmed to me that Microsoft explicitly
*requires* all contract workers to work "a minimum of 50-55 hours a week".
The Boeing Company is also a member of the WSDMA.
The WSDMA's legal move was kept secret. The "request" was not reported in
the local press until the day AFTER the public comment period had ended.
The author of that story has acknowledged he learned of the proposal in
October, but did not cover it because he "didn't appreciate the
significance". One wonders how he manages to cross the street
successfully.
The "public" hearing was scheduled for the Tuesday before Thanksgiving
from 10 am to noon -- in Tumwater, WA, several miles south of Olympia.
The vast majority of the state's contract workers live in Seattle and
neighboring communities far to the north.
The WSDMA's own street-level membership was not informed of the move, let
alone invited to comment.
It should be noted that computer professionals are already barred from
labor organizing by a Cold War-era federal law. It seems the time has
come to work to get that law overturned on Constitutional grounds. But
first...
THE PERIOD FOR PUBLIC COMMENT ON THE OVERTIME LAW HAS BEEN EXTENDED UNTIL
DEC. 19 -- NEXT FRIDAY.
Management and owners have had nearly two months to comment, we have less
than a week. Please make it count.
Comments can be sent to Linda Merz of the Washington State Dept. of Labor
and Industry at (360) 902-5403 or merl235@lni.wa.gov
Please be clear, relatively brief, and most importantly courteous (even if
firm).
Comments of up to 10 pages may be faxed to (360) 902-5300 or snail mailed
to:
Greg Mowat, Program Manager
Employment Standards
Department of Labor and Industries
P.O. Box 4-4510
Olympia, WA 98504-4510
Below is an excerpt from the proposed law, HOUSE BILL 2209. As you can
see, it applies to just about anyone working in the computer and web
industries.
(source: http://www.wa.gov/lni/pa/w128-535.htm )
(1) Any employee who is a computer system analyst, computer programmer,
software engineer, software developer or other similarly skilled worker
will be considered a "professional employee" and will be exempt from the
minimum wage and overtime provisions of the Washington Minimum Wage Act
if:
(i) Applying systems analysis techniques and procedures to determine
hardware, software, or system functional specifications for any user of
such services; or
(ii) Following user or system design specifications to design, develop,
document, analyze, create, test or modify any computer system, application
or program, including prototypes; or
(iii) Designing, documenting, testing, creating or modifying computer
systems, applications or programs for machine operation systems; or
(iv) Any combination of the above primary duties whose performance
requires the same skill level [...]
RESOURCES ONLINE
News Stories (both of 'em -- literally)
Temporary software workers to lose OT
http://www.seattletimes.com/extra/browse/html97/temp_120597.html
Software temps gain time to fight OT changes
http://www.seattletimes.com/extra/browse/html97/temp_121097.html
Info from WA State Dept of L&I
http://www.wa.gov/lni/pa/over.htm
http://www.wa.gov/lni/pa/w128-535.htm
HOUSE BILL 2209 as posted on the WA Legislature Site
http://leginfo.leg.wa.gov/pub/billinfo/house/2200-2224/2209_022697
WA Legislature Site
http://leginfo.leg.wa.gov/
WSDMA
http://www.wsdma.org
------------------------------
Date: Fri, 9 Jan 1998 16:23:35 -0600
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
Subject: File 2--Washington HR 2209 (computer workers as "Professionals")
SOURCE:
http://www.wa.gov/lni/pa/w128-535.htm
(Washington HR 2209)
NEW SECTION
WAC 296-128-535 Are professional computer employees exempt from the
Washington Minimum Wage Act? (1) Any employee who is a computer
system analyst, computer programmer, software engineer, software
developer or other similarly skilled worker will be considered a
"professional employee" and will be exempt from the minimum wage and
overtime provisions of the Washington Minimum Wage Act if:
(a) Their primary duty is of one of the following:
(i) Applying systems analysis techniques and procedures to determine
hardware, software, or system functional specifications for any user
of such services; or
(ii) Following user or system design specifications to design,
develop, document, analyze, create, test or modify any computer
system, application or program, including prototypes; or
(iii) Designing, documenting, testing, creating or modifying computer
systems, applications or programs for machine operation systems; or
(iv) Any combination of the above primary duties whose performance
requires the same skill level; and
(b) Their rate of pay is at least $27.63 per hour.
(2) This professional exemption only applies to highly skilled
employees who:
(a) Possess a high degree of theoretical knowledge and understanding
of computer system analysis, programming and software engineering; and
(b) Have the ability to practically apply that theoretical knowledge
and understanding to highly specialized computer fields; and
(c) Generally attain the necessary level of expertise and skill to
qualify for an exemption through a combination of education and
experience in the field; and
(d) Consistently exercise discretion and judgment in the application
of their special knowledge as opposed to performing purely mechanical
or routine tasks; and
(e) Engage in work that is predominantly intellectual and inherently
varied in character as opposed to work that is routinely mental,
manual, mechanical, or physical.
(3) While many employees who qualify for this exemption hold a
bachelor's or higher degree, no degree is required for this exemption.
(4) This professional exemption does not apply to:
(a) Trainees or employees in entry level positions learning to become
proficient in computer systems analysis, programming and software
engineering; or
(b) Employees in computer systems analysis, programming and software
engineering positions who have not attained a level of skill and
expertise which allows them to generally work independently and
without close supervision; or
(c) Employees engaged in the operation of computers; or
(d) Employees engaged in the manufacture, repair or maintenance of
computer hardware and related equipment; or
(e) Employees covered by a collective bargaining agreement.
[]
_________________________________________________________________
This rule was adopted as written Dec. 31, 1997. It will become
effective Feb. 1, 1998. See news release: Dec. 31, 1998 - State adopts
rule exempting computer professional overtime pay rate
To access the department's response to public comments received about
the proposed rule, press here: Concise explanatory statement regarding
overtime and minimum wage exemption for professional computer
employees
_________________________________________________________________
Labor and Industries is an Equal Opportunity and Affirmative Action
employer. The department complies with all federal rules and
regulations and shall not discriminate on the basis of race, color,
national origin, sex, creed, marital status, sexual orientation, age,
disabled, disabled or Vietnam-era veteran, religion or disability as
defined by applicable state and/or federal statutes or regulations.
Washington State Department of Labor and Industries
What's New|L&I Services|
Press Releases |Training | Directory| Links
Publications| Calendar| Site Index| Search
L&I Home
Page last revised: 01-05-1998 - 5:10 PM
------------------------------
Date: Wed, 07 Jan 1998 18:17:53 -0800
From: Greg Broiles <gbroiles@netbox.com>
Subject: File 3--CA anti-spam bill
Here's the text of AB 1629, introduced in the California State Assembly
yesterday:
----
BILL NUMBER: AB 1629 INTRODUCED
BILL TEXT
INTRODUCED BY Assembly Member Miller
JANUARY 5, 1998
An act to add Section 17538.45 to the Business and Professions
Code, relating to advertising.
LEGISLATIVE COUNSEL'S DIGEST
AB 1629, as introduced, Miller. Advertising: electronic mail.
Existing law prohibits a person conducting business in this state
from faxing unsolicited advertising material, unless certain
conditions are satisfied.
This bill would also prohibit a person conducting business in the
state from using a computer or other electronic device to send an
unsolicited advertisement to an electronic mail address within the
state unless (1) that person has a preexisting and ongoing business
or personal relationship with the recipient, or absent that
relationship, the recipient has previously provided express consent
or permission with respect to the advertisement and (2) that person
provides certain identifying information at the beginning of the
advertisement. It would also authorize any person with legal
standing to bring an action in a court of competent jurisdiction to
enjoin any violation of these prohibitions, or to recover civil
damages, as specified, or to seek both of those remedies. It would
also provide that the prevailing party in any of those actions shall
be entitled to recover reasonable attorney's fees.
Existing law provides for the regulation of advertising and
provides that any violation of those provisions is a crime. This
bill, by creating additional prohibitions with regard to advertising,
would expand the scope of an existing crime, thereby imposing a
state-mandated local program.
The California Constitution requires the state to reimburse local
agencies and school districts for certain costs mandated by the
state. Statutory provisions establish procedures for making that
reimbursement.
This bill would provide that no reimbursement is required by this
act for a specified reason.
Vote: majority. Appropriation: no. Fiscal committee: yes.
State-mandated local program: yes.
THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS:
SECTION 1. Section 17538.45 is added to the Business and
Professions Code, to read:
17538.45. (a) No person conducting business in this state shall
use any computer or other electronic device to send an unsolicited
advertisement to an electronic mail address within the state unless
each of the following requirements are satisfied:
(1) That person has a preexisting and ongoing business or personal
relationship with the recipient, or absent that relationship, the
recipient has previously provided express consent or permission with
respect to the advertisement.
(2) That person clearly provides, at the beginning of the
unsolicited advertisement, the date and time the message was sent,
the identity of the person sending the message, and the return
electronic mail address of that person.
(b) (1) Notwithstanding Sections 17535 and 17536, any person who
has legal standing may bring an action in a court of competent
jurisdiction for either or both of the following purposes:
(A) To enjoin any violation of this section.
(B) To recover civil damages in an amount equal to the actual
monetary loss suffered by that person by reason of any violation, or
five hundred dollars ($500) for each violation, whichever amount is
greater. However, if the court finds that a violation of this
section was willful or knowing, the court may, in its discretion,
award up to three times the amount of those civil damages.
(2) The prevailing party in any action brought under paragraph (1)
shall be entitled to recover reasonable attorney's fees.
SEC. 2. No reimbursement is required by this act pursuant to
Section 6 of Article XIIIB of the California Constitution because the
only costs that may be incurred by a local agency or school district
will be incurred because this act creates a new crime or infraction,
eliminates a crime or infraction, or changes the penalty for a crime
or infraction, within the meaning of Section 17556 of the Government
Code, or changes the definition of a crime within the meaning of
Section 6 of Article XIIIB of the California Constitution.
Notwithstanding Section 17580 of the Government Code, unless
otherwise specified, the provisions of this act shall become
operative on the same date that the act takes effect pursuant to the
California Constitution.
------------------------------
Date: Fri, 09 Jan 98 15:02 CST
From: Cu Digest <TK0JUT2@mvs.cso.niu.edu>
Subject: File 4--Fwd: America Online Files Suit Against Three Junk E-mail Firms
Source - AOL News <AOLNews@aol.com>
America Online Files Suit Against Three Junk E-mail Firms
DULLES, Va.--(BUSINESS WIRE)--Jan. 7,
1998--America Online Inc. Tuesday filed suit against three junk
e-mail firms in its continuing battle against unsolicited bulk
e-mail, also known as "spam."
The suit was filed in U.S. District Court for the Eastern
District of Virginia and seeks an injunction to prevent the
companies from continuing their practice of sending large
quantities of unsolicited junk e-mail to AOL members. The suit
also seeks damages from all three companies.
The companies named in the suit are: IMS of Knoxville, Tenn.;
Gulf Coast Marketing of Baton Rouge, La.; and TSF Marketing and
TSF Industries of Riverside, Calif. This suit follows on the
heels of a federal court ruling in favor of AOL in its suit
against junk e-mail firm Over the Air Equipment Inc.
In that case, AOL won a court order barring Over the Air
Equipment from sending unsolicited e-mail to AOL members. Later,
Over the Air Equipment dropped its challenge to the order barring
it from spamming and agreed to pay AOL a substantial sum of
money in damages. AOL's new suit builds on the precedent
established in the Over the Air Equipment case.
<snip>
------------------------------
Date: Fri, 9 Jan 1998 14:29:16 -0500
From: David Banisar <banisar@EPIC.ORG>
Subject: File 5--ACM (POLICY98) Conference Announcement
ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE
* * * POLICY98 * * *
"Shaping Policy in the Information Age"
Washington, DC, Renaissance Hotel
May 10-12, 1998
Preliminary Notice
For Conference and Registration information see:
http://www.acm.org/usacm/events/policy98/
The ACM Annual Conference will focus on public policy issues
affecting future applications of computing. Our goal is to
forge stronger links between computing professionals and policy
makers. Attendees will interact with prominent leaders from
academia, industry, Congress, and Executive agencies, and
participate in debates on policy issues including Universal
Access, Electronic Commerce, Intellectual Property, and
Education Online.
The conference will promote more regular engagement of computing
professionals in democratic processes related to productive use
of computing and information processing innovations. A blend of
technical skills and policy insights are essential to cope with
the inherent opportunities and dangers of any transformational
technology. Continuing collaborations between computing
professionals and policy makers will benefit citizens, consumers,
entrepreneurs, researchers, and students. You can make a difference!
May 10: Ethical and social impacts papers and panels
May 11-12: Public policy panels and featured speakers
All Policy98 attendees are invited to the Annual ACM Awards Banquet
on Sunday evening May 10th, and a conference reception on Monday
evening May 11th.
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PANEL TOPICS AND COORDINATORS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Universal Service: Ollie Smoot
What can be done to promote widespread access to the benefits of
the Internet? What is the role of government and the role of the
private sector in wiring schools, libraries, and medical facilities?
Electronic Commerce: Jim Horning
How much public policy does EComm need? What problems would
inadequate, excessive, or misguided policies cause? Can compromises
in areas like fair trade practices, fraud prevention, security, privacy,
law enforcement, and taxation advance the interests of all stakeholders?
Intellectual Property in Cyberspace: Pam Samuelson
What will be the impact of the WIPO agreements on copyright in
cyberspace? How should intellectual property be protected and what
safeguards are necessary to protect libraries and academic institutions?
Education Online: Charles N. Brownstein
The Internet offers unparalleled opportunities for learning and teaching.
What public policy and technical challenges must be met to realize
these prospects?
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
CONFERENCE CO-CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Ben Shneiderman, USACM (U.S. Public Policy Committee)
C. Dianne Martin, SIGCAS (ACM Special Interest Group
on Computers & Society)
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PROGRAM COMMITTEE CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Marc Rotenberg, Public Policy
Keith Miller, Ethics and Social Impacts
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
REGISTRATION INFORMATION
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
For more information, contact: policy98@acm.org
or to register electronically, see:
http://www.acm.org/usacm/events/policy98/reginfo.html
Early registrants and ACM members receive discounts.
------------------------------
Date: Mon, 1 Dec 1997 14:32:06 -0500
From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
Subject: File 6--If Big Brother Has Been Dismembered, Are We Safe?
NETFUTURE
Technology and Human Responsibility
Source: Netfuture - Issue #61 December 1 1997
COPYRIGHT 1995 BRIDGE COMMUNICATIONS
Editor: Stephen L. Talbott (stevet@oreilly.com)
On the Web: http://www.oreilly.com/people/staff/stevet/netfuture/
You may redistribute this newsletter for noncommercial purposes.
If Big Brother Has Been Dismembered, Are We Safe?
-------------------------------------------------
In "No Place To Hide" (*Forbes*, September 22, 1997) Ann Marsh offers a
useful survey of the potentials and current realities of electronic
surveillance. Among the items she ticks off:
* Travel information from electronic toll booths in New York, originally
off limits to law enforcement agencies without a subpoena, is now
routinely available for the investigation of all serious crimes.
* As cars are fitted with satellite-tracking services, General Motors
has already felt the need to issue a disclaimer: "We will tell the
police where a vehicle is, but not just any individual. We do not
want to be a national detective service."
* Passive tracking devices as small as a rice grain reveal their data in
the presence of a scanner (as at a toll booth or retailer's exit).
They can be (and have been) implanted under the skin of humans to
store and report medical data. They could equally well be used as
security passes.
* In a few years all cellular phone companies will be required to report
the location of 911 callers.
* Unmanned spy planes ("drones") can photograph the ground with twelve-
inch resolution. Other drones as small as a paper plane can survey an
area from just a few hundred feet up. "On the drawing board are some
vehicles that can fly through an open door, perch inside a building,
and quietly observe their surroundings."
But Marsh also looks at the positive side: tracking lost kids and
Alzheimer patients; nabbing criminals by installing tiny transmitters in
cars and store merchandise, or in stacks of money given to bank robbers;
automatically dialing 911 and reporting the location of car accidents;
tracking salmon migrations; and using drones to sniff out airborne
pollutants.
Like it or not, Marsh concludes,
The world is becoming smaller and smaller and ever more transparent.
Your fenced-in yard won't be quite as private as it used to be. But
neither will the dark alley near your bank teller machine. Tradeoff,
tradeoff, tradeoff.
Yes, but the notion of tradeoffs can lead us to stop thinking too soon.
It's not simply a matter of looking at a particular piece of technology
and saying, "Gee, it could be used this way (which is good) and it could
be used that way (which is bad) -- and let's make the bad illegal." Given
the complex interrelationship of all technologies, we have little choice
but to seek larger and deeper patterns.
Once we do that, we will not always find neatly offsetting facts on
opposite sides of the balance. It is not as simple as seeing which set of
facts outweighs the other. There may be *some* patterns that are
reinforced by both sides of a supposed tradeoff.
In particular, chip implants for tracking Alzheimer patients, while
obviously helpful for some purposes, would not necessarily prove benign in
the larger picture. The devices could easily encourage the continuing
depersonalization of care for the elderly -- especially in a society
already moving in that direction. The more easily you can electronically
monitor a person, the more invisible he tends to become *as a person* --
and long-term social policy toward invisible people is rarely benign.
Similarly, medical data stored on chip implants may save some lives. But
as this data gets electronically transmitted from here to there for
analysis, the risk is that the individual, flesh-and-blood patient in all
his particularity will be replaced by the sum of his data. So the medical
benefit, to the degree it entails disregard of the individual, is not
unrelated to various abuses on the other side of the balance. For
example, violations of data privacy become much more likely once the
patient has been lost sight of.
And, as I have pointed out before, the ability to nab criminals through
high-tech tracking devices is occurring as part of a general trend toward
the technical mediation of human relations. This in turn -- if we do not
counter the trend with a strong consciousness of community -- leads to the
weakening of the social matrix that is the most effective barrier to
crime. So even the benefits of the tracking devices may be part of a
distinctly unhealthy pattern that negates the benefits.
In her article, Marsh mentions the Orwellian, dictatorial potentials of
the new technologies, and sets them in the balance against the freeing
potentials. But, as I argued in "Distributing Big Brother's Intelligence"
(NF #59), we need to be alert to the possibilities of a "distributed
tyranny" requiring no dictatorial center. Both sides of the balance in
which we usually assess the issues may weigh in favor of such a tyranny.
While Marsh mentions Saddam Hussein in passing, it is worth remarking that
nearly all her examples of dangerous technical implementations come from
the United States. It is hard to imagine that Americans will succumb to
an old-style dictator in the foreseeable future. But it is quite
imaginable that we will continue succumbing to the "necessities" of
progress -- the very necessities that lock us in debate about what may in
some cases be lose-lose tradeoffs.
When hidden cameras in public places, electronic surveillance of
employees, and the tracking of individual product purchases are on the
increase, it is not because we are heading toward a centralized
dictatorship, but rather because the entire fabric of corporate business,
law enforcement, and public consumption seems to require these things.
Here the immediate necessity is rooted in economics, there in personal
health; here in law enforcement; there in the needs of the disabled.
I am not sure to what degree we might avoid pursuing the various technical
implementations that sustain the threats. Who, after all, would deny to
the disabled the latest technical assist? But I *am* sure that we had
better step back and take a hard look at the overall shape of the puzzle
pieces slowly assembling themselves all around us.
I can't help thinking of those coarsely scanned images that, from close
up, yield nothing recognizable, but from a distance betray a human
countenance. Let us hope that the face now taking shape in the pattern of
our technologically transformed lives is not the dismembered and
redistributed face of Big Brother. But if it is, our only hope for
recognizing the fact is to gain some objective distance between ourselves
and the "inevitable" progress of technology.
(Quotations are from the online version of Marsh's article:
http://www.forbes.com/forbes/97/0922/6006226a.htm.)
------------------------------
Date: Fri, 2 Jan 1998 12:24:35 -0800
From: Susan Evoy <sevoy@Sunnyside.COM>
Subject: File 7--CPSR's Year 2000 Rumors Web Site
News Release CPSR Y2k Web Site Launched
News Release
For more information contact:
Norman Kurland, chair, CPSR Y2k Working Group
kurlandn@crisny.org; phone 518-439-9065
YEAR 2000 RUMORS ADDRESSED ON NEW WEB SITE
There are just two years until January 1, 2000 -- two years to make sure
that computers can tell that 00 means 2000 and not 1900. During these
two years businesses, governments and individuals are going to be working
with increasing urgency to fix the so-called Y2k problem or minimize its
impact on their operations.
Even as the pace of work on the problem accelerates, so too will the
rumors. Already there are rumors that elevators will stop running,
electrical utilities will fail, the international financial system will
grind to a halt and Social Security checks will be late and incorrect.
To help sort fact from fiction CPSR (Computer Professionals for Social
Responsibility) has established a Y2k Rumor Center on its new Y2k Web
site: http://www.cpsr.org/program/y2k/.
The site is intended to provide guidance to small organizations that have
not initiated their Y2k remediation efforts and to help everyone
understand the social and economic consequences of this seemingly simple
problem. CPSR is hopeful that its effort will help prevent people from
panicking as they hear unsubstantiated rumors about what might happen.
CPSR is a public-interest alliance of computer scientists and others
concerned about the impact of computer technology on society. It works to
influence decisions regarding the development and use of computers.
CPSR is deeply concerned about the serious threat posed to individuals,
organizations, governments, and economies by the Year 2000 computer
problem, a threat that could disrupt our economic and social systems.
The Y2k Working Group was formed to help promote awareness of
the problem and assist in finding solutions. Its focus is on segments
of society which do not have extensive resources or organized groups
to speak for them. It seeks to foster a sense of urgency at all levels
local, national and global, while helping the public and the media understand
and prepare for the impact of the Y2k problem.
The Working Group maintains the Web site as the place to go for
individuals and smaller organizations seeking understanding and help with
Y2k. The site includes a simple explanation of the the Y2k problem and
practical suggestions on how to respond to it, including a checklist of
things to do now.
> --
> Susan Evoy * Deputy Director
> http://www.cpsr.org/home.html
> Computer Professionals for Social Responsibility
> P.O. Box 717 * Palo Alto * CA * 94302
------------------------------
Date: Fri, 2 Jan 1998 20:47:31 EST
From: MRand33609 <MRand33609@aol.com>
Subject: File 8--US vs Microsoft
Is Microsoft Evil?
How is it that in the United States -- the home of such men
as Thomas Edison, Henry Ford and the Wright Brothers -- could that
question even be reasonably postulated? Bill Gates the most
productive man in the United States, is actually being persecuted
for being productive . . . . for running the largest
computer-software company in the world.
To me, this issue should not even be discussed between
rational people. It would be like debating over the answer
to a simple arithmetic problem or the shape the Earth. But this
is an issue; an issue that has been avoided for the last century
in this country.
Think; if it were evil to create better products at lower
prices, then would that imply that building the worst products at
outrageous prices
is good.
I once thought that Ayn Rand was exaggerating when she
claimed that people held the phrase, From each according to his
ability, to each according to his needs as a moral ideal. But
once again the Ralph Nadar and Janet Reno are proving that
they do.
Imagine penalizing Bill Gates 1 million dollars a day for
running a good business.
What' next? Failing Johnny because he got all the answers
right on his test, while giving Steve a full ride to Harvard
because he never went to class.
To learn more about the specifics of the Justice Department'
vendetta against Mr. Gates and Microsoft visit the following
website;
http://www.capitalism.org/microsoft
------------------------------
Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #10.02
************************************