Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 10 Issue 21

  


Computer underground Digest Sun Apr 5, 1998 Volume 10 : Issue 21
ISSN 1004-042X

Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #10.21 (Sun, Apr 5, 1998)

File 1--CYBERsitter
File 2-- Announcement: PEOPLES PRESS INTERNATIONAL (PPI)
File 3--Islands in the Clickstream. Voyagers. April 4, 1998.
File 4--"Feds Dishing up Spam" (press release)
File 5--"Computers, Ethics and Society", Ermann & Williams
File 6--SLAC Bulletin - Apr 1 '98
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 01 Apr 1998 23:26:37 -0600
From: Bennett Haselton <bennett@peacefire.org>
Subject: File 1--CYBERsitter

In the last issue someone pointed out that they had found the decoded list
of sites that CYBERsitter blocks, at:
http://atropos.c2.net/~sameer/cybersitter.txt

This list is indeed accurate. About a year ago, Peacefire put a program on
the Web that made it possible for people to unscramble the list of sites
blocked by CYBERsitter from the encrypted list that came with the program.
The encryption scheme they were using was very simple -- they XOR'ed every
character in the file with 0x94 -- and the CSDECODE program simply reversed
that process. I didn't want to put the list of blocked sites itself on
Peacefire.org because I was worried that they might be able to get us for
Copyright infringement if I did that, so I posted the program itself and
told people where they could download CYBERsitter if they wanted to
unscramble the list.
Naturally, CYBERsitter was furious and threatened legal action anyway:

http://www.news.com/News/Item/0,4,9964,00.html
http://www.wired.com/news/politics/story/3355.html

So much I expected. What I didn't expect is that most of the media started
reporting that this "bunch of hackers had posted a program to break the
code on CYBERsitter", deliberately worded in such an ambiguous way as to
make people think that we were posting a program for kids to hack around
the software, which csdecode specifically does not do. C-Net, for example,
originally titled their story "Teen Disables Filtering Software" and said
that we were helping kids hack around CYBERsitter; their original version
of the story is at:

http://peacefire.org/archives/cnet.on.cybersitter.1st-version.txt

We called them up and threatened all kinds of action that were completely
out of our range, unless they corrected it, so the next morning they
changed the story and posted the amended version which is now at:

http://www.news.com/News/Item/0,4,9964,00.html

which was titled "Teen Exposes Filtering Software" instead of "Teen
Disables Filtering Software" as well as some other minor changes.

The list of blocked sites may be out of date, but you can still download
CYBERsitter and run csdecode to find out what it blocks. Csdecode can be
downloaded from:

http://www.peacefire.org/censorware/CYBERsitter/csdecode.shtml

Please note that it will not work with CYBERsitter 97, only with
CYBERsitter 2.12.

------------------------------

Date: Sun, 5 Apr 1998 16:19:16 +0100
From: "Richard K. Moore" <rkmoore@iol.ie>
Subject: File 2-- Announcement: PEOPLES PRESS INTERNATIONAL (PPI)

Dear cyberjournal community,
writers & publishers (via Bcc:),

Announcement>

PEOPLES PRESS INTERNATIONAL (PPI)
- a new incarnation of <cyberjournal@cpsr.org> -


In collaboration with "CADRE Productions Unlimited" (CPU), and with
the hosting support of "Computer Professionals for Social
Responsibility" (CPSR), I am pleased to announce a revamp of the
cyberjournal list -- a dedication to an expanded mission in support
of _Social Responsibility_ on a GLOBAL scale: the PEOPLES PRESS
INTERNATIONAL (PPI).

PPI aims to connect people to people, worldwide, bringing you the
_real_ news of the world -- the news Rupert Murdoch, Ted Turner,
the UPI, Reuters, the API, and the New York Times don't think you
need to see.


WHERE WILL PPI GET ITS NEWS?...
...from stringer reporters, amateur and professional, all over the
world -- on the ground where the news is happening, uncensored and
up-to-the-minute...
...from the culls of dozens of Internet lists -- the
exceptional/pivotal postings that are deserving of worldwide
exposure...
...from you, our writer/publisher subscribers, who are encouraged
to send in those items of your own which would be of interest
beyond your shores...
...from our network of independent journalists and analysts who
have chosen PPI as a venue for their best and most topical essays
and investigations...
...and from you our readers, who welcome a chance to have _your_
voice heard on the issues of the day.


HOW WILL THE NEWS FEED BE FORMATTED?...
From now on each cyberjournal/PPI posting Subject will be prefixed
by a tag denoting what type of news item it is, and will identify
the source of the material along with the topic/subject:

- PPI-ALERT> source: subject
- a posting which urges action on the part of the reader -- to join
a letter-writing campaign, to provide information or contacts in
support of an action, etc.

- PPI-BULLETIN> " "
- a news bulletin: an item of worldwide interest, though not to
every audience

- PPI-ANALYSIS>
- an essay or investigative report by a distinguished observer

- PPI-EDITORIAL>
- an opinion/analysis piece by CADRE editorial staff or by a guest
contributor

- PPI-BACKGROUND>
- a background study -- bringing in historic, economic, political,
or philosophical observations that shed light on today's events

- PPI-FIRST-PERSON>
- a report by an "ordinary person", perhaps poorly expressed or
with grammatical errors, but which "tells it like it is" from the
front lines

- PPI-READERS-VOICE>
- a comment, again by an "ordinary person", on recent news or on
any other topic of widespread interest

- PPI-RENAISSANCE>
- a report on the progress of the Democratic Renaissance and of the
global coalition movement striving to bring it about


HOW CAN YOU ACCESS THE NEWS FEED?
You can subscribe to cyberjournal@cpsr.org, getting the real-time feed
directly into your mailbox, or you can access the always-current PPI
Archives, and pull down what you need...
http://cyberjournal.org/cadre/PPI-archives

To join cyberjournal, simply send:
To: listserv@cpsr.org
Subject-- (ignored)
---
sub cyberjournal Jane Q. Doe <-- your name there


HOW CAN THE PPI NEWS FEED BE USED?
All material published by PPI is available for free and unrestricted
use in non-commmercial venues or in in small-press (ie, "struggling for
existence") venues, such as small-town newspapers. Commercial (profitable)
media venues may inquire regarding republication rights. All material is
copyrighted by the original source and by PPI.


NOTICE TO LIST-OWNERS AND WEBSITE-OWNERS:
You are invited to link your websites to <http://cyberjournal.org> and to
request a cross-link; list-owners are invited to use the PPI news feed as
a regular source of material supplementary to your other sources.


HOW MUCH TRAFFIC WILL THERE BE ON PPI?
Traffic will be limited to two or three postings per day.

------------------------------

Date: Tue, 07 Apr 1998 11:35:46 -0500
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 3--Islands in the Clickstream. Voyagers. April 4, 1998.

Islands in the Clickstream:
Voyagers


When we come to a new place or enter a new environment, the landscape looks
all of a piece, and we have to learn how to see it in depth and detail.
Our interaction with new cultures teach us over time how to understand them


When I moved to Maui in the eighties, I lived about thirty feet from the
ocean. From the sea wall, when I looked out at the channel that defined the
"pond" among our islands, all I could see was water. Nothing but water

Of course I could see the other islands and waves breaking over the reef,
but the ocean itself looked like nothing but undifferentiated water.

Last week I returned to Hawaii to speak about spirituality and technology.
During the week, two canoe builders from the Marshall Islands made a public
presentation and shared some of their lore, long believed to be lost. "Some
of our navigators are trained to detect six different swells by the feel of
the canoe," one said. Others specialized in navigating by the stars or
weather. Despite the repression of their culture (and the explosion of
dozens of nuclear bombs on their islands), they had somehow kept alive the
knowledge of their ancestors.

They used tangled knots to map the night skies and learned to discern the
subtle interacting patterns of the swells by crouching in canoes on what
looked to a "mainland haole" like a perfectly calm sea. When they looked
out at the ocean, they saw a lot more than just water.

After a few years on the island, I could see at a glance the direction of
the wind and the complex pattern of the currents. That told me what I was
likely to encounter when I went diving or spear fishing. I knew where the
fish would be feeding, how to co-exist with morays and reef sharks, how to
use the surge of the sea to slide without effort toward prey. The angle of
the sun under the water, the length of the seaweed, the Kona wind, all
correlated with the feeding habits of the fish on the reef. The sea
resolved itself into a complex, richly detailed environment.

What I learned was child's play compared to the intimacy with which
islanders know the ocean. Someone who lives on the mainland might look at
the water and see only a barrier, whereas islanders see an open invitation,
a whole world waiting to be explored, both highway and home.

The journey into ourselves and the journey into the symbolic landscape that
defines our culture - of which the Internet is an emblem - are the same
journey.

When we first turn inward, the landscape may seem opaque, but as we explore
through meditation, prayer, and other disciplines, we too discover both a
highway and a home.

It's as if someone who spent his or her entire life on land hears for the
first time about the ocean. The word calls forth an image and a desire,
and that is the beginning of the journey. We make our way to the water's
edge and look out at the singular immensity of it. Some plunge in; others
take scuba lessons, letting others coach them. When we first snorkel or
dive on a tropical reef, we are amazed at the beauty and variety of living
forms. That beauty can be a trap. If we're not careful, we stay at that
depth instead of learning to go deeper. If we do go deeper, new worlds are
disclosed, new possibilities for communion with ourselves, others, and the
universe of which we could not have dreamed.

Over time, we become as comfortable under water as on land, and our
framework expands to include the sea and what is under the sea as well as
the narrower life lived in the air. We move back and forth between them
easily. Air and water become dimensions of a single reality.

The first explosive photos taken by the Hubble telescope showed the
richness and complexity of space, a technology disclosing new possibilities
for action. As those possibilities percolate into our consciousness, what
it means to be a human being is transformed.

That's how it felt too when I downloaded my first browser and tumbled like
Alice into cyberspace, emerging from underground eight hours later,
oblivious to the passage of time.

The Internet is a vast sea of possibilities, a symbolic representation of
our collective consciousness and our collective unconscious. When we
explore the Net, we are exploring ourselves. The Net is a swirl of
invisible currents. We learn to surf swells of meaning that surge back and
forth like the sea. We learn to follow currents of information, feeling the
swells interact in subtle and complex ways. We become voyagers in the sea
of information in which we are immersed, plunging through high seas in
outrigger canoes. We make our own tangled starmaps that represent and
remember for us how to find our way home.

There is ultimately only ourselves to know. When we try to understand
everything, we do not understand anything at all, observed Shunryu Suzuki.
But when we understand ourselves, we understand everything.

The Internet is not so much a set of skills as it is a culture. Guided by
mentors, learning like wolves to hunt together, we learn how to hang in the
medium. The images on our monitors are icons, windows disclosing
possibilities far beyond our home planet. Inner and outer space alike are
explored by tele-robotic sensory extensions, revealing the medium in which
we have always been swimming. Consciousness is the sea, and the sea is all
around us. The secrets that we think are lost are simply waiting to be
found: Supra-rational modes of knowing. Connection and community of such
depth and complexity that we grow giddy with delight. A network in which we
are both nurtured and fulfilled, each node of the web a reflecting facet
like one of Indra's jewels, reflecting each of the others and the totality
of the whole.

**********************************************************************

Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.

Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.

To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.

Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.

Islands in the Clickstream (c) Richard Thieme, 1998. All rights reserved.

ThiemeWorks on the Web: http://www.thiemeworks.com

ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321

------------------------------

Date: Wed, 1 Apr 1998 23:47:49 -0600
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 4--"Feds Dishing up Spam" (press release)

SOURCE: http://www.cnn.com/TECH/computing/9803/31/beat/

HEARD ON THE BEAT: FEDS DISHING UP SPAM

March 31, 1998
Web posted at: 11:43 AM EST (1143 GMT)

The FBI uses many methods in its crusade against crime and,
according to a few angry residents of cyberspace, one of those
methods looks suspiciously like "spam."

In February, the FBI sent bulk e-mail, titled "Militants Call for
Anti-U.S. Attacks Worldwide," to thousands of online addresses.

The missive warned that Islamic militants had issued "a religious
decree calling on Muslims everywhere to attack U.S. citizens,
facilities and allies of the U.S. around the world."

While it may have been considerate of the FBI to issue the
warning, it left people like John Bolding, owner of a tiny
software company in Tucson, wondering why he was one of its
recipients.

A fanatical foe of spam, unwanted bulk e-mail, Bolding conducted
an investigation of his own. He said he learned that the message
had been sent to thousands of high-tech companies, even though
they weren't terrorism targets.

Bolding said he was perplexed, then outraged. "They're using tax
dollars to send out spam," said Bolding, who posted the FBI
message on his company's Web site, at
http://www.firstbase.com/spam.htm

FBI officials said the e-mail messages were simply a new wrinkle
in a long-standing effort to raise awareness of terrorism by
sending advisories to companies that want occasional updates.

The FBI assembled the e-mail list partly from various published
directories, said Ron VanVranken, an FBI spokesman. He added that
the agency received only two complaints and removed those
addresses.

"We just want to protect Americans," said VanVranken. Bolding said
he had his name taken off the list, although the agent he
contacted asked him if his attempts to block the e-mail were part
of "some kind of new un-American subversive activity."

So while Bolding still gets hundreds of spam messages each week,
none of them is from the FBI, restoring normalcy to his
relationship with the spy agency.

"Except there is a sedan parked out front with guys wearing trench
coats," he said. "Just joking."

------------------------------

Date: Mon, 30 Mar 1998 08:03:27 -0800
From: "Rob Slade, doting grandpa of Ryan and Trevor" <rslade@sprint.ca>
Subject: File 5--"Computers, Ethics and Society", Ermann & Williams

BKETHICS.RVW 980131

"Computers, Ethics and Society", M. David Ermann/Mary B.
Williams/Michele S. Shauf, 1997, 0-19-510756-X, C$29.95
%A M. David Ermann
%A Michele S. Shauf
%C 70 Wynford Drive, Don Mills, Ontario M3C 1J9
%D 1997
%G 0-19-510756-X
%I Oxford University Press
%O C$29.95 800-451-7556 fax: 919-677-1303 cjp@oup-usa.org
%P 340 p.
%T "Computers, Ethics and Society, Second Edition"

Ethics. Don't talk to me about ethics.

Computer industry the size of a planet, security specialists sleeping
under every bush, a zillion philosophy students and what do we do? We
write a textbook.

It's so depressing.

It has been seven years since the first edition of this book was
published, and five years since I reviewed that first edition. I was
rather looking forward to it at the time, it being the only title I
had found to address this all important issue. I was a bit chagrined
to find that it was, a) a series of articles, rather than a book; and,
b) a textbook. Well, courses on computer ethics are important, and in
the interim there have been both other textbooks and serious
examinations of the topic for the working professional. I've gotten
over my disappointment that the book was a textbook, but still find it
to be flawed *as* a textbook. As with other, similar, works, some of
the disappointment arises from the fact that, so far, this is close to
the best we can do.

The apparent organization of the material is good. The first section
of papers deals with general ethical theory. Unfortunately, the
background is somewhat limited, dealing only with utilitarianism,
generally simplified to "the greatest good for the greatest number",
and some minor variations. (Kant's "Categorical Imperative" is
covered, but it can easily be seen as a special case of utilitarianism
where "badness" is exponential.) The first paper, "Ethical Issues in
Computing," stands as an overview of topics to be covered in the book.
As such, the piece can't be faulted for a lack of depth. However,
what analysis there is in the essay betrays a reliance on facile
reasoning and presumptions based on strictly anecdotal evidence, or no
evidence at all. In this regard, it foreshadows too much of the
material in the book overall. The second and third papers,
"Information Technologies Could Threaten Privacy, Freedom, and
Democracy," and "Technology is a Tool of the Powerful," demonstrates
another shortcoming of the book: an emphasis on theoretical societal,
rather than practical personal, responsibilities and issues. As the
material begins to examine generic ethical principles in light of
specific problems, the treatment becomes uneven, although by and large
it offers little except further problems in defining moral action. (I
was sad to see that a first rate treatise on privacy as it relates to
monitoring of criminal offenders; lucid, readable and almost poetic
while casting an insightful new light on the subject; has been
removed.)

In light of my comments about a social bias to the book, it may seem
strange that part two is entitled "Computers and Personal Life."
However, personal action and responsibility is in the minority. Four
papers deal with privacy, commerce, and employment, again pitting the
individual against the mass, if not the state. The excerpt from
Gates' "The Road Ahead" (an unremarkedly ironic inclusion given the
current debate and legal battles over "ownership" of the desktop) is
nothing more than a bit of blue sky pronouncing. The articles by
Postman, Gergen, and Broadhurst are better informed, but no closer to
ethics. Eugene Spafford seems to be the only contender in the
personal activity arena.

"Computers and the Just Society" is definitely back with the person
against the principality, paying particular attention to employment
(in the aggregate) and privacy (as being eroded by legislation against
encryption). There is a nod to cyberspace and the law on the way
through, but it isn't much improvement over the first edition.
(Aristotle and Augustine didn't even make the cut this time out.)

Part four, on "Computing Professionals and Their Ethical
Responsibilities" shows titular promise, but is back on the individual
against society once more. Indeed, there is little that is specific
to the computing professional. A paper on "whistle-blowing' is clear
as to the issues, but finally ambiguous as to any answers. Steven
Levy's piece on Lotus Marketplace is a bit depressing when you realize
the final outcome: Lotus never did release marketplace, but a number
of recent "products" are much greater invasions of privacy.

Given the almost absolute emphasis on society, I was rather surprised
to see only one paper, and that tangentially, related to the rise of
the Internet. The net has become a major force in society, both in
spreading hate literature and other disinformation, and in promoting
democracy and discourse. The second edition does not appear to have
taken the opportunity to come up to date in this regard.

Much of the material collated here is interesting, and worthwhile
background for a course in computer ethics, but it doesn't go
anywhere. The quality is very uneven and, ultimately, much of the
writing is disappointing. The section and subsection headings often
bear only the most tenuous connection to the contents, although
related articles to tend to have some commonality. As course reading
material, this book could be very useful in the hands of a good
instructor. As a resource for those working in the lines...well, I
suppose we keep looking and hoping.

copyright Robert M. Slade, 1993, 1998 BKETHICS.RVW 980131

------------------------------

Date: Wed, 01 Apr 1998 07:33:41 -0500
From: Jonathan Wallace <jw@bway.net>
Subject: File 6--SLAC Bulletin - Apr 1 '98

SLAC Bulletin, April 1, 1998
-----------------------------

The SLAC Bulletin is a low-volume mailer (1-5 messages per month)
on Internet freedom of speech issues from Jonathan Wallace,
co-author of Sex, Laws and Cyberspace (Henry Holt 1996) and
publisher of The Ethical Spectacle (http://www.spectacle.org). To
add or delete yourself:
http://www.greenspun.com/spam/home.tcl?domain=SLAC

The following is my testimony submitted to the U.S. Senate in
oppositio to the McCain bill which would require installation of
censorware in federally-supported libraries and schools.

What Censorware Means to Me

by Jonathan Wallace jw@bway.net

In the past year I have become an activist against the use of
censorware in government institutions. Of the wide variety of
issues pertaining to free speech which I might have chosen, how
did I select this one? The answer is that I didn't go looking to
pick a fight with censorware; it picked a fight with me.

I practiced law for ten years specializing in computer-related
matters, then became an executive in a software business. For
years I had day-dreamed about starting a newsletter on ethical
issues as an avocation, but the cost seemed prohibitive; the
newsletter I sent my law clients cost more than a dollar a copy,
so it seemed impossible for me to reach a significant audience. I
wasn't rich, and I couldn't afford it.

In 1994, the World Wide Web came along, and I learned HTML, the
"mark-up" language in which Web pages are created. That happened
to be the year I turned 40, and I made up a list of things I
wanted to accomplish; finally starting my ethics newsletter was
one of them. On January 1, 1995, issue number 1 of The Ethical
Spectacle went on-line at http://www.spectacle.org. It included
articles on campaign finance, Schindler's List, and making the net
accessible for minorities. Thirty-seven more monthly issues have
followed since then. The expense of publishing the Spectacle is
under $100 a month, exclusive of my time.

A goal listed in the Spectacle mission statement: "Promoting
freedom of speech, compassion, fairness and humility as the
fundamental building blocks of private and public life."

Within a few days, people had found the Spectacle and were
beginning to send me letters about it. I received a monthly status
report from the company on whose server the Spectacle lives: more
than 1,000 people had read it, more than 3,000, 8,000,
12,000....Today upwards of twenty to thirty thousand people read
it every month. I have received email from readers in Sweden,
France, Germany, Italy, Portugal, Australia, New Zealand, South
Africa, Brazil and many other countries. Publishers have
requested and gotten permission to reprint my work in textbooks,
law journals, and library science publications. Hundreds or
thousands of other Web sites around the world link to mine, and
many of them have republished my essays. Pieces I wrote have been
passed around on Usenet and private mailing lists, leading more
readers to the Spectacle.

During 1995, I had signed a contract with the publishing firm of
Henry Holt, for a book on Internet censorship. Ironically, in
that book, Sex, Laws and Cyberspace, published in early 1996, Mark
Mangan and I recommended censorware as a private approach to
avoiding pornography. Between the time that we delivered the
manuscript and its appearance in bookstores, censorware products
began blocking the Spectacle. The first Web page of mine blocked
by any product was the one dedicated to our book
(http://www.spectacle.org/freespch). It was promptly barred by
Cyberpatrol and later by I-Gear as well. Cyberpatrol has also
blocked Nizkor, the leading Holocaust site, and Deja News, a
Usenet archive used by programmers, attorneys, public relations
consultants and others to obtain technical and business
information.

Through the winter and spring of 1995, I prepared a special issue
of the Spectacle for June of that year: a compilation of material
about the Auschwitz death camp. Entitled "An Auschwitz Alphabet",
it contains excerpts from works by Primo Levi,
Elie Wiesel and Tadeusz Borowski, among other Auschwitz inmates.
The "Alphabet" is located at
http://www.spectacle.org/695/ausch.html. I had no idea of the
impact this simple work would have: it accounts for more than 40%
of Spectacle readers. Teachers all over the world have assigned it
to their classes, and students from many countries have thanked me
for creating it. Here are a few of the responses I have had.

>From teachers:

"I just discovered your work online and am impressed! I am
teaching a second level composition course thematically based on
the Holocaust..."

"I just wanted to let you know that I found your site as I was
gathering resources to teach a unit on the Holocaust to my middle
school students....your site is going to be a fabulous resource."

"I am teaching summer school--U.S. history, 20th century--and
found the Alphabet a powerful tool..."

>From students:

"I am a tenth grade student in Australia, and I would like to
congratulate you on this homepage."

"I am an Abilene Christian University student. Your information is
wonderful and greatly appreciated."

"I'm in eighth grade and your page helped me the most..."

And here is the single most moving message I have ever received on
the Internet, from a young Italian girl:

"I read all the books of Primo Levi, I hope for one best world.
I'm only 14...I'm not a Jew but I will don't forget..."

If these students or teachers had been accessing the Net from
computers with the Cybersitter or X-Stop products installed, they
would never have been able to see An Auschwitz Alphabet.
Cybersitter blocked the whole Spectacle site from about February
1997 until its most recent release. Cybersitter also blocked the
National Organization for Women and Peacefire, a student free
speech group. X-Stop blocked a portion of my site until recently,
when (the ACLU informs me) it began blocking the entire Spectacle
domain.

The July 1995 issue of the Spectacle, appearing the month after
"An Auschwitz Alphabet", was entitled "Threats to the Net" and
covered several of the cases we would describe in more detail in
the book. (Its address is http://www.spectacle.org/795/). It
contained discussions of the Jake Baker and Amateur Action cases,
and the Communications Decency Act. The concluding essay was
entitled, "We Don't Need New Laws." This issue of the Spectacle
was quickly blocked by X-Stop's "felony load" version. This is
the release which the publisher touts as blocking only obscene
material, hence "felony". It is the same release which blocks the
Quaker pages, the Aids Quilt and the American Association of
University Women.
Late in the year, I added a new section to the Spectacle site
called "The Free Speech Dictionary"
(http://www.spectacle.org/freespch/musm/). It was a series of
brief definitions of free speech terms: "hate speech,"
"pervasiveness", "fighting words", "libel", "obscenity". The
Dictionary was blocked by the Bess product.

Another product that will not allow access to much of the
Spectacle is Web Chaperone, which is the only one
of these products to block by keyword alone. I am told Web
Chaperone cannot distinguish between an essay about Catharine
MacKinnon's views on pornography and the "Hot Nude Women" page.

So that makes six, count 'em, six censorware products which block
all or part of the Spectacle--a sober, intellectual, rather dry
publication, without prurient photographs or stories, which
aspires to be an electronic equivalent of print magazines like The
Nation, The National Review or The Atlantic. And those are only
the ones I know about. If only one or two of these products had
blocked my pages, I might have concluded it didn't mean anything.
Being on the blacklists of six censorware products proves to me
that this kind of software will inevitably block speech like mine
on topics
like freedom of speech and the Holocaust.

Being blocked by all this software has led me to make an
investigation of censorware and to become a founding member of The
Censorware Project (http://www.spectacle.org/cwp). Each time I
look into what one of these products blacklists, I found out about
more Websites completely lacking any pornography--on topics like
censorship, scuba diving, pet care, political activism. Many of
them are run by people who don't have my legal skills or
visibility, or the willingness to make a fuss to get their pages
unblocked. Most have no way of even finding out which censorware
products block their sites.

At least four of the products which blacklist the Spectacle are
currently installed in public libraries or schools: Cybersitter,
Cyberpatrol, Bess, and X-Stop. This bothers me intensely,
because I always thought these institutions were in the business
of providing access to pages like An Auschwitz Alphabet and the
Free Speech Dictionary, not blocking them. One of the letters I
got about the Alphabet was from Cenie Ho, a young student at the
Djakarta International School. That school later installed
CyberSitter, so Cenie and her classmates can't read An Auschwitz
Alphabet any more.

When libraries install censorware, it is usually because of
community pressure, and fundamentalist groups are involved. At the
library board meeting in Loudoun County, Virginia which resulted
in a decision to install X-Stop, Dixie Sanner of Enough is Enough
commented that putting library staff in charge of selecting
Internet content is like "putting the wolf in charge of the
henhouse." Why are we allowing people who hate and fear librarians
and have no conception of the diversity of speech to dictate
national library policy?

I'd like to close with three quotes which, read together, state
more eloquently than I can the guiding philosophy of the American
doctrine of free speech:

John Milton: "Read any books whatever come to thy hands, for thou
art sufficient both to judge aright, and to examine each
matter....Prove all things, hold fast that which is good."

John Stuart Mill: "[T]he peculiar evil of silencing the expression
of an opinion is, that it is robbing the human race; posterity as
well as the existing generation; those who dissent from the
opinion, still more than those who hold it. If the opinion is
right, they are deprived of the opportunity of exchanging error
for truth: if wrong, they lose, what is almost as great a benefit,
the clearer perception and livelier impression of truth, produced
by its collision with error."

And finally, Justice Holmes, who stated the operative metaphor for
the First Amendment in his dissent in Abrams v. U.S.:

"[W]hen men have realized that time has upset many fighting
faiths, they may come to believe even more than they believe the
very foundations of their own conduct that the ultimate good
desired is better reached by free trade in ideas--that the best
test
of truth is the power of thought to get itself accepted in the
competition of the market, and that truth is the only ground upon
which their wishes safely can be carried out."

I believe that the strands uniting the thoughts of these three men
are humility, tolerance and optimism-the humility to know that we
do not know all the answers; the tolerance of other people's
ideas; the optimism that everything will come out all right if we
permit free speech. Dixie Sanner and her organization Enough is
Enough do not manifest humility, tolerance or optimism when th

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

In ITALY: ZERO! BBS: +39-11-6507540

UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #10.21
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT