Computer underground Digest Sun Feb 12, 1995 Volume 7 : Issue 12 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copi Editor: E. T. NaShrdlu CONTENTS, #7.12 (Sun, Feb 12, 1995) File 1--If Amended, the Implications of Exon's Bill (S 314) File 2--UofMich student expelled for "obscene" story on Net (fwd) File 3--Re: Cu Digest, #7.09 - Libel international File 4--Defamation in cyberspace File 5--Internet Censorship in Africa (fwd) File 6--*** STILL CENSORED *** (fwd) File 7--Cu In The News File 8--Conferences that may be of interest File 9--Cu Digest Header Info (unchanged since 25 Nov 1994) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. ---------------------------------------------------------------------- Date: Wed, 8 Feb 1995 15:04:19 -0500 (EST) From: slowdog <slowdog@WOOKIE.NET> Subject: File 1--If Amended, the Implications of Exon's Bill (S 314) If Sen. Exon's bill passes, this will be the text of the law. Items in [brackets] are the portions that are being deleted or changed. The text itself that is not within these brackets is how the law will look. Comments to follow. 47 USC Sec. 223 TITLE 47 CHAPTER 5 SUBCHAPTER II Sec. 223. [Obscene or harassing telephone calls in the District of Columbia or in interstate or foreign communications] Obscene or harassing utilization of telecommunications devices and facilities in the District of Columbia or in interstate or foreign communications (a) Prohibited acts generally Whoever - (1) in the District of Columbia or in interstate or foreign communication by means of [telephone] telecommunications device - (A) [makes any comment, request, suggestion or proposal] makes, transmits, or otherwise makes available any comment, request, suggestions, proposal, image, or other communication] which is obscene, lewd, lascivious, filthy, or indecent; (B) [makes a telephone call, whether or not conversation ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number] makes a telephone call or utilizes a telecommunications device, whether or not conversation or communications ensues, without disclosing his identity with intent to annoy, abuse, threaten, or harass any person at the called number or who receives the communication; (C) makes or causes the telephone of another repeatedly or continuously to ring, with intent to harass any person at the called number; or (D) [makes repeated telephone calls, during which conversation ensues, solely to harass any person at the called number; or] makes repeated telephone calls or repeatedly initiates communication with a telecommunications device, during which comversation or communication ensues, solely to harass any person at the called number of who receives the communication; or (2) knowingly permits any [telephone] telecommunications facility under his control to be used for any purpose prohibited by this section, shall be fined not more than [$50,000] $100,000 or imprisoned not more than [six months] 2 years, or both. (b) Prohibited acts for commercial purposes; defense to prosecution (1) Whoever knowingly - (A) within the United States, by means of [telephone], telecommunications device makes (directly or by recording device) any obscene communication for commercial purposes to any person, regardless of whether the maker of such communication [placed the call] placed the call or initiated the conversation; or (B) permits any [telephone] telecommunications facility under such person's control to be used for an activity prohibited by subparagraph (A), shall be fined in accordance with title 18 or imprisoned not more than two years, or both. (2) Whoever knowingly - (A) within the United States, [by means of telephone, makes] by means of telecommunications device, makes, knowingly transmits, or knowingly makes available (directly or by recording device) any indecent communication for commercial purposes which is available to any person under 18 years of age or to any other person without that person's consent, regardless of whether the maker of such communication [placed the call] placed the call or initiated the communication; or (B) permits any [telephone] telecommunications facility under such person's control to be used for an activity prohibited by subparagraph (A), shall be fined not more than [$50,000] $100,000 or imprisoned not more than [six months] 2 years, or both. (3) It is a defense to prosecution under paragraph (2) of this subsection that the defendant restrict access to the prohibited communication to persons 18 years of age or older in accordance with subsection (c) of this section and with such procedures as the Commission may prescribe by regulation. (4) In addition to the penalties under paragraph (1), whoever, within the United States, intentionally violates paragraph (1) or (2) shall be subject to a fine of not more than [$50,000] $100,000 for each violation. For purposes of this paragraph, each day of violation shall constitute a separate violation. (5)(A) In addition to the penalties under paragraphs (1), (2), and (5), whoever, within the United States, violates paragraph (1) or (2) shall be subject to a civil fine of not more than [$50,000] $100,000 for each violation. For purposes of this paragraph, each day of violation shall constitute a separate violation. (B) A fine under this paragraph may be assessed either - (i) by a court, pursuant to civil action by the Commission or any attorney employed by the Commission who is designated by the Commission for such purposes, or (ii) by the Commission after appropriate administrative proceedings. (6) The Attorney General may bring a suit in the appropriate district court of the United States to enjoin any act or practice which violates paragraph (1) or (2). An injunction may be granted in accordance with the Federal Rules of Civil Procedure. (c) Restriction on access to subscribers by common carriers; judicial remedies respecting restrictions (1) A common carrier within the District of Columbia or within any State, or in interstate or foreign commerce, shall not, to the extent technically feasible, provide access to a communication specified in subsection (b) of this section from the [telephone] telecommunications device of any subscriber who has not previously requested in writing the carrier to provide access to such communication if the carrier collects from subscribers an identifiable charge for such communication that the carrier remits, in whole or in part, to the provider of such communication. (2) Except as provided in paragraph (3), no cause of action may be brought in any court or administrative agency against any common carrier, or any of its affiliates, including their officers, directors, employees, agents, or authorized representatives on account of - (A) any action which the carrier demonstrates was taken in good faith to restrict access pursuant to paragraph (1) of this subsection; or (B) any access permitted - (i) in good faith reliance upon the lack of any representation by a provider of communications that communications provided by that provider are communications specified in subsection (b) of this section, or (ii) because a specific representation by the provider did not allow the carrier, acting in good faith, a sufficient period to restrict access to restrict access to communications described in subsection (b) of this section. (3) Notwithstanding paragraph (2) of this subsection, a provider of communications services to which subscribers are denied access pursuant to paragraph (1) of this subsection may bring an action for a declaratory judgment or similar action in a court. Any such action shall be limited to the question of whether the communications which the provider seeks to provide fall within the category of communications to which the carrier will provide access only to subscribers who have previously requested such access. =========================== > (a) Prohibited acts generally > > Whoever - > > (1) in the District of Columbia or in interstate or foreign > communication by means of [telephone] telecommunications > device - > > (A) [makes any comment, request, suggestion or proposal] > makes, transmits, or otherwise makes available any comment, > request, suggestions, proposal, image, or other communication] > which is obscene, lewd, lascivious, filthy, or indecent; Here's an important bit. "Transmits or otherwise makes available" is different from the earlier law. It DOES pleace a burden of responsibility upon the provider of service. NOTE that unlike other portions of the law, boths old and new versions, this part DOES NOT include the word "knowingly". Crucial, crucial point. > (B) [makes a telephone call, whether or not conversation > ensues, without disclosing his identity and with intent to > annoy, abuse, threaten, or harass any person at the called > number] makes a telephone call or utilizes a telecommunications > device, whether or not conversation or communications ensues, > without disclosing his identity with intent to annoy, abuse, > threaten, or harass any person at the called number or who > receives the communication; No anonymous annoying! Does this mean we can't raid IRC channels anymore? Or flame people from anon.petit.fi (sp?) accounts? ------------------------------ Date: Sun, 5 Feb 1995 22:44:32 -0600 (CST) From: David Smith <bladex@BGA.COM> Subject: File 2--UofMich student expelled for "obscene" story on Net (fwd) ---------- Forwarded message ---------- From--jgull@umich.edu (Jason Gull) Date--4 Feb 1995 20:14:29 GMT The local (Ann Arbor, MI) paper ran a story yesterday regarding a sophomore at the University of Michigan (whose name is Baker, I believe) who was expelled yesterday (or Thursday) as a result of a story he "transmitted on the Internet." The story the student wrote apparently involved the brutal rape and torture of a woman. The name of the woman in the story is also the name of another student on campus, which seems to have been the spark that got the kid kicked out. The story seems to have been in one of the alt.sex USENET groups, because according to the paper, the story was first brought to the attention of University officials by an alumnus -- an attorney in Moscow who just happened to spot the story on USENET. The irony of the fact that this morality-policeman in Moscow was scouring the alt.sex groups is apparently lost on the Ann Arbor News. What is truly frightening, and deserving of more coverage in the news, is that the FBI is now investigating this kid, and an agent in the local FBI office has officially stated that they're contemplating federal obscenity charges against him. Remember, this isn't pictures/video he's accused of sending, it's purely text. (Raunchy, disgusting text, I'm sure, but plain 'ol ASCII). Anyone have any other news on this? (I'll post more when I find it.) ------------------------------ Date: Mon, 6 Feb 1995 14:41:02 -0500 From: kingego@IO.ORG(Greg Boyd) Subject: File 3--Re: Cu Digest, #7.09 - Libel international >Date: Tue, 10 Jan 1995 10:47:24 -0600 >Subject--Re: Libel & Defamation in the Information Age > >Several clarifications are needed and will, I think, >ease people's minds abit. > >Eric Eden r3eje@vm1.cc.uakron.edu wrote, in part: ... >> Other users have the right to sue you for defamation if they can prove >> you damaged their reputation or good name with false information. > >Absolutely right. It is the _plaintiff_ who must prove that a >wrong has been >done. See further mention below. Of course, this discussion is based on American libel law. The Net, however, is accessible from countries with different rules. In Canada and the United Kingdom, for example, the customary burden of proof shifts in defamation cases; if someone sues a newspaper for libel in Canada, the lawyers *for the paper* must show that the reporter and editors did no wrong -- one result of this is that the defence of truth is used sparingly, since it necessitates providing a legal proof of every word in a newspaper story. Libel trials are extremely rare in Canada, perhaps because the expense of legally proving a piece of journalism runs into the hundreds of thousands of dollars. In addition, countries that use British common law principles do not admit the defense of absence of malice, which is a uniquely American idea. (Yes, we are jealous.) My main point is that, since the Net is international, perhaps a party who felt themselves wronged could sue for libel in a jurisdiction where the laws are weighted more in favor of the plaintiff than is possible in the U.S.A. (Just like recent Net-related prosecutions in the U.S.A., in which BBS operators from one state find themselves defending charges originating from another, generally less civilized state.) Some years ago a political figure in a Caribbean country brought a libel suit againt an American television network. His lawyers brought the suit into a Canadian court, stating that since the program had been available to Canadian cable viewers, this was jusified (most in Canada believed it was because of our plaintiff-friendly libel laws.) P.S.: I am not a lawyer, and therefore unqualified to render a useful opinion on international Net libel law. I submit this as a journalist with some practical knowledge of libel and defamation law, and in the hopes that you may encourage a real expert to address my observations. ------------------------------ Date: Sun, 05 Feb 95 13:57:18 From: "Carolina, Robert" <Robert.Carolina@CLIFFORDCHANCE.COM> Subject: File 4--Defamation in cyberspace In a recent exchange on this topic in CuD 7.09, Eric Eden <R3eje@vml.cc.uakron.edu> and Henry Itkin <Henry.Itkin@UNI.edu> have been disagreeing about burdens of proof in defamation cases. This can be a complicated area because the actual process of the law tends to be shortened into various "rules of thumb" such as "if you can prove it is true you are probably not liable". Just to clarify the process under common law (i.e. individual US state law), roughly speaking: 1. The plaintiff (the alleged victim) in a defamation case has the burden of proving that the defendant published a defamatory statement. "Publisher" by the way includes the author as well as the actual publication in which the defamation is printed. The plaintiff does NOT have to prove that the statement is untrue. (But see discussion below.) 2. If the plaintiff can show this first step is completed, then the assumption is that the defendant is liable. It is now the DEFENDANT's burden to show why he or she should not be held liable. One such affirmative defense is "truth". That is, if he can prove that the statements made are true then he will not be held liable. 3. Note that each state has the opportunity to alter the rules presented above, and some US states have tougher or weaker standards. Most US states do not change the standards due to point number 4 below. 4. If you live in a jurisdiction where the 1st Amendment to the US Constitution applies, there is a Federal Constitutional issue which comes into play. (Bear with me, it has been a while since law school.) If the plaintiff (alleged victim) in a case is deemed to be a "public figure", then he is required to prove that the defendant had actual malice when making the statement in question. There are a number of cases which define how public you have to be before you are a "public figure", and I won't go into that. But assuming that the plaintiff IS a public figure, then the matter will turn on whether he can prove actual malice. (Hold on tight, here is where the confusion sets in.) One method used to demonstrate actual malice is for the plaintiff to show BOTH that the statement is false, and that the author should have known it was false when he made the statement. Obviously, no journalist will go through this detailed set of calculations before writing a story. (If he asks us, of course, we do the calculations for him). Instead, the journalist operates on a rule of thumb that "if I can prove it's true I am probably all right". This is a fairly cautious restatement of the standard above and will probably help to keep people out of trouble, but if in doubt please consult with a lawyer familiar with your own case and local law. (If, like me, you live in a common law jurisdiction where the 1st Amendment does NOT apply, then you need to be much more cautious than in the US. In fact, be aware that when you post to the Usenet you are probably "publishing" in the UK as well.) Finally (home stretch) if the court determines that the defendant is liable for defamation, the next question is "how much does he have to pay". This is the question of damages. The relevant inquiry is: "how much damage can the plaintiff show as a result of the defamatory publication". If one were to publish allegations in the New York Times that a stock broker is a "cheat and embezzler", then this will probably damage the person quite a bit. If, on the other hand, you send an e-mail to one friend alleging that your neighbour slapped you while hanging up clothes, this will probably not generate a huge amount of damages. If you want to read more about it, I co-authored a piece entitled "Multimedia Defamation" which appeared last year in International Media Law Review. In addition, my colleague Nick Braithwaite has an article on this subject which should be accessible on our firm's World Wide Web server. The URL is http://www.cliffordchance.com/ ------------------------------ Date: Thu, 9 Feb 1995 22:28:38 -0600 (CST) From: David Smith <bladex@BGA.COM> Subject: File 5--Internet Censorship in Africa (fwd) ---------------- From--Emmanuel@critical.demon.co.uk (Emmanuel Ohajah) Subject--Internet Censorship in Africa Dear All, Back in June 1994 I wrote an article (Computer Weekly June 16 1994 Computer privacy, Highway patrol) which was very critical of the creeping censorship and government control of computer networks in the UK and USA Since then I have been told that IT experts in Africa wishing to develop computer networks, set up internet connections or even use a telecommunications provider other that the state PTT face similar obstacles from their respective governments. What's more phone calls are routinely monitored and satillite access is restricted or at least discouraged. A visiting civil rights lawyer from Cameroon suggested to me that many African governments do not want to see a proliferation of communications mediums because they will be unable to keep track of their subjects. I am not sure if this is true but I would appreciate details of any overzealous African government attempts at monitoring internet traffic or censorship of electronic communications. If any African governments have given any justifications for the control or censorship of electronic communications please speed the details to me! Thanks in advance. Emmanuel Ohajah If you would like to see my article and other research then please mail me at Emmanuel@critical.demon.co.uk ------------------------------ Date: Sat, 11 Feb 1995 12:43:01 -0600 (CST) From: David Smith <bladex@BGA.COM> Subject: File 6--*** STILL CENSORED *** (fwd) ---------- Forwarded message ---------- From--dan.gannon@nwcs.org (Dan Gannon) Date--Fri, 10 Feb 1995 05:35:54 GMT STILL CENSORED FROM THE INTERNET! Banished CPU has been -- and remains -- censored from the Internet. The (Canadian) CBC PrimeTime News camera crew has recently interviewed me for 4 hours about the situation. We are being unscrupulously censored for politically and financially motivated reasons. Here is the complete story: Banished CPU, a Freedom of Speech BBS, has been distributing Holocaust Revisionist material through the Internet since 1991. The material addresses, in an objective manner, the question of WHAT REALLY HAPPENED during the so-called "Holocaust". The facts are both "politically inconvenient" and undeniable. Over the years, organized Jewish pressure has succeeded in cutting off our link to the Internet numerous times, using their traditional methods of boycott, slander and terror. Netcom, a large commerical Internet provider based in San Jose, California, served as our latest connection to the Internet for almost a year, until they censored Banished CPU on November 26, 1994, violating the contract they had formed with me. Before I signed on with Netcom, I informed them of the nature of the material I distribute, and inquired about the level of Freedom of Speech they offer. I was told -- by a Netcom sales representitive who identified herself as "Sherri" -- there would be no restrictions or censorship of any kind, as long as the material conformed to U.S. law (which, of course, it does.) Agreeing to the stated terms, I paid the initial sign-up fee and continued paying them each month for the connection to the Internet. After a couple months of organized Jewish pressure, an unsigned electronic message arrived from Netcom, informing me that I would no longer be allowed to distribute messages in most Internet message areas (USENET newsgroups). The message specified only 12 newsgroups that I would be allowed to post to, forbidding me from posting to any of the other 7,000+ newsgroups (including many 100% appropriate newsgroups such as soc.history!) The message stated plainly that they were not willing to discuss the issue. For months, I reluctantly obeyed the new "rule", even though it violated the verbal contract they had entered into earlier. Then I distributed a Free Video Offer to a couple dozen newsgroups outside of their arbitrary list of 12. The video was "David Cole Interviews Dr. Franciszek Piper", which greatly infuriated and panicked the Holocaust Lobby. David Cole, producer of the video, is Jewish -- NOT a "Nazi" or an "anti-Semite" by any means. Hundreds of copies were sent all over the world within a matter of weeks. Requests were still pouring in when we were abruptly cut off. At first, Jewish pressure tried to get me kicked off for "profiteering" (an informal taboo on the Internet). A lady named Margaret from Netcom wrote to me, informing me of the complaints and asking me to cease and desist. In reply, I pointed out that I was not "profiteering" by any stretch of the imagination -- I was merely giving out free, legal copies of someone else's video, and not collecting any money whatsoever. Margaret wrote back, apologizing for the misunderstanding. The next day, however, I discovered that our link to the Internet was no longer functional. I made countless long distance phone calls to Netcom's offices in California. I left messages with receptionists for their managers, supervisors and technical support staff. For eight full days, nobody at Netcom would take or return my calls. In the meantime, Banished CPU's link to the outside world was cut, effectively censoring me and all of my callers. I discovered that Netcom was DELETING all of my callers' mail, which was in many cases both important and irreplaceable. Finally, after 8 days of silence, someone at Netcom called and left a message on my answering machine, informing me that Banished CPU had been cut off because I posted to newsgroups other than the 12 that they had illegally mandated. They violated their contract, bowing to the Jewish demands to censor me. Now, almost 3 months after Netcom first censored us, I am still unable to procure another Internet connection, even though one small Internet provider ("Quicknet") has supposedly been trying to provide us with a link. According to Quicknet, some "Internet committee" or individual (whose Internet e-mail address is root@internic.net) is refusing to process the necessary re-registration form. Censored we remain. In the meantime, messages addressed to myself and my callers are reportedly still being deleted by Netcom, returning no warning message whatsoever -- giving the impression that the messages are received but ignored. Netcom continues in their unethical behavior, and is refusing to speak to the CBC PrimeTime News. Should you wish to contact Netcom and let them know how you feel about their unprofessional behavior, the following information may be of some use: Netcom's address: 400 Moorpark Avenue, Suite 209, San Jose, CA 95117 Internet e-mail address: root@netcom.com Toll-free sales line: 1-800-501-8649 Technical support line: (408) 983-5970 Emergency pager number: (408) 951-1193 Sincerely, Dan Gannon (a.k.a. Maynard) ___________________________________________________________ | | | Banished CPU supports Freedom of Speech! | | (And the Right to Keep and Bear Arms.) | | | | 28800 bps (9 lines with V.FC)............(503) 232-9202 | | 14400 bps (11 lines with V.32bis)........(503) 232-6566 | | 9600- bps (12 lines with V.32)...........(503) 232-5783 | |___________________________________________________________| ------------------------------ Date: 09 Feb 95 13:56:58 EST From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 7--Cu In The News Most Computer Intrusions Unreported =================================== The Pentagon's Center for Information Systems Security (CISS) attempts to penetrate DoD systems worldwide, via the Internet. The govt hackers were able to gain entry to systems 95% of the time, and only 5% of the break-ins were detected. Of those, only 5% were reported to higher-ups in the organizations. ComputerWorld. Jan. 30, 1995 pg.12 Spoofing and Hijacking ====================== In a related story to the above, Computerworld ran a story about CERT's alert concerning IP Spoofing and Session Hijacking. The story includes comments from several security specialists, who express concern about continued attacks of this type. ComputerWorld. Jan. 30, 1995 pg.12 InfoTerrorism ============= Sure, hackers are a problem, but what are you going to do about high- tech military-style assualts on your datacenter? The miltary-industrial complex has several weapons that could (in theory) be used by a disgruntled employee or info-terrorist. Items such as high-energy guns that emit data destroying pulses, and EMF bombs that paralize your systems, are some the technologies that threaten your system. Yet another reason to lay awake at night, worrying. ComputerWorld. Jan. 30, 1995. pg.1 Deadbeat BBS, Beat & Dead ========================= Novell and Microsoft have reached an agreement that will close the Deadbeat BBS, located in New Jersey. The teenage-sysop will pay $25,000. in damages to the software giants, in restitution for the 60+ Novell and MS products that were allegedly available for downloading on the board. ComputerWorld. Feb. 6, 1995. pg.8 Big Brother *is* Watching ========================= Analytic Concept's "GameCop" software is just what the overseer ordered. The program watches active windows on a PC to see if a game is running. If one is, a customizable message displays a stern warning for the employee to get back to work. GameCop can also, optionally, sound an alarm to embarass the slackard in front of their cellmates..err co-workers. ComputerWorld. Feb. 6, 1995. ------------------------------ Date: Wed, 8 Feb 1995 16:02:41 -0800 From: Susan Evoy <evoy@PCD.STANFORD.EDU> Subject: File 8--Conferences that may be of interest CPSR Members and Friends, If you are planning to attend one of these conferences, or another that may be related to CPSR's work, please contact CPSR at cpsr@cpsr.org or (415) 322-3778 for easy ways for you to be a presence for CPSR. CONFERENCE /EVENT SCHEDULE National Conference on Ethics in America: Promoting Trust, Truth, and Universality, Long Beach, CA, Feb. 22-24. Contact: ddavis@csulb.edu 310 985-8222 310 985-5842(fax) Technologies of Freedom: State of the Nation (A conference on the progress of the National Information Infrastructure), Washington Court Hotel, Washington, DC, Feb. 23-25. Contact: holder@apt.org 202 408-1403 202 408-1134 (fax) Midwest Conference on Technology, Employment, and Community, Chicago Circle Center, UIC, IL, March 2-4. Contact: jdav@mcs.com 312 996-5463 Unions and the Information Superhighway, March 2. Contact: 416 441-2731 Association for Practical and Professional Ethics Fourth Annual Meeting, Stouffer Concourse Hotel, Crystal City, VA, March 2-4. Contact: appe@indiana.edu 812 855-6450 National STS Meeting and Technology Literacy Conference, Arlington, VA, March 2-5. Contact: ejb2@psu.edu 814 865-3044 (ph) 814 865-3047 (fax) Midwest Conference on Technology, Employment, and Community, Chicago, IL, March 3-4. Proposals due by Jan. 8. Contact: jdav@mcs.com 312 996-5463 (ph) 312 996-5766 (fax) Local-Global Creative Tension, '95 PC Forum, Phoenix, AZ, March 5-8. Contact: daphne@edventure.com 212 924-8800 (ph) 212 924-0240 (fax) Technologies for the Superhighway, IEEE COMPCON 95, Stanford Court Hotel, San Francisco, CA, March 5-9. Contact: egrimes@aol.com (advance program) compcon95@lbl.gov(register) 510 422-2199 408 973-1325 (fax) Microcomputers in Education Conference, Arizona State University, Tempe, AZ, March 13-15. Contact: Pat Southwick, ASU, Box 870908, Tempe, AZ 85287-0908 Towards an Electronic Patient Record '95. Orlando, FL. Mar. 14-19, 1995. Sponsored by Medical Records Institute. Contact: 617-964-3926 (fax). Access, Privacy, and Commercialism: When States Gather Personal Information, College of William and Mary, Williamsburg, VA, March 17. Contact: Trotter Hardy 804 221-3826 Geographic Information Systems '95, Vancouver, BC, March 27-30. Contact: gis@unixg.ubc.ca 604 688-0188 (ph) 604 688-1573 (fax) Computers, Freedom and Privacy CFP'95, Burlingame CA, Mar 28-31 Contact: info.cfp95@forsythe.stanford.edu ETHICOMP95: An international conference on the ethical issues of using Information Technology, DeMontfort University, Leicester, ENGLAND, March 28-30, 1995. Contact: Simon Rogerson srog@dmu.ac.uk 44 533 577475 (phone) 44 533 541891 (Fax). National Net '95: Reaching Everyone. Washington, DC. Apr. 5-7, 1995. Sponsored by EDUCOM. Contact: net95@educom.edu or call 202/872-4200. Information Security and Privacy in the Public Sector. Herdon, VA. Apr. 19-20, 1995. Sponsored by AIC Conferences. Contact: 212/952-1899. Cultivating New Ground in Electronic Information Use of the Information Highway to Support Agriculture - USAIN, Lexington, KY, April 26-29. Proposals for solicited papers or project demonstrations by 12/31/94. Contact: librgrf@gaes.griffin.peachnet.edu ACM Conference on Computer Human Interaction (CHI'95), Denver, CO, May 7-11. Contact 410 263-5382 chi95@sigchi.acm.org http://info.sigchi.acm.org/sigchi/chi95.html 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 8-10. Contact: sp95@itd.nrl.navy.mil NPTN's Annual Affilate & Organizing Committee Meeting --1995: An International Free-Net Community Computing Conference, Arizona State University, May 17-20. Contact: pfh@nptn.org 216 498-4050 216 498-4051 (fax) http://www.nptn.org/ ErgoCon '95 - Silicon Valley Ergonomics Conference & Exposition, San Jose, CA, May 22-24. Contact: Abbas Moallem 408 924-4132 (ph) 408 924-4153 (fax). Proposals for papers, posters, workshops, or panel discussions: Deadline Nov. 1 Third International Conference on Artificial Intelligence Applications on Wall Street, Pace University, New York, NY, June 7-9. Contact: satwell@mcimail.com 914 763-8820 (ph) 914 763-9324 (fax) Identifying Grand Challenges in Socially Responsible Computing, Durango, CO, June 11-14. Contact: Ben Shneiderman ben@cs.umd.edu IDT 95 12th Congress - Information Markets and Industries, Paris, FRANCE, June 13-15. Organized by ADBS (Society of information professionals), ANRT (National Association of Technological Research), and GFII (French association of information industries). Contact: 33 1 43 72 25 25 (ph) 33 1 43 72 30 41 (fax) Workshop on Ethical and Professional Issues in Computing, RPI, Troy, NY, June 24-28. Deadline for submissions: April 15. Contact: cherkt@rpi.edu 518 276-8503 518 276-2659 (fax) Internet Society's 1995 International Networking Conference, Honolulu, HI, June 28-30. Abstract submission deadline Jan 13. Contact: http://www.isoc.org/inet95.html inet95@isoc.org 703 648-9888(ph) Key Players in the Introduction of Information Technology: Their Social Responsibility and Professional Training, BELGIUM, July 5-7, 1995. Contact: nolod@ccr.jussieu.fr clobet@info.fundp.ac.be Paper submissions by Nov. 2, 1994 Alliance for Community Media's International Conference and Trade Show, Boston, MA, July 5-8. Proposal Submissions by 1/31/95. Contact: Rika Welsh 617 321-6400 617 321-7121 (fax) 18th International Conference on Research & Development in Information Retrieval, The Sheraton, Seattle, WA, July 9-11. Contact: sigir95@u.washington.edu Joint International Conference Association for Computers and the Humanties- Association for Literacy and Linguistic Computing 95, University of California, Santa Barbara, July 11-15. Deadline for paper submissions: Dec. 31. Contact: Eric Dahlin: hcf1dahl@ucsbuxa.ucsb.edu 805 687-5003 Tenth Annual Conference on Computing and Philosophy (CAP), Pittsburgh, PA, Aug. 10-12. Contact: Robert Cavalier rc2z@andrew.cmu.edu 412 268-7643 Conference on Organizational Computing Systems COOCS '95, Sheraton Silicon Valley, Milpitas, Aug. 13-16. Paper Submissions by 1/4/95. Contact: kling@ics.uci.edu. Computers in Context: Joining Forces in Design, Aarhus, DENMARK, Aug. 14-18. Contributions for papers, proposals for panels, workshops, and tutorials (in 6 copies - not by facsimile or e-mail)): Deadline for receipt Jan 5. Contact: Computers in Context, Aarhus University, Dept. of Computer Science, Bldg. 540, Ny Munkegade 116, DK-8000 Aarhus C, DENMARK. Libraries of the Future - IFLA. Istanbul, TURKEY, Aug. 16-19. Contact: mkutup-o@servis.net.tr AI-ED '95: 7th World Conference on Artificial Intelligence in Education, Washington, DC, Aug. 16-19. Contact: aace@virginia.edu 804 973-3987 "Designing for the Global Village," HFES, Sheraton Harbor Island Hotel, Santa Monica, CA, October 9-13. Contact: 72133.1474@compuserve.com 310 394-1811 310 394-2410 (fax) ------------------------------ Date: Thu, 23 Oct 1994 22:51:01 CDT From: CuD Moderators <tk0jut2@mvs.cso.niu.edu> Subject: File 9--Cu Digest Header Info (unchanged since 25 Nov 1994) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: Bits against the Empire BBS: +39-461-980493 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the NIU Sociology gopher at: URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.12 ************************************