Computer underground Digest Sun Mar 12, 1995 Volume 7 : Issue 20 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Semi-retiring Shadow Archivist: Stanton McCandlish Correspondent Extra-ordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Monster Editor: Loch Nesshrdlu CONTENTS, #7.20 (Sun, Mar 12, 1995) File 1--NPTN 1995 Annual Meeting (fwd) File 2--GII Free Expression Letter File 3--Cu Digest Header Info (unchanged since 26 Feb, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. ---------------------------------------------------------------------- Date: Sun, 22 Jan 1995 11:06:37 -0600 (CST) From: David Smith <bladex@BGA.COM> Subject: File 1--NPTN 1995 Annual Meeting (fwd) ---------- Forwarded message ---------- Date--Fri, 20 Jan 1995 14:49:17 -0500 (EST) From--Peter F. Harter <pfh@nptn.org> <REPOST FREELY AND WIDELY IN ITS ENTIRETY> NPTN's Annual Affiliate & Organizing Committee Meeting -- 1995: An International Free-Net Community Computing Conference MAY 17-20, 1995 In The Valley of the Sun at Arizona State University, Computing Commons Building, Tempe, Arizona, U.S.A. Sponsored By: The National Public Telecomputing Network (NPTN) Arizona Telecommunication Community (AzTeC) Computing Arizona State Public Information Network (ASPIN) 1. The Annual Meeting: NPTN is proud to announce the preliminary details for the Annual Affiliate and Organizing Committee Meeting. AzTeC, NPTN's first Free-Net Affiliate in Arizona, is playing host with Arizona State University at their tremendous Computing Commons facility. This announcement is preliminary in scope but all details of place and time are set. Registration forms and detailed travel and entertainment information will be forthcoming. The purpose of this announcement is to alert the Free-Net community and its friends and interested parties of what promises to be a watershed event. 1994 was an exciting year for Free-Nets in terms of growth and issues. 1995 promises to be even more critical as the medium we work and play in changes around us. Free-Net community computing systems lead the community networking movement; however, many issues and potential problems demand comprehensive review and discussion. Without a convergence of ideas and thinking, progress and future growth will be difficult. Hence the Annual Meeting will be a working meeting involving the direct participation of folks from Free-Net Affiliates, Organizing Committees, and special guest experts. (Please see the call for participation and topic suggestions below.) It is not a conference where speakers pontificate about how things can be or should be. Instead, the structure and strategy focuses on enlisting the creativity, energy, and leadership of members of the Free-Net family itself. While the Annual Meeting will be an open meeting (e.g., users, companies, institutions, other community computer systems), priority will be given to NPTN Affiliates and Organizing Committees. Work product and resolution of issues is key; however, fun is in the mix: High profile speakers will be featured in the evenings; information describing entertainment options will made available so that one can take in Arizona before and or after the Annual Meeting. New information is integrated into the Annual Meeting: A vendor array area will be available for attendees to peruse and sample. Vendors will come from a wide variety of nonprofit and commercial areas. 2. The Preliminary Agenda: Since the Annual Meeting focuses on hitting hard issues head on, a structure has been devised. This structure aims to provide a robust exchange of information and discussion by all in attendance by breaking down issues into topic tracks, numbered in no particularly order or importance below. These track numbers correspond to the panels and work groups in the following proposed agenda. Since it is a proposed agenda, however, it is subject to change based upon ideas submitted during the call for participation phase (see below). Topic Tracks: # 1 - Legal # 2 - Funding # 3 - Content # 4 - Management # 5 - Technical Daily Schedule: <PLEASE NOTE: This is a draft agenda and will be modified as suggestions are made by participants and attendees so that the Annual Meeting will fulfill the interests of Affiliates and Organizing Committees.> WEDNESDAY, MAY 17, 1995: "Registration & Settling In" 2-8pm Registration materials, refreshments at the Computing Commons. 6-10pm Dinner in "Old Town" Tempe: Folks can enjoy the diverse cuisine offered in this fine town, engage in "birds of a feather" groups at local watering holes, and meet those folks behind the e-mail. THURSDAY, MAY 18, 1995: "State of the Network & Opportunities Ahead" 7:30-8:30 Continental Breakfast (Kaleidoscope Room & Computing Commons) -- Time to check e-mail at the electronic cafe of free computer terminals, to check out the vendor array, to continue some of those conversations from last night over some coffee, fresh fruit, juice, bagels and other fare. 8:30-8:40 Welcoming Remarks -- Peter Harter (NPTN), Joe Askins (AzTeC), and Skip Brand (ASPIN) 8:40-9:00 State of the Free-Net Network Address -- Dr. Thomas Grundner (NPTN) 9:00-10:30 Panel I: "Concepts of a Free-Net" * Moderator - leads panel through a dialogue and facilitates Q&A * Five panelists present and then lead work groups in the afternoon. # 1 - Competition with private industry. # 2 - Fees and types of fee based revenue streams. # 3 - Local Content: Local people and institutions using and developing Local information resources to fulfill Local information needs under Local governance and participation. # 4 - Defining a Free-Net that is manageable and sustainable. # 5 - The Rural Information Network: Advances in hardware, software and communications technologies that make starting and operating a Free-Net easier and more effective. 10:30-11:00 Refreshment Break (Kaleidoscope Room & Computing Commons) 11:00-12:30 Panel II: "Laws and Liabilities of Electronic Communities" * Moderator -- * Five panelists -- # 1 - Insurance issues, needs, and packages. # 2 - Advertising / Information Providers. # 3 - Copyright Infringement. # 4 - Acceptable Use Policies and User Registration Contracts. # 5 - Security Issues and Contingency Plans. 12:30-1:30 Boxed Lunch (Kaleidoscope Room & Computing Commons) Take your lunch with you to enjoy the breezes along the walks lined with palm trees or up to the plaza gazing over campus to relax and take in the sunshine. 1:30-3:00 Panel I Work Groups: Break out into discussion groups led by topic track panelists; policy development and production of summary reports. 3:00-3:30 Refreshment Break (Kaleidoscope Room & Computing Commons) 3:30-5:00 Panel II Work Groups: Break out into discussion groups led by topic track panelists; policy development and production of summary reports. 5:00-6:00 Break: Visit the electronic cafe to do e-mail, the vendor array in the Kaleidoscope Room, talk a walk around campus and town, help your work group chair put together his summary report and submit it electronically, or take a swim at your hotel. 6:00-7:00 Happy Hour 7:00-9:00 Banquet Dinner & Pizzazz Speaker either live or via CU-See-Me with Q&A. FRIDAY, MAY 19, 1995 7:30-8:30 Continental Breakfast (Kaleidoscope Room & Computing Commons) -- Time to check e-mail at the electronic cafe of free computer terminals, to check out the vendor array, to continue some of those conversations from last night over some coffee, fresh fruit, juice, bagels and other fare. 8:30-9:00 International Issues in Community Computing -- TBA 9:00-10:30 Panel III: "Economics & Sustainability Structures" * Moderator -- * Five panelists -- # 1 - 501(c)(3): Revenue Streams and Funding Sources. # 2 - New Business Model for Free-Nets. # 3 - Content as a revenue stream. # 4 - Financial planning and purchasing strategies. # 5 - Configuration and scaling up to meet demand: scalable dialup versus network access. 10:30-11:00 Refreshment Break (Kaleidoscope Room & Computing Commons) 11:00-12:30 Panel IV: "Global Gateway: Paths Forward" * Moderator -- * Five panelists -- # 1 - Transborder, regional, and cross-industry Partnerships or Access Issues As Seen From Afar # 2 - NTIA's TIIAP 1995 and other grants in building the GII # 3 - WWW and linking Tempe to Timbuktu # 4 - Agile Business Practices in an international medium # 5 - Platform and system standardization? Solutions toward seamless operation of a decentralized network of disparate community computer systems. 12:30-1:30 Boxed Lunch (Kaleidoscope Room & Computing Commons) Take your lunch with you to enjoy the breezes along the walks lined with palm trees or up to the plaza gazing over campus to relax and take in the sunshine. 1:30-3:00 Panel III Work Groups: Break out into discussion groups led by topic track panelists; policy development and production of summary reports. 3:00-3:30 Refreshment Break (Kaleidoscope Room & Computing Commons) 3:30-5:00 Panel IV Work Groups: Break out into discussion groups led by topic track panelists; policy development and production of summary reports. 5:00-6:00 Break: Visit the electronic cafe to do e-mail, the vendor array in the Kaleidoscope Room, talk a walk around campus and town, help your work group chair put together his summary report and submit it electronically, or take a swim at your hotel. 6:00-7:00 Happy Hour 7:00-9:00 Banquet Dinner & Pizzazz Speaker either live or via CU-See-Me with Q&A. SATURDAY, MAY 21, 1995 ** This day is for NPTN Affiliates and Organizing Committees only. ** 8:00-8:30 Continental Breakfast (Computer Commons) 8:30-11:00 Affiliate Council Meeting: Making an underutilized resource productive and how NPTN can better support its work. 10:00 Refreshments 11:00-1:30 Board of Trustees Meeting 12:00 Boxed lunches 1:30 --- Golf, touring, dinner in Phoenix for birds of a feather.... Call for Participation: Since this meeting is for the members of the Free-Net family, participation is integral to the Annual Meeting. Participation entails speaking on a panel and then leading and chairing the corresponding work group in the afternoon that same day. Preparation would not be lengthy as one's panel remarks will only be fifteen minutes in length. The substance of one's thoughts will come out during the Q&A sessions following each panel and during the intensive work groups in the afternoon which will produce an electronic summary of their conclusions that will be published in an Annual Meeting report. Interested parties should submit a topic and brief explanation of why they are interested in speaking to NPTN, care of <cfp@nptn.org> -- the "call for participation" mailbox. Participants will be selected and finalized by May 1, 1995. All panel discussion and work group break out rooms are equipped with computers, audio-visual equipment, white boards, and other tools. Special requests for equipment and or setup will be answered and accommodated as best can be done. Registration Information: Quality and attendee satisfaction is a high priority: From complimentary telephone debit cards, to guest Internet accounts, to computer terminal and printer use privileges, to a highly results driven agenda, the Annual Meeting aims to fulfill people's interests and needs during their stay in Tempe. The Annual Meeting fee goes toward defraying food, facilities, and materials costs. NPTN, AzTec, and ASPIN have budgeted the event at an at-cost rate so that none of us loses our shirts: For NPTN Affiliates & Organizing Committees: PRE-REGISTRATION (BEFORE April 15, 1995) - $150.00 U.S. LATE REGISTRATION (AFTER April 15, 1995) - $200.00 U.S. For All Others: PRE-REGISTRATION (BEFORE April 15, 1995) - $200.00 U.S. LATE REGISTRATION (AFTER April 15, 1995) - $250.00 U.S. Accommodations & Transportation: Since Arizona State University resides in a "college town" hotels, restaurants, bars, shops and various points of interest are all within a few minutes walk of the campus and the Computing Commons building. Three hotels have been selected for their rates and proximity to campus. Special rates have been negotiated; however, earlier reservations are necessary in order to guarantee the low Annual Meeting rate. Most provide for a free shuttle from the Phoenix International Airport -- a commercial shuttle is also available for a nominal fee. Hence, renting a car for the duration of the Annual Meeting is unnecessary. However, in making plans to travel to Tempe, one can certainly rent a car to see some of the sights nearby before and or after the Meeting. (More tourism information will be made available soon.) It is recommended that one make airline reservations earlier so as to take advantage of discounts. A detailed listing of hotels, pricing, and contact information will be made available to those that inquire to <amq@nptn.org> -- "annual meeting questions" e-mail address. It is recommended that individuals considering attending make their hotel reservations in advance as hotel space in May in Tempe, AZ, can be at a premium due to other conferences and events. From our surveying of hotels it is recommended that folks make their hotel arrangements before March 10, 1995. GENERAL QUESTIONS: General conference questions can be directed to <amq@nptn.org> -- "annual meeting questions". MORE INFORMATION COMING!!! This material and additional details will become available on NPTN's Web site <http://www.nptn.org/> after Feb. 1, 1995. Further updates and details can be had at NPTN's ftp site and by e-mail and by snailmail after Feb. 1st. END. ***** --- Peter F. Harter, Executive Director & General Counsel The National Public Telecomputing Network (NPTN) Offices: 30680 Bainbridge Road, Solon, Ohio 44139-2268 U.S.A. U.S. Mail: P.O. Box 1987, Cleveland, Ohio 44106-0187 U.S.A. E-mail: pfh@nptn.org Voice: 216/498-4050 Fax: 216/498-4051 Free-Net is a service mark of NPTN registered in the U.S. and other countries. ------------------------------ Date: 17 Feb 1995 14:15:16 -0500 From: "Dave Banisar" <banisar@EPIC.ORG> Subject: File 2--GII Free Expression Letter ------------------ HUMAN RIGHTS WATCH ------------------ For Immediate Release For Further Information, Please Contact: Ann Beeson phone: 212-972-8400 x258 e-mail: beesona@hrw.org Gara LaMarche phone: 212-972-8400 x207 e-mail: lamarcg@hrw.org Marc Rotenberg phone: 202-544-9240 e-mail: rotenberg@epic.org HUMAN RIGHTS AND CIVIL LIBERTIES GROUPS URGE GORE TO PROTECT FREE EXPRESSION ON INFO-HIGHWAY February 16, 1995 -- A coalition of leading human rights and civil liberties groups today urged Vice President Al Gore to carry the banner of free speech to Brussels where the G-7 will meet next week to discuss the future of the global information infrastructure (GII). The coalition alleges that the current U.S. agenda for the GII is incomplete because it fails to include core free expression principles. The Clinton Administration has stated that it wants to achieve support from the G-7 for five basic principles for building the GII: encouraging private investment; promoting competition; creating a flexible regulatory environment; providing open access to networks and services for providers and users; and ensuring universal service. The Administration gave a detailed description of these principles in a document released yesterday entitled "The Global Information Infrastructure: Agenda for Cooperation." The coalition asks the U.S. to add a "sixth principle" for adoption at next week's G-7 gathering that "explicitly recognizes a commitment to protect and promote the free exchange of information and ideas on the GII." The letter (a copy of which is attached) recommends that the Clinton Administration: -protect against censorship and promote diverse ideas and viewpoints on the GII. -support broad access to the GII by people of all nations. -promote strong information privacy rights on the GII. The group points to the inevitable impact the GII will have on social, political, and economic life. If properly designed, the GII will "motivate citizens to become more involved in decisionmaking at local and global levels as they organize, debate, and share information unrestricted by geographic distances or national borders." The letter was signed by Human Rights Watch, Electronic Privacy Information Center, American Civil Liberties Union, American Library Association, Article 19, Center for Democracy and Technology, Electronic Frontier Foundation, People for the American Way, and Privacy International. ---------------------- February 16, 1995 The Honorable Al Gore Vice President of the United States S212 Capitol Building Washington, D.C. 20510 Dear Mr. Vice President: We understand that you will be addressing the G-7 Ministerial Conference on the Information Society, which takes place in Brussels February 25-26, 1995. The undersigned represent leading human rights and civil liberties organizations dedicated to promoting free expression in the new information age. We write today to ask you to urge the G-7 ministers to adhere to international free expression principles in any international agreement regarding the development, content, control and deployment of the global information infrastructure (GII). Article 19 of the Universal Declaration of Human Rights proclaims: *Everyone has the right . . . to seek, receive and impart information and ideas through any media and regardless of frontiers.* Since the Universal Declaration was adopted in 1948, the ability of individuals to exercise their free expression rights has been transformed by technological advances. Today, interactive communications technologies provide an opportunity to reinvigorate Article 19 by empowering citizens to seek, receive and impart information and ideas instantaneously, across the globe. The GII can motivate citizens to become more involved in decisionmaking at local and global levels as they organize, debate, and share information unrestricted by geographic distances or national borders. Increased citizen awareness and involvement will contribute to the spread of democratic values. In particular, the GII has the potential to: * permit individuals with common interests to organize themselves in forums to debate public policy issues. * provide instant access to a wide range of information. * increase citizen oversight of government affairs. * decentralize political decisionmaking. * empower users to become active producers of information rather than passive consumers. Already, existing online networks empower citizens worldwide. Individuals in war-torn countries have used the Internet and other online networks to report human rights abuses quickly to the outside world. When traditional means of communication broke down and the war in Sarajevo made it impossible for civilians to leave their homes without risking their lives, many citizens used online technology to communicate with family members, the international press, and humanitarian relief agencies. People from across the globe are communicating online to fight censorship, scrutinize government, and exchange information and strategies on an endless array of subjects. However, the GII's inevitable impact on social, political, and economic life presents risks as well as opportunities. Although the extraordinary potential for a GII has been suggested by existing online communications networks, the present online community is still quite limited. Only countries with a sophisticated telecommunications infrastructure are able to take advantage of online technology. While the Internet has reached more than 150 countries, two-thirds of the Internet host computers are in the U.S., and the 15 countries with the most Internet hosts account for 96% of all Internet hosts worldwide. As a recent report noted, "the Internet's diffusion appears to be inversely related to the occurrence of humanitarian crises -- it is precisely those nations that lack a strong presence on the Net where wars, famines and dictators abound." Even in countries with advanced telecommunications infrastructures, only persons with access to equipment and training can take advantage of new information resources. General illiteracy remains the primary obstacle to computer literacy. And while the GII may foster an unprecedented sharing of cultural traditions, current users of online technology are primarily American, affluent, white, and male. Finally, some governments have inhibited online expression through limitations on the use of encryption technology, restrictive access practices, and content liability laws. Just as authoritarian governments control other forms of media, governments may restrict access to the GII out of fear that citizens will use it to undermine government authority. In India, exorbitant licensing fees operate to exclude many people from online services, and an archaic telegraph law requires online carriers to ensure that no obscene or objectionable messages are carried on their networks. In Singapore, users of Teleview, the government's sophisticated public interactive information system, must agree not to use the service to send "any message which is offensive on moral, religious, communal, or political grounds." Even the United States has continued to impose restrictions on the free flow of technologies designed to provide users with greater privacy and to foster freedom of communication. The undersigned organizations have reviewed "The Global Information Infrastructure: Agenda for Cooperation." We understand that the U.S. hopes to achieve support among G-7 countries for five core principles as the basis for a global information infrastructure: encouraging private investment; promoting competition; creating a flexible regulatory framework; providing open access to the network for all information service providers; and ensuring universal service. We recognize the importance of these principles in providing a foundation for a GII and applaud the administration's support of universal service. However, we believe that the administration has failed to address some core free expression principles. Absent consideration of these principles, the current U.S. position on the future of the GII is incomplete. To reduce the risks of the GII and to maximize its potential to promote democracy, the GII must adopt and expand upon international standards of free expression. The following international rights and freedoms are of particular relevance to online activity: The Universal Declaration of Human Rights (UDHR) * Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." * Article 7: "All are equal before the law and are entitled without any discrimination to equal protection of the law." * Article 12: "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence." * Article 18: "Everyone has the right to freedom of thought, conscience and religion." * Article 20: "Everyone has the right to freedom of peaceful assembly and association." * Article 21: "Everyone has the right to take part in the government of his country." * Article 27: "Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits." The International Covenant on Civil and Political Rights (ICCPR) * Article 19: The right "to hold opinions without interference" and "to seek, receive and impart information and ideas of all kinds, regardless of frontiers . . . through any media." * Article 17: Freedom from "arbitrary or unlawful interference with privacy, family, home or correspondence." * Article 18: "Freedom of thought, conscience and religion." * Article 21: "The right of peaceful assembly." * Article 22: "The right to freedom of association with others." * Article 25: The right "to take part in the conduct of public affairs." * Article 26: "All persons are equal before the law and are entitled without any discrimination to equal protection of the law. . . . [T]he law shall prohibit any discrimination and guarantee to all persons equal and effective protection against discrimination on any ground such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status." All of the G-7 members, including the United States, are parties to the ICCPR. The International Covenant on Economic, Social and Cultural Rights, the American Convention on Human Rights, the European Convention for the Protection of Human Rights and Fundamental Freedoms, and the African Charter on Human and Peoples' Rights also contain important free expression standards which should be considered in developing the GII. In the strong tradition of free speech protection under the First Amendment of the United States Constitution, the U.S. should advocate for the universal application of two important free expression principles not yet codified in international law. First, the U.S. should advocate for an explicit prohibition against prior censorship. Second, the U.S. should promote an explicit prohibition against restrictions of free expression by indirect methods such as the abuse of government or private controls over newsprint, radio broadcasting frequencies, or equipment used in the dissemination of information, or by any other means tending to impede the communication and circulation of ideas and opinions. Recommendations: The undersigned organizations have identified three principal areas of concern regarding free expression and the GII: content regulation, access, and information privacy. We recommend the following guidelines to address those concerns. Content Issues Recognizing the mandates of Articles 7, 18, 19, and 20 of the UDHR, and Articles 18, 19, 21, 22, and 26 of the ICCPR, we call on the Clinton Administration to protect the free exchange of information and ideas on the GII. * Prior censorship of online communications should be expressly prohibited on the GII. * Any restrictions of online speech content should be clearly stated in the law and should be limited to direct and immediate incitement of acts of violence. * Laws that restrict online speech content should distinguish between the liability of content providers and the liability of data carriers. * Online free expression should not be restricted by indirect means such as the abuse of government or private controls over computer hardware or software, telecommunications infrastructure, or other equipment essential to the operation of the GII. * The GII should promote noncommercial public discourse. * The right of anonymity should be preserved on the GII. * The GII should promote the wide dissemination of diverse ideas and viewpoints from a wide variety of information sources. * The GII should enable individuals to organize and form online associations freely and without interference. Access Issues Recognizing the mandates of Articles 7, 19, 20, 21, and 27 of the UDHR, and Articles 19, 21, 22, 25, and 26 of the ICCPR, we call on the Clinton Administration to support broad access by individuals and groups to the GII development process, to online training, and to the GII itself. * Governments should provide full disclosure of information infrastructure development plans and should encourage democratic participation in all aspects of the development process. * The GII development process should not exclude citizens from countries that are currently unstable economically, have insufficient infrastructure, or lack sophisticated technology. * The GII should provide nondiscriminatory access to online technology. * To guarantee a full range of viewpoints, the GII should provide access to a diversity of information providers, including noncommercial educational, artistic, and other public interest service providers. * The GII should provide two-way communication and should enable individuals to publish their own information and ideas. * To protect diversity of access, the GII should have open and interoperable standards. * Deployment of the GII should not have the purpose or effect of discriminating on the basis of race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. * The GII should encourage citizens to take an active role in public affairs by providing access to government information. * Governments should encourage widespread use of the GII and should strive to provide adequate training. Information Privacy Recognizing the mandates of Article 12 of the UDHR and Article 17 of the ICCPR, we call on the Clinton Administration to promote strong information privacy rights on the GII. Online communications are particularly susceptible to unauthorized scrutiny. Encryption technology is needed to ensure that individuals and groups may communicate without fear of eavesdropping. Lack of information privacy would inhibit online speech and unnecessarily limit the diversity of voices on the GII. * Governments should ensure enforceable legal protections against unauthorized scrutiny and use by private or public entities of personal information on the GII. * Personal information generated on the GII for one purpose should not be used for an unrelated purpose or disclosed without the person's informed consent. * Individuals should be able to review personal information on the GII and to correct inaccurate information. * The GII should provide privacy measures for transactional information as well as content. * The Clinton Administration should oppose controls on the export and import of communications technologies, including encryption. * Users of the GII should be able to encrypt their communications and information without restriction. * Governments should be permitted to conduct investigations on the GII pursuant only to lawful authority and subject to judicial review. The G-7 Ministerial Conference on the Information Society will focus international attention on the development of the global information infrastructure. We encourage the Clinton Administration to use this opportunity not simply to promote free expression values in principle, but to secure these values through specific decisions regarding the development, content, control and deployment of the GII. We request that the U.S. add a "sixth principle" for adoption by the G-7 gathering that explicitly recognizes a commitment to protect and promote the free exchange of ideas and information on the GII. The U.S. is seen as the world's champion of the fundamental right of free expression, and it should continue to carry the free speech banner as it shapes the development of the GII. Sincerely, Gara LaMarche, Director Ann Beeson, Bradford Wiley Fellow Free Expression Project Human Rights Watch Marc Rotenberg Executive Director Electronic Privacy Information Center Ira Glasser Executive Director American Civil Liberties Union Judith F. Krug Director, Office for Intellectual Freedom American Library Association Sandy Coliver Law Program Director Article 19 International Centre Against Censorship Jerry Berman Executive Director Center for Democracy and Technology Andrew Taubman Executive Director Electronic Frontier Foundation Arthur J. Kropp President People for the American Way Simon Davies Director General Privacy International cc: The Honorable Ronald Brown United States Secretary of Commerce ___________________________________________________________________ David Banisar (Banisar@epic.org) * 202-544-9240 (tel) Electronic Privacy Information Center * 202-547-5482 (fax) 666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org Washington, DC 20003 * HTTP://epic.digicash.com/epic ------------------------------ Date: Sun, 26 Feb 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 3--Cu Digest Header Info (unchanged since 26 Feb, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB <your name> Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.20 ************************************