Computer underground Digest Thu June 12, 1997 Volume 9 : Issue 45 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.45 (Thu, June 12, 1997) File 1--<nettime> Attack against Decoder (english) (FWD) File 2--Islands in the Clickstream File 3--'Amateur Action' update File 4--Ready, aim, fire! File 5--Re: Mass-CuD Problem Solved (we hope) File 6--"Java Fundamental Classes Reference" from O'Reilly File 7--U.S. Agriculture Dept. web site closed after security breach File 8--French Internet Suit Dismissed File 9--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 03 Jun 17 01:57:10 -0100 From: Bruce Sterling <bruces@well.sf.ca.us> Subject: File 1--<nettime> Attack against Decoder (english) (FWD) From--Gomma@decoderbbs.csmtbo.mi.cnr.it (Gomma) Date--03 Jun 17 01:57:10 -0100 To--nettime-l@Desk.nl The following (translated) article is from "Il Mattino" of Naples. It concerns "Decoder", one of the most relevant magazines in the Italian antagonist landscape. This raving article is against "Decoder" and the alternative Italian telematics. It is the proof that all the repressive legislation passed or under way to "regulate" the net will become instruments against freedom of expression more broadly. For those who didn't know it, the article mentioned concerns a strip by the famous English artist, Graham Harwood ("Decoder", No. 8), on the issue of violence on children. A harsh strip, ruthless, but whose only goal was to make people reason on the origins of violence against weaker human beings. But when power becomes blind, it hits in any form, it becomes abuse, it becomes censorship, and it hits everything and everyone. If this was not so gloomy for the future prospects it envisages, we could even laugh at it, but BEWARE, because this article -which the journalist who attacks us and the right to stay anonymous was not brave enough to sign- seems to anticipate a new repressive clampdown on Italian networks and their activists. As "Decoder" we will seek for advice from our lawyers to try and do something -we do not accept being used to the ends of newspapers' manipulation- and we INVITE all the comrades, brothers and sisters from telematic communities to express solidarity, to activate on these issues, and build a united front against repression. ------- "Il Mattino" 28 May 1997 The cyber-race and its prophets. See under "violence" There is also a magazine ,"Decoder", in glossy paper: it preaches the destruction of all rules ROME. A bunch of copies on adjunct attorney's Italo Ormanni. Disgusting images of violence on children accompanied by a language that is abusive in itself. It is not a porn magazine, of those some guys get behind closed doors. It's a glossy paper, underground they say, who claims to change the world. An organ of ideological struggle, one may say party-like, if we can call this way a group which is sailing on the Net preaching the destruction of all rules. And what is more shocking, more destructive than sanctifying violence on children? Ormanni, the statutes in his hands, could only do one thing. He asked to the police's telecommunication operative branch director, Maria Cristina Ascenzi, if the requisites existed to sue someone for under- age persons' exploitation. But it came out that those sick images are the outcome of computer-aided elaborations. The crime disappears, at least for current laws, but a chilling discovery is confirmed: pedophily is not only stuff for a-social, depraved people: it is used, if you pass this concept, as a tool of struggle, a ram's head against the bases of society. Going through "Decoder"'s pages is like have a walk into a frenzy: a summary of the cyberpunk's "philosophy" is that any rule must tumble down. And that anyone do what they want, totally unnamed. Being strong or weak, being the animal that eats or the one who gets eaten, does not matter. But this is not said because anyone of these cyberphilosophers feel, tacitly, the eating animal. One of the most notable parts of this vision of the world supported even through pedophily is the coming birth of a cyber-race improved by computer. And all, which they imagine so original and part of the new times, inequivocably smacks like a rotten carcass. No signatures, only proclamations. The authors don't let people look in their faces. Only battle nicknames. It's the rule, on the Net. This in the lefty circles who are seeking on the Net for alternatives to the old social centre (whom detectives call "antagonist"), like in these groups defined, instead, as rightist. Among so many living presences, curious, even provoking, then, you can also find anti- everything propaganda, desecrating by choice. Legislation that is now going to pass in Parliament provides for very hard penalties for everyone produces pornographic material representing under-age persons. Also virtual pedophily, then, might be punished, as a non- value and an "exaltation" of a crime. Until now the police, who can anyway point and prosecute those inciting to racial hatred, can just wait and see. -- | Cybernet: Gomma 65:1200/1.2 | Internet: Gomma@decoderbbs.csmtbo.mi.cnr.it | WWW : http://www4.iol.it/decoder | | Standard disclaimer: >>>> Information wants to be free <<<< | From DecoderBBS Italy +39-2-29527597 (open 14:00-08:00). --- # distributed via nettime-l : no commercial use without permission # <nettime> is a closed moderated mailinglist for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@icf.de and "info nettime" in the msg body # URL: http://www.desk.nl/~nettime/ contact: nettime-owner@icf.de ------------------------------ Date: Sat, 07 Jun 1997 21:38:18 From: Richard Thieme <rthieme@thiemeworks.com> Subject: File 2--Islands in the Clickstream Islands in the Clickstream: No More Pencils, No More Books? We are all children of our times. We frame our worlds as they are given to us by our language and the structures of our education. The frame is invisible until there is a change so pervasive that we see by contrast what we once took for granted. It's like the terminator on the moon, the line between darkness and light where the mountain ranges are thrown into relief. I did not experience the education I received growing up in America in the 1950s and 1960s as a choice. It's what education was. In the same way, becoming an "adolescent" was simply a fact of growing up, a universal stage of development. But adolescence is really a modern invention. The word was first used in 1904. The same is true of "childhood" which was really invented by the Victorians. In the United States, the expectation that adults will graduate from high school is a fairly recent development, a twentieth-century phenomena. "School" as we know it is a direct result of the printing press. Collections of benches in a central building on which to sit and read are a recent development. Learning had universally been accomplished through apprenticeship. Young people worked beside adults, learning by doing. Most never left the village in which they were born. The fact of textbooks and universal literacy made necessary a prolonged period of time called "adolescence" that postponed adulthood. During that time we learned the art of symbol manipulation. We learned to internalize typographical symbols and be "reading people." Learning to read transformed who we were and how we understood our lives as possibilities for action. The process was at least as important as the content. We called that process "education." Today the structures of education are out of joint with the structures of adulthood. That's why so many businesses are educating workers. More education takes place today in conference rooms, meeting rooms in hotels, and via remote telepresence and onsite computer-assisted learning than in classrooms. The need for continuous lifelong education is now an unquestioned assumption. Apple flooded schools with computers, but didn't provide teachers who knew what to do with them. My consulting with schools tells me that money is often budgeted to buy computers, but seldom budgeted for the years of training needed to re- program teachers to use them effectively. I know a fourth grade teacher who was supposed to teach computers but didn't know how to turn them on. She asked her class, "Who knows how?" Hands waved in the air. She turned the task over to the students and hid behind her desk while they showed each other what to do. She called it "empowerment." But she couldn't hide forever. So she asked her three brightest students secretly to teach her after school how to use computers. Then she could teach the students how to use computers. That teacher's situation as an officer in a command-and- control hierarchy who does not know as much as the people she teaches is analogous to a manager asked to supervise younger workers who understand computer technology and its uses far better than she does. Older managers as well as older teachers must learn from younger adults as well as teach them. The wisdom of experience is relevant, but relevant in a different way. Command-and-control behaviors do not make for good coaching. That teacher, like many managers, learned that she still had authority, but authority that had to be exercised in a collegial way. Leadership is exercised in a network by implementing a vision, not by dominating and controlling. Power is exercised in a network by participating and contributing. That teacher knew, at least, how to get out of the way, but that didn't make her a coach. She needed to learn how to be present but not controlling, available but not directive. Like the best computer assisted learning, good coaches provide information not at the convenience of the curriculum but when learners are most teachable. Naturally the fact of computer technology has been threatening to many schools. Some responded to the challenge by taking away all the computers and locking them up in a room. They call it a "computer lab" and let the kids in there an hour a day. Imagine being a teacher when pencils were invented. You pass out pencils and watch as the children discover that pencils can do anything because a pencil is a symbol manipulating machine. Children can write stories, do math, reflect on history. Afraid you're no longer needed, you collect the pencils and lock them in a Pencil Lab, letting the children use them an hour a day. The rest of the time they write with rocks on slabs of broken concrete. In preparation for a speech for a school district in northern Illinois recently, I was told that the large corporations in which most of their students worked gave the district good grades in much of what they were teaching, but not in preparing young people for cooperative learning and cross- disciplinary teamwork. When I asked what they meant by "cooperative learning," I realized that in *my* day it was called ... cheating. A stand-alone human being who learns and works by themselves -- as I was taught to do -- is a brain in a bottle. The structures of education, like the structures of work, are moving through a sea-change. Symptoms include: + Rising drop-out rates. Racial minorities, the canaries in the coal mine of society, die first. The growing irrelevance of school to life in the real world was experienced first in ghettos. Now blue-collar workers and middle-aged managers are feeling the pain so it's a "crisis." + A growing "black market" in education. We give lip-service to traditional structures but barter for "educational goods" on the job and over the Internet, in the global marketplace. + Businesses are becoming centers of education, not because they want to, but because they must. McDonald's teaches politeness and civility because the traditional structures of society no longer do the job. The budget for training in many businesses exceeds the budgets of local school districts. Some companies have started their own colleges and graduate studies because schools do not generate people with the skills and knowledge they need. + Conscientious teachers who can't see the forest for the trees redouble their efforts. They become exhausted , working harder and harder, but it's like drinking from a dribble glass. The gears of the system don't mesh with the real world. Veterans count the days until retirement. Burn-out abounds. + "Work-to-school" programs grow as apprenticeship is re- engineered for the 21st century. Is there hope? Of course. The solutions begin with understanding the depths of the transformation we are experiencing and asking questions relevant to our real lives. The process of finding answers together will generate the security we need to remain effective during revolutionary times. ********************************************************************** Islands in the Clickstream is a monthly column written by Richard Thieme exploring social and cultural dimensions of computer technology. Comments are welcome. Feel free to pass along columns for personal use, retaining this signature file. If interested in (1) publishing columns online or in print, (2) giving a free subscription as a gift, or (3) distributing Islands to employees or over a network, email for details. To subscribe to Islands in the Clickstream, send email to rthieme@thiemeworks.com with the words "subscribe islands" in the body of the message. To unsubscribe, email with "unsubscribe islands" in the body of the message. Richard Thieme is a professional speaker, consultant, and writer focused on the impact of computer technology on individuals and organizations. Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved. ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321 ********************************************************************* ------------------------------ Date: Sun, 8 Jun 1997 13:23:04 -0400 From: Michael Sims <jellicle@inch.com> Subject: File 3--'Amateur Action' update ((MODERATORS' NOTE: A full background on the Amateur Action BBS case, including its history and the text of relevant legal documents, can be found in the CuD archives at: http://www.soci.niu.edu/~aabbs/aabbs.html ============== Source - fight-censorship@vorlon.mit.edu Background: Robert and Carleen Thomas ran an adult-oriented bulletin board system from their home in California. Prosecutors in Tennesee in 1994 downloaded allegedly obscene pictures of sexual acts and charged them. Of course, they were applying *their* "community standards" for obscenity to his California business. They were found guilty and sentenced to 37 months. While that case was on trial, Federal officials in Utah heard about and looked into it. They downloaded pictures of "nude and semi-nude children" and charged Thomas in Utah with distributing child pornography, although there is no evidence any Utahan except the official had ever done so. Thomas pled guilty to 1 of 16 charges and appealed alleging double jeopardy. The 10th Circuit Court of Appeals has upheld the decision of the Utah District Court. No double jeopardy because the individual photos are different from those which were tried in the other cases. Thomas is serving a 26-month sentence on this count, concurrently with the other sentence. The opinion does not appear to be on the Emory University web site which tracks these things. Moral: anyone who distributes content nationally continues to be subject to prosecution in each and every locale under prevailing community standards. If your content is objectionable to the most small-minded folk anywhere in the US, it would be wise to refrain from publishing it on the internet or other comparable medium. Prosecutions continue to apply local "contemporary community standards" to obscenity prosecutions, but in meeting the Miller test, they are permitted to demonstrate that the material has prurient appeal to someone else. In other words, offensive to you, sexually appealing to anyone anywhere. For example, if space aliens landed tomorrow and their pornography consisted of pictures that looked like cat vomit, prosecutors could present evidence that the material is prurient with regard to space aliens, patently offensive to you (cat vomit, you know), and lacking in serious literary value to you (obviously) and you would therefore conclude that the material was obscene. [v]enue for federal obscenity prosecutions lies "in any district from, through, or into which" the allegedly obscene material moves, according to 18 U.S.C. section 3237. This may result in prosecutions of persons in a community to which they have sent materials which is obscene under that community's standards though the community from which it is sent would tolerate the same material. United States v. Peraino, 645 F.2d 548, 551 (6th Cir. 1981) So even if you refrain from sending material to Tennesee residents, an internet router can make that decision for you by sending data packets through the state. What a great piece of law. Refs: Jonathan Wallace's consideration of the issue: http://www.spectacle.org/795/amateur.html http://www.spectacle.org/freespch/musm/obsne.html http://www.spectacle.org/296/obscene.html ACLU materials on the Tennessee case: http://www.aclu.org/court/thomas.html http://www.aclu.org/court/obscene.html -- Michael Sims ------------------------------ Date: Sat, 7 Jun 1997 19:30:57 -0400 From: Michael Sims <jellicle@inch.com> Subject: File 4--Ready, aim, fire! Source - fight-censorship@vorlon.mit.edu http://www.nando.net/newsroom/ntn/info/060697/info5_16347.html Reproduced in full, it's short. Anyone have more information? Meeting reportedly will aim to fight obscenity on Internet Copyright c 1997 Nando.net Copyright c 1997 Agence France-Presse TOKYO (June 6, 1997 11:43 a.m. EDT) - Japan, the United States and European nations will hold an unprecedented ministerial meeting next month to study ways to restrict obscenity on the Internet and regulate electronic commerce, it was reported Friday. The meeting in Bonn July 6-8 will focus on measures to crack down on obscene and violent pictures on the Internet, Jiji Press quoted informed sources as saying. It will also discuss universal criteria for encoding information in electronic commerce to protect private information, Jiji said. Japan will be represented by the posts and telecommunications minister, Hisao Horinouchi, the sources said. ------------------------------ Date: Tue, 3 Jun 1997 06:55:40 -0400 (EDT) From: "Bill Michaelson" <bill@COSI.COM> Subject: File 5--Re: Mass-CuD Problem Solved (we hope) <. . .> But in all this furor over spam, I've been puzzled by something. Why not as much indignation over paper mail? I told someone last week that if I could take all the paper junk that is stuffed in my postal mailbox (which I am required to physically sort for recycling), and put it in my e-mailbox, I would flick it into the ether with just as much ease as I do the electronic variety. Two years ago, after sending written requests to about 150 paper junk mailers, I was only successful at stopping the flow from half of them. The others required one or more followup calls, many of which had lame excuses for not complying with my request to stop. And it appears that I have no legal recourse. A handful have been so non-responsive (Honda, Godiva Chocolates and Starbucks come to mind) that I've considered organizing boycotts of their products by like-minded individuals. Ah, but I've got a life. At least I know that *I* won't be buying their products. This isn't to say I'm unsympathetic; I've been the victim of some idiotic spam attacks myself, and I'm still receiving junk from email lists that accept automatic registration without any sort of authentication - an administrative practice which borders on negligence at this late date. ------------------------------ Date: Thu, 5 Jun 1997 17:18:47 -0700 From: Sara Winge <sara@ora.com> Subject: File 6--"Java Fundamental Classes Reference" from O'Reilly FOR IMMEDIATE RELEASE June 5, 1997 PRESS ONLY--FOR REVIEW COPIES, CONTACT: Sara Winge 707/829-0515 x285 sara@ora.com http://www.ora.com O'REILLY RELEASES "JAVA FUNDAMENTAL CLASSES REFERENCE" SEBASTOPOL, CA--"Java Fundamental Classes Reference," the latest title in O'Reilly & Associates' Java documentation series, provides complete reference documentation on the core Java 1.1 classes. "Java Fundamental Classes Reference" goes beyond a standard reference manual. In addition to detailed descriptions of classes and methods, it offers tutorial-style explanations of the important classes in the Java core API. The first section of the book includes chapters that describe the ins and outs of strings and related classes, effective thread programming, and the use of the I/O classes. These chapters also include lots of sample code, so that readers can learn by example. The core classes addressed in "Java Fundamental Classes Reference" contain architecture-independent methods that serve as Java's gateway to the real world, by providing access to resources such as the network and the host filesystem. These classes also include utilities for working with strings, I/O streams, mathematical functions, vectors, and hash tables. The book covers the classes that comprise the java.lang, java.io, java.net, java.util, java.text, java.math, java.lang.reflect, and java.util.zip packages. These classes provide general-purpose functionality that is fundamental to every Java application. "Java Fundamental Classes Reference" describes Version 1.1 of the Java Development Kit (JDK) and includes: - Easy-to-use reference material on every core Java class - Tutorial-style explanations of important classes and examples that demonstrate their functionality - Detailed coverage of all the essential classes in java.lang, including Object, String, and Thread - Descriptions of all the I/O classes provided in the java.io package, including all of the new Reader, Writer, and object serialization classes in Java 1.1 - Material on using the classes in java.util effectively - Coverage of all the networking classes in the java.net package "Java Fundamental Classes Reference" is meant to be used in conjunction with the "Java AWT Reference." Together, these two reference manuals cover all of the classes in the Java core API. "Java Language Reference" completes O'Reilly's core Java documentation set by providing a detailed reference of the Java programming language. These manuals comprise the definitive set of Java 1.1 documentation--essential reference for any serious Java programmer. O'Reilly's Java series also includes a tutorial, "Exploring Java," and single-topic programming books that provide in-depth information on critical topics, an approach the company has perfected in the past ten years with their highly successful Nutshell Handbooks. "Java Virtual Machine," "Java Threads," and "Java Network Programming" are the first books on advanced programming topics. Upcoming Java programming books include "Developing Java Beans" (6/97) and "Database Programming with JDBC and Java" (7/97). # # # Java Fundamental Classes Reference By Mark Grand & Jonathan Knudsen 1st Edition May 1997 (US) 1114 pages, ISBN: 1-56592-241-7, $44.95 (US) ------------------------------ Date: Wed, 11 Jun 1997 00:32:43 -0400 From: "Evian S. Sim" <evian@escape.com> Subject: File 7--U.S. Agriculture Dept. web site closed after security breach Copyright 1997 Reuter Information Service WASHINGTON (June 11, 1997 00:08 a.m. EDT) - The U.S. Agriculture Department's Foreign Agricultural Service shut down access to its internet home page Tuesday after a major security breach was discovered, a department aide said. "It's a big, huge problem," Ed Desrosiers, a computer specialist in USDA's Farm Service Agency, told Reuters. "We can't guarantee anything's clean anymore." Someone broke into system and began "sending out a lot of messages" to other "machines" on the internet, Desrosiers said. The volume of traffic was so great, "we were taking down machines" and began receiving complaints, he said. "It's not worth our time to try to track down" the culprit, Desrosiers said. "Instead, we're just going to massively increase security." A popular feature on the FAS home page is the search function for "attache reports," which are filed by overseas personnel and provide assessments on crop conditions around the world. Although not official data, the reports provide key information that goes into USDA's monthly world supply-and-demand forecasts. It could be next week before the page is open to outside users again, Desrosiers said. ------------------------------ Date: Tue, 10 Jun 1997 22:13:30 -0500 From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas) Subject: File 8--French Internet Suit Dismissed Date: Tuesday, June 10, 1997 Source: Reuters. Dateline: PARIS Copyright Chicago Tribune FRENCH INTERNET SUIT DISMISSED ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE The first test of whether France's disputed language law applies to the Internet ended in a fiasco Monday when a court threw out the case against an overseas branch of Georgia Tech on a technicality. Two state-approved watchdogs promoting the use of the French language had filed a complaint against the Georgia Institute of Technology's French campus for using English only on its Web site. The plaintiffs, Defense of the French Language and Future of the French Language, accused Georgia Tech Lorraine of breaking a 1994 law requiring all advertising in France to be in French. The Paris police court dismissed the lawsuit, saying the two private groups should have notified a public prosecutor first. The legislation, named after then-Culture Minister Jacques Toubon, was part of a battle to protect the tongue of Moliere and Racine from the growing international use of English. <...> ------------------------------ Date: Thu, 7 May 1997 22:51:01 CST From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. In ITALY: ZERO! BBS: +39-11-6507540 UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #9.45 ************************************