Computer underground Digest    Sun  July 13, 1997   Volume 9 : Issue 56
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Field Agent Extraordinaire:   David Smith
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.56 (Sun, July 13, 1997)

File 1--Cyber Patrol Bans Crpyt Newsletter
File 2--ALA Council Resolution on the Use of Filtering Software
File 3--An Economic Basis for SPAM Control
File 4--French "English Only" Web Site Suit Dismissed
File 5--UFOs and the Net (fwd Islands in the Clickstream)
File 6--Oil City Officials Worry About Link To Web Page
File 7--Call for Commentaries on CuD Special Issue of Net & Education
File 8--Star Wars, Fanfiction, and Big Eight Newsgroup Creation
File 9--Anti-solicitation laws and anti-spam "opt-in" mailing lists
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: 20 Jun 97 01:53:31 EDT
From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM>
Subject: File 1--Cyber Patrol Bans Crpyt Newsletter

((CuD MODERATORS' COMMENT: George Smith learned the danger of
blocking software. As he explains, the homepage of
Crypt Newsletter was blocked. Why? Because another homepage on
the server, the American Society of Criminology's Critical
Criminology Division homepage at
http://www.soci.niu.edu/~critcrim, includes a copy of the
Unabomer Manifesto. The Crit Crim page is a well-established and
busy resource, especially for criminologists, and the Unabomer
Manifesto is relevant to the research resources the page
provides.  Unfortunately, all homepages on the system beginning
with ~cr were blocked. Although the problem apparently has been
resolved for now, risks of future blocking remain. Because
libraries and schools use Cyber Patrol, the consequence of the
blocking may be to exclude students from the ability to access a
valuable homepage for assigments)).

Banned by Cyber Patrol
June 19, 1997

Hey, buddy, did you know I'm a militant extremist? Cyber Patrol, the
Net filtering software designed to protect your children from
cyberfilth, says so. Toss me in with those who sleep with a copy of
"The Turner Diaries" under their pillows and those who file nuisance
liens against officials of the IRS. Seems my Web site is dangerous
viewing.

I discovered I was a putative militant extremist while reading a
story on Net censorship posted on Bennett Haselton's PeaceFire
Web site. Haselton is strongly critical of Net filtering software and
he's had his share of dustups with vendors like Cyber Patrol, who
intermittently ban his site for having the temerity to be a naysayer.

Haselton's page included some links so readers could determine what
other Web pages were banned by various Net filters. On a lark, I typed
in the URL of the Crypt Newsletter, the publication I edit. Much to my
surprise, I had been banned by Cyber Patrol. The charge? Militant
extremism. Cyber Patrol also has its own facility for checking if a
site is banned, called the CyberNOT list. Just to be sure, I
double-checked. Sure enough, I was a CyberNOT.

Now you can call me Ray or you can call me Joe, but don't ever call me
a militant extremist! I've never even seen one black helicopter
transporting U.N. troops to annex a national park.

However, nothing is ever quite as it seems on the Web and before I
went into high dudgeon over political censorship--the Crypt Newsletter
has been accused of being "leftist" for exposing various
government, academic, and software industry charlatans--I told some of
my readership. Some of them wrote polite--well, almost polite--letters
to Debra Greaves, Cyber Patrol's head of Internet research. And
Greaves wrote back almost immediately, indicating it had all been a
mistake.

My Web site was blocked as a byproduct of a ban on another page on the
same server. "We do have a [blocked] site off of that server with a
similar directory. I have modified the site on our list to be more
unique so as to not affect [your site] any longer," she wrote.

Perhaps I should have been reassured that Cyber Patrol wasn't banning
sites for simply ridiculing authority figures, a favorite American
past time. But if anything, I was even more astonished to discover th
company's scattershot approach to blocking. It doesn't include precise
URLs in its database. Instead, it prefers incomplete addresses that
block everything near the offending page. The one that struck down
Crypt News was "soci.niu.edu/~cr," a truncated version of my complete
URL. In other words: any page on the machine that fell under "~cr" was
toast.

Jim Thomas, a sociology professor at Northern Illinois University,
runs this particular server, and it was hard to imagine what would be
militantly extreme on it. Nevertheless, I ran the news by Thomas. It
turns out that the official home page of the American Society of
Criminology's Critical Criminology Division, an academic resource,
was the target. It features articles from a scholarly criminology
journal and has the hubris to be on record as opposing the death
penalty but didn't appear to have anything that would link it with
bomb-throwing anarchists, pedophiles, and pornographers.

There was, however, a copy of the Unabomber Manifesto on the page.

I told Thomas I was willing to bet $1,000 cash money that Ted
Kaczynski's rant was at the root of Cyber Patrol's block.
Thomas confirmed it, but I can't tell you his exact words. It
might get this page blocked, too.

What this boils down to is that Cyber Patrol is banning writing on the
Web that's been previously published in a daily newspaper: The
Washington Post. It can also be said the Unabomber Manifesto already
has been delivered to every corner of American society.

If the ludicrous quality of this situation isn't glaring enough,
consider that one of Cyber Patrol's partners, CompuServe, promoted the
acquisition of electronic copies of the Unabomber Manifesto after it
published by the Post. And these copies weren't subject to any
restrictions that would hinder children from reading them. In fact,
I've never met anyone from middle-class America who said, "Darn those
irresponsible fiends at the Post! Now my children will be inspired to
retreat to the woods, write cryptic essays attacking techno-society,
and send exploding parcels to complete strangers."

Have you?

So, will somebody explain to me how banning the Unabomber Manifesto,
the ASC's Critical Criminology home page, and Crypt Newsletter
protects children from smut and indecency? That's a rhetorical
question.

Cyber Patrol is strongly marketed to public libraries, and has been
acquired by some, in the name of protecting children from Net
depravity.

Funny, I thought a public library would be one of the places you'd be
more likely to find a copy of the Unabomber Manifesto.

_George Smith is the author of The Virus Creation Labs, a book about
computer virus writers and the antivirus industry._

------------------------------

Date: Wed, 9 Jul 1997 10:28:11 -0800
From: "--Todd Lappin-->" <telstar@wired.com>
Subject: File 2--ALA Council Resolution on the Use of Filtering Software

Source -  fight-censorship@vorlon.mit.edu

From: "Craig A. Johnson" <caj@tdrs.com>


AMERICAN LIBRARY ASSOCIATION

This resolution was adopted by ALA Council at the annual conference.

RESOLUTION ON THE USE OF FILTERING SOFTWARE IN LIBRARIES

WHEREAS, On June 23, 1997, the United States Supreme court issued a
sweeping re-affirmation of core First Amendment principles and held
that communications over the Internet deserve the highest level of
Constitutional protection; and

WHEREAS, The Court's most fundamental holding is that communications
on the Internet deserve the same level of Constitional protection as
books, magazines, newspapers, and speakers on a street corner
soapbox.  The Court found that the *Internet constitutes a vast
platfrom from which to address and hear from a world-wide audience of
millions of readers, viewers, researchers, and buyers,* and that *any
person with a phone line can become a town crier with a voice that
resonates farther than it could from any soapbox*; and

WHEREAS, For libraries, the most critical holding of the Supreme
Court is that libraries that make content available on the Internet
can continue to do so with the same Constitutional protections tha
apply to the books on libraries' shelves; and

WHEREAS, The Court's conclusion *that the vast democratic fora of the
Internet* merit full constitutional protection will also serve to
protect libraries that provide their patrons with access to the
Internet; and

WHEREAS, The Court recognized the importance of enabling individuals
to receive speech from the entire world and to speak to the entire
world.  Libraries provide these opportunities to many who would not
otherwise have them; and

WHEREAS, The Supreme Court's decision will protect that access; and

WHEREAS, The use in libraries of software filters which block
Constitutionally protected speech is inconsistent with the United
States Constitution and federal law and may lead to legal exposure
for the library and its governing authorities; now, therefore, be it

RESOLVED, That the American Library Association affirms that the use
of filtering software by libaries to block access to constitutionally
protected speech violates the Library Bill of Rights.

Adopted by the ALA Council, July 2, 1997

------------------------------

Date:       Wed, 09 Jul 97 09:59:10 EST
From: Computer Privacy Digest Moderator  <comp-privacy@UWM.EDU>
Subject: File 3--An Economic Basis for SPAM Control

((SOURCE - Computer Privacy Digest, Vol 11, #002:, Wed 8 July:
The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.

Web browsers will find it at http://www.uwm.edu/org/comp-privacy/))

 =========

From--Steve Schear <azur@netcom.com>
Date--02 Jul 1997 18:02:07 -0700
Subject--An Economic Basis for SPAM Control

There are three approaches being publicly discussed to regulate
unwanted email: regulatory, opt-in and opt-out.  Due to subtle, but
important differences between fax and email, I believe the legal
approach will be difficult to craft without facing First Amendment
challenges.  Both the opt-in and opt-out appear to create more
bureaucratic overhead and may be difficult to satisfactorily
administer.  There is a fourth approach, economic, which has received
scant attention.

Postage costs are what, quite effectively, keep our snail-mail boxes
from overflowing with junk.  Since email is essentially free, or
almost, there has been no incentive for SPAMers to better target their
ads, as is financially required for snail-mail advertising.

One economic approach is to enhance email software (either at the ISP
or client end) that would filter incoming messages in two ways: to
determine if the sender was known to the recipient (i.e., from previous
correspondence) or to determine if sufficient postage was placed within
the message header.

The email software could automate building the 'known sender' list from
email responses and other user input (in this way electronic mailing
lists would should not be affected).  Messages not from known parties
and without sufficient postage would be rejected: returned to sender or
discarded.  The email software could refund postage--e.g., by explicit
recipient action or in the next reply email--so non-SPAM senders would
not be left out-of-pocket for d-postage.  SPAMers would have their
d-postage pocketed by the recipient.

There are at least two Digital Postage (d-postage) approaches: e-cash
based d-postage and sender-generated d-postage (hashcash).

E-cash based postage is an obvious choice.  Like today's postal stamps,
the sender would need to purchase the e-cash and include it in the
header of outgoing mail to recipients to whom the sender was unknown.
However, e-cash isn't widely used nor is it certain that current and
proposed e-cash systems could economically and architecturally scale to
address Net d-postage.

An alternative is to use 'stamps' created by the sender. Called
'hashcash,' it was first put forward as a way to reduce remailer
abuse.  With hascash the sender must perform a mathematical operation
which is very computationally intensive when generating the 'stamp'
(the more complex the higher the stamp value) but which is quick for
the recipient to check.  Each stamp value is intimately related to the
recipient's address, so a SPAMer can't reproduce a stamp and send them
to different addressees.

Hashcash is elegant in its simplicity and scalability due to its lack
of a centralized issuing or clearing facility. Hascash-based d-postage
could also seed the development of commercial distributed computing Net
industry, as SPAMers elect to purchase hashcash rather than generating
it themselves-the idea isn't to eliminate SPAM, just place it on
similar economic footing with junk snailmail. (See
http://www.dcs.ex.ac.uk/~aba/hashcash/).

------------------------------

Date: Tuesday, June 10, 1997
From: user45@@anonymous.nosys.com
Subject: File 4--French "English Only" Web Site Suit Dismissed

Source: Reuters.
Dateline: PARIS

FRENCH INTERNET SUIT DISMISSED
ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE

   The first test of whether France's disputed language law
applies to the Internet ended in a fiasco Monday when a court
threw out the case against an overseas branch of Georgia Tech on
a technicality.
   Two state-approved watchdogs promoting the use of the French
language had filed a complaint against the Georgia Institute of
Technology's French campus for using English only on its Web
site.
   The plaintiffs, Defense of the French Language and Future of
the French Language, accused Georgia Tech Lorraine of breaking a
1994 law requiring all advertising in France to be in French.
   The Paris police court dismissed the lawsuit, saying the two
private groups should have notified a public prosecutor first.
   The legislation, named after then-Culture Minister Jacques
Toubon, was part of a battle to protect the tongue of Moliere and
Racine from the growing international use of English.
   "The central question, the most interesting one, has not been
decided today; only a procedural matter has," said Marc Jobert,
lawyer for the two groups, which had demanded that the Internet
site be translated into French.
   While supporters of Internet say the World Wide Web should be
free of national restraints, many governments have asserted
their authority over cyberspace to try to block pornography or
to silence political dissent.
   "The court did not address the underlying issue and has left
us wanting more," said Jacques Schaefer, lawyer for Georgia Tech
Lorraine, which is based in Metz, in eastern France.
   "It's a total victory in the sense that we were cleared of
all accusations," he said, but the university would rather have
won on substance than on procedure.
   Georgia Tech President Wayne Clough said the drive to apply
the Toubon law to the Web ignores its "interconnected nature."
   "The Web is the personification of the global economy. It does
not recognize national or linguistic borders," he said.
   Georgia Tech argued at a January hearing that communications
on the Web are like telephone calls. It said its Web site is in
English because all of its courses are taught in the language and
students are required to be fluent in English.
   Two weeks ago, Georgia Tech Lorraine made its Web site
available in French and German as well but denied the lawsuit was
the reason.
   It said that technological advances in the global computer
network had made it easier to provide the translation and that it
"wanted to be more European."

------------------------------

Date: Sat, 12 Jul 1997 21:37:40 -0500
From: Richard Thieme <rthieme@thiemeworks.com>
Subject: File 5--UFOs and the Net (fwd Islands in the Clickstream)

Islands in the Clickstream:
                          UFOs and the Internet


[This summer marks the 50th anniversaries of the first modern
publicized report of UFO phenomena by Kenneth Arnold in June 1947
and the "Roswell incident" in July 1947. This column is much
abridged from the articles "How to Build a UFO ... Story"
(Internet Underground: November 1996) and "Stalking the UFO Meme
on the Internet" (South Africa Computer Magazine: April 1997).
The article was also included in Digital Delirium (eds. Arthur
and Marilouise Kroker: St. Martin's Press: 1997). A full copy
will be archived on the ThiemeWorks web site -- coming this
summer.]


     "We are convinced that Roswell took place. We've had too
many high ranking military officials tell us that it happened,
that told us that it was clearly not of this earth."

          Don Schmitt, co-author, "The Truth About the UFO Crash
at Roswell," in an interview on the Internet



     That "interview with a real X-Filer" can be found on one of
the hundreds of web sites  -- in addition to Usenet groups,
gopher holes stuffed with hundreds of files, and clandestine BBSs
where abductees meet to compare "scoop marks" -- that make up the
virtual world of flying saucers.
     The UFO subculture or -- for some -- the UFO religion on the
Internet is a huge supermarket of images and words. Everything is
for sale -- stories, pictures, entire belief systems. But are we
buying a meal? Or a menu?
     When Schmitt uses the word "Roswell," he is not merely
identifying a small town in New Mexico that put itself on the map
with a terrific UFO story. He uses it to MEAN the whole story --
the one that says a UFO crashed in 1947 near the Roswell Army Air
Field, after which alien bodies were recovered and a cosmic
Watergate initiated.
     That story is scattered on the Internet like fragments of an
exploding spaceship. Do the pieces fit together to make a
coherent puzzle? Or is something wrong with this picture?


Stalking the UFO meme on the Internet

     Memes are contagious ideas that replicate like viruses from
mind to mind. On the Internet memes multiply rapidly. Fed by
fascination, incubated in the feverish excitement of devotees
transmitting stories of cosmic significance, the UFO meme mutates
into new forms, some of them wondrous and strange.
     "The Roswell incident" is one variation of the UFO meme.
On the Internet, Schmitt's words are hyperlinked to those of
other UFO sleuths and legions of interested bystanders fascinated
by the psychodynamics of the subculture as well as the "data."
     Before we examine a few fragments, let's pause to remember
what the Internet really is.


Copies of copies -- or copies of originals?

     The Internet represents information through symbols or
icons. So does speech, writing, and printed text, but the symbols
on the Net are even further removed from the events and context
to which they point.
     The power of speech gave us the ability to lie, then writing
hid the liar from view. That's why Plato fulminated at writing --
you couldn't know what was true if you didn't have the person
right there in front of you.
     The printing press made it worse. Now digital images and
text are on the Net. Pixels can be manipulated. Without
correlation with other data, no digital photo or document can be
taken at face value. There's no way to know if we're looking at a
copy of an original, a copy of a copy, or a copy that has no
original.
     In addition, certain phenomena elicit powerful projections.
Because projections are unconscious, we don't know if we're
looking at iron filings obscuring a magnet or the magnet.
     Carl Jung said UFOs invite projections because they're
mandalas -- archetypal images of our deep Selves. Unless we
separate what he think we see from what we see, we're bound to be
confused.
     Hundreds of cross-referenced links on the Web create a
matrix of credibility. In print, we document assertions with
references. Footnotes are conspicuous by their absence on the
Web. Information is self-referential. Symbols and images point to
themselves like a ten-dimensional dog chasing its own tails.
     Are there "eight firsthand witnesses who saw the bodies,"
"many high-ranking military officials who said it was not of this
earth," or "550 witnesses stating that this was not from this
earth?" Schmitt makes all of those statements in the same
interview. He uses the word "witness" the way Alice in Wonderland
uses words, to mean what she wants them to mean.
     Tracking down the truth about the "Roswell incident" is like
hunting the mythical Snark in the Lewis Carroll poem. The closer
one gets to the "evidence," the more it isn't there.
     There is in fact not one "witness" to the "Roswell incident"
in the public domain, not one credible report that is not
filtered through a private interview or privileged communication.
     There are, though, lots of people making a living from it --
makers of the Ray Santilli "autopsy film," guides for tours of
the rival crash sites in Roswell, television producers and book
publishers. It all gets very confusing.
     Is any of the confusion intentional?

Ready for a Headache?

     Are government agents using the subculture to manipulate
public opinion? To cover up what they know? Are UFO investigators
spies, "useful idiots" (as they're known in the spy trade), or
just in it for the buck?
     An online adventure illustrates the difficulty of getting
answers.
     A woman in Hamilton, Montana, was speaking to Peter
Davenport, head of the National UFO Reporting Center in Seattle
about a UFO she said was above her house. She said she heard
beeps on the radio when it was hovering. As they spoke, some
beeps sounded.
     "There!" she said. "What is that?"
     I recorded the beeps and posted a message on a hacker's
Internet group asking for help.
     I received an offer of assistance from the LoD, the Legion
of Doom, a well-known hacker name. I emailed the beeps as an
audio file to them. They examined the switching equipment used by
the Montana telco and reported that the signals did not originate
within the system. They could say what the signals were not, but
not what they were.
     In another email, a writer said he had heard similar tones
over telephone lines and shortwave radio near White Sands Missile
Range. He said friends inside the base had given him "some info
that would be of great interest.
     "The documentation and info that I am getting are going to
basically confirm what a member of the team has divulged to me
[about UFO occupants].
     "They are here and they are not benign."

Into the Twilight Zone

     Without corroboration, that's as far as the Internet can
take us.
     Words originate with someone -- but who? Is the name on the
email real? Is the account real? Was the White Sands source who
he said he was? Were his contacts telling the truth? Or was he a
bored kid killing time?
     The UFO world is a hall of mirrors. The UFO world on the
Internet is a simulation of a hall of mirrors. The truth is out
there ... but how can we find it?
     Plato was right. We need to know who is speaking to evaluate
the data.

The Bottom Line

     A number of years ago, I volunteered to be Wisconsin state
director of the Mutual UFO Network in order to listen firsthand
to people who claimed to have encountered UFOs. I brought sixteen
years' experience as a counsellor to the project. I listened to
people from all walks of life.
     My interest in the phenomena had quickened in the 1970s
during a conversation with a career Air Force officer, a guy with
all the "right stuff."
     A fellow B47 pilot told him of an unusual object that flew
in formation with him for a while, then took off at an incredible
speed. The co-pilot verified the incident. Neither would report
it and risk damage to their careers.
     That was the first time I heard a story like that from
someone I knew well. I remember how he looked as he told that
story. Usually confident, even cocky, he looked puzzled,
helpless. That was the first time I saw that look, too, but it
wouldn't be the last.
     I have seen that look many times since as credible people --
fighter pilots, commercial air line pilots, intelligence
officers, and just plain folk fishing on an isolated lake or
walking in the woods after dark -- recounted an experience they
can't forget. They don't want publicity. They don't want money.
They just want to know what they saw.
     Data has been accumulating for fifty years. Some is on the
Internet. Some is trustworthy. Much of it isn't.
     Are we hunting a Snark, only to be bamboozled by a boojum?
Or are we following luminous breadcrumbs through the forest to
the Truth that is Out There?
     The Net is one place to find answers, but only if our
pursuit of the truth is conducted with discipline, a rigorous
methodology and absolute integrity.









**********************************************************************

Islands in the Clickstream is a weekly column written by
Richard Thieme exploring social and cultural dimensions
of computer technology. Comments are welcome.

Feel free to pass along columns for personal use, retaining this
signature file. If interested in (1) publishing columns
online or in print, (2) giving a free subscription as a gift, or
(3) distributing Islands to employees or over a network,
email for details.

To subscribe to Islands in the Clickstream, send email to
rthieme@thiemeworks.com with the words "subscribe islands" in the
body of the message. To unsubscribe, email with "unsubscribe
islands" in the body of the message.

Richard Thieme is a professional speaker, consultant, and writer
focused on the impact of computer technology on individuals and
organizations.

Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.

ThiemeWorks  P. O. Box 17737  Milwaukee WI 53217-0737  414.351.2321
*********************************************************************

------------------------------

Date: 9 Jul 1997 13:34:47 GMT
From: glr@RIPCO.COM(Glen Roberts)
Subject: File 6--Oil City Officials Worry About Link To Web Page

 AP  06-30-97 12:11 PMT
 AM-PA-BRF--Oil City-Internet,150
 Oil City officials worry about link to web page

 Eds: Note Internet address at end.

    OIL CITY, Pa. (AP)  Officials in this northwestern Pennsylvania
city say they do not want to be linked to an Internet site
including electronic rants against religions, blacks, women and
homosexuals.
    The ``Outrage'' page is maintained by Glen Roberts, who also
posts advertisements for Oil City on his home page in cyberspace.
    Oil City Mayor Malachy McMahon and other officials are afraid
people might think the page reflects the views of city residents.
    Roberts has a reputation as a spokesman for Internet privacy
issues and once posted the Social Security numbers of Indiana
University employees to make a point about privacy.
    He said the opinions on his page are not his own, but rather
those of anonymous people who wish to express a viewpoint.
    ``The whole Internet is based on people being able to say what
they want,'' Roberts said. ``It's different than a newspaper, whose
letters are filtered through editors and publishers.''
    =
    The Internet address for Roberts' site is:
http://www.glr.com/outrage.html.

------------------------------

Date: Sun, 13 Jul 97 16:39 CDT
From: Cu Digest <TK0JUT2@MVS.CSO.NIU.EDU>
Subject: File 7--Call for Commentaries on CuD Special Issue of Net & Education

Over the past year or two, CuD has received queries about how the
Net can be, or is being, used in classrooms, how the "virutal
university" concept is being developed, and in general, what's
going on at the K-12 and higher education levels.

This isn't a topic CuD has addressed in its 8 years of covering
cyberculture, but the number of inquiries convinces us that we
should make up for this omission.  Because CuD has several
hundred thousand readers, we assume that a substantive number of
them are educators who use the Net.

We will start with a special issue in about two or three weeks,
and we solicit substantive commentaries (10-35 K) on such issues
as:
  1) Innovative uses of the Net in classrooms
  2) Problems/pitfalls in using the Net in teaching
  3) Book reviews of Net-based pedagogy
  4) Lists of URLs elated to Net pedagogy
  5) Strengths/weaknesses of Virtual Universities
  6) Critical essays on whether Net pedagogy is
     a dilution of education

The above are suggestive.  Readers will likely have other topics
of interest, so feel free to send them over for consideration.
Commentaries should be sent to:  cudigest@sun.soci.niu.edu

------------------------------

Date: 10 Jul 1997 02:48:17 -0700
From: Russ Allbery <rra@stanford.edu>
Subject: File 8--Star Wars, Fanfiction, and Big Eight Newsgroup Creation

The policy of the current Big Eight newsgroup creation system on
newsgroups devoted to fanfiction has recently been criticized here.  (The
Big Eight are the comp, humanities, misc, news, rec, sci, soc, and talk
hierarchies.)  Here's what that policy actually is and a little background
on the reason for it.

First of all, please realize that the Big Eight is not all of Usenet.  It
is just eight specific Usenet hierarchies; there are many, *many* more.
Each hierarchy is created for a different purpose and has a different set
of rules for creating new groups in that hierarchy.

A major goal of the Big Eight is to provide a relatively small set of
widely useful newsgroups that are maintained by a central newsgroup
creation system.  Ideally, every system carrying the Big Eight will have
precisely the same set of newsgroups; solid propagation and consistency
across different news servers are the major feature of this sort of
approach to newsgroup creation.  Obviously this procedure does *not* work
for all topics, given that a voting procedure is involved (and therefore
the possibility of a group being voted down for political reasons exists)
and given that news administrators may not want certain types of groups
created automatically without their review.  This is precisely why alt.*
was created originally; alt.* has a wide-open creation policy and
therefore is home to the sorts of groups that couldn't be created in the
Big Eight for whatever reason.  (The tradeoff, of course, being that alt.*
groups are often subject to manual review at each site and tend to be much
less consistent across different news sites.)

Now, about the proposed Star Wars stories group.  Fanfiction (fiction
using trademarked or copyrighted characters and backgrounds without the
permission of the owners) has always been of questionable legality and
subject to the occasional lawsuit in the United States and elsewhere.  Due
to the way intellectual property laws work in the United States,
fanfiction *may* be illegal and if a news site is knowingly carrying a
newsgroup devoted solely to fanfiction, it *may* be possible to sue them
as well as the authors for the violation.

No, it's probably not very *likely* that a news site would be sued.  But
this *has* been an often-stated concern by news administrators in the
past.

Keep in mind the purpose of the Big Eight, namely to create a set of
useful newsgroups that can be created automatically at all the subscribing
sites.  Due to this *possible* legal concern, a large number of news
administrators do not want newsgroups devoted to fanfiction automatically
created on their news servers, and therefore would not be able to just let
the Big Eight newsgroup creation process run automatically on their
servers if the Big Eight includes those groups.  This directly hurts one
of the primary purposes of the hierarchies.  Therefore, newsgroups which
are devoted to fanfiction are against the rules of the Big Eight unless
the proponent can show reasonable evidence that the groups would not cause
a legal problem.

Some proponents do in fact do precisely that.  rec.arts.anime.creative
exists because anime and manga companies do not, as a matter of general
policy, prosecute fanfiction, so the legal concern is minimal.
rec.arts.comics.creative exists because its charter requires that stories
posted there use original characters.  Other groups have been proposed
with no problems before because they would have been for parody.  The
proponents of the Star Wars group were considering changing their charter
to require parody or original characters and background, which would make
the group fine under those rules.

If a group can't fit under those rules, it most certainly isn't censored.
It simply needs to be created in a different hierarchy that has looser
rules, such as alt.*.  People create fanfiction groups in alt.* routinely
and some of them are quite successful.

Also, please note that no *post* is refused.  The newsgroup creation
system has nothing to do with individual posts; it has to do with
newsgroups.  One can post pretty much anything one wishes to any
unmoderated group, and the newsgroup creation system doesn't affect that
in the slightest.  The only thing this policy affects is whether a
newsgroup devoted to fanfiction can be created in this particular set of
hierarchies.

Finally, this policy obviously doesn't affect discussion, including
discussion of fanfiction, as should be obvious from the five existing
discussion groups devoted to Star Wars.  Discussion of fanfiction is
certainly on-topic in rec.arts.sf.starwars.misc and absolutely nothing
prevents it from being posted there.

Hopefully this clarifies the situation somewhat.  This policy, just like
all other Big Eight newsgroup creation policies, tends to get discussed
periodically on news.groups, and anyone with questions or concerns about
it is certainly welcome to raise the issue there or contact me directly.

--
Russ Allbery (rra@stanford.edu)         <URL:http://www.eyrie.org/~eagle/>

------------------------------

Date: Thu, 10 Jul 1997 23:45:11 +0000
From: David Smith <bladex@bga.com>
Subject: File 9--Anti-solicitation laws and anti-spam "opt-in" mailing lists

Source -  fight-censorship@vorlon.mit.edu

One of the tactics advocated by anti-spam activists is that of an
"opt-in" mailing list.  That is, I can't send you commercial
speech via e-mail unless you request the information or we have a
prior business relationship.

I read the following article in First Amendment Legal Watch
(excerpted below) where an anti-solicitation law aimed at real
estate brokers was ruled by a district judge as a violation of
the First Amendment.

I'm not very familiar with anti-solicitation laws.  Are there
other decisions about statutes that have been upheld or
over-turned?

------- Begin Article  -------

3.  Anti-Solicitation Law Violates First Amendment

A federal district court judge recently struck down an Illinois
real-estate anti-solicitation law in a case that has gone on for
more than 10 years. The statute prohibited real-estate brokers
from soliciting home sales or listings from owners who had
provided notice that they did not wish to be solicited.

After being fined $100 for calling certain Chicago homeowners who
had signed an anti-solicitation petition, a brokerage firm and
several brokers challenged the law in federal court.

The case has a long and convoluted history. Initially, federal
district court Judge Brian Barnett Duff denied the brokerage
firm's motion to enjoin the law. During the appeals process, the
case eventually reached the U.S. Supreme Court, which sent it back
down to Judge Duff for reevaluation under a different
constitutional standard. In April 1996, the parties had a bench
(non-jury) trial which resulted in this recent opinion.

Judge Duff ruled the law violated real-estate brokers' free-speech
and due-process rights. Analyzing the law under the commercial
free-speech doctrine, the Court found that the Illinois attorney
general failed to show that the anti-solicitation law "materially
and directly advanced" the state's interests in protecting
residential privacy and preventing blockbusting-a real-estate
practice in which brokers encourage owners to sell their homes by
exploiting fears of racial change in the neighborhood.

According to the judge, blockbusting is an outdated practice in
today's society that could, in any event, be properly punished
under other laws. He also found that real-estate solicitation
constituted only a small portion of messages residents encounter.
For this reason, the judge found that the law restrained too much
speech while only marginally protecting privacy concerns.

The judge also determined the law violated due process because the
law failed to define the term "solicit. " According to the court
opinion, a broker could unwittingly violate the law by harmlessly
handing out business cards to someone who has signed an
anti-solicitation petition.

<snip>

First Amendment Legal Watch Contact Info --

copyright 1997 First Amendment Center

To subscribe to the Legal Watch mailing list send an email to
legalwatch-join@truman.fac.org

To unsubscribe send an email to legalwatch-off@truman.fac.org

Legal Watch is available on our Web site (http://www.fac.org) in
HTML format and Adobe Acrobat format for printing.

------------------------------

Date: Thu, 7 May 1997 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

         In ITALY: ZERO! BBS: +39-11-6507540

  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #9.56
************************************