💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0956.txt captured on 2022-06-12 at 11:05:54.
-=-=-=-=-=-=-
Computer underground Digest Sun July 13, 1997 Volume 9 : Issue 56 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Field Agent Extraordinaire: David Smith Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #9.56 (Sun, July 13, 1997) File 1--Cyber Patrol Bans Crpyt Newsletter File 2--ALA Council Resolution on the Use of Filtering Software File 3--An Economic Basis for SPAM Control File 4--French "English Only" Web Site Suit Dismissed File 5--UFOs and the Net (fwd Islands in the Clickstream) File 6--Oil City Officials Worry About Link To Web Page File 7--Call for Commentaries on CuD Special Issue of Net & Education File 8--Star Wars, Fanfiction, and Big Eight Newsgroup Creation File 9--Anti-solicitation laws and anti-spam "opt-in" mailing lists File 10--Cu Digest Header Info (unchanged since 7 May, 1997) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: 20 Jun 97 01:53:31 EDT From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM> Subject: File 1--Cyber Patrol Bans Crpyt Newsletter ((CuD MODERATORS' COMMENT: George Smith learned the danger of blocking software. As he explains, the homepage of Crypt Newsletter was blocked. Why? Because another homepage on the server, the American Society of Criminology's Critical Criminology Division homepage at http://www.soci.niu.edu/~critcrim, includes a copy of the Unabomer Manifesto. The Crit Crim page is a well-established and busy resource, especially for criminologists, and the Unabomer Manifesto is relevant to the research resources the page provides. Unfortunately, all homepages on the system beginning with ~cr were blocked. Although the problem apparently has been resolved for now, risks of future blocking remain. Because libraries and schools use Cyber Patrol, the consequence of the blocking may be to exclude students from the ability to access a valuable homepage for assigments)). Banned by Cyber Patrol June 19, 1997 Hey, buddy, did you know I'm a militant extremist? Cyber Patrol, the Net filtering software designed to protect your children from cyberfilth, says so. Toss me in with those who sleep with a copy of "The Turner Diaries" under their pillows and those who file nuisance liens against officials of the IRS. Seems my Web site is dangerous viewing. I discovered I was a putative militant extremist while reading a story on Net censorship posted on Bennett Haselton's PeaceFire Web site. Haselton is strongly critical of Net filtering software and he's had his share of dustups with vendors like Cyber Patrol, who intermittently ban his site for having the temerity to be a naysayer. Haselton's page included some links so readers could determine what other Web pages were banned by various Net filters. On a lark, I typed in the URL of the Crypt Newsletter, the publication I edit. Much to my surprise, I had been banned by Cyber Patrol. The charge? Militant extremism. Cyber Patrol also has its own facility for checking if a site is banned, called the CyberNOT list. Just to be sure, I double-checked. Sure enough, I was a CyberNOT. Now you can call me Ray or you can call me Joe, but don't ever call me a militant extremist! I've never even seen one black helicopter transporting U.N. troops to annex a national park. However, nothing is ever quite as it seems on the Web and before I went into high dudgeon over political censorship--the Crypt Newsletter has been accused of being "leftist" for exposing various government, academic, and software industry charlatans--I told some of my readership. Some of them wrote polite--well, almost polite--letters to Debra Greaves, Cyber Patrol's head of Internet research. And Greaves wrote back almost immediately, indicating it had all been a mistake. My Web site was blocked as a byproduct of a ban on another page on the same server. "We do have a [blocked] site off of that server with a similar directory. I have modified the site on our list to be more unique so as to not affect [your site] any longer," she wrote. Perhaps I should have been reassured that Cyber Patrol wasn't banning sites for simply ridiculing authority figures, a favorite American past time. But if anything, I was even more astonished to discover th company's scattershot approach to blocking. It doesn't include precise URLs in its database. Instead, it prefers incomplete addresses that block everything near the offending page. The one that struck down Crypt News was "soci.niu.edu/~cr," a truncated version of my complete URL. In other words: any page on the machine that fell under "~cr" was toast. Jim Thomas, a sociology professor at Northern Illinois University, runs this particular server, and it was hard to imagine what would be militantly extreme on it. Nevertheless, I ran the news by Thomas. It turns out that the official home page of the American Society of Criminology's Critical Criminology Division, an academic resource, was the target. It features articles from a scholarly criminology journal and has the hubris to be on record as opposing the death penalty but didn't appear to have anything that would link it with bomb-throwing anarchists, pedophiles, and pornographers. There was, however, a copy of the Unabomber Manifesto on the page. I told Thomas I was willing to bet $1,000 cash money that Ted Kaczynski's rant was at the root of Cyber Patrol's block. Thomas confirmed it, but I can't tell you his exact words. It might get this page blocked, too. What this boils down to is that Cyber Patrol is banning writing on the Web that's been previously published in a daily newspaper: The Washington Post. It can also be said the Unabomber Manifesto already has been delivered to every corner of American society. If the ludicrous quality of this situation isn't glaring enough, consider that one of Cyber Patrol's partners, CompuServe, promoted the acquisition of electronic copies of the Unabomber Manifesto after it published by the Post. And these copies weren't subject to any restrictions that would hinder children from reading them. In fact, I've never met anyone from middle-class America who said, "Darn those irresponsible fiends at the Post! Now my children will be inspired to retreat to the woods, write cryptic essays attacking techno-society, and send exploding parcels to complete strangers." Have you? So, will somebody explain to me how banning the Unabomber Manifesto, the ASC's Critical Criminology home page, and Crypt Newsletter protects children from smut and indecency? That's a rhetorical question. Cyber Patrol is strongly marketed to public libraries, and has been acquired by some, in the name of protecting children from Net depravity. Funny, I thought a public library would be one of the places you'd be more likely to find a copy of the Unabomber Manifesto. _George Smith is the author of The Virus Creation Labs, a book about computer virus writers and the antivirus industry._ ------------------------------ Date: Wed, 9 Jul 1997 10:28:11 -0800 From: "--Todd Lappin-->" <telstar@wired.com> Subject: File 2--ALA Council Resolution on the Use of Filtering Software Source - fight-censorship@vorlon.mit.edu From: "Craig A. Johnson" <caj@tdrs.com> AMERICAN LIBRARY ASSOCIATION This resolution was adopted by ALA Council at the annual conference. RESOLUTION ON THE USE OF FILTERING SOFTWARE IN LIBRARIES WHEREAS, On June 23, 1997, the United States Supreme court issued a sweeping re-affirmation of core First Amendment principles and held that communications over the Internet deserve the highest level of Constitutional protection; and WHEREAS, The Court's most fundamental holding is that communications on the Internet deserve the same level of Constitional protection as books, magazines, newspapers, and speakers on a street corner soapbox. The Court found that the *Internet constitutes a vast platfrom from which to address and hear from a world-wide audience of millions of readers, viewers, researchers, and buyers,* and that *any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox*; and WHEREAS, For libraries, the most critical holding of the Supreme Court is that libraries that make content available on the Internet can continue to do so with the same Constitutional protections tha apply to the books on libraries' shelves; and WHEREAS, The Court's conclusion *that the vast democratic fora of the Internet* merit full constitutional protection will also serve to protect libraries that provide their patrons with access to the Internet; and WHEREAS, The Court recognized the importance of enabling individuals to receive speech from the entire world and to speak to the entire world. Libraries provide these opportunities to many who would not otherwise have them; and WHEREAS, The Supreme Court's decision will protect that access; and WHEREAS, The use in libraries of software filters which block Constitutionally protected speech is inconsistent with the United States Constitution and federal law and may lead to legal exposure for the library and its governing authorities; now, therefore, be it RESOLVED, That the American Library Association affirms that the use of filtering software by libaries to block access to constitutionally protected speech violates the Library Bill of Rights. Adopted by the ALA Council, July 2, 1997 ------------------------------ Date: Wed, 09 Jul 97 09:59:10 EST From: Computer Privacy Digest Moderator <comp-privacy@UWM.EDU> Subject: File 3--An Economic Basis for SPAM Control ((SOURCE - Computer Privacy Digest, Vol 11, #002:, Wed 8 July: The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. Web browsers will find it at http://www.uwm.edu/org/comp-privacy/)) ========= From--Steve Schear <azur@netcom.com> Date--02 Jul 1997 18:02:07 -0700 Subject--An Economic Basis for SPAM Control There are three approaches being publicly discussed to regulate unwanted email: regulatory, opt-in and opt-out. Due to subtle, but important differences between fax and email, I believe the legal approach will be difficult to craft without facing First Amendment challenges. Both the opt-in and opt-out appear to create more bureaucratic overhead and may be difficult to satisfactorily administer. There is a fourth approach, economic, which has received scant attention. Postage costs are what, quite effectively, keep our snail-mail boxes from overflowing with junk. Since email is essentially free, or almost, there has been no incentive for SPAMers to better target their ads, as is financially required for snail-mail advertising. One economic approach is to enhance email software (either at the ISP or client end) that would filter incoming messages in two ways: to determine if the sender was known to the recipient (i.e., from previous correspondence) or to determine if sufficient postage was placed within the message header. The email software could automate building the 'known sender' list from email responses and other user input (in this way electronic mailing lists would should not be affected). Messages not from known parties and without sufficient postage would be rejected: returned to sender or discarded. The email software could refund postage--e.g., by explicit recipient action or in the next reply email--so non-SPAM senders would not be left out-of-pocket for d-postage. SPAMers would have their d-postage pocketed by the recipient. There are at least two Digital Postage (d-postage) approaches: e-cash based d-postage and sender-generated d-postage (hashcash). E-cash based postage is an obvious choice. Like today's postal stamps, the sender would need to purchase the e-cash and include it in the header of outgoing mail to recipients to whom the sender was unknown. However, e-cash isn't widely used nor is it certain that current and proposed e-cash systems could economically and architecturally scale to address Net d-postage. An alternative is to use 'stamps' created by the sender. Called 'hashcash,' it was first put forward as a way to reduce remailer abuse. With hascash the sender must perform a mathematical operation which is very computationally intensive when generating the 'stamp' (the more complex the higher the stamp value) but which is quick for the recipient to check. Each stamp value is intimately related to the recipient's address, so a SPAMer can't reproduce a stamp and send them to different addressees. Hashcash is elegant in its simplicity and scalability due to its lack of a centralized issuing or clearing facility. Hascash-based d-postage could also seed the development of commercial distributed computing Net industry, as SPAMers elect to purchase hashcash rather than generating it themselves-the idea isn't to eliminate SPAM, just place it on similar economic footing with junk snailmail. (See http://www.dcs.ex.ac.uk/~aba/hashcash/). ------------------------------ Date: Tuesday, June 10, 1997 From: user45@@anonymous.nosys.com Subject: File 4--French "English Only" Web Site Suit Dismissed Source: Reuters. Dateline: PARIS FRENCH INTERNET SUIT DISMISSED ENGLISH-ONLY WEB SITE ILLEGAL, GROUPS CHARGE The first test of whether France's disputed language law applies to the Internet ended in a fiasco Monday when a court threw out the case against an overseas branch of Georgia Tech on a technicality. Two state-approved watchdogs promoting the use of the French language had filed a complaint against the Georgia Institute of Technology's French campus for using English only on its Web site. The plaintiffs, Defense of the French Language and Future of the French Language, accused Georgia Tech Lorraine of breaking a 1994 law requiring all advertising in France to be in French. The Paris police court dismissed the lawsuit, saying the two private groups should have notified a public prosecutor first. The legislation, named after then-Culture Minister Jacques Toubon, was part of a battle to protect the tongue of Moliere and Racine from the growing international use of English. "The central question, the most interesting one, has not been decided today; only a procedural matter has," said Marc Jobert, lawyer for the two groups, which had demanded that the Internet site be translated into French. While supporters of Internet say the World Wide Web should be free of national restraints, many governments have asserted their authority over cyberspace to try to block pornography or to silence political dissent. "The court did not address the underlying issue and has left us wanting more," said Jacques Schaefer, lawyer for Georgia Tech Lorraine, which is based in Metz, in eastern France. "It's a total victory in the sense that we were cleared of all accusations," he said, but the university would rather have won on substance than on procedure. Georgia Tech President Wayne Clough said the drive to apply the Toubon law to the Web ignores its "interconnected nature." "The Web is the personification of the global economy. It does not recognize national or linguistic borders," he said. Georgia Tech argued at a January hearing that communications on the Web are like telephone calls. It said its Web site is in English because all of its courses are taught in the language and students are required to be fluent in English. Two weeks ago, Georgia Tech Lorraine made its Web site available in French and German as well but denied the lawsuit was the reason. It said that technological advances in the global computer network had made it easier to provide the translation and that it "wanted to be more European." ------------------------------ Date: Sat, 12 Jul 1997 21:37:40 -0500 From: Richard Thieme <rthieme@thiemeworks.com> Subject: File 5--UFOs and the Net (fwd Islands in the Clickstream) Islands in the Clickstream: UFOs and the Internet [This summer marks the 50th anniversaries of the first modern publicized report of UFO phenomena by Kenneth Arnold in June 1947 and the "Roswell incident" in July 1947. This column is much abridged from the articles "How to Build a UFO ... Story" (Internet Underground: November 1996) and "Stalking the UFO Meme on the Internet" (South Africa Computer Magazine: April 1997). The article was also included in Digital Delirium (eds. Arthur and Marilouise Kroker: St. Martin's Press: 1997). A full copy will be archived on the ThiemeWorks web site -- coming this summer.] "We are convinced that Roswell took place. We've had too many high ranking military officials tell us that it happened, that told us that it was clearly not of this earth." Don Schmitt, co-author, "The Truth About the UFO Crash at Roswell," in an interview on the Internet That "interview with a real X-Filer" can be found on one of the hundreds of web sites -- in addition to Usenet groups, gopher holes stuffed with hundreds of files, and clandestine BBSs where abductees meet to compare "scoop marks" -- that make up the virtual world of flying saucers. The UFO subculture or -- for some -- the UFO religion on the Internet is a huge supermarket of images and words. Everything is for sale -- stories, pictures, entire belief systems. But are we buying a meal? Or a menu? When Schmitt uses the word "Roswell," he is not merely identifying a small town in New Mexico that put itself on the map with a terrific UFO story. He uses it to MEAN the whole story -- the one that says a UFO crashed in 1947 near the Roswell Army Air Field, after which alien bodies were recovered and a cosmic Watergate initiated. That story is scattered on the Internet like fragments of an exploding spaceship. Do the pieces fit together to make a coherent puzzle? Or is something wrong with this picture? Stalking the UFO meme on the Internet Memes are contagious ideas that replicate like viruses from mind to mind. On the Internet memes multiply rapidly. Fed by fascination, incubated in the feverish excitement of devotees transmitting stories of cosmic significance, the UFO meme mutates into new forms, some of them wondrous and strange. "The Roswell incident" is one variation of the UFO meme. On the Internet, Schmitt's words are hyperlinked to those of other UFO sleuths and legions of interested bystanders fascinated by the psychodynamics of the subculture as well as the "data." Before we examine a few fragments, let's pause to remember what the Internet really is. Copies of copies -- or copies of originals? The Internet represents information through symbols or icons. So does speech, writing, and printed text, but the symbols on the Net are even further removed from the events and context to which they point. The power of speech gave us the ability to lie, then writing hid the liar from view. That's why Plato fulminated at writing -- you couldn't know what was true if you didn't have the person right there in front of you. The printing press made it worse. Now digital images and text are on the Net. Pixels can be manipulated. Without correlation with other data, no digital photo or document can be taken at face value. There's no way to know if we're looking at a copy of an original, a copy of a copy, or a copy that has no original. In addition, certain phenomena elicit powerful projections. Because projections are unconscious, we don't know if we're looking at iron filings obscuring a magnet or the magnet. Carl Jung said UFOs invite projections because they're mandalas -- archetypal images of our deep Selves. Unless we separate what he think we see from what we see, we're bound to be confused. Hundreds of cross-referenced links on the Web create a matrix of credibility. In print, we document assertions with references. Footnotes are conspicuous by their absence on the Web. Information is self-referential. Symbols and images point to themselves like a ten-dimensional dog chasing its own tails. Are there "eight firsthand witnesses who saw the bodies," "many high-ranking military officials who said it was not of this earth," or "550 witnesses stating that this was not from this earth?" Schmitt makes all of those statements in the same interview. He uses the word "witness" the way Alice in Wonderland uses words, to mean what she wants them to mean. Tracking down the truth about the "Roswell incident" is like hunting the mythical Snark in the Lewis Carroll poem. The closer one gets to the "evidence," the more it isn't there. There is in fact not one "witness" to the "Roswell incident" in the public domain, not one credible report that is not filtered through a private interview or privileged communication. There are, though, lots of people making a living from it -- makers of the Ray Santilli "autopsy film," guides for tours of the rival crash sites in Roswell, television producers and book publishers. It all gets very confusing. Is any of the confusion intentional? Ready for a Headache? Are government agents using the subculture to manipulate public opinion? To cover up what they know? Are UFO investigators spies, "useful idiots" (as they're known in the spy trade), or just in it for the buck? An online adventure illustrates the difficulty of getting answers. A woman in Hamilton, Montana, was speaking to Peter Davenport, head of the National UFO Reporting Center in Seattle about a UFO she said was above her house. She said she heard beeps on the radio when it was hovering. As they spoke, some beeps sounded. "There!" she said. "What is that?" I recorded the beeps and posted a message on a hacker's Internet group asking for help. I received an offer of assistance from the LoD, the Legion of Doom, a well-known hacker name. I emailed the beeps as an audio file to them. They examined the switching equipment used by the Montana telco and reported that the signals did not originate within the system. They could say what the signals were not, but not what they were. In another email, a writer said he had heard similar tones over telephone lines and shortwave radio near White Sands Missile Range. He said friends inside the base had given him "some info that would be of great interest. "The documentation and info that I am getting are going to basically confirm what a member of the team has divulged to me [about UFO occupants]. "They are here and they are not benign." Into the Twilight Zone Without corroboration, that's as far as the Internet can take us. Words originate with someone -- but who? Is the name on the email real? Is the account real? Was the White Sands source who he said he was? Were his contacts telling the truth? Or was he a bored kid killing time? The UFO world is a hall of mirrors. The UFO world on the Internet is a simulation of a hall of mirrors. The truth is out there ... but how can we find it? Plato was right. We need to know who is speaking to evaluate the data. The Bottom Line A number of years ago, I volunteered to be Wisconsin state director of the Mutual UFO Network in order to listen firsthand to people who claimed to have encountered UFOs. I brought sixteen years' experience as a counsellor to the project. I listened to people from all walks of life. My interest in the phenomena had quickened in the 1970s during a conversation with a career Air Force officer, a guy with all the "right stuff." A fellow B47 pilot told him of an unusual object that flew in formation with him for a while, then took off at an incredible speed. The co-pilot verified the incident. Neither would report it and risk damage to their careers. That was the first time I heard a story like that from someone I knew well. I remember how he looked as he told that story. Usually confident, even cocky, he looked puzzled, helpless. That was the first time I saw that look, too, but it wouldn't be the last. I have seen that look many times since as credible people -- fighter pilots, commercial air line pilots, intelligence officers, and just plain folk fishing on an isolated lake or walking in the woods after dark -- recounted an experience they can't forget. They don't want publicity. They don't want money. They just want to know what they saw. Data has been accumulating for fifty years. Some is on the Internet. Some is trustworthy. Much of it isn't. Are we hunting a Snark, only to be bamboozled by a boojum? Or are we following luminous breadcrumbs through the forest to the Truth that is Out There? The Net is one place to find answers, but only if our pursuit of the truth is conducted with discipline, a rigorous methodology and absolute integrity.