|
AA BBS - Thomases are going to jail..., Microsoft
NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From <@uga.cc.uga.edu:[email protected]> Wed Dec 7 19:39:12 1994
Return-Path: <<@uga.cc.uga.edu:[email protected]>>
Received: from uga.cc.uga.edu by netcom11.netcom.com (8.6.9/Netcom)
id TAA05108; Wed, 7 Dec 1994 19:38:59 -0800
Received: from UGA.CC.UGA.EDU by uga.cc.uga.edu (IBM VM SMTP V2R2)
with BSMTP id 1696; Wed, 07 Dec 94 22:31:57 EST
Received: from UGA.CC.UGA.EDU (NJE origin LISTSERV@UGA) by UGA.CC.UGA.EDU (LMail V1.2a/1.8a) with BSid 5631; Wed, 7 Dec 1994 21:56:48 -0500
Received: from NIU.BITNET by VMD.CSO.UIUC.EDU (LISTSERV release 1.8a) with NJE
id 5205 for [email protected]; Wed, 7 Dec 1994 20:54:14 -0600
Date: Wed, 07 Dec 94 20:50 CST
To: cudigest%[email protected]
From: Cu Digest ([email protected]) <TK0JUT2%[email protected]>
Subject: Cu Digest, #6.6103
Message-ID: <CUDIGEST%[email protected]>
Sender: [email protected]
Status: O
Computer underground Digest Wed Dec 7, 1994 Volume 6 : Issue 103
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Reader: Laslo Toth
CONTENTS, #6.103 (Wed, Dec 7, 1994)
File 1--Re: AA BBS - Thomases are going to jail...
File 2--Microsoft helps nab "obscene" BBS (fwd)
File 3--"Evil Net Threatens to Collapse Civilization" (eyeW fwd)
File 4-- "Protect Your Privacy" Author Online on CIS
File 5--Cu in the News
File 6--Account Broken Into
File 7--cybercafe @ phone
File 8--"Hacker Learns Intelligence Secrets" (Update - Risks Reprint)
File 9--Call for Workshop Proposals
File 10--Politics of Science & Technology (fwd)
File 11--Cu Digest Header Information (unchanged since 25 Nov 1994)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
----------------------------------------------------------------------
Date: Mon, 5 Dec 94 10:55:10 PST
From: [email protected]
Subject: File 1--Re: AA BBS - Thomases are going to jail...
We have a Problem . . .
H. Keith Henson
Part of the Federal Government's law enforcement mechanism is under
the control of the Religious Right.
By reaching out thousands of miles through cyberspace connections, the
RR is using Federal power to suppress constitutionally protected
activities which they find offensive.
I expect the RR people involved feel that what they are doing is fair
return for Federal power being used to suppress the school Christmas
pageant in a thousand sleepy little towns in middle America--and less
dangerous than offing abortion doctors, or killing gays.
Most of you reading these groups are familiar with the AA BBS case.
In a nutshell, a postal inspector in Memphis called Amateur Action BBS
in California, downloaded a dozen files, ordered other stuff, shipped
the sysop some unsolicited kiddy porn, then arrested the sysop (Robert
Thomas) and his wife (Carleen) for kiddy porn and (by Memphis standards)
obscenity. They were tried in Memphis last summer by an obviously
biased court. (The judge and prosecutor made no attempt to hide their
longstanding mutual admiration.) The Memphis jury found the sysop
and his wife guilty of obscenity, but even they couldn't buy the kiddy
porn charges, and acquitted on that charge. Friday (Dec. 2, 1994), in
the worst perversion of justice I have ever witnessed, the sysop and
his wife were sentenced to three years.
They were lucky to get that little time.
I got a look at the pre-sentencing report. (I may be able to post
some of it later.) The recommended sentence included about twice this
amount of time based on the kiddy porn charge they were *acquitted*
of.
Those reports are simply *amazing*. They cover family members and
history out a generation or so in all directions, not to mention
school, medical records, tax filings, and any police record--even if
you were found innocent! It seems to be the function of these things
to put your entire life in the worst possible light.
Someone should take the form and do one for Christ just prior to the
Crucifixion. It would run something like:
". . . questionable father, . . low class occupation (carpenter), .
. . accused of impersonating a doctor by healing sick, . . . known
to associate with low class persons, . . . travels about
(vagabond), . . ."
Back to the problem.
I find the situation intolerable--without having a clear idea of how
to deal with it.
With little more effort (though a lot more skill than the postal
inspector demonstrated) the RR-controlled Feds can create crime and
venue problems for just about anyone running a BBS or net node.
Certainly *any* system which carries alt.sex.* is subject to the same
treatment by the Religious Right (in the guise of the Memphis Feds) as
AA BBS. In fact, the very .gifs that were found obscene in Memphis
were made "freely distribute," by Robert and have been posted *many*
times to the net.
Could we use economic retaliation? I won't use Federal Express any
more because it and Graceland (and the cat houses near Graceland) seem
to be the economic mainstays of Memphis. Unfortunately, even a very
effective economic boycott is not going to have an effect on the
zealots, and depressing that area further might make it an even *more*
repressive backwater because the last of the intelligent/tolerant
people would move out. On the other hand, economic pressures might
induce the more sensible part of the community to pressure the zealots
into being more tolerant (at least of people 3 time zones away!). In
recent years economic pressure has induced two states to change laws.
A positive sign that economic pressure might be effective is that the
local newspaper did *not* support the prosecution. Research question:
Why did the Memphis Feds back off after the Deep Throat trials?
Is the law any help? After nearly a year of watching the process, I
am *quite* pessimistic. In its own way, the court system is deeply
corrupt. I think even the RR folks know this is a political case and
not a criminal one. In political cases, leaving a person out on bail
during appeal is normal, but in this case, it is very much in the
government's interest to have Robert out of circulation so he cannot
pursue the Electronic Communication Privacy Act suit and other causes
of action against them in civil court. Robert's motion for bail
during appeal was denied.
Are there political routes? Yes, but chancy. It is possible that a
political fight with the RR might backfire and result in heavy
restrictions on the nets. Coming down hard on the nets would be very
popular with the Administration forces after the Clipper debacle. The
power of the net to organize political force must be quite worrying
to those in power. (It is clear to me that modern day revolutions,
anywhere in the world, and peaceful or not, would be organized through
the net. In some places this has already happened.) It may be that a
general cutting down on the powers of the Federal Government is in
order. This has pros and cons, and support (in some areas) even from
the RR. How *does* one shrink the unshrinkable? Tax revolts (in the
form of massive political pressure) seem to come about when the tax
rates get as high as they are now. Another possibility is that the
formation of private money may greatly shrink the ability of
governments everywhere to collect taxes.
Should people start thinking about direct action? I hope we don't
come to this! There is nothing I can think of worse than arousing the
technically knowledgeable to take the infrastructure apart. Problem
is that pinpoint damage (like taking the 901 area code down for a few
days or weeks) is somewhere between impossible and probably
impossible. (Though ATT managed to take down their entire phone
network for a day with a missing "case" statement.)
Your thoughts and suggestions would be appreciated. Please post
encrypted through a remailer chain if you absolutely *must* post ideas
about the last paragraph!
------------------------------
Date: Sun, 4 Dec 1994 19:05:34 -0600 (CST)
From: David Smith <[email protected]>
Subject: File 2--Microsoft helps nab "obscene" BBS (fwd)
Date-- Sat, 3 Dec 1994 18--25--28 -0500
[email protected]
Here is the complete article. My Internet pathway through AOL sucks, has
problems posting and connecting. The unnamed computer-right attorney is from
EFF. Maybe you can post the whole article from your end. Thanks.
Later,
WildBoy 25
Article follows:
MICROSOFT LEAD BROKE COMPUTER OBSCENITY CASE
12/2/94
by Jonathan Sidener
The Arizona Republic
The key elements of an obscenity investigation against a state Department of
Public Safety officer were gathered by the world's largest developer of
software, not by public law-enforcement officers.
According to court records released late Thursday, a principal investigator
in a case that led to the seizure of computer equipment and the temporary
shutdown of a pay-for-access bulletin board is an employee of Microsoft Corp.
A leading computer-rights attorney said Microsoft's role in the
investigation was unusual. But authorities defended Microsoft's role as
routine and appropriate.
When asked why a private corporation was involved in a criminal
investigation of obscenity rather than in copyright or other corporate
issues, an official with the Maricopa County Attorney's Office said it is
common for software, telephone or credit-card investigators to pass along
information of possible crimes to law-enforcement investigators.
The Microsoft investigator prowled the Phoenix "Wish Book" bulletin board in
August, September and October and downloaded electronic images of bestiality
and sexual acts involving excrement, according to the records in a
search-warrant affidavit.
The records say David Swartzendruber investigates software piracy for
Microsoft's law and corporate-affairs department.
The Wish Book was a bulletin board raided Tuesday by the DPS. DPS Officer
Lorne Shantz, 38, who operated the bulletin board from his Phoenix home, was
suspended with pay pending the outcome of the investigation.
Warrants also were served on the residences of Bob Barbee and Stan
Rosenblatt, who were co-operators of the system.
Shantz, a 14-year veteran of DPS, began the bulletin board in August 1988.
No criminal charges have been filed against any of the three. Shantz has
declined to comment on the advice of attorneys.
The affidavit gives this account of the steps leading to the investigation:
Officials received allegations from DPS Sgt. Dan Mitchell and two
"confidential informants" that Shantz's bulletin board was distributing child
pornography. No evidence of child pornography has been found.
Swartzendruber began searching for copyright violations and child
pornography in late August. On at least two occasions in September and at
least one in October, he found what was called "obscene materials" and
downloaded them. Swartzendruber provided the files to DPS investigators.
Deputy County Attorney Gail Thackeray defended Microsoft's role in the
investigation. She said she and DPS already had opened an investigation into
Wish Book when Microsoft approached them with information about the reputedly
obscene materials.
Thackeray said a Phoenix police detective who had been brought into the
investigation by the County Attorney's Office later found on his own in Wish
Book the images Microsoft had provided to investigators.
"Private investigators routinely exchange information with law-enforcement
officials, and it's not unique to the computer industry," Thackeray said.
But Michael Godwyn, an attorney for the Electronic Freedom Foundation,
questioned Microsoft's role in the Wish Book case.
Godwyn made his comments Thursday before the affidavits were released and
before the full extent of Microsoft's role was made public. He could not be
reached late Thursday.
A call to Microsoft's public-relations office in Redmond, Wash., was not
returned.
Barnett Lotstein, special assistant to County Attorney Rick Romley, said
Arizona obscenity statutes specifically define as obscene materials depicting
bestiality or explicit materials involving excrement.
"This is Justice Stewart stuff," Lotstein said, referring to Supreme Court
Justice Potter Stewart, who said that he couldn't define obscenity, but that
he knew it when he saw it.
"This clearly falls within our statute," Lotstein said.
Lotstein said the seizure of computer equipment was not intended to shut
down the bulletin board. He said the equipment will be returned after
authorities are able to copy all of the computer files.
The search warrant specifies that only the electronic mail of the three
system operators would be read.
------------------------------
Date: Wed, 30 Nov 1994 22:26:45 -0500
From: [email protected](eye WEEKLY)
Subject: File 3--"Evil Net Threatens to Collapse Civilization" (eyeW fwd)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY November 24 1994
Toronto's arts newspaper .....free every Thursday
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYE.NET EYE.NET
EVIL NET THREATENS TO COLLAPSE CIVILIZATION
Film at 11
by
K.K. CAMPBELL
In that insatiable quest for coverage of the 3 Ps -- pornography,
pedophilia and piracy -- reporters will stop at nothing. Hell, they'll
even manufacture the tale.
On Oct. 10, some person named Tom Kavanagh ([email protected]) wrote a post
called "RESEARCHING COMPUTER PORN _ HELP WANTED" to newsgroup
ont.general. Ol' Tom posted for reporter Jeffrey Kofman.
CBC's Kofman [CBC is Canada's national broadcast outlet] writes: "Have you
discovered the limitless range ofcomputer porn? Have you discovered your
kid/student discovering thesame? I am a CBC- TV journalist preparing a report
on computerpornography and I am looking for people who are prepared to talk
abouttheir own experiences.
"I'd like to meet some teenage kids who can navigate through the world
of computer porn and who can show me what they've found. I'd also like
to meet parents and teachers who have come across their kids/students
exploring this world."
Ain't that special?
Kofman doesn't even have a net account. He has to get some third person
to post his request. Yet he's the one who's going to "inform" the
public about the porn-percolating net.
When are large news organizations going to wake up and realize they
have to hire someone who has a working knowledge of the net? General
assignment reporters can't be expected to know everything, but come on,
people -- do you send someone to cover Queen's Park who doesn't even
understand what the hell Ontario is?
The only public response I saw came the next day from Justin Wells
([email protected]) -- a satire of Kofman's post:
"I am a yellow journalist preparing a sensationalistic story on the
information superhighway, and I am looking for people prepared to
provide me with shocking and unrepresentative anecdotes from their own
experiences."
TO BOLDLY GO BRAIN-DEAD
Not to be outdone, CTV proudly entered its candidate for eye's First
Annual Stupid Net Coverage Awards with a full-page ad for some TV show
called William Shatner's Tekwar. The Nov. 2 ad ran in Starweek (The
Star's TV guide thing) featured the bold headline: "In 2044, drugs
aren't sold on the street. They're sold on the Internet." The ad shows
some white-bread male model pointing a plastic space-gun (it's 2044
after all!) at some darker-skinned non-white-bread male model --
clearly right in the middle of an exciting drug bust on the Infobahn.
Brilliant work, Captain.
JANET MARSTEN REPORTS...
Displaced Torontonian Janet Marsten ([email protected] --
that's Scotland) writes to EYE.NET: "After reading your article on the
media and the net a few weeks back [August 4], I thought you might
enjoy this little piece of misinformation and hype. I wanted you to
know that the media hype on this side of the Atlantic is just as
ignorant, inaccurate and sensationalist as it is there. The only
difference is that few people have even heard of Karla Homolka!"
Net.trooper Marsten sends an article from the Oct. 8 edition of The
Scotsman -- Scotland's national newspaper -- called "Cook Book With A
Nasty Taste." It's a story about The Anarchist's Cookbook and how the
unregulated net corrupts children!
The Anarchist's Cookbook dates back to 1971, long before the net as we
know it. It circulates cyberspace and I've seen it a few times. Last I
checked, you can grab a copy at anon FTP extro.ucc.su.oz.au in
/tmp/apple .
It tells how to make bombs, how to make LSD, etc. -- guerilla warfare
stuff. It's generally shunned as poorly researched. Indeed, some even
suggest it was created by some disinformation agents during the
turbulent '60s and early '70s by something like COINTELPRO, the FBI
counter intelligence program which tried to fuck-up radicals by
disseminating incorrect info.
Anyway, three Scottish kids (all under age 16) were dragged before the
court for credit card fraud. They scammed 1,734 of computer gear and
games. To hear the adults tell it, the kids were corrupted by the
"evil" Cookbook file circulating the net. The Scotsman uses the file as
a peg to mention that the net has mountains of dirty pictures... and
even images of people being beheaded in Vietnam! What a bunch of sickos
these netters are.
Shovel away this panic-mongering, what did the kids actually do? They
picked up the phone and called people, hoping to find adults stupid
enough to give out their credit card numbers to a complete stranger.
The kids then used info given them by mentally-challenged adults to
order computer stuff. As if anyone needs the Cookbook to figure that
out.
The mother of one of the boys says she's only speaking out to warn
mothers everywhere about the evil Cookbook and the net. She notes,
ominously, that the disk with the Cookbook file on it "looked no
different from any other in the disk box." The judge ordered the disk
confiscated, hoping that would end the matter. But the mother warns
"the disk" has been circulating "in the south of England."
Unfortunately mom lets slip the real story here: "The boys phoned about
15 people and of the 15 they got 11 'no's. I'm quite convinced that if
the other four had told them to 'bugger off,' then the boys would have
just given up."
No protecting people from their own stupidity. Of course, when news
media try to whip up hysteria, the stupidity of others becomes a
control weapon.
Oh yeah, BTW -- you can buy civilization-threatening The Anarchist's
Cookbook at the World's Biggest Bookstore (Barricade Books, $34.75
cloth). [World's Biggest Bookstore is nothing but a huge Toronto bookstore.]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace Author holds standard copyright
Issues of eye in archive gopher://interlog.com
Coupla Mailing lists available http://www.interlog.com/eye
[email protected] "Break the Gutenberg Lock..." 416-971-8421
------------------------------
Date: 05 Dec 94 10:47:03 EST
From: Gordon Meyer <[email protected]>
Subject: File 4-- "Protect Your Privacy" Author Online on CIS
(Moderators' Note: The following announcement is reprinted from
CompuServe's event calendar.)
Protect Your Privacy Author Online
(05-Dec-94)
Bill Stallings, the author of "Protect Your Privacy: A Guide for PGP
Users," will be the featured guest in an NCSA InfoSecurity Forum
conference on 11-Dec at 9 p.m. EST (03:00 CET). Pretty Good Privacy
(PGP) is the most widely used multivendor software for electronic-mail
security. It also fulfills all the requirements for a universal
e-mail privacy utility and is platform- and operating
system-independent. The conference will be held in the forum's
Conference Room 1.
A copy of the book's foreword by Phil Zimmerman, the creator of PGP,
is in the NCSA InfoSecurity Forum's Library 19, "Book Reviews," under
the file name IS149.DES.
If you have specific questions or topics you want to have addressed at
the online conference, send them to Bill Stallings via CompuServe Mail
(GO MAIL) at User ID number 72500,3562.
To access the NCSA InfoSecurity Forum, part of CompuServe's extended
services, GO NCSAFORUM.
------------------------------
Date: 05 Dec 94 16:47:40 EST
From: Gordon Meyer <[email protected]>
Subject: File 5--Cu in the News
MS-VisaNet
=========
MicroSoft and VISA International have signed a letter of intent to
co-develop a secure method for executing credit card transactions
over the 'net. The first implementation has been scheduled for
sometime in 1995.
(Datamation. Dec. 1, 1994 pg 22)
Crypto to foil Pirates
===============
Teledyne and Zenith are developing a military-grade cryptography
system for use with advanced cable and telephone systems delivering
video-on-demand, home shopping, video games, etc. (Datamation. Dec.
1, 1994 pg. 17)
Spouses Beware
===========
Personal computers are being used more and more as a source of
incriminating information in divorce cases, reports the Privacy
Journal. Divorce lawyers say a spouse's personal computer can uncover
evidence of "double-book" accounting or hidden personal assets. Not
only can a spouse's computer contain financial records but
information relative to the calendared activities of a person. Many
states, however, have written their computer crime laws so that such
access may be a crime.
(Reprinted with permission from Communications of the ACM. Nov., 1994. pg. 10)
More on Crypto Systems
==================
The focus of the November, 1994 issue of Communications of the ACM is
"securing cyberspace." Check out the whole magazine for several great
articles about security, crypto, and related issues.
------------------------------
Date: Mon, 5 Dec 1994 15:13:52 -0700
From: [email protected](System Administrator)
Subject: File 6--Account Broken Into
This account, scd@pine.cse.nau.edu, was broken into from elsewhere on
the Internet on Dec. 5 between 3:00 AM and 4:00 AM MST. The intruder
launched a number of processes that mailed more than 15,000 racist and
offensive messages from this account on Dec. 5 between 3:30 AM and
8:30 AM MST.
The administrators of the College of Engineering and of Northern
Arizona University apologize for mail sent from this account.
If you have any additional information that may assist us in our
investigation, please mail root@pine.cse.nau.edu. Thank you.
Paul Balyoz, Senior Systems Programmer root@pine.cse.nau.edu
Computer Science Department [email protected].nau.edu
Northern Arizona University
PO Box 15600, Flagstaff AZ 86011, USA
------------------------------
Date: Tue, 6 Dec 1994 15:16:21 +0000
From: [email protected](heath bunting)
Subject: File 7--cybercafe @ phone
cybercafe @ phone
global directory of public telephones
in a time of private prosperity and public poverty public telephones
offer the potential for a wealthy public space
we aim to have the details of at least one public telephone in each
country in the world (currently 233 countries)
register cool public telephones in or query the global directory
either by
post: 1a monouth str, london wc2h 9da, uk
telephone: 44 171 497 2916
email: heath@cybercafe.org
www: http://www.cybercafe.org/cybercafe/pubtel/pubtel.html
folowing information is required / provided
dial number:
description of telephone:
dial type (tone / pulse):
calls (incoming & outgoing
/ incoming / outgoing) :
known bugs / hacks:
description surrounding area:
postal address of telephone:
first language of area :
second language of area :
longtitude :
latitude :
time difference +/-GMT:
other comments:
send some nice telephone graphics
(keep them small <50k)
heath
cybercafe aims to promote/create spaces/situations in which
people can create/behave/express/experience
in ways unavailable in currently existing places
Domains of activity radio/tv/telephones/fax/
mailart/flyposting/performance/computer.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
heath@cybercafe.org vox 44 171 497 2916
http://www.cybercafe.org/cybercafe/ mbl 44 374 823 840
1a monmouth street bbs 44 171 240 3332
london wc2h 9da UK vms 44 171 209 3093
------------------------------
Date: Sun, 4 Dec 94 19:20:43 EST
From: "Mike Alexander" <Mike.[email protected]>
Subject: File 8--"Hacker Learns Intelligence Secrets" (Update - Risks Reprint)
Since you published the original Risks item on the Independent article
related to the BT hacker incident (CuD 6.102), I thought you might be
interested in the follow up. Apparently it wasn't all it seemed to be. I
know nothing about this except what I've read in Risks.
Mike Alexander
University of Michigan
From-- [email protected].com (Sidney Markowitz)
Subject-- British Telecom "hacker" article was a hack!
[Thanks to sidney@apple.com (Sidney Markowitz) for letting me see
copyrighted Newsbytes material, which I have starkly abstracted. PGN]
Steve Fleming, the reporter noted in RISKS-16.58 as responsible for
the article on the "hacking" of BT's Customer Service System (CSS),
has admitted that he himself was the unknown Internet hacker.
``Instead of gaining unauthorized access to the BT computers, he
actually worked for a lengthy period of time (three months, according
to Newsbytes sources) and was required to access the CSS computer
system as part of his job. "I didn't realize how sensitive the
information was, but I was horrified how easy it was to get into the
system," he is quoted as saying in the London Observer newspaper.''
Fleming may be prosecuted.
(Source: RISKS-FORUM, Volume 16, Issue 59, Wed. Nov. 30, 1994).
------------------------------
Date: Tue, 15 Nov 1994 07:23:17 -0800
From: email list server <[email protected]>
Subject: File 9--Call for Workshop Proposals
+----------------------------------------------------------------+
MIDWEST CONFERENCE ON TECHNOLOGY, EMPLOYMENT AND COMMUNITY
Chicago, IL, USA
March 3-4, 1995
Sponsored by the
Center for Urban Economic Development,
University of Illinois at Chicago
+----------------------------------------------------------------+
CALL FOR WORKSHOP PROPOSALS
(please repost and distribute freely)
+----------------------------------------------------------------+
The Technology Revolution is touching every aspect of our lives.
Its impact has perhaps been most profound on the way things are
made, and with it, on jobs.
The Midwest Conference on Technology, Employment and Community
will focus on the impact of the Technology Revolution on economic
life, and its social consequences. With the impact of new
technologies on production, transportation, and communications, we
are entering a new historical period of change.
The conference is appropriately set in Chicago, once synonymous
with heavy industry. But with the shrinkage and disappearance of
the steel mills, the meat-packing plants, and other large scale
production, the industrial job loss has devastated many of
Chicago's working class neighborhoods. This pattern has been
repeated in communities throughout the region.
At the same time though, the productivity of new technologies
offers great promise for satisfying the basic needs of all
citizens, of delivering the world's information to every home, and
of providing new and exciting ways of developing as human beings.
This conference will provide an opportunity for scholars,
community leaders, trade unionists, and anyone else concerned
about the future of their communities and livelihood to discuss
the impact and possibilities of the Technology Revolution, and
look at how new technologies can be deployed to raise everyone's
standard of living. The conference will also provide technology
demonstration sites, and provide opportunities to learn about the
new technologies.
The Midwest Conference on Technology, Employment and Community
will mix plenary sessions with workshops. We encourage your
participation both through attending the conference and through
conducting a workshop or organizing a panel. We are currently
soliciting workshop proposals. We suggest proposals on the themes
below, but any topic related to the conference purpose is welcome.
Community activists and off-campus researchers are encouraged to
organize panels.
Employment Community
+ Impact of technology on + Impact of technology on
industries communities
+ Job development + Community technology
+ Future of work and the job + Future of the neighborhood
+ Unions and technology + Youth opportunities
+ Job training + Virtual communities
+ Plant closing alternatives + Health care and technology
+ Technology, health and safety + New forms of racism
+ NAFTA, globalization + Human capacity building
Communication and Information Technology
+ The future of schools + Who calls the shots?
+ Community networks + Future technologies
+ The future of libraries + Access to technology
+ Universal access + Measuring social impact
+ The NII
+ Meeting diverse needs Skills
+ Non-profits and computers
Democracy + Non-profits and the Internet
+ Privacy
+ Access to information
+ Electronic town meetings
+ Technologies of surveillance and control
+ The new eugenics movement
Workshops and panels will be an hour and half in length. The
proposal should include title, presenter, purpose of workshop,
references, and plan. We encourage workshops that substantially
involve the audience; and proposals in which some group product or
action plan is created are preferred. As the proposals may be
collected into a book, workshop proposals should be clear and
informative to people who don't participate in the workshop.
Proposals are due January 8, 1995 and acceptance and rejection
notices will be sent by February 1, 1995. Electronic submissions
are encouraged but paper versions are also acceptable.
To reach the Midwest Conference on Technology, Employment and
Community:
By Email: [email protected]
By Phone: (312) 996-5463
By Fax: (312) 996-5766
By Mail: Conference on Technology, Employment and Community
Center for Urban Economic Development
400 South Peoria, Suite 2100
University of Illinois - Chicago
Chicago, IL 60607
To participate in discussions around the conference and conference
issues, join the JOB-TECH mailing list. Send the following
message:
SUBSCRIBE JOB-TECH <your first name> <your last name>
to:
[email protected]
------------------------------
Date: Thu, 1 Dec 1994 14:21:19 -0800
From: email list server <[email protected]>
Subject: File 10--Politics of Science & Technology (fwd)
[email protected]
Date--Tue, 29 Nov 1994 05:59:46 -0500 (EST)
Loka Alert 1-13 (Nov. 29, 1994)
Friends and Colleagues:
This is one in an occasional series of electronic postings
on democratic politics of science and technology, issued by The
Loka Institute. You are welcome to post or publish it anywhere
you feel is appropriate.
--Dick Sclove
Executive Director, The Loka Institute, P.O. Box 355,
Amherst, MA 01004-0355, USA
Tel. 413 253-2828; Fax 413 253-4942
E-mail: [email protected]
*****************************************************************
ANNOUNCING NEW ACTION-ORIENTED, POLITICS OF SCIENCE &
TECHNOLOGY ELECTRONIC DISCUSSION LISTS:
POL-SCI-TECH
and
FASTnet (FEDERATION OF ACTIVISTS ON SCIENCE &
TECHNOLOGY NETWORK)
Many recipients of Loka Alerts have been asking for some
time: How can I communicate and collaborate directly with others
on the Loka e-mail list? Two, complementary answers are now at
hand:
(1) If you are interested in promoting a more democratic
politics of science and technology within the United States,
please join the new electronic discussion list: FASTnet
(Federation of Activists on Science and Technology Network).
To subscribe to FASTnet send an e-mail message to:
[email protected]
Leave the subject line blank. The text of the message
should be:
subscribe FASTnet
(2) If you are interested in discussing democratic politics
of science and technology anywhere in the world (i.e., not only
in the U.S.) and forging new transnational collaborations, please
join FASTnet's new sibling list: pol-sci-tech.
To subscribe to pol-sci-tech send an e-mail message to:
[email protected]
Leave the subject line blank. The text of the message
should be:
subscribe pol-sci-tech
(Of course, you are welcome to subscribe to both FASTnet and
pol-sci-tech.) Upon subscribing, you will receive a message
describing each list's purpose and operation in greater detail.
NOTE TO NEW SUBSCRIBERS: As with all pioneering electronic
ventures, please be a little patient during the inevitable period
of start-up wobbles and glitches. FASTnet and pol-sci-tech
represent important new attempts to foster cross-issue awareness
and alliances that can help promote a more socially responsive
politics of science and technology.
Loka Alert subscribers who wish to keep their e-mail traffic
low need do nothing. Loka Alerts will continue to arrive at
periodic, well-spaced intervals. However, you may also choose to
subscribe temporarily to FASTnet or pol-sci-tech whenever you
want to post your own alert or inquiry, and then unsubscribe
after receiving replies.
* * *
Loka Alerts, FASTnet, and pol-sci-tech are activities of the
broader Public Interest Technology Policy Project (a
collaborative effort of the Loka Institute and the Institute for
Policy Studies). The Project is pleased to announce that its
1994 start-up grants from the Menemsha Fund and Rockefeller
Family Associates have just been supplemented by a $50,000 grant
from the John D. and Catherine T. MacArthur Foundation.
Unlike the open electronic conferences FASTnet and pol-sci-
tech, Loka-L (the distributor of Loka Alerts) represents a one-
way news-and-opinion dissemination service. If you would like to
be added to, or removed from Loka-L, please send an e-mail
message to that effect to: [email protected]
------------------------------
Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 11--Cu Digest Header Information (unchanged since 25 Nov 1994)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-461-980493
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #6.103
************************************
|
|