|   | lecture about internet and censorship (fwd), CybeNOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 Computer underground Digest    Tue  Jul 23, 1996   Volume 8 : Issue 55
 ISSN  1004-042X
 
 Editor: Jim Thomas ([email protected])
 News Editor: Gordon Meyer ([email protected])
 Archivist: Brendan Kehoe
 Shadow Master: Stanton McCandlish
 Field Agent Extraordinaire:   David Smith
 Shadow-Archivists: Dan Carosone / Paul Southworth
 Ralph Sims / Jyrki Kuoppala
 Ian Dickinson
 Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
 
 CONTENTS, #8.55 (Tue, Jul 23, 1996)
 
 File 1--(fwd) lecture about internet and censorship (fwd)
 File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
 File 3--Online Dispute Resolution, etc. (fwd)
 File 4--Re: Response to CUD re: selling wind
 File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
 File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
 File 7--(Fwd) $50K Hacker challenge
 File 8--Access control, Censorship, and Precision
 File 9--Computer Literacy Bookshops events
 File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
 
 CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
 THE CONCLUDING FILE AT THE END OF EACH ISSUE.
 
 ---------------------------------------------------------------------
 
 Date: Sun, 9 Jun 1996 13:26:59 -0500 (CDT)
 From: David Smith <[email protected]>
 Subject: File 1--(fwd) lecture about internet and censorship (fwd)
 
 This is a speech on internet censorship given by the managing director of
 the Dutch Internet Service Provider which created the child pornography
 "hotline" that I forwarded about a month ago.
 
 ---------- Forwarded message ----------
 [email protected] (Felipe Rodriquez)
 Date--8 Jun 1996 17:29:50 GMT
 
 A lecture i gave at the international liberals congress:
 
 Hello,
 
 I am Felipe Rodriquez, Managing director of Xs4all Internet, a mayor
 dutch provider, and Im also chairman of the dutch foundation of
 internet providers.
 
 I was asked to do a short lecture about Internet and censorship.
 
 Internet is an emerging market, and at the same time an exciting new
 social environment. A space of communications between people of
 different nations, with different habits, traditions and legal codes.
 
 Internet is a place without borders. Information travels from one
 country to another in a split second. From here to the United States it
 takes 100 milliseconds. To Japan the information travels within 300
 milliseconds. Nicaragua takes 250 milliseconds and to Australia it
 takes the bits and bytes 400 milliseconds. Information crosses many
 borders on its path to the final destination.
 
 This challenges the concept of regionally defined cultures. The world
 becomes a global village of many cultures. Those cultures are not
 necessarily confined to a certain region or location. They are on the
 Net, and thus independent of location.
 
 The environment and conditions on the Net change quickly. New
 possibilities of communicating with other people emerge on an almost
 daily basis. Today people can sound-talk over the Internet, play games
 together, send pictures, send video transmissions, radio et cetera.
 Never before have people been communicating so massively, on an
 intenational scale. Every person is a medium that generates network
 traffic.
 
 This mash of global cultures, all communicating with eachother, creates
 a culture shock.  Every culture has its own traditions and codes, and
 naturally tries to protect and nurture these values.The traditional way
 of protecting ones culture and traditions has always been through
 legislation and social control. It is legislation that now threatens
 most of the worldwide cultures on Internet.
 
 Legislation on Internet is a slippery road. A communication technology
 on this scale is a new concept.  It is difficult to legislate a global
 social environment. The main problem is the fact that countries try to
 legislate a global environment through their own culturally defined
 moral codes.
 
 Different things are allowed in different countries. In the US it is
 allowed to make racist comments, in Holland it is not. So you see a
 migration of the information that dutch neo-nazi groups put on the
 Internet. Vice versa the United States has strict laws against
 obsenity, that are much more tolerant in Holland. Now you see a
 migration of pornographic material towards Holland. From both countries
 the information is published on a world wide scale. Implementation of
 law for Internet should include a harmonisation of some kind in the
 area of international legislation.
 
 The United States has implemented the Communications Decency Act. This
 law defines unacceptable speech on Internet. You can be criminally
 prosecuted for saying the word fuck or other indecent words, if you are
 an American. Anything indecent is being supressed. This proves to be a
 law that is impossible to uphold.
 
 The United States government webservers violate the Communications
 Decency Act. On the White House webserver there is a picture of a
 painting that is displayed. The painting shows a family of a mother
 with her two children. One of the children is nude. According to the
 Decency Act it is forbidden to display this image on the Internet.
 There are similar examples on other government systems in the US.
 
 This communications decency act is now being challenged as being
 unconstitutional by a group of organisations on Internet that has more
 than 40.000 supporters.
 
 Other countries like China, Vietnam and Saudi Arabia have even stricter
 guidelines for Internet. No one can use the Internet without prior
 government permission. These governments introduce strict control on
 the gateways that connect them to the Net.  These countries are afraid
 that Internet will give their citizens access to information against
 their government and political structure. The Internet is too
 democratic for them.
 
 Germany had ordered Compuserve to block off all groups about sex, and
 Compuserve then had no other way to shut these groupsdown worldwide.
 Eventually the german ambassador had to explain this action to
 President Clinton. A local law was influencing cultures in other
 countries.
 
 France arrested two internet-providers a couple of weeks ago. They
 where held responsible for the publication of child-pornography that
 was foumd on the Net. They did not distribute it themselves, but it was
 available somewhere on Internet. After global concern, the french
 minister of Interior admitted the arrests where a mistake, and that the
 providers could not be held liable.
 
 Prudence is needed because experience must first be aquired. You cannot
 legislate something you do not know anything about, but it happens
 everywhere on Internet.  Resulting in unworkable situations, and
 repression of the people and the market.
 
 Many problems on Internet can be dealt with today. One of those
 problems is Child Pornography. In Holland we have started a hotline
 against child pornography on Internet. If we get a report about a dutch
 user that is transmitting child-pornography, then we send him a
 warning. If that does not stop him, we report that user to the police.
 The user gets his chance to test the legal system. The hotline does not
 censor, it warns and reports.  This project is a cooperation between
 the foundation of dutch internetproviders, the dutch criminal
 intelligence agency, a psychologist, a couple of internet users and the
 national bureau against racial discrimination.  The hotline is based on
 existing law, and proves that no extra law is needed to fight
 child-pornography on Internet. Im a firm believer of first trying all
 the intruments that the existing legislation has to offer. Why bother
 about new laws if existing rules are sufficient ?
 
 One of the common concerns is the availabality of  obscene and violent
 information to children. This is the main argument in the United Stated
 to impose strict rules for the Net. But there are already techniques
 that can protect children from seeing any these materials. There is
 software that is especially made for the purpose of creating a safe
 Internet. There is a demand from the market to create these programs,
 and thus they are created.
 
 Protection of the children on the Net is not a government task, but an
 educational task of the parents of the children. Instead of regulating
 a worldwide network one could also think of imposing an age limit.
 
 Pridence is needed to find solutions for these new problems. Business
 can only thrive in a stable environment. And rushing in all kinds of
 repressive measures is not a stabilising factor. It is often easier to
 impose new legislation, than it is to repair old bad legislation.
 
 Thank you !
 
 
 --
 Felipe Rodriquez          -  XS4ALL Internet  - finger [email protected] for
 http://xs4all.nl/~felipe/ - Managing Director - pub pgp-key 1024/A07C02F9
 
 pgp Key fingerprint = 32 36 C3 D9 02 42 79 C6 D1 9F 63 EB A7 30 8B 1A
 
 ------------------------------
 
 Date: Sun, 14 Jul 1996 18:25:52 -0700 (PDT)
 From: baby-X <[email protected]>
 Subject: File 2--"Cyber-Rights" Platform Plank - FINAL DISCUSSION PERIOD (fwd)
 
 You've probably already seen this elsewhere, but I figured I'd send it
 your way directly.
 
 ----------------------------------------------------------------------------
 Christopher D. Frankonis - Rootless Cosmopolitan
 cyberPOLIS - Communicate This Culture
 
 Draft "Cyber-Rights" Platform Plank
 http://www.cypher.net/cyberPOLIS/platform-plank.html
 
 ---------- Forwarded message ----------
 
 Submissions of platform proposals to both the Democratic and Republican
 Parties are due by the first week of August. The Libertarians have already
 held their convention, but will receive a copy of this plank proposal
 anyway, as will Perot's Reform Party if it can ever be determined who to
 send it to.
 
 Therefore, I am opening a final period of discussion on the proposed
 "cyber-rights" platform plank -- beginning at the start of Sunday, July
 14, and ending at the close of Wednesday, July 17.
 
 Please try to focus the discussion in the following locations (although I
 will be tracking the entire handful of lists and groups this announcement
 is being posted to):
 
 the Bonfire mailing list
 (see http://www.well.com/user/jonl/bonfire.html)
 the cyberPOLIS mailing list
 (see http://www.cypher.net/cyberPOLIS/discussion.html)
 alt.culture.internet
 alt.politics.datahighway
 comp.org.eff.talk
 
 At the close of the final discussion period, the draft platform plank will
 be considered to be in a fixed state; development will be over.
 
 For the two weeks between Wednesday, July 17, and Wednesday, July 31, an
 email address will be made available for collecting the names of
 individuals and groups which wish to signify their support for the plank.
 The collection of names will be appended to the plank proposal, and sent
 along with the text of the plank to each of the four parties being
 targeted. Note: Do NOT send me any of this now. When the time comes, I
 will announce the appropriate address.
 
 And so, without further explanation, here is the current version (the
 2nd, in fact) of the proposed "cyber-rights" platform plank:
 
 [ Respect for Freedom in the Information Age ]
 
 "As the most participatory form of mass speech yet developed, the
 Internet deserves the highest protection from government intrusion."
 
 - Judge Stewart Dalzell
 
 The [BLANK] Party takes special recognition of the unique
 characteristics of computer-mediated communication. As the nation and
 the world experience the Information Revolution, we must rise to the
 challenge of embracing the achievements and the promise of the global
 Internet.
 
 To this end, we affirm that the new world of cyberspace calls for a
 commitment to these essential values of American liberty:
 
 * The right to speak, express oneself, and associate freely.
 * The right to privacy, whether through the use of anonymity,
 pseudonymity, encryption, or other means.
 * The right of the individual to control both the information they
 access and the information they provide.
 
 As the people of America and those of nations around the world come
 closer together through the power of computer networking, the [BLANK]
 Party embraces the spirit of freedom embodied by this new medium.
 
 ------------------------------
 
 Date: Tue, 16 Jul 1996 21:46:13 -0500 (CDT)
 From: David Smith <[email protected]>
 Subject: File 3--Online Dispute Resolution, etc. (fwd)
 
 ---------- Forwarded message ----------
 Date--        Thu, 11 Jul 1996 13:09:43 -0400
 From--        Ethan Katsh <[email protected]>
 
 Some members of this list may have in interest in (or know someone
 who has a need for) the Online Ombuds Office, which can be found at
 http://www.ombuds.org.  This is a pilot project aimed at using online tools
 to try to resolve disputes arising out of online activities (and even
 non-online activities). There is no charge for the use of the service,
 since most of our costs are covered by a grant from the National Center
 for Automated Information Research.
 
 If you belong to any listservs or newsgroups where disputes
 arising out of online activities are discussed, I'd be most grateful if
 you would mention the project and our URL.
 
 We are particularly interested in disputes involving copyrights,
 domain names, First Amendment, online service providers, and harassment.
 Our home page even describes a little reward for the parties in the first
 disputes that we settle in these areas.
 
 !~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~!
 ! Ethan Katsh                  Internet: [email protected]  !
 ! Professor                                VOICE: 413-545-5879  !
 ! Department of Legal Studies                FAX: 413-545-1640  !
 ! University of Massachusetts                                   !
 ! 216 Hampshire House                                           !
 ! Amherst, MA 01003                                             !
 !               Co-Director, Online Ombuds Office               !
 !                    http://www.ombuds.org                      !
 
 ------------------------------
 
 Date: Tue, 9 Jul 1996 13:52:38 -0700
 From: Barry Gold <[email protected]>
 Subject: File 4--Re: Response to CUD re: selling wind
 
 To: Roland Dobbins,
 
 Seems to me that CUD is being about as balanced as usual.  They
 published your "right-wing rant", just as they published the
 "left-wing rant" you were objecting to.
 
 You are quite correct about the "liberal" Clinton administration
 trying to foist key-escrow (like Clipper), "anti-terrorism"
 legislation that uses guilt-by-association, and has violated the
 rights of individuals in their quest to force various "militias" to
 submit.  (Although I'm not sure that the Clinton admin can really be
 blamed for Ruby Ridge -- that was already planned before he took
 office, and bureaucracies have a certain inertia.)  In any case, if
 they are to be blamed for the idiocies at Ruby Ridge and Waco, they
 are equally entitled to take credit for learning from past mistakes
 and working out a negotiated settlement with the "Free Men".
 
 I'm not sure about "filegate".  Maybe it's an enemies list.  But it
 seems just as likely to me (a computer professional) that it resulted
 from somebody searching an outdated list of white-house employees.
 Seems to me if Clinton wanted to keep an enemies list, he could have
 picked a better list than a bunch of former white-house employees and
 applicants.  However, I maintain an open mind on this, as additional
 evidence may turn at any time.
 
 But I really must take issue with your bringing up SDI.  Yes, weapons
 are made to be used.  That's one reason why we maintained and continue
 to maintain our own weapons.  It lets any foreign power who might think
 of using such weapons on the U.S. know that the result will be the total
 destruction of whatever country they are ruling.
 
 But the SDI was, and remains, a chimera.  Vaporware, impossible to
 build.  I just happen to have a relevant LA Times column, which I will
 quote part of:
 
 David L. Parnas(1) spent two days listening to Air Force
 briefings, then in June 1985 he resigned from the advisory panel,
 concluding that the fundamental computer requirements for
 strategic defense could never be satisfied.
 
 ...
 
 His basic points are simple and unalterable:  By its nature,
 strategic ballistic missile defense cannot be tested in its
 conditions of use -- we can't fire a missile at Los Angeles
 to see if our defense works.  And no computer system of even
 modest complexity has ever been considered reliable without
 extensive testing in actual conditions of use.
 ...
 National ballistic missile defense, of course, would require
 computer software of both unimaginable(sic) complexity and
 infallible trustworthiness -- and it would have to work
 correctly the first time it was ever used.
 
 ...
 
 Furthermore, the long lead time and elaborate facilities
 required to build an intercontinental missile mean that the
 U.S. and its allies would be able to deal with such a threat(2)
 from a rogue state in others(sic) ways -- via a preemptive
 strike, for example.
 
 Above quoted from "Innovation" column, by Gary Chapman, Los Angeles
 Times, Monday, July 8, 1996, page D6.
 
 I note that Chapman ignores the many missiles left in the former
 Soviet Union.  These are mostly controlled by the Russian military,
 regardless of where they are physically located.  And Russia seems to
 have other things than intercontinental war on its mind.  This could
 change in the future, of course.  But I suspect it would be cheaper to
 just buy the missiles than to build even the prototype SDI ($31-60
 billion; we have spent over "$100 billion on ... research so far, without
 noticeable progress."(ibid))
 
 Also ignored by proponents of SDI is that there are other methods of
 delivering weapons of mass destruction than ICBMs.  If Russia _did_
 become a threat again, they could use submarine-launched missiles,
 which are harder to defend against because they travel tens or hundreds
 of miles instead of thousands.  And the smaller "rogue states" that
 indulge in terrorism could get quite satisfactory results by smuggling
 the weapons into the U.S. and assembling them in whichever city they
 want to destroy.
 
 It would be difficult to completely destroy the U.S. with short range
 or smuggled in weapons, but you could certainly deliver a lot of
 terror, just the sort of thing those dictators would enjoy.  Except
 for one thing -- the retaliatory strike would leave them radioactive
 dust, or if they happened to have a deep enough bunker to survive it,
 no army and a radioactive wasteland to "rule" over.  The same thing
 would happen to anyone who launched a more massive missile strike, of
 course.
 
 So, who are we to fear?  Anyone who is weighing risks against gains
 will see there is nothing to be gained by using such weapons against
 U.S. territory.  And in spite of propaganda labelling Hussein and
 Kaddafi "madmen", they are quite sane, just working from goals we
 don't understand.  And if someone crazy does come to power (Hitler,
 perhaps), SDI will not prevent him from smuggling in weapons.
 
 In fact, assuming such a ruler (or a stateless terrorist group for
 that matter) could lay hands on enough fissionables, this would be at
 least as efficient a method of using them as launching missiles.
 Missiles have a way of failing, their payloads refusing to go off.
 Worse, after you've figured out how to build a fission bomb (not that
 difficult, most of the info is now available in libraries), you
 _still_ have to figure out how to build the missiles, a much more
 difficult task.  (Or spend a lot of money to buy them, then hope you
 can maintain them in working condition until its time to use them.)
 
 Thank you, I'd rather use the 31-60 billion to lower taxes or reduce
 the national debt.
 
 ---
 
 (1) a famous software engineer and a member of the panel charged with
 looking at the computer requrirements for an SDI system.
 
 (2) e.g., the occasional threats by the current rulers of North Korea,
 Iraq, and Libya.
 
 ------------------------------
 
 Date: Wed, 17 Jul 1996 19:59:47 -0700 (PDT)
 From: Declan McCullagh <[email protected]>
 Subject: File 5--NYT -- IRC-based child molestation ring busted (7/17/96)
 
 The New York Times, July 17, 1996, p. A10.
 
 16 Indicted On Charges Of Internet Pornography
 Allegations of Molestation Are Also Filed
 
 By Tim Golden
 
 San Jose, Calif., July 16 -- [...]
 
 Today, Federal officials said the girl in a small central
 California town had led them to one of the more distant
 frontiers of sexual crime.
 
 In an indictment handed up here, a Federal grand jury
 charged 16 people in the United States and abroad with
 joining in a pornography ring that was effectively an
 on-line pedophilia club. Its members shared homemade
 pictures, recounted their sexual experiences with children
 and even chatted electronically as two of the men molested
 a 10-year-old girl, the authorities said.
 
 The case appeared likely to heighten concerns about the
 spread of child pornography over the Internet. Debate has
 grown steadily over whether or how the government should
 impose obscenity standards in cyberspace, and Republican
 leaders have increasingly attacked the Clinton
 Administration for being insufficiently vigorous in the
 prosecution of on-line pornography cases.
 
 [...]
 
 In addition to 13 men arrested around the United States,
 officials said the group included members in Finland,
 Canada and Australia. Although arrest warrants have been
 issued for those three, officials said they were still only
 known by their computer aliases.
 
 [...]
 
 With help from Customs Service investigators in Silicon
 Valley, F.B.I. agents eventually uncovered computer files
 that began to trace the scope of the Orchid Club, one of
 the thousands of virtual conference rooms of Internet Relay
 Chat.
 Officials said they did not have to conduct wire-tap
 surveillance or break into encrypted files; two of the
 accused conspirators collaborated with investigators, going
 on-line in the presence of law-enforcement agents to help
 track other members of the club.
 
 ------------------------------
 
 Date: Mon, 8 Jul 1996 08:56:51 -0400 (EDT)
 From: Noah <[email protected]>
 Subject: File 6--U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM (fwd)
 
 U.S. GOV'T PLANS COMPUTER EMERGENCY RESPONSE TEAM
 The federal government is planning a centralized emergency response team to
 respond to attacks on the U.S. information infrastructure.  The Computer
 Emergency Response Team at Carnegie Mellon University, which is financed
 through the Defense Department, will play a major role in developing the new
 interagency group, which will handle security concerns related to the
 Internet, the telephone system, electronic banking systems, and the
 computerized systems that operate the country's oil pipelines and electrical
 power grids. (Chronicle of Higher Education 5 Jul 96 A19)
 
 AT&T TARGETS CYBERSPACE
 AT&T's recent investment in Nets Inc., through its spin-off of New Media
 Services to Jim Manzi's Industry.Net, signals its plans to become a one-stop
 shop for electronic communications -- from e-mail and Internet access to
 cellular calling and satellite TV.  The company's primary strategy is to
 sign up millions of customers for its WorldNet Internet access service.  The
 company will also provide its corporate customers a "hosting" service called
 EasyCommerce, which will create and operate corporate Web sites.  At the
 same time, the company has scrapped Network Notes and is looking to get rid
 of its Imagination Network, an online gaming service; it's also considering
 phasing out Personalink, a messaging service that uses General Magic
 technology. (Business Week 8 Jul 96 p120)
 
 ------------------------------
 
 Date: Thu, 18 Jul 1996 23:10:49 +0000
 From: David Smith <[email protected]>
 Subject: File 7--(Fwd) $50K Hacker challenge
 
 I saw this article in a recent edition of Online Business Today.
 
 ------- Forwarded Message Follows -------
 Date--         Tue, 25 Jun 1996 09:08:17 -0400 (EDT)
 From--         Home Page Press <[email protected]>
 
 <sections snipped>
 
 **************************************************
 
 Hackers $50K challenge to break Net security system
 
 World Star Holdings in Winnipeg, Canada is looking for
 trouble. If they find it, they're willing to pay $50,000 to the
 first person who can break their security system. The
 company has issued an open invitation to take the "World
 Star Cybertest '96: The Ultimate Internet Security Challenge,"
 in order to demonstrate the Company's Internet security
 system.
 
 Personal email challenges have been sent to high profile
 names such as Bill Gates, Ken Rowe at the National Center
 for Super Computing, Dr. Paul Penfield, Department of
 Computer Science at the M.I.T. School of Engineering and
 researchers Drew Dean and Dean Wallach of Princeton
 University.
 
 OBT's paid subscription newsletter Online Business
 Consultant has recently quoted the Princeton team in several
 Java security reports including "Deadly Black Widow On The
 Web: Her Name is JAVA," "Java Black Widows---Sun
 Declares War," Be Afraid. Be Very Afraid" and "The
 Business Assassin."  To read these reports go to Home Page
 Press http://www.hpp.com and scroll down the front page.
 
 Brian Greenberg, President of World Star said, "I personally
 signed, sealed and emailed the invitations and am very
 anxious to see some of the individuals respond to the
 challenge. I am confident that our system is, at this time, the
 most secure in cyberspace."
 
 World Star Holdings, Ltd., is a provider of interactive
 "transactable" Internet services and Internet security
 technology which Greenberg claims has been proven
 impenetrable. The Company launched its online contest
 offering more than $50,000 in cash and prizes to the first
 person able to break its security system.
 
 According to the test's scenario hackers are enticed into a
 virtual bank interior in search of a vault. The challenge is to
 unlock it and find a list of prizes with inventory numbers and
 a hidden "cyberkey" number.  OBT staff used Home Page
 Press's Go.Fetch (beta) personal agent software to retrieve the
 World Star site and was returned only five pages.
 
 If you're successful, call World Star at 204-943-2256.  Get to
 it hackers.  Bust into World Star at http://205.200.247.10 to
 get the cash!
 
 **************************************************
 ============================
 ============================
 ONLINE BUSINESS TODAY(TM)
 NEWSLETTER: Vol 2 (#6)
 MORNING FINAL
 THURSDAY, JUNE 24, 1996
 [email protected]
 
 ------------------------------
 
 Date: Mon, 15 Jul 96 07:30:34 GMT
 From: "David G. Bell" <[email protected]>
 Subject: File 8--Access control, Censorship, and Precision
 
 For me, the most disturbing part of the Meeks story about control of
 access to parts of the Internet was the allegation of a lack of
 precision in defining controlled sites, so that sites with a similar,
 but not identical, URL could be blocked.
 
 I imagine that a smart lawyer could make a case for damages out of that
 one.
 
 Contrast it with the iSTAR story.  The list of newsgroups they have
 refused to handle is pretty clear, and while different countries, even
 different States in the USA, have different limits, pretty well all of
 the newsgroups have names which strongly suggest an illegal content in
 many jurisdictions.
 
 About the only one which I was surprised to see was the newsgroup for
 pictures of cheerleaders, but on an international network of networks,
 it isn't hard to find differences in age limits, which would make a
 picture of a 17-year-old legal in one country, and illegal in another.
 
 At least the censors and controllers have a reason for their actions,
 and one which I believe can be defended.  The danger in both the stories
 is that so much is being done in secret, and these actions should be
 challenged, should be publically debated, rather than imposed in secret.
 
 Here in the UK we have what is officially a film _classification_
 system, backed by law.  Mostly, it seems to work pretty well.  There are
 stories about scenes being cut from films to get a less restrictive
 classification.  It has also been claimed that no film can be released
 in the UK which shows the use of nunchaku, because of some decision
 taken by the current head of the BBFC.
 
 It can be argued that too many people on the Internet fail to accept
 responsibility for what they make available.  The scary thing about the
 secrecy surrounding efforts to classify or censor material, is that it
 suggests that the people taking the decisions are afraid to accept their
 responsibilities.
 Date: Thu, 18 Jul 1996 23:23:16 -0400 (EDT)
 From: Noah <[email protected]>
 Subject: File 9--Computer Literacy Bookshops events
 
 >From -Noah
 
 [email protected]
 
 ---------- Forwarded message ----------
 Date--Thu, 18 Jul 96 18:05:19 PDT
 From--CLB Event Accounement <[email protected]>
 
 AN EVENT AT COMPUTER LITERACY BOOKSHOPS
 
 -----------------------------------------------------------
 Logical Synthesis with Verilog HDL
 ---------------------------------------------------------
 
 a free presentation by Samir Palnitkar
 
 What is?
 Logic Synthesis
 Impact of Logic Synthesis
 Synthesis Design Flow Sequential Circuit Synthesis Example
 
 Samir Palnitkar is the president of Indus Consulting Services, Inc.
 in Sunnyvale, CA; a company which offers training and consulting
 services for chip design and verification.
 
 As a member of the technical staff at Sun Microsystems, he was
 involved in several successful microprocessor, ASIC and system
 design projects. He's also been a consultant to chip design
 companies, semiconductor houses and EDA companies. He has also
 taught Verilog and Synthesis courses to engineers at various
 companies. Samir has published several technical papers and is the
 holder of two U.S. Patents.
 
 Mr. Palnitkar is the author of
 "Verilog HDL: A Guide to Design and Synthesis.
 
 Date:  Tuesday, July 30, 1996
 Time:  6:30 p.m. to 8:30 p.m.
 
 Location: Computer Literacy Bookshop
 2590 N First St (at Trimble)
 San Jose, (408) 435-1118
 
 DID YOU KNOW THAT OUR EVENTS ARE POSTED ON OUR WEB PAGE?
 http://www.clbooks.com/
 
 Stay tuned.  There are more events to come.
 
 August 7, 1996
 Tons of Practial Experience with the Shlaer-Mellor Method
 with Leon Starr
 
 August 17, 1996
 Power of Ignorance (C++ Templates)
 with Andrew Koenig
 
 August 21, 1996
 Web Multimedia Techniques
 with Tay Vaughan
 
 Events at our stores are always free.
 
 ------------------------------------------------------------
 If you would like to receive e-mail announcements for upcoming store
 events, simply write to:
 
 [email protected] (for events held at our California stores)
 [email protected] (for events held at our Virginia store)
 --------------------------------------------------------------
 
 If you have signed up for email announcements but have not received any,
 or wish to be removed from this list, please contact us.  We add names
 by request only.
 
 ****************************************************
 Computer Literacy Bookshops, Inc.
 
 Cherrie C. Chiu
 [email protected]
 (408) 435-5015 x116
 
 ------------------------------
 
 Date: Thu, 21 Mar 1996 22:51:01 CST
 From: CuD Moderators <[email protected]>
 Subject: File 10--Cu Digest Header Info (unchanged since 7 Apr, 1996)
 
 Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
 available at no cost electronically.
 
 CuD is available as a Usenet newsgroup: comp.society.cu-digest
 
 Or, to subscribe, send post with this in the "Subject:: line:
 
 SUBSCRIBE CU-DIGEST
 Send the message to:   [email protected]
 
 DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
 
 The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
 or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
 60115, USA.
 
 To UNSUB, send a one-line message:   UNSUB CU-DIGEST
 Send it to  [email protected]
 (NOTE: The address you unsub must correspond to your From: line)
 
 Issues of CuD can also be found in the Usenet comp.society.cu-digest
 news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
 LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
 libraries and in the VIRUS/SECURITY library; from America Online in
 the PC Telecom forum under "computing newsletters;"
 On Delphi in the General Discussion database of the Internet SIG;
 on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
 and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
 CuD is also available via Fidonet File Request from
 1:11/70; unlisted nodes and points welcome.
 
 EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
 Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
 In ITALY: ZERO! BBS: +39-11-6507540
 In LUXEMBOURG: ComNet BBS:  +352-466893
 
 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
 
 The most recent issues of CuD can be obtained from the
 Cu Digest WWW site at:
 URL: http://www.soci.niu.edu/~cudigest/
 
 COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
 information among computerists and to the presentation and debate of
 diverse views.  CuD material may  be reprinted for non-profit as long
 as the source is cited. Authors hold a presumptive copyright, and
 they should be contacted for reprint permission.  It is assumed that
 non-personal mail to the moderators may be reprinted unless otherwise
 specified.  Readers are encouraged to submit reasoned articles
 relating to computer culture and communication.  Articles are
 preferred to short responses.  Please avoid quoting previous posts
 unless absolutely necessary.
 
 DISCLAIMER: The views represented herein do not necessarily represent
 the views of the moderators. Digest contributors assume all
 responsibility for ensuring that articles submitted do not
 violate copyright protections.
 
 ------------------------------
 
 End of Computer Underground Digest #8.55
 ************************************
 
 
 
 |   |