Computer underground Digest Wed Sep 8, 1994 Volume 6 : Issue 79 ISSN 1004-042X Editors: Ji
Computer underground Digest Wed Sep 8, 1994 Volume 6 : Issue 79
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Urban Legend Editor: E. Greg Shrdlugold
CONTENTS, #6.79 (Wed, Sep 8, 1994)
File 1--New indecency rules proposed for all online services (fwd)
File 2--Sex, the Internet and the Idiots
File 3--Symposium Announcement & Call for Papers
File 4--Reaffirming Life through an Online Death
File 5--Cu Digest Header Information (unchanged since 9-1-94)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
Date: Thu, 1 Sep 1994 11:52:49 -0400 (EDT)
From: Mike Godwin
Subject: File 1--New indecency rules proposed for all online services (fwd)
(MODERATORS' NOTE: In CuD 6.76 we ran a post on the Exon Amendment to
S 1822. S.AMDT.2404, sponsored by Senator J. James Exon (D. Neb.),
raised concerns that proposed federal restrictions on "indecency"
could adversely affect computer communications by placing the onus of
liability on the carrier. Contrary to some reports, the EFF does not
approve of the amendment. For those wishing further information, the
full Bill is: S. 1822 (Sponsored by Sen. Ernest F. Hollings, D., S.
Car.). Official Title: A BILL TO FOSTER THE FURTHER DEVELOPMENT OF THE
NATION'S TELECOMMUNICATIONS INFRASTRUCTURE AND PROTECTION OF THE
PUBLIC INTEREST, AND FOR OTHER PURPOSES. At last report, the Bill
(with the amendment) has been referred to the Senate Committee on
Commerce (on 26 July). We're not aware of subsequent action taken
since. The following fowarded post clarifies the amendment)).
>From firstname.lastname@example.org Thu Sep 1 10:47:31 1994
Posted-Date--Thu, 1 Sep 1994 09:29:09 -0400
Date--Thu, 25 Aug 1994 14:32:40 -0600
Fromemail@example.com (Daniel J. Weitzner)
During the final hours before the Senate telecommunications
bill (S.1822) was marked-up by the Senate Commerce Committee, a
provision was added which would expand the current FCC regulation on
obscene and indecent audiotext (900 number) services to virtually all
electronic information services, including commercial online service
providers, the Internet, and BBS operators. This proposal, introduced
by Senator Exon, would require all information service providers and
all other electronic communication service providers, to take steps to
assure that minors do not have access to obscene or indecent material
through the services offered by the service provider.
Placing the onus, and criminal liability, on the carrier, as
opposed to the originator of the content, threatens to limit the free
flow of all kinds of information in the online world. If carriers are
operating under the threat of criminal liability for all of the
content on their services, they will be forced to pre-screen all
messages and limit both the privacy and free expression of the users
of these services. Senator Exon's amendment raises fundamental
questions about the locus on liability for harm done from content in
new digital communications media. These questions must be discussed
in a way that assures the free flow of information and holds content
originators responsible for their actions.
II. Summary of Exon Amendment
The Exon amendment which is now part of S.1822, expands section
of the Communications Act to cover anyone who "makes, transmits, or
otherwise makes available" obscene or indecent communication. It
makes no distinction between those entities which transmit the
communications from those which create, process, or use the
communication. This section of the Communications Act was originally
intended to criminalize harassment accomplished over interstate
telephone lines, and to require telephone companies that offer
indecent 900 number services to prevent minors from having access to
such services. The 900 number portions are known as the Helms
Amendments, having been championed by Senator Jesse Helms. These
sections have been the subject of extension constitutional litigation.
If enacted into law, these amendments would require that anyone
who "makes, transmits, or otherwise makes available" indecent
communication take prescribed steps to assure that minors are
prevented from having access to these communications. In the case of
900 numbers, acceptable procedures include written verification of a
subscriber's age, payment by credit card, or use of a scrambling
device given to the subscriber after having verified his or her age.
Failure to do so would result in up to a $100,000 fine or up to two
III. Carrier Liability and Threats to the Free Flow of Information
These provisions raise serious First Amendment concerns. (Note
that we use the term 'carrier' here to refer to a wide range of
information and communication service providers. This does not
suggest that these entities are, or should be, common carriers in the
traditional sense of the term.)
Overbroad carrier liability forces carriers to stifle the free
flow of information on their systems and to act as private censors
If carriers are responsible for the content of all information
and communication on their systems, then they will be forced to
attempt to screen all content before it is allowed to enter the
system. In many cases, this would be simply impossible. But even
where it is possible, such pre-screening can severely limit the
diversity and free flow of information in the online world. To be
sure, some system operators will want to offer services that
pre-screen content. However, if all systems were forced to do so, the
usefulness of digital media as communication and information
dissemination systems would be drastically limited. Where possible,
we must avoid legal structures which force those who merely carry
messages to screen their content.
Carriers are often legally prohibited from screening messages
In fact, under the Electronic Communications Privacy Act of
1986, electronic communication service providers are generally
prohibited from examining the contents of messages or information
carrier from one subscriber to another.
Extension of the 900 number rules to all electronic information
services may be unconstitutional
The regulation of indecent 900 number programming was only
accomplished after nearly a decade of constitutional litigation, with
rules being overturned by the Supreme Court. The regulations were
finally found constitutional only after being substantially narrowed
to meet First Amendment scrutiny. Since the access methods offered by
online service providers are significantly different than simple
telephone access to 900 services, we doubt that the same
constitutional justifications would support the newly expanded rules.
This issue requires considerable study and analysis.
Content creators, or those who represent the content as their
own, should be responsible for liability arising out of the content
In sum, it should be content originators, not carriers, who are
responsible for their content. Any other approach will stifle the
free flow of information in the new digital media.
IV. Next Steps
Having only just received the language offered by Senator Exon,
EFF still needs to do further analysis, and consult with others in the
online community. We also hope to speak with Senator Exon's staff to
understand their intent. Another important hearing will be held on
S.1822 in mid-September by the Senate Judiciary Committee. By that
time, we hope to have this issue resolved. While we agree that these
carrier liability problems are in need of Congressional consideration,
we do not believe that the time is ripe to act. Before any action is
taken, hearings must be held and careful evaluation of all the issues,
not just indecency, must be undertaken.
Daniel J. Weitzner, Deputy Policy Director, Electronic Frontier Foundation,
1001 G St. NW Suite 950 East, Washington, DC 20001 +1 202-347-5400(v)
Date: Fri, 2 Sep 1994 11:06:39 -0400 (EDT)
From: eye WEEKLY
Subject: File 2--Sex, the Internet and the Idiots
eye WEEKLY August 4 1994
Toronto's arts newspaper .....free every Thursday
EYE NET EYE NET
SEX, THE INTERNET AND THE IDIOTS
There are two breeds of moron attracted to the Internet's relation to
sex -- reporters and wankers. These categories may overlap, but that's
beside the point.
Canadian newsmedia owe a great deal of Internet education to Judge
Francis Kovacs and his infamous Karla Homolka trial publication ban.
That elevated the Internet to headline material. It is humorous to
watch reporters/editors grope for net.literacy. Talk with Justin
Wells (firstname.lastname@example.org) and Ken Chasse
(email@example.com), the chaps who created alt.fan.karla-homolka
as a lark, then found themselves hounded by reporters asking for
"banned information, please." Or check out The Star's early stories,
where Usenet newsgroups are called "computer billboards" --
whatever the hell those are.
Mainstream journalists without a rallying issue like a trial ban
invariably end up with nothing better to do then bang the drum about
the 3 Ps: pedophilia, piracy and pornography.
Take the recent Internet "child molesters" silliness. Some teen
somewhere is enticed into sex with an adult -- through America On
Line, not the Internet -- and we have an "epidemic." Chicago's Harlan
Wallach (firstname.lastname@example.org) reported in alt.internet.media-coverage
how some dink named James Coates wrote a column for the July 15
Chicago Tribune called "Beware cybercreeps lurking on the Internet."
True enough. But Coates' purpose is to frighten the middle class with
some probably made-up story about "Vito," who cruises the net
hoping "to have sex with children in wheelchairs."
I understand Coates' pain. I can't spend 10 minutes in Internet Relay
Chat (IRC) before someone asks if I'm a child in a wheelchair looking
for a sex partner. Wallach told eye Coates has been going like this
for months now -- "a master at work."
Couple of weeks ago, California nuclear research facility Lawrence
Livermore Labs discovered one computer held some dirty pictures.
An employee gave away a password. Someone used that access to
store the images. People could connect and get them. Nothing was
hacked. Big deal.
But on July 13, CNN reporter Don Knapp swooped in to whip up
hysteria. Doom was clearly imminent.
"Computer security specialists were surprised to find what may be
the largest computer collection ever of hardcore pornography at the
nation's top nuclear weapons and research laboratory," Knapp
intoned ominously. Almost 2000 megs! Gol-ly! (Incidentally, 99 per
cent of it was individual shots of nude/semi-nude women, no
sexually explicit acts. Playboy stuff.)
CNN rang Wired magazine writer Brian Behlendorf (email@example.com)
and woke him at home, excited about "a big break-in at Laurence
Livermore." Hackers and porno! If CNN was lucky, the hacker was a
child molester. Behlendorf consented to an interview. CNN
immediately asked him to "find some pictures of naked women on
the Net for us." Behlendorf recounted the incident: "I really wasn't
interested in doing that. I don't know of any FSP/FTP sites offhand
anyways, and really didn't want to be associated with pictures of
But amiable Behlendorf slid over to alt.binaries.pictures.supermodels
and grabbed a picture of a model in a swimsuit. He also picked up a
landscape, a race car and a Beatles album cover "to show that other
images get sent over Usenet as well," naively thinking this point
would be made -- though he stresses he by no means condones
distributing copyrighted images, "clean" or otherwise. Behlendorf was
then made to sit beside a terminal displaying Ms String-Bikini
throughout all his comments. "They made me keep returning to that damn
bikini image ... over and over."
But intrepid reporter Don Knapp assured us all is well -- for now.
"Spokespeople for the national laboratories insist that at no time
were the pornographers, nor the software pirates, able to cross over
from the research network into the classified network. The labs say
that, while they are embarrassed, national security was not
YOU'RE GETTING VERY STUP- ERR, SLEEPY...
Then you have regular net.wankers. Whoever said, "Never
underestimate the intelligence of the American public," must read
For instance, the charismatic Aabid (firstname.lastname@example.org) wrote
a touching post called "I would like an enema myself!" to newsgroup
sci.chem (science: chemistry). "Looking for a Middle Eastern M or F
to help me with my enema desires. If you can be of assistance please
email me." Readers of sci.chem were very intrigued and Aabid has
made many interesting new friends.
The greatest example of alt.sex stupidity is: The Hypnosis Program.
As a joke, Indiana's Steve Salter (email@example.com)
posted to alt.sex.stories that he had a "hypnosis program" -- which
you cleverly slip onto another person's computer where it will so
mesmerize the unsuspecting target, he/she becomes your SEXUAL
PLAYTHING, BENDING TO YOUR EVERY WHIM! For weeks after, global
village idiots pestered him for copies.
"I must have received over a hundred requests via private email or in
alt.sex.stories for a copy of the program," Salter told eye. He had to
publicly post a reply to stem the tide: "No offense, but get a rather
large clue. There is no such animal. That was a joke. I thought it was
obvious. How many people out there really want to hypnotize someone
secretly? What the fuck is wrong with all of you?! What age group are
we dealing with here? There is no such program!!! Sheesh..."
Personally, I'm in agreement with David Romm
(firstname.lastname@example.org) who wrote: "I really liked the hypnosis
program. It was much better than Cats."
MASSAGE MY MEDIUM
To get your own porn, there are lots of sites. Ask for the latest in
the alt.sex groups. Check out alt.binaries.pictures.erotica to grab a
few images. For text erotica, read in alt.sex.stories .
If you can't access alt.sex groups because, say, your university is
run by prudes, write (ahem) "Hot Stuff" (email@example.com)
for details about his mail-server. He makes available hundreds of
stories. We at eye have yet to sample this collection but are
intrigued by two items: "Perils of Red Tape," which we assume
reveals the lust-riddled world of civil service, and "Tales from the
Network," the story of lonely boys sitting around Friday nights
fingering their groins in IRC, praying someone with a female-
sounding alias drops by.
* FootNote: NEKKID GRRLS is idiomatic fresh-off-the-BBS net.wanker-
speak. This language can be learned by hanging around newsgroups
like alt.2600 . To convince others you are a deadly cool net.cruiser,
write: "HEY, elite pir-8 d00ds! I got more NEKKID GRRLS philes than
ANY OF U!!!! And U censorship loosers can SUCK MY DICK!!!!!" Send it
to alt.sex . Make sure to cross-post to the comp.sys.ibm.* hierarchy
because PCs are the most common computer and you will reach a wider
audience. If you can manage it, post through an anonymous account
and leave your personal signature with real address in the text of
Retransmit freely in cyberspace Author holds standard copyright
Full issue of eye available in archive ==> gopher.io.org or ftp.io.org
Mailing list available http://www.io.org/eye
firstname.lastname@example.org "Break the Gutenberg Lock..." 416-971-8421
Date: Wed, 24 Aug 1994 18:12:38 GMT
From: shallit@GRACELAND.UWATERLOO.CA(Jeffrey Shallit)
Subject: File 3--Symposium Announcement & Call for Papers
Final Announcement and Call for Papers
"Free Speech and Privacy in the Information Age"
University of Waterloo
200 University Avenue, West
Waterloo, Ontario N2L 3G1
Saturday, November 26, 1994
The "information superhighway" will have a profound effect on our lives
and the way we communicate in the 21st century. But how will it transform
and be transformed by our understanding of traditional freedoms,
such as free speech and privacy?
This one-day symposium is intended to address the ethical, philosophical,
and legal implications of the Internet and related communications
technologies. Expert speakers from industry, academia, government,
and the legal profession will discuss free speech and privacy in the
information age. A wide spectrum of opinion will be represented.
The symposium will host a poster session for contributed papers; see below
for submission information.
During the symposium, there will also be demonstrations, conducted by
University library staff, of the Internet and its applications
as a research and communications tool.
WHO SHOULD ATTEND:
* University and public librarians;
* local, provincial, and federal government officials concerned
with information and communication technology;
* Internet users and computer system administrators from industry
* feminists concerned with impact of the new technology;
* lawyers interested in information and communication technology;
* journalists from print, radio, television, and other media;
* professors and students of sociology, philosophy, law, ethics,
computer science, and electrical engineering.
8:00 - 9:00 AM Registration, coffee, and doughnuts
Internet demonstration by library staff
9:00 AM Opening and Official Welcome
9:10 AM Professor JAY WESTON, Carleton University and the Ottawa
Freenet: "Old Freedoms and New Technologies: The Evolution
of Community Networking".
9:50 AM Professor URSULA M. FRANKLIN, FRSC, Massey College, University of
Toronto: "Global Gossip, Homeless Information, and the Notion of
10:45 AM Break
11:00 AM HENRY SPENCER, SP Systems and University of Toronto: "Computer
System Administration in an Age of Uncontrolled Information Flow".
11:40 AM Professor GAILE POHLHAUS, Women's Studies and Theology and
Religious Studies, Villanova University: "The Use of the Internet
as a Vehicle for Pornography - Do We Really Care?"
12:20 PM Lunch
Internet demonstration by library staff
2:10 PM (Keynote Address) The Honourable Mr. Justice JOHN SOPINKA,
Canadian Supreme Court: "Freedom of Speech and the Protection of
Privacy under the *Charter* in the Information Age".
3:05 PM Professor MARGARET ANN WILKINSON, Faculty of Law and Graduate School
of Library and Information Science, University of Western Ontario:
"Perceptual Differences in Approaches to Censorship: Information
Intermediaries and the Implementation of Law".
3:45 PM Break
4:00 PM PARKER BARSS DONHAM, Political Columnist, Halifax Sunday Daily
News and CBC Political Panellist, Nova Scotia: "A Free and
Unshackled Internet -- If Joseph Howe Were Designing Cyberspace".
4:40 PM Professor Emeritus THELMA McCORMACK, Department of Sociology,
York University: "Must We Buy Into Technological Determinism?".
5:20 PM Closing Remarks
CALL FOR PAPERS:
There will be a poster session for contributed papers. Contributed
papers should be no more than 10 pages in length, and on a topic
relevant to the symposium's theme. Submit contributed papers BEFORE
October 31, 1994 to:
Free Speech and Privacy Symposium
c/o Prof. Jeffrey Shallit
Department of Computer Science
University of Waterloo
Waterloo, Ontario N2L 3G1 Canada
You will be notified of the decision by telephone, fax, or electronic
The symposium is being sponsored by the Institute for Computer Research,
University of Waterloo; the Department of Computer Science, University
of Waterloo; the Dean of the Arts Faculty, University of Waterloo; and
Electronic Frontier Canada.
Prof. Harriet Lyons, Women's Studies and Anthropology,
University of Waterloo
Prof. Jeffrey Shallit, Computer Science, University of
The symposium will be held at the William G. Davis Computer
Research Centre at the University of Waterloo in Waterloo,
Waterloo is approximately 80 minutes west of Toronto, Ontario, and
is accessible from Toronto via car, airport limousine, bus, and rail.
By Air: The nearest airport is Toronto. Airways Transit limousine
serves the Waterloo area from Toronto airport. Reservations
must be made at least 24 hours in advance by calling
(519) 886-2121. The regular one-way fare is $43. There is
a special symposium fare of $23 one-way; specify the "Free
Speech Symposium" when making reservations, and be sure to
have complete flight information ready when you call.
By Car: From Detroit/Windsor/London: take Highway 401 east.
(*) Exit at Route 8 west. Follow Route 8 to Route 7 east.
Take Route 7 to 86 North, and exit at University Avenue West.
Follow University Avenue approximately 3 km to the main
entrance of the University (200 University Ave. West).
From Toronto: take Highway 401 west, and follow the
directions beginning with (*) above.
From Buffalo: take the QEW to Highway 403 West. Exit the
403 at Highway 6 North. Take Highway 6 North to the 401
West, and follow the directions beginning with (*) above.
By Bus: From Toronto: Kitchener is served by Greyhound Bus Service;
about 10 buses a day, each direction. For schedule
information, call (800) 661-8747.
From London: Kitchener is served by Cha-co Trails; about
3 buses a day, each direction. For schedule information,
call (800) 265-9460.
Once at the Kitchener bus terminal, Kitchener Transit runs
buses every 10-30 minutes to the University of Waterloo.
Take buses 7D or 8B from the terminal. Travel time is
approximately 25 minutes.
By Rail: VIA rail has infrequent service to Kitchener from Chicago/London
and Toronto. For schedule information, contact them at
(800) 361-1235 (Ontario only).
Symposium attendees should make their own hotel reservations.
The Waterloo Inn (475 King St. North, Waterloo) has reserved
a block of rooms for the symposium until October 26, at the
special symposium rate of $70 (CDN) for a single room and $76
for a double room. Contact them at (519) 884-0220, and specify
the "block ID Free100".
Other hotels/motels reasonably near the Waterloo campus include:
* Destination Inn, 547 King St. North, Waterloo,
(519) 884-0100. Single $53, Double $63.
* Comfort Inn, 190 Weber St. North, Waterloo,
(519) 747-9400. Request the corporate rate of
Single $60, Double $69.
* Best Western Walper Terrace Hotel, 1 King St. West,
Kitchener, (519) 745-4321. Near Kitchener Bus
Terminal. Request the corporate rate of Single
$69, Double $69.
Last Name: ____________________ First Name: ___________________
City: ___________________ Province/State: __________________
Postal Code: _______________ Country: _________________________
Phone: _____________________ Fax: ____________________________
Before October 31 After October 31
StudentCDN $20 / US $16 CDN $30 / US $24
GeneralCDN $75 / US $60 CDN $90 / US $72
Registration fee includes admission to all sessions, Internet
demonstration, lunch, two coffee breaks, copies of printed
material, and GST. (GST No. = R119260685)
If paying by cheque, please make cheque out to "University of
Waterloo", payable in either US or Canadian Funds, and mail to:
"Free Speech and Privacy Symposium"
c/o Wendy Rush
Department of Computer Science
University of Waterloo
Waterloo, Ontario N2L 3G1
You can also use a credit card. Please provide the following
Card name (Visa, Mastercard, or American Express):
Amount (Specify in Canadian dollars ONLY):
Cardholder's Name (please print):
Cardholder's Signature: ___________________________________________
FOR FURTHER INFORMATION:
Contact Wendy Rush at (519) 885-1211 ext. 3688, or Jeffrey
Shallit at (519) 888-4804. Fax inquiries can be sent to
(519) 885-1208. E-mail inquiries can be sent to:
On the Internet, you can get a copy of this program by
typing "finger email@example.com".
Date: Wed, 7 Sep 1994 21:18:54 CDT
From: Jim Thomas
Subject: File 4--Reaffirming Life through an Online Death
On August 21, about 10:30 p.m.
Kathleen Johnston was a nudge shy of 50, rather lonely and unhappy.
Brilliant, articulate, and rather shy in person, she was a dynamic
extrovert online. Her health prevented her from applying her
Wellesley background and an M.A. and Ph.d in physical sciences toward
a full-time professional career. So, in her final years, she immersed
herself in The Well, the bay area electronic community populated by
equally bright and articulate folk. There, she made friends, found
foes, provoked, nurtured, challenged, baited, and both earned respect
and generated animosity from those she encountered. What made kj's
death different from most deaths was that, when she was no longer able
to participate fully on The Well, she wrote her own death notice, a
simple statement, and posted it in the Well's obituary topic on June
Kathleen Johnston. September 29, 1945 - July or August, 1994.
The days are dwindling, as is my energy, so I won't be around to
correct your copious errors in logic. It's been fun.
Of metastatic cancer.
kj's post generated scores of immediate responses, and a second topic
was opened. Nearly 400 additional posters offered their poems,
sympathy, and tear-stained well-wishes. Almost 300 more appeared
immediately after her death. The event drew media attention:
In his ONLINE column in the San Francisco Chronicle (1 Sept, '94: THE
SAN FRANCISCO CHRONICLE, 9/1/94 "Death Leaves Well Bewildered")
That's kj's death is famous now was just luck. Two years
ago, or two years hence, she could have died just like
anyone else, without making the papers.
But right now what happens online is new and different.
That an ordinary citizen named Kathleen Johnston should die
of cancer is not fodder for Time and the Washington Post.
But that kj on the WELL should die -- and that her death
provoke the online response that it did -- that makes news.
We're just beginning to get a handle on the idea of living
online, after a decade or so of making it up as we go along.
This inevitably includes deciding, in the chaotic way that
collective decisions get made online, how we are going to
respond to death.
The thing is, we just don't know what to do. Americans have
always tended to improvise. This works for things like
technology, marketing, or statecraft. But it serves us
poorly where death is concerned.
Time Magazine (5 Sept, '94: p. 18) was more straight-forward:
CHRONICLES: WELL-WISHERS ON THE INTERNET
Is cyberspace as cold and anonymous as it is reputed to be?
Members of the WELL, a San Francisco-based computer bulletin
board, recently found out. On June 29, Adele Framer, who
calls herself tigereye, posted a message: "Kathleen
Johns((t))on -- kj -- on the WELL, who's housebound in the
final stages of cancer, could use a little help with light
meals once or twice a week." The following are excerpts from the
exchange that followed. KJ herself is noticeably absent. She was
in no shape to take part in a message board.
The Time piece added 17 posts believed to typify the spirit of the
But, the media, I think, missed the real story. kj's was much more
than a death around which a community commiserated electronically.
This should not be a story about posts. It's a story of people coming
together, sharing experiences, grieving, squabbling, learning, and
growing. The real story is that the electronic medium, while
certainly of value in helping a stunned community cope with the grief
of losing one of their own through an E-death watch, provided the
means to reach out more tangibly to kj. And, more importantly, to
reach out to each other.
The real story is how one woman devoted her energy to organizing
meals and assuring that kj would be cared for. How a male, often in
mortal online combat with kj, visited her and together in her final
days experienced a mutual growth and understanding. How others, who
fought with kj in public, were uneasy about participating in the
online or physical events prior to the death. It's about the
rallying, about the phone calls, about the supportive e-mail sent to
kj, about the visits at home. It's about friends, acquaintances and
strangers visiting in the hospice in the final days, comforting her,
reading to her, holding her hand.
Most of all, the story is not about death, it's about life. It's
about how online antagonists recognize their own demons and with pain
and self-reflection confront them. It's about how friends and
strangers give of themselves in ways that transcend the ASCII world in
which they normally meet. It's about the courage to make peace, the
sacrifice of care-giving, the shared community of grieving.
Most of all, the story is about how the electronic medium brings
people together, face-to-face, heart-to-heart, even in death. The
media saw and reported only ASCII, and made invisible the mandala
that gave it soul.
Date: Thu, 13 Aug 1994 22:51:01 CDT
From: CuD Moderators
Subject: File 5--Cu Digest Header Information (unchanged since 9-1-94)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +126.96.36.199.77 (ringdown)
UNITED STATES: etext.archive.umich.edu (188.8.131.52) in /pub/CuD/
ftp.eff.org (184.108.40.206) in /pub/Publications/CuD
aql.gatech.edu (220.127.116.11) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
End of Computer Underground Digest #6.79
E-Mail Fredric L. Rice / The Skeptic Tank