About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Holocaust revisionism goes up in flame wars, Addit


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From <@uga.cc.uga.edu:[email protected]> Wed Nov 30 22:01:39 1994
Return-Path: <<@uga.cc.uga.edu:[email protected]>>
Received: from uga.cc.uga.edu by mail.netcom.com (8.6.9/Netcom)
id WAA11298; Wed, 30 Nov 1994 22:00:54 -0800
Received: from UGA.CC.UGA.EDU by uga.cc.uga.edu (IBM VM SMTP V2R2)
with BSMTP id 2599; Thu, 01 Dec 94 00:57:08 EST
Received: from UGA.CC.UGA.EDU (NJE origin LISTSERV@UGA) by UGA.CC.UGA.EDU (LMail V1.2a/1.8a) with BSid 8022; Thu, 1 Dec 1994 00:55:52 -0500
Received: from NIU.BITNET by VMD.CSO.UIUC.EDU (LISTSERV release 1.8a) with NJE
id 4327 for [email protected]; Wed, 30 Nov 1994 23:52:59 -0600
Date: Wed, 30 Nov 94 23:49 CST
To: cudigest%[email protected]
From: Cu Digest ([email protected]) <TK0JUT2%[email protected]>
Subject: Cu Digest, #6.101
Message-ID: <CUDIGEST%[email protected]>
Sender: [email protected]
Status: O

Computer underground Digest Wed Nov 30, 1994 Volume 6 : Issue 101
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Fruit-loop editor: Carnegie Melon

CONTENTS, #6.101 (Wed, Nov 30, 1994)

File 1--Holocaust revisionism goes up in flame wars
File 2--Addition to alt.revisionism story
File 3--USSC Rules "Defendants must Know" in Child Porn Cases
File 4--Law, Science and Society Conference
File 5--CPSR Discounted Membership
File 6--CU in the News
File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)
File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Mon, 14 Nov 1994 00:01:47 -0500
From: [email protected](eye WEEKLY)
Subject: File 1--Holocaust revisionism goes up in flame wars

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY November 10 1994
Toronto's arts newspaper .....free every Thursday
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYE.NET EYE.NET

.SIG HEIL
Holocaust revisionism goes up in flame wars

by
K.K. CAMPBELL

It was 56 years ago today that Germans awoke to find the Nazis had
spent the night terrorizing Jews and destroying property in something
called "Crystal Night." It was a test-run pogrom for the Holocaust to
follow.

Once upon a time, net.news (the Internet's public discussion forums)
was swamped with flame wars about the Holocaust. They'd be found
anywhere -- in newsgroups like alt.conspiracy, soc.history,
soc.culture.canada, misc.headlines, alt.individualism etc.

One of the most persistent Nazi-apologists, Dan Gannon
([email protected]), wildly spammed Holocaust-denying material,
either not understanding or not caring about netiquette -- that is, you
post appropriate material to appropriate groups. Thousands, from dozens
of newsgroups, complained. Gannon's posts were bad enough, but they
always brought rebuttal and endlessly repeated arguments.

Today, most of these debates are found in one newsgroup:
alt.revisionism -- dedicated to discussing "Holocaust revisionism," the
claim that the Nazi extermination of Jews and other distinct peoples is
a "hoax" exacted upon millions of unwary non-Jews.

Anti-racist and anti-fascist online activists continue to track Gannon
and his pals around the 9,000-odd newsgroups. One such hunter is
Canada's Ken McVay ([email protected]). McVay, 53, came to
Canada in 1967 from the U.S. and is now a Canadian citizen (holds dual
citizenship). He's Canada's foremost online anti-revisionist warrior.

I've been reading his stuff for years.

TRUE COLORS

"When I first got started on this, everyone was sort of out there on
their own," McVay told eye in a phone interview from his Vancouver
Island home. "Almost by accident, working groups started coordinating
their efforts." McVay works closely with Danny Keren ([email protected])
and Jamie McCarthy ([email protected]), among others.

The goal is not censorship. "I am absolutely, unequivocally opposed to
any kind of censorship," McVay says.

This is a real shift in McVay's thinking. I vividly recall reading
McVay his posts from about two years ago, where he'd vehemently defend
Canadian anti-hate speech laws.

"I don't anymore. I think it's the biggest possible mistake." What
changed his mind? "Dealing with these guys on a daily basis for over
two years. Seeing how easy it is to shoot them down. And it is. The
most intellectual among them are stupid and completely inept when it
comes to historical research. And, of course, they are liars. That
being the case, why on Earth would anyone want to shut them up or force
them underground? I want to know who I'm dealing with. I want to know
where they are. And I want to know how their minds work."

To see their true colors, McVay and compatriots badger and prod
revisionists until they drop the scholarly pretense by, say, calling
McVay a "Jew-lover" or complaining Hitler unfortunately missed the
parents of some Jewish netter. It happens regularly.

"These online discussions are not aimed at getting Gannon and his pals
to change their minds," McVay says. "That ain't gonna happen. It's to
reach the rest - - such as the new users that pop up every September in
universities and stumble on this stuff. Many don't know how Nazis
operate. Most racists don't go around with a little patch on their
shoulder proclaiming: `I hate Jews, or blacks, or natives.' But it's
there. We work to bring it out in the open."

A.R. AS TESTING GROUND

McVay and company are working on putting together a book, a primer on
Holocaust-denial techniques. (He hasn't approached a publisher yet.)
You often see the results of this ongoing research in alt.revisionism .
McVay chuckles about having rabid anti-Semites ever at hand to help
write it.

"We throw out a chapter when we think it's done, content-wise. If the
revisionists ignore it completely, then we know it's finished. If they
respond, we say, `Ah! We missed that trick, calling a maple tree a
Porsche.' So we add that argument in." A month later, they upload the
chapter again.

McVay says the "classic" revisionist tactic is misrepresentation of
text. Outright lies.

"They'll cite a historical text: `K.K. Campbell says on page 82 of his
famous book that nobody died at Auschwitz.' Then you go to the Library
of Congress and look up K.K. Campbell, page 82, and what you find he
really said was, `It was a nice day at Dachau.' They get away with this
because they know goddamn well most people don't have time to rush off
to the Library of Congress. But people read that and say to themselves,
`Who would lie about such a thing when it's so easy to prove them
wrong? They must be telling the truth.' "

The years of refutation have resulted in anti-revisionists transcribing
mass amounts of death camp evidence and testimony into computer text
files. McVay saved them. Soon netters requested the material. It began
to take up so much time, he automated the process. You send an email
request, the computer sends you back the file(s).

The archive is now maybe 60 megs and may swell to over a gig in 1995.
Write email to ADDRESS TK with the message GET HOLOCAUST/INDEX --
you'll be sent a huge index of Holocaust files (other files, too, on
fascist racist-right groups). If you like the convenience of gopher,
check out jerusalem1.datasrv.co.il .

Revisionists often assert McVay secretly gets operating funds from
Jews.

"I don't," McVay says. "The hard-drives are spread out on a table with
a Canadian Tire fan blowing right at them. I can't afford to replace
things, if it breaks, it's gone. However, I'm upfront -- if I get
support money, I'll take it, Jewish or not. The fact that a Jewish
organization would offer several grand to help wouldn't change the
value of the historical data." He'd like to put it all on CD-ROM.

"The Internet has to be a revisionist's worst communications
nightmare," McVay says. "They can't ignore it, because, as you and I
know, in 10-15 years everyone in North America is going to read stuff
through the Internet.

"And that's the beauty of the Internet: once it's refuted in an honest
and academic fashion, you can't run away from it," McVay says.

When the latest revisionist recruit charges in with the same old
pamphlets, it's almost effortless for anyone to request a file and
reply: "We covered this two years ago. Here is the massive refutation
of that so-called scholarly report."

It's there. For everyone. Forever.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace Author holds standard copyright
Full issues of eye in archive gopher://interlog.com
Coupla Mailing lists available http://www.interlog.com/eye
[email protected] "Break the Gutenberg Lock..." 416-971-8421

------------------------------

From: [email protected](eye WEEKLY)
Subject: File 2--Addition to alt.revisionism story
Date: Sun, 20 Nov 1994 00:10:25 -0500

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
eye WEEKLY November 17 1994
Toronto's arts newspaper .....free every Thursday
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
EYE.NET EYE.NET

RANKING THE ALT.REVISIONISTS

by
K.K. CAMPBELL

Last week, eye Net focused on Ken McVay, battle-hardened
anti-revisionist warrior against net.Nazis and holocaust deniers alike
who cruise the net.

McVay and cohorts endeavor to demonstrate that under every single
Holocaust denier you find an anti-Semite/racist/fascist -- no matter
how "scholarly" a front may be presented.

Newsgroup alt.revisionism has housed a changing cast of Holocaust
deniers over the years. To help guide the newcomer through the raging
flame wars, eye presents the current crew rated for denial motivations
and cyberspace posting style.

eye surveyed two dozen contributors who wage war with Holocaust deniers
on a regular or semi-regular basis. While some polled were inclined to
just give all revisionists 1 in smarts, it was understood this wouldn't
be very useful to newcomers. More importantly, if all rated 1, then
it's impossible to measure the intelligence of Tim McCarthy.

This chart will be posted permanently in eye's online Web site --
http://www.interlog.com/eye/Misc/Alt.revisionism/Rev.html . The chart
can be updated, ratings recalculated, as new net.nazis and kin wander
in. Useful tool for a.r newcomers.

(McVay suggests eye add a new category -- the BSI or Berg Spittle
Index. Using Friedrich Berg as a perfect 10 in spluttering vitriol, he
says Gannon would come in at 9.9 and Hoffman at 7.5. These are, of
course, but the most preliminary of ratings...)

TOP TEN NET.HOLOCAUST-DENIERS

| A | B | C | D || E | F | G | H |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Friedrich Berg | 7 | 9 | 9 | 9 || 5 | 7 | 3 | 5 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dan Gannon | 7 | 8 | 7 | 9 || 2 | 4 | 4 | 3 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Michael A Hoffman | 7 | 8 | 8 | 8 || 4 | 4 | 4 | 3 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Milton Kleim | 9 | 9 |10a| 9 || 4 | 7 | 3 | 2 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tim McCarthy | 9 | 9 | 8 |10 || 1b| 3 | 1 | 1 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
? | 7 | 8 | 8 | 9 || 2 | 3 | 2 | 1 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Greg Raven | 4 | 5 | 5 | 5 || 5 | 8 | 8 | 4 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Rick Savage | 9 |10 | 8 | 9 || 2 | 2 | 2 | 1 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Bradley R. Smith | 5 | 5 | 5 | 5 || 6 | 7 | 7 | 4 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ross Vicksell | 3 | 4 | 5 | 5 || 6 | 7 | 8 | 3 |
([email protected])
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ratings are from 1-10 --10 high. (All rounded to nearest whole number.)

MOTIVATIONAL TRAITS

A = RACISM (10 = Christian Identity; 1 = indifferent)
B = ANTI-SEMITISM (10 = pure visceral hate; 1 = dispassionate)
C = FASCISM/NAZISM (10 = Sieg Heil; 1 = politically clueless)
D = CONSPIRACISM (10 = "I have PROOF Jew-controlled Robot
Icebergs sank the Titanic!!!!!!"; 1 = ya right, like any of them
are 1s)

PERSONAL TRAITS

E = INTELLIGENCE (10 = snort, as if; 1 = "Bend over?! Jawohl, Mein
Fuhrer!!!")
F = COMPOSITION (10 = properly formatted paragraphs; 1 = forget
computers, yet to master holding pencil)
G = CIVILITY (10 = courteous; 1 = "FUKKK YOUU JOOOO!!!!111")
H = ACADEMIC RESOURCES (10 = constant citations; 1 = "My dad told
me that ...")

NOTES

a = Kleim rated 10 from all respondents; only one to achieve a perfect
score in any category.

b = McCarthy only person to receive several ZERO ratings for
intelligence; these registered as 1 in computation.

KILL (FILE) THE NAZIS

Deborah Lipstadt argues in her recent book Denying The Holocaust
(Penguin, $13.99, paper) that anti-revisionists should not just yell,
but should refute revisionists --and then ridicule will issue forth
from that. This is particularly relevant to cyberspace, which has no
"central office."

Netters who simply don't wanna see net.Nazi shit can use the all-
important kill files. You'll find a copy of the Kill File FAQ
(Frequently Asked Questions) in eye archives to help explain to you how
to use them. (Use gopher or Web and look in eye's Miscellaneous
directory.)

A kill file "tells" your news reader (the software that organizes all
those net.news/Usenet posts) to filter out specific articles. You can
kill all posts coming from a particular person, or a particular site,
or on a particular subject.

To help you ascertain which net.personalities are common kill file
bait, eye introduces its series of KILL FILE TRADING CARDS! Instant
collector's item! Trade with friends! Collect the set!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Retransmit freely in cyberspace Author holds standard copyright
Issues of eye in archive gopher://interlog.com
Coupla Mailing lists available http://www.interlog.com/eye
[email protected] "Break the Gutenberg Lock..." 416-971-8421

------------------------------

Date: Wed, 30 Nov 1994 18:22:43 PST
From: Anonymous <[email protected]>
Subject: File 3--USSC Rules "Defendants must Know" in Child Porn Cases

((MODERATORS' Note: The following USSC decision should make sysops
breathe a bit easier, because it requires that prosecutors show that
defendants in "child pornography" cases know that the subjects are
minors)).

Source: Chicago Tribune, Nov 30 1994 (p. 10)

CHILD PORNOGRAPHY LAW UPHELD
IN 7-2 RULING, SUPREME COURT EDITS INEXACT PHRASING

The Supreme Court salvaged the federal law against child
pornography Tuesday by editing it to make clear that the government
must prove that a defendant knew that the performers in sexually
explicit photographs or films were under the age of 18.

Congress almost certainly intended to include a knowledge
requirement even though "the most natural grammatical reading" of the
densely written law does not find one, Chief Justice William
Rehnquist said in a 7-2 decision. The chief justice said that when
Congress wrote the law in 1977 and amended it in 1984, it was aware of
((The story notes that USSC precedents have held that
obscenity laws are unconstitutional unless they require
proof that defendants know the nature of the material.
Justice Scalia, joined by Justice Thomas, dissented)).

The decision overturned a 1992 ruling by a federal appeals court in
San Francisco, which had declared the law, the Protection of Children
Against Sexual Exploitation Act, unconstitutional on its face because
it omitted a knowledge requirement.

The statute's linguistic problem is the placement of the word
"knowingly." The law provides that anyone who "knowingly transports or
ships" or who "knowingly receives or distributes" visual depictions of
a minor engaged in sexually explicit conduct has committed a federal
crime.

Taken literally, the law requires only that the transporting,
shipping, receiving or distributing be intentional, without reference
to the sexually explicit contents or to the age of the performers.

((Rehnquist noted that a literal interpretation of the law
would produce off, even absurd results)):

Among the examples he gave of innocent violators of the law's
literal meaning was "a retail druggist who returns an uninspected roll
of developed film to a customer" and who thereby "knowingly
distributes" a "visual depiction" that might turn out to show children
engaged in sexually explicit conduct.

------------------------------

Date: Wed, 30 Nov 1994 12:26:44 -0600
From: Stephen Smith <[email protected]>
Subject: File 4--Law, Science and Society Conference

LAW, SCIENCE AND SOCIETY

the 11th annual higher education conference
sponsored by the
American Bar Associaton
Commission on College and University Legal Studies

WHERE: Detroit, Michigan
[at The Atheneum Suite Hotel, a new hotel located in the
revitalized Greektown area of Detroit, near Renaissance
Center]

WHEN: April 28-30, 1995 (Friday - Sunday)

THEMES: The conference will explore a variety of relationships
between law and science, including law's contribution to
medical and ethical debates (e.g., reproduction, death and
dying, genetics), the role of scientific and forensic
evidence in the courtroom, environmental regulation, law
and psychiatry, and the impact of technology on legal
concepts and ideas of justice. Workshops will provide an
opportunity to discuss curriculum, teaching, and learning
within the context of law/science perspectives.

WHO: This is an invitational conference. We seek a diverse
group of about 75 faculty and other educators from the
social sciences, humanities, and professional fields --
e.g., philosophy, sociology, history, political science,
psychology, mental health, criminal justice, law, medicine,
nursing and the health sciences, etc.

COSTS: The ABA will pay for two nights of lodging at the Hotel for
40 invitees. As many as 30 additional applicants will be
invited without a lodging subsidy. Preference for
subsidies will be given to faculty whose interests bear
most directly upon conference themes and who have not
previously been subsidized at a Commission conference. A
$75 registration fee ($40 for commuters) includes a
complete set of conference materials, receptions, and group
meals.

TO APPLY: College and university faculty, deans, and organization-
based educators wishing to apply should send a c.v. and a
cover letter describing their interests by January 31, 1995
to: John Ryan, ABA Commission on College & University Legal
Studies, 541 N. Fairbanks Ct., Chicago, IL 60611-3314;
fax: 312/988-5032; or email: [email protected]

Please direct any questions or applications to this conference to the
[email protected] address, not the mailing list. Thanks.

Anthony Star
American Bar Asssociation, Commission on College and University Legal Studies
541 N. Fairbanks Court, Chicago, IL 60611-3314; 312/988-5736
[email protected] (work); [email protected] (home)

------------------------------

Date: Thu, 10 Nov 1994 13:40:47 -0800
From: email list server <[email protected]>
Subject: File 5--CPSR Discounted Membership

------------------------------------------------------
Second in a series of clever come-ons to entice you to join CPSR
------------------------------------------------------
Take advantage of this SPECIAL OFFER. Join before Janurary 1st.
------------------------------------------------------
Approved for distribution by The Cyberian Winds... Feel free!
------------------------------------------------------

COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY

ELIGIBILITY TEST

As you know, CPSR is an organization that is dedicated to understanding
and influencing the implications of computer technology. We have
devised a short test below (estimated time to complete: 19.3 seconds) to
help you determine (in the privacy of your own home) whether you have
what it takes to join this effort.

If you choose the *correct* answer for all four true / false statements
below, then you are eligible to join CPSR! It's that EASY!


Simply answer T (for True) or False (for False) for each
statement below.

1. It is important for citizens to become involved in the development
of the "Information Superhighway" to ensure that it addresses
educational and other critical needs.

2. Privacy considerations might be overlooked in the next-generation
computing systems if organizations like CPSR aren't especially
vigilant.

3. I am concerned that the "Information Superhighway" might become an
"Information Supertollway" - a shopping mall rather than a public
commons. I'm concerned about first amendment rights in cyberspace!

4. I would like to help support Computer Professionals for Social
Responsibility and help support the development of democratic
and responsible technology.

[If you answered T to all four questions, you are eligible to join CPSR!]

CPSR Isn't Just for Computer Scientists!

CPSR was started in 1981 by computer scientists and, to this day, has
many computer scientists within its ranks. At that time, CPSR's
mission - that of informing the people as to the risks of using
computers in automated nuclear weapons systems - was quite complex.
Times have changed considerably since 1981. Computers are much more
prevalent. Also as computing technology becomes more an integral part
of modern life, the voice of the computer scientist - although
important - becomes one voice among many others that needs to enter
into the discussion on the future of computing technology.

While computers offer great opportunities for enhanced communication
with community and civic networks, they also offer grave threats.
Computers allow privacy violations to occur virtually unchecked
as transfer of personal information can occur almost instantaneously.
Prospects of the Clipper Chip, National ID cards, and unchecked
collecting and sharing of millions of K-12 records are looming
omininously in the future unless we act now to prevent them.

Today, in 1994, with computers playing vital roles in virtually all
areas of society, it is important that educators, students, librarians,
policy makers, engineers, social workers, activists, and business
people, among many others with important viewpoints participate in
these vital discussions. For that reason we are currently making a
special effort to introduce all of these groups to CPSR.

**********************************************************************
*********** SPECIAL DISCOUNT ON FIRST TIME MEMBERSHIPS **************
**********************************************************************

To help people participate, We are lowering our membership fees by $10
for both our regular and and our contributing membership categories
(first time members only please) for the remainder of 1994! Take
advantage of this special offer today and join the discussion!

If your interest is the National Information Infrastructure, privacy,
civil liberties, national identification cards, privacy of student
records, community networking, computers in the workplace, or any
number of important issues, please consider joining us.

**********************************************************************
******************** CPSR Membership Form *************************
**********************************************************************

Here are my membership dues to help support Computer Professionals for
Social Responsibility and bring the message of socially responsible
computing to the profession, policymakers, and the public.

Name ___________________________________________________________

Address ___________________________________________________________

___________________________________________________________

City/State/Zip _____________________________________________________

Home phone _____________________ Work phone ______________________

Company / Institution ________________________________________________

Type of work ______________________________________________________

E-mail address _____________________________________________________

CPSR Chapter
__ Acadiana __ Austin __ Berkeley
__ Boston __ Chicago __ Denver/Boulder
__ Los Angeles __ Loyola/New Orleans
__ Madison __ Maine __ Milwaukee
__ Minnesota __ New Haven __ New York
__ Palo Alto __ Philadelphia __ Pittsburgh
__ Portland __ San Diego __ Santa Cruz
__ Seattle __ Washington, DC __ No chapter in my area


CPSR Membership Categories
[Note SPECIAL Discounts!]

>From now until the end of 1994, CPSR is offering a $10.00 DISCOUNT
on their Regular and Basic membership levels for new members.

__ $ 20 Student/Low income membership

Basic Membership
WAS $50 Now just ==>> __$40 (for first time members)

REGULAR MEMBERSHIP
WAS $75 Now just ==>> __$65 (for first time members) (receive a mousepad)

__ $200 Supporting membership (receive totebag)
__ $500 Sponsoring membership (receive mousepad and totebag)
__ $1000 Lifetime membership (receive book, totebag, and mousepad)

__ Electronic Funds Transfer Membership $__ per month

Please consider a donation to help expand the CPSR program.

__ $50 __ $75 __ $100 __ $250 __ $500 __ $1000 __ Other

Total Enclosed: $ ________

Interests

__ National Information Infrastructure
__ Privacy & Civil Liberties __ Participatory Design
__ Working in Industry __ Community Networks
__ Social Action __ Weapons & Peace
__ Intellectual Property __ Computer & Environment
__ Education __ Workplace
__ International __ K-12 Student Privacy

Please make check out to CPSR.

Mail form with check to: CPSR, P.O. Box 717, Palo Alto, CA 94302-9917

We welcome comments that you have about the CPSR Program.

Privacy Notice. The CPSR membership database is never sold, rented,
loaned, exchanged, or put to use for anything other than official CPSR
activity. CPSR may elect to send members mailings with information from
other groups, but the mailings will always originate with CPSR.

************************************************************************
**************** JOIN CPSR'S ELECTRONIC MAILING LIST **************
************************************************************************

Placing yourself on CPSR's list server gives you access to a
library of materials dealing with CPSR issues and CPSR
documents. It is accessible via Internet and anyone can join.
To subscribe, send email to:

[email protected]

Your message needs to contain only one line:
SUBSCRIBE CPSR-ANNOUNCE <your first name><your last name>

You will get a return message that confirms your subscription.
The message also explains how to use the list server to request
materials and how to use the index of CPSR's archives.

If you have a problem with the list server, please contact
[email protected]

CPSR also maintains a number of email lists that focus on
various issues and projects. To find out what email lists are
available and how to join them, send an email containing the
message LIST to [email protected]

You can also request assistance by using the HELP command. If
you have trouble contact [email protected]

We hope you enjoy this new service.

------------------------------------------------------
If you didn't answer correctly, please feel free to study the materials
and try again. Good luck!

------------------------------

Date: 30 Nov 94 15:44:29 EST
From: Gordon Meyer <[email protected]>
Subject: File 6--CU in the News

Online Libel Lawsuits
=====================
ComputerWorld reports that the flame wars of the electronic frontier
have finally spilled over into the courts. Prodigy has been sued for
$200 million over a message that called a stock offering a criminal
fraud. There is speculation that Prodigy's zealous control of its
message boards, especially in terms of obscenity and topic control,
may result in the company being held to a standard higher than
services who don't so tightly monitor user activity. The article also
discusses Kodak's policy of not allowing employees to post on
discussion groups when using a Kodak address.
(ComputerWorld. Nov. 21, 1994 pg 1+)

Sounding Off about Business Use of Internet
===========================================
Two cogent and articulate writers "sound off" about the
commercialization of the 'net in the Nov. 21, 1994 issue of
ComputerWorld. One writer is a researcher/academic, the other a
business consultant. Their arguments have been heard before, but
having both side-by-side makes for a though-provoking piece.
(ComputerWorld. Nov. 21, 1994. pg 116+)

Cyberspace and The Law reviewed
===============================
Datamation offers a short blurb about _Cyberspace and The Law: Your
Rights and Duties in the Online World_. The reviewer found it to be a
"well-written, well-organized primer meant for people who have more
experience with he Internet then with the law." The book is by Edward
Carvazos and Gavino Morin, MIT Press.
(Datamation. Nov. 15, 1994 pg 100)

------------------------------

Date: Wed, 30 Nov 1994 18:19:20 PST
From: Anonymous <[email protected]>
Subject: File 7--Legion of Doom "Terrorists?" (Chic Tribune summary)

((MODERATORS' Comment: File this one under "another clueless reporter
discovers the Internet." The opening paragraph says it all. We invite
comments))

Privacy under siege in the heart of the Internet
By Nathaniel Sheppard Jr. Tribune Staff Writer

Source: The Chicago Tribune, Nov. 30, '94 (p. 1, 12)

WASHINGTON--They're terrorists with names such as the Legion of Doom
and Masters of Deception. But unlike the Red Guard or Symbionese
Liberation Army of a previous era, their weapon of choice is a
keyboard, not an assault rifle.

They're among the subversives launching sporadic attacks on the
information superhighway and raising troubling questions about
security and privacy for individuals, corporations and federal law
enforcement agencies.

((The article notes that electronic invaders compromised
passwords, stole data, and are increasingly able to monitor
telephone calls))

Perhaps most alarming are the attacks against Internet, a global grid
of computer networks, and the widespread distribution over the
internet of intrusion tool kits, the hacker's equivalent of the
burglar's black bag. The tool kits contain "sniffer" programs that
attach themselves to the hub of computer networks and copy user
passwords and other log-in data.

((The story quotes a computer security expert, Earl Boebert
in Roseville, Minn, as saying that there's a convergence of
traditional areas of concern--protecing individuals' personal
data from organizations and protecting intellectual property
from theft, and some individuals are going after organizatins
that keep personal data records. The story notes that sniffer
programs are used by intruders, and recent targets this year
included Milnet)).

A Defense Department spokeswoman said intruders captured the
identification codes of about 100,000 users and were able to "steal,
alter or erase information on the affected computers and to shut
computers down or alter them in such a way as to allow further
undetected access to the compromised systems."

"Attacks on the infrastructure are becoming increasingly more
significant," said Barbara Fraser, manager of product development for
the Computer Emergency Response Team, a federally funded project based
at Carnegie Mellon University in Pittsburgh that helps computer users
cope with intrusion problems.

The agency was set up in 1988 after a young hacker named Robert Morris
Jr. introduced a "worm" into Internet, compromising an estimated
6,000 "host" or primary systems.

((Cert handled more than 1,300 incidents last year, the story
says. It alludes to the MCI calling card scheme, and repeats
the questionable facts reported by earlier media sources))

The incidents are part of a rash of attacks by underground groups of
hackers with names such as the Legion of Doom, groups made up largely
of college students.

Crackers, as the more malevolent hackers are called, have become very
sophisticated. They focus their attacks on known weaknesses in systems
or probe for back doors, said Scott Charney, director of the Justice
Department's computer crimes unit.

"Cases involving the Legion of Doom and the Masters of Deception
really went to the heart of the system," he said.

The legion is a group of about 20 hackers spread around the country.
Beginning in 1987 three members of the group in Atlanta used pilfered
passwords and old identification cards to gain access to computers at
BellSouth, the regional phone company serving southeastern states.

The three men, who subsequently pleaded guilty to computer fraud
charges, eavesdropped on telephone conversations, re-routed calls, and
are believed by authorities to have planted electronic messages in
telephone facilities in Atlanta, Denver and New Jersey that could have
knocked out 911 emergency and long distance service.

In July 1992, members of a rival group of crackers, the Masters of
Deception, allegedly broke into computers at BellSouth, TRW
Information Services, Timenet, Nynex and other data carriers and stole
credit reports and other confidential information that was sold to
private investigators.

The increase in attacks may be in part due to the proliferation of
intrusion kits, Fraser said. "Tool kits for intruding on systems are
being posted to bulletin boards all over the world," he said. "This
allows even novices to enter network systems."

((The article notes that electronic theft of software is also
increasing. It gives the exaple of TIE Fighter, based on Star
Wars movies, that an employee made available to "software
pirates" two weeks before the scheduled release. The article
notes that some companies are hiring ex-hackers for security
advice. The article also finds great significance in the "finger"
command on Unix as a means of aiding to stalking or harassment of
women)).

------------------------------

------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 8--Cu Digest Header Info (unchanged since 25 Nov 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #6.101
************************************

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS