Computer underground Digest Sun 14 Feb, 1999 Volume 11 : Issue 09 ISSN 1004-042X Editor: Jim Thomas (cudigest@sun.soci.niu.edu) News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) Archivist: Brendan Kehoe Poof Reader: Etaion Shrdlu, Jr. Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Cu Digest Homepage: http://www.soci.niu.edu/~cudigest CONTENTS, #11.09 (Sun, 14 Feb, 1999) File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act File 2--Spurned LA Man charged with Internet Stalking File 3--Court upholds law banning Internet porn in the office File 4--Israeli Teens Charged with Hacking into US Systems File 5--More States Consider Laws Restricting Junk E-Mail File 6--Jury awards $107 Million File 7--Cyber Patrol controversy File 8--LECTURE: "Doing Computer History in Internet Time" File 9--Australia to trial "link crimes" File 10--Computers, Freedom and Privacy '99 File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS: File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Sun, 14 Feb 1999 17:45:43 -0500 From: Robert A. CostnerSubject: File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act Source - fight-censorship@vorlon.mit.edu I'd appreciate some comments on this bill. If you will give me "official" comments, I'll add them to a web page linked to the bill commentary at http://www.efga.org/leg/ Comments from all sides are welcome. 1 To amend Part 2 of Article 3 of Chapter 12 of Title 16 of 2 the Official Code of Georgia Annotated, relating to offenses 3 related to minors generally, so as to define the crime of 4 computer pornography; to provide a short title; to define a 5 certain term; to make it unlawful for any person knowingly 6 to utilize a computer on-line service, Internet service, or 7 local bulletin board service to seduce, solicit, lure, or 8 entice, or attempt to seduce, solicit, lure, or entice a 9 child or another person believed by such person to be a 10 child, to commit certain illegal acts; to make it unlawful 11 for any owner or operator of a computer on-line service, 12 Internet service, or local bulletin board service knowingly 13 to permit a subscriber to utilize the service to commit a 14 violation of this Act; to provide that the fact that an 15 undercover operative or law enforcement officer was involved 16 in the detection and investigation of an offense under this 17 Act shall not constitute a defense to prosecution under this 18 Act; to provide that a person is subject to prosecution in 19 this state pursuant to Code Section 17-2-1 for any conduct 20 made unlawful by this Act which the person engages in while 21 either within or outside of this state if, by such conduct, 22 the person commits a violation of this Act which involves a 23 child who resides in this state or another person believed 24 by such person to be a child residing in this state; to 25 provide that, for the purposes of this Act, conduct which is 26 criminal only because of the age of the victim shall not be 27 considered a criminal offense if the perpetrator is 18 years 28 of age or younger; to provide that any violation of this Act 29 shall constitute a separate offense; to provide penalties; 30 to repeal conflicting laws; and for other purposes. 31 BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA: 32 SECTION 1. 33 Part 2 of Article 3 of Chapter 12 of Title 16 of the 34 Official Code of Georgia Annotated, relating to offenses 35 related to minors generally, is amended by adding following 1 Code Section 16-12-100.1 a new Code Section 16-12-100.2 to 2 read as follows: 3 "16-12-100.2. 4 (a) This Code section shall be known and may be cited as 5 the 'Computer Pornography and Child Exploitation 6 Prevention Act of 1999.' 7 (b) As used in this Code section, the term 'child' means 8 any person under the age of 16 years. 9 (c)(1) A person commits the offense of computer 10 pornography if such person knowingly: 11 (A) Compiles, enters into, or transmits by means of 12 computer; 13 (B) Makes, prints, publishes, or reproduces by other 14 computerized means; 15 (C) Causes or allows to be entered into or transmitted 16 by means of computer; or 17 (D) Buys, sells, receives, exchanges, or disseminates 18 any notice, statement, or advertisement, or any child's 19 name, telephone number, place of residence, physical 20 characteristics, or other descriptive or identifying 21 information for the purpose of facilitating, 22 encouraging, offering, or soliciting sexual conduct of 23 or with any child or the visual depiction of such 24 conduct. 25 (2) Any person convicted of violating paragraph (1) of 26 this subsection shall be punished by a fine of not more 27 than $10,000.00 or by imprisonment for not less than one 28 nor more than 20 years, or both. 29 (c)(1) It shall be unlawful for any person knowingly to 30 utilize a computer on-line service, Internet service, or 31 local bulletin board service to seduce, solicit, lure, 32 or entice, or attempt to seduce, solicit, lure, or 33 entice a child or another person believed by such person 34 to be a child, to commit any illegal act described in 35 Code Section 16-6-2, relating to the offense of sodomy 36 or aggravated sodomy; Code Section 16-6-4, relating to 37 the offense of child molestation or aggravated child 38 molestation; Code Section 16-6-5, relating to the 39 offense of enticing a child for indecent purposes; or 40 Code Section 16-6-8, relating to the offense of public 1 indecency; or to engage in any conduct that by its 2 nature is an unlawful sexual offense against a child. 3 (2) Any person who violates paragraph (1) of this 4 subsection shall be guilty of a misdemeanor of a high 5 and aggravated nature. 6 (d)(1) It shall be unlawful for any owner or operator of 7 a computer on-line service, Internet service, or local 8 bulletin board service knowingly to permit a subscriber 9 to utilize the service to commit a violation of this 10 Code section. 11 (2) Any person who violates paragraph (1) of this 12 subsection shall be guilty of a misdemeanor of a high 13 and aggravated nature. 14 (e) The fact that an undercover operative or law 15 enforcement officer was involved in the detection and 16 investigation of an offense under this Code section shall 17 not constitute a defense to prosecution under this Code 18 section. 19 (f) A person is subject to prosecution in this state 20 pursuant to Code Section 17-2-1, relating to jurisdiction 21 over crimes and persons charged with commission of crimes 22 generally, for any conduct made unlawful by this Code 23 section which the person engages in while either within or 24 outside of this state if, by such conduct, the person 25 commits a violation of this Code section which involves a 26 child who resides in this state or another person believed 27 by such person to be a child residing in this state. 28 (g) For the purposes of this Code section, conduct which 29 is criminal only because of the age of the victim shall 30 not be considered a criminal offense if the perpetrator is 31 18 years of age or younger. 32 (h) Any violation of this Code section shall constitute a 33 separate offense." -- Robert Costner Phone: (770) 402-3580 Electronic Frontiers Georgia mailto:pooh@efga.org http://www.efga.org/ run PGP 5.0 for my public key ------------------------------ Date: Sun, 7 Feb 1999 15:55:35 -0600 (CST) From: Jim Thomas Subject: File 2--Spurned LA Man charged with Internet Stalking Spurned L.A. Man Charged With Internet Stalking/Explicit, inviting e-mail was sent in woman's name to various men Source: San Francisco Chronicle, Saturday, January 23, 1999 http://www.sfgate.com/www.sfgate.com In the first prosecution under a new California cyber-stalking statute, a man has been charged with using the Internet in an attempt to arrange the rape of a woman who had spurned his romantic advances. The case centers on the chilling account of a North Hollywood woman. According to testimony, six different men showed up at her apartment over a five-month period last year, saying they were responding to online ads and steamy e-mails sent in her name that described fantasies of being raped. Authorities said Thursday that these were not her ads, her e-mails or her fantasies, and that she was the victim of Gary S. Dellapenta, a 50-year-old security guard from North Hollywood who earlier this week was ordered to stand trial on charges of stalking, computer fraud and solicitation of sexual assault. "This technology has created a whole new class of criminals who would not otherwise have the forbearance to terrorize people face to face," said Assistant U.S. Attorney Michael J. Gennaco, who two years ago prosecuted the first federal hate crime in cyberspace. "It emboldens them to hide behind computer screens and interfere with other people's lives." The e-mails said the woman was ``into rape fantasy'' and multiple partners, authorities said, and told numerous men everything from the address of her apartment to her physical description, her phone number and how to bypass her home security system. "Carol Chase, a professor at Pepperdine University School of Law, said messages like the kind Dellapenta allegedly posted are not that different from spiteful remarks that scorned suitors used to post on bathroom walls." "But by placing this information on an Internet site, you can reach millions of people," Chase said. "There is a greater likelihood that the harm you intend will be visited upon a victim." ------------------------------ Date: Thu, 11 Feb 1999 06:20:01 -0800 From: Jim Galasyn Subject: File 3--Court upholds law banning Internet porn in the office Court upholds law banning Internet porn in the office February 11, 1999 Web posted at: 7:52 AM EST (1252 GMT) RICHMOND, Virginia (AP) -- A federal appeals court has upheld a Virginia law that prohibits state employees from looking at sexually explicit material via the Internet while at work. The 4th U.S. Circuit Court of Appeals ruled on Wednesday that the law does not infringe state employees' freedom of expression. Six professors at public colleges challenged the law, arguing it would impede their ability to conduct legitimate research. But the 4th Circuit agreed with lawyers for the state who argued that the government has a right to supervise on-the-job activities of its employees. ------------------------------ Date: Thu, 11 Feb 1999 11:44:00 -0600 (CST) From: Jim Thomas Subject: File 4--Israeli Teens Charged with Hacking into US Systems The Chicago Tribune (Feb 10, '99: p 19) reported that a teenager and four accomplices who allegedly hacked into the computer systems of the Pentagon and NASA were indicted in Israel. "Ehud Tenenbaum, 18, and four others were charged with illegal entry into computers in the U.S. and Israel, including academic institutions and the Knesset." The story notes that their activities were discovered last year when two California youths were caught hacking into Pentagon computers and told authorities they had been trained by Tenebaum. ------------------------------ From: jthomas@sun.soci.niu.edu Date: Thu, 11 Feb 1999 10:30:46 EST Subject: File 5--More States Consider Laws Restricting Junk E-Mail Source: The New York Times, February 11 (1999) More States Consider Laws Restricting Junk E-Mail By JERI CLAUSING As lawmakers around the country discover that their constituents are concerned about Internet issues, bills to regulate or outlaw junk e-mail are popping up in state legislatures. Three laws restricting junk e-mail are already on the books, and lawmakers are considering four more. Advocates of the laws say they are encouraged by the new interest state lawmakers are taking in protecting consumers and Internet service providers from the scourge of junk e-mail, dubbed "spam" by annoyed recipients. However, they are also concerned that a patchwork of different laws across the country could hamper legitimate online marketing. Legislators adjourning for their 1999 sessions have introduced proposed spam laws in Texas, Virginia, Washington and Maryland. More are expected before lawmakers in other states wrap up this year's business. In the last Congress, CAUCE had been pushing for federal legislation to amend an existing junk fax law to also outlaw unsolicited junk e-mail. That bill, which was sponsored by Representative Chris Smith, a New Jersey Republican, made little headway. Instead, the Senate passed a proposal by Senators Robert Torricelli, a New Jersey Democrat, and Frank Murkowski, an Alaska Republican, that would have regulated junk e-mail by requiring that it be labeled as advertising and that senders provide an easy way for recipients to get off their mailing lists. Although that bill never made it through the House, the senators are expected to introduce a new version this year. The Murkowski-Torricelli bill has been favored by the Direct Marketing Association (DMA). But groups like CAUCE say it still fails to address the issue of cost. Internet service providers pay for the cost of processing millions of pieces of junk e-mail, and some Internet users must pay their ISP or phone company for the time they spend downloading spam. In a surprise announcement in December, CAUCE and the DMA said they had reached a tentative agreement on principles for new federal legislation. But Mozena said in a telephone interview last week that his optimism about finalizing that agreement was waning. ------------------------------ Date: Thu, 4 Feb 1999 11:26:01 -0500 (EST) From: Bill Subject: File 6--Jury awards $107 Million By Lauren Dodge Associated Press Writer PORTLAND, Ore. (AP) - "Wanted" posters and a Web site listing names and addresses of "baby butchers" amount to illegal threats, and the anti-abortion activists who created them must pay $107 million in damages, a federal jury says. "The jury saw the posters for what they are - a hit list for terriosts," said Gloria Feldt, president of Planned Parenthood, which joined several abortion doctors and a clinic in suing the activists. Yet within minutes of Tuesday's verdict, First Amendment experts said it went too far and defendants said they would appeal, calling it a threat to constitutionally protected political speech. "It's really just a statement from the court that says, 'Please shut up,'" said defendant Michael Bray. "It's an obscene assault upon the right to free speech. It says that when an abortionist cries out that he feels frightened by the speech of others, that the speakers should shut their mouths." The suit was filed under U.S. racketeering statute and a 1994 federal law that makes it illegal to incite violence against abortion doctors or their patients. Unlike previous cases brought under the 1994 law, this one did not involve any physical confrotations or explicit threats. Because of that, the anti-abortion activists contended that the Internet site and the posters were protected by the First Amendment. At issue was a Web site called "The Nuremberg Files" that lists hundreds of abortion doctors accused of committing "crimes against humanity" and invites readers to send in doctor's addresses, license plate numbers and even names of their children. When three doctors on the list were killed, their nmaes were shown crossed off. Wild West-style posters were handed out at rallies and in abortion doctors' neighborhoods, offering a $5,000 reward for information about a "Deadly Dozen" doctors. The plantiffs now want an injunction shutting down the Web site. "We have no intention of squelching free speech," said Dr. Elizabeth Newhall. "Free speech is not in jeopardy. Women and their providers are." ------------------------------ Date: Thu, 04 Feb 1999 02:59:15 -0600 From: Bennett Haselton Subject: File 7--Cyber Patrol controversy [sent to various reporters who have written about Peacefire or Internet censorship recently] Peacefire's "Cyber Patrol password decoder" is one of three top stories on C-Net's News.com this morning: "Net Filters Foiled Again" http://www.news.com/News/Item/0,4,31903,00.html The password decoder, CPCrack, can be run on any Windows machine to circumvent Cyber Patrol without the password. Cyber Patrol is an Internet blocking program with an estimated 9 million users, promoting a conservative view towards the damaging effects of sexuality, and used by schools and parents to restrict minors' access to political and religious viewpoints contrary to their own. Sites banned by Cyber Patrol have included pages about Judaism, feminism, animal rights, religious tolerance, and the Holocaust; Peacefire encourages Internet users to use tools such as CPCrack to gain access to all viewpoints and form their own opinions. Peacefire is an organization of about 3,500 members, mostly teenagers, advocating First Amendment rights for people under 18 on the Internet. Our Web site at http://www.peacefire.org/ contains exclusive information about sites blocked by censoring software; these reports has been used by the ACLU and People For the American Way in filing lawsuits against library censorship policies. Peacefire members have been interviewed about Internet censorship on NPR, MTV, Court TV, CNN Financial News and MSNBC. ------------------------------ Date: Wed, 10 Feb 1999 10:23:03 -0800 (PST) From: spicer@tcm.org (Dag Spicer) Subject: File 8--LECTURE: "Doing Computer History in Internet Time" The Computer Museum History Center presents: "Doing Computer History in Internet Time" Paul Ceruzzi Curator of Aerospace Electronics and Computing National Air and Space Museum Smithsonian Institution Tuesday, Februaury 16, 1999 5:30 p.m. NASA Main Auditorium Building N201 NASA Ames Research Center Mountain View, CA 94035 NOTE: YOU WILL NOT BE ADMITTED TO THIS TALK WITHOUT ADVANCE CONFIRMATION (By February 12) BECAUSE OF MOFFETT FIELD SECURITY CHANGES. A Computer Museum membership card is not valid with these security changes. See confirmation procedure below, at conclusion of this announcement. The Lecture: Historians like to let things settle a bit before doing history, but how is that possible when the subject of historical inquiry is computing, which seems to re-invent and redefine itself every few months? The author, a curator in the Space History Department of the National Air and Space Museum, will describe his recent attempt to write a comprehensive history of computing, from the dedication of the ENIAC in 1946 to the commercialization of the World Wide Web. When he began writing, the World Wide Web had not even been invented, yet by the time he submitted a manuscript to the publisher, Microsoft had announced Internet Explorer 4.0! Ceruzzi believes that one can now take a look back and tell a coherent story about computing in the last fifty years, even if tomorrows headlines threaten to turn it all into a preface to the real story. Ceruzzi's work at the Smithsonian includes research, writing, planning exhibits, collecting artifacts, and lecturing on the subjects of microelectronics, computing, and control as they apply to the practice of air and space flight. Dr. Ceruzzi is a graduate of Yale University and has a Ph.D. in American Studies from the University of Kansas. He has been a Fullbright Scholar, the receipient of a Charles Babbage Institute Research Fellowship, and a faculty member at Clemson University in South Carolina. He is the author or co-author of several books on the history of computing and related issues: "Reckoners: The Prehistory of The Digital Computer" (1983); "Beyond the Limits: Flight Enters the Computer Age" (1989); "Smithsonian Landmarks in the History of Digital Computing" (1994, with Peggy Kidwell); and "A History of Modern Computing" (1998). Copies of "A History of Modern Computing" and "Beyond the Limits" will be available at the talk for author signature and purchase. ------------------------------------------------------------------- Directions >From Highway 101 in Mountain View, take the Moffett Field exit (ignore any exits for Moffett Blvd.or Moffett Field South Gate). At the Moffett Field main gate, go to the Visitor Badging office on the right side of the gate. The lecture is in Building N-201. A map is available by visiting the website (URL below) or by fax by calling Ellen Lee at +1 650 604 2579. Confirmation Procedure You must confirm by February 15. Confirm by calling Ellen Lee at +1 650 604 2579, or by e-mailing chc@tcm.org, with your name, phone no., and country of citizenship: - if you are a US citizen, please state so, and bring a driver's license for photo id. - if you are not a US citizen, but have a green card, state your country of citizenship, and bring the green card. - and if you are not a US citizen, and do not have a green card, please e-mail chc@tcm.org with your name, country of origin, and citizenship, to get confirmation. If you are confirmed, you will need to bring your passport. Among other countries, citizens (without a green card) of China, India, Israel, South Africa and Taiwan require special processing for admittance to Moffett Field, and will not be able to attend this talk. For more information, including a map of NASA Ames and the venue for this talk, please visit http://www.computerhistory.org/ceruzzi Our 1999 Spring Lecture Schedule follows shortly! ------------------------------ Subject: File 9--Australia to trial "link crimes" Date: Thu, 11 Feb 1999 22:06:24 +1100 (EST) From: "Danny Yee" The "Publication for Adoption" version of the Code of Practice of IIA (Internet Industry Association, Australia) is available at: http://www.iia.net.au/Code4.html Among other things, this * prohibits linking to Illegal Content * prohibits "misleading" metatags * guarantees that email (specifically) will be "treated as private content", but says nothing about any OTHER communication systems (e.g. IRC, ICQ, web traffic) * has unacceptable administrative procedures (including no limits on the number of different "Relevant Authorities" empowered to make decisions about the Code. It also endorsed spamming, but they've promised to reconsider those sections after people made comments like "Australia is on the way to becoming the world's largest intranet". If you want to provide feedback on this code, contact details are at http://www.iia.net.au/contact.html ------------------------------ Date: Wed, 10 Feb 1999 10:46:07 -0600 From: Bennett Haselton Subject: File 10--Computers, Freedom and Privacy '99 If you're going to be attending Computers, Freedom and Privacy '99, Peacefire has been invited to give a presentation on "Technology for Circumventing Internet Censorship". We'll be talking about the use of tools like the Anonymizer and the Anti-Censorship Proxy (http://ians.978.org) to circumvent different forms of Internet censorship, including restrictions imposed at the national level by firewalls used by the governments of China and the U.A.E. CFP99 is going to take place from April 5-8 in Washington, D.C. Our presentation will be from 8:00-10:30 a.m. on April 6. Please let me know if you or someone in your news office might be there, and we'll connect at the conference. Thanks! ------------------------------ Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST) From: Stanton McCandlish Subject: File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures Source: EFFector 12.01: EFF & Other Groups Oppose New Measures to Undermine Freedom of Information FOR IMMEDIATE RELEASE February 10, 1999 Groups Supporting Openness Oppose Limits on Access to Public Information Letter Adds Voices to Environmentalists' Outcry on Restrictions to the Public Right-to-Know WASHINGTON - February 10, 1999 - Yesterday, a group of civil liberties, academic, journalist and public interest organizations sent a letter to Representative Thomas Bliley, Chairman of the House Commerce Committee, expressing concern over proposals to limit the availability of public information about the potential for accidents at chemical plants (EPA's unclassified Worst Case Scenarios data) on the Internet. The text of this letter is available at: http://www.eff.org/pub/Activism/FOIA/HTML/19990210_bliley_letter.html This information has been readily available through the Freedom of Information Act (FOIA) providing citizens with critical insight to assess and improve the safety of their communities. As part of the Clean Air Act, the information was to be made more readily accessible. Under pressure from the FBI, Chairman Bliley and the chemical industry, the EPA has stepped back from its initial proposal to provide public access to the data through the agency's Web site. New proposals would limit the basic access to this public information. "Rather than taking advantage of the Internet's democratic potential to allow citizens the ability to access public information," Ari Schwartz, Policy Analyst at the Center for Democracy and Technology, said "these proposals view the Internet and its power to distribute information as a threat." The letter, signed by the American Association of Law Libraries, the American Civil Liberties Union, Association of Newspaper Editors, Center for Democracy and Technology, Electronic Frontier Foundation and OMB Watch, urged the Chairman not to retreat from the substantial gains made in ensuring that citizens have access to public information to monitor their government and its activities through the FOIA. Recent amendments to FOIA, EFOIA, encouraged and promulgated the use of communications technology to spread public information ensuring greater openness. "The United States is a democracy, and the Freedom of Information Act plays an essential role in guaranteeing that citizens gain access to information that empowers us to make educated choices, " Shari Steele, Director of Legal Services at the Electronic Frontier Foundation, explained. "Proposals like this one undermine the very core of our society and are a threat to the exercise of true liberty." The groups' letter asked Bliley for more comprehensive hearings on the subject to include members of all interested communities. A legislative proposal is expected in the coming weeks. "This is just the beginning of a battle to protect the ability to access public information on the Internet," Schwartz said. For More Information * EFF's Freedom of Information & Open Government Archive: http://www.eff.org/pub/Activism/FOIA ------------------------------ Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST) From: Stanton McCandlish Subject: File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS: THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS: CALL FOR NOMINATIONS *Please free to redistribute this notice in appropriate forums.* In every field of human endeavor,there are those dedicated to expanding knowledge, freedom, efficiency and utility. Along the electronic frontier, this is especially true. To recognize this, the Electronic Frontier Foundation established the Pioneer Awards for deserving individuals and organizations. The Pioneer Awards are international and nominations are open to all. The deadline for nominations this year is March 10, 1999. Nominations must be sent to pioneer@eff.org. In March of 1992, the first EFF Pioneer Awards were given in Washington D.C. The winners were: Douglas C. Engelbart, Robert Kahn, Jim Warren, Tom Jennings, and Andrzej Smereczynski. The 1993 Pioneer Award recipients were Paul Baran, Vinton Cerf, Ward Christensen, Dave Hughes and the USENET software developers, represented by the software's originators Tom Truscott and Jim Ellis. The 1994 Pioneer Award winners were Ivan Sutherland, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr Roxanne Hiltz, Lee Felsenstein, Bill Atkinson, and the WELL. The 1995 Pioneer Award winners were Philip Zimmermann, Anita Borg, and Willis Ware. The 1996 Pioneer Award winners were Robert Metcalfe, Peter Neumann, Shabbir Safdar and Matthew Blaze. The 1997 winners were Marc Rotenberg, Johan "Julf" Helsingius, and (special honorees) Hedy Lamarr and George Antheil. The 1998 winners were Richard Stallman, Linus Torvalds, and Barbara Simons. The 8th Annual Pioneer Awards will be given in Washington, D.C., at the 9th Conference on Computers, Freedom, and Privacy in April of 1999. All nominations will be reviewed by a panel of judges chosen for their knowledge of computer-based communications and the technical, legal, and social issues involved in computer technology and computer communications. This year's judges are Mike Godwin, Bruce Koball, Hal Abelson, Lorrie Cranor, Phil Agre, and Simona Nass. There are no specific categories for the Pioneer Awards, but the following guidelines apply: 1. The nominees must have made a substantial contribution to the health, growth, accessibility, or freedom of computer-based communications. 2. The contribution may be technical, social, economic or cultural. 3. Nominations may be of individuals, systems, or organizations in the private or public sectors. 4. Nominations are open to all, and you may nominate more than one recipient. You may nominate yourself or your organization. 5. All nominations, to be valid, must contain your reasons, however brief, for nominating the individual or organization, along with a means of contacting the nominee, and your own contact number. Anonymous nominations will be allowed, but we prefer to be able to contact the nominating parties in the event that we need more information.. 6. Every person or organization, with the single exception of EFF staff members, are eligible for Pioneer Awards. 7. Persons or representatives of organizations receiving a Pioneer Award will be invited to attend the ceremony at the Foundation's expense. You may nominate as many as you wish, but please use one form per nomination. You may return the forms to us via email to: pioneer@eff.org Just tell us the name of the nominee, the phone number or email address at which the nominee can be reached, and, most important, why you feel the nominee deserves the award. You may attach supporting documentation in Microsoft Word or other standard binary formats. Please include your own name, address, phone number, and e-mail address. We're looking for the Pioneers of the Electronic Frontier that have made and are making a difference. Thanks for helping us find them, The Electronic Frontier Foundation ------------------------------ Date: Sun, 10 Jan 1999 22:51:01 CST From: CuD Moderators Subject: File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send post with this in the "Subject:: line: SUBSCRIBE CU-DIGEST Send the message to: cu-digest-request@weber.ucsd.edu DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS. The editors may be contacted by voice (815-753-6436), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CU-DIGEST Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU (NOTE: The address you unsub must correspond to your From: line) CuD is readily accessible from the Net: UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD Web-accessible from: http://www.etext.org/CuD/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom) The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #11.09 ************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu