Computer underground Digest Sun Feb 14 1999 Volume 11 : Issue 09

Computer underground Digest    Sun  14 Feb, 1999   Volume 11 : Issue 09
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Poof Reader:   Etaion Shrdlu, Jr.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #11.09 (Sun, 14 Feb, 1999)

File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act
File 2--Spurned LA Man charged with Internet Stalking
File 3--Court upholds law banning Internet porn in the office
File 4--Israeli Teens Charged with Hacking into US Systems
File 5--More States Consider Laws Restricting Junk E-Mail
File 6--Jury awards $107 Million
File 7--Cyber Patrol controversy
File 8--LECTURE: "Doing Computer History in Internet Time"
File 9--Australia to trial "link crimes"
File 10--Computers, Freedom and Privacy '99
File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures
File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Sun, 14 Feb 1999 17:45:43 -0500
From: Robert A. Costner 
Subject: File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act

Source -  fight-censorship@vorlon.mit.edu

I'd appreciate some comments on this bill.  If you will give me "official"
comments, I'll add them to a web page linked to the bill commentary at
http://www.efga.org/leg/

Comments from all sides are welcome.

 1  To amend Part 2 of Article 3 of Chapter 12 of Title 16 of
 2  the Official Code of Georgia Annotated, relating to offenses
 3  related to minors generally, so as to define the crime of
 4  computer pornography; to provide a short title; to define a
 5  certain term; to make it unlawful for any person knowingly
 6  to utilize a computer on-line service, Internet service, or
 7  local bulletin board service to seduce, solicit, lure, or
 8  entice, or attempt to seduce, solicit, lure, or entice a
 9  child or another person believed by such person to be a
10  child, to commit certain illegal acts; to make it unlawful
11  for any owner or operator of a computer on-line service,
12  Internet service, or local bulletin board service knowingly
13  to permit a subscriber to utilize the service to commit a
14  violation of this Act; to provide that the fact that an
15  undercover operative or law enforcement officer was involved
16  in the detection and investigation of an offense under this
17  Act shall not constitute a defense to prosecution under this
18  Act; to provide that a person is subject to prosecution in
19  this state pursuant to Code Section 17-2-1 for any conduct
20  made unlawful by this Act which the person engages in while
21  either within or outside of this state if, by such conduct,
22  the person commits a violation of this Act which involves a
23  child who resides in this state or another person believed
24  by such person to be a child residing in this state; to
25  provide that, for the purposes of this Act, conduct which is
26  criminal only because of the age of the victim shall not be
27  considered a criminal offense if the perpetrator is 18 years
28  of age or younger; to provide that any violation of this Act
29  shall constitute a separate offense; to provide penalties;
30  to repeal conflicting laws; and for other purposes.

31       BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:

32                           SECTION 1.

33  Part 2 of Article 3 of Chapter 12 of Title 16 of the
34  Official Code of Georgia Annotated, relating to offenses
35  related to minors generally, is amended by adding following

 1  Code Section 16-12-100.1 a new Code Section 16-12-100.2 to
 2  read as follows:

 3    "16-12-100.2.

 4    (a) This Code section shall be known and may be cited as
 5    the 'Computer Pornography and Child Exploitation
 6    Prevention Act of 1999.'

 7    (b) As used in this Code section, the term 'child' means
 8    any person under the age of 16 years.

 9      (c)(1) A person commits the offense of computer
10      pornography if such person knowingly:

11        (A) Compiles, enters into, or transmits by means of
12        computer;

13        (B) Makes, prints, publishes, or reproduces by other
14        computerized means;

15        (C) Causes or allows to be entered into or transmitted
16        by means of computer; or

17        (D) Buys, sells, receives, exchanges, or disseminates

18      any notice, statement, or advertisement, or any child's
19      name, telephone number, place of residence, physical
20      characteristics, or other descriptive or identifying
21      information for the purpose of facilitating,
22      encouraging, offering, or soliciting sexual conduct of
23      or with any child or the visual depiction of such
24      conduct.

25      (2) Any person convicted of violating paragraph (1) of
26      this subsection shall be punished by a fine of not more
27      than $10,000.00 or by imprisonment for not less than one
28      nor more than 20 years, or both.

29      (c)(1) It shall be unlawful for any person knowingly to
30      utilize a computer on-line service, Internet service, or
31      local bulletin board service to seduce, solicit, lure,
32      or entice, or attempt to seduce, solicit, lure, or
33      entice a child or another person believed by such person
34      to be a child, to commit any illegal act described in
35      Code Section 16-6-2, relating to the offense of sodomy
36      or aggravated sodomy; Code Section 16-6-4, relating to
37      the offense of child molestation or aggravated child
38      molestation; Code Section 16-6-5, relating to the
39      offense of enticing a child for indecent purposes; or
40      Code Section 16-6-8, relating to the offense of public

 1      indecency; or to engage in any conduct that by its
 2      nature is an unlawful sexual offense against a child.

 3      (2) Any person who violates paragraph (1) of this
 4      subsection shall be guilty of a misdemeanor of a high
 5      and aggravated nature.

 6      (d)(1) It shall be unlawful for any owner or operator of
 7      a computer on-line service, Internet service, or local
 8      bulletin board service knowingly to permit a subscriber
 9      to utilize the service to commit a violation of this
10      Code section.

11      (2) Any person who violates paragraph (1) of this
12      subsection shall be guilty of a misdemeanor of a high
13      and aggravated nature.

14    (e) The fact that an undercover operative or law
15    enforcement officer was involved in the detection and
16    investigation of an offense under this Code section shall
17    not constitute a defense to prosecution under this Code
18    section.

19    (f) A person is subject to prosecution in this state
20    pursuant to Code Section 17-2-1, relating to jurisdiction
21    over crimes and persons charged with commission of crimes
22    generally, for any conduct made unlawful by this Code
23    section which the person engages in while either within or
24    outside of this state if, by such conduct, the person
25    commits a violation of this Code section which involves a
26    child who resides in this state or another person believed
27    by such person to be a child residing in this state.

28    (g) For the purposes of this Code section, conduct which
29    is criminal only because of the age of the victim shall
30    not be considered a criminal offense if the perpetrator is
31    18 years of age or younger.

32    (h) Any violation of this Code section shall constitute a
33    separate offense."

  -- Robert Costner                  Phone: (770) 402-3580
     Electronic Frontiers Georgia    mailto:pooh@efga.org
     http://www.efga.org/            run PGP 5.0 for my public key

------------------------------

Date: Sun, 7 Feb 1999 15:55:35 -0600 (CST)
From: Jim Thomas 
Subject: File 2--Spurned LA Man charged with Internet Stalking

Spurned L.A. Man Charged With Internet Stalking/Explicit,
inviting e-mail was sent in woman's name to various men

Source: San Francisco Chronicle, Saturday, January 23, 1999
http://www.sfgate.com/www.sfgate.com

    In the first prosecution under a new California
cyber-stalking statute, a man has been charged with using the
Internet in an attempt to arrange the rape of a woman who had
spurned his romantic advances.

   The case centers on the chilling account of a North Hollywood
woman. According to testimony, six different men showed up at her
apartment over a five-month period last year, saying they were
responding to online ads and steamy e-mails sent in her name that
described fantasies of being raped.

   Authorities said Thursday that these were not her ads, her
e-mails or her fantasies, and that she was the victim of Gary S.
Dellapenta, a 50-year-old security guard from North Hollywood who
earlier this week was ordered to stand trial on charges of
stalking, computer fraud and solicitation of sexual assault.



   "This technology has created a whole new class of criminals
who would not otherwise have the forbearance to terrorize people
face to face," said Assistant U.S. Attorney Michael J. Gennaco,
who two years ago prosecuted the first federal hate crime in
cyberspace.  "It emboldens them to hide behind computer screens
and interfere with other people's lives."



 The e-mails said the woman was ``into rape fantasy'' and
multiple partners, authorities said, and told numerous men
everything from the address of her apartment to her physical
description, her phone number and how to bypass her home security
system.



   "Carol Chase, a professor at Pepperdine University School of
Law, said messages like the kind Dellapenta allegedly posted are
not that different from spiteful remarks that scorned suitors
used to post on bathroom walls."

     "But by placing this information on an Internet site, you
can reach millions of people," Chase said. "There is a greater
likelihood that the harm you intend will be visited upon a
victim."

------------------------------

Date: Thu, 11 Feb 1999 06:20:01 -0800
From: Jim Galasyn 
Subject: File 3--Court upholds law banning Internet porn in the office

Court upholds law banning Internet porn in the office
February 11, 1999
Web posted at: 7:52 AM EST (1252 GMT)


RICHMOND, Virginia (AP) -- A federal appeals court has upheld a
Virginia law that prohibits state employees from looking at
sexually explicit material via the Internet while at work.

The 4th U.S. Circuit Court of Appeals ruled on Wednesday that the
law does not infringe state employees' freedom of expression.

Six professors at public colleges challenged the law, arguing it
would impede their ability to conduct legitimate research.

But the 4th Circuit agreed with lawyers for the state who argued
that the government has a right to supervise on-the-job
activities of its employees.



------------------------------

Date: Thu, 11 Feb 1999 11:44:00 -0600 (CST)
From: Jim Thomas 
Subject: File 4--Israeli Teens Charged with Hacking into US Systems

The Chicago Tribune (Feb 10, '99: p 19) reported that a teenager and
four accomplices who allegedly hacked into the computer systems
of the Pentagon and NASA were indicted in Israel.

     "Ehud Tenenbaum, 18, and four others were charged with
   illegal entry into computers in the U.S. and
   Israel, including academic institutions and the Knesset."

The story notes that their activities were discovered last year
when two California youths were caught hacking into Pentagon
computers and told  authorities they had been trained by Tenebaum.

------------------------------

From: jthomas@sun.soci.niu.edu
Date: Thu, 11 Feb 1999 10:30:46 EST
Subject: File 5--More States Consider Laws Restricting Junk E-Mail

Source: The New York Times, February 11 (1999)
More States Consider Laws Restricting Junk E-Mail

 By JERI CLAUSING

  As lawmakers around the country discover that their
constituents are concerned about Internet issues, bills to
regulate or outlaw junk e-mail are popping up in state
legislatures. Three laws restricting junk e-mail are already on
the books, and lawmakers are considering four more.

   Advocates of the laws say they are encouraged by the new
interest state lawmakers are taking in protecting consumers and
Internet service providers from the scourge of junk e-mail,
dubbed "spam" by annoyed recipients. However, they are also
concerned that a patchwork of different laws across the country
could hamper legitimate online marketing.



  Legislators adjourning for their 1999 sessions have introduced
proposed spam laws in Texas, Virginia, Washington and Maryland.
More are expected before lawmakers in other states wrap up this
year's business.

  In the last Congress, CAUCE had been pushing for federal
legislation to amend an existing junk fax law to also outlaw
unsolicited junk e-mail. That bill, which was sponsored by
Representative Chris Smith, a New Jersey Republican, made little
headway. Instead, the Senate passed a proposal by Senators Robert
Torricelli, a New Jersey Democrat, and Frank Murkowski, an Alaska
Republican, that would have regulated junk e-mail by requiring
that it be labeled as advertising and that senders provide an
easy way for recipients to get off their mailing lists. Although
that bill never made it through the House, the senators are
expected to introduce a new version this year.

  The Murkowski-Torricelli bill has been favored by the Direct
Marketing Association (DMA). But groups like CAUCE say it still
fails to address the issue of cost. Internet service providers
pay for the cost of processing millions of pieces of junk e-mail,
and some Internet users must pay their ISP or phone company for
the time they spend downloading spam.

  In a surprise announcement in December, CAUCE and the DMA said
they had reached a tentative agreement on principles for new
federal legislation. But Mozena said in a telephone interview
last week that his optimism about finalizing that agreement was
waning.



------------------------------

Date: Thu, 4 Feb 1999 11:26:01 -0500 (EST)
From: Bill 
Subject: File 6--Jury awards $107 Million

By Lauren Dodge
Associated Press Writer

PORTLAND, Ore. (AP) - "Wanted" posters and a Web site listing names and
addresses of "baby butchers" amount to illegal threats, and the
anti-abortion activists who created them must pay $107 million in
damages, a federal jury says.
     "The jury saw the posters for what they are - a hit list for
terriosts," said Gloria Feldt, president of Planned Parenthood, which
joined several abortion doctors and a clinic in suing the activists.
     Yet within minutes of Tuesday's verdict, First Amendment experts
said it went too far and defendants said they would appeal, calling it a
threat to constitutionally protected political speech.
     "It's really just a statement from the court that says, 'Please
shut up,'" said defendant Michael Bray.  "It's an obscene assault upon
the right to free speech.  It says that when an abortionist cries out
that he feels frightened by the speech of others, that the speakers
should shut their mouths."
     The suit was filed under U.S. racketeering statute and a 1994
federal law that makes it illegal to incite violence against abortion
doctors or their patients.
     Unlike previous cases brought under the 1994 law, this one did not
involve any physical confrotations or explicit threats.  Because of
that, the anti-abortion activists contended that the Internet site and
the posters were protected by the First Amendment.
     At issue was a Web site called "The Nuremberg Files"  that lists
hundreds of abortion doctors accused of committing "crimes against
humanity" and invites readers to send in doctor's addresses, license
plate numbers and even names of their children.  When three doctors on
the list were killed, their nmaes were shown crossed off.
     Wild West-style posters were handed out at rallies and in abortion
doctors' neighborhoods, offering a $5,000 reward for information about a
"Deadly Dozen" doctors.
     The plantiffs now want an injunction shutting down the Web site.
     "We have no intention of squelching free speech," said Dr.
Elizabeth Newhall.  "Free speech is not in jeopardy.  Women and their
providers are."



------------------------------

Date: Thu, 04 Feb 1999 02:59:15 -0600
From: Bennett Haselton 
Subject: File 7--Cyber Patrol controversy

[sent to various reporters who have written about Peacefire or
Internet censorship recently]

Peacefire's "Cyber Patrol password decoder" is one of three top
stories on C-Net's News.com this morning:

	"Net Filters Foiled Again"
	http://www.news.com/News/Item/0,4,31903,00.html

The password decoder, CPCrack, can be run on any Windows machine
to circumvent Cyber Patrol without the password.  Cyber Patrol is
an Internet blocking program with an estimated 9 million users,
promoting a conservative view towards the damaging effects of
sexuality, and used by schools and parents to restrict minors'
access to political and religious viewpoints contrary to their
own.  Sites banned by Cyber Patrol have included pages about
Judaism, feminism, animal rights, religious tolerance, and the
Holocaust; Peacefire encourages Internet users to use tools such
as CPCrack to gain access to all viewpoints and form their own
opinions.

Peacefire is an organization of about 3,500 members, mostly
teenagers, advocating First Amendment rights for people under 18
on the Internet.  Our Web site at http://www.peacefire.org/
contains exclusive information about sites blocked by censoring
software; these reports has been used by the ACLU and People For
the American Way in filing lawsuits against library censorship
policies.  Peacefire members have been interviewed about Internet
censorship on NPR, MTV, Court TV, CNN Financial News and MSNBC.

------------------------------

Date: Wed, 10 Feb 1999 10:23:03 -0800 (PST)
From: spicer@tcm.org (Dag Spicer)
Subject: File 8--LECTURE: "Doing Computer History in Internet Time"

The Computer Museum History Center presents:

"Doing Computer History in Internet Time"


Paul Ceruzzi
Curator of Aerospace Electronics and Computing
National Air and Space Museum
Smithsonian Institution

Tuesday, Februaury 16, 1999
5:30 p.m.

NASA Main Auditorium
Building N201
NASA Ames Research Center
Mountain View, CA  94035



NOTE: YOU WILL NOT BE ADMITTED TO THIS TALK WITHOUT ADVANCE CONFIRMATION
(By February 12) BECAUSE OF MOFFETT FIELD SECURITY CHANGES.  A Computer
Museum membership card is not valid with these security changes.  See
confirmation procedure below, at conclusion of this announcement.


The Lecture:
Historians like to let things settle a bit before doing history, but how
is that possible when the subject of historical inquiry is computing,
which seems to re-invent and redefine itself every few months? The
author, a curator in the Space History Department of the National Air
and Space Museum, will describe his recent attempt to write a
comprehensive history of computing, from the dedication of the ENIAC in
1946 to the commercialization of the World Wide Web. When he began
writing, the World Wide Web had not even been invented, yet by the time
he submitted a manuscript to the publisher, Microsoft had announced
Internet Explorer 4.0!

Ceruzzi believes that one can now take a look back and tell a coherent
story about computing in the last fifty years, even if tomorrows
headlines threaten to turn it all into a preface to the real story.
Ceruzzi's work at the Smithsonian includes research, writing, planning
exhibits, collecting artifacts, and lecturing on the subjects of
microelectronics, computing, and control as they apply to the practice
of air and space flight.

Dr. Ceruzzi is a graduate of Yale University and has a Ph.D. in American
Studies from the University of Kansas. He has been a Fullbright Scholar,
the receipient of a Charles Babbage Institute Research Fellowship, and a
faculty member at Clemson University in South Carolina. He is the author
or co-author of several books on the history of computing and related
issues: "Reckoners: The Prehistory of The Digital Computer" (1983);
"Beyond the Limits: Flight Enters the Computer Age" (1989); "Smithsonian
Landmarks in the History of Digital Computing" (1994, with Peggy
Kidwell); and "A History of Modern Computing" (1998).

Copies of "A History of Modern Computing" and "Beyond the Limits" will
be available at the talk for author signature and purchase.


 -------------------------------------------------------------------

                             Directions

>From Highway 101 in Mountain View, take the Moffett Field exit
(ignore any exits for Moffett Blvd.or Moffett Field South Gate).
At the Moffett Field main gate, go to the Visitor Badging office
on the right side of the gate.  The lecture is in Building N-201.
A map is available by visiting the website (URL below) or by fax
by calling Ellen Lee at +1 650 604 2579.


                       Confirmation Procedure

You must confirm by February 15.  Confirm by calling Ellen Lee at
+1 650 604 2579, or by e-mailing chc@tcm.org, with your name,
phone no., and country of citizenship:

 - if you are a US citizen, please state so, and bring a driver's
license for photo id.

 - if you are not a US citizen, but have a green card, state your
country of citizenship, and bring the green card.

 - and if you are not a US citizen, and do not have a green card,
please e-mail chc@tcm.org with your name, country of origin, and
citizenship, to get confirmation. If you are confirmed, you will
need to bring your passport. Among other countries, citizens
(without a green card) of China, India, Israel, South Africa and
Taiwan require special processing for admittance to Moffett
Field, and will not be able to attend this talk.

For more information, including a map of NASA Ames and the venue
for this talk, please visit
http://www.computerhistory.org/ceruzzi

Our 1999 Spring Lecture Schedule follows shortly!

------------------------------

Subject: File 9--Australia to trial "link crimes"
Date: Thu, 11 Feb 1999 22:06:24 +1100 (EST)
From: "Danny Yee" 

The "Publication for Adoption" version of the Code of Practice of IIA
(Internet Industry Association, Australia) is available at:

http://www.iia.net.au/Code4.html

Among other things, this

* prohibits linking to Illegal Content

* prohibits "misleading" metatags

* guarantees that email (specifically) will be "treated as private
  content", but says nothing about any OTHER communication systems
  (e.g. IRC, ICQ, web traffic)

* has unacceptable administrative procedures (including no limits on
  the number of different "Relevant Authorities" empowered to make
  decisions about the Code.

It also endorsed spamming, but they've promised to reconsider those
sections after people made comments like "Australia is on the way to
becoming the world's largest intranet".  If you want to provide feedback
on this code, contact details are at
      http://www.iia.net.au/contact.html

------------------------------

Date: Wed, 10 Feb 1999 10:46:07 -0600
From: Bennett Haselton 
Subject: File 10--Computers, Freedom and Privacy '99

If you're going to be attending Computers, Freedom and Privacy '99,
Peacefire has been invited to give a presentation on "Technology for
Circumventing Internet Censorship".  We'll be talking about the use of
tools like the Anonymizer and the Anti-Censorship Proxy
(http://ians.978.org) to circumvent different forms of Internet censorship,
including restrictions imposed at the national level by firewalls used by
the governments of China and the U.A.E.

CFP99 is going to take place from April 5-8 in Washington, D.C.  Our
presentation will be from 8:00-10:30 a.m. on April 6.

Please let me know if you or someone in your news office might be there,
and we'll connect at the conference.  Thanks!

------------------------------

Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST)
From: Stanton McCandlish 
Subject: File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures

Source: EFFector 12.01:


  EFF & Other Groups Oppose New Measures to Undermine Freedom of
Information

      FOR IMMEDIATE RELEASE February 10, 1999

Groups Supporting Openness Oppose Limits on Access to Public
Information

  Letter Adds Voices to Environmentalists' Outcry on Restrictions
  to the Public Right-to-Know

   WASHINGTON - February 10, 1999 - Yesterday, a group of civil
   liberties, academic, journalist and public interest
   organizations sent a letter to Representative Thomas Bliley,
   Chairman of the House Commerce Committee, expressing concern
   over proposals to limit the availability of public information
   about the potential for accidents at chemical plants (EPA's
   unclassified Worst Case Scenarios data) on the Internet. The
   text of this letter is available at:
   http://www.eff.org/pub/Activism/FOIA/HTML/19990210_bliley_letter.html

   This information has been readily available through the
   Freedom of Information Act (FOIA) providing citizens with
   critical insight to assess and improve the safety of their
   communities. As part of the Clean Air Act, the information was
   to be made more readily accessible.  Under pressure from the
   FBI, Chairman Bliley and the chemical industry, the EPA has
   stepped back from its initial proposal to provide public
   access to the data through the agency's Web site. New
   proposals would limit the basic access to this public
   information.  "Rather than taking advantage of the Internet's
   democratic potential to allow citizens the ability to access
   public information," Ari Schwartz, Policy Analyst at the
   Center for Democracy and Technology, said "these proposals
   view the Internet and its power to distribute information as a
   threat."

   The letter, signed by the American Association of Law
   Libraries, the American Civil Liberties Union, Association of
   Newspaper Editors, Center for Democracy and Technology,
   Electronic Frontier Foundation and OMB Watch, urged the
   Chairman not to retreat from the substantial gains made in
   ensuring that citizens have access to public information to
   monitor their government and its activities through the FOIA.
   Recent amendments to FOIA, EFOIA, encouraged and promulgated
   the use of communications technology to spread public
   information ensuring greater openness. "The United States is a
   democracy, and the Freedom of Information Act plays an
   essential role in guaranteeing that citizens gain access to
   information that empowers us to make educated choices, " Shari
   Steele, Director of Legal Services at the Electronic Frontier
   Foundation, explained. "Proposals like this one undermine the
   very core of our society and are a threat to the exercise of
   true liberty."

   The groups' letter asked Bliley for more comprehensive
   hearings on the subject to include members of all interested
   communities. A legislative proposal is expected in the coming
   weeks. "This is just the beginning of a battle to protect the
   ability to access public information on the Internet,"
   Schwartz said.

For More Information

     * EFF's Freedom of Information & Open Government Archive:
       http://www.eff.org/pub/Activism/FOIA

------------------------------

Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST)
From: Stanton McCandlish 
Subject: File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:

              THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:

CALL FOR NOMINATIONS

   *Please free to redistribute this notice in appropriate forums.*

   In every field of human endeavor,there are those dedicated to
   expanding knowledge, freedom, efficiency and utility. Along the
   electronic frontier, this is especially true. To recognize this, the
   Electronic Frontier Foundation established the Pioneer Awards for
   deserving individuals and organizations.

   The Pioneer Awards are international and nominations are open to all.
   The deadline for nominations this year is March 10, 1999. Nominations
   must be sent to pioneer@eff.org.

   In March of 1992, the first EFF Pioneer Awards were given in
   Washington D.C. The winners were: Douglas C. Engelbart, Robert Kahn,
   Jim Warren, Tom Jennings, and Andrzej Smereczynski. The 1993 Pioneer
   Award recipients were Paul Baran, Vinton Cerf, Ward Christensen, Dave
   Hughes and the USENET software developers, represented by the
   software's originators Tom Truscott and Jim Ellis. The 1994 Pioneer
   Award winners were Ivan Sutherland, Whitfield Diffie and Martin
   Hellman, Murray Turoff and Starr Roxanne Hiltz, Lee Felsenstein, Bill
   Atkinson, and the WELL. The 1995 Pioneer Award winners were Philip
   Zimmermann, Anita Borg, and Willis Ware. The 1996 Pioneer Award
   winners were Robert Metcalfe, Peter Neumann, Shabbir Safdar and
   Matthew Blaze. The 1997 winners were Marc Rotenberg, Johan "Julf"
   Helsingius, and (special honorees) Hedy Lamarr and George Antheil. The
   1998 winners were Richard Stallman, Linus Torvalds, and Barbara
   Simons.

   The 8th Annual Pioneer Awards will be given in Washington, D.C., at
   the 9th Conference on Computers, Freedom, and Privacy in April of
   1999.

   All nominations will be reviewed by a panel of judges chosen for their
   knowledge of computer-based communications and the technical, legal,
   and social issues involved in computer technology and computer
   communications.

   This year's judges are Mike Godwin, Bruce Koball, Hal Abelson, Lorrie
   Cranor, Phil Agre, and Simona Nass.

   There are no specific categories for the Pioneer Awards, but the
   following guidelines apply:

    1. The nominees must have made a substantial contribution to the
       health, growth, accessibility, or freedom of computer-based
       communications.
    2. The contribution may be technical, social, economic or cultural.
    3. Nominations may be of individuals, systems, or organizations in
       the private or public sectors.
    4. Nominations are open to all, and you may nominate more than one
       recipient. You may nominate yourself or your organization.
    5. All nominations, to be valid, must contain your reasons, however
       brief, for nominating the individual or organization, along with a
       means of contacting the nominee, and your own contact number.
       Anonymous nominations will be allowed, but we prefer to be able to
       contact the nominating parties in the event that we need more
       information..
    6. Every person or organization, with the single exception of EFF
       staff members, are eligible for Pioneer Awards.
    7. Persons or representatives of organizations receiving a Pioneer
       Award will be invited to attend the ceremony at the Foundation's
       expense.

   You may nominate as many as you wish, but please use one form per
   nomination. You may return the forms to us via email to:
   pioneer@eff.org

   Just tell us the name of the nominee, the phone number or email
   address at which the nominee can be reached, and, most important, why
   you feel the nominee deserves the award. You may attach supporting
   documentation in Microsoft Word or other standard binary formats.
   Please include your own name, address, phone number, and e-mail
   address.

   We're looking for the Pioneers of the Electronic Frontier that have
   made and are making a difference. Thanks for helping us find them,

     The Electronic Frontier Foundation

------------------------------

Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators 
Subject: File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

CuD is readily accessible from the Net:
  UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
    Web-accessible from: http://www.etext.org/CuD/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #11.09
************************************

<--">Return to the Cu Digest homepage

Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu