Computer underground Digest Sun 14 Feb, 1999 Volume 11 : Issue 09
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Poof Reader: Etaion Shrdlu, Jr.
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #11.09 (Sun, 14 Feb, 1999)
File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act
File 2--Spurned LA Man charged with Internet Stalking
File 3--Court upholds law banning Internet porn in the office
File 4--Israeli Teens Charged with Hacking into US Systems
File 5--More States Consider Laws Restricting Junk E-Mail
File 6--Jury awards $107 Million
File 7--Cyber Patrol controversy
File 8--LECTURE: "Doing Computer History in Internet Time"
File 9--Australia to trial "link crimes"
File 10--Computers, Freedom and Privacy '99
File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures
File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sun, 14 Feb 1999 17:45:43 -0500
From: Robert A. Costner
Subject: File 1--GA HB213 Computer Porn & Child Exploitation Prevention Act
Source - fight-censorship@vorlon.mit.edu
I'd appreciate some comments on this bill. If you will give me "official"
comments, I'll add them to a web page linked to the bill commentary at
http://www.efga.org/leg/
Comments from all sides are welcome.
1 To amend Part 2 of Article 3 of Chapter 12 of Title 16 of
2 the Official Code of Georgia Annotated, relating to offenses
3 related to minors generally, so as to define the crime of
4 computer pornography; to provide a short title; to define a
5 certain term; to make it unlawful for any person knowingly
6 to utilize a computer on-line service, Internet service, or
7 local bulletin board service to seduce, solicit, lure, or
8 entice, or attempt to seduce, solicit, lure, or entice a
9 child or another person believed by such person to be a
10 child, to commit certain illegal acts; to make it unlawful
11 for any owner or operator of a computer on-line service,
12 Internet service, or local bulletin board service knowingly
13 to permit a subscriber to utilize the service to commit a
14 violation of this Act; to provide that the fact that an
15 undercover operative or law enforcement officer was involved
16 in the detection and investigation of an offense under this
17 Act shall not constitute a defense to prosecution under this
18 Act; to provide that a person is subject to prosecution in
19 this state pursuant to Code Section 17-2-1 for any conduct
20 made unlawful by this Act which the person engages in while
21 either within or outside of this state if, by such conduct,
22 the person commits a violation of this Act which involves a
23 child who resides in this state or another person believed
24 by such person to be a child residing in this state; to
25 provide that, for the purposes of this Act, conduct which is
26 criminal only because of the age of the victim shall not be
27 considered a criminal offense if the perpetrator is 18 years
28 of age or younger; to provide that any violation of this Act
29 shall constitute a separate offense; to provide penalties;
30 to repeal conflicting laws; and for other purposes.
31 BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:
32 SECTION 1.
33 Part 2 of Article 3 of Chapter 12 of Title 16 of the
34 Official Code of Georgia Annotated, relating to offenses
35 related to minors generally, is amended by adding following
1 Code Section 16-12-100.1 a new Code Section 16-12-100.2 to
2 read as follows:
3 "16-12-100.2.
4 (a) This Code section shall be known and may be cited as
5 the 'Computer Pornography and Child Exploitation
6 Prevention Act of 1999.'
7 (b) As used in this Code section, the term 'child' means
8 any person under the age of 16 years.
9 (c)(1) A person commits the offense of computer
10 pornography if such person knowingly:
11 (A) Compiles, enters into, or transmits by means of
12 computer;
13 (B) Makes, prints, publishes, or reproduces by other
14 computerized means;
15 (C) Causes or allows to be entered into or transmitted
16 by means of computer; or
17 (D) Buys, sells, receives, exchanges, or disseminates
18 any notice, statement, or advertisement, or any child's
19 name, telephone number, place of residence, physical
20 characteristics, or other descriptive or identifying
21 information for the purpose of facilitating,
22 encouraging, offering, or soliciting sexual conduct of
23 or with any child or the visual depiction of such
24 conduct.
25 (2) Any person convicted of violating paragraph (1) of
26 this subsection shall be punished by a fine of not more
27 than $10,000.00 or by imprisonment for not less than one
28 nor more than 20 years, or both.
29 (c)(1) It shall be unlawful for any person knowingly to
30 utilize a computer on-line service, Internet service, or
31 local bulletin board service to seduce, solicit, lure,
32 or entice, or attempt to seduce, solicit, lure, or
33 entice a child or another person believed by such person
34 to be a child, to commit any illegal act described in
35 Code Section 16-6-2, relating to the offense of sodomy
36 or aggravated sodomy; Code Section 16-6-4, relating to
37 the offense of child molestation or aggravated child
38 molestation; Code Section 16-6-5, relating to the
39 offense of enticing a child for indecent purposes; or
40 Code Section 16-6-8, relating to the offense of public
1 indecency; or to engage in any conduct that by its
2 nature is an unlawful sexual offense against a child.
3 (2) Any person who violates paragraph (1) of this
4 subsection shall be guilty of a misdemeanor of a high
5 and aggravated nature.
6 (d)(1) It shall be unlawful for any owner or operator of
7 a computer on-line service, Internet service, or local
8 bulletin board service knowingly to permit a subscriber
9 to utilize the service to commit a violation of this
10 Code section.
11 (2) Any person who violates paragraph (1) of this
12 subsection shall be guilty of a misdemeanor of a high
13 and aggravated nature.
14 (e) The fact that an undercover operative or law
15 enforcement officer was involved in the detection and
16 investigation of an offense under this Code section shall
17 not constitute a defense to prosecution under this Code
18 section.
19 (f) A person is subject to prosecution in this state
20 pursuant to Code Section 17-2-1, relating to jurisdiction
21 over crimes and persons charged with commission of crimes
22 generally, for any conduct made unlawful by this Code
23 section which the person engages in while either within or
24 outside of this state if, by such conduct, the person
25 commits a violation of this Code section which involves a
26 child who resides in this state or another person believed
27 by such person to be a child residing in this state.
28 (g) For the purposes of this Code section, conduct which
29 is criminal only because of the age of the victim shall
30 not be considered a criminal offense if the perpetrator is
31 18 years of age or younger.
32 (h) Any violation of this Code section shall constitute a
33 separate offense."
-- Robert Costner Phone: (770) 402-3580
Electronic Frontiers Georgia mailto:pooh@efga.org
http://www.efga.org/ run PGP 5.0 for my public key
------------------------------
Date: Sun, 7 Feb 1999 15:55:35 -0600 (CST)
From: Jim Thomas
Subject: File 2--Spurned LA Man charged with Internet Stalking
Spurned L.A. Man Charged With Internet Stalking/Explicit,
inviting e-mail was sent in woman's name to various men
Source: San Francisco Chronicle, Saturday, January 23, 1999
http://www.sfgate.com/www.sfgate.com
In the first prosecution under a new California
cyber-stalking statute, a man has been charged with using the
Internet in an attempt to arrange the rape of a woman who had
spurned his romantic advances.
The case centers on the chilling account of a North Hollywood
woman. According to testimony, six different men showed up at her
apartment over a five-month period last year, saying they were
responding to online ads and steamy e-mails sent in her name that
described fantasies of being raped.
Authorities said Thursday that these were not her ads, her
e-mails or her fantasies, and that she was the victim of Gary S.
Dellapenta, a 50-year-old security guard from North Hollywood who
earlier this week was ordered to stand trial on charges of
stalking, computer fraud and solicitation of sexual assault.
"This technology has created a whole new class of criminals
who would not otherwise have the forbearance to terrorize people
face to face," said Assistant U.S. Attorney Michael J. Gennaco,
who two years ago prosecuted the first federal hate crime in
cyberspace. "It emboldens them to hide behind computer screens
and interfere with other people's lives."
The e-mails said the woman was ``into rape fantasy'' and
multiple partners, authorities said, and told numerous men
everything from the address of her apartment to her physical
description, her phone number and how to bypass her home security
system.
"Carol Chase, a professor at Pepperdine University School of
Law, said messages like the kind Dellapenta allegedly posted are
not that different from spiteful remarks that scorned suitors
used to post on bathroom walls."
"But by placing this information on an Internet site, you
can reach millions of people," Chase said. "There is a greater
likelihood that the harm you intend will be visited upon a
victim."
------------------------------
Date: Thu, 11 Feb 1999 06:20:01 -0800
From: Jim Galasyn
Subject: File 3--Court upholds law banning Internet porn in the office
Court upholds law banning Internet porn in the office
February 11, 1999
Web posted at: 7:52 AM EST (1252 GMT)
RICHMOND, Virginia (AP) -- A federal appeals court has upheld a
Virginia law that prohibits state employees from looking at
sexually explicit material via the Internet while at work.
The 4th U.S. Circuit Court of Appeals ruled on Wednesday that the
law does not infringe state employees' freedom of expression.
Six professors at public colleges challenged the law, arguing it
would impede their ability to conduct legitimate research.
But the 4th Circuit agreed with lawyers for the state who argued
that the government has a right to supervise on-the-job
activities of its employees.
------------------------------
Date: Thu, 11 Feb 1999 11:44:00 -0600 (CST)
From: Jim Thomas
Subject: File 4--Israeli Teens Charged with Hacking into US Systems
The Chicago Tribune (Feb 10, '99: p 19) reported that a teenager and
four accomplices who allegedly hacked into the computer systems
of the Pentagon and NASA were indicted in Israel.
"Ehud Tenenbaum, 18, and four others were charged with
illegal entry into computers in the U.S. and
Israel, including academic institutions and the Knesset."
The story notes that their activities were discovered last year
when two California youths were caught hacking into Pentagon
computers and told authorities they had been trained by Tenebaum.
------------------------------
From: jthomas@sun.soci.niu.edu
Date: Thu, 11 Feb 1999 10:30:46 EST
Subject: File 5--More States Consider Laws Restricting Junk E-Mail
Source: The New York Times, February 11 (1999)
More States Consider Laws Restricting Junk E-Mail
By JERI CLAUSING
As lawmakers around the country discover that their
constituents are concerned about Internet issues, bills to
regulate or outlaw junk e-mail are popping up in state
legislatures. Three laws restricting junk e-mail are already on
the books, and lawmakers are considering four more.
Advocates of the laws say they are encouraged by the new
interest state lawmakers are taking in protecting consumers and
Internet service providers from the scourge of junk e-mail,
dubbed "spam" by annoyed recipients. However, they are also
concerned that a patchwork of different laws across the country
could hamper legitimate online marketing.
Legislators adjourning for their 1999 sessions have introduced
proposed spam laws in Texas, Virginia, Washington and Maryland.
More are expected before lawmakers in other states wrap up this
year's business.
In the last Congress, CAUCE had been pushing for federal
legislation to amend an existing junk fax law to also outlaw
unsolicited junk e-mail. That bill, which was sponsored by
Representative Chris Smith, a New Jersey Republican, made little
headway. Instead, the Senate passed a proposal by Senators Robert
Torricelli, a New Jersey Democrat, and Frank Murkowski, an Alaska
Republican, that would have regulated junk e-mail by requiring
that it be labeled as advertising and that senders provide an
easy way for recipients to get off their mailing lists. Although
that bill never made it through the House, the senators are
expected to introduce a new version this year.
The Murkowski-Torricelli bill has been favored by the Direct
Marketing Association (DMA). But groups like CAUCE say it still
fails to address the issue of cost. Internet service providers
pay for the cost of processing millions of pieces of junk e-mail,
and some Internet users must pay their ISP or phone company for
the time they spend downloading spam.
In a surprise announcement in December, CAUCE and the DMA said
they had reached a tentative agreement on principles for new
federal legislation. But Mozena said in a telephone interview
last week that his optimism about finalizing that agreement was
waning.
------------------------------
Date: Thu, 4 Feb 1999 11:26:01 -0500 (EST)
From: Bill
Subject: File 6--Jury awards $107 Million
By Lauren Dodge
Associated Press Writer
PORTLAND, Ore. (AP) - "Wanted" posters and a Web site listing names and
addresses of "baby butchers" amount to illegal threats, and the
anti-abortion activists who created them must pay $107 million in
damages, a federal jury says.
"The jury saw the posters for what they are - a hit list for
terriosts," said Gloria Feldt, president of Planned Parenthood, which
joined several abortion doctors and a clinic in suing the activists.
Yet within minutes of Tuesday's verdict, First Amendment experts
said it went too far and defendants said they would appeal, calling it a
threat to constitutionally protected political speech.
"It's really just a statement from the court that says, 'Please
shut up,'" said defendant Michael Bray. "It's an obscene assault upon
the right to free speech. It says that when an abortionist cries out
that he feels frightened by the speech of others, that the speakers
should shut their mouths."
The suit was filed under U.S. racketeering statute and a 1994
federal law that makes it illegal to incite violence against abortion
doctors or their patients.
Unlike previous cases brought under the 1994 law, this one did not
involve any physical confrotations or explicit threats. Because of
that, the anti-abortion activists contended that the Internet site and
the posters were protected by the First Amendment.
At issue was a Web site called "The Nuremberg Files" that lists
hundreds of abortion doctors accused of committing "crimes against
humanity" and invites readers to send in doctor's addresses, license
plate numbers and even names of their children. When three doctors on
the list were killed, their nmaes were shown crossed off.
Wild West-style posters were handed out at rallies and in abortion
doctors' neighborhoods, offering a $5,000 reward for information about a
"Deadly Dozen" doctors.
The plantiffs now want an injunction shutting down the Web site.
"We have no intention of squelching free speech," said Dr.
Elizabeth Newhall. "Free speech is not in jeopardy. Women and their
providers are."
------------------------------
Date: Thu, 04 Feb 1999 02:59:15 -0600
From: Bennett Haselton
Subject: File 7--Cyber Patrol controversy
[sent to various reporters who have written about Peacefire or
Internet censorship recently]
Peacefire's "Cyber Patrol password decoder" is one of three top
stories on C-Net's News.com this morning:
"Net Filters Foiled Again"
http://www.news.com/News/Item/0,4,31903,00.html
The password decoder, CPCrack, can be run on any Windows machine
to circumvent Cyber Patrol without the password. Cyber Patrol is
an Internet blocking program with an estimated 9 million users,
promoting a conservative view towards the damaging effects of
sexuality, and used by schools and parents to restrict minors'
access to political and religious viewpoints contrary to their
own. Sites banned by Cyber Patrol have included pages about
Judaism, feminism, animal rights, religious tolerance, and the
Holocaust; Peacefire encourages Internet users to use tools such
as CPCrack to gain access to all viewpoints and form their own
opinions.
Peacefire is an organization of about 3,500 members, mostly
teenagers, advocating First Amendment rights for people under 18
on the Internet. Our Web site at http://www.peacefire.org/
contains exclusive information about sites blocked by censoring
software; these reports has been used by the ACLU and People For
the American Way in filing lawsuits against library censorship
policies. Peacefire members have been interviewed about Internet
censorship on NPR, MTV, Court TV, CNN Financial News and MSNBC.
------------------------------
Date: Wed, 10 Feb 1999 10:23:03 -0800 (PST)
From: spicer@tcm.org (Dag Spicer)
Subject: File 8--LECTURE: "Doing Computer History in Internet Time"
The Computer Museum History Center presents:
"Doing Computer History in Internet Time"
Paul Ceruzzi
Curator of Aerospace Electronics and Computing
National Air and Space Museum
Smithsonian Institution
Tuesday, Februaury 16, 1999
5:30 p.m.
NASA Main Auditorium
Building N201
NASA Ames Research Center
Mountain View, CA 94035
NOTE: YOU WILL NOT BE ADMITTED TO THIS TALK WITHOUT ADVANCE CONFIRMATION
(By February 12) BECAUSE OF MOFFETT FIELD SECURITY CHANGES. A Computer
Museum membership card is not valid with these security changes. See
confirmation procedure below, at conclusion of this announcement.
The Lecture:
Historians like to let things settle a bit before doing history, but how
is that possible when the subject of historical inquiry is computing,
which seems to re-invent and redefine itself every few months? The
author, a curator in the Space History Department of the National Air
and Space Museum, will describe his recent attempt to write a
comprehensive history of computing, from the dedication of the ENIAC in
1946 to the commercialization of the World Wide Web. When he began
writing, the World Wide Web had not even been invented, yet by the time
he submitted a manuscript to the publisher, Microsoft had announced
Internet Explorer 4.0!
Ceruzzi believes that one can now take a look back and tell a coherent
story about computing in the last fifty years, even if tomorrows
headlines threaten to turn it all into a preface to the real story.
Ceruzzi's work at the Smithsonian includes research, writing, planning
exhibits, collecting artifacts, and lecturing on the subjects of
microelectronics, computing, and control as they apply to the practice
of air and space flight.
Dr. Ceruzzi is a graduate of Yale University and has a Ph.D. in American
Studies from the University of Kansas. He has been a Fullbright Scholar,
the receipient of a Charles Babbage Institute Research Fellowship, and a
faculty member at Clemson University in South Carolina. He is the author
or co-author of several books on the history of computing and related
issues: "Reckoners: The Prehistory of The Digital Computer" (1983);
"Beyond the Limits: Flight Enters the Computer Age" (1989); "Smithsonian
Landmarks in the History of Digital Computing" (1994, with Peggy
Kidwell); and "A History of Modern Computing" (1998).
Copies of "A History of Modern Computing" and "Beyond the Limits" will
be available at the talk for author signature and purchase.
-------------------------------------------------------------------
Directions
>From Highway 101 in Mountain View, take the Moffett Field exit
(ignore any exits for Moffett Blvd.or Moffett Field South Gate).
At the Moffett Field main gate, go to the Visitor Badging office
on the right side of the gate. The lecture is in Building N-201.
A map is available by visiting the website (URL below) or by fax
by calling Ellen Lee at +1 650 604 2579.
Confirmation Procedure
You must confirm by February 15. Confirm by calling Ellen Lee at
+1 650 604 2579, or by e-mailing chc@tcm.org, with your name,
phone no., and country of citizenship:
- if you are a US citizen, please state so, and bring a driver's
license for photo id.
- if you are not a US citizen, but have a green card, state your
country of citizenship, and bring the green card.
- and if you are not a US citizen, and do not have a green card,
please e-mail chc@tcm.org with your name, country of origin, and
citizenship, to get confirmation. If you are confirmed, you will
need to bring your passport. Among other countries, citizens
(without a green card) of China, India, Israel, South Africa and
Taiwan require special processing for admittance to Moffett
Field, and will not be able to attend this talk.
For more information, including a map of NASA Ames and the venue
for this talk, please visit
http://www.computerhistory.org/ceruzzi
Our 1999 Spring Lecture Schedule follows shortly!
------------------------------
Subject: File 9--Australia to trial "link crimes"
Date: Thu, 11 Feb 1999 22:06:24 +1100 (EST)
From: "Danny Yee"
The "Publication for Adoption" version of the Code of Practice of IIA
(Internet Industry Association, Australia) is available at:
http://www.iia.net.au/Code4.html
Among other things, this
* prohibits linking to Illegal Content
* prohibits "misleading" metatags
* guarantees that email (specifically) will be "treated as private
content", but says nothing about any OTHER communication systems
(e.g. IRC, ICQ, web traffic)
* has unacceptable administrative procedures (including no limits on
the number of different "Relevant Authorities" empowered to make
decisions about the Code.
It also endorsed spamming, but they've promised to reconsider those
sections after people made comments like "Australia is on the way to
becoming the world's largest intranet". If you want to provide feedback
on this code, contact details are at
http://www.iia.net.au/contact.html
------------------------------
Date: Wed, 10 Feb 1999 10:46:07 -0600
From: Bennett Haselton
Subject: File 10--Computers, Freedom and Privacy '99
If you're going to be attending Computers, Freedom and Privacy '99,
Peacefire has been invited to give a presentation on "Technology for
Circumventing Internet Censorship". We'll be talking about the use of
tools like the Anonymizer and the Anti-Censorship Proxy
(http://ians.978.org) to circumvent different forms of Internet censorship,
including restrictions imposed at the national level by firewalls used by
the governments of China and the U.A.E.
CFP99 is going to take place from April 5-8 in Washington, D.C. Our
presentation will be from 8:00-10:30 a.m. on April 6.
Please let me know if you or someone in your news office might be there,
and we'll connect at the conference. Thanks!
------------------------------
Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST)
From: Stanton McCandlish
Subject: File 11-- EFF et. al. Oppose Anti-Freedom of Info Measures
Source: EFFector 12.01:
EFF & Other Groups Oppose New Measures to Undermine Freedom of
Information
FOR IMMEDIATE RELEASE February 10, 1999
Groups Supporting Openness Oppose Limits on Access to Public
Information
Letter Adds Voices to Environmentalists' Outcry on Restrictions
to the Public Right-to-Know
WASHINGTON - February 10, 1999 - Yesterday, a group of civil
liberties, academic, journalist and public interest
organizations sent a letter to Representative Thomas Bliley,
Chairman of the House Commerce Committee, expressing concern
over proposals to limit the availability of public information
about the potential for accidents at chemical plants (EPA's
unclassified Worst Case Scenarios data) on the Internet. The
text of this letter is available at:
http://www.eff.org/pub/Activism/FOIA/HTML/19990210_bliley_letter.html
This information has been readily available through the
Freedom of Information Act (FOIA) providing citizens with
critical insight to assess and improve the safety of their
communities. As part of the Clean Air Act, the information was
to be made more readily accessible. Under pressure from the
FBI, Chairman Bliley and the chemical industry, the EPA has
stepped back from its initial proposal to provide public
access to the data through the agency's Web site. New
proposals would limit the basic access to this public
information. "Rather than taking advantage of the Internet's
democratic potential to allow citizens the ability to access
public information," Ari Schwartz, Policy Analyst at the
Center for Democracy and Technology, said "these proposals
view the Internet and its power to distribute information as a
threat."
The letter, signed by the American Association of Law
Libraries, the American Civil Liberties Union, Association of
Newspaper Editors, Center for Democracy and Technology,
Electronic Frontier Foundation and OMB Watch, urged the
Chairman not to retreat from the substantial gains made in
ensuring that citizens have access to public information to
monitor their government and its activities through the FOIA.
Recent amendments to FOIA, EFOIA, encouraged and promulgated
the use of communications technology to spread public
information ensuring greater openness. "The United States is a
democracy, and the Freedom of Information Act plays an
essential role in guaranteeing that citizens gain access to
information that empowers us to make educated choices, " Shari
Steele, Director of Legal Services at the Electronic Frontier
Foundation, explained. "Proposals like this one undermine the
very core of our society and are a threat to the exercise of
true liberty."
The groups' letter asked Bliley for more comprehensive
hearings on the subject to include members of all interested
communities. A legislative proposal is expected in the coming
weeks. "This is just the beginning of a battle to protect the
ability to access public information on the Internet,"
Schwartz said.
For More Information
* EFF's Freedom of Information & Open Government Archive:
http://www.eff.org/pub/Activism/FOIA
------------------------------
Date: Thu, 11 Feb 1999 19:43:08 -0800 (PST)
From: Stanton McCandlish
Subject: File 12--THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
THE EIGHTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
CALL FOR NOMINATIONS
*Please free to redistribute this notice in appropriate forums.*
In every field of human endeavor,there are those dedicated to
expanding knowledge, freedom, efficiency and utility. Along the
electronic frontier, this is especially true. To recognize this, the
Electronic Frontier Foundation established the Pioneer Awards for
deserving individuals and organizations.
The Pioneer Awards are international and nominations are open to all.
The deadline for nominations this year is March 10, 1999. Nominations
must be sent to pioneer@eff.org.
In March of 1992, the first EFF Pioneer Awards were given in
Washington D.C. The winners were: Douglas C. Engelbart, Robert Kahn,
Jim Warren, Tom Jennings, and Andrzej Smereczynski. The 1993 Pioneer
Award recipients were Paul Baran, Vinton Cerf, Ward Christensen, Dave
Hughes and the USENET software developers, represented by the
software's originators Tom Truscott and Jim Ellis. The 1994 Pioneer
Award winners were Ivan Sutherland, Whitfield Diffie and Martin
Hellman, Murray Turoff and Starr Roxanne Hiltz, Lee Felsenstein, Bill
Atkinson, and the WELL. The 1995 Pioneer Award winners were Philip
Zimmermann, Anita Borg, and Willis Ware. The 1996 Pioneer Award
winners were Robert Metcalfe, Peter Neumann, Shabbir Safdar and
Matthew Blaze. The 1997 winners were Marc Rotenberg, Johan "Julf"
Helsingius, and (special honorees) Hedy Lamarr and George Antheil. The
1998 winners were Richard Stallman, Linus Torvalds, and Barbara
Simons.
The 8th Annual Pioneer Awards will be given in Washington, D.C., at
the 9th Conference on Computers, Freedom, and Privacy in April of
1999.
All nominations will be reviewed by a panel of judges chosen for their
knowledge of computer-based communications and the technical, legal,
and social issues involved in computer technology and computer
communications.
This year's judges are Mike Godwin, Bruce Koball, Hal Abelson, Lorrie
Cranor, Phil Agre, and Simona Nass.
There are no specific categories for the Pioneer Awards, but the
following guidelines apply:
1. The nominees must have made a substantial contribution to the
health, growth, accessibility, or freedom of computer-based
communications.
2. The contribution may be technical, social, economic or cultural.
3. Nominations may be of individuals, systems, or organizations in
the private or public sectors.
4. Nominations are open to all, and you may nominate more than one
recipient. You may nominate yourself or your organization.
5. All nominations, to be valid, must contain your reasons, however
brief, for nominating the individual or organization, along with a
means of contacting the nominee, and your own contact number.
Anonymous nominations will be allowed, but we prefer to be able to
contact the nominating parties in the event that we need more
information..
6. Every person or organization, with the single exception of EFF
staff members, are eligible for Pioneer Awards.
7. Persons or representatives of organizations receiving a Pioneer
Award will be invited to attend the ceremony at the Foundation's
expense.
You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to:
pioneer@eff.org
Just tell us the name of the nominee, the phone number or email
address at which the nominee can be reached, and, most important, why
you feel the nominee deserves the award. You may attach supporting
documentation in Microsoft Word or other standard binary formats.
Please include your own name, address, phone number, and e-mail
address.
We're looking for the Pioneers of the Electronic Frontier that have
made and are making a difference. Thanks for helping us find them,
The Electronic Frontier Foundation
------------------------------
Date: Sun, 10 Jan 1999 22:51:01 CST
From: CuD Moderators
Subject: File 13--Cu Digest Header Info (unchanged since 10 Jan, 1999)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
CuD is readily accessible from the Net:
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #11.09
************************************
<--">Return to the Cu Digest homepage
Page maintained by: Jim Thomas - cudigest@sun.soci.niu.edu