Computer underground Digest Sun Apr 23, 1995 Volume 7 : Issue 32 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Desecrator: Emo Shrdlu CONTENTS, #7.32 (Sun, Apr 23, 1995) File 1--ACLU Files Amicus Brief in U.S. v Thomas (AABBC Case) File 2--ex-Public Safety Officer Charged w/Distrib. of BBS "Obscenity" File 3--New list: CACI--Children Accessing Controversial Info (fwd) File 4--Supreme Court opinion reaffirming right to comm anonymity File 5--Summercon Info... File 6--** The Cyberspace Society ** File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Fri, 21 Apr 1995 16:29:11 -0400 From: ACLU Information Subject: File 1--ACLU Files Amicus Brief in U.S. v Thomas (AABBC Case) For Immediate Release April 17, 1995 ACLU Files In Groundbreaking Computer Obscenity Case; Friend-of-the-Court Brief Seeks to Overturn Tennessee Conviction NEW YORK, April 17 -- The American Civil Liberties Union, seeking to secure the future of free communication on the Internet, has filed a friend-of-the-court brief in what is believed to be the first case involving the cross-country prosecution and conviction of computer bulletin board operators. In its brief, filed with the U.S. Court of Appeals for the Sixth Circuit in Tennessee, the ACLU urges the court to overturn the conviction of Robert Thomas and Carleen Thomas of Milpitas, California. The Thomases own and operate a computer bulletin board that specializes in the posting of sexually explicit words and pictures. The couple was indicted and convicted in the U.S. District Court in Tennessee because a U.S. postal inspector learned of their bulletin board and filed a fake application seeking access to its contents. Once he obtained access, the postal inspector downloaded several pictures from the California-based bulletin board, which a U.S. Attorney then deemed to be ~obscene~ under the "local community standards" of Tennessee. In its brief, which was also filed on behalf of the ACLU affiliates in Tennessee and Northern California and the National Writers Union, Feminists for Free Expression and the Thomas Jefferson Center for the Protection of Free Expression, the ACLU charges that the government is engaged in a "clumsy attempt to censor communications in cyberspace through application of an obscenity law and standards wholly inappropriate for this new medium." "Computer networks have created vast new fora for the exchange of ideas," the ACLU's brief said. "They have created new communities with new opportunities for people with similar interests to communicate with each other. "Until now," the brief continues, "computer networks have been faithful to the values of the First Amendment. They have fostered, encouraged and even nurtured the robust exchange of ideas.In this case the government seeks to use a criminal law never intended to apply to computer communications, to put a brake on that development, to stifle the explosive creativity and breadth of expression occuring on computer networks." The full text of the ACLU~s brief in Thomas vs. United States of America is available in the ACLU's Free Reading Room, a gopher site (address below) in the Court section, under National Office litigation. -- ACLU Free Reading Room | American Civil Liberties Union gopher://aclu.org:6601 | 132 W. 43rd Street, NY, NY 10036 mailto:infoaclu@aclu.org| "Eternal vigilance is the ftp://ftp.pipeline.com | price of liberty" ------------------------------ Date: Mon, 24 Apr 1995 10:50:11 -0500 (CDT) From: David Smith Subject: File 2--ex-Public Safety Officer Charged w/Distrib. of BBS "Obscenity" Question : This is very much like the Tony Davis case in Oklahoma, who was arrested for the same charge of distribution of obscene images from CD-Roms bought from the back of national magazines. Why are the CD-Rom manufacturers never charged with distributing obscene material? -- david ---------- Forwarded message ---------- NEWS RELEASE FOR IMMEDIATE RELEASE: April 18,1995 A VETERAN DPS OFFICER GIVES HIS SIDE The ex-Department of Public Safety Officer who is charged with the distribution of obscene materials on his computer bulletin board system plead "not guilty" this morning. Lorne Shantz, a 17-year veteran police officer, was arraigned at the Maricopa County Superior Court. Shantz operated an electronic bulletin board system called "The Wishbook" as a hobby and public service. There were close to 4,000 users, of which approximately 400 financially contributed. This was a non-mandatory contribution. The money contributed was used to defray operating costs of the bulletin board. The other 3,600 users were casual users who didn't give any financial support. The 400 users who did contribute were given more access to the system that included Internet access, CD-ROM files and more time on-line each day. The files the County Attorney's Office is alleging to be obscene were not available to the general public. In fact, every effort was made by Shantz to prevent obscene files from existing on the system. Shantz purchased commercial CD-ROMS from a national distributor. According to the County Attorney's Office, the alleged files are found on the CD-ROMS, not on Shantz's hard drive system. Users of "The Wishbook" who wanted access to the adult area had to submit a written application and a photocopy of identification to verify they were adults. At no time did Shantz knowingly allow the distribution of obscene materials on his bulletin board. "It defies logic why Lorne Shantz would risk his career, his livelihood, his retirement, his reputation and his family to distribute disgusting and unwanted files on his bulletin board. Clearly, these files are not of a general interest," said Peter Balkan, Shantz's attorney. The bulletin board had nearly 500,000 files, of which almost 40,000 were of adult nature. The alleged files made up less than one/one-thousandth (.001) of one percent of all files. At the time of his termination, Shantz was classified as an Officer III and had been an employee with DPS for nearly 15 years. Prior to working at DPS, Shantz was a Yavapai County Deputy Sheriff for two years and a reserve Deputy for one year. Shantz was eligible for retirement in July of 1998, just three years from now. Jeffrey Adcock, Shantz's brother-in-law, has set up a defense fund to help Shantz defend himself. "I've known Lorne for seven years and have had the opportunity to ride as a civilian observer with him while he was on duty. He was a good cop who took his job seriously. He has spent all of his adult life trying to protect other people. These allegations are outrageous and untrue." People wishing to contribute to the defense fund can send donations to The Lorne Shantz Defense Fund, c/o Jeffrey Adcock, P.O.Box 273, Litchfield Park, Arizona, 85340. -End of Press Release- The contents of this official News Release, are made available at no cost by The JCCS Multiline BBS, whose owners and staff fully support Lorne Shantz Defense Fund. ------------------------------ Date: Tue, 18 Apr 1995 00:18:30 -0500 (CDT) From: David Smith Subject: File 3--New list: CACI--Children Accessing Controversial Info (fwd) ---------- Forwarded message ---------- ANNOUNCING CACI: a mailing list devoted to discussing Children Accessing Controversial Information through computer networks A lot of kids are getting online these days--sharing data about acid rain, talking about social issues, meeting adults as well as kids, and learning about other cultures. Computer networks hold tremendous promise, but also raise difficult issues which need to be discussed openly. Unfortunately, much of the publicity related to these issues has only dealt with potential dangers--and it has not encouraged reflection on solutions. Can children be prevented from accessing materials which are controversial? Is preventing access even desirable? We believe censorship is not the answer. What alternatives do we have or could we provide? How do we talk with children about these issues? What can we say to concerned parents and school administrators? How and by whom are community standards set? The stakes are clear: if we don't find ways to manage these difficult issues, parents and school administrators may choose to deny children access to networking in an attempt to protect them. And prohibitions against undirected exploration through networking could prevent many of the benefits which the technology could support. We hope to form a community of people interested in discussing these issues and developing helpful materials. Complementing the ongoing online discussion, a round table discussion will be held at the upcoming American Educational Research Association conference in San Francisco. (12:25 pm on Wednesday, April 19th. See our web page for more information.) To subscribe: Send email to: caci-request@media.mit.edu The body of the message should say: subscribe If you have difficulty, email caci-owner@media.mit.edu This announcement as well as additional information may be found at http://mevard.www.media.mit.edu/people/mevard/caci.html using any web browser. Please forward this announcement to others who may be interested. -- Amy Bruckman and Michele Evard, MIT Media Lab ------------------------------ Date: Mon, 24 Apr 1995 01:22:18 -0500 From: jim thomas Subject: File 4--Supreme Court opinion reaffirming right to comm anonymity ((MODERATORS' NOTE: The following was provided by Mike Godwin) The Supreme Court reaffirmed yesterday the right to anonymity in communications. Here's the syllabus of the opinion: SUPREME COURT OF THE UNITED STATES Syllabus McINTYRE, executor of ESTATE OF McINTYRE, DECEASED v. OHIO ELECTIONS COMMISSION certiorari to the supreme court of ohio No. 93-986. Argued October 12, 1994-Decided April 19, 1995 After petitioner's decedent distributed leaflets purporting to express the views of ``CONCERNED PARENTS AND TAX PAYERS'' oppos- ing a proposed school tax levy, she was fined by respondent for violating 3599.09(A) of the Ohio Code, which prohibits the distribu- tion of campaign literature that does not contain the name and address of the person or campaign official issuing the literature. The Court of Common Pleas reversed, but the Ohio Court of Ap- peals reinstated the fine. In affirming, the State Supreme Court held that the burdens 3599.09(A) imposed on voters' First Amend- ment rights were ``reasonable'' and ``nondiscriminatory'' and therefore valid. Declaring that 3599.09(A) is intended to identify persons who distribute campaign materials containing fraud, libel, or false advertising and to provide voters with a mechanism for evaluating such materials, the court distinguished Talley v. California, 362 U. S. 60, in which this Court invalidated an ordinance prohibiting all anonymous leafletting. Held: Section 3599.09(A)'s prohibition of the distribution of anony- mous campaign literature abridges the freedom of speech in viola- tion of the First Amendment. Pp. 7-24. (a) The freedom to publish anonymously is protected by the First Amendment, and, as Talley indicates, extends beyond the literary realm to the advocacy of political causes. Pp. 7-9. (b) This Court's precedents make abundantly clear that the Ohio Supreme Court's reasonableness standard is significantly more lenient than is appropriate in a case of this kind. Although Talley concerned a different limitation than 3599.09(A) and thus does not necessarily control here, the First Amendment's protection of ano- nymity nevertheless applies. Section 3599.09(A) is not simply an election code provision subject to the ``ordinary litigation'' test set forth in Anderson v. Celebrezze, 460 U. S. 780, and similar cases. Rather, it is a regulation of core political speech. Moreover, the category of documents it covers is defined by their content-only those publications containing speech designed to influence the voters in an election need bear the required information. See, e.g., First Nat. Bank of Boston v. Bellotti, 435 U. S. 765, 776-777. When a law burdens such speech, the Court applies ``exacting scrutiny,'' upholding the restriction only if it is narrowly tailored to serve an overriding state interest. See, e.g., id., at 786. Pp. 9-14. (c) Section 3599.09(A)'s anonymous speech ban is not justified by Ohio's asserted interests in preventing fraudulent and libelous statements and in providing the electorate with relevant informa- tion. The claimed informational interest is plainly insufficient to support the statute's disclosure requirement, since the speaker's identity is no different from other components of a document's contents that the author is free to include or exclude, and the author's name and address add little to the reader's ability to evaluate the document in the case of a handbill written by a private citizen unknown to the reader. Moreover, the state interest in preventing fraud and libel (which Ohio vindicates by means of other, more direct prohibitions) does not justify 3599.09(A)'s extremely broad prohibition of anonymous leaflets. The statute encompasses all documents, regardless of whether they are arguably false or misleading. Although a State might somehow demonstrate that its enforcement interests justify a more limited identification require- ment, Ohio has not met that burden here. Pp. 14-20. (d) This Court's opinions in Bellotti, 435 U. S., at 792, n. 32-which commented in dicta on the prophylactic effect of requiring identification of the source of corporate campaign advertising-and Buckley v. Valeo, 424 U. S. 1, 75-76-which approved mandatory disclosure of campaign-related expenditures-do not establish the constitutionality of 3599.09(A), since neither case involved a prohi- bition of anonymous campaign literature. Pp. 20-23. 67 Ohio St. 3d 391, 618 N. E. 2d 152, reversed. Stevens, J., delivered the opinion of the Court, in which O'Connor, Kennedy, Souter, Ginsburg, and Breyer, JJ., joined. Ginsburg, J., filed a concurring opinion. Thomas, J., filed an opinion concurring in the judgment. Scalia, J., filed a dissenting opinion, in which Rehn- quist, C. J., joined. ------------------------------ Date: Sat, 22 Apr 1995 18:21:41 -0500 From: Phrack Magazine Subject: File 5--Summercon Info... -----BEGIN PGP SIGNED MESSAGE----- Phrack Magazine and Computer Security Technologies proudly present: The 1995 Summer Security Conference "SUMMERCON" June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia This is the official announcement and open invitation to the 1995 incarnation of Summercon. In the past, Summercon was an invite-only hacker gathering held annually in St. Louis, Missouri. Starting with this incarnation, Summercon is open to any and all interested parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators, Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers, Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers, Programmers, Conspiracy Nuts, Musicians and Nudists. LOCATION: The Clarion Hotel is located in downtown Atlanta, 9 miles from Hartsfield International Airport and just a few blocks from the Peachtree Center MARTA Station. Considering the exorbitant expenses involved with attending other conferences of this type, Rooms at Summercon are reduced to $65 per night for Single or Double Occupancy The Clarion Hotel Downtown, Courtland at 70 Houston St., NE, Atlanta, GA 30303 (404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax) No one likes to pay a hundred dollars a night. We don't expect you to have to. Spend your money on room service, drinks in the hotel bar, or on k-rad hacker t-shirts. Remember: Mention that you are attending Summercon in order to receive the discount. DIRECTIONS 75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland then turn left on Houston (John Wesley Dobbs Ave.) 20 East - Exit 75/85 North at International. Turn Left on Courtland at Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.) 20 West - Exit 75/85 North at International. One block to Courtland and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.) Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's International Airport will drop you off at many hotels in the downtown area, including the Clarion. The shuttle should be no more than 12 dollars. Fares may be paid at the Airport Shuttle in the Ground Transportation area of the Airport Terminal. MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a convenient and inexpensive way to negotiate most of the Atlanta area. Take the MARTA train from the Airport to the Peach Tree Center Station. Walk three blocks down Houston to the intersection of Houston and Courtland. The MARTA fare will be roughly 2 dollars. Taxis - The average cab fare from Atlanta's Airport to the downtown area is roughly 30 dollars. CONFERENCE INFO It has always been our contention that cons are for socializing. "Seekret Hacker InPh0" is never really discussed except in private circles, so the only way anyone is going to get any is to meet new people and take the initiative to start interesting conversations. Because of this, the formal speaking portion of Summercon will be held on one day, not two or three, leaving plenty of time for people to explore the city, compare hacking techniques, or go trashing and clubbing with their heretofore unseen online companions. The "Conference" will be held on June 3rd from roughly 11:00 am until 6:00 pm with a 1 hour lunch break from 1:00 to 2:00. NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping and still photography will be permitted. CURRENT LIST OF SPEAKERS: Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source Solutions (a private sector intelligence firm) Topic: Hackers from the Intelligence Perspective Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise", Publisher of Security Insider Report, and noted security expert Topic: Electromagnetic Weaponry Bob Stratton - Information Security Expert from one of America's largest Internet service providers Topic: The Future of TCP/IP Security Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks" Topic: Cryptography, Banking, and Commerce Annaliza Savage - London-based Director/Producer Topic: Discussion of her documentary "Unauthorized Access" (Followed by a public screening of the film) Chris Goggans - Editor of Phrack Magazine and Summercon M.C. Topic: introductions, incidentals and a topic which is sure to culminate in an international incident. (Other Speakers May Be Added - Interested parties may contact scon@fc.net) COSTS Since other cons of this type have been charging from 25 to 40 dollars entry fees, we are only charging 10 dollars. Yes, that's correct, TEN (10) dollars in US currency. Money is far too scarce among the hacker community to fleece everyone for money they will probably need to eat with or pay for their hotel rooms. WHAT TO DO IN ATLANTA: To attempt to make everyone's stay in Atlanta more exciting, we are contacting local establishments to arrange for special discounts and/or price reductions for Summercon attendees. Information will be handed out regarding these arrangements at the conference. Atlanta is a happening town. Touristy Stuff Party Time The World of Coca-Cola Buckhead Underground Atlanta The Gold Club Georgia Dome (Baseball?) (Countless Other Clubs and Bars) Six Flags CONTACTING SUMMERCON SPONSORS You can contact the Summercon sponsors by several means: E-mail: scon@fc.net WWW: http://www.fc.net/scon.html Snail Mail: Phrack Magazine 603 W. 13th #1A-278 Austin, TX 78701 If deemed severely urgent, you can PGP your email with the following PGP key: - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR tBRwaHJhY2tAd2VsbC5zZi5jYS51cw== =evjv - -----END PGP PUBLIC KEY BLOCK----- See you in Atlanta! -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4 46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5 uRix2FrftCY= =m/Yt -----END PGP SIGNATURE----- ------------------------------ Date: 21 Apr 1995 00:06:14 -0700 From: rkmoore@iol.ie (Richard K. Moore) Subject: File 6--** The Cyberspace Society ** Dear Cyber Citizens, I am pleased to forward this annoucement of the formation of The Cyberspace Society. As you will see below, CS is a quite different kind of endeavor than the Cyber Rights Campaign. CS is an initiative aimed at transforming the very governance of the world, in the direction of what I would call "enlightened democracy". Is this so ambitious as to be not worth attempting? I think not. If selfish economic interests, representing only a handfull of wealthy individuals, can attempt to create a New World Order catering to their avarice, why can't the rest of us -- the overwhelming majority -- pursue instead a vision more conducive to global justice and economic sustainability? As computer visionary Alan Kay is wont to say: "A great project is not much more difficult than good project; why not go for greatness?" Please be assured that my attention and focus will remain with cyber-rights and cyberjournal. I have no moderation or administrative duties in the Cyberspace Society. In Solidarity, Richard @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Date--Sun, 16 Apr 1995 22:55:46 -0400 (EDT) From--Vigdor Schreibman - FINS To--Vigdor Schreibman - FINS Subject--Global Grass Roots "Cyberspace Society" Launched -----------------Cyberspace Society Charter--------------------- ------------------Republication Authorized---------------------- THE _ _ __ __ __ __ ^ _ __ __---__ / \/ |_\ |_ |_/ \ |_\ /_\ / |_ - | - \_ | |_/ |_ | \ _\ | / \ \_ |_ - | - - /|\ - SOCIETY -_/ | \_- --- making the world safe for enlightened democracy April 17, 1995 SPEAK TRUTH TO POWER: A Call For Establishment of "The Cyberspace Society" By Vigdor Schreibman, W. Curtiss Priest, and Richard K. Moore The moving sociopolitical forces presently shaping the Information Age includes industry groups such as computer, information, telecommunications, broadcasting, and cable. They have colossal monopoly and oligopoly-based resources of, perhaps, half a trillion dollars with which to plan for their future and acquire the necessary political influence to implement such plans. Similar coalitions of mega-corporate interests are behind the various efforts to create super-national organizations based on treaty-status agreements such as NAFTA, GATT, and Maastricht. These agreements seek to supersede national sovereignty by un-elected commissions dominated by corporate representatives. However we may criticize the governments of the various Western Democracies, they at least include a modicum of popular representation, and should be much-preferred to the corporate commissions that threaten to replace them. In the US, the UK, Mexico, and in many other countries, governments are using their positions of temporary power to commit their nations to agreements, which surrender sovereignty to these commissions, and thereby limit the ability of future governments to fulfill their democratic representational mandates. For years, large corporations have been consolidating their control over these governments and the electoral process and are now cashing in their chips in an attempt to achieve global hegemony for corporate power, to replace democracy, such as it is, with a new form of Feudalism. Ideology is used as a tool to manipulate the political process. So called "conservatives" in the US with a new style of political leadership are now attempting to massively restructure American public life along reactionary lines. Syndicated columnist Jonathan Yardly wrote in an article in The Washington Post Dec. 26, 1994, that these leaders "would have us believe ... that they are 'conservatives,' but in truth the ideology they espouse has virtually nothing to do with conservativism as it is properly understood and almost everything to do with avarice, jingoism, intolerance, boosterism, moral relativism, religiosity and just plain meanness." New insight to turn the new world order away from its present course toward more enlightened purposes is now of greater urgency than ever. For the most part, people get their reading of these events through the corporate-dominated media. The larger pattern of events is intentionally concealed by this media, whose owners tend to be the same corporate forces engineering the changes. Internet provides a unique vehicle for 'going around' the mass media and providing for ourselves an independent means of sharing information and views. Unfortunately, the democratic openness of Internet itself is also under attack by these same forces, who seem determined to restrict freedom of expression on Internet, and replace the participatory Internet culture with yet another corporate-controlled, commercialized, mass-media channel. But while the open Internet remains in existence, twenty million networked souls throughout the world provide the basis for "gathering together" people of good will and democratic spirit more effectively than ever before in history. Non-trivial as a voting block in their own right, the political potency of network organizing is even more powerful in terms of the leverage it offers as an organizing infrastructure, which can extend its reach by linking up in coalition with traditional political organizations, local media, etc. The threatening transformation that is now emerging in the US can be resisted and, perhaps, even reversed by strong democratization of Cyberspace. A significant role in future US national elections could be realized by only 6 to 12 million voters, who represent 5 to 10 percent of total voters in the 1992 USA Presidential elections, according to the calculations of Jim Warren, Net-based grassroots political action wizard. This "voter arithmetic" applies to the USA and to all other democratic nations with significant participation in Cyberspace. Among these 20 million are surely many who would welcome the opportunity to join with others to help find the path toward a democratic future for the world as we enter the era of the global economy and the Information Age. -------------------- We hereby call for the creation of a ** Cyberspace Society **, to join together such people of good will, people who are concerned with the survival of humanity and the enrichment of the quality of life, and who agree that a genuine democratic process is the surest hope for a just and prosperous future. The Cyberspace Society would at once be an evolving prototype/model for the democratic process, an enlightened forum for the discussion of democratic movements in the broader political world, and the forum of strategies and coalitions to further the practice and benefits of democracy in the world. The strategic mission of Cyberspace Society would be to educate ourselves and build the human capacity and strong democratic institutional support systems during the period from 1995 to 2000, designed to reclaim mastery over the political powers, as are guaranteed to Americans by the US Constitution, and belong by natural right to the citizens of all nations, and are in many cases guaranteed by the laws and constitutions of those nations. It is appropriate that a Cyberspace-based movement linked and committed to serving the real world be encouraged for two reasons. First, Cyberspace will become an increasingly significant "public space," and if it is governed by narrow business self-interests, will have momentous adverse effects on public discourse. Second, Cyberspace--linked to the real world--provides the citizenry with an incredibly potent instrument for education, collaboration, planning, organization and global consensus building. A strategic planning group is now being formed to establish a framework for "The Cyberspace Society" based on: A) the Cyberspace Ethic; and B) the Cyberspace Social Contract. Founding members of the planning group include: Vigdor Schreibman, editor and publisher of the Federal Information News Syndicate; W. Curtiss Priest, Ph.D., director of the Center for Information, Technology, and Society; and Richard K. Moore, writer, and chairman of the Cyber-Rights Campaign of Computer Professionals for Social Responsibility. * DRAFT * VISION STATEMENT FOR PLANNING A DESIRABLE FUTURE BY CITIZENS OF "THE CYBERSPACE SOCIETY" A. The Cyberspace Ethic The new institution should educate citizens of Cyberspace, pursuant to an enlightened democratic ethic for the future of the Information Age. As Ralph Barton Perry, the philosopher of education, wrote "Democracy is that form of social organization which most depends on ... the cultivation of enlightened good will in the body of its citizens." John Warfield, a design visionary, has observed that enlightened good will means the capacity to analyze and resolve the issues facing society "through synthesis of ideas, to arrive at positions that promote the general welfare of the society in deference to selfish postures of individual pressure groups." There is now available a body of knowledge and experience that has been applied successfully in a large variety of academic and real-world situations, which can facilitate collaborative group inquiry and action required under the Cyberspace Ethic. A cellular structure will be used, and group work will be systematically organized so as to include the desirable dimensions of knowledge and perspective of the Cyberspace Society, including system designers, system insiders, and system outsiders. B. The Cyberspace Social Contract The proposed social contract for Cyberspace should promote citizenship in "The Cyberspace Society" that is responsive to that ethic. This must be supported by instrumental measures that effectively support the paramount social needs of the society and global environment in forms that are not subject to countervailing profit pressures, which have traditionally disregarded or even undermined desired social goods. The choice of such measures would be made exclusively by the citizens of the Cyberspace Society. The role of the strategic planners will not be to make such decisions but to assist in the organization and facilitation of free and fair citizen choice. A 3-part design is proposed: 1) a 3-level infrastructure, 2) a bill of rights, and 3) a set of applications constituting global challenges: 1. Cyberspace infrastructure -- three virtual networks -- interconnected to one another, but each operating with an independent economic model and social purpose: a. A public information infrastructure (PII) to assure that core Government publications are made available in all useful formats for the free use of the general public. PII would be developed and operated by a central government institution in close collaboration with all government agencies, libraries, colleges and universities, schools and other not-for-profit entities throughout the nation; b. A global "sustainable development" infrastructure (GSDI) to assure preservation and restoration of the integrity of natural systems which sustain both economic prosperity and life itself, and to foster economic growth, environmental protection, and social equity as interdependent, mutually reinforcing national goals. GSDI would follow the successful Internet/NREN model using leveraged government funding, together with direct financial support and management by not-for-profit and private institutions at local, state, regional, national, and global levels. Access to GSDI would be governed by an authorized use policy (AUP), connecting schools, libraries, hospitals, and local governments to each other and to the Internet/GSDI for those purposes; and c. A global information infrastructure (GII), funded and managed by private industry to provide free market access to voice, data, and video telecommunications services. The GII would embrace the following six principles: encourage private investment; promote competition; create a flexible regulatory framework; provide open access to the network for all information service providers; ensure universal service; and protect and promote the free exchange of information and ideas on the GII. 2. Cyberspace bill of rights e.g.: a. Common carrier structure, separating conduit and content; b. Equal access and affordable service; c. Freedom of expression, privacy, security, and copyright protection; 3. Cyberspace global challenges applications e.g.: a. Disease prevention and health promotion; b. News and citizen discussion of issues in virtual communities c. Distance learning, child development, worker retraining; d. Manufacturing, and others. -------------------- Members of "The Cyberspace Society," are invited to support, criticize, or amend the draft vision statement, for the betterment of humanity. Charter membership in "The Cyberspace Society"--for individuals only--costs $10.00. To become a charter member, send your check or money order to The Cyberspace Society, c/o FINS, 18 - 9th Street, NE #206, Washington, DC 20002-6042. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: Bits against the Empire BBS: +39-464-435189 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.32