Computer underground Digest    Sun  April 30, 1995   Volume 7 : Issue 34
                          ISSN  1004-042X

      Editors: Jim Thomas and Gordon Meyer ([email protected])
      Archivist: Brendan Kehoe
      Shadow Master: Stanton McCandlish
      Field Agent Extraordinaire:   David Smith
      Shadow-Archivists: Dan Carosone / Paul Southworth
                         Ralph Sims / Jyrki Kuoppala
                         Ian Dickinson
      Copy Desecrator:  Emo Shrdlu

CONTENTS, #7.34 (Sun, April 30, 1995)

File 1-- ***VIRUS INFO***  (GOOD TIMES VIRUS A HOAX, FOLKS!)
File 2--Clipper paper available for anon FTP
File 3--New Maillist battles Omnibus Terrorism Bill/Join NOW! (fwd)
File 4--Ohio Job Opening
File 5--making reality acceptable: cybercafe @ compress
File 6--Playing to Win in DC June 1-4
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date:         Thu, 27 Apr 1995 02:14:46 -0400
From:         "Robert A. Rosenberg" <[email protected]>
Subject: File 1-- ***VIRUS INFO***  (GOOD TIMES VIRUS A HOAX, FOLKS!)

((MODERATORS' NOTE: We've received  number of posts regarding the
so-called "Good Times" virus, and "warnings" have appeared on
many of the news groups we read. The following is unlikely to
end it until it's time to pay the modem tax)).


Originally from:  <AMEND1-L%[email protected]>

At 18:04 4/26/95, [email protected] wrote:
[Another "Good Times" Virus Warning]


Here we go again <g>.

The "Good Times Virus" is a Urban Legend. In reality it is composed of the
mass mailing of spurious warnings like the above from those who
(admittedly) are trying to be helpful.

Here is the real story (Note that date on the warning to see how long this
BS has been going on).

================================================================

               CIAC Notes

Number 94-04c:December 8, 1994

Welcome to the fourth issue of CIAC Notes! This is a special edition
to clear up recent reports of a "good times" virus-hoax.  Let us know
if you have topics you would like addressed or have feedback on what
is useful and what is not. Please contact the editor, Allan L. Van
Lehn, CIAC, 510-422-8193 or send E-mail to [email protected].

Reference to any specific commercial product does not necessarily
constitute or imply its endorsement, recommendation or favoring by
CIAC, the University of California, or the United States Government.


THE "Good Times" VIRUS IS AN URBAN LEGEND

In the early part of December, CIAC started to receive information
requests about a supposed "virus" which could be contracted via
America OnLine, simply by reading a message.  The following is the
message that CIAC received:

Here is some important information.  Beware of a file called Goodtimes.

Happy Chanukah everyone, and be careful out there. There is a virus on America
Online being sent by E-Mail. If you get anything called "Good Times",
DON'T read it or download it.  It is a virus that will erase your hard
drive.  Forward this to all your friends.  It may help them a lot.

THIS IS A HOAX.  Upon investigation, CIAC has determined that this message
originated from both a user of America Online and a student at a university
at approximately the same time, and it was meant to be a hoax.

CIAC has also seen other variations of this hoax, the main one is that
any electronic mail message with the subject line of "xxx-1" will
infect your computer.

This rumor has been spreading very widely.  This spread is due mainly
to the fact that many people have seen a message with "Good Times" in
the header.  They delete the message without reading it, thus
believing that they have saved themselves from being attacked.
These first-hand reports give a false sense of credibility to the
alert message.

There has been one confirmation of a person who received a message
with "xxx-1" in the header, but an empty message body.  Then, (in a
panic, because he had heard the alert), he checked his PC for viruses
(the first time he checked his machine in months) and found a
pre-existing virus on his machine.  He incorrectly came to the
conclusion that the E-mail message gave him the virus (this particular
virus could NOT POSSIBLY have spread via an E-mail message).  This
person then spread his alert.

As of this date, there are no known viruses which can infect merely
through reading a mail message.  For a virus to spread some program
must be executed.  Reading a mail message does not execute the mail
message.  Yes, Trojans have been found as executable attachments to
mail messages, the most notorious being the IBM VM Christmas Card
Trojan of 1987, also the TERM MODULE Worm (reference CIAC Bulletin
B-7) and the GAME2 MODULE Worm (CIAC Bulletin B-12).  But this is not
the case for this particular "virus" alert.

If you encounter this message being distributed on any mailing lists,
simply ignore it or send a follow-up message stating that this is a
false rumor.

Karyn Pichnarczyk
CIAC Team
[email protected]


WHO IS CIAC?

CIAC is the U.S. Department of Energy's Computer Incident Advisory Capability.
Established in 1989, shortly after the Internet Worm, CIAC provides
various computer security services free of charge to employees and
contractors of the DOE, such as: Incident Handling consulting,
Computer Security Information, On-site Workshops, White-hat Audits.

CIAC is located at Lawrence Livermore National Laboratory and is a
part of its Computer Security Technology Center.  CIAC is also a
founding member of FIRST, the Forum of Incident Response and Security
Teams, a global organization established to foster cooperation and
coordination among computer security teams worldwide.


CONTACTING CIAC

If you require additional assistance or wish to report a
vulnerability, call CIAC at 510-422-8193, fax messages to 510-423-8002
or send E-mail to [email protected].

ATTENTION: For emergencies and off-hour assistance, CIAC is available 24-hours
a day to DOE and DOE contractors via an integrated voicemail and
SKYPAGE number.  To use this service, dial 1-510-422-8193 or
1-800-759-7243 (SKYPAGE).  The primary SKYPAGE PIN number, 8550070 is
for the CIAC duty person.  A second PIN, 8550074 is for the CIAC
Project Leader. Keep these numbers handy.

CIAC's ELECTRONIC PUBLICATIONS

Previous CIAC Bulletins and other information are available via
anonymous FTP from ciac.llnl.gov.

CIAC has several self-subscribing mailing lists for electronic publications:

1. CIAC-BULLETIN for Advisories, highest priority - time critical
   information, and Bulletins, important computer security information;
2. CIAC-NOTES for Notes, a collection of computer security articles;
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
   software updates, new features, distribution and availability;
4. SPI-NOTES, for discussion of problems and solutions regarding the
   use of SPI products.

Our mailing lists are managed by a public domain software package called
ListProcessor, which ignores E-mail header subject lines.  To subscribe
(add yourself) to one of our mailing lists, send requests of the
following form:

subscribe list-name LastName, FirstName PhoneNumber

as the E-mail message body, substituting CIAC-BULLETIN, CIAC-NOTES,
SPI-ANNOUNCE or SPI-NOTES for "list-name" and valid information for
"LastName" "FirstName" and "PhoneNumber."  Send to:
[email protected] (NOT to: [email protected])

e.g.,

subscribe ciac-notes O'Hara, Scarlett 404-555-1212 x36
subscribe ciac-bulletin O'Hara, Scarlett 404-555-1212 x36

You will receive an acknowledgment containing address and initial PIN,
and information on how to change either of them, cancel your
subscription, or get help.

To subscribe an address which is a distribution list, first subscribe
the person responsible for your distribution list.  You will receive an
acknowledgment (as described above).  Change the address to the
distribution list by sending a second E-mail request.  As the body of
this message, substitute valid information for "list-name," "PIN", and
"address of the distribution list" when sending

E-mail to [email protected]:

       set  list-name  address  PIN  distribution_list_address
 e.g., set ciac-notes address 001860 [email protected]

To be removed from a mailing list, send the following request via

E-mail to [email protected]:

       unsubscribe  list-name
 e.g., unsubscribe ciac-notes

For more information, send the following request:

       help

If you have any questions about this list, you may contact the list's owner:
[email protected].

This document was prepared as an account of work sponsored by an agency of the
United States Government.  Neither the United States Government nor the
University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights.  Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation or
favoring by the United States Government or the University of
California.  The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government or
the University of California, and shall not be used for advertising or
product endorsement purposes.

End of CIAC Notes Number 94-04c 94_12_08
UCRL-MI-119788

------------------------------

Date: Thu, 27 Apr 1995 15:24:59 -0400 (EDT)
From: Michael Froomkin <[email protected]>
Subject: File 2--Clipper paper available for anon FTP

My paper, "The Metaphor is the Key: Cryptography, the Clipper Chip, and
the Constitution" is now available for anonymous FTP.  It is about 180pp.
long, and contains more than 800 references.

I would welcome your feedback on this paper -- even (especially?)
contributions to the inevitable errata sheet.

(Please note this docment resides at what is officially a "temporary"
site, so that if you create a web link to it, please let me know so that
I can notify you when it moves).

Contents of FTP://acr.law.miami.edu/pub/..

File                  Type
---------------       ----------
clipper.asc           ASCII
clipper.wp            WP 5.1/Dos
clipperwp.zip         Pkzipped version of clipper.wp
clipper.ps            My best effort at Postscript.  YMMV.  (approx. 7Mb.)
clipperps.zip         Pkzipped version of clipper.ps
clipper.ps.gz         Gzipped version of clipper.ps

Ports provided by nice people (please note I have not checked these)
------------------------------------------------------------------------
clipper.ps.Z          Unix compressed version of clipper.ps with carriage
                     returns removed -- courtesy of Whit Diffie
clipperMSW.sea.hqx    Binhexed self-extracting Microsoft Word 5.1 for
                     Macintosh version of clipper.wp -- courtesy
                     of Ted Byfield

None of these files contains correct and final page numbers, and there are
generally trivial typos that were corrected in the printed version.  The
printed version appears at 143 U.Penn.L.Rev. 709 (1995).

I intend to put up a web version presently.  The .index file in the above
directory will have details when a clean copy is ready for prime time.  A
link to an experimental and highly buggy HTMLized version may appear at
erratic intervals at http://acr.law.miami.edu at the very bottom of the
homepage.

A.Michael Froomkin          | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law  |
U.Miami Law School          | [email protected]
PO Box 248087               |
Coral Gables, FL 33146 USA  | It's warm here.

------------------------------

Date:         Fri, 28 Apr 95 13:18:13 EDT
From:         "W. K. (Bill) Gorman" <[email protected]>
Subject: File 3--New Maillist battles Omnibus Terrorism Bill (fwd)

Obviously, CUD would be impacted by this legislation if enacted,
as would we all.
                   ===========================

W. K. Gorman  <[email protected]>

Copyright (C) 1995 by W. K. Gorman.
With explicit reservation of all rights, exclusively and without prejudice,
per UCC 1-207.  Any commercial or for-profit use of all or any part of this
message, in any form, is expressly forbidden. Opinions are my own.
----------------------------Original message----------------------------
Date--Fri, 28 Apr 1995 03:43:29 -0400
[email protected] (Howard L. Bloom)
Subject--New Maillist battles Omnibus Terrorism Bill/Join NOW!

The Omnibus Counterterrorism Bill was languishing in Congress before
The Oklahoma Bombing.  It is now on the fast track and needs to be stopped
or at least changed drastically so that it does not infringe on our
rights as Citizens.  A concise description of what this bill represents
follows the subscribe information to this list.

Please post information relevant to fighting or making this bill more
constitutional as this bill in both the house and senate makes a mockery
of the constituiton.  This is a non-partison issue that has people on
the right, the left and the middle raising eyebrows.  THIS IS NOT A
RIGHT WING ANGRY WHITE MALE ISSUE!

The listowner (me) is an Angry White Jewish Male who sees grave dangers
should it be voted on in its present state.  This list is not going to be
a discussion list about whether the bill is good or bad, I think it is bad
and it is my list.  So, if you think it is good, then feel free to join, but
do not inhibit or dilute the momentum of this list.  I am a private
individual who pays for the list traffic on the webcom.com service.

If you would like to join you must decide whether you wish to join the
reflected list where each message sent creates a new message in your
mailbox, or the digest which lumps them all together for the day and
sends many messages in one email post.

To Join, send a message to one of the following addresses:

[email protected]      (this is the refelected list)
[email protected]   (this is the digest)
Fromyou
Subject(please leave the subject blank)
-------------------------------------------------
in the body of the message put just one word, the word "subscribe"

You do not have to put your name or email address.

And now a description of the Terrorism Bill


Omnibus Counterterrorism Bill - S. 390 and H.R. 896

New FBI Charter To Investigate Political Groups

     February 10, 1995 the Omnibus Counterterrorism Bill was
introduced as S. 390 into the Senate and as H.R. 896 in the
House. It was initiated by the FBI, and passed on by the Justice
Department and the White House. Senators Biden (D-DE) and Specter
(R-PA) initiated it in the Senate, Rep. Schumer (D-NY) and Dicks
(D-WA) in the House. It has bipartisan support and could get
expedited action.

Summary

* This is a general charter for the FBI and other agencies,
including the military, to investigate political groups and
causes at will. The bill is a wide-ranging federalization of
different kinds of actions applying to both citizens and
non-citizens. The range includes acts of violence (attempts,
threats and conspiracies) as well as giving funds for
humanitarian, legal activity.

* It would allow up to 10 year sentences for citizens and
deportation for permanent resident non-citizens for the "crime"
of supporting the lawful activities of an organization the
President declares to be "terrorist", as the African National
Congress, FMLN in El Salvador, IRA in Northern Ireland, and PLO
have been labelled. It broadens the definition of terrorism. The
President's determination of who is a terrorist is unappealable,
and specifically can include groups regardless of any legitimate
activity they might pursue.

* It authorizes secret trials for immigrants who are not charged
with a crime but rather who are accused of supporting lawful
activity by organizations which have also been accused of
committing illegal acts. Immigrants could be deported1) using
evidence they or their lawyers would never see; 2) in secret
proceedings; 3) with one sided appeals; 4) using illegally
obtained evidence.

* It suspends posse comitatus - allowing the use of the military
to aid the police regardless of other laws.

* It reverses the presumption of innocence - the accused is
presumed ineligible for bail and can be detained until trial.

* It loosens the rules for wiretaps. It would prohibit probation
as a punishment under the act - even for minor nonviolent
offenses.

Implications

* Those who remember the McCarran Walter Act will recognize this
bill, only in some ways this is broader and potentially more
dangerous.

* This bill is highly politicalthe President can determine who
is a terrorist and change his/her mind at will and even for
economic reasons. The breadth of its coverage would make it
impossible for the government to prosecute all assistance to
groups around the world that have made or threatened to commit
violent acts of any sort. Necessarily its choices would be
targeted at organizations the government found currently
offensive. People to be deported would be chosen specifically
because of their political associations and beliefs.

* The new federal crimeinternational terrorism doesn't cover
anything that is not already a crime. As the Center for National
Security Studies notes"Since the new offense does not cover
anything that is not already a crime, the main purpose of the
proposal seems to be to avoid certain constitutional and
statutory protections that would otherwise apply."

* While many provisions of this bill could well be found
unconstitutional after years of litigation, in the mean time the
damage could be enormous to the First Amendment and other
constitutional rights including presumption of innocence and
right to bail.

------------------------------

Date: Thu, 27 Apr 1995 08:14:50 -0700
From: Peter Miller <[email protected]>
Subject: File 4--Ohio Job Opening

Job Posting -- Please Distribute:
================================

         Ohio Community Computing Center Network Coordinator

The Ohio Community Computing Center Network (OCCCN) will be establishing
14 computer centers in low-income neighhborhoods in Cleveland, Columbus,
Dayton, Akron, Toledo, Youngstown, and Marietta. Funding for these
centers comes from the settlement of the Ameritech Alternative
Regulation case before the Ohio Public Utilities Commission. The OCCCN
seeks to hire a part-time Coordinator to assist these centers in
becoming operational and to provide ongoing support and coordination.

The OCCCN Coordinator will be based in Columbus and provide program and
technical assistance to each center, do outreach throughout the state,
and perform statewide administrative duties, under the direction of the
OCCCN Coordinating Committee, as follows:


1. Provide Ohio community computing centers with:

*  assistance in becoming operational;

*  assistance in making telecommunications arrangements for connecting
  centers to each other and to the national information infrastructure;

*  organization development assistance: planning and proposal
  development, fundraising, publicity, and board development;

*  program support: activities suggestions, technical support,
  assistance in choosing software, hardware and consultants, and in
  developing volunteer program;

*  arrange for and participate in on-site visits and regional and
  statewide gatherings/workshops.


2. Do outreach:

*  identify and establish contact with similar programs;

*  develop a pool of associates for the OCCCNetwork and coordinate
  involvement of those doing related work in the region;

*  attend regional meetings and conferences as appropriate.


3. Perform administrative duties statewide:

*  actively facilitate and participate in online conferences for the
  OCCCN;

*  work with funders in developing financial support for statewide
  and local coordination;

*  participate in discussion of directions and goals for OCCCN and
  involve involve centers in those discussions;

*  review periodic financial and performance reports from each center;
  summarize and report to the committee.

*  provide timely reports regarding activity in the above roles.

The OCCCN Coordinators should be familiar with telecommunications and
with either Mac or IBM-compatible systems, their basic applications, and
trouble-shooting skills. The Coordinator should have community
organizing experience and orientation; educational and related community
technology experience will be particularly useful.

Please send resume and cover letter by May 12 to Ellis Jacobs, OCCCN
Coordinating Committee, Legal Aid Society of Dayton, Inc., 333 West
First St., Suite 500, Dayton, OH 45402.

===========================================================
Peter Miller
Playing to Win Network Director
Education Development Center            617/969-7101 x2727
55 Chapel St.                           FAX: 617/ 969-4902
Newton, MA 02158                         [email protected]

------------------------------

Date: Sun, 30 Apr 1995 19:57:07 +0000
From: [email protected](heath bunting)
Subject: File 5--making reality acceptable: cybercafe @ compress

                        cybercafe @ compress

when the external can not be understood
we DESIRE its transformation into our internal form

if you have anything you can not cope with
(e.g. ideas/people/cultures)
please send them to cybercafe and we will restructure them
for your pleasant CONSUMPTION

this will be accomplished using the new technique of
private SUBJECTIVE compression instead of public objectivity

(compression is the process of interpretation often resulting in LOSS)

subjective compression works through SELF reference and paradox.
searching recursively for the WHOLE in smaller and smaller
sections of itself, until all you have left is YOU.

when the world is like us we will no longer desire CHANGE

send the undigestible to:
4 egmont house
116 shaftesbury ave
london wv1 7dj
uk

or via our web form
http://www.cybercafe.org/cybercafe/compress.html

heath

cybercafe aims to promote/create spaces/situations in which
people can create/behave/express/experience
in ways unavailable in currently existing places

Domains of activity radio/tv/telephones/fax/
mailart/flyposting/performance/computer.

=-=-=-=-=-=-=-=-=-= uphold dignity/creativity =-=-=-=-=-=-=-=-=-=

[email protected]                           vox 44 171 437 8584
http://www.cybercafe.org/cybercafe/           mbl 44 374 823 840
flat 4, 116 shaftesbury ave                   bbs 44 171 439 3998
london w1v 7dj UK

------------------------------

Date: Thu, 27 Apr 1995 08:23:46 -0700
From: Peter Miller <[email protected]>
Subject: File 6--Playing to Win in DC June 1-4

For Immediate Distribution:

        PLAYING TO WIN COMMUNITY COMPUTING CENTER NETWORK
            Hosts 4th Annual Meeting in Washington DC
              Friday, June 2 - Sunday, June 4, 1995
          Future Center at the Capital Children's Museum
            800 Third Street NE -- near Union Station

             Thursday, June 1, 7:30 pm Kick Off with
      Working Group Against Information Redlining Forum on
  "Disenfranchised Communities and the Information Superhighway"

=======================================================================

Summary Program Schedule

Preliminary Program Thursday, June 1   7:30-9:30 - see below

Friday, June 2 -  9:00 am to 7:00 pm

Registration & Continental Breakfast
Panel presentation:
   Issues of Access: The Best of Times, The Worst of Times --
   * Mario Marino, Chairman, The Morino Institute, Reston, VA
   * Laura Breeden, Director, Telecommunications and
     Information Assistance Program, Washington, DC
   * James Ferguson, Executive Director, National Coalition on
     Black Voter Participation, Washington, DC
   * Lauren-Glenn Davitian, Coordinator, Chittenden Community
     Television, Burlington, VT
Focus Groups
Keynote Speaker: Elliot Soloway, Ph.D., Associate Professor of
   Electrical Engineering & Computer Science, Artificial Intelligence
   Lab, University of Michigan
Concurrent Presentations & Workshops:
         Starting a Community Technology Center
         Technology and Literacy
         Managing Community Technology Programs
         The PTW Network -- IGC Training for New Users
         Role of Math and Science in Community Technology Programs
         Volunteers: How to Find Them/How to Keep Them
Reception sponsored by The Morino Institute

Saturday, June 3    9:00 am to 5:45 pm

Registration & Continental Breakfast
Affiliate Presentations & Workshops:
         The Whys and Hows of Public Access
         Multimedia Projects
         Integrating Technology: Video and Computers
         IGC Telecommunications Training for Experienced Users
         Role of Telecommunications in Community Technology Programs
         Exploring Internet Resources
         Telecommunication Projects
         Tools Play: Using basic computer tools to create learning games
         Math & Science Projects and Resources
         Program Assessment and Evaluation
The PTW Network Agenda: 1995-96 and Beyond

Sunday, June 4   9:00 am to 1:00 pm

Regional and Steering Committee Meetings

+ + + + + + + + + + + + + + + + + + + +

Conference co-sponsors: The Capital Children's Museum, The Morino
Institute, The Legent Corporation, the National Science Foundation,
and Playing To Win, Inc.

Goals:

To provide opportunities for personal networking and for exchanging
information and experiences.

To enhance community-based technology programs by providing
technical training and program development information.

To explore and understand issues related to providing equity in
technology access at the local, regional and national levels.

Description:

The Annual All-Affiliates Meeting of The Playing To Win Network
brings together Network affiliate members, potential affiliates,
associates, friends, supporters and other persons interested in
learning more about how community-based technology programs can and
do provide technology access to underserved and disenfranchised
peoples. In addition to gaining practical program development
information, participants will learn how programs throughout the PTW
Network are working and collaborating to open the doors to
technology in their communities. Panel discussions, workshops, and
training sessions will be led by affiliate members, PTW Network
project staff and consultants, as well as representatives from
public policy and public interest organizations. Opportunities for
informal socializing will include group lunches and a Friday night
reception sponsored by The Morino Institute.

Registration and Lodging:

Representatives of the PTW Network and conference presenters do not
pay a registration fee. All other participants are charged $25 to
attend the conference ($35 at the door). To register in advance for
any day of the conference, contact Ruth Rappaport at [email protected],
or 800/225-4276 x2329, with your name, address, organization, and
phone, and note whether you would like to take advantage of any of
the reserved lodging and for what dates. A block of rooms has been
reserved at the Radison Barcelo ($100 single; $113 double) and
Carlyle Suites ($89; $99) Hotels.  A  detailed conference information
packet will be mailed to all registered participants in May. This
packet will include the final program, schedule, maps, and
transportation information.

Travel:

Discounted airfare is available from US Air. Contact: Sally Kahn,
Stewart International Travel, 800-441-8666.  Tell her you are attending
the PTW Network Conference in Washington DC.


=======================================================================

   DISENFRANCHISED COMMUNITIES AND THE INFORMATION SUPERHIGHWAY
                         Co-Sponsored with
         THE WORKING GROUP AGAINST INFORMATION REDLINING

               Thursday, June 1st, 7:30 -- 9:30 p.m.
                       Radison Barcelo Hotel
                          2121 "P" St. NW

The Working Group Against Information Redlining, a coalition of
primarily Washington-based organizations concerned with low-income
community access to the National Information Infrastructure (NII),
and the Playing to Win Network of community technology centers invite
you to join us on June 1, from 7:30 to 9:30 p.m. to exchange ideas
and information on our efforts to ensure that the gap between the
haves and have-nots is not replicated (much less widened) in the
deployment of the Information Superhighway.

At the meeting on June 1st, we will distribute information about the
proposed community telecommunication forums and resources we are both
planning. We will want to discuss with you your possible
participation and your ideas about content and community needs.

WHAT WE ARE ABOUT:

Universal access has become a major concern in building the NII.
Community-based non-profits in rural and disdvantaged areas lack
affordable access  to the information superhighway as well as a voice
in the development of  the content it will carry. Will the
information be relevant to community  needs?  Will people have the
capacities and resources to make use of it and be active
contributors? If so, how will that be determined?

There is growing interest in people speaking for and about low-income
and other disenfranchised individuals. However, there is little in
the way of these individuals speaking for themselves in order to
shape the debate and policies in ways beneficial to them.  In the
long run, empowering affected populations to speak for themselves
will be essential. Resources for using the NII are limited:  when and
where communities have come to understand the real opportunities this
"highway" could open up for them -- access to education and
educational resources, access to medical information and (potentially
treatment), access to needed governmental information and benefits,
training opportunities, job opportunities -- they don't have the
resources (financial, human, or technical) to take advantage of what
is already available. Capacity building will be an essential
component even if the NII is technically designed to reach all
people.

Toward this end, the Working Group Against Information Redlining has
been meeting on a monthly basis since May 1994. The groups
participating -- OMB Watch, RTK NET (the Right-to-Know Network), the
Benton Foundation,  Alliance for Public Technology, Alliance for
Community Media, the National Council of Nonprofit Associations, the
National Trust for the Development of African American Men, the
National Consumer Law Center and numerous others -- have developed a
proposal for community forums on non-profit access to and use of the
NII. The Playing to Win Network, consisting of over 50 neighborhood
community technology programs, is currently planning a program
focusing on using telecommunications to heighten participants'
interest in and involvement with local, state, and national policies
upon which their technology access rests.

These community forums and center resource projects will be discussed
at the June 1st gathering. For more information on the June 1st
program or either project, contact:

Patrice McDermott                   Peter Miller
OMB Watch                           Playing to Win Network
[email protected]              [email protected]
202/234-8494                        800/225-4276 x2727

------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST <your name>
Send it to  [email protected]
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
        Brussels: STRATOMIC BBS +32-2-5383119 2:291/[email protected]
        In ITALY: Bits against the Empire BBS:  +39-464-435189
        In LUXEMBOURG: ComNet BBS:  +352-466893

 UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                 ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                 aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                 world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                 uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                 wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
 EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                 ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

 JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                 ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
 URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
           the views of the moderators. Digest contributors assume all
           responsibility for ensuring that articles submitted do not
           violate copyright protections.

------------------------------

End of Computer Underground Digest #7.34
************************************