免费国产一级毛卡片视频app

    1. <form id=HNqrReUUs><nobr id=HNqrReUUs></nobr></form>
      <address id=HNqrReUUs><nobr id=HNqrReUUs><nobr id=HNqrReUUs></nobr></nobr></address>

      Personal tools

      Spring1994.txt

      The CPSR Newsletter

      Volume 12, No. 2 COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY Spring 1994

      COMPUTERS AND EDUCATION

      COMPUTERS AND THE DESKILLING OF TEACHING

      Page 3

      NH IN EDUCATION: ACCESS ISN'T ENOUGH

      Page 4

      CAN'T WE EDUCATE ALL OUR CHILDREN?

      Page 6

      THE SOCIAL CONTEXT OF EDUCATIONAL COMPUTING

      Page 7

      MULTIMEDIA: A LIMITING TECHNOLOGY OR A CHANCE FOR CHANGE?

      Page 10

      COSTS AND BENEFITS OF COMPUTERS IN HIGHER EDUCATION

      Page 15

      CLIPPER: GOVERNMENT SPONSORED, GOVERNMENT COMPROMISED ENGRYPTION

      Page 22


      Technology in Education: Everybody's Business
      Judith Stern

      CPSR/Berkeley

      In this issue of the CPSR Newsletter we focus on education. As computer professionals, we need to be
      concerned about what happens in education for two reasons. One is that technology is increasingly used
      as a tool in educational settings. The other is that education is essential in our increasingly
      technological society.

      The articles in this newsletter focus largely on the ways in which technology is used in education and
      how it affects those involved脩teachers, students, institutions, and society as a whole. Even so, we've
      had to limit our focus to the learning that happens in schools, ignoring less formal educational settings,
      such as libraries, community centers, homes, workplaces, end Job training centers.

      The articles cover topics that are receiving a lot of press today, but with a perspective, often critical,
      that is missing in the mainstream press. We've seen enough articles that get us excited about the
      tremendous potential that technology offers in the educational realm: .

      CPSR's role, however, is to go beyond the hype, acting as a watchdog. So, in this newsletter, Michael
      Apple discussses how technology negatively affects the profession of teaching. In a brief report
      summarizing some current Internet-based projects, Philip Bell and I point out a few things that we
      need to watch out for when it comes to the use of the National Information Infrastructure

      (NII) in education. Hank Bromley warns about how technology use in education can often reproduce
      inequities in society. For those who are hearing all about multimedia, Brian Harvey points out how,
      counter to what it may seem, multimedia can actually be very limiting. Christopher Hoadley and Sherry
      Hsi provide a counterpoint to Brian's article, but in doing so provide their own warnings about how
      educators need to approach this technology. Finally, Marsha Woodbury spells out both the benefits and
      costs of using computers in higher education.

      Far from throwing our hands up in despair, however, there are plenty of things that CPSR members
      can do if we're concerned about education. As Mike Brand et al. stress in their article in this issue, it is
      urgent that we educate all our children, and this can only be done if we stop distributing educational
      resources so unfairly. CPSR/Berkeley's A Computer and Information Technologies Platform (1992)
      reads:

      We reaffirm that quality education is a basic human right. We call for full funding for education
      through the university level to insure that everyone obtains the education they need to participate in
      and contribute to the "Information Age. " Education must remain a public resource. .. . The public
      education system must provide students with access lo computers as well as the critical and analytical
      tools necessary to understand, evaluate and use new technologies.

      Beyond the ever important goal of working towards equality, here are some specific suggestions for
      action, contributed by CPSR members Rick Crawford, Brian Harvey, Jeff Johnson, Aki Namioka,
      Marsha Woodbury, and BMUG member Gretchen Brewer:

      Raise consciousness. Start by understanding the issues yourself. Read the articles in this newsletter,
      and other places. Always read critically! Don't let the media, politicians, administrators, or anyone else
      get away with promoting simplistic technological fixes to educational problems. Try to make sure that
      technology is used in responsible ways. Find out if your state has a statewide plan for technology, and
      try to influence its development. Write letters to the editor. Attend public school board meetings. Talk
      to parents and others in the community about your concerns.

      Donate equipment to schools. There are organizations that will make sure your donated computer gets to
      a school that can use it. If you want to donate directly to your local school, don't get angry if your offer
      is rejected脩the school may not be able to make use of your particular computer because it's too old,
      because it is incompatible with equipment they already have, or because they're lacking the technical
      support to make use of it. It's often better to donate via an organization that matches equipment to needs.
      Some examples: Detwiler Foundation is working with the California Department of Education to place
      donated computers in schools. Call (619) 456-9045. In the San Francisco Bay Area, Computer
      Recycling Center (415-428-3700) takes donations of computers and peripherals and places them in
      educational settings.

      Volunteer in a school or other learning institution. Oftentimes technology isn't used because teachers
      lack necessary support. There are a variety of levels at which you can offer to help, such as setting up
      equipment, advising on hardware and software purchases, providing ongoing technical support, or
      teaching students or teachers about technology with which you are familiar.

      Right now, many classrooms need help getting on the Internet. Some states, including Texas, North
      Dakota, Virginia, Florida, and California, provide low-cost or free connections for schools, but often
      specific schools and teachers don't know about it, or how to take advantage of it.

      Again, there are organizations that are great for matching up your technological skills with existing
      needs. Some examples: The CoNECT project, in the Boston area can use | volunteers at all levels of
      participation; volunteer coordination is being taken care of by Vivienne Begg of the ACM, who is also
      collecting names of volunteers who want to I work in schools outside the Boston area. Contact
      conect@musenet.bbn.com. Also, consider volunteering to help outside of schools. Check out the
      "Community Computer l Center" movement: read Peter Miller's article in the Fall 1993 issue of the
      CSPR/Newsletter (Volume 1 1, No. 3). (He's got a listing of Community Computing Centers
      nationwide.)

      And don't overlook volunteering to use your non-technological skills. We need people to teach literacy
      more than we need people to teach computer literacy.
      Help students prepare for jobs. Visit the school and give a presentation on what your job is and what
      your company does. Invite students to visit your workplace. Set up partnerships between your
      company and a local school. Most valuable: take on apprentices; give a teenager an opportunity to do real
      work.

      We all know the importance of education to society. Let's all do something about it.

      Computers and the Deskilling of Teaching

      by Michael W. Apple
      John Bascom Professor of Education The University of Wisconsin, Madison

      We are repeatedly told that unless we have a "technologically literate" work force we will ultimately
      become outmoded economically. This has created immense pressure on schools to quickly, and often
      relatively unreflectively, get large numbers of computers in schools and to institute 'computer
      literacy" classes for their students. Yet, as I have shown in both 'reachers and Texts (Routledge, 198X)
      and Official KnowIedge (Routledge, 1993), not only are these economic claims more than a little
      inaccurate, the proposals for a technological future in schools have little understanding of some of the
      most major negative consequences of such a technological fix, especially on the lives of teachers.

      A helpful way of thinking about these consequences is to employ the concepts of deskilling and
      intensification These concepts signify a complex historical process in which the control of labor has
      altered, one in which the skills that workers have developed over many years are broken down and
      reduced to their atomistic units, automated, and redefined by management to enhance profit levels,
      efficiency, and control. In the process, the employee's control over timing, over defining the most
      important way to do a task, and over the criteria that establish acceptable performance, are slowly
      taken over as the prerogatives of management personnel who are usually divorced from the place where
      the actual labor is carried out. Loss of control on the part of the employee is almost always the result.
      Pay is often lowered. And the Job itself increasingly becomes exactly that脩just a job脩as it becomes
      routinized, boring, and alienating as conception is separated from execution and more and more aspects
      of jobs are rationalized to bring them into line with management's "need" for increased
      "accountability," control. and "cost effectiveness."

      These processes are not limited to what have been called working class positions. The separation of
      conception from execution, for example, has expanded rapidly into professional labor as well. Let us
      take as a prime instance the aforementioned pressure to bring the unbridled benefits of the new
      technology into the classrooms of America. Given these kinds of pressures, what may happen to teachers
      if the new technology continues to be pushed into schools in an uncritical way?

      One of the major effects of the current (over) emphasis on technologizing classrooms may be the
      deskilling and depowering of a considerable number of teachers. Given the already heavy workload of
      planning, teaching, meetings, and paperwork for most teachers, and given the fiscal crisis that is
      having such a negative impact on so many school districts throughout the country, it is probably wise to
      assume that very few teachers will actually be given more than a tiny amount of training in computers,
      programming, their positive and negative social effects, and so on. This will be especially the case in
      our elementary schools where teachers are already teaching a wide array of subjects. Research
      indicates in fact that few teachers in any school district are actually given substantial information
      before computer curricula are implemented. Often only one or two teachers are the resident "experts."
      Because of this, most teachers have to rely on pre-packaged sets of material, existing software, and
      specifically purchased material from the scores of software manufacturing firms that aggressively
      market their products, the vast majority of which have quite questionable educational merit.

      All of this is happening in a time when teachers' labor has become "intensified." There is ever more to
      do as widespread economic and social problems are given over to the school to supposedly solve. Thus,
      time is at a premium. Time to evaluate these purchased computer programs and even to learn how to use
      them is nearly nonexistent.

      The impact of this can be striking. What is happening is the exacerbation of trends we have begun to see
      in a number of nations. Instead of teachers having the time and the skill to do their own curriculum
      planning and deliberation, they become the isolated executors of someone else's plans, procedures, and
      evaluative mechanisms. In industrial teens (and we need to remember that like many other
      professionals. teachers are workers employed by the state), this is an aspect of the transformations of
      the paid labor process I noted earlier脩the separation of conception from execution.

      This reliance on prepackaged software脩without either the thne or resources to sufficiently evaluate its
      real educational worth脩can have a number of long term effects. It can cause a decided loss of Important
      skills and dispositions on the part of teachers. When the skills of local curriculum planning, on which
      so much of progressive, community based, and culturally responsive pedagogy is based, are not used
      they can tend to atrophy. The tendency to constantly look to one's own or one's colleagues' historical
      experience about curriculum and pedagogy is considerably lessened as most major parts of the
      curriculum, and the teaching and evaluative practices that surround it, are viewed as something one
      purchases. Substantive skills, including the ability to design relevant experiences for those students
      who are least likely to find a culturally responsive curriculum in schools, are lost through lack of use
      over time. And in the process脩and this is very important脩the school itself is transformed even more
      into a lucrative market as all manner of material is introduced. While the situation has improved in the
      last ten years since the following statement was issued by the director of software evaluation of one of
      the largest school systems in the United States, his claim that of the more than 10,000 computer
      programs currently available less than 200 are educationally significant still has power. The effects of
      this on students, as well as on the labor process of their teachers, has not been given the attention that
      it deserves.

      My point in these brief comments is not to take a neo-luddite position. There are many interesting,
      socially critical, and pedagogically creative uses to which computers can be put in schools throughout
      the country. Rather, I want to argue in the strongest possible terms that unless we situate the
      introduction of this technology back into the social reorganization of the labor processes that many
      professional employees are now experiencing, we may be reproducing some of its most deleterious
      effects into schools. Teachers and students are too important to let this go on uncritically.

      VOLUME 12, No. 2 The CPSR Newsletter SPRING 1994

      NII in Education: Access Isn't Enough

      by Philip Bell and Judith Stern
      University of California at Berkeley

      "For every complex question, there is a simple answer and it's wrong. "

      脩H. L. Mencken

      Everybody, especially CPSR, is talking about the NII. What then are the NII-related issues for
      education? Access is obviously the primary (and most often cited) concern. It is clear that we must
      ensure that the information resources are made available to all schools. However, it is equally
      important not to confuse "equal access to information" with "equal learning potential." Educational and
      cognitive research definitively show that pedagogy is not that simple.

      As always, there is a danger that technology will be seen as the solution to our most pressing and
      complex problems. This invariably leads to band-aid treatments for very deep wounds. As politically
      and socially unpalatable as it obviously is: complex problems脩with education being about as complex as
      they come脩necessitate comprehensive and complex solutions. For example, the following (taken from a
      recent newspaper article) presents a potential application of NII technology:

      A single physics teacher beamed by satellite or as blips of light on a fiber channel could provide
      university-quality education to all the 11th grade students in Texas. Teacher's aides on site could help
      students study for tests; telephones, video cameras and computers could allow for direct interaction
      with the physics superstar. The courts would get the equality of education they want, because students
      in the poorest districts would get exactly the same lesson as those in the richest. (emphasis added)

      Here we have a scenario where it is assumed that technology can single-handedly solve a very serious
      problem we have in this country脩educational inequity. The author demonstrates a lack of
      understanding, not about the technology involved, but about education. Learning does not occur simply
      by presenting and testing on the "correct" material脩even if the presenter is a "superstar." It is
      important to realize that children are not blank slates into which we can pour information. Research
      clearly shows that students bring initial conceptions to the classroom based on their individual life
      experiences. Working with these initial conceptions presents the bridging opportunity for showing
      students how school subjects relate to their own lives脩thereby keeping them interested, involved, and
      learning in a more robust and integrated fashion. Learning occurs when students actively build upon
      their own knowledge and cooperatively interact with peers and teachers. This student-centered and
      inquiry-based approach to education (usually labeled "constructivism") then becomes part of the
      necessary fabric for weaving a technological approach to education. It dramatically changes the tenor of
      that approach and is also dependent upon factors extending beyond the technology as well.

      Of course, many social and economic factors must be taken into account. Referring back to the NII
      example, sending a video image of a great teacher to poor school districts just isn't going to do the trick.
      Learning in rich and poor schools will still be remarkably different because of such factors as: the
      number of students per teacher, the quality of the teachers (often dependent upon what the school
      district can afford to pay), and the availability of other resources (desks, books, paper, pencil,
      supplementary materials, laboratory equipment)脩not to mention external factors such as whether the
      students are hungry or are having to deal with drugs and violence on or off campus.

      It is obviously beyond the scope of this article to present a comprehensive treatment of educational
      reform. In fact, true reform represents one of the greatest challenges facing society today. But at the
      same time, as we forge ahead let's not fool ourselves into thinking that the real problems of education
      are going to be solved by the NII or any other technological innovation. Therefore, a better approach is
      to make sure that the way we use technology for education is consistent with what we do know about
      learning. A few current Internet-based projects can give us a feeling for how the NII could be used in
      education. (Please note that this is just a small sampling of what's going on around the country.)

      The Kids as Global Scientists (KGS) project, based in Boulder, Colorado, has middle school students
      using the Internet to investigate atmospheric science concepts by analyzing different representations of
      weather phenomena and communicating with other students from all over the world on relevant issues
      and real-world phenomena. They have characterized the types of Internet-based knowledge available to
      their students as today's knowledge (recent information that can be obtained quickly) and interactive
      knowledge (information that students can obtain by interacting with first-hand sources). KGS builds
      upon the constructivist approach, recognizing that learning happens only when students can work with
      and build on their own ideas. Currently, however, says principal investigator, Dr. Nancy Songer, "a
      large majority of K-12 Internet-available activities do not permit two-way, interactive
      communication. This encourages a relatively passive model of student interaction which is based on the
      assumption that others are contributing important knowledge which Our student should know about and
      use."

      To counteract this idea of students as receivers of knowledge, Songer and her research team at the
      University of Colorado, are developing curricula and software which will make the Internet a "child-
      focused" resource, one in which students are "empowered to make the Internet an interactive resource
      which has nodes of information developed, maintained. and focused for themselves."

      Learning Through Collaborative Visualization (CoVis), a research project based at Northwestern
      University, is attempting to transform science education by allowing students to engage in activities
      that resemble the question-centered, collaborative practice of real scientists. Students study
      atmospheric and environmental science using state-of-the-art scientific visualization software which
      has been specifically modified to be an appropriate learning environment. Students are provided with a
      "collaboratory'' workbench which includes video-teleconferencing, shared software environments,
      access to Internet resources, a multimedia notebook, and the scientific visualization software. CoVis
      emphasizes the social nature of learning by encouraging students to become enculturated into a
      community of scientific practice and explores how networking and remote communication can play an
      integral role.

      Finally, in a unique program at Richmond High School in Richmond, California, junior and senior high
      school students learn to manage and use a vast array of computer tools, including Internet tools. Here,
      125 low-income students in the Computer and Business Partnership Academy essentially run their
      own computer system. These are students that are not necessarily thinking of going on to college. And
      typically, such students would get very little exposure to technology脩let alone be encouraged to control
      it. But here, teacher Les Radke teaches all his students to use the simple tools of the Internet (telnet,
      ftp), as well as Mosaic, gophers, veronica, archie, and WAIS. Some are creating their own MOO. Others
      are learning HTML and setting up a World Wide Web server (the first thing they're putting on it is a
      memorial to a recently murdered fellow student). Students serve as the Unix system administrators.
      and others manage the 10-base-T network in the school. The important thing to note is that these
      students are in control of technology and their own learning; they're not being controlled.

      Although we have been arguing that technology is tar from being a panacea for educational problems, we
      do believe it can figure prominently in the solution. Indeed, computers offer very unique capabilities
      for education, and the resources associated with NII, in particular, can be used to augment learning if
      they are appropriately harnessed to encourage the social nature of learning and allow for individual.
      interactive access to information.

      Can't We Educate ALL Our Children?

      by Mike Brand, Phd, Marc Steiner, and Ed Zeidman, Phd.

      The crisis in American education is well documented and frequently written about. There is no shortage
      of descriptions of the two-tiered educational process which continues to develop and characterize the US
      education system. A shrinking minority of students is trained to take its place within a shrinking
      hightech job base. For these students, Email and Cyberspace are realities that indicate the potential of
      electronic technology to uplift the educational level of at least the chosen few. But an increasing
      majority are not so fortunate. For them, growing class size and a decreasing level of expenditures per
      child characterize a school system that is increasingly unable to educate its pupils. Here, hi-tech
      applications are either absent or so inefficiently used as to be worthless. (See Bromley article on
      facing page).

      Thus, the use of hi-tech within the education system is fully consistent with the structural inequality
      that characterizes the system as a whole. The use of technology is often recognized as a factor which
      favors the better off students. That is certainly true. Educational technology is just one more resource
      that is increasingly available to the better-off kids while the poorer kids go without. Thus, the historic
      situation in which education or lack thereof becomes a cause (excuse) for economic and social
      inequality is reinforced.

      It will only be when the educational system as a whole is radically democratized and when the poorer
      school districts no longer are forced to go without, that the most useful applications of technology, as
      well as other resources, will be discovered.

      POVERTY AND EDUCATION

      It is sometimes not appreciated that it really is possible to educate all our children. Once adequate
      resources are provided, the possibilities for uplifting the educational level of society are boundless.
      But they are real. Yet, the educational gap is widening. So are the per pupil expenditures among school
      districts. We all know of cases throughout the US of impoverished city public schools that spend
      substantially less per pupil and pay less per teacher than their suburban public school neighbors (to
      say nothing of the private elite institutions). For example, Baltimore City spends about 20% less per
      pupil than its more prosperous neighbors. And the highest predictor of student performance in
      standardized tests continues to be the poverty level. By the time kids finish high school, if they finish,
      the die is cast. More than 25% do not finish. In many so-called inner city school systems 50% or more
      do not finish. And at least 25% of those who do finish are not prepared for either higher education or
      employment. In the main, students' accomplishments are restricted by where they go to school. Self-
      fulfilling prophecies abound. Kids who are poorly taught do not learn. Kids who are not expected to do
      well, do not do well. Kids (fewer and fewer) who are judged to be bright "bright," act "bright." Kids
      with no future and nothing to do act like kids with no future and nothing to do etc., etc. With the
      exactness with which Adam Smith's "the invisible hand of God" regulates the free market system, the
      educational system helps the economic classes reproduce themselves from generation to generation in
      "proper" proportion to each other to supply the economy with properly trained, but not too trained,
      workers.

      DISPARITY BETWEEN POSSIBILITY AND REALITY?

      To account for the disparity between possibility and reality we look at the interconnection between
      economics and control of public policy. In the economic arena, the application of electronics to the
      production of goods and services eliminates the amount of labor needed for their production. Thus, it
      shrinks demand for educated (and uneducated) workers below the number of workers available. AT&T's
      announcement of the elimination of 15000 jobs raises its recent total to 100,000. It is a small part of
      a growing phenomenon. In 1993 there were more layoffs at service jobs than in manufacturing.
      Moreover, it is becoming clear that the way life-sustaining resources such as education (and health
      care and housing, for that matter) are allocated is according to the economic and social interests of the
      dominant elite. They will not pay to educate or otherwise adequately care for those whom they do not
      need. Thus, educational technology as well as other educational resources remain in the hands of only
      those with money to buy them. Hardly what we can call equality of opportunity.

      It is not possible to predict the specifics of the path to adequate technology for public school students in
      the US. None-the-less, we should point out that the struggle for equal, quality education is rooted in the
      history of the US. (Recall Brown vs. The Board of Education). There is currently a growing movement
      of students, parents and teachers who are fighting for equal, quality education. There is already an
      organized effort to shape the NII in the public interest which is expressed in the program of CPSR. The
      movement is in primitive stages, but it's a beginning.

      [Brand and Zeidman teach Math at Essex Community College in Baltimore, Maryland. Steiner hosts The
      Marc Steiner Show on WJHU in Baltimore.]

      The Social Context of Educational Computing

      Hank Bromley CPSR/Madison

      Understanding the full educational impact of any computer-based curriculum necessarily involves
      matters well beyond the technical, and even well beyond the classroom. Many proposed computer
      curricula acknowledge the shortcomings of previous initiatives, yet make recommendations still
      addressing only technical questions. My frustration with such purported "advances" led me to the
      conviction that ongoing social dynamics in (and beyond) the classroom, long pre-dating the introduction
      of computers, are of crucial importance. No matter how painstaking the design of a computer-based
      curriculum, what actually happens when it reaches a given classroom will depend partly on what's
      already going on in that classroom. How the new technology gets swept up into its users' pursuit of their
      preexisting goals脩in essence, the context of use, the effect of the social environment on educational
      computing脩is the subject of this article.

      One of the most noticeable influences on schools these days is the increasing application of economic
      reasoning to their activities. Under pressure from many quarters to improve their "productivity," to
      yield a higher level of measurable student performance with little or no increase in funding,
      educational institutions are increasingly being run as businesses.

      Such pressure to "produce" more efficiently is one of the many reasons for the influx of computers.
      Just as their use in the business world enables firms to produce more with fewer employees, it is
      hoped that computerizing the operations of the educational world will enable more learning to happen,
      especially individualized instruction, without hiring more teachers Unfortunately for this line of
      argument, tar from saving money, adding computers to the classroom commits the school to additional
      spending in the future (for software, equipment upgrades, maintenance, staff training, etc.), and
      actually increases teacher workload rather than reducing it. (Ronald Ragsdale cites several studies
      demonstrating the added burden on teachers on page 207 of his book Permissible Computing in
      Education)

      Under pressure from many quarters to improve their "productivity," to yield a higher level of
      measurable student perfomance with little or no increase in funding, educational institutions are
      increasingly being run as businesses.

      With teachers already pushed to the limit as schools "streamline" their operations, adding new
      responsibilities is practicable only if something else is dropped. Reducing class sizes would be a
      healthy solution, but that would mean spending more on teacher salaries, just the opposite of the
      economies computer advocates are promising. Some even suggest computer purchases should be funded
      by increasing class sizes further to save on salaries.

      The argument from economic efficiency just doesn't hold. Other pedagogical innovations, like peer
      tutoring programs, produce better results more cheaply, without consuming resources from all sides
      as computers do. (Marc Tucker cites research to this effect in his article in Journal of Communication,
      vol. 35, no. 4.) Introducing computers to schools does offer some benefits, but saving money isn't one of
      them, and if they are introduced in a manner that presumes spending reductions, then some other
      necessity will inevitably be ousted, especially at a time when shrinking resources at all levels of
      government have made it extremely difficult for many school districts to keep up with overdue building
      maintenance, buy up-to-date textbooks, or even, in some cities, keep schools open for the requisite
      number of days each year.

      But given that the computers are there, and the teachers are short on time (increasingly so, due to the
      computers and their effect on school budgets), the computers do get used. And exactly how are they
      used? Of the various kinds of instructional software available, one is notably more responsive to the
      pressures schools are under to boost their "efficiency" and the predictability of their "output": drill-
      and-practice programs. Such software allows precise control over, and tracking of, student activities.
      The activities themselves are arguably much impoverished, but the programs do train students to
      perform at known levels on multiple choice exams, thus satisfying the call for efficient and predictable
      output. A study by Michael Apple and Susan Jungck (chapter 6 of Apple's book Official Knowledge)
      shows how the day-to-day realities of teachers' lives leads a conscientious set of professionals to
      employ an utterly routinized and vapid computer curriculum, simply because it was already prepared
      (freeing them from having to write one) and kept the students busy (freeing the teacher to complete
      other tasks). Perversely, the least intellectually engaging instructional software can become the most
      attractive to teachers脩for keeping students wholly occupied, in a known activity with few surprises to
      require the teacher's attention, for a predictable amount of time脩because of work conditions brought
      about partly by the very reforms touted as freeing teachers to spend more time working with students
      individually. [For more on how teachers are affected see page 3.

      From a technical point of view, the computer is just as amenable to running an open-ended simulation
      as a drill-and-practice program. But in the current social context you tend to see one a lot more than
      the other, because it's much easier to measure a student's performance on a standardized test than to
      verify that she has learned, for instance, to ask good questions.

      One may also see a lot of computers sitting in schools without any well thought-out plan at all for what
      to do with them. This phenomenon is a result of pressure on school officials to do something脩anything脩
      about America's faltering economy, about Japanese and European competition, about students' job
      prospects, about the impending information age. The problem of how to appear to be doing something
      about these assorted crises is easily solved: buy some computers. The problem of how then to render the
      machines educationally useful is a good deal more challenging. Outcome: swarms of classroom computers
      without a clear mission. Expensive public relations insurance, paid for out of instructional funds.

      Another way economic rationality is visible in the educational realm is in the treatment of schools as a
      source of profits. With several million microcomputers already in U.S. schools alone, educational
      institutions are, of course, a significant site for the sale for both hardware and software. But selling
      directly to schools is only one way to make money from them; another is to package access to their
      inhabitants as a product to sell someone else. Whittle Communications transmits Channel One into over
      10,000 schools. The satellite-delivered news program, carrying paid advertisements, is notable for
      converting students themselves into a commodity, as Whittle sells its sponsors access to its captive
      audience. One can also generate profits via the schools by enlisting them to train students to be
      consumers of one's products, creating a future customer base. It is no coincidence that regional
      telephone companies are generously underwriting school purchases of computers at the very same time
      they are busily merging with cable television operators in preparation for offering new information
      services piped into our homes. For the new products to be profitable, someone has to buy them.

      Pressure to add computers to the curriculum also stems from concern over how well schools are
      preparing students for the workplace. (I should note that views differ on how much schools should
      emphasize training in job skills; some might say the primary function of schools should instead be
      teaching students how to be active citizens, or passing on the collected knowledge of our predecessors,
      or establishing some sense of community in a nation of many cultures. But concerns over job skills are
      prominent at present.) Many claims about how schools "need" to change begin with discussions of how
      the workplace has changed recently. There is much talk about the "post-Fordist" mode of production,
      and "flexible manufacturing systems." In the new economy, the story goes, firms must be adaptable,
      opportunistic, quick to respond to constantly changing circumstances, "lean and mean," all of which
      implies considerable dependence on information technologies to track both external conditions and the
      firm's operations. And the new firm needs a new worker: rather than being a cog in the machine, she
      must exercise responsibility, recognize what needs to be done and do it, solve problems creatively.

      Accordingly a new education is called for: to thrive in a work environment involving continual shifting
      to new tasks, students will need to become self-motivated learners, prepared to keep acquiring new
      skills their whole lives; they'll need to be adept at "critical thinking"; and most of all, they'll need
      proficiency with the high-tech equipment that will typify their work environment.

      So what's wrong with this story? For one thing, it blames schools for problems they can't solve. It is
      simply not the case that the failure of the schools to provide enough of this new kind of worker is what's
      constraining the economy. Even if every graduate matched the profile of the post-Fordist worker
      perfectly, there still wouldn't be post-Fordist jobs for them. Although the occupations with the greatest
      rate of growth are in prime, high-tech fields, the actual number of such jobs being created is quite
      modest, as the high percentage increases are from a small initial base. The bulk of the growth will be in
      far less attractive fields. The Bureau of Labor Statistics now projects that the occupation in which the
      most new jobs will be created over the next decade is salesperson, followed by nurse, cashier, general
      office clerk, truck driver, waiter/waitress, nursing aide, janitor, and food preparation worker (chart
      in The New York Times, March 12, 1994, p. A7). Even though nurses are relatively well-paid, the
      median wage across all these occupations is approximately $14,500, and new entrants are likely to
      start well below the median. Furthermore, full-time, permanent jobs are in short supply, even in
      these fields; ominously, the temp agency Manpower has recently become the largest employer in the
      country.

      Clearly, what the post-Fordist labor market presents is not a ravenous demand for as many self-
      motivated, multiply skilled, critically thinking young people as can be supplied, but a split demand, for
      a few such fortunates, and a much larger population shunted into marginal and temporary work, at best.
      The "flexibility" in flexible manufacturing includes payroll flexibility, wherein the employer adds and
      drops workers immediately as they're needed. Moreover, even for those working consistently, and in
      highly technologized environments, high-tech schooling is largely irrelevant. Productivity on the job
      is essentially unrelated to what happens in school, and the skills needed are overwhelmingly acquired in
      the workplace (see Randall Collins' book The Credential Society, chapters I and 2).

      The impending Information Age is nonetheless a convincing pretext for initiating major educational
      change. Despite the irrelevance of curricular content to job performance, the rhetoric of high-tech
      schooling for a high-tech economy has lent effective support to various reforms, including the
      installation of computers in schools. One reason the rhetoric has been so effective is that parents are
      legitimately worried about the job prospects of their children. No matter what the data say, common
      opinion has it that computer skills will be an increasingly necessary job qualification, and no one wants
      to be left behind. Groups whose participation in the mainstream economy is already marginal fear being
      totally closed out if their schools don't keep up. And groups which historically had no trouble securing
      more lucrative positions are finding it more difficult. What was once virtually automatic, for instance,
      upon receiving a college degree, is now not so easy to obtain. With wider distribution of educational
      credentials, and shrinking opportunities, the same credentials no longer buy what they once did; the
      historically privileged need a new way to pass on their advantage.

      If such an effort at "redifferentiation" is, in fact, a significant element of computer adoption by schools,
      one would expect parental pressure to be a visible factor. That's exactly what Marc Tucker reports in
      the article cited above. In his experience, the initial push for computers in schools came not from
      educators but from upper-middle class parents. The pressure was also backed up with money: in one
      year during the major build-up, funds raised by suburban parents paid for fully 27% of all computers
      bought for U.S. schools.

      These actions can be seen as a response to credentials inflation. Although curricular changes have little
      to do with on-the-job performance, new technologies of production do enable the creation of new forms
      of "cultural currency" (borrowing from Randall Collins again). The older credentials have become
      badly inflated: everyone has them and they no longer guarantee a cushy sinecure. The formerly
      privileged react by creating a new credential. Initially, of course, no one has it, so the first few to
      acquire it are now distinguished from the crowd that has inflated the old credentials, and stand to
      benefit substantially. Once the computer credential catches on, a mad rush for it is likely to follow,
      yielding exponential growth in school computers脩precisely what ensued throughout the 1980s (with
      the numbers doubling approximately every 14 months). But not everyone is in a strong enough position
      to obtain access to the new credential. The computer-intensive classroom is a very expensive
      innovation, out of reach for the many communities that cannot afford it (or lack the clout to force their
      school officials to find a way to afford it).

      What I hope these arguments have suggested is that educational computing has unfortunately been
      technology-driven rather than curriculum-driven; i.e., an attitude of "this technology exists, we've got
      to have it" has been the predominant motivating force, rather than starting with a determination of
      what we want schooling to accomplish, and then examining how computers might be used to achieve
      those goals. Without such reflection, putting computers in schools is likely to mean we just get more of
      the same, only automated now. And for the most vulnerable members of our society, already getting a
      raw deal in school, that's very bad news.

      In the absence of a more mindful approach, students from different backgrounds are given different
      experiences with computers, tending to perpetuate existing inequalities. Girls, children of color,
      poorer kids, and students labeled "low-ability" are disproportionately engaged with drill-and-practice
      software, "mastery" learning of decontextualized basic skills, and vocational training in the use of
      specific software, while boys, white children, middle-class kids, and students labeled "high-ability"
      are disproportionately involved with open-ended simulations, integrated applications, and
      programming (data in Henry Jay Becker's newsletters from the Center for Social Organization of
      Schools, Johns Hopkins University). The differentiation process that once reserved certain privileges
      for wealthy white men through, for instance, college attendance, may be breaking down due to
      demographic and economic changes, but it may also be reestablished through preferential provision of
      computer-based education. Some students will learn how to direct the new technology while others will
      learn脩if they can afford any exposure at all脩how to be directed by it.

      While I am asserting a tendency for social disparities to be reproduced, I am not claiming that is
      necessarily an intended result. It may not be that privileged groups push for introduction of certain
      kinds of computer education specifically in order to distance themselves from other groups. That may
      be the furthest thing from their minds when they lobby for computer purchases; perhaps a benign
      initiative is colonized by the dynamics of a preexisting social structure, telling us nothing about why
      the computers are first introduced. But that is exactly my point脩regardless of why they are introduced
      into the educational setting, computers become part of the preexisting social dynamic of that setting.
      And the effect of their presence, their impact, depends on how they may be swept up into ongoing
      conflicts. If you drop an artifact like the computer into a setting where some people are more powerful
      than others, it should come as no surprise that unless specific measures are taken to assure otherwise,
      the computer ends up perpetuating the advantage of the more powerful, for they are most able to reap
      the benefits of its presence.

      Hank Bromley is currently completing his PhD in Educational Policy Studies at the University of
      Wisconsin-Madison.

      Two Perspectives on Using Multimedia in Education
      A Limiting Technology

      by Brian Harvey CPSR/Berkeley

      About 15 years ago, at the dawn of the personal computer era, I attended a talk by one of the early
      leaders in educational computing. The Votrax voice response unit had just been introduced, and he was
      very excited about it. To demonstrate the potential of this early multimedia technology, he first showed
      a standard, boring arithmetic drill program. The program presented a problem on the screen, the
      student would type in an answer, and the program would either announce that the answer was correct,
      and go on to the next problem, or announce that the answer was wrong, and repeat the same problem.

      The speaker "improved" this program by using the voice response unit to give messages such as "that's
      still wrong, but you're getting warmer" for incorrect answers. The machine was able to control the
      tone and syllable emphasis enough to present these hints in an amusing fashion, and most of the audience
      was quite entranced by this new technology.

      Unfortunately, the modified program's standard for "warmer" or "colder" was nothing more
      sophisticated than the numerical distance between the student's answer and the correct answer. So, for
      example, if the problem was 6 times 8, and the student first answered 42 (confusing this problem with
      the nearby 6 times 7), then answered 47 (a ridiculous answer), the program would congratulate the
      student for getting "warmer." The result is that the program was turned into a "guess my number"
      game, and the idea of learning arithmetic was lost!

      Of course, the voice technology could have been used in more helpful ways (for example, the program
      could have recognized common errors and given messages such as "No, 42 is 6 times 7, not 6 times
      8"), but the point of the example is that this otherwise intelligent designer of educational software,
      who would never have thought to use "warmer" and "colder" in the program's printed messages, was so
      mesmerized by the new technology that he wasn't thinking at all about the educational issues.

      Now move forward a dozen years. The new technology is video-based. A leading multimedia researcher
      at Apple Computer demonstrates educational applications; one example is a program to teach physics
      students about levers. On the computer screen is a depiction of a see-saw. Using the mouse, the student
      can position three children, of different weights, at various positions on the see-saw. The goal for the
      student is to get it to balance. The see-saw is held in the horizontal position until the student finishes
      placing the three children; then the student clicks a button to release it. This is where the multimedia
      part comes in: The developers have videotaped three actual children, with the correct weight ratios, at
      all possible integer positions along the length of an actual see-saw. If the student has put two children
      at the same position, the actual children are seen in each other's lap, or on each other's shoulders. It's
      fun to watch.

      Now imagine you're a student using this program. You've positioned two children arbitrarily, and
      you're trying to figure out where to put the third child so that the see-saw will balance. Most likely,
      the correct position is not at an integer distance! This wouldn't be a problem for the computer
      simulation alone, without the video enhancement, but in fact the program had to be written to allow
      only integer positions, because that's all they videotaped.

      What these examples have in common is that in their eagerness to use the latest technology, both
      developers have actually made their programs worse, from a pedagogic point of view. Multimedia is
      limiting! You end up tailoring your work to the demands of the medium, rather than the other way
      around.

      Multimedia is limiting in another way, also. Because good video is difficult and expensive to produce,
      the range of ideas available is restricted. One of the prototypical educational applications of multimedia
      is to ask students to prepare a report on Martin Luther King in which they use multimedia software to
      select and arrange excerpts from available videodiscs. But the Martin Luther King presented by Time-
      Life and by ABC News is the "I have a dream" integrationist, the pacifist, the martyr脩 not the socialist,
      not the angry militant, not the multifaceted King that students could find in books. The videos don't
      emphasize the FBI's spying on King's sexual activities, nor the recent accusations of plagiarism in
      King's scholarly works. Similarly, the ABC videos on the Gulf War are based essentially on information
      provided by the United States government, some of which has been shown to be inaccurate.

      Do all of these examples merely reflect the immaturity of the technology, rather than inherent
      weakness? Perhaps, but only if slick, professional video production will someday be as easy as
      computer programming is now. As long as it takes dozens of skilled technicians to produce television
      shows, the literature of multimedia will be limited. Of course there are better examples, such as the
      "Voyage of the Mimi" project developed at Bank Street College. (This project centered around a weekly
      broadcast TV show in which the protagonists explored the world by boat; the broadcasts were
      supplemented with a range of written material, interactive computer programs, and classroom
      activities.) But that project took years to produce, using federal research funds. And the result only
      teaches specific lessons; it's not open-ended in the way that programs like Geometric Supposer (which
      allows learners to perform geometric constructions on the screen; measure the resulting lengths,
      angles, and areas; hypothesize general rules; and test the hypotheses by repeating the construction with
      different starting shapes), or programming languages like Logo (a dialect of Lisp designed specifically
      for children learning mathematics, with simplified syntax and with a variety of mathematical
      "microworlds" to explore, of which the best known is turtle graphics), are open-ended. Therefore, the
      payoff for all that money is quite limited, compared to non-multimedia computer software development.

      It is possible to use multimedia technology in a more open-ended way. Coco Conn, for example, has done
      some spectacular work with kids and video, in which the kids themselves plan and carry out the entire
      project, operating the cameras and the video editors. If there is any promise at all in educational
      multimedia, I think it's in that style of work. But it hasn't happened on a large scale because it requires
      both expensive equipment and a lot of skilled adult support. Even then, the kids' work probably won't be
      as slick as professionally made video, so we may find that students will be tempted to stick with the
      professional work rather than make their own, just as interest in computer programming has declined
      because of the wide availability of slick programs with graphical interfaces.

      Because multimedia revolves around video, it shares many of the questionable properties of broadcast
      television: the emphasis on visually strong news such as violence and disasters, the short attention
      span, the focus on celebrities. People have argued for many years about whether these things are
      necessary implications of television. but even programs like Nova that attempt to be somewhat
      scholarly use the quick-cut style, and show the faces of Nobel laureates talking while the soundtrack
      gives us the simplified platitudes of a narrator. The more honest media enthusiasts don't even deny that
      a diet of television works against literacy; instead, they're proud of it, describing print literacy as
      obsolete in the light of the new "media literacy."

      Like much of the "information superhighway" that's been in the news recently, multimedia provides the
      illusion of interactivity, in which the user's control extends merely to a selection among professionally
      prepared alternatives. Selecting images from an ABC News video is essentially similar to the idea of the
      "electronic town meeting," in which TV watchers can vote on choices presented by Al Gore and Ross
      Perot. In a real town meeting, the decision-makers are the same people who carry out the discussion
      and who invent the choices. The electronic version is deeply antidemocratic.

      Why don't the same arguments apply to any educational use of computer technology? My answer is that
      in some cases they do apply. The kind of computer technology that presents a learner with multiple
      choice tests, or with "Computer-Managed Instruction," is indeed just as limiting as multimedia
      technology. But computers lend themselves to a different style of work, one in which learners are
      presented with tools rather than with constraints. Word processing, spreadsheets, calculators, and
      drawing programs can help learners explore and present their own ideas. Most flexible of all is a
      programming language, in which learners can invent their own tools. So tar, at least, multimedia is a
      much less accessible medium.

      A Chance for Change by Christopher Hoadley and Sherry Hsi University of California at Berkeley

      "If I only had a computer with a CD-ROM, I could learn better faster." This is the current perception of
      many students who blame the lack of technology available to them as the key problem in their education.
      Let's assume a magic genie grants every student a CD-ROM player with supercomputing capabilities.
      Now what? The next, more challenging step is finding out how computer technology affects learning and
      instruction. Originally, the computer was seen as an infinitely replicable substitute for real teachers,
      later as the determining skill of the future required for economic advancement, and now as the
      broadcast vehicle of multimedia. Brian Harvey (see A Limiting Technology) has taken the stance that
      this may turn out to be an empty promise, like many other promises made by new educational
      technologies over the years脩from slide projectors to VCRs. With his basic premise, we agree:
      technology does not make bad teaching good. All the computers in the world will not make drill and
      practice more intellectually stimulating. However, it does add an important tool to the teacher's (and
      the student's) toolbox. Moreover, this latest generation of technology gives us a chance to right some of
      the wrongs of past technologies.

      First, let's state the obvious; the more ways available to present information, the better. Multimedia,
      by definition, is the combination of different media, like sound, video, text, or images. With computer-
      based multimedia, we unlock the prior constraints of text alone on the computer. And indeed, some of
      the finest multimedia applications excel on this point alone. Voyager's Mozart CD-ROM combines
      critical analyses, definitions, historical background, and exercises with the sounds they refer to. Not
      the score, but the music itself, is co-presented with texts that describe it. Compare this to the old way
      of doing things: juggling printed scores, critiques, and recordings, constantly searching for passages or
      themes discussed in various books, while trying to verify what you're hearing is what they're
      discussing by following the score as well. No novel educational theory is embodied in the software;
      indeed, it contains multiple-choice questions reminiscent of the Votrax Harvey mentions. But because it
      integrates the pieces and makes information accessible in different ways, multimedia is an
      improvement.

      And computer-based multimedia can be better since media may be truly integrated Teaching materials
      including audio cassettes, text references, photographs, personal letters, maps, and videotapes can be
      combined and carried on a single disc. For instance, the "Voices of the 30s" CD-ROM is a compilation of
      materials about the Great Depression originally collected by a school teacher and librarian, Pat Hanlon
      and Bob Campbell. The multimedia repackaging of their teaching materials didn't change their teaching
      philosophy, but eliminated the annoyances of carrying and coordinating several pieces of AV equipment.
      In general, instructors could create their own multimedia teaching materials from scratch, but current
      technology makes this difficult and expensive venture, as Harvey concurs.

      Does this benefit outweigh potential disadvantages? Will multimedia help students and teachers develop
      deep conceptual understanding, or will it produce a generation of jaded couch potatoes waiting for
      infotainment? This depends on several key factors. Foremost among these is control; who controls the
      medium?

      Television is passive, few-to-many communication where the few are entrusted to an enormous degree
      with creation of viewpoints. The people who control mass media like television or major newspapers
      are people with expensive equipment, large professional staffs, and regulatory approval. The only
      incentive to run such a gauntlet is large profit, which comes from advertisers. They in turn join the
      media-control bandwagon.

      Multimedia can be similarly inaccessible, but this is rapidly changing. Key technologies including video
      cameras, multimedia-capable computers, and audio digitizers are now within the financial grasp of
      many schools. Television broadcasting is still out of reach for the average school, but video development
      and multimedia composition are not. The Bell High School, a public school in East Los Angeles, provides
      a fine example in which students develop near professional quality videos as part of a class; Brian
      Reilly has collected and coalesced these videos as a computer-based multimedia project, which
      showcases students' projects and students' points of view. Students and teachers can have control of
      multimedia production. Multimedia is putting the power of creation into the hands of the viewer.

      "But do the students learn anything from building multimedia presentations?" one might ask. Indeed,
      Harvey suggests these students are trading in playing with cameras for text-based literacy. Our belief
      is that the quality of the educational experience with a medium depends on the quality of activities
      performed with that medium. Any medium requires literacy. We have book literacy, in which we
      understand typical genres (essay, novel, etc.) and literary devices (metaphor, sarcasm, etc). We also
      have video literacy with current genres including news program, debate, game show, sitcom, etc. and
      cinematographic devices. The point is that we create literacy for each medium ourselves, as a culture.
      We invented the newspaper, and we also invented the grocery store tabloid. What elevates or debases is
      not generally the problem of the medium, but of the society that creates it.

      Once one has created a "document" in a medium, how can one share it? Another key characteristic of
      media is reproducibility. Print is a very democratic medium in the age of photocopiers because it is
      easy to create and share with others. Copier and printer technology are so widespread that nearly
      anyone can be a "desktop publisher". We envision a similar set of circumstances now that
      computer-based multimedia is available. Unlike film and images that are difficult for the average
      person to reproduce and distribute, digitized images and sound can be easily copied, or even transmitted
      over networks. This has a great potential to enhance education, since students can share their work with
      each other and with outsiders. By opening the door to communicating and sharing with people outside the
      school walls, students may actually be able to participate in real activities and not just contrived
      exercises. For example, in Roy Pea's CoVis project at Northwestern, a collaboration between scientists
      and elementary school kids through networked multimedia has allowed students to use real weather
      satellite images of meteorologists, and engage in scientific inquiry and group discussion with real
      experts. Again, the media itself will not change bad habits of the past; if students are not allowed to
      share with other people either because of classroom practice or legal issues of media ownership, or if
      sharing is trivialized to video note-passing, nothing will come of it. But the possibility for exciting
      interactions between schools and the rest of society remains.

      The promise that multimedia holds for change rests ultimately on how the technology is shaped and used.
      To the extent that multimedia becomes an accessible, transmittable, and democratic medium, it can have
      a positive impact on schools.

      INTERNET SERVICES FROM CPSR.ORG

      CPSR now provides a wide range of electronic services for its members and the public including
      administrative and informational mailing lists and an extensive online library. General information on
      CPSR and electronic access of all forms is available by sending email to <cpsr-info@cpsr.org>.

      The Internet CPSR library now houses files on a wide range of subjects: privacy, networking,
      conferences, computer crime, gender, disability, the workplace, and others. Files in the library are
      available via email, gopher, FTP and the World-Wide Web.

      ACCESS TO THE INTERNET LIBRARY IS SIMPLE.

      For users limited to email: Send a message to <listserv@cpsr.org>, the subject should be blank, with
      the command HELP in the mail body. A help file will be mailed to your address explaining how to use the
      library.

      For anonymous FTP: Type the command ftp ftp.cpsr.org and you will be asked to login (use the word:
      anonymous) and provide a password (use your own login id). You will then be in the home directory of
      CPSR's library.

      For Gopher Access: Type the command: gopher gopher.cpsr.org and you will go directly to CPSR's home
      directory.

      For World-Wide Web access (via Mosaic, Lynx, or other browsers): Point your browser to the
      following URL: / which will take you to the home page of CPSR.

      The main announcement mailing list, originally created by Paul Hyland as CPSR@GWUVM.BITNET is
      now called CPSR-ANNOUNCE@CPSR.ORG. It disseminates official, short CPSR-related messages. We
      encourage you to subscibe and widely publicize the list. To subscribe, send email to
      <listserv@cpsr.org> with the following message: SUBSCRIBE CPSR-ANNOUNCE <your firstname> <your
      lastname>

      You will get a message that confirms your subscription. If you have a problem, send email to
      <admin@cpsr.org>. To find out what other email lists are available on cpsr.org, send email to
      <listserv@cpsr.org> with the message: LIST

      There are two new USENET newsgroups. The first, comp.org.cpsr.announce, is an echo of the CPSR-
      ANNOUNCE mailing list to the netnews system. The other newsgroup is called comp.org.cpsr.talk. It is
      open for use by anyone to discuss CPSR-related issues.

      If you would like to reach a chapter contact, send email to <cpsr-chapter-name@cpsr.org>. This email
      address will reach one person who has been designated as a contact. Email lists have been set up for a
      few chapters (cpsr-boston-members, cpsr-paloalto-members, and cpsr-berkeley-members) in
      order to send announcements to chapter members or for the purpose of chapter discussions.
      Otherchapters that wish to form member lists should contact <admin@cpsr.org>.

      HANDY LISTSERV COMMANDS

      Send the following commands in the body of an email message to <listserv@cpsr.org>: HELP to receive
      basic help, LIST脩to find out the list of email lists the listserv supports, GET CPSR CPSR_FILE_LIST to
      receive a list of files that may be retrieved, GET CPSR NII_POLICY- to receive the CPSR NII position
      paper, GET CPSR/CPSR_MEMBERSHIP_INFO CPSR.ALIASES- to receive organization contact names.

      VOLUNTEERS NEEDED

      Volunteers are needed to help run CPSR.ORG. There are three fundamental classes of assistance that are
      needed. First and foremost is the need for contributors to and maintainers of the library of information.
      Individuals with FTP access who are interested in controlling a directory of information on a particular
      topic or helping with the library in general are needed. Second is the need for those who can moderate
      some of the email discussion lists; a direct connection is not required for this function. The third class
      of assistance involves maintenance of the software on the CPSR server; those with knowledge of
      listserv, FTP, WAIS, Web, Mosaic, sendmail and gopher software would be helpful. C programmers are
      also useful for special functions. Anyone interested in this kind of involvement should send email to
      <admin@cpsr.org>. Additionally, we need access to a faster link as well as upgrade the software for
      managing our library. We currently use the WAIS software that is publicly available. Any help in this
      would be appreciated.

      AI Whaley, CPSR/Palo Alto

      A Quick Look at the Costs and Benefits of Computers in Higher Education

      Marsha Woodbury
      CPSR Director at Large

      Until now, the two technologies which have had a lasting impact on schooling were the textbook and the
      blackboard (Hodas, 1993). Maybe the computer is the next "big leap." As computer professionals, we
      are delighted to have work and money thrown our way, yet we wear other hats, too. We are parents and
      taxpayers who need to know that our money is being put to good use by the universities which we
      support. When we send our children to college, we want them to meet and get to know professors, as
      well as computers. We want them to develop humanitarian values, as well as gain job skills.

      Here at the University of Illinois at Urbana-Champaign (UIUC), the campus doesn't have a child-care
      center, but it has workstations to die for. As a community, we choose to pay for computers and not
      creches; we cut back on tenure-track positions while adding PowerPCs. Sometimes these choices worry
      me, so I decided to step back and look at the motivations for how we allot our resources for this CPSR
      Educational Issue.

      The move toward computers had a big push from institutions and business. Apple and IBM, Microsoft
      and Sun, the CIA and the Army, the National Science Foundation (NSF) and many more organizations
      have helped universities finance computer projects. The way these institutions typically support
      education is by providing equipment and expertise, or by giving computer grants. Sometimes the
      companies are trying to sell their products and hook in new users while students are young. Sometimes
      an end-product is needed, such as courseware developed for the CIA to help train people to speak foreign
      languages. Sometimes companies seek hardware or software development.

      Theoretically, everyone comes out a winner, all the way from the company to the public-at-large to the
      student. Capitalism isn't necessarily evil, although we might get suspicious as truckloads of computers
      come onto campuses. Students surely will benefit from the new inter-connectedness and access to
      information flowing from the ever-expanding networks. They also must be prepared to buy their own
      equipment and spend hours on end staring at video monitors during their

      As a community, we choose to pay for computers and not creches; we cut back on tenure-track positions
      while adding PowerPCs.

      WHO BENEFITS?

      We seem to value computers at a university in these ways:

      楼 Students have a chance to learn material in different ways, using touch, hearing, and sight (not taste
      as yet). The jury is still out on how effective computers are, but common sense can tell us that students
      aren't millions of dollars smarter for the millions we've spent. For those of us who fall asleep in dull
      classes, multi-media offers promise and excitement, particularly with nonlinear display of
      information. Also, students gain from becoming familiar with the machines they will be using later at
      work, and their class papers have gone from typed-with-corrections to laser-printed-with-graphics.

      楼 Parents can relax脩their kids will emerge from college computer literate, job-ready.

      楼 Universities get discounts and free equipment from outside sources during an era of declining support
      for education. It certainly attracts students when a school can offer computer labs in every dorm, or
      showcase labs developed with Apple Grants or two-to-one (sometimes five-to-one!) IBM
      contributions.

      楼 Faculty find they can teach things they never could before. Also, professors who grasp the significance
      of the digital revolution, and realize its impact on the history of ideas and communications correctly
      try to bring their new knowledge to class (T. Johnson, Professor of Journalism, San Francisco State).
      In the early days, a few sly professors may have imagined that the computer could be a way to get out of
      teaching, that they could just sit the students down and the computer would do it for them, hoping the
      software already existed, and all they had to do was load it onto the hardware. Those days are past. The
      teachers have become the courseware creators.

      Through designing their own software, faculty can maintain ownership of their course content. They
      recognize that they have the educational expertise and don't leave creation of the software to the
      "professional." Professors have to re-organize their material in a logical way for the computer, and
      that process alone makes them come to grips with the material in a new, constructive way (Szoke,
      Research Programmer, University of Illinois). Of course, the hardware "puts a gleam in their eye." At
      a recent campus demonstration of the Apple Power PC, the gleams practically drilled a hole in the
      monitors.

      楼 Computer Companies perhaps gain the most:

      1. The students get contact with the donor's equipment and so are likely to want/recommend/ask for
      said equipment when they find employment. "In the 70's DEC subsidized the cost of providing mini-
      computers for most of the "big computer" universities. The result was that DEC grew tremendously in
      the 80's when all those students graduated and went on to become computer purchasers or key
      engineers. In the 80's SUN displaced DEC as the university's provider of choice. The result is that SUN
      now dominates the workstation marketplace in the 90's," wrote Newman.

      2. It's hard to change horses midstream. Sticking to one machine makes life much simpler for
      developing materials and running labs. The developers also make a commitment: One UIUC unit locked
      onto the Macintosh, and a few PC labs are now unable to use their software.

      3. Sponsorship and underwriting of education helps the public image.

      4. Free advertising. For example, now the UIUC is recommending that its students buy their own
      computers, and the university is describing suitable configurations for the students and parents.

      5. Faculty may buy extra units or upgrades. The professor will often purchase the same type of system
      for home or a similar laptop for travel and presentations.

      6. Fascinating and useful new software might be written. Faculty and students will develop it, and even
      more people might want to buy the donor's equipment.

      COSTS

      With so many people benefiting from computers, you risk being labeled a Luddite if you question the
      final outcome. Here are some issues to mull over:

      The computer is, in a sense, a magnificent toy that distracts us from facing what we most needed to
      confront 脩spiritual emptiness, knowledge of ourselves, usable conceptions of the past and future. Does
      one blame the computer for this? Of course not. It is, after all, only a machine.

      脩Neil Postman, Informing Ourselves To Death

      Many reasons can be ascribed for the ,failure of computers to live up to its promise, but I think the
      chief one is that it's very hard to write software that can be as flexible, creative, and caring as a good
      human teacher.

      脩Todd Newman, Special Director, CPSR

      The money is better spent, I think, on real teachers rather than mechanical ones.

      脩Allen Holub

      楼 "Beware of bright boys bearing toys," said a salesman for Hewlett-Packard. Computers are sexy.
      According to him, with the introduction of computers in any university department, the equivalent of
      one full-time faculty is lost from his calling, seduced by the computer. The professors can spend oodles
      of hours creating programs without any sure payoff, either in proven instructional effectiveness, or in
      job promotion or tenure.

      Time is a huge investment, at a ratio of 100 to 600 production hours for every one courseware-hour.
      As for doing it the fast way, making a "page turner," you might as well write a text book. (Szoke)

      楼 Hidden Expenses - One of the big outlays for computers is providing the infrastructure to make it all
      work. Putting in wiring and furniture and security is backbreaking. "We spent more (money)
      renovating and furnishing our new second generation workstation lab, than we spent on the 31 IBM 23T
      color workstations to equip the lab," wrote Jon Finke, Senior Network Systems Engineer.

      楼 Robbing Peter to Pay Paul - The money for the computers comes not only from companies and
      institutions, but from public revenues. Underfunding of universities and colleges is a chronic problem,
      and in the era of tight budgets. choosing computers means lopping off something else.

      Hank Bromley, University of Wisconsin, voiced these common fears when referring to the November l
      5, 1993, issue of Newsweek, which had pages of paid advertising for computers in schools. "What
      they're calling for is taking $ l5 to $20 billion of public money away from buying textbooks and chalk
      and art supplies, from paying teachers and custodians and school nurses, from replacing roofs on
      dilapidated buildings, and from other needs schools are already too broke to meet, and using that money
      to purchase their products. And all so that our children can become more efficient workers in their
      companies, and more inclined to consume even more of their information technology products." The
      same arguments can apply to higher education.

      楼 Schools as Markets - Are we comfortable with the school delivering up consumers to business? That's
      the deal脩they give us generous discounts and grant money, and we use their machines. If profit weren't
      the motive, then non-profits would get an equal donation, but they don't. "Corporations and universities
      may get to learn by doing脩but the rest of us are simply going to get the applications the big guys want
      us to have," wrote Evelyn Pine, director of Partners consulting firm.

      Our schools have accepted Whittle's Channel One TV in the classrooms in exchange for equipment. Are
      we as (un)comfortable with what we are doing with computers?

      楼 Upgrades - You are forever feeding the insatiable monster. Hardware seems to have a five-year
      lifespan, if that. People cannot seem to lower their expectations, and it pricks our pride to have
      inferior machines.

      楼 It's Gotta Be My Baby - We don't like to use other people's material, so all the previous work is
      dumped. There's little recycling. "Professor Jones" develops software for an introductory course, at
      huge expense. After teaching it for a year or two, the course is taken over by "Professor Smith," who
      wants to have his/her own software, to go with the new textbook and new syllabus.

      楼 Lower-Order Thinking - Technology has a downside, and one frightening outcome is predicted by
      Lawrence McCluskey, who wrote, "If snore and more advanced technology is introduced into the
      educational scheme without a concomitant emphasis on knowledge acquisition, it will allow some
      students to operate and increasingly lower levels of thought...Students who possess knowledge will use
      technology as a tool; those who do not possess knowledge will use it as a crutch...higher-order thought
      processes will be displaced into the control of smaller numbers of people, while lower-order thought
      processes will proliferate and be supported by progressively advancing technology" ( 1 994).

      SUMMING UP

      If we are going to pour money into technology in Higher Ed, let's at least make sure that it goes for
      worthwhile projects. This isn't easy. Lenny Siegel, of the Pacific Studies Center, echoed what others
      have been saying, "I don't know of any case where a computer-assisted training program has grown out
      of a balanced analysis of unmet educational needs."

      Currently, I am on a committee which is reviewing grant applications for one million dollars of student
      computer tee funds. This money will support faculty in "providing innovative uses of technology in
      education." I am reading page after page of professors' pleadings for upgrades and new projects, and
      wondering who should get what. These may not be highly scientific criteria, but I like to give funding
      when . . .

      . . . computers replace huge lecture classes. (Anything is better than piling students into large
      auditoriums, I hope).

      . . . computers prevent science buildings from being blown up (for example: simulated Chemistry
      experiments).

      . . . the computers can be shared by the rest of the campus (in labs which are open at least 16 hours a
      day).

      . . . computers can be used in master classrooms to guide projection, or mounted on carts to be used in
      many classrooms.

      . . . people are safe snaking their way to and from the computers (access for handicapped, safety for
      women).

      In the longer run, we really have to take a hard look at where reliance on computers in undergraduate
      education is leading us. The Wingspread Report (1993) challenges us to assure that next year's
      entering students will graduate as individuals of character more sensitive to the needs of community,
      more competent to contribute to society, and more civil in habits of thought, speech, and action. We are
      modeling our values for them, by making them "one" with the technology. Perhaps less seductive
      alternatives would mold a better citizenry for the future.

      REFERENCES:

      Steven Hodas, "Technology Refusal and the Organizational Culture of Schools", Leadership and Policy
      Studies, Vol. ], 10, Sept. 14, 1993, School of Education, University of Washington.

      Lawrence McCluskey, Gresham's Law, "Technology, and Education", Phi Delta Kappan, Vol. 75, 7,
      March 1994, pp. 550-552.

      Neil Postman, Informing Ourselves To Death, a speech given at a meeting of the German Intormatics
      Society (Gesellschaftuer Informatik) on October 11, 1990 in Stuttgart, sponsored by IBM-Germany.

      Wingspread Group on Higher Education, 1993. An American Imperative. Higher Expectations for Higher
      Education, First Edition, Racine, WI: The Johnson Foundation, INC. or ftp to csd4.csd.uwm.edu, find it
      in: pub/wingspread/report.txt

      Contributions from: Ellen Brewer, Hank Bromley, Rick Crawtord, Jim Davis, Steve Dorner, Nikki
      Draper, Jon Finke, Allen Holub, Marge Jerich, Tom Johnson, Professor of Journalism, San Francisco
      State, Jim Levin, Jim McCord, Barbara Meyer, Todd Newman, Evelyn Pine, John Schmitz, Judy Stern,
      Ron Szoke, Research Programmer, University of Illinois, and Mike Waugh.

      An Open Letter to CPSR

      Kent M. Pitman CPSR/Boston

      BACKGROUND

      I attended last year's CPSR annual meeting to carry a message of concern about our NII vision statement.
      To my dismay, there was only a pro forma discussion of the document. Further, neither my concerns
      nor those of others present were mentioned in the CPSR Newsletter summary of the meeting.

      Based on my experience, which I consider to have been a waste of personal money, I wish that published
      trip reports were required in cases where CPSR funds are used to pay CPSR officials for travel to a
      meeting. Further, more time should be allocated at annual meetings for member discussion. Panels can
      be fun, but they don't justify the cost of a plane ticket and/or lost days at work.

      THE BASIC PROBLEM

      I worry that we are trying to be all things to all people, and I believe that this could result in our
      missing many opportunities to really make an observable impact.

      I see two basic sources of trouble in our approach: Conflicting Goals and Lack of Focus. Either of these
      by themselves would be bad enough; taken together they magnify each others' effects.

      CONFLICTING GOALS

      We must choose goals that do not conflict, or we must be plain about how they conflict and how we would
      resolve that conflict. If we fail to resolve or at least identify conflicts ourselves, we make it hard to
      send a clear message. Anyone who doesn't like our agenda and understands that we are sending an unclear
      message can use that confusion to our disadvantage by pointing out that we don't even agree amongst
      ourselves.

      An example of such conflict I find in our present document is the paradox of "encouraging standards" and
      "encouraging experimentation. " While these might be resolvable at some detail level, they are not
      resolvable at the high level we are presently speaking. People wanting to walk away with just a short
      take-home message are left with a dilemma: are we for having everyone do the same thing, or letting
      everyone disagree? This hurts our cause by distracting attention from the things we can say that are
      more clear.

      LACK OF FOCUS

      With so many recommendations, we blur the "must do now" part of our message from the "ultimate
      goal" part. We must prioritize better.

      I fear that we are shying away from a prioritized message for fear of sending a message that the
      "ultimate goal'' portions are not important. "Ultimate goals" are very important, but we will never get
      there if we confuse them with infrastructure.

      It's great for CPSR to have members who are committed to "ultimate goals." These people inform our
      sense of what is a "must do now" item. It's also good for chapters to work actively on these projects
      under the CPSR name. But saying that CPSR benefits and is benefited by people with vision is different
      than saying that the message CPSR should be sending is "just do lots of things that show vision." We
      must think and act strategically if we're to have any real effect.

      Members are often called upon to speak for CPSR. If our message is clear and simple so that it is easily
      and often repeated, it might eventually sink in. Our current message is not clear, not easy to
      remember, not easy to repeat, and in my opinion will only (and can only) be given lip service in its
      current form.

      RIGHTS VS. GOALS

      I once learned a useful way of distinguishing a right from a goal: Rights are things which happen at no
      cost in an ideal society. Goals are things that require investment. (Sometimes the enforcement of rights
      requires investment, but the enforcement of a right is a goal, not a right.)

      In this view, free speech, privacy, and access to existing information are things that can be rights.
      Education is an example of something that can only be a goal and never a right by this definition, except
      insofar as self-education through access to public information facilities like libraries is a right.
      Libraries, however, are something that can never be a right since they actively require resources to
      create and maintain.

      This distinction is important because violation of a right can be made to be a crime (since anyone can,
      without cost, respect your rights). Failure to achieve a goal must not be an automatic crime because the
      best of intentions combined with inadequate resources might not be enough to ensure that a goal is
      achieved.

      PROPOSED FOCUS

      I would like to see us re-examine the set of issues that are now active and make a decision to focus in on
      just a few (at most three) criteria. For discussion purposes, I suggest three such criteria here. Note
      that each could be made to be a Right as I have defined the term, not just a Goal.

      1. Privacy. The NII backbone should ensure completely private communication, just as the present day
      telephone and mail system. Access to the NII should not require a promise to give up this right. Access to
      the NII should also not require anyone to give up personal information except that which is necessary to
      verify the identity of the user; second-hand use of such information should be prohibited.

      2. Free Speech Communication on the NII should be regarded as "speech" and all existing rights of free
      speech should be applied in this new medium.

      3. Access. Barriers to new users or service providers should be avoided. There should be no arbitrary
      limit on the number of individuals or organizations that can directly connect to the NII. Fees should be
      permissible only when absolutely necessary, only if commensurate with actual costs incurred, and only
      if distributed such that users with modest needs can participate at correspondingly modest cost. The
      specification for any protocol or software service necessary to be NII compliant must be made available
      to anyone that requests it.

      REEXAMINING EXISTING RECOMMENDATIONS

      In what follows, I'll suggest some ways to reexamine our existing Policy and Design Recommendations
      with the aim of simplifying our message.

      The following should be a non-goal because the organizations we are advising think they are already
      doing this. It's not that this is a bad sentiment,

      it's just that it isn't really likely to help and might even distract from other messages that could help.

      楼 Policy: Consider the social impact

      The following are effectively just restatements of one or more of the important three goals I have
      suggested.

      楼 Policy: Guarantee equitable and universal access.

      楼 Design: Enable users to act as producers and consumers.

      楼 Design: Address security and design issues from the beginning.

      楼 Design: Develop open and interoperable standards.

      The following should be non-goals because they will be naturally tended to by my suggested three goals
      above and/or by the presence of a free market. Internet experience has shown that the freer the flow of
      information, the more information and services will arise on their own. The marketplace has already
      demonstrated that it is economically motivated to consider these, and deserves a chance to operate on its
      own before we meddle.

      楼 Policy: Consider the social impact.

      楼 Policy: Promote widespread economic benefits

      楼 Policy: Promote diversity in content markets.

      楼 Design: Ease of use.

      楼 Design: Require high reliability.

      The following are interesting goals but our other goals do not depend upon them. They should be deferred
      until later so as not to dilute our message.

      楼 Policy: Provide access to government services and information over the Nll.

      楼 Design: Encourage Experimentation and Evolution

      The following should be non-goals or secondary goals. While many of us might consider library, snow
      removal, police, and fire services to be essential, it is possible to find communities that have
      consciously elected to invest small to non-existent amounts of money in these activities.

      楼 Policy: Protect public spaces

      楼 Design: Full service to homes, workplaces, and community centers.

      SUMMARY

      What I want is an initial agenda based on promoting "common sense" and "cost free" needs of the NII.
      Privacy, Free Speech, and Access. These may seem like small things, but they won't come automatically.

      Now is the time to demand them.

      Where I would characterize the present-day CPSR/NIT statement as Liberal (in both goals and
      spending), I would characterize my proposed alternative as Libertarian (in both goals and spending). I
      have no fundamental objection to the long-term goals people have cited, except insofar as they distract
      from "must do now" issues.

      Whether you agree or disagree with my specific choices, I hope you will agree that we must have a
      dramatically shorter list of priorities to go after for the near term. When those are achieved, we can go
      on to the next step. But if we try to do everything at once, our voice will be hopelessly diluted.

      The President's Column

      The most important news on the CPSR front is the formation of the Electronic Privacy Information
      Center (EPIC), which was formally announced on April 29 at a press conference in Washington, D.C.
      We are excited about this development and believe it will work to the mutual advantage of CPSR and the
      EPIC project. More details on the EPIC announcement are contained in the letter on the facing page.

      Another timely piece of CPSR news is the just-completed Directions and Implications of Advanced
      Computing conference, which was held in Cambridge, Massachusetts, on April 23 and 24. Focused on the
      theme of Developing an Equitable and Open Information Infrastructure, DIAC-94 was our most
      successful such conference to date, attracting almost 300 participants. The conference attracted
      attendees and speakers from a wide range of disciplines, which made for many interesting and valuable
      interactions. More details of the conference will appear in the Summer issue of the CPSR Newsletter,
      but I wanted to take the time to thank the conference chairs, Coralee Whitcomb and Hans Klein, and the
      program chair, Doug Schuler, for putting on a wonderful event.

      The DIAC conference was the most recent event in a succession of CPSR activities focused on the National
      Information Infrastructure. Prior to this conference, CPSR's most visible contribution to the NII
      debate has been the report we released in October under the title Serving the Community: A Public
      Interest

      Vision of the National Information Infrastructure, which appeared in the Fall-Winter issue of the
      Newsletter. The report has gotten extensive circulation in Washington, and the feedback we have
      received has been quite positive. We sent copies to the members of the Information Infrastructure
      Advisory Council and have received several letters in return, all of which contain very positive
      comments about out report.

      Not everyone, however, is happy with the report. This issue of the newsletter contains a long letter
      from CPSR member Kent Pitman, in which he criticizes the CPSR Serving the Community report and
      our process in producing it. Because we believe that discussion and debate are essential to the success of
      CPSR, we have published Kent's letter in full in this issue.

      Generating a document脩 particularly one that seeks to integrate contributions from a membership that
      is widely scattered across both the geographic and the political map脩 is a difficult task. Throughout the
      process, we tried to solicit as much opinion from the membership as we could. We circulated an initial
      draft on July 15 and spent the next two months collecting responses from the membership and several
      chapter-based working groups. We received approximately 75 comments in response, and we
      considered each of them carefully; most of those suggestions found their way into the final report. There
      were, as is often the case in distributed writing projects, some timing glitches in the process. For
      example, as the report moved through the various drafts, we would occasionally get detailed comments
      critiquing portions of a previous draft that had changed radically by the time those comments were
      received. There are aspects of the process that we now know how to improve, but much of it ran as well
      as one could expect.

      Kent's letter does not describe fully what happened at the Seattle meeting. In the time that we had
      allocated for discussion of the NII report, there were a couple of members脩of whom Kent was one脩who
      argued for substantive changes in the content of the NII report. What was fascinating was that the
      arguments from these members argued for completely incompatible changes in the report. As Kent's
      letter notes, he lobbied for CPSR to emphasize a more Libertarian perspective in the report. A member
      from Seattle, however, argued equally strongly that the report should be rewritten in a direction that
      most members would identify as Socialist. Both members wanted the report delayed until their position
      could be accommodated within it. On this point, the two agreed. There were few other points of
      agreement.

      The most important omission in Kent's discussion of the history of the Seattle meeting is that Marc
      Rotenberg, who was chairing the session, asked the meeting participants whether they wanted to delay
      publication of the report to provide additional opportunity for input. In the discussion that followed,
      several people pointed out the enormous value of publishing the report in a timely fashion. The
      Telecommunications Policy Roundtable had scheduled a major press conference on the NII eight days
      after the CPSR Annual Meeting, and our report would gain would gain significant visibility if it could be
      released at that time. We took an informal vote on the motion to delay publication and discovered that
      the sense of the meeting overwhelmingly favored脩by a majority of 90 percent or more脩to publish the
      report so that it would be available for the TPR meeting

      In publishing the Serving the Community report, our goal was not to find a consensus document that
      everyone in CPSR could endorse in its entirety. Instead we sought to develop an effective, well-written
      document that would meet two goals. First, it had to have an impact on policymakers in Washington.
      Second, it had to represent a position that a significant majority of the CPSR membership could
      endorse. We believe that we have achieved both and that CPSR's voice in the NII debate has been
      considerably strengthened as a result.

      Dear CPSR members and friends:

      At a press conference on April 29, 1994, the staff of the CPSR Washington office脩Marc Rotenberg,
      David Sobel, and Dave Banisar脩announced the formation of the Electronic Privacy Information Center
      (EPIC), a public-interest research center based in Washington, D.C. EPIC will focus on emerging
      threats to personal privacy in the electronic domain and direct public attention toward the critical
      privacy issues raised by the National Information Infrastructure, such as the Clipper Chip, the Digital
      Telephony Proposal, medical record privacy, and the sale of consumer data.

      EPIC is a joint project of CPSR and the Fund for Constitutional Government (FCG), a nonprofit
      charitable organization established in 1974 to protect civil liberties and constitutional rights. After
      negotiating the design of the new arrangement for several months, we are convinced that the creation of
      EPIC will strengthen both organizations. In particular, the establishment of EPIC broadens the base of
      organizational support for privacy issues, increases the independence of a very capable Washington-
      based staff, offers expanded opportunities for fundraising, reduces administrative overhead, and
      improves efficiency to the point that we will be able to dedicate more of our energy to program work.

      During the last few years, the CPSR Washington office has played a large part in strengthening CPSR's
      public-interest voice. The work of Marc, David, and David has been nothing short of terrific. They have
      done an impressive job..

      CPSR does not intend to abandon its Washington policy activities. In particular, we will pursue our
      FOIA lawsuits and continue our membership in the Telecommunications Policy Roundtable, either by
      contracting for services with organizations such as EPIC or through our own staff and volunteers. In
      any case, CPSR will continue to serve as a powerful voice for responsible computing.

      In the last few months, we have been unusually busy and productive. We published a comprehensive
      report on the NII entitled Serving the Community: A Public Interest Vision of the National Information
      Infrastructure. We have circulated an electronic petition opposing the Clipper program that has been
      signed by over 47,000 people. Last weekend in Boston, CPSR presented its fifth Directions and
      Implications of Advanced Computing symposium (DIAC-94), which focused on Developing an Equitable
      and Open Information Infrastructure. The conference was extremely successful and attracted almost
      300 participants. We are going as hard and fast as we can!

      A great deal of the credibility and respect for our work comes from the fact that our members脩
      computer scientists and others concerned about the impact of technology on society脩use their expertise
      and knowledge to talk realistically about the limitations and possibilities of computer technology. They
      testify before policymakers and influence major decisions, such as those concerning the NII. That work
      will continue to grow in importance as the use of computing technology expands. We look forward to the
      success of both CPSR and EPIC in the new configuration.

      脩Eric Roberts CPSR Board President

      Clipper: Government-Sponsored, Government-Compromised Encryption

      Al Whaley
      CPSR/Palo Alto

      Clipper has become the code name for an encryption system designed by the National Security
      Administration (NSA) and the National Institute of Standards and Technology (NIST). Clipper is
      deliberately compromised to allow law enforcement officials to wire-tap phones in the digital age. The
      fear is that authorized wire-taps would be rendered meaningless if the speech is encoded with an
      unbreakable encryption technique. Clipper would be a standard encryption system used by individuals
      and businesses to keep their communications secret and for which the government would hold a master
      key for decrypting messages.

      During the Bush administration, several attempts to pass legislation to require Clipper to be installed
      in domestic telecommunication systems failed in Congress. Under Clinton, the government is using its
      purchasing power to create a market for Clipper by requiring Clipper-equipped telephones for
      government use, both within and outside of the defense department. The Clinton administration has also
      funded initial development to guarantee low per unit cost.

      !D1FQ=+@z~o$3&H>

      Cryptography is the process of writing in or deciphering secret code. It dates back to ancient Rome and
      has most often been used by the military. In very basic terms, the way encryption works is as follows:
      you have a message that you want to keep secret; you run the message through an encryption process
      with a key which produces unreadable text. This coded text is then sent to the intended recipient, who
      presumably has the appropriate key to decipher the text.

      Encryption processes are implemented with mathematical algorithms that convert the original message
      into a coded or ciphered text based upon the key that is used. In a well designed system, the algorithm,
      or mathematical basis for the encryption, may be public and have no impact on the secrecy of the
      messages. The security of the encryption depends only on the secrecy of the key. Good systems are hard
      to design and are difficult to verify because of their mathematical complexity; good design requires an
      open process of design and review.

      In a well designed encryption system, there should be no way for a stranger to decrypt a message except
      by trying all possible encryption keys; any shortcut that is found to exist is considered to be a serious
      weakness. The present encryption standard, DES, has 56 bit keys, and there are therefore
      72,057,594,037,927,936 possible keys. It has become fairly easy to crack this code by brute force脩
      i.e. by trying all possible keys. Because of this, DES is being decertified in 1998, and the
      administration wishes Clipper to become the new standard. The Clipper encryption algorithm, called
      Skipjack, uses 80 bits, resulting 16 million times as many keys. It is unclear how long a lifetime will
      result from such a modest increase in key size.

      The essence of Clipper is the Escrowed Encryption Standard (EES). This combines the Skipjack
      algorithm and an escrow system which is cast into an integrated circuit called Clipper, to encrypt
      digitized communications. The key escrow system involves dividing up the decryption key into two parts
      and giving one half to two different government agencies. Currently, the government agencies receiving
      the keys are NIST and the Treasury department. This is supposed to ensure that the keys can only be
      obtained with proper court authorization.

      WHAT'S THE PROBLEM?

      There are many concerns raised about Skipjack. The NSA developed the algorithm in secret and demands
      that it must be kept secret. This suggests to encryption experts the possibility of a severe weakness in
      the algorithm. Perhaps it can be easily cracked without the keys. DES, a previous NIST designed
      encryption system, suffered from the same lack of confidence after the algorithm was modified from
      IBM's original Lucifer. It was only in the last two years that it has been found that the algorithm was
      actually improved.

      There are also important technical and structural problems with Clipper and EES. The key escrow
      system takes an algorithm that is supposed to be robust enough to take hundreds of years of
      supercomputer time to crack and reduces this supposed protection to padlock level security; if one has
      friends at the two agencies who can be bribed, then one can tap any link for which they hold the keys.
      Additionally, the escrow system is constructed in such a way that once a key has been revealed for a
      Clipper chip, it is then known forever. And, the court order procedure does not include any verification
      that the chip to be defeated actually belongs to the individual cited in the wiretap order.

      The Clipper chip implementation may also have some problems. Apparently, if the initial handshake and
      setup between chips is interfered with, the chips silently revert to an unencrypted mode of
      communication. Due to the classified nature of the design, problems of this sort are difficult to identify,
      and if identified are hard to verity. Again, the secrecy surrounding the development of Clipper has
      people worried that a back door or secret access method may exist. Also, all chips use the same key
      worldwide to encode the initial handshake; as soon as it becomes known, various weaknesses are
      exposed, such as the ability to easily track digital cellular phones, even for those who cannot read the
      messages. It is also possible to wiretap and record conversations and then decrypt them later when a
      wiretap court order is obtained, violating the time limit on the court order.

      Currently, the government says that it won't stop people from using their own encryption systems.
      Clipper will be a very expensive effort to install. Is the government hoping that criminals will be
      smart enough to use cryptography to hide their illegal activity but dumb enough to use the government
      designed system without including a second, more secure layer of encryption? Are they hoping that good
      encryption does not become commonly available in normal consumer items, such as in facsimile
      machines? There are already inexpensive systems that are available like Viacrypt's Pretty Good
      Privacy (PGP).

      AND THAT'S NOT ALL . . .

      Clipper is a technical collision between the scientific capabilities of the 21st century and a medieval
      understanding of crime fighting and of science. I'm reminded of a cartoon depicting a Pentagon soldier
      guarding a computer against viruses by pointing his gun at a modem. Similarly, cryptographers point
      out that there is no security in algorithms that need to be secret, or in crippling a system and then
      trying to keep the Achilles heel in a vault; either of these can be compromised in minutes, regardless of
      the supposed mathematical integrity provided by cryptography.

      Despite technical flaws, perhaps the biggest problems with Clipper are policy Issues:

      楼 Clipper was developed by the NSA without a public review process. The public must be able to decide
      how much freedom to give up through open debate.

      楼 The NSA is barred by a 1987 law from working on systems destined for public use.

      楼 Clipper cripples privacy mechanisms in advance of due process. Historically, our system of
      government has prevented anticipatory interference in the design and deployment of
      telecommunications mechanisms without a demonstrable clear and present danger or evidence of
      wrongdoing.

      楼 The government is allowed to bypass court orders in obtaining the escrowed keys if national security
      is involved脩a frequently misused justification.

      楼 The government won't discuss Important issues脩who will know the algorithm used to generate keys,
      or have access to keys without court order? A government response to criticism, published in the
      Federal Register (Vol 59 No. 27), was a mixture of denial. evasiveness, and promises for
      improvement.

      楼 Clipper will be resented by the international community. Good encryption systems are available
      overseas and other countries will not want their banking system (for example) to be forced, in order to
      interface with our own, to use a compromised security system to which the U.S. holds the keys.

      楼 The voters do not want Clipper. A brief email campaign produced 47,000 petitions against Clipper in
      a few weeks. This is a remarkable response.

      楼 The administration has said that non-escrowed encryption is not a matter of right, suggesting that
      other systems may be outlawed later.

      楼 Encryption systems need to be constantly reevaluated and tested, which is impossible if the plans are
      secret.

      In addition to the above, Clipper is a government program with a not-so-secret agenda. The claim that
      only the government itself is required to use the system is undermined by the statement that Clipper is
      aimed at catching terrorists and organized crane. This implies that the government expects to succeed in
      pressuring society into widespread adoption of Clipper. Many people are tired of this form of deliberate
      misrepresentation and lack of forthrightness.

      Attempting to deploy an expensive, compromised encryption system is likely to be a doomed experiment
      in economics, politics and law enforcement. Americans consistently show that they do not appreciate
      being manipulated by their own government. It is unfortunate that the agencies we have set up to
      protect us against criminals are so lacking in diplomacy and technical competence.

      WHAT CAN I DO?

      First, educate yourself. More detailed information about Clipper is available from CPSR.ORG by
      electronic mail and other means (see page 14). Second, write to your congressperson and indicate how
      you feel about Clipper and write to the administration as well. 47,000 signatures were recently turned
      over to the White House, but individual letters are relatively rare and are quite important.

      Miscellaneous

      VOLUME 12, No. 2 The CPSR Newsletter SPRING 1994

      The CPSR Newsletter is published quarterly by Computer Professionals for Social Responsibility, P.O.
      Box 717, Palo Alto, CA 94302, voice: 415-322-3778, FAX 415-322-4748, email: cpsr@cpsr.org.

      Copyright 1994 by CPSR. Articles may be reproduced as long as the copyright notice is included. The
      item should be attributed to The CPSR Newsletter and contact information should be listed.

      Guest Editor Judith Stern Executive Editor, Layout & Design Nikki Draper Board of Directors Eric
      Roberts, President Jeff Johnson, Chair Judi Clark, Treasurer Steve Dever, Secretary

      Jim Davis Jim Grant Paul Hyland Steven Miller Todd Newman

      Aki Namioka Dave Rasmussen Coralee Whitcomb Terry Winograd Marsha Woodbury

      CPSR's National Office Staff Kathleen Kells, Managing Director Nikki Draper, Communications Director
      Susan Evoy, Database Manager CPSR's Washington, D.C. Office Marc Rotenberg, Director David Sobel,
      CPSR Legal Counsel Dave Banisar, Policy Analysist

      CPSR Washington, D.C. 666 Pennsylvania Ave., SE, Suite 301 Washington, D.C. 20003 202-544-
      9240 FAX: 202-547-5482 email: rotenberg@washofc.cpsr.org



      If you move, please notify the CPSR National Office. The CPSR Newsletter is mailed bulk rate and the
      postal service will not forward bulk mail.
      415-322-3778 / cpsr@cpsr.org



      CPSR'S NATIONAL INFORMATION INFRASTRUCTURE WORKING GROUP

      CPSR has an electronic discussion group on the National Information Infrastructure. The list is open to
      any interested members. To subscribe, send email to listserv@cpsr.org. In the message type:

      SUBSCRIBE CPSR-NIT <your firstname> <your lastname>

      You will receive a message that confirms your subscription. After that, you should begin receiving any
      messages sent to the group. In order to send messages to the discussion list, send mail to cpsr-
      nii@cpsr.org. If you have any problems, send email to admin@cpsr.org.

      Archived CPSR Information
      Created before October 2004
      Announcements

      Sign up for CPSR announcements emails

      Member login
      Not a member yet?
      Ongoing Projects
      > Elections Project
      > Public Sphere Project
      > Liberating Voices! Pattern Language Project
      Chapters

      International Chapters -

      > Canada
      > Japan
      > Peru
      > Spain
                more...

      USA Chapters -

      > Chicago, IL
      > Pittsburgh, PA
      > San Francisco Bay Area
      > Seattle, WA
      more...
      Why did you join CPSR?

      The growing importance of civil liberties in a paranoid world: we need organizations like CPSR.

       
       

      “Certainly. That seemed to be the purpose, in the London hotel. A person as clever as that must have planned this entire affair and has undoubtedly accomplished his wish and vanished long ago—or else he can never be caught because we have no way to discover him.” But she only answered that that was unlikely and slipped her arm around his neck, as she added that if anything were to happen to him, she would not have one real friend in the world. There was something pathetic in the quiet realization of her loneliness. "You're a liar," said Shorty hotly. "You didn't git out o' the regiment because it stole niggers. That's only a pretend. The rear is full o' fellers like you who pretend to be sore on the nigger question, as an excuse for not going to the front. You sneaked out o' every fight the regiment went into. You got out of the regiment because it was too fond of doin' its duty." His volubility excited that of the "Captain," who related how he had been doing a prosperous business running a bar on a Lower Mississippi River boat, until Abolition fanaticism brought on the war; that he had then started a "grocery" in Jeffersonville, which the Provost-Marshal had wickedly suppressed, and now he was joining with others of his oppressed and patriotic fellow-citizens to stop the cruel and unnatural struggle against their brethren of the South. As he reached the top of the bank a yell and a volley came from the other side of the creek. Shorty joined him at once, bringing the two boys on the engine with him. "I'll look out for that." "That is," Dr. Haenlingen said, "fools like you." Rogier opened his mouth, but the old woman gave him no chance. "People who think psychology is a game, or at any rate a study that applies only to other people, never to them. People who want to subject others to the disciplines of psychology, but not themselves." "There are spots the steel's never covered," he said. "You can tunnel through if you're lucky." A pause. "I—" "No—it's just something one enjoys, same as cakes and bull's-eyes. I've kissed dozens of people in my time and meant nothing by it, nor they either. It's because you've no experience of these things that you think such a lot of 'em. They're quite unimportant really, and it's silly to make a fuss." "I ?un't that. I'm just a poor labouring man, wot loves you, and wot you love." HoME免费国产一级毛卡片视频app ENTER NUMBET 0017
      www.ante3.com.cn
      www.uwoo.net.cn
      linke8.com.cn
      www.buma0.net.cn
      www.riyao1.net.cn
      buzuo0.net.cn
      yamin9.com.cn
      www.0ppo.com.cn
      www.ablsilver.com.cn
      qunhe2.net.cn
      大胆胖女人体艺术 性爱333哥哥干哥哥干嘛哥哥讨厌 乳交写真 h女同电视剧 华人在线伦理电影 人妻系列成人动漫 日本美女露b高清图片 美女黑木耳处照 WWW.GAN860.COM WWW.LED6918.COM WWW.HQ-ZSW.COM WWW.OPP999.COM WWW.BJBJ100.COM WWW.HHH307.COM WWW.JAVCHAN.COM WWW.TCBGC.COM WWW.BJZJQF.COM WWW.02MK.COM WWW.987BB.COM WWW.XMBJGS.COM WWW.VERISIGN.COM WWW.HHH437.COM WWW.AOFEINI.COM WWW.BBB549.COM WWW.NENNENLU.COM WWW.HHH018.COM ABU.OMAR WWW.BBB598.COM 大肉棒丝袜裤性奴 欧美丰满美女图 半夜成人影院 晚上电影网址 东京热制服群交www51gannet 高清播放成年网站 在线成人国产打飞机 台湾综合网首页 第九月激情网yuyongniancom 制服丝袜AV无码专区 色色资源站色色资源站影院色色资源站在线影院 狠插猛干舅妈 爸爸日我逼逼 玛雅maya十八岁 nass系列合集 东方AV在西安 蝌蚪窝kedou2www980022com 亚洲丝袜偷拍论坛 迷人av 90色吧影院 μs浏览器成年影院 毛片人兽性交的视 www操酷狗com caopporn超碰 小明看看首页看www1234zacom UC色片 大唐淫乱 美剧排行榜 97yy成人 米奇第四色做爱 我想看鸡巴插小逼免费片 青青草视频观 狠狠干迅雷 少妇诱惑舞蹈 全家乱淫交换 玩弄阴道 www484ppcom lululuAV 母女交换啊啊啊啊 爱幼幼社区 丝袜3av网 九色撸撸 最新三级片电影 日韩AV-撸波波影院 susu62avav www7s 色色色999曰韩国拍 大黑鸡巴性交 有个黄色网站的网址是wwwkou多少 迅雷下载自拍偷拍 苹果手机在线看片网址 av闲人吧av在线看 云播欧美 五月五婷婷AV 成人校园乱伦密史 推女郎色图 涩人阁第四影院 无毛萝莉在线观看 香蕉一淫 wwwavtt98com 啊啊啊老公不要图片 邪恶漫画之嫂嫂受孕 京东人妻50 韩国黄色的三级片 淫荡妻成人3p小说 黄色片毛wwwjlnqkaqbwocn 社旗黑社会老大王燕 肉棒被淫穴亲亲快播 女同无码先锋 冯仰妍16分钟在线视频 丁香五月婷婷人与兽 www789cgcom mmtt44校园春色 欧女性生殖真人图片 丝袜旗袍露脸 主播身材诱惑国产 国产露脸母子 在线播放成人网 www色色www44tutucom 性感欧美第二十期成人网 屄一样的花 色交录像 av天堂网2016 幼女逼被插 成熟俄罗斯女人与性 村上凉子演过的近亲黄色电影 熟女自慰影片看快播 青毛极品画眉鸟图片 网业的黄se电影2014 大妈三人性交 强奸乱伦制服诱惑亚洲bt迅雷下载 熟女网微博 俄罗斯幼网站 冰漪图片欣赏 干妈的肥穴真好玩 乳罩口交 90后模特色图 欧美浪屄图 大胆人体美女私处艺术图片 幼女做爱种子下载 60老女床上视频激情 绫香是a片的 新娘 小穴 高清裸体炮图 人和动物片片 av台湾无码 欧美大屁股熟女俱乐部 打炮超碰在线视频 小色迷ge av资源网ye123 少女的b上没长毛的b 最人体大胆女艺术 日美女阴道 迅雷看看菅野亚梨沙 东北成人网论坛 自慰门mp4 通辽市信息港 小学生心理测试题 肏女大学生的经历 930影院手机版 30p亚洲性交 色色区 116田255田163田176把田字换城 黑人体艺 我和妈妈的激情性爱故事 上午鲁下午鲁 本多快播下载 丝袜足交视频晚上碰99 xxx4tubetv 大逼tu 淫荡小妞被插15p 成人网玉环网狗奴舔脚视频 nanrenaikandirenti 视频裸聊裸性爱裸肏屄裸口交 青涩基地 入屄爽鸡巴 屄肏文章 美国操逼片视频 淫荡日本小说 丰满人妖的性爱 日本人兽片番号 美女午夜爱爱网 国语干老太太逼快播 大胆人体艺术电影 WWWSEWGPCOM 清狗人体艺术 kkbokk自拍图片 秘密爱中的做爱是真的吗 大奶裸体人体艺术图片 屄草垮 东京热手机版 佐佐木希作品快播播放 色姐姐自拍 gogo人体高清人体孙俪 ppp邪恶动态成人图 韩国sheyiye 日本幼女破处网 午夜伦理av男人的天堂wwww6080com 看8o后操B射 国产自拍热99www99kk5com WWW淫民色色色 96插妹妹sexsex88com 激烈抽插漂亮大奶妹 欧美黄人成人视频 湖南妹子艳照门 一条莉音肛交 91色妹妹AV hulisecow 我和淫荡美女操逼的故事 欧美人妻被迫 日日拍嗷嗷拍 波多野结衣操老师 偷拍自拍泳衣 黄女人京东干 韩国美女捰体mm照片 国产国语偷拍在线视频 中国av教育 wwwxingqingzhongrencn 山毛人体艺术 丰臀骚妇 操 俄 快播 遮天 有声小说 春色满员 日本minato h网 你懂得 有没有动漫h网 给我一个h网 谁给个无毒的h网 东京热真做 手机看黄片怎么看 5252黄色小说 大色鸟 色界论坛 生殖器官 我去摸逼 成人文章网 models视频 哥去射中文网 色撸橹 日日 撸友网 撸射网 撸飘飘少女 喜爱se在线播放 亚洲 另类 春色 3d漫画 白洁 链接 深爱开心五月图片区 av12电影手机版无码 2019午夜AV yitunhuo最新链接 avbus 最新地址 免费剧情漫画 snis-937在线 少女潘金莲一老司机看电影 大爱撸免费在线影院 中口韩特级大黄片 特区爱奴无剪辑 免费视频在线观看国产情侣自拍 性奴小说视频 小泽玛利亚bd视频 日本学生妹自慰视频 日本淫a片在线观看 日本熟女人妻视频 荡女婬春神马影院 情艺中心在线紧急 JJJ347 古侠武典小说天堂 色喇叭国产自拍 amt005磁力链接 迷奸美女伦理片 成人avav 射射射日日视频 国产群交在线观看 厕所女人偷拍到的手淫视频 大香蕉本色成人视频 翘臀少妇内射50p 女人鸡吧 国产牛牛热线视频 你懂百度资源 白嫩寡妇巨乳伦理电影 国产自拍小视视频 秋月小町av 迅雷下载 小视频胸大的 萝莉无圣光小鸟酱百合 老炮儿琪琪看片 我要黄片儿强奸的黄片三级黄片 人人操 视频 4422n xvideos中国人双飞 播放s片韩国毛片一级 Chinahomevoid 一本道高清AV电影网 窝窝电影之大香蕉 超屌爽 caoporn91视频在线 av在线直播 ssni-261在线 300mium-086 超碰首页 vr格式 色久悠悠青草 福利上瘾怎么播不了 福利视频优衣库完整版 xxoo又黄又色 111番漫画 亚洲黄片在线 av电影中文字幕 小依天堂 色999色屌丝 1769hz在线 蝌蝌窝2018地址蚪蝌窝 大香蕉色影 VVTcc秋霞影院 亚洲成交毛片 日本高清无码高评分 舔少妇屄屄 草莓慕斯塔的全套magnet 十八禁资源群 七月丁香网水野朝阳 三级黄线下载 旅游时看到蜜桃臀想操 爱色影激情在线002 日本无吗无卡高清在线观看 76zy 老司机午夜Ⅹ0 2588影院 校园激情自拍偷拍 汤姆影视avtom 扩阴无码 mp4 美女逼逼视频 强奸女大学生 下载magnet 深喉口爆群交在线视频 曰b镜头给你看看 玲木波多 gav免费播放成人大片 亚洲破除系列 百变女神魅心户外大马路 wwwxy14app 开放90后在四虎线观看 91性交视频 香蕉网络电视 校园春色激情 爱视频 校服白丝污视频 波野结多依 magnet 周晓琳视频下载 mkck-194 show网站公路黄色网站干她舒服 国产直播小嫰女直喷自摸阴蒂 94福利社区会员 www559955com 视频 国产 大胸 在线 日本伦理影院 秋霞一级毛片 www5y95con 久久人人97 狂燥空姐小穴 怪兽AV动漫 国产偷啪棚户区站街女在线观看 被同事扣出水视频 爆乳啪啪啪视频网站在线观看 藏精阁第一福利宅男搬运工 jjkkrrrr 大香蕉人伊在线这是我的网站 800AV最新地址 av网址站 91x视频成人教育a v 联合中英美 成人娱乐av男人的天堂 光棍影院2017鬼父 u15 天堂图片区 成人福利影院免赞网站 陈慧二字图片 二级艳舞黄色视频 3成人视屏在哪看? 自慰视频福利在线看 快播成人电影五福影院 夫妻房事做爱动作大片一级黄色 - 资讯搜索 老男人和胖女人做爱视频卜 在线福利gv 写真av全裸影院 日韩无码180 最近网上怎么看不到小视频 XXx在线视频 影音先锋成人伦理无码 藤井蕾娜迅雷种子 福利片优播看看 在线看 操逼视频啊啊好舒服 采精的小蝴蝶在线观看 国产偷拍自拍91 噢门毛片 啪啪叫床视频 亚洲av在线播放人妻 maomi8686 咪咪网 国产自拍 母乳新人协和 chengrendianyingzipai 国家福利是什么狗屁 女日本女日直播视频 迅雷下载地址 混血哥双飞高颜值的上海177制服 空姐办公室乱欲 3d动漫在线播放 色姑娘棕色姑娘综合站 极品清纯大奶90后妹纸自慰视频 曰b黄色视 狂操空姐骚穴 成年人大片网站 日韩女优无码性交视频 淫妻小说 同性视频网站 黄色网站大全 欧美4p番号 黄片网站啪啪视频 啪啪游戏视频 男女上床尻屄视频 淫shipin 汤姆影院AVt0n rd845影音先锋 都市凌香录在线有声 9191偷拍在线播放 黄色一号视 CLUB-162可以搞的人妻回春按摩3中出交渉偷拍 自拍图片专区12p 亚洲图片欧美图片天堂网 影音先锋av资源tokyo 6seavcom 香蕉丁香网 后入极品美女自拍 好屌色在线精品网站 艺校女生贴身衣物 女人B脱毛视频 大棒棒塞进洞洞的视频 爱福利视频cc 4438成人黄色视频 艾迪av无码 三级片视频图片 色狼群免费小视频 欧美性受群交视频1在线播放 爱看影院视频伦理 国产自拍HHHHH 人体手机壁纸 草杨幂的小说 至爱色色图 艳欲迷墙 新色猫咪导航网站 欧美性爱黄色淫淫网 张筱雨的淫荡 顶级姑娘大胆人体摄影 宫崎葵寄生木下载 口述6p a片在线看 中欧人体美鲍艺术 日本被老公的领导调戏 各种犬的性能力 huang片网 成人激情乱伦大集合 日本成人漫画网站 欧美性交电影先锋播放人与动物 普通话淫荡对白山东94年的大奶小姑娘和男友 看裸体漏阴道 日本女人的阴性毛 操人体模特 欧美裸模大胆露阴图 乱伦家庭母子小说 筱原凉子av先锋影音 每晚小姨骗我上床 风骚淫荡妈妈做小姐 WWW_280_COM � 做爱嫩穴 草裙 女人大奶子撸撸色图 偷偷拍影院 性感美女性器 操尿图片 美阴图 xxxsexeurpe 冠希哥亚洲视频 母子115网盘 苍井空护士水蓝色裤袜全集 妈妈的肥乳 丝袜做爱少妇 非州大炮干亚州少 美女性感视频网站有哪些 日韩考屄视频 李静仪 西湖是哪个省的 钢铁侠1国语 朴唛妮28部全集 波多野结衣是哪个公司的 幼女插进 国产女主调教视频在线 骚逼美女网 罗李芳身份证 父亲顶入亲生女儿小说 自拍偷拍欧美论坛 成人偷拍自拍自拍 美女三级黄色美图 欧美色图漂亮的女主持人 百度日本强奸电影 腾讯联合藤下梨花 欧美黄色电影怎摸进 丁香五月中字欧美三级 俄罗斯美眉的逼 姑娘人体摄影 男用壮阳喷剂 西西人艺网极品粉嫩美鲍70p中国人体 美女爱鸡巴快播 日本女优吉吉 国内成人露脸 搞女儿 外国男人操中国骚逼 94草b 日韩炮图图片 大鸡巴哥哥草骚屁眼 小学生幼女av 西西学生人体 东热操屄图 女王性侵小说 色八阁 欧州毛片5 ccm99oinet 人体艺体阴部插图片 处女做爱av视频 se色撸撸 非洲黑人日本女人 姐妹乱伦专辑下载 老妇的性事小说 自拍偷拍先锋视屏 www45hucom 13骇人游戏美国版在线视频 日本妓女被操的电影 三级片免费在线网站 完美动态艺术 姐姐和弟弟操逼 人妻小黎19p WWW233SIHUCOM 2017男人天堂在线77bbs787com 美女人阴口毛 52草逼 艳照门肛交 爷爷操幼幼书 mm365小说 成人处女被操视频 综合承认在线 美艳国模裸体完美展示 新视觉影院ios 白虎的嫩穴 操白虎屄视频 琪琪影院经典片 日韩av综合网magnet 自拍偷拍动漫视频手机播放 japhd日本55 熟妇漫画合集 日本av淫乱小穴 tube8xxxfree 自拍偷拍校园春色撸一撸 干空姐的小穴 哥哥干妹妹wwwggwmmcom 狠狠草狠狠干青青草 想老公的大肉棒了 亚洲荡 儿童爱爱网站 啊不要人家小穴都湿了 啦啦队宝贝av资源 奇色手机影视 夜夜撸勾引骚女亚洲 涩站网 永久束缚少女小说 塞尔维亚人体艺术 在线免费观看动物敲门 谷露英语 tube幼子 1069gv同影网 色人www46ltcom 超碰淫淫网 性爱影片名称 秋霞福利小说书 我要看一丝不挂女人的逼逼和大奶子图片 黄色网站偷拍自拍亚洲熟女乱伦丝袜 韩国x档案全文 我的娇艳淫荡妻子 母子姐姐做爱图 人妻淫淫网 2017年夫妻群 李梅大屁股 酒店后入在线视频 极品美腿人妻系列 一天让多个女人发黑木耳照片给我 制服诱惑丝袜美腿亚州电影 图片如题在线电影观看地址 撸色淫乱图 夜间电影a免费 野蛮部落的性生活 爱库99bt 香港三级先锋 免费在线黄色小说阅读最新yy黄id 大色逼 丝袜性奴老师 呢女同 操大美幼 三十七度二百度云 东京热制服群交www51gannet 35gao在线福利免费观看 wwwav882com 农夫激情基地 自拍亚洲中文字幕日韩欧美 武汉玩小姐 哥哥噜狠噜噜 色爷爷影院 WWW52色C0m 怡春院分站 京香juliaav视频免费观看 朋友淫荡的妈妈我可以操你妈妈吗 插女儿的小屁眼小说百度 免费黄色电影76yrcom 天天射鲁一鲁 色窝窝黄站小说 能看的在线av站 调教型a片 meiguose 欧美末成年处女图片 久草李雅 陈勤勤的所有肉偿视频 类似达酷的网站 有基zzcom 2000激情影院 先锋av资源在线 jizzjizz有jj和bb两性器宫人 五月激情夜 国产偷拍一在线观看视频 女子柔术视频裸体大全 n0015叶丽美先锋影音 波多野结衣性感写真 轮奸淫荡的妻子_ 搜索www108yucom 我用假阴茎的小说 人妻淫色删除 成人性爱视频在线观看 淫奇艺影院欧美Av 超级碰caoporm 与邻居三少妇 精品自拍美女 久草sdde wwwer37comwwwer37com 女人尿尿的器官 500资源网视频在线 在线视频无本道狂野 大咪咪乳房表妹大肥逼 sm性奴人妻母狗调教色图 gayandguy亚洲 成人丝袜视频大全集 刘可颖欢乐岛 素人啪啪啪 办公室av下载 688ttfcom 新鲜大吉鲍 亚洲制服av 金瓶梅之鸳鸯戏床小说 亚洲色之图 在线秘密AV 人妻五月天在线下载 熟妇乱伦图片区 76资源网妈妈的朋友 处女宫电影 另类在线先锋 黄色a片免费看 性交触视频 玖玖总站资源青草 japanyellowmovie 形形色色五月天 射射草 大伯影视 身穿民族服饰的中国少数民族漂亮美女大胆人体艺术7国内 www淫色色淫com奇米综合网 那里有龙珠色片 东方亚洲av东方亚洲狠撸 wwwpu628com 人与兽性毛片 nnyythunder AV天堂wqng 黄色aA片magnet 色wwwcomcn 丝袜巨乳人妻连裤袜 祼体美女露阴图 91在线最新官方地址发布页 欧美av电影幼幼片 nipingdebi 狗交的张柏芝 屄 图 p 黑 新片欧美十八岁美少 苍井空露阴道阴毛图片 肥佬影音适合的网站 福原爱谈av 老女人13p 360爸爸操死我吧舒服死了txttxt在线免费阅读 影视先锋伦理电影 夫妻交换操屄俱乐部 伦理txt 人体艺术toupian 做爱乱伦先锋电影 高树三姐妹txt小说 千草忠夫 父女性爱母子性交 147小泽玛利亚人体 好有肉感好甜美 中学女生三级小说 上原结衣哥哥射 快播韩国主播视频 婷婷快播网址是多少 岳母 奶子 熟母 电车 岳母 父女做爱的自述 苍井空白浆av 外国美女阴部写真 徐子淇面相 抗衰老产品 天通苑尾货市场 精灵的守护者 周国平散文读后感 艾灸视频 WWWBJ8080COM 天堂文学占有大姨子的身体 老奶奶勾引青年开房床上变态做爱 护士美女裸体照 多毛阴道图片 欧美性急交 当阴经插入美眉bb里的那一刻 欧美淫乱猛图 狠狠射ssdy 男人玩充气仿真娃娃 成人激情黄色乱伦电影下载 欧美性爱潮喷集锦 日本乡村义母 3圾片大全快播文件 熟女欧美亚洲 操老浪屄 露阴部人体艺术 每日更新的色站 亚州色图波多野结衣性交图片 幼幼强奸摸奶 黄色我和姐姐在公交车上 欧美裸体漏阴图 能看影院大片的软件 陈冠希qvod 卓依琳的做爱电影 大奶金发美女吃鸡巴 少妇美女做爱色图 12345678性爱 肏屄香小说 黑人对性的看发 干大屄人体 WWW827724COM 我和少女3p日记 雅玛小说网 淫荡妇女优 人体艺术开档 小说鸡巴淫城 秒播国产偷拍视频在线观看 色哥哥帝国军情 鲛岛琉生如狼 俄罗斯成人激情电影 自慰国语三级欧美 狠狠射黄色电影 小女孩阴部视频自慰视频 美国四级在线云播放 `国产自拍色 百度影音幼幼 与淫荡女医生做爱 tunfeixiaoyizitu 小人大鸡巴干熟 荒野嗯啊 少妇逼逼超嫩 草榴社区文学区 哥哥轻点好疼好大 五月停停五月天47cccccom Av激情网 自慰偷拍亚洲天堂 亚欧图片有声 wwwbbb560von 超碰痴汉空姐 撸撸鸟AV亚洲色图 老熟女内裤丝袜图片 后女QQ上买内裤 日本美女色色色 百度一下luotiyis 快播成人日本幼女系列 插插插总和我 少女插p色图 操逼性交被人操了小说 美国免播放器射吧 有声小说色 春色堂永远 h网是什么意思 www黄色录像com www访问 东京热导航 东京热401 东京热toky 为什么酒色网 酒色酒色网 酒色网 网站 黄色小说集 葵つかさ 悦来客栈 爱色就色网 高处女电影 狼人电影网 我色淫我乐 99999AV电影 百撸社区 撸踏踏20以下禁止入内 日本Av饭免费观看 人人看91视频直播 白色手机天堂网站 gav成人网站在线 女优磁力链接在线观看 ooxx老湿影院 情侣不雅激情实拍papa 日韩精彩短视频 樱木莉爱无码 MP4下载 影音先锋 av资源 日本头交视频哪里看 美脚妻连体袜在线播放 深喉吞精中国 yuputuan01 在丈夫面前福利视频 影院电影手机观看综合网 rav 无码 eee119猫咪网 live 图 无码 蓝沢润av迅雷下载 有bi吗va视频 网红做爱迅雷下载 mp4 超频在线 prisonschool里番免费看 41st福利视频 999西瓜视频 久久爱国产自拍偷拍 在线搞 午夜福利免费视频50集 红楼78电影网 韩国片神马影院 性奴电击灌肠调教视频 大爷操免费 桥本麻衣子398 艳m迅雷在线观看 艳姆秋霞影院 幼i交18girl renyidongwujiaopei 黄片狼人与岛 犬屋敷 影院 希咲彩大战黑人 福利757午夜云播 45tom影院 色王者 欧洲性x xx 铃原爱蜜莉在线无码 yuzuki柚木 国内自拍第五 草b在线免费视频 美女 youzzjj影视 a v淘宝在线观看 松坂美纪 23riri新地址 ipx072在线观看 在线视频 就是操 xo色视频 黄色干逼 视频在线观看 瓜皮影院韩国伦理片 幼女视频吗 光棍影院福利在线看 快点插我快来了视频 18v韩国主播 一本道国产在线97 免费看黄尤美 长泽梓所有无码高清在线 桃谷绘香里高清无码 西瓜 avxxxx 老是免费十分钟影院 射丝袜足 在线影院 国产名人女神学生 奉仕在线播放视频 大空美绪 手机免费视频在线观看 苍井空无码 换妻 偷拍 任你不一样的搞法搬运工 miad-812 92看看电 影网100午夜合集 黄色网站在线浏览 337p日本人 性爱vn 露脸怒草发廊高颜值小姐 小彩的屁眼 鸭子av性 性抽插视频福利 哪有松岛枫电影 亚洲人妖在线资源 看两性啪啪真人免费大黄片 哥也射综合 影音先锋2019a v源站 裸聊视频在线播放 哥去射偷拍自拍在线观看 欧美黄A片天天影院 小仙女思妍手机在线视频 黄色AV导航 偷窥盜摄在线播放 撸一炮 炮一炮在线视频 类似51abab 自拍色人阁 视频二区学生系列知名国产 一部影院b 肉蒲团之极乐净土免费观看 苍井优一本道在线 操逼视频中文字幕 变态碰碰强奸 北嵨杏 金蒲团直播艳艳 亚洲日韩激情文学 长泽梓AV在哪看 成人极速性生活视频 草帽AV ppppmmmmmm 朝桐光视频 陈冠希迅雷 全套bt种子 变态熟女在线 ssni磁力链接 成人时平在线播放免费 被轮j的校花高晓 草根艳舞团 县城全裸淫荡火爆 苏小欣磁力下载 丁香五月欧洲大香蕉 快播麻辣影院 人人操人人日视频 白鸟樱 无码 在线 琪琪色在线影院福利视频群 性感女主播0 日批又黄又色的动态视频 超高级国王游戏电影 那有小姐操逼视频 爆乳自拍偷拍 苍老师操b 果宝张筱雨 国产自拍伦理片久久热 国产私人玩物视频在线 freex性日韩免费视频 亚洲成人0887 伊人性爱 极品白嫩美女主播极尽诱惑,喜欢的不要错过16 wankz视频日本 最新制服丝袜 爱沢花梨加勒比 magnet 2018最新AV福利中国 yut2 uuu777在线观看 a4yy万利达首播影院官网 青青草i在线视频 舔阴蒂日本 伦理逼 麻条北妃 色男人福利论坛 色婷亚洲五月 饥渴的熟妇番号 青青草kjii 强奸资源网站 鸡宝 肥佬影院 精品福利影院 教室诱惑夹笔杆番号 鲍粉逼 夜用影院 91凤吟鸟唱 sigua 888com 女同性恋做激情视频 和寡妇干b 缓冲小视频厨房干 丝袜美腿品玉小说下载 sheyujie 1000部啪啪啪视频日本 短发气质美女小秘书公司聚会被领导算计喝多了带到酒店蹂躏 色福利亦航 丝袜女同性恋接吻女子磁力 卡在电梯里的av系列 韩国ck青草直播 OX做暧昧免费视频 中学老师在线视频 免费v片在线观看2320 好B网视频在线 农村夫妻生活偷拍视频 主播走光 磁力 艹小穴视频 97总站人妻在线视频 老鬼色综合 Caoii∪1024 超清:90后巨乳美女被色狼疯狂摸胸吸吮后······ 高清 福利小视频 【19禁热舞】-诱惑视频- 视频在线观看 - 爆米花视频 内射肉丝视频 三上悠亚xz av网站在线免费观看幼嫩 动漫靠逼18岁视频 虎牙高管潜规则视频 ddoox校园 新城春奈影音 美女野外艺术写真 WWW_YESEGE_NET 和美女明星做爱舒服吗 人与动物电影大全 66电影成人电影 毛篇片地址大全 亚洲美图t 百度马六人体艺术鲍 妇乱艺术穴图 男模王魅经典全见图 操骚逼妈妈中文对话 操逼涩蝴蝶 亚洲视频人妻按摩 少妇在线内射 yijidianyeng