766 lines
36 KiB
Plaintext
766 lines
36 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sat Apr 25, 1992 Volume 4 : Issue 19
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Associate Editor: Etaion Shrdlu, Jr.
|
|||
|
Arcmeisters: Brendan Kehoe and Bob Kusumoto
|
|||
|
|
|||
|
CONTENTS, #4.19 (Apr 25, 1992)
|
|||
|
File 1--Hacking, Then and Now
|
|||
|
File 2--Text of Sun Devil ruling
|
|||
|
File 3--Ralph Nader/Cable TV/Information Networks (corrected)
|
|||
|
File 4--Battle over Landsat/Public Domain (fr: Corp. Crime Rept)
|
|||
|
File 5--Internet Society News
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4),
|
|||
|
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 24 Apr 92 19:01:13 CDT
|
|||
|
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Hacking, Then and Now
|
|||
|
|
|||
|
In CuD 4.18, Jerry Leichter raises several points for discussion.
|
|||
|
Each reveals the rapid changes that continue to occur both in computer
|
|||
|
technology and computer culture. Jerry writes:
|
|||
|
|
|||
|
2. "Information" and "computers" should be free, hackers are
|
|||
|
just trying to learn, there is nothing wrong with learning.
|
|||
|
|
|||
|
Point 2 I don't want to get into; it's old, tired, and if you
|
|||
|
don't recognize it for its moral bankruptcy by this time, nothing
|
|||
|
I can say will change your mind.
|
|||
|
|
|||
|
I doubt that Jerry means to imply that the debates over the
|
|||
|
accessibility of information are morally bankrupt or that the goal of
|
|||
|
learning through "hacking" is improper. Rather, the cynical use of
|
|||
|
the rhetoric of freedom by many "wannabe cybernauts" to justify
|
|||
|
intrusion or blatant predatory behavior distorts the original
|
|||
|
meaning of the term used by the early hackers. The original hackers
|
|||
|
found the challenge of the new machine intriguing. Few resources were
|
|||
|
available for exploring its limits other than hands-on
|
|||
|
trial-and-error, and there were no ethical or legal models to guide
|
|||
|
the initial exploration. Two decades ago, control over the new
|
|||
|
technology appeared limited to a relatively small elite who, if
|
|||
|
unchecked, would amass what some considered unacceptable power over
|
|||
|
the dissemination and use of computer technology and use. Things
|
|||
|
change. This raises Jerry's second point: Whatever one may think of
|
|||
|
hacking activity, its meaning is not the same in 1992 as it was even
|
|||
|
as recently as the late-1980s. Bob Bickford's definition of hacking as
|
|||
|
"the joy of exceeding limitations" is no longer the current dominating
|
|||
|
ethos of too many of those who have assumed the "hacker" mantle. The
|
|||
|
label has become a romanticized activity for teenagers and others who
|
|||
|
see password cracking, simple computer intrusion for its own sake,
|
|||
|
numbers-running, and credit card fraud as ends in themselves.
|
|||
|
|
|||
|
Like the counter-culture of the sixties, the "hacker culture" emerged
|
|||
|
quickly, shaped a new generation of youth exploring beyond the
|
|||
|
confines of conventional culture, and then disintegrated under the
|
|||
|
excesses of those who adopted the trappings while losing sight of the
|
|||
|
core of the new cultural message. Like the counter-culture, the ease
|
|||
|
of access into "hacking, the romanticized media depictions, the focus of
|
|||
|
newcomers on the fun to the exclusion of corresponding
|
|||
|
responsibilities, and the critical mass of exploiters able to
|
|||
|
manipulate for their own ends fed the darkside of the culture.
|
|||
|
|
|||
|
All meanings occur in a broader context, and the context of hacking
|
|||
|
has changed. Social changes in the past decade have led to changes in
|
|||
|
the definition of "hacking" and in the corresponding ethos and
|
|||
|
culture. The increased learning curve required to master contemporary
|
|||
|
computers, the proliferation of networks to share information, and the
|
|||
|
ease of distribution of software have reduced much of the incentive
|
|||
|
for many amateur hackers to invest the time and effort in moving
|
|||
|
beyond all but the simplest of technological skill. As a consequence,
|
|||
|
there has emerged a fairly large core of newcomers who lack both the
|
|||
|
skill and the ethos that guided earlier hackers, and who define the
|
|||
|
enterprise simplistically.
|
|||
|
|
|||
|
The attraction of original phreaking and hacking and its attendant
|
|||
|
lifestyle appear to center on three fundamental characteristics: The
|
|||
|
quest for knowledge, the belief in a higher ideological purpose of
|
|||
|
opposition to potentially dangerous technological control, and the
|
|||
|
enjoyment of risk-taking. In a sense, CU participants consciously
|
|||
|
created dissonance as a means of creating social meaning in what is
|
|||
|
perceived as an increasingly meaningless world. In some ways, the
|
|||
|
original CU represents a reaction against contemporary culture by
|
|||
|
offering an ironic response to the primacy of a master technocratic
|
|||
|
language, the incursion of computers into realms once considered
|
|||
|
private, the politics of techno-society, and the sanctity of
|
|||
|
established civil and state authority. But, the abuses of this ethos
|
|||
|
have changed the culture dramatically. Consider two fairly typical
|
|||
|
posts from two defunct self-styled "hacker" boards in the early 1990s:
|
|||
|
|
|||
|
Well, instead of leaving codes, could you leave us
|
|||
|
"uninformed" people with a few 800 dialups and formats? I
|
|||
|
don't need codes, I just want dialups! Is that so much to
|
|||
|
ask? I would be willing to trade CC's %credit cards% for
|
|||
|
dialups. Lemme know..
|
|||
|
|
|||
|
or:
|
|||
|
|
|||
|
Tell ya what. I will exchange any amount of credit cards
|
|||
|
for a code or two. You name the credit limit you want on
|
|||
|
the credit card and I will get it for you. I do this cause
|
|||
|
I to janitorial work at night INSIDE the bank when no one is
|
|||
|
there..... heheheheheh
|
|||
|
|
|||
|
Unfortunately, this is the "hacking" that the public and LE officials
|
|||
|
dramatize, but it is simply an infantile form of social predation.
|
|||
|
There is no adventure, no passion for learning, and no innocence
|
|||
|
reflected in today's CU culture. Jerry is, therefore correct: Times
|
|||
|
have changed. If Altamont symbolized the death the counter-culture,
|
|||
|
Cliff Stoll's _The Cuckoo's Egg_ symbolizes the end of the "golden age
|
|||
|
of hacking." culture and those who participate in it have lost their
|
|||
|
innocence.
|
|||
|
|
|||
|
Baudrillard observed that our private sphere now ceases to be the
|
|||
|
stage where the drama of subjects at odds with their objects and with
|
|||
|
their image is played out, and we no longer exist as playwrites or
|
|||
|
actors, but as terminals of multiple networks. The public space of
|
|||
|
the social arena is reduced to the private space of the computer desk,
|
|||
|
which in turn creates a new semi-public, but restricted, public realm
|
|||
|
to which dissonance seekers retreat. To participate in the computer
|
|||
|
underground once was to engage in what Baudrillard describes as
|
|||
|
"private telematics," in which individuals, to extend Baudrillard's
|
|||
|
fantasy metaphor, are transported from their mundane computer system
|
|||
|
to the controls of a hypothetical machine, isolated in a position of
|
|||
|
perfect sovereignty, at an infinite distance from the original
|
|||
|
universe. There, identity is created through symbolic strategies and
|
|||
|
collective beliefs. Sadly, this generally is no longer the case for
|
|||
|
most young computerists. Times have changed. Very few who currently
|
|||
|
attempt to justify the "right to hack" as a form of social rebellion
|
|||
|
recognize--let alone engage in--the tedious struggles of others (such
|
|||
|
as EFF or CPSR) that would civilize the Electronic Frontier. In the
|
|||
|
battle to expand civil liberties to cyberspace, contemporary "hackers"
|
|||
|
have not only *not* been part of the solution, they have become part
|
|||
|
of the problem.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 24 Apr 1992 17:22:24 EDT
|
|||
|
From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 2--Text of Sun Devil ruling
|
|||
|
|
|||
|
Text of Sun Devil ruling
|
|||
|
|
|||
|
On March 12, 1992, the U.S. District Court for the District of
|
|||
|
Columbia issued its ruling in the Freedom of Information Act case
|
|||
|
brought by Computer Professionals for Social Responsibility (CPSR)
|
|||
|
seeking disclosure of the Operation Sun Devil search warrant materials.
|
|||
|
The Court ruled that the Secret Service may withhold the material from
|
|||
|
public disclosure on the ground that release of the information would
|
|||
|
impede the government's ongoing investigation. On April 22, CPSR filed
|
|||
|
an appeal of that ruling.
|
|||
|
|
|||
|
The Court's oral ruling, which was delivered from the bench, has now
|
|||
|
been transcribed and is set forth below.
|
|||
|
|
|||
|
David Sobel
|
|||
|
Legal Counsel
|
|||
|
CPSR Washington Office
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
THE COURT: The Court's going to issue its ruling, bench ruling
|
|||
|
at this time, which will be its opinion in this case in the
|
|||
|
summary judgment motions. The defendants moved for summary
|
|||
|
judgment in this FOIA case, and the plaintiffs originally sought
|
|||
|
discovery under 56(f) to obtain information concerning sealing
|
|||
|
orders covering certain of the documents at issue in this action.
|
|||
|
|
|||
|
January 16 of this year, I denied the plaintiff's
|
|||
|
motion that defendants were not relying upon the sealing orders
|
|||
|
and that the Morgan case was inapposite, although it had been
|
|||
|
discussed originally at some other status calls before this
|
|||
|
Court.
|
|||
|
|
|||
|
In this FOIA case, the Computer Professionals for
|
|||
|
Social Responsibility seek these agency records regarding what's
|
|||
|
called Operation Sun Devil from the Secret Service, which is
|
|||
|
concededly a criminal investigation that is still ongoing
|
|||
|
involving information compiled for law enforcement purposes that
|
|||
|
was, involved alleged computer fraud which began back in May of
|
|||
|
1990.
|
|||
|
|
|||
|
The Secret Service has refused to release the search
|
|||
|
warrants and the applications for the search warrants, the
|
|||
|
executed warrants, as well as the applications for the inventory
|
|||
|
lists except as to one Bruce Esquibel, known as Dr. Ripco, who
|
|||
|
had agreed to have his information released. But as to the
|
|||
|
remaining 25 -- there were 26 search warrants -- the government
|
|||
|
has refused to release them, relying upon FOIA exemptions 7(A),
|
|||
|
(C), and (D) under the statute.
|
|||
|
|
|||
|
The Court's going to grant the summary judgment for
|
|||
|
the defendant for the following reasons: There's no, as I said,
|
|||
|
dispute as to whether or not this information has been compiled
|
|||
|
for law enforcement purposes, which covers -- is covered by
|
|||
|
exemption 7. 7 says, however, "only to the extent that the
|
|||
|
production of such law enforcement records or information (A)
|
|||
|
could reasonably be expected to interfere with enforcement
|
|||
|
proceedings" and then "(C) could reasonably be expected to
|
|||
|
constitute an unwarranted invasion of personal privacy, [or] (D)
|
|||
|
could reasonably be expected to disclose the identity of a
|
|||
|
confidential source," et cetera.
|
|||
|
|
|||
|
From the Court's view, (A) is the crucial issue in the
|
|||
|
case and whether or not this would be unwarranted interference
|
|||
|
with an ongoing investigation by ordering the Secret Service to
|
|||
|
produce all the records regarding the 25 search warrants. The
|
|||
|
Secret Service represented as of today, apparently, one
|
|||
|
individual has pled guilty by way of information, but there have
|
|||
|
been no indictments, but that Operation Sun Devil continues,
|
|||
|
obviously, then as an ongoing investigation.
|
|||
|
|
|||
|
The deputy director of the Secret Service by
|
|||
|
affidavit has stated the evidence in these materials consists of
|
|||
|
facts that have been gathered against various individuals,
|
|||
|
information provided by confidential sources, and affidavits
|
|||
|
establishing probable cause for search of the individual
|
|||
|
residences or businesses.
|
|||
|
|
|||
|
He argues that any release of this overall
|
|||
|
information in one package, as opposed to someone finding out an
|
|||
|
individual search warrant from the individual court, would give
|
|||
|
this access to the evidence and strategy as being used by the
|
|||
|
government in this law enforcement proceeding, that this would
|
|||
|
show the focus, overall focus and the approach and the limits of
|
|||
|
the government's case, it could have a chilling effect on the
|
|||
|
witnesses and constitute potential interference with those
|
|||
|
witnesses by revealing them, and it would give the ability to
|
|||
|
those who are under investigation, who may not know the scope and
|
|||
|
the nature of the overall approach of the government, to
|
|||
|
construct defenses and interfere, obviously, with the ongoing
|
|||
|
proceedings that they may have, that is, their ongoing
|
|||
|
investigation.
|
|||
|
|
|||
|
The issue really is whether the government has shown
|
|||
|
that by the affidavit of Caputo and the other facts in the
|
|||
|
record. Obviously, the Caputo affidavit is tailored to meet the
|
|||
|
law, NLRB v. Robbins Tire & Rubber is one of them, 437 U.S. 214,
|
|||
|
241, where Congress intended to prevent such interference with
|
|||
|
law enforcement proceedings as giving a person greater access to
|
|||
|
the government's case than it ordinarily would have, or Hatcher
|
|||
|
v. U.S. Postal Service, which is an F. Supp. case here, 566 F.
|
|||
|
Supp. 331, 333, where it's not necessary to show under exemption
|
|||
|
7 the interference with law enforcement proceedings is likely to
|
|||
|
occur if the documents are disclosed. It's enough that there's a
|
|||
|
generic showing that disclosure of particular kinds of records
|
|||
|
would generally interfere with enforcement proceedings.
|
|||
|
|
|||
|
The defendant -- excuse me, the plaintiff has
|
|||
|
asserted first, that because they're routinely available around
|
|||
|
the country and rarely filed under seal, and secondly, because
|
|||
|
some are filed under seal, that they should be producible by the
|
|||
|
federal government, using a dual argument. One is that if
|
|||
|
they're already public, then they can't claim there can be any
|
|||
|
harm done by producing them now, and secondly, if they're under
|
|||
|
seal, they have to go through a Morgan process before they can
|
|||
|
rely upon them as being under seal and not producing them under
|
|||
|
the law of this circuit.
|
|||
|
|
|||
|
The plaintiffs have basically argued that it's a
|
|||
|
circuitous argument advanced by the defendants that these
|
|||
|
documents, but for the seals, would be produced, and that they
|
|||
|
really, that's what they're relying upon. The Court does not see
|
|||
|
the government's, or defendants' argument in that light or the
|
|||
|
affidavits that have been filed in this case.
|
|||
|
|
|||
|
First, it seems to me that because some of the
|
|||
|
information may be available after diligent research around the
|
|||
|
country and some others may be under seal that could be made
|
|||
|
public by petition or by the government going through the Morgan
|
|||
|
exercise doesn't seem to the Court therefore the government has
|
|||
|
no justification for saying that they can't produce these records
|
|||
|
because they could interfere with ongoing criminal proceedings,
|
|||
|
and that is because this would be the only place you could get
|
|||
|
probably a total overall picture of the government's concerted
|
|||
|
effort in this investigation.
|
|||
|
|
|||
|
The government obviously has a concerted effort.
|
|||
|
Whether it's a conspiracy or not and they're related, the
|
|||
|
government executed these warrants all basically at the same time
|
|||
|
and place in an overall organized plan in May of 1990. They
|
|||
|
executed 26 search warrants. It was a concentrated, obviously
|
|||
|
carefully orchestrated effort to move on several fronts at one
|
|||
|
time all across the country and not separate, distinct,
|
|||
|
individual cases coming over a period of years against various
|
|||
|
individuals. It was obviously an approach the government had
|
|||
|
designed and planned as part of their criminal investigation,
|
|||
|
which is still ongoing and has now resulted apparently in at
|
|||
|
least one guilty plea.
|
|||
|
|
|||
|
So I don't think the availability merely on the case-
|
|||
|
by-case basis, potentially available, meets the same as having
|
|||
|
the compilation of all the information the Secret Service can
|
|||
|
provide in toto in a package which could allow one to see the
|
|||
|
limits and the scope and the nature of their investigation
|
|||
|
overall and give them a much better picture. It's the old saw of
|
|||
|
the seeing a tree or seeing the whole forest basically and having
|
|||
|
perspective.
|
|||
|
|
|||
|
The second really part of the argument by the plaintiff
|
|||
|
is that if the Esquibel search can be released without harm to
|
|||
|
the ongoing investigation, it could release the other
|
|||
|
investigation without great damage to its work. Again, however,
|
|||
|
it seems to me the warrant in the Esquibel case was released upon
|
|||
|
his agreement and request and waiver of his rights, that that is
|
|||
|
an individual, one individual out of 26, and it seems to me very
|
|||
|
different from exposing the entire investigative plan that may
|
|||
|
well be exposed by providing all of the documents that relate to
|
|||
|
the 25 other searches.
|
|||
|
|
|||
|
The Secret Service has in its affidavits set forth
|
|||
|
fairly clearly that they have gone through the three-fold process
|
|||
|
to provide appropriate exemption under 7(A). Under Bevis v.
|
|||
|
Department of State, 801 F.2d 1386, the court ruled that it must,
|
|||
|
the government, first define its categories functionally; second,
|
|||
|
it must conduct a document-by-document review in order to assign
|
|||
|
documents to the proper category; and finally, it must explain to
|
|||
|
the court how the release of each category would interfere with
|
|||
|
enforcement proceedings.
|
|||
|
|
|||
|
And under our Crooker v. Bureau of Alcohol, Tobacco and
|
|||
|
Firearms, 789 F.2d 64, this circuit held that the agency must
|
|||
|
provide this court with enough information to allow it to trace
|
|||
|
any rational link between the nature of the documents and the
|
|||
|
alleged likely interference.
|
|||
|
|
|||
|
The Secret Service herein has set forth the
|
|||
|
following: Information is in three general categories: gathered
|
|||
|
against particular individuals, provided by confidential sources,
|
|||
|
and the information for the probable cause of the search of the
|
|||
|
individual residences, referring to Caputo declaration. This
|
|||
|
information could be used to avoid prosecution by those who are
|
|||
|
targets by giving, one, advanced knowledge of the information
|
|||
|
would enable a suspect to inhibit additional investigation, to
|
|||
|
destroy undiscovered evidence, to mold defenses to meet the
|
|||
|
contours of the government's case. Additionally, the release of
|
|||
|
the information concerning confidential informants and evidence
|
|||
|
in the possession of the government could lead to attempts at
|
|||
|
intimidation, fabrication of evidence, and perhaps alibis
|
|||
|
tailored to rebut the specifics of the government's cases.
|
|||
|
|
|||
|
It seems to the Court that there is a rational link
|
|||
|
between the nature of the documents that have been discussed and
|
|||
|
the alleged likely interference. I don't have to say that it's
|
|||
|
beyond a reasonable doubt that this interference could occur, but
|
|||
|
it is likely that it could occur.
|
|||
|
|
|||
|
The overall release of these records, in the Court's
|
|||
|
view the government has established, meets the exemption of 7(A),
|
|||
|
that it would show an interference with enforcement proceedings
|
|||
|
is likely to occur if the documents are disclosed, again giving
|
|||
|
them the entire total package of the government's approach in
|
|||
|
this case, which is still an ongoing criminal investigation and
|
|||
|
apparently is still active, it is not dormant, and nothing has
|
|||
|
happened in two years. It is, rather, apparently, according to
|
|||
|
the government's most recent evidence, has resulted in at least
|
|||
|
one guilty plea.
|
|||
|
|
|||
|
Additional exemptions relied upon by the government,
|
|||
|
7(C) and 7(D), it's not necessary for the Court to address, but I
|
|||
|
would just note for the record in case of further review of this,
|
|||
|
the exemption for disclosure under 7(C) as to unwarranted
|
|||
|
invasion of personal privacy, it seems to the Court that there's
|
|||
|
obviously a cognizable interest in the privacy of anyone's
|
|||
|
involvement in a law enforcement investigation. No one wants to
|
|||
|
be publicized that they may be the subject of some investigation.
|
|||
|
They want their participation to remain secret.
|
|||
|
|
|||
|
And the plaintiffs have not, do not seek the
|
|||
|
identification of these individuals. The interest really at
|
|||
|
stake is their privacy interest, where they could be exposed by
|
|||
|
the publication of these affidavits, with their names redacted,
|
|||
|
and whether or not any other information contained in there would
|
|||
|
also have to be redacted.
|
|||
|
|
|||
|
If we look at the Esquibel affidavit that came in
|
|||
|
supporting the search of his home and business, you'll see there
|
|||
|
are numerous other computer hackers and, presumably, legitimate
|
|||
|
computer users referred to, and that would be presumably the same
|
|||
|
in the other affidavits for the other search warrants.
|
|||
|
Therefore, there would have to be much redacting, if anything
|
|||
|
could be produced in the other affidavits and the other search
|
|||
|
warrants for the publication of these individuals who are named,
|
|||
|
none of who have been indicted apparently, and obviously their
|
|||
|
interest in, privacy interest should be protected. What
|
|||
|
information could be redacted and what could be released remains
|
|||
|
to be seen, but I'll just note for the record it seems to the
|
|||
|
Court that there would be little that can be produced based upon
|
|||
|
the Esquibel affidavit at least, but that is a concern to the
|
|||
|
Court, although I don't think it's a total bar to the production
|
|||
|
under exemption 7(C).
|
|||
|
|
|||
|
I think 7(D) is under the same formula, that is, could
|
|||
|
reasonably be expected to disclose the identity of confidential
|
|||
|
sources by the publication of these records. Again, obviously
|
|||
|
there could be redaction. Again, there would have to be some
|
|||
|
type of review to see whether redaction can be meaningful or not
|
|||
|
and anything could be produced. The government's view is it
|
|||
|
could not, but again, I don't think there's been any attempt yet
|
|||
|
made to produce anything under that exemption, because the 7(A)
|
|||
|
exemption is being relied primarily upon. I would note again
|
|||
|
there would have to be redactions, and whether anything of
|
|||
|
substance could be produced would have to be seen at a later
|
|||
|
hearing if this matter goes forward.
|
|||
|
|
|||
|
So I'm going to rule primarily basically on the 7(A)
|
|||
|
exemption that the production of these documents overall, without
|
|||
|
relying on the sealing or not and without accepting the
|
|||
|
circuitous argument that the plaintiff asserts the defendant is
|
|||
|
engaged in, I think the defendant has not and has elected to
|
|||
|
stand and fall on exemption 7(A) as applying because of the
|
|||
|
entire documentation being produced at one time and one place
|
|||
|
could reasonably be expected to constitute an unwarranted,
|
|||
|
constitute an interference with the enforcement proceedings that
|
|||
|
are ongoing.
|
|||
|
|
|||
|
So for those reasons, I'll grant the motion for summary
|
|||
|
judgment of the defendant, and I'll issue an order incorporating
|
|||
|
by reference this bench opinion.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 23 Apr 92 16:52 GMT
|
|||
|
From: "Essential Information, Inc." <0002633455@MCIMAIL.COM>
|
|||
|
Subject: File 3--Ralph Nader/Cable TV/Information Networks (corrected)
|
|||
|
|
|||
|
"Ralph Nader/Cable TV/Information Networks"
|
|||
|
|
|||
|
From: Ralph Nader, Washington, DC
|
|||
|
Date: April 16, 1992
|
|||
|
|
|||
|
Summary: Your help is needed to secure an amendment to pending
|
|||
|
cable television legislation. The amendment would
|
|||
|
create a mechanism to organize local Cable Consumer
|
|||
|
Action Groups (CCAGs) to represent the interests of
|
|||
|
consumers directly before regulatory and legislative
|
|||
|
bodies. This proposal is an innovative way to create
|
|||
|
countervailing power to some of the large corporate
|
|||
|
interests that control our information infrastructure,
|
|||
|
and it is a model that is highly relevant for users of
|
|||
|
voice and data network services. Readers are asked to
|
|||
|
sign a letter to Congress supporting this amendment.
|
|||
|
Action is needed very soon. Respond to Jim Donahue,
|
|||
|
Teledemocracy Project (Internet:
|
|||
|
0002633455@mcimail.com)
|
|||
|
|
|||
|
|
|||
|
Dear citizen:
|
|||
|
|
|||
|
As you may know, congress is currently considering cable
|
|||
|
television legislation. Every television consumer should be
|
|||
|
concerned about the outcome of this legislation, and particularly
|
|||
|
citizens who are concerned about the future of information
|
|||
|
technologies. The current fiasco with the cable industry is an
|
|||
|
important example of the management of information technologies
|
|||
|
for the benefit of a few corporate monopolists at the expense of
|
|||
|
the many. Today nearly all americans are confronted with a
|
|||
|
monopoly provider of cable video signals, who not only has total
|
|||
|
control over what you can receive, but also what you pay.
|
|||
|
|
|||
|
Over the next 15 years we will see a rapid convergence of
|
|||
|
information technologies. Soon it will be possible to transmit
|
|||
|
voice, data, and video signals over the same fiber optic
|
|||
|
telecommunications infrastructure. The fight over who will
|
|||
|
control the content of information that flows over that
|
|||
|
infrastructure, and how it will be priced, will define who can
|
|||
|
send and who can receive information in digital form. As the use
|
|||
|
of modern technologies increasingly makes it easier to meter the
|
|||
|
consumption of information products and services, the gaps
|
|||
|
between the information rich and information poor will continue
|
|||
|
to grow.
|
|||
|
|
|||
|
The current battle over the regulation of the cable television
|
|||
|
industry is an important step in a more general battle over the
|
|||
|
control of our information infrastructure. This is a battle over
|
|||
|
power and wealth, and also over democratic values, competition,
|
|||
|
and enlightenment. Will we harness our great new information
|
|||
|
technologies to promote a diversity of sources of information, or
|
|||
|
will these technologies be used primarily as vehicles for
|
|||
|
narrowly focused commercial interests, exercising monopoly power?
|
|||
|
|
|||
|
CABLE CONSUMER ACTION GROUPS (CCAG) AS COUNTERVAILING POWER
|
|||
|
|
|||
|
A number of consumer groups have asked Congress to adopt an
|
|||
|
innovative proposal to help cable television subscribers organize
|
|||
|
to represent their interests. Notices describing local Cable
|
|||
|
Consumer Action Groups (CCAGs), which would be independent and
|
|||
|
democratically controlled local organizations, would be placed in
|
|||
|
the cable companies billings. The notices describe the purposes
|
|||
|
and goals of the group and solicit funds for membership. The CCAG
|
|||
|
would be required to reimburse the cable company for the
|
|||
|
incremental costs of inserting the notice in the bill, so the
|
|||
|
cost would not be a burden to the cable company or its
|
|||
|
subscribers. These local subscriber consumer groups would then
|
|||
|
monitor the policies and practices of the cable company, and
|
|||
|
represent consumer interests in regulatory and legislative
|
|||
|
proceedings and with the cable companies directly.
|
|||
|
|
|||
|
The cable industry is extremely active politically, contributing
|
|||
|
millions of dollars to candidates for political office and
|
|||
|
spending millions more in lobbying activities before legislative
|
|||
|
and regulatory bodies. In the absence of something like the
|
|||
|
CCAG, important public policy issues are debated in an extremely
|
|||
|
unbalanced way. The CCAG is a modest but important step in
|
|||
|
addressing a very corrupt system that regularly tramples on the
|
|||
|
rights and interests of consumers.
|
|||
|
|
|||
|
Among the groups that have endorsed this proposal are:
|
|||
|
|
|||
|
Center for Media Education
|
|||
|
Consumer Federation of America
|
|||
|
New York City Commissioner of Consumer Affairs
|
|||
|
Public Citizen
|
|||
|
Teledemocracy Project
|
|||
|
U.S. Public Interest Research Group
|
|||
|
|
|||
|
HAS IT BEEN TRIED BEFORE?
|
|||
|
|
|||
|
This proposal is based on the highly successful Citizen Utility
|
|||
|
Board (CUB) model, which has represented ratepayers in several
|
|||
|
states. The most successful CUB, in Illinois, has 170,000
|
|||
|
members; its advocacy has saved consumers some $2 billion over
|
|||
|
the past several years. Other CUBs exist in Wisconsin, Oregon
|
|||
|
and San Diego. We want to see this innovation used nation wide
|
|||
|
in the cable television industry. (Of course, it may well be a
|
|||
|
model that has applications to other telecommunications issues.)
|
|||
|
|
|||
|
WHAT YOU CAN DO
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The CCAG proposal was included in H.R. 4850, but was deleted by a
|
|||
|
voice vote (in contrast to a recorded vote) in the House
|
|||
|
Subcommittee on Telecommunications and Finance. The bill is now
|
|||
|
in the full Energy and Commerce Committee, where committee
|
|||
|
supporters will seek to restore the provision through an
|
|||
|
amendment. We are asking you to send us an email message giving
|
|||
|
permission to use your name in a letter to Congress supporting
|
|||
|
this amendment. If you are willing to do so send the following
|
|||
|
information to the Teledemocracy Project (internet:
|
|||
|
0002633455@mcimail.com, or fax 202-234-5176).
|
|||
|
|
|||
|
Name:
|
|||
|
Title: (optional)
|
|||
|
Affiliation: (optional)
|
|||
|
Address:
|
|||
|
City and State: (important, for obvious reasons)
|
|||
|
telephone: (for verification)
|
|||
|
email address: optional
|
|||
|
|
|||
|
|
|||
|
Thank you very much for your help on this.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Ralph Nader
|
|||
|
|
|||
|
A copy of the letter follows:
|
|||
|
|
|||
|
-------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
LETTER
|
|||
|
|
|||
|
Chairman Edward Markey
|
|||
|
Subcommittee on Telecommunications and Finance
|
|||
|
Committee on Energy and Commerce
|
|||
|
Washington, D.C. 20515
|
|||
|
|
|||
|
Dear Chairman Markey:
|
|||
|
|
|||
|
We are writing to support your "consumer representation"
|
|||
|
amendment to H.R. 4850, the cable re-regulation bill. It is
|
|||
|
imperative that new cable legislation provide a mechanism that
|
|||
|
gives consumers a stronger voice in regulatory and legislative
|
|||
|
debates. This amendment is ideal because it brings citizens into
|
|||
|
the regulatory process at no cost to the government or the cable
|
|||
|
industry.
|
|||
|
|
|||
|
Who in Congress can deny the unfairness of a system where the
|
|||
|
owners of cable monopolies can use subscriber revenues for
|
|||
|
lobbying purposes while consumers are left powerless and
|
|||
|
unrepresented? This is only a small step toward curbing the
|
|||
|
monopolistic power of the cable television industry. We urge the
|
|||
|
House Energy and Commerce Committee to include your consumer
|
|||
|
representation amendment in the cable bill.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
|
|||
|
------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
For more information, contact:
|
|||
|
|
|||
|
Jim Donahue
|
|||
|
Teledemocracy Project
|
|||
|
voice: 202/387-8030
|
|||
|
fax: 202/234-5176
|
|||
|
Internet: 0002633455@mcimail.com
|
|||
|
|
|||
|
For a an email copy of the amendment contact Jim Donahue
|
|||
|
(internet: 0002633455@mcimail.com).
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 20 Apr 1992 10:36:58 CDT
|
|||
|
From: James P Love <LOVE@PUCC.BITNET>
|
|||
|
Subject: File 4--Battle over Landsat/Public Domain (fr: Corp. Crime Rept)
|
|||
|
|
|||
|
++++++++++++++++++++++++++++Original message++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Reprinted with permission from Corporate Crime Reporter.
|
|||
|
|
|||
|
[Corporate Crime Reporter is published by American Communications and
|
|||
|
Publishing Co., Inc. 48 times a year. ISSN Number: 0897-4101.
|
|||
|
Principal Editorial Offices: 1322 18th St, N.W., Washington, D.C. 20036.
|
|||
|
Telephone: (202) 429-6928. Editor: Russell Mokhiber.]
|
|||
|
|
|||
|
Vol 6, No. 15, April 13, 1992.
|
|||
|
|
|||
|
STATES, ENVIRONMENTALISTS LAUNCH CAMPAIGN TO RETURN LANDSAT TO
|
|||
|
PUBLIC DOMAIN. "A NASTY FIGHT IS BREWING"
|
|||
|
|
|||
|
A loose coalition of state officials and environmentalists has formed
|
|||
|
to challenge the 1984 decision by the federal government to privatize
|
|||
|
Landsat, the first satellite dedicated to the environment.
|
|||
|
|
|||
|
In a letter last month to Congressman James Scheuer (D-New York),
|
|||
|
Chairman of the Subcommittee on the Environment of the House Science,
|
|||
|
Space and Technology Committee, a number of environmental groups,
|
|||
|
including Greenpeace, Sierra Club and the Environmental Defense Fund,
|
|||
|
called for a "clean break with the patently unsuccessful %experiment
|
|||
|
in commercialization'."
|
|||
|
|
|||
|
Landsat was first launched in 1972. Until 1984, the satellite was in
|
|||
|
the public domain. State governments, environmental groups, and
|
|||
|
universities used the data for a range of purposes, including
|
|||
|
environmental management and enforcement of environmental laws.
|
|||
|
|
|||
|
In 1984, the Reagan Administration "commercialized" the satellite,
|
|||
|
taking it out of the public's hands, and giving the data rights to a
|
|||
|
private company owned by General Electric and Hughes, to sell on the
|
|||
|
commercial market.
|
|||
|
|
|||
|
The coalition of users and environmental groups fighting to return
|
|||
|
Landsat to the public domain argue that the "experiment in
|
|||
|
commercialization" has been disastrous. High prices have dramatically
|
|||
|
reduced the availability of the data to researchers, academics, and
|
|||
|
conservationists. Images that once cost under $100 have now soared to
|
|||
|
$4,500 per scene.
|
|||
|
|
|||
|
"At a time when destruction of tropical forests is recognized as an
|
|||
|
international calamity, the Landsat sensors are infrequently even
|
|||
|
turned on over the most threatened regions," the environmentalists
|
|||
|
argued. "Those who need remote sensing most, namely conservationists
|
|||
|
and third world natural resource agencies, are able to afford it
|
|||
|
least."
|
|||
|
|
|||
|
Congressman George Brown (D-California) has introduced legislation
|
|||
|
(H.R. 3614) that would take back some public control over the data
|
|||
|
base. But the environmental groups are not happy with H.R. 3614. They
|
|||
|
charge that H.R. 3614 sets up "a complicated system of partial
|
|||
|
commercialization."
|
|||
|
|
|||
|
"It seems to us much better to simply eliminate %commercialization' as
|
|||
|
rapidly as possible under existing contracts," they write.
|
|||
|
|
|||
|
In the letter to Scheuer, the groups argue for a return to the policy
|
|||
|
in effect before 1984, thus making data available "to all who request
|
|||
|
it at marginal cost of copying and distribution."
|
|||
|
|
|||
|
Hill staffers close to the impending battle predicted a bitter fight.
|
|||
|
"A nasty fight is brewing," said one. "There are some former NASA
|
|||
|
scientists who are hell-bent on returning Landsat into the public
|
|||
|
fold. They believe that there is something wrong with commercializing
|
|||
|
publicly funded data about the environment at prices only industry can
|
|||
|
afford. And on the other hand, the big aerospace firms know how to
|
|||
|
play hardball. GE and Hughes are not going to roll over and play
|
|||
|
dead."%
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 21 Apr 92 19:34:20 EDT
|
|||
|
From: "Ofer Inbar" <cos@CHAOS.CS.BRANDEIS.EDU>
|
|||
|
Subject: File 5--Internet Society News
|
|||
|
|
|||
|
In Cu Digest 4.18, Michael Rosen wrote:
|
|||
|
|
|||
|
> "At negligible cost, in the span of a few weeks, an entirely virtual
|
|||
|
> global publishing network involving nearly 150 correspondents has been
|
|||
|
> assembled," Anthony M. Rutkowski, editor in chief of the _Internet
|
|||
|
> Society News_, wrote in the first issue of the magazine, which was
|
|||
|
> recently published.
|
|||
|
|
|||
|
> [No e-mail addresses were mentioned in the letter; do you have any
|
|||
|
> knowledge of the addresses of anyone involved in this publication?]
|
|||
|
|
|||
|
From the inside front cover of the Internet Society News Vol 1 No 1:
|
|||
|
|
|||
|
Editor-in-Chief: Anthony-Michael Rutkowsky <amr@nri.reston.va.us>
|
|||
|
<amr@media-lab.media.mit.edu> <amr@cernvax.cern.ch>
|
|||
|
|
|||
|
Associate Editor: Joyce K. Reynolds <jkrey@nri.reston.va.us>
|
|||
|
|
|||
|
Editorial Advisory Board:
|
|||
|
Brian Carpenter <brian@cernvax.cern.ch>
|
|||
|
Christian Huitema <huitema@mirsa.inria.fr>
|
|||
|
Ole Jacobson <ole@csli.stanford.edu>
|
|||
|
Carl Malamud <carl@malamud.com>
|
|||
|
Joyce Reynolds <jkrey@nri.reston.va.us>
|
|||
|
Mike Roberts <roberts@educom.edu>
|
|||
|
Anthony Rutkowski <amr@nri.reston.va.us>
|
|||
|
Mike Schwartz <schwartz@latour.colorado.edu>
|
|||
|
Bernard Stockman <boss@sunet.se>
|
|||
|
|
|||
|
Internet Society Board of Trustees:
|
|||
|
Hideo Aiso <aiso@sfc.keio.ac.jp>
|
|||
|
Charles Brownstein <cbrownst@note.nsf.gov>
|
|||
|
Vint Cerf <vcerf@nri.reston.va.us>
|
|||
|
Lyman Chapin <lyman@bbn.com>
|
|||
|
Ira Fuchs <fuchs@pucc.princeton.edu>
|
|||
|
Frode Greisen <neufrode%neuvm1.bitnet@searn.sunet.se>
|
|||
|
Juergen Harms <harms@cui.unige.ch>
|
|||
|
Geoff Huston <g.huston@aarnet.edu.au>
|
|||
|
Robert Kahn <rkahn@nri.reston.va.us>
|
|||
|
Tomaz Kalin <kalin@ijs.ac.mail.yu>
|
|||
|
Kenneth King <kmk@educom.edu>
|
|||
|
Lawrence Landweber <lhl@cs.wisc.edu>
|
|||
|
Anthony Rutkowski <amr@nri.reston.va.us> [temporary]
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.19
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|