916 lines
44 KiB
Plaintext
916 lines
44 KiB
Plaintext
![]() |
|
|||
|
Computer underground Digest Sun Jul 2, 1995 Volume 7 : Issue 55
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
la Triviata: Which wine goes best with Unix?
|
|||
|
|
|||
|
CONTENTS, #7.55 (Sun, Jul 2, 1995)
|
|||
|
|
|||
|
File 1--Another Cinci BBS comment
|
|||
|
File 2--Are We Sheep? - LA Times Op-Ed on online censorship (fwd)
|
|||
|
File 3--Big Brother Covets the Internet (fwd)
|
|||
|
File 4--Legal Bytes 3.01 (part 1)
|
|||
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 30 Jun 95 15:40:00 -0500
|
|||
|
From: JOHN BAILEY <john.bailey@cccbbs.cincinnati.oh.us>
|
|||
|
Subject: File 1--Another Cinci BBS comment
|
|||
|
|
|||
|
((MODERATORS' NOTE: We ran several articles on the Cincinnati
|
|||
|
BBS busts in CuD 7.53. Below is another comment from a
|
|||
|
Cincinnatian)).
|
|||
|
|
|||
|
Dear CUD,
|
|||
|
|
|||
|
I was wondering if you ever did anything in regards to computer
|
|||
|
rights. This is becoming a very big issue lately, especially with the
|
|||
|
Exon bill eeking its way through the government.
|
|||
|
|
|||
|
The reason I ask, on Friday, June 16, this became a very critical
|
|||
|
issue for some 5000 users of one BBS here in Cincinnati. A local
|
|||
|
sheriff and his group took it upon themselves to raid 5 local BBSs for
|
|||
|
what he considers "adult material". These BBSs by the way, were not
|
|||
|
all in the sheriff's jurisdiction. The largest BBS (Cincinnati
|
|||
|
Computer Connection, CCC) was a 25 node PCBoard BBS with 5000 users.
|
|||
|
These users used the board for personal mail, conducting business,
|
|||
|
playing games and downloading files. The users are outraged and have
|
|||
|
begun to try and understand what prompted this action and why it was
|
|||
|
executed in the manner it was. The Cincinnati media has provided
|
|||
|
excellent coverage of this situation and the CCC users have already
|
|||
|
held a "town meeting" to try and discover what has actually happened
|
|||
|
and what rights the users really have. Unfortunately, the sheriff and
|
|||
|
his group refused to attend or provide any explanation as to what is
|
|||
|
really happening.
|
|||
|
|
|||
|
According to the warrant, "adult material" seemed to be the issue but
|
|||
|
this was very vague and far reaching. If there was offensive material
|
|||
|
on the board, it was unbeknownst to the users. The sheriff apparently
|
|||
|
had a plant on the board for 2 years. This person, in all good
|
|||
|
conscience, would have to have seen that the BBS was a very friendly
|
|||
|
and open "family type" community of users who had nothing to hide.
|
|||
|
Parents and their children (of all ages) used the board. If something
|
|||
|
was wrong, nobody ever bothered to suggest to the Sysop there might be
|
|||
|
a problem, which certainly would have been rectified. Instead, a
|
|||
|
Gestapo type raid was performed (very poorly, I might add), seizing
|
|||
|
some equipment here, some there without full knowledge of how the
|
|||
|
equipment even worked.
|
|||
|
|
|||
|
What the CCC users are trying to do is gain some exposure, and
|
|||
|
insight, in to the rapidly growing problems regarding the censorship
|
|||
|
issues the government (and police agencies) seem to have with computer
|
|||
|
on-line networks and the way in which they brutalize computers (and
|
|||
|
their users) instead of trying to remedy the situation through
|
|||
|
discussion and education. If legal action is considered a viable
|
|||
|
alternative, many CCC users have shown support for that type of action
|
|||
|
in order to protect their rights.
|
|||
|
|
|||
|
Does your publication offer any kind of editorial facility to not only
|
|||
|
review, but help in the research of these types of on-line network
|
|||
|
problems that seem to be occurring more frequently? Users need to be
|
|||
|
aware of potential seizure of their personal information without their
|
|||
|
knowledge or without a warrant specifically identifying their property
|
|||
|
as part of the seizure. Regardless of the outcome of any type of legal
|
|||
|
proceedings, this incident in Cincinnati could be a far reaching
|
|||
|
landmark case. Your assistance and knowledge would be greatly
|
|||
|
appreciated.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
|
|||
|
Cincinnati Computer Connection BBS Users
|
|||
|
|
|||
|
|
|||
|
John M. Bailey (CCC User)
|
|||
|
1570 Citadel Place
|
|||
|
Cincinnati, Oh 45255
|
|||
|
Home: 513-474-9114
|
|||
|
Work: 513-624-8844 ext 239
|
|||
|
Internet: john.bailey@cccbbs.cincinnati.oh.us
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 28 Jun 1995 08:11:48 -0500 (CDT)
|
|||
|
From: David Smith <bladex@BGA.COM>
|
|||
|
Subject: File 2--Are We Sheep? - LA Times Op-Ed on online censorship (fwd)
|
|||
|
|
|||
|
From--dewelch@earthlink.net (Douglas E. Welch)
|
|||
|
Date--Tue, 27 Jun 1995 14:11:55 -0700
|
|||
|
|
|||
|
Previously published in the Los Angeles Times, Tuesday, June 27, 1995. Page
|
|||
|
B11
|
|||
|
|
|||
|
Note: Electronic re-posting is ALLOWED but NO PAPER REPRINTS or inclusion in
|
|||
|
online digests without written permission (paper or email) from the
|
|||
|
author. All re-postings must retain this notice.
|
|||
|
|
|||
|
The complete article is available on the web site listed below.
|
|||
|
|
|||
|
Copyright (c) 1995 Douglas E. Welch
|
|||
|
|
|||
|
dewelch@earthlink.net
|
|||
|
dewelch@pop.com
|
|||
|
76625,3301
|
|||
|
http://www.earthlink.net/~dewelch/
|
|||
|
------------------------------------------
|
|||
|
|
|||
|
Are We Sheep?
|
|||
|
|
|||
|
By Douglas E. Welch
|
|||
|
|
|||
|
DOUGLAS E. WELCH, a writer and computer analyst from North
|
|||
|
Hollywood, is concerned about calls for government control
|
|||
|
of electronic media in the guise of protecting children.
|
|||
|
He told The Times:
|
|||
|
|
|||
|
The thought of anti-violence and anti-sex technology built into our
|
|||
|
televisions and computers is appalling and unnecessary. The ultimate
|
|||
|
control device is already built into every piece of technology
|
|||
|
manufactured today: the "off" switch.
|
|||
|
|
|||
|
We need to use our own best censors, our values and morals, to decide
|
|||
|
what we and our children watch. If we took control and stopped
|
|||
|
watching, advertisers would quickly learn that we expected better
|
|||
|
entertainment.
|
|||
|
|
|||
|
Instead, we have become lazy, whining neo-children who want our
|
|||
|
governmental parents to tell us what is right and wrong, what is good
|
|||
|
and bad, so that we don't have to think for ourselves. We want to
|
|||
|
continue grazing peacefully like a herd of sheep while the shepherd
|
|||
|
keeps the wolf at bay. What we don't realize is the shepherd might be
|
|||
|
the wolf in disguise.
|
|||
|
|
|||
|
We should not be so willing to give our government the power to
|
|||
|
control what we see and hear. If we give these rights away, they will
|
|||
|
only be bought back at a very high price, if they are to be bought
|
|||
|
back at all.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 19 Jun 1995 23:21:46 -0500 (CDT)
|
|||
|
From: David Smith <bladex@BGA.COM>
|
|||
|
Subject: File 3--Big Brother Covets the Internet (fwd)
|
|||
|
|
|||
|
---------- Forwarded message ----------
|
|||
|
|
|||
|
From: nyt@nyxfer.blythe.org (NY Transfer News Collective)
|
|||
|
|
|||
|
|
|||
|
Via NY Transfer News Collective * All the News that Doesn't Fit
|
|||
|
|
|||
|
|
|||
|
From Flatland, No. 12, May 1995, pp. 44-46.
|
|||
|
|
|||
|
|
|||
|
Big Brother Covets the Internet
|
|||
|
|
|||
|
by Daniel Brandt
|
|||
|
|
|||
|
"The Internet offers intelligence agencies an amazing
|
|||
|
potential source for information collection and for monitoring
|
|||
|
the activities of their targets. They not only can plug into
|
|||
|
communications through the names of senders and receivers of
|
|||
|
e-mail, but also through keyword monitoring of messages as
|
|||
|
they have done for many years. If you add e-mail to their
|
|||
|
monitoring of telephone and other credit card transactions,
|
|||
|
they can get a very complete picture of a given person's
|
|||
|
activities.
|
|||
|
|
|||
|
"On my long trips to the United States for university
|
|||
|
lecturing and other activities, such monitoring enables them
|
|||
|
to know my every flight, hotel and car rental, and local
|
|||
|
contacts, not to mention my complete itineraries. All this
|
|||
|
prior to my flight from Germany to the U.S. Add to this my
|
|||
|
other calls and bank transactions and you ahve almost every
|
|||
|
imaginable detail. It is a perfect system for spy agencies and
|
|||
|
getting better all the time."
|
|||
|
|
|||
|
-- former CIA officer Philip Agee
|
|||
|
|
|||
|
What the government giveth, the government can taketh away.
|
|||
|
This message has been received by Internet watchers recently, as
|
|||
|
Big Brother begins to confront the issue of online computer security.
|
|||
|
Internet hacking is at an all-time high, the Pentagon claims, just
|
|||
|
as big business is buying into the Internet in a big way. Something
|
|||
|
has to give.
|
|||
|
|
|||
|
"Hackers are even better than communists," says one Washington
|
|||
|
activist who deals with civil rights and electronic privacy issues.
|
|||
|
Several weeks later, on November 22, 1994, NBC News with Tom Brokaw
|
|||
|
underscored his point with an alarmist segment by Robert Hager:
|
|||
|
|
|||
|
A Pentagon unit is poised to combat unauthorized
|
|||
|
entries into some of the world's most sensitive computer
|
|||
|
systems. But despite all the safeguards and a computer
|
|||
|
security budget in the hundreds of millions of dollars,
|
|||
|
attempts were made to break into the Pentagon's computers
|
|||
|
on 254 separate occasions in the last twelve months
|
|||
|
alone, almost always through the Internet.... NBC News
|
|||
|
has learned that intrusions into the Defense Department's
|
|||
|
computers go unreported 98 percent of the time -- 98
|
|||
|
percent! -- often because no one is aware information is
|
|||
|
being pirated. Pentagon officials are worried the
|
|||
|
nation's security is being compromised.
|
|||
|
|
|||
|
Only Joe McCarthy knows how Robert Hager came up with a figure
|
|||
|
of 98 percent for undetected break-ins, and then pretended it was
|
|||
|
worth repeating. Hager continued with his voice-over and began
|
|||
|
talking about hackers breaking into one nameless hospital's records
|
|||
|
and reversing the results of a dozen pap smears. Patients who may
|
|||
|
have had ovarian cancer, Hager claimed, were told instead that they
|
|||
|
were okay.
|
|||
|
|
|||
|
If this were an isolated story, then the Newsgroup subscribers
|
|||
|
on <alt.conspiracy> who reacted to Hager's segment, by speculating
|
|||
|
that something must be behind it, might be dismissed for weaving
|
|||
|
yet another paranoid thread. But here I have to agree that even if
|
|||
|
you're paranoid, they still might be after you. On this story, at
|
|||
|
least, NBC seems to be the mouthpiece for larger forces.
|
|||
|
|
|||
|
"Organized Crime Hackers Jeopardize Security of U.S." reads
|
|||
|
the headline in "Defense News" (October 3-9, 1994). This article
|
|||
|
reported on a conference sponsored by the Center for Strategic and
|
|||
|
International Studies, a prestigious Washington think tank with
|
|||
|
close connections to the intelligence community. Dain Gary from the
|
|||
|
Computer Emergency Response Team in Pittsburgh, a hacker-buster
|
|||
|
group funded by the Pentagon, claimed that "there are universities
|
|||
|
in Bulgaria that teach how to create more effective viruses." Mr.
|
|||
|
Gary did not respond to my letter requesting more information.
|
|||
|
|
|||
|
|
|||
|
The government started the Internet, and then over a period
|
|||
|
of years it lost control. This was partly due to the unique
|
|||
|
architecture of the Internet, which has its roots in a 1964 Rand
|
|||
|
Corporation proposal for a post-Doomsday network. Rand's idea was
|
|||
|
that information packets could contain their own routing
|
|||
|
information, and would not have to rely on centralized switching.
|
|||
|
Anarchy, it seems, is the best antidote to vulnerable
|
|||
|
communications systems.
|
|||
|
|
|||
|
Recently the government, due to a combination of tight budgets
|
|||
|
and a trend toward deregulation, has allowed big business to take
|
|||
|
over the main conduits, or "backbone" of the Net. Corporations
|
|||
|
smell a huge potential cybermarket, and are investing money to get
|
|||
|
themselves positioned on the Net. They want to be ready when it
|
|||
|
comes time to harvest the expected profits.
|
|||
|
|
|||
|
Today we have a global network with 30 million users.
|
|||
|
No one is in control, and no one can pull the plug. If one
|
|||
|
telecommunications company decided to shut off the segment of the
|
|||
|
Net that they administer, other companies could simply route their
|
|||
|
traffic around them. And if it weren't for password protection and
|
|||
|
the "firewalls" installed by corporations to protect their local
|
|||
|
turf from other computers, each of Internet's users would have
|
|||
|
access to all the other computers on the Net.
|
|||
|
|
|||
|
Passwords and firewalls don't always work. A hacker who
|
|||
|
burrows in and obtains the right sort of access can watch the
|
|||
|
passwords of other users fly by, and can capture them for later
|
|||
|
use. In November 1994, General Electric's robust firewalls were
|
|||
|
circumvented by hackers, according to a company spokeswoman, and
|
|||
|
GE had to pull their computers off the Net for a week to revamp
|
|||
|
their security procedures. In two other incidents, a group of
|
|||
|
hackers calling itself the Internet Liberation Front managed to
|
|||
|
break into systems. On one they posted a message warning corporate
|
|||
|
America against turning the Internet into a "cesspool of greed."
|
|||
|
|
|||
|
So Big Brother has a problem. But it's not so much a problem
|
|||
|
of national security, except perhaps in the broad sense of economic
|
|||
|
vulnerability. Defense and intelligence systems that are classified
|
|||
|
are not connected to the Internet. When the Pentagon complains to
|
|||
|
NBC about national security, what they really mean is that they
|
|||
|
might have to forego the convenience of Internet contacts with
|
|||
|
their contractors, and use other means instead.
|
|||
|
|
|||
|
No, Big Brother in this case is not the Pentagon, it's really
|
|||
|
big business. They're chomping at the Net's information bits, while
|
|||
|
the computer security problem is reining them back. Until this
|
|||
|
problem is solved, the Net cannot be used for serious commercial
|
|||
|
transactions. Big business seems to be feeding scare stories to the
|
|||
|
media, and the Pentagon is helping them out by raising the
|
|||
|
time-tested bugaboo of national security -- the only surefire way
|
|||
|
to scare Congress into repressive legislation. America leads the
|
|||
|
world in information technology, and the Internet is potentially a
|
|||
|
lucrative link in tomorrow's profit chain. If only those pesky
|
|||
|
hackers would go away.
|
|||
|
|
|||
|
The hackers that do exist are grist for the system's
|
|||
|
disinformation mill, so if they didn't exist the system would
|
|||
|
probably have to invent them. The bottom line for those whose
|
|||
|
opinions matter is that the Internet has potential to help the rich
|
|||
|
get richer. Hackers belong in jail, of course, but there's also the
|
|||
|
Net surfer who's clogging bandwidth with idle chatter, or even
|
|||
|
swapping copyrighted material with their friends. Frequently this
|
|||
|
unprofitable silliness is subsidized by the universities. All big
|
|||
|
business wants from these folks is consumption -- they may browse
|
|||
|
through online catalogs and debit their credit lines, but forget
|
|||
|
all this virtual community stuff. It's got to go.
|
|||
|
|
|||
|
|
|||
|
The way to reboot the system is to boot the little guy, and
|
|||
|
the best way to do this has always been to let the government bash
|
|||
|
some heads. The digital equivalent of this is the one-two punch of
|
|||
|
the Clipper chip and the Digital Telephony Bill. Clipper is an
|
|||
|
ongoing government effort to encourage the mass marketing of a
|
|||
|
encryption standard that can be tapped by them. It was developed
|
|||
|
with help from the National Security Agency (NSA), which is worried
|
|||
|
about the emergence of encryption that can't be easily broken by
|
|||
|
their supercomputers. The FBI's favorite is the Digital Telephony
|
|||
|
Bill, which was passed without debate by Congress last October.
|
|||
|
It forces telecommunications companies to modify their digital
|
|||
|
equipment so that the government has access to wiretapping ports
|
|||
|
when they come calling with a warrant.
|
|||
|
|
|||
|
Warrants? When was the last time the intelligence community
|
|||
|
took warrants seriously? Just in case a few of them get nervous
|
|||
|
while breaking the law, the Foreign Intelligence Surveillance Act
|
|||
|
of 1978 set up a secret court to issue warrants in situations
|
|||
|
involving a foreign threat. This court has yet to turn down a
|
|||
|
single request put before it -- even rubber stamps don't perform
|
|||
|
this well. All it would take is a vague rumor of a Bulgarian virus
|
|||
|
with Russian organized crime lurking close behind, and presto, a
|
|||
|
secret warrant is issued to tap the Internet backbone so that U.S.
|
|||
|
spooks can look for nasty digital germs. The judges aren't
|
|||
|
competent to evaluate technical rumors, and with their track
|
|||
|
record, no one pretends that they will call in their own experts.
|
|||
|
Why bother, since the proceedings are secret and there's no
|
|||
|
accountability?
|
|||
|
|
|||
|
But then, who needs a warrant? According to reports, the NSA,
|
|||
|
Britain's Government Communications Headquarters (GCHQ), and
|
|||
|
Canada's Communications Security Establishment, all practice what
|
|||
|
might be termed the "sister agency gambit." They do this by
|
|||
|
stationing liaison officers in each of the other agencies. When
|
|||
|
they want to tap their own citizens without a warrant, they just
|
|||
|
call over the liaison officer to throw the switch. Now it's called
|
|||
|
"intelligence from a friendly foreign agency" and it's all legal.
|
|||
|
|
|||
|
|
|||
|
Particularly with the Internet, where jurisdictional problems
|
|||
|
involve many nations, this sort of transnational cooperation will
|
|||
|
be the rule rather than the exception. The excuse for monitoring
|
|||
|
the Net today might be the security problem. Tomorrow the security
|
|||
|
problem may be solved, one way or another, and the Net will be used
|
|||
|
for commercial transactions. Then the excuse for monitoring will be
|
|||
|
the need to detect patterns of commerce indicative of money
|
|||
|
laundering, much like FinCen does today.
|
|||
|
|
|||
|
FinCen, the Financial Crime Enforcement Network, monitors
|
|||
|
Currency Transaction Reports from banks, and other records from
|
|||
|
over 35 financial databases, as well as NSA intercepts of wire
|
|||
|
transfers into and out of the U.S. This data is shared with the DEA
|
|||
|
(Drug Enforcement Administration), CIA, DIA (Defense Intelligence
|
|||
|
Agency), IRS, FBI, BATF (Bureau of Alcohol, Tobacco, and Firearms),
|
|||
|
and the Secret Service. FinCen, which began in 1990, is an attempt
|
|||
|
to track, cross-reference, and apply artificial-intelligence
|
|||
|
modeling to all the relevant data from government agencies. Now
|
|||
|
they are floating a proposal for a deposit tracking system. When
|
|||
|
the Internet begins carrying financial transactions, FinCen is sure
|
|||
|
to be poking around behind the scenes.
|
|||
|
|
|||
|
One characteristic of the Internet is that surveillance on a
|
|||
|
massive scale is easy to accomplish. With telephone voice or fax
|
|||
|
transmissions, the digital signal is an approximation of the analog
|
|||
|
signal. Massive computing power, relatively speaking, is needed to
|
|||
|
extract the content in the form of words or numbers. This is called
|
|||
|
"speech recognition" for voice, or "optical character recognition"
|
|||
|
for fax. Data on the Internet, on the other hand, is already in the
|
|||
|
form that computers use directly. Moreover, each packet
|
|||
|
conveniently includes the address of the sender and receiver.
|
|||
|
|
|||
|
It's a simple matter to tap an Internet backbone and scan
|
|||
|
every packet in real time for certain keywords. With voice and fax,
|
|||
|
it's only practical to capture specific circuits, and then examine
|
|||
|
them later for content. On the Internet, even encryption doesn't
|
|||
|
solve the privacy problem, because the Net is also ideal for
|
|||
|
message traffic analysis. A stream of encrypted messages between
|
|||
|
two points could be detected by a computer, which then spits out a
|
|||
|
report that's sure to attract attention. Each end of this stream
|
|||
|
is now identified as a target, which means that other types of
|
|||
|
surveillance are now practical. The Internet, in other words,
|
|||
|
increases opportunities for surveillance by many orders of
|
|||
|
magnitude, with or without encryption.
|
|||
|
|
|||
|
Those who have the resources can try to befuddle the spooks
|
|||
|
who monitor them by disguising their transactions. Shell
|
|||
|
corporations, off-shore banks, and cash-intensive businesses will
|
|||
|
still be popular with money launderers. Seemingly innocent
|
|||
|
transactions will slip through the net, and for the most part only
|
|||
|
the little guy without transnational resources will get caught.
|
|||
|
|
|||
|
Which is exactly the point. The little guy on the Net is
|
|||
|
surfing on borrowed time. There are too many pressures at work, too
|
|||
|
many powerful interests to consider. The Net is too important to
|
|||
|
the Suits -- if not now, then soon.
|
|||
|
|
|||
|
|
|||
|
If it were only a case of Us and Them, it would be easier to
|
|||
|
sort it all out. But the self-styled Internet Liberation Front, and
|
|||
|
similar types with hacker nonethics, are part of the problem as
|
|||
|
surely as the greedy capitalists. Nor is it easy to see much hope
|
|||
|
in the way the little guy -- the one who obeys the law -- has used
|
|||
|
the Internet. The entire experiment has left us with 30 million
|
|||
|
connections but very little public-sector content. Apart from the
|
|||
|
sense of community found in Newsgroups, list servers, and e-mail,
|
|||
|
not much is happening in cyberspace. And just how deep is this
|
|||
|
community when the crunch comes? Not nearly as deep as the
|
|||
|
counterculture of the 1960s, and look what happened to them.
|
|||
|
|
|||
|
Rand Corporation, meanwhile, is churning out studies on
|
|||
|
cyberwar, netwar, and information warfare. The Defense Department,
|
|||
|
at the urging of their Advanced Research Projects Agency (which
|
|||
|
started the Internet), recently signed a memorandum of understanding
|
|||
|
with the Justice Department, at the urging of the FBI and the
|
|||
|
National Institute of Justice. This memorandum anticipates a
|
|||
|
coordinated effort on high-tech applications for "Operations Other
|
|||
|
Than War" and "Law Enforcement." The game is on, and the high-tech
|
|||
|
high rollers are getting it together.
|
|||
|
|
|||
|
The neat graphics and sassy prose in "Wired" and "Mondo 2000"
|
|||
|
magazines notwithstanding, the Net-surfing culture is more virtual
|
|||
|
than real. Cyberspace cadets are no match for the real players, and
|
|||
|
it's going to be like taking candy from a baby. Lots of squeals,
|
|||
|
but nothing to raise any eyebrows. It's all so much spectacle
|
|||
|
anyway. Guy Debord (1932-1994) summed it up in "Society of the
|
|||
|
Spectacle" in 1967, when Rand was still tinkering with their
|
|||
|
Doomsday idea:
|
|||
|
|
|||
|
The technology is based on isolation, and the
|
|||
|
technical process isolates in turn. From the automobile
|
|||
|
to television, all the goods selected by the spectacular
|
|||
|
system are also its weapons for a constant reinforcement
|
|||
|
of the conditions of isolation of "lonely crowds." The
|
|||
|
spectacle constantly rediscovers its own assumptions more
|
|||
|
concretely.... In the spectacle, which is the image of
|
|||
|
the ruling economy, the goal is nothing, development
|
|||
|
everything. The spectacle aims at nothing other than
|
|||
|
itself.
|
|||
|
|
|||
|
Then again, the Spectacle does make for excellent Internet
|
|||
|
watching, once silly notions like "information wants to be free"
|
|||
|
are discarded, and the drama can be enjoyed for what it is.
|
|||
|
Basically, it's one more example of something that happens
|
|||
|
frequently in history. The little guy thinks he has created
|
|||
|
something new and powerful. He's so busy congratulating himself,
|
|||
|
that when the Big Dogs begin to notice, the little guy doesn't.
|
|||
|
In the end, it's merely another dog-bites-man nonstory that won't
|
|||
|
be found on NBC News. This just in: "Little guy gets screwed."
|
|||
|
|
|||
|
END END END
|
|||
|
|
|||
|
Flatland can be reached at PO Box 2420,
|
|||
|
Fort Bragg CA 95437-2420, Tel: 707-964-8326.
|
|||
|
Reposting permitted by the author.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 13 Jun 1995 00:31:00 -0500 (CDT)
|
|||
|
From: David Smith <bladex@BGA.COM>
|
|||
|
Subject: File 4--Legal Bytes 3.01 (part 1)
|
|||
|
|
|||
|
---------- Forwarded message ----------
|
|||
|
Date--Fri, 2 Jun 1995 11:40:42 -0500
|
|||
|
From--owner-legal-bytes@io.com
|
|||
|
|
|||
|
By George, Donaldson & Ford, L.L.P.
|
|||
|
Attorneys at Law
|
|||
|
114 West Seventh Street, Suite 1000
|
|||
|
Austin, Texas 78701
|
|||
|
(512) 495-1400
|
|||
|
(512) 499-0094 (FAX)
|
|||
|
gdf@well.sf.ca.us
|
|||
|
___________________________________
|
|||
|
|
|||
|
Copyright (c) 1995 George, Donaldson & Ford, L.L.P.
|
|||
|
(Permission is granted freely to redistribute
|
|||
|
this newsletter in its entirety electronically.)
|
|||
|
___________________________________
|
|||
|
|
|||
|
David H. Donaldson, Jr., Publisher <6017080@mcimail.com>
|
|||
|
Peter D. Kennedy, Senior Editor <pkennedy@io.com>
|
|||
|
Jim Hemphill, Contributing Editor <JAHEMPH+aGD&F%GDF@mcimail.com>
|
|||
|
Jeff Kirtner, Law Clerk
|
|||
|
___________________________________
|
|||
|
|
|||
|
IN THIS ISSUE:
|
|||
|
|
|||
|
1. WILL THE SHRINK-WRAP LICENSE DILEMMA PLAGUE ON-LINE SALES?
|
|||
|
|
|||
|
2. SOME LEGAL RISKS POSED BY ON-LINE ADVERTISING
|
|||
|
|
|||
|
3. LOTUS LOSES FIGHT TO PROTECT ITS USER INTERFACE
|
|||
|
|
|||
|
4. COPYRIGHT LAW UPDATE: COPYING BY COMMERCIAL RESEARCHERS IS
|
|||
|
NOT NECESSARILY A FAIR USE
|
|||
|
____________________________________________________
|
|||
|
|
|||
|
1. WILL THE SHRINK-WRAP LICENSE DILEMMA PLAGUE ON-LINE SALES?
|
|||
|
|
|||
|
Can software companies unilaterally decide what terms govern
|
|||
|
the sale of their software? What's the point of those long,
|
|||
|
complicated, one-sided licenses that come with most commercial
|
|||
|
software packages? Are they enforceable?
|
|||
|
|
|||
|
The Purpose of Shrink-wrap Licenses.
|
|||
|
|
|||
|
Everyone has seen these licenses -- they come with commercial
|
|||
|
software and state that opening the package or using the software
|
|||
|
means the buyer is agreeing to abide by their terms. While these
|
|||
|
documents may be slightly aggravating, software companies use them
|
|||
|
for two important reasons -- to protect their copyrights and to
|
|||
|
limit their exposure to lawsuits.
|
|||
|
|
|||
|
Software is terribly easy to copy and distribute; software
|
|||
|
developers understandably want to protect themselves from losing
|
|||
|
revenue from unauthorized copying. Shrink wrap licenses include
|
|||
|
terms restricting the copying of the software in order to help
|
|||
|
insure that the sale of a single copy of the software does not give
|
|||
|
rise to any implied license to make, distribute or use additional
|
|||
|
copies. The licenses might also try add further restrictions, such
|
|||
|
as prohibiting resale or leasing of the software.
|
|||
|
|
|||
|
Shrink-wrap licenses have a second goal: to limit the
|
|||
|
software company's legal liability. This need arises not from
|
|||
|
copyright law, but from the general laws governing contracts and
|
|||
|
the sale of goods -- which in all states (except Louisiana) is the
|
|||
|
Uniform Commercial Code, or UCC.
|
|||
|
|
|||
|
Article 2 of the UCC sets "default" rules that automatically
|
|||
|
become part of just about every sale of goods, unless the buyer and
|
|||
|
seller agree to change the defaults to something else. Despite
|
|||
|
some theoretical questions, most legal authorities agree commercial
|
|||
|
software is a "good" under the UCC.
|
|||
|
|
|||
|
The problem for a software vendor is that the UCC reads into
|
|||
|
every sale implied terms that favor the buyer. Rather than adopt
|
|||
|
the doctrine of "caveat emptor," the UCC assumes that the seller
|
|||
|
has made certain promises or warranties about the quality of the
|
|||
|
product. If the product does not live up to these implied
|
|||
|
warranties, the buyer can sue. Most importantly, the UCC assumes
|
|||
|
that the seller always promises that the product is "merchantable,"
|
|||
|
that is, fit for the customary use that such products are put to.
|
|||
|
Further, the UCC also assumes that the seller has promised that the
|
|||
|
product was fit for the buyer's particular intended use, if the
|
|||
|
seller had reason to know of that use.
|
|||
|
|
|||
|
The seller and buyer can agree to change these terms, such as
|
|||
|
when a used car is sold "as is." The buyer and seller can also
|
|||
|
agree to limit the scope of the seller's liability if the product
|
|||
|
does not live up to the promises that were made. However, when the
|
|||
|
seller tries to make these limitations himself, through terms on an
|
|||
|
invoice or other document, the limitations must be "conspicuous,"
|
|||
|
they must mention "merchantability," and they cannot be "unreason-
|
|||
|
able." Moreover, the buyer has to agree to the limits.
|
|||
|
|
|||
|
Are Shrink-wrap Contracts Enforceable?
|
|||
|
|
|||
|
There is serious question about how effective a typical
|
|||
|
shrink-wrap license is. Various criticisms are made.
|
|||
|
|
|||
|
First, and most obviously, is whether a purchaser has really
|
|||
|
"agreed" to the terms of the shrink wrap license. Typically, the
|
|||
|
buyer does not know what the license says when she buys the
|
|||
|
software; the purchase is made before the terms are revealed. How
|
|||
|
can the buyer "agree" to the terms without knowing what they are?
|
|||
|
After a sale is made, one party cannot add new terms. The federal
|
|||
|
court of appeals sitting in Philadelphia discussed these issues in
|
|||
|
STEP-SAVER DATA SYSTEMS, INC. v. WYSE TECHNOLOGY, 939 F.2d 91 (3rd
|
|||
|
Cir. 1991), and decided that a particular shrink-wrap license was
|
|||
|
not enforceable. See also David Hayes, Shrinkwrap License
|
|||
|
Agreements: New Light on a Vexing Problem, 15 Hastings Comm. Ent.
|
|||
|
L.J. 653 (1993).
|
|||
|
|
|||
|
A second, related objection is one raised to all take-it-or-
|
|||
|
leave it contracts, which are derisively named "contracts of
|
|||
|
adhesion." These tend to get rough treatment by courts, and
|
|||
|
shrink-wrap licenses are a special strain.
|
|||
|
|
|||
|
Other concerns relate to the technical question of contract
|
|||
|
formation -- the sale is usually made between a retailer and the
|
|||
|
consumer, but the shrink-wrap license is between the consumer and
|
|||
|
the software company. Is that a contract at all? What did the
|
|||
|
software company give the consumer that the consumer did not
|
|||
|
already have when she bought the product? There are also some
|
|||
|
concerns about whether particular restrictive terms in these
|
|||
|
licenses (or more accurately, state laws that state that the terms
|
|||
|
are enforceable) violate the federal Copyright Act. See VAULT
|
|||
|
CORP. v. QUAID SOFTWARE, LTD. 847 F.2d 255 (5th Cir. 1988).
|
|||
|
|
|||
|
Can These Problems be Fixed by On-line Transactions?
|
|||
|
|
|||
|
Do these same objections to shrink-wrap licenses apply to on-
|
|||
|
line transactions? Maybe not.
|
|||
|
|
|||
|
The unique nature of interactive on-line transactions offers
|
|||
|
vendors the ability to get and record the buyer's agreement to
|
|||
|
license terms before a purchase is made. Much of the software that
|
|||
|
is distributed on-line, shareware particularly, comes with a
|
|||
|
license.doc zipped up with the program files. These licenses will
|
|||
|
have the same troubles a shrink-wrap licenses, because they are an
|
|||
|
after-the-fact "surprise".
|
|||
|
|
|||
|
However, most bulletin board systems, and now the World Wide
|
|||
|
Web, can easily be configured to require short interactive sessions
|
|||
|
before a transaction is consummated. The vendor can display the
|
|||
|
license terms, require the buyer's assent before the software is
|
|||
|
made available, and importantly, the buyer's assent can be recorded
|
|||
|
-- written to a log file. While an on-line seller cannot force the
|
|||
|
buyer to read the terms, it surely can record the fact that the
|
|||
|
terms were displayed, and that the buyer gave affirmative responses
|
|||
|
-- "Did you read the terms of the license?" "I did." "Do you agree
|
|||
|
to the terms?" "I do."
|
|||
|
|
|||
|
This type of interaction before the sale makes the transaction
|
|||
|
appear far less one-sided. While take-it-or-leave-it terms might
|
|||
|
still be criticized as "adhesion contracts," the unique give-and-
|
|||
|
take that's possible on-line removes much of the inequitable sting
|
|||
|
that "surprise" shrink-wrap license terms leave on many observers.
|
|||
|
___________________________________________________________________
|
|||
|
|
|||
|
2. SOME LEGAL RISKS POSED BY ON-LINE ADVERTISING
|
|||
|
|
|||
|
Advertising on the Internet is booming -- not with crass
|
|||
|
"spamming" on Usenet newsgroups, but with flashy, multi-media home
|
|||
|
pages on the World Wide Web that show off pictures, sound and even
|
|||
|
video. Most commercial World Wide Web sites combine a mix of
|
|||
|
advertising, information, and entertainment -- honoring the
|
|||
|
Internet tradition that tasteful, non-intrusive self-promotion is
|
|||
|
acceptable if it comes along with something neat or valuable.
|
|||
|
|
|||
|
Are there legal risks involved in on-line advertising? There
|
|||
|
are, just like any other endeavor. Any business that extends its
|
|||
|
advertising to cyberspace must take the same care as it does with
|
|||
|
print or broadcast advertising. Electronic advertising also
|
|||
|
introduces new questions of jurisdiction -- whose laws apply? On-
|
|||
|
line service providers that accept advertising must consider their
|
|||
|
own potential liability, too. What is their duty concerning the
|
|||
|
content of other companies' ads?
|
|||
|
|
|||
|
Advertisements are "publications."
|
|||
|
|
|||
|
Companies that put their ads on the Internet are "publishers"
|
|||
|
and face the same potential risks of defamation, invasion of
|
|||
|
privacy, etc., from these ads as from print ads. Moreover,
|
|||
|
electronic service providers that accept paid advertisement may be
|
|||
|
"publishers" of those ads as well, and responsible to some degree
|
|||
|
for their content. Absent particular exceptions, advertisements
|
|||
|
carried by a publisher are viewed as that publisher's own speech.
|
|||
|
For example, the landmark 1964 Supreme Court libel case, New York
|
|||
|
Times v. Sullivan, concerned the liability of the New York Times
|
|||
|
for a paid advertisement written by others. The Supreme Court's
|
|||
|
ruling, although favorable to the Times, made no distinction
|
|||
|
between advertisements and other content of the newspaper.
|
|||
|
|
|||
|
Compuserve, in the now-famous Cubby v. Compuserve case,
|
|||
|
successfully defended itself from a libel suit by proving its
|
|||
|
ignorance -- that it knew nothing of the content of a newsletter
|
|||
|
carried on its service, but provided by an outside contractor.
|
|||
|
This defense -- based on the traditional protection granted
|
|||
|
bookstores from libel suits -- is unlikely to be available when it
|
|||
|
comes to paid advertisements. Publishers, whether on-line or in
|
|||
|
print, generally review the content of advertisements before they
|
|||
|
are accepted and published, if only to determine pricing. They
|
|||
|
usually retain the right to refuse an advertisement based on its
|
|||
|
content. (Recall the recent attempts by revisionist "historians"
|
|||
|
to place ads in college papers denying that the Holocaust took
|
|||
|
place).
|
|||
|
|
|||
|
Because of this potential exposure to liability, electronic
|
|||
|
publishers should be guided by two general principles: (1) review
|
|||
|
all proposed advertisements for potential legal problems, and
|
|||
|
(2) obtain an agreement that the advertiser will indemnify the
|
|||
|
publisher for any legal liability that arises from the ad. This
|
|||
|
article reviews several areas of potential concern for electronic
|
|||
|
advertisers.
|
|||
|
|
|||
|
Ads for illegal transactions.
|
|||
|
|
|||
|
You can't legally advertise marijuana for sale. (Or, more
|
|||
|
accurately, the First Amendment does not protect ads for illegal
|
|||
|
transactions.) A publisher can't knowingly carry such ads, even if
|
|||
|
the publisher would not be a party to the illegal transaction.
|
|||
|
|
|||
|
A publisher's liability for carrying ads for illegal
|
|||
|
transactions has been hashed out in an interesting series of
|
|||
|
lawsuits involving the magazine Soldier of Fortune, which
|
|||
|
unintentionally carried several classified advertisements submitted
|
|||
|
by real live hit men offering the services of a "gun for hire."
|
|||
|
The hit men were hired through the magazine ads, and the families
|
|||
|
of those people "hit" sued the magazine.
|
|||
|
|
|||
|
Two federal appeals courts came to entirely opposite
|
|||
|
conclusions about very similar Soldier of Fortune ads. The
|
|||
|
Eleventh Circuit upheld a multi-million dollar damage award against
|
|||
|
the magazine; the Fifth Circuit reversed a finding of liability.
|
|||
|
The legal principles these courts announced were relatively
|
|||
|
consistent, though: if an advertisement poses a "clearly
|
|||
|
identifiable unreasonable risk that it was an offer to commit
|
|||
|
crimes for money" the publisher can be held liable if it was
|
|||
|
negligent in running the ad. BRAUN v. SOLDIER OF FORTUNE MAGAINZE,
|
|||
|
INC., 968 F.2d 1110, 1121 (11th Cir. 1992), cert. denied, 113 S.
|
|||
|
Ct. 1028 (1993). A publisher must make sure that the ad, on its
|
|||
|
face, does not present a "clearly identifiable unreasonable risk"
|
|||
|
that the advertisement is soliciting an illegal transaction. On
|
|||
|
the other hand, the courts are less likely to impose liability for
|
|||
|
ambiguous advertisements that could have an innocent meaning. See
|
|||
|
EIMANN v. SOLDIER OF FORTUNE MAGAZINE, INC., 880 F.2d 830 (5th Cir.
|
|||
|
1989), cert. denied, 493 U.S. 1024 (1990). This recognizes courts'
|
|||
|
reluctance to impose a duty on publishers to investigate
|
|||
|
advertisements beyond what the advertisements say.
|
|||
|
|
|||
|
There is no reason to believe that this standard is different
|
|||
|
for advertisements of so-called "victimless" crimes like
|
|||
|
prostitution, although the likelihood of a civil lawsuit might be
|
|||
|
less.
|
|||
|
|
|||
|
Ads for regulated businesses.
|
|||
|
|
|||
|
Many businesses are regulated, and so is the content of their
|
|||
|
advertisements. The First Amendment permits some government
|
|||
|
regulation of commercial speech; for example, lawyer advertising is
|
|||
|
regulated by state bar associations or courts (although lawyers are
|
|||
|
constantly fighting over how far the regulations can go).
|
|||
|
Businesses placing ads should know what rules regulate their
|
|||
|
advertising. Companies accepting ads have two choices: (1) know
|
|||
|
the regulations for all companies for which it accepts ads; or (2)
|
|||
|
require the advertiser to guarantee that its ads comply with
|
|||
|
applicable regulations, and indemnify the publisher for losses if
|
|||
|
they don't.
|
|||
|
|
|||
|
An example of the difficult legal questions raised by local
|
|||
|
regulation in the new borderless world of cyberspace are lottery
|
|||
|
and gambling ads. Some states (and territories) regulate or ban
|
|||
|
advertising lotteries and gambling. Puerto Rico, for instance,
|
|||
|
allows casino gambling. It also allows advertisement of gambling
|
|||
|
aimed at tourists, but prohibits such ads aimed at Puerto Ricans.
|
|||
|
The U.S. Supreme Court says that this odd regulatory scheme is
|
|||
|
constitutional. POSADAS DE PUERTO RICO ASSOCIATES v. TOURISM CO.
|
|||
|
OF PUERTO RICO, 478 U.S. 328 (1986).
|
|||
|
|
|||
|
More recently, the Supreme Court also upheld the
|
|||
|
constitutionality of a federal law that forbids radio or television
|
|||
|
stations from broadcasting lottery ads into states that don't have
|
|||
|
a lottery -- even if the broadcasts are primarily heard in a state
|
|||
|
that has a lottery. UNITED STATES v. EDGE BROADCASTING CO., 113
|
|||
|
S. Ct. 2696 (1993). This federal law only regulates airwave
|
|||
|
broadcasts of lottery ads. However, some states have similar
|
|||
|
statutes banning lottery advertising in any medium. For example,
|
|||
|
North Carolina prohibits advertising a lottery "by writing or
|
|||
|
printing or by circular or letter or in any other way." N.C. Stat.
|
|||
|
14-289. Could North Carolina enforce this law against electronic
|
|||
|
publishers who carry lottery ads?
|
|||
|
|
|||
|
Answering that question raises a host of difficult, unanswered
|
|||
|
jurisdictional questions and is beyond the scope of this short
|
|||
|
article. As a practical matter, it seems unlikely that North
|
|||
|
Carolina officials would try to prosecute the State of Texas, for
|
|||
|
example, if Texas set up a Web site to advertise its lottery that
|
|||
|
of course could be accessed from North Carolina. On the other
|
|||
|
hand, a local North Carolina service provider that accepted and
|
|||
|
posted ads for the Texas lottery (or even the results of the Texas
|
|||
|
lottery) might have something to worry about: the language of the
|
|||
|
law prohibits it; the service provider is in easy reach of local
|
|||
|
prosecutors; and the U.S. Supreme Court has already looked kindly
|
|||
|
on a similar law.
|
|||
|
|
|||
|
Misleading and deceptive ads.
|
|||
|
|
|||
|
The First Amendment does not protect false advertisement;
|
|||
|
state statutes (and some federal laws) routinely prohibit false,
|
|||
|
misleading and deceptive ads. For example, the broad Texas
|
|||
|
Deceptive Trade Practices-Consumer Protection Act ("DTPA")
|
|||
|
prohibits all sorts of deceptive advertising, and gives deceived
|
|||
|
consumers very powerful remedies in court. Such statutes are
|
|||
|
primarily aimed at those who place advertisements, rather than the
|
|||
|
publishers. Where do electronic publishers fit in? As usual, it's
|
|||
|
not clear.
|
|||
|
|
|||
|
Newspapers cannot be sued under the Texas DTPA because that
|
|||
|
law does not apply to "the owner or employees of a regularly
|
|||
|
published newspaper, magazine, or telephone directory, or broadcast
|
|||
|
station, or billboard." Tex. Bus. & Comm. Code 17.49(a). Is an
|
|||
|
internet service provider a "magazine" or "broadcast station?"
|
|||
|
Maybe. Is a BBS or a World Wide Web page a "billboard"? Maybe.
|
|||
|
The question has not come up yet. While it would be more logical
|
|||
|
and consistent with the purpose of the statute to exempt electronic
|
|||
|
publishers that perform the same function as a newspaper, courts
|
|||
|
are supposed to apply the DTPA "liberally" to provide consumers
|
|||
|
with as broad a remedy as possible from deceptive ads -- leaving
|
|||
|
the answer in doubt.
|
|||
|
|
|||
|
Some things are clear. An entity distributing information
|
|||
|
regarding its own goods or services cannot claim the "media
|
|||
|
exemption" -- a newspaper or BBS that publishes false information
|
|||
|
about its goods or services can be sued by consumers under the
|
|||
|
DTPA. Also, an entity that has a financial stake in the sale of
|
|||
|
the goods advertised is also subject to DTPA liability. This means
|
|||
|
that internet service providers that accept a percentage of sales
|
|||
|
generated by on-line advertising will be subject to the
|
|||
|
restrictions of the DTPA, and should insure that the ads they place
|
|||
|
are not deceptive, and that the seller has agreed (and can)
|
|||
|
indemnify them for liability. Finally, no publisher -- whether
|
|||
|
earthbound or in cyberspace -- is exempt from DTPA liability if the
|
|||
|
outlet and/or its employees know an ad is false, misleading or
|
|||
|
deceptive.
|
|||
|
|
|||
|
Remember: It's YOUR service.
|
|||
|
|
|||
|
Unless an electronic publication accepts all advertisements,
|
|||
|
regardless of content, and does not review the content of that
|
|||
|
advertising in any way or reserve any right to reject
|
|||
|
advertisements (and can prove this in court), the presumption will
|
|||
|
be that the service "published" the ad and is responsible for its
|
|||
|
content. No one has a First Amendment right to place their
|
|||
|
advertisement with any given Internet service provider or on any
|
|||
|
commercial information service. Despite lots of on-line rhetoric,
|
|||
|
the First Amendment only restricts what the government can do, not
|
|||
|
what businesses (even big ones) can do. Remember that a publisher
|
|||
|
always has the right to reject an ad for any reason at all and can
|
|||
|
require changes before an ad is placed. For ads that are obviously
|
|||
|
illegal, slanderous or misleading, the safest bet is to refuse the
|
|||
|
ad.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|||
|
|
|||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #7.55
|
|||
|
************************************
|
|||
|
|