874 lines
36 KiB
Plaintext
874 lines
36 KiB
Plaintext
|
|
||
|
|
||
|
Computer underground Digest Wed Sept 27, 1995 Volume 7 : Issue 77
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #7.77 (Wed, Sept 27, 1995)
|
||
|
|
||
|
File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)
|
||
|
File 2--New Firewalls Book from O'Reilly
|
||
|
File 3--CIX alternative to InterNIC's registration process.
|
||
|
File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)
|
||
|
File 5--COMPUTERS & THE LAW CONFERENCE INFO
|
||
|
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Wed, 20 Sep 1995 22:59:35 -0500 (CDT)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 1--Minnesota A.G. Erects Electronic Wall Around State (fwd)
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
|
||
|
From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>
|
||
|
|
||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||
|
|
||
|
The following memo can be found at:
|
||
|
http://www.state.mn.us/ebranch/ag/memo.txt
|
||
|
|
||
|
As a resident of Minnesota, I have a great concern over how far this
|
||
|
inturrpretation can go. The AA BBS case seems to be ripe for repeat
|
||
|
under this, as can any other law that diffes between Minnesota and
|
||
|
another state. This is bad, IMHO.
|
||
|
|
||
|
I have deleted a small amount of white space, otherwise the memo is exact
|
||
|
as it appears on the web page.
|
||
|
|
||
|
================
|
||
|
|
||
|
WARNING TO ALL INTERNET USERS AND PROVIDERS
|
||
|
|
||
|
THIS MEMORANDUM SETS FORTH THE ENFORCEMENT POSITION OF THE
|
||
|
MINNESOTA ATTORNEY GENERAL'S OFFICE WITH RESPECT TO CERTAIN
|
||
|
ILLEGAL ACTIVITIES ON THE INTERNET.
|
||
|
|
||
|
PERSONS OUTSIDE OF MINNESOTA WHO TRANSMIT INFORMATION VIA THE
|
||
|
INTERNET KNOWING THAT INFORMATION WILL BE DISSEMINATED IN
|
||
|
MINNESOTA ARE SUBJECT TO JURISDICTION IN MINNESOTA COURTS FOR
|
||
|
VIOLATIONS OF STATE CRIMINAL AND CIVIL LAWS.
|
||
|
|
||
|
The following discussion sets out the legal basis for this
|
||
|
conclusion.
|
||
|
|
||
|
Minnesota's general criminal jurisdiction statute provides as
|
||
|
follows:
|
||
|
|
||
|
A person may be convicted and sentenced under the
|
||
|
law of this State if the person:
|
||
|
|
||
|
(1) Commits an offense in whole or in part within
|
||
|
this state; or
|
||
|
|
||
|
(2) Being without the state, causes, aids or abets
|
||
|
another to commit a crime within the state; or
|
||
|
|
||
|
(3) Being without the state, intentionally causes a
|
||
|
result within the state prohibited by the criminal laws
|
||
|
of this state.
|
||
|
|
||
|
It is not a defense that the defendant's conduct is
|
||
|
also a criminal offense under the laws of another state
|
||
|
or of the United States or of another country.
|
||
|
|
||
|
Minnesota Statute Section 609.025 (1994).
|
||
|
|
||
|
This statute has been interpreted by the Minnesota Supreme
|
||
|
Court. In State v. Rossbach, 288 N.W.2d 714 (Minn. 1980), the
|
||
|
defendant appealed his conviction for aggravated assault. The
|
||
|
defendant, standing inside the border of an Indian Reservation,
|
||
|
had fired a rifle across the boundary line at a person outside
|
||
|
the border. The defendant claimed that Minnesota courts did not
|
||
|
have jurisdiction because his act took place off of Minnesota
|
||
|
lands. Applying Minnesota Statute { 609.025 and the common law,
|
||
|
the Minnesota Supreme Court affirmed the conviction, holding that
|
||
|
the intentional impact within Minnesota land created
|
||
|
jurisdiction. Id. at 715-16.
|
||
|
|
||
|
The Minnesota Court of Appeals reached a similar result in
|
||
|
State v. Brown, 486 N.W.2d 816 (Minn. Ct. App. 1992). In Brown,
|
||
|
the court implicitly found that Minnesota courts had criminal
|
||
|
jurisdiction over individuals in Iowa who mailed unlicensed
|
||
|
gambling equipment to Minnesota residents. Id. at 817-18.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Minnesota courts have applied similar jurisdictional
|
||
|
principles in civil cases. In State v. Red Lake DFL Committee,
|
||
|
303 N.W.2d 54 (Minn. 1981), the Minnesota Supreme Court held that
|
||
|
state courts had jurisdiction over a committee of the Red Lake
|
||
|
Indian Tribe which had purchased space for political
|
||
|
advertisements in a newspaper circulated in the state. At issue
|
||
|
was whether the committee had to register under state ethical
|
||
|
practices laws.
|
||
|
|
||
|
The committee argued that it had done nothing outside of the
|
||
|
reservation, since the transaction with the newspaper took place
|
||
|
inside the reservation, and the committee did not assist in the
|
||
|
circulation of the newspaper. In holding that the committee was
|
||
|
required to register under state ethical practices law, the
|
||
|
Supreme Court responded to this argument as follows:
|
||
|
|
||
|
Defendants say nothing they did occurred outside the
|
||
|
reservation, but they choose to ignore that what they
|
||
|
did caused something to occur beyond the reservation
|
||
|
boundaries, namely, the dissemination of a political
|
||
|
message, which is the activity here sought to be
|
||
|
regulated.
|
||
|
|
||
|
Id. at 56 (emphasis added).
|
||
|
|
||
|
The above principles of Minnesota law apply equally to
|
||
|
activities on the Internet. Individuals and organizations
|
||
|
outside of Minnesota who disseminate information in Minnesota via
|
||
|
the Internet and thereby cause a result to occur in Minnesota are
|
||
|
subject to state criminal and civil laws.
|
||
|
|
||
|
An Example Of Illegal Activity On The Internet - Gambling
|
||
|
|
||
|
Gambling appears to be an especially prominent aspect of
|
||
|
criminal activity on the Internet. There are a number of
|
||
|
services outside of Minnesota that offer Minnesota residents the
|
||
|
opportunity to place bets on sporting events, purchase lottery
|
||
|
tickets, and participate in simulated casino games. These
|
||
|
services are illegal in Minnesota.
|
||
|
|
||
|
Lotteries
|
||
|
|
||
|
A lottery is defined as "a plan which provides for the
|
||
|
distribution of money, property or other reward or benefit to
|
||
|
persons selected by chance from among participants some or all of
|
||
|
whom have given a consideration for the chance of being
|
||
|
selected." Minnesota Statute Section 609.75, Subdivision 1(a)
|
||
|
(1994).
|
||
|
|
||
|
Generally, it is unlawful in Minnesota to sell or transfer a
|
||
|
chance to participate in a lottery. Minnesota Statute Section
|
||
|
609.755(2) (1994). It is also unlawful to disseminate
|
||
|
information in Minnesota about a lottery, except a lottery
|
||
|
conducted by an adjoining state, with intent to encourage
|
||
|
|
||
|
|
||
|
-2-
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
participation therein. Minnesota Statute Section 609.755(3).
|
||
|
Acts in Minnesota in furtherance of a lottery conducted outside
|
||
|
of Minnesota are included, notwithstanding its validity where
|
||
|
conducted. Minnesota Statute Section 609.75, Subdivision 1(c)
|
||
|
(1994). Violation of these provisions is a misdemeanor,
|
||
|
punishable by up to 90 days in jail, or a fine of up to $700, or
|
||
|
both. Minnesota Statute Section 609.755 (1994); 609.02,
|
||
|
Subdivision 3 (1994). It is a gross misdemeanor under Minnesota
|
||
|
law to conduct a lottery. Minnesota Statute Section 609.76,
|
||
|
Subdivision 1(3) (1994). A gross misdemeanor is punishable by up
|
||
|
to one year in jail, or a $3,000 fine, or both. Minnesota
|
||
|
Statute Section 609.02, Subdivision 4 (1994).
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
-3-
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Sports Bookmaking
|
||
|
|
||
|
Sports bookmaking is defined as "the activity of
|
||
|
intentionally receiving, recording or forwarding within any
|
||
|
30-day period more than five bets, or offers to bet, that total
|
||
|
more than $2,500 on any one or more sporting events." Minnesota
|
||
|
Statute Section 609.75, Subdivision 7 (1994). Engaging in sports
|
||
|
bookmaking is a felony, which is punishable by more than one year
|
||
|
imprisonment. Minnesota Statutes Sections 609.76, Subdivision 2
|
||
|
(1994); 609.02, Subdivision 2 (1994). Intentionally receiving,
|
||
|
recording, or forwarding bets or offers to bet in lesser amounts
|
||
|
is a gross misdemeanor. Minnesota Statute Section 609.76,
|
||
|
Subdivision 1(7) (1994).
|
||
|
|
||
|
Accomplice Liability
|
||
|
|
||
|
Minnesota's accomplice statute provides that one who
|
||
|
intentionally aids, advises, counsels, or conspires with another
|
||
|
to commit a crime is equally liable for that crime. Minnesota
|
||
|
Statute Section 609.05, Subdivision 1 (1994). Therefore, persons
|
||
|
or organizations who knowingly assist Internet gambling
|
||
|
organizations in any unlawful activity may themselves be held
|
||
|
liable for that unlawful activity. Thus, for example, Internet
|
||
|
access providers and credit card companies that continue to
|
||
|
provide services to gambling organizations after notice that the
|
||
|
activities of the organizations are illegal would be subject to
|
||
|
accomplice liability.
|
||
|
|
||
|
In addition to being illegal under Minnesota law, the
|
||
|
Internet gambling organizations appear to violate several
|
||
|
provisions of the federal law. All of the services appear to
|
||
|
violate 18 United States Code Section 1084, which prohibits the
|
||
|
foreign or interstate transmission of bets or wagers or
|
||
|
information on bets or wagers by use of a wire communication. In
|
||
|
as much as the Internet gambling organizations involve lotteries,
|
||
|
they would also appear to violate 18 United States Code Section
|
||
|
1301 (prohibiting the "importing or transporting" of lottery
|
||
|
tickets; 18 United States Code Section 1302 (prohibiting the
|
||
|
mailing of lottery tickets); and 18 United States Code Section
|
||
|
1304 (prohibiting the "broadcasting" of lottery information).
|
||
|
Sections 1084 and 1301 provide for felony-level penalties, while
|
||
|
Sections 1302 and 1304 provide for misdemeanor penalties.
|
||
|
|
||
|
Placing A Bet Through Internet Gambling Organizations
|
||
|
|
||
|
Minnesota residents should be aware that it is unlawful to
|
||
|
make a bet through Internet gambling organizations. Minnesota
|
||
|
law makes it a misdemeanor to place a bet unless done pursuant to
|
||
|
an exempted, state-regulated activity, such as licensed
|
||
|
charitable gambling or the state lottery. Minnesota Statute
|
||
|
Sections 609.75, Subdivisions 2 - 3; 609.755(1) (1994). The
|
||
|
Internet gambling organizations are not exempted. Therefore, any
|
||
|
person in Minnesota who places a bet through one of these
|
||
|
organizations is committing a crime.
|
||
|
|
||
|
|
||
|
-4-
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Minnesota residents should also be aware of forfeiture
|
||
|
provisions related to unlawful gambling activity. Minnesota
|
||
|
Statute Section 609.762, Subdivision 1 (1994) provides that the
|
||
|
following items are subject to forfeiture:
|
||
|
|
||
|
(a) Devices used or intended for use, including
|
||
|
those defined in section 349.30, subdivision 2, as a
|
||
|
gambling device, except as authorized in sections 349.11
|
||
|
to 349.23 and 349.40;
|
||
|
|
||
|
(b) All moneys, materials, and other property used
|
||
|
or intended for use as payment to participate in
|
||
|
gambling or a prize or receipt for gambling; and
|
||
|
|
||
|
(c) Books, records, and research products and
|
||
|
materials, including formulas, microfilm, tapes, and
|
||
|
data used or intended for use in gambling.
|
||
|
|
||
|
A "gambling device" is defined as "a contrivance which for a
|
||
|
consideration affords the player an opportunity to obtain
|
||
|
something of value, other than free plays, automatically from the
|
||
|
machine or otherwise, the award of which is determined
|
||
|
principally by chance." Minnesota Statute Section 609.75,
|
||
|
Subdivision 4 (1994).
|
||
|
|
||
|
Under this definition of "gambling device", a computer that
|
||
|
is used to play a game of chance for something of value would be
|
||
|
subject to forfeiture.
|
||
|
|
||
|
Gambling is just one example of illegal activity on the
|
||
|
Internet. However, the same jurisdictional principles apply with
|
||
|
equal force to any illegal activity.
|
||
|
|
||
|
Please direct any inquiries regarding this notice, or report
|
||
|
violations of Minnesota law to the Law Enforcement Section,
|
||
|
Minnesota Attorney General's Office, Suite 1400, NCL Tower, 445
|
||
|
Minnesota Street, St. Paul, Minnesota 55101-2131, telephone (612)
|
||
|
296-7575..
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 20 Sep 1995 11:33:36 -0700
|
||
|
From: Sara Winge <sara@ora.com>
|
||
|
Subject: File 2--New Firewalls Book from O'Reilly
|
||
|
|
||
|
FOR IMMEDIATE RELEASE
|
||
|
September 20, 1995
|
||
|
|
||
|
PRESS--FOR REVIEW COPIES, CONTACT: Sara Winge
|
||
|
707/829-0515
|
||
|
sara@ora.com
|
||
|
|
||
|
O'REILLY PUBLISHES GUIDE TO INTERNET FIREWALLS
|
||
|
New Book Describes Theory and Practice of
|
||
|
Key Computer Security Technology
|
||
|
|
||
|
SEBASTOPOL, CA--O'Reilly & Associates has released "Building Internet
|
||
|
Firewalls," a practical guide to protecting computer systems from the
|
||
|
growing threats to Internet security.
|
||
|
|
||
|
Determined Internet hackers and computer criminals can wreak havoc if
|
||
|
they break into computer systems that are connected to the Internet.
|
||
|
Firewalls are an important security tool for responding to this
|
||
|
threat--they keep damage on one part of the network (e.g.,
|
||
|
eavesdropping, a worm program, file damage) from spreading to the rest
|
||
|
of the network. A hardware and/or software solution that restricts
|
||
|
access from an internal network to the Internet (and vice versa), a
|
||
|
firewall may also be used to separate two or more parts of a local
|
||
|
network (for example, protecting finance from R&D). Without firewalls,
|
||
|
network security problems can rage out of control.
|
||
|
|
||
|
"Building Internet Firewalls" describes a variety of firewall
|
||
|
approaches and architectures. It discusses Internet threats, the
|
||
|
benefits of firewalls, overall security strategies, and a summary of
|
||
|
Internet services and their security risks. In addition, the book
|
||
|
thoroughly covers the technical aspects of firewall design and
|
||
|
maintenance, including how to protect the bastion host in a firewall
|
||
|
configuration, how to build proxying and packet filtering firewalls,
|
||
|
and how to configure Internet services to operate with a firewall. Its
|
||
|
appendices include a resource summary, a directory of how to find
|
||
|
firewall toolkits and other security-related tools, and a detailed
|
||
|
summary providing TCP/IP background information.
|
||
|
|
||
|
More than a million computer systems are now connected to the
|
||
|
Internet. Over 100 million email messages are exchanged each day,
|
||
|
along with countless files, documents, and images. For businesses that
|
||
|
are striving to be safe on the Net, "Building Internet Firewalls"
|
||
|
offers a comprehensive guide to the theory and practice of creating
|
||
|
effective firewalls.
|
||
|
|
||
|
About the Authors
|
||
|
|
||
|
D. Brent Chapman is a consultant in the San Francisco Bay Area,
|
||
|
specializing in Internet firewalls. He has designed and built Internet
|
||
|
firewall systems for a wide range of clients, using a variety of
|
||
|
techniques and technologies. He is also the manager of the Firewalls
|
||
|
Internet mailing list.
|
||
|
|
||
|
Elizabeth Zwicky is a senior system administrator at Silicon Graphics
|
||
|
and the president of SAGE (the System Administrators Guild). She has
|
||
|
been involuntarily involved in Internet security since before the
|
||
|
Internet worm.
|
||
|
|
||
|
# # #
|
||
|
|
||
|
Building Internet Firewalls"
|
||
|
By D. Brent Chapman & Elizabeth D. Zwicky
|
||
|
1st Edition September 1995
|
||
|
544 pages, ISBN: 1-56592-124-0, $29.95
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: Stanton McCandlish <mech@EFF.ORG>
|
||
|
Date: Mon, 18 Sep 1995 19:09:29 -0400 (EDT)
|
||
|
Subject: File 3--CIX alternative to InterNIC's registration process.
|
||
|
|
||
|
CIX has put out a white paper on overhauling the domain registration &
|
||
|
routing system of the US portion of Internet. Some of it sounds OK, most
|
||
|
of it does not sound any better than InterNIC's announcement that it'll
|
||
|
start charging for domain names. Some of it's downright strange, and
|
||
|
inspires some concern in me. Particular this section:
|
||
|
|
||
|
**********
|
||
|
Domain registration will be open to anybody but subject to several
|
||
|
restrictions to minimize abuse, i.e., acquisition of trademarked
|
||
|
names. Domains registration will require submittal of a taxpayer
|
||
|
identification number followed by hard copy submittal of company
|
||
|
letterhead and notary certification. Trademark disputes will not be
|
||
|
settled by the CIX but between parties in the appropriate legal forum.
|
||
|
Domain registration will require a one time fee and a yearly
|
||
|
maintenance fee.
|
||
|
**********
|
||
|
|
||
|
That's right. No domains for any entity that is not a corporation with a
|
||
|
letterhead, no domain if you aren't willing to send a bunch of notarized
|
||
|
snail mail, no domain if you are not willing to have your Social Security
|
||
|
Number tied to your domain registration, no domain if you're not a US
|
||
|
citizen with a Soc. Security Number in the first place. All this of course
|
||
|
directly contradicts the opening statement that domain registration is
|
||
|
available to "anybody".
|
||
|
|
||
|
The document says the registration process is "in realtime", whatever
|
||
|
that means. The implication is that it'll be immediate, and faster than
|
||
|
InterNIC. Somehow I have a hard time reconciling this with the
|
||
|
requirement for snailmailed paperwork.
|
||
|
|
||
|
Fortunately, this remains just a proposal.
|
||
|
|
||
|
The full text of this item is at:
|
||
|
|
||
|
CIX Registry Services Strategy White Paper
|
||
|
http://www.cix.org/Reports/registry.html
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 26 Sep 1995 22:38:50 -0500 (CDT)
|
||
|
From: David Smith <bladex@BGA.COM>
|
||
|
Subject: File 4--Update--Cult Internet Censorship in Norway -- 24/9/95 (fwd)
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
|
||
|
Update --- Cult Internet Censorship in Norway
|
||
|
=============================================
|
||
|
|
||
|
|
||
|
News Release - 24th September 1995
|
||
|
|
||
|
On Thursday, 21st of September, news broke of another cult attempting
|
||
|
to silence its critics with the closing down of a student's account
|
||
|
at the Univeristy of Bergen, Norway. Within hours, this action had
|
||
|
been reported worldwide and many representations made by e-mail; the
|
||
|
staff responsible at the University have peddled various alternative
|
||
|
stories to those concerned net.citizens who wrote in protest. To set
|
||
|
the story straight and to record his gratitude for the enormous support
|
||
|
he has received, the student at the center of the affair, Mr Jan
|
||
|
Steinar Haugland, has released the following statement:
|
||
|
|
||
|
<beginning of statement>
|
||
|
|
||
|
In the autumn of 1993, when I was a Jehovah's Witness [JW], I met a
|
||
|
fellow Witness at a pub. His name was Kenneth Hostland, and I was
|
||
|
delighted to discover that he was a real Internet expert. I told him
|
||
|
about several JW resources that I had found on the Internet, such as
|
||
|
the "Friends" mailing list.
|
||
|
|
||
|
I had an email account at NHH, the Business School in Bergen, but at
|
||
|
the time the computing department there had closed all Internet access
|
||
|
except email and gopher, believing this would help them avoid viruses.
|
||
|
Kenneth said that since I was a student, I could get a less restricted
|
||
|
account at the University of Bergen (UiB).
|
||
|
|
||
|
The University and the NHH Business School are closely related. NHH
|
||
|
uses the University's computing facilities. If you are matriculated at
|
||
|
NHH, you can study at the University. Because of this close
|
||
|
connection, I decided to accept Kenneth Hostland's kind offer. I
|
||
|
dropped by his office, where he filled out a paper form. I signed it
|
||
|
and I was apparently officially authorized to have an account.
|
||
|
|
||
|
In the spring of 1995, after wrestling with many disturbing questions
|
||
|
about JW doctrine, I came to the conclusion I could no longer be a
|
||
|
Jehovah's Witness. I was finally disfellowshiped (excommunicated) for
|
||
|
not believing the 90-year-old JW teaching about the significance of
|
||
|
the year 1914. Ironically, the very teaching I disagreed with was
|
||
|
recently rejected by the Governing Body of Jehovah's Witnesses. The
|
||
|
doctrinal reversal was announced to the Witnesses this month
|
||
|
(September 1995) in their official publication, the WatchTower.
|
||
|
|
||
|
When you are disfellowshipped, all Jehovah's Witnesses are instructed
|
||
|
to shun you. Their leaders say that you deserve nothing less than
|
||
|
"complete hatred." (Watchtower, 1 Oct 1993, page 18)
|
||
|
|
||
|
My interest in the Witnesses continued, however. From time to time, I
|
||
|
posted material on the Internet that was critical of JW doctrine. I
|
||
|
also posted quotes from old Watchtower publications which demonstrated
|
||
|
a history of failed predictions and doctrinal "adjustments". These
|
||
|
were no doubt embarassing to the Witnesses, who believe that the
|
||
|
Watchtower organization is God's sole channel of information to the
|
||
|
world.
|
||
|
|
||
|
Kenneth Hostland, who was still a loyal Witness, decided to terminate
|
||
|
the account he had set up for me. Even though I was now a student at
|
||
|
the University, and had submitted the proper University paperwork to
|
||
|
secure my access, Hans Morten Kind <kind@edb.uib.no> was instructed to
|
||
|
cancel my account.
|
||
|
|
||
|
When Kenneth Hostland first set up my account, I had no idea that
|
||
|
getting an account through the University was more difficult than the
|
||
|
studies themselves! The procedure was simpler at the NHH Business
|
||
|
School; students automatically got an account. They didn't even have
|
||
|
to ask.
|
||
|
|
||
|
After my account was removed (September 21st, 1995), a number of
|
||
|
concerned individuals spread the news on Usenet groups and other
|
||
|
forums. Those who sent inquiries to the computing department were told
|
||
|
that my objections were "pure nonsense". Mr. Kind and Mr. Hostland
|
||
|
later claimed that this was simply a technical matter, involving the
|
||
|
cleaning up of accounts. Later still, they appealed to rules and
|
||
|
regulations at the University, saying that the account had been set up
|
||
|
improperly.
|
||
|
|
||
|
Their inconsistent and evasive replies to questions about this matter
|
||
|
lead me to only one conclusion: if I had stayed a Jehovah's Witness,
|
||
|
my account would not have been cancelled. I am certain it was removed
|
||
|
because I was critical towards the Watchtower Society, the multi-
|
||
|
billion dollar corporation that uses Jehovah's Witnesses to spread
|
||
|
their gospel.
|
||
|
|
||
|
Most censorship is done without actually breaking any laws. For
|
||
|
example, a newspaper has no legal duty to let all sides of a case be
|
||
|
heard. Yet, if they do not, they practice censorship. This practice
|
||
|
can be dangerous to democracy and freedom of speech, even when it is
|
||
|
technically legal.
|
||
|
|
||
|
The individuals responsible can provide credible excuses for their
|
||
|
actions; they have done nothing illegal. But it is still censorship.
|
||
|
Fortunately, even in cases of "legal" censorship, we all have the
|
||
|
right to protest. Thanks to the global stage of the Internet, I am
|
||
|
able to tell the world: I was taken off the Internet because of my
|
||
|
beliefs.
|
||
|
|
||
|
I believe that what they did is offensive to the Internet community,
|
||
|
where free speech is accorded the highest value. We all know that the
|
||
|
next time, censorship may hit someone who can not obtain another
|
||
|
account.
|
||
|
|
||
|
When you join in the protest directed at these individuals, you
|
||
|
demonstrate that the Internet community cares about censorship. Things
|
||
|
like this may happen again, but perhaps next time, the malicious
|
||
|
system administrator will remember how people rose up in protest, and
|
||
|
decide it isn't worth the trouble.
|
||
|
|
||
|
Mr. Kind is publicly calling me a liar, though it appears that he has
|
||
|
not read a single public statement I have made. He does not cite any
|
||
|
specifics; he simply says I am lying.
|
||
|
|
||
|
Before the protest gathered steam, Mr. Kind supported Mr. Hostland.
|
||
|
Now, however, his replies to protesters (apparently auto-mailed) claim
|
||
|
that my account was illegal from the start. This change of position
|
||
|
indicates that the protest is producing results. But I still do not
|
||
|
have my original account. For justice to be done, I need your support.
|
||
|
|
||
|
My sincerest thanks you to all.
|
||
|
|
||
|
Jan S. Haugland
|
||
|
jansh@telepost.no
|
||
|
|
||
|
<end of statement>
|
||
|
|
||
|
However, the efforts of this cult to silence all dissidence continues
|
||
|
apace. Cult members themselves have been warned in an internal bulletin
|
||
|
this September of the dangers of on-line participation; immediately
|
||
|
following this many loyal cultists dropped out of religion forums on
|
||
|
the major on-line services, web sites were taken off or emptied of
|
||
|
content, and of the two main cult internet mailing lists, one
|
||
|
("friends-chat") was closed down, and the other ("friends-all") began
|
||
|
strict moderation of mail. A classic cult pattern of information control.
|
||
|
|
||
|
Cultists are not, alas, satisfied with self-censorship and a new campaign
|
||
|
has begun to harass postmasters - including the Finnish anon-server
|
||
|
administrator who has been a previous target - and SysOps of on-line
|
||
|
services with the aim of closing down internet accounts of those who dare
|
||
|
to utter a dissident voice in defiance of the supposed God-given authority
|
||
|
of their ruling council in Brooklyn, NY. The postmaster of one of Norway's
|
||
|
independent Internet providers, telepost.no, has resisted the mail-bombing
|
||
|
by cult members in defense of his customers right to free speech - however
|
||
|
there are reports this weekend that ex-cult members on other Internet
|
||
|
service providers may also have had their accounts closed or suspended.
|
||
|
|
||
|
These are independent individuals of limited means and influence, faced
|
||
|
with a multi-billion dollar multinational corporation and millions of
|
||
|
loyal followers taught to shun and hate anyone who dares impede their
|
||
|
business or uncover what they prefer to keep covered-up. Your support is
|
||
|
needed *now* to help protect internet freedoms of speech for *everyone* -
|
||
|
there are many other powerful corporations and governments, ready to
|
||
|
follow up such a trend of repression if the cults are able to do so with
|
||
|
impudence. If the first window is left broken, all the rest will follow.
|
||
|
|
||
|
TowerWatch
|
||
|
|
||
|
-----------------------------------------------------------
|
||
|
"Give me the liberty to know, to utter, and to argue freely according to
|
||
|
conscience, above all liberties" - John Milton
|
||
|
-----------------------------------------------------------
|
||
|
|
||
|
CopyLeft 1995, TowerWatch
|
||
|
<end of press release>
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 18 Sep 1995 14:07:38 -0400 (EDT)
|
||
|
From: John <john@SUG.ORG>
|
||
|
Subject: File 5--COMPUTERS & THE LAW CONFERENCE INFO
|
||
|
|
||
|
SUN USER GROUP
|
||
|
Second Annual Technical Symposium
|
||
|
"Computers & The Law"
|
||
|
November 12-15, 1995
|
||
|
Tampa, FL
|
||
|
|
||
|
As computers are utilized in more and more aspects of everyday life,
|
||
|
the once distinct areas of technology, legislature, and law
|
||
|
enforcement draw closer together. This unique technical conference
|
||
|
provides a forum in which members of these three fields can meet to
|
||
|
share experiences and ideas. The four day technical program (a day of
|
||
|
tutorials, two days of talks, and another day of tutorials) will
|
||
|
provide you with essential knowledge, whether your field is technical,
|
||
|
legal, or law enforcement.
|
||
|
|
||
|
More detailed information of this symposium are available via email at
|
||
|
conference@sug.org or on the World Wide Web at http://sug.org.
|
||
|
|
||
|
If you have further questions, contact the Sun User Group at
|
||
|
(617)232-0514.
|
||
|
|
||
|
|
||
|
+-----------------------------------------------------------------------+
|
||
|
| IMPORTANT DATES TO REMEMBER: |
|
||
|
| Early-bird Savings Deadline: October 13, 1995 |
|
||
|
| Registrations must be received at the Sun User Group offices |
|
||
|
| by October 13, 1995 to be eligible for Early-bird savings |
|
||
|
| |
|
||
|
| Hotel Discount Reservation Deadline: October 21, 1995 |
|
||
|
+-----------------------------------------------------------------------+
|
||
|
|
||
|
|
||
|
CONFERENCE OVERVIEW:
|
||
|
|
||
|
SUNDAY, November 12, 1995 - TUTORIAL PROGRAM
|
||
|
MONDAY, November 13, 1995 - TECHNICAL SESSIONS
|
||
|
TUESDAY, November 14, 1995 - TECHNICAL SESSIONS
|
||
|
WEDNESDAY, November 15, 1995 - TUTORIAL PROGRAM
|
||
|
|
||
|
TUTORIALS:
|
||
|
----------
|
||
|
The SUG Tutorial Program brings experienced training professionals to
|
||
|
you. Courses are presented by skilled teachers who are hands-on
|
||
|
experts in their topic areas. The tutorials will cover a variety of
|
||
|
topics relating to Sun/SPARC and x86-based machines, running any of a
|
||
|
number of operating systems.
|
||
|
|
||
|
Those who attend the tutorials will benefit from this unique
|
||
|
opportunity to develop essential skills in a unique combination of
|
||
|
UNIX system security, ethical, and legal topics.
|
||
|
|
||
|
The tutorial program at Tampa is divided into two days, with both
|
||
|
full- and half-day tutorials offered. Attendees may select any
|
||
|
non-overlapping set of classes. To ensure adequate seating and to
|
||
|
reduce crowding, we are requiring that registrants pre-register for
|
||
|
specific classes. Please note that some prior knowledge is required
|
||
|
for the advanced tutorials.
|
||
|
|
||
|
SUG's tutorial program is always in demand, and some tutorials are
|
||
|
almost guaranteed to sell out before registration closes. Attendance
|
||
|
is limited, and pre-registration is strongly recommended. On-site
|
||
|
registration is possible ONLY if space permits.
|
||
|
|
||
|
Sunday, November 12, 1995 Tutorials
|
||
|
-----------------------------------
|
||
|
|
||
|
S1 - 9:00am-5:00pm
|
||
|
Basics of Unix Security
|
||
|
Peter Galvin, Corporate Technologies, Inc.
|
||
|
|
||
|
S2 - 9:00am-5:00pm
|
||
|
System Administrator Liability
|
||
|
Edward A. Cavazos
|
||
|
|
||
|
Wednesday, November 15, 1995 Tutorials
|
||
|
-----------------------------------
|
||
|
|
||
|
W1 - 9:00am-5:00pm
|
||
|
Firewalls and Internet Security
|
||
|
Rik Farrow, Consultant
|
||
|
|
||
|
W2a - 9:00pm- 12:30pm
|
||
|
Network Intrusions
|
||
|
John Smith, Computer Crime Unit, Santa Clara County District
|
||
|
Attorney's Office
|
||
|
|
||
|
T2b - 1:30pm-5:00pm
|
||
|
Ethics and Systems Administration
|
||
|
S.Lee Henry, Johns Hopkins University
|
||
|
|
||
|
|
||
|
KEYNOTE SPEAKERS:
|
||
|
-----------------
|
||
|
|
||
|
The Sun User Group keynote sessions are topical and informative --
|
||
|
speakers you won't hear at any other conference!
|
||
|
|
||
|
Ken Geide, Chief, FBI Economic Espionage Unit
|
||
|
"Economic Espionage in the USA"
|
||
|
Monday, November 13, 9 a.m. - 10:30 a.m.
|
||
|
|
||
|
Mike Godwin, Staff Counsel, The Electronic Frontier Foundation
|
||
|
Tuesday, November 14, 9 a.m. - 10:30 a.m.
|
||
|
|
||
|
Randal L. Schwartz, Stonhenge Consulting Services
|
||
|
"Just another convicted Perl hacker"
|
||
|
Tuesday, Nov 14, 4:30 p.m. - 5:30 p.m.
|
||
|
|
||
|
|
||
|
TECHNICAL SESSIONS (Monday, November 13 & Tuesday, November 14):
|
||
|
-------------------------------------------------------------------
|
||
|
|
||
|
"Computers & The Law" features three distinct parallel tracks of talks:
|
||
|
Technical; Legal; and Law Enforcement.
|
||
|
|
||
|
The TECHNICAL track will focus on nuts and bolts of
|
||
|
maintaining a UNIX or Sun system. These talks will cover the
|
||
|
all of the newest developments in the changing world
|
||
|
of technology. There are talks from the experts on: UNIX and
|
||
|
network security; encryption; software distribution in a
|
||
|
client/server environment; firewalls.
|
||
|
|
||
|
The LEGAL track will cover up-to-date issues of privacy and
|
||
|
morality, as well as in-depth examinations of the current and
|
||
|
changing laws pertaining to software and hardware. Legal
|
||
|
professionals from all over the country will examine how
|
||
|
changing technologies will necessitate changes in the law.
|
||
|
|
||
|
The LAW ENFORCEMENT track discusses computers as tools. Tools
|
||
|
which can help in the prevention of crimes -- or in the
|
||
|
commission of them. Join or experts in high-tech crime as the
|
||
|
discuss the discovery, investigation, apprehension, and
|
||
|
prosecution of crackers, software pirates, and bandits on the
|
||
|
information on the information superhighway.
|
||
|
|
||
|
SPECIAL FEATURES:
|
||
|
|
||
|
"The Future of Computer Crime, A Panel"
|
||
|
|
||
|
"Unix Security Tools Workshop"
|
||
|
Peter Galvin, Corporate Technologies, Inc.
|
||
|
|
||
|
The Great Debate: Round 2
|
||
|
"Can Existing Laws Be Applied To Cyberspace?"
|
||
|
|
||
|
|
||
|
RECEPTION Sponsored by our friends at SunExpress!
|
||
|
---------
|
||
|
You are invited to join in the fun, mingle with old and new friends,
|
||
|
and enjoy the plentiful hors d'oeuvres and beverages. The Sun User
|
||
|
Group Reception is Monday, November 13, from 6:00-8:00pm at the
|
||
|
Conference hotel. The Reception is included in the technical sessions
|
||
|
registration fee. Additional Reception tickets may be purchased for a
|
||
|
nominal fee at the conference.
|
||
|
|
||
|
|
||
|
THE SUN USER GROUP
|
||
|
------------------
|
||
|
The Sun User Group (SUG) brings people together to share information
|
||
|
and ideas about using Sun/SPARC equipment. You can discover new ways
|
||
|
to save time and money in the pages of _Readme_. You can get quick
|
||
|
answers to important questions on our electronic mailing list. At our
|
||
|
seminars you can learn more about the capabilities of your
|
||
|
workstation. At our conferences, you can meet other people who are
|
||
|
doing progressive and innovative work with their Sun/SPARC equipment.
|
||
|
|
||
|
Now is a better time than ever to join the Sun User Group. We're
|
||
|
reorganized, reinvented and growing every day. We've recently
|
||
|
introduced exciting new services specifically for our official LUGs.
|
||
|
Our members-only electronic mailing list has become one of the most
|
||
|
popular routes on the information highway. Our annual conferences
|
||
|
feature respected teachers - from Sun Microsystems as well as many
|
||
|
other areas of the industry.
|
||
|
|
||
|
REGISTRATION INFORMATION AND FEES
|
||
|
---------------------------------
|
||
|
|
||
|
CONTACT SUG AT office@sug.org FOR A REGISTRATION FORM TODAY!!!
|
||
|
|
||
|
+-------------------------------------------------------------------+
|
||
|
| Sun User Group members save $50.00! |
|
||
|
+-------------------------------------------------------------------+
|
||
|
+-------------------------------------------------------------------+
|
||
|
| Earlybird Bonus! Register before October 13, 1995 and |
|
||
|
| save $100.00 *plus* get the Sun User Group "Security" |
|
||
|
| CD-ROM for FREE -- a $195 savings if you register by |
|
||
|
| October 13, 1995! |
|
||
|
+-------------------------------------------------------------------+
|
||
|
|
||
|
|
||
|
More detailed information of this symposium are available via email at
|
||
|
conference@sug.org or on the World Wide Web at http://sug.org.
|
||
|
|
||
|
If you have further questions, contact the Sun User Group at
|
||
|
(617)232-0514.
|
||
|
|
||
|
For more information please call (617) 232-0514.
|
||
|
|
||
|
SUG Symposium
|
||
|
1330 Beacon Street, Suite 344
|
||
|
Brookline, MA 02146
|
||
|
USA
|
||
|
|
||
|
Email: registration@sug.org Fax: (617) 232-1347
|
||
|
|
||
|
You may also register over the telephone with a Master Card or Visa.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.02
|
||
|
************************************
|
||
|
|