911 lines
47 KiB
Plaintext
911 lines
47 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.05 (February 9, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest. Back
|
|||
|
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (temporarily down); (2)
|
|||
|
cudarch@chsun1.uchicago.edu E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles relating to
|
|||
|
the Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Arrest of Phiber Optik
|
|||
|
File 4: The Dictator: My thoughts
|
|||
|
File 5: Chaos Computer Club Congress
|
|||
|
File 6: The Feds (In this case the FCC) hits Ham Packet BBS Ops.
|
|||
|
File 7: FCC Citation of Packet BBSs for Store-and-Forward Msg
|
|||
|
File 8: Book Review--Exporting the First Amendment
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05, File 1 of 8: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: February 7, 1991
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1. RETALIATION IS NOT THE ANSWER
|
|||
|
2. CONFERENCE ON COMPUTER INVESTIGATION CONFERENCE
|
|||
|
++++++++++
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
Retaliation is *not* the Answer
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
We've heard "rumors" about plans for retaliation against informants and
|
|||
|
others who have added to the victim list of law enforcement zealousness. We
|
|||
|
have been, and continue to be, unequivocal in our opposition to such
|
|||
|
behavior! Informants are a symptom of the problem and not its cause.
|
|||
|
Victims are created by abuse of power, by ignorance of agents, by
|
|||
|
inadequate Constitutional protections in a time of rapidly changing
|
|||
|
technology, and by a cultural mentality that sees witches to be hunted in
|
|||
|
anything mysterious. We are not required to like paid informants,
|
|||
|
especially when they appear responsible for creating victims rather than
|
|||
|
protecting society. Sometimes, in serious cases, they are necessary, but
|
|||
|
should be used with caution. But, they should be used with caution.
|
|||
|
Informants, by definition, betray, and the ethical issue for law
|
|||
|
enforcement is one of maintaining a balance between necessity and unethical
|
|||
|
practice. It is this balance that seems to be out of kilter in the RIPCO
|
|||
|
informant incident, and we view the problem as one of restoring the balance
|
|||
|
AND NOT retaliating against the paid informant. Informants must live with
|
|||
|
their conscience and with the stigma they earn. From all accounts, law
|
|||
|
enforcement agents respect informants as little as the rest of us; they
|
|||
|
only find them useful. So, there is little need to retaliate: Loss of
|
|||
|
status and the corresponding condemnation is sufficient response. An
|
|||
|
anonymous poster shares similar thoughts in file #4, below.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
Conference on Computer Investigation Conference
|
|||
|
+++++++++++
|
|||
|
|
|||
|
The Criminal Justice Statistics Association will be holding a conference on
|
|||
|
INVESTIGATION COMPUTER CRIME (March 18-20) in Washington D.C. The blurb
|
|||
|
reads:
|
|||
|
Audience: Law enforcement and prosecutorial personnel assigned to the
|
|||
|
computer crimes cases
|
|||
|
|
|||
|
Objectives: To train personnel in the technical and legal aspects
|
|||
|
of computer crimes. Covers issues such as computer crime methods
|
|||
|
and detection, crime scene search procedures and computer evidence
|
|||
|
preservation, the application of existing laws, interaction with
|
|||
|
techincal experts, and prevention education.
|
|||
|
|
|||
|
A registration fee is $100 per class day and classes will be held in the
|
|||
|
Computer Center's facility at 555 New Jersey Avenue, NW, Suite 860,
|
|||
|
Washington DC. For more information, contact person is:
|
|||
|
Jim Zepp, Director
|
|||
|
NCJS (Suite 860)
|
|||
|
555 New Jersey Avenue, NW
|
|||
|
Washington, DC 20001 (202-638-4155)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
res;res on aca101;ct; uf file; ch'3.03' to'3.05';res
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: 9 Feb, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 2 of 8: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Subject: CuDs available in New Zealand
|
|||
|
From: patrick@SIDEWAYS.GEN.NZ(Pat Cain)
|
|||
|
Date: Sat, 02 Feb 91 01:53:55 NZD
|
|||
|
|
|||
|
I run a bbs in New Zealand and archive CuD -- all the issues of CuD are
|
|||
|
here. Plus miscellaneous other telecoms related files. If you get any
|
|||
|
inquiries from New Zealand people then perhaps you could direct them here?
|
|||
|
|
|||
|
e-mail: patrick@sideways.gen.nz
|
|||
|
bbs phone: +64 4 661231 (v21/v22/v22bis)
|
|||
|
(no fees, charges or donations reqd.)
|
|||
|
CuDs are located in: /public/telecoms/cud
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: BIFF@PHOENIX.COM(Biff)
|
|||
|
Subject: CuD #3.04, File 3 of 4: The Politics of the ECPA of 1986
|
|||
|
Date: Wed, 30 Jan 91 20:11:11 EST
|
|||
|
|
|||
|
Reprint from BMUG (Berkeley MacIntosh Users' Group) writes:
|
|||
|
|
|||
|
->A more
|
|||
|
->emotional defense was made by John Stanton, Executive VP of McCaw
|
|||
|
->Communications, who stated "The inhibition of the growth of cellular
|
|||
|
->technology and paging technology, forced by the lack of privacy, is
|
|||
|
->unfair."
|
|||
|
|
|||
|
The commercial use of the public airwaves by cellular communications
|
|||
|
providers is unfair. The transmission of their signals through my body
|
|||
|
without my permission is unfair. Life is not fair, Mr. Stanton. There is no
|
|||
|
Constitutional guarantee of fairness, especially for corporations over
|
|||
|
citizens.
|
|||
|
|
|||
|
->For example, John
|
|||
|
->Stanton of McCaw testified that "Encryption devices make it difficult to
|
|||
|
->roam from system to system," generated scratchy sound, and required 30%
|
|||
|
->more investment for the base unit, and 100% for the phone. Mr. Colgan's
|
|||
|
->estimated high grade commercial encryption as costing $40 for the
|
|||
|
->encryption chip (quantity one), plus associated circuitry . In either
|
|||
|
->case, the net cost for several million subscribers was estimated in the
|
|||
|
->tens if not hundreds of millions of dollars.
|
|||
|
|
|||
|
Before anyone starts to feel sorry for the cost involved for the cellular
|
|||
|
folks to add encryption to the phones, consider the following facts:
|
|||
|
|
|||
|
1. The cellular industry is already switching to digital mode
|
|||
|
because they are running out of room. This digital mode is
|
|||
|
encrypted (to the casual listener) and privacy of the cellular
|
|||
|
user is protected.
|
|||
|
|
|||
|
2. The cost of the parts to add encryption to a cellular phone is
|
|||
|
hardly 100% of the cost of the phone. The estimates from
|
|||
|
non-cellular, and thus less opposed to adding the encryption
|
|||
|
devices, spokespeople are that encryption would add $5 to the
|
|||
|
cost.
|
|||
|
|
|||
|
3. There is no need for "high grade" encryption. Cellular users
|
|||
|
need no more than simple encryption, since the only people ANY
|
|||
|
encryption will stop are the casual listeners. A serious privacy
|
|||
|
invader will tap into the trunks leading out of the cellular
|
|||
|
switch and bypass all the nonsense.
|
|||
|
|
|||
|
4. Only poorly designed encryption systems would make it harder
|
|||
|
to roam. If the cellular industry can't design their systems
|
|||
|
properly, why should the rest of us be held to account for it?
|
|||
|
|
|||
|
5. There are already several encryption systems in use by law
|
|||
|
enforcement agencies, and one of those could easily be used by
|
|||
|
cellular providers. The technology is not new.
|
|||
|
|
|||
|
6. Anyone who wants you to believe that cellular manufacturers
|
|||
|
buy ANYTHING at single quantity prices is prevaricating through
|
|||
|
their orthodonture.
|
|||
|
|
|||
|
7. Scratchy sound for some is better than denying to ALL the
|
|||
|
rights to receive signals transmitted on the public airwaves.
|
|||
|
|
|||
|
->John Stanton of McCaw commented that if the U.S.
|
|||
|
->passed the ECPA, then it would enjoy superior communications privacy to
|
|||
|
->that available in Europe.
|
|||
|
|
|||
|
This was, and probably still is, the view of the cellular industry.
|
|||
|
They feel that legislation guarantees privacy, and they are more than
|
|||
|
happy to tell cellular users that their calls are completely private.
|
|||
|
Instead of spending the money to MAKE the calls private, they spend the
|
|||
|
money to make listening illegal.
|
|||
|
|
|||
|
->This last point deserves elaboration. Under ECPA, monitoring of cordless
|
|||
|
->phone frequencies is not prohibited, although it is hard to argue that the
|
|||
|
->average individual's "expectation of privacy" is any different for a
|
|||
|
->cordless phone than it would be for a cellular phone.
|
|||
|
|
|||
|
Arguing that any prudent human would believe that cordless
|
|||
|
communications were private is beyond imagination. But even cordless
|
|||
|
phone manufacturers are playing the game by adding "security codes",
|
|||
|
which don't stop anyone from listening, just from dialing your phone.
|
|||
|
|
|||
|
->In contrast to the detailed arguments submitted by the parties discussed
|
|||
|
->above, the one page letter submitted by The Source had a minor impact at
|
|||
|
->best, suggesting that the ECPA, by not preempting state statutes, could
|
|||
|
->expose the online service industry to an entangling web of federal and
|
|||
|
->state statutes.
|
|||
|
|
|||
|
The tangle has started. California has, according to reports I have
|
|||
|
seen, enacted a law prohibiting the reception of cordless phones and
|
|||
|
baby monitors. They have preempted the FCC and the US Congress in this
|
|||
|
matter. The IRS has ruled that IRS agents may monitor cordless phone
|
|||
|
conversations to gather evidence of wrongdoing. A judge in an eastern
|
|||
|
state has ruled the use of a scanner to monitor cordless phones and
|
|||
|
identify drug dealers, by the local sheriff's department, is legal.
|
|||
|
|
|||
|
Sigh... Life is not fair, D00D.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Newsbytes (Barbara and John McMullen)
|
|||
|
Subject: Arrest of Phiber Optik
|
|||
|
Date: February 8, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 3 of 8: Arrest of Phiber Optik ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
NEW YORK STATE POLICE ARREST "PHIBER OPTIK" 2/8/91
|
|||
|
EAST FARMINGDALE, NEW YORK, U.S.A., 1991 FEB 8(NB) --
|
|||
|
CORRECTION: The February 7th Newsbytes piece on this story said that the
|
|||
|
alleged illegal activity committed by 18 year-old Mark Abene, "Phiber
|
|||
|
Optic" took place on JULY 9, 1990. The date of the alleged incident was
|
|||
|
actually JANUARY 9th, 1990.
|
|||
|
|
|||
|
The corrected story follows:
|
|||
|
Major Timothy Rabbett of the New York State Police has announced the arrest
|
|||
|
of Mark Abene, 18, of Queens, NY for allegedly tampering with a New York
|
|||
|
Telephone Computer Computer to provide free access for Abene and unnamed
|
|||
|
others to have unbilled access to a "900" telephone.
|
|||
|
|
|||
|
The arrest, which was made by New York State Police Officers and a member
|
|||
|
of the United States Secret Service, came after a year's investigation by
|
|||
|
those two agencies. Abene, who is also known by the computer handle "Phiber
|
|||
|
Optik", is charged with felony counts of Computer Tampering, First Degree
|
|||
|
and Computer Trespass and a misdemeanor charge of theft of services. New
|
|||
|
York State Senior Investigator Donald Delaney told Newsbytes that each of
|
|||
|
the felony charges carries maximum sentences of from 1 to 4 years in
|
|||
|
prison.
|
|||
|
|
|||
|
The charges allege that Abene, on January 9th, 1990, obtained access to a
|
|||
|
New York Telephone Company computer through the use of a stolen credit card
|
|||
|
number and, having gained access, activated an unassigned telephone number.
|
|||
|
According to the charges, he then arranged "call-forwarding" from the
|
|||
|
unassigned number to a "900" number, a procedure that allegedly allowed
|
|||
|
Abene and others to make free calls through the unassigned number to the
|
|||
|
"900" number.
|
|||
|
|
|||
|
Search warrants relating to this investigation were executed on Abene and
|
|||
|
two others, known as "Acid Phreak" and "Scorpion", on January 24th, 1990
|
|||
|
and computer equipment, diskettes, notebooks and other materials were taken
|
|||
|
into custody at that time. The arrest of Abene was said to have been the
|
|||
|
result of the year-long study of these materials in conjunction with
|
|||
|
materials received from various telephone companies.
|
|||
|
|
|||
|
Newsbytes has learned that the other subjects of the search warrants and
|
|||
|
investigations will be charged under Federal statutes for allegations
|
|||
|
relating to the investigation. Abene, had he been charged under federal
|
|||
|
statues, would have been considered a minor at the time of the alleged
|
|||
|
acts; under New York state regulation, he is classified as an adult and is
|
|||
|
being charged as such.
|
|||
|
|
|||
|
While Abene, on the advice of attorney, was not available for comment, Mrs.
|
|||
|
Gloria Abene, his mother, told Newsbytes that her son was "taken away with
|
|||
|
handcuffs on". Delaney told Newsbytes that this is standard procedure
|
|||
|
because "You cannot bring an un-handcuffed prisoner into a New York City
|
|||
|
police precinct for booking." Abene was taken into custody at 10:10 AM on
|
|||
|
February 5th and taken to the Queens County Detention Center where he was
|
|||
|
held until 11:30 PM on the same evening when he was released under his own
|
|||
|
recognizance.
|
|||
|
|
|||
|
Delaney commented on the arrest to Newsbytes, saying "I hope that by
|
|||
|
arresting the people that have been committing these crimes and publicizing
|
|||
|
their arrests, we reduce the occurrence of these activities. There has
|
|||
|
been a recent reduction in computer crime and I think that it is due, in
|
|||
|
part, to the publicity that has surrounded similar arrests.
|
|||
|
|
|||
|
(Barbara E. McMullen & John F. McMullen/19910207)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Anonymous (from Ripco BBS)
|
|||
|
Subject: The Dictator: My thoughts
|
|||
|
Date: 02/08/91
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 4 of 8: The Dictator--My Thoughts ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Well, since others have put up what they thought about the Dictator, I may
|
|||
|
as well add mine.
|
|||
|
|
|||
|
I am not so mad at The Dictator (I'm not really mad at all 'cuz I don't
|
|||
|
know him, I don't hack systems/phreak, and I haven't seen black-and-white
|
|||
|
proof) as I am at the intrusion into the underground.
|
|||
|
|
|||
|
It was one thing to bust hacks, phreaks, carders, etc. You play, you pay.
|
|||
|
Every hack/phreak/'rate knows and accepts that. The problem I have is that
|
|||
|
we were violated. Face it, we were raped. An outsider came in, got into
|
|||
|
some exclusive boards (and some non-exclusive ones, too, that were busted
|
|||
|
for no reason), made people trust him, and fucked them.
|
|||
|
|
|||
|
We should be mad at ourselves. The guy went to SummerCon unnoticed! They
|
|||
|
videotaped shit, he called boards, etc. How could people who can bring
|
|||
|
networks down to their knees be duped by someone who probably thinks DTMF
|
|||
|
is "Dumb Tight Mother Fucker"?
|
|||
|
|
|||
|
Social Engineering.
|
|||
|
|
|||
|
Sound familiar? The guy hacked his way into the underground! What irony!
|
|||
|
This gives the story a little twist! WE got socially engineered for once.
|
|||
|
This is a "shoe is on the other foot" type scenario. He made a quality
|
|||
|
hack! He probably thought he was doing the cool 007 James Bond deal when
|
|||
|
he did whatever he did or didn't do. You know, infiltrating the enemy,
|
|||
|
behind the lines, all that stuff.
|
|||
|
|
|||
|
At any rate, instead of blowing the guy up (he still might be innocent, you
|
|||
|
know), I think we should use hacker ethics to deal with this situation.
|
|||
|
|
|||
|
You ask, what are hacker ethics in this situation? 1) A quality hack
|
|||
|
should not be punished. 2) A hack can show leaks in security, and is
|
|||
|
therefore beneficial in some respects.
|
|||
|
|
|||
|
He did make a quality hack whether we want to admit it or not. It was
|
|||
|
immoral and everything, but it was a quality hack. Like when someone
|
|||
|
breaks into a system and grabs stuff, he doesn't feel he should be busted.
|
|||
|
Well, fair is fair. Let the courts bust him and whoever for illegal
|
|||
|
procedure or whatever. That's their place, not ours. He has shown leaks
|
|||
|
in security. What security? you ask. Exactly. There is no security.
|
|||
|
Security CAN be implemented. It doesn't have to be elitist, either.
|
|||
|
|
|||
|
At any rate, IF (and it's a big if) The Dictator or anyone else did
|
|||
|
infiltrate the underground, wouldn't it be better to fix the holes than
|
|||
|
retaliate against some stooge?
|
|||
|
|
|||
|
I don't blame The Dictator, or even the guys who are giving their kids a
|
|||
|
nice new Mac courtesy of Doc Ripco (tho he might). Personally I only hold
|
|||
|
the "brains" of the operation responsible like Gail (got a job yet?)
|
|||
|
Thackeray. Nice career move. Too bad it blew up like the Hindenburg.
|
|||
|
|
|||
|
At was the people who instigated the investigation who should be blamed.
|
|||
|
And us for being such idiots. The Dictator was a mere cog in the machine.
|
|||
|
Let the guy live with whatever conscience he has. Some day he will
|
|||
|
realize that the SS used him and threw him away like a soiled condom. He
|
|||
|
got used like he used us. What is the SS doing for him now? Probably
|
|||
|
nothing. He's probably sitting at home, sweating, and shitting in his
|
|||
|
pants everytime he starts his car. Isn't that punishment enough?
|
|||
|
|
|||
|
If the SS wants to play CIA, and it can get buffoons to play 007, then it
|
|||
|
will be sorry in the end. I think they should stick to counterfeiters
|
|||
|
instead. The FBI probably would have done a better job at busting the real
|
|||
|
criminals and leaving the amatures alone. The REAL feds, the FBI dudes,
|
|||
|
are probably laughing at this whole thing.
|
|||
|
|
|||
|
The CIA probably knows more about us than anyone, but they're smart. They
|
|||
|
stick to their business rather than trying to get the glory.
|
|||
|
|
|||
|
That's my opinion.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Bill Fischer <wmf%chinet.chi.il.us@GATECH.BITNET>
|
|||
|
Subject: Chaos Computer Club Congress
|
|||
|
Date: Mon, 28 Jan 91 10:00:13 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 5 of 8: Chaos Computer Conference (Reprint) ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
%Reprinted with permission from: Risks Digest, 10.80%
|
|||
|
=============================================================================
|
|||
|
|
|||
|
-Date: 24 Jan 91 14:19 GMT+0100
|
|||
|
-From: Klaus Brunnstein <brunnstein@rz.informatik.uni-hamburg.dbp.de>
|
|||
|
-Subject: 7th Chaos Computer Congress, Hamburg, 27-29 Dec 1990
|
|||
|
|
|||
|
In its 7th year, the annual conference of Chaos Computer Club was held in
|
|||
|
Hamburg (Germany) in the last week of December. A broad spectrum of themes was
|
|||
|
offered, dominated by networking, but also covering legal aspects, ecological
|
|||
|
computing, freedom of information, female computer handling, psychology of
|
|||
|
hackers and others. Among the more than 300 participants, only few people from
|
|||
|
European countries (Netherland, Italy) and USA participated. The Congress
|
|||
|
newspaper (covering reports about most sessions, available as *.DOC or *.TXT
|
|||
|
files, see below) is only in German. Though the printed (DTP-ed) version of it
|
|||
|
looks more professionally, some essential discussions (e.g. female computer
|
|||
|
handling, computer viruses, the new German Information Security Agency, GISA)
|
|||
|
are missing; quality and readability of articles is rather mixed. As there
|
|||
|
were only few spectacular themes (phreaking, copying bank cards), public
|
|||
|
interest and coverage in newsmedia, as compared to CCC'89 (the year, when the
|
|||
|
KGB hack was published) was moderate.
|
|||
|
|
|||
|
Among the spectacular themes, a group HACK-TIC from Netherland demonstrated a
|
|||
|
machine (about 1,500$) to copy credit and Eurocheque cards (EC); according to
|
|||
|
Wau Holland (co-founder of CCC), this was arranged "to demonstrate the
|
|||
|
insecurity of these plastique cards". While the speaker of Hamburg's saving
|
|||
|
bank (HASPA, which was the victim of CCC's famous "Btx/HASPA-attack") said that
|
|||
|
this is impossible, a journalist of BILD (a German boulevard newspaper)
|
|||
|
received a printout of his account with a copy of his card, but when trying to
|
|||
|
order money from a teller machine, his card was collected.
|
|||
|
|
|||
|
The most spectacular event was a workshop on (phone) "Phreaking". Experiences
|
|||
|
and methods how "to call as far as possible with as many phreaks as possible at
|
|||
|
lowest possible price" were described in some detail (few of which were
|
|||
|
written). Tricks with German PTT's 130-number (and connection to US' 700/800
|
|||
|
numbers) as well as with the (PTT-internal) test number 1177 to establish
|
|||
|
low-cost (at least for the phreaks) teleconferences and voice mailboxes were
|
|||
|
discussed. It is surprising to hear from a US phreak that the old tricks (2,600
|
|||
|
MHz, red boxes to simulate the coins' click) even work today; some new
|
|||
|
experiences esp. tricks with Calling Cards (due to missing expiration date on
|
|||
|
some cards or delayed update of MCI databank) were added to "help fight the
|
|||
|
excessive telephone costs". Dutch phreaks informed about "use" of 008-numbers;
|
|||
|
a hotel reservation service at a large airport does not check the validity of
|
|||
|
credit cards (file: PHREAK.DOC). The workshop was not concerned with legal
|
|||
|
aspects of Phreaking.
|
|||
|
|
|||
|
Several sessions were devoted to networking. Chaos Computer Club runs a
|
|||
|
network ("Zerberus") with gateways to international networks and a growing
|
|||
|
number of regional mailbox systems. Despite mixed (or even bad) experiences
|
|||
|
with new mailbox systems and gateways (the gateway group emailed invitation to
|
|||
|
this workshop; 50% of the invitations came back, essentially with "error-mail";
|
|||
|
file NETWCHAoS.DOC), several sessions were devoted to introductions into
|
|||
|
networking (file WSI-NET.DOC covering a detailed INTERNET survey; several files
|
|||
|
on GATOR, a GATEway ORientation guide to regional and international
|
|||
|
communication and gateways). A special report was devoted to communication of
|
|||
|
graphic and sound data, where special standards, command languages and software
|
|||
|
are under development (file SCF.DOC). Special discussions were devoted to
|
|||
|
applications of mailboxes for ecological purposes (file UMWE-DFU.DOC) and as
|
|||
|
infrastructure for publications (file Med-DFU.DOC), as well as to aspects of
|
|||
|
(German) publication laws (file PRESRECH.DOC).
|
|||
|
|
|||
|
One session was devoted to CCCs idea to aid the former GDR (now "5 new federal
|
|||
|
countries") in establishing a citizen computer network "DDRNET". Despite of
|
|||
|
significant aid by computer dealers (who spontaneously donated PCs, software
|
|||
|
and modems in significant numbers) and despite of the interest of local groups
|
|||
|
and parties (New Forum, essential force in the East-German revolution), tax and
|
|||
|
organization problems finally stopped the project when German reunification
|
|||
|
happened. The document (file: DDRNET.DOC) gives a lively example of good ideas
|
|||
|
and plans being killed by hostile bureaucracy.
|
|||
|
|
|||
|
Following earlier CCC' discussions on sociological aspects of hacking, a
|
|||
|
student (Tommy) described his examination thesis (diplom work) relating
|
|||
|
Psychology and Computing (file PSYCHO.DOC, thesis in compacted form: PSYCH.LZH
|
|||
|
in 109kBytes). According to Tommy, hackers exhibit their self-consciousness as
|
|||
|
an elite by their techno-speak. "Ordinary" people of same age with no
|
|||
|
understanding of computing are rather suspicious about hackers, even more as
|
|||
|
computers appear as threats to their civil rithts and working places. In such
|
|||
|
controversies, hackers seems to flee reality, mostly unconsciously, and they
|
|||
|
live in simulated worlds such as Cyberspace ("not as dangerous as other
|
|||
|
drugs"). Anonymous or technically depersonalized communication (e.g.
|
|||
|
mailboxes) lowers the threshold of moral scruples, resulting in communication
|
|||
|
garbage and flames. Btw: as in previous years, a special workshop on Cyberspace
|
|||
|
demonstrated EEG-coupled graphical devices and software (file: CYBER.DOC); the
|
|||
|
sub-culture (as initiated by Gibson's book "Neuromancer") developing around
|
|||
|
this techno-drug has it's first European magazines (Decoder, Cyberpunk).
|
|||
|
|
|||
|
A special discussion developed on computer "viruses". Two speakers working
|
|||
|
with Ralph Burger (author of the "Big Book of Computer Viruses", also
|
|||
|
publishing virus code in German, English and Russian) described his work to
|
|||
|
classify new viruses and to establish a databank of virus code. In their
|
|||
|
classification, the group starts with a specific model of virus mechanisms
|
|||
|
including self-encryption; this model is in some contradiction with other
|
|||
|
classification (e.g. as a virus in their model must always have an effect,
|
|||
|
parent viruses like DO NOTHING having no effect would not be a virus while
|
|||
|
their descendants are), and stealth mechanisms other than encryption are
|
|||
|
not foreseen. The speakers argued that information on virus details should
|
|||
|
be easily accessible to all relevant parties.
|
|||
|
|
|||
|
A controversial discussion arose when the author of this report informed about
|
|||
|
the establishment of CARO (=Computer Antivirus Research Organisation, cofounded
|
|||
|
by V.Bonchev/Sofia, Ch.Fischer/Karlsruhe, F.Skulason/Rejkjavik, A.Solomon/UK,
|
|||
|
M.Swimmer/Hamburg, M.Weiner/Vienna and the author) to establish a database with
|
|||
|
virus specimen and procedures to quickly analyse new viruses and distribute the
|
|||
|
disassemblies for verification and antivirus development. As the number of
|
|||
|
viruses grows significantly (more than 400 MsDos viruses known, plus new
|
|||
|
developments visible in Soviet Union, Hungary etc) with advanced stealth
|
|||
|
methods and more sophisticated damage, restrictions in the access to such virus
|
|||
|
specimen based on concepts of "trusted persons" and "need to know" are
|
|||
|
presently discussed (also controversially). In contrast to such concepts,
|
|||
|
CCC'90 participants and the speakers expressed their view that such virus
|
|||
|
specimen should be accessible to any interested party.
|
|||
|
|
|||
|
Summary: apart from the session on phone phreaking, Chaos Computer Club visibly
|
|||
|
demonstrated its distance to criminal activities which dominated the last
|
|||
|
conferences (e.g. KGB hack). In discussing themes of technical and related
|
|||
|
interests, they return to the list of items which were described in their
|
|||
|
foundation document (file THESEN.TXT, October 1981). Themes related to civil
|
|||
|
rights (e.g. "Freedom of Information") are visibly of more interest than
|
|||
|
classical hacking techniques. As CCC did not discuss any consequences of the
|
|||
|
KGB case (after the trial in March 1990) for its members or related persons,
|
|||
|
CCC omitted the opportunity to prepare for it's role in future hacks in it's
|
|||
|
environment. While their annual conference was less chaotically organized than
|
|||
|
last year, it's structure and future developments remain as the name indicates:
|
|||
|
chaotic and computer-minded, yet with a sense for new ideas and applications.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM>
|
|||
|
Subject: The Feds (In this case the FCC) hits Ham Packet BBS Ops.
|
|||
|
Date: Thu, 31 Jan 91 08:55:45 PST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 6 of 8: The Feds hit Ham Packet BBS Ops. ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
-Newsgroups: rec.ham-radio
|
|||
|
Subject: FCC Citation of Packet BBSs for Store-and-Forward Msg
|
|||
|
|
|||
|
FCC CENSORS/CENSURES PACKET RADIO
|
|||
|
Tom Clark, W3IWI
|
|||
|
January 30, 1991
|
|||
|
|
|||
|
Today a number of packet BBSs on the east coast received citations from the
|
|||
|
FCC's Norfolk (actually Virginia Beach) Field Office which may well spell
|
|||
|
the end to much of amateur packet radio. According to Jim, WA4ONG the
|
|||
|
following packet BBSs (and perhaps others) are involved: N3LA, WA3TSW,
|
|||
|
KA3CNT, KA3T, WA3ZNW, W3IWI, WA4ONG, WB0TAX and N4HOG [my copy of the
|
|||
|
citation has not yet arrived in the mail -- the details in this message are
|
|||
|
taken from a copy WA4ONG faxed to me].
|
|||
|
|
|||
|
The letter dated January 25th from Mr. J. J. Freeman, Engineer in Charge at
|
|||
|
the Norfolk Office, to WA4ONG states:
|
|||
|
|
|||
|
"I have received a report that indicates you may have operated your amateur
|
|||
|
radio station, call sign WA4ONG, in violation of Section 97.113(a) of the
|
|||
|
Commission's Rules. It appears that you used the Ama-teur Radio Service to
|
|||
|
facilitate the business activity of THE COALITION TO STOP U.SD.
|
|||
|
INTERVENTION IN THE MIDDLE EAST."
|
|||
|
|
|||
|
"Specifically, on or about January 5, 1991 you received a packet radio
|
|||
|
message originated by amateur radio station WA3QNS. You then transmitted
|
|||
|
this packet radio message to another amateur radio station. The message
|
|||
|
was:
|
|||
|
|
|||
|
% Here appears a copy of the message sent by WA3QNS@N3LA.PA originat-ed
|
|||
|
at 22:22z on Jan.5 with the BID #21035_N3LA, Subject: Call This Number
|
|||
|
ASAP. The message listed the business telephones and fax numbers for
|
|||
|
"The Coalition" as well as a 1-900-xxx-xxxx number to call to
|
|||
|
"register your voice" I won't repeat the bulletin here, because
|
|||
|
repeating the bulletin would make it illegal to send this message! %
|
|||
|
(Continued in Part 2)
|
|||
|
/EX
|
|||
|
|
|||
|
SB URGENT@USA < W3IWI $38141_W3IWI
|
|||
|
FCC CITES BBSs FOR @USA MSG (Part 2/4)
|
|||
|
R:910131/0445z 38141@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]
|
|||
|
|
|||
|
FCC CENSORS/CENSURES PACKET RADIO cont'd
|
|||
|
|
|||
|
"This activity was a facilitation of the business affairs of the Coali-tion
|
|||
|
to Stop U.S. Intervention in the Middle East and therefor %sic% in
|
|||
|
violation of Section 97.113(a)."
|
|||
|
|
|||
|
The FCC citation then contains the boilerplate demanding a response within
|
|||
|
10 days explaining circumstances and correct actions, and then closing with
|
|||
|
a chilling "to determine what, if any, enforcement action is required to
|
|||
|
insure current and future rule compliance" and a state-ment that future
|
|||
|
transgressions will bring fines and/or license revoca-tion.
|
|||
|
|
|||
|
That's the facts. I'll now discuss some of the implications and recommended
|
|||
|
actions.
|
|||
|
|
|||
|
THE IMPLICATIONS
|
|||
|
|
|||
|
The implications of the action by the FCC's Norfolk Field Office are
|
|||
|
absolutely appalling. What is implied is that each and every station in a
|
|||
|
store-and-forward network is responsible for the actual message CONTENT
|
|||
|
passing through each node. The BBSs were cited because their calls were in
|
|||
|
the message header "audit trail". The FCC's action states that each BBS
|
|||
|
SYSOP is personally responsible for the "correctness" of all messages
|
|||
|
merely passing through his system. Here, the W3IWI mail switch handles
|
|||
|
about 10,000 messages per month automatically. There is NO WAY that I can
|
|||
|
vouch for every bit that passes through!
|
|||
|
|
|||
|
If the FCC had instead gleaned its information from on-the-air monitor-ing,
|
|||
|
then all the THENET/NETROM/ROSE/TCPIP/DIGIPEATER switches handling the
|
|||
|
message would have been equally culpable! The implication of the FCC action
|
|||
|
is that a node control operator must read all information and be prepared
|
|||
|
to shut the system down at the first hint of an "inappropriate" message.
|
|||
|
It's hard enough to watch the information passing on 1200 BPS links --
|
|||
|
imagine the impossibility of "censoring" 56 kBPS or faster channels.
|
|||
|
(Continued in Part 3)
|
|||
|
/EX
|
|||
|
|
|||
|
SB URGENT@USA < W3IWI $38142_W3IWI
|
|||
|
FCC CITES BBSs FOR @USA MSG (Part 3/4)
|
|||
|
R:910131/0445z 38142@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]
|
|||
|
|
|||
|
THE IMPLICATIONS cont'd
|
|||
|
|
|||
|
In future networks where redundant channels exist, it is quite possible
|
|||
|
that a given message will be fragmented and parts of it sent via several
|
|||
|
parallel paths. The message may exist as a complete entity only at the ends
|
|||
|
of a virtual path. It would be impossible to implement the censor-ship the
|
|||
|
FCC seems to be demanding with such a network, so the "legali-ty" will
|
|||
|
interfere with development of new technology.
|
|||
|
|
|||
|
Consider another recent development: amateur packet radio satellites.
|
|||
|
PACSAT is licensed by the FCC with a US trustee and a cadre of US sy-sops.
|
|||
|
PACSAT is, in essence, a flying BBS with the sysops on the ground. In
|
|||
|
order to screen out "offensive" messages, a ground-based SYSOP has to use a
|
|||
|
radio channel to verify message CONTENT. But the FCC letter says that the
|
|||
|
very act of reading an "offensive" message on the radio is illegal. If the
|
|||
|
Norfolk FCC action is allowed to stand, the logical implication is that
|
|||
|
PACSATs must be turned off!
|
|||
|
|
|||
|
A number of us have discussed such issues with responsible individuals at
|
|||
|
the FCC in Washington ever since the first fledgling days of packet radio.
|
|||
|
The signal that the FCC sent was that the sole responsibility for the
|
|||
|
CONTENT of a message lays with the ORIGINATOR. The actions of the Norfolk
|
|||
|
Office seem to indicate a new policy has been adopted which effectively
|
|||
|
kills packet radio.
|
|||
|
|
|||
|
Or -- perhaps -- the Norfolk Engineer in Charge who issued the citations
|
|||
|
was offended by the particular message and chose to take out his
|
|||
|
frus-trations on all the "King's Messengers" who brought the message to
|
|||
|
him?
|
|||
|
|
|||
|
W3IWI COMMENTS AND RECOMMENDATIONS
|
|||
|
|
|||
|
It is ironic that the WA3QNS message that brought down the wrath of the FCC
|
|||
|
a number of the BBSs that "touched" his message brought a very vocal
|
|||
|
response from the packet community informing him that
|
|||
|
|
|||
|
(1) 1-900-xxx-xxxx are in fact commercial ventures designed to raise
|
|||
|
money and that a call to the number would cost the caller.
|
|||
|
|
|||
|
(2) The subject message was probably in violation of 97.113(a) and
|
|||
|
probably illegal
|
|||
|
(Continued in Part 4)
|
|||
|
/EX
|
|||
|
|
|||
|
SB URGENT@USA < W3IWI $38143_W3IWI
|
|||
|
FCC CITES BBSs FOR @USA MSG (Part 4/4)
|
|||
|
R:910131/0445z 38143@W3IWI.MD.USA.NOAM [Balto/Wash MD/DC]
|
|||
|
|
|||
|
W3IWI COMMENTS AND RECOMMENDATIONS cont'd
|
|||
|
|
|||
|
Personally, I have been silent (but very frustrated) that about the 10% of
|
|||
|
bulletins addressed @USA (or @ALLUS, @ALLBBS, etc.) that are in poor taste.
|
|||
|
I have grown tired if blather about censorship, First Amendment Rights and
|
|||
|
the incredible volumes of hate mail. WA3QNS, by his statements and by the
|
|||
|
responses to his statements from other folks, has been one of the causes of
|
|||
|
this frustration. I have longed for the return to normalcy with messages on
|
|||
|
technical topics and personal communications. I have found it frustrating
|
|||
|
to pay the electric power bill and pay for the W3IWI hardware for others to
|
|||
|
engage in marginally offensive "Free Speech". I have wished that the
|
|||
|
(ab)users of @USA would have exercised more discretion with
|
|||
|
self-censorship.
|
|||
|
|
|||
|
But I have gritted what teeth I have left and avoided being a censor. Now,
|
|||
|
the FCC's CENSURE has left me with no alternative than to be a CENSOR.
|
|||
|
|
|||
|
Until the FCC tells me that I can do otherwise, I will only release @USA
|
|||
|
messages that I personally screen and am willing to stake my license on.
|
|||
|
The priority on my time is such that I don't expect to have time to screen
|
|||
|
@USA bulletins. Any complaints about my decision will be sent to /dev/null.
|
|||
|
|
|||
|
For the vast majority of you who do not abuse the system, I'm sorry that
|
|||
|
this situation has come up and that your ability to "fan out" informa-tion
|
|||
|
will be hindered. Since there have been very few instances of "offensive"
|
|||
|
personal messages, I'll take the risk of keeping all other packet mail
|
|||
|
flowing here and I hope the other BBS SYSOPs do likewise. But PLEASE
|
|||
|
exercise self-policing. The BBS SYSOPs don't want to be held responsible
|
|||
|
for YOUR words.
|
|||
|
|
|||
|
The ARRL has already been informed about the Norfolk citations. Because of
|
|||
|
the potentially devastating impact on all packet radio if the Norfolk
|
|||
|
situation is allowed to stand, I anticipate a lot of phone calls to be made
|
|||
|
in the next few days!
|
|||
|
|
|||
|
73 de Tom, W3IWI
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: Book Review--Exporting the First Amendment
|
|||
|
Date: Sun, 27 Jan 91 09:11 EST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 7 of 8: Review--Exporting the First Amndmnt ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
BOOK REVIEW: Exporting the First Amendment: The Press-Government Crusade
|
|||
|
1945-1952 by Margaret A. Blanchard, Longman Publishers, New York, 1986.
|
|||
|
|
|||
|
This book was reviewed in the same issue (Vol. 39, No. 3. Oct 1987) of the
|
|||
|
Federal Communication Law Journal that contains the article "An Electronic
|
|||
|
Soapbox: Computer Bulletin Boards and the First Amendment." "Soapboax" was
|
|||
|
cited by The Electronic Frontier Foundation in the amicus curiae brief on
|
|||
|
behalf of Len Rose. EXPORTING THE FIRST AMENDMENT is the more telling
|
|||
|
tale.
|
|||
|
|
|||
|
Time and again, Eleanor Roosevelt and her team mates from the United States
|
|||
|
were overpowered by compromisers who viewed "freedom of the press" as a
|
|||
|
necessary evil. To most of the delegates to the press conventions in
|
|||
|
Geneva and New York, RESTRICTING the press by adopting "principles of
|
|||
|
responsibility" was more important.
|
|||
|
|
|||
|
Freedom of the press was for everyone EXCEPT... Except for issues of
|
|||
|
national security (all nations agreed with that). Except for when the
|
|||
|
press in one place insults the politicians in another place (Egypt's King
|
|||
|
Farouk enjoyed the Riveria and Monte Carlo). Except when materials are
|
|||
|
injurious to youth (Scandanavia and France feared American comic books and
|
|||
|
the communists hated the daily comics because in the background was all
|
|||
|
this luxury). Except when opinions are injurious to the reputation of
|
|||
|
natural and legal individuals (a "legal individual" is a corporation). And
|
|||
|
indeed, while Eleanor Roosevelt was insisting that the press should be
|
|||
|
free, the United States was chasing "communist" writers at home and abroad.
|
|||
|
|
|||
|
Sadly, the author actually shares the views of the totalitarians. To
|
|||
|
Blanchard, the press is like religion or politics, it is an institution
|
|||
|
than cannot be superimposed on a culture. However, freedom of the press is
|
|||
|
merely a logical extension of the freedom to speak which comes from the
|
|||
|
freedom to think. Why it is that Islam and Christianity and atheism,
|
|||
|
socialism and communism and capitalism, hot dogs and tofu and tacos can be
|
|||
|
exported and imported but freedom of the press cannot?
|
|||
|
|
|||
|
Recently, the National Science Foundation pressured a sysop into dropping
|
|||
|
"obscene" GIF files from his FTP directory. (The fate of publishers like
|
|||
|
Craig Neidorf and Steve Jackson has been well-documented.) To the extent
|
|||
|
that we compromise, we deliver to our enemies the weapons that are used
|
|||
|
against us. The failure of the "First Amendment Crusade" following World
|
|||
|
War II is still haunting us today. The threat to your right to think comes
|
|||
|
not from the fact that Egypt and Israel impose censorship, but that the
|
|||
|
United States imposes censorship. The key difference is that for them, it
|
|||
|
is the rule and for us, it is the exception. So be it.
|
|||
|
|
|||
|
Very often in cyberspace, we come upon systems that ask us not to post
|
|||
|
"illegal" information on bombs or lockpicking or sex or credit cards. A
|
|||
|
sysop or moderator has a right to define what is appropriate on their
|
|||
|
system. But stop and think. There is nothing inherently ILLEGAL about
|
|||
|
publishing these facts. Security textbooks are one source. Mystery
|
|||
|
stories are another. If you don't know how cars or credit card numbers are
|
|||
|
stolen, you cannot PROTECT yourself and you become dependent upon the
|
|||
|
socialized police forces to inefficiently record your losses. And why is
|
|||
|
it wrong to write about SEX? What next, walking down the street?
|
|||
|
|
|||
|
Freedom of the press comes from freedom to think. EXPORTING THE FIRST
|
|||
|
AMENDMENT is the sad story of what happened when these principles were
|
|||
|
compromised.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Subject: Michigan Bell Fends off BBS Complainant
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU> Subject: News from Michigan
|
|||
|
Date: Tue, 29 Jan 91 15:24 EST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.05: File 8 of 8: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: GRID News. vol 2 nu 4. January 29, 1991. World GRID Association, P. O.
|
|||
|
Box 15061, Lansing, MI 48901 USA
|
|||
|
-----------------------------------------------------------------Michigan
|
|||
|
|
|||
|
Bell Fends off BBS Complainant by Michael E. Marotta
|
|||
|
|
|||
|
James R. Imhoff is the sysop of Variety and Spice BBS. In January
|
|||
|
of 1990, Michigan Bell began assessing him business rates. He filed a
|
|||
|
complaint with the Michigan Public Service Commission. MBT filed for and
|
|||
|
was granted a motion hearing. On January 18, 1991 at 10:00 am, a hearing
|
|||
|
was conducted by telephone. Judge Daniel Nickerson presided. Two MPSC
|
|||
|
staffers were present in person. Michigan Bell's Craig Anderson and Char
|
|||
|
Hoffman were connected and James R. Imhoff was connected.
|
|||
|
|
|||
|
At that time, Michigan Bell asked for several "discoveries". As the
|
|||
|
defendants, they had a right to know what proofs and witnesses Imhoff
|
|||
|
intended to rely on. Judge Nickerson granted most of the eight requests.
|
|||
|
|
|||
|
Docket U9725 James Imhoff vs Michigan Bell Telephone was heard on January
|
|||
|
29, 1991. Present were Bruce Rainey, Tomasin Garcia, and Sam Khattar of
|
|||
|
the MPSC staff. Craig Anderson, Charlene Hoffman, Nancy M. Rhoads, and
|
|||
|
Amy Edwards of Michigan Bell. James Robert Imhoff appeared, also. Daniel
|
|||
|
Nickerson was the administrative law judge.
|
|||
|
|
|||
|
We met in a pre-hearing at 9:00 am. The judge announced that the purpose
|
|||
|
of the pre-hearing was to define the issues of discovery. Craig Anderson,
|
|||
|
speaking for Bell, said that discovery was not resolved. The MPSC staff
|
|||
|
said that it did not see the complainant's reponses to the request for
|
|||
|
discovery until this morning. Craig Anderson said he had a motion. The
|
|||
|
judge said he would continue presently.
|
|||
|
|
|||
|
Anderson's motion was heard. "I spoke to Imhoff and reminded him of the
|
|||
|
deadline," he said. That deadline was Friday, January 25, 1991 at 5:00 pm.
|
|||
|
According to Anderson, Imhoff delivered the responses to Bell on Monday at
|
|||
|
12:10 pm. Speaking for the MPSC staff, Tomasin Garcia said she did not
|
|||
|
receive the response. Anderson said that Imhoff did not provide addresses
|
|||
|
or other materials as directed by the judge. MBT asked that Imhoff be
|
|||
|
precluded from calling witnesses as they did not have adequate time to
|
|||
|
prepare a defense or response.
|
|||
|
|
|||
|
James Imhoff said that he delivered the materials to Bell's Michigan Avenue
|
|||
|
Detroit office at 4 pm on Friday, January 25, 1991, but that the guard was
|
|||
|
unconcerned. The guard did not know Craig Anderson. Imhoff said that
|
|||
|
three guards were present, two men chatting with women, a third woman
|
|||
|
chatting with another woman. Imhoff also said that he did not know he was
|
|||
|
to give materials to the MPSC staff, he thought he was to delivery them to
|
|||
|
MBT staff. Further, he does not know the addresses of his witnesses
|
|||
|
because they are all computer people whom he knows online only. He did not
|
|||
|
know who could and could not appear.
|
|||
|
|
|||
|
Judge Nickerson asked Imhoff if he received a letter outlining his
|
|||
|
responsibilities. Imhoff replied that he did not know if he got the letter
|
|||
|
because he gets a lot of mail, some of it redundant.
|
|||
|
|
|||
|
Some discussion transpired on the state of readiness of security at MBT and
|
|||
|
whether and when every package delivered is logged.
|
|||
|
|
|||
|
After a recess to consider the arguments, Daniel Nickerson ruled.
|
|||
|
"Discovery is allowed," he said, calling it an important aspect of an
|
|||
|
efficient and fair hearing. "Therefore," he said,"I find that my order was
|
|||
|
not complied with. Both staff and respondent are prejudiced for not
|
|||
|
receiving the answers... The matter of dismissed without prejudice."
|
|||
|
|
|||
|
James Imhoff said he would file again and take it up later.
|
|||
|
|
|||
|
After the hearing, I spoke with the principals and the audience. Craig
|
|||
|
Anderson said that Michigan Bell is not interested in going after every
|
|||
|
BBS. He would not comment on two hypothetical cases. He would not say
|
|||
|
whether he would consider file uploads to be a value rendered and he did
|
|||
|
not feel he could say what this might mean in an information society.
|
|||
|
Anderson and his colleagues all agreed that these issues would have to be
|
|||
|
addressed in the future as we continue to wire our network nation.
|
|||
|
|
|||
|
I also spoke with James Imhoff. "I do charge for access," Imhoff said.
|
|||
|
When a user sends him money, "they get time on my system... they get into
|
|||
|
the library." Imhoff feels he should not be charged business rates. "The
|
|||
|
last seven years I have run this system I have not made dime one on this
|
|||
|
system. I actually lose between $100 and $150 a month. It is a hobby for
|
|||
|
this reason. If I were charging by the minute like a Prodigy or a
|
|||
|
CompuServe, it would be a business. I just want to get close to
|
|||
|
break-even. According to the IRS, any time you lose money on a business for
|
|||
|
three years, that is a hobby. I make anywhere from $1000 to $1200 a year
|
|||
|
and it costs me about $800 a month. The cost of a man's toys do not
|
|||
|
determine whether his hobby is a business or a residence.
|
|||
|
|
|||
|
Kevin Craft, sysop of Beam Rider noted that Imhoff seemed "not well
|
|||
|
prepared." Rick Wisckol, former sysop of Northern Point said that when
|
|||
|
faced with Michigan Bell, you "shouldn't wing it. ...Get someone who can
|
|||
|
work the ropes on the same level as Michigan Bell."
|
|||
|
|
|||
|
Imhoff said that he was a target in a larger conspiracy. He said that
|
|||
|
there are 50 million registered home modems in American. If Bell can
|
|||
|
collect an extra $3 per month, he said, that will be an extra $150 million
|
|||
|
per month in income. "Going after me is just the first step."
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.05**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|