792 lines
38 KiB
Plaintext
792 lines
38 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed, Jan 15, 1992 Volume 4 : Issue 02
|
|||
|
|
|||
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
|
|||
|
CONTENTS, #4.02 ( Jan 15, 1992)
|
|||
|
File 1--Re: Whole Earth Review Questions Technology
|
|||
|
File 2--Craig's submission in #4.01
|
|||
|
File 3--Subscribing to PHRACK
|
|||
|
File 4--Report: 8th Chaos Computer Congress
|
|||
|
File 5--Net "do-it-yourself" political activity (NEWSBYTES Reprint)
|
|||
|
File 6--Political Organizing at the Individual Level
|
|||
|
File 7--*DRAFT* "Guaranteeing Constitutional Freedoms"
|
|||
|
File 8--The Compuserve Case (Reprint from EFF Vol 2, #3)
|
|||
|
File 9--Senate Introduces Two FOIA Bills, S. 1929 & S. 1940
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
|
|||
|
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to the
|
|||
|
Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Thu, 09 Jan 92 15:54:48 -0600
|
|||
|
From: Neil W Rickert <rickert@CS.NIU.EDU>
|
|||
|
Subject: File 1--Re: Whole Earth Review Questions Technology
|
|||
|
|
|||
|
In Cu Digest, #4.01 Tom White writes:
|
|||
|
|
|||
|
> Is technological innovation invariably beneficial? Do we control
|
|||
|
>new technologies or do they control us?
|
|||
|
|
|||
|
This reminds me of the comments I occasionally have been heard to
|
|||
|
make, with tongue only very slightly in cheek:
|
|||
|
|
|||
|
In the old days, before Xerox became a household word, everyone
|
|||
|
participating in an important meeting would be given a copy of the
|
|||
|
documentation. Attached was a check sheet. He/she would read the
|
|||
|
documentation, cross his/her name off the check sheet, and pass the
|
|||
|
documents onto the next person listed.
|
|||
|
|
|||
|
Today, everybody has an individual copy. There is not so much of a
|
|||
|
rush to read it. Thus everyone can put off reading it until the last
|
|||
|
minute or a little later, come to the meeting, and an important issue
|
|||
|
is voted on without one participant having read it, or having the
|
|||
|
courage to admit to not having read it.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
|
|||
|
In the old days it was very costly to revise a draft, since the whole
|
|||
|
thing had to be redone from the start, with the possibility of new
|
|||
|
errors being introduced. As a result many letters and memos were
|
|||
|
sent out with minor errors, because it was just not worth the trouble
|
|||
|
of correcting them.
|
|||
|
|
|||
|
Today, with word processing, editing a memo or letter is much
|
|||
|
simpler. As a result, drafts are revised ad infinitum. The total
|
|||
|
number of man (and woman) hours spend on the document may be three or
|
|||
|
more times as much as before. And the result - a few less minor
|
|||
|
typos, but no improvement in the essential meaningfulness and
|
|||
|
readability of the document.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
|
|||
|
To top it off, there are probably thousands of MIPS (million
|
|||
|
instructions per second) of computing power dedicated to the sole
|
|||
|
purpose of printing address labels on junk mail, much of which will
|
|||
|
finish up in land fills without having been read.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 11 Jan 92 0:23:33 EST
|
|||
|
From: tadvocate@anonymous.com
|
|||
|
Subject: File 2--Craig's submission in #4.01
|
|||
|
|
|||
|
Reply to: File 2--How The Government Broke The Law And Went Unpunished
|
|||
|
|
|||
|
> JUSTICE DENIED
|
|||
|
>
|
|||
|
> How The Government Broke The Law And Went Unpunished
|
|||
|
>
|
|||
|
> by Craig Neidorf
|
|||
|
> kl@stormking.com
|
|||
|
>
|
|||
|
>
|
|||
|
> TO THE READER:
|
|||
|
>
|
|||
|
> During the summer of 1990, I wrote the following review of how the
|
|||
|
> Privacy Protection Act of 1980 could have been applied to the above
|
|||
|
> described incident. After several months of trying to find a way to
|
|||
|
> file a claim, I have finally come to realize that the goal I seek is
|
|||
|
> unreachable because I do not possess the financial resources to hire
|
|||
|
> legal counsel and no law firm or organization capable of handling the
|
|||
|
> case will agree to take it on a contingency basis. Furthermore, as I
|
|||
|
> Protection Act of 1980 as described above.
|
|||
|
>
|
|||
|
> ********** Stuff Deleted***********
|
|||
|
>
|
|||
|
> *** What Are The Remedies?
|
|||
|
>
|
|||
|
> Section 106(a) provides a civil cause of action for damages for
|
|||
|
> violations of the Act. Such an action may be brought by any person
|
|||
|
> aggrieved by a violation of the statute.
|
|||
|
>
|
|||
|
> WE DARE NOT GIVE UP THAT RIGHT!
|
|||
|
|
|||
|
Craig, stop complaining. You are going to law school. File a pro se
|
|||
|
action against the government. File it and ask some of your
|
|||
|
professors to help you out. You'll learn more practical law then a
|
|||
|
thousand class hours.
|
|||
|
|
|||
|
If we dare not give up our rights, then we dare not stop.
|
|||
|
|
|||
|
The Advocate.
|
|||
|
|
|||
|
[ This information published so that all members of the community can
|
|||
|
know that they do not need to depend on lawyers to protect our rights.
|
|||
|
The day an american may not protect his rights without a lawyer, is
|
|||
|
the day his rights have died.]
|
|||
|
|
|||
|
PS For those interested. The supreme court is deciding a case where
|
|||
|
a man was convicted of receiving child pornography only after being
|
|||
|
targeted for 2 years in a blizzard of letters by undercover operators
|
|||
|
into buying it by mail. The supreme court will try to determine what
|
|||
|
limits the government may not violate in enticing people into breaking
|
|||
|
the law.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 14 Jan 92 17:44:09 EST
|
|||
|
From: Storm King ListServ Account <server@STORMKING.COM>
|
|||
|
Subject: File 3--Subscribing to PHRACK
|
|||
|
|
|||
|
We here at phrack have been getting mail bouncing all over the place
|
|||
|
due to people writing PHRACK@STOMKING.COM the correct contact for
|
|||
|
phrack is at PHRACKSUB@STORMKING.COM. Please correct this!
|
|||
|
|
|||
|
These days people must do the following to get on the phrack mailing
|
|||
|
list.
|
|||
|
|
|||
|
The distribution of Phrack is now being performed by the software
|
|||
|
called Listserv. All individuals on the Phrack Mailing List prior to
|
|||
|
your receipt of this letter have been deleted from the list.
|
|||
|
|
|||
|
If you would like to re-subscribe to Phrack Inc. please follow these
|
|||
|
instructions:
|
|||
|
|
|||
|
1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
|
|||
|
must be sent from the account where you wish Phrack to be delivered.
|
|||
|
|
|||
|
2. Leave the "Subject:" field of that letter empty.
|
|||
|
|
|||
|
3. The first line of your mail message should read:
|
|||
|
SUBSCRIBE PHRACK <your name here>
|
|||
|
|
|||
|
4. DO NOT leave your address in the name field!
|
|||
|
(This field is for PHRACK STAFF use only, so please use a full name)
|
|||
|
|
|||
|
Once you receive the confirmation message, you will then be added to
|
|||
|
the Phrack Mailing List. If you do not receive this message within 48
|
|||
|
hours, send another message. If you STILL do not receive a message,
|
|||
|
please contact
|
|||
|
"SERVER@STORMKING.COM".
|
|||
|
|
|||
|
You will receive future mailings from "PHRACK@STORMKING.COM".
|
|||
|
|
|||
|
If there are any problems with this procedure, please contact
|
|||
|
"SERVER@STORMKING.COM" with a detailed message.
|
|||
|
|
|||
|
Sincerly,
|
|||
|
The Phrack Staff
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 14 Jan 92 12:15 MST
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 4--Report: 8th Chaos Computer Congress
|
|||
|
|
|||
|
((For those who do not receive either RISKS-L or TELECOM Digest,
|
|||
|
we reprint the following form TELECOM Digest, Vol 13 #35 (14 Jan '92)).
|
|||
|
|
|||
|
***********************************************
|
|||
|
|
|||
|
Date: Tue, 14 Jan 1992 06:33:50 PST
|
|||
|
From: Eric_Florack.Wbst311@xerox.com
|
|||
|
Subject: Report: 8th Chaos Computer Congress
|
|||
|
|
|||
|
The following message was copied from RISKS-L. Of particular interest
|
|||
|
to TELECOM reader will be where the writer speaks of HACKTIC. That
|
|||
|
such gatherings are becoming more sparsely populated is a positive
|
|||
|
step. But is it, perhaps, time for people such as the UN , or perhaps
|
|||
|
the ITU, to invoke sanctions against countries that allow such groups
|
|||
|
to thrive? ( Comments are my own ... I don't expect anyone else to
|
|||
|
have the guts to agree with me.) (Grin)
|
|||
|
|
|||
|
-=-=-=--=-=-=
|
|||
|
|
|||
|
Date: 9 Jan 92 16:37 +0100
|
|||
|
From: Klaus Brunnstein <brunnstein@rz.informatik.uni-hamburg.dbp.de>
|
|||
|
Subject: Chaos Congress 91 Report
|
|||
|
|
|||
|
Report: 8th Chaos Computer Congress
|
|||
|
|
|||
|
On occasion of the 10th anniversary of its foundation, Chaos Computer
|
|||
|
Club (CCC) organised its 8th Congress in Hamburg (Dec.27-29, 1991). To
|
|||
|
more than 400 participants (largest participation ever, with growing
|
|||
|
number of students rather than teen-age scholars), a rich diversity of
|
|||
|
PC and network related themes was offered, with significantly less
|
|||
|
sessions than before devoted to critical themes, such as phreaking,
|
|||
|
hacking or malware construction. Changes in the European hacker scene
|
|||
|
became evident as only few people from Netherlands (see: Hacktick) and
|
|||
|
Italy had come to this former hackers' Mecca. Consequently, Congress
|
|||
|
news are only documented in German. As CCC's founding members develop
|
|||
|
in age and experience, reflection of CCC's role and growing diversity
|
|||
|
(and sometimes visible alienity between leading members) of opinions
|
|||
|
indicates that teen-age CCC may produce less spectacular events than
|
|||
|
ever before.
|
|||
|
|
|||
|
This year's dominating theme covered presentations of communication
|
|||
|
techniques for PCs, Ataris, Amigas and Unix, the development of a
|
|||
|
local net (mousenet.txt: 6.9 kByte) as well as description of regional
|
|||
|
(e.g. CCC's ZERBERUS; zerberus.txt: 3.9 kByte) and international
|
|||
|
networks (internet.txt: 5.4 kBytes), including a survey (netzwerk.txt:
|
|||
|
53.9 kByte). In comparison, CCC'90 documents are more detailed on
|
|||
|
architectures while sessions and demonstrations in CCC'91 (in "Hacker
|
|||
|
Center" and other rooms) were more concerned with practical navigation
|
|||
|
in such nets.
|
|||
|
|
|||
|
Phreaking was covered by the Dutch group HACKTIC which updated its
|
|||
|
CCC'90 presentation of how to "minimize expenditures for telephone
|
|||
|
conversations" by using "blue" boxes (simulating specific sounds used
|
|||
|
in phone systems to transmit switching commands) and "red" boxes
|
|||
|
(using telecom-internal commands for testing purposes), and describing
|
|||
|
available software and recent events. Detailed information on
|
|||
|
phreaking methods in specific countries and bugs in some telecom
|
|||
|
systems were discussed (phreaking.txt: 7.3 kByte). More information
|
|||
|
(in Dutch) was available, including charts of electronic circuits, in
|
|||
|
several volumes of Dutch "HACKTIC: Tidschrift voor Techno-Anarchisten"
|
|||
|
(=news for techno-anarchists).
|
|||
|
|
|||
|
Remark #1: recent events (e.g. "Gulf hacks") and material presen-
|
|||
|
ted on Chaos Congress '91 indicate that Netherland emerges as a new
|
|||
|
European center of malicious attacks on systems and networks. Among
|
|||
|
other potentially harmful information, HACKTIC #14/15 publishes code
|
|||
|
of computer viruses (a BAT-virus which does not work properly;
|
|||
|
"world's shortest virus" of 110 bytes, a primitive non-resident virus
|
|||
|
significantly longer than the shortest resident Bulgarian virus: 94
|
|||
|
Bytes). While many errors in the analysis show that the authors lack
|
|||
|
deeper insight into malware technologies (which may change), their
|
|||
|
criminal energy in publishing such code evidently is related to the
|
|||
|
fact that Netherland has no adequate computer crime legislation. In
|
|||
|
contrast, the advent of German computer crime legislation (1989) may
|
|||
|
be one reason for CCC's less devotion to potentially harmful themes.
|
|||
|
|
|||
|
Remark #2: While few Netherland universities devote research and
|
|||
|
teaching to in/security, Delft university at least offers introductory
|
|||
|
courses into data protection (an issue of large public interest in NL)
|
|||
|
and security. Professors Herschberg and Aalders also analyse the
|
|||
|
"robustness" of networks and systems, in the sense that students may
|
|||
|
try to access connected systems if the addressed organisations agree.
|
|||
|
According to Prof. Aalders (in a recent telephone conversation), they
|
|||
|
never encourage students to attack systems but they also do not punish
|
|||
|
students who report on such attacks which they undertook on their own.
|
|||
|
(Herschberg and Alpers deliberately have no email connection.)
|
|||
|
|
|||
|
Different from recent years, a seminar on Computer viruses (presented
|
|||
|
by Morton Swimmer of Virus Test Center, Univ. Hamburg) as deliberately
|
|||
|
devoted to disseminate non-destructive information (avoiding any
|
|||
|
presentation of virus programming). A survey of legal aspects of
|
|||
|
inadequate software quality (including viruses and program errors) was
|
|||
|
presented by lawyer Freiherr von Gravenreuth (fehlvir.txt: 5.6 kByte).
|
|||
|
|
|||
|
Some public attention was drawn to the fact that the "city-call"
|
|||
|
telephone system radio-transmits information essentially as ASCII. A
|
|||
|
demonstration proved that such transmitted texts may easily be
|
|||
|
intercepted, analysed and even manipulated on a PC. CCC publicly
|
|||
|
warned that "profiles" of such texts (and those addressed) may easily
|
|||
|
be collected, and asked Telecom to inform users about this insecurity
|
|||
|
(radioarm.txt: 1.6 kByte); German Telecom did not follow this advice.
|
|||
|
|
|||
|
Besides discussions of emerging voice mailboxes (voicebox.txt: 2.8
|
|||
|
kBytes), an interesting session presented a C64-based chipcard
|
|||
|
analysis systems (chipcard.txt: 3.3 kBytes). Two students have built
|
|||
|
a simple mechanism to analyse (from systematic IO analysis) the
|
|||
|
protocol of a German telephone card communicating with the public
|
|||
|
telephone box; they described, in some detail (including an
|
|||
|
elctronmicroscopic photo) the architecture and the system behaviour,
|
|||
|
including 100 bytes of communication data stored (for each call, for
|
|||
|
80 days!) in a central German Telecom computer. Asked for legal
|
|||
|
implications of their work, they argued that they just wanted to
|
|||
|
understand this technology, and they were not aware of any legal
|
|||
|
constraint. They have not analysed possibilities to reload the
|
|||
|
telephone account (which is generally possible, due to the
|
|||
|
architecture), and they didnot analyse architectures or procedures of
|
|||
|
other chipcards (bank cards etc).
|
|||
|
|
|||
|
Following CCC's (10-year old charta), essential discussions were
|
|||
|
devoted to social themes. The "Feminine computer handling" workshop
|
|||
|
deliberately excluded men (about 25 women participating), to avoid
|
|||
|
last year's experience of male dominancy in related discussions
|
|||
|
(femin.txt: 4.2 kBytes). A session (mainly attended by informatics
|
|||
|
students) was devoted to "Informatics and Ethics" (ethik.txt: 3.7
|
|||
|
kByte), introducing the international state-of-discussion, and
|
|||
|
discussing the value of professional standards in the German case.
|
|||
|
|
|||
|
A discussion about "techno-terrorism" became somewhat symptomatic for
|
|||
|
CCC's actual state. While external participants (von Gravenreuth,
|
|||
|
Brunnstein) were invited to this theme, CCC-internal controversies
|
|||
|
presented the panel discussion under the technical title "definition
|
|||
|
questions". While one fraction (Wernery, Wieckmann/terror.txt: 7.2
|
|||
|
kByte) wanted to discuss possibilities, examples and dangers of
|
|||
|
techno-terrorism openly, others (CCC "ol'man" Wau Holland) wanted to
|
|||
|
generally define "terrorism" somehow academically, and some undertook
|
|||
|
to describe "government repression" as some sort of terrorism. In the
|
|||
|
controversial debate (wau_ter.txt: 9.7 kByte), few examples of
|
|||
|
technoterrorism (WANK worm, development of virus techniques for
|
|||
|
economic competition and warfare) were given.
|
|||
|
|
|||
|
More texts are available on: new German games in Multi-User
|
|||
|
Domain/Cyberspace (mud.txt: 3.8 kByte), and Wernery's "Btx
|
|||
|
documentation" (btx.txt: 6.2 kByte); not all topics have been
|
|||
|
reported. All German texts are available from the author (in
|
|||
|
self-extracting file: ccc91.exe, about 90 kByte), or from CCC (e-mail:
|
|||
|
SYSOP@CHAOS-HH.ZER, fax: +49-40-4917689).
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 15 Jan 1992 11:45:54 GMT
|
|||
|
From: John F. McMullen (mcmullen@well.sf.ca.us)
|
|||
|
Subject: File 5--Net "do-it-yourself" political activity (NEWSBYTES Reprint)
|
|||
|
|
|||
|
Warren Announces Do-It-Yourself "NET" Political Activity 1/13/92
|
|||
|
WOODSIDE, CALIFORNIA, U.S.A., 1992 JAN 13 (NB) -- Jim Warren, founder
|
|||
|
of InfoWorld and the West Coast Computer Faire, has announced a plan
|
|||
|
under which US taxpayers may let their legislators know their desire
|
|||
|
for expenditure of tax revenues.
|
|||
|
|
|||
|
In a statement posted of the Whole Earth 'Lectronic Link (WELL),
|
|||
|
Warren outlined a proposal under which taxpayers would fill out a form
|
|||
|
that specifies the desires of the taxpayer for the uses of her/his tax
|
|||
|
payment. The form will then be sent to the taxpayer's elected
|
|||
|
representatives. Warren said "As we approach tax-day, it emphasizes
|
|||
|
that we again worked more than a third of last year for the
|
|||
|
government and politicians. This year, let's tell them how WE want
|
|||
|
them to use the hard-earned money they take from us. When we send in
|
|||
|
our taxes, let's also send copies of this to our current and
|
|||
|
potential elected representatives, especially to this year's political
|
|||
|
candidates. (Let's not blame the IRS; they're just doing what our
|
|||
|
elected representatives tell them to do.) Please feel free to copy
|
|||
|
this to friends, neighbors, customers, business associates and
|
|||
|
company and community bulletin boards."
|
|||
|
|
|||
|
The form, designed by Warren, provides spaces for the taxpayer to fill
|
|||
|
in dollar and percentage figures for the expenditure of the funds.
|
|||
|
Warren also committed, if taxpayers send copies of the forms to him,
|
|||
|
to publish summary reports reflecting the desires of the aggregate of
|
|||
|
the reporting taxpayers. Warren's form follows:
|
|||
|
|
|||
|
To: ______________________________
|
|||
|
______________________________
|
|||
|
______________________________
|
|||
|
______________________________
|
|||
|
|
|||
|
TAX ALLOCATION INSTRUCTIONS FROM A VOTER
|
|||
|
|
|||
|
Here are the taxes that I know you are taking from my work last
|
|||
|
year, and here is how I want you to use them. (For other projects
|
|||
|
that you or your campaign donors desire, please depend on the
|
|||
|
hidden taxes that I cannot easily identify.)
|
|||
|
|
|||
|
This is a very serious matter to me, even though this note is a
|
|||
|
form. Please respond and tell me how much of our earnings you, as
|
|||
|
our elected representative, want to take in taxes, and how much you
|
|||
|
want to spend in each budget-area. Please send me _____ copies of
|
|||
|
your response for my friends, neighbors and business associates.
|
|||
|
(And, a lack of response will be noted as a response.)
|
|||
|
|
|||
|
How to use MY taxes: Federal allocations: Fiscal-1992 Federal Budget
|
|||
|
1. % $ 18.0% $ 290,820M National Defense
|
|||
|
2. % $ 2.2% 35,679M International Affairs
|
|||
|
3. % $ 1.2% 18,934M Science, Space and Technology
|
|||
|
4. % $ 0.3% 4,129M Energy
|
|||
|
5. % $ 1.2% 19,708M Natural Resources and Environment
|
|||
|
6. % $ 1.2% 20,219M Agriculture
|
|||
|
7. % $ 6.5% 105,780M Commerce and Housing Credit
|
|||
|
8. % $ 2.1% 34,312M Transportation
|
|||
|
9. % $ 0.4% 5,768M Community & Regional Development
|
|||
|
10. % $ 2.9% 46,934M Education,Employment, Soc.Services
|
|||
|
11. % $ 5.0% 81,300M Health
|
|||
|
12. % $ 7.0% 113,811M Medicare
|
|||
|
13. % $ 13.8% 222,691M Income Security
|
|||
|
14. % $ 21.7% 351,109M Social Security
|
|||
|
15. % $ 2.1% 33,380M Veterans' Benefits and Services
|
|||
|
16. % $ 0.9% 14,842M Administration of Justice
|
|||
|
17. % $ 0.8% 12,688M General Government
|
|||
|
18. 12.7% $ 12.7% 206,343M Net Interest
|
|||
|
19. % $ <not an expense> deficit reduction
|
|||
|
20. % $ 0.0% 0 tax reduction/refund/rebate to me
|
|||
|
------ --------- ------ -----------
|
|||
|
100.0% $ 100.0% $1,618,447M my taxes & your FY-1992 budget
|
|||
|
|
|||
|
Thanking you for your attention to this constituent request, I
|
|||
|
remain,
|
|||
|
From:______________________________
|
|||
|
______________________________
|
|||
|
______________________________
|
|||
|
______________________________
|
|||
|
|
|||
|
|
|||
|
Warren told Newsbytes that, following his posting, MicroTimes editor
|
|||
|
Mary Eisenhart told him that he can include a copy of the form in an
|
|||
|
up-coping column in that 200,000 circulation publication.
|
|||
|
|
|||
|
Warren also stated that any forms sent to him for summarization will
|
|||
|
be held in the strictest confidence and not shown to others. He said
|
|||
|
"I must hold them for the possibility that anyone doubts that the
|
|||
|
basis for our published summary actually existed."
|
|||
|
|
|||
|
Warren also commented to Newsbytes on the potential of network
|
|||
|
mobilization, saying "We have in the computer network the largest
|
|||
|
circulation publication in the nation and it is free for the logon
|
|||
|
cost. This is the beginning of the implementation of effective
|
|||
|
electronic citizenship.
|
|||
|
|
|||
|
Warren said that at least 2 other electronic political projects are
|
|||
|
planned for 1992.
|
|||
|
|
|||
|
(Barbara E. McMullen & John F. McMullen/Press Contact: Jim Warren,
|
|||
|
415-851-2814 (fax); jwarren@autodesk.com (e-mail)/19920113)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 14 Jan 92 18:45:21 EST
|
|||
|
From: Jim Warren (jwarren@well.sf.ca.us)
|
|||
|
Subject: File 6--Political Organizing at the Individual Level
|
|||
|
|
|||
|
Once every four years, with less opportunity each two years -- i.e.,
|
|||
|
each election year -- citizen-groups have a brief-but-major
|
|||
|
window-of-opportunity to obtain government by and for the People. We
|
|||
|
rarely use it effectively.
|
|||
|
|
|||
|
Civil liberties in the electronic frontier simply cannot wait until
|
|||
|
1996. By then, it may be too late to protect online rights, freedom
|
|||
|
and privacy.
|
|||
|
We need to act now.
|
|||
|
We *can* act. And we *can* be effective:
|
|||
|
|
|||
|
1. Meet with candidates.
|
|||
|
Do this in their offices, preferably, as a group of no more than 2-4
|
|||
|
articulate, presentable spokespeople. It helps if you have formal
|
|||
|
backing of a group, but it is certainly not necessary. What is
|
|||
|
greatly persuasive to candidates is whether you are likely to sway a
|
|||
|
group of voters.
|
|||
|
|
|||
|
2. Be informative.
|
|||
|
Plan a careful, logical, brief oral presentation of our concerns.
|
|||
|
Back it up with a 2-10 page summary of major points, positions and
|
|||
|
requests. Supporting newspaper articles are particularly helpful.
|
|||
|
|
|||
|
3. Seek explicit committments.
|
|||
|
*Every* successful politician has mastered the art of *sounding*
|
|||
|
sincerely interested and supportive without making committments. Make
|
|||
|
specific requests for specific action within a specific time-frame.
|
|||
|
Request it in the form of an official policy- or position-statement
|
|||
|
issued by the candidate, "so you can then publicize their position
|
|||
|
throughout your group." (Verbal assurances in private meetings are
|
|||
|
unreliable.) If they seem disinclined, politely indicate that you
|
|||
|
will, regretfully, have to report that non-action or lack of explicit
|
|||
|
commitment must be viewed as non-support, potentially even opposition,
|
|||
|
on these time-sensitive issues. Don't expect somethin' for nothin'.
|
|||
|
If they seem inclined to commit --at a minimum, they will sound
|
|||
|
sincerely concerned -- they will want to know what support you will
|
|||
|
offer. Expect them to ask for it and/or for your
|
|||
|
formal endorsement. Perhaps the best response to this is to say you
|
|||
|
will vigorously circulate details of their committments throughout
|
|||
|
your group.
|
|||
|
|
|||
|
4. Indicate the group to whom you will report.
|
|||
|
Long ago, when I last checked, the WELL had about 4,500 users. BMUG
|
|||
|
has ?? Brian Reid's latest estimates are that USENET had about
|
|||
|
1,913,000 users on about 40,000 hosts. There are probably around 15
|
|||
|
million users on non-BBS computer networks in the U.S., public and
|
|||
|
private. The Internet has about 5,000 networks with around a million
|
|||
|
hosts and anywhere from 5 to 10 million users. The Fidonet BBS-net
|
|||
|
probably has around 2 million users (I've asked
|
|||
|
|
|||
|
And, there's your own internal net at work or school. Can you post
|
|||
|
personal notes on it? Are you a BBS sysop or host administrator with
|
|||
|
authority to post a logon notice seen by everyone? Seems like every user
|
|||
|
ought to know who is willing to protect their online freedom and privacy.
|
|||
|
|
|||
|
I phrased this in the second person -- "you" do it -- but, jus' for the
|
|||
|
record: I'm personally pursuing this with various federal and state
|
|||
|
candidates on the San Francisco Peninsula. I walk it like I talk it. :-)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 14 Jan 92 18:45:21 EST
|
|||
|
From: Jim Warren (jwarren@well.sf.ca.us)
|
|||
|
Subject: File 7--*DRAFT* "Guaranteeing Constitutional Freedoms"
|
|||
|
|
|||
|
*This is a **draft***. (I am working on additional phrasing
|
|||
|
regarding computerized access to computerized legislation-in-progress,
|
|||
|
so we may be citizens effectly informed of the legislative process. I
|
|||
|
also have some thoughts about enhancing citizen's access to their
|
|||
|
personal information that is collected and shared by government
|
|||
|
agencies.
|
|||
|
|
|||
|
If you wish a copy of the final version for your own modification,
|
|||
|
use and/or personal or group political action, please e-mail your
|
|||
|
request to:
|
|||
|
jwarren@well.sf.ca.us --or-- jwarren@autodesk.com .
|
|||
|
*************************
|
|||
|
|
|||
|
GUARANTEEING CONSTITUTIONAL FREEDOMS INTO THE 21st CENTURY
|
|||
|
|
|||
|
Harvard Law Professor Laurence H. Tribe, one of the nation's leading
|
|||
|
Constitutional scholars, views technological threats to our
|
|||
|
constitutional freedoms and rights as so serious that, for the first
|
|||
|
time in his career, he has proposed a Constitutional Amendment:
|
|||
|
|
|||
|
"This Constitution's protections for the freedoms of speech, press,
|
|||
|
petition and assembly, and its protections against unreasonable
|
|||
|
searches and seizures and the deprivation of life, liberty or property
|
|||
|
without due process of law, should be construed as fully applicable
|
|||
|
without regard to generated, stored, altered, transmitted or
|
|||
|
controlled."
|
|||
|
|
|||
|
Until and unless the unlikely event that such an Amendment is
|
|||
|
adopted, legislation and regulation are the only alternatives to
|
|||
|
assure modern protection of citizens against modern technological
|
|||
|
threats against their constitutional rights and freedoms.
|
|||
|
|
|||
|
PERSONAL COMMITMENT TO ACTION
|
|||
|
|
|||
|
PREFACE: It has been over two centuries since our Constitution and
|
|||
|
Bill of Rights were adopted. The great technological change in the
|
|||
|
interum --especially in computing, telecommunications and electronics
|
|||
|
-- now poses a clear and present danger to the rights and protections
|
|||
|
guaranteed in those great documents. Therefore:
|
|||
|
|
|||
|
will author or coauthor legislation reflecting the following
|
|||
|
specifics, and I will actively support and testify in favor of any
|
|||
|
similar legislation as may be introduced by others. Further, I will
|
|||
|
actively seek to have included in such legislation, explicit personal
|
|||
|
civil and/or criminal penalties against any agent, employee or
|
|||
|
official of the government who violates any of these statutes. And
|
|||
|
finally, I will keep all citizens who express interest in legislative
|
|||
|
progress on these matters fully and timely informed.
|
|||
|
|
|||
|
The protections guaranteed in the Constitution and its Amendments
|
|||
|
shall be fully applicable regardless of the current technology of the
|
|||
|
time. In particular:
|
|||
|
|
|||
|
SPEECH: Freedom of speech shall be equally protected, whether by
|
|||
|
voice or written as in the 18th Century, or by electronic transmission
|
|||
|
or computer communication as in the 20th Century and thereafter.
|
|||
|
|
|||
|
PRESS: Freedom of the press shall be equally protected, whether by
|
|||
|
print as in the 18th Century, or by computer distribution of
|
|||
|
information, as in the 20th Century and thereafter.
|
|||
|
|
|||
|
ASSEMBLY: Freedom of assembly shall be equally protected, whether
|
|||
|
by face-to-face meeting as in the 18th Century, or by computer-based
|
|||
|
conference as in the 20th Century and thereafter. The right to hold
|
|||
|
confidential meetings shall be equally protected, whether they be by
|
|||
|
personal meeting in private chambers, or by computer-based private
|
|||
|
conferences.
|
|||
|
|
|||
|
SELF-PROTECTION: The right of the people to keep and use computers
|
|||
|
and communications equipment and connections shall not be abridged by
|
|||
|
the government.
|
|||
|
|
|||
|
SEARCH & SEIZURE: The right of the people to be secure in their
|
|||
|
papers and effects, against unreasonable searches and seizures, shall
|
|||
|
be fully applicable to their electronic mail, computerized information
|
|||
|
and personal computer systems.
|
|||
|
|
|||
|
WARRANTS: No warrants for search or seizure shall issue for
|
|||
|
computerized information, but upon probable cause, supported by oath
|
|||
|
or affirmation, and particularly describing the computer system to be
|
|||
|
searched and the specific information to be seized.
|
|||
|
|
|||
|
SECURE INFORMATION VAULTS: Just as search and seizure of letters in
|
|||
|
a post-office, and papers in a bank-vault lock-box, and surveillance
|
|||
|
of a telephone conversations by wire-tap each require a separate
|
|||
|
warrant for each postal address, lock-box and telephone line, so also
|
|||
|
shall a separate warrant be required for electronic mail or other
|
|||
|
computer files of each suspect, when stored in a computer facility
|
|||
|
shared by others, and such files stored in a shared facility by or for
|
|||
|
a citizen who is neither named in a warrant nor associated with a
|
|||
|
suspect so-named, may not be used against that citizen, if seized or
|
|||
|
discovered during legal search of or for files of a suspect.
|
|||
|
|
|||
|
SELF-INCRIMINATION: No person shall be compelled in any civil or
|
|||
|
criminal case to be a witness against himself or herself, nor be
|
|||
|
compelled to translate or decode computerized information that may be
|
|||
|
so incriminating.
|
|||
|
|
|||
|
PRIVATE PROPERTY: Private property shall not be taken for public use
|
|||
|
without just compensation, nor shall it be used nor sold by the
|
|||
|
government for less than fair market value, in which case all such
|
|||
|
proceeds shall promptly derive singularly to its owner prior to
|
|||
|
government seizure.
|
|||
|
|
|||
|
SPEEDY RELEASE: Anyone not accused of a crime shall enjoy the right
|
|||
|
to a speedy release and return of all of their property in undamaged
|
|||
|
form, as may be seized under any warrant, particularly including their
|
|||
|
computerized information.
|
|||
|
|
|||
|
_________________________ title/office/office sought
|
|||
|
_________________________ address
|
|||
|
_________________________
|
|||
|
_________________________
|
|||
|
_________________________ campaign-office voice-phone number
|
|||
|
_________________________ campaign-office electronic-mail address
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 14 Jan 92 17:44:09 EST
|
|||
|
From: Eff@org
|
|||
|
Subject: File 8--The Compuserve Case (Reprint from EFF Vol 2, #3)
|
|||
|
|
|||
|
THE COMPUSERVE CASE:
|
|||
|
A STEP FORWARD IN FIRST AMENDMENT PROTECTION FOR ONLINE SERVICES.
|
|||
|
By Mike Godwin (mnemonic@eff.org)
|
|||
|
|
|||
|
By now you may have heard about the summary-judgment decision in
|
|||
|
Cubby, Inc. v. CompuServe, a libel case. What you may not know is why
|
|||
|
the decision is such an important one. By holding that CompuServe
|
|||
|
should not be liable for defamation posted by a third-party user, the
|
|||
|
court in this case correctly analyzed the First Amendment needs of
|
|||
|
most online services. And because it's the first decision to deal
|
|||
|
directly with these issues, this case may turn out to be a model for
|
|||
|
future decisions in other courts.
|
|||
|
|
|||
|
The full name of the case, which was decided in the Southern District
|
|||
|
of New York, is Cubby Inc. v. CompuServe. Basically, CompuServe
|
|||
|
contracted with a third party for that user to conduct a
|
|||
|
special-interest forum on CompuServe. The plaintiff claimed that
|
|||
|
defamatory material about its business was posted a user in that
|
|||
|
forum, and sued both the forum host and CompuServe. CompuServe moved
|
|||
|
for, and received, summary judgment in its favor.
|
|||
|
|
|||
|
Judge Leisure held in his opinion that CompuServe is less like a
|
|||
|
publisher than like a bookstore owner or book distributor. First
|
|||
|
Amendment law allows publishers to be liable for defamation, but not
|
|||
|
bookstore owners, because holding the latter liable would create a
|
|||
|
burden on bookstore owners to review every book they carry for
|
|||
|
defamatory material. This burden would "chill" the distribution of
|
|||
|
books (not to mention causing some people to get out of the bookstore
|
|||
|
business) and thus would come into serious conflict with the First
|
|||
|
Amendment.
|
|||
|
|
|||
|
So, although we often talk about BBSs as having the rights of
|
|||
|
publishers and publications, this case hits on an important
|
|||
|
distinction. How are publishers different from bookstore owners?
|
|||
|
Because we expect a publisher (or its agents) to review everything
|
|||
|
prior to publication. But we *don't* expect bookstore owners to review
|
|||
|
everything prior to sale. Similarly, in the CompuServe case, as in
|
|||
|
any case involving an online service in which users freely post
|
|||
|
messages for the public (this excludes Prodigy), we wouldn't expect
|
|||
|
the online-communications service provider to read everything posted
|
|||
|
*before* allowing it to appear.
|
|||
|
|
|||
|
It is worth noting that the Supreme Court case on which Judge Leisure
|
|||
|
relies is Smith v. California--an obscenity case, not a defamation
|
|||
|
case. Smith is the Supreme Court case in which the notion first
|
|||
|
appears that it is generally unconstitutional to hold bookstore owners
|
|||
|
liable for content. So, if Smith v. California applies in a
|
|||
|
online-service or BBS defamation case, it certainly ought to apply in
|
|||
|
an obscenity case as well.
|
|||
|
|
|||
|
Thus, Cubby, Inc. v. CompuServe sheds light not only on defamation law
|
|||
|
as applied in this new medium but on obscenity law as well. This
|
|||
|
decision should do much to clarify to concerned sysops what their
|
|||
|
obligations and liabilities are under the law.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Highlights of the CompuServe decision (selected by Danny Weitzner):
|
|||
|
|
|||
|
"CompuServe's CIS [CS Information Service] product is in essence an
|
|||
|
electronic, for-profit library that carries a vast number of
|
|||
|
publications and collects usage and membership fees from its subscribers
|
|||
|
in return for access to the publications. CompuServe and companies like
|
|||
|
it are at the forefront of the information industry revolution. High
|
|||
|
technology has markedly increased the speed with which information is
|
|||
|
gathered and processed; it is now possible for an individual with a
|
|||
|
personal computer, modem, and telephone line to have instantaneous
|
|||
|
access to thousands of news publications from across the United States
|
|||
|
and around the world. While CompuServe may decline to carry a given
|
|||
|
publication altogether, in reality, once it does decide to carry a given
|
|||
|
publication, it will have little or no editorial control over that
|
|||
|
publication's contents. This is especially so when CompuServe carries
|
|||
|
the publication as part of a forum that is managed by a company
|
|||
|
unrelated to CompuServe. "... CompuServe has no more editorial control
|
|||
|
over ... [the publication in question] ... than does a public library,
|
|||
|
book store, or newsstand, and it would be no more feasible for
|
|||
|
CompuServe to examine every publication it carries for potentially
|
|||
|
defamatory statements than it would for any other distributor to do so."
|
|||
|
"...Given the relevant First Amendment considerations, the appropriate
|
|||
|
standard of liability to be applied to CompuServe is whether it knew or
|
|||
|
had reason to know of the allegedly defamatory Rumorville statements."
|
|||
|
|
|||
|
Cubby, Inc. v. CompuServe, Inc. (90 Civ. 6571, SDNY)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 09 Jan 92 15:54:48 -0600
|
|||
|
From: CuD Moderators (tk0jut2@mvs.cso.niu.edu)
|
|||
|
Subject: File 9--Senate Introduces Two FOIA Bills, S. 1929 & S. 1940
|
|||
|
|
|||
|
The latest (Vol. 16, #4, Dec., 1991) issue of _First Principles_
|
|||
|
reports on the status of two Freedom of Information Act (FOIA) bills
|
|||
|
introduced in the Senate in late 1991. The proposed amendments would
|
|||
|
make it easier for citizens to obtain information, but more
|
|||
|
importantly, would expand the availability of information in electronic
|
|||
|
form. The following is abstracted from the article, "Senate
|
|||
|
Introduces New FOIA Bills" (pp 6, 9), by Gary M. Stern.
|
|||
|
|
|||
|
Senator Patrick Leahy (D-VT) introduced two bills to amend the
|
|||
|
Freedom of Information Act: S. 1939, the "Freedom of Information
|
|||
|
Improvement Act of 1991," and S. 1940, the "Electronic Freedom of
|
|||
|
Information Improvement Act of 1991 (cosponsored by Hank Brown
|
|||
|
(R-CO)). The latter bill, in particular, presents the best
|
|||
|
opportunity in many years to enact significant FOIA reforms.
|
|||
|
|
|||
|
S. 1940 would require the government to respond to FOIA requests
|
|||
|
in electronic form as well as on paper. Section 4 of the bill
|
|||
|
states that "(a)n agency shall provide records in any form in
|
|||
|
which such records are maintained by that agency as requested by
|
|||
|
any person. (C)An agency shall make resonable efforts to provide
|
|||
|
records in an electronic form requested by any person, even where
|
|||
|
such records are not usually maintained in such form." Section 3
|
|||
|
of the bill would make the Federal Register accessible electronically
|
|||
|
and would require each government agency to publish an index of
|
|||
|
all information retrievable in electronic form, to describe all
|
|||
|
databases used by the agency, and to list all statutes that the
|
|||
|
agency uses to withhold information under exemption (b)(3).
|
|||
|
|
|||
|
In addition, S. 1940 would:
|
|||
|
|
|||
|
1) Address the problem of delays in responding to FOIA requests
|
|||
|
2) Require the agency to notify the requester of "the total number
|
|||
|
of denied records and paes considered by the agency
|
|||
|
to have been responsive to the request."
|
|||
|
|
|||
|
S. 1939 would:
|
|||
|
|
|||
|
1) Narrow the scope of exemptions
|
|||
|
2) Broaden the fee waiver and fee reduction requirements
|
|||
|
3) Narrow the exemption concerning law enforcement records
|
|||
|
4) Narrow the exemption to protect financial information
|
|||
|
|
|||
|
The Senate Judiciary Subcommittee on Technology and the Law plans
|
|||
|
to hold hearings on the bills in March, 1992. The ACLU/CNNS is
|
|||
|
organizing a lobbying coalition in support of both of these
|
|||
|
bills. FOr more information, please call Gary Stern at
|
|||
|
202-675-2327.
|
|||
|
|
|||
|
_First Principles_ is published by the Center for National Security
|
|||
|
Studies, 122 Maryland Avenue, NE, Washington, DC 20002.
|
|||
|
Subscriptions are $15/year (and $10 for students). Sample copies
|
|||
|
are available on request.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.02
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|