1032 lines
44 KiB
Plaintext
1032 lines
44 KiB
Plaintext
|
|
||
|
Computer underground Digest Sun Apr 9, 1995 Volume 7 : Issue 28
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Semi-retiring Shadow Archivist: Stanton McCandlish
|
||
|
Intelligent Agent: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Monster Editor: Loch Nesshrdlu
|
||
|
|
||
|
CONTENTS, #7.28 (Sun, Apr 9, 1995)
|
||
|
|
||
|
File 1--CuD FidoNet Distribution Site in Belgium
|
||
|
File 2--GovAccess.114v2:: The Persecution of Phil Zimmermann, American
|
||
|
File 3--In Response to Censorship at University of Memphis (#7.26)
|
||
|
File 4--Cu Digest Header Info (unchanged since 19 Mar, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: 06 Apr 95 17:48:26 +0100
|
||
|
From: Jerome De Greef <Jerome.De.Greef@f759.n291.z2.fidonet.org>
|
||
|
Subject: File 1--CuD FidoNet Distribution Site in Belgium
|
||
|
|
||
|
I'm the sysop of Stratomic BBS (Brussels, Belgium) and I'm connected
|
||
|
to FidoNet (2:291/759). I receive CuD (great thing ;-) ) through
|
||
|
UUCP since Nr 7.15 and it's available via File Request (magic word
|
||
|
'CUD') on my system (unlisted nodes and points welcome). I have even
|
||
|
created a file echo to distribute it to the nodes and points that
|
||
|
poll on my system.
|
||
|
|
||
|
Would it be possible to get the dist site status and to add my system
|
||
|
in the CU Digest Header Info ? I think my system is the only one in
|
||
|
Europe who distribute CuD via File Request so I think it would be a
|
||
|
great thing to inform the european CuD readers that it is possible to
|
||
|
get it from Stratomic BBS (via FREQ or via a connection to the file
|
||
|
echo).
|
||
|
|
||
|
I know there's another Dist Site in Belgium (Virtual Access BBS) but
|
||
|
they are not on FidoNet (so no FREQ) and their CuD collection is not
|
||
|
very up-to-date (I send them some old Nr).
|
||
|
|
||
|
Well, I hope I'll get an answer and... thanks for the work !
|
||
|
|
||
|
Peace...
|
||
|
Jerome
|
||
|
|
||
|
email:
|
||
|
jerome.de.greef@f759.n291.z2.fidonet.org
|
||
|
2:291/759@fidonet.org
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 3 Apr 1995 20:22:53 -0700
|
||
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
|
Subject: File 2--GovAccess.114v2:: The Persecution of Phil Zimmermann, American
|
||
|
|
||
|
This is a copy of my now-available MicroTimes report of a visit from
|
||
|
federal investigators, three days after I publicly critized the FBI and NSA
|
||
|
about a related matter, in an op-ed in the San Francisco Examiner.
|
||
|
|
||
|
Following the report, there are implications as to how similarly-outraged
|
||
|
citizens might take effective action to halt the gross miscarriage of
|
||
|
justice herein detailed.
|
||
|
|
||
|
And there are supplementary thoughts following my visit with a federal
|
||
|
prosecutor who, like the guards at the concentration camps, is just doing
|
||
|
his job.
|
||
|
|
||
|
When I finished it, I could no longer see the keyboard. I was crying -
|
||
|
with frustration and rage and shame that MY nation and MY government could
|
||
|
be doing this.
|
||
|
|
||
|
--jim
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
[Written on March 2nd, this is appearing in the April, 1995, editions of
|
||
|
MicroTimes, with total circulation exceeding 230,000 in California.]
|
||
|
|
||
|
|
||
|
Is Phil Zimmermann being persecuted? Why? By whom? Who's next?
|
||
|
|
||
|
by Jim Warren (c) 1995
|
||
|
345 Swett Road, Woodside CA 94062; email/jwarren@well.com
|
||
|
Permission herewith granted to redistribute-in-full for any nonprofit use.
|
||
|
|
||
|
I write this today, March 2nd, because I envision the possibility of
|
||
|
somehow being enjoined from speaking or writing about this, by a federal
|
||
|
grand jury in San Jose, next Tuesday.
|
||
|
|
||
|
|
||
|
Subpoena follows op-ed
|
||
|
|
||
|
On Wednesday, February 22nd, an op-ed piece that I wrote appeared in the
|
||
|
San Jose Mercury News, captioned, "Encryption could stop computer
|
||
|
crackers." In the wake of massive Internet break-ins, I urged adopting
|
||
|
nationwide, standardized, by-default, end-to-end data-communications and
|
||
|
file encryption using the most-secure scrambling technologies that are
|
||
|
publicly known and published worldwide. I criticized the FBI and NSA
|
||
|
(National Security Agency) for zealously - and successfully - opposing all
|
||
|
such protection, thus seriously endangering innocent citizens and
|
||
|
law-abiding businesses.
|
||
|
On February 26th, a similar op-ed of mine appeared in the Sunday
|
||
|
edition of the combined San Francisco Examiner and San Francisco Chronicle,
|
||
|
emphasizing the unnecessary danger and billions of dollars of losses
|
||
|
resulting from the government's preoccupation with protecting and
|
||
|
greatly-enhancing its evesdropping capabilities.
|
||
|
Three days later, two U.S. Customs Special Agents appeared at my
|
||
|
home, unannounced, and soon handed me a federal grand jury subpoena. I am,
|
||
|
"commanded to appear and testify before the Grand Jury of the United States
|
||
|
District Court," on March 7th.
|
||
|
|
||
|
The subpoena was dated February 27th - the first workday after the Sunday
|
||
|
Examiner's op-ed piece.
|
||
|
Whoever said government is inefficient?
|
||
|
|
||
|
|
||
|
Interview recording prohibited
|
||
|
|
||
|
The agents - two pleasant, businesslike young women - said they were here
|
||
|
about Phil Zimmermann and his encryption software known as PGP, "Pretty
|
||
|
Good Privacy."
|
||
|
I laughed and said, "Oh - okay, come on in," and led them up to my
|
||
|
office, grabbing a tape-recorder along the way.
|
||
|
I sat down and - prominently turning on the recorder - said,
|
||
|
without being confrontational, that I'd like to record the interview.
|
||
|
|
||
|
Woppps! - flag on the play. They said they would want to take a copy of the
|
||
|
tape with them when they left. That was fine with me, so I turned off my
|
||
|
recorder and went for a second recorder from my car.
|
||
|
Drat! - I wish I'd left the recorder running, because when I
|
||
|
returned, they had decided they needed approval from Assistant U.S.
|
||
|
Attorney Bill Keane, the AUSA in charge of investigating Zimmermann and
|
||
|
PGP.
|
||
|
They called Keane. He was out. They left a message, then said that
|
||
|
- in the absence of his approval - they would have to forego the interview,
|
||
|
and made motions to leave. I was curious about what they wanted, and it
|
||
|
occurred to me that I probably couldn't record my testimony before the
|
||
|
grand jury, anyway. So after some discussion, we agreed not to record. In
|
||
|
the process, they offered to allow me to copy their interview notes - which
|
||
|
I thought was a rather-neat show of good faith.
|
||
|
However, before we began, the senior agent looked at me with a
|
||
|
moment of clear hesitancy and suspicion, and asked several times that I
|
||
|
verify that our conversation was not being recorded. I did, pointing out
|
||
|
that it would be a criminal misdemeanor - in California - if I recorded
|
||
|
them in this private place without their knowledge.
|
||
|
Part-way through the interview, Keane returned his agent's call. I
|
||
|
asked if he say why we couldn't record the interview, with both of us
|
||
|
having a tape. He said only that he didn't wish to have it done.
|
||
|
|
||
|
Apparently we citizens aren't the only ones who are paranoid.
|
||
|
|
||
|
|
||
|
Realworld Big Brother
|
||
|
|
||
|
The interview was relaxed, candid and cordial. The agents said they were
|
||
|
just seeking the facts of what actually happened - to wit:
|
||
|
|
||
|
On April 10, 1991, shortly after the Gulf War, a message from
|
||
|
WHMurray@DOCKMASTER.NCSC.MIL cascaded across the computer nets, warning
|
||
|
about one sentence in buried in a massive "anti-terrorism" bill authored by
|
||
|
Senators Biden and DeConcini. Their Senate Bill 266 declared, "It is the
|
||
|
sense of Congress that providers of electronic communications services and
|
||
|
manufacturers of electronic communications service equipment shall ensure
|
||
|
that communications systems permit the government to obtain the plain text
|
||
|
contents of voice, data, and other communications when appropriately
|
||
|
authorized by law."
|
||
|
Bill Murray, then a computer-security consultant to the NSA, wrote:
|
||
|
"The referenced language requires that manufacturers build
|
||
|
trap-doors into all cryptographic equipment and that providers of
|
||
|
confidential channels reserve to themselves, their agents, and assigns the
|
||
|
ability to read all traffic.
|
||
|
"Are there readers of this list that believe that it is possible
|
||
|
for manufacturers of crypto gear to include such a mechanism and also to
|
||
|
reserve its use to those "appropriately authorized by law" to employ it?
|
||
|
"Are there readers of this list who believe that providers of
|
||
|
electronic communications services can reserve to themselves the ability to
|
||
|
read all the traffic and still keep the traffic "confidential" in any
|
||
|
meaningful sense?
|
||
|
"Is there anybody out there who would buy crypto gear or
|
||
|
confidential services from vendors who were subject to such a law?
|
||
|
"David Kahn asserts that the sovereign always attempts to reserve
|
||
|
the use of cryptography to himself. Nonetheless, if this language were to
|
||
|
be enacted into law, it would represent a major departure. An earlier
|
||
|
Senate went to great pains to assure itself that there were no trapdoors in
|
||
|
the DES [federally-adopted Data Encryption Standard]. Mr. Biden and Mr.
|
||
|
DeConcini want to mandate them.
|
||
|
"The historical justification of such reservation has been
|
||
|
"national security;" just when that justification begins to wane, Mr. Biden
|
||
|
wants to use "law enforcement." Both justifications rest upon appeals to
|
||
|
fear.
|
||
|
"In the United States the people, not the Congress, are sovereign;
|
||
|
it should not be illegal for the people to have access to communications
|
||
|
that the government cannot read. We should be free from unreasonable search
|
||
|
and seizure; we should be free from self-incrimination.
|
||
|
"The government already has powerful tools of investigation at its
|
||
|
disposal; it has demonstrated precious little restraint in their use.
|
||
|
"Any assertion that all use of any such trap-doors would be only
|
||
|
"when appropriately authorized by law" is absurd on its face. It is not
|
||
|
humanly possible to construct a mechanism that could meet that requirement;
|
||
|
any such mechanism would be subject to abuse.
|
||
|
"I suggest that you begin to stock up on crypto gear while you can
|
||
|
still get it."
|
||
|
|
||
|
The net went ballistic over this Orwellian mandate.
|
||
|
|
||
|
|
||
|
PGP - Pretty Good Privacy
|
||
|
|
||
|
Prior to this, Phil Zimmermann, a sometime cryptographer and small computer
|
||
|
consultant near the University of Colorado in Boulder, had been developing
|
||
|
a PC implementation of public-key encryption, as described in the open
|
||
|
literature, published worldwide more than a decade earlier. He had idle
|
||
|
thoughts of possibly making it available as shareware, perhaps for
|
||
|
educational purposes for fellow crypto hobbyists. He called it, "PGP" -
|
||
|
Pretty Good Privacy.
|
||
|
But public-key crypto using any reasonably-robust key-sizes is
|
||
|
reputed to be uncrackable. And intentionally building a back-door into a
|
||
|
beautiful crypto implementation is about like welding a tractor tire on the
|
||
|
back of a classic '63 Corvette - obscene!
|
||
|
|
||
|
Kelly Goen, located in the San Francisco Bay area, was also interested in
|
||
|
crypto. He and Zimmermann became acquainted - as is common among technoids
|
||
|
with similar interests. In that context, Zimmermann apparently gave Goen a
|
||
|
copy of PGP - also common behavior among us propeller-heads.
|
||
|
|
||
|
|
||
|
S. 266 goads guerrilla crypto
|
||
|
|
||
|
When Murray's message flashed across the nets, thousands of us were
|
||
|
infuriated - and frightened. In the wake of the Gulf War, S. 266 seemed
|
||
|
likely to become law, permanently prohibiting Americans from having the
|
||
|
privacy protection that technology could easily provide.
|
||
|
S. 266 would also prohibit PGP - at least in any respectable form.
|
||
|
So - with more than a little of the spirit of freedom that is the
|
||
|
heritage of all Americans - and the help citizens "stock up on crypto gear
|
||
|
while you still can," it was decided to make this privacy protection tool
|
||
|
available to everyone, immediately. Goen would upload copies - fully
|
||
|
annotated sources, binaries and documentation - to as many BBSs (bulletin
|
||
|
board systems) and host-computers around the United States as possible.
|
||
|
Zimmermann agreed - especially since S. 266 would soon outlaw PGP.
|
||
|
|
||
|
|
||
|
A night-time call
|
||
|
|
||
|
Goen sent email to MicroTimes on May 24th, saying, "the intent here is to
|
||
|
invalidate the socalled trap-door provision of the new senate bill coming
|
||
|
down the pike before it has a possibility of making it into law." He said
|
||
|
we could publish details about it, "provided of course mum is the word
|
||
|
until the code is actually flooded to the networks at large."
|
||
|
He also called me - as a MicroTimes columnist, and probably because
|
||
|
I had organized the recently-completed First Conference on Computers,
|
||
|
Freedom & Privacy, or maybe because of my comments on the net critical of
|
||
|
the S. 266 mandate.
|
||
|
I had several conversations with Goen, and later with Zimmermann -
|
||
|
who seemed more passive about the project. Now, four years after the fact,
|
||
|
this is re-constructed from random notes I took at the time, plus my
|
||
|
recollections - some of which remain quite vivid.
|
||
|
|
||
|
|
||
|
D-Day, defending freedom
|
||
|
|
||
|
On a weekend around the first of June, Goen began uploading complete PGP to
|
||
|
systems around the U.S. He called several times, telling me his progress.
|
||
|
He was driving around the Bay Area with a laptop, acoustic coupler
|
||
|
and a cellular phone. He would stop at a pay-phone; upload a number of
|
||
|
copies for a few minutes, then disconnect and rush off to another phone
|
||
|
miles away.
|
||
|
He said he wanted to get as many copies scattered as widely as
|
||
|
possible around the nation before the government could get an injunction
|
||
|
and stop him.
|
||
|
|
||
|
I thought he was being rather paranoid. In light of the following, perhaps
|
||
|
he was just being realistic.
|
||
|
|
||
|
|
||
|
Government counter-attacks
|
||
|
|
||
|
About two years after the PGP uploads, the government began threatening to
|
||
|
prosecute Zimmermann for illegal trafficking in munitions - cryptography.
|
||
|
[He was first visited by U.S. Customs agents on Feb. 17, 1993.] For more
|
||
|
than two years, they have been investigating whether he "exported" PGP. It
|
||
|
appears at press-time that they will probably prosecute him.
|
||
|
The allegation seems to be that, since he permitted someone else -
|
||
|
over whom he had no control anyway - to upload PGP to some Internet hosts
|
||
|
inside the United States, Zimmermann thus exported this controlled
|
||
|
munition!
|
||
|
This ignores the fact that most of those same Internet hosts also
|
||
|
have DES crypto software from AT&T, Sun, SCO and BSD, part of their
|
||
|
standard domestic Unix systems. The DES is under the same export
|
||
|
prohibition as PGP. The same is true for RSA's public-key crypto tools that
|
||
|
reside on thousands of Internet hosts around the nation.
|
||
|
This bizarre lunacy also ignores that public-key was published,
|
||
|
worldwide, fifteen years ago, and is available from numerous foreign
|
||
|
software competitors including entrepreneurs in former Easter Bloc
|
||
|
countries - as is the DES.
|
||
|
|
||
|
Based on what they told me at the time and everything I've learned since then:
|
||
|
Zimmermann never even uploaded PGP files for public access.
|
||
|
Goen studiously limited his uploads to U.S. systems, as permitted
|
||
|
by law and routinely done with identically-regulated AT&T and RSA software.
|
||
|
They certainly didn't care about exporting PGP. Hell, most of the
|
||
|
rest of the world already purchases public-key products from numerous
|
||
|
vendors except U.S. companies.
|
||
|
|
||
|
They did want to pre-empt S. 266 before it became law - just as millions of
|
||
|
people do all the time regarding all sorts of pending legislation. And the
|
||
|
offending mandate was later deleted from S. 266, anyway.
|
||
|
Zimmermann and Goen wanted to protect this nation's citizens. S.
|
||
|
266 wasn't threatening other nation's citizens; it was threatening
|
||
|
Americans!
|
||
|
|
||
|
|
||
|
Why the persecution?
|
||
|
|
||
|
Some apologists say the government is just trying to clarify the law. Bull!
|
||
|
If that's what they want, they should investigate and prosecute
|
||
|
AT&T or Sun or SCO or RSA. Each makes millions peddling systems to U.S.
|
||
|
Internet host-owners that include identically-controlled crypto modules,
|
||
|
particularly including RSA public-key packages that are at-least as
|
||
|
powerful as PGP.
|
||
|
But thugs don't pick on targets that can defend themselves. Goons
|
||
|
go for the frail and weak and helpless - like Phil Zimmermann.
|
||
|
|
||
|
Maybe this is a rogue prosecutor trying to make a name for himself. But
|
||
|
apparently Keane can't seek a grand jury indictment for this "crime"
|
||
|
without clearance from the Department of Justice in Washington.
|
||
|
|
||
|
Maybe it's just our government wasting thousands of staff hours and
|
||
|
millions of dollars to publicly flog Zimmermann as a lesson to any other
|
||
|
pissant citizen who dares to do what AT&T, Sun and RSA can do with
|
||
|
impunity.
|
||
|
|
||
|
This appears to be nothing less than an arrogant, oppressive government
|
||
|
using all of its might and all of its power to flail and torture one poor
|
||
|
citizen, to teach him that he is dirt and intimidate everyone else.
|
||
|
|
||
|
Is this what our nation has become? Is this the America we want?
|
||
|
|
||
|
|
||
|
Coincidental subpoena?
|
||
|
|
||
|
As a footnote, I must say that my initial assumption was that the agents'
|
||
|
arrival two days after my op-ed piece appeared was simply coincidental -
|
||
|
that they were just-now getting around to tying-up loose ends of this
|
||
|
wasteful multi-year investigation. They said they were responding to a
|
||
|
letter I had sent to the grand jury a year or two earlier, when I first
|
||
|
heard they were investigating Zimmermann.
|
||
|
As I write this, and try to maintain some slight semblance of
|
||
|
reason, about half the time I think the timing was accidental - and half
|
||
|
the time I think I'm being naive.
|
||
|
|
||
|
|
||
|
A frightening experience
|
||
|
|
||
|
But I gotta tell ya, I awakened hours before dawn this morning, wondering
|
||
|
if somehow I was going to be the next victim of this governmental
|
||
|
obscenity. The government's stated policy is to attack opponents with
|
||
|
overpowering force. They are certainly doing that to Zimmermann.
|
||
|
I feel threatened and intimidated - and furious and outraged that
|
||
|
it should be happening in MY nation, prosecuted by MY government.
|
||
|
|
||
|
I cry for what Phil Zimmermann must be going through. He had little
|
||
|
financial resources to begin with; this has already cost him, dearly. For
|
||
|
almost two years, he has been under the horrifying threat of wasting all of
|
||
|
his assets including his home, just to defend himself against the
|
||
|
outrageous abuse of a federal government that will go to any expense to
|
||
|
"win."
|
||
|
And if Zimmermann looses, he goes to prison for years of mandatory
|
||
|
incarceration. When he comes out, his young daughter will be a teen-ager.
|
||
|
All because he dared to write a cryptographic program that the government
|
||
|
couldn't crack, that someone else made available to U.S. citizens.
|
||
|
|
||
|
If there is any justice remaining in this nation, this screams out for
|
||
|
immediate redress!
|
||
|
|
||
|
Folks who care can send much-needed donations to the Zimmermann legal
|
||
|
defense fund in care of his attorney, Phil DuBois, 2305 Broadway, Boulder
|
||
|
CO 80304; 303-444-3885; dubois@csn.org .
|
||
|
|
||
|
---
|
||
|
|
||
|
Warren has received the Hugh M. Hefner First Amendment Award (1994), the
|
||
|
James Madison Freedom-of-Information Award from the Society of Professional
|
||
|
Journalists - Northern California (1994) and the Electronic Frontier
|
||
|
Foundation Pioneer Award in its first year (1992). He led the successful
|
||
|
1993 effort to make state legislation and statutes available via the public
|
||
|
nets without state charge and organized and chaired the landmark First
|
||
|
Conference on Computers, Freedom & Privacy (1991).
|
||
|
He founded InfoWorld, was founding host of PBS' "Computer
|
||
|
Chronicles," founding editor of Dr. Dobb's Journal, and has chaired various
|
||
|
computer and mathematics organizations. He holds graduate degrees in
|
||
|
computing (Stanford), medical information science (UC Medical Center) and
|
||
|
mathematics & statistics, began working as a programmer in 1968, and was a
|
||
|
mathematics teacher and professor for ten years before that. He also serves
|
||
|
on Autodesk's Board of Directors.
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
Give Us Your Poor, Your Weak ... for Harassment & Intimidation
|
||
|
|
||
|
Copies of other cryptographic software that fall under exactly the same
|
||
|
export controls and prohibitions as PGP - sold by Hewlett-Packard, AT&T,
|
||
|
Sun, SGI, SCO, BSD, etc. - as part of their standard domestic Unix systems
|
||
|
are available on hundreds of thousands of host-computers connected to the
|
||
|
global Internet in the United States. ViaCrypt in Phoenix AZ sells copies
|
||
|
of PGP. MIT provides several versions of PGP - including full source-code
|
||
|
- for free downloading from one of their Internet host computers. US News
|
||
|
and World Reports' Vic Sussman tells me a copy is on Compu$erve.
|
||
|
|
||
|
The prosecutor knows this; I have discussed it with him.
|
||
|
|
||
|
But there is no attempt to indict AT&T, Sun, H-P, SGI, SCO, BSD, etc.
|
||
|
There is no attempt to prosecute MIT or CompuServe for continuing to make
|
||
|
what Phil created freely available via the Internet and CPN. After all,
|
||
|
Compu$erve has a warning in capital letters saying that CI$ customers
|
||
|
outside of the U.S. should not download it. ViaCrypt is not being
|
||
|
investigated for selling PGP throughout the nation - not even to computer
|
||
|
stores located near the Iranian or North Korean Consulates. MIT restricts
|
||
|
access: A PGP recipient must first type "yes" to four questions, and may
|
||
|
have to connect to MIT through one of the more-than-two-million Internet
|
||
|
host-computers in the U.S., by telnet if they are outside the nation.
|
||
|
|
||
|
But PGP's creator - who is not known to have uploaded *any* copies for
|
||
|
public access - and his aquaintance, are the only ones being investigated.
|
||
|
|
||
|
|
||
|
Most of the remainder of this edition of GovAccess details what I know -
|
||
|
and opine (!!) - of why Washington is spending hundreds of thousands of
|
||
|
tax-dollars and thousands of limited staff hours of experienced
|
||
|
investigators and talented legal professionals on this lunatic persecution.
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
A Grand Jury is Usually the Lapdog of the Prosecutor - BUT ...
|
||
|
|
||
|
There are at least three members of this grand jury who have Internet
|
||
|
accounts, according to cryptographer Charlie Merritt who was testifying
|
||
|
before them and asked them. And the grand jury has been assembled in the
|
||
|
heart of Silicon Valley.
|
||
|
|
||
|
The best address that I can think of for the federal grand jury - composed
|
||
|
of concerned citizens - from which Keane is seeking this indictment, is:
|
||
|
|
||
|
Fore-person and Members
|
||
|
Federal Grand Jury in the Zimmermann/Goen case
|
||
|
280 S. First St.
|
||
|
San Jose CA 95113
|
||
|
|
||
|
I'm told that there are about 25 members, and I doubt that they have a
|
||
|
copier in the grand jury room.
|
||
|
|
||
|
I don't know whether Keane would be violating postal regulations if he
|
||
|
opened and withheld from those addressees, first-class mail addressed in
|
||
|
this manner. I have no evidence to believe that he would withhold it.
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
Washington is Often Not Involved in a Local Prosecution - BUT ...
|
||
|
|
||
|
My assumption is that Keane is being directed to persecute <sic> this
|
||
|
investigation by his superiors in Washington - that it wouldn't be
|
||
|
happening if Washington didn't want it. When I said that to him, he told
|
||
|
me only that his superiors in Washington are kept informed of his actions
|
||
|
and the progress on the case - as one would certainly hope. In fact, I'm
|
||
|
told that he cannot seek an indictment in this kind of case without
|
||
|
approval from Washington.
|
||
|
|
||
|
He's a good lieutenant. Personally, I think he's doing what he's told.
|
||
|
|
||
|
Keane's most-senior superior in the Department of Justice is:
|
||
|
Unived States Attorney General Janet Reno
|
||
|
Department of Justice, Room 5111
|
||
|
10th St & Constitution Ave NW
|
||
|
Washington DC 20530
|
||
|
fax/202-514-4371
|
||
|
My belief is that USAG Reno *does* have the authority to stop this idiocy.
|
||
|
|
||
|
Keane's ultimate superior is:
|
||
|
President Bill Clinton
|
||
|
1600 Pennsylvania Ave
|
||
|
Washington DC 20500
|
||
|
fax/202-456-2461
|
||
|
president@whitehouse.gov
|
||
|
His official, public response would undoubtedly be that he should not get
|
||
|
involved in an ongoing criminal investigation.
|
||
|
|
||
|
But BYTE columnist and sci fi writer Jerry Pournelle has pointed out that
|
||
|
that's absolute nonsense.
|
||
|
|
||
|
1. Our elected officials damn-well *better* be in charge of their
|
||
|
bureaucrats. And if this President isn't, he needs to be replaced.
|
||
|
2. The President certainly has the power to pardon and halt criminal
|
||
|
investigations before-the-fact, as Gerald Ford illustrated with Nixon.
|
||
|
|
||
|
Much of Pournelle's June column in BYTE will focus on this case. Pournelle
|
||
|
is urging that the President simply pardon Zimmermann for any possible
|
||
|
wrong-doing, and let him get back to his family and on with his life.
|
||
|
[announced here with Jerry's explicit prior permission]
|
||
|
|
||
|
So what do *you* think?
|
||
|
|
||
|
Don't tell me - tell the folks, above, who *can* make a difference.
|
||
|
|
||
|
--jim
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
Later Thoughts - After Meeting with Asst US Attorney Keane on Friday, 3/10
|
||
|
|
||
|
On Monday, 3/6, before I was to appear for the grand jury on the following
|
||
|
day, I finally reached Keane. He agreed that I did not need to come down
|
||
|
for the grand jury (now why do I think he wouldn't want me speaking to his
|
||
|
lap-dog? :-), and we agreed instead, that I would come in for an interview
|
||
|
with him and his agents at the end of the week.
|
||
|
|
||
|
As soon as we began, he volunteered that he didn't anticipate that I had
|
||
|
any exposure and didn't consider me a target of their investigation. I
|
||
|
appreciated that. He also said he would tell me if that changed. Oh.
|
||
|
|
||
|
We met for about four hours (folks rarely accuse me of brevity). I was
|
||
|
completely candid, and told them all of the above and lots more - including
|
||
|
most of the opinions ... with which he was very patient. <grin>
|
||
|
|
||
|
I found Keane reasonable, attentive, even-handed and probably a very good
|
||
|
prosecutor (and we *need* good prosecutors). However, my impression was
|
||
|
that he had rather-limited understanding of the nets - e.g., he'd never
|
||
|
even heard of Fidonet, and seemed convinced that the primary way that PGP
|
||
|
was distributed was by USENET from the WELL! (He said that's why they are
|
||
|
pursuing the investigation in California rather than back in Colorado.)
|
||
|
|
||
|
I continued to be favorably impressed by the Customs investigators, and I
|
||
|
honestly don't think Keane is one of the bad guys - though I suspect that
|
||
|
he may be too focused on on the nitty-gritty of seeking evidence for
|
||
|
prosecution, and too-little focused on seeking principled, equitable
|
||
|
*Justice*.
|
||
|
|
||
|
The fact is, I honestly feel a bit sorry for him - because I think he's a
|
||
|
good prosecutor, and I believe Washington is telling him to pursue this
|
||
|
case, which is probably turning into a public relations debacle as its
|
||
|
capricious injustice becomes more and more clear ... and it's Bill Keane's
|
||
|
name and reputation that is going to be trashed.
|
||
|
|
||
|
The real responsibility lies with the anonymous Washington gang, who never
|
||
|
have to face their victims, who are blindly intent on intimidating all of
|
||
|
us by making an example of Zimmermann - just like street-thugs always pick
|
||
|
the frail and weak to terrorize, so as to intimidate a community into
|
||
|
submission.
|
||
|
|
||
|
The only difference is that this time, the community can't turn to the
|
||
|
law-enforcement officials for help.
|
||
|
|
||
|
I told Keane that, okay, WE GOT THE MESSAGE.
|
||
|
|
||
|
|
||
|
God!, I'm ashamed of my government's myopic, self-serving leadership.
|
||
|
|
||
|
|
||
|
&&&&&&&&&&&&&&&&&&&&
|
||
|
|
||
|
|
||
|
Trial attorneys - prosecutors and defense - too-often seem more interested
|
||
|
in "winning" the trial "game" than they are interested in Truth or Justice.
|
||
|
Too-often, they excuse such immorality by saying that the costly, abusive,
|
||
|
terrifying adversarial system will assure Truth and Justice.
|
||
|
|
||
|
Attorneys are the gun-slingers of the 20th Century - but only their clients
|
||
|
get shot.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: kadie@SAL.CS.UIUC.EDU(Carl M Kadie)
|
||
|
Subject: File 3--In Response to Censorship at University of Memphis (#7.26)
|
||
|
Date: 3 Apr 1995 16:59:11 GMT
|
||
|
|
||
|
>>Apparently the motivation behind David Hooper's case was a thing called
|
||
|
>>"Title IX", which requires the school to provide an environment free of
|
||
|
>>sexual or racial hostility.
|
||
|
|
||
|
This alt.comp.acad-freedom.talk FAQ file seem relevant:
|
||
|
|
||
|
=========== ftp://ftp.eff.org/pub/CAF/faq/censorship-and-harassment =========
|
||
|
q: Must/should universities ban material that some find offensive
|
||
|
(from Netnews facilities, email, libraries, and student publications,
|
||
|
etc) in order to comply with antiharassment laws?
|
||
|
|
||
|
a: No. U.S. federal courts have said that harassing speech is
|
||
|
different from offensive speech. While face-to-face harassment can be
|
||
|
prohibited, mere offensive speech is protected by the principles of
|
||
|
academic freedom and, at state universities, by the Constitution.
|
||
|
|
||
|
The courts have also said that that it is unconstitutional at state
|
||
|
universities to base campus speech restrictions on EEOC rules. Here is
|
||
|
part of a decision:
|
||
|
|
||
|
==============Excerpt uwm-post-v-u-of-wisconsin ==========
|
||
|
|
||
|
(3) PARALLEL TO TITLE VII LAW
|
||
|
The Board of Regents argues that this Court should find the UW Rule
|
||
|
constitutional because its prohibition of discriminatory speech which creates a
|
||
|
hostile environment has parallels in the employment setting. The Board notes
|
||
|
that, under Title VII, an employer has a duty to take appropriate corrective
|
||
|
action when it learns of pervasive illegal harassment. See Meritor Savings
|
||
|
Bank v. Vinson, 477 U.S. 57, 72 (1986).
|
||
|
The Board correctly states Title VII law. However, its argument regarding
|
||
|
Title VII law has at least three difficulties. First, Title VII addresses
|
||
|
employment, not educational, settings. Second, even if Title VII governed
|
||
|
educational settings, the Meritor holding would not apply to this case. The
|
||
|
Meritor Court held that courts should look to agency principles when
|
||
|
determining whether an employer is to be held liable for its employee's
|
||
|
actions. See id. Since employees may act as their employer's agents, agency
|
||
|
law may hold an employer liable for its employees actions. In contrast, agency
|
||
|
theory would generally not hold a school liable for its students' actions since
|
||
|
students normally are not agents of the school. Finally, even if the legal
|
||
|
duties set forth in Meritor applied to this case, they would not make the UW
|
||
|
Rule constitutional. Since Title VII is only a statute, it cannot supersede
|
||
|
the requirements of the First Amendment.
|
||
|
============================
|
||
|
|
||
|
The intellectual freedom principles developed by libraries offer some
|
||
|
guidance. The American Library Association statement on Challenged
|
||
|
Materials says: "Freedom of expression is protected by the
|
||
|
Constitution of the United States, but constitutionally protected
|
||
|
expression is often separated from unprotected expression only by a
|
||
|
dim and uncertain line. The Constitution requires a procedure
|
||
|
designed to focus searchingly on challenged expression before it can
|
||
|
be suppressed. An adversary hearing is a part of this procedure."
|
||
|
|
||
|
Private institutions are legally free to violate the standards set by
|
||
|
the Constitution and academic freedom. They should not, however, try
|
||
|
to justify their violations with appeals to government rules.
|
||
|
|
||
|
- Carl
|
||
|
|
||
|
ANNOTATED REFERENCES
|
||
|
|
||
|
(All these documents are available on-line. Access information follows.)
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/academic/speech-codes.aaup">
|
||
|
academic/speech-codes.aaup
|
||
|
=================</a>
|
||
|
* Speech Codes (AAUP)
|
||
|
|
||
|
On Freedom of Expression and Campus Speech Codes Expression - An
|
||
|
official statement of the American Association of University
|
||
|
Professors (AAUP)
|
||
|
|
||
|
It says in part: "On a campus that is free and open, no idea can be
|
||
|
banned or forbidden. No viewpoint or message may be deemed so hateful
|
||
|
or disturbing that it may not be expressed."
|
||
|
|
||
|
=================<a
|
||
|
href="ftp://ftp.eff.org/pub/CAF/law/uwm-post-v-u-of-wisconsin">
|
||
|
law/uwm-post-v-u-of-wisconsin
|
||
|
=================</a>
|
||
|
* Expression -- Hate Speech -- UWM Post v. U Of Wisconsin
|
||
|
|
||
|
The full text of UWM POST v. U. of Wisconsin. This recent district
|
||
|
court ruling goes into detail about the difference between protected
|
||
|
offensive expression and illegal harassment. It even mentions email.
|
||
|
|
||
|
It concludes: "The founding fathers of this nation produced a
|
||
|
remarkable document in the Constitution but it was ratified only with
|
||
|
the promise of the Bill of Rights. The First Amendment is central to
|
||
|
our concept of freedom. The God-given "unalienable rights" that the
|
||
|
infant nation rallied to in the Declaration of Independence can be
|
||
|
preserved only if their application is rigorously analyzed.
|
||
|
|
||
|
The problems of bigotry and discrimination sought to be addressed here
|
||
|
are real and truly corrosive of the educational environment. But
|
||
|
freedom of speech is almost absolute in our land and the only
|
||
|
restriction the fighting words doctrine can abide is that based on the
|
||
|
fear of violent reaction. Content-based prohibitions such as that in
|
||
|
the UW Rule, however well intended, simply cannot survive the
|
||
|
screening which our Constitution demands."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/doe-v-u-of-michigan">
|
||
|
law/doe-v-u-of-michigan
|
||
|
=================</a>
|
||
|
* Expression -- Hate Speech -- Doe v. U of Michigan
|
||
|
|
||
|
This is Doe v. University of Michigan. In this widely referenced
|
||
|
decision, the district judge down struck the University's rules
|
||
|
against discriminatory harassment because the rules were found to be too
|
||
|
broad and too vague.
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/broadrick-v-oklahoma">
|
||
|
law/broadrick-v-oklahoma
|
||
|
=================</a>
|
||
|
* Expression -- Vague Regulation -- Broadrick v. Oklahoma, et al.
|
||
|
|
||
|
Summary of case law on overly vague regulation of expression. It says
|
||
|
a statute is unconstitutionally vague when "men of common intelligence
|
||
|
must necessarily guess at its meaning."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/naacp-v-button">
|
||
|
law/naacp-v-button
|
||
|
=================</a>
|
||
|
* Expression -- Overbroad Regulation -- NAACP v. Button, et al.
|
||
|
|
||
|
Summary of case law on overly broad regulation of expression. It says
|
||
|
"[b]ecause First Amendment freedoms need breathing space to survive,
|
||
|
government may regulate in the area only with narrow specificity."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/pd-of-chicago-v-mosley">
|
||
|
law/pd-of-chicago-v-mosley
|
||
|
=================</a>
|
||
|
* Expression -- Content Regulation -- Police Department of Chicago v. Mosley
|
||
|
|
||
|
Summary of case law on content-based regulation of expression. It says
|
||
|
that "above all else, the First Amendment means that government has no
|
||
|
power to restrict expression because of its message, its ideas, its
|
||
|
subject matter, or its content."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/rav-v-st-paul.1">
|
||
|
law/rav-v-st-paul.1
|
||
|
=================</a>
|
||
|
* Expression -- Hate Speech -- RAV v. St Paul -- 1
|
||
|
|
||
|
The Supreme Court's _R.A.V. v. City of St. Paul_ decision about hate crimes.
|
||
|
|
||
|
The Court overturned St. Paul's Bias-Motivated Crime Ordinance, which
|
||
|
prohibits the display of a symbol which one knows or has reason to
|
||
|
know "arouses anger, alarm or resentment in others on the basis of
|
||
|
race, color, creed, religion or gender."
|
||
|
|
||
|
By 9-0, the Court said the law as overly broad. By 5-4, the Court said
|
||
|
that the law was also unfairly selective because it only tried to protect
|
||
|
some groups.
|
||
|
|
||
|
Included: summary, majority opinion, 3 concurring opinions.
|
||
|
|
||
|
=================<a
|
||
|
href="ftp://ftp.eff.org/pub/CAF/law/young-conservatives-v-sau">
|
||
|
law/young-conservatives-v-sau
|
||
|
=================</a>
|
||
|
* Expression -- Offensive -- Young Conservatives v. SAU
|
||
|
|
||
|
A UPI story that tells how Stephen F. Austin University originally
|
||
|
banned a group's "sexist" flyers, but when challenged, the ban was
|
||
|
lifted and a cash settlement was given to the students whose
|
||
|
free-speech was violated by the ban.
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.1">
|
||
|
law/cohen-v-california.1
|
||
|
=================</a>
|
||
|
* Expression -- Offensive -- Cohen v. California -- 1
|
||
|
|
||
|
Definition of "fighting words"; why no right not to be offended
|
||
|
|
||
|
The definition of fighting words from _Chaplinsky v. New Hampshire_
|
||
|
and then _Cohen v. California_. Also, says quotes the Supreme Court
|
||
|
saying that there is no universal right to not hear offensive
|
||
|
expression.
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.2">
|
||
|
law/cohen-v-california.2
|
||
|
=================</a>
|
||
|
* Expression -- Offensive -- Cohen v. California -- 2
|
||
|
|
||
|
Netnews article with reference _Cohen v. California_, "in which the
|
||
|
court ruled that Cohen's jacket, which stated "Fuck the Draft" was a
|
||
|
protected form of free speech, even though he wore it in a county
|
||
|
courthouse."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.3">
|
||
|
law/cohen-v-california.3
|
||
|
=================</a>
|
||
|
* Expression -- Offensive -- Cohen v. California -- 3
|
||
|
|
||
|
Here are excerpts from several Supreme Court decisions inclusing
|
||
|
_Cohen v. Calfiornia_. They say that offensive public expression is
|
||
|
protected if those offended can "effectively avoid further bombardment
|
||
|
of their sensibilities simply by averting their eyes."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/cohen-v-california.4">
|
||
|
law/cohen-v-california.4
|
||
|
=================</a>
|
||
|
* Expression -- Regulation of Tone -- Cohen v. California -- 4
|
||
|
|
||
|
A short quote from _Cohen v. California_: "We cannot sanction the view
|
||
|
that the constitution, while solicitous of the cognitive content of
|
||
|
individual speech, has little or no regard for that emotive function
|
||
|
which, practically speaking, may often be the more important element
|
||
|
of the overall message sought to be communicated."
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/law/quiet-reading">
|
||
|
law/quiet-reading
|
||
|
=================</a>
|
||
|
* Expression -- Harassment -- Quiet Reading of _Playboy_
|
||
|
|
||
|
Excerpts from a newspaper report that a federal district judge has
|
||
|
said that "quiet reading" of a _Playboy_ magazine by a firefighter
|
||
|
does not create a sexually harassing atmosphere. [Editorial comment: I
|
||
|
think this supports the idea that rather banning "porn" from a general
|
||
|
academic computer, it is more appropriate to ban harassment.]
|
||
|
|
||
|
=================<a
|
||
|
href="ftp://ftp.eff.org/pub/CAF/library/challenged-materials.ala">
|
||
|
library/challenged-materials.ala
|
||
|
=================</a>
|
||
|
* Challenged Materials (ALA)
|
||
|
|
||
|
An interpretation by the American Library Association of the "Library
|
||
|
Bill of Rights". It says in part "The Constitution requires a
|
||
|
procedure designed to focus searchingly on challenged expression
|
||
|
before it can be suppressed. An adversary hearing is a part of this
|
||
|
procedure."
|
||
|
|
||
|
=================<a href="http://www.eff.org/CAF/faq/netnews.liability.html">
|
||
|
faq/netnews.liability
|
||
|
=================</a>
|
||
|
* Netnews -- On University Liability for Netnews
|
||
|
|
||
|
q: Does a University reduce its likely liability by screening Netnews
|
||
|
for offensive articles and newsgroups?
|
||
|
|
||
|
a: Not necessarily. By screening articles and newsgroups the
|
||
|
...
|
||
|
|
||
|
=================<a href="http://www.eff.org/CAF/faq/netnews.reading.html">
|
||
|
faq/netnews.reading
|
||
|
=================</a>
|
||
|
* Netnews -- Policies on What Users Read
|
||
|
|
||
|
q: Should my university remove (or restrict) Netnews newsgroups
|
||
|
because some people find them offensive? If it doesn't have the
|
||
|
resources to carry all newsgroups, how should newsgroups be selected?
|
||
|
|
||
|
a: Material should not be restricted just because it is offensive to
|
||
|
...
|
||
|
|
||
|
=================<a href="http://www.eff.org/CAF/faq/computer-porn.html">
|
||
|
faq/computer-porn
|
||
|
=================</a>
|
||
|
* Banning "porn" from university computers
|
||
|
|
||
|
q: Should universities create a rule banning "porn" on university
|
||
|
computers?
|
||
|
|
||
|
a: In my opinion, no. Such a rule would be unnecessary and too broad.
|
||
|
...
|
||
|
|
||
|
q: Should universities create a rule banning "porn" on university
|
||
|
computers?
|
||
|
|
||
|
a: In my opinion, no. Such a rule would be unnecessary and too broad.
|
||
|
...
|
||
|
|
||
|
=================<a href="ftp://ftp.eff.org/pub/CAF/filters.email">
|
||
|
filters.email
|
||
|
=================</a>
|
||
|
* How Unix users can filter out harassing email by themselves
|
||
|
|
||
|
=================
|
||
|
=================
|
||
|
|
||
|
If you have gopher, you can browse the CAF archive with the command
|
||
|
gopher gopher.eff.org
|
||
|
|
||
|
These document(s) are also available by anonymous ftp (the preferred
|
||
|
method) and by email. To get the file(s) via ftp, do an anonymous ftp
|
||
|
to ftp.eff.org (192.77.172.4), and then:
|
||
|
|
||
|
cd /pub/CAF/academic
|
||
|
get speech-codes.aaup
|
||
|
cd /pub/CAF/law
|
||
|
get uwm-post-v-u-of-wisconsin
|
||
|
cd /pub/CAF/law
|
||
|
get doe-v-u-of-michigan
|
||
|
cd /pub/CAF/law
|
||
|
get broadrick-v-oklahoma
|
||
|
cd /pub/CAF/law
|
||
|
get naacp-v-button
|
||
|
cd /pub/CAF/law
|
||
|
get pd-of-chicago-v-mosley
|
||
|
cd /pub/CAF/law
|
||
|
get rav-v-st-paul.1
|
||
|
cd /pub/CAF/law
|
||
|
get young-conservatives-v-sau
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.1
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.2
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.3
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.4
|
||
|
cd /pub/CAF/law
|
||
|
get quiet-reading
|
||
|
cd /pub/CAF/library
|
||
|
get challenged-materials.ala
|
||
|
cd /pub/CAF/faq
|
||
|
get netnews.liability
|
||
|
cd /pub/CAF/faq
|
||
|
get netnews.reading
|
||
|
cd /pub/CAF/faq
|
||
|
get computer-porn
|
||
|
cd /pub/CAF
|
||
|
get filters.email
|
||
|
|
||
|
To get the file(s) by email, send email to ftpmail@decwrl.dec.com
|
||
|
Include the line(s):
|
||
|
|
||
|
connect ftp.eff.org
|
||
|
cd /pub/CAF/academic
|
||
|
get speech-codes.aaup
|
||
|
cd /pub/CAF/law
|
||
|
get uwm-post-v-u-of-wisconsin
|
||
|
cd /pub/CAF/law
|
||
|
get doe-v-u-of-michigan
|
||
|
cd /pub/CAF/law
|
||
|
get broadrick-v-oklahoma
|
||
|
cd /pub/CAF/law
|
||
|
get naacp-v-button
|
||
|
cd /pub/CAF/law
|
||
|
get pd-of-chicago-v-mosley
|
||
|
cd /pub/CAF/law
|
||
|
get rav-v-st-paul.1
|
||
|
cd /pub/CAF/law
|
||
|
get young-conservatives-v-sau
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.1
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.2
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.3
|
||
|
cd /pub/CAF/law
|
||
|
get cohen-v-california.4
|
||
|
cd /pub/CAF/law
|
||
|
get quiet-reading
|
||
|
cd /pub/CAF/library
|
||
|
get challenged-materials.ala
|
||
|
cd /pub/CAF/faq
|
||
|
get netnews.liability
|
||
|
cd /pub/CAF/faq
|
||
|
get netnews.reading
|
||
|
cd /pub/CAF/faq
|
||
|
get computer-porn
|
||
|
cd /pub/CAF
|
||
|
get filters.email
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Mar 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 4--Cu Digest Header Info (unchanged since 19 Mar, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.28
|
||
|
************************************
|
||
|
|