794 lines
36 KiB
Plaintext
794 lines
36 KiB
Plaintext
![]() |
|
||
|
Computer underground Digest Wed Feb 28, 1996 Volume 8 : Issue 18
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (TK0JUT2@MVS.CSO.NIU.EDU)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #8.18 (Wed, Feb 28, 1996)
|
||
|
|
||
|
File 1-- CDT Press Release/2d suit against CDA
|
||
|
File 2--Are you feeling threatened by the CDA?
|
||
|
File 3--British virus writer to jail for 18 months
|
||
|
File 4--(Fwd) RE: White House Not Decent
|
||
|
File 5--Response to "French Book Banning"
|
||
|
File 6--NIU President Responds to Telecommunications Bill
|
||
|
File 7--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Mon, 26 Feb 1996 17:09:15 -0600
|
||
|
From: Stephen Smith <libertas@COMP.UARK.EDU>
|
||
|
Subject: File 1-- CDT Press Release/2d suit against CDA
|
||
|
|
||
|
Following is a relase prepared by the Center for Democracy and Technology
|
||
|
on the challenge to CDA:
|
||
|
|
||
|
|
||
|
|
||
|
CDA IS UNCONSTITUTIONAL, FAILS TO RECOGNIZE
|
||
|
UNIQUE NATURE OF THE INTERNET
|
||
|
|
||
|
On Monday, February 26, the Citizens Internet Empowerment
|
||
|
Coalition, the American Library Association, America Online,
|
||
|
Compuserve, Prodigy, Microsoft, NETCOM, The Commercial Internet
|
||
|
eXchange, The Newspaper Association of America, Wired Magazine,
|
||
|
Hotwired, Families Against Internet Censorship, and several other
|
||
|
plaintiffs filed suit in a Federal Court in Philadelphia PA
|
||
|
seeking to overturn the Communications Decency Act on the
|
||
|
grounds that it is a violation of the First Amendment rights of
|
||
|
all Internet users.
|
||
|
|
||
|
In a 55 page complaint that details the history of the Internet
|
||
|
and outlines how the network operates, the CIEC intends to educate
|
||
|
the court on how the Internet functions and why the broad content
|
||
|
regulations imposed by the CDA threaten the very existence of the
|
||
|
Internet as a viable medium for free expression, education, and
|
||
|
commerce. Among other things, the CIEC challenge argues that:
|
||
|
|
||
|
* The Internet is a unique communications medium which deserves
|
||
|
First Amendment protections at least as broad as those afforded to
|
||
|
print media.
|
||
|
|
||
|
* Individual users and Parents, not the Federal Government,
|
||
|
should determine for themselves and their children what material
|
||
|
comes into their homes based on their own tastes and values.
|
||
|
|
||
|
* The CDA will be ineffective at protecting children from
|
||
|
"indecent" or "patently" offensive material online.
|
||
|
|
||
|
The CIEC challenge is separate from the case brought by the ACLU,
|
||
|
EFF, EPIC, Planned Parenthood, and several other plaintiffs in the
|
||
|
same Philadelphia court on February 8, 1996. The ACLU effort has
|
||
|
made significant and important headway in the past several weeks.
|
||
|
The CIEC case will reinforce the ACLU's efforts while focusing on
|
||
|
the unique nature of the Internet and alternatives to government
|
||
|
content regulations. ACLU and CIEC attorneys are closely
|
||
|
coordinating their efforts, and it is expected that the courts
|
||
|
will eventually consolidate the two cases.
|
||
|
|
||
|
The outcome of the legal challenges to the CDA will likely
|
||
|
determine the legal status of speech on the Internet and the
|
||
|
future of the First Amendment in the Information Age.
|
||
|
|
||
|
Citizens Internet Empowerment Coalition Members and Plaintiffs
|
||
|
|
||
|
The Citizens Internet Empowerment Coalition is a large and diverse
|
||
|
group of Internet users, businesses, non-profit groups, and civil
|
||
|
liberties advocates, who share the common goal of protecting the
|
||
|
First Amendment and the viability of the Internet as a means of
|
||
|
free expression, education, and commerce. CIEC members believe
|
||
|
that parents, not the United States Government, are the best and
|
||
|
most appropriate judges of what material is appropriate for
|
||
|
themselves and their children.
|
||
|
|
||
|
Named Plaintiffs in the CIEC Challenge to the Communications
|
||
|
Decency Act:
|
||
|
|
||
|
American Library Association
|
||
|
America Online, Inc.
|
||
|
American Booksellers Association
|
||
|
American Booksellers Foundation for Free Expression
|
||
|
American Society of Newspaper Editors
|
||
|
Association of American Publishers
|
||
|
Association of Publishers, Editors and Writers
|
||
|
Citizens Internet Empowerment Coalition
|
||
|
Commercial Internet eXchange
|
||
|
Compuserve, Inc.
|
||
|
Families Against Internet Censorship
|
||
|
Freedom to Read Foundation
|
||
|
HotWired Ventures Ltd.
|
||
|
Interactive Digital Software Association
|
||
|
Interactive Services Association
|
||
|
Microsoft Corporation
|
||
|
Microsoft Network
|
||
|
NETCOM On-Line Communications Services, Inc.
|
||
|
Newspaper Association of America
|
||
|
Prodigy, Inc.
|
||
|
Society of Professional Journalists
|
||
|
Wired Ventures Ltd.
|
||
|
|
||
|
Members of the Citizens Internet Empowerment Coalition:
|
||
|
|
||
|
Americans for Tax Reform
|
||
|
Association of American University Presses, Inc.
|
||
|
Association of National Advertisers
|
||
|
Association of Research Librarians
|
||
|
Center for Democracy and Technology
|
||
|
Coalition for Networked Information
|
||
|
Media Access Project
|
||
|
Media Institute
|
||
|
Microsystems Software, Inc.
|
||
|
National Assoc. of State Universities & Land Grant Colleges
|
||
|
People for the American Way
|
||
|
Recording Industry Association of America
|
||
|
Special Libraries Association
|
||
|
Surfwatch Software, Inc.
|
||
|
University of California Santa Barbara Library
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 27 Feb 1996 16:47:15 -0500
|
||
|
From: ACLUGPC@AOL.COM
|
||
|
Subject: File 2--Are you feeling threatened by the CDA?
|
||
|
|
||
|
To any interested parties:
|
||
|
|
||
|
We have become aware of an effort to promote the voices of people who
|
||
|
are presently not represented in the pending law suits challenging the
|
||
|
CDA. If you feel that material you have posted, are posting, or will
|
||
|
be posting may be considered "indecent" or "patently offensive," you
|
||
|
might want to consider getting involved.
|
||
|
|
||
|
Jim Crawford, a partner at the Philadelphia law firm of Schnader,
|
||
|
Harrison, Segal & Lewis, is preparing an amicus brief in support the
|
||
|
ACLU's challenge to the indecency provisions contained in the recently
|
||
|
passed telecommunications law. The brief will focus on the
|
||
|
overbreadth of the CDA, with particular emphasis on two groups of
|
||
|
amici -- content providers (those who place content on the Internet
|
||
|
that the CDA now criminalizes or potentially criminalizes under its
|
||
|
overbroad language); and access providers (ISPs, mainly). As to
|
||
|
content providers, the argument will be that there is a tremendous
|
||
|
amount of socially valuable expression on the Internet that could be
|
||
|
termed "indecent," or "patently offensive," depending on the community
|
||
|
standards to be applied, under the CDA's overbroad provisions, but
|
||
|
which should not be censored as to adults or minors. Amici want to
|
||
|
provide the court with very specific examples of such expression.
|
||
|
|
||
|
Among others, Crawford is interested in physicians' or medical groups;
|
||
|
universities and professors; artists; musicians; museums; and
|
||
|
businesses (who
|
||
|
|
||
|
may use provocative advertising and marketing techniques). In other
|
||
|
words, if you are concerned that the content of your postings may be
|
||
|
considered "indecent" or "patently offensive," the amici may be
|
||
|
interested in hearing from you.
|
||
|
|
||
|
Anyone who is interested in being considered for amicus status should
|
||
|
forward a statement of interest to Jennifer in Jim Crawford's office
|
||
|
at Jennifer_DuFault_James@SHSL.com.
|
||
|
|
||
|
Please feel free to pass this on to other persons who may be
|
||
|
interested.
|
||
|
|
||
|
Thank you. Vic Walczak
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 29 Feb 1996 00:59:11 -0600 (CST)
|
||
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
||
|
Subject: File 3--British virus writer to jail for 18 months
|
||
|
|
||
|
In mid-November 1995, the English trial of virus-writer Chris Pile
|
||
|
ended with a bang after months of stops and starts when the 26
|
||
|
year-old Devon man was sent away for 18 months as punishment for
|
||
|
spreading and inciting others to distribute the SMEG computer
|
||
|
viruses, programs of his design.
|
||
|
|
||
|
It was a depressing tale that stretched over a year, from
|
||
|
Pile's arrest and the confiscation of his computer by New Scotland
|
||
|
Yard's computer crime unit in 1994, to his conviction in Crown
|
||
|
Court in mid-1995, to the inevitable sentencing which sent him up
|
||
|
for a year and a half stint in an English bighouse the same
|
||
|
week when many others in computerland where trotting out shiny new
|
||
|
wares at ComDex in Las Vegas.
|
||
|
|
||
|
During the case, Pile admitted to five counts of unauthorized access
|
||
|
to computers to facilitate crime and five of unauthorized
|
||
|
modifications of computer software between 1993 and April 1994. He
|
||
|
also confessed to a charge of inciting others to spread viruses.
|
||
|
|
||
|
The English newspaper The Independent referred to Pile, known
|
||
|
briefly as the Black Baron in the virus underground, as a "'mad and
|
||
|
reclusive boffin' who wreaked havoc on computer systems by spreading
|
||
|
[viruses] . . . across the world . . ." [Webster's New World
|
||
|
Dictionary informs readers "mad boffin" is Brit slang for "mad
|
||
|
scientist."]
|
||
|
|
||
|
The Times asserted Microprose had been struck by one of Pile's
|
||
|
SMEG viruses and estimated that it lost 500,000 pounds in business
|
||
|
and wasted 480 man hours checking files for Pile's replicating code.
|
||
|
Another company, named Apricot, was claimed to have been closed while
|
||
|
clearing a third of its machines from a Pile-written virus infection.
|
||
|
|
||
|
In America, Dr. Alan Solomon - developer of the UK-based Solomon
|
||
|
Anti-virus Toolkit (S&S International), worked the news of Pile's
|
||
|
downfall into a presentation given by his firm at ComDex in Las
|
||
|
Vegas, Nevada. The following week, Graham Cluley - a colleague and
|
||
|
employee of Solomon at S&S, privately remarked on the Compuserve
|
||
|
on-line service that the severity of Pile's sentence surprised him.
|
||
|
|
||
|
The treatment of Pile, an unemployed self-taught programmer, by the
|
||
|
English press was slightly reminiscent of the US media's portrayal of
|
||
|
Kevin Mitnick. For the press, Pile was writ large as a young
|
||
|
cyber-madman bent on corrupted programming that resulted in
|
||
|
computer data damage escalating into the millions of dollars. Worse,
|
||
|
his code was said to be in the hands of shadowy criminal arch-fiends
|
||
|
in the US and Europe. Mitnick, of course, had been attributed with
|
||
|
cartoonish superhuman malevolence by the US media, a man dangerous
|
||
|
enough to bring down the Internet, steal the Christmas card list from
|
||
|
your computer and/or break into military computers controlling
|
||
|
NORAD.
|
||
|
|
||
|
English newspapers repeatedly reprinted the activation message from
|
||
|
Pile's SMEG.Pathogen virus. "Your hard disk is being corrupted
|
||
|
courtesy of PATHOGEN! Programmed in the U.K. (Yes, NOT Bulgaria!)
|
||
|
[C] the Black Baron 1993-94. Featuring SMEG v0.1: Simulated
|
||
|
Metamorphic Encryption Generator! 'Smoke me a kipper, I'll be back
|
||
|
for breakfast.....' Unfortunately some of your data won't!!!!!"
|
||
|
Only superficially baleful and menacing, the message was a mixture of
|
||
|
quote from an English TV show named "Red Dwarf" and the stereotypical
|
||
|
gloating anti-style of previous virus writers to numerous to count.
|
||
|
|
||
|
For The Independent Pile was the "most famous" of virus-writers and
|
||
|
the "most dangerous" of a small band of them working in England. The
|
||
|
Independent exaggerated when adding further that Pile's viruses,
|
||
|
called SMEG.Queeg and SMEG.Pathogen, were "the two most sophisticated
|
||
|
ever written." This was probably surprising news even to the anti-virus
|
||
|
software developers interviewed for the Black Baron stories. Indeed,
|
||
|
Alan Solomon's "Virus Encyclopedia," a compilation of technical notes
|
||
|
on computer viruses gives them a page a piece, neither much more nor
|
||
|
less than the hundreds of other entries in the book.
|
||
|
|
||
|
Pile's viruses, however, had reached "criminal elements" working in
|
||
|
Northern Ireland, the US, and Germany, according to the Independent.
|
||
|
|
||
|
The demonization and denunciation of Pile was unusually harsh in
|
||
|
light of the fact that prosecution witness Jim Bates commented to
|
||
|
Crypt Newsletter that UK authorities were uninterested in sending
|
||
|
officials overseas to collect evidence on the SMEG viruses in the
|
||
|
United States because a guilty verdict had been arrived at by
|
||
|
mid-1995.
|
||
|
|
||
|
Bates was the prosecution's point man in the case against Pile. He
|
||
|
was, perhaps, the most experienced for the job, having played a
|
||
|
starring role in another famous U.K. computer crime case - the
|
||
|
prosecution of Joe Popp for the AIDS Information diskette extortion
|
||
|
scheme - in 1991.
|
||
|
|
||
|
In late 1989, Jim Bates was among the first to examine software
|
||
|
called the AIDS Information Trojan. The AIDS Info Trojan, as it
|
||
|
became known, was used as part of a computer blackmail attempt
|
||
|
launched by Popp, an erratic scientist living in Cleveland, Ohio.
|
||
|
Popp had concocted a scheme to extort money from PC users in Europe.
|
||
|
It involved the programming of a software booby-trap that masqueraded
|
||
|
as a database containing information on AIDS and how to assess an
|
||
|
individual's risk of contracting the disease.
|
||
|
|
||
|
The database, as one might expect, was trivial and contained only the
|
||
|
barest information on AIDS. However, when an unwitting user installed
|
||
|
the software, the AIDS Information Trojan created hidden
|
||
|
directories and files on the computer while hiding a counter in
|
||
|
one of the system's start-up files. Once the count reached 90, Popp's
|
||
|
creation would encrypt the directory entries, alter the names of files
|
||
|
with the intent of making them inaccessible and present the operator with
|
||
|
a message to send approximately $200 to a postal drop in Panama City for
|
||
|
a cure reversing the effects of the program. The AIDS Information Trojan
|
||
|
came with a vaguely menacing warning not to install the software if one
|
||
|
didn't intend to pay for it at once.
|
||
|
|
||
|
Popp mailed 20,000 sets of the trojan on disk to users in Europe,
|
||
|
apparently subscribers to a now defunct magazine called PC Business
|
||
|
World. The plan quickly fizzled but Bates was among the first to
|
||
|
analyze Popp's A
|
||
|
on it to English authorities.
|
||
|
|
||
|
The disks were eventually traced back to Popp and New Scotland Yard
|
||
|
began a lengthy process of extraditing him to England to stand
|
||
|
trial for computer blackmail in connection with the disks, a
|
||
|
battle which took almost another two years. Bates was flown to
|
||
|
Cleveland during this time to present evidence in court which
|
||
|
persuaded American authorities to hand over Popp for extradition
|
||
|
to London. Bates also analyzed Popp's original AIDS Information
|
||
|
Trojan software, source code and a program which was evidently
|
||
|
intended to reverse the effects of the logic bomb, thus
|
||
|
regenerating a victim's data.
|
||
|
|
||
|
However, instead of going smoothly, the Popp trial became a source of
|
||
|
controversy. It was claimed the Cleveland man was unfit to stand
|
||
|
trial because he began wearing a cardboard box over his head, making
|
||
|
it impossible to determine whether he was legitimately non compos mentis
|
||
|
or merely shamming. As a result, Bates said to Crypt, Popp was
|
||
|
declared a "public disgrace" by the court and ejected from the
|
||
|
country. In England, this is an unusual classification which,
|
||
|
apparently, allows the case to remain open, the purpose being - on
|
||
|
this occasion, according to Bates - to discourage by intimidation
|
||
|
the authoring of books or a publicity tour of talk shows in the
|
||
|
United States by the defendant. At the time, it was difficult to
|
||
|
tell if Bates was being serious or facetious.
|
||
|
|
||
|
Chris Pile, unlike Joe Popp, appeared not to be flat crazy. Plus,
|
||
|
his computer viruses worked too well. It didn't take much work to
|
||
|
scare the uninformed with them. And Pile's legal defense team was
|
||
|
unable to muster the kind of sophisticated defense necessary to
|
||
|
mitigate Jim Bates' expertise.
|
||
|
|
||
|
For Pile's prosecution, Bates furnished collection and evaluation
|
||
|
of evidence relating to the spread of the Pile/SMEG viruses and
|
||
|
damages attributed to them.
|
||
|
|
||
|
Pile, said Bates, had attached a SMEG virus to a computer game and
|
||
|
uploaded it to a bulletin board system in the United Kingdom. The
|
||
|
virus writer had also targeted the Dutch-made Thunderbyte anti-virus
|
||
|
software, initially by infecting one of the company's anti-virus
|
||
|
programs distributed via the shareware route. After examining
|
||
|
software and source code for Pile's computer virus encryption
|
||
|
engine, named the SMEG, Bates also maintained Pile had invested
|
||
|
a great deal of time in fine-tuning subsequent editions of it
|
||
|
so it specifically generated computer virus samples opaque to
|
||
|
the Thunderbyte anti-virus scanning software.
|
||
|
|
||
|
Although there has been little unusual about this habit of virus
|
||
|
writers since 1993, it surely must have seemed remarkable
|
||
|
techno-magic to the English Crown Court. The judge treated it so.
|
||
|
|
||
|
"I dare say you were looking forward to reading in the computer
|
||
|
press about the exploits of the Black Baron," said judge Jeremy
|
||
|
Griggs to the defendant. "Those who seek to wreak mindless havoc on
|
||
|
one of the vital tools of our age cannot expect lenient treatment,"
|
||
|
he thundered before sending Pile over for eighteen months.
|
||
|
|
||
|
In the wake of Pile's sentencing, English newspapers continually
|
||
|
exaggerated the virus-writer as an international menace. The Times
|
||
|
of London echoed The Independent's hyperbole, maintaining Pile had
|
||
|
written a "training manual" for virus-writers found "in America and
|
||
|
Northern Ireland where it was being used by criminals."
|
||
|
|
||
|
Ali Rafati, as part of Pile's legal defense, said his client was a
|
||
|
"sad recluse." The real Pile is difficult to describe in any detail
|
||
|
even though an excessively overwrought and lugubrious "Biography of a
|
||
|
virus-writer" was written about him by a cyber acquaintance and
|
||
|
circulated widely in the computer virus underground in 1994, just
|
||
|
before he was arrested by New Scotland Yard.
|
||
|
|
||
|
As bombastic as anything written by The Independent, Black Baron's
|
||
|
biography begins:
|
||
|
|
||
|
"In 1969 Neil Armstrong stepped onto the moon. It was a momentous
|
||
|
year for the world. But no-one [sic] at the time paid much attention to
|
||
|
a baby boy being born in a town in southern England. This baby boy
|
||
|
was destined to grow into one of the most infamous computer virus
|
||
|
writers of all time. In 1969 The Black Baron was born!"
|
||
|
|
||
|
Curiously, almost 80 percent of the Black Baron's "biography" is a
|
||
|
reprint of material written by Ross M. Greenberg, a semi-retired
|
||
|
programmer who wrote the Flu_Shot and VirexPC sets of anti-virus
|
||
|
software. The reprint dates from 1988 and contains standard
|
||
|
anti-virus rant and rave, calling virus-writers "worms." One
|
||
|
supposes it could be called mildly irritating by the thin-skinned.
|
||
|
|
||
|
In any case, if the Black Baron's biography is taken at face value,
|
||
|
Greenberg's anti-virus-writer spiel was the seed that formed the basis
|
||
|
of Pile's desire to write viruses as a means toward impressing people.
|
||
|
|
||
|
Black Baron's biography reads (errors reprinted), ". . . when
|
||
|
computers stop attracting social inadequates, but whom I am refering
|
||
|
to the arrogant members of the anti-virus lobby as well as the
|
||
|
nefarious virus authors. But what of the Black Baron? What is he? Is
|
||
|
he a malicious criminal? A computer terrorist? A social inadequate
|
||
|
trying to reassure himself of his own inadequacies through destroying
|
||
|
computer data? I don't [believe] so. I have spoken to Black Baron on
|
||
|
a number of occassions. He is happy to discuss his work, and, at my
|
||
|
request, he has even released a document detailing the design of SMEG.
|
||
|
He doesn't feed on the panic and fear that SMEG viruses such as
|
||
|
Pathogen and Queeg cause. Rather he revels in the embarrasement and
|
||
|
panic which his software causes the arrogant anti-virus writers."
|
||
|
|
||
|
At the time, Pile was unemployed. The "biography" concludes:
|
||
|
|
||
|
"After talking with him, I understand the Black Baron. I feel sorry for
|
||
|
him as well. He is a highly gifted individual who has not been given a
|
||
|
chance by computer society. So he has made his own chance. We all need
|
||
|
recognition. Mainly through employment, but we as thinking machines must
|
||
|
receive recognition for our abilities. Otherwise we sink into melancholy
|
||
|
and paranoida. Black Baron has received his recognition. We, the
|
||
|
computer society are responsible for the creation of Pathogen, Queeg,
|
||
|
SMEG and all the other computer viruses. We have no one to blame but
|
||
|
ourselves. It is our desire to keep the computer fraternity a closed
|
||
|
club which has alienated so many of our colleagues. By rubbing their
|
||
|
noses in it, so to speak, we have begged for trouble, and like the
|
||
|
inhabitants of Troy, we have received it."
|
||
|
|
||
|
English newspapers reported Pile had confessed to police he had
|
||
|
written the viruses to "increase his self-esteem" and because England
|
||
|
appeared not to have produced any virus writers capable of programming
|
||
|
samples capable of spreading in the real world.
|
||
|
|
||
|
The legal offices of Rafferty and Woodmansea, Pile's legal team were
|
||
|
contacted repeatedly by Crypt Newsletter but could not be reached for
|
||
|
opinion. Surprisingly, a secretary on the end of the phone claimed
|
||
|
they lacked e-mail addresses.
|
||
|
|
||
|
http://www.soci.niu.edu/~crypt
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 25 Feb 1996 21:20:41 -0500
|
||
|
From: IPS@OLYMPUS.NET(Steve O'Keefe)
|
||
|
Subject: File 4--(Fwd) RE: White House Not Decent
|
||
|
|
||
|
Sent-- Sunday, February 25, 1996 9:43 AM
|
||
|
To-- cypherpunks@toad.com
|
||
|
|
||
|
(Reprinted without permission from the Seattle Times
|
||
|
Personal Technology section)
|
||
|
|
||
|
White House Site Blocked
|
||
|
|
||
|
Add the White House to the Internet's extensive list of dens of
|
||
|
sin.
|
||
|
|
||
|
Surfwatch, a widely used software program that prevents access
|
||
|
to, and downloading of, sexually explicit material on the
|
||
|
Internet, accidently blocked access to the White House home page
|
||
|
recently - all because a "White House for Kids" Web site address
|
||
|
contained the word "couples."
|
||
|
|
||
|
That's a dirty word in the Surfwatch universe because many
|
||
|
sexually explicit online sites use it as part of their come-on.
|
||
|
|
||
|
In this case, "couples" merely referred to the Executive Branch
|
||
|
tandems of President and Hillary Rodham Clinton and Al and Tipper
|
||
|
Gore.
|
||
|
|
||
|
Surfwatch fixed the problem within hours, although some might
|
||
|
still find the site offensive.
|
||
|
|
||
|
For political reasons, that is.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 28 Feb 1996 07:47:54 -0800 (PST)
|
||
|
From: beust@SOPHIA.ILOG.FR(Cedric Beust)
|
||
|
Subject: File 5--Response to "French Book Banning"
|
||
|
|
||
|
Declan McCullagh <declan@WELL.COM> writes
|
||
|
|
||
|
: (I'm already hosting a book banned by the French government:
|
||
|
: http://www.cs.cmu.edu/~declan/le-secret/)
|
||
|
|
||
|
Ok this is it. I have tried my best to resist the urge to reply, but
|
||
|
this new mention is one too many. I can't let any more misinformation
|
||
|
spread like this.
|
||
|
|
||
|
First of all, I have nothing against you. Declan, and I respect the
|
||
|
cause you *think* you are defending, but I will try to show that you
|
||
|
have gone too far in this quest, and that you lost the minimum sense
|
||
|
of "esprit critique" under the so-called motivation of defending free
|
||
|
speech.
|
||
|
|
||
|
Le Grand Secret is *not* a "book banned by the French government". It
|
||
|
is a book banned by Francois Miterrand's family, on their request
|
||
|
(and that of their lawyer's, who also has many good reasons to see
|
||
|
this book withdrawn from the shelves as I will make clear below).
|
||
|
|
||
|
The book hasn't been censored because of so-called sensitive material
|
||
|
contained in it, but on the sole criterion that it relates private
|
||
|
details of Mr. Mitterrand and relatives. This is a simple breach of
|
||
|
privacy affair, not an attempt to hide away information from the public
|
||
|
by some government cabal (remember, there is no cabal, and this
|
||
|
applies to real life too :-)).
|
||
|
|
||
|
If you had the curiosity to have the book read by a French speaking
|
||
|
person, they would have let you know very quickly that this book
|
||
|
contains *nothing* sensational. You can read here and there a few
|
||
|
clear abuses of privileges (implying the lawyer I mentioned above,
|
||
|
thus his haste to have the court censor it), but nothing unsuspected
|
||
|
(you do expect the relatives of the president of a nation to have
|
||
|
some privileges, don't you ? I am not saying this is normal, but just
|
||
|
that it can be expected, and is no secret).
|
||
|
|
||
|
Now, let me try to explain why you shouldn't be hosting this book.
|
||
|
|
||
|
In France (just like in the United States and more and more
|
||
|
countries), the government is trying to have a stake at
|
||
|
-- somehow -- introducing regulations in the Internet. France might
|
||
|
have its own CDA very soon. This kind of very unfortunate affair (*)
|
||
|
is exactly what the government is expecting to justify a quick
|
||
|
intervention and the creation of hasty measures to stop this den of
|
||
|
pirates that dwell in the Internet. For you are a pirate, Declan,
|
||
|
because you are violating the copyright law that applies to this book
|
||
|
(the United States signed the Berne agreement regarding copyright and
|
||
|
intellectual property). Are you aware of this ? Are you aware that
|
||
|
what you are doing is exactly the same as hosting a pirate copy of,
|
||
|
say, Microsoft NT, on your web page and say to all "come and download
|
||
|
it" ?
|
||
|
|
||
|
Don't you have the impression that by trying to defend the free
|
||
|
speech on the Internet, you are doing exactly the opposite ?
|
||
|
|
||
|
It's curious to see that as soon as the mere consideration of free
|
||
|
speech comes into play, all actors (you first, this might apply to
|
||
|
the EFF as well) suddenly lose all sense of criticism and are more
|
||
|
hasty to wave blindly the banner of free speech than initiate a more
|
||
|
thorough enquiry in order to make sure what this is all about.
|
||
|
|
||
|
Please, Declan, don't think I am bashing your overall work. I am
|
||
|
just trying to say you should be more careful when exercising your
|
||
|
right to fight censorship and promote free speech.
|
||
|
|
||
|
Regards,
|
||
|
|
||
|
Cedric BEUST
|
||
|
beust@sophia.inria.fr
|
||
|
|
||
|
|
||
|
(*) (I remind the CUDers that it all started when a French cybercafe decided
|
||
|
to put the book online right after it was withdrawn from the
|
||
|
stores. I can elaborate and give more precise details on how and why
|
||
|
the bartender was arrested afterwards in case this is of interest)
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 29 Feb 1996 03:23:52 -0600
|
||
|
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
|
||
|
Subject: File 6--NIU President Responds to Telecommunications Bill
|
||
|
|
||
|
NIU RESPONDS TO TELECOMMUNICATIONS BILL
|
||
|
|
||
|
President John E. La Tourette
|
||
|
February 16, 1996
|
||
|
|
||
|
Since passage earlier this month of the Telecommunications Act of
|
||
|
1996, colleges and universities across the country have been
|
||
|
struggling to understand the potential implications of the bill's
|
||
|
so-called "indecency" provisions as they relate to faculty, staff
|
||
|
and student use of the Internet. As you may know, a federal judge in
|
||
|
Philadelphia recently granted a temporary restraining order that
|
||
|
prohibits the U.S. Justice Department from enforcing the indecency
|
||
|
provisions; however even that decision left supporters and opponents
|
||
|
confused. Clearly, this issue will not be definitively resolved
|
||
|
anytime soon, and we recognize the need to address campus concerns
|
||
|
in the interim. In consultation with NIU legal counsel and policy
|
||
|
experts at the American Council on Education and the American
|
||
|
Association of State Colleges and Universities, I offer the
|
||
|
following thoughts.
|
||
|
|
||
|
At the heart of the controversy are provisions which prohibit
|
||
|
Internet users from sending "indecent" material to minors or from
|
||
|
making such material available in any way that could be accessible
|
||
|
to children. Critics have also charged that a little-noticed
|
||
|
provision in the indecency section of the legislation would ban all
|
||
|
discussion of abortion on computer networks. (On this point,
|
||
|
President Clinton has clearly stated that the Justice Department
|
||
|
will not enforce a provision that is clearly in violation of the
|
||
|
First Amendment.)
|
||
|
|
||
|
Two basic issues define this controversy: the definition of
|
||
|
indecency, and institutional and individual liability. As these are
|
||
|
issues of infinite complexity, no official or organization has yet
|
||
|
issued a definitive interpretation of the legal issues involved. The
|
||
|
American Council on Education, the American Library Association and
|
||
|
the American Association of State Colleges and Universities are
|
||
|
working in Washington to craft technical amendments to the
|
||
|
Telecommunications Bill that would resolve many of the issues that
|
||
|
concern their member institutions. Additionally, Sen. Patrick Leahy
|
||
|
(D-Vermont) and Sen. Russell Feingold (D-Wisconsin), both members of
|
||
|
the Senate Judiciary Committee, introduced a bill (SB1567) on
|
||
|
February 9 which would strip out the indecency provisions
|
||
|
altogether.
|
||
|
|
||
|
Controversy surrounding use of the Internet clearly identifies a
|
||
|
mismatch between the speed of technological advancement and our
|
||
|
nation's ability to thoughtfully deal with ensuing constitutional
|
||
|
questions. Further, the legal questions with which we are faced go
|
||
|
far beyond issues of alleged "indecency." For example, the American
|
||
|
Association of State Colleges and Universities (AASCU) recently
|
||
|
urged its members to adopt a "code of ethics" for students using the
|
||
|
Internet, and suggests that students be required to agree to follow
|
||
|
the code before being given e-mail addresses. AASCU's recommendation
|
||
|
follows an incident at the University of Maryland in which a student
|
||
|
posted unsubstantiated hearsay on the Internet about a local woman
|
||
|
whom he said had been abusing her high school-aged daughter. The
|
||
|
student listed the woman's phone number on this world-wide post, and
|
||
|
she subsequently received numerous harrassing calls.
|
||
|
|
||
|
AASCU's most recent posting on this subject suggests that colleges,
|
||
|
universities and other providers of Internet access could be held
|
||
|
harmless for indecent or harrassing posts by students if the network
|
||
|
manager can show that the institution has taken good faith,
|
||
|
reasonable, effective and appropriate actions under the
|
||
|
circumstances to restrict or prevent access to minors to (indecent)
|
||
|
communications. It remains unclear, however, how an institution
|
||
|
could prove "good faith" in an environment where students have
|
||
|
access to many campus computer servers, and where millions of e-mail
|
||
|
and other Internet communications by students and faculty are sent
|
||
|
daily. AASCU officials also note that the Justice Department will
|
||
|
likely develop guidelines for owners and operators of computer
|
||
|
servers on what "reasonable and appropriate" measures they can take
|
||
|
to avoid transmission or display of indecent content to minors.
|
||
|
AASCU plans to further discuss the implications of the
|
||
|
Communications Decency Act at a meeting next month of campus
|
||
|
governmental relations and communications representatives; NIU will
|
||
|
be represented at that meeting.
|
||
|
|
||
|
In the meantime, Northern Illinois University will continue to
|
||
|
foster and protect academic freedom in teaching, research and
|
||
|
creative artistry as strongly as ever. That this will continue is
|
||
|
unmistakably guaranteed by the governance standards of the Board of
|
||
|
Trustees and the University Constitution. The University has not
|
||
|
changed any policy or any operation as a result of this law being
|
||
|
passed -- there is still access to the Internet, home pages and the
|
||
|
other uses which have been provided to our academic community.
|
||
|
Moreover, it is unlikely that reasonable and responsible use of this
|
||
|
communications tool will result in adverse consequences for
|
||
|
individual members of the university community. University employees
|
||
|
are financially protected in the responsible performance of their
|
||
|
duties through the newly strengthened Indemnification Policy in our
|
||
|
new Board's bylaws. At the same time, we take very seriously any
|
||
|
real or potential threats to academic freedom, and will continue to
|
||
|
closely monitor developments in this case. Although there are many
|
||
|
unanswered questions that we could discuss internally, it is more
|
||
|
appropriate for faculty and staff concerns to be communicated to our
|
||
|
elected officials in Washington. A list of their names and
|
||
|
addresses, including e-mail addresses, is attached.
|
||
|
|
||
|
The telecommunications act was several years in the making, received
|
||
|
extensive bipartisan support, and was intended to liberate
|
||
|
technology and make it work more effectively for all citizens.
|
||
|
Unfortunately, as often happens in our legislative process, some
|
||
|
unintended provisions made their way into what is otherwise a
|
||
|
positive set of reforms. We all have an interest in seeing the goals
|
||
|
of the original legislation realized. At the same time, we are
|
||
|
appropriately concerned about the imposition of vague,
|
||
|
"community-based" decency standards on the normal, scholarly
|
||
|
activities of this or any institution of higher learning.
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
|
||
|
Illinois Senators
|
||
|
|
||
|
Carol Moseley-Braun
|
||
|
SH-320 Hart Senate Office Building
|
||
|
Washington, D.C. 20510-1301
|
||
|
202/224-2854
|
||
|
E-Mail: senator@moseley-braun.senate.gov
|
||
|
|
||
|
Paul Simon
|
||
|
SD-462 Dirksen Senate Office Building
|
||
|
Washington, D.C. 20510-1302
|
||
|
202/224-2152
|
||
|
E-Mail: senator@simon.senate.gov
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
|
||
|
U.S. Representatives from Northern Illinois Districts
|
||
|
|
||
|
Philip M. Crane
|
||
|
233 Cannon House Office Building
|
||
|
Washington, D.C. 20515-1308
|
||
|
202/225-3711
|
||
|
|
||
|
|
||
|
J. Dennis Hastert
|
||
|
2453 Rayburn House Office Building
|
||
|
Washington, D.C. 20515-1314
|
||
|
202/225-2976
|
||
|
FAX: 202/225-0697
|
||
|
E-Mail: dhastert@hr.house.gov
|
||
|
|
||
|
|
||
|
Donald Manzullo
|
||
|
426 Cannon House Office Building
|
||
|
Washington, D.C. 20515-1316
|
||
|
202/225-5676
|
||
|
_________________________________________________________________
|
||
|
|
||
|
|
||
|
President John E. La Tourette
|
||
|
February 16, 1996
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 16 Dec 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 7--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #8.18
|
||
|
************************************
|
||
|
|