845 lines
40 KiB
Plaintext
845 lines
40 KiB
Plaintext
|
|
||
|
Computer underground Digest Wed Jun 19, 1996 Volume 8 : Issue 47
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #8.47 (Wed, Jun 19, 1996)
|
||
|
|
||
|
File 1--Re: Virtual Magistrate Decision
|
||
|
File 2--(S 1237) Child Pornography Prevention Act of 1995
|
||
|
File 3--"The One that Got Away" Port (Brock Meeks)
|
||
|
File 4--Religious right and the Net
|
||
|
File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Fri, 24 May 1996 13:32:58 -0700
|
||
|
From: Alan Lewine <alewine@dcez.com>
|
||
|
Subject: File 1--Re: Virtual Magistrate Decision
|
||
|
|
||
|
I attended the National Association for Automated Information
|
||
|
Research conference on Online Disp[ute Resolution at which the
|
||
|
Virtual Magistrate decision was announced. I have posted the Virtual
|
||
|
Magistrate decision in full text to Declan for posting to this list.
|
||
|
Here is a brief summary of the decision as I see it. (Incl. relevant
|
||
|
portions of the America Online Terms of Service (TOS) and Rules of
|
||
|
the Road (RoR) - part of the contract between AOL and its members.
|
||
|
full text of the decision is available at
|
||
|
http://vmag/law.vill.edu:8080/ .
|
||
|
|
||
|
AOL voluntarily participated in the first arbitration proceding on
|
||
|
the Internet through the Virtual Magistrate (VM), which involved a
|
||
|
challenge against a spammer, E_mail America, distributing junk mail
|
||
|
on the AOL network. Although the VM does not have any legal
|
||
|
enforcement power, the establishment of an Internet protocol
|
||
|
prohibiting spammingmay provide persuasive authority to cite in
|
||
|
future legal procedings. VM released its decision 21 May. The
|
||
|
decision along with the complaint and all associated materials are
|
||
|
available thru the VM web site. the decision involved three parties:
|
||
|
an actor - E-mail America (who never responded to invitations to
|
||
|
participate), a complainant - Jim Tierney, a former state Attorney
|
||
|
General and AOL subscriber, and a sysop - AOL. It took the form of
|
||
|
an "in rem" (involving a thing, rather than person(s)) proceding
|
||
|
against a screenname and an associated e-mail advertisement. Perhaps
|
||
|
a proceding against such cyberspacial entities would be better
|
||
|
termed "in meme" than "in rem."
|
||
|
|
||
|
Virtual Magistrate Decision
|
||
|
|
||
|
Paragraph 4(a) of the TOS addressing content may be read as
|
||
|
addressing content generally, whether or not it originates within
|
||
|
AOL. Therefore , because AOL is not a public forum or common
|
||
|
carrier, the determinatio n of what is offensive is within the
|
||
|
subjective purview of AOL. AOL may appropriately consider system
|
||
|
limitations internet custom and practice, and especially customer
|
||
|
complaints
|
||
|
|
||
|
While AOL does not pre-screen content, blocking of a repetitive
|
||
|
message that has been post-screened at least once would not violate
|
||
|
the no pre-screening promise in the TOS.
|
||
|
|
||
|
See also relevant passages in TOS and RoR: TOS 2.5: Prohibits
|
||
|
online conduct by members that inhibit other member use or enjoyment
|
||
|
TOS 4.2 AOL Inc. reserves the right to prohibit conduct . . . harmfu
|
||
|
l to individual members.
|
||
|
|
||
|
RoR 2.C. Online Conduct prohibited or discouraged includes
|
||
|
harassment, impersonation and especially, (viii) unsolicited
|
||
|
advertising.
|
||
|
|
||
|
|
||
|
Fromthe Rules of the Road and Terms of Service, contractual AOL
|
||
|
documents:
|
||
|
|
||
|
<< RULES OF THE ROAD
|
||
|
<<2.C. Online Conduct. Please refer to Section 2.5 of the Terms of
|
||
|
Service Agreement for AOL Inc. policy on impermissible types of online
|
||
|
conduct. Below are some common violations of the Terms of Service. This
|
||
|
list is not exhaustive. AOL Inc. reserves the right, but does not assume
|
||
|
|
||
|
the responsibility, to restrict communication which AOL Inc. deems in its
|
||
|
discretion to be harmful to individual Members, damaging to the
|
||
|
communities which make up the AOL Service, or in violation of AOL Inc.
|
||
|
or any third-party rights. Please be aware, however, that communication
|
||
|
over the AOL Service often occurs in real-time, or is posted on one of
|
||
|
the AOL Service thousands of message boards or libraries, and AOL Inc.
|
||
|
|
||
|
cannot, and does not intend to, screen communication in advance.
|
||
|
|
||
|
(i) Offensive Communication. The AOL Service is a
|
||
|
community-oriented service composed of many different communities of
|
||
|
people. Our goal is to provide an interesting, stimulating and fun place
|
||
|
|
||
|
for all Members. Using vulgar, abusive or hateful language undermines
|
||
|
this goal and is not allowed. Please use your best judgment and be
|
||
|
respectful of other Members. . . .
|
||
|
|
||
|
(ii) Harassment. When a Member targets another specifically to
|
||
|
cause him/her distress, embarrassment, unwanted attention, or other
|
||
|
discomfort, this is harassment. AOL Inc. does not condone harassment in
|
||
|
any form and may suspend or terminate the accounts of any Member who
|
||
|
harasses others. You may have a disagreement with someone's point of
|
||
|
view -- we encourage lively discussion in our chat rooms and message
|
||
|
boards -- but personal attacks, or attacks based on a person race,
|
||
|
national origin, ethnicity, religion, gender, sexual orientation or other
|
||
|
|
||
|
such affiliation, are prohibited. If you have a disagreement with
|
||
|
someone's point of view, address the subject, not the person.
|
||
|
|
||
|
(v) Impersonation. This can involve the portrayal of an account
|
||
|
in an official capacity, such as AOL Inc. staff or an information
|
||
|
provider, authorized Guide or Host, or communication under a false name
|
||
|
or a name that you are not authorized to use. Members must avoid the
|
||
|
portrayal of AOL personnel or others persons in all forms of online
|
||
|
communication, including, but not limited to, screen names, member
|
||
|
profiles, chat dialogue and message postings.
|
||
|
|
||
|
(viii) Advertising and Solicitation. You may not use the AOL
|
||
|
Service to send unsolicited advertising, promotional material, or other
|
||
|
forms of solicitation to other Members except in those specified areas
|
||
|
that are designated for such a purpose (e.g., the classified area).
|
||
|
|
||
|
|
||
|
<<RULES OF THE ROAD
|
||
|
|
||
|
<<D. Third-Party Content and Information.
|
||
|
|
||
|
Because AOL Inc. encourages open and candid communication, it
|
||
|
cannot determine in advance the accuracy of Content transmitted on the
|
||
|
AOL Service. AOL is not responsible for screening, policing, editing, or
|
||
|
|
||
|
monitoring such Content. If notified of allegedly infringing,
|
||
|
defamatory, damaging, illegal or offensive Content, AOL Inc. may
|
||
|
investigate the allegation and determine in good faith and in its sole
|
||
|
discretion whether to remove or request the removal of such Content from
|
||
|
the AOL Service. AOL Inc. shall be held harmless from any performance or
|
||
|
|
||
|
non-performance by AOL Inc. of such activities, as long as it has acted
|
||
|
in good faith.
|
||
|
|
||
|
<<RULES OF THE ROAD
|
||
|
|
||
|
<<4. Public and Private Communication
|
||
|
|
||
|
The AOL Service offers Members the capability to communicate in
|
||
|
Public Areas generally accessible to other Members or to communicate
|
||
|
privately with another Member. Public Areas are those features that are
|
||
|
generally accessible to other Members, such as, but not limited to, chat
|
||
|
rooms, online forums, and message boards. Private Communication is
|
||
|
electronic correspondence sent or received by you to particular
|
||
|
individuals. AOL Inc. will maintain the AOL Service Public Areas as an
|
||
|
open forum for discussion of a wide range of issues and expression of
|
||
|
diverse viewpoints. AOL Inc. will administer standards of online conduct
|
||
|
|
||
|
according to its TOS for the enjoyment of all its Members. While we will
|
||
|
|
||
|
endeavor to monitor the Public Areas to ensure that online standards are
|
||
|
being maintained, AOL Inc. has neither the practical capability, nor does
|
||
|
|
||
|
it intend, to act in the role of Big Brother by screening public
|
||
|
communication in advance.
|
||
|
|
||
|
It is AOL Inc. policy to respect the privacy of personal
|
||
|
electronic communication. AOL Inc. will not intentionally inspect the
|
||
|
contents of an electronic message (E-Mail or Instant Message) s
|
||
|
ent by
|
||
|
one Member to another individual, monitor discussions in private rooms,
|
||
|
or disclose the contents of any personal electronic communication to an
|
||
|
unauthorized third party, except as required or permitted to do so by
|
||
|
law. AOL Inc. reserves the right to cooperate fully with local, state,
|
||
|
or federal officials in any investigation relating to any Content,
|
||
|
including private electronic communication, transmitted on the AOL
|
||
|
Service or the unlawful activities of any Member.
|
||
|
|
||
|
AOL Inc. reserves the right to remove any Content that it deems
|
||
|
in its sole discretion to be a violation of its Terms of Service. AOL
|
||
|
Inc. may terminate immediately any Member who misuses or fails to abide
|
||
|
by its Terms of Service.
|
||
|
|
||
|
<<TERMS OF SERVICE
|
||
|
|
||
|
<<2.5 Online Conduct. Any conduct by a Member that in AOL Inc.
|
||
|
discretion restricts or inhibits any other Member from using or enjoying
|
||
|
the AOL Service will not be permitted. Member agrees to use the AOL
|
||
|
Service only for lawful purposes. Member is prohibited from posting on
|
||
|
or transmitting through the AOL Service any unlawful, harmful,
|
||
|
threatening, abusive, harassing, defamatory, vulgar, obscene, profane,
|
||
|
hateful, racially, ethnically or otherwise objectionable material of any
|
||
|
kind, including, but not limited to, any material which encourages
|
||
|
conduct that would constitute a criminal offense, give rise to civil
|
||
|
liability or otherwise violate any applicable local, state, national or
|
||
|
international law.
|
||
|
|
||
|
<<4.2 AOL Inc. reserves the right to prohibit conduct, communication, or
|
||
|
|
||
|
Content which it deems in its discretion to be harmful to individual
|
||
|
Members, the communities which make up the AOL Service, AOL Inc. or
|
||
|
other third-party rights, or to violate any applicable law.
|
||
|
Notwithstanding the foregoing, neither AOL Inc. nor its Information
|
||
|
Providers have the practical ability to restrict conduct, communication
|
||
|
or Content which might violate its TOS prior to transmission on the AOL
|
||
|
Service, nor can they ensure prompt editing or removal of questionable
|
||
|
Content after on-line posting. Accordingly, neither AOL Inc. nor any
|
||
|
Information Provider shall assume liability for any action or inaction
|
||
|
with respect to conduct, communication or Content on the AOL Service.
|
||
|
|
||
|
<<4.3 AOL Inc. will not intentionally monitor or disclose any private
|
||
|
electronic communication unless permitted or required by law. AOL Inc.
|
||
|
may terminate immediately without notice any Member who misuses or fails
|
||
|
to abide by the TOS, including, without limitation, misuse of the
|
||
|
software libraries, discussion boards, E-Mail, or conference areas.
|
||
|
|
||
|
>>ALEWINE@DCEZ.COM
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 8 Jun 1996 00:18:35 -0500
|
||
|
From: critcrim@SUN.SOCI.NIU.EDU(Critical Criminology - ASA)
|
||
|
Subject: File 2--(S 1237) Child Pornography Prevention Act of 1995
|
||
|
|
||
|
((MODERATORS' NOTE: This week, C-CSPAN televised the hearings of S
|
||
|
1237, which would greatly expand the definition of "child
|
||
|
pornography" in a way that some feel would restrict otherwise
|
||
|
protected expression of art, literature, and even communication of
|
||
|
fantasy. Below is the text of the Bill)).
|
||
|
|
||
|
Child Pornography Prevention Act of 1995 (Introduced in the Senate)
|
||
|
|
||
|
S 1237 IS
|
||
|
|
||
|
104th CONGRESS
|
||
|
|
||
|
1st Session
|
||
|
|
||
|
S. 1237
|
||
|
|
||
|
To amend certain provisions of law relating to child pornography, and
|
||
|
for other purposes.
|
||
|
|
||
|
IN THE SENATE OF THE UNITED STATES
|
||
|
|
||
|
SEPTEMBER 13 (LEGISLATIVE DAY, SEPTEMBER 5), 1995
|
||
|
|
||
|
Mr. HATCH (for himself, Mr. ABRAHAM, Mr. GRASSLEY, and Mr. THURMOND)
|
||
|
introduced the following bill; which was read twice and referred to
|
||
|
the Committee on the Judiciary
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
|
||
|
A BILL
|
||
|
|
||
|
To amend certain provisions of law relating to child pornography, and
|
||
|
for other purposes.
|
||
|
|
||
|
Be it enacted by the Senate and House of Representatives of the United
|
||
|
States of America in Congress assembled,
|
||
|
|
||
|
SECTION 1. SHORT TITLE.
|
||
|
|
||
|
This Act may be cited as the `Child Pornography Prevention Act of
|
||
|
1995'.
|
||
|
|
||
|
SEC. 2. FINDINGS.
|
||
|
|
||
|
Congress finds that--
|
||
|
|
||
|
(1) the use of children in the production of sexually explicit
|
||
|
material, including photographs, films, videos, computer
|
||
|
images, and other visual depictions, is a form of sexual
|
||
|
abuse which can result in physical or psychological harm, or
|
||
|
both, to the children involved;
|
||
|
|
||
|
(2) child pornography permanently records the victim's abuse, and
|
||
|
its continued existence causes the child victims of sexual
|
||
|
abuse continuing harm by haunting those children in future
|
||
|
years;
|
||
|
|
||
|
(3) child pornography is often used as part of a method of
|
||
|
seducing other children into sexual activity; a child who is
|
||
|
reluctant to engage in sexual activity with an adult, or to
|
||
|
pose for sexually explicit photographs, can sometimes be
|
||
|
convinced by viewing depictions of other children `having
|
||
|
fun' participating in such activity;
|
||
|
|
||
|
(4) prohibiting the possession and viewing of child pornography
|
||
|
encourages the possessors of such material to destroy them,
|
||
|
thereby helping to protect the victims of child pornography
|
||
|
and to eliminate the market for the sexually exploitative use
|
||
|
of children; and
|
||
|
|
||
|
(5) the elimination of child pornography and the protection of
|
||
|
children from sexual exploitation provide a compelling
|
||
|
governmental interest for prohibiting the production,
|
||
|
distribution, possession, or viewing of child pornography.
|
||
|
|
||
|
SEC. 3. DEFINITIONS.
|
||
|
|
||
|
Section 2256 of title 18, United States Code, is amended--
|
||
|
|
||
|
(1) in paragraph (2)(E), by inserting before the semicolon the
|
||
|
following: `, or the buttocks of any minor, or the breast of
|
||
|
any female minor';
|
||
|
|
||
|
(2) in paragraph (5), by inserting before the semicolon the
|
||
|
following: `, and data stored on computer disk or by
|
||
|
electronic means which is capable of conversion into a visual
|
||
|
image';
|
||
|
|
||
|
(3) in paragraph (6), by striking `and';
|
||
|
|
||
|
(4) in paragraph (7), by striking the period and inserting `;
|
||
|
and'; and
|
||
|
|
||
|
(5) by adding at the end the following new paragraph:
|
||
|
|
||
|
`(8) `child pornography' means any visual depiction, including
|
||
|
any photograph, film, video, picture, drawing, or computer or
|
||
|
computer-generated image or picture, whether made or produced
|
||
|
by electronic, mechanical, or other means, of sexually
|
||
|
explicit conduct, where--
|
||
|
|
||
|
`(A) the production of such visual depiction involves the
|
||
|
use of a minor engaging in sexually explicit conduct;
|
||
|
|
||
|
`(B) such visual depiction is, or appears to be, of a minor
|
||
|
engaging in sexually explicit conduct; or
|
||
|
|
||
|
`(C) such visual depiction is advertised, promoted,
|
||
|
presented, described, or distributed in such a manner
|
||
|
that conveys the impression that the material is or
|
||
|
contains a visual depiction of a minor engaging in
|
||
|
sexually explicit conduct.'.
|
||
|
|
||
|
SEC. 4. PROHIBITED ACTIVITIES RELATING TO MATERIAL CONSTITUTING OR CONTAINING
|
||
|
CHILD PORNOGRAPHY.
|
||
|
|
||
|
(a) IN GENERAL- Section 2252 of title 18, United States Code, is
|
||
|
amended to read as follows:
|
||
|
|
||
|
`Sec. 2252. Certain activities relating to material constituting or
|
||
|
containing child pornography
|
||
|
|
||
|
`(a) Any person who--
|
||
|
|
||
|
`(1) knowingly mails, transports, or ships in interstate or
|
||
|
foreign commerce by any means, including by computer, any
|
||
|
child pornography;
|
||
|
|
||
|
`(2) knowingly receives or distributes--
|
||
|
|
||
|
`(A) any child pornography that has been mailed, shipped, or
|
||
|
transported in interstate or foreign commerce by any
|
||
|
means, including by computer; or
|
||
|
|
||
|
`(B) any material that contains child pornography that has
|
||
|
been mailed, shipped, or transported in interstate or
|
||
|
foreign commerce by any means, including by computer;
|
||
|
|
||
|
`(3) knowingly reproduces any child pornography for distribution
|
||
|
through the mails, or in interstate or foreign commerce by
|
||
|
any means, including by computer;
|
||
|
|
||
|
`(4) either--
|
||
|
|
||
|
`(A) in the maritime and territorial jurisdiction of the
|
||
|
United States, or on any land or building owned by,
|
||
|
leased to, or otherwise used by or under the control of
|
||
|
the United States Government, or in the Indian country
|
||
|
(as defined in section 1151), knowingly sells or
|
||
|
possesses with the intent to sell any child pornography;
|
||
|
or
|
||
|
|
||
|
`(B) knowingly sells or possesses with the intent to sell
|
||
|
any child pornography that has been mailed, shipped, or
|
||
|
transported in interstate or foreign commerce by any
|
||
|
means, including by computer, or that was produced using
|
||
|
materials that have been mailed, shipped, or transported
|
||
|
in interstate or foreign commerce by any means,
|
||
|
including by computer; or
|
||
|
|
||
|
`(5) either--
|
||
|
|
||
|
`(A) in the maritime and territorial jurisdiction of the
|
||
|
United States, or on any land or building owned by,
|
||
|
leased to, or otherwise used by or under the control of
|
||
|
the United States Government, or in the Indian country
|
||
|
(as defined in section 1151), knowingly possesses 3 or
|
||
|
more books, magazines, periodicals, films, videotapes,
|
||
|
computer disks, or any other material that contains any
|
||
|
child pornography; or
|
||
|
|
||
|
`(B) knowingly possesses 3 or more books, magazines,
|
||
|
periodicals, films, videotapes, computer disks, or any
|
||
|
other material that contains any child pornography that
|
||
|
has been mailed, shipped, or transported in interstate
|
||
|
or foreign commerce by any means, including by computer,
|
||
|
|
||
|
shall be punished as provided in subsection (b).
|
||
|
|
||
|
`(b)(1) Whoever violates, or attempts or conspires to violate,
|
||
|
paragraphs (1), (2), (3), or (4) of subsection (a) shall be fined
|
||
|
under this title or imprisoned not more than 10 years, or both,
|
||
|
but, if such person has a prior conviction under this chapter or
|
||
|
chapter 109A, such person shall be fined under this title and
|
||
|
imprisoned for not less than 5 years nor more than 15 years.
|
||
|
|
||
|
`(2) Whoever violates paragraph (5) of subsection (a) shall be fined
|
||
|
under this title or imprisoned for not more than 5 years, or
|
||
|
both.'.
|
||
|
|
||
|
(b) TECHNICAL AMENDMENT- The table of sections for chapter 110 of
|
||
|
title 18, United States Code, is amended by amending the item
|
||
|
relating to section 2252 to read as follows:
|
||
|
|
||
|
`2252. Certain activities relating to material constituting or
|
||
|
containing child pornography.'.
|
||
|
|
||
|
SEC. 5. PRIVACY PROTECTION ACT AMENDMENTS.
|
||
|
|
||
|
Section 101 of the Privacy Protection Act of 1980 (42 U.S.C. 2000aa)
|
||
|
is amended--
|
||
|
|
||
|
(1) in subsection (a)(1), by inserting before the semicolon at
|
||
|
the end the following: `, or if the offense involves the
|
||
|
production, possession, receipt, mailing, sale, distribution,
|
||
|
shipment, or transportation of child pornography, the sexual
|
||
|
exploitation of children, or the sale or purchase of children
|
||
|
under section 2251, 2251A, or 2252 of title 18, United States
|
||
|
Code'; and
|
||
|
|
||
|
(2) in subsection (b)(1), by inserting before the semicolon at
|
||
|
the end the following: `, or if the offense involves the
|
||
|
production, possession, receipt, mailing, sale, distribution,
|
||
|
shipment, or transportation of child pornography, the sexual
|
||
|
exploitation of children, or the sale or purchase of children
|
||
|
under section 2251, 2251A, or 2252 of title 18, United States
|
||
|
Code'.
|
||
|
|
||
|
SEC. 6. SEVERABILITY.
|
||
|
|
||
|
If any provision of this Act, an amendment made by this Act, or the
|
||
|
application of such provision or amendment to any person or
|
||
|
circumstance is held to be unconstitutional, the remainder of this
|
||
|
Act, the amendments made by this Act, and the application of such
|
||
|
to any other person or circumstance shall not be affected thereby.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 12 Jun 1996 04:24:02 -0700 (PDT)
|
||
|
From: "Brock N. Meeks" <brock@WELL.COM>
|
||
|
Subject: File 3--"The One that got Away" Port (Brock Meeks)
|
||
|
|
||
|
CyberWire Dispatch // Copyright (c) 1996 //
|
||
|
|
||
|
Jacking in from the "One that Got Away" Port:
|
||
|
|
||
|
Washington, DC -- President Clinton call your spooks, get FBI Director
|
||
|
Louis Freeh on the phone. Tell them to order in pizza. Bill, it's
|
||
|
going to be a long night. All your plans to hold the U.S. crypto
|
||
|
market hostage have just been fucked... and you didn't even get kissed.
|
||
|
|
||
|
A virtual tactical nuke was hurled into the arcane subculture of
|
||
|
encryption technology Monday when RSA President Jim Bidzos revealed
|
||
|
that his company's Japanese subsidiary had developed the underlying
|
||
|
code for a monster chipset to be manufactured by NTT, the Japanese
|
||
|
telecom giant. Bidzos said the chipset will be capable of scrambling
|
||
|
voice and data real time with a so-called "key length" of up to 1024
|
||
|
bits.
|
||
|
|
||
|
That key length stuff is just so much gibberish to those playing
|
||
|
without a scorecard, so let me drill down on it for you. Basically,
|
||
|
the longer the key length, the harder it is for a message to be broken
|
||
|
by "brute force" automated attacks. Current U.S. laws prohibit the
|
||
|
export of any encryption device with a key length longer than 40-bits,
|
||
|
or roughly the equivalent of Captain Crunch decoder ring. Although
|
||
|
it's not possible to make direct comparisons between a public key
|
||
|
system, like RSA, and private key systems, such as the exportable
|
||
|
40-bit encryption, the 1024-bit key RSA scrambling scheme is a hell of
|
||
|
a lot tougher to break and it makes the Feds uneasy.
|
||
|
|
||
|
Bidzos, speaking during lunchtime at the Electronic Privacy Information
|
||
|
Center (EPIC) 6th Cryptography and Privacy conference, told how his
|
||
|
Japanese based company, Nihon-RSA, developed a set of two chips capable
|
||
|
of scrambling messages at a level that will make the spooks in the
|
||
|
Puzzle Palace (the National Security Administration) cough up hair
|
||
|
balls that would make the First Cat Socks envious.
|
||
|
|
||
|
Bidzos seems to have found crypto's magic bullet; a legit way to
|
||
|
essentially give the finger to U.S. export laws for crypto product. For
|
||
|
years now the White House has been locked into a kind of crypto war.
|
||
|
The Administration insists that strong encryption products must not be
|
||
|
exported for fear that "terrorists, child pornographers and drug
|
||
|
barons" and a rabble of assorted "bad guys" would snag the technology
|
||
|
and proceed to plot the destruction of the "World As We Know It"... or
|
||
|
at least Western Democracy, if the inbred Iranians got in line first.
|
||
|
|
||
|
The White House crypto-fascist team, led by the NSA, FBI and assorted
|
||
|
military hawks, have offered braindead compromise plans, including
|
||
|
three versions of the "Clipper Chip." This is a plan whereby you can
|
||
|
buy strong locks for your data with the simple caveat that when you buy
|
||
|
and use the products, you have to put the decoding key "in escrow."
|
||
|
This way if a law enforcement agency ever has the need to unscramble
|
||
|
any of your messages -- without you knowing it -- they can simply ask
|
||
|
for these escrowed keys and have them handed over. Yes, even your
|
||
|
local sheriff's department can ask for the keys.
|
||
|
|
||
|
Now, the government promises it will use this power only for good and
|
||
|
never for evil. Honest, that's what they say. Of course, the Justice
|
||
|
Department, in writing the rules for getting the keys, totally absolves
|
||
|
any law enforcement agency of all harm if this power is abused in any
|
||
|
way. Oh.. and if that power is abused, the sheriff or the FBI or
|
||
|
fucking Park Police for that matter, can still use any "evidence" they
|
||
|
gin up on you. Honest, I'm not making any of this stuff up.
|
||
|
|
||
|
So the battle has raged. The industry has been loathe to develop such
|
||
|
products only for the American market because the cost of producing
|
||
|
essentially duplicate products for domestic and foreign markets just
|
||
|
wouldn't be cost effective.
|
||
|
|
||
|
So, you and I are stuck having to use some pretty tedious encryption
|
||
|
technologies, such as PGP (Pretty Good Privacy), which is great, but
|
||
|
tough to use. Or we can use the Captain Crunch Decoder ring
|
||
|
equivalents available off the shelf. In the meantime, other countries
|
||
|
are happily making and distributing robust encryption technologies, at
|
||
|
a possible loss of up to $60 billion for U.S. companies, at least if
|
||
|
industry is to be believed (okay... I see you all laughing...)
|
||
|
|
||
|
Bidzos, tired of fighting the wars here, enlisted the help of the
|
||
|
Japanese. After setting up his Japanese unit, he hired a crack team
|
||
|
of Japanese crypto experts who essentially "reverse engineered" the
|
||
|
company's own U.S. crypto product, according to Kurt Stammberger, RSA
|
||
|
director of technology marketing. It was a brilliant move. Bidzos
|
||
|
can't be slammed by the State Department for violating crypto export
|
||
|
laws because, well, he didn't export a damn thing, except some U.S.
|
||
|
greenbacks, which of course, could have gone to U.S. cryptographers,
|
||
|
but let's not quibble about jobs.
|
||
|
|
||
|
Anyone want to kick around the subject of global competitiveness?
|
||
|
|
||
|
What's happened here is the Japanese have now trumped the entire world
|
||
|
on the crypto market. What's more, Clinton's brain-dead allegiance to
|
||
|
the FBI, et al., has now allowed the Japanese government, which still
|
||
|
owns a large share of NTT, which owns a minority share of RSA's
|
||
|
Japanese subsidiary, to have a lock on the world's strongest encryption
|
||
|
technology. Can you say "Remember the VCR" or "Remember the
|
||
|
Semiconductor" or how about "Thanks, Bill. We're fucked."
|
||
|
|
||
|
The boys in the Pentagon made a stink a few years ago when a Japanese
|
||
|
company made a play for Fairchild, a top defense contractor. It was
|
||
|
feared that the Japanese, by swallowing up the U.S. company, would also
|
||
|
gain access to technologies vital to the U.S. military. The deal was
|
||
|
squashed. Natch... now it looks like the G.I.'s with the stars on
|
||
|
their shoulders have just put their spit-shined combat boots up their
|
||
|
own ass by supporting Clinton and his continued ban on crypto exports.
|
||
|
|
||
|
"We truly have ceded this market Japanese companies," Bidzos said.
|
||
|
"It's almost too late to turn it around." Some 15 COUNTRIES have
|
||
|
already placed orders for these chips, Bidzos said, adding that the
|
||
|
Japanese will not build the chips with a key escrow function.
|
||
|
|
||
|
EPIC Director Marc Rotenberg said he was told by a Japanese
|
||
|
representative that the country's constitution wouldn't allow key
|
||
|
escrow because it doesn't allow wire-tapping. Umm... maybe the
|
||
|
Japanese just don't have *really* bad guys like the FBI assumes we have
|
||
|
here.
|
||
|
|
||
|
What's more, Bidzos says the deal with NTT is "no coup." He says the
|
||
|
Germans and French "aren't far behind" in developing similar
|
||
|
technologies. The RSA bombshell "fuels the argument that this stuff
|
||
|
can't be contained in our own borders," said PGP's Zimmermann.
|
||
|
|
||
|
Just how the relationship between NTT and RSA works out isn't set,
|
||
|
Bidzos acknowledged. "They'll pay us a royalty for the chips they
|
||
|
sell," he said. "We're working it all out."
|
||
|
|
||
|
Meanwhile, from my office window here in DC I've already counted 17
|
||
|
Domino's Pizza delivery bikes go screaming by on their way to the White
|
||
|
House. Through my telescope I can see the White House balcony; it
|
||
|
looks like Bill is sick, like he's just heard some "really bad news."
|
||
|
And behind him, just inside the double-doors, on a persian rug placed
|
||
|
there by Warren G. Harding, I think Socks the Cat has just coughed up a
|
||
|
hairball... or maybe it was Louis Freeh. From this angle, I just can't
|
||
|
be sure.
|
||
|
|
||
|
Meeks out...
|
||
|
|
||
|
------------
|
||
|
|
||
|
Additional reporting by Declan McCullagh (declan@well.com)
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 4 Jun 96 21:42:50 PDT
|
||
|
From: Jonathan Blumen <us003275@pop3.interramp.com>
|
||
|
Subject: File 4--Religious right and the Net
|
||
|
|
||
|
THE RELIGIOUS RIGHT AND INTERNET CENSORSHIP
|
||
|
|
||
|
by Jonathan Wallace jw@bway.net
|
||
|
|
||
|
(This article appeared in the May issue of Freedom Writer, the
|
||
|
newsletter of ther Institute for First Amendment Studies.)
|
||
|
|
||
|
A trial taking place in Philadelphia now will determine the
|
||
|
constitutionality of the Communications Decency Act (CDA), a federal
|
||
|
law passed last fall which criminalizes the online "depiction or
|
||
|
description" of sexual acts and organs. By its terms, the CDA
|
||
|
permits regulation of electronic text far beyond what is permissible
|
||
|
for books and magazines under the First Amendment. In the back of
|
||
|
the courtroom, representatives of the religious right, such as
|
||
|
ex-prosecutor Bruce Taylor of the National Law Center for Children
|
||
|
and Families, are monitoring each day of the trial with intent
|
||
|
interest.
|
||
|
|
||
|
Why are they there? Not only is the CDA an extension of the
|
||
|
religious right's campaign to dictate moral standards in traditional
|
||
|
media; the CDA itself is a creature of the religious right, which
|
||
|
had a significant hand in sculpting it, lining up politicians to
|
||
|
support it, and then supplying them with the ammunition they needed
|
||
|
to get it passed.
|
||
|
|
||
|
Soon after the Republicans released their Contract with America, the
|
||
|
Christian Coalition responded with its Contract with the American
|
||
|
Family; item 10 called for strict regulation of the Internet to
|
||
|
protect minors against sexual material. Bruce Taylor responded to
|
||
|
the Christian Coalition's call. Taylor prosecuted more than sixty
|
||
|
obscenity cases during his tenure with the Department of Justice,
|
||
|
before leaving to become Executive Director of the National Law
|
||
|
Center for Children and Families. Working behind the scenes advising
|
||
|
Nebraska Senator James J. Exon, a conservative Democrat who had made
|
||
|
the issue of Internet indecency his own, Taylor helped draft the
|
||
|
CDA, first introduced by Exon during 1994. The bill expired that
|
||
|
year but succeeded in becoming law in 1995, after the election of a
|
||
|
Republican majority with ties to the religious right.
|
||
|
|
||
|
On June 12, 1995, the Senate initiated debate on the CDA with a
|
||
|
prayer by the Senate chaplain, Dr. Lloyd John Ogilvie: "Almighty
|
||
|
God, Lord of all life, we praise You for the advancements in
|
||
|
computerized communications that we enjoy in our time. Sadly,
|
||
|
however, there are those who are littering this information
|
||
|
superhighway with obscene, indecent, and destructive pornography."
|
||
|
Senator Patrick Leahy of Vermont, foremost adversary of the CDA,
|
||
|
later commented that the Chaplain should "allow us to debate these
|
||
|
issues and determine how they come out and maybe pray for our
|
||
|
guidance, but allow us to debate them. He may find that he has
|
||
|
enough other duties, such as composing a prayer each morning for us,
|
||
|
to keep him busy."
|
||
|
|
||
|
The entire Senate debate, spearheaded by Senator Exon and
|
||
|
Republicans Dan Coats and Charles Grassley, was informed by the
|
||
|
sensibilities of the religious right. The Senators read letters from
|
||
|
the Christian Coalition and from Bruce Taylor into the record. More
|
||
|
significantly, they flaunted statistics from the notorious Marty
|
||
|
Rimm "cyberporn" study two weeks before it was released in an
|
||
|
exclusive article in the July 3rd Time magazine. Apparently, the
|
||
|
proponents of the CDA had been given a preview of the study's
|
||
|
contents.
|
||
|
|
||
|
Mike Godwin, staff counsel to the Electronic Frontier Foundation,
|
||
|
believes that the religious right acted as the conduit between the
|
||
|
Georgetown Law Journal, then preparing the Rimm study for
|
||
|
publication, and the pro-censorship Senators. Godwin discovered that
|
||
|
as early as November 1994, Bruce Taylor was assisting Marty Rimm,
|
||
|
then a junior at Carnegie Mellon, in preparing his study, a thesis
|
||
|
project. Deen Kaplan, a Georgetown Law student and editor of the Law
|
||
|
Journal, shared office space with Taylor in a complex which also
|
||
|
housed the National Coalition for Children and Families and Donna
|
||
|
Rice's organization, Enough is Enough. Another protege of Taylor's,
|
||
|
John McMickle, was now on Senator Grassley's staff, and assisted him
|
||
|
in drafting his own Internet indecency legislation. Deen Kaplan
|
||
|
compiled Senator Exon's "Blue Book" of Internet pornography, which
|
||
|
he brandished to great effect during the Senate discussions.
|
||
|
|
||
|
On June 14, Senator Coats of Indiana announced in the Senate that
|
||
|
there were 450,000 pornographic images and text files on the Net,
|
||
|
which had been accessed 6.4 million times in the last year. Although
|
||
|
he did not give the source of these statistics, they came directly
|
||
|
from the still-secret Rimm study. After its release in July, the
|
||
|
cyberporn study was quickly discredited as a scientific document and
|
||
|
revealed to be the publicity-seeking stunt of a University
|
||
|
undergraduate, but the damage it caused continues: the Department of
|
||
|
Justice introduced it in evidence in the current trial of the CDA.
|
||
|
|
||
|
Ironically, the author soon tried to distance himself from the use
|
||
|
the religious right made of his study. Ralph Reed of the Christian
|
||
|
Coalition had praised the study on Nightline. Marty Rimm responded:
|
||
|
"Frankly, my sense is that things are getting blown out of
|
||
|
proportion because people are angry that the study will be
|
||
|
misappropriated. Their concerns are indeed well-founded. For
|
||
|
instance, Ralph Reed stated on Nightline that According to the
|
||
|
Carnegie Mellon University survey, one-quarter of all the images
|
||
|
involve the torture of women. This is simply untrue; the Carnegie
|
||
|
Mellon study does not report any results concerning torture. Many
|
||
|
others on Capitol Hill have misappropriated the study as well."
|
||
|
|
||
|
Some Congressmen privately told constituents that they had no choice
|
||
|
but to vote for a law which they believed the courts would later
|
||
|
hold unconstitutional; the Senate passed the CDA by a vote of 86-14.
|
||
|
The next day, Ralph Reed of the Christian Coalition exulted: "We are
|
||
|
proud and honored that the first item of the Contract With The
|
||
|
American Family that passed either house of Congress is designed to
|
||
|
protect our children... We applaud Senators Coats and Exon for their
|
||
|
decisive step forward to protect our nation's youth from the real
|
||
|
threat of cyber-porn, and we look forward to swift action in the
|
||
|
House."
|
||
|
|
||
|
For a while, it looked as if the CDA would be defeated in the House,
|
||
|
where Speaker Gingrich had announced that it was unconstitutional.
|
||
|
The CDA was never reported out of committee, and the House made a
|
||
|
show of passing the Cox-Wyden amendment, which lauded the Internet
|
||
|
and announced that the FCC would never have any role in regulating
|
||
|
it. However, in a remarkable manipulation of the procedural rules,
|
||
|
Congressman Henry Hyde of Illinois, another long-time supporter of
|
||
|
the religious right's agenda, added his own version of Internet
|
||
|
indecency language to the Telecommunications Reform Act in a last
|
||
|
minute "manager's mark amendment." This swept to victory shortly
|
||
|
afterwards as the House endorsed the Telcom act, with most
|
||
|
legislators completely unaware that Congressman Hyde had tacked it
|
||
|
on to the bill. The next day, Ralph Reed said, apropos of this and
|
||
|
other legislative developments: "We are on a roll.... We never
|
||
|
expected to make so much progress so quickly... Our grassroots will
|
||
|
stay engaged until the final item is passed and signed by this or a
|
||
|
future president." He made no mention of the unsavory way in which
|
||
|
Congressman Hyde had resuscitated a law declared dead by the
|
||
|
Speaker. A House-Senate conference commitee reconciled the Exon and
|
||
|
Hyde versions, and later that fall, President Clinton signed the
|
||
|
telcom bill, including the CDA, into law.
|
||
|
|
||
|
The religious right is not resting on its laurels. In addition to
|
||
|
attending the Philadelphia case, it has taken to the media with an
|
||
|
aggressive defense of the CDA. A few weeks ago, I debated
|
||
|
ex-prosecutor Patrick Trueman, now legislative affairs director for
|
||
|
the American Family Association, on NBC's America's Talking cable
|
||
|
network. Trueman called the Internet "depraved" and accused me of
|
||
|
wanting "to let the perverts go." Shortly after, he released a
|
||
|
letter to the press in which he called for the prosecution of the
|
||
|
Compuserve online service under the CDA for its alleged hosting of
|
||
|
pornographic images.
|
||
|
|
||
|
In her fine 1993 history of American arts censorship, ACLU attorney
|
||
|
Marjorie Heins wrote that "the message of religiously based
|
||
|
'profamily' leaders like Reverend Donald Wildmon of the American
|
||
|
Family Association or Pat Robertson of the Christian Coalition was
|
||
|
not merely that their views on sexuality, women's rights,
|
||
|
reproductive freedom, and religion were correct, but that other
|
||
|
views should not even be heard." These two organizations, and others
|
||
|
like them, have now mounted a pre-emptive strike against the
|
||
|
Internet.
|
||
|
|
||
|
Jonathan Wallace, a software executive and attorney, is co-author
|
||
|
with Mark Mangan of Sex, Laws and Cyberspace, a book about Internet
|
||
|
censorship (Henry Holt, 1996) (http://www.spectacle.org/freespch/).
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #8.47
|
||
|
************************************
|
||
|
|