835 lines
38 KiB
Plaintext
835 lines
38 KiB
Plaintext
![]() |
|
|||
|
Computer underground Digest Sun Aug 18, 1996 Volume 8 : Issue 60
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #8.60 (Sun, Aug 18, 1996)
|
|||
|
|
|||
|
File 1--Suit filed to enjoin crypto provisions of the ITAR
|
|||
|
File 2--ACLU Gives Princeton "F" for Barring Pol Speech on its Network
|
|||
|
File 3--Full Text of ACLU Letter to Princeton re: Computer Use Policy
|
|||
|
File 4--EYENET: Ontario Tories Get "Make-Over" On The Web
|
|||
|
File 5--BoS: Hare Virus Removal - VirusNet (fwd)
|
|||
|
File 6--UK ISPs Restrict cyberporn; AOL (again) (news from noah)
|
|||
|
File 7--Scientology begins PGP crack attempt (fwd)
|
|||
|
File 8--An Apology to Edupage
|
|||
|
File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Thu, 08 Aug 1996 15:21:24 -0400
|
|||
|
From: "Peter D. Junger" <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
|
|||
|
Subject: File 1--Suit filed to enjoin crypto provisions of the ITAR
|
|||
|
|
|||
|
[I have cross-posted this press release by my lawyers to several
|
|||
|
mailing-lists. I am subscribed to all of them and I believe that this
|
|||
|
information is relevant to all of them, but I apologize because you
|
|||
|
may receive several copies.]
|
|||
|
|
|||
|
--
|
|||
|
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
|
|||
|
Internet: junger@pdj2-ra.f-remote.cwru.edu junger@samsara.law.cwru.edu
|
|||
|
URL: http://samsara.law.cwru.edu
|
|||
|
|
|||
|
|
|||
|
------------------------Press Release---------------------------------
|
|||
|
|
|||
|
Law Professor Sues Federal Government
|
|||
|
Over Computer Privacy Issues
|
|||
|
|
|||
|
Federal Civil Rights Action Seeks Injunction Against
|
|||
|
State Department And National Security Agency
|
|||
|
|
|||
|
Cleveland Scholar Attacks Prohibition On Discussing
|
|||
|
Cryptographic Software With Foreign Students And Colleagues
|
|||
|
|
|||
|
|
|||
|
For Immediate Release
|
|||
|
Cleveland, Wednesday, August 7, 1996
|
|||
|
|
|||
|
For More Information Contact:
|
|||
|
Raymond Vasvari (216) 522-1925
|
|||
|
Gino Scarselli (216) 291-8601
|
|||
|
|
|||
|
More Information Will Be Available at:
|
|||
|
URL: //http:/samsara.law.cwru.edu
|
|||
|
|
|||
|
|
|||
|
A Case Western Reserve University law professor filed suit today in
|
|||
|
federal court, challenging government regulations which restrict
|
|||
|
his ability to teach a course in computer law. Peter Junger, a
|
|||
|
twenty-five year veteran of the law school faculty, will file a
|
|||
|
federal civil rights action this afternoon in the United States
|
|||
|
District Court in Cleveland. The suit names the Department of
|
|||
|
State and the secretive National Security Agency, which administer
|
|||
|
federal regulations limiting Professor Junger's ability to teach.
|
|||
|
|
|||
|
The case involves the International Traffic in Arms Regulations, or
|
|||
|
ITAR, federal regulations which restrict the export of military
|
|||
|
technology. Under the ITAR, cryptographic computer software, which
|
|||
|
encodes text to preserve the privacy of messages on the Internet,
|
|||
|
is considered a "munition" and subject to strict export control.
|
|||
|
The regulations raise significant First Amendment questions by
|
|||
|
defining "export" to include discussing technical information about
|
|||
|
non-classified software with foreign nationals, such as students
|
|||
|
registered for Professor Junger's course.
|
|||
|
|
|||
|
In recent months, the State Department has sent a series of letters
|
|||
|
threatening possible criminal action to a Florida man who posted a
|
|||
|
simple cryptographic algorithm to the "sci.crypt" Usenet Newsgroup,
|
|||
|
an Internet site popular with cryptography enthusiasts. These and
|
|||
|
similar incidents have caused Professor Junger to limit his
|
|||
|
discussions of cryptographic material with foreign colleagues, for
|
|||
|
fear of violating the ITAR. Penalties for unlicenced disclosure of
|
|||
|
cryptographic information are severe: federal law provides ten year
|
|||
|
prison terms and One Million Dollar fines for those convicted of
|
|||
|
violating the Arms Export Control Act, the legislation under which
|
|||
|
the ITAR was promulgated.
|
|||
|
|
|||
|
Professor Junger, whose class at Case Western Reserve focuses on
|
|||
|
the legal aspects of computer use and software development, plans
|
|||
|
to turn away any foreign students who register for the course this
|
|||
|
fall, largely because the law is uncertain as to what he may teach,
|
|||
|
and to whom.
|
|||
|
|
|||
|
The restrictions at issue are administered by the Department of
|
|||
|
State, in cooperation with the ultra-secret National Security
|
|||
|
Agency, the organization charged with eavesdropping on foreign
|
|||
|
governments. Under the ITAR, Junger may not teach foreign
|
|||
|
students about even simple software capable of encoding messages.
|
|||
|
Such software is vital to maintaining the privacy of communications
|
|||
|
and financial transactions on the Internet, and Junger believes
|
|||
|
that lawyers need to understand how it works in order to prepare to
|
|||
|
practice in an increasingly technological world.
|
|||
|
|
|||
|
The information that Junger wishes to disclose is widely available
|
|||
|
on the Internet and elsewhere. "It's not as though we are talking
|
|||
|
about classified information," explained Gino Scarselli, one of
|
|||
|
three lawyers representing Junger in the case. "The material at
|
|||
|
issue in this case can be found in any university library, but the
|
|||
|
regulations make no exceptions for even the most basic software,"
|
|||
|
Scarselli noted. The lawsuit does not challenge the government's
|
|||
|
right to restrict access to classified information.
|
|||
|
|
|||
|
Junger is also represented by Raymond Vasvari and Kevin Francis
|
|||
|
O'Neill, two Cleveland attorneys with considerable experience in
|
|||
|
First Amendment issues. As Vasvari explained, the suit presents
|
|||
|
important First Amendment questions about the government's ability
|
|||
|
to regulate academic life. "These regulations allow the government
|
|||
|
to dictate what a professor may and may not teach, even though the
|
|||
|
material involved poses no threat to national security," Vasvari
|
|||
|
explained.
|
|||
|
|
|||
|
The suit charges that by requiring Junger to apply for a federal
|
|||
|
license to discuss cryptography with foreigners, the government is
|
|||
|
violating a well-established First Amendment rule which prohibits
|
|||
|
the government from imposing prior restraints on expression without
|
|||
|
clear, narrowly drawn standards distinguishing prohibited
|
|||
|
expression from permissible speech. The United States Supreme
|
|||
|
Court has consistently held that such prior restraints face a heavy
|
|||
|
burden in court, and that standardless licencing schemes allowing
|
|||
|
officials broad discretion in restriction speech are
|
|||
|
unconstitutional.
|
|||
|
|
|||
|
Because computer cryptography is expected to play an important role
|
|||
|
in the economic development of the Internet, the case is being
|
|||
|
closely watched. Scarselli has worked closely with attorneys
|
|||
|
affiliated with the San Francisco based Electronic Frontier
|
|||
|
Foundation in preparing the suit, and Junger and his lawyers have
|
|||
|
been in frequent contact with John Gilmore, formerly of Sun
|
|||
|
Microsystems, who has offered his assistance as a technical advisor
|
|||
|
in the case.
|
|||
|
|
|||
|
At issue is not only Junger's right to discuss cryptography with
|
|||
|
foreigners, but also his and other's right to publish and
|
|||
|
distribute such information both in traditional forms and on the
|
|||
|
internet.
|
|||
|
|
|||
|
Professor Junger's suit seeks declaratory and injunctive relief,
|
|||
|
prohibiting the government from interfering with his, or any other
|
|||
|
person's, discussing non-classified cryptographic information with
|
|||
|
foreign persons or from publishing that information. Lawyers for
|
|||
|
Junger have moved the court for a preliminary injunction. Junger's
|
|||
|
course begins in the fall semester, later this month.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 15 Aug 1996 17:14:12 GMT
|
|||
|
From: Ann Beeson <beeson@usa.pipeline.com>
|
|||
|
Subject: File 2--ACLU Gives Princeton "F" for Barring Pol Speech on its Network
|
|||
|
|
|||
|
AMERICAN CIVIL LIBERTIES UNION
|
|||
|
NATIONAL HEADQUARTERS
|
|||
|
News Release August 15, 1996
|
|||
|
----------------------------------------------------
|
|||
|
|
|||
|
Free Speech 101: ACLU Gives Princeton University an "F"
|
|||
|
for Barring Political Speech on its Network
|
|||
|
|
|||
|
FOR IMMEDIATE RELEASE
|
|||
|
Wednesday, August 15, 1996
|
|||
|
|
|||
|
Contact: Ann Beeson, ACLU National (212) 944-9800, x788
|
|||
|
David Rocah, ACLU of New Jersey (201) 642-2084
|
|||
|
|
|||
|
NEW YORK--In a letter sent today to Princeton University officials, the
|
|||
|
American Civil Liberties Union urged them to reconsider a policy barring
|
|||
|
students and staff from using the computer network for "political
|
|||
|
purposes."
|
|||
|
|
|||
|
The letter was sparked by complaints the ACLU national office received over
|
|||
|
a recent memo from Princeton officials advising faculty, staff and
|
|||
|
students, "especially in this year of a presidential election," that the
|
|||
|
school's not-for-profit status barred it from allowing use of the computer
|
|||
|
network "for political purposes."
|
|||
|
|
|||
|
The ACLU called this conclusion mistaken, pointing out in its letter that
|
|||
|
the Internal Revenue Code specifies that only the University itself is
|
|||
|
barred from political activity -- not faculty, staff, or students acting
|
|||
|
independently. In fact, the ACLU said, the IRS has previously held that
|
|||
|
statements in support of political candidates appearing on the editorial
|
|||
|
page of a student newspaper would not be considered violations of a
|
|||
|
university's 501(c)(3) tax-exempt status.
|
|||
|
|
|||
|
"Because there exists no legitimate reason for Princeton's blanket
|
|||
|
prohibition of political speech over the computer network," the ACLU letter
|
|||
|
stated, "it is an unjustified content-based restriction on the free
|
|||
|
expression rights of students, faculty and staff. Therefore, the policy is
|
|||
|
not only unworthy of a great university like Princeton, it is in violation
|
|||
|
of the New Jersey State Constitution." The letter was signed by ACLU
|
|||
|
national staff attorney Ann Beeson and David Rocah, staff attorney of the
|
|||
|
ACLU of New Jersey.
|
|||
|
|
|||
|
"We understand the university's concerns regarding it's tax-exempt status,"
|
|||
|
Rocah said. "But this is free speech 101. Sadly, Princeton is not making
|
|||
|
the grade."
|
|||
|
|
|||
|
Rocah said the ACLU would consider legal action if the university refuses
|
|||
|
to drop its censorship policy.
|
|||
|
|
|||
|
"Traditionally, college campuses are the center of political discussion and
|
|||
|
debate," said Beeson. "The fact that the debate is taking place on the
|
|||
|
Internet does not mean that the speech is any less deserving of
|
|||
|
protection."
|
|||
|
|
|||
|
Beeson added that the policy could bar students and staff from a wide range
|
|||
|
of protected expression, including downloading position papers from the
|
|||
|
Dole or Clinton website; sending e-mail to their parents urging them to
|
|||
|
vote for Ralph Nader; and organizing online discussion groups for student
|
|||
|
chapters of politically active groups such as Greenpeace. In short, Rocah
|
|||
|
said, "Everything that would be acceptable, even welcome, off-line, becomes
|
|||
|
off-limits on the Internet."
|
|||
|
|
|||
|
In its letter, the ACLU called on the school to take a leadership role in
|
|||
|
the academic community: "As a school with a well-deserved reputation as a
|
|||
|
leader in American higher education, Princeton should be the first to
|
|||
|
promote and defend academic freedom and freedom of expression within its
|
|||
|
community, to the very limits of the law," the letter said.
|
|||
|
|
|||
|
Beeson added that the ACLU is working to develop model guidelines for
|
|||
|
colleges and universities to help sort out the confusion in academia
|
|||
|
regarding free expression on the Internet. Many schools have already put
|
|||
|
in place "Appropriate Use Policies" to police student and faculty computer
|
|||
|
use, some of which violate rights of free expression, Beeson said.
|
|||
|
|
|||
|
[The full text of the ACLU letter and Princeton memo are also available
|
|||
|
through the ACLU's website <http://www.aclu.org>and America Online site
|
|||
|
(keyword: ACLU).]
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 15 Aug 1996 17:29:11 GMT
|
|||
|
From: Ann Beeson <beeson@usa.pipeline.com>
|
|||
|
To: fight-censorship@vorlon.mit.edu, rountable@cni.org
|
|||
|
Subject: File 3--Full Text of ACLU Letter to Princeton re: Computer Use Policy
|
|||
|
|
|||
|
AMERICAN CIVIL LIBERTIES UNION
|
|||
|
NATIONAL LEGAL DEPARTMENT
|
|||
|
132 West 43rd Street
|
|||
|
New York, New York 10036
|
|||
|
------------------------------
|
|||
|
|
|||
|
August 15, 1996
|
|||
|
|
|||
|
Mr. Harold Shapiro
|
|||
|
President BY FACSIMILE, E-MAIL, & REGULAR MAIL
|
|||
|
1 Nassau Hall
|
|||
|
Princeton University
|
|||
|
Princeton NJ 85044
|
|||
|
|
|||
|
RE: Computer Use Policy
|
|||
|
|
|||
|
Dear President Shapiro:
|
|||
|
|
|||
|
In response to complaints we have received from members of the Princeton
|
|||
|
University community, we write on behalf of the American Civil Liberties
|
|||
|
Union (ACLU) and the American Civil Liberties Union of New Jersey (ACLU-NJ)
|
|||
|
to urge you to reconsider the policy prohibiting members of the University
|
|||
|
from using the Princeton's computer network for "political purposes." We
|
|||
|
believe that the policy is based on a misunderstanding of the law regarding
|
|||
|
the University's tax-exempt status, and restricts free speech and academic
|
|||
|
freedom rights guaranteed by Art. I, par. 6 of the New Jersey Constitution.
|
|||
|
|
|||
|
|
|||
|
Princeton University's decision to offer its faculty, staff and students
|
|||
|
widespread access to the University's computer network and the Internet
|
|||
|
greatly expanded the resources available for academic research. It also
|
|||
|
provided a new and exciting forum for the free communication of ideas. In
|
|||
|
contrast, Princeton's decision to prohibit the use of the network for
|
|||
|
"political purposes" unjustifiably interferes with the right of the
|
|||
|
University community to exchange ideas freely, regardless of their content.
|
|||
|
|
|||
|
|
|||
|
Princeton's current computer use policy holds that "the Computing and
|
|||
|
network resources of the University may not be used by members of the
|
|||
|
University community for commercial or political purposes or for financial
|
|||
|
gain . . . ." Trustees of Princeton University, Rights, Rules,
|
|||
|
Responsibilities 11 (1993) (emphasis added) (hereinafter "Rights," attached
|
|||
|
as Appendix A). On July 19, 1996, the Office of the General Counsel sent
|
|||
|
an e-mail to members of the University community warning them that any use
|
|||
|
of the Internet or computer network for "any participation in, or
|
|||
|
intervention in, (including the publishing or distributing of statements),
|
|||
|
any political campaign on behalf of (or in opposition to) any candidate for
|
|||
|
public office" would result in disciplinary action. See Office of the
|
|||
|
General Counsel, "Internet use and Politics," E-mail of July 19, 1996,
|
|||
|
attached as Appendix B.
|
|||
|
|
|||
|
We understand that the rationale behind the computer use policy is a
|
|||
|
concern that the University will lose its tax-exempt status, under Internal
|
|||
|
Revenue Code 501(c)(3), if it allows members of the University community to
|
|||
|
use the computer network for political purposes. We believe that this
|
|||
|
concern is misplaced, based on the policies and rulings of the Internal
|
|||
|
Revenue Service.
|
|||
|
|
|||
|
Internal Revenue Code 501(c)(3) provides that an educational organization
|
|||
|
will be tax-exempt as long as it "does not participate in, or intervene in
|
|||
|
(including the publishing or distributing of statements), any political
|
|||
|
campaign on behalf of (or in opposition to) any candidate for public
|
|||
|
office." The Internal Revenue Service has clarified that in order to
|
|||
|
constitute participation or intervention in a political campaign, the
|
|||
|
political activity must be that of the University itself and not the
|
|||
|
individual activity of its faculty, staff, or students. See Internal
|
|||
|
Revenue Service, Exempt Organizations Technical Institution Program for
|
|||
|
1993 426-27 (1993), attached as Appendix C. Thus, any personal
|
|||
|
communication by University members over the computer network cannot
|
|||
|
threaten Princeton's tax-exempt status.
|
|||
|
|
|||
|
The fact that Princeton provides the computing facilities over which the
|
|||
|
communication takes place does not change this conclusion. The Internal
|
|||
|
Revenue Service has stated that a principal factor in determining whether
|
|||
|
the provision of university facilities to a group engaged in political
|
|||
|
activities will constitute participation in a political campaign by the
|
|||
|
university under Internal Revenue Code 501(c)(3), is whether the
|
|||
|
facilities are provided on an equal basis to groups using them for
|
|||
|
non-political reasons. Id. at 427. Princeton provides fair and equal
|
|||
|
access to the computer network, including e-mail and World Wide Web access,
|
|||
|
to all University members, and allows use of the network for a variety of
|
|||
|
non-political purposes. See Rights at 11. Thus, political speech over the
|
|||
|
network will not jeopardize Princeton's tax-exempt status.
|
|||
|
|
|||
|
Even use of the computer network for political purposes in connection with
|
|||
|
a particular course would not jeopardize Princeton's 501(c)(3) status. The
|
|||
|
Internal Revenue Service has previously held that a university that
|
|||
|
required its students in a certain political science course to participate
|
|||
|
in a political campaign of the student's choice for 60 to 80 hours during
|
|||
|
the semester was not participating in political campaigns within the
|
|||
|
meaning of Internal Revenue Code 501(c)(3). See Revenue Ruling 75-512,
|
|||
|
1972-2 C.B. 246, attached as Appendix D.
|
|||
|
|
|||
|
In addition, student organizations are able to publish political views on
|
|||
|
the computer network without threatening Princeton's tax-exempt status.
|
|||
|
The Internal Revenue Service has held that a university was not
|
|||
|
participating in a political campaign within the meaning of Internal
|
|||
|
Revenue Code 501(c)(3), when statements made in support of political
|
|||
|
candidates appeared on the editorial page of a student newspaper. This was
|
|||
|
true despite the university's provision of financial support and facilities
|
|||
|
to the newspaper, as long as the views expressed in the newspaper were
|
|||
|
clearly those of the students and not of the university itself. See
|
|||
|
Revenue Ruling 75-513, 1972-2 C.B. 246, attached as Appendix E.
|
|||
|
|
|||
|
Accordingly, Princeton University does not risk its tax-exempt status by
|
|||
|
allowing University members to use its computer network for political
|
|||
|
purposes. We recognize that Princeton has a legitimate interest in
|
|||
|
ensuring that the individual views of its members not be mistaken for
|
|||
|
official positions of the University. At most, the only permissible
|
|||
|
regulation that Princeton might desire is one requiring a member of the
|
|||
|
University community, who uses Princeton's name in a way that could lead a
|
|||
|
reasonable person to interpret the author's statement as an official
|
|||
|
position of the University, to include a disclaimer clarifying that the
|
|||
|
opinions expressed over the computer network are those of the author alone.
|
|||
|
Compare Rights, "Guidelines Relating to the Tax-Exempt Status of the
|
|||
|
University and Political Activities," at Section 3.
|
|||
|
|
|||
|
Because there exists no legitimate reason for Princeton's blanket
|
|||
|
prohibition of political speech over the computer network, it is an
|
|||
|
unjustified, content-based restriction on the free expression rights of
|
|||
|
students, faculty and staff. Therefore, the policy is not only unworthy of
|
|||
|
a great University like Princeton, it is in violation of Art. I, par. 6 of
|
|||
|
the New Jersey Constitution.
|
|||
|
|
|||
|
Although Princeton University is not a state university, the New Jersey
|
|||
|
Supreme Court has held the Princeton University campus to have been
|
|||
|
sufficiently devoted to expressive uses so as to require the University to
|
|||
|
honor the State constitutional guarantee of free expression. See State v.
|
|||
|
Schmid, 84 N.J. 535, 564-65 (1980); see also New Jersey Coalition Against
|
|||
|
the War in the Middle East v. J.M.B. Realty Corp., 138 N.J. 326 (1994)
|
|||
|
(holding that regional shopping malls were sufficiently open to expressive
|
|||
|
use so as to extend state constitutional right to leaflet). Princeton's
|
|||
|
computer facilities are as much a part of the Princeton "campus" as are the
|
|||
|
lawns and buildings. Princeton may not constitutionally restrict its
|
|||
|
students, faculty, and staff from engaging in political speech over the
|
|||
|
Internet any more than it could prohibit them from engaging in such speech
|
|||
|
in the dorm rooms, classrooms, halls, lawns, and offices of the campus.
|
|||
|
|
|||
|
Political expression has always received the highest degree of
|
|||
|
constitutional protection. See Buckley v. Valeo, 424 U.S. 1, 14 (1976).
|
|||
|
The Constitution was written with the intention to protect from censorship
|
|||
|
those who wish to express their political beliefs and their support for
|
|||
|
political candidates. Indeed, "where political speech is involved, our
|
|||
|
tradition insists that government `allow the widest room for discussion,
|
|||
|
the narrowest range for restriction.'" State v. Miller, 83 N.J. 402, 412
|
|||
|
(1980). As a school with a well-deserved reputation as a leader in
|
|||
|
American higher education, Princeton should be the first to promote and
|
|||
|
defend academic freedom and freedom of expression within its community, to
|
|||
|
the very limits of the law.
|
|||
|
|
|||
|
The computer use policy, read literally, also infringes upon the free
|
|||
|
speech rights of Princeton faculty, staff, and students to receive
|
|||
|
information. Lamont v. Postmaster General, 381 U.S. 301, 307 (1965) (right
|
|||
|
to receive information precludes government from labeling certain
|
|||
|
publications "propaganda") (Brennan, J., concurring); Griswold v.
|
|||
|
Connecticut, 381 U.S. 479-482-83 (1965) ("right of freedom of speech . . .
|
|||
|
includes not only the right to utter or print, but the right to . . .
|
|||
|
receive, the right to read . . . and freedom of inquiry, freedom of
|
|||
|
thought, and freedom to teach . . . . Without these peripheral rights the
|
|||
|
specific rights would be less secure."); Kreimer v. Bur. of Police for Town
|
|||
|
of Morristown, 958 F.2d 1242, 1350-55 (3d Cir. 1992) (listing cases). This
|
|||
|
is because the University's computer facilities, although located on the
|
|||
|
Princeton campus, are a gateway to a virtual, worldwide community. See
|
|||
|
ACLU v. Reno, 1996 U.S. Dist. LEXIS 7919 (E.D. Pa., June 11, 1996). They
|
|||
|
provide a unique means for students, faculty, and staff to access
|
|||
|
information on virtually any topic, including politics.
|
|||
|
|
|||
|
Finally, the computer use policy is in conflict with other University
|
|||
|
policies and practices. Princeton recognizes that
|
|||
|
|
|||
|
"the central purposes of a University are the pursuit of truth, the
|
|||
|
discovery of new knowledge through scholarship and research, the teaching
|
|||
|
and general development of students, and the transmission of knowledge and
|
|||
|
learning to society at large. Free inquiry and free expression within the
|
|||
|
academic community are indispensable to the achievement of these goals.
|
|||
|
The freedom to teach and to learn depends upon the creation of appropriate
|
|||
|
conditions and opportunities on the campus as a whole as well as in
|
|||
|
classrooms and lecture halls."
|
|||
|
|
|||
|
Rights, Introduction to "Principles of General Conduct and Regulations."
|
|||
|
With respect to political speech, the University also recognizes that it
|
|||
|
has a fundamental responsibility to ensure
|
|||
|
|
|||
|
"the opportunity for all members of the University community to
|
|||
|
exercise their prerogatives as citizens. . . . Encouragement of an
|
|||
|
interest in public affairs and the furthering of a sense of social
|
|||
|
responsibility have long been considered important elements of a liberal
|
|||
|
education. The University continues to consider self-chosen participation
|
|||
|
in political and social action by individuals and groups to be a valuable
|
|||
|
part of the educational experience it seeks to encourage. Such activities
|
|||
|
on the part of individuals or groups do not, and should not be taken to,
|
|||
|
imply commitment of the University to any partisan political position or
|
|||
|
point of view."
|
|||
|
|
|||
|
Rights, Introduction to "Guidelines Relating to Tax Exempt Status."
|
|||
|
|
|||
|
For all of the above reasons, we strongly urge you to repeal the existing
|
|||
|
ban on use of the computer network for political purposes, and we look
|
|||
|
forward to your early reply.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Ann Beeson, Staff Attorney
|
|||
|
American Civil Liberties Union
|
|||
|
National Legal Department
|
|||
|
132 West 43rd Street
|
|||
|
New York, New York 10036
|
|||
|
(212) 944-9800 x788
|
|||
|
|
|||
|
David Rocah, Staff Attorney
|
|||
|
American Civil Liberties Union
|
|||
|
of New Jersey
|
|||
|
2 Washington Place
|
|||
|
Newark, NJ 07102
|
|||
|
(201) 642-2086
|
|||
|
|
|||
|
|
|||
|
cc: Office of General Counsel
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 17 Jul 1996 20:59:11 -0400
|
|||
|
From: eye WEEKLY <eye@eye.net>
|
|||
|
Subject: File 4--EYENET: Ontario Tories Get "Make-Over" On The Web
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
eye WEEKLY July 18, 1996
|
|||
|
Toronto's arts newspaper .....free every Thursday
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
EYENET EYENET
|
|||
|
|
|||
|
ONTARIO TORIES GET "MAKE-OVER" ON THE WEB
|
|||
|
|
|||
|
by
|
|||
|
K.K . CAMPBELL
|
|||
|
|
|||
|
6 am. I ascended the stairs to the eyrie in which my computer was
|
|||
|
perched. The little mail program flag was up. Personal mailbox.
|
|||
|
|
|||
|
Navigating a steaming (and grungy) coffee cup to lips, my other hand
|
|||
|
rifled through the usual collection of crap from the night. Nothing
|
|||
|
special... wait, here was something. From "Anonymous."
|
|||
|
|
|||
|
I opened it and scanned the headers for which remailer -- the
|
|||
|
Netherlands.
|
|||
|
|
|||
|
The anonymous author(s) wrote me: "The Ontario Progressive
|
|||
|
Conservative Web Site has been hacked by absolut(0) & Essex. It has
|
|||
|
been given a new look that we @ fix feel is a more suitable reflection
|
|||
|
of their policies and ideology."
|
|||
|
|
|||
|
I was politely asked to visit the Tory web site at
|
|||
|
http://www.ontariopc.on.ca.
|
|||
|
|
|||
|
"What the hell," I muttered and moused to the URL, expecting nothing.
|
|||
|
The page came up: a picture of a Mike Harris sign burning.
|
|||
|
|
|||
|
Now, _that_ woke me up.
|
|||
|
|
|||
|
Putting coffee aside, I went back to the email, scanning the headers
|
|||
|
much more closely this time. The missive was dated July 11, 5:08 am
|
|||
|
(Dutch time). Assuming our anonymous friends were actually in Ontario,
|
|||
|
that meant the letter was sent around 11 pm the night before
|
|||
|
(Wednesday, July 10).
|
|||
|
|
|||
|
Back to the web site. I realized why the picture of Harris was so
|
|||
|
familiar. It was from the Embarrass Harris web site
|
|||
|
(http://www.eye.net/Misc/Harris). I had scanned it myself. (Actually,
|
|||
|
I scanned a much larger picture, "absolut(0) & Essex" were using a
|
|||
|
cropped detail from it.)
|
|||
|
|
|||
|
The "new-look" Tory site featured a quote from the US intellectual and
|
|||
|
pinup boy Noam Chomsky:
|
|||
|
|
|||
|
"And apart from the most cynical, [the corporate and government]
|
|||
|
planners must convince themselves of the justice of the actions, often
|
|||
|
monstrous, that they plan and implement. There are only two pretexts:
|
|||
|
self-defence and benevelonce. It need not be assumed that use of the
|
|||
|
tools is mere deception or careerism, though sometimes it is. Nothing
|
|||
|
is easier than to convince oneself of the merits of actions and
|
|||
|
politics that serve self-interest."
|
|||
|
|
|||
|
(Actually, the quote might be from John Snobelen's "Summer of 95"
|
|||
|
video pep talk.)
|
|||
|
|
|||
|
Only other text was a quote from Jim Hightower: "Let's keep our
|
|||
|
factories and jobs here and move our corporate headquarters to Mexico,
|
|||
|
Korea, or wherever else we can get some reasonably priced chief
|
|||
|
executives."
|
|||
|
|
|||
|
"Anonymous" concluded the email to me: "We are happy that we could
|
|||
|
help out. We imagine the 'new look' will last 24-72 hrs so see it
|
|||
|
while you can."
|
|||
|
|
|||
|
The new-look Tory page was gone faster than that. News of it spread
|
|||
|
like wildfire. Toronto's Golan Klinger even put it up on a big screen
|
|||
|
at the Metro Convention Centre COMDEX show.
|
|||
|
|
|||
|
Finally a Tory was dragged off the golf course and cellphoned net
|
|||
|
provider Magic to replace the hack. Having no other material at hand,
|
|||
|
Magic put up an ad for themselves.
|
|||
|
|
|||
|
FOR OUR FINGER-PRINTIN' FRIENDS
|
|||
|
|
|||
|
In December 1994, someone did an anonymous newsgroup spoof of then-
|
|||
|
Ontario premier Bob Rae (an impersonation, not a real forgery). At the
|
|||
|
time, the Tories told eyeNET that if anyone did that to them, they
|
|||
|
would track down the vile criminals. (To his credit, Rae took the
|
|||
|
spoof in stride in a real follow-up post to the net.)
|
|||
|
|
|||
|
When the Tories won the election, they killed the premier account Rae
|
|||
|
had established. They didn't want anything to do with the net.
|
|||
|
|
|||
|
Being loyal Ontarians, we at eyeNET want to help our finger-printin'
|
|||
|
friends at Queen's Park track down these vile hackers. Here are two
|
|||
|
helpful URLs: The Canadian Security Intelligence Service at
|
|||
|
http://www.csis-scrs.gc.ca, and the Ontario Provincial Police --
|
|||
|
http://www.gov.on.ca/OPP. Get to works, boys!
|
|||
|
|
|||
|
Hmm. You Tory chaps are probably scratching your heads, wondering if
|
|||
|
this Noam Chomsky guy is some superhacker in the computer underground.
|
|||
|
Here's another helpful URL:
|
|||
|
http://www.worldmedia.com/archive/index.html. New World Media and ZNet
|
|||
|
host the net's largest collection of Chomsky writing (almost eight
|
|||
|
megs of text).
|
|||
|
|
|||
|
And for that strange conceptual stuff about CEOs being economic
|
|||
|
parasites... you can read more about it at
|
|||
|
http://www.panix.com/~dhenwood/LBO_home.html -- which web page is a
|
|||
|
previous winner of an eyeSITE Web Award.
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Retransmit freely in cyberspace Author holds standard copyright
|
|||
|
http://www.eye.net Mailing list available
|
|||
|
eyeNET archive -----------------------> http://www.eye.net/News/Eyenet
|
|||
|
eye@eye.net "...Break the Gutenberg Lock..." 416-971-8421
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 15 Aug 1996 12:38:35 -0400 (EDT)
|
|||
|
From: Noah <noah@ENABLED.COM>
|
|||
|
Subject: File 5--BoS: Hare Virus Removal - VirusNet (fwd)
|
|||
|
|
|||
|
From -Noah
|
|||
|
|
|||
|
---------- Forwarded message ----------
|
|||
|
Date--Thu, 15 Aug 1996 11:41:55 -0400 (EDT)
|
|||
|
From--Safetynet, Inc. <safety@gti.net>
|
|||
|
Subject--BoS--Hare Virus Removal - VirusNet
|
|||
|
|
|||
|
Safetynet Virus Alert
|
|||
|
---------------------
|
|||
|
|
|||
|
Virus: Hare.7610, Hare.7750, Hare.7786
|
|||
|
Type: Resident Stealth OSBR MBR EXE COM
|
|||
|
Frequency: Common
|
|||
|
|
|||
|
As you probably already know, the Hare virus (PC platform) is set to
|
|||
|
trigger on August 22 and September 22. Computers infected with this virus
|
|||
|
may have their hard drive information erased.
|
|||
|
|
|||
|
Safetynet has included detection and removal for the three known variants
|
|||
|
of the Hare virus in its VirusNet v2.24 scanner update. All registered
|
|||
|
users should download this update and scan their computers daily through
|
|||
|
the end of September. A total of 8,300 virus are detected by v2.24.
|
|||
|
|
|||
|
Evaluation versions of VirusNet with full virus detection and removal are
|
|||
|
also available for download. Visit the Safetynet WWW site at
|
|||
|
http://www.safe.net/safety/ and select the Free Stuff link. For Windows
|
|||
|
95, Windows NT, Windows 3.x and DOS users, download VirusNet 95. For
|
|||
|
network administrators who wish to scan an entire network, download
|
|||
|
VirusNet LAN.
|
|||
|
|
|||
|
Questions about this and other virus related issues should be sent to
|
|||
|
support@safe.net.
|
|||
|
|
|||
|
------------------
|
|||
|
Virus Support Team
|
|||
|
Safetynet, Inc.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 11 Aug 1996 23:18:33 -0400 (EDT)
|
|||
|
From: Noah <noah@enabled.com>
|
|||
|
Subject: File 6--UK ISPs Restrict cyberporn; AOL (again) (news from noah)
|
|||
|
|
|||
|
U.K. INTERNET PROVIDERS PLAN TO RESTRICT CYBERPORN
|
|||
|
Reacting to pressure from Scotland Yard, the Internet Service
|
|||
|
Providers Association, representing 60 of an estimated 140
|
|||
|
providers in the United Kingdom, will be asking its members to
|
|||
|
voluntarily block access to sites and services featuring
|
|||
|
hard-core pornography. An executive of Demon Internet, which has
|
|||
|
the largest subscriber base in the U.K., dismisses the proposed
|
|||
|
action as ineffective: "This is not a solution, it is just
|
|||
|
hiding the problem." (Financial Times 10 Aug 96)
|
|||
|
|
|||
|
AOL SEES ITS IMPORTANCE "MORE CLEARLY THAN EVER"
|
|||
|
Following last Wednesday's 19-hour blackout of America Online on
|
|||
|
August 9th because of system problems that developed during
|
|||
|
routine maintenance, AOL chief executive Steve Case concluded
|
|||
|
that "the disruption caused by the temporary unavailability of
|
|||
|
AOL illustrates more clearly than ever before how important AOL
|
|||
|
has become in the daily lives of our members." Case said: "We
|
|||
|
still have a long way to go to make AOL as reliable as must-have
|
|||
|
utilities such as electricity and the telephone. But that's what
|
|||
|
we intend to do." Members will get credit for the lost service,
|
|||
|
which, for individuals who subscribe to AOL's standard billing
|
|||
|
plan, will amount to about a 30-cent credit. (Atlanta
|
|||
|
Journal-Constitution 9 Aug 96 D2)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 16 Aug 1996 07:31:50 -0700 (PDT)
|
|||
|
From: Declan McCullagh <declan@eff.org>
|
|||
|
Subject: File 7--Scientology begins PGP crack attempt (fwd)
|
|||
|
|
|||
|
Newsgroups--alt.religion.scientology,alt.security.pgp
|
|||
|
From--grady@netcom.com (Grady Ward)
|
|||
|
Subject--Criminal cult begins PGP crack attempt
|
|||
|
|
|||
|
The Special Master has informed me that Madame Kobrin has asked
|
|||
|
her to retain a PC expert to attempt to "crack" a series of
|
|||
|
pgp-encrypted multi-megabyte files that were seized along with
|
|||
|
more than a compressed gigabyte of other material from my safety
|
|||
|
deposit box.
|
|||
|
|
|||
|
Ironically, they phoned to ask for assistance in supplying them
|
|||
|
with a prototype "crack" program that they could use in iterating
|
|||
|
and permuting possibilities. I did supply them a good core
|
|||
|
pgpcrack source that can search several tens of thousands of
|
|||
|
possible key phrases a seconds; I also suggested that they should
|
|||
|
at least be using a P6-200 workstation or better to make the
|
|||
|
search more efficient.
|
|||
|
|
|||
|
The undercurrent is that this fresh hysterical attempt to "get"
|
|||
|
something on me coupled with the daily settlement pleas reflects
|
|||
|
the hopelessness of the litigation position of the criminal cult.
|
|||
|
|
|||
|
It looks like the criminal cult has cast the die to ensure that
|
|||
|
the RTC vs Ward case is fought out to the bitter end. Which I
|
|||
|
modestly predict will be a devastating, humiliating defeat for
|
|||
|
them from a pauper pro per.
|
|||
|
|
|||
|
I have given them a final settlement offer that they can leave or
|
|||
|
take. Actually they have a window of opportunity now to drop the
|
|||
|
suit since my counterclaims have been dismissed (although Jusge
|
|||
|
Whyte invited me to re-file a new counterclaim motion on more
|
|||
|
legally sufficiant basis).
|
|||
|
|
|||
|
I think Keith and I have found a successful counter-strategy to
|
|||
|
the cult's system of litigation harassment.
|
|||
|
|
|||
|
Meanwhile, I could use some help from veteran a.r.s'ers. I need
|
|||
|
any copy you have of the Cease and Desist letter that you may
|
|||
|
have received last year from Eliot Abelson quondam criminal cult
|
|||
|
attorney and Eugene Martin Ingram spokespiece.
|
|||
|
|
|||
|
|
|||
|
Physical mail:
|
|||
|
|
|||
|
Grady Ward
|
|||
|
3449 Martha Ct.
|
|||
|
Arcata, CA 95521-4884
|
|||
|
|
|||
|
JP's BMPs or fax-images to:
|
|||
|
|
|||
|
grady@northcoast.com
|
|||
|
|
|||
|
Thanks.
|
|||
|
|
|||
|
Grady Ward
|
|||
|
|
|||
|
Ps. I really do need all of your help and good wishes after all.
|
|||
|
Thanks for all of you keeping the net a safe place to insult
|
|||
|
kook kults.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 17 Aug 1996 19:22:32 CDT
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 8--An Apology to Edupage
|
|||
|
|
|||
|
CuD periodically receives news clippings or other items that
|
|||
|
helpful readers forward to us for publication. We stress that
|
|||
|
either permission should first be received for reprinting, or
|
|||
|
that the items should be edited for fair use.
|
|||
|
|
|||
|
We also emphasize that the original source *MUST* be attributed.
|
|||
|
|
|||
|
Because we have neither the time nor resources to check on
|
|||
|
forwarded posts, we rely heavily on submitters to assume
|
|||
|
responsibility for copyright compliance.
|
|||
|
|
|||
|
Most recently, we inadvertantly reprinted excerpts from EDUPAGE
|
|||
|
without attribution. We apologize for the error, and thank the
|
|||
|
reader who recognized the source and let us know.
|
|||
|
|
|||
|
We appreciate the forwarded material that readers send, and we
|
|||
|
equally appreciate being informed of possible goofs. Keep them
|
|||
|
both coming.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|||
|
|
|||
|
SUBSCRIBE CU-DIGEST
|
|||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|||
|
|
|||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|||
|
|
|||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|||
|
|
|||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #8.60
|
|||
|
************************************
|
|||
|
|