833 lines
39 KiB
Plaintext
833 lines
39 KiB
Plaintext
![]() |
|
||
|
Computer underground Digest Sun Dec 14, 1997 Volume 9 : Issue 90
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #9.90 (Sun, Dec 14, 1997)
|
||
|
|
||
|
File 1--Online Copyright Cases Can Simply Be Difficult.
|
||
|
File 2--The Digital Citizen: More Nonsense from *Wired*
|
||
|
File 3--XS4ALL files complaint with Chief Public Prosecu
|
||
|
File 4--"Hackers" hit Yahoo.com - leave "ransom" note
|
||
|
File 5--Mitnick Supporters Deny Yahoo Hack
|
||
|
File 6--Child Protection and Parental Empowerment / Interactive Media
|
||
|
File 7--Technological Breakthrough (humor)
|
||
|
File 8--Cu Digest Header Info (unchanged since 7 Dec, 1997)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Sun, 14 Dec 1997 14:29:27 -0500
|
||
|
From: "David J. Loundy" <David@LOUNDY.COM>
|
||
|
Subject: File 1--Online Copyright Cases Can Simply Be Difficult.
|
||
|
|
||
|
Published in the Chicago Daily Law Bulletin, December 11, 1997 at page 6.
|
||
|
------------------------------------------------------------------------
|
||
|
|
||
|
Online Copyright Cases Can Simply Be Difficult.
|
||
|
|
||
|
Copyright 1997 by David Loundy
|
||
|
Archived at http://www.Loundy.com/CDLB/
|
||
|
To subscribe, send the message
|
||
|
"subscribe" to Loundy-request@netural.com
|
||
|
|
||
|
------------------------------------------------------------------------
|
||
|
When discussing copyright issues on-line, there are a lot of esoteric
|
||
|
questions that can be asked about unusual situations. Some of these
|
||
|
situations are merely fodder for law school exams, and some revolve around
|
||
|
threatened or actual litigation. A recent federal case, however, has a
|
||
|
refreshingly simple set of facts-- unfortunately it shows that some
|
||
|
difficult questions about the finer interpretation of copyright law are not
|
||
|
easy to avoid in a digital setting.
|
||
|
|
||
|
The relevant facts of Marobie-FL v. National Association of Fire Equipment
|
||
|
Distributors, No. 96 C 2966 (N.D. Ill. Nov. 13, 1997) are as follows:
|
||
|
|
||
|
The National Association of Fire Equipment Distributors, or NAFED, has a
|
||
|
web page. The operator of the web page received an offer for some
|
||
|
"clip-art." He sent off a few blank disks, and received them back full of
|
||
|
computer images of firefighter-related art. He placed the images on NAFED's
|
||
|
web page for anyone to download as a courtesy provided by NAFED, and
|
||
|
advertised their presence.
|
||
|
|
||
|
The images, however, were copyrighted property of plaintiff Marobie-FL,
|
||
|
doing Business as Galactic Software. When sales of the clip art plummeted,
|
||
|
and Marobie learned it was because the images were available for free on
|
||
|
NAFED's web page, Marobie, sued NAFED, and, for good measure, Northwest
|
||
|
Nexus, NAFED's Internet service provider which hosted NAFED's web page.
|
||
|
|
||
|
Was there a copyright infringement? Sure. Finding infringement in such a
|
||
|
case is something of a no-brainer. The plaintiff had a valid copyright, and
|
||
|
unlicensed copies were made.
|
||
|
|
||
|
Unfortunately, Judge Robert W. Gettleman went further than necessary in
|
||
|
finding a copyright infringement of the plaintiff's work. The judge held
|
||
|
that NAFED's acts constituted a reproduction of the plaintiff's work in
|
||
|
violation of its exclusive right to make reproductions, as provided in 17
|
||
|
U.S.C. Section 106(1). The court cited the Playboy Enterprises, Inc. v.
|
||
|
Frena case (839 F.Supp. 1552 (M.D. Fla. 1993) as precedent. Unfortunately,
|
||
|
the Judge continued with an argument that was made in the Playboy case and
|
||
|
found a violation of the exclusive right to distribute copyrighted works, a
|
||
|
right protected by 17 U.S.C. Section 106(3).
|
||
|
|
||
|
In neither case, however, was the distribution right violated.
|
||
|
|
||
|
Section 106(3) of the Copyright Act protects the right "to distribute
|
||
|
copies . . . of the copyrighted work to the public by sale, or other
|
||
|
transfer of ownership, or by rental lease or lending." Section 101 of the
|
||
|
Copyright Act defines a copy as "material objects . . . in which a work is
|
||
|
fixed by any method now known or later developed, and from which the work
|
||
|
can be perceived, reproduced, or otherwise communicated, either directly or
|
||
|
with the aid of a machine or device."
|
||
|
|
||
|
Where are the copies in this case?
|
||
|
|
||
|
The original floppy disks are copies. The webmaster's hard drive
|
||
|
constitutes a copy. Northwest's computers' hard disks are also copies. Were
|
||
|
any of these copies distributed by NAFED? No. All of these copies remain
|
||
|
with their initial owners. NAFED did not give its hard disks to web surfers
|
||
|
who called up its web page and downloaded the copyrighted clip art. Rather,
|
||
|
NAFED reproduced a portion of the contents of the hard disk for the web
|
||
|
surfers. There is clearly a reproduction at issue, but there is no
|
||
|
distribution.
|
||
|
|
||
|
The first defense NAFED offered is that it was an innocent infringer, and
|
||
|
thus, any damages should be sharply reduced. NAFED argued that the images
|
||
|
did not have a copyright notice, nor did the disk containing the images.
|
||
|
The Copyright Act, however, does not require a notice. Furthermore, the
|
||
|
court pointed out that the legal copies of Marobie's disks did have a
|
||
|
copyright notice-- the disks NAFED claims are lacking copyright notices are
|
||
|
those of NAFED's webmaster, who sent the disks to an unknown source in
|
||
|
order to acquire the infringing clip art.
|
||
|
|
||
|
Of course, no copyright case would be complete without a claim that the
|
||
|
infringer's use is a fair one, and thus protected by 17 U.S.C. Section 107.
|
||
|
And, of course, the argument is often a losing one.
|
||
|
|
||
|
Gettleman found that even though NAFED is a non-profit company, and did not
|
||
|
sell the clip art, the use could still be considered a commercial one. The
|
||
|
judge held that NAFED would benefit from making Marobie's work available on
|
||
|
its web page by promoting NAFED's association and raising advertising
|
||
|
revenue, all without paying the customary price for the use of the works.
|
||
|
Furthermore, the works were not used for traditional fair uses such as
|
||
|
criticism, teaching, news reporting and the like. The type of material
|
||
|
copied-- creative pictures-- also constituted a strike against the
|
||
|
defendant's fair use claim, as did the fact that three of the plaintiff's
|
||
|
five disks were copied in their entirety, and each of the three copied
|
||
|
disks was subject to a separate copyright. The final fair use factor,
|
||
|
potential damage to the market for the copyrighted work, was presumed from
|
||
|
NAFED's use of the work.
|
||
|
|
||
|
The analysis of the Internet service provider's liability is where this
|
||
|
case demonstrates some of the complexities of on-line copyright law. There
|
||
|
have been a number of cases, such as MAI Systems Corp. v. Peak Computer,
|
||
|
Inc., 991 F.2d 511 (9th Cir. 1993) that have held that loading software
|
||
|
into a computer's Read-Only Memory (RAM) constitutes the creation of a
|
||
|
copy. Based on the aforementioned definition of a copy, this seems like an
|
||
|
appropriate finding. Northwest, however, argued that based on how the
|
||
|
technology works in the case of its web server, although the copyrighted
|
||
|
work passed through its computer's RAM, there was no "fixation" of the work
|
||
|
in that RAM. In the words of the statute, the argument is that the work is
|
||
|
not "sufficiently permanent or stable to permit it to be perceived,
|
||
|
reproduced, or otherwise communicated for more than a transitory duration."
|
||
|
It is the transitory duration portion of the definition that was
|
||
|
Northwest's hook.
|
||
|
|
||
|
Northwest asserted that its system made the reproductions so quickly that a
|
||
|
complete copy was never even present in its system's RAM. Northwest also
|
||
|
argued that its situation was not analogous to that of MAI, or, more
|
||
|
specifically to that in Religious Technology Center v. Netcom On-Line
|
||
|
Communications Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995 (available
|
||
|
on the Internet at http://www.Loundy.com/CASES/RTC_v_Netcom.html), because,
|
||
|
in both MAI and Netcom, the work was present in the computers' RAM for a
|
||
|
much longer period of time.
|
||
|
|
||
|
The judge rejected this argument, focusing on the "perception" aspect,
|
||
|
rather than the "transitory duration" aspect. The court seized on the
|
||
|
language from the definition of "copies" and argues that the "copies"
|
||
|
generated by Northwest could still be perceived "with the aid of a machine
|
||
|
or device" and thus, Northwest was making reproductions of the protected
|
||
|
works. The court missed that Northwest appeared to be challenging whether
|
||
|
there is a "fixation"-- which requires that a copy exist for "more than a
|
||
|
transitory duration." To find against Northwest on this issue, as the issue
|
||
|
was framed by Northwest, would be to find that other similar means of
|
||
|
digital transmission-- such as the transmission of telephone calls via
|
||
|
fiber-optics or satellites, or digital broadcasting of radio, television,
|
||
|
or some portable phones-- all constitute the creation of potentially
|
||
|
infringing copies by the service provider. The court did acknowledge that
|
||
|
it may be the web surfer who was "fixing" the copies, but nonetheless the
|
||
|
court rejected Northwest's argument that its computers were not copying the
|
||
|
plaintiff's works.
|
||
|
|
||
|
Gettleman did, however, accept Northwest's argument that, based on the
|
||
|
Netcom case, Northwest should not be held liable for any such copies that
|
||
|
were made. The Netcom court refused to hold a service provider strictly
|
||
|
liable for its machine's passive operation. Here also, the court found that
|
||
|
there was no active involvement on the part of the service provider-- all
|
||
|
Northwest did was provide "the means to copy, distribute or display
|
||
|
plaintiff's works, much like the owner of a public copying machine used by
|
||
|
a third party to copy protected material."
|
||
|
|
||
|
While this may be the just result based on the lack of participation or
|
||
|
knowledge of the service provider, it is not a necessary result under the
|
||
|
Copyright Act. This fact was illustrated in the recent Playboy Enterprises,
|
||
|
Inc. v. Webbworld case (No. 3-96-CV-3222-DES, (N.D. Tex., June 27, 1997).
|
||
|
In the Webbworld case, the judge made a distinction (based on a perhaps
|
||
|
inaccurate interpretation of the facts) between the Netcom case and the
|
||
|
facts in front of it, and held that a service provider could be held liable
|
||
|
for 'automated' copyright infringements. The Webbworld case was not
|
||
|
addressed in Gettleman's opinion.
|
||
|
|
||
|
Cases such as this show that where there is a clear infringement of a
|
||
|
copyright on-line, remedies are available against the truly responsible
|
||
|
party. Although there may be arguments put forth to justify or excuse
|
||
|
infringements, the law is really more clear than many people make it out to
|
||
|
be. However, the law as it applies to service providers is often not nearly
|
||
|
so clear. In some cases, such as Webbworld, the service provider is a bad
|
||
|
actor, and copyright holders should clearly have a remedy. In cases such as
|
||
|
Marobie, the service provider really should have some insulation from
|
||
|
liability. However, cases such as this illustrate that these are complex
|
||
|
issues, the subtleties and implications of which are often missed in court
|
||
|
decisions.
|
||
|
|
||
|
|
||
|
______________________________________________________________________
|
||
|
David J. Loundy | E-Mail: David@Loundy.com
|
||
|
| WWW: http://www.Loundy.com/
|
||
|
Davis, Mannix & McGrath | Listserv (for my Technology
|
||
|
125 S. Wacker Drive, Suite 1700 | Law column): Send a message
|
||
|
Chicago, IL 60606-4402 | reading "subscribe" to
|
||
|
Phone: (312) 332-0954 | Loundy-request@netural.com
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 1 Dec 1997 14:32:06 -0500
|
||
|
From: Stephen Talbott <stevet@MERLIN.ALBANY.NET>
|
||
|
Subject: File 2--The Digital Citizen: More Nonsense from *Wired*
|
||
|
|
||
|
NETFUTURE
|
||
|
|
||
|
Technology and Human Responsibility
|
||
|
|
||
|
--------------------------------------------------------
|
||
|
Issue #61 Copyright 1997 Bridge Communications December 1 1997
|
||
|
-----------------------------------------------------------
|
||
|
Editor: Stephen L. Talbott (stevet@oreilly.com)
|
||
|
|
||
|
On the Web: http://www.oreilly.com/people/staff/stevet/netfuture/
|
||
|
You may redistribute this newsletter for noncommercial purposes.
|
||
|
|
||
|
|
||
|
The Digital Citizen: More Nonsense from *Wired*
|
||
|
-----------------------------------
|
||
|
|
||
|
Always specializing in missing the point, *Wired* magazine succeeds more
|
||
|
spectacularly than usual in its December issue. The cover article by Jon
|
||
|
Katz (a *Wired* contributing editor) celebrates the "first in-depth poll"
|
||
|
of the digitally Connected, and reports that they are "optimistic,
|
||
|
tolerant, civic-minded, and radically committed to change."
|
||
|
|
||
|
Almost all conventional wisdom about digital culture -- especially as
|
||
|
conveyed in recent years by journalists, politicians, intellectuals,
|
||
|
and other fearful guardians of the existing order -- is dead wrong.
|
||
|
The Internet, it turns out, is not a breeding ground for disconnection,
|
||
|
fragmentation, paranoia, and apathy .... The online world encompasses
|
||
|
many of the most informed and participatory citizens we have ever had
|
||
|
or are likely to have.
|
||
|
|
||
|
The poll, sponsored by *Wired* and Merrill Lynch Forum, assures us that
|
||
|
the Connected are more likely than the Unconnected to know who the chief
|
||
|
justice of the United States is; to believe in change, racial diversity,
|
||
|
and a better future; to have confidence in the two-party political system;
|
||
|
and to read books.
|
||
|
|
||
|
All of which, we're told, puts the lie to the "countless tales of
|
||
|
perversion, porn, hatemongering, violence, addiction, and other perils"
|
||
|
that mainstream journalism is forever disseminating.
|
||
|
|
||
|
The common stereotype of the Internet as a haven for isolated geeks who
|
||
|
are unaware of important events occurring outside their cavelike
|
||
|
bedrooms can now be exploded as an inaccurate myth. The same goes for
|
||
|
the caricature of technology as a civic virus that breeds disaffection
|
||
|
from politics.
|
||
|
|
||
|
(Despite repeated allusions to them, Katz never tells us exactly which
|
||
|
publications constitute this Net-bashing mainstream. He seems to have in
|
||
|
mind those often silly articles that some publications occasionally run,
|
||
|
dramatizing the "dark side of the Net." The tabloid-urge, unfortunately,
|
||
|
*is* a part of mainstream journalism. But this fact is wholly compatible
|
||
|
with the dominant reality Katz ignores. Where is the mainstream
|
||
|
publication whose education pages are trying to brake the lemming-rush to
|
||
|
wire our schools, or whose business pages do not urge the centrality of
|
||
|
everything high-tech for our economic future, or whose feature pages do
|
||
|
not lionize the latest, hot, high-tech start-ups along with their CEOs, or
|
||
|
whose editorial pages fail to treat the "information superhighway" as a
|
||
|
sacred cow that should be encouraged to wander unimpeded into every corner
|
||
|
of our culture, or whose Christmas buyers' guides are not doing everything
|
||
|
possible to stimulate consumer interest in the coolest high-tech gadgets?)
|
||
|
|
||
|
Katz' primary mission is to let us know beyond any doubt that
|
||
|
|
||
|
clearly, there is now evidence that technology promotes democracy,
|
||
|
citizenship, knowledge, literacy, and community.
|
||
|
|
||
|
I have three comments:
|
||
|
|
||
|
First, until very recently the critiques of digital culture were
|
||
|
necessarily directed at the culture's earlier, "purer" manifestations --
|
||
|
what we might call the John Perry Barlow phase of the Net, when a heady
|
||
|
mixture of libertarianism, warmed-over counterculture, and technological
|
||
|
optimism ruled the day. It was a time when the networked computer could
|
||
|
be embraced wholesale as the redemptive substitute for rotten social
|
||
|
institutions. This electronic culture was rooted in the research
|
||
|
departments, computer engineering organizations, underground publications,
|
||
|
university computer science programs, and bulletin board networks that
|
||
|
incubated the modern Net and brought it to birth.
|
||
|
|
||
|
It's hardly surprising that the various utopian disaffections, cultural
|
||
|
distortions, and imbalances of that earlier phase have been diluted by the
|
||
|
more recent arrival of the masses.
|
||
|
|
||
|
Second, the poll results reflect the education, political power, economic
|
||
|
strength, and faith in the existing order characteristic of a relatively
|
||
|
privileged class -- namely, those who are *able* to get connected and are
|
||
|
equipped to capitalize on their connections. And, again, it is hardly
|
||
|
surprising to find that the more educated, better-off folks are also
|
||
|
better-read, more politically engaged, and so on.
|
||
|
|
||
|
I have little doubt that a poll taken during the first decade or two of
|
||
|
the television era would likewise have shown a relatively well off,
|
||
|
better-educated, better-read, and politically engaged audience. There
|
||
|
were, at the same time, widespread, positive expectations about the future
|
||
|
of television-influenced education, culture, and politics. So what?
|
||
|
|
||
|
Third, Katz' answer to the "so what?" is missing. He doesn't supply a
|
||
|
single sentence to support his contention that "technology promotes
|
||
|
democracy, citizenship, knowledge, literacy, and community." A poll
|
||
|
purporting to show what sort of user has connected during the build-up of
|
||
|
the Net tells us nothing at all about the effects the Net will "promote"
|
||
|
in these users. For that you would need to track these users over time.
|
||
|
|
||
|
Meanwhile, he might have remembered television. Regardless of the well-
|
||
|
intentioned involvements and expectations of those who took up television,
|
||
|
it would not be easy today to argue that television strengthened community
|
||
|
or encouraged democratic participation or redeemed education. But, in any
|
||
|
case, my point is that the argument needs to be *made*, not just assumed.
|
||
|
Until Katz offers at least a shred of evidence that the Net will indeed
|
||
|
prove salutary, his claim remains suspended in mid-air, lacking all
|
||
|
support.
|
||
|
|
||
|
It is hard to believe that the editors of a major publication would offer
|
||
|
such a massive non sequitur as a dramatic cover feature. The giddy sense
|
||
|
of exultation and triumph with which Katz and *Wired* herald this poll of
|
||
|
1444 Americans is, for me, the most telling aspect of the article.
|
||
|
Whatever may be the case with Net users as a whole, *these* folks
|
||
|
apparently remain in the Barlow, wish-fulfillment phase of cyberspatial
|
||
|
development.
|
||
|
|
||
|
It's an especially unhealthy phase. Katz welcomes a poll result showing
|
||
|
extraordinary confidence among the Connected in their ability to master
|
||
|
and direct the forces of technological change. We who are connected
|
||
|
certainly do have good reason to believe we can ride these forces for
|
||
|
personal advantage -- I am certainly making the attempt -- and that may be
|
||
|
enough to sustain considerable enthusiasm for a time. But for any of us,
|
||
|
at this point in history, to fancy ourselves masters of the self-driven,
|
||
|
global, technological juggernaut is the sheerest fantasy.
|
||
|
|
||
|
The sober effort to *achieve* such mastery is, of course, exactly what's
|
||
|
needed. Unfortunately, there still aren't many signs of sobriety at
|
||
|
*Wired*.
|
||
|
|
||
|
==============
|
||
|
|
||
|
Current and past issues of NETFUTURE are available on the Web:
|
||
|
http://www.oreilly.com/people/staff/stevet/netfuture/
|
||
|
To subscribe to NETFUTURE, send an email message like this:
|
||
|
To: listserv@infoserv.nlc-bnc.ca
|
||
|
subscribe netfuture yourfirstname yourlastname
|
||
|
No Subject line is needed.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
From: "Maurice Wessling" <maurice@XS4ALL.NL>
|
||
|
Date: Mon, 15 Dec 1997 12:47:12 +0000
|
||
|
Subject: File 3--XS4ALL files complaint with Chief Public Prosecu
|
||
|
|
||
|
Press release
|
||
|
|
||
|
15 december 1997
|
||
|
|
||
|
XS4ALL files complaint with Chief Public Prosecutor
|
||
|
|
||
|
XS4ALL Internet Friday filed a complaint with Chief Public
|
||
|
Prosecutor Vrakking in Amsterdam against the Examining
|
||
|
Magistrate and Public Prosecutor who ordered XS4ALL on
|
||
|
October 31st to tap the Internet traffic of one of its
|
||
|
users.
|
||
|
|
||
|
The Ministry of Justice had based its instruction on Article
|
||
|
125i of the Code of Criminal Procedure. On November 13th
|
||
|
XS4ALL refused to comply, as in its view this lacked all
|
||
|
legal basis. Failure to comply with legal instructions is a
|
||
|
penal offence.
|
||
|
|
||
|
Given all the reactions that XS4ALL has meanwhile received,
|
||
|
it is reinforced in its view that the Ministry has exceeded
|
||
|
its remit. On the basis of Article 125i of the Code of
|
||
|
Criminal Procedure, tapping is not something that can be or
|
||
|
should be requested. XS4ALL believes that the attempt by the
|
||
|
Ministry to compel it to cooperate in applying illegal
|
||
|
methods of investigation should not be allowed to pass off
|
||
|
without sanction. XS4ALL is urging that an early trial case
|
||
|
be brought so that a penal court can pronounce on the
|
||
|
finding and the action of the civil servants involved.
|
||
|
|
||
|
XS4ALL has therefore filed a complaint on the basis of
|
||
|
Articles 365 of the Code of Criminal Procedure and article
|
||
|
140 of the Penal Code. Article 365 of the Code of Criminal
|
||
|
Procedure implies 'coercion' by a civil servant, whereby a
|
||
|
civil servant abuses his authority and compels someone to do
|
||
|
something. In this case, the civil servants involved knew
|
||
|
that the instruction was not founded in law and abused their
|
||
|
authority by still demanding that their instruction be
|
||
|
followed. Furthermore, publications also reveal that the
|
||
|
same instruction has been given to various other Internet
|
||
|
Providers and that there were lengthy discussions with them.
|
||
|
There are therefore adequate grounds for suspecting the
|
||
|
civil servants involved of participation in an organisation
|
||
|
engaged in committing crimes; Article 140 of the Penal Code
|
||
|
applies.
|
||
|
|
||
|
XS4ALL feels obliged in principle to protect its users'
|
||
|
privacy. Furthermore, XS4ALL has a commercial interest, as
|
||
|
it must not run the risk of users bringing proceedings under
|
||
|
civil law on account of unlawful acts. This could happen
|
||
|
with such an intervention by the provider not based on law.
|
||
|
Finally, from the social point of view it is important that
|
||
|
means of detection have an adequate legal basis. Complying
|
||
|
with the injunction could serve as an undesired precedent
|
||
|
which could have a major impact on the privacy of all
|
||
|
Internet providers in the Netherlands.
|
||
|
|
||
|
XS4ALL does not have any view of the nature of the police
|
||
|
investigation or the suspected crimes. Nor will XS4ALL make
|
||
|
any statement regarding the content of the investigation,
|
||
|
the region where it is occurring or the identity of the
|
||
|
civil servants involved, as it is not its intention that the
|
||
|
investigation should founder.
|
||
|
|
||
|
For further details of this case (incl. previous press
|
||
|
releases and articles):
|
||
|
|
||
|
http://www.xs4all.nl/
|
||
|
|
||
|
or contact
|
||
|
XS4ALL
|
||
|
Maurice Wessling
|
||
|
Telephone: +31 20 3987681 / 3987654
|
||
|
email: maurice@xs4all.nl
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 17 Dec 1997 23:35:10 -0600
|
||
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
||
|
Subject: File 4--"Hackers" hit Yahoo.com - leave "ransom" note
|
||
|
|
||
|
In an article titled HACKERS IN YAHOO! LEAVE RANSOM NOTE the
|
||
|
December 10, '97, Chicago Tribune reported that "hackers" broke
|
||
|
into Yahoo.com, the popular launching place for linking to
|
||
|
topical sites, and "demanded the release of an imprisoned comrade
|
||
|
and threatened to unleash a crippling computer virus if he is not
|
||
|
freed." According to the article:
|
||
|
|
||
|
Computer-security experts were skeptical of the hackers'
|
||
|
claim that they had implanted such a virus.
|
||
|
|
||
|
The hackers, calling themselves PANTS/HAGIS, got into
|
||
|
Yahoo!'s World Wide Web site Monday night, leaving a digital
|
||
|
ransom note.
|
||
|
|
||
|
"For the past month, anyone who has viewed Yahoo's page &
|
||
|
used their search engine, now has a logic bomb/worm
|
||
|
implanted deep within their computer," it read. "On
|
||
|
Christmas Day 1998, the logic bomb part of this `virus' will
|
||
|
become active, wreaking havoc upon the entire planet's
|
||
|
networks."
|
||
|
|
||
|
The article reported that an antidote will be made available "if
|
||
|
hacker Kevin Mitnick is released. Mitnick was indicted last year
|
||
|
on charges involving a multimillion-dollar crime wave in
|
||
|
cyberspace."
|
||
|
|
||
|
The article indicates that the message was up for only 10 to 15
|
||
|
minutes. A Yahoo.com spokesperson indicated that there was no
|
||
|
virus.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sat, 13 Dec 1997 12:01:17 -0500
|
||
|
From: "Evian S. Sim" <evian@escape.com>
|
||
|
Subject: File 5--Mitnick Supporters Deny Yahoo Hack
|
||
|
|
||
|
COMPUTERGRAM INTERNATIONAL
|
||
|
New York, Published: December 15 1997
|
||
|
Issue Number 3311
|
||
|
MITNICK SUPPORTERS DENY YAHOO HACK
|
||
|
|
||
|
The group running The Official Kevin Mitnick web site
|
||
|
(http://www.kevinmitnick.com) has denied it is linked to, or knows who is
|
||
|
behind, the curiously named PANTS/HAGIS Alliance which was allegedly
|
||
|
responsible for the hacking stunt pulled on Yahoo on Tuesday (CI No 3,303).
|
||
|
A spokesperson for the site told Computergram International that although
|
||
|
it appreciates the hackers' interest and enthusiasm in helping Kevin
|
||
|
Mitnick, it would like to distance itself from their activities. The site
|
||
|
creators released this statement: "The charges against Kevin have been
|
||
|
grossly exaggerated and the fact that he's been held three years without
|
||
|
bail makes you wonder what kind of government we have. However, vandalizing
|
||
|
web pages, sending out computer viruses (or threatening to do so) and
|
||
|
writing ransom notes are not methods we condone, suggest or encourage."
|
||
|
However, as a result of the Yahoo stunt and subsequent reporting of it, the
|
||
|
Mitnick site, which explains the charges against Kevin Mitnick and the
|
||
|
conditions in which he is kept, has received more than 37,000 visits.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 16 Nov 1997 12:50:43 -0600
|
||
|
From: jthomas3@SUN.SOCI.NIU.EDU(Jim Thomas)
|
||
|
Subject: File 6--Child Protection and Parental Empowerment / Interactive Media
|
||
|
|
||
|
((MODERATORS' NOTE: From the Center for Democracy and
|
||
|
Technology homepage comes this letter signed by CDT and
|
||
|
many other organizations that somehow slipped through the
|
||
|
publication cue's cracks last month)).
|
||
|
|
||
|
----
|
||
|
|
||
|
Child Protection and Parental Empowerment in Interactive Media
|
||
|
|
||
|
The Honorable Larry Pressler
|
||
|
Chairman
|
||
|
Senate Commerce Committee
|
||
|
United States Senate
|
||
|
Washington, DC 20510
|
||
|
|
||
|
|
||
|
The Honorable Thomas J. Bliley, Jr.
|
||
|
Chairman
|
||
|
House Committee on Commerce
|
||
|
United States House of Representatives
|
||
|
Washington, DC, 20515
|
||
|
|
||
|
|
||
|
The Honorable Ernest F. Hollings
|
||
|
Ranking Democrat
|
||
|
Senate Committee on Commerce
|
||
|
United States Senate
|
||
|
Washington, DC 20510
|
||
|
|
||
|
|
||
|
The Honorable John D. Dingell
|
||
|
Ranking Democrat
|
||
|
House Committee on Commerce
|
||
|
United States House of Representatives
|
||
|
Washington, DC, 20515
|
||
|
|
||
|
|
||
|
The Honorable Henry Hyde
|
||
|
Chairman
|
||
|
House Judiciary Committee
|
||
|
United States House of Representatives
|
||
|
Washington, DC, 20515
|
||
|
|
||
|
|
||
|
November 9, 1995
|
||
|
|
||
|
Dear Senator Pressler, Senator Hollings, Representative Bliley, and
|
||
|
Representative Dignell:
|
||
|
|
||
|
For the past year, Congress has struggled with the question of how
|
||
|
best to protect children from inappropriate material online. As the
|
||
|
telecommunications conferees work to reconcile competing approaches to
|
||
|
this issue we urge a consensus policy that empowers families, places
|
||
|
liability on creators of illegal content instead of passive service
|
||
|
providers, and avoids constitutionally suspect new laws that will only
|
||
|
delay enforcement. We write as a broad coalition of representatives
|
||
|
from the online service, computer hardware and software, and
|
||
|
telecommunications and electronic industries, the advertising
|
||
|
industry, newspaper and library associations, and public interest
|
||
|
organizations, who believe that the interests of children, free
|
||
|
expression, and the continued viability of the Internet and
|
||
|
interactive media can best be served by combining a deregulatory
|
||
|
approach to encourage the development of parental empowerment
|
||
|
technology along with vigorous enforcement of criminal laws that are
|
||
|
crafted according to settled constitutional principles.
|
||
|
|
||
|
A comprehensive and effective policy approach to this issue should be
|
||
|
based on the following principles:
|
||
|
|
||
|
* Parental Empowerment: Maximum reliance on, and encouragement of,
|
||
|
private sector innovation to produce technologies that enable
|
||
|
parents, not government regulators, to choose what is best for
|
||
|
their own children.
|
||
|
|
||
|
* No vicarious liability: Due to the tremendous flow of information
|
||
|
through both public and private networks, holding service
|
||
|
providers, systems, access software providers, or any other third
|
||
|
parties liable for the content of illegal messages created by
|
||
|
persons not under their authority or control will be ineffective
|
||
|
at protecting children as well as a threat to the privacy of
|
||
|
users. Groups such as the United States Chamber of Commerce have
|
||
|
expressedconcern on this issue, as well.
|
||
|
|
||
|
* Enforceable, narrowly tailored, and constitutionally sound
|
||
|
criminal laws: Any new criminal laws should be focused on bad
|
||
|
actors and based on constitutionally sound standards. Existing
|
||
|
proposals, which rely on the vague and untested indecency
|
||
|
standard, do not fall into such a category.
|
||
|
|
||
|
* Uniform national policy: Given the national, and even global,
|
||
|
nature of online services, uniform national rules governing
|
||
|
liability are essential. Permitting state regulation of content in
|
||
|
interactive media would force service providers and systems to
|
||
|
conform to inconsistent and contradictory regulations and
|
||
|
undermine the national interest.
|
||
|
|
||
|
|
||
|
|
||
|
Recognizing the power of interactive technology to help solve the
|
||
|
problem of protecting children, the House passed the Cox-Wyden-White
|
||
|
bill on a 420-4 vote in order to encourage the market to provide
|
||
|
parents screening and filtering options to protect minors. Even since
|
||
|
the Congress began considering this issue this year, great advances
|
||
|
have been made in parental empowerment technologies. Thus, the
|
||
|
Interactive Working Group, with the support of its members, would
|
||
|
welcome the opportunity to demonstrate these technologies as well as
|
||
|
to brief the conferees on additional cooperative efforts now underway
|
||
|
in the private sector. Relying on parents, not the government, to make
|
||
|
choices about the content that they and their families receive assures
|
||
|
maximum respect for First Amendment rights of adults to receive and
|
||
|
transmit constitutionally-protected material, and allows families, not
|
||
|
bureaucrats, to determine what information is most consistent with
|
||
|
their own moral values.
|
||
|
|
||
|
Recent FBI child pornography arrests demonstrate that vigorous law
|
||
|
enforcement efforts are already working to punish illegal behavior
|
||
|
online. We would welcome the opportunity to brief you on ongoing
|
||
|
efforts to assist law enforcement in cases where criminal activity has
|
||
|
occurred. To the extent new criminal laws are needed, they must be
|
||
|
drafted in a constitutionally sound manner, both to avoid enforcement
|
||
|
delays and to assure respect for the free speech and privacy rights of
|
||
|
Internet users. We believe it is possible to craft a criminal statute
|
||
|
that punishes those who provide truly harmful material to children in
|
||
|
a manner that both targets the serious offenses about which some
|
||
|
conservative family groups are most concerned, and that also will
|
||
|
withstand constitutional scrutiny. In particular, rather than relying
|
||
|
on the vague and constitutionally suspect "indecency" standard,
|
||
|
Congress should instead consider the "harmful to minors" standard
|
||
|
within the framework of Title 18 of the United Sates Code. This
|
||
|
standard is used in numerous state statutes and has been found
|
||
|
constitutional by the United States Supreme Court.
|
||
|
|
||
|
We look forward to working with all of you in an effort to identify a
|
||
|
solution to this problem that assures maximum protection for children,
|
||
|
while relying on the innovative energy of the high technology market
|
||
|
to meet evolving needs of parents online.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
|
||
|
|
||
|
America Online Inc.
|
||
|
American Advertising Federation
|
||
|
American Association of Advertising Agencies
|
||
|
American Association of Law Libraries
|
||
|
American Library Association
|
||
|
American Society of Newspaper Editors
|
||
|
Association of National Advertisers
|
||
|
AT&T<br> Bell Atlantic
|
||
|
Business Software Alliance
|
||
|
Center for Democracy and Technology
|
||
|
Coalition for Networked Information
|
||
|
Commercial Internet eXchange
|
||
|
Compuserve Inc.
|
||
|
Computer & Communications Industry Association
|
||
|
Consumer Electronics Manufacturers Association
|
||
|
Cox Enterprises
|
||
|
Discovery Channel
|
||
|
Electronic Frontier Foundation
|
||
|
Electronic Messaging Association
|
||
|
Institute for Electrical and Electronic Engineers - United States
|
||
|
Activities
|
||
|
Information Technology Association of America
|
||
|
MCI
|
||
|
Microsoft Corporation
|
||
|
Microsystems Software
|
||
|
National Cable Television Association
|
||
|
National Newspaper Association
|
||
|
Netscape Communications Corp.
|
||
|
Newspaper Association of America
|
||
|
Pacific Telesis
|
||
|
Recreational Software Advisory Council
|
||
|
Software Industry Coalition
|
||
|
Software Publishers Association
|
||
|
SurfWatch Software
|
||
|
TCI
|
||
|
The Media Institute
|
||
|
Time Warner Inc.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
cc: Members of the Conference Committee on telecommunications reform
|
||
|
legislation
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 4 Dec 1997 23:30:11 -0600
|
||
|
From: Avi Bass <te0azb1@corn.cso.niu.edu>
|
||
|
Subject: File 7--Technological Breakthrough (humor)
|
||
|
|
||
|
((MODERATORS' NOTE: This report on a Technological Breakthrough
|
||
|
was passed along to CuD by Avi Bass of "NewsPlace"
|
||
|
<http://www.niu.edu/newsplace/>)).
|
||
|
|
||
|
Technological Report: Announcing the new Built-in Orderly Organized
|
||
|
Knowledge device called B.O.O.K.
|
||
|
|
||
|
The "BOOK" is a revolutionary breakthrough in technology: No wires, no
|
||
|
electric circuits, no batteries, nothing to be connected or switched on.
|
||
|
It's so easy to use even a child can operate it. Just lift its cover!
|
||
|
Compact and portable, it can be used anywhere-even sitting in an armchair
|
||
|
by the fire-yet it is powerful enough to hold as much information as a
|
||
|
CD-ROM disc.
|
||
|
|
||
|
Here's how it works...
|
||
|
|
||
|
Each BOOK is constructed of sequentially numbered sheets of paper
|
||
|
(recyclable), each capable of holding thousands of bits of information.
|
||
|
These pages are locked together with a custom-fit device called a binder
|
||
|
which keeps the sheets in their correct sequence. Opaque PaperTechnology
|
||
|
(OPT) allows manufacturers to use both sides of the sheet, doubling the
|
||
|
information density and cutting costs in half.
|
||
|
|
||
|
Experts are divided on the prospects for further increases in information
|
||
|
density; for now BOOKs with more information simply use more pages. This
|
||
|
makes them thicker and harder to carry, and has drawn some criticism from
|
||
|
the mobile computing crowd. Each sheet is scanned optically, registering
|
||
|
information directly into your brain. A flick of the finger takes you to
|
||
|
the next sheet. The BOOK may be taken up at any time and used by merely
|
||
|
opening it. The BOOK never crashes and never needs rebooting, though like
|
||
|
other display devices it can become unusable if dropped overboard. The
|
||
|
"browse" feature allows you to move instantly to any sheet, and move
|
||
|
forward or backward as you wish. Many come with an "index" feature, which
|
||
|
pinpoints the exact location of any selected information for instant
|
||
|
retrieval.
|
||
|
|
||
|
An optional "BOOKmark" accessory allows you to open the BOOK to the exact
|
||
|
place you left it in a previous session-even if the BOOK has been closed.
|
||
|
BOOKmarks fit universal design standards; thus, a single BOOKmark can be
|
||
|
used in BOOKs by various manufacturers. Conversely, numerous bookmarkers
|
||
|
can be used in a single BOOK if the user wants to store numerous views at
|
||
|
once. The number is limited only by the number of pages in the BOOK.
|
||
|
|
||
|
The media is ideal for long term archive use, several field trials have
|
||
|
proven that the media will still be readable in several centuries, and
|
||
|
because of its simple user interface it will be compatible with future
|
||
|
reading devices.
|
||
|
|
||
|
You can also make personal notes next to BOOK text entries with an
|
||
|
optional programming tool, the Portable Erasable Nib Cryptic
|
||
|
Intercommunication Language Stylus (Pencils). Portable, durable, and
|
||
|
affordable, the BOOK is being hailed as the entertainment wave of the
|
||
|
future. The BOOK's appeal seems so certain that thousands of content
|
||
|
creators have committed to the platform.
|
||
|
|
||
|
Look for a flood of new titles soon.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 7 May 1997 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
|
||
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
||
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #9.90
|
||
|
************************************
|
||
|
|