864 lines
38 KiB
Plaintext
864 lines
38 KiB
Plaintext
|
Computer underground Digest Wed Oct 28, 1998 Volume 10 : Issue 53
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #10.53 (Wed, Oct 28, 1998)
|
|||
|
|
|||
|
File 1--Fwd: Two ISPs Seized Over Usenet Content
|
|||
|
File 2--Dreamscape Responds to AG seizure of ISP equipment
|
|||
|
File 3--Press Release: Sam Ramer, Carol Pub Co., Resist Assimilation
|
|||
|
File 4--The Swedigh Personal Register (Personal Information) Law
|
|||
|
File 5--Spammer sued
|
|||
|
File 6--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Thu, 29 Oct 1998 13:40:26 -0500
|
|||
|
From: Robert A. Costner <pooh@efga.org
|
|||
|
Subject: File 1--Fwd: Two ISPs Seized Over Usenet Content
|
|||
|
|
|||
|
Source - fight-censorship@vorlon.mit.edu
|
|||
|
|
|||
|
A message from Cypherpunks about two NY ISPs seized for content. My
|
|||
|
understanding was that the remaining provisions of the CDA exempted these
|
|||
|
ISPs from liability.
|
|||
|
|
|||
|
-- Robert
|
|||
|
|
|||
|
From-- Eric Cordian <emc@wire.insync.net
|
|||
|
Subject-- Two ISPs Seized Over Usenet Content
|
|||
|
To-- cypherpunks@cyberpass.net
|
|||
|
Date-- Thu, 29 Oct 1998 10--36--51 -0600 (CST)
|
|||
|
|
|||
|
New York State Attorney General Dennis Vacco, who is running for
|
|||
|
re-election, is crowing and posturing this morning over having seized
|
|||
|
two ISPs, Dreamscape in Syracuse, and Buffnet in West Seneca, over the
|
|||
|
content of the newsgroup alt.binaries.pictures.pre-teen, thus making a
|
|||
|
small dent in the distribution of "filth" to ignorant citizen-units.
|
|||
|
|
|||
|
A running gag in abpep-t for the last several years has been for
|
|||
|
newsgroup posters to identify themselves as various faculty belonging
|
|||
|
to a mythical "Pedo University" when responding to trolls. Vacco
|
|||
|
believes this imaginary organization to be a "International Child
|
|||
|
Pornography Ring" which he has broken up.
|
|||
|
|
|||
|
13 individuals in various countries were also arrested on various
|
|||
|
child pornography possession, trading, and promotion charges, related
|
|||
|
to activity in the newsgroup, and 34 are still under "investigation",
|
|||
|
according to this morning's AP wire.
|
|||
|
|
|||
|
alt.binaries.pictures.erotica.pre-teen continues merrily onwards, and
|
|||
|
is presently discussing the arrests and seizures, minus a few of its
|
|||
|
regular participants.
|
|||
|
|
|||
|
While the loss of two small ISPs and a dozen or so patrons is unlikely
|
|||
|
to bring the uncensorable worldwide Usenet to its knees, this appears
|
|||
|
to be a small first step towards eroding the legal notion that common
|
|||
|
carriers are immune from liability over Usenet content.
|
|||
|
|
|||
|
exerpts...
|
|||
|
|
|||
|
NEW YORK (AP) -- Authorities say they have broken up an
|
|||
|
international child pornography ring dubbed ``Pedo
|
|||
|
University'' in which suspects swapped sexually explicit
|
|||
|
information, pictures and video online.
|
|||
|
|
|||
|
...
|
|||
|
|
|||
|
Thirteen people were in custody and more arrests were
|
|||
|
expected.
|
|||
|
|
|||
|
As many as 34 people were still under investigation. New
|
|||
|
York state police seized two Internet providers, Dreamscape
|
|||
|
ISP in Syracuse and Buffnet.net ISP in West Seneca.
|
|||
|
|
|||
|
...
|
|||
|
|
|||
|
Both allegedly carried Pedo University news groups, a type
|
|||
|
of electronic bulletin board similar to a chat room.
|
|||
|
|
|||
|
--
|
|||
|
Eric Michael Cordian 0+
|
|||
|
O:.T:.O:. Mathematical Munitions Division
|
|||
|
"Do What Thou Wilt Shall Be The Whole Of The Law"
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 29 Oct 1998 14:27:54 -0500
|
|||
|
From: Robert A. Costner <pooh@efga.org>
|
|||
|
Subject: File 2--Dreamscape Responds to AG seizure of ISP equipment
|
|||
|
|
|||
|
Source - fight-censorship@vorlon.mit.edu
|
|||
|
|
|||
|
Dreamscape ISP, illegally raided in connection with child porn on usenet
|
|||
|
newsgroups, can be found at
|
|||
|
|
|||
|
http://www.dreamscape.com/
|
|||
|
|
|||
|
|
|||
|
---- forwarded message ------
|
|||
|
From--Eric Cordian <emc@wire.insync.net>
|
|||
|
Subject--Dreamscape Responds
|
|||
|
To--cypherpunks@cyberpass.net
|
|||
|
Date--Thu, 29 Oct 1998 12:50:14 -0600 (CST)
|
|||
|
|
|||
|
Dreamscape has posted a reponse to the antics of New York Attorney
|
|||
|
General Dennis Vacco on its website. It will be interesting to see if
|
|||
|
any of the evidence from this illegal seizure is allowed in court.
|
|||
|
|
|||
|
-----
|
|||
|
|
|||
|
STATEMENT OF DREAMSCAPE WITH RESPECT TO ATTORNEY GENERAL'S SEIZURE OF
|
|||
|
INTERNET EQUIPMENT
|
|||
|
|
|||
|
On October 27th, the New York State Police, acting under the orders of
|
|||
|
Attorney General Dennis Vacco, seized computer equipment used by
|
|||
|
Dreamscape to provide its Internet subscribers with access to
|
|||
|
thousands of newsgroups which are available through the Internet. The
|
|||
|
seizure was purportedly for the purpose of gathering evidence of
|
|||
|
illegal conduit by persons originating child pornography. Dreamscape
|
|||
|
is not accused of any wrongdoing.
|
|||
|
|
|||
|
Dreamscape remains fully operational and continues to provide service
|
|||
|
to its customers.
|
|||
|
|
|||
|
While Dreamscape supports the Attorney General's goal of preventing
|
|||
|
harm to minors through the spread of child pornography, Dreamscape is
|
|||
|
disappointed that the Attorney General has utilized unnecessary and
|
|||
|
unlawful tactics which significantly interfere with the rights of all
|
|||
|
Americans to utilize the Internet.
|
|||
|
|
|||
|
Dreamscape does not create the articles, pictures, or other
|
|||
|
information available to persons using the Internet. Instead,
|
|||
|
Dreamscape acts solely as a conduit allowing individual senders and
|
|||
|
receivers to communicate with each other without review, supervision,
|
|||
|
censorship, or interference by Dreamscape. In this manner, Dreamscape
|
|||
|
acts in the same manner as a telephone company which merely completes
|
|||
|
calls between senders and receivers, without monitoring those
|
|||
|
communications in any way.
|
|||
|
|
|||
|
Dreamscape has, in the past, repeatedly cooperated with law
|
|||
|
enforcement agencies in tracing the identity of persons who originate
|
|||
|
pornographic materials. To the extent the Attorney General seeks to
|
|||
|
protect children by stopping the exchange of pornographic materials,
|
|||
|
that can and should be done by prosecuting the originators and
|
|||
|
recipients of said material to the fullest extent of the law. The
|
|||
|
remedy is not, however, to shut down and paralyze the Internet.
|
|||
|
|
|||
|
Dreamscape, and other Internet providers, cannot control the content
|
|||
|
of material transmitted over the Internet. Dreamscape's subscribers
|
|||
|
have access to over 30,000 newsgroups, to which they can transmit
|
|||
|
messages and receive messages. It is not possible for Dreamscape or
|
|||
|
any other Internet provider to screen, review, and censor the hundreds
|
|||
|
of thousands of messages created, transmitted and received each day.
|
|||
|
|
|||
|
Federal law recognizes that an Internet provider is not liable for the
|
|||
|
content of any messages, which the Internet provider simply transmits
|
|||
|
through cyberspace. At least one Federal Court in New York State has
|
|||
|
determined that any effort by state officials to restrict the
|
|||
|
operation of the Internet is an unconstitutional violation of federal
|
|||
|
rights and unlawful interference with interstate commerce.
|
|||
|
|
|||
|
Dreamscape remains ready and anxious to work with law enforcement
|
|||
|
officials in identifying violators of State and Federal laws against
|
|||
|
child pornography. However, Dreamscape also intends to actively oppose
|
|||
|
overzealous and unlawful efforts which have the effect of destroying
|
|||
|
the ability of its thousands of customers to legitimately utilize the
|
|||
|
Internet.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 27 Oct 1998 02:28:38 +0100
|
|||
|
From: Luca Sambucci <locutus@SAMBUCCI.COM>
|
|||
|
Subject: File 3--Press Release: Sam Ramer, Carol Pub Co., Resist Assimilation
|
|||
|
|
|||
|
Online Freedom Federation
|
|||
|
http://www.off-hq.org
|
|||
|
October 27, 1998
|
|||
|
|
|||
|
|
|||
|
For immediate release
|
|||
|
|
|||
|
|
|||
|
Sam Ramer, Carol Publishing Company, Resist Assimilation
|
|||
|
|
|||
|
Author Sam Ramer and his publishing company have appealed the
|
|||
|
federal court decision halting sales of his book The Joy of Trek.
|
|||
|
In a joint brief filed with the federal appellate court in New
|
|||
|
York City, Ramer and Carol Publishing Group advanced a number of
|
|||
|
compelling legal arguments to establish that the district judge
|
|||
|
abused his discretion and applied the wrong legal standard in
|
|||
|
granting a preliminary injunction in favor of Paramount.
|
|||
|
|
|||
|
Earlier this summer, U.S. District Court Judge Samuel Conti
|
|||
|
granted Paramount's request to ban the sale and distribution of
|
|||
|
the book pending the outcome of a full-blown copyright
|
|||
|
infringement trial in which the studio will seek over $22 million
|
|||
|
in damages. Ramer, a self-proclaimed loyal "Trekster" since the
|
|||
|
age of 6, dedicated The Joy of Trek to his wife and intended it
|
|||
|
as a humorous guide to help non-fans like her understand the
|
|||
|
fierce devotion we fans hold for Star Trek in all its
|
|||
|
incarnations.
|
|||
|
|
|||
|
The lower court found that the book, by "relating synopses of
|
|||
|
individual episodes and encapsulations of the various characters
|
|||
|
and alien species[,] . . . copies the heart' of the Star Trek
|
|||
|
properties." Judge Conti decreed that the "fictitious history
|
|||
|
[of Star Trek] is a story, created and owned by Paramount." In
|
|||
|
addition, he rejected the defense claim that the book was
|
|||
|
protected by the doctrine of "fair use," as well as the argument
|
|||
|
that Paramount has abandoned its right to pursue damages after
|
|||
|
failing to bring legal action with regard to the hundreds of
|
|||
|
other unauthorized books on Star Trek.
|
|||
|
|
|||
|
Obviously, if left unchallenged the ruling could deal a deadly
|
|||
|
blow to fanfic and other forms of fandom by removing legal
|
|||
|
hurdles and emboldening Paramount to renew its campaign against
|
|||
|
websites and other fan media.
|
|||
|
|
|||
|
Despite the obstacles presented by the lower court's injunction,
|
|||
|
Ramer and his publisher have demonstrated extraordinary ingenuity
|
|||
|
and perserverance. Indeed, in a bold tactical maneuver worthy of
|
|||
|
a starfleet captain, Carol Publishing has countersued Paramount,
|
|||
|
whose lawyers notified bookstores that they would be in contempt
|
|||
|
of court for continuing to sell the book, even though the terms
|
|||
|
of the injunction permit sales of existing inventory. Carol
|
|||
|
Publishing seeks unspecified damages for harm to its business
|
|||
|
reputation and interference with its business relationships
|
|||
|
caused by Paramount's actions.
|
|||
|
|
|||
|
Whether Carol Publishing has balanced the odds by capitalizing on
|
|||
|
Paramount's apparent legal blunder remains to be seen. Meanwhile,
|
|||
|
OFF continues to pledge its support to Sam Ramer, and encourages
|
|||
|
its members to make themselves heard. Ultimately, nothing less
|
|||
|
than fandom itself is at stake.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
The Online Freedom Federation <http://www.off-hq.org> is a non-profit
|
|||
|
organization dedicated to the preservation of freedom of speech on the
|
|||
|
Internet. Its executive council can be reached at <executives@off-hq.org>.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 29 Oct 1998 10:53:49 -0600
|
|||
|
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
|
|||
|
Subject: File 4--The Swedigh Personal Register (Personal Information) Law
|
|||
|
|
|||
|
source http://www.dsv.su.se/~jpalme/society/personal-register-law.html
|
|||
|
|
|||
|
THE SWEDISH
|
|||
|
|
|||
|
A new Swedish law about handling of personal information in
|
|||
|
computers took effect on 24 October 1998. The law makes much of
|
|||
|
the publication of information about individual persons on the
|
|||
|
Internet illegal, such as criticism of named persons,
|
|||
|
publication of lists of references in scientific papers or the
|
|||
|
sending of e-mail messages outside of Europe.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Summary of the Swedish
|
|||
|
Personal Register Law
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The object of the law is to protect against invasion of privacy
|
|||
|
through handling of personal information. The law defines "handling of
|
|||
|
personal information" as any handling of personal information,
|
|||
|
automatic or manual, like collection, registering, organizing,
|
|||
|
storing, treatment or change, retrieval, use or transmission,
|
|||
|
publication, collating, blocking or deleting. This law, however, only
|
|||
|
applies to handling of information which is wholly or partly automatic
|
|||
|
(for example by using computers), or which is contained in a
|
|||
|
structured collection of personal information available for search or
|
|||
|
retrieval.
|
|||
|
Personal information is defined as any kind of information, which
|
|||
|
directly or indirectly refers to a living physical person.
|
|||
|
The law specifies exceptions where the law is not valid: Wholly
|
|||
|
private registers handled by a single person for his or her personal
|
|||
|
needs, registers published in newspapers, books or broadcast programs,
|
|||
|
registers used only by journalists, authors or artists.
|
|||
|
|
|||
|
REQUIREMENTS ON TREATMENT
|
|||
|
OF PERSONAL INFORMATION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Personal information may only be handled for specified and justifiable
|
|||
|
goals. Collected information may only be used for the purpose, for
|
|||
|
which it was collected. Personal information must be correct and
|
|||
|
up-to-date and must not be kept longer time than needed for the
|
|||
|
purpose of the collection.
|
|||
|
Personal information may only be handled with permission from the
|
|||
|
person, whose information is handled, or for certain other justified
|
|||
|
uses.
|
|||
|
|
|||
|
SENSITIVE INFORMATION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It is not permitted to handled personal information which reveals race
|
|||
|
or ethnic origin, religious or political opinions, membership in trade
|
|||
|
unions and information about health or sexual behaviour. There are a
|
|||
|
few exceptions from this, a society may handle information who are its
|
|||
|
members, even though the organization is connected to a particular
|
|||
|
religious faith or political view, and medical organizations may
|
|||
|
handle medical information about their patients, researchers may
|
|||
|
handle information for research purposes and such information may also
|
|||
|
be handled or published with permission from the person, whose
|
|||
|
information is handled.
|
|||
|
|
|||
|
TRANSMISSION TO THIRD COUNTRIES
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Personal information may not be transmitted outside of Europe without
|
|||
|
permission from the person, whose information is handled, except with
|
|||
|
explicit permission from this person, to fulfill legal obligations or
|
|||
|
to protect vital interests.
|
|||
|
|
|||
|
CONTROL AND PUNISHMENT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The upholding of the law is controlled by a special government agency,
|
|||
|
the Data Inspection Agency, and breaking the law may be punished
|
|||
|
through damages to the registered person, fines and prison up to two
|
|||
|
years.
|
|||
|
|
|||
|
Critique of the act
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PUBLICATION OF INFORMATION
|
|||
|
ON THE INTERNET WOULD BE ILLEGAL
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If you interpret the act literally, it would mean that the following
|
|||
|
acts would be illegal:
|
|||
|
* Writing of an e-mail message to a recipient outside Europe without
|
|||
|
the prior permission of the recipient.
|
|||
|
* All Internet-based discussion forums (except those run by
|
|||
|
newspapers, since newspapers are excempt from the law) in which
|
|||
|
any information about a person is mentioned without the permission
|
|||
|
of that person.
|
|||
|
* Publication on the Internet of any scientific paper, which
|
|||
|
contains lists of references, unless each person in the list of
|
|||
|
reference has given permission in advance.
|
|||
|
* Any criticism of a named person, where that person does not give
|
|||
|
permission for the criticism. For example, criticism of
|
|||
|
politicians would not be allowed, a trade union would not be
|
|||
|
allowed to criticize named employers, etc.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
This does not agree very well with the Swedish constitution, which
|
|||
|
says that society should protect the rights of citizens to communicate
|
|||
|
with each other, especially communication about political and
|
|||
|
religious issues. However, the constitution contains a clause saying
|
|||
|
that the rights to communicate can be restricted in order to protect
|
|||
|
personal privacy, so the lawmakers claim that the law is not in
|
|||
|
contradiction to the constitution.
|
|||
|
|
|||
|
WHY ARE SOME VOCATIONS EXEMPTED
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The law has also been criticized for the exemption for authors,
|
|||
|
journalists and artists: Freedom of speech should be a right for
|
|||
|
everyone, not only for certain vocations.
|
|||
|
|
|||
|
THE LAW IS NOT NEEDED
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Criticism of the law has also said that the law is not needed, since
|
|||
|
there are other laws, like laws about racial agitation, defamation of
|
|||
|
character, etc. which are better ways than this law to regulate
|
|||
|
unwanted communication.
|
|||
|
|
|||
|
WILL THE LAW REALLY BE UPHELD
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The previous Data Act, which the new law replaces, also made most of
|
|||
|
the Internet illegal. However, this law has only been upheld by the
|
|||
|
government very irregularly. In one case, an online forum was
|
|||
|
forbidden to discuss political and religious issues, in another case,
|
|||
|
an author was forbidden to write his book using a computer. In the
|
|||
|
second case, however, this decision was revoked on appeal to the
|
|||
|
government. The new act, however, does not allow appeals to the
|
|||
|
government, only to courts of law, which can be expected to follow the
|
|||
|
words of the law. Local governments have been forbidden from
|
|||
|
publishing notes from their meetings on the Internet. In most cases,
|
|||
|
however, personal information has been published on the Internet
|
|||
|
without repressional acts from the government.
|
|||
|
Probably, the new law will also not be upheld, but the risk that
|
|||
|
the government can apply the law, when something is published, which
|
|||
|
they do not like, has been said to be an argument against the new law.
|
|||
|
The agency responsible for upholding the law, the Data Inspection
|
|||
|
Agency, says that it will strictly interpret the letter of the law,
|
|||
|
but that they may, because of limited time, not have time to act
|
|||
|
against uncontroversial information, like naming the nobel prize
|
|||
|
winners on the Internet.
|
|||
|
|
|||
|
IS SWEDEN FORCED BY
|
|||
|
THE EUROPEAN UNION
|
|||
|
TO ENACT THIS LAW?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The law was passed by the Swedish parliament with only the small
|
|||
|
liberal party and a few stragglers from other parties voting against
|
|||
|
it. When asked why they passed a law which restricts freedom of speech
|
|||
|
in this way, they say that they had to pass this law, in order to
|
|||
|
fulfill a directive from the European Union.
|
|||
|
However, opponents of the law says that this directive was not
|
|||
|
meant to be applied to publication of personal information, it was
|
|||
|
only meant to be applied to structured collections of personal
|
|||
|
information. Also structured collections would however cause problems,
|
|||
|
for example a list of references in a scientific paper is obviously a
|
|||
|
structured collection and would thus be illegal, unless each of the
|
|||
|
authors of the papers in the reference list gave their permission, and
|
|||
|
to obtain such permission would often be very difficult.
|
|||
|
|
|||
|
WILL THE GOVERNMENT AMEND THE LAW
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Because of the criticism, the government has asked the Data Inspection
|
|||
|
Agency to investigate, whether publication of local government
|
|||
|
protocols and some other publication might be exempted from the law.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 23 Oct 1998 09:50:13 -0700
|
|||
|
From: Don Smith <art@oz.net>
|
|||
|
Subject: File 5--Spammer sued
|
|||
|
|
|||
|
In WA State, the AG's office filed it's first suit against a spammer.
|
|||
|
in court.
|
|||
|
|
|||
|
====================================
|
|||
|
|
|||
|
|
|||
|
IN THE SUPERIOR COURT OF THE STATE OF WASHINGTON
|
|||
|
IN AND FOR THE COUNTY OF KING
|
|||
|
|
|||
|
|
|||
|
STATE OF WASHINGTON,
|
|||
|
|
|||
|
Plaintiff,
|
|||
|
|
|||
|
v.
|
|||
|
|
|||
|
JASON HECKEL, doing business as
|
|||
|
NATURAL INSTINCTS,
|
|||
|
|
|||
|
Defendant.
|
|||
|
NO.
|
|||
|
|
|||
|
COMPLAINT FOR INJUNCTIVE
|
|||
|
AND ADDITIONAL RELIEF UNDER
|
|||
|
THE UNFAIR BUSINESS
|
|||
|
PRACTICES--CONSUMER
|
|||
|
PROTECTION ACT AND THE
|
|||
|
UNSOLICITED ELECTRONIC
|
|||
|
MAIL ACT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
COMES NOW, plaintiff, State of Washington, by and through its
|
|||
|
attorneys Christine O.
|
|||
|
Gregoire, Attorney General; Sally Reed Gustafson, Senior Assistant
|
|||
|
Attorney General; and Paula
|
|||
|
Selis, Senior Counsel, and brings this action against defendant named
|
|||
|
herein. The state alleges the
|
|||
|
following on information and belief:
|
|||
|
I. JURISDICTION AND VENUE
|
|||
|
1.1. This Complaint is filed and
|
|||
|
these proceedings are instituted under the provisions of
|
|||
|
RCW 19.86, the Unfair Business Practices--Consumer Protection Act, and
|
|||
|
RCW 19.190, the
|
|||
|
Unsolicited Electronic Mail Act.
|
|||
|
1.2. Jurisdiction of the Attorney General to commence this action
|
|||
|
is conferred by RCW
|
|||
|
19.86.080 and RCW 19.190.030(2).
|
|||
|
1.3. The violations alleged herein have been and are being
|
|||
|
committed in whole or in
|
|||
|
part in King County, in the State of Washington by defendant named
|
|||
|
herein.
|
|||
|
///
|
|||
|
///
|
|||
|
II. DEFENDANT
|
|||
|
2.1. Defendant Jason Heckel is the
|
|||
|
sole proprietor of Natural Instincts. Natural
|
|||
|
Instinct's principal place of business is located at 4676 Commercial
|
|||
|
Street Southeast, Suite 201,
|
|||
|
Salem, Oregon 97302.
|
|||
|
2.2. Defendant Jason Heckel, doing business as Natural Instincts,
|
|||
|
conducts business in
|
|||
|
Washington through unsolicited commercial electronic mail transmitted
|
|||
|
over the Internet to
|
|||
|
Washington residents.
|
|||
|
III. NATURE OF TRADE OR COMMERCE
|
|||
|
3.1. Since at least February 1996,
|
|||
|
defendant has sent unsolicited commercial electronic
|
|||
|
mail via the Internet. In 1997, defendant developed an online 46-page
|
|||
|
booklet entitled "How to
|
|||
|
Profit From the Internet." Defendant sells his booklet and associated
|
|||
|
pamphlets by using
|
|||
|
unsolicited electronic mail to solicit customers to purchase his
|
|||
|
products.
|
|||
|
3.2. Defendant sends electronic mail messages to individuals
|
|||
|
worldwide. Many of
|
|||
|
those individuals are located in Washington. A copy of a typical
|
|||
|
unsolicited electronic mail
|
|||
|
message received by a Washington consumer is appended as Exhibit A.
|
|||
|
The message states, in
|
|||
|
part, the following:
|
|||
|
|
|||
|
"SHOW ME THE MONEY!" NOT A PROBLEM!
|
|||
|
I am about to share with you a unique opportunity to start a
|
|||
|
very successful
|
|||
|
business or take an existing one to new heights. By taking
|
|||
|
advantage of the
|
|||
|
following breakthrough knowledge in marketing trends, you
|
|||
|
will soon discover the
|
|||
|
art of
|
|||
|
|
|||
|
"How to really make money on the Information Super Highway!"
|
|||
|
3.3. The electronic mail message goes on to cite a number of
|
|||
|
testimonials from those
|
|||
|
who have already purchased defendant's product, and offers additional
|
|||
|
"free" incentives if the
|
|||
|
recipient makes a purchase. These incentives include "free" software,
|
|||
|
a "free" calling card, "free"
|
|||
|
"bonus" reports, and "free" "How to Reports." Defendant also offers
|
|||
|
as an incentive a "private
|
|||
|
list" of "50,000 e-mail addresses." The cost of defendant's product
|
|||
|
package is $39.95.
|
|||
|
3.4. In order to send unsolicited electronic mail messages to
|
|||
|
thousands of individuals in
|
|||
|
an efficient manner, defendant utilizes a software program called
|
|||
|
"Extractor Pro." Extractor Pro
|
|||
|
extracts or "mines" electronic mail addresses from various Internet
|
|||
|
sources and automatically
|
|||
|
sends out messages to those addresses upon defendant's entering the
|
|||
|
appropriate command.
|
|||
|
Using the Extractor Pro software, defendant sends between 100,000 and
|
|||
|
1,000,000 unsolicited
|
|||
|
commercial electronic mail messages per week.
|
|||
|
3.5. On average, defendant sells thirty to fifty of his product
|
|||
|
packages per month.
|
|||
|
Consumers purchase by filling out an order form which may be
|
|||
|
downloaded from the electronic
|
|||
|
mail message solicitation, and mail the form, along with payment, to
|
|||
|
defendant's address.
|
|||
|
3.6. Defendant knows or has reason to know that he sends
|
|||
|
unsolicited commercial
|
|||
|
electronic mail to Washington residents.
|
|||
|
3.7. Defendant is in competition with others in the State of
|
|||
|
Washington engaged in
|
|||
|
similar business.
|
|||
|
IV. FIRST CAUSE OF ACTION
|
|||
|
4.1. Plaintiff realleges Paragraphs
|
|||
|
3.1 through 3.7 and incorporates them herein as if set
|
|||
|
forth in full.
|
|||
|
4.2. Computer users are alerted to the existence of electronic
|
|||
|
mail messages intended
|
|||
|
for their receipt by a display on their computer monitors. The
|
|||
|
display will list the message by its
|
|||
|
purported sender and a brief subject line which generally describes
|
|||
|
the body of the message. In
|
|||
|
order to read or "download" the entire message, the user usually must
|
|||
|
click a cursor on the text of
|
|||
|
the subject line, at which point the text of the message is displayed.
|
|||
|
4.3. The purpose of the subject line in an electronic mail
|
|||
|
message is to describe the
|
|||
|
message's text. This enables a computer user to have discretion over
|
|||
|
whether and when to read
|
|||
|
the entire text of the message. Emergency or personal messages may
|
|||
|
take precedence over
|
|||
|
commercial messages. Similarly, work-related messages may take
|
|||
|
precedence over commercial
|
|||
|
messages.
|
|||
|
4.4. Defendant's unsolicited electronic mail messages display
|
|||
|
various subject lines.
|
|||
|
Rather than accurately describing the content of the text, these
|
|||
|
subject lines mislead recipients as
|
|||
|
to the true nature of the message itself. For example, defendant
|
|||
|
displays "Did I get the right e-
|
|||
|
mail address?" and "For your review--HANDS OFF!" as subject lines in
|
|||
|
his unsolicited electronic
|
|||
|
mail messages. Neither of these subject lines accurately describes
|
|||
|
the content of the messages.
|
|||
|
Rather, they constitute an attempt to entice the recipient into
|
|||
|
downloading and reading the entire
|
|||
|
text of the message. "Did I get the right e-mail address?" misleads
|
|||
|
the recipient into thinking that
|
|||
|
someone he or she knows is trying to make contact. "For your
|
|||
|
review--HANDS OFF!" creates
|
|||
|
the misimpression that the text of the message contains classified
|
|||
|
information, specifically
|
|||
|
intended for the recipient.
|
|||
|
4.5. The use of false or misleading information in the subject
|
|||
|
line of a commercial
|
|||
|
electronic mail message violates RCW 19.190.030(1)(b). Pursuant to
|
|||
|
RCW 19.190.030(2),
|
|||
|
defendant's violation of RCW 19.190.030(1)(b) constitutes a per se
|
|||
|
violation of the Consumer
|
|||
|
Protection Act, RCW 19.86.
|
|||
|
4.6. The conduct described above constitutes unfair or deceptive
|
|||
|
acts or practices in
|
|||
|
trade or commerce and unfair methods of competition in violation of
|
|||
|
RCW 19.86.020.
|
|||
|
V. SECOND CAUSE OF ACTION
|
|||
|
5.1. Plaintiff realleges Paragraphs
|
|||
|
3.1 through 4.6 and incorporates them herein as if set
|
|||
|
forth in full.
|
|||
|
5.2. Electronic mail messages sent via the Internet contain a header,
|
|||
|
which tells the
|
|||
|
recipient the source of the original message, as well as any points of
|
|||
|
transmission on the
|
|||
|
message's path to the eventual recipient. A typical header will show
|
|||
|
the path of computers which
|
|||
|
sent the electronic mail message to the ultimate recipient. The
|
|||
|
specific computers are identified
|
|||
|
by a series of computer and domain names, and Internet protocol
|
|||
|
address numbers. Often there
|
|||
|
are several computers involved in transmitting the message to its
|
|||
|
final destination. By examining
|
|||
|
the names and numbers which identify each computer along the
|
|||
|
transmission path, it is possible to
|
|||
|
determine who originally sent the message, and which Internet service
|
|||
|
providers transmitted it to
|
|||
|
its ultimate recipient.
|
|||
|
5.3. It is also possible for a sender to disguise or obscure the
|
|||
|
true routing of an
|
|||
|
electronic mail message by manipulating the transmission path
|
|||
|
information in the message's
|
|||
|
header. Defendant engages in this practice. He manipulates the
|
|||
|
information in his messages'
|
|||
|
headers to reflect that his solicitations originate at computers which
|
|||
|
are different from his. For
|
|||
|
example, some of defendant's header information indicates that the
|
|||
|
originating computer is
|
|||
|
located at the domain name "13.com." See Exhibit A. In fact,
|
|||
|
"13.com" is a domain name
|
|||
|
assigned to someone other than defendant. Defendant's messages do not
|
|||
|
originate from the
|
|||
|
"13.com" domain. Accordingly, defendant misrepresents the
|
|||
|
transmission path of his electronic
|
|||
|
mail messages by obscuring their true point of origin.
|
|||
|
5.4. It is a violation of RCW 19.190.030(1)(a) to misrepresent
|
|||
|
the transmission path of
|
|||
|
a commercial electronic mail message. Pursuant to RCW 19.190.030(2),
|
|||
|
a violation of RCW
|
|||
|
19.190.030(1)(a) constitutes a per se violation of the Consumer
|
|||
|
Protection Act, RCW 19.86.
|
|||
|
5.5. The above-described conduct constitutes unfair and deceptive
|
|||
|
acts or practices in
|
|||
|
trade or commerce, and unfair methods of competition in violation of
|
|||
|
RCW 19.86.020.
|
|||
|
VI. THIRD CAUSE OF ACTION
|
|||
|
6.1. Plaintiff realleges Paragraph
|
|||
|
3.1 through 5.5 above, and incorporates them herein
|
|||
|
as if set forth in full.
|
|||
|
6.2. Washington residents who receive unsolicited electronic mail
|
|||
|
messages from
|
|||
|
defendant often attempt to respond by clicking on their computer's
|
|||
|
"reply" icon in order to send
|
|||
|
defendant a message protesting the receipt of the original electronic
|
|||
|
mail message. Those who
|
|||
|
attempt to contact defendant are often unsuccessful in doing so. The
|
|||
|
message they attempt to
|
|||
|
send back using the "reply" icon comes back designated
|
|||
|
"undeliverable." Often the reply message
|
|||
|
is undeliverable because defendant uses a return electronic mail
|
|||
|
return address that is invalid by
|
|||
|
the time the recipient attempts to respond. The return address is
|
|||
|
rendered invalid either because
|
|||
|
(1) the Internet service provider who provides defendant's electronic
|
|||
|
mail account immediately
|
|||
|
cancels it upon discovering it is being used to send unsolicited bulk
|
|||
|
electronic mail without the
|
|||
|
service provider's approval or (2) the vast number of irate replies in
|
|||
|
response to defendant's
|
|||
|
messages overload the capacity of the return electronic mail address
|
|||
|
to receive more messages
|
|||
|
and result in the account's eventual shutdown.
|
|||
|
6.3. Despite the fact that defendant's electronic mail accounts
|
|||
|
are either immediately
|
|||
|
canceled by his Internet service provider or quickly lose their
|
|||
|
capacity to receive replies,
|
|||
|
defendant continues to send out unsolicited electronic mail. Once an
|
|||
|
electronic mail account is
|
|||
|
canceled, defendant simply opens another account and sends out another
|
|||
|
bulk mailing.
|
|||
|
Additionally, defendant maintains several electronic mail accounts
|
|||
|
simultaneously, so that he will
|
|||
|
have a continuing means to send out his messages.
|
|||
|
6.4. Defendant bombards hundreds of thousands of electronic mail
|
|||
|
addresses weekly
|
|||
|
without affording his recipients the ability to respond to his
|
|||
|
solicitations. Washington's law
|
|||
|
requires that a sender of unsolicited commercial electronic mail
|
|||
|
truthfully identify the originating
|
|||
|
electronic mail address of the transmission. RCW 19.190.020(1)(a).
|
|||
|
This requirement affords the
|
|||
|
recipient the ability to reply to the sender directly whether it be to
|
|||
|
verify the validity of the source
|
|||
|
of the message, or to protest the receipt of the unsolicited message
|
|||
|
and request no further
|
|||
|
correspondence from the sender.
|
|||
|
6.5. Defendant fails to provide a valid return electronic mail
|
|||
|
address to recipients.
|
|||
|
Though the return electronic mail address accurately reflects the
|
|||
|
source of the original message at
|
|||
|
the moment the message is sent, its almost instantaneous invalidity
|
|||
|
renders it useless to recipients.
|
|||
|
By posting a seemingly valid return electronic mail address which, in
|
|||
|
fact, is impossible to respond
|
|||
|
to, defendant misrepresents the status of his electronic mail account.
|
|||
|
6.6. The conduct described above constitutes unfair or deceptive
|
|||
|
acts or practices in
|
|||
|
trade or commerce and unfair methods of competition in violation of
|
|||
|
RCW 19.86.020.
|
|||
|
VII. PRAYER FOR
|
|||
|
RELIEF
|
|||
|
WHEREFORE, plaintiff, STATE OF
|
|||
|
WASHINGTON, prays for relief as follows:
|
|||
|
7.1. That the Court adjudge and decree that defendant has engaged
|
|||
|
in the conduct complained
|
|||
|
of herein.
|
|||
|
7.2. That the Court adjudge and decree that the conduct
|
|||
|
complained of in Paragraphs 4.4 and
|
|||
|
5.3 constitutes violations of the Unsolicited Electronic Mail Act,
|
|||
|
Chapter 19.190 RCW, and pursuant to
|
|||
|
RCW 19.190.030(2) constitutes per se violations of the Consumer
|
|||
|
Protection Act, Chapter 19.86 RCW.
|
|||
|
7.3. That the Court adjudge and decree that the conduct
|
|||
|
complained of in Paragraphs 4.4, 5.3
|
|||
|
and 6.5 constitutes unfair or deceptive acts or practices and unfair
|
|||
|
methods of competition in violation of
|
|||
|
the Consumer Protection Act, Chapter 19.86 RCW.
|
|||
|
7.4. That the Court issue a permanent injunction enjoining and
|
|||
|
restraining defendant and his
|
|||
|
representatives, successors, assigns, officers, agents, servants,
|
|||
|
employees, and all other persons acting or
|
|||
|
claiming to act for, on behalf of, or in active concert or
|
|||
|
participation with defendant from continuing or
|
|||
|
engaging in the unlawful conduct complained of herein.
|
|||
|
7.5. That the Court assess civil penalties, pursuant to RCW
|
|||
|
19.86.140, of up to two thousand
|
|||
|
dollars ($2,000) per violation against defendant for each and every
|
|||
|
violation of RCW 19.86.020 caused
|
|||
|
by the conduct complained of herein.
|
|||
|
7.6. That the Court make such orders pursuant to RCW 19.86.080 as
|
|||
|
it deems appropriate to
|
|||
|
provide for restitution to consumers of money or property acquired by
|
|||
|
defendant as a result of the conduct
|
|||
|
complained of herein.
|
|||
|
7.7. That the Court make such orders pursuant to RCW 19.86.080 to
|
|||
|
provide that plaintiff,
|
|||
|
State of Washington, have and recover from defendant the costs of this
|
|||
|
action, including reasonable
|
|||
|
attorney's fees.
|
|||
|
7.8. That the Court order such other relief as it may deem just
|
|||
|
and proper to fully and
|
|||
|
effectively dissipate the effects of the conduct complained of herein,
|
|||
|
or which may otherwise seem proper
|
|||
|
to the Court.
|
|||
|
DATED this _____ day of ______________, 1998.
|
|||
|
|
|||
|
CHRISTINE O. GREGOIRE
|
|||
|
Attorney General
|
|||
|
SALLY R. GUSTAFSON
|
|||
|
Senior Assistant Attorney General
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_____________________________
|
|||
|
PAULA SELIS, WSBA #12823
|
|||
|
Senior Counsel
|
|||
|
Attorneys for Plaintiff
|
|||
|
State of Washington
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 25 Apr 1998 22:51:01 CST
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: File 6--Cu Digest Header Info (unchanged since 25 Apr, 1998)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|||
|
|
|||
|
SUBSCRIBE CU-DIGEST
|
|||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|||
|
|
|||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|||
|
|
|||
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
CuD is readily accessible from the Net:
|
|||
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|||
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #10.53
|
|||
|
************************************
|