948 lines
48 KiB
Plaintext
948 lines
48 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.14 (November 30, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Brendan Kehoe
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission.
|
||
It is assumed that non-personal mail to the moderators may be reprinted
|
||
unless otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS:
|
||
File 1: Moderators' Corner
|
||
File 2: Len Rose Indicted
|
||
File 3: CPSR's FOIA request from the FBI
|
||
File 4: International Information Retrieval Guild
|
||
File 5: A Note on Censorship
|
||
File 6: Two Comments on Prodigy
|
||
File 7: Don't Talk to Cops
|
||
File 8: Response to DEA/PBX News Story
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 1 of 8: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: November 30, 1990
|
||
|
||
++++++++++
|
||
In this file:
|
||
1. FTP INFORMATION
|
||
++++++++++
|
||
|
||
+++++++++++++++++++++
|
||
FTP Information
|
||
+++++++++++++++++++++
|
||
|
||
We *DO NOT* maintain archives at NIU, and other than back issues of CuD, we
|
||
cannot send out archival material. Back issues can be obtained from two ftp
|
||
sites:
|
||
|
||
1. WIDENER: The *CORRECT* Widener ftp address is:
|
||
%% ftp cs.widener.edu
|
||
or%% ftp 192.55.239.132
|
||
|
||
On decompressing Zfiles:
|
||
The archivist just put up a 16-bit uncompress utility for DOS that'll do the
|
||
trick. Get pub/dos/uncom.exe first; then to uncompress anything with the .Z
|
||
extension, do it thusly:
|
||
|
||
C:%XFER >UNCOM FOO.Z > FOO
|
||
|
||
(it'll appear on the standard output). He hasn't played with it much yet,
|
||
so it may have a -o option or something to it. The site is available from
|
||
6 pm to 6 am.
|
||
|
||
2. BLAKE: The address and archive list is available to subscribers only.
|
||
All files are Zfiles, and if you are using a unix system, use the
|
||
"decompress +filename+" command.
|
||
|
||
+++++++
|
||
|
||
We have added additional papers and other material to the archives. We are
|
||
ESPECIALLY INTERESTED in receiving papers from lawyers or law students on
|
||
CU-related topics. This can include summaries of recent law,
|
||
bibliographies, or other material that would be of interest. We have added
|
||
the computer crime statutes from Illinois (16D-3) and California (502,
|
||
502.7), the ECPA, and other material. We hope to compile a strong set of
|
||
law-related articles and laws, so if you come across any related files,
|
||
pass them along.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Moderators
|
||
Subject: Len Rose Indicted
|
||
Date: 29 November, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 2 of 8: Len Rose Indicted ***
|
||
********************************************************************
|
||
|
||
"Man is Charged in Computer Crime"
|
||
By Joseph Sjostrom
|
||
From: Chicago Tribune, 28 November, 1990: Section 2, p. 2
|
||
|
||
Du Page County prosecutors have indicted a Naperville resident in
|
||
connection with an investigation into computer tampering.
|
||
|
||
Leonard Rose, 31, of 799 Royal St. George St., Naperville, was charged by
|
||
the Du Page County grand jury last week with violating the 1988 "computer
|
||
tampering" law that prohibits unauthorized entry into a computer to copy,
|
||
delete or damage programs or data contained in it.
|
||
|
||
Rose, who lived in Baltimore until last September or October, is under
|
||
federal indictment there for allegedly copying and disseminating a valuable
|
||
computer program owned by AT&T. The Du Page indictment charges him with
|
||
copying the same program from the computer of a Naperville software firm
|
||
that employed him for a week in October.
|
||
|
||
His alleged tampering with computers there was noticed by other employees,
|
||
according to Naperville police. A search warrant was obtained for Rose's
|
||
apartment last month, and two computers and a quantity of computer data
|
||
storage discs were confiscated, police said.
|
||
|
||
The Du Page County and federal indictments charge that Rose made
|
||
unauthorized copies of the AT&T Unix Source Code, a so-called operating
|
||
system that gives a computer its basic instructions on how to function.
|
||
|
||
The federal indictment says Rose's illegal actions there were commited
|
||
between May 1988 and January 1990. The Du Page County indictment alleges
|
||
he tampered with the Naperville firm's computers on Oct. 17.
|
||
(end article)
|
||
|
||
*************************************
|
||
Although we have not yet seen the indictment, we have been told that charges
|
||
were made under the following provisions of the Illinois Criminal Code:
|
||
*************************************
|
||
|
||
From: SMITH-HURD ILLINOIS ANNOTATED STATUTES
|
||
COPR. (c) WEST 1990 No Claim to Orig. Govt. Works
|
||
CHAPTER 38. CRIMINAL LAW AND PROCEDURE
|
||
DIVISION I. CRIMINAL CODE OF 1961
|
||
TITLE III. SPECIFIC OFFENSES
|
||
PART C. OFFENSES DIRECTED AGAINST PROPERTY
|
||
ARTICLE 16D. COMPUTER CRIME
|
||
|
||
1990 Pocket Part Library References
|
||
|
||
16D-3. COMPUTER tampering
|
||
|
||
s 16D-3. COMPUTER Tampering. (a) A person commits the offense of COMPUTER
|
||
tampering when he knowingly and without the authorization of a COMPUTER'S
|
||
owner, as defined in Section 15-2 of this Code, or in excess of the authority
|
||
granted to him:
|
||
(1) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
|
||
program or data;
|
||
(2) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
|
||
program or data, and obtains data or services;
|
||
(3) Accesses or causes to be accessed a COMPUTER or any part thereof, or a
|
||
program or data, and damages or destroys the COMPUTER or alters, deletes or
|
||
removes a COMPUTER program or data;
|
||
(4) Inserts or attempts to insert a "program" into a COMPUTER or COMPUTER
|
||
program knowing or having reason to believe that such "program" contains
|
||
information or commands that will or may damage or destroy that COMPUTER, or
|
||
any other COMPUTER subsequently accessing or being accessed by that COMPUTER,
|
||
or that will or may alter, delete or remove a COMPUTER program or data from
|
||
that COMPUTER, or any other COMPUTER program or data in a COMPUTER
|
||
subsequently accessing or being accessed by that COMPUTER, or that will or may
|
||
cause loss to the users of that COMPUTER or the users of a COMPUTER which
|
||
accesses or which is accessed by such "program".
|
||
(b) Sentence.
|
||
(1) A person who commits the offense of COMPUTER tampering as set forth in
|
||
subsection (a)(1) of this Section shall be guilty of a Class B misdemeanor.
|
||
(2) A person who commits the offense of COMPUTER tampering as set forth in
|
||
subsection (a)(2) of this Section shall be guilty of a Class A misdemeanor and
|
||
a Class 4 felony for the second or subsequent offense.
|
||
(3) A person who commits the offense of COMPUTER tampering as set forth in
|
||
subsection (a)(3) or subsection (a)(4) of this Section shall be guilty of a
|
||
Class 4 felony and a Class 3 felony for the second or subsequent offense.
|
||
(c) Whoever suffers loss by reason of a violation of subsection (a)(4) of this
|
||
Section may, in a civil action against the violator, obtain appropriate
|
||
relief. In a civil action under this Section, the court may award to the
|
||
prevailing party reasonable attorney's fees and other litigation expenses.
|
||
(end Ill. Law)
|
||
+++++++++++++++++++++++++++++++++++++++++
|
||
|
||
Illinois employs determinate sentencing, which means that the judge is
|
||
bound by sentencing guidelines established by law for particular kinds of
|
||
offenses (See Illinois' Univied Code of Corrections, Chapter 38, Sections
|
||
1005-8-1, 1006-8-2, 1005-5-3.1, and 1005-3.2).
|
||
|
||
Computer tampering carries either a Class 4 felony sentence, which can
|
||
include prison time of from one to three years, or a Class A misdemeanor
|
||
sentence. With determinate sentencing, the judge selects a number between
|
||
this range (for example, two years), and this is the time to be served.
|
||
With mandatory good time, a sentence can be reduced by half, and an
|
||
additional 90 days may be taken off for "meritorious good time." Typical
|
||
Class 4 felonies include reckless homicide, possession of a controlled
|
||
substance, or unlawful carrying of a weapon.
|
||
|
||
A Class A misdemeanor, the most serious, carries imprisonment of up to one
|
||
year. Misdemeanants typically serve their time in jail, rather than prison.
|
||
Ironically, under Illinois law, it is conceivable that if an offender were
|
||
sentenced to prison for a year or two as a felon, he could be released
|
||
sooner than if he were sentenced as a misdemeanant because of differences
|
||
in calculation of good time.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: <mrotenberg@CDP.UUCP>
|
||
Subject: CPSR's FOIA request from the FBI
|
||
Date: Thu, 29 Nov 90 09:55:52 -0800
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 3 of 8: CPSR'S FOIA action with the FBI ***
|
||
********************************************************************
|
||
|
||
CPSR entered its first appearance today in federal district court in the
|
||
case CPSR v. FBI. CPSR is seeking information from the FBI under the
|
||
Freedom of Information Act regarding the monitoring and surveillance of
|
||
computer bulletin boards used by political and advocacy organizations.
|
||
|
||
Judge Stanley Harris began the status call by indicating that the case
|
||
would be transferred to the newest member of the Court, Judge Michael
|
||
Boudin, son of the late civil rights attorney Leonard Boudin. He mentioned
|
||
in passing that the decision to transfer the case was "made by a computer"
|
||
and that he "had nothing to do with it."
|
||
|
||
Judge Harris asked the parties to go ahead with their motions so that the
|
||
proceeding would not be delayed. Assistant US Attorney Mark Nagle
|
||
indicated that the FBI had located one document responsive to CPSR's
|
||
request and that he expected the FBI would release this document shortly
|
||
without any sections excised. He said that the government would then file
|
||
by January 15 a motion for summary judgment.
|
||
|
||
David Sobel, CPSR Counsel, and Marc Rotenberg, appearing as co-counsel,
|
||
then indicated to the Court that CPSR would likely challenge the adequacy
|
||
of the FBI's search for responsive documents.
|
||
|
||
Marc Rotenberg CPSR Washington Office.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: <KRAUSER@SNYSYRV1.BITNET>
|
||
Subject: International Information Retrieval Guild
|
||
Date: Wed, 28 Nov 90 21:18 EDT
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 4 of 8: Internt'l Info Retrieval Guild ***
|
||
********************************************************************
|
||
|
||
The following article describes the who and why of a computer group called
|
||
The International Information Retrieval Guild. I asked this group if they
|
||
would write an article for the readers of CuD in the hopes that other
|
||
computer groups past or present would write similar articles. I hope this
|
||
article will cast more light on what the "computer underground and hackers"
|
||
are and I invite other groups to send me an article about themselves. My
|
||
mail address is KRAUSER@SNYSYRV1.BITNET.
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Who? What? When? Why? and Where?
|
||
|
||
THE
|
||
INTERNATIONAL
|
||
INFORMATION
|
||
RETRIEVAL
|
||
GUILD
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
This article has been published to answer a few basic questions regarding
|
||
The International Information Retrieval Guild. We hope that those who read
|
||
these words will do so in an objective manner.
|
||
|
||
The I.I.R.G. Yesterday.....
|
||
|
||
The I.I.R.G. is not a new organization suddenly appearing on the scene. The
|
||
I.I.R.G. was originally founded by the Mercenary in 1982. In the following
|
||
six years the group grew to prominence in the Commodore 64 community and
|
||
created numerous share-ware utilities as well as text files.
|
||
|
||
The guild at this time was divided into two chapters, One would concentrate
|
||
on the publishing of text files and share-ware, While the second would
|
||
concentrate on the accumulation of data for the organization. At its peak
|
||
in those 6 years the I.I.R.G. ran a network of six bulletin board systems
|
||
spanning the East coast of the United States, as well as one system in
|
||
South Africa.
|
||
|
||
The group was comprised of individuals ranging from 17 to 42 years of age,
|
||
all of those having a wide variety of backgrounds and interests.
|
||
|
||
With the demise of the mainstream Commodore 64 community, (I know I'll
|
||
catch some flack on that one), and the introduction of the much superior
|
||
Amiga, the group was disbanded except for a small core of the founding
|
||
members.
|
||
|
||
Of the four surviving original members, their loyalty was divided. Two
|
||
went with the graphics capabilities and multi-tasking of the Amiga, And Two
|
||
went with the IBM.
|
||
|
||
The I.I.R.G. Today...
|
||
|
||
In early March of 1990, for the first time in over two years. The founding
|
||
members reconvened and discussed reforming the guild as a Vocal
|
||
organization. (It must be noted that in earlier days the I.I.R.G. was an
|
||
invitation only organization) The sudden shift in attitudes was due to the
|
||
negative publicity afforded hackers in the press and television.
|
||
|
||
After a brief hiatus to Canada in April, Mercenary set about establishing
|
||
the groups bulletin board system and contacting former members throughout
|
||
the United States. Knighthack, another of the founding members, was
|
||
contacted and set about the plans for publishing PHANTASY. Phantasy is to
|
||
be the I.I.R.G.'s voice to the world, a forum for discussing topics of
|
||
interest to the Computer Underground. At this point I'd like to have
|
||
Mercenary discuss this.
|
||
|
||
The I.I.R.G. was founded on the principal of exploration, The group as a
|
||
whole does not advocate illegal activities. To us Hacking is an Artform to
|
||
be nurtured and condoned. Phantasy will only publish legally obtainable
|
||
information and is not intended to be a replacement for Phrack. (Although
|
||
we do understand someone else will now be publishing Phrack, we wish them
|
||
the best of luck..)
|
||
|
||
The I.I.R.G. today is a small core of enthusiasts with a wide range of
|
||
computer preferences (IBM,AMIGA,DEC,etc) and will no longer concentrate on
|
||
one machine. I'd like to point out that freedom of speech is one of our
|
||
constitutional rights, But it seems that certain members of the
|
||
Law-enforcement establishment and certain politicians have forgotten this.
|
||
|
||
It's high time that the media also remembered this and looked at things
|
||
from our prospective. Techno Terrorists,high tech bandits, modern day
|
||
robin-hoods, this is all I see appear in the media. What about Hacker
|
||
cracks sex offender's security (Pete Leppik) or Hacker plugs multi-million
|
||
dollar security hole? Let's see some positive articles folks... Now I know
|
||
theres always a few bad apples in the bunch,and I don't dispute this, but
|
||
for the most part a true hacker is driven by curiosity about the world.
|
||
This is the same kid who took the family stereo apart when he was six not
|
||
one of Yassar's boys. I hope I've made my point and have gotten the
|
||
message across, As long as there are things to take apart,chinese
|
||
restaurants open till 2am,and a computer.. There will be hackers..
|
||
|
||
Mercenary....
|
||
|
||
|
||
Phantasy may be obtained at the following Systems...
|
||
|
||
1. IIRG Headquarters- The Rune Stone BBS - 1200/2400 Baud 24 Hours
|
||
Call for the Earliest possible releases of Phantasy and other
|
||
IIRG files. Our system will be going private so call Now while
|
||
you still can, at (203) 485-0088.
|
||
|
||
2. Lightning Systems- 24 hours - at (414) 363-4282
|
||
|
||
3. Sycamore Elite- 24 Hours - at (815) 895-5573
|
||
|
||
4. TAP's BBS at (502) 499-8933
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Czar Donic (California)
|
||
Subject: A Note on Censorship
|
||
Date: Mon, 26 Nov 90 15:40:43 0800
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 5 of 8: A Note on Censorship ***
|
||
********************************************************************
|
||
|
||
The recent debate or discussion in the Computer Underground Digest
|
||
concerning censorship is one more example of how technology has managed to
|
||
outpace legislation. Naturally, the First Amendment covers freedom of
|
||
expression in all of its manifestations, but exclusions have not yet been
|
||
codified to the extent that we can point to a corpus of specific precedents
|
||
to support restrictions thereon. It should be obvious to anyone that the
|
||
term "no law" means "no law," but ever since the prohibition against saying
|
||
"fire in a crowded theatre," people have been trying to modify the
|
||
constitution, trying to read that part of the first ammendment as meaning
|
||
"no law except . . ." or "no law but . . . ." It is one of the greatest
|
||
ironies that those who consider themselves "strict constructionists" have
|
||
the most difficulty with this ammendment.
|
||
|
||
The issue seems to revolve around property rights vs. free speech rights.
|
||
In the case of broadcast media, the airwaves are defined as belonging to
|
||
the public and this allows the government, as OUR representative, to
|
||
regulate the content of programming, even involving itself in the news to
|
||
some extent. For example, a fine arts station in Chicago, WFMT, once
|
||
elected to continue its classical music programming in the face of attack
|
||
by other interests who wanted its frequency. The attacks took the form of
|
||
complaints about its lack of news coverage, especially on "communism." The
|
||
station owners issued a statement that went something like this: "WFMT
|
||
serves a purpose that is not altered by temporary interruptions." The
|
||
station eventually won, but only at the cost of deflection from its
|
||
"purpose." The price was involvement in the political and legal arena.
|
||
|
||
It seems to me that this is where we are right now in the issue of
|
||
censorship in the computer network area. Who owns the network lines? Who
|
||
owns the machines? Who decides what information and in what form is
|
||
available to you? Finally, we have an even deeper question which is "who
|
||
owns what information," which can be expressed as an even more philosophic
|
||
one: "who owns information?"
|
||
|
||
Obviously, the framers of the constitution did not have internet on their
|
||
minds when when they were writing the constitution. They did, however,
|
||
have an interest in the free flow of information. Once a government can
|
||
restrict the information available to you, it can control every other
|
||
aspect of your life. Avoiding or preventing such a situation was the
|
||
entire premise of the first amendment.
|
||
|
||
EDITING VS. CENSORSHIP
|
||
|
||
It should be obvious that an attempt to censor an individual's right to
|
||
freely express and distribute his ideas is contrary to common sense. To
|
||
argue that publications such as Playboy and Penthouse must pay for
|
||
contributions from evangelical christians would clearly be absurd. Equally
|
||
absurd would be to require that every BIBLE come complete with a
|
||
centerfold. What is not so clear is whether such publications should be
|
||
forced to "air dissenting views." Already, equal time provisions force
|
||
electronic journalists to make air time available in such cases. Once this
|
||
crack in the rights of the "editor" is opened, all sorts of questions
|
||
arise. Much debate is squandered over whether or not certain views are
|
||
"mainstream" enough to be considered "worthy dissent."
|
||
|
||
So the absurdity becomes compounded. On the one hand we recognize that
|
||
dissenting opinions should be expressed. On the other, we make certain
|
||
that those opinions do not dissent too much. To paraphrase Barry
|
||
Goldwater, moderation in the defense of mediocrity is no virtue. If
|
||
freedom of speech is to mean anything, it must mean that uncomfortable
|
||
views be expressed.
|
||
|
||
PRIVATE PROPERTY AND FREE SPEECH
|
||
|
||
We now come to the issue of property rights vs. expression rights. It
|
||
seems perfectly reasonable that someone who puts up his own computer, his
|
||
own software, his own telephone line, his own electricity bills, should
|
||
have complete control over any and all activity that transpires on his BBS.
|
||
At the very least, he has the perogative of shutting it down or using an
|
||
unlisted number.
|
||
|
||
PUBLIC FUNDS AND FREE SPEECH
|
||
|
||
The recent argument over whether NSF has the right to censor gif files is
|
||
analogous to the recent controversy over NEA funding of what a few
|
||
retrograde senators consider morally offensive. The recent flack over the
|
||
Maplethorp exhibit is a fairly clear example of this mentality. Because of
|
||
it, congress rushed to adopt the Jessie Helms agenda. Now, congress has
|
||
backed off as a result of Joe Papp and other famous artists refusing grants
|
||
and prominent reviewers resigning.
|
||
|
||
WALMART AND 7-11
|
||
|
||
The "moral majority" threatened to boycott 7-11 if it didn't stop selling
|
||
Playboy and Penthouse. 7-11 caved in. Walmart followed suit, but then
|
||
proceeded to ban rock magazines (lot's of sex in those) but not hunting or
|
||
gun magazines. Now Sam Walton is a bible thumper for the southern midwest
|
||
and went into it with gusto. 7-11, on the other hand, simply bowed to
|
||
pressure. Now it is bankrupt. People stopped going there. Now another
|
||
group threatened Burger King and it turned around a wrote what seems to be
|
||
like the loyalty oaths of the 50's promising to sponsor only programs that
|
||
reflected "family values."
|
||
|
||
What people like us have to do is let people like Burger King know that we
|
||
will boycott them if they continue to knuckle under to extremists.
|
||
|
||
SOLUTION
|
||
|
||
Even though NSF has little choice but to try to exorcise the GIFS from
|
||
their system, Americans interested in free speech should be as vocal as
|
||
possible arguing for their continuance. The reason is that we want battles
|
||
over free speech to be fought on the level or at the line of pornography.
|
||
As long as we can keep these bigoted zealots busy reading pornography and
|
||
worrying about it, they will be unable to attack more important and
|
||
meaningful forms of free speech.
|
||
|
||
Suppose there were no GIFS on the nets? Then they would go after anything
|
||
else they could understand. What about personal notes from one person to
|
||
another? Will we have to document that every syllable is of scientific
|
||
import? Suppose someone still believes in the steady state theory of the
|
||
universe rather than the big bang. Do we cut him off because his views are
|
||
clearly invalid (so far as we know)? It could very well happen if we did
|
||
not have the GIFS as a buffer. We can recognize that the GIFS are of no
|
||
value whatsoever, that such material is available elsewhere, that they take
|
||
up valuable disk or tape space, that they clog the lines that could be
|
||
better used otherwise. So what? Their values remains as pawns in the game
|
||
of censorship and they are the most valuable ones we have.
|
||
|
||
Czar D.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Alex Gross and Steven W. Grabhorn
|
||
Subject: Two Comments on Prodigy
|
||
Date: November 29, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 6 of 8: More on Prodigy ***
|
||
********************************************************************
|
||
|
||
%Prodigy has been receiving considerable criticism in the past few weeks
|
||
because of its policies on e-mail, alleged censorship, and other problems
|
||
that some users identify. There has been a lively discussion in Pat
|
||
Townson's TELECOM DIGEST (available from the internet or by dropping a note
|
||
to: TELECOM@EECS.NWU.EDU). The following typify the kinds of issues
|
||
underlying Prodigy's policies -- moderators%
|
||
|
||
From: Alex Gross <71071.1520@COMPUSERVE.COM>
|
||
Subject: more on prodigy and censorship
|
||
Date: 27 Nov 90 01:05:43 EST
|
||
|
||
Tales of censorship on Prodigy have been ringing a great big bell with
|
||
me, and I think you'll see why from the following message which I wrote as
|
||
an answer to a query about the French Minitele service two years ago. It
|
||
was first posted on CompuServe's FLEFO (Foreign Language Education Forum)
|
||
and then got its life prolonged by being included in a Minitele info file
|
||
that is still posted there. I guess the point is that a lot of people
|
||
everywhere are still quite frightened by the idea of free speech. Also, what
|
||
about the free flow of information across boundaries (or even inside
|
||
boundaries telecom was supposed to bring--how free is it really going to
|
||
turn out to be, and for whom? It's really sounding like Prodigy is Minitele
|
||
revisited. I've added translations of some of the French words into English,
|
||
but otherwise it's as I wrote it then.
|
||
|
||
|
||
"My own experiences with Minitele are limited to the CTL branch between
|
||
Feb & June of 1988, & I don't know how applicable my observations will be
|
||
to Minitele as a whole or to what may have happened since. But I fear the
|
||
worst. First of all, it is expensive, $25 per hour from what I hear. This
|
||
wasn't true with CTL at the beginning. For close to a year, it was absolutely
|
||
free to North Americans--this was because they were trying to drum up sub-
|
||
scribers over here. Another version went that they were running big ads
|
||
in France to get people to sign up for the CTL branch there (they have
|
||
competitive companies over there running pieces of it) on the premise that
|
||
they would be able to "talk directly with America." I came in on the end
|
||
of this & had about 6 weeks of free service which then went to $4 per hour
|
||
to $10 & presumably to $25. I quit at the $4 level.
|
||
|
||
"There really wasn't an awful lot to do on this branch. You could go into
|
||
"Le Bar" & bavarder/taper (talk/type) 1 on 1 in real-time with the French. You
|
||
cd engage in something very remotely resembling free public discussion on some-
|
||
thing called Le Forum. Or you cd try some of the other "entertainments,"
|
||
mostly limited or dumb in one way or another. I'll take each of the three
|
||
in order.
|
||
|
||
"Conversations in "Le Bar" were I think on the whole worse than those you
|
||
might have on a BBS here using the CHAT option. Let's compare it to going
|
||
to a party where you really had no idea who the guests might be, and they all
|
||
turned out to have little in common. I had one or two pleasant chats, but most
|
||
of them were of the "Et quelle heure est-il a New York?" variety ("What time is
|
||
it in NYC?"). Many of the US-niks spoke only English, & a lot of the French
|
||
seemed happy to reply this way. I found at least 2 bilingual Parisian
|
||
secretaries there. Some of the talk was sex-oriented. Many had "PSEUDOs"
|
||
(handles) like Cuddles or Fondles or BIG-T*TS. Oh yes, we all had
|
||
PSEUDO's--mine was FRANGLAIS, which was generally appreciated. (Franglais is
|
||
the kind of French no one is supposed to speak, but almost everyone does--it
|
||
is a combo of French with lots of English words, FRANcais & anGLAIS.) Some
|
||
will no doubt call me a snob, but not too much really got said.
|
||
|
||
"Oh yes, some of the French affect an abbreviated slang, a la Metal
|
||
Hurlant, (Heavy Metal, originally a French mag) something like "k'veute
|
||
feravekma, magoss?" which wd not be too helpful for language-learning.
|
||
("Whatchawanna doowidmebabee?") Also, some of them don't even like computers
|
||
& seemed surprised when I told them Minitele counted as one--so user-friendly
|
||
is the interface that they really think they're on a typewriter or a tele-
|
||
phone. All conversations in Le Bar, by the way, are private between
|
||
those in them.
|
||
|
||
"So much for Le Bar. As for "Le Forum," that was simply terrible. They
|
||
practised rigorous censorship, & msgs cd take as long as 10 days to appear
|
||
on the Bd while someone performed "Validation des Textes" ("text accredita-
|
||
tion," I guess, but it sounds worse in French). At that time many
|
||
of the msgs posted in this "public" part were in English, but about a third
|
||
were in French. There were repeated anti-american msgs such as "All Americans
|
||
are stupid cowboys" or "Les americains sont tous des barbares" ("americains are
|
||
all barbarians") & such ilk. I have French cousins & have been hearing this
|
||
for 35 years, but I was sad to see it still going on. Also, some of them
|
||
have convinced themselves that France now leads the world technologically, &
|
||
I saw one msg claiming that the computer was invented by those two great
|
||
Frenchmen Pascal & Babbage (!) (to many French, any name ending in "-age" can
|
||
sound French.)
|
||
|
||
The best thing we had from it all was a party of 30 NYC area minitelistes,
|
||
& afterwards I posted a msg stating in French that our group had awarded
|
||
the PRIX DERRIDA for total stupidity to the Babbagehead and the PRIX
|
||
ETIEMBLE for some other sottise (stupidity). (Explanation: the French go
|
||
for literary prizes with names like PRIX THIS & PRIX THAT--Derrida is the
|
||
name of a virtually unreadable literary critic, Etiemble wrote the book first
|
||
condemning the use of "Franglais." The message finally got posted. Where
|
||
criticism is concerned, the French can dish it out, but they really can't
|
||
take it. I also (FINALLY) provoked them into posting a msg complaining about
|
||
the censorship, but even this was censored. Le Forum was the only part of
|
||
of Minitele I saw remotely comparable to CIS forums like FLEFO.
|
||
|
||
"As for the other services, how often do you need to know Air France times
|
||
or read Agence France Presse bulletins or consult a French astrologer? And
|
||
even if the real Minitele is more complete, do you really need to know the
|
||
names & addresses of all the dry cleaners in Marseilles? Hope this helps.
|
||
Salut! Alex"
|
||
|
||
And like it said then, Greetings! Alex
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: "Steven W. Grabhorn" <grabhorn%gandalf.nosc.mil@nosc.mil>
|
||
Subject: Prodigy "Protesters" Respond
|
||
Date: 27 Nov 90 05:33:19 GMT
|
||
|
||
I know we've seen quite a bit of discussion about Prodigy in the last
|
||
several weeks, however, I'd like to pass along an article I received from
|
||
some of the Prodigy members involved in the "protest." Prodigy certainly
|
||
does own its own service and it seems like they can do what they see fit
|
||
with it. However, I thought it might be a good idea to forward some
|
||
thoughts from the other side of the fence. Although I use Prodigy
|
||
occasionally, the thoughts below may or may not reflect my own feelings,
|
||
and the usual disclaimers about myself and my employer apply.
|
||
|
||
----------Begin Article------------
|
||
|
||
NEW PRODIGY GUIDELINES RESTRICT USE OF PRIVATE E-MAIL
|
||
|
||
FOR IMMEDIATE RELEASE, NOVEMBER 24, 1990:
|
||
|
||
Prodigy Service, the IBM/Sears owned home computer service, has taken
|
||
another unprecedented step in its clampdown on private electronic
|
||
communication.
|
||
|
||
In what appears to be a direct response to the growing strength and
|
||
visibility of Prodigy members who are protesting Prodigy's abandonment of
|
||
its much publicized "flat fee" billing structure and proposed e-mail
|
||
charges, the service has very quietly issued a new set of "messaging
|
||
guidelines" (see attached) [not included ?? -sg].] Imposition of these
|
||
guidelines will restrict the private exchange of information on Prodigy in
|
||
ways never before attempted on a commercial online service.
|
||
|
||
Russ Singer, a protest coordinator remarks, "Obviously Prodigy feels an
|
||
informed membership is not in their best interest."
|
||
|
||
Six days after being issued, existence of the new regulations is unknown to
|
||
most Prodigy users. The guidelines have not been announced on the
|
||
"Highlights" screen members encounter when logging on to the service.
|
||
|
||
Among the guidelines, which take effect immediately, are prohibitions on:
|
||
Contacting Prodigy's online merchants and advertisers for any reason other
|
||
than to "purchase goods and services" and to "communicate about specific
|
||
orders placed online"; "A mailing with a request to recipients to continue
|
||
distribution to others," which Prodigy describes as "chain letters". Use of
|
||
"automated message distribution programs (other than those provided by
|
||
Prodigy); and the threat of termination of users who fail to provide a
|
||
credit card number but who continue to send a large number of messages .
|
||
|
||
The guidelines are vague and raise disturbing questions about free speech
|
||
and the sanctity of private communication. These issues have aroused the
|
||
concern of the ACLU and other legislative and consumer groups. Although
|
||
issued universally, the intent of the guidelines seems aimed at stemming
|
||
the protest.
|
||
|
||
Says Henry Niman, another protest coordinator, "These guidelines don't make
|
||
sense from a monetary standpoint. If Prodigy goes ahead with e-mail
|
||
charges, in only five weeks these rules will be unnecessary." Although $.25
|
||
per message would afford Prodigy a bloated profit margin, most users on the
|
||
service would find the cost prohibitive.
|
||
|
||
Adds Niman, "These regulations do nothing more than create confusion and
|
||
intimidation. What purpose is served by requiring, under threat of termina-
|
||
tion, a credit card number from members who have already established a
|
||
billing arrangement with the service?"
|
||
|
||
Should e-mail charges be imposed, Prodigy, which is believed to be 80%
|
||
advertiser supported, will have created an electronic marketplace in which
|
||
merchants cannot benefit from customer to customer referrals. With the
|
||
addition of Prodigy's latest guidelines, merchants will be denied customer
|
||
feedback on the condition of that marketplace. Many protesters are asking,
|
||
"Don't advertisers have an interest in knowing what management is doing?"
|
||
|
||
Singer adds, "If what Prodigy wants to be is a shopping mall then it should
|
||
advertise itself that way, not as a flat rate interactive service.
|
||
Restricting users to submitting posts to Prodigy's public bulletin boards
|
||
makes Prodigy no more 'interactive' than a letter to the editor in a
|
||
newspaper."
|
||
|
||
Prodigy's campaign to silence dissent on the service began on October 30th
|
||
when Prodigy expelled ten of the most visible members of the protest group
|
||
(The Cooperative Defense Committee). An hour later discussion of e-mail
|
||
charges was prohibited on the only PUBLIC forum provided for member
|
||
feedback . Fifteen days later, Prodigy targeted four more protesters by
|
||
sending them newly devised "warning" notices informing them that private
|
||
"mass mailings" might be used as grounds for termination.
|
||
|
||
If Prodigy's new "guidelines" applied universally, you would not be getting
|
||
this FAX.
|
||
|
||
FOR FURTHER INFORMATION, CONTACT: PENELOPE HAY (213) 472 0443
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Reprint
|
||
Subject: Don't Talk to Cops
|
||
Date: November 27, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 7 of 8: Don't Talk to Cops ***
|
||
********************************************************************
|
||
|
||
[reposted from misc.legal K. Henson]
|
||
|
||
% There have been a lot of recent discussions of police searches
|
||
% in the electronic-publishing cases (invasions of businesses),
|
||
% and in the Grateful Dead newsgroups (cars with friendly bumper
|
||
% stickers being prime harassment targets.)
|
||
% I just saw this leaflet that looked relevant,
|
||
% so I'm asciifying it for your enjoyment.
|
||
% Bill
|
||
|
||
DON'T TALK TO COPS
|
||
------------------
|
||
By Robert W. Zeuner, Member of the New York State Bar
|
||
|
||
"GOOD MORNING! My name is investigator Holmes. Do you mind answering
|
||
a few simple questions?" If you open your door one day and are greeted
|
||
with those words, STOP AND THINK! Whether it is the local police or
|
||
the FBI at your door, you have certain legal rights of which you ought
|
||
to be aware before you proceed any further.
|
||
|
||
In the first place, when the law enforcement authorities come
|
||
to see you, there are no "simple questions". Unless they are
|
||
investigating a traffic accident, you can be sure they want information
|
||
about somebody. And that somebody may be you!
|
||
|
||
Rule Number One to remember when confronted by the authorities
|
||
is that there is no law requiring you to talk with the police, the
|
||
FBI, or the representative of any other investigative agency. Even the
|
||
simplest questions may be loaded, and the seemingly harmless bits of
|
||
information which you volunteer may later become vital links in a chain
|
||
of circumstantial evidence against you or a friend.
|
||
|
||
DO NOT INVITE THE INVESTIGATOR INTO YOUR HOME!
|
||
|
||
Such an invitation not only gives him the opportunity to look around for
|
||
clues to your lifestyle, frieds, reading material, etc., but also tends to
|
||
prolong the conversation. And the longer the conversation, the more chance
|
||
there is for a skilled investigator to find out what he wants to know.
|
||
|
||
Many times a police officer will ask you to accompany him to the
|
||
police station to answer a few questions. In that case, simply thank him
|
||
for the invitation and indicate that you are not disposed to accept it at
|
||
that time. Often the authorities simply want to photograph a person for
|
||
identification purposes, a procedure which is easily accomplished by
|
||
placing him in a private room with a two-way mirror at the station, asking
|
||
him a few innocent questions, and then releasing him.
|
||
|
||
If the investigator becomes angry at your failure to cooperate and
|
||
threatens you with arrest, stand firm. He cannot legally place you under
|
||
arrest or enter your home without a warrant signed by a judge. If he
|
||
indicates that he has such a warrant, ask to see it. A person under
|
||
arrest, or located on premises to be searched, generally must be shown a
|
||
warrant if he requests it and must be given a chance to read it.
|
||
|
||
Without a warrant, an officer depends solely on your helpfulness to obtain
|
||
the information he wants. So, unless you are quite sure of yourself, don't
|
||
be helpful.
|
||
|
||
Probably the wisest approach to take to a persistent investigator is
|
||
simply to say: "I'm quite busy now. If you have any questions that you
|
||
feel I can answer, I'd be happy to listen to them in my lawyer's office.
|
||
Goodbye!"
|
||
|
||
Talk is cheap. But when that talk involves the law enforcement
|
||
authorities, it may cost you, or someone close to you, dearly.
|
||
|
||
++++++
|
||
This leaflet has been printed as a public service by individuals
|
||
concerned with the growing role of authoritarianism and police power in
|
||
our society. Please feel free to copy or republish.
|
||
|
||
Any typos are mine, as is the damage from squashing italics into UPPER-CASE.
|
||
|
||
Thanks; Bill
|
||
# Bill Stewart 908-949-0705 erebus.att.com!wcs AT&T Bell Labs 4M-312 Holmdel NJ
|
||
Government is like an elephant on drugs: It's very confused, makes lots of
|
||
noise, can't do anything well, stomps on anyone in its way, and it sure
|
||
eats a lot.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Various
|
||
Subject: Response to DEA/PBX News Story
|
||
Date: November 29, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.14: File 8 of 8: Responses to DEA/PBX News story ***
|
||
********************************************************************
|
||
|
||
From: Defensor Vindex <anonymous@usa>
|
||
Subject: Response to Joe Abernathy's article in CuD 2.13
|
||
Date: Tue, 27 Nov 90 21:49:44 cst
|
||
|
||
Mr. Abernathy:
|
||
|
||
This response is to your column about the theft of telephone services,
|
||
recently reprinted (with your permission, as I understand it) by the
|
||
Computer Underground Digest.
|
||
|
||
I agree that a major theft, including a theft of telephone services, is
|
||
news. As such, it was entirely legitimate for you to write your story.
|
||
What I find disturbing is your use of the generic term "hacker" for any
|
||
criminal or alleged criminal that knows how to spell electron or technical.
|
||
It inflames without informing.
|
||
|
||
Unfortunately, it appears to sell papers. My complaint is probably
|
||
useless, since language is constantly evolving, but it still disturbs me
|
||
that a misunderstood part of our society is defamed needlessly.
|
||
|
||
Sorta like Asimov (as Dr. X) wrote in "The Sensuous Dirty Old Man" a few
|
||
years ago, wrote about the meaning of "gay":
|
||
|
||
[ paraphrased with apologies ]
|
||
|
||
"The dictionary says 'gay' means 'excited with merriment, lighthearted.' So
|
||
you go up to an NFL linebacker who's just made his fourth sack of the day
|
||
and is obviously 'excited with merriment, lighthearted,' and you say:
|
||
'You're gay, aren't you?'
|
||
|
||
"Whether he is or he isn't, you'll almost certainly be surprised by the
|
||
response."
|
||
|
||
"Hacker", like "gay", is perhaps becoming redefined--no matter what its
|
||
roots, it is acquiring a new meaning and life of its own, and true
|
||
"hackers" may need to find a new label (unfortunately, it, too will likely
|
||
be subverted), but I wish you wouldn't sensationalize ordinary theft in
|
||
order to carry out a private crusade.
|
||
|
||
Besides, those crooks weren't "hackers," no matter what they called
|
||
themselves. At best they were "phone phreaks." And Joe, by now you ought
|
||
to know the difference.
|
||
|
||
*************************************
|
||
|
||
From: Jack Minard <deleted>
|
||
Subject: I have in my hand a list of hackers....
|
||
Date: Wed, 28 Nov 90 11:42:57 cst
|
||
|
||
(Sigh!). Why does CuD print articles from Joe Abernathy? His articles on
|
||
the Great Porno Netscam have hurt the entire electronic community, and he
|
||
hasn't made many friends with this latest article. It's another scare
|
||
story about hackers (and others?) and gives only one side of hackers.
|
||
Here's what pisses me off about the article.
|
||
|
||
No self-respecting hacker is going to rip-off, especially after Sun Devil.
|
||
Technically, the people breaking into the DEA's pbx were fone phreaks,
|
||
hardly the same as hackers. But does Tail-gunner Joe check? No, he just
|
||
tosses out a label that the public finds sexy and convenient. Doesn't he
|
||
realize how inaccurate and simplistic his story is? Maybe somebody
|
||
originally hacked out the PBX number and gave it out, but once somebody
|
||
gets the number there's no need to hack. It's a contradiction in terms, and
|
||
ripping off a L-D company by carding just ain't hacking. Repeat: THAT
|
||
AIN'T HACKING!
|
||
|
||
Where does this $1.8 million cost come from? I think he just multiplied 18
|
||
months by the $100,000 figure that an "Arizona Prosecutor" game him. At
|
||
about a quarter a minute, it would take 9.25 kids dialing 24 hours a day, 7
|
||
days a week for 18 months to run up this figure. Why didn't our
|
||
hard-hitting investigative reporter start asking some obvious questions
|
||
like either how can so much be done so long so often by so many or why
|
||
couldn't the DEA figure out something was wrong if there was so much use?
|
||
Dimes to donuts says the prosecutor he quoted was Gail Thakeray, always a
|
||
good source for exaggeration when it comes to hacker hysteria. Why didn't
|
||
he try to check out these figures? What do they mean? I think carders are
|
||
scum, but I also think they are accused of trumped up charges. The disuse
|
||
doctrine might be debated, but using ld lines isn't quite the same thing as
|
||
stealing them. If the crime is so serious, why did it take 18 months to
|
||
find it out, and then only incidentally during the investigation of another
|
||
crime? Didn't our intrepid journalist think about asking these kinds of
|
||
questions?
|
||
|
||
The article is filled with quotes, stories, and comments by people who are
|
||
anti-hacker. This may be fine in a story attacking hackers. But since the
|
||
suspects don't seem to be hackers, and since the quotes are so one-sided,
|
||
it seems like another hatchet job. If he has ins with all these
|
||
unidentified hackers he mentions, you'd think he could at least try to
|
||
either get his facts straight and present another side.
|
||
|
||
If Joe had asked me, I'd say yeh, I'm a hacker, and so are my friends, and
|
||
we, and people like us, don't rip off. You may like us or not, disagree
|
||
with what we do or not, but most of us draw a line at that kind of ripoff
|
||
and the line's not ambiguous. It's clear--carding is wrong and using a pbx
|
||
isn't what hacking's all about. But from Joe's slanted article, you'd think
|
||
that we're the world's greatest menace.
|
||
|
||
Finally, he says that some of his info came from people identifying
|
||
themselves as hackers in late night conference calls. Did these people
|
||
trust Joe not to say anything they revealed to him? Why doesn't he tell us
|
||
about his other sources of info and who initiated the calls?
|
||
|
||
Most of us are still pissed about his stories about porn and the nets which
|
||
were yellow journalism that sells papers and gets attention. It's great
|
||
that the cud editors print all sides so let's see if they print this.
|
||
|
||
*******************************
|
||
|
||
%Moderators note: We have not read the earlier stories to which this author
|
||
alludes. As to why we printed the story, we encourage Joe to send his
|
||
CU-related stories to us, and he sent that at our request. Whatever
|
||
political or ideological differences may exist, in phone conversations and
|
||
e-mail we have, without exception, found Joe to be decent and helpful. We
|
||
learn by discussing issues, and we strongly encourage people to respond
|
||
with substantive critiques. The term "hacker" is something worth debating,
|
||
because, according to many of the indictments we have read, hacking is
|
||
defined a priori as a criminal act. As a consequence, if one claims to be
|
||
a hacker, this claim could conceivably be used as evidence in a trial.
|
||
After all, if explaining Kermit is evidence of collusion, as it was to
|
||
justify the raid on Steve Jackson Games, debates over what constitutes a
|
||
hacker are not trivial -- moderators%.
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #2.14**
|
||
********************************************************************
|
||
|
||
|