778 lines
37 KiB
Plaintext
778 lines
37 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun May 10, 1992 Volume 4 : Issue 21
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Associate Editor: Etaion Shrdlu, Jr.
|
||
Arcmeisters: Brendan Kehoe and Bob Kusumoto
|
||
|
||
CONTENTS, #4.21 (May 10, 1992)
|
||
File 1--Police PR meets style v. substance
|
||
File 2--BloomBecker's 5 points for crime policy
|
||
File 3--The Forgotten Victims of the "Bill Cook" Raids
|
||
File 4--A Forgotten Victim of the 1990 Raids
|
||
File 5--Pay Craig's Legal Fees For 29 Cents?
|
||
File 6--Online Debate Article
|
||
File 7--Two Cornell Students Indicted in Virus Case
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
|
||
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
|
||
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
|
||
ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
|
||
with the subject "help" (without the quotes) to
|
||
archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
|
||
in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sat, 2 May 1992 18:18 CDT
|
||
From: <BOEHLEFELD@WISCSSC.BITNET>
|
||
Subject: File 1-- Police PR meets style v. substance
|
||
|
||
A late response, but regarding the discussion of the Fresno police
|
||
press release (discussed in Cu Digest, #4.18):
|
||
|
||
I don't have a scientific sample, but I've looked at information from
|
||
a variety of police/law enforcement agencies for several years as
|
||
a journalist. I have only known one PIO who has had journalism
|
||
training before entering law enforcement, and her time on the PIO
|
||
desk was limited. Many of the releases I saw over the years included
|
||
misspellings, grammatical and other errors. (So, too, did many of
|
||
the police reports I have looked at over the years.) I have seen
|
||
similar releases about LSD being circulated on stickers with cartoon
|
||
characters, and about 'unsavory strangers' lurking in communities.
|
||
|
||
The sensationalism of the writing concerned me far more than the
|
||
minor details of spelling or apparent lack of letterhead. I have
|
||
a computer, I have a modem, I have children and I have an acquaintance
|
||
who claims to run an x-rated bbs. I also manage to keep these elements
|
||
of my life separated. But, if we acknowledge that the computer literacy
|
||
of various members of our society ranges from none to much, and that
|
||
many of us, likely, fall somewhere in between, I'm afraid hype of
|
||
the kind this press release generates will not do much in ensuring
|
||
that the potential benefits of personal electronic media will accrue
|
||
to all of us. It seems fear tactics generate fear, not understanding.
|
||
Sensationalism is not produced by 'the media' alone.
|
||
|
||
I think your response, which included reports of conversations
|
||
you apparently had with Fresno police personnel, put the actual
|
||
event in better perspective.
|
||
|
||
I'm not suggesting that every police department needs to hire a
|
||
public relations specialist (though friends in PR probably would),
|
||
but each of us who writes for public consumption would do well to
|
||
consider how we get attention for an issue we believe is important.
|
||
(The other recent post about preparing material for posting had
|
||
some good advice.)
|
||
|
||
In other words: If you want to be believed, keep it simple. Keep
|
||
it straight.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 4 May 1992 8:50:01 GMT
|
||
From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory
|
||
Subject: File 2--BloomBecker's 5 points for crime policy
|
||
|
||
In response to: CuD 4.14 BloomBecker's Legal Guidelines at CV&SC Conference
|
||
|
||
BloomBecker's 5 points for a nationwide set of legal guidelines for
|
||
computer crime are fundamentally flawed!
|
||
|
||
> 1. The creation of a $200 crime law deductible. Damages incurred below
|
||
> that figure would not be the subject of criminal action.
|
||
|
||
"Damages" would presumably include the $$$ spent in wages for someone
|
||
to inspect the system for maliciously inserted code. It would not be
|
||
hard at all to run up a wages bill in excess of $200 in doing so.
|
||
Ergo, _all_ computer intrusions would be the subject of criminal
|
||
action.
|
||
|
||
One alternative is to set a realistically higher damages threshold for
|
||
criminal proceedings, and allow the "victim" to seek a civil remedy
|
||
against the alleged intruder.
|
||
|
||
> 2. The creation of a civil course of action for inadequate computer
|
||
> security
|
||
|
||
This sounds, at first sight, quite fair. For instance, here in Darwin
|
||
Australia, I can be given a ticket for failing to lock my car doors!
|
||
This measure was introduced in an effort to raise public awareness of
|
||
escalating car thefts, and to promote public responsibility for
|
||
prevention (which is always better than any cure :)
|
||
|
||
But it is difficult to see how such a measure can be justly applied to
|
||
computer security. My primary problem is the phrase "inadequate
|
||
computer security". Locking my car door takes a bit of forethought
|
||
and a second or two upon my exiting the vehicle. "Locking" a computer
|
||
system would require considerable administration time and money.
|
||
|
||
I would also assume that the "inadequacy" of the security is to be
|
||
measured in light of the data/system to be protected? Is the civil
|
||
penalty to be applied to government and quasi-government systems?
|
||
|
||
Are personal computer operators/ BBS SysOps to be made subject to such
|
||
a requirement?
|
||
|
||
> 3. The making of reckless computing a felony. "Reckless computing" is
|
||
> classified as anything which could potentially cause damage.
|
||
|
||
Weird... Ctrl-C'ing at the right time could "potentially cause damage"
|
||
by crashing the host machine. Causing a conflict of 2 TSR's at your
|
||
end (thereby causing your machine to lock up) necessitating a reboot
|
||
(and hence dropping the connection) could "potentially cause damage"
|
||
to the host system.
|
||
|
||
Sorry..."reckless" as opposed to "intentional" conduct should NOT be
|
||
the subject of criminal actions unless there is good grounds for doing
|
||
so.
|
||
|
||
Recklessness in, for example, the area of driving a motor vehicle may
|
||
justifiably be the subject of legal sanctions - but only because of
|
||
the danger to life that it causes. I don't think there is an analogous
|
||
justification in the area of computer misuse!
|
||
|
||
> 4. The making a careless computing a misdemeanor.
|
||
|
||
How do you distinguish "careless" and "reckless"? Does not "careless"
|
||
computing have "the potential to cause damage"?
|
||
|
||
> 5. The enactment of greater protection against unreasonable search and
|
||
> seizure.
|
||
|
||
Now that is something I would support.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 3 May 92 23:45 CDT
|
||
From: uucp@DOGFACE.AUSTIN.TX.US
|
||
Subject: File 3--The Forgotten Victims of the "Bill Cook" Raids
|
||
|
||
A little over two years ago, there was much in Texas that caught the
|
||
interest of law enforcement personnel concentrating on computer crime.
|
||
Two investigations in other parts of the country focused attention on
|
||
individuals in the Austin and Dallas areas, the most well-known of
|
||
whom is Steve Jackson, the owner of an Austin-based game publishing
|
||
company.
|
||
|
||
In July of 1989, Secret Service agents were examining electronic mail
|
||
records of a privately-owned computer system in Illinois owned by Rich
|
||
Andrews. Those records, which contained the computer equivalent of a
|
||
list of all mail sent through a particular post office, showed that a
|
||
copy of a newsletter called "Phrack" had been sent to Loyd
|
||
Blankenship, the managing editor at Steve Jackson Games, Loyd
|
||
Blankenship, in late February of 1989. It had also been sent to
|
||
thousands of others, but none of them were working on a book that, the
|
||
Secret Service agents felt, romanticized computer crime.
|
||
|
||
The editor of the Phrack newsletter, a pre-law student at the
|
||
University of Missouri/Columbia by the name of Craig Neidorf, made the
|
||
activities of the telephone underground the focus of his publication.
|
||
He gave space to individuals fascinated with the telephones in their
|
||
lives, and with the technology that connected them. As phone company
|
||
technology grew to depend upon computers, so did those who read the
|
||
Bell Labs technical journals as if they were the sports page. The
|
||
pages of Phrack came to include technical discussions of computer
|
||
security issues.
|
||
|
||
Mr. Neidorf, thought the Illinois Secret Service and the Illinois U.S.
|
||
Attorney-General's office, was up to no good. There was no difference
|
||
in their minds between writing about the computer underground and
|
||
participating in it. In the last days of January, 1990, Secret
|
||
Service agent Timothy Foley conducted a formal interview with Mr.
|
||
Neidorf in his college frat house. According to an affidavit sworn to
|
||
by Agent Foley, the two discussed the author of an article in Phrack
|
||
that contained a modified version of an element from an AT&T computer
|
||
operating system. The article was penned (under a pseudonym) by
|
||
Leonard Rose, Jr., a computer consultant who lived in Maryland at the
|
||
time, the affidavit said.
|
||
|
||
Mr. Rose was not unknown to computer professionals and enthusiasts in
|
||
Texas and around the country. His electronic mail and telephone
|
||
records were enough to shift the Secret Service's interest to Texas.
|
||
What follows is an informal chronology of the events between January
|
||
of 1990 and today. It is incomplete, partly out of consideration for
|
||
the wishes and privacy of some of the people with whom I spoke, and
|
||
partly because of the troubled calm that people have felt after the
|
||
departure of the current masters of Operation SunDevil.
|
||
|
||
1/90: Bell Communications Research security manager Henry M.
|
||
Kluepfel dials into Loyd Blankenship's home BBS, the Phoenix
|
||
Project, under his real name. By mid-February, he has seen
|
||
and read an issue of Phrack on the system, copied a list of
|
||
the system's users who might have read the newsletter, and
|
||
called the Secret Service. According to Agent Foley's
|
||
affidavits, what Kluepfel saw there was a threat to the
|
||
business of Kluepfel's employer and other telephone
|
||
companies.
|
||
|
||
2/90: Search warrants are given for the residences of Bob Izenberg
|
||
(2/20), Loyd Blankenship (2/28) and Chris Goggans (2/28),
|
||
and at the office of Steve Jackson Games (2/28). The SJG
|
||
warrant is unsigned; the other warrants are signed by U.S.
|
||
Magistrate Stephen H. Capelle on the day that they're
|
||
served. Although the warrant specifies that only computer
|
||
equipment and media may be seized as evidence, Secret
|
||
Service interest goes farther afield. Several videotapes of
|
||
public access programs are seized from one residence. Three
|
||
hours after the raid at another, Secret Service agents have
|
||
called Austin computer store owner Rick Wallingford at home,
|
||
to verify that he sold a pinball machine to one of the
|
||
warrant subjects. Prior to executing the warrants, Secret
|
||
Service agents have gone to security personnel at the
|
||
University of Texas to discuss the individuals, and to
|
||
obtain driver's license information and physical
|
||
descriptions. A subpoena is served at the University to
|
||
obtain access to Chris Goggans' computer records. Public
|
||
access computers attctc/killer (run by AT&T) and
|
||
elephant/puzzle (run by Izenberg) cease operation. The
|
||
former, which Secret Service agents claimed to have run "to
|
||
monitor the hacker community" was closed by AT&T order. The
|
||
latter was closed when the machine was seized under warrant.
|
||
The Steve Jackson Games "Illuminati" BBS goes down when it
|
||
is seized as evidence.
|
||
|
||
3/90: Semi-public access computer rpp386, in service since
|
||
September of 1987, drops most user accounts and connections
|
||
to other computers. Said its owner, John Haugh, "The
|
||
investigation with SunDevil was starting to get too close.
|
||
I knew Bill Kennedy, Bob Izenberg and Charlie Boykin. It
|
||
seemed reasonable that my system would come under
|
||
investigation." It didn't, and Mr. Haugh said that he has
|
||
never been contacted by any law enforcement officials with
|
||
regards to these matters.
|
||
|
||
4/90: Newsweek article "The Hacker Dragnet" by John Schwartz
|
||
discusses the Steve Jackson Games raid, among other issues.
|
||
|
||
6/90: Steve Jackson is told by the Secret Service that his seized
|
||
property can be picked up. Some of it is damaged, and one
|
||
hard disk, some hardware and assorted papers are not
|
||
returned.
|
||
|
||
9/90: Houston Chronicle article "War on Computer Crime Waged With
|
||
Search, Seizure" by Joe Abernathy discusses Steve Jackson
|
||
Games and Operation SunDevil. Agent Foley, on the phone in
|
||
Chicago, refuses return of property seized from Izenberg
|
||
residence.
|
||
|
||
1/91: Bill Kennedy gets a phone call from the Secret Service about
|
||
his knowledge of Len Rose. He is told that he's not under
|
||
investigation, and the Baltimore, Maryland Federal
|
||
prosecutor confirms this.
|
||
|
||
4/91: Byte magazine columnist Jerry Pournelle gives his
|
||
hall-of-shame "Onion of the Year" award to Agent Foley,
|
||
saying, "Mr. Foley's actions in Austin, Texas, regarding
|
||
Steve Jackson Games not only exceeded his authority, but
|
||
weren't even half competently done."
|
||
|
||
5/91: Steve Jackson Games and the Electronic Frontiers Foundation
|
||
file a civil suit against the Secret Service agents,
|
||
Bellcore technical personnel and others for damages.
|
||
|
||
9/91: U.S. Magistrate Capelle grants Izenberg's motion to unseal
|
||
the affidavit in support of search warrant filed by Agent
|
||
Foley on behalf of the Secret Service.
|
||
|
||
Now: The Steve Jackson Games suit presumably continues. The
|
||
Secret Service claims, in court documents, that all
|
||
investigations which have not resulted in indictments are
|
||
still in progress.
|
||
|
||
|
||
WHO'S WHO
|
||
|
||
LOYD BLANKENSHIP: (aka The Mentor): Handed unsigned search warrant in
|
||
Austin, TX on 3/1/90, pursuant to which the feds seized $10K of
|
||
computer equipment. To this date, none of the equipment has been
|
||
returned, and no charges or indictments have been made. Still works
|
||
for Steve Jackson Games (who is in the middle of suing the government
|
||
thanks to the EFF!). Now runs a usenet node out of his house
|
||
(loydb@fnordbox.uucp).
|
||
|
||
CHRIS GOGGANS: Former employee of Steve Jackson Games. Unavailable
|
||
for comment.
|
||
|
||
JOHN HAUGH: Computer consultant in Austin, TX. Owner/operator of
|
||
rpp386 semi-public computer system. On computer
|
||
criminals: "These are the people that are making it
|
||
hard for us...Forcing the government to be
|
||
investigating people in the first place."
|
||
|
||
BOB IZENBERG: Former operator of public access Unix site "elephant".
|
||
Handed search warrant in Austin, TX on 2/20/90. U.S.
|
||
inventory of seized property: minimum $34,000, give or take
|
||
a $900 hammer. Court motion to unseal affidavit for search
|
||
warrant granted early 9/91. No charges or indictments.
|
||
Property not returned, pursuant to "ongoing investigation."
|
||
Runs public access usenet site "dogface" at home.
|
||
|
||
BILL KENNEDY: Computer consultant in Pipe Creek, TX. Contacted by
|
||
Secret Service agents over the phone at a friend's home. (It is a
|
||
subject for speculation how it was known that he was at this
|
||
particular friend's house. Monitoring of phone activity at Kennedy's
|
||
home might have given this information.) During the half hour
|
||
conversation, he was told that he was not under investigation, and was
|
||
asked about his association with other individuals under scrutiny. A
|
||
copy of a note which stated that he was not under investigation was
|
||
faxed to him. Subsequent phone conversation with the Baltimore
|
||
Federal prosecutor confirmed this. After Len Rose pled guilty,
|
||
Kennedy was told that he would be flown to Baltimore to testify, but
|
||
never was called upon to do so. He called the Baltimore Federal
|
||
prosecutor back at this point and was told that they "were through
|
||
with him." Of the investigation,
|
||
and of former Chicago prosecutor William Cook, Kennedy said, "They may
|
||
not have had enough live sacrifices to suit them... Cook was on a
|
||
witch hunt: If they didn't have anything, they'd make some."
|
||
|
||
As mentioned earlier, there are names and events left unmentioned at
|
||
individual request. It is difficult to convey the frustration, anger
|
||
at various individuals, and desire to put it all behind that the named
|
||
and un-named individuals with whom I spoke have expressed. As one
|
||
said, "The emotional toll was pretty steep." But, hey, aren't we all
|
||
safer? Wasn't it all worth it?
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 2 May, 1992 21:19:04 CDT
|
||
From: anonymous@unixville.edu
|
||
Subject: File 4--A Forgotten Victim of the 1990 Raids
|
||
|
||
One victim of the January, 1990 raids, has preferred to remain out of
|
||
the public eye and has successfully kept a low profile. We'll call
|
||
him "Joe." Joe ran Jolnet, a Unix public access BBS in Lockport,
|
||
Illinois, about 30 miles southwest of Chicago across the river from
|
||
Joliet. Joe reportedly discovered files on his system containing E911
|
||
information purloined from BellSouth's computers by Legion of Doom
|
||
member Robert Riggs (who used the handle "Robert Johnson"). Joe
|
||
reported their existence to whom he believed to be the proper telecom
|
||
authorities, which included providing access to Jolnet for Bellcore's
|
||
Henry Kluepfel. They took no immediate action. Joe cooperated with
|
||
the authorities, but ultimately had his equipment confiscated anyway.
|
||
|
||
The files Riggs obtained were related to BellSouth's E911 system, and
|
||
from Jolnet he sent parts of them to others. Since 1988, the Secret
|
||
Service had been investigating "computer intrusions," particularly a
|
||
few Legion of Doom members. The arrest and indictment of Riggs led
|
||
them to Craig Neidorf, who published a portion of the edited E911
|
||
maintenance files in Phrack 24 under the sig of "The Eavesdropper." In
|
||
January 18, 1990, The Secret Service and security personnel from
|
||
Southwestern Bell and Bellcore found the Phrack file and a password
|
||
cracking program called login.c among Craig Neidorf's posessions. They
|
||
traced the login.c program back to Len Rose, and on February 1, 1990,
|
||
they searched his premises in Maryland, where they found unauthorized
|
||
Unix sourcecode in his possession. Not realizing how ballistic the
|
||
Secret Service and AT&T would go over possession of unlicensed
|
||
software, and threatened with major felony charges of transporting
|
||
stolen property across state lines (18 USC 2314) and wire fraud (18
|
||
USC 1030(a)(6), Len indicated that he sent a copy of the program to
|
||
Joe.
|
||
|
||
The next day (February 2), Secret Service Special Agent Barbara Golden
|
||
obtained a warrant to search Joe's house under 18 USC 2314 and 18 USC
|
||
1030(a)(6). They would look for disks, documents, and anything else
|
||
that seemed computer-related. Secret Service agents and various
|
||
security officials wasted little time in trooping out to Joe's brown
|
||
ranch house with the yellow trim. On February 3, they struck. Marty
|
||
Flynn of AT&T Corporate Information Security valued the software Joe
|
||
was suspected to have (which included UNIX SVR 3.1 and 3.2, and
|
||
Starland 3.0 Network Software) at over $250,000. Flynn checked AT&T
|
||
records and informed the agents that Joe held only a limited $100
|
||
"Tool Chest" agreement. Joe's previous cooperation with Kluepfel for
|
||
over a year was forgotten. Joe was raided and he lost much of his
|
||
equipment, even though he was never indicted.
|
||
|
||
Joe's fall from grace--from cooperative citizen to victim--was another
|
||
in the list of disrupted lives caused by the Secret Service and
|
||
others. Those who were indicted paid a heavy price, but the
|
||
victimization of those who are unindicted must not be forgotten.
|
||
|
||
The Players:
|
||
|
||
Joe, at last report, was employed, relatively happy, and just wanted
|
||
to be left alone. He still did not have his equipment returned, and
|
||
was not trying to get it.
|
||
|
||
Craig Neidorf has graduated from the University of Missouri and plans
|
||
to go to law school.
|
||
|
||
Len Rose is completing the last few weeks of a one-year sentence in a
|
||
community release center in Chicago.
|
||
|
||
Robert Riggs was released from prison in 1991 and periodically appears
|
||
at conferences.
|
||
|
||
Henry Kluepfel, former Assistant U.S. Attorney William J. Cook, and
|
||
Secret Service Special Agents Timothy Foley and Barbara Golden are
|
||
defendants in a civil sought brought against them for reckless
|
||
behavior in the subsequent raid on Steve Jackson Games.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 8 May 1992 15:27:50 -0500
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 5--Pay Craig's Legal Fees For 29 Cents?
|
||
|
||
Craig Neidorf's legal fees, incurred from his defense against felony
|
||
charges in the "PHRACK" case, remain high. He is paying them off
|
||
bit-by-bit, but the process is slow.
|
||
|
||
For new readers, Craig was indicted by the U.S. Government on charges
|
||
of wire fraud and theft as the result of publishing what federal
|
||
prosecutor William J. Cook erroneously believed to be proprietary
|
||
information. Because of the efforts of John Nagle, Sheldon Zenner
|
||
(Craig's attorney) was able to show that the information published in
|
||
Phrack was available in public documents for about $12.95 (see Bob
|
||
Izenberg's post, above). The prosecution dropped the case even before
|
||
it finished presenting it. Craig's "victory" exacted an emotional and
|
||
financial toll. His legal expenses were in excess of $100,000 even
|
||
after generous help from supporters.
|
||
|
||
Craig's case represented a landmark in the relationship of cyperspace
|
||
and the law. It marked the beginning of the Electronic Frontier
|
||
Foundation and Cud; it created an awareness of the need to fight for
|
||
the same Constitutional protections in the electronic frontier as
|
||
exist in more conventional realms; it stimulated involvement of a
|
||
number of socially conscious persons from a broad spectrum of
|
||
professions (e.g., Mitch Kapor, Dorothy Denning, Jim Warren, John
|
||
Perry Barlow, Marc Rotenberg); it challenged (and reduced) what some
|
||
saw as the abuse of power by law enforcement agents and prosecutors in
|
||
pursuing "computer crime"; and it led to open public debates about
|
||
over both the freedoms and the responsibilities of the new electronic
|
||
world.
|
||
|
||
Craig was initially tempted to accept a plea-bargain. In some ways,
|
||
this would have been more beneficial: He would have lower legal fees
|
||
and it would not have been as disruptive to his life. He chose to
|
||
fight on principle, and we have all benefited from his choice.
|
||
|
||
We can *ALL* help Craig for only a few minutes and a 29 cent stamp.
|
||
Craig as been nominated for a Playboy Foundation award worth $5,000
|
||
toward his legal fees. The award is for those who have contributed to
|
||
protecting First Amendment rights, and Craig's contributions to
|
||
stimulating public awareness of and action on such rights in
|
||
cyberspace is undeniably significant. Here's the blurb for the award:
|
||
|
||
PLAYBOY FOUNDATION OPENS NOMINATIONS FOR 1992 HUGH M.
|
||
HEFNER FIRST AMENDMENT AWARDS
|
||
|
||
"Established in 1979 by the Playboy Foundation to celebrate the
|
||
25th Anniversary of Playboy Magazine, the awards program is
|
||
designed to educate the public about First Amendment issues and
|
||
to honor individuals who have made significant contributions to
|
||
enhance and protect First Amendment rights of Americans."
|
||
|
||
Readers are encouraged to send a letter in support of Craig Neidorf's
|
||
nomination to:
|
||
|
||
Jill Chukerman or Kris Farley
|
||
Playboy Foundation
|
||
680 North Lake Shore Drive
|
||
Chicago, IL 60611
|
||
|
||
(312)751-8000
|
||
|
||
NOTE: THE DEADLINE FOR LETTERS IS MAY 22 !! The winners will be
|
||
announced in September. Below is a rough draft of our own letter:
|
||
|
||
+++ cut here +++
|
||
|
||
9 May, 1992
|
||
|
||
|
||
Jill Chukerman or Kris Farley
|
||
Playboy Foundation
|
||
680 North Lake Shore Drive
|
||
Chicago, IL 60611
|
||
|
||
Dear Persons:
|
||
|
||
I am writing in support of Craig Neidorf's nomination for the Playboy
|
||
Foundation's "Hugh M. Hefner First Amendment Award." Craig's
|
||
contributions to enhance Constitutional protections of the First
|
||
Amendment have been unique and substantial. At extreme personal cost,
|
||
he chose to fight for a Constitutional principle he believed in, which
|
||
ultimately led to an awareness by others of the need to protect the
|
||
rights of electronic media.
|
||
|
||
While in highschool, Craig founded an electronic newsletter called
|
||
PHRACK that was available to the public by means of a computer and a
|
||
telephone modem. PHRACK published a variety of articles and news
|
||
blurbs, authored by others, on computer culture. In 1989 (Craig was
|
||
now a senior at the University of Missouri), PHRACK published a
|
||
document that BellSouth (a regional Bell telephone company) asserted
|
||
was "proprietary," and its publication, it argued, indicated theft and
|
||
wire fraud. In early 1990, the U.S. Secret Service acted on these
|
||
allegations. Craig was tried in July, 1990. The defense demonstrated
|
||
that the material published in PHRACK was available to the general
|
||
public for about $12.95, and the prosecution dropped the case.
|
||
Although he "won," the victory disrupted his academic performance
|
||
and resulted in over $100,000 in defense fees.
|
||
|
||
Craig could have accepted the advice of his friends, who argued that
|
||
it would be both cheaper and less traumatic to accept a plea bargain
|
||
than to fight his case in federal court. However, Craig recognized
|
||
that there were a number of principles involved. He was especially
|
||
concerned that a large corporation, aided by seemingly over-zealous
|
||
law enforcement personnel, could produce a "chilling effect" on the
|
||
rights to expression by intimidating and punishing those who published
|
||
material it did not like. Craig chose to fight.
|
||
|
||
Craig's choice had substantial consequences. His case generated
|
||
considerable interest among users of electronic media, and it seemed
|
||
to many that Craig was being victimized unjustly for publishing in
|
||
electronic form the type of material that would have been accepted in
|
||
a more conventional paper format. In fighting for the principle of
|
||
freedom of speech, Craig stimulated others to organize and participate
|
||
in protecting and enhancing Constitutional liberties in the electronic
|
||
frontier. Craig is a courageous pioneer who put principle before
|
||
personal expediency. If not for his willingness to resist encroachment
|
||
on First Amendment freedoms, there would not be the current interest
|
||
in organizing to protect them in the electronic media.
|
||
|
||
Craig intends to enter law school and pursue his interest in civil
|
||
liberties. His actions exemplify the spirit of the Award making him a
|
||
most-deserving candidate, hope that you share the views of myself and
|
||
others that he would be a worthy recipient.
|
||
|
||
If I can provide any further information, do not hesitate to contact
|
||
me.
|
||
|
||
|
||
|
||
Sincerely,
|
||
|
||
Jim Thomas
|
||
Professor, Sociology/Criminal Justice
|
||
Northern Illinois University
|
||
DeKalb, IL 60115
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 6 May 92 15:50:12 CDT
|
||
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
|
||
Subject: File 6--Online Debate Article
|
||
|
||
This article appeared in the Washington report of the Sunday, May 3,
|
||
Houston Chronicle. Please send feedback and further developments to
|
||
Joe.Abernathy@houston.chron.com (800) 735-3820
|
||
|
||
Hungry candidates might share a byte
|
||
Computer-based electronic communities emerge as political constituency
|
||
|
||
|
||
By JOE ABERNATHY
|
||
Copyright 1992, Houston Chronicle
|
||
|
||
A leading figure in computer communications is issuing a challenge
|
||
this weekend for the major presidential candi dates to participate in
|
||
the first national online political debate.
|
||
|
||
And a spokesman for at least one presidential hopeful - Democratic
|
||
front-runner Bill Clinton - said the candidate likely would accept the
|
||
invitation.
|
||
|
||
A spokeswoman for President Bush's campaign said no decisions will be
|
||
made about any debates until after the primary season. Bush is
|
||
expected to clinch the GOP nomination in state conventions this
|
||
weekend in Maine and Wyoming.
|
||
|
||
"But depending upon how it's organized, as we get closer to the
|
||
general election, it may be something we will consider,'' said Darcy
|
||
Campbell, the Bush spokeswoman.
|
||
|
||
The debate would be a milestone in a year marked by firsts for a
|
||
nascent electronic democracy movement.
|
||
|
||
Empowered by the ability to quickly reach an audience estimated at 8
|
||
million to 15 million people, at little cost, organizers of this new
|
||
political community envision the debate as a way to bring the major
|
||
presidential candidates and media into potential personal contact with
|
||
every citizen who owns a computer and a modem - the device that lets
|
||
computers communicate via phone lines.
|
||
|
||
Online activist Jim Warren's proposal for the debate is being
|
||
distributed to the campaigns of Clinton, Bush and the other most
|
||
prominent candidate - prospective independent H. Ross Perot, as well
|
||
as to Democrat Jerry Brown, Republican Patrick Buchanan and
|
||
Libertarian Andre Marrou.
|
||
|
||
It calls for a panel of three reporters from major media outlets to
|
||
communicate online with each candidate over the course of a week in a
|
||
moderated newsgroup - an electronic roundtable set up for the purpose.
|
||
|
||
A parallel, unmoderated newsgroup would allow direct discussion of the
|
||
issues by everyone online, while the journalists on the panel would be
|
||
required to accept proposed questions from the online audience. Jeff
|
||
Eller, campaign spokesman for Clinton, the governor of Arkansas, said
|
||
Clinton likely would participate.
|
||
|
||
"I don't think that would be a problem at all,'' he said, adding that
|
||
the campaign already has placed position papers and other information
|
||
online. "Anything that brings more people into the system is a great
|
||
idea.''
|
||
|
||
The Perot campaign did not respond to an interview request.
|
||
|
||
The debate proposal is the latest development in a series of events
|
||
drawing attention to the emergence of computer-based electronic
|
||
communities as a political constituency.
|
||
|
||
Notably, a proposal by Perot to organize electronic town meetings has
|
||
set fire to an online grass roots movement to put him on the ballot as
|
||
an independent. Democratic candidate Jerry Brown already has gone
|
||
online for direct electronic give-and-take with potential supporters.
|
||
|
||
In California and Alabama, a number of major candidates have signed
|
||
agreements to enact legislation to protect civil liberties such as
|
||
free speech and privacy regardless of whether they are exercised on
|
||
paper, on computer networks, or in media yet to be envisioned.
|
||
|
||
"This is the first time that 8 to 15 million people have been online
|
||
out of all of history, and that suddenly provides a critical mass for
|
||
political action,'' said Warren. "That provides an interesting
|
||
constituency.
|
||
|
||
"Secondly, the candidates who have any awareness of modern technology
|
||
realize that this is an essentially free opportunity to reach millions
|
||
of voters, in a manner unrestricted by cost or sound bite editing or
|
||
interviewers' reinterpretations.''
|
||
|
||
Warren is a member of the board of directors of the software firm
|
||
Autodesk; a columnist for MicroTimes; the founder of the Infoworld
|
||
newspaper; founding host of the PBS series Computer Chronicles; and
|
||
organizer of the First Conference on Computers, Freedom & Privacy, a
|
||
seminal event in giving shape to the online political community.
|
||
|
||
"National online interaction between citizens and their
|
||
representatives by far will provide the most efficient and effective
|
||
means of having legitimate representation and active citizen
|
||
participation in the governmental process,'' he said, adding that this
|
||
gives rise to a number of interesting considerations.
|
||
|
||
"A large percentage of the people who are online are well educated,
|
||
affluent citizens who are often leaders within their communities. I
|
||
think there are too many people online for government to successfully
|
||
suppress what is developing, this communication mechanism that is
|
||
developing so rapidly.
|
||
|
||
"One of its major advantages for legitimate candidates is that
|
||
communications have to be long on information and short on useless
|
||
emotional content ... which undoubtedly horrifies some politicians.''
|
||
|
||
Soaring sales of personal computers are likely to strengthen the new
|
||
online electorate. Analysts say that 7 million personal computers were
|
||
sold last year, bringing the number of home users to 20 million - plus
|
||
60 million in business.
|
||
|
||
As many as 15 million people are linked on the global Internet
|
||
computer network, with the number growing. The commercial service
|
||
Prodigy now claims 1.5 million users, while CompuServe claims to reach
|
||
980,000, and GEnie around 600,000.
|
||
|
||
Users of smaller scale community bulletin board systems represent a
|
||
potentially even larger group, although it's hard to say where one
|
||
begins and the next ends. Boardwatch magazine, which loosely monitors
|
||
the field, estimates that there are several tens of thousands of such
|
||
BBSs around the country. Each of them allows from a handful to several
|
||
hundred personal computer users to call in and trade messages,
|
||
computer software, and other information.
|
||
|
||
Current issues often are hot topics, the most recent example being the
|
||
Rodney King verdict in Los Angeles, which is prominent in online
|
||
conversation just as it is dominating national news.
|
||
|
||
In Washington, the chairman of the House Administrative Committee
|
||
recently said that all House members will have, by next year, full
|
||
interactive access to users of the Internet computer network, which is
|
||
quickly eclipsing the academic and military worlds that gave birth to
|
||
it.
|
||
|
||
While the new online electorate is likely to bring change, it is not
|
||
supplanting traditional methods. Instead, computer-based conferencing
|
||
is adding a new dimension to the traditional process by which a grass
|
||
roots candidate is drafted.
|
||
|
||
Perot, who has not yet himself been spotted online, has become a
|
||
beneficiary, as services such as the Whole Earth 'Lectronic Link
|
||
(WELL) in San Francisco, the commercial Prodigy information service,
|
||
and a "Perot for President'' bulletin board communicate strategy and
|
||
rally potential supporters.
|
||
|
||
As the best known computer link of writers, thinkers and activists,
|
||
the WELL has become the online focus of the intellectual issues raised
|
||
by the Perot movement.
|
||
|
||
But the Prodigy service, with its broader presence among non-experts,
|
||
has become the battle front, as Perot support ers frantically trade
|
||
information on efforts to get his name placed on the ballots of all 50
|
||
states.
|
||
|
||
One typical message recently posted to a Prodigy confer ence promoted
|
||
a Perot rally in Houston.
|
||
|
||
In Colorado, meanwhile, the new "Online for H. Ross Perot'' bulletin
|
||
board may offer a measure of the breadth of support.
|
||
|
||
"I want to send you $5,'' wrote Marjorie Darling, who is described as
|
||
"about 80'' and got involved through Senior Net, an activity organized
|
||
by Dave Hughes, an online activist who runs the Perot board.
|
||
|
||
"We hear the third candidate has only been a spoiler' and can never,
|
||
or has never made it running for president,'' wrote Darling. "But none
|
||
of those has been 'Ross Perot, Business Man.'
|
||
|
||
"You can make it!''
|
||
|
||
------------------------------
|
||
|
||
Date: 10 May 92 20:49:04 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 7--Two Cornell Students Indicted in Virus Case
|
||
|
||
TWO AT CORNELL INDICTED IN VIRUS CASE
|
||
|
||
Two Cornell University students now have been indicted for felonies in
|
||
connection with the computer virus case that came to light last
|
||
February at the Ithaca, N.Y., university.
|
||
|
||
David Blumenthal and Mark Pilgrim are accused of embedding a virus in
|
||
three Apple Macintosh computer games that were sent from Cornell's
|
||
computer center to an archive at Stanford University. Authorities say
|
||
from there, the games were duplicated and wound up in computers across
|
||
the U.S., Japan and Great Britain.
|
||
|
||
Blumenthal, 20, and Pilgrim, 19, who, in convicted, face a maximum
|
||
four years in prison, were arrested in February on misdemeanor
|
||
charges, which were increased to felonies because the virus is
|
||
believed to have caused more than $1,000 in damage, said county
|
||
District Attorney George Dentes.
|
||
|
||
Reprinted from A NETWORKER'S JOURNAL May 8, 1992
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.21
|
||
************************************
|
||
|
||
|
||
|