809 lines
39 KiB
Plaintext
809 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun May 16 1993 Volume 5 : Issue 36
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Senrio
|
||
|
||
CONTENTS, #5.36 (May 16 1993)
|
||
File 1--Yet Another "LOD" Pretender!
|
||
File 2--Building Bridges of Understanding in LE & Comp. Community
|
||
File 3--Crypto-Schemes/Mobile Digital Services in Australia
|
||
File 4--More on Free Speech & Cyberspace
|
||
File 5--Gene Spafford's Farewell
|
||
File 6--UPDATE #3-AB1624 Online Access to Legislation / ACT BY 5/13
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) 203-832-8441 NUP:Conspiracy
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
Back issues also may be obtained through mailserver at:
|
||
server@blackwlf.mese.com
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sat, 15 May 1993 12:12:22 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 1--Yet Another "LOD" Pretender!
|
||
|
||
After the "hacker crackdowns" in 1990, in which the LOD was brought to
|
||
national media attention, it seemed that the group became associated
|
||
with every major computer incident that hit the national press. A few
|
||
examples of unsubstantiated LOD involvement include: The claim by
|
||
federal prosecutors that Len Rose was the LOD mastermind; A logic bomb
|
||
defused in AT&T computers in 1990 that law enforcement suspected might
|
||
be LOD-inspired; An airforce "hacker" thought to be an LOD member in
|
||
1990; the juveniles busted with "Kyrie" for fraud were believed to be
|
||
associated with LOD; "Maverick's" 1992 claim that he was an LOD
|
||
"hacker;" and Michigan juveniles assumed to be LOD because of "text
|
||
files" associated with the group found in their possession. Although
|
||
the media seem less inclined to attribute LOD membership to any
|
||
computer delinquent found in possession of LOD/TJ #2 or Phrack, there
|
||
remain too many juveniles out there who believe that they can
|
||
appropriate the name for themselves.
|
||
|
||
We've been asked about the latest pretender, who has circulated the
|
||
following to several Usenet groups:
|
||
|
||
*** begin start of circulated document ***
|
||
|
||
From--TDC <tdc@zooid.guild.org>
|
||
Organization--The Zoo of Ids
|
||
|
||
Release Date: 4 May 16:07 EDT
|
||
|
||
READ AND DISTRIBUTE EVERYWHERE - READ AND DISTRIBUTE EVERYWHERE
|
||
***************************************************************
|
||
|
||
Important Anouncement:
|
||
|
||
The
|
||
|
||
LOD
|
||
|
||
Legion of Doom
|
||
|
||
Is Back!
|
||
|
||
No that has not been a mis-print ... the LOD has returned! The
|
||
world's greatest hacking group has formally been reinstated to bring
|
||
back dignity and respect to a scene that has rapidly deteriorated
|
||
since its departure.
|
||
|
||
*** end excerpt ***
|
||
|
||
The addressee has not responded to CuD inquiries, but there appears to
|
||
be no connection between the pretender and the original LOD. One
|
||
original LOD member submitted a strong criticism of the poster in
|
||
Telecom Digest (V13, #327), which reads in part:
|
||
|
||
From--todd@hal.gnu.ai.mit.edu (The Marauder)
|
||
Subject--Legion of Doom! - The Real One
|
||
Date--13 May 1993 21:55:46 -0400
|
||
|
||
Let me set the record straight:
|
||
|
||
This "NEW" Legion of Doom, coming from "tdc@zooid.guild.org" has
|
||
_NOTHING_ whatsoever to do with the Legion of Doom! group that
|
||
was formed approximately mid-1984, of which I was a member. The
|
||
"real" LoD continued as a group until somewhere around 1990.
|
||
Those of you really interested in the whole thing can read all
|
||
about it in the electronic publication called "Phrack", which is
|
||
available at the anon ftp site "ftp.eff.org", in the
|
||
"/pub/cud/phrack" directory.
|
||
|
||
I believe "Phrack" issue #31 contains "The History of The Legion
|
||
of Doom!" which was written by Lex Luthor (founder of the whole
|
||
thing), and edited by Erik Bloodaxe. The article contains a
|
||
brief history of us, and ALL them members of the real group, and
|
||
is the final word as to who was/was not in LoD. I think you will
|
||
find no mention of this (ahem) Lord Havoc character. I believe
|
||
"ftp.eff.org" also contains all the LOD Technical Journals in
|
||
"pub/cud/lod". The Legion of Doom! as a hack/phreak group DOES
|
||
NOT EXIST ANYMORE. These clowns running around the internet
|
||
calling themselves the "NEW" LoD are simply some all the LOD
|
||
Technical Journals in "pub/cud/lod". The Legion of Doom! as a
|
||
hack/phreak group DOES NOT EXIST ANYMORE. These clowns running
|
||
around the internet calling themselves the "NEW" LoD are simply
|
||
some kids having fun with you all, so relax, take a deep breath,
|
||
and forget the whole thing. I am quite convinced you'll not hear
|
||
much more from them ;).
|
||
|
||
Some members of the *original* LOD are currently compiling a
|
||
documentary history of the computer underground in the mid-1980s, and
|
||
from what we've seen, it promises to be a valuable contribution
|
||
to understanding that period. CuD will provide an extended review
|
||
of their material in the next week or two.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 13 May 1993 22:51:01 EDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 2--Building Bridges of Understanding in LE & Comp. Community
|
||
|
||
Attempts to generate dialogue between the "computer culture" and law
|
||
enforcement have proceeded slowly over the past few years. The EFF's
|
||
early activities included attempts to make law enforcement personnel
|
||
aware of the civil liberties issues related to cyberspace;
|
||
Conferences, such as Computers, Freedom & Privacy, or the annual
|
||
"Hackers' Conference" have brought diverse groups together
|
||
face-to-face; and public access systems such as The Well in California
|
||
have had some success in bringing different groups into an on-line
|
||
dialogue.
|
||
|
||
The problem with many of these formats is that they tend to exclude
|
||
the average computer user or law enforcement agent. There's now an
|
||
alternative. Kim Clancy, a security specialist for the Dept. of
|
||
Treasury's Office of Public Debt, has begun the "round-table forum on
|
||
Mindvox to bring a variety of views into open dialogue. The intent is
|
||
to increase the understanding by the public of the legitimate tasks of
|
||
law enforcement, and to expand an awareness of the civil liberties
|
||
concerns of the computer public for investigators and others. Law
|
||
enforcement personnel are understandably hesitant to engage in such
|
||
discussions. But, from what I've seen, there is no ranting, the
|
||
discussions are generally of high quality (although an occasional
|
||
topic drift does occur), and those participating are sincere in their
|
||
attempts to stimulate discussion.
|
||
|
||
The obvious question, of course, is: Why should law enforcement
|
||
personnel bother discussing these issues with an audience that
|
||
includes "kids," law students, attorneys, professors, computer
|
||
specialists, and other LE agents? To us, the answer is simple: If the
|
||
goal is to minimize computer abuse rather than to simply "prosecute,"
|
||
then open dialogue is a cost-effective and efficient way of
|
||
educational outreach. It's in everybody's interests for law
|
||
enforcement personnel to encourage and participate in these dialogues.
|
||
Kim Clancy moderates the round-table forum with a gentle, but incisive
|
||
hand. She combines her experiences as a security specialist with her
|
||
belief in the value of dialogue and information-sharing as an
|
||
educational tool as a means of building bridges and promoting
|
||
understanding. We share her view that increased understanding is a
|
||
significant means of decreasing unacceptable accesses.
|
||
|
||
Kim's credentials for moderating this type of a forum are impressive.
|
||
In addition to her security and anti-virus skills, she set up the AIS
|
||
BBS, BBS run by Dept. of Treasury, Bureau of Public Debt. Run by
|
||
Computer Security Branch, AIS BBS is intended as a resource for
|
||
security specialists, scholars, or others seeking information about
|
||
the varieties of computer abuse and how to combat them. The files
|
||
range from CERT advisories, documents on viruses, and "underground"
|
||
files to simple public domain/shareware utilities, such as virus
|
||
checkers. For those lacking ftp access, AIS BBS is an excellent source
|
||
of information and a public service of value to a broad range of
|
||
computer professionals and researchers. The AIS number is currently
|
||
(304) 420-6083, in late may it will change to (304) 480-6083.
|
||
|
||
The following extracts from Mindvox's round-table forum illustrate the
|
||
goals and tenor of the discussions there:
|
||
|
||
+++ Begin Excerpts +++
|
||
|
||
Post: 8 of 296
|
||
Subject--what this is about
|
||
From--sbranch (Kim Clancy)
|
||
Date--Tue, 09 Mar 93 08:38:15 EST
|
||
In-Reply-To--<cV9kVB1w165w@mindvox.phantom.com>
|
||
|
||
I (and others) asked mindvox to start this forum to give LE and others
|
||
a place to meet and discuss topics. I have been getting folks
|
||
together for awhile and wanted to find a public place I could send
|
||
folks to meet instead of me taking all this time to run around and
|
||
patch folks together. there are numerous LE types that would like
|
||
this exchange to occur and I'll et them know its now open. I belong
|
||
to a private :) security forum with a bunch and will pass it on.
|
||
Probably one of the best areas I have seen set up for this was on
|
||
Gheps bbs. It was called Security and the Security Impaired (you
|
||
figure out who is whom). Anyway if there is anyone specific you would
|
||
like to see on, let me know and I will see what I can do. Btw, I'm
|
||
not an LE type, but manager a computer security unit for the Federal
|
||
Gov. but this is being done on my own and the gov. doesn't endorse my
|
||
actions...and other standard disclaimers...
|
||
|
||
From what I have experienced, ignorance breeds fear, fear breeds
|
||
stupid behavior...like SJG games stuff (yea Mike btw on his work!)
|
||
If we can use this place ot chip away at the ignorance, it can't hurt.
|
||
It won't be a cure all but it won't hurt...will it?
|
||
|
||
+++++
|
||
|
||
Post--12 of 296
|
||
Subject--Re--what this is about
|
||
From--cudigest (Jim Thomas)
|
||
Date--Thu, 11 Mar 93 00:16:36 EST
|
||
In-Reply-To--<P9a8ZB1w165w@mindvox.phantom.com>
|
||
|
||
In principle, it's a fantastic idea to get both sides talking. The
|
||
reality is that those who could most benefit are those least likely to
|
||
participate. The Secret Service is a prime example of a group that
|
||
seems unable and/or unwilling to learn by its mistakes. Local/regional
|
||
"computer-crime" enforcers seem enmeshed in the control mentality, and
|
||
have neither incentive nor willingness to understand the other side.
|
||
It's discouraging.
|
||
|
||
Nonetheless, any attempts at dialogue are worthwhile. Struggle's as
|
||
long as history, and change requires persistence. The trick is to get
|
||
the LE types on-line and, if not talking, at least reading. But, from
|
||
what I've seen from LE documents, what the read is more likely to turn
|
||
up in indictments rather than be the fodder for thought.
|
||
|
||
Two questions: What kinds of topics might LE be willing to discuss,
|
||
and what kinds of changes are likely to occur from the discussions?
|
||
|
||
++++++
|
||
|
||
Post--162 of 194
|
||
Subject--About LE
|
||
From: kcit (Ken Citarella)
|
||
Date: Thu, 01 Apr 93 09:59:38 EST
|
||
In-Reply-To: <TqRX1B2w165w@mindvox.phantom.com>
|
||
|
||
I took a quick look at some postings since I was last here, and am
|
||
glad to see that not all LE people are perceived as evil despotic
|
||
lunatics. Neither are the phone companies. They spend a lot of money
|
||
to create their systems and they sell their services to earn a profit.
|
||
Some people may prefer a world where telephone, indeed all telecom
|
||
services are free to all, but that is not the American way, at least
|
||
not now. When the telecom infrastructure is paid for entirely out of
|
||
taxes (which none of us, or few, would be too happy about) and defined
|
||
by the courts or legislature as a free fundamental right of US
|
||
citizenship, then all services will be free (if you ignore the fact
|
||
that taxes pay to create, maintain, and operate the system). Reality
|
||
is that private companies pay to create, maintain, and install, and
|
||
that those systems, as any private property, is entitled to protection
|
||
as a matter of law. Changing whether or not those systems should be
|
||
for free or for higher is a political question, not a LE one. In the
|
||
current scheme of things, LE has an obligation to put all sorts of
|
||
computer abuse into the hopper with all the other crimes it pays
|
||
attention to and to give it the priority each given LE agency deems
|
||
appropriate.
|
||
|
||
..............
|
||
|
||
Can LE be self improving? Sure, LE is made of people, as is
|
||
any other organization or industry. Moreover it is one which
|
||
frequently sees itself as the guardian who is unappreciated and abused
|
||
while trying to do a thankless job. But, any person or group changes
|
||
once the need to do so is perceived individually from within or
|
||
imposed upon from without. No different than the big shake up at IBM.
|
||
Everyone paying attention saw the collapse coming as their product
|
||
line became irrelevant. They saw it last, but eventually caught on.
|
||
But you can bet there were people on the inside of IBM who were crying
|
||
a lonely voice for years. The same is true for LE. There are voices
|
||
inside and outside to be listened to. Evolution comes, it always
|
||
does. It can be far better helped along by friendly approaches than
|
||
denunciations.
|
||
|
||
+++ END EXTRACTED POSTS +++
|
||
|
||
Mindvox, a public access system in New York, is accessible via telnet
|
||
at phantom.com or dialins at (212) 989-4141 (for 300-2400 baud) or
|
||
(212) 989-1550 for 9600+. Current users wishing to engage in the
|
||
round-table discussions can go to the discussion forums and join
|
||
round-table. New users may sign in as "guests" and look around.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 13 May 1993 08:55:32 EDT
|
||
From: Roger.Clarke@ANU.EDU.AU
|
||
Subject: File 3--Crypto-Schemes/Mobile Digital Services in Australia
|
||
|
||
At CFP'93, there was considerable debate about whether cryptographic
|
||
schemes should be designed to be 'crackable' by national security and
|
||
law enforcement agencies. The Australian situation is that the
|
||
licences issued for mobile digital telephone services all require the
|
||
cryptography to be crackable. Now read on ...
|
||
|
||
The Sydney Morning Herald, Wednesday 28 April, 1993
|
||
|
||
New digital phones on line despite objections
|
||
|
||
By BERNARD LAGAN
|
||
and ANNE DAVIES
|
||
|
||
CANBERRA: The Federal government has over-ridden the objections of law
|
||
enforcement agencies and allowed Telecom and Optus to start new
|
||
digital mobile phone networks which are so secure that conversations
|
||
can escape officially authorised telephone bugging.
|
||
|
||
While law enforcement agencies can still intercept calls from
|
||
mobile phones to an ordinary phone, calls from one digital mobile
|
||
phone to another cannot be tapped.
|
||
|
||
The Government agreed to waive the bugging requirement,
|
||
originally a condition of Telecom and Optus's mobile phone network
|
||
licences, late last week after strong pressure from both carriers to
|
||
begin their services without providing technology to allow law
|
||
enforcement agencies to listen into conversations.
|
||
|
||
The changes to the system to allow official bugging will take
|
||
up to two years to complete and will cost more than $25 million, a
|
||
cost which the Government has agreed to bear.
|
||
|
||
The Government's waiving of the bugging requirement was made
|
||
despite strong opposition from law enforcement agencies, who wanted
|
||
the start of the new digital mobile phone networks delayed until there
|
||
was technology available to allow conversations conducted on these
|
||
|
||
networks to be intercepted.
|
||
|
||
The law enforcement agencies argued that once criminals and
|
||
others who had reason to avoid officially authorised interceptions of
|
||
their telephone conversations became aware of the loopholes in the new
|
||
system, they would exploit it.
|
||
|
||
The exemption was given by the Minister for Communications, Mr
|
||
Beddall after talks held last week with the acting Attorney-General,
|
||
Mr Kerr.
|
||
|
||
It enabled Telecom to launch the country's first digital
|
||
mobile phone network yesterday.
|
||
|
||
The Federal Government is reticent about the decision to let
|
||
the new network go ahead. A spokesman would only say that the
|
||
Attorney-General was "satisfied" with the operational aspects of the
|
||
new system.
|
||
|
||
A spokesman for Minister for Communications, Mr Beddall, said
|
||
that "the matter had been resolved", and any further queries should
|
||
be addressed to Telecom and Optus.
|
||
|
||
General manager of Telecom, MobileNet, Mr John Dearn, refused
|
||
to confirm or deny that calls made from the new GSM (General System
|
||
Mobile),mobile phones to other GSM mobile phones could not be
|
||
intercepted, or that an exemption had been sought from the Government
|
||
to allow the new GSM service to begin.
|
||
|
||
"We have an agreement with the Department of Communications
|
||
that we will not discuss the licence conditions," he said.
|
||
|
||
Referring to the fact that most mobile phone calls are to
|
||
fixed phones attached to the ordinary telephone network, Optus chief
|
||
operating officer, Mr Ian Boatman said that most calls carried on
|
||
Optus's GSM network would be interceptable by the security agencies.
|
||
|
||
Optus is understood to have met with the Attorney General last
|
||
Thursday, and has been given similar exemptions to its licence
|
||
conditions.
|
||
|
||
A third licensed operator is Vodaphone. Managing director, Mr
|
||
Phillip Cornish, said: "These are Government and security matters and
|
||
Vodaphone had no comment". Vodaphone is not likely to begin its
|
||
service until late this year.
|
||
|
||
The three mobile licensees Telecom MobileNet, Optus and
|
||
Vodaphone Australia - are 'required by their licences to introduce the
|
||
new digital mobile system, or GSM, as soon as the standard is
|
||
available.
|
||
|
||
However it became clear that the formula used to encode the
|
||
new service, known as the A5 algorithm, was so secure that not even
|
||
the police or security agencies could listen in.
|
||
|
||
The dilemma for the Government was that having insisted on the
|
||
the early introduction of GSM, it faced the prospect of substantial
|
||
delays if it did not waive the licence condition. Because the standard
|
||
was so secure, nobody anticipated the difficulty of re-coding and
|
||
re-encrypting the algorithm to give access to law enforcement
|
||
agencies.
|
||
|
||
The Telecom system, costing in excess of $10O million to
|
||
establish, covers more than 55 per cent of Australian consumers in
|
||
Sydney, Melbourne, Canberra, Brisbane, Perth, Adelaide, the Gold
|
||
Coast, Newcastle, Geelong and the Mornington Peninsula, Victoria.
|
||
|
||
Its high security - compared to the existing 018 mobile
|
||
telephone network - together with greater clarity is being used by
|
||
Telecom to attract new customers.
|
||
|
||
Under the 018 radio phone network, people using sophisticated
|
||
scanners could pick up private conversations. But the digital
|
||
technology ensures the telephone transmissions are scrambled and
|
||
cannot be understood by people with scanners.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 14 May 93 10:10 EDT
|
||
From: "Gerry Santoro - CAC/PSU 814-863-7896" <GMS@PSUVM.BITNET>
|
||
Subject: File 4--More on Free Speech & Cyberspace
|
||
|
||
Wes Morgan wrote:
|
||
|
||
> Can you
|
||
>give an example of a free speech forum that does *NOT* have the po-
|
||
>tential to cause this fear and/or reticence?
|
||
|
||
All free speech forums have this potential, however there are some unique
|
||
features of CMC/cyberspace that make this especially frightening for
|
||
some people.
|
||
|
||
In particular, the archival capability of cyberspace makes it possible
|
||
that any person's posting will be stored and retrieved later for some
|
||
other use. I've seen some of my students posting in various Usenet NEWS
|
||
groups opinions that may well (and likely will) change as they get older,
|
||
yet there is the potential that those postings will resurface at some
|
||
point and haunt them in job searches, etc.
|
||
|
||
We are already feeling the 'chilling effect' of 'political correctness'
|
||
on many University/College campuses. As one of those who has steadfastly
|
||
fought for free speech I hate to see this happen because I view the squelching
|
||
of opinion as detrimental to education and enlightenment. This issue will
|
||
surely not go away. The way to change people is to educate them, not
|
||
to silence them.
|
||
|
||
When one posts in cyberspace they are in effect publishing themselves.
|
||
They likely do not know who the reader will be or to what use their
|
||
posting will be put. If one honestly states an opinion that may go against
|
||
the accepted 'norm' or establishment there is the potential for real
|
||
harm coming back to that person.
|
||
|
||
As an example, if one were to post in favor of decriminalizing drug use
|
||
would that brand that person as having an 'unpopular' view? Would the
|
||
information possibly be used against that person at later times, for example
|
||
being entered into a law enforcement data base? Could tenure, or a new
|
||
job, be denied that person partially because of the 'unfortunate' information?
|
||
Of course that could not be the 'official' reason, but I have seen people
|
||
denied tenure or promotions for lesser reasons, always couched in 'legal'
|
||
reasons.
|
||
|
||
The potential for easy retrieval of such a posting raises such fears. Some
|
||
systems routinely keep track of which Usenet NEWS groups a person
|
||
reads -- this gives a powerful personal profile and can itself be chilling
|
||
without any posting involved.
|
||
|
||
Please don't forget that only 40 years ago we had the McCarthy hearings,
|
||
in which circumstantial evidence of communist affiliation was used to
|
||
harass people. Many people lost jobs, opportunities, and worse because
|
||
of this. It can happen here! Can anyone out there truly say that our
|
||
government is now above reproach and wouldn't do such a thing? Sorry,
|
||
only 3 years ago the FBI approach our library system wanting information about
|
||
who checked out certain materials. (The campus newspaper reported that
|
||
the requests were denied.)
|
||
|
||
The fact is that 'free speech' is an ideal that requires constant
|
||
protection and legal defense if it is to be realized. Limits have been
|
||
placed on free speech in cases of 'clear and present danger' (ie, yelling
|
||
'Fire' in a theater), or in cases of 'hate crimes' (look at the current
|
||
situation at U. of Penn for an example).
|
||
|
||
Until the legal system clearly defines and truly protects the right
|
||
to free and equal expression in cyberspace there will continue to be a
|
||
'chilling effect' and the notion of free speech in cyberspace will
|
||
continue to be a concept and not a reality. Those who exercise this
|
||
right may well have later regrets.
|
||
|
||
prof. gerry santoro
|
||
academic computing/speech communication
|
||
penn state university
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 9 May 93 13:39:23 EDT
|
||
From: Jerry Leichter <leichter@LRW.COM>
|
||
Subject: File 5--Gene Spafford's Farewell
|
||
|
||
((MODERATORS' NOTE: For readers without access to Usenet, Gene
|
||
Spafford, an associate professor computer science at Purdue
|
||
University, has been active on the nets for over a decade. His
|
||
leadership in an informal medium and his willingness to help others
|
||
made the cybercommunity more civilized. Although his opinions and
|
||
statements on occasion have provoked strong disagreement and debate,
|
||
his contributions to the net have strengthened it. The passing of
|
||
Azandi priests seems an appropriate farewell metaphor, and "THANKS,
|
||
SPAF!"
|
||
|
||
X-News--zodiac news.announce.newusers:293
|
||
From--spaf@cs.purdue.edu
|
||
Subject--That's all, folks
|
||
Date--30 Apr 93 00:01:12 GMT
|
||
Message-ID:<1rpq88INNjlk@ector.cs.purdue.edu>
|
||
|
||
[ I originally was going to post nothing on this topic. I'm burned
|
||
out, and I don't want my fatigue to appear like I'm posting
|
||
self-indulgent garbage. However, several people have argued with
|
||
me, and convinced me that maybe I should make a statement to "end an
|
||
era," and as a piece of net "history." At the least, even if it is
|
||
perceived as self-indulgent garbage, it will fit right in with the
|
||
rest of the net. ]
|
||
|
||
There is a Zen adage about how anything one cannot bear to give up is
|
||
not owned, but is in fact the owner. What follows relates how I am
|
||
owned by one less thing....
|
||
|
||
About a dozen years ago, when I was still a grad student at Georgia
|
||
Tech, we got our first Usenet connection (to allegra, then being run
|
||
by Peter Honeyman, I believe). I'd been using a few dial-in BBS
|
||
systems for a while, so it wasn't a huge transition for me. I quickly
|
||
got "hooked": I can claim to be someone who once read every newsgroup
|
||
on Usenet for weeks at a time!
|
||
|
||
After several months, I realized that it was difficult for a newcomer
|
||
to tell what newsgroups were available and what they covered. I made
|
||
a pass at putting together some information, combined it with a
|
||
similar list compiled by another netter, and began posting it for
|
||
others to use. Eventually, the list was joined by other documents
|
||
describing net history and information.
|
||
|
||
In April of 1982 (I believe it was -- I saved no record of the year,
|
||
but I know it was April), I began posting those lists regularly,
|
||
sometimes weekly, sometimes monthly; the longest break was for 4
|
||
months a few years ago when I was recovering from pneumonia and poor
|
||
personal time management. (Tellingly, only a few people noticed the
|
||
lack of postings, and almost all the mail was "When will they come
|
||
out?" rather than "Did something happen?") As time went on, people
|
||
began to attach far more significance to the posts than I really
|
||
intended. It was flattering for a very short time, and a burden for
|
||
most of the rest; there is no telling how much time I have devoted
|
||
over the last decade to answering questions, editing the postings, and
|
||
debating the role of newsgroup naming, to cite a few topics. I really
|
||
tired of being a "semi-definitive" voice.
|
||
|
||
Starting several years ago, at about the time people started pushing
|
||
for group names designed to offend or annoy others, or with a lack of
|
||
concern about the possible effects it might have on the net as a whole
|
||
(e.g., rec.drugs and comp.protocols.tcp-ip.eniac) I began to question
|
||
why I was doing the postings. I have had a growing sense of futility:
|
||
people on the net can't possibly find the postings useful, because
|
||
most of the advice in them is completely ignored. People don't seem
|
||
to think before posting, they are purposely rude, they blatantly
|
||
violate copyrights, they crosspost everywhere, use 20 line signature
|
||
files, and do basically every other thing the postings (and common
|
||
sense and common courtesy) advise not to. Regularly, there are postings
|
||
of questions that can be answered by the newusers articles, clearly
|
||
indicating that they aren't being read. "Sendsys" bombs and forgeries
|
||
abound. People rail about their "rights" without understanding that
|
||
every right carries responsibilities that need to be observed too, not
|
||
least of which is to respect others' rights as you would have them
|
||
respect your own. Reason, etiquette, accountability, and compromise
|
||
are strangers in far too many newsgroups these days.
|
||
|
||
I have finally concluded that my view of how things should be is too
|
||
far out-of-step with the users of the Usenet, and that my efforts are
|
||
not valued by enough people for me to invest any more of my energy in
|
||
the process. I am tired of the effort involved, and the meager --
|
||
nay, nonexistent -- return on my volunteer efforts.
|
||
|
||
This hasn't happened all at once, but it has happened. Rather than
|
||
bemoan it, I am acting on it: the set of "periodic postings" posted
|
||
earlier this week was my last. After 11 years, I'm hanging it up.
|
||
David Lawrence and Mark Moraes have generously (naively?) agreed to
|
||
take over the postings, for whatever good they may still do. David
|
||
will do the checkgroups, and lists of newsgroups and moderators
|
||
(news.lists), and Mark will handle the other informational postings
|
||
(news.announce.newusers).
|
||
|
||
I'm not predicting the death of the Usenet -- it will continue without
|
||
me, with nary a hiccup, and six months from now most users will have
|
||
forgotten that I did the postings...those few who even know now, that
|
||
is. That is as it should be, I suspect. Nor am I leaving the
|
||
Usenet entirely. There are still a half-dozen groups that I read
|
||
sometimes (a few moderated and comp.* groups), and I will continue to
|
||
read them. That's about it, though. I've gone from reading all the
|
||
groups to reading less than ten. Funny, though, the total volume of
|
||
what I read has stayed almost constant over the years. :-)
|
||
|
||
My sincere thanks to everyone who has ever said a "thank you" or
|
||
contributed a suggestion for the postings. You few kept me going at
|
||
this longer than most sane people would consider wise. Please lend
|
||
your support to Mark and David if you believe their efforts are
|
||
valuable. Eventually they too will burn out, just as the Usenet has
|
||
consumed nearly everyone who has made significant contributions to its
|
||
history, but you can help make their burden seem worthwhile in
|
||
between.
|
||
|
||
In closing, I'd like to repost my 3 axioms of Usenet. I originally
|
||
posted these in 1987 and 1988. In my opinion as a semi-pro
|
||
curmudgeon, I think they've aged well:
|
||
|
||
Axiom #1:
|
||
"The Usenet is not the real world. The Usenet usually does not even
|
||
resemble the real world."
|
||
Corollary #1:
|
||
"Attempts to change the real world by altering the structure
|
||
of the Usenet is an attempt to work sympathetic magic -- electronic
|
||
voodoo."
|
||
Corollary #2:
|
||
"Arguing about the significance of newsgroup names and their
|
||
relation to the way people really think is equivalent to arguing
|
||
whether it is better to read tea leaves or chicken entrails to
|
||
divine the future."
|
||
|
||
Axiom #2:
|
||
"Ability to type on a computer terminal is no guarantee of sanity,
|
||
intelligence, or common sense."
|
||
Corollary #3:
|
||
"An infinite number of monkeys at an infinite number of keyboards
|
||
could produce something like Usenet."
|
||
Corollary #4:
|
||
"They could do a better job of it."
|
||
|
||
Axiom #3:
|
||
"Sturgeon's Law (90% of everything is crap) applies to Usenet."
|
||
Corollary #5:
|
||
"In an unmoderated newsgroup, no one can agree on what constitutes
|
||
the 10%."
|
||
Corollary #6:
|
||
"Nothing guarantees that the 10% isn't crap, too."
|
||
|
||
Which of course ties in to the recent:
|
||
|
||
"Usenet is like a herd of performing elephants with diarrhea --
|
||
massive, difficult to redirect, awe-inspiring, entertaining, and a
|
||
source of mind-boggling amounts of excrement when you least expect
|
||
it." --spaf (1992)
|
||
|
||
"Don't sweat it -- it's not real life. It's only ones and zeroes."
|
||
-- spaf (1988?)
|
||
|
||
--
|
||
Gene Spafford, COAST Project Director
|
||
Software Engineering Research Center & Dept. of Computer Sciences
|
||
Purdue University, W. Lafayette IN 47907-1398
|
||
Internet: spaf@cs.purdue.edu phone: (317) 494-7825
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 9 May 1993 14:08:23 -0700
|
||
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
||
Subject: File 6--UPDATE #3-AB1624 Online Access to Legislation / ACT BY 5/13
|
||
|
||
[ For newcomers: California Assembly Bill 1624 would mandate that
|
||
already-computerized public legislative data be publicly accessible by
|
||
modem (by Bowen-D, Torrance). If the bill fails in any committee, the
|
||
issue cannot be re-introduced by any Assembly Member until 1995. ]
|
||
|
||
This update provides:
|
||
1. Emerging key questions
|
||
2. Needed [minimal] citizen action
|
||
3. Key legislative contacts
|
||
|
||
KEY QUESTIONS/ISSUES THAT APPEAR TO BE EMERGING
|
||
|
||
Should electronic public access to the California Legislature's
|
||
computerized public records be left unchanged?
|
||
|
||
The information -- already in computers for internal legislative use
|
||
-- is available to anyone for 50-cents/kilobyte on magtape in
|
||
Sacramento. Or, for about ten times more than current
|
||
citizen/consumer-oriented network services -- for example, $4,200 for
|
||
2,880 minutes in a 2-year period -- one can use a private
|
||
information-distributor that purchases the data and resells online
|
||
access. One distributor is owned by the politically-powerful
|
||
Sacramento Bee. Numerous state and local agencies currently pay tens
|
||
of thousands of tax-dollars to use these private distributors to
|
||
access public records.
|
||
|
||
Should the Legislature design, build, own, operate and control their
|
||
own proprietary, public-access computer system and statewide computer
|
||
network --disconnected from and inaccessible from the numerous
|
||
nonprofit public networks already used by a million or more
|
||
Californians at little or no cost?
|
||
|
||
What would be the server-system costs, network costs, operational
|
||
costs, long-distance communications costs, ability to serve
|
||
widely-diverse users, controls on access, possibility of monitoring
|
||
users, etc.?
|
||
|
||
Should the Legislature at-the-least transmit copies of the public
|
||
records to host-computers on the largest, nonprofit, nonproprietary,
|
||
extensively-interconnected, cooperative public networks, to be
|
||
archived among other public files for free copying across the
|
||
networks? WITHOUT charging for it?
|
||
|
||
Operating expenses would be little more than the cost of a daily
|
||
local phone call -- so small that it couldn't practically be pro-rated
|
||
across the several million Californians who make free or low-cost use
|
||
of those networked computers. A file-server and network hardware
|
||
would cost $5K-$9K, and could be donated if their $25-million annual
|
||
computer budget can't cover it. Free sharing of thousands of public
|
||
files is pervasive and customary among about 1.5-million
|
||
inter-networked host-computers, including more than 20,000 BBSs that
|
||
share files via FidoNet and usually offer free access for all.
|
||
|
||
SHOULD the Legislature profit from libraries, local and state
|
||
agencies, nonprofit groups, researchers, schools, civic groups,
|
||
California businesses, etc., providing citizens with access to
|
||
electronic copies of public records?
|
||
|
||
They don't sell printed copies for more than the [partial] cost of
|
||
printing and distribution, nor charge when a lobbyist or corporation
|
||
makes many copies of a paper bill. Why should non-landfill copies be
|
||
more costly?
|
||
|
||
CAN the Legislature make money by charging users of public records?
|
||
|
||
The two best-known information-distributors that appear to focus on
|
||
the California Legislature's public information appear to be limited
|
||
in size. A third competitor is rumored to be leaving the
|
||
online-distribution business.
|
||
|
||
Should The Legislature include the already-computerized state codes
|
||
(statutes) and Constitution in the information to be made publicly
|
||
accessible?
|
||
|
||
Currently, they sell the codes and constitution for more than
|
||
$200,000 on magtape; one sale, so far. For comparison, the US GPO
|
||
sells the more voluminous federal codes on a CD ROM for $30.
|
||
|
||
NEEDED [MINIMAL] CITIZEN ACTION
|
||
The crucial Assembly Rules Committee chaired by San Francisco's John
|
||
Burton is currently expected to hear AB1624 on May 13th at 7:30 a.m.
|
||
Chairman Burton needs to hear from Californians, and each Committee
|
||
member needs to hear from constituents in their own Assembly
|
||
Districts. NOW!
|
||
1. *Briefly* express support for AB1624 and state WHY.
|
||
2. Request their explicit commitment to support AB1624.
|
||
3. Explicitly request an explanation if they decline to commit to it.
|
||
|
||
KEY LEGISLATIVE CONTACTS
|
||
Please be SURE to send a copy to the bill's sponsor:
|
||
Hon. Debra Bowen, Assembly Member (D) [Venice/Marina Del Rey area]
|
||
State Capitol, Room 3126, Sacramento CA 95814, fax/916-327-2201
|
||
The Rules Committee members are (in the State Capitol, Sacramento CA 95814):
|
||
John L. Burton, Chair, Rules Committee (D-San Francisco) [KEY decision-maker]
|
||
916-445-8253; fax/916-324-4899; Room 3152
|
||
Ross Johnson, (R-Fullerton) 916-445-7448; fax/916-324-6870; Room 3151
|
||
Deirdre "Dede" Alpert (D-Coronado) 916-445-2112; fax/916-445-4001; Room 3173
|
||
Trice Harvey (R-Bakersfield) 916-445-8498; fax/916-324-4696; Room 4162
|
||
Barbara Lee (D-Oakland, Alameda) 916-445-7442; fax/916-327-1941; Room 2179
|
||
Richard L. Mountjoy (R-Monrovia) 916-445-7234; fax/818-445-3591?; Room 2175
|
||
Willard H. Murray, Jr. (D-Paramount) 916-445-7486; fax/916-447-3079; Room 3091
|
||
Patrick Nolan (R-Glendale) 916-445-8364; fax/916-322-4398; Room 4164
|
||
Richard Polanco (D-Los Angeles) 916-445-7587; fax/916-324-4657; Room 2188
|
||
|
||
The original bill-text and other postings on this subject are available
|
||
from cpsr.org by anonymous ftp, WAIS, Gopher, Veronica and LISTSERV access
|
||
in /cpsr/state/california, compliments of Al Whaley at Sunnyside Computing,
|
||
or by request from jwarren@well.sf.ca.us .
|
||
|
||
Timely information about government is prerequisite for a free society.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.36
|
||
************************************
|
||
|
||
|
||
|