845 lines
41 KiB
Plaintext
845 lines
41 KiB
Plaintext
Computer underground Digest Wed Aug 3, 1994 Volume 6 : Issue 70
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copper Ionizer: Ephram Shrustleau
|
|
|
|
CONTENTS, #6.70 (Wed, Aug 3, 1994)
|
|
|
|
|
|
File 1--"Porn" and Security at Lawrence Livermore Labs (LAT Rprnt)
|
|
File 2--Re--"Porn" and Security at Lawrence Livermore Labs
|
|
File 3--ACTION: Outlaw "Electronic Redlining" on NII. (fwd)
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Thu, 28 Jul 94 18:22:39 PDT
|
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|
Subject: File 1--"Porn" and Security at Lawrence Livermore Labs (LAT Rprnt)
|
|
|
|
Computer at Nuclear Lab Used for Access to Porn
|
|
By ADAM S. BAUMAN, TIMES STAFF WRITER
|
|
|
|
Los Angeles Times Tuesday July 12, 1994
|
|
Home Edition Part A Page 1 Column 5 Metro Desk
|
|
|
|
Dramatically illustrating the security problems posed by the rapid
|
|
growth of the Internet computer network, one of the nation's three
|
|
nuclear weapons labs confirmed Monday that computer hackers were using
|
|
its computers to store and distribute hard-core pornography.
|
|
|
|
Embarrassed officials at Lawrence Livermore National Laboratory,
|
|
which conducts a great deal of classified research and has highly
|
|
sophisticated security procedures, said the incident was among the
|
|
most serious breaches of computer security at the lab in Livermore,
|
|
Calif.
|
|
|
|
The computer, which was shut down after a Times reporter
|
|
investigating Internet hacking alerted lab officials, contained more
|
|
than 1,000 pornographic images. It was believed to be the largest
|
|
illicit cache of hard-core pornography ever found on a computer
|
|
network.
|
|
|
|
Computer hackers once were primarily mischief-makers aiming to
|
|
prove their computer prowess, and they devoted their efforts to
|
|
disrupting computer systems at large organizations or stealing
|
|
technical information. But today, a new breed of hackers has developed
|
|
methods for seizing partial control of Internet-linked computers and
|
|
using them to store and distribute pornography, stolen computer
|
|
software and other electronic information--often for profit.
|
|
|
|
The Internet, a "network of networks" originally designed to
|
|
connect computers at universities and government research labs, has
|
|
grown dramatically in size and technical sophistication in recent
|
|
years. It is now used by many businesses and individual computer
|
|
users, and is often viewed as the prototype for the information
|
|
superhighway of the future.
|
|
|
|
But the Internet has an underside, where so-called "pirates" with
|
|
code names such as "Mr. Smut," "Acidflux" and "The Cowboy" traffic in
|
|
illegal or illegally obtained electronic information. The structure of
|
|
the Internet means that such pirates can carry out their crimes from
|
|
almost anywhere in the world, and that tracing them is nearly
|
|
impossible.
|
|
|
|
The FBI late last week confirmed that it was investigating software
|
|
piracy on the Internet. A Times reporter discovered a number of sites
|
|
at prestigious institutions that were being used to distribute stolen
|
|
software, including one in the office of the UC Berkeley chancellor
|
|
and another at Lawrence Berkeley National Laboratory.
|
|
|
|
Pirate sites, which carry exotic monikers such as "3 Days Till
|
|
Death," "Impact of Chaos" and "Field of Dreams," can generally be
|
|
found only by highly sophisticated computer users who are
|
|
well-schooled in the intricacies of the Internet. The pirates use a
|
|
new and relatively obscure method for transferring information, known
|
|
as the "file service protocol," and they often change the location of
|
|
their sites every few weeks to avoid detection.
|
|
|
|
In April, MIT student David LaMaccia was arrested on felony
|
|
conspiracy and wire fraud charges for allegedly using the protocols to
|
|
distribute more than $1 million worth of commercial software. The
|
|
protocol allows files to be sent to large numbers of computer users
|
|
easily with minimal disruption of other computer functions.
|
|
|
|
Pirates also have their own "chat" lines, a series of channels
|
|
within a service called the Internet Relay Chat. An elaborate pecking
|
|
order determines who will be allowed to take part in these
|
|
conversations--newcomers can often wangle their way in if they have a
|
|
particularly hot piece of software to offer.
|
|
|
|
Garden-variety copyrighted software is known as "warez" on these
|
|
channels, while especially good software is called "kewl," and
|
|
brand-new software that has not even reached stores is called
|
|
"zero-day software." At the Lawrence Berkeley pirate site, the
|
|
offerings last week included Power Japanese, which retails for $395,
|
|
as well as IBM DOS 6.3 and a game called Alien Legacy, which is not
|
|
yet available in stores.
|
|
|
|
Sandy Merola, deputy director of information and computing at the
|
|
Berkeley lab, said the pirate site was shut down last week after The
|
|
Times investigation revealed its existence. Merola said the Department
|
|
of Energy, which oversees lab operations, as well as the FBI, had been
|
|
notified of the incident.
|
|
|
|
At Lawrence Livermore, officials said Monday they believe that at
|
|
least one lab employee was involved in the pornography ring, along
|
|
with an undetermined number of outside collaborators. Chuck Cole,
|
|
deputy associate director of computing at the lab, said that nearly
|
|
2,000 megabytes of unauthorized graphic images have been found in a
|
|
Livermore computer. He confirmed that they were pornographic.
|
|
|
|
The employee has been placed on "investigatory leave" and his or
|
|
her security badge confiscated while an investigation is under way,
|
|
the lab said. It was unclear whether the pornographic images were
|
|
being sold or how many people had gained access to them. The pictures
|
|
were sufficiently graphic that they could be considered obscene by
|
|
courts in some jurisdictions, in which case transmitting them over the
|
|
Internet might be illegal.
|
|
|
|
The massive amount of storage capacity used in the Livermore scheme
|
|
shows how Internet hacking could be quite profitable. Seizing partial
|
|
control of large and sophisticated computer systems at universities or
|
|
government laboratories can save unscrupulous entrepreneurs large sums
|
|
of money.
|
|
|
|
There were indications that the person operating the pornography
|
|
database had become aware of possible scrutiny. On June 27, a message
|
|
left in a file labeled READ ME!!! said: "It appears that news about
|
|
this site has escaped. In the past two weeks, I have had 27
|
|
unauthorized hosts attempt to access my server. This does not give me
|
|
a warm-fuzzy feeling. I would hate to have to shut this down, but I
|
|
may have no choice."
|
|
|
|
One computer expert, who requested anonymity, said there might be
|
|
more to the incident than meets the eye. The expert suggested that the
|
|
hard-core pornography may be a cover for an ultra-sophisticated
|
|
espionage program, in which a "sniffer" program combs through other
|
|
Livermore computers, encodes the passwords and accounts it finds, and
|
|
then hides them within the pornographic images, perhaps to be
|
|
downloaded by foreign agents.
|
|
|
|
But Cole said there was no possibility of a computer intruder
|
|
gaining access to classified data at Livermore Labs. "We use an air
|
|
gap security method in which no electronic connection of any kind is
|
|
maintained between the classified computer world and the unclassified
|
|
computer world."
|
|
|
|
Cliff Stoll, a former computer systems manager at Lawrence Berkeley
|
|
who chronicled his experiences with a computer hacker in the book "The
|
|
Cuckoos Egg," said there would be easier ways to conduct espionage
|
|
over the Internet than to use pornographic pictures as an encoding
|
|
method.
|
|
|
|
Still, the computer penetrations at Livermore and Lawrence Berkeley
|
|
"show very poor management on the part of the national labs," Stoll
|
|
said.
|
|
|
|
The problem of pirate sites extends far beyond U.S. government
|
|
laboratories and universities: Many popular sites discovered by The
|
|
Times are located in Mexico, France, Britain and other countries. One
|
|
system operator of a pirate site in Istanbul, Turkey, openly bragged
|
|
on-line that his country has no laws preventing the distribution of
|
|
copyrighted software; thus, he claimed, he was breaking no laws by
|
|
doing so.
|
|
|
|
The Software Publishers Assn., a trade association representing
|
|
major software manufacturers, has made software piracy on the Internet
|
|
a major priority. Peter Beruk, the association's litigation manager,
|
|
said: "We are currently tracking over 1,600 pirate sites on the
|
|
Internet in a joint investigation with the FBI. It is a very serious
|
|
and costly problem.
|
|
|
|
"In the case of David LaMaccia, we estimate over a million dollars
|
|
of software was downloaded from his site in a two-week period. We will
|
|
start going after the universities next. . . . The Internet, in our
|
|
view, is now getting a very bad name."
|
|
|
|
Hal Hendershot, manager of the fraud and computer crime abuse
|
|
initiative of the FBI, though declining to give any details,
|
|
acknowledged that the bureau was cooperating with the association in
|
|
regard to Internet piracy. As the popularity of the Internet surges,
|
|
the problem of net piracy will increase, Hendershot said.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 28 Jul 94 18:22:55 PDT
|
|
From: Mike Farren <farren@well.sf.ca.us>
|
|
Subject: File 2--Re--"Porn" and Security at Lawrence Livermore Labs
|
|
|
|
((MODERATORS NOTE: On The Well, Mike Farren posted the following
|
|
response to Adam Bauman's article)).
|
|
|
|
> Dramatically illustrating the security problems posed by the rapid
|
|
>growth of the Internet computer network, one of the nation's three
|
|
>nuclear weapons labs confirmed Monday that computer hackers were using
|
|
>its computers to store and distribute hard-core pornography.
|
|
|
|
Security problems? This is hyperbole of the worst sort - there were no
|
|
security problems of any kind posed by this activity, beyond the
|
|
problems of managing large sites. There certainly were no break-ins,
|
|
no illicit access, nothing like that.
|
|
|
|
> The computer, which was shut down after a Times reporter investigating
|
|
>Internet hacking alerted lab officials, contained more than 1,000
|
|
>pornographic images. It was believed to be the largest illicit cache of
|
|
>hard-core pornography ever found on a computer network.
|
|
|
|
1,000 images? Small potatoes. There are sites which have orders of
|
|
magnitude more than that available. There are commonly hundreds of
|
|
pornographic images available at any given time on any system which
|
|
carries the Usenet alt.binaries.pictures.erotica.* groups.
|
|
|
|
> Computer hackers once were primarily mischief-makers aiming to prove
|
|
>their computer prowess, and they devoted their efforts to disrupting
|
|
>computer systems at large organizations or stealing technical
|
|
>information.
|
|
|
|
Oh, please, not this old wheeze again. Read Stephen Levy's HACKERS if
|
|
you want a realistic appraisal. In any event, misuse of the term or not,
|
|
the actual number of "hackers" who are interested in destructive or
|
|
malicious activity per se is, and always has been, extremely small.
|
|
|
|
>But today, a new breed of hackers has developed methods for
|
|
>seizing partial control of Internet-linked computers and using them to
|
|
>store and distribute pornography, stolen computer software and other
|
|
>electronic information--often for profit.
|
|
|
|
Bushwah. This capability is there for everyone who uses the Net. All
|
|
it takes is two things: to be on a net site which allows outside access
|
|
(nearly 100% of them, barring the large commercial services), and to
|
|
have some storage thereon. It's not "seizing partial control" of anything.
|
|
It's using capabilities which are explicit in the fact of net access.
|
|
It's control which is explicitly granted, not illicitly seized.
|
|
|
|
> But the Internet has an underside, where so-called "pirates" with code
|
|
>names such as "Mr. Smut," "Acidflux" and "The Cowboy" traffic in illegal
|
|
>or illegally obtained electronic information. The structure of the
|
|
>Internet means that such pirates can carry out their crimes from almost
|
|
>anywhere in the world, and that tracing them is nearly impossible.
|
|
|
|
Again, bushwah. Tracing capability is built into the system, should
|
|
you really need to do it. And the existence of pirates is nothing
|
|
new - you don't even bother to mention the fact that private pirate
|
|
BBS systems have existed for decades. That some such exist on the Internet
|
|
is no surprise - and neither is it an earthshaking problem, per se.
|
|
|
|
> Pirate sites, which carry exotic monikers such as "3 Days Till Death,"
|
|
>"Impact of Chaos" and "Field of Dreams," can generally be found only by
|
|
>highly sophisticated computer users who are well-schooled in the
|
|
>intricacies of the Internet.
|
|
|
|
This deserves better than "bushwah" - I'll say, right out, that it's
|
|
bullshit. You need no more sophistication than any 12-year-old can gain
|
|
within a few days of obtaining an account - that, plus a lead to a site,
|
|
which is very easy to obtain. There is no intricacy involved in typing
|
|
the line "ftp pirate.software.com".
|
|
|
|
> The pirates use a new and relatively obscure
|
|
>method for transferring information, known as the "file service
|
|
>protocol," and they often change the location of their sites every few
|
|
>weeks to avoid detection.
|
|
|
|
Relatively obscure? fsp, as a variant of ftp, is extremely well known,
|
|
and well used, I assure you. It's one of the standard ways of doing
|
|
file transfers between Internet sites, hardly something thought up by
|
|
Evil Pirates for their own Nefarious Purposes. I use fsp all the time,
|
|
for example, and ftp (which is the same thing, with a different interface)
|
|
even more.
|
|
|
|
>Chuck Cole, deputy
|
|
>associate director of computing at the lab, said that nearly 2,000
|
|
>megabytes of unauthorized graphic images have been found in a Livermore
|
|
>computer.
|
|
|
|
I point out that, at current market rates, this amounts to a cost of
|
|
approximately $1200 for the disk drive, and represents an amount of
|
|
storage which many home computer owners have already exceeded. I have
|
|
a friend, for example, whose computer system at home contains nearly
|
|
ten times as much storage. 2 gigabytes seems large, and it is large,
|
|
but compared to the total storage capability available on LLL systems,
|
|
it's about like the floppy disk on a typical PC.
|
|
|
|
>It was unclear whether the pornographic images were being sold or
|
|
>how many people had gained access to them.
|
|
|
|
If they were available via fsp, they *could not* have been sold - fsp
|
|
does not come with MasterCharge interfaces built in. Typically, sites
|
|
such as this are explicitly for free access - if people want to pay
|
|
money for such things, there are many publically accessible BBS systems
|
|
with far more than "1,000 images" or "2,000 Megabytes" of porn imagery
|
|
available. The briefest persual of any local computer-related magazine
|
|
provides any number of alternatives, should one be willing to pay.
|
|
|
|
>The pictures were sufficiently
|
|
>graphic that they could be considered obscene by courts in some
|
|
>jurisdictions, in which case transmitting them over the Internet might be
|
|
>illegal.
|
|
|
|
Might be. But you'll have a hard time proving it, I think, and an even
|
|
harder time coming up with a justification for doing so, let alone one
|
|
which will hold for the entire Internet, much of which is international.
|
|
|
|
> The massive amount of storage capacity used in the Livermore scheme
|
|
>shows how Internet hacking could be quite profitable.
|
|
|
|
No, what it actually shows is that system managers should properly
|
|
pay more attention to the resources that are being used. The storage
|
|
space in question was not stolen, it was merely used.
|
|
|
|
> There were indications that the person operating the pornography
|
|
>database had become aware of possible scrutiny. On June 27, a message
|
|
>left in a file labeled READ ME!!! said: "It appears that news about this
|
|
>site has escaped. In the past two weeks, I have had 27 unauthorized hosts
|
|
>attempt to access my server. This does not give me a warm-fuzzy feeling.
|
|
>I would hate to have to shut this down, but I may have no choice."
|
|
|
|
This is a very standard thing. Here's the scenario, as it most often
|
|
works its way out: somebody has what he feels to be an interesting
|
|
collection of erotic images. Creating a site for them and letting it
|
|
be public knowledge is self-defeating, as the traffic to such sites
|
|
more often than not is so heavy that it causes ordinary operations to
|
|
that site, such as email, to become badly delayed or even impossible.
|
|
The site, therefore, is created secretly - not in the sense of "hidden
|
|
from authority", necessarily, but more in the sense of "let's try to
|
|
keep access to reasonable levels by limiting the number of people who
|
|
know about us." Sooner or later, the name of the site "leaks" - and
|
|
traffic starts to increase. In order to avoid potential problems, be
|
|
they interference with ordinary operations, or a possible bad reaction
|
|
on the part of the site management, the site is shut down - and
|
|
messages like the one you quote are quite often the prelude to a
|
|
shutdown.
|
|
|
|
Many sites do consider things like pornographic images to be
|
|
undesirable on their face - but many do not. Most of the sites which
|
|
aren't tied to businesses, academia, or government, I believe, are far
|
|
more concerned with the effects on traffic than they are with the
|
|
"problem" of pornography
|
|
per se.
|
|
|
|
> One computer expert, who requested anonymity, said there might be more
|
|
>to the incident than meets the eye. The expert suggested that the
|
|
>hard-core pornography may be a cover for an ultra-sophisticated espionage
|
|
>program, in which a "sniffer" program combs through other Livermore
|
|
>computers, encodes the passwords and accounts it finds, and then hides
|
|
>them within the pornographic images, perhaps to be downloaded by foreign
|
|
>agents.
|
|
|
|
This is simply ridiculous on its face. Why would anyone tie their
|
|
espionage activity to something which is otherwise frowned upon, when
|
|
they could just as easily do so in a manner which would never cause
|
|
a stir?
|
|
|
|
> Still, the computer penetrations at Livermore and Lawrence Berkeley
|
|
>"show very poor management on the part of the national labs," Stoll said.
|
|
|
|
This is the salient point. The person who set up this site may, or may
|
|
not, have been guilty of anything illegal (with regard to the porn, anyhow -
|
|
the pirated software is a different issue). The LLL management, however,
|
|
is certainly guilty of a lack of oversight. But that's as far as it goes,
|
|
a lack of oversight. And I recommend, before the hammer of condemnation
|
|
gains too much momentum, a bit of talk with people who have to manage
|
|
sites as large, and with as many users, as LLL. Like any other large-scale
|
|
operation, there simply isn't the opportunity to examine every corner of
|
|
the system all the time. The best you can do is to try your best, and
|
|
deal with problems as they arise.
|
|
|
|
>One system
|
|
>operator of a pirate site in Istanbul, Turkey, openly bragged on-line
|
|
>that his country has no laws preventing the distribution of copyrighted
|
|
>software; thus, he claimed, he was breaking no laws by doing so.
|
|
|
|
What's worse is that he was perfectly correct. The pertinent example
|
|
here is Italy, which for years had the same loose attitude towards
|
|
software copyright - to the point where many companies would not
|
|
sell software in Italy at all. My point is only that trying to attach
|
|
this issue to Internet, per se, is missing the larger point entirely,
|
|
and represents a grave distortion of the actual picture, of which
|
|
the Internet is only a small part.
|
|
|
|
> The Software Publishers Assn., a trade association representing major
|
|
>software manufacturers, has made software piracy on the Internet a major
|
|
>priority. Peter Beruk, the association's litigation manager, said: "We
|
|
>are currently tracking over 1,600 pirate sites on the Internet in a joint
|
|
>investigation with the FBI. It is a very serious and costly problem.
|
|
|
|
Will this have the same impact as their tracking of private pirate BBS
|
|
systems, which have been around for decades now? That impact, for what
|
|
it's worth, is fairly close to zero. Again, the point is that the Internet
|
|
is only a part of the picture. There are many other points to be made
|
|
about the actual nature of software piracy and its actual impact on the
|
|
software industry, but that's another (although closely related) rant.
|
|
Suffice it to say that the SPA has a vested interest in making the problem
|
|
seem as costly and widespread as it possibly can.
|
|
|
|
> "In the case of David LaMaccia, we estimate over a million dollars of
|
|
>software was downloaded from his site in a two-week period. We will start
|
|
>going after the universities next. . . . The Internet, in our view, is
|
|
>now getting a very bad name."
|
|
|
|
If you're using retail prices like $395 for Power Japanese, you can get
|
|
up to a million bucks real fast. This reminds me very much of the
|
|
newspaper reports of cocaine busts "worth $42 million dollars on the
|
|
street", and is using exactly the same distortions. And as far as
|
|
the SPA's ability to determine what's getting a bad name, well, I point
|
|
out that their position is hardly unbiased. Nor, for that matter, has
|
|
it ever been particularly well-informed.
|
|
|
|
In summary, this was about as highly distorted and inaccurate a view of
|
|
the Internet as I've ever seen in a newspaper. You might as well have
|
|
written an article which claimed that because Hayward, California, has
|
|
one adult bookstore, that it's proof that that city is a "haven for
|
|
pornographers", or that because one car theft ring operated out of
|
|
Eugene, Oregon, that the entire Northwest was teeming with car thieves,
|
|
and nobody's Ford Escort was safe. In other words - it's bullshit.
|
|
If you narrow your focus enough, you can prove any point you care to
|
|
make about 'most *anything*, the Internet being no exception. That's
|
|
a long, long way from finding the truth, though.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 23 Jul 1994 20:41:35 -0500 (CDT)
|
|
From: Charles Stanford <cstanfor@BIGCAT.MISSOURI.EDU>
|
|
Subject: File 3--ACTION: Outlaw "Electronic Redlining" on NII. (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Sat, 23 Jul 1994 23:18:08 GMT
|
|
From--Center for Media Education <cme@access1.digex.net>
|
|
|
|
ACTION ALERT From People For the American Way (DC)
|
|
|
|
SENATE TO ACT ON INFO-HIGHWAY BILL--ACTIVISTS NEEDED TO PREVENT
|
|
DISCRIMINATORY PRACTICES BY TELECOMMUNICATIONS GIANTS.
|
|
|
|
The Issue
|
|
|
|
- The "Baby Bells'" plans to begin construction of the "information
|
|
superhighway" have already displayed stark patterns of by-passing
|
|
minority, low income and rural communities. This practice, known as
|
|
"redlining," is a serious problem in the deployment of advanced
|
|
telecommunications services.
|
|
|
|
- A diverse coalition (listed below) of public interest organizations has
|
|
proposed that an Anti-Redlining amendment be introduced as part of S.
|
|
1822, the NII (info highway) bill now pending in the Senate.
|
|
|
|
- The amendment prohibits telecommunications carriers from deploying new
|
|
systems in a way that discriminates on the basis of race, color, national
|
|
origin, income or residence in a rural area.
|
|
|
|
- Without this amendment, the much-heralded advent of the "information
|
|
superhighway" may serve to aggravate differences in opportunities that
|
|
already exist along lines such as race, income and geographical location.
|
|
For example, "telemedicine" can provide increased access to health care
|
|
information -- such as pre-natal nutrition or poison control procedures --
|
|
to rural and low-income areas. However, for these technologies to benefit
|
|
everybody, it is vital that minority, low-income and rural communities are
|
|
not the last to reap the benefits of the information superhighway.
|
|
|
|
- This amendment guarantees that minority, low-income, and rural
|
|
Americans won't be the last ones connected. Without it, these communities
|
|
will lag far behind the rest of our country in access to advanced
|
|
telecommunications services.
|
|
|
|
LEGISLATIVE TIMING
|
|
|
|
Senator Hollings (D-SC), Chairman of the Commerce Committee, and Senator
|
|
Danforth (R-MO), Ranking Minority Member of the Commerce Committee are
|
|
busily working on amendments to S. 1822, a major telecommunications reform
|
|
bill. Next week, the full Committee is expected to consider these
|
|
amendments. Therefore, an Anti-Redlinig provision must be added now.
|
|
|
|
ACTION REQUEST
|
|
|
|
- Please call Senator Hollings at the Commerce Committee and Senator
|
|
Danforth (Ranking Minority Member) immediately!! Ask them to guarantee
|
|
that an Anti-Redlining provision will be included in the Chairman's Mark.
|
|
Phone calls on this issue by the public will have a profound effect on the
|
|
outcome of this amendment--so please call!
|
|
|
|
Senator Hollings 202-224-5115
|
|
Senator Danforth 202-224-6154
|
|
|
|
- Please try to find the time to make a few calls and ask the other
|
|
Senators on the Commerce Committee to guarantee non-discriminatory
|
|
deployment of the information superhighway by supporting an Anti-Redlining
|
|
Amendment. The Senators on the Commerce Committee are:
|
|
|
|
Inouye (D-HA) 202-224-3934
|
|
Exon (D-NB) 202-224-4224
|
|
Ford (D-KY) 202-224-4343
|
|
Rockefeller (D-WV) 202-224-6472
|
|
Kerry (D-MA) 202-224-2742
|
|
Breaux (D-LA) 202-224-4623
|
|
Bryan (D-NV) 202-224-6244
|
|
Robb (D-VA) 202-224-4024
|
|
Dorgan (D-ND) 202-224-2551
|
|
Matthews (D-TN) 202-224-4944
|
|
|
|
|
|
Packwood (R-OR) 202-224-5244
|
|
Pressler (R-SD) 202-224-5842
|
|
Stevens (R-AK) 202-224-3004
|
|
McCain (R-AZ) 202-224-2235
|
|
Burns (R-MT) 202-224-2644
|
|
Gorton (R-WA) 202-224-3441
|
|
Lott (R-Miss.) 202-224-6253
|
|
Hutchison (R-TX) 202-224-5922
|
|
|
|
- Calling these Senators *works*!!
|
|
|
|
ADDITIONAL INFORMATION:
|
|
|
|
(1) Letter written to Commerce Committee Members by Anti-Redlining
|
|
Coalition
|
|
(2) Public Interest Organizations that support this measure
|
|
(3) Elements of the Anti-Redlining amendment
|
|
(4) FAQ on 'electronic redlining'
|
|
(5) Text of proposed amendment
|
|
|
|
Letter written to Commerce Senate Commerce Committee Members:
|
|
|
|
Senator
|
|
Committee on Commerce, Science and Transportation
|
|
United States Senate
|
|
Washington, D.C. 20510
|
|
|
|
Dear Senator:
|
|
|
|
We write on behalf of a diverse coalition of civic organizations to urge
|
|
you to adopt, as part of S. 1822, strong anti-redlining protections for
|
|
the deployment and provision of advanced telecommunications services. The
|
|
organizations in our coalition represent civil rights, consumer,
|
|
educational, local government, religious, and other constituencies
|
|
concerned that all Americans share in the benefits of the "information
|
|
superhighway."
|
|
|
|
Discrimination in deployment of advanced telecommunications services
|
|
poses a threat to equal opportunity over the next several decades.
|
|
Already, an increasing amount of critical information and services are
|
|
available "on-line." And, as the National Information Infrastructure
|
|
(NII) develops, it will play an increasingly important role in economic
|
|
development, education, access to health care, informing the public about
|
|
employment opportunities, and participation in the political process, to
|
|
name only a few. For example, advanced telecommunications services may be
|
|
the principal means through which businesses reach and sell to potential
|
|
customers, and the only major source of classified advertisements for
|
|
employment opportunities.
|
|
|
|
However, if minority, low income and rural areas are given access to
|
|
advanced telecommunications services well after the rest of our country,
|
|
the much-heralded advent of the "information superhighway" may serve to
|
|
aggravate differences in opportunities that already exist along
|
|
discriminatory lines such as race, income and geographical location.
|
|
Indeed, allegations that plans for the deployment of video dialtone
|
|
services constitute "electronic redlining" have recently appeared on the
|
|
front pages of newspapers across the country. As Vice-President Gore
|
|
warned, America cannot afford to permit the NII to divide our society
|
|
among "information haves and have nots."
|
|
|
|
The Communications Act of 1994, S. 1822, must include specific
|
|
anti-redlining provisions that assure that minority, low income, and rural
|
|
areas will not be the last to enjoy the important economic and civic
|
|
benefits of advanced telecommunications services. It is insufficient for
|
|
Congress to tackle this very serious problem by simply including general
|
|
admonitions that discrimination in the deployment and provision of
|
|
telecommunications services should be avoided. Instead, specific
|
|
anti-redlining requirements should be added to S.1822 before the bill is
|
|
reported out of Committee.
|
|
|
|
Although there has been considerable public debate concerning S. 1822 and
|
|
the NII, anti-redlining has not yet received the attention it deserves.
|
|
We suggest that the Senate examine the risk of discriminatory deployment
|
|
of advanced telecommunication services with additional hearings on the
|
|
problems posed by electronic redlining. Hearings would allow
|
|
representatives from civil rights, educational, community, government,
|
|
health care, religious, and other civic organizations as well as potential
|
|
individual users of future technologies the opportunity to discuss the
|
|
problem of discriminatory deployment and offer possible solutions.
|
|
|
|
The Senate must mandate that the NII promotes equal opportunities in the
|
|
use of current and future developments in information technologies. As S.
|
|
1822 moves through the Senate, the interests of racial minorities, low
|
|
income and rural Americans must not be left behind. We urge you to
|
|
support an anti-redlining amendment that has specific provisions to
|
|
guarantee equal deployment of advanced telecommunications services.
|
|
|
|
Sincerely,
|
|
American Association of Retired Persons
|
|
Appalachian Consortium of Enterprise Networks
|
|
Alliance for Communications Democracy
|
|
Alliance for Community Media
|
|
American Association of Museums
|
|
American Library Association
|
|
ASPIRA
|
|
Association of Art Museum Directors
|
|
Association of Independent Video and Filmmakers
|
|
Association of Research Libraries
|
|
Association of Systematics Collections
|
|
Big Sky Telegraph
|
|
Center for Media Education
|
|
Center for the Study of Responsive Law
|
|
Chittendon Community Television (Burlington, VT)
|
|
Citizens for Media Literacy
|
|
Consumer Federation of America
|
|
Consumers Union
|
|
Council of Jewish Federations
|
|
Deep Dish Television Network
|
|
Federation of Southern Cooperatives/Land Assistance Fund
|
|
Government Accountability Project
|
|
Independent Sector
|
|
Institute for Public Representation
|
|
Media Access Project
|
|
Media Alliance
|
|
Museum Computer Network
|
|
Minority Media Ownership and Employment Council
|
|
NAACP
|
|
National Alliance for Media Arts & Culture
|
|
National Asian American Telecommunications Association
|
|
National Association of College Broadcasters
|
|
National Association of People with AIDS
|
|
National Black Caucus of State Legislators
|
|
National Black Programming Consortium
|
|
National Campaign for Freedom of Expression
|
|
National Council of LaRaza
|
|
National Education Association
|
|
National Federation of Community Broadcasters
|
|
National Humanities Alliance
|
|
National Latino Communications Center
|
|
National Minority Public Broadcasting Consortia
|
|
National Puerto Rican Coalition
|
|
National School Boards Association
|
|
National Writers Union (UAW Local 1981)
|
|
Native American Public Broadcasting Consortium
|
|
New York Foundation for the Arts
|
|
OMB Watch
|
|
Pacific Islanders in Communications
|
|
People For the American Way Action Fund
|
|
Public Citizen's Congress Watch
|
|
Self Help for Hard of Hearing People, Inc.
|
|
Taxpayer Assets Project
|
|
The Rural Coalition
|
|
AFGE Local 3354 (Missouri); Alabama Council on Human Relations; American
|
|
Indian Movement (Minnesota); Appalachian Community Board (Tennessee);
|
|
Arkansas Land & Farm; Association for Community Based Education (DC);
|
|
Boggs Rural Life Center, Inc. (Georgia); California Action Network;
|
|
California Rural Legal Assistance Fund; Center for Community Change (DC);
|
|
Center for Democratic Renewal (Georgia); Christian Children's Fund, Inc.
|
|
(Virginia); Citizen Alert (Nevada); Commission on Religion in Appalachia
|
|
(Tennessee); Community Enterprise Development Corporation of Alaska;
|
|
Community Transportation Association of America (DC); Cornucopia Network
|
|
of New Jersey, Inc.; Frente Democratic Compensino (Mexico); General Board
|
|
of Church and Society (DC); Gulf Coast Tenants Organization (Louisiana);
|
|
Heartwood (Indiana); Highlander Research and Education Center
|
|
(Tennessee); H.O.M.E., Inc. (Maine); Housing Assistance Council (DC);
|
|
Institute for Alternative Agriculture(Maryland); Institute for Local
|
|
Self-Reliance (DC); Institute for Southern Studies ; (North Carolina);
|
|
Intertribal Agriculture Council(Montana); Junior Achievement, Inc.
|
|
(Colorado); La Mujer Obrera (Texas); Land Loss Prevention Project ;
|
|
(North Carolina); Bert and Mary Meyer Foundation(Florida); Missouri Rural
|
|
Crisis Center; National Catholic Rural Life Conference(Iowa); Native
|
|
Action (Montana); North American Farm Alliance (Ohio); Northern Neck
|
|
Rural Development Coalition (Virginia); Northwest Housing Association
|
|
(Vermont); Oyati Zani (Healthy People) ; (South Dakota); Pennsylvania
|
|
Farmers Union; Prairiefire Rural Action, Inc. (Iowa); Rural Advancement
|
|
Fund ; (North Carolina); Rural Alliance for Military Accountability
|
|
(Nevada); Rural Development Leadership Network(New York); Rural Community
|
|
Assistance Program(Virginia); Rural Life Office (Kentucky); Rural
|
|
Southern Voice for Peace ; (North Carolina); Rural Virginia, Inc.; Save
|
|
Our Cumberland Mountains (Tennessee); Save Sierra Blanca (Texas); School
|
|
of Human Services, Springfield College (Vermont); Sin Fronteras
|
|
Organizing Project(Texas); Solidarity Committee of the Capital District
|
|
(New York); Stueben Churchpeople Against Poverty (New York); University of
|
|
Arizona, Rural Health Office; Vermonters Organized for Clean Up (Vermont);
|
|
Virginia Water Project, Inc.
|
|
Office of Communications, United Church of Christ
|
|
United Methodist Church, General Board of Church & Society
|
|
United States Catholic Conference
|
|
|
|
FREQUENTLY ASKED QUESTIONS
|
|
|
|
(1) What is electronic redlining?
|
|
|
|
In violation of Fair Housing and Fair Lending laws, many banks have
|
|
refued to lend money to people who live in minority or low-income areas.
|
|
Red lines would be drawn on a map indicating neighborhoods which would be
|
|
excluded.
|
|
|
|
Electronic redlining occurs when a telecommunications carrier -- such as
|
|
a telephone or cable television company -- refuses to provide service, or
|
|
provides lower quality service to minority, low-income or rural areas.
|
|
|
|
(2) Is electronic redlining really happening?
|
|
|
|
Yes. On May 23, 1994, a coalition of civil rights, public interest, and
|
|
consumer groups filed petitions with the Federal Communications Commission
|
|
showing that several Regional Bell Operating Companies plan to deploy
|
|
video dial tone services in a manner that excludes minority and low-income
|
|
areas.
|
|
|
|
For example, Bell Atlantic's initial plans for video dialtone service in
|
|
the Washington, DC area would have served Montgomery County and Northern
|
|
Virginia, both suburbs, but excluded the District of Columbia which has
|
|
much higher concentrations of minority and low-income residents.
|
|
|
|
(3) Don't the telecommunications carriers promise that everyone is going
|
|
to be connected?
|
|
|
|
Some companies have responded that they will eventually get around to
|
|
providing these new services to everyone. But hooking up everyone
|
|
eventually could mean that disadvantaged areas lag a generation behind
|
|
advantaged areas. Some offer only a vague commitment to deploy service in
|
|
a non-discriminatory way; others have announced more concrete but limited
|
|
plans after facing heavy criticism and the threat of congressional action.
|
|
|
|
The anti-redlining amendment would require companies to provide
|
|
deployment plans that indicate exactly which communities they intend to
|
|
serve. Telecommunications carriers would not be permitted to build
|
|
advanced networks in wealthy suburbs first, followed eventually by
|
|
build-outs in minority, low-income and rural areas.
|
|
|
|
(4) Doesn't this mean minority, low-income and rural areas would have to
|
|
be hooked up first?
|
|
|
|
The anti-redlining amendment does not require that any areas be provided
|
|
with advanced telecommunications services first. Instead, it simply
|
|
mandates that service be deployed in a non-discriminatory manner in
|
|
keeping with a core principle of the 1934 Communications Act. That is, a
|
|
telecommunications company may not deploy new services in a discriminatory
|
|
manner. communities.
|
|
|
|
For example, suppose Bell Atlantic chooses to deploy "video dial-tone" to
|
|
100,000 homes in a city with a substantial minority of black or hispanic
|
|
residents. The anti-redlining amendment would require that a substantial
|
|
minority of homes served be those of minority residents. The amendment
|
|
would make it illegal for a telecommunications carrier to deploy a new
|
|
service to wealthy, predominantly white, suburbs first, only to hook up
|
|
minority communities later.
|
|
|
|
(5) Would this amendment hurt industry?
|
|
|
|
The RBOCs' own MFJ-Task force has done a study showing that minority
|
|
households at all income levels spend significantly more on
|
|
telecommunications services than non-minority households. For instance,
|
|
minority households spend more on premium cable services -- probably due
|
|
to fewer alternatives for entertainment. Industry's perception that
|
|
minority markets are not profitable seems largely based on out-moded
|
|
stereotypes of the very sort that civil rights laws commonly address.
|
|
|
|
TEXT OF PROPOSED ANTI-REDLINING AMENDMENT
|
|
|
|
(1) It shall be unlawful for any telecommunications carrier to refuse to
|
|
provide access to telecommunications services with either the purpose or
|
|
effect of discriminating on the basis of race, national origin, income, or
|
|
residence in a rural area. A telecommunications carrier shall offer
|
|
service to representative percentages of members of classes protected by
|
|
this subsection as compared to the percentages of protected class members
|
|
in the relevant local area.
|
|
|
|
(2) SUBMISSION OF PLAN FOR PROVISION OF SERVICE. As a condition of
|
|
receiving or renewing a license, franchise, permit or other authorization
|
|
to provide telecommunications service, each telecommunications carrier
|
|
shall submit, to the responsible regulatory authorities, a plan
|
|
demonstrating compliance with subsection (1). The plan shall include all
|
|
relevant tract-level census data in a standard form to be prescribed by
|
|
the Commission.
|
|
|
|
(3) ENFORCEMENT BY THE COMMISSION. Within one year after the date of
|
|
enactment of this subsection, the Commission shall complete a rulemaking
|
|
procedure for the purpose of prescribing regulations that set forth the
|
|
requirements for compliance with subsection (1), public comment,
|
|
complaint, enforcement procedures under this section, and procedures for
|
|
annual certification of compliance with subsection (1).
|
|
|
|
===========
|
|
People For the American Way is 300,000-member nonpartisan constitutional
|
|
liberties public interest organization.
|
|
|
|
People For the American Way, 2000 M Street NW, Suite 400, Washington DC 20036
|
|
===========
|
|
Anthony E. Wright cme@access.digex.net
|
|
Coordinator, Future of Media Project Center for Media Education
|
|
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.70
|
|
************************************
|
|
|