853 lines
38 KiB
Plaintext
853 lines
38 KiB
Plaintext
|
|
Computer underground Digest Sun Feb 12, 1995 Volume 7 : Issue 12
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copi Editor: E. T. NaShrdlu
|
|
|
|
CONTENTS, #7.12 (Sun, Feb 12, 1995)
|
|
|
|
File 1--If Amended, the Implications of Exon's Bill (S 314)
|
|
File 2--UofMich student expelled for "obscene" story on Net (fwd)
|
|
File 3--Re: Cu Digest, #7.09 - Libel international
|
|
File 4--Defamation in cyberspace
|
|
File 5--Internet Censorship in Africa (fwd)
|
|
File 6--*** STILL CENSORED *** (fwd)
|
|
File 7--Cu In The News
|
|
File 8--Conferences that may be of interest
|
|
File 9--Cu Digest Header Info (unchanged since 25 Nov 1994)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Wed, 8 Feb 1995 15:04:19 -0500 (EST)
|
|
From: slowdog <slowdog@WOOKIE.NET>
|
|
Subject: File 1--If Amended, the Implications of Exon's Bill (S 314)
|
|
|
|
If Sen. Exon's bill passes, this will be the text of the law. Items in
|
|
[brackets] are the portions that are being deleted or changed. The text
|
|
itself that is not within these brackets is how the law will look.
|
|
|
|
Comments to follow.
|
|
|
|
47 USC Sec. 223
|
|
|
|
TITLE 47
|
|
CHAPTER 5
|
|
SUBCHAPTER II
|
|
|
|
|
|
Sec. 223. [Obscene or harassing telephone calls in the District of
|
|
Columbia or in interstate or foreign communications] Obscene or
|
|
harassing utilization of telecommunications devices and facilities
|
|
in the District of Columbia or in interstate or foreign
|
|
communications
|
|
|
|
|
|
(a) Prohibited acts generally
|
|
|
|
Whoever -
|
|
|
|
(1) in the District of Columbia or in interstate or foreign
|
|
communication by means of [telephone] telecommunications
|
|
device -
|
|
|
|
(A) [makes any comment, request, suggestion or proposal]
|
|
makes, transmits, or otherwise makes available any comment,
|
|
request, suggestions, proposal, image, or other communication]
|
|
which is obscene, lewd, lascivious, filthy, or indecent;
|
|
|
|
(B) [makes a telephone call, whether or not conversation
|
|
ensues, without disclosing his identity and with intent to
|
|
annoy, abuse, threaten, or harass any person at the called
|
|
number] makes a telephone call or utilizes a telecommunications
|
|
device, whether or not conversation or communications ensues,
|
|
without disclosing his identity with intent to annoy, abuse,
|
|
threaten, or harass any person at the called number or who
|
|
receives the communication;
|
|
|
|
(C) makes or causes the telephone of another repeatedly or
|
|
continuously to ring, with intent to harass any person at the
|
|
called number; or
|
|
|
|
(D) [makes repeated telephone calls, during which conversation
|
|
ensues, solely to harass any person at the called number; or]
|
|
makes repeated telephone calls or repeatedly initiates
|
|
communication with a telecommunications device, during which
|
|
comversation or communication ensues, solely to harass any
|
|
person at the called number of who receives the communication;
|
|
or
|
|
|
|
(2) knowingly permits any [telephone] telecommunications facility
|
|
under his control to be used for any purpose prohibited by this
|
|
section, shall be fined not more than [$50,000] $100,000 or
|
|
imprisoned not more than [six months] 2 years, or both.
|
|
|
|
(b) Prohibited acts for commercial purposes; defense to prosecution
|
|
|
|
(1) Whoever knowingly -
|
|
|
|
(A) within the United States, by means of [telephone],
|
|
telecommunications device makes (directly or by recording device)
|
|
any obscene communication for commercial purposes to any person,
|
|
regardless of whether the maker of such communication [placed the
|
|
call] placed the call or initiated the conversation; or
|
|
|
|
(B) permits any [telephone] telecommunications facility under such
|
|
person's control to be used for an activity prohibited by
|
|
subparagraph (A), shall be fined in accordance with title 18 or
|
|
imprisoned not more than two years, or both.
|
|
|
|
(2) Whoever knowingly -
|
|
|
|
(A) within the United States, [by means of telephone, makes]
|
|
by means of telecommunications device, makes, knowingly
|
|
transmits, or knowingly makes available (directly or by recording
|
|
device) any indecent communication for commercial purposes which is
|
|
available to any person under 18 years of age or to any other person
|
|
without that person's consent, regardless of whether the maker of
|
|
such communication [placed the call] placed the call or
|
|
initiated the communication; or
|
|
|
|
(B) permits any [telephone] telecommunications facility under such
|
|
person's control to be used for an activity prohibited by subparagraph
|
|
(A), shall be fined not more than [$50,000] $100,000 or imprisoned not
|
|
more than [six months] 2 years, or both.
|
|
|
|
(3) It is a defense to prosecution under paragraph (2) of this
|
|
subsection that the defendant restrict access to the prohibited
|
|
communication to persons 18 years of age or older in accordance
|
|
with subsection (c) of this section and with such procedures as the
|
|
Commission may prescribe by regulation.
|
|
|
|
(4) In addition to the penalties under paragraph (1), whoever,
|
|
within the United States, intentionally violates paragraph (1) or
|
|
|
|
(2) shall be subject to a fine of not more than [$50,000]
|
|
$100,000 for each violation. For purposes of this paragraph, each
|
|
day of violation shall constitute a separate violation.
|
|
|
|
(5)(A) In addition to the penalties under paragraphs (1), (2),
|
|
and (5), whoever, within the United States, violates paragraph (1)
|
|
or (2) shall be subject to a civil fine of not more than [$50,000]
|
|
$100,000 for each violation. For purposes of this paragraph, each
|
|
day of violation shall constitute a separate violation.
|
|
|
|
(B) A fine under this paragraph may be assessed either -
|
|
|
|
(i) by a court, pursuant to civil action by the Commission or
|
|
any attorney employed by the Commission who is designated by the
|
|
Commission for such purposes, or
|
|
|
|
(ii) by the Commission after appropriate administrative
|
|
proceedings.
|
|
|
|
(6) The Attorney General may bring a suit in the appropriate
|
|
district court of the United States to enjoin any act or practice
|
|
which violates paragraph (1) or (2). An injunction may be granted
|
|
in accordance with the Federal Rules of Civil Procedure.
|
|
|
|
(c) Restriction on access to subscribers by common carriers;
|
|
judicial remedies respecting restrictions
|
|
|
|
(1) A common carrier within the District of Columbia or within
|
|
any State, or in interstate or foreign commerce, shall not, to the
|
|
extent technically feasible, provide access to a communication
|
|
specified in subsection (b) of this section from the [telephone]
|
|
telecommunications device of any subscriber who has not previously
|
|
requested in writing the carrier to provide access to such
|
|
communication if the carrier collects from subscribers an identifiable
|
|
charge for such communication that the carrier remits, in whole or in
|
|
part, to the provider of such communication.
|
|
|
|
(2) Except as provided in paragraph (3), no cause of action may
|
|
be brought in any court or administrative agency against any common
|
|
carrier, or any of its affiliates, including their officers,
|
|
directors, employees, agents, or authorized representatives on
|
|
account of -
|
|
|
|
(A) any action which the carrier demonstrates was taken in good
|
|
faith to restrict access pursuant to paragraph (1) of this
|
|
subsection; or
|
|
|
|
(B) any access permitted -
|
|
|
|
(i) in good faith reliance upon the lack of any
|
|
representation by a provider of communications that
|
|
communications provided by that provider are communications
|
|
specified in subsection (b) of this section, or
|
|
|
|
(ii) because a specific representation by the provider did
|
|
not allow the carrier, acting in good faith, a sufficient
|
|
period to restrict access to restrict access to communications
|
|
described in subsection (b) of this section.
|
|
|
|
(3) Notwithstanding paragraph (2) of this subsection, a provider
|
|
of communications services to which subscribers are denied access
|
|
pursuant to paragraph (1) of this subsection may bring an action
|
|
for a declaratory judgment or similar action in a court. Any such
|
|
action shall be limited to the question of whether the
|
|
communications which the provider seeks to provide fall within the
|
|
category of communications to which the carrier will provide access
|
|
only to subscribers who have previously requested such access.
|
|
|
|
===========================
|
|
|
|
|
|
> (a) Prohibited acts generally
|
|
>
|
|
> Whoever -
|
|
>
|
|
> (1) in the District of Columbia or in interstate or foreign
|
|
> communication by means of [telephone] telecommunications
|
|
> device -
|
|
>
|
|
> (A) [makes any comment, request, suggestion or proposal]
|
|
> makes, transmits, or otherwise makes available any comment,
|
|
> request, suggestions, proposal, image, or other communication]
|
|
> which is obscene, lewd, lascivious, filthy, or indecent;
|
|
|
|
Here's an important bit. "Transmits or otherwise makes available" is
|
|
different from the earlier law. It DOES pleace a burden of responsibility
|
|
upon the provider of service. NOTE that unlike other portions of the law,
|
|
boths old and new versions, this part DOES NOT include the word
|
|
"knowingly". Crucial, crucial point.
|
|
|
|
> (B) [makes a telephone call, whether or not conversation
|
|
> ensues, without disclosing his identity and with intent to
|
|
> annoy, abuse, threaten, or harass any person at the called
|
|
> number] makes a telephone call or utilizes a telecommunications
|
|
> device, whether or not conversation or communications ensues,
|
|
> without disclosing his identity with intent to annoy, abuse,
|
|
> threaten, or harass any person at the called number or who
|
|
> receives the communication;
|
|
|
|
No anonymous annoying! Does this mean we can't raid IRC channels anymore?
|
|
Or flame people from anon.petit.fi (sp?) accounts?
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 5 Feb 1995 22:44:32 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 2--UofMich student expelled for "obscene" story on Net (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
From--jgull@umich.edu (Jason Gull)
|
|
Date--4 Feb 1995 20:14:29 GMT
|
|
|
|
The local (Ann Arbor, MI) paper ran a story yesterday regarding a
|
|
sophomore at the University of Michigan (whose name is Baker, I believe)
|
|
who was expelled yesterday (or Thursday) as a result of a story he
|
|
"transmitted on the Internet."
|
|
|
|
The story the student wrote apparently involved the brutal rape and
|
|
torture of a woman. The name of the woman in the story is also the
|
|
name of another student on campus, which seems to have been the spark
|
|
that got the kid kicked out. The story seems to have been in one of
|
|
the alt.sex USENET groups, because according to the paper, the story
|
|
was first brought to the attention of University officials by an
|
|
alumnus -- an attorney in Moscow who just happened to spot the story
|
|
on USENET. The irony of the fact that this morality-policeman in
|
|
Moscow was scouring the alt.sex groups is apparently lost on the Ann
|
|
Arbor News.
|
|
|
|
What is truly frightening, and deserving of more coverage in the news,
|
|
is that the FBI is now investigating this kid, and an agent in the
|
|
local FBI office has officially stated that they're contemplating
|
|
federal obscenity charges against him. Remember, this isn't
|
|
pictures/video he's accused of sending, it's purely text. (Raunchy,
|
|
disgusting text, I'm sure, but plain 'ol ASCII).
|
|
|
|
Anyone have any other news on this? (I'll post more when I find it.)
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 6 Feb 1995 14:41:02 -0500
|
|
From: kingego@IO.ORG(Greg Boyd)
|
|
Subject: File 3--Re: Cu Digest, #7.09 - Libel international
|
|
|
|
>Date: Tue, 10 Jan 1995 10:47:24 -0600
|
|
>Subject--Re: Libel & Defamation in the Information Age
|
|
>
|
|
>Several clarifications are needed and will, I think,
|
|
>ease people's minds abit.
|
|
>
|
|
>Eric Eden r3eje@vm1.cc.uakron.edu wrote, in part:
|
|
...
|
|
>> Other users have the right to sue you for defamation if they can prove
|
|
>> you damaged their reputation or good name with false information.
|
|
>
|
|
>Absolutely right. It is the _plaintiff_ who must prove that a
|
|
>wrong has been
|
|
>done. See further mention below.
|
|
|
|
Of course, this discussion is based on American libel law. The Net,
|
|
however, is accessible from countries with different rules.
|
|
|
|
In Canada and the United Kingdom, for example, the customary burden of
|
|
proof shifts in defamation cases; if someone sues a newspaper for
|
|
libel in Canada, the lawyers *for the paper* must show that the
|
|
reporter and editors did no wrong -- one result of this is that the
|
|
defence of truth is used sparingly, since it necessitates providing a
|
|
legal proof of every word in a newspaper story. Libel trials are
|
|
extremely rare in Canada, perhaps because the expense of legally
|
|
proving a piece of journalism runs into the hundreds of thousands of
|
|
dollars. In addition, countries that use British common law
|
|
principles do not admit the defense of absence of malice, which is a
|
|
uniquely American idea. (Yes, we are jealous.)
|
|
|
|
My main point is that, since the Net is international, perhaps a party
|
|
who felt themselves wronged could sue for libel in a jurisdiction
|
|
where the laws are weighted more in favor of the plaintiff than is
|
|
possible in the U.S.A. (Just like recent Net-related prosecutions in
|
|
the U.S.A., in which BBS operators from one state find themselves
|
|
defending charges originating from another, generally less civilized
|
|
state.)
|
|
|
|
Some years ago a political figure in a Caribbean country brought a
|
|
libel suit againt an American television network. His lawyers brought
|
|
the suit into a Canadian court, stating that since the program had
|
|
been available to Canadian cable viewers, this was jusified (most in
|
|
Canada believed it was because of our plaintiff-friendly libel laws.)
|
|
|
|
P.S.: I am not a lawyer, and therefore unqualified to render a useful
|
|
opinion on international Net libel law. I submit this as a journalist
|
|
with some practical knowledge of libel and defamation law, and in the
|
|
hopes that you may encourage a real expert to address my
|
|
observations.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 05 Feb 95 13:57:18
|
|
From: "Carolina, Robert" <Robert.Carolina@CLIFFORDCHANCE.COM>
|
|
Subject: File 4--Defamation in cyberspace
|
|
|
|
In a recent exchange on this topic in CuD 7.09, Eric Eden
|
|
<R3eje@vml.cc.uakron.edu> and Henry Itkin <Henry.Itkin@UNI.edu> have
|
|
been disagreeing about burdens of proof in defamation cases. This can
|
|
be a complicated area because the actual process of the law tends to
|
|
be shortened into various "rules of thumb" such as "if you can prove
|
|
it is true you are probably not liable".
|
|
|
|
Just to clarify the process under common law (i.e. individual US state
|
|
law), roughly speaking:
|
|
|
|
1. The plaintiff (the alleged victim) in a defamation case has the
|
|
burden of proving that the defendant published a defamatory statement.
|
|
"Publisher" by the way includes the author as well as the actual
|
|
publication in which the defamation is printed. The plaintiff does NOT
|
|
have to prove that the statement is untrue. (But see discussion
|
|
below.)
|
|
|
|
2. If the plaintiff can show this first step is completed, then the
|
|
assumption is that the defendant is liable. It is now the DEFENDANT's
|
|
burden to show why he or she should not be held liable. One such
|
|
affirmative defense is "truth". That is, if he can prove that the
|
|
statements made are true then he will not be held liable.
|
|
|
|
3. Note that each state has the opportunity to alter the rules
|
|
presented above, and some US states have tougher or weaker standards.
|
|
Most US states do not change the standards due to point number 4
|
|
below.
|
|
|
|
4. If you live in a jurisdiction where the 1st Amendment to the US
|
|
Constitution applies, there is a Federal Constitutional issue which
|
|
comes into play. (Bear with me, it has been a while since law school.)
|
|
If the plaintiff (alleged victim) in a case is deemed to be a "public
|
|
figure", then he is required to prove that the defendant had actual
|
|
malice when making the statement in question. There are a number of
|
|
cases which define how public you have to be before you are a "public
|
|
figure", and I won't go into that. But assuming that the plaintiff IS
|
|
a public figure, then the matter will turn on whether he can prove
|
|
actual malice. (Hold on tight, here is where the confusion sets in.)
|
|
One method used to demonstrate actual malice is for the plaintiff to
|
|
show BOTH that the statement is false, and that the author should have
|
|
known it was false when he made the statement.
|
|
|
|
Obviously, no journalist will go through this detailed set of
|
|
calculations before writing a story. (If he asks us, of course, we do
|
|
the calculations for him). Instead, the journalist operates on a rule
|
|
of thumb that "if I can prove it's true I am probably all right". This
|
|
is a fairly cautious restatement of the standard above and will
|
|
probably help to keep people out of trouble, but if in doubt please
|
|
consult with a lawyer familiar with your own case and local law.
|
|
|
|
(If, like me, you live in a common law jurisdiction where the 1st
|
|
Amendment does NOT apply, then you need to be much more cautious than
|
|
in the US. In fact, be aware that when you post to the Usenet you are
|
|
probably "publishing" in the UK as well.)
|
|
|
|
Finally (home stretch) if the court determines that the defendant is
|
|
liable for defamation, the next question is "how much does he have to
|
|
pay". This is the question of damages. The relevant inquiry is: "how
|
|
much damage can the plaintiff show as a result of the defamatory
|
|
publication". If one were to publish allegations in the New York Times
|
|
that a stock broker is a "cheat and embezzler", then this will
|
|
probably damage the person quite a bit. If, on the other hand, you
|
|
send an e-mail to one friend alleging that your neighbour slapped you
|
|
while hanging up clothes, this will probably not generate a huge
|
|
amount of damages.
|
|
|
|
If you want to read more about it, I co-authored a piece entitled
|
|
"Multimedia Defamation" which appeared last year in International Media
|
|
Law Review. In addition, my colleague Nick Braithwaite has an article on
|
|
this subject which should be accessible on our firm's World Wide Web
|
|
server. The URL is http://www.cliffordchance.com/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 9 Feb 1995 22:28:38 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 5--Internet Censorship in Africa (fwd)
|
|
|
|
----------------
|
|
|
|
|
|
From--Emmanuel@critical.demon.co.uk (Emmanuel Ohajah)
|
|
Subject--Internet Censorship in Africa
|
|
|
|
Dear All,
|
|
|
|
Back in June 1994 I wrote an article (Computer Weekly June 16 1994
|
|
Computer privacy, Highway patrol) which was very critical of the creeping
|
|
censorship and government control of computer networks in the UK and USA
|
|
|
|
Since then I have been told that IT experts in Africa wishing to develop
|
|
computer networks, set up internet connections or even use a
|
|
telecommunications provider other that the state PTT face similar
|
|
obstacles from their respective governments. What's more phone calls are
|
|
routinely monitored and satillite access is restricted or at least
|
|
discouraged.
|
|
|
|
A visiting civil rights lawyer from Cameroon suggested to me that many
|
|
African governments do not want to see a proliferation of communications
|
|
mediums because they will be unable to keep track of their subjects.
|
|
|
|
I am not sure if this is true but I would appreciate details of any
|
|
overzealous African government attempts at monitoring internet traffic
|
|
or censorship of electronic communications.
|
|
|
|
If any African governments have given any justifications for the control
|
|
or censorship of electronic communications please speed the details to me!
|
|
|
|
Thanks in advance. Emmanuel Ohajah If you would like to see my article and
|
|
other research then please mail me at Emmanuel@critical.demon.co.uk
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 11 Feb 1995 12:43:01 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 6--*** STILL CENSORED *** (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
From--dan.gannon@nwcs.org (Dan Gannon)
|
|
Date--Fri, 10 Feb 1995 05:35:54 GMT
|
|
|
|
STILL CENSORED FROM THE INTERNET!
|
|
|
|
Banished CPU has been -- and remains -- censored from the
|
|
Internet. The (Canadian) CBC PrimeTime News camera crew has recently
|
|
interviewed me for 4 hours about the situation. We are being
|
|
unscrupulously censored for politically and financially motivated
|
|
reasons.
|
|
|
|
Here is the complete story:
|
|
|
|
|
|
Banished CPU, a Freedom of Speech BBS, has been distributing
|
|
Holocaust Revisionist material through the Internet since 1991. The
|
|
material addresses, in an objective manner, the question of WHAT REALLY
|
|
HAPPENED during the so-called "Holocaust". The facts are both
|
|
"politically inconvenient" and undeniable.
|
|
|
|
Over the years, organized Jewish pressure has succeeded in cutting
|
|
off our link to the Internet numerous times, using their traditional
|
|
methods of boycott, slander and terror.
|
|
|
|
Netcom, a large commerical Internet provider based in San Jose,
|
|
California, served as our latest connection to the Internet for almost
|
|
a year, until they censored Banished CPU on November 26, 1994,
|
|
violating the contract they had formed with me.
|
|
|
|
Before I signed on with Netcom, I informed them of the nature of
|
|
the material I distribute, and inquired about the level of Freedom of
|
|
Speech they offer. I was told -- by a Netcom sales representitive who
|
|
identified herself as "Sherri" -- there would be no restrictions or
|
|
censorship of any kind, as long as the material conformed to U.S. law
|
|
(which, of course, it does.) Agreeing to the stated terms, I paid the
|
|
initial sign-up fee and continued paying them each month for the
|
|
connection to the Internet.
|
|
|
|
After a couple months of organized Jewish pressure, an unsigned
|
|
electronic message arrived from Netcom, informing me that I would no
|
|
longer be allowed to distribute messages in most Internet message areas
|
|
(USENET newsgroups). The message specified only 12 newsgroups that I
|
|
would be allowed to post to, forbidding me from posting to any of the
|
|
other 7,000+ newsgroups (including many 100% appropriate newsgroups
|
|
such as soc.history!) The message stated plainly that they were not
|
|
willing to discuss the issue.
|
|
|
|
For months, I reluctantly obeyed the new "rule", even though it
|
|
violated the verbal contract they had entered into earlier.
|
|
|
|
Then I distributed a Free Video Offer to a couple dozen newsgroups
|
|
outside of their arbitrary list of 12. The video was "David Cole
|
|
Interviews Dr. Franciszek Piper", which greatly infuriated and panicked
|
|
the Holocaust Lobby. David Cole, producer of the video, is Jewish --
|
|
NOT a "Nazi" or an "anti-Semite" by any means. Hundreds of copies were
|
|
sent all over the world within a matter of weeks. Requests were still
|
|
pouring in when we were abruptly cut off.
|
|
|
|
At first, Jewish pressure tried to get me kicked off for
|
|
"profiteering" (an informal taboo on the Internet). A lady named
|
|
Margaret from Netcom wrote to me, informing me of the complaints and
|
|
asking me to cease and desist. In reply, I pointed out that I was not
|
|
"profiteering" by any stretch of the imagination -- I was merely giving
|
|
out free, legal copies of someone else's video, and not collecting any
|
|
money whatsoever. Margaret wrote back, apologizing for the
|
|
misunderstanding.
|
|
|
|
The next day, however, I discovered that our link to the Internet
|
|
was no longer functional. I made countless long distance phone calls
|
|
to Netcom's offices in California. I left messages with receptionists
|
|
for their managers, supervisors and technical support staff. For eight
|
|
full days, nobody at Netcom would take or return my calls. In the
|
|
meantime, Banished CPU's link to the outside world was cut, effectively
|
|
censoring me and all of my callers. I discovered that Netcom was
|
|
DELETING all of my callers' mail, which was in many cases both
|
|
important and irreplaceable.
|
|
|
|
Finally, after 8 days of silence, someone at Netcom called and
|
|
left a message on my answering machine, informing me that Banished CPU
|
|
had been cut off because I posted to newsgroups other than the 12 that
|
|
they had illegally mandated. They violated their contract, bowing to
|
|
the Jewish demands to censor me.
|
|
|
|
Now, almost 3 months after Netcom first censored us, I am still
|
|
unable to procure another Internet connection, even though one small
|
|
Internet provider ("Quicknet") has supposedly been trying to provide
|
|
us with a link. According to Quicknet, some "Internet committee" or
|
|
individual (whose Internet e-mail address is root@internic.net) is
|
|
refusing to process the necessary re-registration form. Censored we
|
|
remain.
|
|
|
|
In the meantime, messages addressed to myself and my callers are
|
|
reportedly still being deleted by Netcom, returning no warning message
|
|
whatsoever -- giving the impression that the messages are received but
|
|
ignored. Netcom continues in their unethical behavior, and is refusing
|
|
to speak to the CBC PrimeTime News.
|
|
|
|
Should you wish to contact Netcom and let them know how you feel
|
|
about their unprofessional behavior, the following information may be
|
|
of some use:
|
|
|
|
|
|
Netcom's address: 400 Moorpark Avenue, Suite 209, San Jose, CA 95117
|
|
Internet e-mail address: root@netcom.com
|
|
Toll-free sales line: 1-800-501-8649
|
|
Technical support line: (408) 983-5970
|
|
Emergency pager number: (408) 951-1193
|
|
|
|
|
|
Sincerely,
|
|
|
|
Dan Gannon (a.k.a. Maynard)
|
|
|
|
___________________________________________________________
|
|
| |
|
|
| Banished CPU supports Freedom of Speech! |
|
|
| (And the Right to Keep and Bear Arms.) |
|
|
| |
|
|
| 28800 bps (9 lines with V.FC)............(503) 232-9202 |
|
|
| 14400 bps (11 lines with V.32bis)........(503) 232-6566 |
|
|
| 9600- bps (12 lines with V.32)...........(503) 232-5783 |
|
|
|___________________________________________________________|
|
|
|
|
------------------------------
|
|
|
|
Date: 09 Feb 95 13:56:58 EST
|
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|
Subject: File 7--Cu In The News
|
|
|
|
Most Computer Intrusions Unreported
|
|
===================================
|
|
The Pentagon's Center for Information Systems Security (CISS) attempts
|
|
to penetrate DoD systems worldwide, via the Internet. The govt hackers
|
|
were able to gain entry to systems 95% of the time, and only 5% of the
|
|
break-ins were detected. Of those, only 5% were reported to higher-ups
|
|
in the organizations.
|
|
ComputerWorld. Jan. 30, 1995 pg.12
|
|
|
|
Spoofing and Hijacking
|
|
======================
|
|
In a related story to the above, Computerworld ran a story about
|
|
CERT's alert concerning IP Spoofing and Session Hijacking. The story
|
|
includes comments from several security specialists, who express
|
|
concern about continued attacks of this type.
|
|
ComputerWorld. Jan. 30, 1995 pg.12
|
|
|
|
InfoTerrorism
|
|
=============
|
|
Sure, hackers are a problem, but what are you going to do about high-
|
|
tech military-style assualts on your datacenter? The miltary-industrial
|
|
complex has several weapons that could (in theory) be used by a disgruntled
|
|
employee or info-terrorist. Items such as high-energy guns that emit data
|
|
destroying pulses, and EMF bombs that paralize your systems, are some
|
|
the technologies that threaten your system. Yet another reason to lay
|
|
awake at night, worrying.
|
|
ComputerWorld. Jan. 30, 1995. pg.1
|
|
|
|
Deadbeat BBS, Beat & Dead
|
|
=========================
|
|
Novell and Microsoft have reached an agreement that will close the Deadbeat
|
|
BBS, located in New Jersey. The teenage-sysop will pay $25,000. in
|
|
damages to the software giants, in restitution for the 60+ Novell and
|
|
MS products that were allegedly available for downloading on the board.
|
|
ComputerWorld. Feb. 6, 1995. pg.8
|
|
|
|
Big Brother *is* Watching
|
|
=========================
|
|
Analytic Concept's "GameCop" software is just what the overseer ordered.
|
|
The program watches active windows on a PC to see if a game is running.
|
|
If one is, a customizable message displays a stern warning for the
|
|
employee to get back to work. GameCop can also, optionally, sound an
|
|
alarm to embarass the slackard in front of their cellmates..err co-workers.
|
|
ComputerWorld. Feb. 6, 1995.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 8 Feb 1995 16:02:41 -0800
|
|
From: Susan Evoy <evoy@PCD.STANFORD.EDU>
|
|
Subject: File 8--Conferences that may be of interest
|
|
|
|
CPSR Members and Friends,
|
|
If you are planning to attend one of these conferences, or another that
|
|
may be related to CPSR's work, please contact CPSR at cpsr@cpsr.org or
|
|
(415) 322-3778 for easy ways for you to be a presence for CPSR.
|
|
|
|
|
|
CONFERENCE /EVENT SCHEDULE
|
|
|
|
National Conference on Ethics in America: Promoting Trust, Truth, and
|
|
Universality, Long Beach, CA, Feb. 22-24.
|
|
Contact: ddavis@csulb.edu 310 985-8222 310 985-5842(fax)
|
|
|
|
Technologies of Freedom: State of the Nation (A conference on the progress of
|
|
the National Information Infrastructure), Washington Court Hotel,
|
|
Washington, DC, Feb. 23-25.
|
|
Contact: holder@apt.org 202 408-1403 202 408-1134 (fax)
|
|
|
|
Midwest Conference on Technology, Employment, and Community, Chicago
|
|
Circle Center, UIC, IL, March 2-4. Contact: jdav@mcs.com 312 996-5463
|
|
|
|
Unions and the Information Superhighway, March 2.
|
|
Contact: 416 441-2731
|
|
|
|
Association for Practical and Professional Ethics Fourth Annual Meeting,
|
|
Stouffer Concourse Hotel, Crystal City, VA, March 2-4.
|
|
Contact: appe@indiana.edu 812 855-6450
|
|
|
|
National STS Meeting and Technology Literacy Conference, Arlington, VA,
|
|
March 2-5. Contact: ejb2@psu.edu 814 865-3044 (ph) 814 865-3047 (fax)
|
|
|
|
Midwest Conference on Technology, Employment, and Community, Chicago, IL,
|
|
March 3-4. Proposals due by Jan. 8.
|
|
Contact: jdav@mcs.com 312 996-5463 (ph) 312 996-5766 (fax)
|
|
|
|
Local-Global Creative Tension, '95 PC Forum, Phoenix, AZ, March 5-8.
|
|
Contact: daphne@edventure.com 212 924-8800 (ph) 212 924-0240 (fax)
|
|
|
|
Technologies for the Superhighway, IEEE COMPCON 95, Stanford Court Hotel,
|
|
San Francisco, CA, March 5-9.
|
|
Contact: egrimes@aol.com (advance program) compcon95@lbl.gov(register)
|
|
510 422-2199 408 973-1325 (fax)
|
|
|
|
Microcomputers in Education Conference, Arizona State University, Tempe, AZ,
|
|
March 13-15. Contact: Pat Southwick, ASU, Box 870908, Tempe, AZ 85287-0908
|
|
|
|
Towards an Electronic Patient Record '95. Orlando, FL. Mar. 14-19,
|
|
1995. Sponsored by Medical Records Institute. Contact: 617-964-3926
|
|
(fax).
|
|
|
|
Access, Privacy, and Commercialism: When States Gather Personal
|
|
Information, College of William and Mary, Williamsburg, VA, March 17.
|
|
Contact: Trotter Hardy 804 221-3826
|
|
|
|
Geographic Information Systems '95, Vancouver, BC, March 27-30.
|
|
Contact: gis@unixg.ubc.ca 604 688-0188 (ph) 604 688-1573 (fax)
|
|
|
|
Computers, Freedom and Privacy CFP'95, Burlingame CA, Mar 28-31
|
|
Contact: info.cfp95@forsythe.stanford.edu
|
|
|
|
ETHICOMP95: An international conference on the ethical issues of using
|
|
Information Technology, DeMontfort University, Leicester, ENGLAND,
|
|
March 28-30, 1995. Contact: Simon Rogerson srog@dmu.ac.uk
|
|
44 533 577475 (phone) 44 533 541891 (Fax).
|
|
|
|
National Net '95: Reaching Everyone. Washington, DC. Apr. 5-7, 1995.
|
|
Sponsored by EDUCOM. Contact: net95@educom.edu or call 202/872-4200.
|
|
|
|
Information Security and Privacy in the Public Sector. Herdon, VA.
|
|
Apr. 19-20, 1995. Sponsored by AIC Conferences. Contact: 212/952-1899.
|
|
|
|
Cultivating New Ground in Electronic Information Use of the Information
|
|
Highway to Support Agriculture - USAIN, Lexington, KY, April 26-29.
|
|
Proposals for solicited papers or project demonstrations by 12/31/94.
|
|
Contact: librgrf@gaes.griffin.peachnet.edu
|
|
|
|
ACM Conference on Computer Human Interaction (CHI'95), Denver, CO,
|
|
May 7-11. Contact 410 263-5382 chi95@sigchi.acm.org
|
|
http://info.sigchi.acm.org/sigchi/chi95.html
|
|
|
|
1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 8-10.
|
|
Contact: sp95@itd.nrl.navy.mil
|
|
|
|
NPTN's Annual Affilate & Organizing Committee Meeting --1995:
|
|
An International Free-Net Community Computing Conference, Arizona State
|
|
University, May 17-20.
|
|
Contact: pfh@nptn.org 216 498-4050 216 498-4051 (fax)
|
|
http://www.nptn.org/
|
|
|
|
ErgoCon '95 - Silicon Valley Ergonomics Conference & Exposition, San Jose, CA,
|
|
May 22-24. Contact: Abbas Moallem 408 924-4132 (ph) 408 924-4153 (fax).
|
|
Proposals for papers, posters, workshops, or panel discussions: Deadline Nov. 1
|
|
|
|
Third International Conference on Artificial Intelligence Applications on Wall
|
|
Street, Pace University, New York, NY, June 7-9.
|
|
Contact: satwell@mcimail.com 914 763-8820 (ph) 914 763-9324 (fax)
|
|
|
|
Identifying Grand Challenges in Socially Responsible Computing, Durango, CO,
|
|
June 11-14. Contact: Ben Shneiderman ben@cs.umd.edu
|
|
|
|
IDT 95 12th Congress - Information Markets and Industries, Paris, FRANCE,
|
|
June 13-15. Organized by ADBS (Society of information professionals), ANRT
|
|
(National Association of Technological Research), and GFII (French association
|
|
of information industries). Contact: 33 1 43 72 25 25 (ph) 33 1 43 72 30 41
|
|
(fax)
|
|
|
|
Workshop on Ethical and Professional Issues in Computing, RPI, Troy, NY,
|
|
June 24-28. Deadline for submissions: April 15.
|
|
Contact: cherkt@rpi.edu 518 276-8503 518 276-2659 (fax)
|
|
|
|
Internet Society's 1995 International Networking Conference, Honolulu, HI,
|
|
June 28-30. Abstract submission deadline Jan 13.
|
|
Contact: http://www.isoc.org/inet95.html inet95@isoc.org 703 648-9888(ph)
|
|
|
|
Key Players in the Introduction of Information Technology: Their Social
|
|
Responsibility and Professional Training, BELGIUM, July 5-7, 1995.
|
|
Contact: nolod@ccr.jussieu.fr clobet@info.fundp.ac.be
|
|
Paper submissions by Nov. 2, 1994
|
|
|
|
Alliance for Community Media's International Conference and Trade Show,
|
|
Boston, MA, July 5-8. Proposal Submissions by 1/31/95.
|
|
Contact: Rika Welsh 617 321-6400 617 321-7121 (fax)
|
|
|
|
18th International Conference on Research & Development in Information
|
|
Retrieval, The Sheraton, Seattle, WA, July 9-11.
|
|
Contact: sigir95@u.washington.edu
|
|
|
|
Joint International Conference Association for Computers and the Humanties-
|
|
Association for Literacy and Linguistic Computing 95, University of California,
|
|
Santa Barbara, July 11-15. Deadline for paper submissions: Dec. 31.
|
|
Contact: Eric Dahlin: hcf1dahl@ucsbuxa.ucsb.edu 805 687-5003
|
|
|
|
Tenth Annual Conference on Computing and Philosophy (CAP), Pittsburgh, PA,
|
|
Aug. 10-12. Contact: Robert Cavalier rc2z@andrew.cmu.edu 412 268-7643
|
|
|
|
Conference on Organizational Computing Systems COOCS '95, Sheraton Silicon
|
|
Valley, Milpitas, Aug. 13-16. Paper Submissions by 1/4/95.
|
|
Contact: kling@ics.uci.edu.
|
|
|
|
Computers in Context: Joining Forces in Design, Aarhus, DENMARK, Aug. 14-18.
|
|
Contributions for papers, proposals for panels, workshops, and tutorials
|
|
(in 6 copies - not by facsimile or e-mail)): Deadline for receipt Jan 5.
|
|
Contact: Computers in Context, Aarhus University, Dept. of Computer Science,
|
|
Bldg. 540, Ny Munkegade 116, DK-8000 Aarhus C, DENMARK.
|
|
|
|
Libraries of the Future - IFLA. Istanbul, TURKEY, Aug. 16-19.
|
|
Contact: mkutup-o@servis.net.tr
|
|
|
|
AI-ED '95: 7th World Conference on Artificial Intelligence in Education,
|
|
Washington, DC, Aug. 16-19. Contact: aace@virginia.edu 804 973-3987
|
|
|
|
"Designing for the Global Village," HFES, Sheraton Harbor Island Hotel,
|
|
Santa Monica, CA, October 9-13.
|
|
Contact: 72133.1474@compuserve.com 310 394-1811 310 394-2410 (fax)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 Oct 1994 22:51:01 CDT
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 25 Nov 1994)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the NIU
|
|
Sociology gopher at:
|
|
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.12
|
|
************************************
|
|
|