819 lines
41 KiB
Plaintext
819 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed Apr 26, 1995 Volume 7 : Issue 33
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Field Agent Extraordinaire: David Smith
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Desecrator: Emo Shrdlu
|
||
|
||
CONTENTS, #7.33 (Wed, Apr 26, 1995)
|
||
|
||
File 1--EPIC On Gov't Guidelines
|
||
File 2-- Lorrie Faith Cranor's CFP95 Conference Report
|
||
File 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd)
|
||
File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: 26 Apr 1995 16:32:35 -0400
|
||
From: "Marc Rotenberg" <rotenberg@EPIC.ORG>
|
||
Subject: FIle 1--EPIC On Gov't Guidelines
|
||
|
||
Electronic Privacy Information Center
|
||
666 Pennsylvania Avenue, S.E.
|
||
Washington, DC 20003
|
||
(202) 544-9240
|
||
info@epic.org
|
||
|
||
|
||
* P R E S S R E L E A S E *
|
||
|
||
|
||
April 27, 1995
|
||
|
||
|
||
EPIC URGES SPECTER TO PROCEED CAUTIOUSLY
|
||
|
||
WASHINGTON -- In a letter sent today to Senator Arlen Specter,
|
||
the Electronic Privacy Information Center, a leading civil
|
||
liberties organization, urged the Congress to proceed cautiously
|
||
in the wake of the tragic bombing incident in Oklahoma. EPIC
|
||
said that "any expansion of federal authority to investigate
|
||
political activity could have a profound impact upon
|
||
communication networks and the future of electronic democracy."
|
||
Senator Specter is holding hearings tomorrow on counter-terrorism
|
||
proposals.
|
||
|
||
The EPIC letter focused on the history of the Attorney
|
||
General guidelines which permit the government to conduct
|
||
investigations of domestic organizations. The original
|
||
guidelines were issued in 1976 by Attorney General Edward Levi.
|
||
The "Levi Guidelines," as they came to be known, recognized the
|
||
FBI's legitimate investigative needs while seeking to protect the
|
||
First Amendment rights of dissident politic organizations. The
|
||
Guidelines were promulgated in the wake of Watergate and the
|
||
revelations of the Senate's Church Committee investigation.
|
||
According to EPIC, the Levi Guidelines reflected the post-
|
||
Watergate consensus that the investigation of controversial or
|
||
unpopular political groups had at times been overzealous and had
|
||
violated fundamental constitutional rights.
|
||
|
||
In 1983 President Reagan's Attorney General, William French
|
||
Smith, issued a new set of guidelines that replaced the Levi
|
||
Guidelines. The "Smith Guidelines" were far less restrictive
|
||
than the Levi Guidelines. As President Reagan's FBI Director
|
||
William Webster said, the Smith Guidelines "should eliminate any
|
||
perceptions that actual or imminent commission of a violent crime
|
||
is a prerequisite to investigation."
|
||
|
||
The critical section of the Smith Guidelines cited in the
|
||
EPIC letter provides that "[a] domestic security/terrorism
|
||
investigation may be initiated when facts or circumstances
|
||
reasonably indicate that two or more persons are engaged in an
|
||
enterprise for the purpose of furthering political or social
|
||
goals wholly or in part through activities that involve force or
|
||
violence and a violation of the criminal laws of the United
|
||
States."
|
||
|
||
EPIC said that "the current guidelines provide the FBI with
|
||
ample authority to initiate investigations of organizations and
|
||
individuals similar to those alleged to have been involved in the
|
||
Oklahoma City bombing." EPIC noted that public information
|
||
concerning paramilitary right-wing organizations in general --
|
||
and the Michigan Militia in particular -- has been readily
|
||
available to the FBI and other law enforcement agencies for some
|
||
time. EPIC also noted that former Attorney General Griffin Bell
|
||
and former Assistant Attorney General Victoria Toensing have
|
||
recently expressed the view that the FBI possessed sufficient
|
||
authority under the Smith Guidelines to investigate and monitor
|
||
the activities of this organization and affiliated individuals.
|
||
|
||
Finally, EPIC urged Senator Specter to give similar careful
|
||
consideration to any proposals for the modification of the
|
||
wiretap statute or privacy statutes that would diminish the
|
||
freedoms that all American currently enjoy.
|
||
|
||
Earlier this year, EPIC recommended that Congress not
|
||
appropriate $500 million for a national wiretap program developed
|
||
by the FBI. EPIC said that the program would increase the
|
||
vulnerability of the nation's communications infrastructure.
|
||
EPIC said today that it will continue to oppose funding of the
|
||
program.
|
||
|
||
|
||
|
||
-30-
|
||
|
||
ELECTRONIC PRIVACY INFORMATION CENTER
|
||
WASHINGTON, DC
|
||
INFO@EPIC.ORG
|
||
|
||
April 26, 1995
|
||
|
||
Honorable Arlen Specter
|
||
Chairman
|
||
Judiciary Subcommittee on Terrorism,
|
||
Intelligence and Gov't Information
|
||
United States Senate
|
||
161 Dirksen Office Building
|
||
Washington, DC 20510
|
||
|
||
Dear Senator Specter:
|
||
|
||
We write on behalf of the Electronic Privacy Information
|
||
Center ("EPIC"), a non-profit research organization concerned with
|
||
the protection of privacy and civil liberties. We are particularly
|
||
interested in the preservation of Constitutional freedoms in the
|
||
evolving communications infrastructure. Increasingly, the Internet
|
||
and other digital systems facilitate the expression of political
|
||
opinions and have, in effect, become the electronic town squares
|
||
of our information society. For this reason, EPIC believes that
|
||
any expansion of federal authority to investigate political
|
||
activity and/or expression could have a profound impact upon those
|
||
networks and the future of electronic democracy.
|
||
|
||
As the Committee begins its examination of the tragic events
|
||
in Oklahoma City, we urge careful and deliberate consideration of
|
||
any proposal that would alter current guidelines governing the
|
||
investigation and monitoring of domestic political activity or the
|
||
collection and use of personal information. The Congress must be
|
||
careful not to compromise fundamental constitutional values as it
|
||
seeks to address the obvious security concerns in the wake of
|
||
recent events. As Justice Powell observed in the Keith case:
|
||
|
||
History abundantly documents the tendency of Government
|
||
-- however benevolent and benign its motives -- to view
|
||
with suspicion those who most fervently dispute its
|
||
policies. [Constitutional] protections become the more
|
||
necessary when the targets of official surveillance may
|
||
be those suspected of unorthodoxy in their political
|
||
beliefs. The danger to political dissent is acute where
|
||
the Government attempts to act under so vague a concept
|
||
as the power to protect "domestic security." Given the
|
||
difficulty of defining the domestic security interest,
|
||
the danger of abuse in acting to protect that interest
|
||
becomes apparent.
|
||
|
||
United States v. United States District Court, 407 U.S. 297, 314
|
||
(1972).
|
||
|
||
In order to assess whether it is necessary to make changes in
|
||
the current policies concerning the investigation of domestic
|
||
organizations, we believe it is necessary to look closely at the
|
||
history of federal investigative authority. As you know, the
|
||
evolution of the current requirements governing the FBI's conduct
|
||
of domestic security investigations dates back to 1976. In that
|
||
year, President Ford's Attorney General, Edward Levi, issued
|
||
"Guidelines on Domestic Security Investigation," which came to be
|
||
known as the "Levi Guidelines." This directive, which recognized
|
||
the FBI's legitimate investigative needs while seeking to protect
|
||
the First Amendment rights of dissident politic organizations, was
|
||
promulgated in the wake of Watergate and the revelations of the
|
||
Senate's Church Committee investigation./1/ The Levi Guidelines
|
||
reflected the post-Watergate consensus that the investigation of
|
||
controversial or unpopular political groups had at times been
|
||
overzealous and had violated fundamental constitutional rights./2/
|
||
|
||
Seven years later, in 1983, the Levi Guidelines were
|
||
superseded by the "Attorney General's Guidelines on General
|
||
Crimes, Racketeering Enterprise and Domestic Security/Terrorism
|
||
Investigations," issued by Attorney General William French Smith
|
||
(the "Smith Guidelines"). The revised guidelines were generally
|
||
considered to be far less restrictive than the Levi Guidelines.
|
||
As FBI Director William Webster noted at the time of their
|
||
issuance, the Smith Guidelines "should eliminate any perceptions
|
||
that actual or imminent commission of a violent crime is a
|
||
prerequisite to investigation."/3/
|
||
|
||
The guidelines provide, in pertinent part, that
|
||
|
||
[a] domestic security/terrorism investigation may be
|
||
initiated when facts or circumstances reasonably indicate
|
||
that two or more persons are engaged in an enterprise for
|
||
the purpose of furthering political or social goals wholly
|
||
or in part through activities that involve force or
|
||
violence and a violation of the criminal laws of the
|
||
United States.
|
||
|
||
Smith Guidelines (reprinted in 32 Crim. L. Rep. (BNA) 3087
|
||
(1983)), Section III (B)(1). The standard of "reasonable
|
||
indication" is
|
||
|
||
substantially lower than probable cause. In determining
|
||
whether there is reasonable indication of a federal
|
||
criminal violation, a Special Agent may take into account
|
||
any facts or circumstances that a prudent investigator
|
||
would consider. However, the standard does require
|
||
specific facts indicating a past, current, or impending
|
||
violation. There must be an objective, factual basis for
|
||
initiating the investigation; a mere hunch is insufficient.
|
||
|
||
Id., Section II (C)(1).
|
||
|
||
Given the constitutional command that the government may not
|
||
suppress or punish statements advocating criminal activity unless
|
||
they pose an immediate and substantial danger to public safety,
|
||
Brandenburg v. Ohio, 395 U.S. 444 (1969), the Smith Guidelines
|
||
afford the FBI considerable leeway in pursuing investigations of
|
||
potential violent crime. In a 1984 en banc opinion interpreting
|
||
the Smith Guidelines, the Seventh Circuit Court of Appeals found
|
||
that the directive strikes an appropriate balance between First
|
||
Amendment rights and legitimate law enforcement. As Judge Posner
|
||
wrote for the court,
|
||
|
||
[the FBI] may not investigate a group solely because
|
||
the group advocates [an unpopular cause]; but it may
|
||
investigate any group that advocates the commission, even
|
||
if not immediately, of terrorist acts in violation of
|
||
federal law. It need not wait until the bombs begin to
|
||
go off, or even until the bomb factory is found.
|
||
|
||
Alliance to End Repression v. City of Chicago, 742 F.2d 1007, 1015
|
||
(7th Cir. 1984).
|
||
|
||
Thus, the current guidelines provide the FBI with ample
|
||
authority to initiate investigations of organizations and
|
||
individuals similar to those alleged to have been involved in the
|
||
Oklahoma City bombing. In reaching this conclusion, we note that
|
||
a good deal of public source material concerning paramilitary
|
||
right-wing organizations in general -- and the Michigan Militia in
|
||
particular -- has been readily available to the FBI and other law
|
||
enforcement agencies for some time. For instance, a front page
|
||
article about the Michigan Militia in the Detroit Free Press last
|
||
fall reported:
|
||
|
||
Their goal is to keep the U.S. government in check,
|
||
through threat of armed rebellion if need be. Gun control
|
||
advocates, federal firearms agents and the United Nations
|
||
are among the perceived threats. ...
|
||
|
||
Federal officials are aware of these groups, but "we
|
||
are not monitoring their growth," said Stanley Zimmerman,
|
||
head of the Detroit office of the federal Bureau of Alcohol,
|
||
Tobacco and Firearms. "It would be our preference that the
|
||
militia groups would use the power of the vote rather than
|
||
the threat of armed violent confrontation to accomplish
|
||
their goals."
|
||
|
||
"They Cite their Disgust with Government," Detroit Free Press,
|
||
October 13, 1994, at 1A.
|
||
|
||
Indeed, the Justice Department was specifically alerted to
|
||
the activities of the Michigan Militia. Morris Dees, director of
|
||
the Southern Poverty Law Center, disclosed in a recent interview
|
||
that:
|
||
|
||
We warned Attorney General Reno in a letter last October
|
||
concerning this Militia of Michigan, the one that's
|
||
involved in this case, and pointed out that they should
|
||
be checking on them. ... [T]hese people, like Mark Koernke,
|
||
are out actually advocating the overthrow of the United
|
||
States government with individuals who are practicing and
|
||
training with explosives, with assault weapons.
|
||
|
||
ABC News, "This Week with David Brinkley," April 23, 1995.
|
||
|
||
In recent comments concerning the adequacy of the Smith
|
||
Guidelines, former Attorney General Griffin Bell and former
|
||
Assistant Attorney General Victoria Toensing have expressed the
|
||
view that the FBI possessed sufficient authority to investigate
|
||
and monitor the activities of this organization and affiliated
|
||
individuals. This conclusion is consistent with the observation
|
||
of former FBI Director Webster, noted above, that the current
|
||
guidelines "should eliminate any perceptions that actual or
|
||
imminent commission of a violent crime is a prerequisite to
|
||
investigation." As you commence your review into this matter, we
|
||
strongly urge you to consider the views of many experts who share
|
||
the opinion of these former officials.
|
||
|
||
We urge you also to give similar careful consideration to any
|
||
proposals for the modification of the wiretap statute or privacy
|
||
statutes that would diminish the freedoms that all Americans
|
||
currently enjoy. Any such proposal must be carefully drafted to
|
||
address specific and identifiable harms. We urge you also to
|
||
proceed cautiously in the area of electronic communications. Our
|
||
country is in the process of developing the communication tools
|
||
that will take us into the next century. While we share the
|
||
President's belief that irresponsible speech should be opposed by
|
||
responsible speech, we do not believe that enhanced surveillance
|
||
of lawful activity by American citizens will serve the country
|
||
well.
|
||
|
||
Political and associational rights form the foundation of our
|
||
democratic society. As the Committee and Congress examine the
|
||
nation's contemporary security needs, the temptation to find
|
||
expedient quick fixes must be resisted. Issues as fundamental as
|
||
the ones you propose to address deserve and demand a thorough and
|
||
open national debate. We look forward to working with you and the
|
||
Committee as you consider these difficult questions.
|
||
|
||
|
||
Sincerely,
|
||
|
||
|
||
|
||
|
||
Marc Rotenberg, Director David L. Sobel, Legal Counsel
|
||
|
||
|
||
|
||
|
||
|
||
cc: Sen. Fred Thompson
|
||
Sen. Spencer Abraham
|
||
Sen. Strom Thurmond
|
||
Sen. Herbert Kohl
|
||
Sen. Patrick Leahy
|
||
Sen. Dianne Feinstein
|
||
|
||
==================================================================
|
||
|
||
Notes
|
||
|
||
/1/ See, generally, Final Report of the Senate Select
|
||
Committee to Study Governmental Operations with Respect to
|
||
Intelligence Activities, S. Rep. 755, 94th Cong., 2d Sess. (1976).
|
||
|
||
/2/ Although some critics maintained that the guidelines were
|
||
unduly restrictive, Attorney General Levi explained that they
|
||
authorized the initiation of an investigation on the basis of a
|
||
relatively benign statement such as "The rulers have set the time
|
||
for the party; let us bring the fireworks," delivered by a group
|
||
with no known propensity for violence. Alliance to End Repression
|
||
v. City of Chicago, 742 F.2d 1007, 1012 (7th Cir. 1984) (quoting
|
||
Congressional testimony of Attorney General Levi).
|
||
|
||
/3/ Alliance to End Repression v. City of Chicago, 561 F.
|
||
Supp. 575, 578 n.5 (N.D. Ill. 1983) (quoting internal FBI
|
||
memorandum).
|
||
====================
|
||
Marc Rotenberg (Rotenberg@epic.org) * 202-544-9240 (tel)
|
||
Electronic Privacy Information Center * 202-547-5482 (fax)
|
||
666 Pennsylvania Ave, SE, Suite 301 * ftp/gopher/wais cpsr.org
|
||
Washington, DC 20003 * HTTP://epic.digicash.com/epic
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 24 Apr 1995 01:22:02 -0500
|
||
From: jim thomas <tk0jut1@CS.NIU.EDU>
|
||
Subject: FIle 2-- Lorrie Faith Cranor's CFP95 Conference Report
|
||
|
||
Lorrie Faith Cranor's CFP95 Conference Report
|
||
|
||
-----------------------------------------------------------------
|
||
Copyright 1995 by Lorrie Faith Cranor. Permission to distribute this
|
||
report electronically is granted, provided you do not distribute it
|
||
for direct commercial advantage. This report is a description of
|
||
CFP95 as I experienced it. The unattributed opinions liberally
|
||
sprinkled throughout are, of course, my own.
|
||
-------------------------------------------------------------------
|
||
|
||
I attended the Fifth Conference on Computers, Freedom and Privacy
|
||
(http://www-techlaw.stanford.edu/CFP95.html) March 28 through 31 at
|
||
the San Francisco Airport Marriott Hotel. Having thoroughly enjoyed
|
||
the previous two CFP conferences, I had been looking forward to CFP95
|
||
for quite some time -- and I was not disappointed.
|
||
|
||
The conference began on March 28 with a full day of tutorial programs.
|
||
I arrived too late to attend the tutorials, but in time to enjoy an
|
||
evening ice cream reception and meet some of the other attendees. The
|
||
informal discussions I began that evening and which I continued
|
||
between sessions throughout the conference proved to be as valuable as
|
||
the formal sessions.
|
||
|
||
The main part of the CFP95 program got off to a slow start on March
|
||
29 with keynote speaker John Morgridge, chairman of the board of Cisco
|
||
systems. Morgridge described the current status of computer networks
|
||
as "the era of use," in which we will have to address more difficult
|
||
issues than we faced while we were just concentrating on "the
|
||
plumbing." But he failed to shed much light on what these issues are
|
||
or how we might face them.
|
||
|
||
The next session, "Student Databases: For Education and For Life,"
|
||
proved more enlightening and quite controversial. Barbara Clements,
|
||
Council of Chief State School Officers, outlined the advantages of
|
||
electronic student records databases over the traditional paper filing
|
||
systems. She argued that electronic systems are more accurate, take
|
||
up less space, and are more secure. In addition, if these systems
|
||
follow standard conventions they can make it much easier for
|
||
information to be transfered between schools. But panelist Anita
|
||
Hoge, was quite critical of standardized student information
|
||
databases, especially those that contain information obtained through
|
||
standardized tests. She described an exam given to her son in a
|
||
Pennsylvania public school. Hoge said this "Educational Quality
|
||
Assessment" was designed to measure predispositions of students
|
||
towards certain types of behaviors. For example, the exam described a
|
||
hypothetical situation in which the student's friends were planning an
|
||
outing to spray paint graffiti around town. The student is asked
|
||
whether he or she would go along. A negative response is interpreted
|
||
as a predisposition towards anti-social behavior. According to Hoge,
|
||
the results of this exam can be used to identify students with mental
|
||
and behavioral disorders, classify them as special education students,
|
||
send this information to the government, and make the students
|
||
eligible for Medicaid. While most of the audience probably agreed
|
||
with Hoge that such exams are inappropriate, many people were not
|
||
convinced by Hoge's conclusion that the use of standardized exams and
|
||
standardized student information databases was the first step in the
|
||
government's effort to sneak socialized health care through the back door.
|
||
|
||
Stanford Law Professor Margaret Jane Radin gave an interesting lunch
|
||
time presentation that inspired fish jokes throughout the rest of the
|
||
conference. Radin described two property rights paradigms and
|
||
discussed the advantages and disadvantages of applying them in
|
||
cyberspace. Traditionally, intellectual property has been considered
|
||
a form of economic property that could be bought and sold in a free
|
||
market. However, land (especially the land on which the family home
|
||
is built) has been considered a form of property that has
|
||
personal value beyond the monetary value that can be obtained by
|
||
selling it. She also speculated that as more people flock to
|
||
cyberspace, the Internet may evolve into something similar to what
|
||
broadcast TV has become. She described the TV audience as "potential
|
||
customers delivered to advertisers for a fee." Thus, she explained,
|
||
the TV broadcast industry is a giant commercial fishing industry. "It
|
||
would be good if cyberspace doesn't turn us into fish," she concluded.
|
||
|
||
A panel discussion on Intelligent Transportation Systems raised some
|
||
important privacy considerations, but was not nearly as provocative as
|
||
the next two sessions of the day: "Transaction Records In Interactive
|
||
Services" and "A Case Against Computers." The transaction records
|
||
panelists debated a variety of issues including who owns personal
|
||
information records (the person who provides them or the organization
|
||
that collects them), the merits of "opt-in" and "opt-out" privacy
|
||
protection systems, and where the responsibility for privacy
|
||
violations should rest.
|
||
|
||
The Case Against Computers session, dubbed the "luddite session,"
|
||
featured four panelists critical of computer technology. Jerry Mander
|
||
began by reminding everyone that people used to get along just fine
|
||
without computers. He suggested that contrary to what electronic
|
||
activists claim, computers help people feel more powerful, but are not
|
||
actual instruments of empowerment. Rather, he argued, computers
|
||
enforce centralized power structures that take power out of the hands
|
||
of individuals. In addition he was critical of the fact that computer
|
||
professionals do not receive training on how to critique computers.
|
||
Finally, he expressed dismay at the way computers and other new
|
||
technologies have been accepted by the public without debate or
|
||
consideration of their downsides. Panelist Ted Roszak then discussed
|
||
the fact that most computer users are not computer experts -- and
|
||
don't wish to be. He urged computer experts to remember that when
|
||
designing computer systems. Panelist Chet Bowers gave a very academic
|
||
presentation that was probably lost on most of the audience. The
|
||
point of his presentation seemed to be that we were not properly
|
||
considering the cultural impact of computers. Richard Sclove, the
|
||
only panelist with an email address (or at least the only one who
|
||
mentioned it), reminded us that information technology effects
|
||
everyone, even people who don't use computers. Although the panelists
|
||
raised some excellent points, I don't think this panel did a very good
|
||
job of addressing their audience. The panelists came across as a
|
||
bunch of middle-aged (or older) academic luddites, a characterization
|
||
that won them little respect or credibility with the techies in the
|
||
audience. In fact, during the Q & A period one audience member (who
|
||
seemed to have missed the point of the presentation entirely) asked
|
||
the panel, "Are you guys not getting it? What are you missing?"
|
||
|
||
The day's panel discussions were followed by the Electronic Frontier
|
||
Foundation (http://www.eff.org) Pioneer Awards presentation, an
|
||
EFF-sponsored reception, and dinner. At dinner each table was given a
|
||
question to discuss and answer, with prizes being awarded for the best
|
||
answers. Some tables took this quite seriously while others resented
|
||
being told what to talk about and submitted answers more humorous than
|
||
insightful (my own table taking the latter approach).
|
||
|
||
The next day of conference sessions began with a panel titled "Defining
|
||
Access Paradigms: Libraries, Rural Areas, and International Aspects."
|
||
While not particularly controversial, the panel addressed some
|
||
interesting problems. Karen Coyle of the University of California
|
||
described the free lending library as a product of the print
|
||
world. She explained that libraries generally purchase books but
|
||
lease electronic materials -- sometimes on a per-use basis. If
|
||
libraries had to pay per-use fees on all their materials, they would
|
||
likely have to pass some of these fees onto their patrons. In
|
||
addition libraries face problems in distributing electronic
|
||
information to patrons who want to take the information with them.
|
||
Panelist Christine Borgman's warning against causing a situation in
|
||
which only the elite have access to knowledge, led one audience member
|
||
to question whether technology really widens the knowledge gap. He
|
||
cited as evidence the fact that he as access to as much information as
|
||
a millionaire has. Apparently it didn't occur to this gentleman
|
||
(probably a member of the middle class) that he is a member of the
|
||
information elite, not the information poor.
|
||
|
||
The next session, "A Net for All: Where Are the Minorities?", featured
|
||
an interesting discussion of efforts to bring the Net to minority and
|
||
underprivledged populations. Art McGee of the Institute for Global
|
||
Communications described the famous New Yorker cartoon featuring one
|
||
dog introducing another dog to the Internet. The cartoon caption
|
||
reads, "On the Internet, nobody knows you're a dog." This led McGee to
|
||
comment that the second dog should have asked, "What's wrong with
|
||
being a dog?". He added that technology gives people the power to
|
||
express themselves in their own voices, without having their messages
|
||
spun by the media. But he reminded the audience that there are still
|
||
a lot of illiterate people and "all the computers in the world won't
|
||
help them if they can't read." Panelist Barbara Simons added that the
|
||
computer revolution has had a negative impact on uneducated people
|
||
because there are now fewer unskilled jobs.
|
||
|
||
An afternoon of discussion on "Freedom and Responsibility of Electronic
|
||
Speech" followed lunch, an address by Esther Dyson, and a panel
|
||
discussion on online activism. The electronic speech discussion began
|
||
with presentations from three individuals who have been involved in
|
||
freedom of electronic speech disputes. Brock Meeks, who was sued for
|
||
defamation because of something he posted as part of an online
|
||
newsletter (http://cyberwerks.com:70/1/cyberwire), discussed his case.
|
||
Because the case was settled out of court, it sets no legal precedent,
|
||
but Meeks proposed that people who enter into a discussion on the
|
||
Internet should be considered "public figures" who cannot be easily
|
||
libeled. He suggested the public figure characterization is
|
||
appropriate because Internet discussion participants have easy access
|
||
to the same public forum as those who might try to defame them. Jean
|
||
Camp (http://www.cs.cmu.edu/afs/cs/user/jeanc/www/home.html), a
|
||
doctoral student at Carnegie Mellon University discussed CMU's
|
||
censorship of sexually explicit Usenet newsgroups
|
||
(http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/index.html). Roger
|
||
Karraker, a journalism professor who maintained an electronic
|
||
conferencing system at Santa Rosa Junior College, described a case in
|
||
which a female student filed a sex discrimination complaint against
|
||
him after hearing that derogatory remarks had been made against her on
|
||
a men-only discussion group. Karraker said one of the mistakes he
|
||
made with the conferencing system was in describing it as an extension
|
||
of the student newspaper, because newspaper publishers are responsible
|
||
for their content. Karraker said individuals should be responsible
|
||
for their own speech in electronic discussion groups.
|
||
|
||
The second half of the electronic speech discussion took the form of a
|
||
"Socratic forum" (somewhat like a TV talk show) led by Stanford Law
|
||
Professor Kim Taylor-Thompson. Taylor-Thompson described hypothetical
|
||
situations and posed questions to the nine panelists. The discussion
|
||
was animated and brought out some interesting ideas. However, too
|
||
much of the debate was between the lawyers on the panel. CMU student
|
||
Donna Riley -- whose introduction as the founder of the feminist
|
||
Clittoral Hoods
|
||
(http://www.cs.cmu.edu/afs/cs/user/kcf/www/censor/misc/clitoral-hoods-announ
|
||
ce.html)
|
||
organization brought a startled reaction from the audience -- and Ira
|
||
Kaufman of the Anti-Defamation League could hardly get a word in.
|
||
|
||
The second day of the conference concluded with a dinner speech by
|
||
Roger Wilkins and an evening of Birds of a Feather sessions. Probably
|
||
the most well-attended BOF was the public forum on cryptography
|
||
policy. Members of the National Research Council cryptography
|
||
committee listened and took notes as conference attendees expressed
|
||
their concerns.
|
||
|
||
The final day of CFP95 began too early in the morning with an 8 am
|
||
talk by Willis Ware. The audience was sparse and sleepy from two
|
||
nights of BOFs which ran until midnight (followed by informal
|
||
discussions which ended early in the morning). Most of the conference
|
||
attendees had dragged themselves out of bed in time for the next
|
||
session: Can We Talk Long Distance? Removing Impediments to Secure
|
||
International Communications. This panel was of particular
|
||
interest to many of the audience members. While most of the
|
||
discussion centered around issues which have been brought up
|
||
repeatedly over the past few years, Cypherpunk Tim May summed things
|
||
up nicely by characterizing the encryption controversy as a debate
|
||
between those who feel that their communication is "none of your
|
||
damn business" versus those who ask, "What have you got to hide?".
|
||
|
||
A session on copyright and the Net included an interesting discussion
|
||
about how copyright should be enforced in cyberspace. In response to
|
||
often-repeated claims that it is not possible to enforce copyright
|
||
laws on the Net, Attorney Lance Rose pointed out that intelligent
|
||
software agents that can be programmed to search the Net for certain
|
||
types of news can also be programmed to search the Net for copyright
|
||
infringements. Michael Kepplinger of the U.S. Patent and Trademark
|
||
Office and Law Professor Pamela Samuelson debated the "Green Paper"
|
||
produced by the Working Group on Intellectual Property Rights.
|
||
Samuelson criticized the Green Paper authors for assuming that there
|
||
will not be any useful content on the Internet until Congress passes
|
||
strict intellectual property laws. However, she said that people are
|
||
already finding useful information on the Internet. She was also
|
||
critical of the Green Paper for suggesting that online service
|
||
providers should be held strictly liable for copyright infringement.
|
||
Kepplinger denied that the Green Paper included strict liability
|
||
language. Brad Templeton of ClariNet Communications Corp. followed up
|
||
by asserting that most people respect copyright, regardless of whether
|
||
or not it is enforced. Templeton, whose company provides Associated
|
||
Press and other news feeds over the Internet, said that ClariNet
|
||
has been profitable under the current copyright laws.
|
||
|
||
Lenny Foner (http://foner.www.media.mit.edu/people/foner/), a graduate
|
||
student at the MIT Media Lab and the winner of the CFP95 Student Paper
|
||
Competition, presented his research on agents during lunch. Foner
|
||
described a "matchmaker" system he is developing that is designed to
|
||
demonstrate the feasibility of a large scale distributed system in
|
||
which it is essential to build in privacy. Lenny's research is
|
||
interesting for its technological goals as well as its political
|
||
goals.
|
||
|
||
By the afternoon of the last day of the conference, a large portion of
|
||
conference attendees had migrated from their chairs to the floor in
|
||
the back of the conference hall. Students, journalists, long-haired
|
||
hackers, and libertarians camped out with backpacks and laptops on
|
||
the audio platform and the surrounding floor space. One gentleman
|
||
fell asleep, but was woken by a journalist when he started to snore.
|
||
At one point Conference Chair Carey Heckman pointed out that there
|
||
were plenty of empty seats towards the front, but nobody in the back
|
||
moved forward.
|
||
|
||
A session titled "It Oughta Be a Crime" kicked off an afternoon filled
|
||
with some of the most interesting sessions of the conference. Scott
|
||
Charney of the Justice Department opened his remarks by reminding the
|
||
audience that "there is always a percentage of the population up to no
|
||
good." Although only a small percentage of those up to no good are
|
||
currently computer literate, 30 years from now everyone is likely to
|
||
be computer literate, he said. He added that there are some types of
|
||
behavior -- such as extortion and wire fraud -- that is clearly
|
||
criminal conduct, however, there are other types of behavior that fall
|
||
into grey areas. For example, some people don't think breaking into a
|
||
computer system to look at files should be considered criminal if the
|
||
intruder does not change or remove any of the files. However, Charney
|
||
pointed out that companies that discover break-ins end up spending a
|
||
lot of time checking all their files to make sure none have been
|
||
changed or removed. This can be both inconvenient and quite
|
||
expensive. Santa Clara District Attorney Ken Rosenblatt discussed
|
||
statements by some people (including writer Bruce Sterling) that
|
||
police have no business on the Net because electronic conflicts are
|
||
more a "cultural war" than criminal behavior. However, Rosenblatt
|
||
said that all laws are an expansion of cultural norms. Panelist Mark
|
||
Traphagan of the Software Publishers Association concluded the session
|
||
with a discussion of copyright infringement. He claimed that China
|
||
has a 99 percent piracy rate making it "virtually a one-copy country."
|
||
This session brought much disagreement from the audience members, some
|
||
of whom interrupted the speakers. This prompted CFP founder Jim Warren
|
||
to remind the audience that all sides need to be heard.
|
||
|
||
Many conference attendees anticipated that the session titled "Who
|
||
Owns the Law? The Debate Over Legal Citation Form and What It Means"
|
||
would only be interesting to lawyers. However this session proved to
|
||
be the most animated of the entire conference. After the four
|
||
panelists gave their opening statements, Glenn Tenney of Fantasia
|
||
Systems Inc. gave each of them five minutes in which to question the
|
||
other panelists. This format provoked a lively debate about the
|
||
U.S. legal citation system. Jamie Love of the Taxpayers Assets
|
||
Project complained that West Publishing's page numbers must be
|
||
used when citing most court opinions. Because one cannot determine
|
||
the West pagination from the official court documents, one must visit
|
||
a law library or pay online charges to West to find the complete
|
||
citations. With an increasing amount of legal research being
|
||
conducted online, this can get very expensive. However, West argues
|
||
that they spend a lot of time verifying the accuracy of the opinions
|
||
they publish and should be compensated for their work. Besides, they
|
||
say, it is not their fault that the courts do not provide accurate
|
||
copies of their opinions that can be cited in legal proceedings.
|
||
|
||
The final CFP95 session featured several presentations about
|
||
anonymity, pseudonyms, and the technologies that make such things
|
||
possible. To illustrate the use of pseudonyms, some of the panelists
|
||
replaced the names on their name badges and exchanged name cards.
|
||
Leading moderator Roger Clarke to introduce panelists Gary Marx and
|
||
Kent Walker as "Kent and or Gary." David Chaum described the
|
||
electronic cash products being developed by his company, DigiCash.
|
||
Writer Steven Levy then gave an excellent presentation on anonymous
|
||
remailers. Science Fiction Writer David Brin wrapped things up with
|
||
some thoughts on the conference as a whole. After this session, the
|
||
chairs of all five CFP conferences commented on the past and future of
|
||
CFP.
|
||
|
||
Plans are already underway for CFP96 (http://web.mit.edu/cfp96) to be
|
||
held March 27-30, 1996 in Boston.
|
||
|
||
-- Lorrie Faith Cranor (lorracks@cs.wustl.edu)
|
||
April 3, 1995
|
||
|
||
|
||
/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
|
||
|
||
Lorrie Faith Cranor Engineering and Policy, Computer Science
|
||
Washington University http://dworkin.wustl.edu/~lorracks/
|
||
1 Brookings Dr Box 1045
|
||
St. Louis, MO 63130 "UNLESS someone like you cares a whole awful lot,
|
||
lorracks@cs.wustl.edu nothing is going to get better. It's not." -Dr.Seuss
|
||
|
||
Look for the Crossroads special issue on computers and society,
|
||
available May 1 from http://info.acm.org/crossroads/
|
||
|
||
Students: Are you doing interdisciplinary research related to
|
||
computers and society? Are you interested in joining an
|
||
online discussion group to exchange ideas with other students?
|
||
Send me email for more information.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 26 Apr 1995 00:10:14 -0500 (CDT)
|
||
From: David Smith <bladex@BGA.COM>
|
||
Subject: FIle 3--DEATH ROW INMATE GETS HOME PAGE ON INTERNET (fwd)
|
||
|
||
---------- Forwarded message ----------
|
||
|
||
DEATH ROW INMATE GETS HOME PAGE ON THE INTERNET
|
||
|
||
Illinois death row inmate Girvies Davis, who is scheduled to
|
||
be executed by lethal injection on May 17, 1995, has become the first
|
||
death row prisoner in the United States to take his case directly to
|
||
the people on the Internet. Girvies' home page went online April 24,
|
||
1995.
|
||
|
||
For the first time since Illinois re-enacted the death
|
||
penalty in 1977, the State is faced with the very real likelihood of
|
||
executing a man for a crime he did not commit. Internet users can
|
||
learn more about the facts surrounding Girvies' conviction and death
|
||
sentencing by accessing his home page at:
|
||
|
||
http://www.mcs.net/~bkmurph/girvies.htm
|
||
|
||
Girvies was convicted and sentenced to death in 1980 for a crime
|
||
in which -- in all probability -- he had no involvement at all.
|
||
Girvies' home page contains links to his clemency petition to the
|
||
Governor, articles written about his plight, "evidence" that Internet
|
||
users can examine for themselves, pictures and audio of Girvies, and
|
||
the e-mail address of Illinois Governor Jim Edgar, who holds Girvies'
|
||
fate in his hands.
|
||
|
||
For more information, contact Mr. Davis' attorneys via
|
||
electronic mail at bkmurph@mcs.net or contact Brian Murphy or David
|
||
Schwartz at (312) 222-9350.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: FIle 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
||
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
In ITALY: Bits against the Empire BBS: +39-464-435189
|
||
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
||
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
||
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #7.33
|
||
************************************
|
||
|