852 lines
42 KiB
Plaintext
852 lines
42 KiB
Plaintext
|
|
Computer underground Digest Sun Jun 4, 1995 Volume 7 : Issue 45
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Tibia Editor: Who built the Seven Towers of Thebes?
|
|
|
|
CONTENTS, #7.45 (Sun, Jun 4, 1995)
|
|
|
|
File 1--(fwd) Christian American article on Pornography Online
|
|
File 2--Ban Nothing, Question Everything (Eye Reprint)(fwd)
|
|
File 3--Some Questions for Canter and Siegel in re Their Book
|
|
File 4--Student Loses Scholarship. We All Lose A Little Freedom
|
|
File 5--Library of Congress Signs Nat'l Dig Library Fed Agreement
|
|
File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Fri, 19 May 1995 20:12:10 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 1--(fwd) Christian American article on Pornography Online
|
|
|
|
CHRISTIAN AMERICAN
|
|
|
|
MAY/JUNE 1995
|
|
|
|
TECHNO-PREDATORS Computer Porn Invades Homes
|
|
|
|
Editor's note: Pornography victimizes women and entices young people.
|
|
This article contains graphic information about the growing
|
|
availability of pornographic pictures via computer bulletin boards
|
|
and the Internet. Christian American hopes this information will be
|
|
useful to parents and others who wish to safeguard their computers
|
|
from this growing threat.
|
|
|
|
By Jeffrey M. Peyton
|
|
|
|
Youth pastor Tim McNabb used to love browsing through the Internet, a
|
|
world-wide computer network, in search of electronic "pen pals."
|
|
|
|
"I've had some of the most stimulating theological discussions ever
|
|
with some people on the net," he said. "But more and more, I was
|
|
having to wade through so much garbage to find someone who really
|
|
wanted to talk."
|
|
|
|
One day McNabb was having a theological conversation with a young
|
|
woman who kept trying to turn the conversation in a
|
|
sexually-suggestive direction. McNabb, who is married with children,
|
|
was shocked. "It turns out she was only 16," he said. "I couldn't
|
|
believe it."
|
|
|
|
McNabb experienced a mild form of what some Internet veterans know as
|
|
cybersex, the electronic equivalent to talking dirty on the telephone.
|
|
Today McNabb, one of an estimated 30 million people dialing in from
|
|
his home computer, accesses Internet only when he has to, and his
|
|
communications software at home is password-protected.
|
|
|
|
Unfortunately, the experience that shocked McNabb is tame compared to
|
|
some material available on commercial dial-in bulletin boards and,
|
|
worse, free and easily through the Internet. Today, all anyone needs
|
|
to access hard-core pornographic photos is a computer, a modem and a
|
|
phone jack.
|
|
|
|
The technology revolution has led to a sudden explosion in illegal,
|
|
obscene pornography distribution - all right under the noses of law
|
|
enforcement and, in some cases, parents who unknowingly have given
|
|
their children the ability to access such information.
|
|
|
|
"Right now, people are operating in 'ignorant' mode," said Donna Rice
|
|
Hughes of Enough is Enough, a national organization dedicated to
|
|
stopping pornography. "They have no idea what's happening."
|
|
|
|
Increasingly, porn purveyors are re-distributing photographs through
|
|
"home pages" on Internet's world-wide web. This material is free for
|
|
anyone who knows where to look.
|
|
|
|
(Internet's public network is called a web because Internet forms an
|
|
electronic "web" connecting computers in cities around the world. If
|
|
one computer on the web is unavailable, information is re-routed
|
|
though another computer via the web. The home page, literally a
|
|
computer's address on the web, is the graphic equivalent to turning
|
|
the page of an electronic magazine.)
|
|
|
|
Some porno pages on the web deal mostly with pin-ups, along the lines
|
|
of Sports Illustrated's swimsuit issue, but most offer images far more
|
|
disturbing. These photographs can be copied to computer disks or
|
|
printed on paper and permanently kept by the user or shared with
|
|
friends.
|
|
|
|
"Children can dial into the system and download anything," Hughes
|
|
said. "It's all available, subdivided into specific sections."
|
|
|
|
Illegal pornographic images are available to anyone with the right
|
|
computer equipment. Of particular concern to parents is the rampant
|
|
availability of legal pornography, since the law distinguishes between
|
|
pornography, which may be legal, and obscenity, which is illegal.
|
|
|
|
And, Special Agent Ken Lanning of the FBI's Behavioral Sciences Unit
|
|
told the Associated Press, "as computers become less expensive, more
|
|
sophisticated and easier to operate, the potential for abuse
|
|
increases."
|
|
|
|
In order to test how easily accessible porn is to computer users, a
|
|
Christian American reporter accessed several menu selections arranged
|
|
by subject. Topics included bestiality (sex with animals),
|
|
torture/mutilation, snuff (killing a victim after sexually assaulting
|
|
her) and child pornography. Categories are sub-organized for
|
|
convenience - images under bestiality, for instance, are subdivided by
|
|
type of animal. Not all topics included photographs.
|
|
|
|
"This stuff would make a Hustler subscriber squirm," Hughes said.
|
|
"There are hundreds of options. They're all easy to get, and they're
|
|
all free for the taking."
|
|
|
|
No Control
|
|
|
|
Many parents feel better knowing their children are working on the
|
|
computer rather than watching television, but at least TV offers
|
|
control devices that can block objectionable channels. Now, with
|
|
Internet and other computer bulletin board systems, the same child who
|
|
is prohibited from watching MTV can see graphic sexual pictures on his
|
|
or her personal computer.
|
|
|
|
"You can see anything and talk to anybody," McNabb said.
|
|
|
|
Legal Briefs
|
|
|
|
Recent cybersmut incidents demonstrate that more law enforcement
|
|
patrols are needed on the information speedway.
|
|
|
|
The University of Michigan expelled a sophomore who posted email
|
|
messages - which he claims were pure fiction - that described the
|
|
rape, torture and murder of a classmate. The student, 20-year-old Jake
|
|
Baker, spent 29 days in jail after authorities charged him with
|
|
interstate transmission of a threat.
|
|
|
|
"Torture is foreplay," Baker wrote in the introduction to one of his
|
|
pieces. "Rape is romance, snuff is climax."
|
|
|
|
In Fresno, Calif., in 1993, Mark Forston was convicted of sodomizing a
|
|
16-year-old boy he had met and lured to his home via a computer
|
|
network. In Sacramento, William Steen was convicted on charges
|
|
stemming from sending pornographic computer files to two 14-year-olds.
|
|
|
|
National lawmakers are becoming aware of the growing need to regulate
|
|
computer porn and are struggling for realistic ways to do it.
|
|
|
|
Senators Jim Exon (D-NE) and Slade Gorton (R-WA) are sponsoring a bill
|
|
that would curtail transmission of obscene, indecent or harassing
|
|
telecommunications. Exon says the Baker case strengthens his belief
|
|
that a crackdown on a growing Internet "red-light district" is needed.
|
|
|
|
"When I see my 8-year-old granddaughter sitting at the computer back
|
|
in Nebraska, and I know stuff like what this student wrote is
|
|
available, I get upset. (Some Internet users) are trying to say
|
|
anything goes, and I think that is wrong."
|
|
|
|
No Boundaries
|
|
|
|
Because no one "owns" the Internet - its very nature defies boundaries
|
|
- many users feel there should be no limitations on what is available
|
|
through the system. Their protests raise difficult questions about how
|
|
Internet can be effectively policed.
|
|
|
|
What community standard should apply to a forum that transcends state,
|
|
even national, boundaries? Do laws apply based on the location of the
|
|
server (usually a mainframe computer that provides Internet access to
|
|
hundreds of users) or the location of the individual downloading
|
|
information?
|
|
|
|
For instance, in June 1994, Robert and Carleen Thomas, operators of an
|
|
"adult bulletin board service" in California, were convicted in U.S.
|
|
court in Memphis, Tenn., on obscenity charges because of images
|
|
downloaded in Tennessee.
|
|
|
|
Tens of thousands of Internet users have emailed petitions denouncing
|
|
the Exon bill to Capitol Hill and the White House, claiming that any
|
|
attempt to regulate the information super highway would be paramount
|
|
to regulating free speech.
|
|
|
|
Robert Knight, cultural studies director for the Family Research
|
|
Council, told the Washington Times that such doomsday wailing misses
|
|
the point.
|
|
|
|
"Obscene materials are not protected, no matter what the method of
|
|
transmission," Knight said. "The point is not to go after the
|
|
Internet, but to begin enforcing laws against obscene materials.
|
|
|
|
"If child pornography pictures are transmitted by Internet or by U.S.
|
|
mail, it shouldn't make any difference in terms of enforcement."
|
|
|
|
To encourage your senators to support the Exon-Gorton measure to curb
|
|
computer porn, write to them at the U.S. Senate, Washington D.C.
|
|
20510. Or call the Capitol switchboard and ask for your senator: (202)
|
|
224-3121.
|
|
|
|
For more information on computer pornography and what you can do to
|
|
safeguard your home, write to Enough is Enough! at P.O. Box 888,
|
|
Fairfax, Va. 22030, or call (703) 278-8343.
|
|
|
|
Copyright =A91995 by The Christian Coalition of this page and all
|
|
contents. All Rights Reserved.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 26 May 1995 22:02:56 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 2--Ban Nothing, Question Everything (Eye Reprint)(fwd)
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
eye WEEKLY May 25 1995
|
|
Toronto's arts newspaper .....free every Thursday
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
EYENET EYENET
|
|
|
|
BAN NOTHING
|
|
Question everything
|
|
|
|
by
|
|
K.K. CAMPBELL
|
|
|
|
|
|
I was on CBC Newsworld's Faceoff two Tuesdays ago (May 16). Topic:
|
|
censorship on the net. My opponent was Bernie Farber of the Canadian
|
|
Jewish Congress. Take a wild guess which side I took ...
|
|
|
|
The forces of censorship are amassing and, I hate to say it, if Canada
|
|
maintains its traditions, we're doomed. The term net.cop will have a
|
|
more real meaning than it does today.
|
|
|
|
Our saving grace might be the U.S. If the U.S. abides by its own
|
|
tradition of banning very little speech, Canucks will always be able to
|
|
get an account in the U.S. and thus maintain our voices. While the
|
|
net.illiterate assholes on Parliament Hill play Emperor For A Day,
|
|
citizens will telnet across the border and publish whatever they want,
|
|
from American computers.
|
|
|
|
Here are the main three points I tried to make on the show:
|
|
|
|
DIGITAL BOOK BURNERS
|
|
|
|
Farber and his ilk are the moral descendants of book burners. But
|
|
because books and printed matter have much stronger legal protections,
|
|
The Modern Inquisition finds it easier to target CPUs and sysadmins.
|
|
|
|
Right now, the panic-mongers in government and the media blame just
|
|
about every social ill on the net. But the main theme today is bombs:
|
|
"You can learn how to make bombs from reading the net! This evil must
|
|
stop!"
|
|
|
|
It's somewhat true. There is a file called The Terrorist's Handbook
|
|
which circulates cyberspace. (It has a real wanky "WareZ d00d" feel to
|
|
it and I wouldn't trust it for a second.) There's also The Anarchist's
|
|
Cookbook making the rounds, which details everything from blowing up
|
|
suspension bridges to cooking LSD in your kitchen. (Regard it with the
|
|
same suspicion.)
|
|
|
|
Sure enough, when I arrived at CBC studios, I saw that Farber had a
|
|
printout of one of these text files.
|
|
|
|
It was a good thing I had walked over to the World's Biggest Bookstore
|
|
on my lunch hour and bought a copy of The Anarchist's Cookbook for
|
|
$34.75. Information on bomb building. Right off the shelf.
|
|
|
|
"Ah, but that costs money," the pro-censorship forces would counter.
|
|
"You can copy it off the net for free.
|
|
|
|
Anticipating that objection, I strolled over to the Metro Reference
|
|
Library last Saturday. There, on the main floor, sat a horrible
|
|
collection of terrorist information: the Encyclopedia Britannica. I
|
|
grabbed volume 21 (right off the shelf), flipped to page 323 and read
|
|
the section on explosives. I photocopied it for about a buck and
|
|
strolled back out with the detailed description of how to make an
|
|
ammonium nitrate fuel oil bomb -- exactly like that used in the
|
|
Oklahoma City bombing.
|
|
|
|
I hope Allan Rock and the feds attend to this outrage immediately and
|
|
write legislation to regulate these damn libraries.
|
|
|
|
FIGHT SPEECH WITH SPEECH, NOT COPS
|
|
|
|
Farber kept suggesting that Nazis and hatemongers are using the net as
|
|
a propaganda tool. This is uninformed opinion of the first order. The
|
|
net is terrible as a "propaganda tool" because it's a two-way medium.
|
|
Newsgroups are interactive. Racists are forced to answer questions.
|
|
When Farber says, "Millions of people see what these people write,"
|
|
complete the image for him: "Millions of people see these people
|
|
ridiculed and humiliated in intellectual debate over and over again."
|
|
|
|
That is pretty ineffective propaganda.
|
|
|
|
In the finest of anarchist traditions, the net.community naturally
|
|
produces people who rebut every hate-mongering pamphlet that denies the
|
|
Holocaust happened. Canada's Ken McVay is one famous example. He's
|
|
built an enormous reservoir of historical documents that permanently
|
|
shred the revisionist pamphlets. Every time the same old pamphlets are
|
|
uploaded to cyberspace, someone quickly tags on the real story.
|
|
|
|
"And that's the beauty of the Internet: once it's refuted in an honest
|
|
and academic fashion, you can't run away from it," McVay says. "The
|
|
most intellectual among them (revisionists) are stupid and completely
|
|
inept when it comes to historical research. And, of course, they are
|
|
liars. That being the case, why on Earth would anyone want to shut them
|
|
up or force them underground? I want to know who I'm dealing with. I
|
|
want to know where they are. And I want to know how their minds work."
|
|
|
|
It's dramatic to watch. No need for Thought Cops. As Deborah Lipstadt
|
|
writes in Denying The Holocaust: "The main shortcoming of legal
|
|
restraints is that they transform the deniers into martyrs on the altar
|
|
of free speech."
|
|
|
|
CENSORSHIP SUPPORTS THE STATUS QUO
|
|
|
|
Throughout history, censorship has only worked to uphold the status
|
|
quo. It keeps the strong strong and the weak weak.
|
|
|
|
In 1871, Prussia's "personal honor" laws were intended to prevent
|
|
insults against groups, such as Jews. Not surprisingly, the courts
|
|
never upheld them for Jews, but rigorously used them to prevent
|
|
criticism of Prussians, clerics and the military -- the status quo.
|
|
|
|
At the turn of the century, France never charged the anti-Semitic
|
|
enemies of Captain Alfred Dreyfuss. Of course, when Emile Zola wrote
|
|
his famous tract "J'Accuse," he was charged with libel against the
|
|
clergy and had to flee to England.
|
|
|
|
In 1965, the British Race Relations Act was passed to combat racism.
|
|
The first people charged under it? Black Power leaders, labor leaders,
|
|
no-nuke activists. Britain's National Front thrives.
|
|
|
|
In 1974, Britain's National Union of Students passed a resolution
|
|
against "openly racist and fascist organizations." It was designed
|
|
specifically to prevent anti- Semitism. A year later, it was invoked to
|
|
prevent Israeli/Zionist speakers from touring. The National Front was
|
|
delighted.
|
|
|
|
Think all this is ancient history? How about Canada's infamous 1992
|
|
Supreme Court decision in "Butler vs. the Queen"? It was hailed by
|
|
pro-censorship feminists like Andrea Dworkin and Catherine MacKinnon as
|
|
being a great step forward for women in the "battle" against sexual
|
|
images.
|
|
|
|
Two-and-a-half years later, we find that it has been used by the
|
|
authorities to seize and confiscate material from well over half of all
|
|
the feminist bookstores across the country. In fact, Customs actually
|
|
seized two of Dworkin's own books. It was also used against gays and
|
|
lesbians. "Traditional" sexual material was never touched.
|
|
|
|
When are people who work for change going to learn that when they
|
|
support censorship, they are building their own gallows? If they want
|
|
to change society, why are they working to transfer still greater
|
|
powers to the state? If they believe in change, they simply cannot
|
|
support censorship.
|
|
|
|
The Master's tools will never dismantle the Master's house.
|
|
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Retransmit freely in cyberspace Author holds standard copyright
|
|
http://www.interlog.com/eye Mailing list available
|
|
eyeNET archive --> http://www.interlog.com/eye/News/Eyenet/Eyenet.html
|
|
eye@interlog.com "...Break the Gutenberg Lock..." 416-971-8421
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 3 Jun 1995 21:13:56 CDT
|
|
From: Jim Thomas <cudigest@sun.soci.niu.edu>
|
|
Subject: File 3--Some Questions for Canter and Siegel in re Their Book
|
|
|
|
((MODERATORS' NOTE: Canter and Siegel are best known for "spamming the
|
|
nets" with the infamous 1994 "Green Card" advertisement that was sent to
|
|
thousands of newsgroups and mailing lists. Then, they wrote a book
|
|
lauding the spam practice, and claimed that fortunes were waiting to
|
|
be made on the Internet. CuD was the victim of their spam, although
|
|
the quick action of gatemeister Chip Rosenthal minimized the damage.
|
|
Within the next week, CuD will run a special issue on Canter and
|
|
Siegel, including a review of their "How to Make a Fortune on the
|
|
Information Superhighway," which is billed as a "Guerrilla Guide." The
|
|
book is a rather confusing mixture of self-serving commentary,
|
|
mean-spirited attacks on their critics, sloppy thinking, and gross
|
|
errors. Before completing the review, I thought I would provide
|
|
Canter and Siegel the opportunity to clarify a few questions I had
|
|
after reading it)).
|
|
|
|
===========================
|
|
|
|
2 June, 1995
|
|
|
|
TO: Laurence A. Canter and Martha S. Siegel
|
|
|
|
FROM: Jim Thomas
|
|
|
|
RE: Help me Understand Your Book
|
|
|
|
Please help me. I am doing a review of your book, _How to Make a
|
|
FORTUNE on the Information Superhighway: Everyone's Guerrilla Guide
|
|
to Marketing on the Internet and Other On-line Services_, which will
|
|
be part of a special issue on you both in Cu Digest within the next
|
|
week. To help me assure accuracy in writing my review, perhaps you
|
|
could answer some questions I have now that I've carefully read,
|
|
line-by-line, the full 234 pages of your tome. I have found so many
|
|
confusing and illogical passages, gross errors that suggest a
|
|
"fictional work adapted from a true story," and sloppy thinking and
|
|
writing, that I am wondering if it was intended as a Swiftian satire.
|
|
Here are a few examples that I found curious:
|
|
|
|
1. On page 190 of your volume, you strongly suggest that Michael
|
|
LaMacchia, an MIT student, was indicted for software piracy. You
|
|
write:
|
|
|
|
"Still, one thing does seem to be typical of many hackers,
|
|
they don't care about breaking the law. The two most famous
|
|
examples of this are Craig Neidorf and Michael La Macchia.
|
|
Neidorf went down in the annals of hacker fame for stealing
|
|
a program that detailed the operations of Bell South's
|
|
emergency 911 telephone system. For this Neidorf was
|
|
arrested and convicted, although he received only a year's
|
|
probation as punishment."
|
|
|
|
It is not that you grossly err in identifying these two individuals as
|
|
"hackers" or as "famous examples" of cyber-criminals who "don't care
|
|
about breaking the law." This I attribute to simple ignorance and
|
|
cavalier indifference to fact. My concern is with your falsehoods.
|
|
Because you identify yourself as competent, credentialed, credible
|
|
professionals, and because you seem to pride yourself on "being
|
|
right," perhaps you could provide the source for the above claims.
|
|
Those who have read the the indictment in the LaMacchia case,
|
|
which as practicing attorneys I assume you would before making
|
|
your claims, are aware that LaMaccia was not indicted for
|
|
piracy. I wonder if you are also aware that the federal judge
|
|
dismissed the charges against LaMacchia. My question: On what
|
|
basis do you proclaim LaMacchia a "famous example" of law-breaking
|
|
when he was not so-judged by the court?
|
|
|
|
More serious are your allegations against Craig Neidorf. You
|
|
explicitly claim that "NEIDORF WENT DOWN IN THE ANNALS OF HACKER FAME
|
|
FOR STEALING A PROGRAM THAT DETAILED THE OPERATIONS OF BELL SOUTH'S
|
|
EMERGENCY E911 TELEPHONE SYSTEM ((emphasis added))." For this,
|
|
you say, HE WAS CONVICTED.
|
|
|
|
There are several fundamental errors in this short passage. First, a
|
|
"program" was not at issue in the case. Second, Neidorf was not
|
|
brought to trial for theft, as even a cursory review of his indictment
|
|
(or even media accounts) would reveal. Third, Neidorf was not only
|
|
NOT convicted, but the prosecution withdrew the charges even before it
|
|
concluded presenting its case. It had no case. Fourth, there was no
|
|
evidence adduced in court, nor am I aware of even anecdotal
|
|
information, to indicate that Neidorf was a "hacker." He published a
|
|
newsletter ABOUT hackers, a small, but hardly an inconsequential
|
|
detail, as a federal prosecutor learned in a humiliating experience
|
|
with a botched prosecution.
|
|
|
|
My questions: 1) Does such a statement, which publicly defames Craig
|
|
Neidorf, constitute an intentional lie, astonishing intellectual
|
|
sloppiness, or simply an indifference to truth? 2) Are you prepared
|
|
to publicly apologize to Craig Neidorf for this reckless comment that
|
|
some might argue is libelous? 3) Are you willing to publicly recant
|
|
that passage now that you have been corrected, or will you insist on
|
|
letting such a defamatory smear stand? If you wish to read the
|
|
indictments and other related legal documents and commentary, you can
|
|
find them in the back issues of Cu Digest.
|
|
|
|
2) In reading your book, I had the feeling that I was reading a
|
|
234 page match-book cover: "MAKE A FORTUNE IN YOUR SPARE TIME--tear
|
|
the cover off, send it in...."--Chapter headings and passages allude
|
|
ad nauseam to "making a fortune," "getting rich," and "making money."
|
|
My question: Are you as hopelessly driven by the mercenary spirit in
|
|
real life as the book suggests, or does the subtext of your book
|
|
reflect merely an ironic satire on shameless amoralism and the
|
|
disingenuousness of advertising and consumerism that you practice?
|
|
|
|
3) You seem not to like people on the net very much. Despite the
|
|
occasional caveat, your work (as the title would corroborate) seems an
|
|
indiscriminate assault on all those who inhabit "cyberspace." You make
|
|
sweeping generalizations about the "Net society," "Net participants,"
|
|
and the "Net community," in which your invective includes so many
|
|
pejorative terms that I stopped counting. Geeks is the mildest. My
|
|
question: Is it good business practice to offend the community in which
|
|
you're trying to make a buck?
|
|
|
|
4) Nowhere in your book did you demonstrate that you understood why
|
|
the response to your advertising gimmick, called "spamming,"
|
|
infuriated people. In fact, you seemed not only surprised, but angry
|
|
that people would react against indiscriminate flooding of Usenet,
|
|
Bitnet, and other Newsgroups, as well as mailboxes, with repititious
|
|
advertisements. Indeed, you seem proud to the point of boastful that
|
|
you spammed the net, and unless you were speaking in some primitive
|
|
code, it seemed clear that you were advocating to others that they do
|
|
likewise to make a fortune. Further, you conflate "spamming" and
|
|
"advertising," assuming that the ill-will you raised was soley due to
|
|
violation of an advertising taboo. Did I misread, or do you really not
|
|
understand the implications of flooding newsgroups and mailboxes with
|
|
millions of identical posts? Nowhere, not in a single line, did I
|
|
find even a hint that you saw such an action as--at the least--rude.
|
|
Quite the contrary--you write as if it's your right to be uncivil
|
|
boors, while criticizing your victims when they complain of your
|
|
predation. My question: Did you ever take an ethics course? If so,
|
|
did you pass?
|
|
|
|
5) I have tried to drop you a note (to the address listed in your book
|
|
and to the contact identified as "Laurence A. Canter" at
|
|
postmaster@cyber.sell.com on the information provided through Unix's
|
|
nslookup). Using a variety of Unix programs (mail, ping, nslookup,
|
|
whois, traceroute, and others), It appears that cyber.sell.com is down
|
|
or otherwise unreachable. Perhaps this is merely a momentary glitch,
|
|
perhaps not. My question: Do you have net access, or do you not? If
|
|
not, is it because your "spamming" strategy has so discredited you
|
|
that you are unable to find a reputable provider?
|
|
|
|
6) You claim that you are being "censored" by "cancelbots" which have
|
|
been designed to identify and cancel posts that are identical and that
|
|
are distributed to numerous newsgroups at once. As attorneys, I'm
|
|
surprised that you seem not to understand the meaning of the term
|
|
"censorship." You label those who engage in and support cancelbots as
|
|
"hypocrites" and worse. My questions: 1) Are you really unaware that
|
|
spamming is opposed by the overwhelming majority of the net? 2) Do you
|
|
really not know that those opposing spamming do so because spamming is
|
|
disruptive to systems and individual users? 3) Do you really not know
|
|
that most system administrators support cancelbots? 4) Are you really
|
|
unaware that cancelbots are not content-driven, but distribution
|
|
driven? 5) Are you being disingenuous or merely ignorant when you feel
|
|
that it is your "right" (as you repeatedly claim) to advertise as you
|
|
wish (as long as you violate no statutes), while simultaneously
|
|
complaining when others exercise their right of speech to communicate
|
|
to you their displeasure with your disruptive behavior?
|
|
|
|
7) You argue in your conclusion that you are pioneers and you believe
|
|
that you are paving the way for others. Paving the way for what?
|
|
Certainly not for net advertising or commercialism, which has long
|
|
been a fact of net life, and is recognized by most of us as a valuable
|
|
enrichment of the net. The homepages of the publishing and music
|
|
industry are just two examples of how information and commercialism
|
|
can be productively integrated. After reading your book with great
|
|
care, I can only conclude that your own "pioneer" effort has been the
|
|
advocacy of spamming. But, this is a minor issue. What troubles me is
|
|
that, while stating that you are pioneers, both the mood and the text
|
|
of your book suggest a different metaphor, that suggested in your
|
|
subtitle: "EVERYONE'S GUERRILLA GUIDE TO MARKETING." The term
|
|
"guerrilla" denotes small bands of militants who harass an enemy with
|
|
destructive acts for the purpose of driving the enemy from the field.
|
|
The term connotes a state of war in which the guerrilla aims to hurt
|
|
the adversary. My question: Do you honestly believe that "guerrilla
|
|
warfare" is a sound commercial strategy, or is this more satire by
|
|
which you poke fun at net-hucksters, unethical advertising tactics,
|
|
and destructive behavior?
|
|
|
|
8) Throughout your book, you demonstrate a disregard for common
|
|
courtesy and display what I interpret as a Nietzschean ethical
|
|
relativism. To your readers who might traverse the internet to
|
|
seek their fortune, you advise:
|
|
|
|
Along your journey, someone may try to tell you
|
|
that in order to be a good Net "citizen," you must
|
|
follow the rules of the cyberspace community. Don't
|
|
listen. The only laws and rules with which you
|
|
should concern yourself are those passed by the
|
|
country, state, and city in which you truly live.
|
|
The only ethics you should adopt as you pursue wealth on the
|
|
I-way are those dictated by the religious faith you have chosen
|
|
to follow and your own good conscience (p. 12).
|
|
|
|
You scoff at Usenet's (and other) "Netiquette rules" for posting, and
|
|
call it dogma (p. 200). You add:
|
|
|
|
Of the supposed moral issue, there is little left to be
|
|
said. Making money on the Internet in whatever way seems
|
|
best to you is not a moral question as long as you conduct
|
|
yourself with basic honesty and obey the law (p 207).
|
|
|
|
In all societies, there are norms of basic etiquette. Participating in
|
|
an electronic forum doesn't change normative expectations of
|
|
participants. You seem not to know that legality is not necessarily a
|
|
sufficient criterion for appropriate behavior in civilized society.
|
|
More to the point is the bald disingenuousness of your rather facile
|
|
rationalization for engaging in disruptive behavior. After decrying
|
|
electronic vandals, rudeness, and "crime," you seem to glorify and
|
|
advocate many of those same acts. For example, even while claiming
|
|
that one's mailbox is not a public forum, you defend junkmail,
|
|
comparing it to unsolicited advertising delivered by the postal
|
|
service. Do you not understand that, for those computer users who are
|
|
charged by the message, by the space used for file storage, or for
|
|
on-line time, that the costs of junk mail are passed on to the
|
|
consumer? Are you really so ignorant of how the web operates that you
|
|
believe that your spam is limited to Usenet news groups? Are you so
|
|
completely ignorant of the medium you profess to know that you are
|
|
unaware that much of spam winds up in others' mailboxes instead of
|
|
newsgroups? Do you really not know how much space can be wasted, how
|
|
disruptive your posts are to some systems, and how aggravating it is
|
|
especially for non-Usenet users when spamming occurs? It will
|
|
eventually be for the courts to determine whether such disruptive,
|
|
costly, and resource-draining behaviors such as yours are illegal. A
|
|
case could be made that you are nothing more than electronic "Vandals"
|
|
intent on sacking the net with admitted guerrilla tactics. However,
|
|
in your defense, I offer that perhaps your history education is
|
|
sufficiently incomplete that you confuse "pioneers" with "Vandals"."
|
|
From my reading of your book, there is little to support your
|
|
identification with the former, and much with the latter.
|
|
|
|
But, a metaphoric quibble isn't my point. It's this: You claim on one
|
|
hand that you have not broken any laws. You also claim to find
|
|
"hacker" activity abhorrent. Yet, you arguably are as willing to
|
|
violate legal norms as those "hackers" you ridicule. Your spam didn't
|
|
simply flood Usenet newsgroups. You targeted academic groups as well,
|
|
and your indiscriminate posting, which you defend and glorify, flooded
|
|
some mailboxes. This is merely the behavior of a Vandal. To reach some
|
|
of those posters, you had to "hack" your way into private, moderated
|
|
lists. You had to circumvent established procedures to trespass where
|
|
you were neither wanted nor invited. In short, to reach some lists you
|
|
did more than post to a public forum---you crashed into private spaces
|
|
through trickery. It is not just that you trespassed into private
|
|
domains, it is that you defend this costly and disruptive practice and
|
|
then wonder why others are bothered by your behavior. My question is
|
|
this: Why are you so sure that your own behaviors and those you
|
|
advocate are within the law?
|
|
|
|
I look forward to your answers to these questions so that I may
|
|
complete my review of your work as objectively as possible. Of
|
|
course, because you do not know me, you may not with to respond. Let
|
|
me introduce myself:
|
|
|
|
My name is Jim Thomas. I am an academic who has been on the nets for
|
|
over a decade. I subscribe to several dozen Usenet groups, virtually
|
|
all of which were hit by your spam. These were deleted easily enough.
|
|
I subscribe to a dozen highly specialized academic Bitnet discussion
|
|
groups. These posts arrive in my personal mailbox. Your spam cluttered
|
|
my box and caused me delays and other consequences. I edit an
|
|
electronic, moderated, newsgroup, Cu Digest (or CuD). This group does
|
|
not accept public posts. Posts sent to the group do not go to the
|
|
group, but to me. In order to post to the group without permission,
|
|
one must "hack" the address. Three times in the past year, spam that
|
|
was publicly attributed to you--the Green Card, about which you brag,
|
|
a "get out of debt" spam that was identified from the return route as
|
|
originating from cyber.sell.com, and a recent health book
|
|
advertisement that the "clients" claim was initiated by "Canter and
|
|
Siegel who wrote that book"--was hacked into this group. That you
|
|
found a way to automate trespassing makes it no-less acceptable. Is
|
|
it illegal? Perhaps, perhaps not. But, if you are counselling your
|
|
clients to trespass in order to "make their fortune on the Internet,"
|
|
as both your words and deeds indicate, then I do have to wonder about
|
|
the private ethics that you hold up as the model of good conscience.
|
|
|
|
After reading your volume and being a victim of your actions, I am
|
|
saddened that, for me, the best single adjective that fits your
|
|
behavior and the intellectual tone of the volume is: dishonest.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 2 Jun 1995 18:54:26 -0400
|
|
From: Matthew Saroff <msaroff@MOOSE.ERIE.NET>
|
|
Subject: File 4--Student Loses Scholarship. We All Lose A Little Freedom
|
|
|
|
(Originally from: comp-academic-freedom-talk@EFF.ORG
|
|
(comp-academic-freedom-talk mailing list)
|
|
|
|
Student Loses Scholarship. We All Lose A Little Freedom
|
|
|
|
by Jim Crawley, editor
|
|
-----------------------------------------------------------
|
|
|
|
Paul Kim may be the first person ever to have his own home page on the
|
|
World Wide Web censored. The 17-year-old high school senior lost his
|
|
National Merit scholarship, possibly admission to Harvard and his
|
|
satirical Web page.
|
|
|
|
Earlier this year, the Bellevue, Wash., student created an "Unofficial
|
|
Newport High School Home Page" on his home computer and posted it in a
|
|
public directory of his Internet provider, according to a recent
|
|
article in the Seattle Post-Intelligencer. He also submitted the page
|
|
to the Yahoo directory.
|
|
|
|
Included under a category about students' likes, Kim provided links to
|
|
three other servers that had a Playboy centerfold, an article about
|
|
masturbation and another about oral sex, the paper reported.
|
|
|
|
"I put a satire of the school on the Internet as a joke," Kim told a
|
|
reporter.
|
|
|
|
The page was noticed by a staff member at another Bellevue school, who
|
|
reported it to Newport High officials. Their response was to withdraw
|
|
the school's endorsement of Kim's National Merit scholarship -- he has
|
|
a 3.88 grade point average and posted a near perfect score on the SAT.
|
|
He automatically lost the $2,000 scholarship. Then, the principal sent
|
|
faxes to the seven top-rank colleges that Kim applied to. Soon,
|
|
afterwards, Harvard rejected his application.
|
|
|
|
While Kim and attorneys from the ACLU are asking the school district
|
|
for $2,000 and a public explanation of the school officials'
|
|
"violation of Kim's free-speech rights," the school hasn't paid up nor
|
|
showed signs it will.
|
|
|
|
The scary part of this story -- other than it's true -- is that it's
|
|
only the beginning of a trend.
|
|
|
|
You don't need to be a soothsayer to predict that other schools,
|
|
Internet providers or companies will try to determine what is
|
|
appropriate content. It's already happened.
|
|
|
|
But, the Kim case is the first time a government entity has censured
|
|
(and censored) someone for publishing a Web page on a non-government
|
|
computer. And, if unchecked and uncorrected, it sets a horrific
|
|
impediment on the Web and its development.
|
|
|
|
While a person's home is their castle (please note the WEBster's
|
|
gender neutrality), a person's home page may not be safe. As the Web
|
|
grows into a full-fledged, powerful replacement for some forms of the
|
|
printed word, Web publishers must be assured that they are protected
|
|
by the First Amendment.
|
|
|
|
So far, freedom of the press doesn't cover publications that are based
|
|
entirely on recycled electrons. If that lapse continues much longer,
|
|
more and more bureaucrats, legislators and demagogues will try (and
|
|
succeed) to censor the Web.
|
|
|
|
And, then no one will be laughing.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 2 Jun 95 16:37:41 EST
|
|
From: "Rhea Zimbar" <rzim@LOC.GOV>
|
|
Subject: File 5--Library of Congress Signs Nat'l Dig Library Fed Agreement
|
|
|
|
May 24, 1995
|
|
Contact: Guy Lamolinara (202) 707-9217
|
|
|
|
LIBRARY OF CONGRESS SIGNS
|
|
NATIONAL DIGITAL LIBRARY FEDERATION AGREEMENT
|
|
|
|
|
|
The Librarian of Congress, James H. Billington, the
|
|
Commission on Preservation and Access and officials from 14 other
|
|
research libraries and archives on May 1 signed the National
|
|
Digital Library Federation Agreement.
|
|
Recognizing "the important leadership role that the Library
|
|
of Congress has played in raising as a national issue the need
|
|
for such a national digital library," those institutions taking
|
|
part agreed to "bring together -- from across the nation and
|
|
beyond -- digitized materials that will be made accessible to
|
|
students, scholars and citizens everywhere."
|
|
"The Library of Congress is proud to be a member of the
|
|
National Digital Library Federation and to continue its
|
|
leadership role in building a collection of digitized materials
|
|
that will bring unique materials reflecting America's heritage
|
|
and culture to all," said Dr. Billington.
|
|
The Commission on Preservation and Access, whose president
|
|
is Deanna B. Marcum, is a private, nonprofit organization. Its
|
|
mission is to develop and support collaboration among libraries
|
|
and allied institutions to ensure access to and preservation of
|
|
resources in all formats.
|
|
At the signing, held at Harvard University, participants
|
|
agreed to establish a collaborative management structure, develop a
|
|
coordinated approach to fund-raising and formulate selection guidelines
|
|
that will "ensure conformance to the general theme of U.S. heritage and
|
|
culture." "The Library of Congress and the scholarly community will
|
|
benefit from participation in the National Digital Library
|
|
Federation, particularly by working with the federation members
|
|
to increase access to the nation's research collections in
|
|
libraries and archives both large and small," said Winston Tabb,
|
|
Associate Librarian for Collections Services.
|
|
In addition to the Library of Congress, and the Commission
|
|
on Preservation and Access, those institutions signing the
|
|
agreement are: Columbia University, Cornell University, Emory
|
|
University, Harvard University, National Archives and Records
|
|
Administration, New York Public Library, Pennsylvania State
|
|
University, Princeton University, Stanford University, University
|
|
of California at Berkeley, University of Michigan, University of
|
|
Southern California, and University of Tennessee and Yale
|
|
University.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.45
|
|
************************************
|
|
|