862 lines
38 KiB
Plaintext
862 lines
38 KiB
Plaintext
|
|
Computer underground Digest Sun Feb 9, 1997 Volume 9 : Issue 08
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.08 (Sun, Feb 9, 1997)
|
|
|
|
File 1--LAWSUIT: Case Filed with "Intent to Annoy"
|
|
File 2--"Hacking Chinatown"
|
|
File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak)
|
|
File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd)
|
|
File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 30 Jan 1997 10:25:04 -0700
|
|
From: --Todd Lappin-- <telstar@wired.com>
|
|
Subject: File 1--LAWSUIT: Case Filed with "Intent to Annoy"
|
|
|
|
THE CDA DISASTER NETWORK
|
|
|
|
January 30, 1997
|
|
|
|
Today Mr. Steve Silberman -- one of my distinguished comrades at Wired
|
|
News -- brings us an interesting scoop about a new lawsuit that has
|
|
been filed challenging one of the little-known provisions of the
|
|
Communications Decency Act.
|
|
|
|
|
|
The new suit targets a section of the CDA that criminalizes any
|
|
"indecent" computer communications intended to "annoy" another person.
|
|
This provision outlaws constitutionally protected communications among
|
|
other adults, including public officials. Under the CDA, such actions
|
|
could be prosecuted as a felony, punishable by a fine and up to two
|
|
years imprisonment. The lawsuit was filed to protect the "annoy.com"
|
|
Web site at http://annoy.com.
|
|
|
|
|
|
Steve's full report follows below.
|
|
|
|
|
|
Work the network!
|
|
|
|
|
|
--Todd Lappin-->
|
|
|
|
Section Editor
|
|
|
|
WIRED Magazine
|
|
|
|
(From: http://www.wired.com/news/ )
|
|
|
|
|
|
Designed to Annoy, Web Site Flouts CDA
|
|
|
|
|
|
by Steve Silberman
|
|
|
|
|
|
11:29 am PST 29 Jan 97 - If "flaming" is the favorite sport of the
|
|
online world, annoy.com is a high-octane flame-thrower on a
|
|
mission.
|
|
|
|
Slated for launch Thursday, annoy.com takes aim at the provision
|
|
in the Communications Decency Act that bans communication "with
|
|
intent to annoy."
|
|
|
|
|
|
By offering an online service that delivers scathing, anonymous
|
|
postcards to public figures, and dishes up corrosive commentary
|
|
and graphics hammering every hot-button issue from abortion to
|
|
Zionism, annoy.com's creator, Clinton Fein, hopes to engage
|
|
readers in dialogues
|
|
|
|
about freedom and censorship that will continue past the Supreme
|
|
Court's
|
|
review of the CDA this spring.
|
|
|
|
|
|
"Some might call it subversive," Fein declares. "We call it
|
|
democracy."
|
|
|
|
|
|
On Thursday morning, Fein and his attorneys, Mike Traynor and William
|
|
Bennett Turner, will file a complaint for declaratory and injunctive
|
|
relief in the US District Court in San Francisco, naming Fein's
|
|
ApolloMedia Corporation as the plaintiff, and Attorney General Janet
|
|
Reno as the defendant. The suit aims to establish that the provisions
|
|
banning annoying and "indecent" speech in the CDA are
|
|
"unconstitutional
|
|
on their face," overbroad, and indefensible.
|
|
|
|
|
|
Fein says he's angry that media critiques of the CDA focused on
|
|
wording
|
|
in the act that claimed to protect children from vaguely defined
|
|
"indecency," and ignored provisions throttling communication between
|
|
adults. "Where was The New York Times," asks Fein. "Covering the O. J.
|
|
trial?"
|
|
|
|
Traynor insists that his client's intentionally provocative site -
|
|
abuzz
|
|
with four-letter words and ire-arousing icons - is "not about throwing
|
|
mudpies, but having the elbow room to use blunt, robust language, not
|
|
just language that's PC. ApolloMedia and its lawyers are not
|
|
|
|
deliberately urging people to use nasty language. They're encouraging
|
|
people to be very forceful in their defense of freedom."
|
|
|
|
Annoy.com is divided into sections with titles like "Heckle,"
|
|
"Censure,"
|
|
and "Weekly Irrit8." The ransom-letter layout and label-maker fonts on
|
|
annoy.com are like a call to battle stations, but many of the texts -
|
|
including the polymorphously perturbing "annoy libs," with a menu of
|
|
targets including Sen. Jesse Helms - are as witty as they are angry.
|
|
|
|
|
|
"Media Muck" aims barbs at perceived hypocrisy in all media, from
|
|
dead-tree to digital, and guest writers will contribute essays to the
|
|
site on inflammatory topics, starting with novelist Patricia Nell
|
|
Warren's "Youth - Seen But Not Heard," and a rant by Gary McIntosh
|
|
titled "Pornography Is Good for You." With a conferencing system on
|
|
board called "Gibe" - think late-'80s Spy crossed with Electric Minds.
|
|
|
|
|
|
Fein's commitment to the Bill of Rights, he says, began in South
|
|
Africa,
|
|
where Fein, as he puts it, grew up censored. "The First Amendment was
|
|
a
|
|
strong motivation for my coming to America," Fein says. "Imagine how I
|
|
felt when I realized America was kidding about it."
|
|
Annoy.com is not Fein's first attempt to resist censorship. Threatened
|
|
by the Navy for reproducing a Navy recruiting poster in his CD-ROM
|
|
production of Randy Shilts' "Conduct Unbecoming: Gays and Lesbians in
|
|
the
|
|
U.S. Military" - depicting an African American who was later
|
|
discharged
|
|
for being gay - Fein included both the poster and the Navy's
|
|
threatening
|
|
letter in the final product. The acerbic Fein says one of his goals
|
|
for
|
|
annoy.com is "to get people to talk to each other even if they hate
|
|
each
|
|
other."
|
|
|
|
For Jonah Seiger of the Center for Democracy and Technology, the
|
|
addition of the ApolloMedia complaint to the arsenal of legal
|
|
challenges
|
|
to the CDA "makes sense because it makes sense to raise every question
|
|
and pick every nit about this law."
|
|
|
|
Fein vows that even if the Supreme Court does not overturn the
|
|
injunction made against the CDA by a panel of three federal judges in
|
|
Philadelphia last June, annoy.com will stay up and running. "The
|
|
issues
|
|
that it touches on are not going away," he says. "Whether the CDA is
|
|
there or not, you've still got Bill Clinton and Congress signing
|
|
stupid
|
|
|
|
legislation."
|
|
|
|
<smaller>Copyright 1993-97 Wired Ventures, Inc. and affiliated
|
|
companies.
|
|
All rights reserved. </smaller>
|
|
|
|
|
|
###
|
|
|
|
|
|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
|
|
|
This transmission was brought to you by....
|
|
|
|
|
|
THE CDA DISASTER NETWORK
|
|
|
|
|
|
The CDA Disaster Network is a moderated distribution list providing
|
|
up-to-the-minute bulletins and background on efforts to overturn the
|
|
Communications Decency Act. To subscribe, send email to
|
|
<<majordomo@wired.com> with "subscribe cda-bulletin" in the message
|
|
body. To unsubscribe, send email to <<info-rama@wired.com> with
|
|
"unsubscribe cda-bulletin" in the message body.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 8 Feb 1997 09:01:52 -0600
|
|
From: Richard Thieme <rthieme@thiemeworks.com>
|
|
Subject: File 2--"Hacking Chinatown"
|
|
|
|
"Hacking Chinatown"
|
|
by
|
|
Richard Thieme
|
|
|
|
"Forget it, Jake. It's Chinatown."
|
|
Those are the last words of the movie "Chinatown," just
|
|
before the police lieutenant shouts orders to the crowd to clear
|
|
the streets so the body of an innocent woman, murdered by the Los
|
|
Angeles police, can be removed.
|
|
"Chinatown," with Jack Nicholson as Jake Gittes, is a fine
|
|
film: it defines an era (the thirties in the United States) and a
|
|
genre -- film noir -- that is a unique way to frame reality.
|
|
"Film noir" is a vision of a world corrupt to the core in
|
|
which nevertheless it is still possible, as author Raymond
|
|
Chandler said of the heroes of the best detective novels, to be
|
|
"a man of honor. Down these mean streets a man must go who is not
|
|
himself mean, who is neither tarnished nor afraid."
|
|
"Chinatown" also defines life in the virtual world -- that
|
|
consensual hallucination we have come to call "cyberspace." The
|
|
virtual world is a simulation of the "real world." The "real
|
|
world" too is a symbolic construction, a set of nested structures
|
|
that -- as we peel them away in the course of our lives --
|
|
reveals more and more complexity and ambiguity.
|
|
The real world IS Chinatown, and computer hackers --
|
|
properly understood -- know this better than anyone.
|
|
|
|
There are several themes in "Chinatown."
|
|
|
|
(1) People in power are in seamless collusion. They take
|
|
care of one another. They don't always play fair. And sooner or
|
|
later, we discover that "we" are "they."
|
|
A veteran police detective told me this about people in
|
|
power.
|
|
"There's one thing they all fear -- politicians,
|
|
industrialists, corporate executives -- and that's exposure. They
|
|
simply do not want anyone to look too closely or shine too bright
|
|
a light on their activities."
|
|
I grew up in Chicago, Illinois, known for its political
|
|
machine and cash-on-the-counter way of doing business. I earned
|
|
money for my education working with the powerful Daley political
|
|
machine. In exchange for patronage jobs -- supervising
|
|
playgrounds, hauling garbage -- I worked with a precinct captain
|
|
and alderman. My job was to do what I was told.
|
|
I paid attention to how people behaved in the real world. I
|
|
learned that nothing is simple, that people act instinctively out
|
|
of self-interest, and that nobody competes in the arena of real
|
|
life with clean hands.
|
|
|
|
I remember sitting in a restaurant in a seedy neighborhood
|
|
in Chicago, listening to a conversation in the next booth. Two
|
|
dubious characters were upset that a mutual friend faced a long
|
|
prison term. They looked and sounded different than the
|
|
"respectable" people with whom I had grown up in an affluent part
|
|
of town.
|
|
As I grew up, however, I learned how my friends' fathers
|
|
really made money. Many of their activities were disclosed in the
|
|
newspaper. They distributed pornography before it was legal,
|
|
manufactured and sold illegal gambling equipment, distributed
|
|
vending machines and juke boxes to bars that had to take them or
|
|
face the consequences. I learned that a real estate tycoon had
|
|
been a bootlegger during prohibition, and the brother of the man
|
|
in the penthouse upstairs had died in Miami Beach in a hail of
|
|
bullets.
|
|
For me, it was an awakening: I saw that the members of the
|
|
power structures in the city -- business, government, the
|
|
religious hierarchy, and the syndicate or mafia -- were
|
|
indistinguishable, a partnership that of necessity included
|
|
everyone who wanted to do business. Conscious or unconscious,
|
|
collusion was the price of the ticket that got you into the
|
|
stadium; whether players on the field or spectators in the
|
|
stands, we were all players, one way or another.
|
|
Chicago is South Africa, South Africa is Chinatown, and
|
|
Chinatown is the world. There is no moral high ground. We all
|
|
wear masks, but under that mask is ... Chinatown.
|
|
|
|
(2) You never really know what's going on in Chinatown.
|
|
The police in Chinatown, according to Jake Gittes, were told
|
|
to do "as little as possible" because things that happened on the
|
|
street were the visible consequences of strings pulled behind the
|
|
scenes. If you looked too often behind the curtain -- as Gittes
|
|
did -- you were taught a painful lesson.
|
|
We often don't understand what we're looking at on the
|
|
Internet. As one hacker recently emailed in response to someone's
|
|
fears of a virus that did not and could not exist, "No
|
|
information on the World Wide Web is any good unless you can
|
|
either verify it yourself or it's backed up by an authority you
|
|
trust."
|
|
The same is true in life.
|
|
Disinformation in the virtual world is an art. After an
|
|
article I wrote for an English magazine about detective work on
|
|
the Internet appeared, I received a call from a global PR firm in
|
|
London. They asked if I wanted to conduct "brand defense" for
|
|
them on the World Wide Web.
|
|
What is brand defense?
|
|
If one of our clients is attacked, they explained, their
|
|
Internet squad goes into action. "Sleepers" (spies inserted into
|
|
a community and told to wait until they receive orders) in usenet
|
|
groups and listserv lists create distractions, invent
|
|
controversies; web sites (on both sides of the question) go into
|
|
high gear, using splashy graphics and clever text to distort the
|
|
conversation. Persons working for the client pretend to be
|
|
disinterested so they can spread propaganda.
|
|
It reminded me of the time my Democratic Party precinct
|
|
captain asked if I wanted to be a precinct captain.
|
|
Are you retiring? I asked.
|
|
Of course not! he laughed. You'd be the Republican precinct
|
|
captain. Then we'd have all our bases covered.
|
|
|
|
The illusions of cyberspace are seductive. Every keystroke
|
|
leaves a luminous track in the melting snow that can be seen with
|
|
the equivalent of night vision goggles.
|
|
Hacking means tracking -- and counter-tracking -- and
|
|
covering your tracks -- in the virtual world. Hacking means
|
|
knowing how to follow the flow of electrons to its source and
|
|
understand on every level of abstraction -- from source code to
|
|
switches and routers to high level words and images -- what is
|
|
really happening.
|
|
Hackers are unwilling to do as little as possible. Hackers
|
|
are need-to-know machines driven by a passion to connect
|
|
disparate data into meaningful patterns. Hackers are the online
|
|
detectives of the virtual world.
|
|
You don't get to be a hacker overnight.
|
|
The devil is in the details. Real hackers get good by
|
|
endless trial and error, failing into success again and again.
|
|
Thomas Alva Edison, inventor of the electric light, invented a
|
|
hundred filaments that didn't work before he found one that did.
|
|
He knew that every failure eliminated a possibility and brought
|
|
him closer to his goal.
|
|
Listen to "Rogue Agent" set someone straight on an Internet
|
|
mailing list:
|
|
"You want to create hackers? Don't tell them how to do this
|
|
or that. Show them how to discover it for themselves. Those who
|
|
have the innate drive will dive in and learn by trial and error.
|
|
Those who don't, comfortable to stay within the bounds of their
|
|
safe little lives, fall by the wayside.
|
|
"There's no knowledge so sweet as that which you've
|
|
discovered on your own."
|
|
|
|
In Chinatown, an unsavory character tries to stop Jake
|
|
Gittes from prying by cutting his nose. He reminds Gittes that
|
|
"curiosity killed the cat."
|
|
Isn't it ironic that curiosity, the defining characteristic
|
|
of an intelligent organism exploring its environment, has been
|
|
prohibited by folk wisdom everywhere?
|
|
The endless curiosity of hackers is regulated by a higher
|
|
code that may not even have a name but which defines the human
|
|
spirit at its best. The Hacker's Code is an affirmation of life
|
|
itself, life that wants to know, and grow, and extend itself
|
|
throughout the "space" of the universe. The hackers' refusal to
|
|
accept conventional wisdom and boundaries is a way to align his
|
|
energies with the life-giving passion of heretics everywhere. And
|
|
these days, that's what needed to survive.
|
|
Robert Galvin, the grand patriarch of Motorola, maker of
|
|
cell-phones and semi-conductors, says that "every significant
|
|
decision that changes the direction of a company is a minority
|
|
decision. Whatever is the intuitive presumption -- where everyone
|
|
agrees, "Yeah, that's right" -- will almost surely be wrong."
|
|
Motorola has succeeded by fostering an environment in which
|
|
creativity thrives. The company has institutionalized an openness
|
|
to heresy because they know that wisdom is always arriving at the
|
|
edge of things, on the horizons of our lives, and when it first
|
|
shows up -- like a comet on the distant edges of the solar system
|
|
-- it is faint and seen by only a few. But those few know where
|
|
to look.
|
|
Allen Hynek, an astronomer connected with the U. S. Air
|
|
Force investigation of UFOs, was struck by the "strangeness" of
|
|
UFO reports, the cognitive dissonance that characterizes
|
|
experiences that don't fit our orthodox belief systems. He
|
|
pointed out that all the old photographic plates in astronomical
|
|
observatories had images of Pluto on them, but until Clyde
|
|
Tombaugh discovered Pluto and said where it was, no one saw it
|
|
because they didn't know where to look.
|
|
The best computer consultants live on the creative edge of
|
|
things. They are path-finders, guides for those whom have always
|
|
lived at the orthodox center but who find today that the center
|
|
is constantly shifting, mandating that they learn new behaviors,
|
|
new skills in order to be effective. In order to live on the
|
|
edge.
|
|
The edge is the new center. The center of a web is wherever
|
|
we are.
|
|
|
|
When I looked out over the audience at DefCon IV, the
|
|
hackers' convention, I saw an assembly of the most brilliant and
|
|
most unusual people I had ever seen in one room. It was
|
|
exhilarating, and I felt as if I had come home. There in that
|
|
room for a few hours or a few days, we did not have to explain
|
|
anything. We knew who we were and what drove us in our different
|
|
ways to want to connect the dots of data into meaningful
|
|
patterns.
|
|
We know we build on quicksand, but building is too much fun
|
|
to give up. We know we leave tracks, but going is so much more
|
|
energizing than staying home. We know that curiosity can get your
|
|
nose slit, but then we'll invent new ways to smell.
|
|
Computer programmers write software applications that are
|
|
doomed to be as obsolete as wire recordings or programs for an
|
|
IBM XT. The infrastructures built by our engineers are equally
|
|
doomed. Whether a virtual world of digital bits or a physical
|
|
world of concrete and steel, our civilization is a Big Toy that
|
|
we build and use up at the same time. The fun of the game is to
|
|
know that it is a game, and winning is identical with our
|
|
willingness to play.
|
|
|
|
To say that when we engage with one another in cyberspace we
|
|
are "Hacking Chinatown" is a way to say that asking questions is
|
|
more important than finding answers. We do not expect to find
|
|
final answers. But the questions must be asked. We refuse to do
|
|
as little as possible because we want to KNOW.
|
|
Asking questions is how human beings create opportunities
|
|
for dignity and self-transcendence; asking questions is how we
|
|
are preparing ourselves to leave this island earth and enter into
|
|
a trans-galactic web of life more diverse and alien than anything
|
|
we have encountered.
|
|
Asking questions that uncover the truth is our way of
|
|
refusing to consent to illusions and delusions, our way of
|
|
insisting that we can do it better if we stay up later,
|
|
collaborate with each other in networks with no names, and lose
|
|
ourselves in the quest for knowledge and self-mastery.
|
|
This is how proud, lonely men and women, illuminated in the
|
|
darkness by their glowing monitors, become heroes in their own
|
|
dramas as they wander the twisting streets of cyberspace and
|
|
their own lives.
|
|
Even in Chinatown, Jake. Even in Chinatown.
|
|
|
|
copyright Richard Thieme 1997
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 08 Feb 1997 09:32:04 -0800
|
|
From: Jonathan Wallace <jw@bway.net>
|
|
Subject: File 3--An Auschwitz Alphabet (In re Milburn/Solid Oak)
|
|
|
|
((MODERATORS' NOTE: Although we normally attempt to give both
|
|
sides to every issue such as this, an attempt to contact Mr.
|
|
Milburn of Solid Oak led to a bizarrre "never contact this site"
|
|
again response from him, and an accusaton that CuD was harassing
|
|
and intimidating him and his employees. Although this was, we have
|
|
since learned, a canned response, it prevents us from further
|
|
attempts to solicit a view from the "other side." Milburn's
|
|
response to CuD would seem to confirm the criticisms of him and
|
|
his company)).
|
|
|
|
===================
|
|
|
|
Brian Milburn
|
|
President,
|
|
Solid Oak Software
|
|
|
|
Dear Mr. Milburn:
|
|
|
|
In December you added my site, The Ethical Spectacle,
|
|
http://www.spectacle.org, to Cybersitter's list of blocked
|
|
sites because of my criticism of your company
|
|
(see http://www.spectacle.org/alert/cs.html).
|
|
|
|
Below is a small sampling of the letters I receive every day
|
|
from teachers and students about my
|
|
Holocaust compilation, "An Auschwitz Alphabet",
|
|
http://www.spectacle.org/695/ausch.html.
|
|
|
|
Please read these over and reflect on the following
|
|
issues:
|
|
|
|
1. Why do you think your dislike of criticism is more important
|
|
than the benefit these students gain from accessing my site?
|
|
|
|
2. Why do you think you are more qualified than these teachers
|
|
to determine what our children should see?
|
|
|
|
There is a trend beginning in state legislatures to pass
|
|
legislation mandating that schools buy blocking software.
|
|
For as long as you continue blocking The Ethical Spectacle,
|
|
I will share a copy of this correspondence with any
|
|
school system or university considering purchasing
|
|
your product.
|
|
|
|
Here are three of the teachers who have assigned An
|
|
Auschwitz Alphabet to their classes:
|
|
|
|
|
|
"I just discovered your work online and am impressed! I am teaching a
|
|
second level composition course thematically based on the Holocaust. I
|
|
am teaching research writing skills in a computer lab with access to
|
|
e-mail and the Internet and WWW. Have been surfing around looking for
|
|
source material for myself and also for places to send the students.
|
|
Some of them learned a little about the Holocaust in high school, but
|
|
most are not too aware. Some are of German background and want to know
|
|
what happened. This is a four year university in Michigan and most of
|
|
the students are traditional freshmen, although I do have a couple of
|
|
older students too."
|
|
|
|
"I just wanted to let you know that I found your site as I was gathering
|
|
resources to teach a unit on the Holocaust to my middle school students.
|
|
They will be reading the book Night by Elie Weisel. That will serve as a
|
|
launching pad into our study. Your site is going to be a fabulous
|
|
resource. Most of what I have found so far is not very 'kid friendly'.
|
|
Your site is going to allow them to explore on their own as they learn
|
|
more about a topic most of them know nothing about. Thanks for providing
|
|
such a valuable resource."
|
|
|
|
"I am teaching summer school--US history, 20th Century--and found the
|
|
Alphabet a powerful tool to convey what must be known about the
|
|
Holocaust.
|
|
|
|
"Each student was given a letter to read to the class. A few others read
|
|
excerpts from the recollections of a child I found on another server.
|
|
When we were finished, I needed to say no more."
|
|
|
|
And here are a few of the students from around the
|
|
world who have written to me:
|
|
|
|
|
|
"I am a tenth grade student in Australia and I would just like to
|
|
congratulate you on this homepage. This information has been most
|
|
helpful for an assignment I am doing. So thanks."
|
|
|
|
"I am an Abilene Christian University student in Texas. I am doing a
|
|
report over the Holocaust. You information is wonderful and greatly
|
|
appreciated. Keep it up."
|
|
|
|
"Hey, I would like to congratulate you on your wonderful page, I am
|
|
currently in the middle of a huge holocaust project for school, Im in
|
|
eigth grade and your page helped me the most, I found it to be thorough,
|
|
clean and very factual. I like it and will reccomend it to many of my
|
|
friends!! Thank-you for your wonderful service!!"
|
|
|
|
|
|
"I think this is great. I am a 14 year old boy that lives in Indiana.
|
|
(USA) I really think what you are doing is important. If kids my age
|
|
aren't told of this tragedy, than it will be forgotten about and the
|
|
likelier the possibility of it happening again in some shape or form.
|
|
Thank you."
|
|
|
|
"I am a college student writing a paper on the happenings in Auschwitz.
|
|
The pages that I read were enlighting as to what really occured. Many
|
|
people do not believe in the Holocaust but after my presentation some
|
|
changed their minds. Thank you for condensing many hours of reading."
|
|
|
|
"Your Auschwitz Alphabet is amazing. Funny how you can be researching to
|
|
write a paper and end up reading an entire collection of information
|
|
that is actually extremely interesting. All I can say is wow. Truly
|
|
awesome."
|
|
|
|
"After coming across your page when looking for information for a school
|
|
research assignment, I was amazed at the information in your 'Auschwitz
|
|
Alphabet'. It has given me many ideas for my 1000 word essay due next
|
|
week :-)"
|
|
|
|
"I am a student at Jakarta International School and presently in tenth
|
|
grade. At this moment I am doing research on the Holocaust. And by
|
|
searching through the web I learned a lot of information about the
|
|
Holocaust from you. So I was wondering if I could interview you and ask
|
|
you some questions about the Holocaust in Auschwitz and asking how
|
|
people escaped from the Holocaust."
|
|
|
|
This is one of my favorites:
|
|
|
|
[An Italian girl]"I read all the books of Primo Levi, I hope in one best
|
|
world I'm only 14 but I know a lot of things about the past I'm not a
|
|
Jew but I will don't forget..."
|
|
|
|
There's no shame in correcting a moral misstep. I suggest
|
|
you unblock my pages, and those of your other critics
|
|
such as Bennett Haselton of Peacefire, www.peacefire.org,
|
|
immediately. Otherwise you will continue to raise serious
|
|
questions as to your competence to determine what is safe
|
|
for children to see.
|
|
|
|
Sincerely yours,
|
|
Jonathan Wallace
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 2 Feb 1997 13:48:13 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 4--CyberLex -(Summary of legal issues) Updated 1/97 (fwd)
|
|
|
|
CyberLex may have been around for a while, but since I just discovered it
|
|
that makes it a new resource..........
|
|
|
|
This is a monthly summary of news items about legal developments and high
|
|
profile events affecting the online community.
|
|
|
|
David Smith *
|
|
bladex@bga.com *
|
|
President, EFF-Austin *
|
|
512-304-6308 *
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Sat, 1 Feb 1997 12:12:59 -0800
|
|
From--Jonathan Rosenoer <cyberlaw@cyberlaw.com>
|
|
Subject--CyberLex - Updated 1/97
|
|
|
|
Dear CyberLaw/CyberLex subscriber:
|
|
|
|
Here is the latest edition of CyberLex!
|
|
|
|
Best regards,
|
|
Jonathan
|
|
|
|
|||||||||||||||||||||||||||||||
|
|
|
|
CYBERLEX
|
|
by Jonathan Rosenoer
|
|
|
|
Notable legal developments reported in December 1996 include the following:
|
|
|
|
|
|
# A state court judge ruled that Minnesota may enforce consumer protection
|
|
laws against out-of-state businesses operating on the World Wide Web. The
|
|
decision comes in a case on Internet gambling. __Minnesota v. Granite Gate
|
|
Resorts__, No. C 6-95-007227 (Dist. Ct. Cty of Ramsey, filed July 18,
|
|
1995).
|
|
|
|
# Georgia Tech Lorraine, the European platform of the Georgia Institute of
|
|
Technology, has been sued for failing to comply with a French law requiring
|
|
that goods and services be offered in French in addition to any other
|
|
language in which they may be offered.
|
|
|
|
# One third of Internet users provide false demographic data at Internet
|
|
sites because they are not told how the information will be used and fear
|
|
it will end up on a marketing list, according to a new study of 14,000 Web
|
|
users by the Georgia Institute of Technology.
|
|
|
|
# Charles Morrell, 34, a disgruntled former employee of a Connecticut
|
|
Internet company (Diversified Technologies Group), was arrested and charged
|
|
with felony computer crime relating to the erasure of all the company's
|
|
computer files, including backups.
|
|
|
|
# A World Wide Web service company, WebCom in San Francisco, California,
|
|
suffered a syn-flood/denial-of-service attack that knocked out more than
|
|
3,000 Web sites for 40 hours during the holiday shopping season. WebCom
|
|
halted the attacks after tracing the source of the attacks to MCI
|
|
Communications Corp., which, in turn, tracked further back to CANet in
|
|
Canada and a compromised account on BC.Net in Vancouver, British Columbia.
|
|
As it could not end the attack, MCI blocked all traffic from CANet.
|
|
|
|
# The US Air Force temporarily closed its Web site and the Department of
|
|
Defense temporarily shuttered 80 other Internet sites after hackers broke
|
|
into the Air Force's site and replaced files with prank messages and a
|
|
sexually-explicit video clip.
|
|
|
|
# FBI agents participated in searches in 20 cities as part of a nationwide
|
|
investigation into the use of computer online services and the Internet to
|
|
lure children into illicit sex and to distribute child pornography. The
|
|
3-year old investigation has already resulted in 80 arrests, 103
|
|
indictments and charges, 66 felony convictions, and 207 searches.
|
|
|
|
# The Center for Media Education and the Consumer Federation of America,
|
|
both non-profit groups, urged the Federal Communications Commission to set
|
|
guidelines for children's advertising and marketing on the Internet. The
|
|
groups find that companies collect personally identifiable information from
|
|
children without disclosing how the information will be used, or who will
|
|
have access to it -- all without requesting parental consent.
|
|
|
|
# The US Supreme Court agreed to decide whether the Communications Decency
|
|
Act, which bans the transmission of indecent material to minors, violates
|
|
the First Amendment.
|
|
|
|
# A television industry group announced a rating system that will rank
|
|
shows based on appropriateness for age groups, similar to that used for
|
|
movies. The system, which will determine the shows blocked by the V-chip
|
|
that will be built into new televisions, is subject to Federal
|
|
Communications Commission approval. Critics complain the approach is too
|
|
vague and of little use to parents, particularly regarding shows with
|
|
violence or sexual themes.
|
|
|
|
# A Brooklyn, NY, jury awarded $5.3 million in favor of a former executive
|
|
secretary, Patricia Geressy, who claimed she developed carpal tunnel
|
|
syndrome using keyboards made by Digital Equipment Corp. Two other women,
|
|
Jill Jackson and Janet Tolo, were awarded $306,000 and $278,000,
|
|
respectively. No defective keyboard design was found, but Digital was
|
|
faulted for failing to issue warnings about the dangers of repetitive
|
|
typing.
|
|
|
|
# Labor Secretary Robert Reich said the government is moving ahead with
|
|
new regulations to prevent repetitive motion injuries in the workplace.
|
|
|
|
# An Australian Federal Court upheld copyright protection for a popular
|
|
shareware program, the Trumpet Winsock application. This program allows
|
|
personal computers to access the Internet. Software developer Trumpet
|
|
Software International filed suit against OzEmail, the largest Internet
|
|
service provider in Australia and New Zealand, after learning that 60,000
|
|
unauthorized copies had been made. The court also ruled that OzEmail
|
|
violated the Trade Practices Act by misleading and deceiving people that it
|
|
had permission to publish the shareware.
|
|
|
|
# The California Supreme Court ruled that prosecutors may not solicit
|
|
financial assistance from crime victims, as they may create a legally
|
|
cognizable conflict of interest for the prosecutor." The ruling came in a
|
|
case involving the alleged theft of trade secret and confidential
|
|
information from Borland International. The District Attorney accepted
|
|
more than $13,000 from Borland, after telling the company it needed money
|
|
for a computer expert and other expenses relating to the case. __People v.
|
|
Eubanks__, 927 P.2d 310, 59 Cal.Rptr.2d 200, 1996 Cal. LEXIS 6829 (1996).
|
|
|
|
# Cyber Promotions, Inc., a purveyor of unsolicited e-mail, agreed to
|
|
settle a trademark infringement lawsuit brought by Prodigy Services Corp.
|
|
The settlement followed the issuance of a permanent injunction ordering
|
|
Cyber Promotions to stop sending unsolicited e-mail advertisements falsely
|
|
indicating they came from Prodigy.
|
|
|
|
# A US District Court Judge in San Francisco ruled that the First
|
|
Amendment was violated by a 1993 State Department export ban relating to a
|
|
software encryption program (Snuffle) written by Dr. Daniel Bernstein.
|
|
|
|
# The Business Software Alliance, a group that includes IBM, Microsoft,
|
|
Apple Computer, and nine other companies, criticized the Clinton
|
|
administration on early versions of regulations implementing an October 1
|
|
compromise allowing for the export of robust computer-encryption software.
|
|
A November 15, 1996, executive order provides that the Justice Department
|
|
will play a consulting role with the Commerce Department, which is viewed
|
|
as giving law-enforcement to big a role in the export process. The order
|
|
also indicates that export licenses for 56-bit key encryption software will
|
|
be considered largely on a case-by-case basis, instead of being
|
|
automatically allowed. It is further faulted for not accounting in the
|
|
export review process for the availability of comparable overseas
|
|
technology. And the order is also criticized for giving the Government the
|
|
upper hand in developing a key-recovery system that would allow for the
|
|
legal breaking of encrypted data once a warrant is obtained, as well as for
|
|
prescribing a system that might enable Government decryption of messaging
|
|
during transmission.
|
|
|
|
# America Online says it has resolved concerns of 19 state Attorneys
|
|
General, agreeing to make better pricing disclosures and extending the date
|
|
that customers can receive automatic refunds relating to its change to new
|
|
flat-fee pricing of $19.95 per month.
|
|
|
|
# The World Trade Organization, a trade pact with 128 member nations,
|
|
endorsed the Information Technology Agreement, which will abolish import
|
|
duties on computers, software, semiconductors and telecommunications
|
|
equipment between July 1, 1997, and January 1, 2000.
|
|
|
|
# Final treaties agreed to by 160 nations, negotiating under the auspices
|
|
of the United Nation's World Intellectual Property Organization, will
|
|
reflect that temporary copies of copyrighted materials automatically made
|
|
when a user is browsing the Internet will not be considered a copyright
|
|
violation. A proposed treaty to extend copyright protection to databases
|
|
was set aside, as many countries were not ready to address the issue.
|
|
|
|
# Unauthorized service conversion, commonly known as "slamming," is the
|
|
most frequently lodged consumer grievance about long-distance companies,
|
|
according to the Federal Communications Commission's "Common Carrier
|
|
Scorecard."
|
|
|
|
# Microsoft Corp. has renegotiated license agreements with major computer
|
|
makers, blocking them from using Microsoft's Windows operating system
|
|
unless Microsoft's screen comes up when a user boots up. Several computer
|
|
makers have provided a copy of the new agreement to the Justice Department
|
|
for review.
|
|
|
|
# The Federal Communications Commission unanimously approved technical
|
|
standards for advanced digital television.
|
|
|
|
# Television broadcasters, including CBS, Fox, and others, filed suit in
|
|
federal court in Miami against a satellite programming company, PrimeTime
|
|
24 (a unit of Great Universal American Industries Inc.), alleging that
|
|
illegally provides network shows to certain satellite dish owners. Federal
|
|
law allows satellite carriers to sell network programming to consumers who
|
|
cannot obtain decent reception of network programs. The broadcasters
|
|
complain that PrimeTime 24 crowds out network affiliates and discourages
|
|
advertisers from buying time on local stations.
|
|
|
|
Sources for CyberLex include the Wall Street Journal, New York Times, Marin
|
|
Independent Journal, The (San Franciso) Recorder, USA Today, and Le Monde.
|
|
|
|
CyberLex (tm) is published solely as an educational service. The author is
|
|
a California attorney. He may be contacted at cyberlaw@cyberlaw.com.
|
|
Questions and comments may be posted at the CyberLaw Internet site
|
|
(www.cyberlaw.com), hosted by Best Internet Communications, Inc.
|
|
(www.best.com). ISDN Internet connectivity is provided by InterNex
|
|
(www.internex.com). Legal research assistance is provided by Lexis-Nexis.
|
|
CyberLex is a trademark of Jonathan Rosenoer. Copyright (c) 1997 Jonathan
|
|
Rosenoer; All Rights Reserved.
|
|
|
|
|||||||||||||||||||||||||||||||||||||
|
|
CyberLaw.com
|
|
Jonathan Rosenoer, Esq. | Kentfield, California, USA
|
|
cyberlaw@cyberlaw.com | www.cyberlaw.com
|
|
Ph. 415-461-3108 | Fax 415-461-4013
|
|
|||||||||||||||||||||||||||||||||||||
|
|
|
|
------------------------------
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.08
|
|
************************************
|
|
|