893 lines
39 KiB
Plaintext
893 lines
39 KiB
Plaintext
|
|
Computer underground Digest Wed Oct 29, 1997 Volume 9 : Issue 78
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.78 (Wed, Oct 29, 1997)
|
|
|
|
File 1--Sen. Lott's comments on Encryption (Cong. Record)
|
|
File 2--NPR Reporter Indicted For Trading Porn on the Net
|
|
File 3--Hack into Yale
|
|
File 4--Mitnick Might Get Computer Use
|
|
File 5--IRISS'98 Internet Research and Information for Social (fwd)
|
|
File 6--Re: In "Web things to do when you're dead" (CuD 9.73)
|
|
File 7--Electronic Frontier Canada opposes Internet content control
|
|
File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sat, 25 Oct 1997 09:19:53 -0700 (PDT)
|
|
From: Mike Godwin <mnemonic@well.com>
|
|
Subject: File 1--Sen. Lott's comments on Encryption (Cong. Record)
|
|
|
|
((MODERATORS' COMMENT: The following is taken from The Well's
|
|
EFF conference. Information about The Well can be obtained
|
|
at: http://www.well.com))
|
|
|
|
From the Congressional Record
|
|
----------------------------------------------------------
|
|
ENCRYPTION (Senate - October 21, 1997)
|
|
----------------------------------------------------------
|
|
|
|
[Page: S10879]
|
|
|
|
Mr. LOTT. Mr. President, I would like to report to my colleagues on the
|
|
activities in the House to establish a new export policy on encryption.
|
|
This is an issue that is still at the top of my list of legislation I
|
|
hope this Congress can resolve within the next 2 months. The House's
|
|
actions last month turned a spotlight on how this issue should
|
|
ultimately be resolved.
|
|
|
|
Let me briefly review the issue. Encryption is a mathematical way to
|
|
scramble and unscramble digital computer information during transmission
|
|
and storage. The strength of encryption is a function of its size, as
|
|
measured in computer bits. The more bits an encryption system has, the
|
|
more difficult it is for someone else to illegally unscramble or hack
|
|
into that information.
|
|
|
|
Today's computer encryption systems commonly used by businesses range
|
|
from 40 bits in key length to 128 bits. A good hacker, let's say a
|
|
criminal or a business competitor, can readily break into a computer
|
|
system safeguarded by a lower-technology 40-bit encryption system. On
|
|
the other hand, the 128-bit encryption systems are much more complex and
|
|
pose a significant challenge to any would-be hacker.
|
|
|
|
Obviously, all of us would prefer to have the 128-bit systems. And
|
|
equally as important, we would like to buy such systems from American
|
|
companies. Firms we can routinely and safely do business with. Foreign
|
|
companies and individuals also want to buy such systems from American
|
|
companies. They admire and respect our technological expertise, and
|
|
trust our business practices. The United States remains the envy of the
|
|
world in terms of producing top-notch encryption and information
|
|
security products.
|
|
|
|
However, current regulations prohibit U.S. companies from exporting
|
|
encryption systems stronger than the low-end, 40-bit systems. A few
|
|
exceptions have been made for 56-bit systems. Until recently, it has
|
|
been the administration's view that stronger encryption products are so
|
|
inherently dangerous they should be classified at a level equal to
|
|
munitions, and that the export of strong encryption must be heavily
|
|
restricted.
|
|
|
|
While we are restricting our own international commerce, foreign
|
|
companies are now manufacturing and selling stronger, more desirable
|
|
encryption systems, including the top-end 128-bit systems, anywhere in
|
|
the world they want. Clearly, our policy doesn't make sense. Just as
|
|
clearly, our export policies on encryption have not kept up to speed
|
|
with either the ongoing changes in encryption technology or the needs
|
|
and desires of foreign markets for U.S. encryption products.
|
|
|
|
My intention is neither to jeopardize our national security nor harm law
|
|
enforcement efforts. I believe we must give due and proper regard to the
|
|
national security and law enforcement implications of any changes in our
|
|
policy regarding export of encryption technology. But it is painfully
|
|
obvious we must modernize our export policies on encryption technology,
|
|
so that U.S. companies can participate in the world's encryption
|
|
marketplace. The legislative initiative on this issue has always been
|
|
about exports, but this summer that changed.
|
|
|
|
During the past month, the FBI has attempted to change the debate by
|
|
proposing a series of new mandatory controls on the domestic sale and
|
|
use of encryption products. Let me be clear. There are currently no
|
|
restrictions on the rights of Americans to use encryption to protect
|
|
their personal financial or medical records or their private e-mail
|
|
messages. There have never been domestic limitations, and similarly,
|
|
American businesses have always been free to buy and use the strongest
|
|
possible encryption to protect sensitive information from being stolen
|
|
or changed. But now, the FBI proposes to change all that.
|
|
|
|
The FBI wants to require that any company that produces or offers
|
|
encryption security products or services guarantee immediate access to
|
|
plain text information without the knowledge of the user. Their proposal
|
|
would subject software companies and telecommunications providers to
|
|
prison sentences for failure to guarantee immediate access to all
|
|
information on the desktop computers of all Americans. That would move
|
|
us into an entirely new world of surveillance, a very intrusive
|
|
surveillance, where every communication by every individual can be
|
|
accessed by the FBI.
|
|
|
|
Where is probable cause? Why has the FBI assumed that all Americans are
|
|
going to be involved in criminal activities? Where is the Constitution?
|
|
|
|
And how would this proposal possibly help the FBI? According to a
|
|
forthcoming book by the M.I.T. Press, of the tens of thousands of cases
|
|
handled annually by the FBI, only a handful have involved encryption of
|
|
any type, and even fewer involved encryption of computer data. Let's
|
|
face it--despite the movies, the FBI solves its cases with good
|
|
old-fashioned police work, questioning potential witnesses, gathering
|
|
material evidence, and using electronic bugging or putting microphones
|
|
on informants. Restricting encryption technology in the U.S. would not
|
|
be very helpful to the FBI.
|
|
|
|
The FBI proposal won't work. I have talked with experts in the world of
|
|
software and cryptography, who have explained that the technology which
|
|
would provide compliance with the FBI standard simply does not exist.
|
|
The FBI proposal would force a large unfunded mandate on our high
|
|
technology firms, at a time when there is no practical way to accomplish
|
|
that mandate.
|
|
|
|
Rather than solve problems in our export policy, this FBI proposal would
|
|
create a whole new body of law and regulations restricting our domestic
|
|
market.
|
|
|
|
This and similar proposals would also have a serious impact on our
|
|
foreign market. Overseas businesses and governments believe that the
|
|
U.S. might use its keys to computer encryption systems to spy on their
|
|
businesses and politicians. Most U.S. software and hardware
|
|
manufacturers believe this is bad for business and that nobody will
|
|
trust the security of U.S. encryption products if this current policy
|
|
continues. In fact, this proposal appears to violate the European
|
|
Union's data-privacy laws, and the European Commission is expected to
|
|
reject it this week.
|
|
|
|
So, the FBI proposal would: Invade our privacy; be of minimal use to the
|
|
FBI; would require nonexistent technology; would create new
|
|
administrative burdens; and would seriously damage our foreign markets.
|
|
|
|
This is quite a list.
|
|
|
|
Mr. President, the FBI proposal is simply wrong. I have learned that
|
|
even the administration does not support this new FBI proposal. So why
|
|
does the FBI believe it must now subject all Americans to more and more
|
|
surveillance?
|
|
|
|
This independent action by the FBI has created confusion and mixed
|
|
signals which are troublesome for the Senate as it works on this
|
|
legislation. Perhaps the FBI and the Justice Department need to focus
|
|
immediately on a coordinated encryption position.
|
|
|
|
Mr. President, I congratulate the members of the House Commerce
|
|
Committee for rejecting this FBI approach by a vote margin of more than
|
|
2 to 1.
|
|
|
|
I am sure all of my colleagues are sympathetic to the fact that emerging
|
|
technologies create new problems for the FBI.
|
|
|
|
But we must acknowledge several truths as Congress goes forward to find
|
|
this new policy solution. People increasingly need strong information
|
|
security through encryption and other means to protect their personal
|
|
and business information. This demand will grow, and somebody will meet
|
|
it. In the long term, it is clearly in our national interest that U.S.
|
|
companies meet the market demand. Individuals and businesses will either
|
|
obtain that protection from U.S. firms or from foreign firms. I firmly
|
|
believe that all of our colleagues want American firms to successfully
|
|
compete for this business. Today there are hundreds of suppliers of
|
|
strong encryption in the world marketplace. Strong encryption can be
|
|
easily downloaded off the Internet. Even if Congress wanted to police or
|
|
eliminate encryption altogether, I am not sure that is doable.
|
|
|
|
So, let's deal with reality. Clamping down on the constitutional rights
|
|
of American citizens, in an attempt to limit the use of a technology, is
|
|
the wrong solution. The wrong solution. This is especially true with
|
|
encryption technology because it has so many beneficial purposes. It
|
|
prevents hackers and espionage agents from stealing valuable
|
|
information, or worse, from breaking into our own computer networks. It
|
|
prevents them from disrupting our power supply, our financial markets,
|
|
and our air traffic control system. This is scary--and precisely why we
|
|
want this technology to be more available.
|
|
|
|
Only a balanced solution is acceptable. Ultimately, Congress must
|
|
empower Americans to protect their own information. Americans should not
|
|
be forced to only communicate in ways that simply make it more
|
|
convenient for law enforcement officials. This is not our national
|
|
tradition. It is not consistent with our heritage. It should not become
|
|
a new trend.
|
|
|
|
Mr. President, I would like to establish a framework to resolve this
|
|
difficult issue. I hope to discuss it with the chairmen and ranking
|
|
members of the key committees. I especially look forward to working with
|
|
the chairman of the Commerce, Science and Transportation Subcommittee on
|
|
Communications, Senator Burns. He was the first to identify this issue
|
|
and try to solve it legislatively. His approach on this issue has always
|
|
been fair and equitable, attempting to balance industry wants with law
|
|
enforcement requirements.
|
|
|
|
I believe there are other possible ideas which could lead to a consensus
|
|
resolution of the encryption issue. It is my hope that industry and law
|
|
enforcement can come together to address these issues, not add more
|
|
complexity and problems. The bill passed by the House Commerce Committee
|
|
included a provision establishing a National Encryption Technology
|
|
Center. It would be funded by in-kind contributions of hardware,
|
|
software, and technological expertise. The National Encryption
|
|
Technology Center would help the FBI stay on top of encryption and other
|
|
emerging computer technologies. This is a big step. This is a big step
|
|
in the right direction.
|
|
|
|
It is time to build on that positive news to resolve encryption policy.
|
|
|
|
Mr. President, there is an op-ed piece which appeared in the Wall Street
|
|
Journal on Friday, September 26. It is well written and informative,
|
|
despite the fact that its author is a good friend of mine. Mr. Jim
|
|
Barksdale is the president and CEO of Netscape Communications and is
|
|
well-versed in encryption technology. Mr. Barksdale's company does not
|
|
make encryption products; they license such products from others. They
|
|
sell Internet and business software and, as Jim has told me many times,
|
|
his customers require strong encryption features and will buy those
|
|
products either from us or foreign companies.
|
|
|
|
Again, let's deal with reality. The credit union manager in
|
|
Massachusetts, the real estate agent in Mississippi, the father writing
|
|
an e-mail letter to his daughter attending a California university, each
|
|
want privacy and security when using the computer. They will buy the
|
|
best systems available to ensure that privacy and security. And, in just
|
|
the same way, the banker in Brussels, Belgium, the rancher in Argentina,
|
|
and the mother writing e-mail to her daughter in a university in
|
|
Calcutta, India, each of these people also want privacy and security.
|
|
They also will buy the best systems available to ensure that privacy and
|
|
security. And they want encryption systems they trust--American systems.
|
|
That's what this debate is about.
|
|
|
|
Mr. President, if Congress does not modernize our export controls, we
|
|
run the real risk of destroying the American encryption industry. And we
|
|
risk giving a significant and unfair advantage to our foreign business
|
|
competitors.
|
|
|
|
[Page: S10881]
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 Oct 1997 18:19:13 GMT
|
|
From: owner-cyber-liberties@aclu.org
|
|
Subject: File 2--NPR Reporter Indicted For Trading Porn on the Net
|
|
|
|
Cyber-liberties Update
|
|
|
|
|
|
NPR Reporter Indicted For Trading Porn on the Net While
|
|
Researching Story
|
|
|
|
A veteran reporter for National Public Radio, who says he was
|
|
engaged in lawful newsgathering activities, was indicted in late
|
|
August by a federal grand jury for allegedly receiving and
|
|
sending child pornography through the Internet, Jane Kirtley,
|
|
Executive Director of the Reporters Committee for Freedom of the
|
|
Press (RCFP) said.
|
|
|
|
Larry Matthews pleaded not guilty to nine felony counts of
|
|
possession of child pornography and six counts of distribution of
|
|
such material in federal District Court in Maryland, saying that
|
|
he was using the material as research for a freelance story on
|
|
child pornography on the Internet.
|
|
|
|
Matthews had reported three stories on the issue prior to his
|
|
indictment, Kirtley said.
|
|
|
|
"This is exactly the type of action we predicted would happen
|
|
when Senator Hatch moved to pass the Child Pornography Prevention
|
|
Act (CPPA) which amended the Privacy Protection Act of 1980. The
|
|
new law removes exemptions that protected journalists from
|
|
federal search and seizures and creates an overbroad definition
|
|
of pornography," she said.
|
|
|
|
"The amendment was unnecessary since child pornography is already
|
|
illegal and the amendment leads to the overzealous persecution of
|
|
journalists engaged in protected newsgathering activities,"
|
|
Kirtley said.
|
|
|
|
The ACLU along with other week free-speech advocates recently
|
|
filed an appeal before the Court of Appeals in the Ninth Circuit
|
|
to another decision which upheld the CPPA as constitutional.
|
|
|
|
The suit is a pre-enforcement challenge to the law and claims it
|
|
is unconstitutional because it criminalizes the publication or
|
|
transmission of non-obscene images that "appear" to portray
|
|
children involved in sexual acts. The law applies to
|
|
computer-generated images, morphed images, films and drawings,
|
|
and bans any depiction that "is, or appears to be, of a minor
|
|
engaged in sexually explicit conduct."
|
|
|
|
+++++++++++++++++
|
|
|
|
About Cyber-Liberties Update:
|
|
|
|
ACLU Cyber-Liberties Update Editor:
|
|
Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
|
|
American Civil Liberties Union
|
|
National Office 125 Broad Street,
|
|
New York, New York 10004
|
|
|
|
To subscribe to the ACLU Cyber-Liberties Update, send a message to
|
|
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
|
|
message. To terminate your subscription, send a message to
|
|
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Oct 1997 21:16:13 -0500 (CDT)
|
|
From: Avi Bass <te0azb1@corn.cso.niu.edu>
|
|
Subject: File 3--Hack into Yale
|
|
|
|
Hacker breaks into Yale e-mail
|
|
|
|
By Jeff Herzog, The Yale Daily News, Oct. 16, 1997
|
|
|
|
Although no students realized it, Yale's computers were under attack
|
|
Tuesday.
|
|
|
|
A computer hacker "attacked" one of Yale's main e-mail account servers
|
|
under the nose of Information and Technology Service officials.
|
|
|
|
ITS staff detected a breach of the Pantheon login server as the
|
|
attacker aimed to capture passwords and login names, ITS officials
|
|
said.
|
|
|
|
"The primary purpose of the attack was to use Yale as an attack point
|
|
for other sites," Director of Academic Computing Services Philip Long
|
|
said. As a result of the security breech, ITS required all pantheon
|
|
users to change their account passwords.
|
|
|
|
"We don't have evidence of damage or tampering with accounts, but we
|
|
think it's important for students to change their security passwords
|
|
as a precaution," Long said.
|
|
|
|
ITS administrators said they believe that the hacker used a "sniffer,"
|
|
a rogue program designed to capture undetected all login names and
|
|
passwords.
|
|
|
|
As to the extent of damage the hacker caused, Long added, "We don't
|
|
have evidence of small or wide spread compromise of accounts."
|
|
|
|
<snip>
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 12 Oct 1997 16:14:45 -0400
|
|
From: "Evian S. Sim" <evian@escape.com>
|
|
Subject: File 4--Mitnick Might Get Computer Use
|
|
|
|
Valley Focus North Hills Alleged Hacker May Get Use of Computer
|
|
Los Angeles Times (LT)
|
|
FRIDAY October 10, 1997
|
|
By: ASSOCIATED PRESS
|
|
Edition: Valley Edition
|
|
Section: Metro
|
|
Page: 3 Pt. B
|
|
Story Type: Column; Brief;
|
|
Wire Word Count: 312
|
|
|
|
A federal judge may allow Kevin Mitnick use of a computer to help
|
|
him defend himself against computer and wire fraud charges.
|
|
|
|
U.S. District Judge Mariana Pfaelzer earlier had vowed to keep
|
|
Mitnick away from computers, but she seemed to back away from
|
|
that edict after listening to lawyers' arguments Wednesday.
|
|
|
|
Mitnick, who grew up in the Valley and began his electronic
|
|
obsession by breaking into Los Angeles Unified School District
|
|
computers while a student at Monroe High School in North Hills,
|
|
was on parole for other computer-related convictions when he
|
|
allegedly went on a three-year hacking spree in 1992. He has been
|
|
in prison since he was arrested in 1995.
|
|
|
|
Pfaelzer set an April 14 trial on 25 counts of computer and wire
|
|
fraud, possessing unlawful access devices, damaging computers and
|
|
intercepting electronic messages.
|
|
|
|
Mitnick has pleaded not guilty to those charges. If convicted, he
|
|
could face another five to 10 years in prison.
|
|
|
|
<snip>
|
|
|
|
Assistant U.S. Attorney David Schindler said that if all the
|
|
documents were printed it would fill up a space larger than the
|
|
courtroom.
|
|
|
|
Pfaelzer seemed to warm to the notion that Mitnick have access to
|
|
a laptop computer, and she told both sides to confer on how
|
|
Mitnick could best view the evidence against him.
|
|
|
|
Mitnick has been in jail since he was arrested in February 1995
|
|
in Raleigh, N.C., after an investigation and cross-country
|
|
manhunt ended in a trap sprung by Tsutomo Shimomura, an expert in
|
|
computer security.
|
|
|
|
Copyright (c) 1997, Times Mirror Company
|
|
|
|
------------------------------
|
|
|
|
Date: 97-10-19 14:59:13 EDT
|
|
From: John.Kirriemuir@bristol.ac.uk (John Kirriemuir)
|
|
Subject: File 5--IRISS'98 Internet Research and Information for Social (fwd)
|
|
|
|
1st call for delegates for IRISS and
|
|
2nd call for abstracts for IRISS
|
|
|
|
IRISS'98 Internet Research and Information for Social
|
|
Scientists
|
|
25-27 March 1998
|
|
University of Bristol, UK
|
|
http://www.sosig.ac.uk/iriss/
|
|
email: iriss-info@bris.ac.uk
|
|
|
|
A three day conference hosted by the Institute for Learning
|
|
and Research Technology at the University of Bristol.
|
|
|
|
The first international IRISS conference aims to bring
|
|
together social scentists who are interested in the
|
|
Internet, either as a means of supporting and
|
|
enhancing their work, or as a focus for their research.
|
|
|
|
***CONFERENCE THEMES***
|
|
|
|
The themes of this year's conference are Internet skills, sites and
|
|
social effects. The conference aims to reflect the practical and
|
|
theoretical questions raised by the increasing role of networked
|
|
information in the social sciences and society. Topics for debate
|
|
include:
|
|
|
|
* how can social scientists make effective use of the
|
|
Internet in their work?
|
|
* where and how are social scientists using the Internet
|
|
to enhance their work and what effect is it having on
|
|
traditional roles and working methods?
|
|
* what high quality information can the Internet supply to
|
|
social scientists?
|
|
* what impact does the Internet have on individuals and
|
|
society and what visions do we have for the future?
|
|
|
|
***ATTENDING IRISS AS A DELEGATE***
|
|
|
|
This is the first call for delegates for IRISS. Confirmed, to date,
|
|
for the conference are:
|
|
|
|
* several high-profile keynote speakers
|
|
* a large variety of papers and presentations, covering all of the
|
|
conference themes, and presented by speakers from a combination of
|
|
academic, commercial, public and social/voluntary organisations
|
|
* pre and during conference hands-on workshops, in fully networked
|
|
rooms and conducted by experienced Internet for Social Scientist
|
|
trainers
|
|
* the main conference dinner, held in the prestigious Harveys
|
|
Restaurant and Museum - see:
|
|
http://www.sosig.ac.uk/iriss/harveys.html
|
|
|
|
Bristol is a city in the west of England; it is served by an
|
|
international airport, located 11 miles south of the city. The city has
|
|
two major train stations, with frequent train services to London (in
|
|
under 2 hours) and other cities. South Wales is a few minutes away by
|
|
train or car, and the scenic areas of the Cotswolds, Cornwall and Devon
|
|
are all easily accessible, as are attractions such as the city of Bath,
|
|
Stonehenge and Avebury.
|
|
|
|
Bristol itself is a thriving cosmopolitan city, with a very lively
|
|
social and cultural scene. The city has many famous sites of
|
|
interest, such as the Clifton suspension bridge and the S.S. Great
|
|
Britain, which are within a short distance of the conference location
|
|
and accomodation. Various on-line guides to Bristol include:
|
|
|
|
http://www.epost.co.uk/standards/bestofbris.html
|
|
http://www.bristol.digitalcity.org/org/council/about-bristol.html
|
|
|
|
A reduction is available to all delegates registering before 19
|
|
December 1997. Further details on booking can be found on the IRISS Web
|
|
site.
|
|
|
|
***CALL FOR PAPERS***
|
|
|
|
We invite papers and participation from:
|
|
|
|
* practitioners in the field who use the Internet to
|
|
support their day to day work
|
|
* researchers using Internet information and communication
|
|
in their research
|
|
* librarians developing their Internet knowledge and skills
|
|
to serve a social science user group
|
|
* educators interested in using the Internet for teaching
|
|
and learning
|
|
* information providers who publish on the Internet and
|
|
wish to reach the social science community
|
|
|
|
In addition to concurrent paper and workshop sessions the
|
|
conference will feature an ongoing poster session and a
|
|
dedicated Internet Gallery in a fully networked environment
|
|
enabling contributors to display high quality Internet
|
|
resources.
|
|
|
|
***HOW TO CONTRIBUTE***
|
|
|
|
If you are interested in submitting a paper, joining the
|
|
Internet Gallery or ongoing poster session, visit our Web
|
|
site at:
|
|
|
|
http://www.sosig.ac.uk/iriss/
|
|
|
|
for conference information together with online booking and
|
|
submission forms. The Web site will be updated frequently
|
|
as information becomes available and will include full
|
|
programme details and abstracts. The deadline for the
|
|
submission of abstracts is 7 November 1997.
|
|
|
|
***CONFERENCE FEE***
|
|
|
|
Delegates presenting papers will pay a reduced conference
|
|
fee. A reduction will also be available to all delegates
|
|
registering before 19 December 1997. Full details are
|
|
available from the Web site.
|
|
|
|
***HOST A MEETING AT IRISS***
|
|
|
|
Would your organisation or professional association like to
|
|
host a meeting at IRISS? We can provide free meeting
|
|
rooms and refreshments for groups booking to attend the
|
|
conference. Special discounts are available to groups of
|
|
10 or more. For further information contact the Conference
|
|
Secretary at:
|
|
|
|
iriss-info@bris.ac.uk
|
|
|
|
General conference enquiries should be directed to:
|
|
|
|
IRISS Conference Secretariat
|
|
Institute for Learning and Research Technology
|
|
University of Bristol
|
|
8 Woodland Road
|
|
BRISTOL
|
|
BS8 1TN, UK
|
|
Tel: +44 (0)117 928 8474
|
|
Fax: +44 (0)117 928 8473
|
|
Email: iriss-info@bris.ac.uk
|
|
|
|
IRISS Web site: http://www.sosig.ac.uk/iriss/
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 13 Oct 97 11:01:45 MDT
|
|
From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
|
|
Subject: File 6--Re: In "Web things to do when you're dead" (CuD 9.73)
|
|
|
|
I couldn't help but comment on this:
|
|
|
|
|Things to Do on the Web When You're Dead
|
|
| by David Blatner <david@afterlife.org>
|
|
|
|
|
| ... But I wonder how many people's sites are simply being "turned off"
|
|
| when they no longer have a voice (or a checkbook) to sustain them?
|
|
|
|
I like how you sneaked in that bit about the checkbook.
|
|
That comment seems to imply that a web presence should be free.
|
|
I fear a society where people not only don't have to work to supply
|
|
themselves with food and shelter, but they have a 'right' to a home
|
|
page? Frightening. Who exactly would pay for such a society?
|
|
|
|
--------------------------------------------------
|
|
|
|
|From--The Old Bear <oldbear@arctos.com>
|
|
|Subject--Spam Analysis
|
|
|
|
|
| 3. the apparent evolution of a subset of standard English
|
|
| punctuation which might be called 'spammese'.
|
|
|
|
Excellent catch on the exclamation point. I've been filtering my
|
|
mailbox for spam as well - and I've found that the To, From and Subject
|
|
fields can often give away spam - part of my filter searches for:
|
|
|
|
From:.*(success|money|mailbot)
|
|
To:.*(free@|you@|success|nobody@|friend@|money|askme|prices)
|
|
Subject:.*(18\+|Pix|Hot.*Website|Adult.*Video)
|
|
|
|
I only hit normal email (normail? ;) once with these regexps, and
|
|
only because I screwed up and used 18+ instead of 18\+.
|
|
|
|
I find that false positives aren't a problem because procmail saves off
|
|
guessed SPAM and sends a reply explaining that the message was recognized
|
|
as spam and gives contact instructions if this is a mistake. Not once
|
|
has a spammer used my contact instructions to get spam to me.
|
|
|
|
--------------------------------------------------
|
|
|
|
|From--Jonathan Wallace <jw@bway.net>
|
|
|Subject--File 9--THE X-STOP FILES: The Truth Isn't Out There
|
|
|
|
|
| So another censorware product has been found to secretly been
|
|
|blacklisting gay and lesbian material, anti-censorship sites, feminist...
|
|
|
|
I fully agree with your analysis that censorware doesn't work and will
|
|
probably never work well. I am however concerned that we are pointing
|
|
out the impracticalities of one of the concepts we used to our defense
|
|
against censorship of the entire net.
|
|
|
|
So - to play Devil's Advocate for a moment, let's say you have children
|
|
that you want to use the computer, but you really don't want them to
|
|
access pornography when you're not looking. Sure - you could tell
|
|
them to be a better parent, but my parents were great and I would've
|
|
been up until two in the morning finding out what the female body
|
|
looks like if we had the net when I was a kid :)
|
|
|
|
Disregarding the discussion over whether or not we should allow our
|
|
kids to look at such material, let's just assume:
|
|
|
|
1) Parents have the right to decide their kids shouldn't view such material
|
|
2) Kids will try to view such material regardless of what they are taught
|
|
3) Just keeping these kids off the net isn't necessarily fair.
|
|
|
|
Whether or not it's true isn't as important, because a huge amount of
|
|
the population believes that it's true and will fight for it strongly.
|
|
|
|
So what solution do we give these people? Right now they have none, except
|
|
to watch their children every moment they are on the computer. Can we
|
|
find a solution? One possibility I came up with was creating a 'safeweb'.
|
|
|
|
Safeweb would be similar to self-rating, but instead of deciding what
|
|
category a page would fit into (a difficult thing to do), there would
|
|
only be one 'rating' - that a page was deemed 'safe' - or at least
|
|
innocuous. What would determine 'safe'? Well - it's not as big
|
|
of an issue anymore, because it's not really an issue of censorship -
|
|
you could have a democratic majority decision on an easy to follow
|
|
set of standards for safe. You wouldn't have to worry about whether or
|
|
not different levels of nudity or 'language' would be included, you could
|
|
just not include any of it. I know there can be nitpicking here, i.e.,
|
|
are greek statues considered nudity, and so forth, but I don't think
|
|
that flaws the idea.
|
|
|
|
So the beauty of it is the end result, not the idea itself. You end up
|
|
having a web with a small percentage of which is deemed safe (in the
|
|
Barney sense :). Then parents can set the browser to view safe material
|
|
only, much like censorware. The beauty is that suddenly the parents
|
|
see what they are limiting their children to by trying to censor any
|
|
material that might have nudity or 'dirty words' in it, for golly's sake ;)
|
|
|
|
Then it's up to the parents to decide if they want their children to
|
|
be limited by their own decisions. One could argue that point #1 above
|
|
is illegitimate, that we should stop these parents from limiting their
|
|
children's growth, but then again, I don't think there's much you can
|
|
do to help children whose parents will only let them on BarneyWeb.
|
|
|
|
But finally we'd have an answer for the fundamentalists.
|
|
|
|
Any thoughts?
|
|
|
|
Dave Ljung
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 Oct 1997 13:42:16 -0400
|
|
From: Paul Kneisel <tallpaul@nyct.net>
|
|
Subject: File 7--Electronic Frontier Canada opposes Internet content control
|
|
|
|
Electronic Frontier Canada says the Canadian Human Rights Commission should
|
|
not attempt to control Internet content
|
|
|
|
ELECTRONIC FRONTIER CANADA (EFC) --- PRESS RELEASE
|
|
|
|
(For immediate release --- Thursday, October 16, 1997)
|
|
<http://insight.mcmaster.ca/org/efc/pages/pr/efc-pr.16oct97.html>
|
|
|
|
Electronic Frontier Canada (EFC), Canada's premier organization devoted to
|
|
the protection of freedom of expression in cyberspace, is opposed to the
|
|
Canadian Human Rights Commission's current attempt to control the flow of
|
|
information on the Internet.
|
|
|
|
In a series of hearings that began in Toronto on October 14th, a Human
|
|
Rights Tribunal will attempt to decide if a California web site spreading
|
|
Ernst Zundel's hateful messages is a discriminatory practice that falls
|
|
under the jurisdiction and within the scope of the Canadian Human Rights Act.
|
|
|
|
EFC's opposition to the Commission's agenda should not be interpreted as
|
|
support for Zundel. Like the vast majority of Canadians, EFC finds Zundel's
|
|
anti-Semitic views ludicrous, grotesque, and offensive. However, in the
|
|
words of Oliver Wendell Holmes, EFC believes that free speech means
|
|
"freedom for the thought that we hate."
|
|
|
|
EFC believes the expression of controversial opinions, no matter how
|
|
erroneous or repugnant, should be protected from government censorship by
|
|
the Charter of Rights and Freedoms.
|
|
|
|
"Of course, this doesn't mean that all speech is protected," says David
|
|
Jones, EFC's president and a professor of computer science at McMaster
|
|
University. "The Charter does not, for example, protect fraud, libel, or
|
|
death threats, whether over the Internet or not."
|
|
|
|
"Expressions of opinion, and even claiming that the Holocaust is a hoax,"
|
|
adds EFC vice-president Jeffrey Shallit, "should be protected." EFC favours
|
|
the repeal of all Canadian laws restricting hate speech.
|
|
|
|
"Laws intended to restrict 'bad' speech are often too broadly written, and
|
|
have the potential to restrict genuine debate," explains Shallit, who is a
|
|
computer science professor at the University of Waterloo. "Let's not forget
|
|
that the Communications Decency Act was recently found to be
|
|
unconstitutional by the U.S. Supreme Court," he says, "in part because it
|
|
did not distinguish between 'obscene' speech and speech that was merely
|
|
'indecent'."
|
|
|
|
"I'm sure if the Commission thought it could prove that the Zundelsite fell
|
|
within the legal definition of 'hate propaganda', as defined in sections
|
|
319 and 320 of the Criminal Code," says Jones, "then this would be a
|
|
criminal proceedings."
|
|
|
|
"Instead," continues Jones, "the worst this Tribunal can decide is that
|
|
publishing the web site is a 'discriminatory practice' under the Canadian
|
|
Human Rights Act, that 'exposes people to hatred or contempt'." "It's a
|
|
broader and more flexible legal concept, and the standard of proof is not
|
|
as rigourous because the penalty that can be imposed is less severe."
|
|
|
|
"But on the other hand," says Jones, "if the Tribunal issues a
|
|
cease-and-desist order and the web pages do not go away, Zundel might be
|
|
jailed for contempt."
|
|
|
|
"I question whether it is a distortion of the judicial process, considering
|
|
the eventual outcome may be the same, to allow the Commission to attempt to
|
|
do through the back door what they could not possibly hope to achieve
|
|
through the front door," says Jones.
|
|
|
|
This is not about technology, not about jurisdiction, not about regulating
|
|
the Internet, and not about setting legal precedents," asserted Bernie
|
|
Farber of the Canadian Jewish Congress during a recently televised debate
|
|
on CBC Newsworld. "This is about punishing Ernst Zundel," he said.
|
|
|
|
"I'm sure some people would like to skip the hearing and go straight to the
|
|
punishment," says Jones, "but the details really do matter in this case.
|
|
This hearing is all about whether a government department can re-interpret
|
|
an old law to give itself sweeping new regulatory powers over the Internet."
|
|
|
|
Section 13(1) of the Canadian Human Rights Act was introduced by Parliament
|
|
to control hateful messages on telephone answering machines. "It is too
|
|
crude an analogy to suggest that a collection of Internet web pages is the
|
|
same thing as an answering machine," says Jones. "The whole context and
|
|
inter-connectedness of the web and the way people interact with and
|
|
navigate through the medium are different in important and significant ways."
|
|
|
|
"If Canadians want content on the Internet to be controlled by the
|
|
government, then what we need is a broad national debate to decide where we
|
|
want to draw the line," suggests Shallit. "Dusting off old pieces of
|
|
legislation and misapplying them to this new communication medium is not
|
|
the way for Canadians to step into the 21st century."
|
|
|
|
EFC acknowledges that Canadians need effective strategies for dealing with
|
|
controversial or hateful speech, but EFC's position is that the proper
|
|
remedy for racist speech is not less speech, but more speech.
|
|
|
|
EFC gives high praise to hard-working community organizations like Ken
|
|
McVay's Nizkor Project, which maintains a huge electronic archive of
|
|
material devoted to preserving the history of the Holocaust and dedicated
|
|
to the memory of all who died at the hands of the Nazis.
|
|
|
|
"Instead of banishing the hatemongers to the shadows, or making them
|
|
martyrs by giving them an expensive show trial," says Shallit, "the Nizkor
|
|
Project shines the intense light of public scrutiny on people like Zundel
|
|
and exposes their deceptive messages for what they are - warts and all. It
|
|
is an approach that really works."
|
|
|
|
Another notable web site, run by the McGill Hillel student organization to
|
|
support the Jewish student community, provides one of the most extensive
|
|
lists of hyperlinks to hate web sites ever compiled. There purpose, of
|
|
course, is not to promote hatred, but to educate people about its enduring
|
|
presence in society.
|
|
|
|
"Electronic Frontier Canada is pleased to announce donations to both the
|
|
Nizkor Project and McGill Hillel Student Centre," said EFC president David
|
|
Jones, "to encourage them to continue their efforts in dealing with hateful
|
|
content on the Internet. In our view, theirs is the only approach that has
|
|
had any significant success."
|
|
|
|
"At the end of the day," says Jones, "no matter what the Tribunal decides,
|
|
the Canadian government cannot possibly hope to control the flow of
|
|
information on the Net."
|
|
|
|
"Sure, they can go ahead and lock Zundel behind bars, if they decide the
|
|
law allows it," concedes Jones, "but once the information is on the Net,
|
|
it's not going to disappear."
|
|
|
|
----------------------------------------------------
|
|
|
|
EFC Contact Information:
|
|
Electronic Frontier Canada
|
|
|
|
Dr. David Jones, djones@efc.ca
|
|
phone: (905) 525-9140 ext. 24689, fax: (905) 546-9995
|
|
|
|
Dr. Jeffrey Shallit, shallit@efc.ca
|
|
phone: (519) 888-4804, fax: (519) 885-1208
|
|
|
|
Dr. Richard Rosenberg, rosen@efc.ca
|
|
phone: (604) 822-4142, fax: (604) 822-5485
|
|
|
|
Electronic Frontier Canada's, online archives:
|
|
URL: http://www.efc.ca
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.78
|
|
************************************
|
|
|
|
|