904 lines
44 KiB
Plaintext
904 lines
44 KiB
Plaintext
|
|
Computer underground Digest Tue Nov 4, 1997 Volume 9 : Issue 80
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.80 (Tue, Nov 4, 1997)
|
|
|
|
File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE APOCALYPSE?
|
|
File 2--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 28 Oct 1997 23:58:55 -0500
|
|
From: Paul Kneisel <tallpaul@nyct.net>
|
|
Subject: File 1--WILL "HATE SPEECH" BECOME 5th HORSEMAN OF THE APOCALYPSE?
|
|
|
|
WILL "HATE SPEECH" BECOME FIFTH HORSEMAN OF THE APOCALYPSE?
|
|
The Tired Four Horsemen
|
|
|
|
by tallpaul
|
|
|
|
ROPER: So now you'd give the Devil benefit of law!
|
|
|
|
MORE: Yes. What would you do? Cut a great road through the law to get
|
|
after the Devil?
|
|
|
|
ROPER: I'd cut down every law in England to do that!
|
|
|
|
MORE: Oh? And when the last law was down, and the Devil turned round
|
|
on you--where would you hide, Roper, the laws all being flat? This
|
|
country's planted thick with laws from coast to coast--man's laws, not
|
|
God's--and if you cut them down--and you're just the man to do it--d'you
|
|
really think you could stand upright in the winds that would blow then?
|
|
Yes, I'd give the Devil benefit of law, for my own safety's sake.
|
|
|
|
--Robert Bolt "A Man For All Seasons"
|
|
|
|
You haven't heard much from the Four Horsemen of the Apocalypse recently.
|
|
The dreaded "hackers, terrorists, drug dealers and kiddie pornographers" of
|
|
cyberspace who once caused Presidents and Prime Ministers to tremble and
|
|
mothers to herd their children into their beds at sundown have been
|
|
strangely quiet, if only measured by the absence of significant media
|
|
reports to the contrary. Perhaps in these modern times the wages of sin are
|
|
no longer death but just a really tired feeling, as comedienne Paula
|
|
Poundstone comments.
|
|
|
|
Yet the Four Horsemen once caused millions people off-the-net to call for
|
|
all manner of controls on the Global Information Superhighway.
|
|
|
|
Part I: The Tired Four Horsemen
|
|
|
|
Concerned parents "cruising the net" to see what their children were
|
|
exposed to found little evidence of drug dealing. There is a lot of spam
|
|
for $50,000 a week pyramid schemes, but little advertising at web sites for
|
|
Jack's House'O'Crack, Crack Attack, or Crack'n'Smack.
|
|
|
|
Where are the "terrorists" on the Internet against whom we need increased
|
|
government powers? (I use the term here as the government uses it, not as
|
|
anti-hate or civil-libertarian forces might.)
|
|
|
|
Even the most anti-Islamic forces do not charge that we can find web pages
|
|
from "Crazy Abdul's" where you can buy AK-47 assault rifles and C4 plastic
|
|
explosive at "prices so low they're INSANE!"
|
|
|
|
The very phrase "terrorist" has a considerable political bias that makes
|
|
the whole notion of supporting a cop crackdown on "hate crimes" exceedingly
|
|
problematical. Black churches burn up in the South, abortion clinics blow
|
|
up, and members of right-wing and fundamentalist Christian militias are
|
|
convicted of crimes ranging from multiple murders down the list of lesser
|
|
felonies. But not a single such right-wing individual is identified on the
|
|
FBI's current "Ten Most Wanted" list.[1]
|
|
|
|
Chillingly, *the* "major investigation" for today's FBI does not involve
|
|
any of the bank robberies or murders for which right-wing hate-based forces
|
|
are suspected.[2] It involves cemetery desecrations. It's easy to imagine
|
|
that the investigation centers on those who spray paint swastikas and Nazi
|
|
slogans in Jewish cemeteries since we read so many stories about this in
|
|
the daily papers. But the imagination is wrong. Rather the *top-listed*
|
|
investigation is of inferentially anti-hate activists for ostensibly
|
|
desecrating cemeteries with the phrase ""H[awaii] P[olice] D[epartment]
|
|
ignores hate crimes. Ignore this."[3]
|
|
|
|
Nor is the international scene better. The State Department just released
|
|
its own list of "international terrorist organizations."[4] Only three of
|
|
the 31 organizations have a recognizable right-wing orientation. These are
|
|
the archly anti-Semitic Aum Shinrikyo (AUM) cult in Japan and the two
|
|
right-wing-Zionist groups Kach and Kahane Chai. Not surprisingly, the State
|
|
Department was unable to find a single military-based death squad or
|
|
neo-fascist group in the world to which it was willing to pin the
|
|
"terrorist" designation. Nor, with the exception of those groups ostensibly
|
|
based in Islam or AUM, is there a single recognizably-named political (as
|
|
opposed to religious) anti-Semitic organization listed.
|
|
|
|
"Kiddie porn" got a small boost in the past week or so when international
|
|
police consortiums charged several people with trafficking and even got a
|
|
conviction of one person in the U.S.[5] Even the power of a conviction to
|
|
motivate people was offset by several factors. The first was that it
|
|
occurred under existing laws and conditions without any special need for
|
|
changes. The second was that the man convicted was already in prison when
|
|
he used a prison-based computer to commit the new crime for which he was
|
|
convicted, showing that convictions do not forever prevent the crime from
|
|
occurring. The third was the release of Methodist minister Rev. Nathaniel
|
|
T. Grady after serving ten years for rape, sodomy, and sexual abuse of six
|
|
children between three and five years old.[6] An appeals court ruled that
|
|
Rev. Grady was falsely convicted in one of the sexual hysterias sweeping
|
|
the country.
|
|
|
|
The hysteria around "kiddie porn" on the net has its own prehistory
|
|
beginning over a decade ago with the "missing children" scare that led to a
|
|
significant increase in photos appearing on milk cartons. It then moved to
|
|
the "Satanic molestations" at day care centers and "recovered memory
|
|
therapy" that virtually guaranteed that you, too, could discover that you
|
|
were a victim of childhood sexual molestation. The hysteria culminated with
|
|
J. Quitter's article in _TIME_ magazine about an ostensible study of
|
|
"kiddie porn" on the net via Marty Rimm and Carnegie Mellon University.[7]
|
|
|
|
The cooler heads discovered that most missing children were only missing to
|
|
one parent. The other parent, involved in a messy divorce, has snatched the
|
|
child. The Satanic scare, reflected in cases like McMartin in California
|
|
and Michaels in New Jersey, started to break down. Incredibly expensive
|
|
trials led either to no convictions or convictions reversed on appeal as
|
|
saner courts examined the ostensible evidence and saw none to examine.
|
|
"Recovered memories" of sexual abuse cracked when therapists specializing
|
|
in such ostensible therapy started losing big lawsuits to the innocent
|
|
people they targeted as molesters. The Rimm study on the Internet soon came
|
|
under enormous criticism.[7]
|
|
|
|
Of course, all of the Four Horsemen (along with every other group in the
|
|
world) are on the net. This includes "kiddie pornographers" or at least
|
|
those accused of it. It is easy argue that even one convicted "kiddie porn"
|
|
trafficker is one too many. The same can be said of cannibals like Jeffrey
|
|
Dahmer. But does it justify the creation of a Kitchen Decency Act where
|
|
warrentless searches are permitted for fear that we will have Hannibal
|
|
Lecter as a dinner guest?
|
|
|
|
The use of the Horseman to motivate a crackdown on civil liberties becomes
|
|
even more problematical as people discover that the arguments are used to
|
|
bolster a different politic. "Many of these companies are using the
|
|
public's discomfort with new technologies and the hysteria of easy access
|
|
to pornography on the Internet to further an anti-gay agenda," said Loren
|
|
Javier, GLAAD's Interactive Media Director.[8]
|
|
|
|
Even the infamous "hacker menace" has lost its ability to motivate attacks
|
|
on the U.S. Bill of Rights.
|
|
|
|
Part of this is due to increased public knowledge of computers and systems.
|
|
Press coverage of _2600_ magazine's recent beyondHOPE hacker convention in
|
|
New York City tended to be free from the hysteria that has marked such
|
|
coverage in the past.[9]
|
|
|
|
Another reason why the Four Horsemen lack motivational power for the
|
|
crackdown is that the dire predictions made for the past 30 years have not
|
|
come true. Leon Festinger, in his book _When Prophecy Fails_, showed how
|
|
failed predictions often lead those who made them to cling to, rather
|
|
abandon, the prediction. But such actions only pertain to those actually
|
|
making the predictions, not the bulk of the citizenry who only heard the
|
|
prediction made. Hackerdom has produced events like the Internet worm a few
|
|
years ago but even this was not the disaster that the control-pundits
|
|
warned about. Despite the horrible predictions, the average citizen has
|
|
spent thirty years since Captain Crunch and the original phone phreaks
|
|
waiting for the *first* massively destructive shoe to drop.
|
|
|
|
No, these Horseman have not produced the Apocalypse from which forces
|
|
hostile to the U.S. Bill of Rights want to protect us.
|
|
|
|
The issue of quality encryption and anonymous remailers has also run into
|
|
difficulties as a mass motivator for additional government control of
|
|
cyberspace.
|
|
|
|
When export controls on PGP were in place, the labyrinthine procedures
|
|
necessary to get a copy were likely beyond the capability of most new
|
|
users. Learning to use it was even more daunting, although considerably
|
|
assisted by new books like those from O'Reilly and Associates.[10]
|
|
|
|
Anonymous remailer systems introduce yet another level of complexity. By
|
|
the end of the process, Steve Harris, the author of the "John Doe"
|
|
front-end software for PGP and remailers, once estimated that only 500
|
|
people in the world were sophisticated enough to use the whole system.[11]
|
|
This represents quite a comedown for a society reared on the dreaded "Red
|
|
Menace" from the former Soviet Union or the hysteria of a millennia-old
|
|
Satanic conspiracy sacrificing 50,000 children a year just in the U.S.
|
|
|
|
The mere existence of highly secure encryption systems that potential
|
|
criminals *might* use does not in itself create a global problem. Andy
|
|
Oram, an editor at O'Reilly & Associates and the moderator of the
|
|
discussion list for Computer Professionals for Social Responsibility,
|
|
points out that commercial needs can severely limit the use of technology
|
|
of anonymity. "Repressive forces have constantly argued that they need to
|
|
control encryption and anonymous remailers in order to attack pornography.
|
|
But the vast majority of distributors of pornography can't hide themselves,
|
|
because they want payment. They have to advertise their presence! They're
|
|
the last people to hide behind encryption and anonymity."
|
|
|
|
Nor are the remailer systems all that secure against actions using existing
|
|
laws and technologies (whether overt or covert.)
|
|
|
|
<penit.fi> in Finland, the oldest of the systems, shut down after the owner
|
|
received a subpoena to deliver the name of a user. The others, as standard
|
|
computer systems, are as vulnerable to individual attack as any other
|
|
individual system.
|
|
|
|
We saw a federal armored combat vehicle gradually demolish the fortified
|
|
headquarters of the Branch Davidian compound in Waco, Texas. Is the notion
|
|
of a cyber-siege so outlandish then, where government computer systems
|
|
would launch simultaneous SYNC attacks against a rogue remailer system if
|
|
the same government deemed it was actively being used by terrorists? The
|
|
recent attack by forces supporting the anti-Basque policies of the Spanish
|
|
government on the Institute For Global Communications (IGC) site indicates
|
|
"no."
|
|
|
|
Of course the anonymous remailers themselves are not anonymous. The owners
|
|
and administrators are subject to the same system of social defense (or
|
|
political attack) as all other individuals in society. A simple court
|
|
injunction would likely shut them down or result in the arrest on contempt
|
|
charges of any administrator who disobeyed.
|
|
|
|
Any of the Four Horsemen can be used to whip up a short-term concern. Such
|
|
hysterias are not difficult to create. Social psychologists can track the
|
|
movement of local versions of mass hysteria across geographic areas as if
|
|
they were weather fronts.
|
|
|
|
A gruesome child kidnapping and murder can capture headlines until a Royal
|
|
Celebrity dies. Bombing a public building calls for changes in laws until
|
|
that story is swept away by news of a large drug raid, only to have that
|
|
replaced by a tale of young hackers "reprogramming the orbits of space
|
|
satellites."
|
|
|
|
Even the well-known mass hysterias of the past were so often simply local
|
|
upsurges that burned out in one area and then moved on to the next.
|
|
Outbursts of the European Witch Craze might last for decades in different
|
|
countries but took the form of waves of short-term hysteria sweeping
|
|
through villages and counties. The Salem Witch Trials, probably the best
|
|
known hysteria in the U.S., was obviously limited to the Salem area. Less
|
|
well known is that by 1692 the major Salem jury, led by its foreman Thomas
|
|
Fisk, had recovered and shame-faced, issued a written apology for their
|
|
actions to their victims (or to the community and those victims still
|
|
alive.)[12] In the language of today's Internet, the hanging jury confessed
|
|
they were a group of "clueless newbies."
|
|
|
|
None of the short-term "god ain't it horrible" stories about the net serve
|
|
to create the type of mass sustained public concern necessary to rewrite or
|
|
reinterpret citizen rights to give governments sweeping new powers to
|
|
"protect" citizens.
|
|
|
|
Government claims to protect citizens' privacy with new anti-encryption
|
|
proposals are, at best, little more than the pious wishes of bureaucrats.
|
|
This was clearly seen last month when a hacker group intercepted and
|
|
published pager communications by White House functionaries.
|
|
|
|
"We are publicizing this flaw in the hopes that it will finally be fixed,"
|
|
said Pamela Finkel, one of the organizers of the Hackers On Planet Earth
|
|
(HOPE) conference and a lead spokesperson for the group. "It's an excellent
|
|
example of why we need encryption to protect sensitive information.
|
|
|
|
"I hope that this demonstration causes encryption to be added to the pager
|
|
network," Finkel added. "This incident shows that the President's policy on
|
|
encryption is so poorly crafted that it could have even compromised his own
|
|
personal security."[13]
|
|
|
|
The totality of pro-regulation arguments around the Four Horseman take on a
|
|
separate four related characteristics. "First, the occasional conviction we
|
|
get shows that criminal behavior is epidemic on the net. Second, without
|
|
new laws we cannot get convictions. Third, encryption prevents us from
|
|
getting convictions but the new encryption rules we propose will let us
|
|
protect your privacy. Fourth, we cannot protect our own."
|
|
|
|
Only the Tooth Fairy lets you have all four at the same price.
|
|
|
|
This does not stop the forces opposed to civil liberties from pushing for
|
|
new laws with new arguments.
|
|
|
|
It does, however, make their past efforts increasingly problematical for
|
|
them, with a character somewhere between the Orwellian and the humorous.
|
|
|
|
One central problem -- given the existence of telephones and computers --is
|
|
the *relative* unimportance of the Internet. The two pre-Internet
|
|
technologies make the Internet little more that a set of protocols
|
|
concerning data. One set, like TCP/IP, determines how data is transmitted
|
|
over the phones via computer. The other, like the World Wide Web and the
|
|
Usenet news groups, determines how pre-existing data is stored. The
|
|
Internet could disappear tomorrow while phones plus computers would permit
|
|
all of the Horseman to continue their ostensible gallop, either via direct
|
|
modem-to-modem connections or via non-Internet private bulletin board systems.
|
|
|
|
A more Orwellian view was recently expressed by Alan McDonald, "a senior
|
|
executive with the FBI," who said "that 'extremist' positions on electronic
|
|
encryption are a threat to normal law enforcement and are elitist and
|
|
nondemocratic. Insisting that the United States had remained true to the
|
|
Constitution and to a system of ordered liberties, McDonald says: 'When
|
|
people don't know much about electronic surveillance, they are fearful of
|
|
it. But when they know Congress passed laws and the Supreme Court reviewed
|
|
them and that there are numerous constraints and procedures, then it makes
|
|
sense to them. It seems rational and balanced'."[14]
|
|
|
|
Perhaps the greatest sense of Orwellian doublethink from FBI pundits here
|
|
is over the notion of judicial review. The courts have indeed reviewed
|
|
cases brought before it by McDonald's "privacy extremists" and struck down
|
|
the laws. The Zimmerman case involving the export of PGP encryption
|
|
technology was dropped. The Communications Decency Act was declared
|
|
unconstitutional. Recent state attempts to control the Internet by New York
|
|
and Georgia have similarly been struck down.[15]
|
|
|
|
Measured even from the standpoint of the U.S. judiciary, the positions the
|
|
FBI denounces as "extremist," elitist, and undemocratic far better define
|
|
the actions of the FBI and other branches of the U.S. executive branch of
|
|
government than its opponents.
|
|
|
|
Yet the same executive branch of government funds its own extremism in
|
|
these areas with $US 250 million a year. This is a sizeable chunk of
|
|
change, but, according to the President's Commission on Critical
|
|
Infrastructure Protection, is not sufficient to even "jump start" the
|
|
battle against "physical and cyber threats." A dollar just doesn't go as
|
|
far these days as it did when J. Edgar Hoover headed the FBI and Richard
|
|
Nixon called for Law And Order. Now the Clinton government wants an
|
|
additional $US 250 million for 1999 "and $100 million each succeeding year
|
|
until they reach $1 billion in 2004."[16]
|
|
|
|
Some find this effort far more chilling to the well-being of the citizenry
|
|
than the mythology of the Four Horsemen themselves.
|
|
|
|
Something else is required to motivate an increasingly tax-shy electorate
|
|
to pop for a billion a year as the Horsemen increasingly fail to provide
|
|
sufficient motivation.
|
|
|
|
Then ... however ... there is the new issue of "hate speech."
|
|
|
|
FOOTNOTES
|
|
|
|
[1] Federal Bureau of Investigation: "the FBI's TEN MOST WANTED fugitives,"
|
|
via:
|
|
|
|
<http://www.fbi.gov/mostwant/tenlist.htm>, accessed 13 Oct 97.
|
|
|
|
[2] Federal Bureau of Investigation: "Major Investigations." via:
|
|
|
|
<http://www.fbi.gov/majcases.htm>, accessed 13 Oct 97.
|
|
|
|
[3] Federal Bureau of Investigation: "Cemetery Desecration," via:
|
|
|
|
<http://www.fbi.gov/majcases/desecration/hawaii.htm>, accessed 13 Oct 97.
|
|
|
|
[4] Office of the Co-ordinator for Counterterrorism of the U.S. State
|
|
Department, "Foreign Terrorist Organizations," via:
|
|
|
|
<http://www.state.gov/www/global/terrorism/terrorist_orgs_list.html>,
|
|
accessed 13 Oct 97.
|
|
|
|
[5] _New York Times_, 5 Sep 97. no author listed in summary via EduPage
|
|
<educom@educom.unc.edu>, "Minnesota Child Molester Convicted of Cyber
|
|
Porn," 7 Sep 97.
|
|
|
|
[6] David Stout, "Conviction for Child Abuse Overturned 10 Years Later,"
|
|
_New York Times,_, 30 Sep 97, p. B3. no on-net source found to cite.
|
|
|
|
[7] See "The Rimm/Carnegie Mellon University/TIME Cyberporn 'study' Debate
|
|
(NIU Sociology 476 - Ethics of Fieldwork Segment)," via:
|
|
|
|
<http://venus.soci.niu.edu/~cudigest/rimm/rimm.html>. accessed 5 Sep 1997.
|
|
|
|
[8] "Disturbing Anti-gay Trend Continues in Cyberspace," "GLAADLines"
|
|
electronic news post, 25 Aug 97, Gay & Lesbian Alliance Against Defamation
|
|
<glaad@glaad.org> and via:
|
|
|
|
<http://www.glaad.org>.
|
|
|
|
[9] For examples of the press coverage of "beyondHOPE," see for example The
|
|
Cheshire Catalyst's web age via:
|
|
|
|
<http://digital.net/~cheshire/#hope>
|
|
|
|
[10] Simson Garfinkel, _PGP: Pretty Good Privacy_, (O'Reilly & Associates,
|
|
Sebastopol, CA: 1995).
|
|
|
|
[11] Steve Harris, via:
|
|
|
|
<http://www.compulink.co.uk/~net-services/pgp/>
|
|
|
|
[12] Thomas Fisk, Thomas Pearly senior, William Fish, et al. "We confess
|
|
that we ourselves were not capable to understand...." quoted by Kurt
|
|
Seligman, _The History of Magic and the Occult_ (Harmony Books, New York:
|
|
1983) p. 191.
|
|
|
|
[13] Pamela Finkel, "Media Advisory: Hackers Expose Vulnerability in White
|
|
House Security," 16 Sep 97, via:
|
|
|
|
<http://www.inch.com/~esoteric/pam_suggestion/formal.html>
|
|
|
|
[14] no author, "FBI says privacy 'extremists' are 'elitist'," TechWire, 25
|
|
Sep 97. summary republished in electronic form by EduPage, 28 Sep 97 via
|
|
Edupage Editors <educom@educom.unc.edu>.
|
|
|
|
[15] no author listed, "Internet restrictions overturned in New York [and]
|
|
Georgia," _WiredNews_, 20 Jun 97. summary republished in electronic form by
|
|
EduPage, 23 Jun 97.
|
|
|
|
"In the New York case, a law similar to the federal Communications Decency
|
|
Act was declared unconstitutional because it sought to regulate
|
|
transactions occurring outside the state's borders, thereby violating the
|
|
Constitution's interstate commerce clause. 'The judge was waiting to hear
|
|
the Supreme Court's decision on the CDA, but decided that in any event it
|
|
doesn't matter because under this commerce law, it is too burdensome for
|
|
people to speak at all in this medium,' says an American Civil Liberties
|
|
Union attorney. In Georgia, a federal judge issued a preliminary injunction
|
|
against a law that made it illegal to use a name that "falsely identifies"
|
|
the sender of an electronic message, such as a pseudonym or an anonymous
|
|
e-mail address." republished by EduPage, 23 Jun 97.
|
|
|
|
[16] no author listed, "Cyber threats of concern to presidential
|
|
commission," _Washington Post_, 6 Sep 97. republished as summary in
|
|
electronic form by EduPage, 7 Sep 97.
|
|
|
|
++++ PART II ++++
|
|
|
|
Unlike the chimera of "kiddie porn," drug dealers, international
|
|
terrorists, or nefarious hacker plots worthy of "the Mind of Fu Manchu," an
|
|
enormous amount of hate-based propaganda exists on the net, as do the
|
|
organizations publishing it.[17]
|
|
|
|
The terrorists, drug dealers, and "kiddie pornographers" may not have a
|
|
very public net presence[18]; the neo-Nazi, K.K.K., and other openly
|
|
fascist groups do.[17] The leaders of the Colombian cocaine cartels do not
|
|
have personal web pages but you can view web pages like that of noted
|
|
Holocaust-Revisionist Arthur Butz. You won't find an enormous number of
|
|
documents extolling the positive social virtues of pedophilia but you can
|
|
find a veritable _Cliff's Notes_ of homophobia.[19]
|
|
|
|
Unlike the myth of the international hacker menace that has to be
|
|
periodically created, Auschwitz was real. So are the people on the net who
|
|
denied that it happened. So are the people on the net who want it to happen
|
|
again. Other forms of propaganda against the Romis (Gypsies), illegal
|
|
immigrants, physically handicapped, and other targets of Nazi mass
|
|
extermination are routine occurrences on the web and in the Usenet news
|
|
groups.[20]
|
|
|
|
The question of how to handle net-based and action-oriented hate propaganda
|
|
is increasingly asked.
|
|
|
|
One group argues "nothing." But these people are not the target of
|
|
pro-government[21] arguments for intervention against the "Four Horsemen."
|
|
Nor is the group composed of many potential victims of hate-action.
|
|
|
|
There are a variety of ways in which action concerning the net can be
|
|
considered.
|
|
|
|
The first is the individual/collective dichotomy. Collective action, in
|
|
turn, can be directed to produce anti-hate intervention by corporate ISPs,
|
|
government, or by grassroots users.
|
|
|
|
Some urge corporate action against hate on the net. Late in 1995 the Simon
|
|
Wiesenthal Center (SWC) called for ISPs to deny fascists web sites. This
|
|
did not produce any diminution of the fascist presence. It did, however,
|
|
bring strong criticisms against the SWC and defenses of "free speech for
|
|
Nazis." Other actions were taken against the K.K.K. on America Online and
|
|
similar attacks against hate-based forces on <geocities>.
|
|
|
|
One problem with such campaigns is that they result in the mantle of
|
|
martyrdom falling, not on the victims and survivors of Auschwitz, but on
|
|
those defending the very fascist criminals who produced Auschwitz. The rush
|
|
to mirror Zundel's web site illustrated this.
|
|
|
|
Similar public campaigns to pressure ISPs to remove web pages do nothing to
|
|
reduce or eliminate other forms of hate-based net behavior contained in
|
|
e-mail or on discussion groups.
|
|
|
|
The corporate-based anti-hate strategy will always fail. There are tens of
|
|
thousands of ISPs on the net, and hate-forces will always be able to locate
|
|
a home-base on at least one of them. Even when an ISP is successfully
|
|
pressured, the offending forces relocate to another provider.
|
|
|
|
In a reversal of off-the-net common sense, the net provides a strange
|
|
equality among ISPs regardless of size, capitalization, advertising, or
|
|
"prestige." The Plaza Hotel at the corner of New York's Central Park can
|
|
provide luxury accommodations; the Bed'n'Bite Trailer Motel on Tobacco Road
|
|
cannot. Once on the net, however, <Bed-n-Byte.com> provides web services
|
|
essentially identical to <Plaza.com>. In cyberspace every ISP is as
|
|
geographically close to the user as every other ISP; new web sites are just
|
|
an URL away. Different ISPs' web-oriented services may be marginally
|
|
different in upload or download time but from the end-user's perspective
|
|
they are functionally identical because the hardware, software, and
|
|
operating protocols are effectively the same.
|
|
|
|
This also holds for such things as e-mail and ancillary services like
|
|
mailing list 'bots. In a reversal of the normal economy of scale, the
|
|
smaller provider may even provide better services via things like
|
|
user-to-modem ratios or technical support than the biggest carriers.
|
|
|
|
Successful pressures on ISPs cannot even substantially increase costs of
|
|
the hate-based forces. Market mechanisms have reduced basic
|
|
"all-you-can-eat" net access to the $US 15-25/month rate.
|
|
|
|
The next strategy for "kicking hate off the net" relies on the
|
|
police/military might of the various states.
|
|
|
|
This must occur on an international level if it is to be successful. The
|
|
cyberpunk slogan that "National borders are just speedbumps on the global
|
|
information superhighway" is especially important here.
|
|
|
|
In abstract terms, the net is post-internationalist. It has moved to a
|
|
globalism that no longer recognizes the very nation states around which one
|
|
must be internationalist. For many on the net, such nations are little more
|
|
than the "dot two-letter" suffixes on e-mail addresses and even these
|
|
disappear as the large ISPs go multinational.
|
|
In concrete terms, Dilbert no longer bothers or even thinks about whether
|
|
<www.foobar.com> is located in the U.S. or in Elbonia. Attacks by one
|
|
government on E. Zundel's Holocaust Revisionist site resulted in the site
|
|
being mirrored in other countries. Cyberpunks took but a few hours to
|
|
publish "workarounds" for German users when CompuServe cut some news groups
|
|
in its German feed.
|
|
|
|
In short, calling on national governments to fight internationalized hate
|
|
only works if all of the governments participate equally in the
|
|
crackdown.[22] In Thomas More's words, we can no longer tear down the laws
|
|
of England to get to the devil; we must tear down the laws of every country
|
|
to get to the same English devil.
|
|
|
|
When I leave my house to fight off-the-net actions against fascist-based
|
|
hate speech I know I am far more likely to be physically assaulted by the
|
|
police protecting the fascists than I am by the fascists themselves.
|
|
|
|
Working with the 1960's civil rights movement exposed me to the actions of
|
|
both the K.K.K. and the cops. One central difference was that the cop wore
|
|
a badge and gun outside his uniform; the Klansman often wore the same badge
|
|
and carried the same gun beneath his white sheet.
|
|
|
|
Unfortunately this process did not end with the 1960s.
|
|
|
|
As I write this the national newspapers still cover the case of Abner
|
|
Louima, the Haitian man assaulted in a NY police station. Police decided to
|
|
"teach him respect" for the law by sodomizing him with a bathroom plunger
|
|
doing severe injuries to his colon and other internal organs, according to
|
|
widespread press reports. Then they rammed the same plunger down his
|
|
throat, doing even more injury to his mouth and throat.
|
|
|
|
This excellent example of how police protect us from hate occurred in
|
|
liberal NY. One wonders what cases have gone unreported elsewhere in the
|
|
world in geographic locations less interested in "handcuffing" the police.
|
|
|
|
Let us not forget other actions by armed state representatives, as when
|
|
elite-trained U.S. soldiers stationed further South recently murdered a
|
|
black couple.
|
|
|
|
Nor was the old Southern judiciary necessarily better that the local
|
|
sheriff's office. Too often one sensed from legal decisions not to punish
|
|
those convicted of hate crimes that we faced not the metaphorical "hanging
|
|
judge" but a literal extra-legal lynching one.
|
|
|
|
In this sense, the Devil and the law were one and the same. The judicial
|
|
black robes of More's Law might have constrained the devil; relying on the
|
|
same black-robed figure for protection from the devil only damned the
|
|
victims of hate-action that More's Law was to protect.
|
|
|
|
Hoover's FBI provided the evidence to convict a few hate-activists during
|
|
the late civil rights period, largely through paying KKK informants. But
|
|
the wrath of Hoover, through programs like COINTELPRO, was directed at the
|
|
same forces the Klan targeted. The FBI did not fight hatred on a broad
|
|
front; rather it spent money and used its agents to whip up the very hatred
|
|
it condemned. Hoover branded Dr. M.L. King as the "most notorious liar in
|
|
America" while bugging his phones, sending him anonymous blackmailing
|
|
letters designed to have him commit suicide, and spending covert money to
|
|
create the image of another leader of the "Negro struggle." Similar efforts
|
|
were directed against the anti-war movement. Even more sustained efforts
|
|
were directed against groups like the Black Panther Party. Many Party
|
|
members who were convicted under the hate-oriented atmosphere remain in
|
|
jail today. In some cases, their unjustified convictions are only today
|
|
being overturned as is seen in the case of geronimo ji Jaga (Elmer
|
|
"Geronimo" Pratt).[23]
|
|
|
|
Perhaps the best known case -- Mumia Abu-Jamal -- is still under a death
|
|
sentence while his case is being appealed.[24]
|
|
|
|
Hoover and the official COINTELPRO program were a long time ago. It may be
|
|
comforting to repeat "that was then; this is now" as if the words are some
|
|
crucifix waved in front of the 1960s Devil of Hate in order to convince
|
|
ourselves that cop-based hatred vanished when Richard Nixon finally died.
|
|
While comforting, it is not true. Nor is the constant repetition of
|
|
hate-based action among the cops and military a matter of a single Devil.
|
|
|
|
Dracula may die at the end of every vampire film only to rise again at the
|
|
beginning of the sequel. But Dracula is only one entity while the forces of
|
|
hate are countless; their name is Legion.
|
|
|
|
The Tennessee-based hate-filled "Good Old Boys Roundups" were attended by
|
|
120-200 Treasury agents and some 45 agents from the Department of
|
|
Justice.[25] These estimates include people from only two federal agencies
|
|
and none from the military. Estimates from those agencies are lacking.
|
|
Missing also are attendance figures from any of the country's local police
|
|
departments.
|
|
|
|
The story could have broken several years earlier had any cop wanted to
|
|
act. But there is a massive and continuous differentiation in the police
|
|
mentality between wrongdoing by citizens and the *identical* wrongdoing by
|
|
the cops themselves.
|
|
|
|
This difference is illustrated by two stories in the 24 September _New York
|
|
Times_. Serpico, NY's famed "honest cop" played by actor Al Pacino in the
|
|
1973 movie of the same name, just showed up to testify at a City Council
|
|
meeting on police corruption.[26] Today, 26 years after Serpico revealed
|
|
massive corruption among NY cops, police hostility to him has not vanished.
|
|
"... plainclothes officers guarding the entrance to City Hall gave him
|
|
looks that could have cooled burning coals. For sure, they were polite,
|
|
those men, some of whom were little boys when Frank Serpico blew the
|
|
whistle. But they glared in unvarnished hostility...."[26]
|
|
|
|
The issue is far more than merely cop-hate-(whistle-blowing)cop. The same
|
|
issue of the paper reported retaliatory attacks on the nurse who first
|
|
reported the Louima police-brutality case to the police Internal Affairs
|
|
Bureau.[27] The Bureau failed to log the complaint.
|
|
|
|
Dealing with the Devil of Hate, once ensconced among the cops, is far more
|
|
difficult than merely calling The Exorcist.
|
|
|
|
In the "Butler" case, Canadian courts, following the lead of "radical"
|
|
feminists A. Dworkin and C. MacKinnon, created strong legal sanctions
|
|
against printed matter like "pornography" deemed to disparage women and
|
|
other "minorities."[28] Almost immediately in the political ROTFLMAO event
|
|
of the decade, Butler was used to ban several of Dworkin's works as
|
|
pornographic.
|
|
|
|
Butler was then used by Canadian customs as precedent for a general
|
|
crackdown on gay and lesbian bookstores in that country. [29] One wonders
|
|
what percentage of lesbians routinely oppress women and how many homosexual
|
|
men are convicted of heterosexual rape. But such questions did not appear
|
|
to bother Customs as its agents found the ostensibly anti-hate law useful
|
|
to act on their own homophobic impulses.
|
|
|
|
Elsewhere in Canada, other laws designed to bolster law enforcement in
|
|
today's new electronic climate brought charges that police misused the laws
|
|
against citizens concerning both wiretapping[30] and more general issues of
|
|
privacy.[31]
|
|
|
|
|
|
Internationally, we repeatedly see the dominant role of the cops and
|
|
military in leading the very violent hate-based action many want them to
|
|
stop. Have we so soon forgotten the revelations of how the "death squads"
|
|
in Latin and South America killed tens to hundreds of thousands of
|
|
"dissidents?" If our collective memory does not extend back into the late
|
|
1980s what of the reports this year of how forces in the S. African police
|
|
killed anti-apartheid leader Steve Biko?
|
|
|
|
Yet the utmost charity is extended to *this* form of hatred, with pardons
|
|
and general amnesties for cops and Generals pronounced in the spirit of
|
|
"reconciliation" and "forgiveness."
|
|
|
|
Even under the abstractly best of conditions, reliance on state agencies to
|
|
fight fascism is exceedingly dangerous. Fascism has little power under good
|
|
conditions; it develops only when conditions are bad and the very state on
|
|
which one relies is itself threatened. History repeatedly shows that at
|
|
such times fascist supporters in the cops and military increase
|
|
significantly. Relying on the state during such times is like buying
|
|
insurance against kangaroo bites that is cancelled as soon as one moves to
|
|
Australia.
|
|
|
|
Germany today has passed strong laws to deal with things like "child
|
|
pornography and neo-Nazi behavior." But these laws have been used to ban
|
|
the "Radikal" net site and charge *anti*-fascists with illegal activity.[32]
|
|
|
|
The same police mandated by German law to prosecute neo-Nazi activity
|
|
assist the same fascists to avoid arrest and prosecution under these laws.
|
|
A covert intelligence operation conducted by the Simon Wiesenthal
|
|
Center[33] into European fascist activity documented how such
|
|
police-assisted fascism organizing occurs and the exact hate-oriented
|
|
groups and individuals who benefit from it.
|
|
|
|
Overt pro-fascist actions are also increasing in the German military
|
|
paralleling other German attacks on Turkish immigrants and Romis. "Germany
|
|
Alert" wrote "German soldiers were involved in some 120 reported incidents
|
|
involving pro-Nazi, anti-Semitic or anti-foreigner hate over the past year,
|
|
the Defense ministry revealed. Incidents have more than doubled since last
|
|
year, the government admitted, as concern about extreme right wing
|
|
nationalism in the military mounted."[34]
|
|
|
|
The same does not unfold in the opposite direction, for the Devil, once
|
|
ennobled with the sanctity of law, becomes forever angelic and protected.
|
|
Nowhere has this been more clearly observed than the case of Erich Mielke.
|
|
Listed as the "number two man in East Germany for three decades,"[35] he
|
|
was convicted in 1993 for the murder of two cops.
|
|
|
|
The facts of the case were simple yet astounding. Mielke was a young
|
|
Communist in Germany during the 1930s, assigned to the defense of the
|
|
German Communist Party's headquarters. Two high-ranking Storm Troopers in
|
|
the Berlin police were assigned by the Nazi Party to use their police rank
|
|
to physically attack Communists working at the HQ. When protests against
|
|
this went unanswered by the police, Mielke did what many anti-fascists
|
|
throughout the political spectrum did a few years later. He went out. He
|
|
killed both cops. Then he went underground.
|
|
|
|
For this action in 1931, he was convicted by a German court 62 years later.
|
|
|
|
Between cops hating Serpico and cops hating Mielke, it's enough to make
|
|
even Saint Thomas More turn in his halo.
|
|
|
|
FOOTNOTES
|
|
|
|
[17] see, for example, HateWatch via:
|
|
<http://hatewatch.org/>, accessed 3 Sep 97.
|
|
|
|
"HateWatch is a web based organization that monitors the growing and
|
|
evolving threat of hate group activity on the Internet. Started in 1996,
|
|
HateWatch provides an online resource for concerned individuals, academics,
|
|
activists and the media to keep abreast of and to combat online bigotry.
|
|
Because the Internet has eliminated geographical and monetary boundaries
|
|
that once existed for hate groups, we must be vigilant in monitoring these
|
|
sometimes violent people and their activities in cyberspace."
|
|
|
|
[18] This is not to say that groups listed by the State Department as
|
|
"terrorist" have no web pages; some do. But they are outnumbered by the
|
|
neo-fascists and other related groups.
|
|
|
|
[19] see, for example: Jeff Vos, "The Homosexual Threat" via:
|
|
|
|
<http://www.crusader.net/texts/cng/homo.html>, accessed 3 Sep 1997.
|
|
|
|
Earlier, Vos was a leading member of the CyberNaziGroup. see, for example,
|
|
his articles "The Manifesto of the CyberNaziGroup: Let Your Life Be a
|
|
Lightening Bolt!" and "The CNG: An Idea for On-Line Organizations."
|
|
available as files FD005.TXT and FD008.TXT via:
|
|
|
|
<ftp://ftp.nyct.net/pub/users/tallpaul/Docs/Fascist/>.
|
|
|
|
[20] Another detailed list of anti-hate/anti-fascist web sites is available
|
|
from what started as a project at the University of Michigan's School of
|
|
Information, via:
|
|
<http://www.sils.umich.edu/~plefr/HomePage2.html>.
|
|
|
|
These sites frequently contain URLs to the hate-oriented web pages.
|
|
|
|
[21] The phrase "pro-government" here does not refer just to the current
|
|
U.S. government. The "Four Horsemen" arguments are used, in one form or
|
|
another, by an enormous number of different governments and political
|
|
systems from Iran to Singapore, and from the People's Republic of China to
|
|
the Republic of Korea.
|
|
|
|
[22] Some forces are organizing to this end, if not for *all* governments
|
|
at least for a significant number. See, for example, Clive Parker,
|
|
"E[uropean] U[nion] sends in the Internet police," _The Times [of London]_,
|
|
24 Sep 1997. Barker summarized a speech by EU Commissioner Martin
|
|
Bangemann, speaking at the Telecom Interactive 97 conference in Geneva, "a
|
|
call for an international charter to establish worldwide standards for
|
|
policing the Internet and the broadcasting and multimedia industries."
|
|
|
|
For a *partial* list of U.S. local to global censorship attempts, see the
|
|
Electronic Frontier Foundation's "Action Alerts" site via:
|
|
|
|
<http://www.eff.org/pub/Alerts/Foreign_and_local/index.html>
|
|
|
|
[23] no author, via Associated Press, "Black Panther Geronimo Pratt granted
|
|
new trial after 25 years," 29 May 97. see also, Edward J. Boyer, "For Pratt
|
|
Legal Wheels Grind Slowly," _Los Angeles Times_ 3 Jun 97. reprinted in the
|
|
_ANTIFA INFO-BULLETIN," 3 Jun 97, via:
|
|
|
|
<gopher://gopher.igc.apc.org:7021/11/europe>.
|
|
|
|
[24] for details on the controversy, the background of the Mumia case, and
|
|
the current status of the death-row appeals, see:
|
|
<http://www.mumia.org>
|
|
|
|
[25] see _New York Times_, 3 Apr 1996, p. D20:4.
|
|
|
|
[26] Clyde Haberman, "Serpico Steps Out of the Shadows to Testify," _NY
|
|
Times_, 24 Sep 1997, p. B1.
|
|
|
|
[27] John Kifner, "Nurse Tells of Retaliation For Effort in Louima Case,"
|
|
_NY Times_, 24 Sep 1997, p. B4.
|
|
|
|
[28] Adrienne Weller and Andrea Bauer, "Catharine MacKinnon: Crusader for a
|
|
Rightwing Women's Movement," _Freedom Socialist_, Vol. 15, No. 1. available
|
|
on-line as file "FN002.TXT" via:
|
|
|
|
<ftp://ftp.nyct.net/pub/users/tallpaul/Footnote/>.
|
|
|
|
Edward H. Hurley, "Pornography Makes For Strange Bedfellows: The
|
|
feminist/right-wing union against pornography," _Ethical Spectacle_ Nov 95,
|
|
via:
|
|
|
|
<http://www.spectacle.org/997/hurley.html>, accessed 13 Oct 97.
|
|
|
|
[29] Wendy McElroy and Catherine Siemann, "Right now Little Sisters
|
|
Bookstore in Vancouver is in court...." no date, press release, reposted to
|
|
Usenet news group <soc.feminism> by Jeffrey Shallit,
|
|
<shallit@graceland.uwaterloo.ca>. 18 Aug 94, via:
|
|
|
|
<http://www.mit.edu/activities/safe/safe/canada/feminists-free-exp-org>.
|
|
accessed 13 Oct 97.
|
|
|
|
[30] no author, "Wiretapping probe urged," _The Toronto Star_, Oct 1997,
|
|
on-line through the Electronic Frontiers Canada via:
|
|
|
|
<http://insight.mcmaster.ca/org/efc/pages/media/toronto.star.06oct97b.html>.
|
|
accessed 11 Oct 97.
|
|
|
|
[31] Campbell Clark, "Quebec breaking own privacy rules: watchdog," _The
|
|
Montreal Gazette_, 8 Oct 1997, on-line through he Electronic Frontiers
|
|
Canada via:
|
|
|
|
<http://insight.mcmaster.ca/org/efc/pages/media/gazette.08oct97.html>.
|
|
accessed 11 Oct 97.
|
|
|
|
[32] no author listed, "German court to try woman for guerrilla
|
|
hyperlinks," _New York Times_, 6 Jun 97, summary republished by EduPage, 8
|
|
Jun 97. no author listed, "New German law restricting cyberspace," _New
|
|
York Times_, 5 Jul 97, summary republished by EduCom, 6 Jul 97.
|
|
|
|
[33] no author [Simon Wiesenthal Center], "SWC Operations Report: Part
|
|
IV--Findings," posted in file dated 24 Dec 96, via:
|
|
|
|
<http://www.shamash.org/holocaust/neo-nazis/swc4.txt>, accessed 21 Sep 97.
|
|
|
|
[34] no author ["Germany Alert", "German Military Hate Incidents Double,"
|
|
26 Oct 97. via:
|
|
|
|
<http://alertnet.com/ga/>, accessed 27 Oct 97.
|
|
|
|
[35] Larry Thorson, "Another Attempt in Court to Punish East German
|
|
Leaders," Associated Press via _The News-Times_. via:
|
|
|
|
<http://www.newstimes.com/archive/nov1395/ina.htm> accessed 28 Sep 1997.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 2--Cu Digest Header Info (unchanged since 7 Oct, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.80
|
|
************************************
|
|
|
|
|