814 lines
33 KiB
Plaintext
814 lines
33 KiB
Plaintext
|
|
Computer underground Digest Sun Nov 16, 1997 Volume 9 : Issue 84
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.84 (Sun, Nov 16, 1997)
|
|
|
|
File 1--CuD #9.82 - re: Internet as Scab
|
|
File 2--"Who Watches the Watchmen: Net Content Rating Systems
|
|
File 3--XS4ALL refuses Internet tap
|
|
File 4--Angela Marquardt on trial again
|
|
File 5--Cyber-Liberties Update, October 17, 1997
|
|
File 6--Book Review - The Electronic Privacy Papers
|
|
File 7--cDc Global Dominatrix Update #23
|
|
File 8-- Congressional Action and New Bills
|
|
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 13 Nov 1997 00:07:37 -0500
|
|
From: Mark Federman <federman@popd.netcom.ca>
|
|
Subject: File 1--CuD #9.82 - re: Internet as Scab
|
|
|
|
Concerning your article in CuD 9.82, your correspondent wrote:
|
|
> An interesting article appeared in the October 28 Boston Globe about
|
|
> striking teachers in the province of Ottawa. The strike is over
|
|
> typical work rules ("class size, length of the school day, and number
|
|
> of hours of teaching time"). But one paragraph in particular caught my
|
|
> eye:
|
|
> If the strike continues, provincial authorities said,
|
|
> they will urge parents to educate their children at home
|
|
> using assignments and learning aids provided on the
|
|
> Internet.
|
|
|
|
There are a few misconceptions conveyed by the Boston Globe
|
|
article, and by the interpretation. The teachers' strike was
|
|
throughout the province of Ontario, closing school doors to
|
|
approximately 2.1 million children. Although at the beginning, it
|
|
appeared as if the issues were so-called "typical work rules",
|
|
this was, in fact, not the case. The strike was over pending
|
|
legislation which would effectively eliminate all power of local
|
|
school boards, and give all power and control of ALL education
|
|
issues, down to and including classroom issues, to the Minister
|
|
of Education. As the legislation is written and will be passed by
|
|
the majority provincial government, there is no review by the
|
|
parliament, no input from local municipalities regarding local
|
|
concerns or special needs, and no ability for judicial review,
|
|
save a constitutional challenge to the Supreme Court of Canada.
|
|
The legislation is so restrictive, in fact, that any employee
|
|
covered by the Education Act who even expresses an opinion or
|
|
votes against a policy of the Minister can be summarily fired,
|
|
without appeal. The bitter icing on the putrid cake proposed by
|
|
the provincial government was the revelation that the Deputy
|
|
Minister had a "management objective" to cut $667 million from the
|
|
education budget, which could only be accomplished by this
|
|
anti-democratic legislation. This information was leaked only
|
|
after the provincial Premier, Mike Harris, appeared on television
|
|
saying that it was not the objective of the government to cut
|
|
education spending.
|
|
|
|
The impression that the strike was over work rules came from the
|
|
fact that the full text of the legislation was not made generally
|
|
available until almost the strike date (the Minister had not even
|
|
read it in its entirety!). To properly understand it, teams of
|
|
lawyers had to sift through many referenced Acts, before any
|
|
proper interpretation of its scope and chilling consequences could
|
|
be made.
|
|
|
|
The strike was, in reality, a political protest which was
|
|
supported by over 60% of the general population and by over 80% or
|
|
parents of school-age children.
|
|
|
|
The only thing the government did right was to provide
|
|
supplemental, grade-appropriate learning materials for parents
|
|
over the Internet to keep their children "in tune" with
|
|
classroom-type activities. Even their disclaimer said that these
|
|
materials could not supplant the important work teachers do in the
|
|
class. What the technology allowed was the ability for the
|
|
children to avoid the typical "post-break" ramp-up period after
|
|
the two week protest. This perhaps gives some credence to the
|
|
emerging view that computer-based learning for school-age children
|
|
is a worthwhile addition to multiply the learning experience; one
|
|
cannot, however, subtract the teachers from the equation, or even
|
|
divide the parental support.
|
|
|
|
Faithfully,
|
|
|
|
Mark Federman
|
|
federman@netcom.ca
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 14 Nov 1997 10:45:36 -0500
|
|
From: Paul Kneisel <tallpaul@nyct.net>
|
|
Subject: File 2--"Who Watches the Watchmen: Net Content Rating Systems
|
|
|
|
For Immediate Release, 11 November 1997
|
|
|
|
CYBER-RIGHTS & CYBER-LIBERTIES (UK) REPORT, `WHO WATCHES THE WATCHMEN:
|
|
INTERNET CONTENT RATING SYSTEMS, AND PRIVATISED CENSORSHIP.'
|
|
|
|
The full report is available at:
|
|
http://www.leeds.ac.uk/law/pgs/yaman/watchmen.htm
|
|
|
|
===================
|
|
|
|
Leeds, United Kingdom - Cyber-Rights & Cyber-Liberties (UK), a non
|
|
profit civil liberties organisation launched a new report entitled,
|
|
Who Watches the Watchmen, on the implications of the use and
|
|
development of rating systems and filtering tools for the Internet
|
|
content.
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK) insists that the debates on
|
|
regulation of Internet-content should take place openly and with the
|
|
involvement of public at large rather than at the hands of a few
|
|
industry based private bodies.
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK) report suggests that:
|
|
|
|
There is no pressing need in fact for new national legislation
|
|
for content regulation.
|
|
|
|
National Legislation would be the wrong response.
|
|
|
|
There is confusion between illegal and harmful content.
|
|
|
|
Adults should not be treated like Children.
|
|
|
|
A self-regulatory model for harmful content on the Internet may
|
|
include the following levels and in this model `self' means as in
|
|
`individual' without the state involvement:
|
|
|
|
User or Parental Responsibility
|
|
Parental Software
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK) argue that a radical
|
|
self-regulatory solution for the hybrid Internet content should not
|
|
include any kind of rating systems and self-regulatory solutions
|
|
should include minimum government and industry involvement.
|
|
|
|
According to the UK report, child pornography is often used as an
|
|
excuse to regulate the Internet but there is no need to rate illegal
|
|
content such as child pornography since it is forbidden for any
|
|
conceivable audience and this kind of illegal content should be
|
|
regulated by the enforcement of existing UK laws.
|
|
|
|
Yaman Akdeniz, head of the UK group stated that:
|
|
|
|
`The current situation at the UK does not represent a self-regulatory
|
|
solution as suggested by the Government. It is moving towards a form
|
|
of censorship, a privatised and industry based one where there will be
|
|
no space for dissent as it will be done by the use of private
|
|
organisations, rating systems and at the entry level by putting
|
|
pressure on the UK Internet Service Providers.'
|
|
|
|
With rating systems and the moral panic behind the Internet content,
|
|
the Internet could be transformed into a `family friendly' medium,
|
|
just like the BBC. But it should be remembered that the Internet is
|
|
not as intrusive as the TV and users seldom encounter illegal content
|
|
such as child pornography. Like other historical forms of censorship,
|
|
current attempts to define and ban objectionable content are vague and
|
|
muddy, reaching out far beyond their reasonable targets to hurt the
|
|
promise of open communication systems.
|
|
|
|
Government-imposed censorship, over-regulation, or service provider
|
|
liability will do nothing to keep people from obtaining material the
|
|
government does not like, as most of it will be on servers in another
|
|
country (as happened recently with the availability of the JET Report
|
|
in 37 different web sites on the Internet outside the UK).
|
|
|
|
Yaman Akdeniz also stated that:
|
|
|
|
`If there is anyone who needs to be educated on Internet matters, it
|
|
is the government officials, the police and MPs together with the
|
|
media in the first place but not online users, parents and children.
|
|
We do not need moral crusaders under the guise of industry based
|
|
organisations to decide what is acceptable and not acceptable.'
|
|
|
|
When censorship is implemented by government threat in the background,
|
|
but run by private parties, legal action is nearly impossible,
|
|
accountability difficult, and the system is not open and becomes
|
|
undemocratic. These are sensitive issues and therefore, before
|
|
introducing these systems there should be an open public debate
|
|
possibly together with a consultation paper from the DTI.
|
|
|
|
Notes for the Media
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK)
|
|
<http://www.leeds.ac.uk/law/pgs/yaman/yaman.htm>
|
|
|
|
Mr Yaman Akdeniz
|
|
Address: Centre For Criminal Justice Studies, University of Leeds, LS2
|
|
9JT. Telephone: 0113-2335033 Fax: 0113- 2335056 E-mail:
|
|
lawya@leeds.ac.uk Url: http://www.leeds.ac.uk/law/pgs/yaman/yaman.htm
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK) is a non-profit civil liberties
|
|
organisation founded on January 10, 1997. Its main purpose is to
|
|
promote free speech and privacy on the Internet and raise public
|
|
awareness of these important issues. The Web pages have been online
|
|
since July 1996. Cyber-Rights & Cyber-Liberties (UK) started to become
|
|
involved with national Internet-related civil liberties issues
|
|
following the release of the DTI white paper on encryption in June
|
|
1996 and the Metropolitan Police action to censor around 130
|
|
newsgroups in August 1996. Cyber-Rights & Cyber-Liberties (UK)
|
|
recently criticised the attempts of the Nottinghamshire County Council
|
|
to suppress the availability of the JET Report on the Internet.
|
|
|
|
Cyber-Rights & Cyber-Liberties (UK) covers such important issues as
|
|
the regulation of child pornography on the Internet and UK
|
|
Government's encryption policy. The organisation provides up-to-date
|
|
information related to free speech and privacy on the Internet.
|
|
Cyber-Rights & Cyber-Liberties (UK) is a member of various action
|
|
groups on the Internet and also a member of the Global Internet
|
|
Liberty Campaign (see <http://www.gilc.org>) which has over 30 member
|
|
organisations world wide.
|
|
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Yaman Akdeniz <lawya@leeds.ac.uk>
|
|
Cyber-Rights & Cyber-Liberties (UK) at:
|
|
http://www.leeds.ac.uk/law/pgs/yaman/yaman.htm
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 14 Nov 1997 13:21:42 +0000
|
|
From: Hacking In Progress <info@hip97.nl>
|
|
Subject: File 3--XS4ALL refuses Internet tap
|
|
|
|
Press release
|
|
|
|
November 13th 1997, Amsterdam, Netherlands.
|
|
|
|
XS4ALL refuses Internet tap
|
|
|
|
XS4ALL Internet is refusing to comply with an instruction from the
|
|
Dutch Ministry of Justice that it should tap the Internet traffic
|
|
of one of its users as part of an investigation. XS4ALL has
|
|
informed the Ministry that in its view the instruction lacks any
|
|
adequate legal basis. The company's refusal makes it liable for a
|
|
penalty but XS4ALL is hoping for a trial case to be brought in the
|
|
near future so that a court can make a pronouncement.
|
|
|
|
On Friday October 31st, a detective and a computer expert from the
|
|
Forensic Science Laboratory issued the instruction to XS4ALL. The
|
|
Ministry of Justice wants XS4ALL to tap for a month all Internet
|
|
traffic to and from this user and then supply the information to
|
|
the police. This covers e-mail, the World Wide Web, news groups,
|
|
IRC and all Internet services that this person uses. XS4ALL would
|
|
have to make all the technical arrangements itself.
|
|
|
|
As far as we are aware, there is no precedent in the Netherlands
|
|
for the Ministry of Justice issuing such a far-reaching
|
|
instruction to an Internet provider. The detectives involved also
|
|
acknowledge as much. Considering that a national meeting of
|
|
Examining judges convened to discuss the instruction, one may
|
|
appreciate just how unprecedented this situation is. Hitherto,
|
|
instructions have mainly been confined to requests for personal
|
|
information on the basis of an e-mail address.
|
|
|
|
XS4ALL feels obliged in principle to protect its users and their
|
|
privacy. Furthermore, XS4ALL has a commercial interest, since it
|
|
must not run the risk of action being brought by users under Civil
|
|
Law on account of unlawful deeds. This could happen with such an
|
|
intervention by the provider which is not based in law. Finally,
|
|
it is important from the social point of view that means of
|
|
investigation have adequate statutory basis. To comply with the
|
|
instruction could act as an undesirable precedent which could have
|
|
a major impact on the privacy of all Internet users in the
|
|
Netherlands.
|
|
|
|
XS4ALL has no view on the nature of the investigation itself or
|
|
the alleged crimes. It is happy to leave the court to decide that.
|
|
Nor will XS4ALL make any comment on the content of the study or
|
|
the region in which this is occurring for it is not its intention
|
|
that the investigation should founder. XS4ALL has proposed in vain
|
|
to the examining judge that the instruction be recast in terms
|
|
which ensures the legal objections are catered for.
|
|
|
|
The Ministry of Justice based its claim on Article 125i of the
|
|
Penal Code. This article was introduced in 1993 as part of the
|
|
Computer Crime Act. It gives the examining judge the option of
|
|
advising third parties during statutory preliminary investigations
|
|
to provide data stored in computers in the interest of
|
|
establishing the truth. According to legal history, it was never
|
|
the intention to apply this provision to an instruction focused on
|
|
the future. Legislators are still working to fill this gap in the
|
|
arsenal of detection methods, by analogy with the Ministry of
|
|
Justice tapping phone lines (125g of the Penal Code). The Dutch
|
|
Constitution and the European Convention on the Protection of
|
|
Human Rights demand a precise statutory basis for violating basic
|
|
rights such as privacy and confidentiality of correspondence. The
|
|
Ministry clearly does not wish to wait for this and is now
|
|
attempting to use Article 125i of the Penal Code, which is not
|
|
intended for this purpose, to compel providers themselves to start
|
|
tapping suspect users. The Ministry of Justice is taking the risk
|
|
of the prosecution of X, in the context of which the instruction
|
|
was issued to XS4ALL, running aground on account of using illegal
|
|
detection methods. Here, again, XS4ALL does not wish to be liable
|
|
in any respect in this matter.
|
|
|
|
For information please contact:
|
|
|
|
XS4ALL
|
|
Maurice Wessling
|
|
email: maurice@xs4all.nl
|
|
http://www.xs4all.nl/
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 10 Nov 97 10:48:06 -0500
|
|
From: Jamie McCarthy <jamie@mccarthy.org>
|
|
Subject: File 4--Angela Marquardt on trial again
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
This is twelve-day-old news but I didn't see it mentioned here. Thanks
|
|
to Paul Kneisel (Cc'd) for pointing it out. I'm sure we all recall
|
|
Ms. Marquardt's trial for, and subsequent acquittal on, _linking_ to
|
|
material banned by the German prosecutor. Now it seems she's in the
|
|
news again, being charged with publishing information about the first
|
|
trial. Odd, to say the least.
|
|
|
|
At <http://www.techserver.com/infotech/10.30.97/tech08.html> is the
|
|
Reuters story:
|
|
|
|
New trial in Germany over radical Internet website
|
|
|
|
Copyright (c) 1997 Nando.net
|
|
|
|
BERLIN - A left-wing German politician acquitted in June of
|
|
supporting guerrilla acts with information linked to her Internet
|
|
home page appeared in court again on Friday on new charges
|
|
emerging from her first trial.
|
|
|
|
Angela Marquardt, 26, former deputy leader of Germany's reform
|
|
communist Party of Democratic Socialism (PDS), was this time
|
|
accused of having illegally published the charge sheet of her
|
|
first trial.
|
|
|
|
The latest proceedings were adjourned after a witness failed to
|
|
appear in court.
|
|
|
|
"This is a farce," Marquardt told reporters. She said she had only
|
|
shown the charge sheet to a few friends.
|
|
|
|
[...]
|
|
|
|
The court ruled that Marquardt had set up a hyperlink to the
|
|
magazine page before the details on sabotage methods were
|
|
published and did not have any knowledge of their publication.
|
|
|
|
Unfortunately her website <http://yi.com/home/MarquardtAngela/>
|
|
doesn't have the latest information available and it's all in German.
|
|
Anybody know of a good English-language source on her story? The
|
|
search engines bring back 95% German pages.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 17 Oct 1997 18:19:13 GMT
|
|
From: owner-cyber-liberties@aclu.org
|
|
Subject: File 5--Cyber-Liberties Update, October 17, 1997
|
|
|
|
Cyber-liberties Update
|
|
October 17, 1997
|
|
|
|
Recent Lawsuits Against Spammers
|
|
|
|
As netizens continue to grapple with how to put an end to the unpopular
|
|
practice of sending mass unsolicited e-mail, otherwise known as spam, the
|
|
following lawsuits have been recently filed:
|
|
|
|
BigFoot Partners, L.P. v. Cyber Promotions, Inc. (S.D.N.Y. filed Oct. 6,
|
|
1997).=20
|
|
<http://www.jmls.edu/cyber/cases/bf-cp0.html>
|
|
|
|
Internet Service Provider (ISP) BigFoot Partners filed a million dollar
|
|
lawsuit this month against the bulk unsolicited e-mail (or "spam") company,
|
|
CyberPromotions, for sending thousands of messages and falsely indicating
|
|
that the SPAM had been sent by the ISP.
|
|
|
|
The complaint alleges that CyberPromotions intentionally falsified the
|
|
domain name and the electronic return address so that the messages appeared
|
|
to originate from BigFoot thereby infringing BigFoot's trademark,
|
|
committing computer fraud, violating the Electronic Communications Act, 18
|
|
U.S.C. Section 2701, misappropriating of identity and libel among other
|
|
theories. BigFoot seeks an injunction to stop CyberPromotions, $1 million
|
|
in damages and punitive damages.=20
|
|
|
|
America Online, Inc. v. Over the Air Equipment, Inc. (E.D. Va. Oct. 1997)
|
|
<http://www.ljx.com/LJXfiles/aol/aolsuit.html> .
|
|
|
|
In an attempt to protect its Internet service subscribers, America Online
|
|
(AOL), has filed suit against a company that allegedly sent thousands of
|
|
unsolicited e-mail to users to encourage them to visit pornographic web=
|
|
sites.
|
|
|
|
The suit against Over the Air Equipment, a Las Vegas bulk e-mail company
|
|
alleges several counts of fraud, misappropriation, Lanham Act violations
|
|
and that AOL suffered harm to its reputation and business interests.
|
|
|
|
Snow v. Doherty, No. 97-CV-0635(RM) (N.D. Ind. complaint filed Sept. 22,
|
|
1997) <http://mama.indstate.edu/users/dougie/lawsuit.html>
|
|
|
|
This pro se complaint alleges that the defendant, a commercial spammer,
|
|
violated the Telephone Consumers Protection Act of 1991 by sending him
|
|
unsolicited e-mail messages and forcing him to incur the costs related to
|
|
unsolicited commercial email.=20
|
|
|
|
According to the complaint, the expenses plaintiff incurred actual expenses
|
|
by way of increased connection time and additional download time to
|
|
download unsolicited email from the defendant.=20
|
|
|
|
Under the TCPA it is unlawful for "any person within the United States to
|
|
use any
|
|
telephone facsimile machine, computer, or other device to send an
|
|
unsolicited advertisement to a telephone facsimile machine." In addition
|
|
the TCPA 47 U.S.C. 227(b)(3) authorizes lawsuits by individuals to enjoin
|
|
senders of unsolicited advertisements, recover actual damages or $500.00,
|
|
whichever is greater and an individual may receive treble damages if the
|
|
court finds that the sender "knowingly or willfully" violated the
|
|
prohibitions set forth in the Act.=20
|
|
|
|
Typhoon, Inc. v. Kentech Enterprises, No. CV 97-6270 JSL (AIJx) (S.D. Cal.
|
|
Sept. 1997) <http://www.jmls.edu/cyber/cases/typhoon2.html> (partial
|
|
settlement).
|
|
|
|
A Japanese ISP, Typhoon, Inc. received a permanent injunction against a
|
|
company which sent thousands of messages to numerous Internet users through
|
|
computer equipment owned by the plaintiff without authorization.
|
|
|
|
The lawsuit alleged that the defendants falsely displayed Typhoon's return
|
|
e-mail address, domain name and trademark. The injunction states that as a
|
|
result of the spam e-mail messages, Typhoon was defamed, suffered
|
|
misappropriation of its name and identity, misappropriation of its
|
|
trademark, was trespassed against, had its services stolen, and was
|
|
required to spend substantial time and money sorting through e-mail
|
|
messages that could not be delivered.
|
|
=09
|
|
Parker v. C.N. Enterprises (Tex. Travis County Dist. Ct. Sept. 17, 1997).
|
|
<http://www.jmls.edu/cyber/cases/flowers2.html>
|
|
|
|
A Texas Court has entered a temporary injunction against a California
|
|
resident and his company, prohibiting further spamming of the Internet
|
|
without consent. The lawsuit, filed by Internet author Tracy LaQuey Parker,
|
|
who owned the rights to the domain name flowers.com alleged that the
|
|
defendant used her domain name to fraudulently distributed mass unsolicited
|
|
e-mail.
|
|
|
|
Parker received thousands of return messages as a result of the defendant's
|
|
use of her address, preventing her from accessing her Internet account for
|
|
hours and temporarily shutting down her Internet service provider's mail
|
|
servers. =20
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
About Cyber-Liberties Update:
|
|
|
|
ACLU Cyber-Liberties Update Editor:
|
|
Cassidy Sehgal (Cassidy_Sehgal@aclu.org)
|
|
American Civil Liberties Union
|
|
National Office 125 Broad Street,
|
|
New York, New York 10004
|
|
|
|
To subscribe to the ACLU Cyber-Liberties Update, send a message to
|
|
majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
|
|
message. To terminate your subscription, send a message to
|
|
majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
|
|
|
|
The Cyber-Liberties Update is archived at
|
|
http://www.aclu.org/issues/cyber/updates.html
|
|
|
|
Are you an ACLU member? To become a card carrying member visit the ACLU web
|
|
site <http://www.newmedium.com/aclu/join.html> For general information
|
|
about the ACLU, write to info@aclu.org.
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
Cassidy Sehgal |To receive the biweekly
|
|
Cassidy_Sehgal@aclu.org |ACLU Cyber-Liberties Update
|
|
http://www.aclu.org |email: majordomo@aclu.org
|
|
http://www.gilc.org |body of message:
|
|
|subscribe=
|
|
cyber-liberties
|
|
|
|
take the pledge: <http://www.firstamendment.org>
|
|
|
|
Lynn Decker
|
|
Coordinator of Online Programs
|
|
ACLU National Office
|
|
125 Broad Street, New York, NY
|
|
See us on the web at <http://www.aclu.org>
|
|
|
|
and on America Online keyword: ACLU
|
|
|
|
|
|
|
|
|
|
This Message was sent to
|
|
cyber-liberties
|
|
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 9 Nov 1997 17:30:42 +1100 (EST)
|
|
From: Danny Yee <danny@staff.cs.usyd.edu.au>
|
|
Subject: File 6--Book Review - The Electronic Privacy Papers
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
http://www.anatomy.su.oz.au/danny/book-reviews/h/Privacy_Papers.html
|
|
|
|
title: The Electronic Privacy Papers
|
|
: Documents on the Battle for Privacy in the Age of Surveillance
|
|
by: Bruce Schneier + David Banisar
|
|
publisher: John Wiley 1997
|
|
other: 747 pages, index, US$59.99
|
|
|
|
_The Privacy Papers_ is not about electronic privacy in general: it covers
|
|
only United States Federal politics, and only the areas of wiretapping
|
|
and cryptography. The three topics covered are wiretapping and the
|
|
Digital Telephony proposals, the Clipper Chip, and other controls on
|
|
cryptography (such as export controls and software key escrow proposals).
|
|
|
|
The documents included fall into several categories. There are broad
|
|
overviews of the issues, some of them written just for this volume.
|
|
There are public pronouncements and documents from various government
|
|
bodies: legislation, legal judgements, policy statements, and so forth.
|
|
There are government documents obtained under Freedom of Information
|
|
requests (some of them partially declassified documents complete with
|
|
blacked out sections and scrawled marginal annotations), which tell
|
|
the story of what happened behind the scenes. And there are newspaper
|
|
editorials, opinion pieces, submissions to government enquiries, and
|
|
policy statements from corporations and non-government organisations,
|
|
presenting the response from the public.
|
|
|
|
Some of the material included in _The Privacy Papers_ is available
|
|
online, none of it is breaking news (the cut-off for material appears
|
|
to be mid-to-late 1996), and some of the government documents included
|
|
are rather long-winded (no surprise there). It is not intended to be a
|
|
"current affairs" study, however; nor is it aimed at a popular audience.
|
|
_The Privacy Papers_ will be a valuable reference sourcebook for anyone
|
|
involved with recent government attempts to control the technology
|
|
necessary for privacy -- for historians, activists, journalists,
|
|
lobbyists, researchers, and maybe even politicians.
|
|
|
|
--
|
|
|
|
Disclaimer: I requested and received a review copy of _The Privacy
|
|
Papers_ from John Wiley, but I have no stake, financial or otherwise,
|
|
in its success.
|
|
|
|
--
|
|
|
|
%T The Electronic Privacy Papers
|
|
%S Documents on the Battle for Privacy in the Age of Surveillance
|
|
%A Bruce Schneier
|
|
%A David Banisar
|
|
%I John Wiley
|
|
%C New York
|
|
%D 1997
|
|
%O hardcover, bibliography, index
|
|
%G ISBN 0-471-12297-1
|
|
%P xvi,747pp
|
|
%K crime, politics, computing
|
|
|
|
9 November 1997
|
|
|
|
------------------------------------------------
|
|
Copyright (c) 1997 Danny Yee (danny@cs.su.oz.au)
|
|
http://www.anatomy.su.oz.au/danny/book-reviews/
|
|
------------------------------------------------
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 14 Nov 1997 23:47:54 -0800 (PST)
|
|
From: editor@CULTDEADCOW.COM
|
|
Subject: File 7--cDc Global Dominatrix Update #23
|
|
|
|
________________________________________________________
|
|
|
|
"We've got more bite than Marv Albert."
|
|
|
|
FOR IMMEDIATE RELEASE GLOBAL DOMINATRIX UPDATE
|
|
|
|
_____________ http://www.cultdeadcow.com/cDc_files/ ____________________
|
|
|
|
_ _
|
|
((___))
|
|
[ x x ] cDc Communications
|
|
\ / Global Dominatrix Update #23
|
|
(' ') October 31st, 1997
|
|
(U)
|
|
Est. 1984
|
|
- * -
|
|
|
|
All right, ya punks. Here are five new files, so stop carding the shit
|
|
out of your mom's favorite porn server and start reading.
|
|
|
|
|
|
_____________________/text files\________________________________
|
|
|
|
341:"R.I.P." by Poppy Z. Brite. Last Tango in Lawrence? Our intrepid
|
|
writer burrows into William on the night of his demise. And you thought
|
|
he was just the guy from the Nike commercials.
|
|
|
|
342:"Wuss Vandals Get Hassled by the Man" by Rev. Anna Truwe. It's a
|
|
Martha Stewart moment. Just when you think the rock's under wraps, along
|
|
comes the Man. Dang.
|
|
|
|
343:"Some Form of Success" by Weaselboy. Stone walls do not a prison
|
|
make. Free your mind, grab a boot disk and always wear a condom. And you
|
|
thought Tony Robbins had all the rad insights.
|
|
|
|
344:"Wackers: The Secret Life of a 'Fantasy Maker'" by Isis. Sexual politics
|
|
goes head to head with hand to gland combat. Read this gripping account of
|
|
one girlie's search for real meaning in her nine to five.
|
|
|
|
345:"A Day Off for DrunkFux" by DrunkFux. Help me Rhonda. The kids have
|
|
gone buck wild and they're marching for Jesus. Anyone wanna try to one-up
|
|
this baby?
|
|
|
|
|
|
|
|
File submissions: editor@cultdeadcow.com
|
|
|
|
- * -
|
|
|
|
Thanks to the following items of influence this time around:
|
|
WAREZ: BeOS - It's cDc approved and guaranteed to get you all the
|
|
lovin'
|
|
PRINT: _Gravity's Rainbow_ by Thomas Pynchon
|
|
MUSIC: Big Youth, The Five Alabama Blind Boys, Ry Cooder,
|
|
Phillip Glass' _Mishima: A Life in Four Chapters_
|
|
RERUNS: Kids in the Hall
|
|
BEVERAGES: Cafe Americano, ice cold Creemore
|
|
INTERSECTION: St. Denis + Ontario (Montreal)
|
|
|
|
_______________________/ - x X x - \________________________________
|
|
|
|
Fools better recognize: CULT OF THE DEAD COW is a gift to the women of
|
|
this world and the trademark of cDc communications. Established in 1984,
|
|
the cDc is the largest and oldest krewe in telecom, inventor of the e-zine
|
|
and stool loosener to sysadmins everywhere. Each and every issue is
|
|
produced on an Apple II for genuine effect. Yo, bee-atch! Find the flavor
|
|
at these fine locations:
|
|
|
|
World Wide Web: http://www.cultdeadcow.com
|
|
http://www.L0pht.com/cdc.html
|
|
FTP/Gopher: ftp://ftp.cultdeadcow.com/cDc
|
|
Usenet: alt.fan.cult-dead-cow
|
|
BBS: 806/794-4362 Entry:KILL
|
|
|
|
Any questions, jackass?
|
|
Grandmaster Ratte'
|
|
cDc/Phat Daddy & Pontiff
|
|
Email: gratte@cultdeadcow.com
|
|
Postal: POB 53011, Lubbock, TX, 79453, USA
|
|
|
|
"cDc. Hyperbole is our business."
|
|
______________________________________________________________
|
|
|
|
Copyright(c)1997 Oxblood Ruffin, Straight Buttah & cDc communications
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 10 Nov 1997 14:38:12 -0500
|
|
From: EPIC-News List <epic-news@epic.org>
|
|
Subject: File 8-- Congressional Action and New Bills
|
|
|
|
Volume 4.15 November 10, 1997
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
|
|
http://www.epic.org/
|
|
|
|
CONGRESSIONAL ACTION AND NEW BILLS
|
|
APPROVED
|
|
|
|
H.R.2369. Wireless Privacy Enhancement Act of 1997. The bill bans
|
|
modifying scanners to intercept cellular phone calls and increases
|
|
penalties for intentional interception. The House Subcommittee on
|
|
Telecommunications, Trade, and Consumer Protection of the House
|
|
Committee on Commerce approved a revised version of the bill on
|
|
October 29.
|
|
|
|
INTRODUCED
|
|
|
|
HR 2563. Taxpayer Confidentiality Act of 1997. Introduced by Dunn
|
|
(R-WA) on September 26. Amends IRS code to restrict the authority to
|
|
examine books and witnesses for purposes of tax administration.
|
|
Referred to the Committee on Ways and Means.
|
|
|
|
HR 2581. Social Security Privacy Act of 1997. Introduced by Campbell
|
|
(R-CA). Limits use of Social Security number. Requires disclosure of
|
|
uses of SSN by businesses. Referred to the Committee on Ways and
|
|
Means.
|
|
|
|
S. 1223. Employee Information Protection Act of 1997. Introduced by
|
|
Burns (R-MT) on September 26. Amends 1996 welfare bill to require
|
|
that data collected for "new hires" database be deleted after six
|
|
months. Referred to the Committee on Finance.
|
|
|
|
S. 1356. To amend the Communications Act of 1934 to prohibit Internet
|
|
service providers from providing accounts to sexually violent
|
|
predators. Introduced by Faircloth (R-NC). Sets civil fines of
|
|
$5,000 per day for providing an account to a "sexually violent
|
|
predator." Referred to the Committee on Commerce, Science, and
|
|
Transportation.
|
|
|
|
S. 1368. Medical Information Privacy and Security Act. Introduced by
|
|
Leahy (D-VT) and Kennedy (D-MA) on November 4. General medical
|
|
privacy bill.
|
|
|
|
The EPIC Alert is a free biweekly publication of the Electronic
|
|
Privacy Information Center. To subscribe or unsubscribe, send email to
|
|
epic-news@epic.org with the subject: "subscribe" (no quotes) or
|
|
"unsubscribe" or use the Web form at:
|
|
|
|
http://www.epic.org/alert/subscribe.html
|
|
|
|
Back issues are available at:
|
|
|
|
http://www.epic.org/alert/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.84
|
|
************************************
|
|
|