534 lines
28 KiB
Plaintext
534 lines
28 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 1, Issue #1.25 (July 28, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
|
||
CONTENTS:
|
||
|
||
File 1: Moderators' Comments
|
||
File 2: Neidorf Trial Over: CHARGES DROPPED (Moderators)
|
||
File 3: Warning about Continued Harassment of BBSs (Keith Henson)
|
||
File 4: League for Programming Freedom Protests Lotus Litigation
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #1.25, File 1 of 4: Moderators' Comments ***
|
||
********************************************************************
|
||
|
||
Date: 28 July, 1990
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
|
||
++++++++++
|
||
In this file:
|
||
1) Disclaimer of Authorship
|
||
2) CuD Format
|
||
|
||
+++++++++++++++++++++++++++++
|
||
DISCLAIMER OF AUTHORSHIP
|
||
+++++++++++++++++++++++++++++
|
||
|
||
We do not engage in "guessing games" about anonymous authors, nor will we
|
||
reveal the identity. Often, we in fact do not know, because we tend to
|
||
erase files to preserve space and have no way of retrieving such
|
||
information. But, sometimes it is necessary to exclude those from the list
|
||
of "possibilities" if there exists potential repercussions. The recent
|
||
anonymous author of the Neidorf trial *WAS NOT* in any way involved with
|
||
the trial as a participant, witness, or member of the the defense team.
|
||
Those who have inquired can rest assured that no participant even remotely
|
||
related to the case will contribute any article until a verdict is reached.
|
||
|
||
+++++++++++++++++++++
|
||
CuD FORMAT
|
||
+++++++++++++++++++++
|
||
|
||
Our format is changing slightly each issues as we try to find one that
|
||
conforms to the basic conventions that will allow most systems to recognize
|
||
and do their magic with digests. If anybody has suggestions, please pass
|
||
them on. We're indebted to those who have responded with docs and other
|
||
information to help us in this.
|
||
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #1.25: File 2 of 4: Trial Over: Charges Dropped ***
|
||
********************************************************************
|
||
|
||
Date: 28 July, 1990
|
||
From: Moderators
|
||
Subject: Neidorf Trial Over: Charges Dropped
|
||
|
||
Less than halfway through the trial, and before it had presented its remaining
|
||
witnesses, but government dropped all charges against Craig Neidorf Friday.
|
||
Defense Attorney Sheldon Zenner said that Prosecutor Bill Cook's decision
|
||
was "in line with the highest standards of good government and ethical
|
||
conduct." Zenner said that the government could have continued to the last
|
||
and let the jury decide, but did the honorable thing.
|
||
|
||
One reason for the surprise decision, according to one inside source, was
|
||
that, as the testimony and cross-examination proceeded, the government
|
||
realized that BellSouth had not been forthcoming about the extent of
|
||
availability of the document and its worth. The prosecution apparently relied
|
||
on the good faith of BellSouth because of the previously good working
|
||
relationship it had with it and other telecom companies.
|
||
|
||
Craig Neidorf was ecstatic about the decision, and feels vindicated. He can
|
||
now resume his studies, complete his degree, and seriously consider law
|
||
school. He *WILL NOT* resume publication of PHRACK!
|
||
|
||
Zenner praised Bill Cook's decision to drop all charges, and added he is not
|
||
angry, but appreciative. Zenner also felt that the the efforts of EFF, CuD,
|
||
and the many individuals who supported Craig were instrumental in creating
|
||
credibility and visibility for the case, generating ideas and information for
|
||
the defense, and facilitating enlisting some of the prospective defense
|
||
witnesses to participate.
|
||
|
||
There are those who have taken the Ed Meese line and assumed that Craig must
|
||
have done *something* or the government wouldn't be prosecuting him. Others
|
||
have not been as strident, but have put their faith in "The System," assuming
|
||
that the process works, and as long as Craig's procedural rights were
|
||
protected, we should "wait and see." Others on the extreme end have said that
|
||
those of us who supported Craig would change our minds once all the evidence
|
||
has come out, and we were criticized for raising issues unfairly when the
|
||
government, so it was claimed, couldn't respond because it had to protect
|
||
Craig's privacy and was required to sit in silence. One prosecutor even said
|
||
that when all the evidence comes out, Craig's supporters would slink back
|
||
under their rocks.
|
||
|
||
There is little cause for Craig's supporters to gloat, because the emotional
|
||
and financial toll on Craig and his family were substantial. Dropping the
|
||
charges hardly means that the system works, because if it worked, there would
|
||
have been no charges to begin with. From the beginning, Craig expressed his
|
||
willingness to cooperate, but the government made this impossible with its
|
||
persecution. Craig's supporters, from the beginning, have published the
|
||
evidence, explained the issues, and we can still see no reason for his
|
||
indictment. The evidence presented by the government in some cases could have
|
||
been presented as well by the defense to show that *no* criminal acts
|
||
occurred. When witnesses must be coached into how to present negative
|
||
evidence, and when little, if any, can be adequately constructed, one would
|
||
think that somebody in the prosecutor's office might realize there simply
|
||
isn't a case there. The government had no case in the beginning, they could
|
||
not construct one, and they had nothing at the end. So, dropping the charges
|
||
does not indicate that the system works, but rather that sometimes a just
|
||
outcome may result despite unjust actions of over-zealous agents. The
|
||
prosecution not only lost the case, but reduced its credibility in all areas
|
||
of computer enforcement.
|
||
|
||
The claim that a recent Telecom Digest contributor made that the SS and others
|
||
may intentionally overstep bounds to establish more clearly the lines of law
|
||
may be true, but what about the costs to innocent victims of such
|
||
Machiavellian tactics? Do we really live in such a cynical society that we
|
||
find it acceptable to place lives, careers, and reputations at great risk?
|
||
|
||
Now, however, it is time to move on and address the lessons learned from the
|
||
experience. Some of the issues include how computerists can be protected from
|
||
overzealousness, how law enforcement agents can perform their legitimate tasks
|
||
of gathering evidence without violation rights, and how legislation can be
|
||
written to reflect technological changes that protect us from predators while
|
||
not subverting our rights with loose, broad, or inaccurate language. This has
|
||
been the goal of Mitch and the EFF, and it is one on which we should *all*
|
||
unite and focus our energy.
|
||
|
||
Below is a summary of the days 2-4 of the trial (the first day, jury
|
||
selection, appears in CuD 1.24):
|
||
|
||
|
||
In the second day of Craig Neidorf's trial in Chicago, both sides presented
|
||
their opening arguments. The prosecution wheeled in two shopping carts
|
||
containing documents, presumably to be used as evidence. Bill Cook, the
|
||
prosecutor, down-played the technical aspects of the case and tried to
|
||
frame it as a simple one of theft and receiving/transporting stolen
|
||
property. Sheldon Zenner's opening statements were described as "absolutely
|
||
brilliant," and challenged the definitions and interpretations of the
|
||
prosecution. More detail will follow as the trial progresses.
|
||
|
||
DAY THREE OF CRAIG NEIDORF'S TRIAL (WEDS, JULY 25):
|
||
|
||
The prosecution continued presenting its witnesses. The most damaging to
|
||
the prosecution (from a spectators perspective) was the testimony of a Ms.
|
||
Williams from BellSouth whose primary testimony was that the E911 documents
|
||
in question were a) proprietary and b) not public information. Following a
|
||
lunch break, defense attorney Sheldon Zenner methodically, but politely and
|
||
gently, attacked both claims. The "proprietary" stamp was placed on *all*
|
||
documents at the source without any special determination of contents and
|
||
there is nothing necessarily special about any document with such a
|
||
statement attached. It was established that it was a bureaucratic means of
|
||
facilitating processing of documents. The proprietary claims were further
|
||
damaged when it was demonstrated that not only was the content of E911
|
||
files available in other public documents, but that the public can call an
|
||
800 number and obtain the same information in a variety of documents,
|
||
incuding information dramatically more detailed than any found in PHRACK.
|
||
After considerable waffling by the witness, Zenner finally received her
|
||
acknowledgement that the information found in the files presented as
|
||
evidence could be obtained for a mere $13, the price of a singled document,
|
||
by simply calling a public 800 number to BellCorp, which provided thousands
|
||
of documents, "including many from BellSouth." If our arithmetic is
|
||
correct, this is a little less than the original assessed value of $79,449
|
||
in the original indictment, and about $22,987 less than the revised value
|
||
assessed in the second document.
|
||
|
||
Ms. Williams often seemed hesitant and uncooperative in answering Zenner's
|
||
questions, even simple ones that required only a "yes" or a "no." For
|
||
example, part of Ms. Williams testimony was the claim that PHRACK'S E911
|
||
document was nearly identical to the original BellSouth document, and she
|
||
noticed only four changes in the published text. Zenner identified other
|
||
differences between the two versions. He then suggested that it was odd
|
||
that she didn't notice that the original document was about 24 pages and
|
||
the PHRACK document half of that, and wondered why she didn't notice that
|
||
as a major change. She tried to avoid the question, and in exasperation,
|
||
Zenner gently asked if she didn't think that to reduce 24 pages to about 13
|
||
indicated a major editing job: Doesn't that indicate that somebody did a
|
||
good job of editing?" "I don't know what you mean." After a bit of banter
|
||
in which Zenner tried to pin down the witness to acknowledge that a major
|
||
editing had occured such that the PHRACK document was hardly a facsimile of
|
||
the original, and several "I don't knows" from the witness, Zenner turned
|
||
to her and said gently: "Editing. You know, that's when somebody takes a
|
||
large document and reduces it." "I don't know," she repeated again. This
|
||
seemed especially damaging to the prosecution, because they had claimed
|
||
that the document was nearly identical. In challenging a motion to dismiss,
|
||
the prosecution wrote:
|
||
|
||
Neidorf received and edited the file and subsequently,
|
||
on January 23, 1989, uploaded a "proof cop" of the
|
||
edited text file onto Riggs' file area on the Lockport
|
||
bulletin board for Riggs to review. (Counts 8 and 9).
|
||
Riggs was to proofread Neidorf's version before Neidorf
|
||
included it in an upcoming issue of "Phrack." The only
|
||
differences between the original version posted by
|
||
Riggs, and the edited version that Neidorf posted for
|
||
return to Riggs, were that Neidorf's version was retyped
|
||
and omitted all but one of the Bell South proprietary
|
||
notices contained in the text file. Neidorf modified
|
||
the one remaining Bell South warning notice by inserting
|
||
the expression "whoops" at the end:
|
||
|
||
NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE BELL SOUTH OR
|
||
ANY OF ITS SUBSIDIARIES EXCEPT UNDER WRITTEN AGREEMENT.
|
||
[WHOOPS]
|
||
|
||
From an outsider's perspective, this witness was there to make a claim and
|
||
not to present "truth." Even when confronted with public E911 information
|
||
identical or similar to the PHRACK version, she seemed unwilling to give a
|
||
direct answer indicating that passages were identical.
|
||
|
||
Also in the afternoon session, Secret Service Special Agent Timothy Foley,
|
||
in charge of the search of Craig Neidorf and others, related a detailed
|
||
account of the search and what he found. A number of files from PHRACK and
|
||
several additional e-mail documents were introduced as government exhibits.
|
||
|
||
At this time, a number of documents were introduced as evidence. These
|
||
included several e-mail messages between Craig and others.
|
||
In addition to the E911 files, the following were introduced:
|
||
|
||
PHRACK ISSUE FILE No.
|
||
21 3
|
||
22 1
|
||
23 1
|
||
23 3
|
||
24 1
|
||
24 11
|
||
25 2
|
||
|
||
(Some of these have been reprinted in CuD. A CuD index is available, and
|
||
PHRACKS may be obtained from the archives).
|
||
|
||
From a spectator's perspective, the most curious element of Agent Foley's
|
||
testimony was his clear presentation of Craig as initially indicating a
|
||
willingness to cooperate and his initial willingness to talk without a
|
||
lawyer present. Given the nature of the case, one wonders why the
|
||
government couldn't have dealt less aggressively with this case, since the
|
||
testimony was explicit that, had it been handled differently, justice could
|
||
have been served without such a waste of the taxpayers dollars. When Agent
|
||
Foley read the PHRACK file describing summercon, one was also struck by
|
||
what seemed to be little more than announcing a party in which there was
|
||
explicit emphasis on informing readers that nothing illegal would occur,
|
||
and that law enforcement agents were also invited.
|
||
|
||
It was also curious that, in introducing the PHRACK/INC Hacking Directory,
|
||
a list of over 1,300 addresses and handles, the prosecution seemed it
|
||
important that LoD participants were on it, and made no mention of
|
||
academics, security and law enforcement agents, and others. In some ways,
|
||
it seemed that Bill Cook's strategy was to put HACKING (or his own rather
|
||
limited definition of it) on trial, and then attempt to link Craig to
|
||
hackers and establish guilt by association. It was also strange that,
|
||
after several months of supposed familiarization with the case, that
|
||
neither Bill Cook nor Agent Foley would pronounce his name correctly.
|
||
Neidorf rhymes with eye-dorf. Foley pronounced it KNEEdorf and Cook
|
||
insisted on NEDD-orf. Further, his name was spelled incorrectly on at least
|
||
three charts introduced as evidence, but as Sheldon Zenner indicated, "we
|
||
all make mistakes." Yeh, even Bill Cook. One can't but think that such an
|
||
oversight is intentional, because a prosecutor as aware of detail as Bill
|
||
Cook surely by now can be expected to know who he is prosecuting, even when
|
||
corrected. Perhaps this is just part of a crude, arrogant style designed
|
||
to intimidate, perhaps it is ignorance, or perhaps it is a simple mistake.
|
||
But, we judge it an offense both to Craig and especially his family to sit
|
||
in the courtroom and listen to the man prosecuting their son to continually
|
||
and so obviously mispronounce their name.
|
||
|
||
DAY FOUR OF THE TRIAL (THURSDAY, JULY 26):
|
||
|
||
Special Agent Foley continued his testimony, continuing to describe the
|
||
step by step procedure of the search, his conversation with Craig, what he
|
||
found, and the value of the E911 files. On cross-examination, Agent Foley
|
||
was asked how he obtained the original value of the files. The value is
|
||
crucial, because of the claim that they are worth more than $5,000. Agent
|
||
Foley indicated that he obtained the figure from BellSouth and didn't
|
||
bother to verify it. Then, he was asked how he obtained the revised value
|
||
of $23,000. Again, Agent Foley indicated that he didn't verify the worth.
|
||
Because of the importance of the value in establishing applicability of
|
||
Title 18, this seems a crucial, perhaps fatal, oversight.
|
||
|
||
Next came the testimony of Robert Riggs (The Prophet), testifying
|
||
presumably under immunity and, according to a report in the last issue of
|
||
CuD, under the potential threat of a higher sentence if he did not
|
||
cooperate. The diminutive Riggs said nothing that seemed harmful to Craig,
|
||
and Zenner's skill elicited information that, to an observer, seemed quite
|
||
beneficial. For example, Riggs indicated that he had no knowledge that
|
||
Craig hacked, had no knowledge that Craig ever traded in or used passwords
|
||
for accessing computers, and that Craig never asked him to steal anything
|
||
for him. Riggs also indicated that he had been coached by the prosecution.
|
||
The coaching even included having a member of the prosecution team play the
|
||
role of Zenner to prepare him for cross-examination. It was also revealed
|
||
that the prosecution asked Riggs to go over all the back issues of PHRACK
|
||
to identify any articles that may have been helpful in his hacking career.
|
||
Although it may damage the egos of some PHRACK writers, Riggs identified
|
||
only one article from PHRACK 7 that MIGHT POSSIBLY be helpful.
|
||
|
||
What are we to make of all this? So far, it seems that the bulk of the
|
||
evidence against Craig is weak, exaggerated, and at times seems almost
|
||
fabricated (such as the value of the E911 file and Craig's "evil" attempt
|
||
to organize a league of "criminals." We have been told repeatedly be some
|
||
law enforcement officials and others that we should wait, because evidence
|
||
will come out that could not be discussed in public, and that this evidence
|
||
would silence critics. Some have even said that those who have criticized
|
||
law enforcement would "slink back under their rocks" when the evidence was
|
||
presented. Perhaps. But, so far at least, there has been no smoking gun, no
|
||
evidence that hasn't been discussed previously, and no indication of any
|
||
heinous conspiracy to bring America to its knees by trashing the E911
|
||
system, robbing banks, or destroying the technological fabric of society.
|
||
Perhaps a bombshell will be introduced before the prosecution winds up in a
|
||
few days. But, even if Craig is ultimately found guilty on any of the
|
||
counts, there is certainly nothing presented thus far that appears to
|
||
justify the severity of the charges or the waste of state resources. To
|
||
paraphrase that anonymous writer in the last issue of CuD, I can't help but
|
||
wonder why we're all here!
|
||
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #1.25: File 3 of 4: Warning about BBS Harassment ***
|
||
********************************************************************
|
||
|
||
Date: Undated
|
||
From: Keith Henson
|
||
Subject: Warning about Continued BBS Harassment
|
||
|
||
++++++++++++++++++++++++++++
|
||
Keith Henson posted the following on Portal and sent it along to us.
|
||
++++++++++++++++++++++++++++
|
||
|
||
|
||
PORTAL MESSAGE
|
||
-----------------------------------------------------------------------
|
||
One day you try to log in, and it's PORTAL OFFLINE. After a day or
|
||
two, the word gets around on other systems that the Feds have "searched"
|
||
Portal, carrying off all its computers, disk drives, modems, phones,
|
||
manuals, paper files, printers, even a box of blank paper. Why? Sorry,
|
||
the warrants are sealed, and you won't be able to even find out for six
|
||
months or more. The guess (because of some simultaneous arrests) is
|
||
that someone told the Secret Service of proprietary files being
|
||
transferred through Portal. Portal's computers (and anything *you* have
|
||
there) are now locked up as evidence in a case unlikely to come to trial
|
||
for a year or more.
|
||
|
||
Is this a paranoid fantasy? No, everything in the story, even the
|
||
box of blank paper, has happened to someone in the last three years.
|
||
Could it happen to Portal? All too possible. Even if the staff wanted
|
||
to snoop on everything that goes through Portal, they couldn't; there is
|
||
just too much. Is there anything we can do now to prevent these raids
|
||
from cutting into our access to the net? John Little, the owner of
|
||
Portal, thinks we can. That is why this is being posted.
|
||
|
||
|
||
There is a law, passed in 1986, called the Electronic Communications
|
||
Privacy Act. This law requires warrants if law enforcement agents want
|
||
to take electronic mail which is less than 180 days old. To get a
|
||
warrant, a law enforcement agent must show a judge that there is
|
||
"probable cause" of a crime before he permits the agents to violate the
|
||
privacy of your email, or to deny access to it by confiscating the
|
||
computer on which your email is stored.
|
||
|
||
The legal question is: does a warrant for a computer automatically
|
||
include all the electronic mail which might be found within it? (Kind
|
||
of like getting a warrant to search a post office and using it to open
|
||
and read all the mail found within the walls.) Or should law
|
||
enforcement agents be required to get warrants for the each person's
|
||
email before they can confiscate a computer?
|
||
|
||
Truthfully, no one knows. Law is as much a hodgepodge of
|
||
precedents as it is the statutes. And since 1986 (as far as I know) no
|
||
precedent setting cases on this point have gone to trial. It is
|
||
unlikely in the extreme that one law enforcement agency would go after
|
||
another for violating the provisions of the ECPA, and generate the
|
||
precedent. However, the act provides for civil action against those who
|
||
violate its provisions. A civil win would be just as effective in
|
||
setting precedent.
|
||
|
||
Two and a half years ago there was an incident in which the email
|
||
of 15 persons was taken by law enforcement agents with a warrant for the
|
||
computer, but without a warrant for email. This happened on a small
|
||
system used by the Alcor Life Extension Foundation (a non-profit
|
||
cryonics organization). A suit against the law enforcement agents and
|
||
agencies was filed early this year. Filings, motions, etc. are posted
|
||
on Portal (go 9449.3.12). So far things are going well. The lawyers
|
||
for the agents filed for dismissal; the judge told them we have a case.
|
||
|
||
Originally Alcor was going to fund the suit, but an endowment they
|
||
were counting on turned out to be about 1/4 of the expected size. The
|
||
email case, though important, is one of the things which had to be pared
|
||
from the budget. It has fallen to me, one of the plaintiffs, to raise
|
||
money to fund the case, which could cost up to $75,000. None of the
|
||
plaintiffs is wealthy, and the potential award from winning the case is
|
||
only $1000 each. We have already spent around $15,000. (However, if we
|
||
win, they have to pay our legal expenses.)
|
||
|
||
What we are looking for is donations to help pay for the suit.
|
||
John feels strongly enough about this matter to offer the use of the
|
||
Portal billing system to collect small donations. (For large donations,
|
||
contact me directly for details on how to make them tax deductible, or
|
||
returnable if we win.) All you need to do is to send a note to CS,
|
||
stating the amount you wish to donate and have added to your Portal
|
||
account.
|
||
|
||
And why should you part with your hard earned dollars? If net
|
||
access, netnews, or email is important to you, consider it a small
|
||
insurance policy. A win on the Alcor email case would make the story in
|
||
the first paragraph much less likely to occur.
|
||
|
||
If everyone on Portal gave a few dollars, it would go a *long* way
|
||
in helping to pay for the suit. Of course, if you can afford more, it
|
||
would be greatly appreciated. All donations will be acknowledged. If
|
||
we win and get the legal fees back, anything donated through Portal will
|
||
be returned to a Portal legal defense fund.
|
||
|
||
|
||
Thank you very much for taking the time to read this.
|
||
|
||
Sincerely,
|
||
|
||
H. Keith Henson (hkhenson)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #1.25: File 4 of 4: LPF Protests Lotus Litigation ***
|
||
********************************************************************
|
||
|
||
Date: 25 Jul 90 00:34:39 GMT
|
||
To: alt-society-cu-digest@rutgers.edu
|
||
From: tower@buita.bu.edu(Leonard H. Tower Jr.)
|
||
Subject: Fight "Look and feel" Lawsuits--March on Lotus August 2
|
||
|
||
|
||
[Please repost as widely as possible.]
|
||
|
||
Sad to say, the bad guys seem to be winning---the courts are on their side.
|
||
On June 28, Lotus won the lawsuit against Paperback Software, which had
|
||
developed a spreadsheet with the same commands and menus as 1-2-3. Now
|
||
they have sued SCO and Borland, claiming that their spreadsheets (including
|
||
Quattro Pro) are illegal copies. This decision makes it more likely that
|
||
Apple or Xerox will win their suits, and establish a monopoly on window
|
||
systems. And who knows who will be the next to be sued by someone else.
|
||
|
||
But the last battle is the battle for public opinion, and we can still win
|
||
that.
|
||
|
||
Therefore, on August 2, we will march on Lotus headquarters to protest
|
||
their new lawsuits. This is a demonstration against look-and-feel
|
||
copyright, sponsored by the League for Programming Freedom.
|
||
|
||
We will rally at Tech Square at 12:30 pm (in the tree-filled central area),
|
||
then march at 1 pm to the Lotus building next to the river at 55 Cambridge
|
||
Parkway. Professor Patrick Winston, director of the Artificial
|
||
Intelligence Laboratory, and Richard Stallman, president of the League for
|
||
Programming Freedom, will speak once we arrive there. If you are late,
|
||
come directly to Lotus. Don't be too late, since we will finish at 2 pm.
|
||
|
||
We will be handing out the new League stickers, showing Liberty holding the
|
||
disk and tape, with the slogan, "Stop Software Monopolies." (If you are a
|
||
League member, we will mail you some in the next mailing.) Take them and
|
||
post them where programmers will see them! If you can come get some and
|
||
post them before the demonstration, so much the better.
|
||
|
||
Please post copies of this announcement where you work, on bulletin boards
|
||
and anywhere else appropriate. Also speak to your coworkers and friends
|
||
about the demonstration; some of them may not read net news or bulletin
|
||
boards. Then remind them again a few days before.
|
||
|
||
Since not everyone will make a sign, it is very helpful if you do so. Here
|
||
are some suggestions for slogans:
|
||
SAY NO TO MONOPOLY
|
||
KEEP YOUR LAWYERS OFF MY COMPUTER
|
||
BOYCOTT LOTUS
|
||
PROGRAMMERS ARE ANGRY
|
||
USERS WANT COMPATIBLE SOFTWARE
|
||
Use your imagination; the more variety, the better.
|
||
|
||
Once we get to the Lotus building, please remember not to litter, not to
|
||
block pedestrians and to stay out of the street. We want to behave as
|
||
responsible citizens of a democratic society and be seen as such.
|
||
|
||
It's a sure thing there will be lots of reporters covering this
|
||
demonstration. (We'll make sure of it.) Our previous demonstration led to
|
||
coverage in all the major computer newspapers, and many major dailies.
|
||
This one promises to be even bigger and have a greater impact.
|
||
|
||
If you have to be somewhere else at 2 pm, then come at least from 1 to
|
||
1:30. If you work in the suburbs, you can travel back and forth and attend
|
||
the most important part of the demonstration in about two hours. That's a
|
||
long lunch, but you can get away with it. Mark the date and don't let
|
||
anything stop you from coming. We can win--but we must all pitch in.
|
||
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #1.25**
|
||
********************************************************************
|
||
|
||
|