717 lines
36 KiB
Plaintext
717 lines
36 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.08 (March 12, 1991) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
||
RESIDENT GAEL: Brendan Kehoe
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest. Back
|
||
issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
||
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (back up and running) and
|
||
(2) cudarch@chsun1.uchicago.edu
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles relating to
|
||
the Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS THIS ISSUE:
|
||
File 1: Moderators' Corner
|
||
File 2: From the Mailbag
|
||
File 3: "Hollywood Hacker" Info Wanted
|
||
File 4: What the EFF's Been Doing!
|
||
File 5: Book Review--COMPUTER ETHICS
|
||
File 6: The CU in the News: SPA Settlement
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #3.08, File 1 of 6: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: March 12, 1991
|
||
|
||
+++++++++++++++
|
||
Timing of CuD Issues
|
||
+++++++++++++++
|
||
|
||
In the last CuD, we indicated that there would be a longer time lag between
|
||
issues. Now, a few days later, comes the next issue. We suddenly seem to
|
||
have a good bit of material ranging from special issues on
|
||
FOIA/Constitutional stuff to a few longer articles that will take the bulk
|
||
of an issue. Thanks to all the contributors, AND KEEP THE STUFF COMING. We
|
||
especially want blurbs from news papers (or summaries for longer stories
|
||
that assure no copyright protections are violated).
|
||
|
||
A number of recent mailings have bounced--nobody seems to know why. All
|
||
uucp addresses in the CuD 3.07 mailing, but this seems to have been fixed
|
||
for most addresses. Vacation seems to have resulted in other stuff being
|
||
returned. Best way to receive CuD is off the nets (alt.society.cu-digest)
|
||
or ftp (see header).
|
||
|
||
+++++++++++++++
|
||
CuD FTP Additions
|
||
+++++++++++++++
|
||
|
||
The CuD ftp sites currently include a variety of University computer
|
||
policies, additional papers, and a variety of state and federal (and a few
|
||
foreign) computer abuse statutes.
|
||
|
||
law/<state> Current computer crime laws are online for:
|
||
AL, AK, AZ, CA, CO, CT, DE, FL, GA, HI, IA, ID, IL,
|
||
IN, MD, MN, NJ, NY, TX, VT, VA, and WV.
|
||
|
||
(Everyone [law students especially] is encouraged to send
|
||
along other statutes...we want to build this area up to
|
||
[hopefully] a full set.)
|
||
|
||
We still needed: AR, DC, KS, KY, ME, MI, MO, MS, MT, NC, ND,
|
||
NH, NM, NV, OK, RI, SC, SD, TN, UT, WI, WY
|
||
|
||
+++++++++++++++++
|
||
2600 and Full Disclosure Magazines
|
||
+++++++++++++++++
|
||
|
||
2600 and Full Disclosure are out. Characteristical, 2600 has its usual
|
||
collection of interesting articles, including a nice story on Republican
|
||
Party hacking into Democratic Party computers, "The Hacker Reading List,"
|
||
and one of the last articles to come out of the Legion of Doom, "Central
|
||
Office Operations" (by Agent Steal). As a number of people have observed
|
||
following increased exposure of the rip-off of COCOTS (Coin Operated,
|
||
Customer-Owned Telephones), 2600 was instrumental in documenting various
|
||
abuses in the past. It's a mag well worth the modest investment. Contact:
|
||
2600@well.sf.ca.us or write 2600 Magazine; PO Box 752; Middle Island, NY
|
||
11953 (USA).
|
||
|
||
We also received the latest issue of Full Disclosure (#22). Articles
|
||
include a summary of the Ripco Seizure, the "Atlanta Three" Sentencing
|
||
Memorandum, and numerous articles on government surveillance. It's a great
|
||
issue, and a steal for only $18 for 12 issues. Contact: Full DIsclosure,
|
||
Box 903-FD22, Libertyville, IL 60048. The Mag's Glen Roberts (publisher)
|
||
and Bill Vajk (professional gadfly), remember, are the ones who dug up the
|
||
Ripco seizure warrant when nobody else could.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Ah, Sordid
|
||
Subject: From the Mailbag
|
||
Date: March 12, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.07: File 2 of 6: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
Subject: SWBell PUC ruling a bad precedent.
|
||
Date: Fri, 8 Mar 91 16:11:22 CST
|
||
From: peter@taronga.hackercorp.com (Peter da Silva)
|
||
|
||
> From: Visualize Whirled Peas <brewer@ACE.ENET.DEC.COM>
|
||
> Subject: Sounds good... court ruling on BBS in SW Bell
|
||
|
||
The associated ruling is *not* a good precedent for future cases or law,
|
||
because it establishes that the phone company can charge based on the type
|
||
of information shipped over a phone line, rather than on the usage
|
||
patterns, whether the customer is running a business, or one of the
|
||
established bases for discriminating between customers.
|
||
|
||
With the phone companies trying to get into the information provider
|
||
business this is a bad precedent indeed. I understand that Hirsch and co
|
||
had other concerns, but we're all going to have to watch the various PUCs
|
||
like a hawk for references to this. Don't let it become an accepted
|
||
practice, or the future may see BBSes charged out of existence while the
|
||
phone companies push videotext services like Prodigy or SWBell's
|
||
"Sourceline".
|
||
--
|
||
Peter da Silva. %-_-' peter@ferranti.com
|
||
+1 713 274 5180. 'U% "Have you hugged your wolf today?"
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: P.A.Taylor@EDINBURGH.AC.UK
|
||
Subject: Re: QUick quesiton
|
||
Date: 09 Mar 91 13:04:32 gmt
|
||
|
||
Hi, I'm a 2nd year postgrad doing a PhD on the rise of the computer
|
||
security industry, system break-ins, browsing and viruses.
|
||
|
||
1. Would any of you be prepared to answer a questionnaire with the
|
||
possibility of a more in-depth e-mail discussion if you are amenable to it?
|
||
|
||
2. Is there anyone out there in The Netherlands or Germany who would be
|
||
prepared to brave a face-to-face interview with me. I was planning to go to
|
||
those countries in 3-4 weeks time and possibly again in the summer.
|
||
Obviously, I would also be keen to interview anyone in the U.K. at any
|
||
time.
|
||
|
||
ALL RESPONSES ETC. WILL BE TREATED WITH THE UTMOST CONFIDENCE AND ANY
|
||
FINDINGS WILL ONLY BE USED FOR ACADEMIC PURPOSES AND NEVER WITHOUT THE
|
||
PRIOR CONSENT OF THE SUBJECT. I CAN SUPPLY BONA FIDES OF MY ACADEMIC STATUS
|
||
IF REQUESTED.
|
||
|
||
Thanks very much in advance,
|
||
|
||
Paul A. Taylor Department of Politics, Edinburgh University.
|
||
|
||
P.S. I WOULD LIKE TO SPEAK TO *BOTH* SIDES OF THE SECURITY DEBATE.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: zane@DDSW1.MCS.COM
|
||
Subject: Civil Disobedience" and Freedom in the 90's
|
||
Date: Sun, 20 Jan 91 19:54:47 CST
|
||
|
||
Our freedoms today are being rapidly eaten up. The RICO laws and
|
||
Operation Sundevil are examples of this. Eric Postpischil
|
||
(edp@jareth.enet.dec.com) has written a very good article giving
|
||
examples of our rights and how the government is observing them in this
|
||
the 200th anniversary of the Bill of Rights.
|
||
|
||
But I will not dwell on what is going wrong; I think that many of you
|
||
already know that we live in a near-police state and those of you who
|
||
don't are quite the optimists. Many people are complaining about these
|
||
rights and their loss, yet no one seems to be doing anything. On the
|
||
RipCo, I was commended for my bravery for writing a letter to my Senator.
|
||
There is nothing brave about this. What is brave is actively protesting,
|
||
such as those who are currently protesting the War in Iraq, or, even
|
||
more brave, those who are trying to make their views on abortion known,
|
||
from lying in the paths of potential abortions, to simply marching on the
|
||
capitol.
|
||
|
||
We in the Electronic Frontier have no such people. Most people in the
|
||
Electronic Frontier are people who WANT something done, but are not
|
||
willing to go about doing it. The Electronic Frontier Foundation is a
|
||
prime example. The EFF has done quite a bit for Freedom in the
|
||
Electronic Frontier, but it is just waiting, waiting for change to come
|
||
about slowly by petitioning the legislator. This is very slow, and by
|
||
the time that works, it will be out of date. I had thought that what the
|
||
EFF was doing was good enough, until I read "Civil Disobedience" by Henry
|
||
David Thoreau. Then I realized that more must be done. One person can
|
||
make a difference, and we are many. We do not have to wait until we
|
||
convince the majority, says Thoreau, all we have to do is do what we feel is
|
||
right, and change will come about.
|
||
|
||
Thoreau, because he did not want to pledge his allegiance to the
|
||
State, did not pay his poll tax for six years. He did not like the
|
||
actions of the government, so therefore did not want to support them with
|
||
his money. (The actions at that time were the Mexican-American War, and
|
||
slavery.) He did not wait until his petitions to his legislators
|
||
were answered, they are sluggish. He constituted a "majority of
|
||
one."
|
||
|
||
Something must be done to protect our freedoms in this nation. We have a
|
||
great code in our Bill of Rights. We must protect that. That is our
|
||
obligation as citizens and patriots. Current actions are very slow, and
|
||
more MUST be done.
|
||
|
||
"Civil Disobedience" can be obtained at the CuD archive at
|
||
cudarch@chsun1.uchicago.edu, ftp.cs.widener.edu, or by archive server at
|
||
archive-server@chsun1.uchicago.edu. Read it.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
From: Rambo Pacifist
|
||
Subject: Computers, Movies, Media, and Madness
|
||
Date: Sun, 10 Mar 91 21:28:21 PST
|
||
|
||
Bob Izenberg's summary of bad computer flix reminded of a few others. Who
|
||
can forget that giant system in the tv show The Prisoner? Anybody ever see
|
||
that system, that probably didn't have the capacity of a 386 s/x, actually
|
||
DO anything? And what about the computer banks in all those B-movies? Lots
|
||
of lights with some poor schlub sitting in front of them--what are all
|
||
those lights for? They're all designed alike. Wonder if AT&T owns the
|
||
proprietary source code for the set design. There is a merciful god,
|
||
because I've forgotten the name of the flick where the computer falls in
|
||
love with some kid and tries to subvert his romance with a real-life
|
||
bimbette who prances around with mindless dialogue and rice-pudding for
|
||
brains--the sad thing is, it's not intended to be so mindless. And anybody
|
||
remember the Lost in Space computer? But my favorite all time computer is
|
||
from Bad Science--I'm typing this during a thunder storm hoping something
|
||
will get zapped and it will clone another Rachel Ward. With my luck, tho,
|
||
I'd get a coupla' Unix.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Jim Thomas
|
||
Subject: "Hollywood Hacker" Info Wanted
|
||
Date: March 11, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.07: File 3 of 6: "Hollywood Hacker" Info Wanted ***
|
||
********************************************************************
|
||
|
||
About a year ago, if memory serves, a reporter dubbed the "Hollywood
|
||
Hacker" made the news when the Secret Service and Los Angeles police raided
|
||
his home with a television crew present. I think his name was Stuart
|
||
Goldman. My recollection of the facts is rather cloudy, but I have seen
|
||
little follow-up on this case, and it hasn't been mentioned among the
|
||
"abuses" of the raids of that period.
|
||
|
||
The gist of the case, I think, was roughly this: The "Hollywood Hacker" was
|
||
a freelance investigative reporter for Fox who was accused of accessing
|
||
computers while investigating a story. He was raided in a media-event
|
||
atmosphere, the story made a few tabloids and the Fox News for a day or
|
||
two, and then was forgotten.
|
||
|
||
Has anybody been following this? Were there indictments? Did the case go to
|
||
trial? Will it go to trial? Is this still a federal case, or did they turn
|
||
it over to local agencies? The issues the case raises seem critically
|
||
important for the CU, and it seems surprising, if this broad summary is
|
||
reasonably correct, that there has not been more information of follow-up
|
||
on it. For example, what are the implications for freedom of the press in
|
||
applying computer abuse laws (and in California, if prosecuted under state
|
||
law, some of the law is rather Draconian)? If a reporter was working on
|
||
other stories and the info was confiscated, was this information ever
|
||
returned? If there were tv cameras present, why? The SS and most local
|
||
police are usually quite reticent about such things, so this kind of
|
||
action, if it occured, seems rather odd.
|
||
|
||
If anybody has any information (indictments, affidavits, news articles,
|
||
tapes of the original broadcasts or other documents), perhaps you could
|
||
send them over. Because the principle was a reporter, and because--if
|
||
memory serves--it was labelled hacking and wasn't--the implications may be
|
||
important. Like the cases of Ripco, Steve Jackson, Craig Neidorf, and
|
||
others, there may be issues here that, if unaddressed, will create bad-law
|
||
and legitimize increasing (and unnecessary) controls of the government over
|
||
Constitutional protections for ALL computer hobbyists.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: EFF (excerpts from EFF NEWS #3)
|
||
Subject: What the EFF's Been Doing!
|
||
Date: March 11, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.07: File 4 of 6: What the EFF's Been Doing ***
|
||
********************************************************************
|
||
|
||
%Moderator's Note: We have received, and seen on the nets, a number of
|
||
inquiries wondering about what the EFF has been doing. Some of these
|
||
inquiries have been critical, suggesting the EFF hasn't been doing anything
|
||
except seeking publicity. This seems unfair, because it puts them in a
|
||
catch-22 situation: If they don't publicize their activities, they are
|
||
accused of doing nothing; If they do publicize their activities, they are
|
||
accused of grand-standing. In a recent post on comp.org.eff.talk, Mike
|
||
Godwin indicated that the reason EFF does not publicize their activities
|
||
more fully is tactical: Why let the opposition know what the defense is
|
||
planning? When General Schwartzkopf used this strategy in planning the
|
||
campaign in Iraq, he was a hero. We suggest that EFF is every bit as
|
||
heroic, because they, too, are protecting the Constitution and "American
|
||
Way," but in a longer, slower, and much less glamorous campaign.
|
||
|
||
In the latest EFF News (#3), Mike and Mitch outlined what the EFF has been
|
||
up to, and for those who haven't seen it, the following should be
|
||
sufficient evidence that those legal eagles are busy little beavers (even
|
||
if they do hate mixed metaphors).--J&G%.
|
||
|
||
*** CASE UPDATES, by Mike Godwin***
|
||
|
||
Len Rose
|
||
|
||
EFF's support and Mitch's independent funding of Len's defense have led to
|
||
good results. Our efforts have limited the extent to which Len is being
|
||
made an example of, and the extent to which he can be used as justification
|
||
for increased law-enforcement activity in this area. Had we not intervened
|
||
in Len's support, it seems likely not only that he would have faced far
|
||
harsher penalties after a plea bargain or trial, but also that bad law
|
||
would have been made by his federal and state cases.
|
||
|
||
Acid, Optik, and Scorpion
|
||
|
||
"Acid Phreak" and "The Scorpion" received preindictment letters from
|
||
federal prosecutors in New York, while "Phiber Optik" was indicted by a
|
||
state grand jury. Phiber's case has been resolved; he pled guilty to a
|
||
misdemeanor count, and at this writing his sentence is expected to be
|
||
limited to community service when he is sentenced on April 4.
|
||
|
||
EFF has chosen not to become involved in these cases at this early stage,
|
||
primarily because it is unclear whether the cases will raise important
|
||
Constitutional or civil-liberties issues, but we are tracking them closely.
|
||
|
||
Washington v. Riley
|
||
|
||
Although we initially favored involvement in this case, EFF's legal
|
||
committee later decided that prudent management of our financial and legal
|
||
resources dictated that we withhold our formal involvement here. This case
|
||
raises important issues, but control of our costs and management of our
|
||
time has forced us to make some hard decisions about investing in new
|
||
cases, and in this light we determined that this case would not represent
|
||
the best investment of our limited resources.
|
||
|
||
We have remained in touch with Riley's attorney, however, and we have
|
||
offered to act informally as a legal and technical resource for her to the
|
||
extent it does not detract from our work on other projects; she has
|
||
accepted our offer.
|
||
|
||
Other
|
||
|
||
Other important legal matters are currently receiving considerable
|
||
attention. Because these are of a sensitive nature, we will not be able to
|
||
disclose details until some time in the future. Please bear with us.
|
||
|
||
*** LEGAL CASE MANAGEMENT, by Mitch Kapor ***
|
||
|
||
On February 6, Harvey Silverglate, Sharon Beckman, Tom Viles, and Gia
|
||
Baresi (all of Silverglate and Good), Mike Godwin, and I all had dinner
|
||
together at Harvey's house. We reached a number of important conclusions
|
||
about improving the effectiveness and reducing the cost of the legal
|
||
programs of the foundation.
|
||
|
||
S&G want are willing to allocate additional people to the EFF account in
|
||
order to have some extra capacity to handle peak loads. Tom Viles will be
|
||
working with us. He's very ACLU-knowledgeable. He is serving on a
|
||
national ACLU committee which has just recommended that the ACLU take a
|
||
position on national info infrastructure.
|
||
|
||
S&G sees EFF as being its ongoing client, as opposed to their usual mode of
|
||
operation which is to represent an individual or organization for a
|
||
particular case. In essence, S&G is becoming the EFF's outside litigation
|
||
counsel. With both parties located in Boston, it will make coordination
|
||
more convenient and less expensive. They have also agreed to work at a
|
||
very large discount from their usual client fee schedule.
|
||
|
||
We discussed streamlining the legal review process. Everyone felt that
|
||
it's wasteful and inefficient to have several lawyers looking into each
|
||
possible new case and to have conference calls for making decisions. Mike
|
||
and Sharon are going to prepare a joint plan on how we will manage the
|
||
legal process efficiently. Now that there are fewer parties involved and
|
||
that all of the lawyers are in town, it should be simpler.
|
||
|
||
*** LEGAL AND POLICY PROJECTS, by Mitch Kapor ***
|
||
|
||
Sysop liability
|
||
|
||
We are engaged in an internal discussion about the limits of sysop
|
||
liability. We hope to build a consensus on what the law should be in this
|
||
area in order to provide a philosophical framework for whatever action we
|
||
choose to take in current and future BBS seizure cases.
|
||
|
||
Massachusetts Computer Crime Bill
|
||
|
||
We are once again working with the Mass. Computer Software Council in an
|
||
effort to pass a progressive computer crime bill which protects civil
|
||
liberties as well as security interests. Two different bills have been
|
||
filed: one is our bill, while the other has serious problems of
|
||
overbreadth. Sharon, Mike, and I are all working on this. Sharon has
|
||
prepared testimony which will be used in public hearings nest week. There
|
||
will be a series of briefings for legislators and other other parties as
|
||
well.
|
||
|
||
Guidelines for Computer Search and Seizure
|
||
|
||
Previously Terry Gross and Nick Poser of Rabinowitz, Boudin had developed a
|
||
series of guidelines for the conduct of computer-based searches for an ABA
|
||
sub-committee working on this issue. Subsequently, Mike Godwin revised
|
||
those for a paper and presentation to be given at the Computer Virus
|
||
conference upcoming shortly. At the recent CPSR Policy Roundtable, it
|
||
became apparent that we needed to take more of top-down approach in order
|
||
to gain adoption and implementation of these guidelines by federal and
|
||
state law enforcement agencies.
|
||
|
||
We are now in the process of structuring an important project, to be led by
|
||
Mike, which will target the FBI and other key agencies for a series of
|
||
events to formally develop and present our finding and recommendations.
|
||
Jerry Berman of the ACLU has offered to assist us in navigating our way
|
||
through the bureaucratic maze in Washington.
|
||
|
||
Computer Bulletin Boards, Computer Networks, and the Law
|
||
|
||
In addition to the computer crime bill work and development of search
|
||
guidelines, the third major legal project is to develop a position on the
|
||
legal issues surrounding computer bulletin boards. There has already been
|
||
a great deal of discussion about this issue on the net on the Well's EFF
|
||
conference. There have been a small number of law papers published on the
|
||
subject as well. Nothing to date though has offered a comprehensive
|
||
proposal as to how to place BBSes and network carriers in the same legal
|
||
framework as print publications, common carriers, and broadcasters.
|
||
|
||
This project, which will involve a collective effort of all EFF principals,
|
||
and which is being driven by Mike, will seek to identify both the
|
||
fundamental common aspects and differentiating attributes of digital
|
||
computer media as compared with their predecessors. This will be done in
|
||
order to propose basic approaches to issues of government censorship,
|
||
rights and restrictions of private network carriers and system operators
|
||
to control content ("private" censorship) and liabilities of system
|
||
operators and users for activities and communication using network
|
||
facilities.
|
||
|
||
This is an ambitious undertaking, which will commence with a formal issues
|
||
development process, the deliverable of which will initially take some
|
||
written form such as a published paper or position statement. We will
|
||
attempt to incorporate input from many groups in this process in order to
|
||
develop a consensus.
|
||
|
||
As a starting point, I offer the notion that a computer bulletin board
|
||
ought to be treated as a legal hybrid. For certain purposes, e.g., the
|
||
right of the publisher to be free from government censorship of content, it
|
||
should be treated as though it were a print publication. But a BBS
|
||
operator should have less liability for the content of the board than the
|
||
publisher of a magazine. In many cases it is simply impossible, given the
|
||
volume of posting, for a sysop to review new postings in advance. The
|
||
principled way to defend such a hybrid approach would be to show that the
|
||
elements of the legal treatment desired are related to the particular
|
||
attributes of the system itself and reflect, in each case, a desirable
|
||
public policy goal.
|
||
|
||
The ACLU is beginning to take an interest in this area. We will work
|
||
cooperatively with them.
|
||
|
||
Other
|
||
|
||
There are other worthwhile projects competing for attention as well. In an
|
||
informal feedback session to the EFF held at the CPSR Roundtable, there was
|
||
a great deal of interest in a project to educate users of computers
|
||
networks about their rights and responsibilities. There is also interest
|
||
in understanding successful techniques in the self-management of "virtual
|
||
communities" which lessens the necessity for external sanctions. My
|
||
current judgment is that our "policy research" plate is already full and
|
||
that undertaking these or other subjects will have to be deferred.
|
||
|
||
CPSR FOIA Requests
|
||
|
||
Mike Godwin attended a meeting in Washington between representatives of the
|
||
Secret Service and David Sobel and Marc Rotenberg of CPSR. This meeting,
|
||
initiated by the Secret Service, took place for the purpose of helping the
|
||
agency define the scope of CPSR's two FOIA requests concerning,
|
||
respectively, Sundevil and non-Sundevil computer-crime investigations by
|
||
the Secret Service. Mike took part in the discussion, and is supporting
|
||
CPSR's FOIA effort by seeking privacy releases from individuals who may be
|
||
named in the files CPSR is seeking.
|
||
|
||
The EFFECTOR
|
||
|
||
The first issue of the EFFector print newsletter is at the printer. Gerard
|
||
van der Leun contributed much time and energy to seeing this through. I
|
||
think we will all be very pleased with its maiden voyage. EFFector is
|
||
aimed at an audience not already assumed to be intimately familiar with
|
||
issues on the electronic frontier.
|
||
|
||
The newsletter will be distributed to people on our mailing list who have
|
||
sent us postal addresses, every Well subscriber, and all participants at
|
||
the Computers, Freedom, and Privacy conference. We are printing about
|
||
10,000 copies.
|
||
|
||
The production values are very professional without looking too slick or
|
||
glitzy. (Gerard was able to persuade a graphic designer to develop the
|
||
format and design the first issue for virtually nothing). I think it
|
||
communicates our basic concerns and positions quite well. There is a piece
|
||
by Barlow on the origins of the EFF. I have my "Why Defend Hackers"
|
||
article. There are features on "20 Things You Can Do to Advance the
|
||
Electronic Frontier" culled from postings on the Well, a Washington update
|
||
by Marc Rotenberg, and many other worthwhile items.
|
||
|
||
We are aiming for a four times yearly publication frequency. Beginning
|
||
with issue two we will work out a subscription / membership plan and
|
||
arrangement.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Jim Thomas
|
||
Subject: Book Review--COMPUTER ETHICS
|
||
Date: March 8, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.07: File 5 of 6: Book Review: Computer Ethics ***
|
||
********************************************************************
|
||
|
||
Review of COMPUTER ETHICS: CAUTIONARY TALES AND ETHICAL DILEMMAS IN
|
||
COMPUTING, by Tom Forester and Perry Morrison. 1990. Oxford (Eng.): Basil
|
||
Blackwell. 193 pp. (np). (Reviewed by Jim Thomas, Northern Illinois
|
||
University).
|
||
|
||
The questions raised in the U.S. by Secret Service procedures in so-called
|
||
"computer crime" investigations such as Operation Sun Devil, the growth in
|
||
public computer literacy, and the general public recognition that computers
|
||
are moving from the periphery to the center of social control and
|
||
organizational operations make COMPUTER ETHICS a timely and worthwhile
|
||
tome. Although both authors resided in Australia when the book was written
|
||
(Tom Forester remains at Griffith University in Queensland and Perry
|
||
Morrison is now at the University of Singapore), the work focuses primarily
|
||
on the U.S. for examples, but draws as well from international data to
|
||
argue that society has yet to confront the twin dilemmas of hardware and
|
||
software malfunctions and misuse by humans.
|
||
|
||
In some ways, the book is misnamed. The themes are not restricted to those
|
||
of ethics, but include as well risks to society by over-reliance on
|
||
computer technology (especially when it fails) and to thornier social
|
||
issues, such as privacy, the social implications of artificial
|
||
intelligence, and the potential problems of the increasingly computerized
|
||
workplace. The authors organize each of the eight chapters around a specific
|
||
issue (Our Computerized Society, Computer Crime, Software Theft, Hacking
|
||
and Viruses, Unreliable Computers, The Invasion of Privacy, AI and Expert
|
||
System, and Computerizing the Workplace), summarize the problems by drawing
|
||
from an impressive wealth of data from conventional and other media, and
|
||
conclude each chapter with a hypothetical example and set of questions that
|
||
enhance the value of the work for college graduate and undergraduate
|
||
classes.
|
||
|
||
About one third of the book directly confronts computer crime and "computer
|
||
underground" activities, such as piracy and hacking. There is no obvious
|
||
ax-grinding, and especially with piracy the authors raise issues in a
|
||
generally non-judgmental manner. They observe that an increasing number of
|
||
software authors have recognized the general ineffectiveness of
|
||
program-protecting their products and have increasingly moved away from the
|
||
practice. However, the focus of the discussion avoids the type of "warez
|
||
sharing" that occurs on pirate BBSs and begs the issue of swapping
|
||
copyright programs without purchasing them. The discussion example focuses
|
||
on the ethical issue of copy-protecting programs with a disk-wiping virus
|
||
rather than using an example that teases out the nuances of using
|
||
unpurchased software. I am also a bit troubled by the cursory attention
|
||
given to the different types of piracy. Participants enmeshed in the
|
||
"pirate culture" on BBSs would agree that theft of proprietary source code
|
||
for profit or reselling copied programs is clearly wrong. Further, even
|
||
within the computer underground, pirates range from "kids" who crack and
|
||
swap games to older and more sophisticated users who simply enjoy
|
||
collecting and examining various types of programs. Without teasing out the
|
||
complexity of the pirate culture, many of the important issues are glossed
|
||
over, such as the ethics of "fair use" to pre-test a program, the harm (or
|
||
lack of it) in using a program that would not have been purchased, but
|
||
whose use expands a product's visibility and reputation (thereby expanding
|
||
the market), and the problem of an increasing array of available software
|
||
that if purchased would be exceed the resources of all but the most
|
||
affluent computerists. In fairness, not all relevant ideas can be
|
||
addressed in a single chapter, and the authors satisfactorily provoked
|
||
enough questions to make this an interesting and useful section.
|
||
|
||
The most troublesome chapter, "Hacking and Viruses," simplifies the
|
||
phreak/hacking community and alludes to studies that do not accurately
|
||
reflect the computer underground. Although a relatively short and seemingly
|
||
innocuous discussion, the section "why do hackers 'hack'?" cites studies
|
||
suggesting that "severe social inadequacy" typifies many hackers. The
|
||
authors do make it clear that there is no simple answer to explain
|
||
motivation, they tend to ignore the primary reasons cited by most hackers:
|
||
The challenge, the excitement, and the satisfaction of success and
|
||
increased knowledge. Granted, these reasons, too, are simplistic as a
|
||
satisfactory explanation but they provide an antidote to the general
|
||
imagery portrayed by law enforcement officials that hackers are dangerous
|
||
social misfits and criminals who should be prosecuted to the full extent of
|
||
the law.
|
||
|
||
Also troublesome is the inclusion of virus writers and spreaders with
|
||
hacking activity. Hackers are as vehemently opposed to spreading viruses as
|
||
law enforcement. In fact, hackers, because of their use of networks and
|
||
reliance on smoothly functioning hardware, have far more to lose than the
|
||
average computer user by their spread. Nonetheless, the authors do raise a
|
||
few questions about the differences in the various types of activity,
|
||
asking, for example, whether system-browsing should be criminalized in the
|
||
same way as other predatory behavior. The degree to which this chapter
|
||
provokes disagreement and challenge to some of the claims (or vehement
|
||
responses to some of the questions) is simply an indicator of the utility
|
||
of this work both for stimulating thought and for generating discussion.
|
||
|
||
Although the remainder of the book is not as directly relevant to the CU
|
||
community, it nonetheless provides interesting reading. The authors
|
||
continually remind the reader that despite their benefits, computers
|
||
possess numerous demonstrable dangers. The value of the work is not simply
|
||
the admonition of the risks of computer misuse, but more importantly, that
|
||
social attitudes, ethical issues, governmental policies, and social control
|
||
strategies have lagged far behind in the need to be aware of how computers
|
||
change our lives and how these changes may usher in new forms of social
|
||
interaction for which we are unprepared as we cross into the
|
||
cyber-frontier.
|
||
|
||
The authors' scholarship and documentation, although impressive, does not
|
||
tempt them to fall back into academicese. The volume reads like a novel
|
||
and--even where one might disagree with claims or conclusions--the
|
||
provocations are stimulating rather than combatative. In short, Computer
|
||
Ethics is fun and worth reading.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: The CU in the News: SPA Settlement SPA Settlement
|
||
Date: 10 Mar 91 02:54:32 EST
|
||
|
||
********************************************************************
|
||
*** CuD #3.07: File 6 of 6: The CU in the News ***
|
||
********************************************************************
|
||
|
||
- Washington, D.C. SPA STRIKES AGAIN!
|
||
---------------
|
||
|
||
Last week the Software Publishers Association (SPA) reported a settle-
|
||
ment with Davy McKee Corp. concerning illegal use of software (CPU
|
||
Status Report #10), this week the SPA has announced a raid on Parametrix
|
||
Corp., an engineering consulting firm, that "unveiled a substantial
|
||
number of illegal copies of software in use."
|
||
|
||
After obtaining an exparte writ of seizure and a temporary restraining
|
||
order, on February 26, the SPA's attorneys, along with some federal
|
||
marshals paid a surprise visit to the Bellevue and Sumner locations of
|
||
Parametrix and conducted an audit of the personal computers at these
|
||
locations.
|
||
|
||
SPA Executive Director Ken Wasch said, "The raid on Parametrix is part
|
||
of the industry's stepped-up campaign against software piracy in
|
||
corporate America. The SPA now receives dozens of piracy reports each
|
||
week, and we are filing new lawsuits every few days."
|
||
|
||
[Moderators' note: Those of us heavily into the matrix tend to forget
|
||
that most "real people" aren't using the same tools to obtain
|
||
information, etc. Here are some interesting numbers that may help to
|
||
understand the next time the general public fails to get too excited
|
||
about encroachments on our electronic freedoms.]
|
||
|
||
- Stamford, Connecticut OVER 1/2 OF US HOUSEHOLDS DON'T
|
||
++++++++++++++++++++++++++++++ USE PC, FAX OR CELLULAR PHONES
|
||
|
||
According to a survey of 45,000 U.S. households done by Comtec Market
|
||
Analysis Services of the Gartner Group, 52% of Americans haven't used a
|
||
PC, fax machine or cellular phone, either at home or at work. Only 3%
|
||
of households use all 3 technologies while cellular phones are in 7% and
|
||
42% use PCs.
|
||
|
||
Source:
|
||
STReport March 08, 1991 No.7.10
|
||
Reprinted with permission.
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #3.08**
|
||
********************************************************************
|
||
|
||
|
||
|