953 lines
42 KiB
Plaintext
953 lines
42 KiB
Plaintext
Computer underground Digest Tue Apr 12, 1994 Volume 6 : Issue 32
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe (He's Baaaack)
|
|
Acting Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Suspercollater: Shrdlu Nooseman
|
|
|
|
CONTENTS, #6.32 (Apr 12, 1994)
|
|
|
|
File 1--An Issues Primer for the Lamacchia Case
|
|
File 2-- MIT Butt-Covering?
|
|
File 3--New Edition of E-Zine-List available
|
|
File 4--Ratings Bandwidth
|
|
File 5--"I Have Seen the Future" (Satire)
|
|
File 6--Badgering LambdaMOO
|
|
File 7--Edwards to Lopez
|
|
File 8--Gilmore Files Clipper FOIA
|
|
File 9--Arrests of Juvenils in New Zealand for Bomb-making llegal
|
|
File 10--PRODIGY Forges Ahead With New Features
|
|
File 11--NY bill to make govt. info available online - act NOW!
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
nic.funet.fi
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Mon, 11 Apr 1994 22:48:00 -0500
|
|
From: Silverglate & Good <slvrgood@well.sf.ca.us>
|
|
Subject: File 1--An Issues Primer for the Lamacchia Case
|
|
|
|
An Issues Primer
|
|
in the Criminal Prosecution of
|
|
_United States of America vs. David LaMacchia_
|
|
(U. S. District Court, Boston, MA)
|
|
|
|
There has been a lot of mis-information and mis-understanding
|
|
floating around the electronic and print media concerning the issues
|
|
in the prosecution of Massachusetts Institute of Technology
|
|
undergraduate David LaMacchia, who was indicted on April 7, 1994 in
|
|
the federal District of Massachusetts. This issues primer is meant
|
|
to clarify what the case is and is not about, and to place into some
|
|
perspective the legal issues raised. The purpose of this memo is
|
|
not, at this stage, to discuss any contested evidence in the case,
|
|
since that will be played out at a later stage. Some of the case's
|
|
legal implications are, however, clear from the start.
|
|
|
|
* * *
|
|
|
|
>>> The charge in the indictment:
|
|
|
|
The indictment charges that David LaMacchia, by operating a
|
|
computer bulletin board system, or "BBS", at M.I.T. during a period
|
|
of some six weeks, thereby permitted and facilitated the illegal
|
|
copying and distribution of copyrighted software by other unknown
|
|
persons (presumably, the many computer users who logged onto the
|
|
BBS). It is further alleged that LaMacchia knew that others were
|
|
using his system for such a purpose, although it is *not* alleged
|
|
that the BBS was not used for other, lawful communication purposes as
|
|
well. There is *no* allegation that LaMacchia himself uploaded,
|
|
downloaded, sold, profited from, used, or actually transmitted any
|
|
such software. The government does not allege that LaMacchia
|
|
violated the federal copyright or computer fraud statutes. Rather,
|
|
the prosecution has charged him with engaging in a criminal
|
|
conspiracy to violate the federal wire fraud statute, which was
|
|
enacted in 1952 to prevent the use of the telephone wires in
|
|
interstate fraud schemes.
|
|
|
|
* * *
|
|
|
|
>>> What this case is *not* about:
|
|
|
|
This is *not* a case about whether *"software piracy"* is
|
|
illegal under federal law. Both sides in the case are proceeding,
|
|
and will proceed, on the assumption that it is *not* lawful to make
|
|
and distribute copies of copyrighted computer software without paying
|
|
a licensing or royalty fee to the copyright owner. There is likely
|
|
to be agreement as well that if copyrighted software above a certain
|
|
value is willfully copied and sold, a criminal copyright violation
|
|
has occurred.
|
|
|
|
David LaMacchia is *not* alleged in the indictment to have
|
|
_uploaded_ or _downloaded_, _transmitted to anyone_ or even _used
|
|
personally_, any copyrighted software on the computer bulletin board
|
|
system ("BBS"), or "node", that he created and operated from an
|
|
M.I.T. computer.
|
|
|
|
LaMacchia is *not* alleged to have _sold_ any copyrighted
|
|
software, _nor profited_ one penny from the copying or distribution
|
|
of any such software.
|
|
|
|
It is *not* alleged that the computer BBS was used *exclusively*
|
|
to transfer copyrighted software. Indeed, the indictment alleges
|
|
that "part" of the conspiracy was to transmit "files and messages" on
|
|
the system, part was "to create a library of software", and that
|
|
"part" of the scheme was to allow some users to "unlawfully download
|
|
copyrighted software."
|
|
|
|
* * *
|
|
|
|
>>> What this case *is* about:
|
|
|
|
This case raises the following significant issues in the overall
|
|
larger question of whether, and how, the principles underlying
|
|
freedom of speech and of the press (the First Amendment) will be
|
|
applied to the world of computer communications ("cyberspace"):
|
|
|
|
1. Under current criminal statutes, may a systems operator
|
|
("SYSOP") of a computer BBS be held criminally responsible for
|
|
what *users* of the system do while logged onto the network,
|
|
including the exchange of copyrighted software or indeed, the
|
|
publication of other copyrighted materials?
|
|
|
|
2. If current criminal statutes, including the "wire
|
|
fraud" statute that LaMacchia is alleged to have "conspired" to
|
|
violate, are interpreted to reach the SYSOP who does not himself
|
|
upload, download, copy, use, or sell copyrighted software, do
|
|
those statutes, as so interpreted, violate the First Amendment,
|
|
and are they therefore unconstitutional?
|
|
|
|
3. In light of the uncertainty over whether and how
|
|
current statutes, including the federal "wire fraud" statute,
|
|
apply to the activities of a SYSOP of a computer BBS, does the
|
|
government violate the "Due Process of Law" provision of the
|
|
Fifth Amendment to the Constitution which prohibits criminal
|
|
prosecution unless Congress has given citizens clear notice of
|
|
what conduct is prohibited, by seeking to impose *criminal*
|
|
liability on a SYSOP like LaMacchia, where any reasonable person
|
|
(even a legal expert, but much less a 20-year-old undergraduate)
|
|
would not have known that his conduct even arguably was a crime?
|
|
In short, was LaMacchia given adequate *notice* that the wire
|
|
fraud statute would be stretched to cover his activity? Is it
|
|
fair, or constitutional, to prosecute such a person before the
|
|
law is *clarified*?
|
|
|
|
* * *
|
|
|
|
>>> Discussion:
|
|
|
|
The First Amendment to the United States Constitution has long
|
|
conferred special protection on those engaged in the activity of
|
|
maintaining communications media. Part of this protection has
|
|
involved protecting such persons from being held *criminally*
|
|
responsible for the criminal misuses of their systems and media by
|
|
other people. Thus, for example:
|
|
|
|
It is well-known that certain classified advertisements for
|
|
"_dating services_" found commonly in some newspapers are really
|
|
covers for high-class *prostitution* rings. Yet only the people
|
|
who actually run the prostitution services are prosecuted for
|
|
those violations of law. Editors and publishers of the
|
|
newspapers are *not* prosecuted on some legal theory that their
|
|
classified sections -- and therefore they themselves -- somehow
|
|
"aided" or "conspired with" the prostitution rings in the
|
|
criminal prostitution enterprise, even if the editors and
|
|
publishers were well aware of the fact that their newspapers
|
|
were being mis-used for an illegal purpose.
|
|
|
|
It is well-known that gambling "numbers" syndicates utilize
|
|
newspaper reports of scores of the outcomes of certain athletic
|
|
events, as the basis for illegal sports-betting operations.
|
|
Only the bookies are criminally prosecuted for such gambling
|
|
activity. The newspapers -- their editors, publishers, and
|
|
reporters included -- are never criminally prosecuted for the
|
|
illegal activities of those who thus use the published sports
|
|
reports.
|
|
|
|
In nearly every lending library in the country, there are
|
|
one or more photocopying machines sitting in the midst of large
|
|
number of books, many of which are copyrighted. Librarians
|
|
surely understand that a certain number of people who make
|
|
photocopies on those machines are copying *copyrighted*
|
|
material, perhaps in violation of the copyright laws. There
|
|
does not appear to be a criminal prosecution of any such
|
|
librarians for "aiding" or "facilitating" breaches of the
|
|
copyright laws.
|
|
|
|
The owner or manager of a bookstore may not be criminally
|
|
prosecuted for the distribution of obscene material if, in a
|
|
bookstore carrying a wide variety of printed materials, a
|
|
certain quantity of those materials contain obscene portions.
|
|
It does not even matter whether the bookstore owner or manager
|
|
suspects that some of the material in the store may contain
|
|
obscene matter. It is not his or her legal responsibility to
|
|
monitor and censor such materials, according to the United
|
|
States Supreme Court. (_Smith v. California_, 361 U.S. 147
|
|
(1959))
|
|
|
|
The reason why the editor, publisher, reporter, librarian, and
|
|
bookstore-owner and manager are all protected against criminal
|
|
prosecution, is because the First Amendment protects them from being
|
|
held criminally responsible for the acts of those who use, or
|
|
mis-use, their media or their facilities. In short, because of the
|
|
First Amendment, we do not assign to such people the role of being
|
|
*censors* or "media cops."
|
|
|
|
In the case of a SYSOP (like David LaMacchia) of a computer BBS,
|
|
the First Amendment would appear to protect him from criminal
|
|
liability for the arguably illegal actions of other people using (or
|
|
mis-using) his system to upload, download, transfer, copy, and use
|
|
copyrighted software. Just as with the owner or manager of a
|
|
bookstore or the librarian, it would be impossible for a SYSOP to
|
|
monitor everything being uploaded to or downloaded from his computer
|
|
BBS. Were such liability imposed, nobody would risk being a SYSOP,
|
|
and virtually every computer BBS in the country would shut down.
|
|
This is what the First Amendment is supposed to prevent.
|
|
|
|
The question in the _LaMacchia_ case is whether the First
|
|
Amendment protections that have long applied to those in the print
|
|
medium, should apply fully to those in the computer communications
|
|
medium. Because the law has been slow in adjusting to the age of
|
|
digital communications, there have been relatively few legal tests of
|
|
the scope of First Amendment protections in cyberspace. Civil
|
|
libertarians have assumed that there surely should be no less
|
|
constitutional protection for free speech and free press in
|
|
cyberspace than elsewhere. Those few courts tests that have happened
|
|
indicate that the First Amendment is indeed alive and well in
|
|
cyberspace.
|
|
|
|
Now, in the case of _United States v. David LaMacchia_, we will
|
|
learn whether the Department of Justice will be permitted to bend and
|
|
stretch the old federal criminal "wire fraud" statute to cover the
|
|
activities of a SYSOP who himself violates no copyright law, does not
|
|
profit from the activities of others, and who merely runs the system
|
|
perhaps even suspecting or knowing that it is being used for a wide
|
|
variety of purposes -- some legal and some arguably illegal, or
|
|
whether Congress, if it wishes to criminalize such activity, will
|
|
have to pass a statute *clearly* making it a crime for a SYSOP to
|
|
operate in this fashion. If and when such a statute is enacted, the
|
|
question of whether the First Amendment allows a SYSOP to be treated
|
|
differently than a publisher, an editor, or a bookstore owner or
|
|
manager, would have to be decided of course. But surely no SYSOP
|
|
should be criminally prosecuted in the *absence* of such a statute,
|
|
with no warning at all that he could face prison because it did not
|
|
(and reasonably could not) occur to him that someone would claim
|
|
under *current* law that he was committing a crime.
|
|
|
|
|
|
Harvey A. Silverglate
|
|
Sharon L. Beckman
|
|
Silverglate & Good
|
|
89 Broad Street
|
|
Boston, MA 02110
|
|
Tel (617) 542-6663
|
|
Fax (617) 451-6971
|
|
has@world.std.com
|
|
|
|
David Duncan
|
|
Zalkind, Rodrigues, Lunt & Duncan
|
|
65a Atlantic Avenue
|
|
Boston, MA 02110
|
|
Tel (617) 742-6020
|
|
Fax (617) 742-3269
|
|
|
|
Legal Counsel for David LaMacchia
|
|
|
|
Dated: April 11, 1994.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 11 Apr 1994 18:33:15 +0000
|
|
From: gtoal@an-teallach.com (Graham Toal)
|
|
Subject: File 2-- MIT Butt-Covering?
|
|
|
|
In the MIT tech newspaper:
|
|
|
|
"We became aware sometime in December that a computer was
|
|
being used to distribute software," said Kenneth D.
|
|
Campbell, director of the news office. "That information
|
|
was turned over to Campus Police and the FBI. MIT
|
|
personnel cooperated with the FBI in the investigation."
|
|
|
|
The incident was discovered when an Athena-user in the
|
|
Student Center cluster noticed that an unattended
|
|
workstation next to him was behaving abnormally, making
|
|
frequent disk accesses, according to James D. Bruce ScD
|
|
'60, vice president for Information Systems.
|
|
|
|
The user apparently reported the abnormal behavior to
|
|
members of the Student Information Processing Board, who
|
|
then proceeded to investigate the matter, according to a
|
|
source familiar with the investigation. The SIPB members
|
|
saw the status of the workstation and reported the
|
|
incident to the Information Systems staff, the source
|
|
said.
|
|
|
|
Most places I know of, if something like an FSP site was found, the
|
|
Dean or equivalent would take the student to one side and give him a
|
|
good verbal rap on the knuckles - maybe suspend his account for a time
|
|
- and put him back on the straight and narrow with the fear of god in
|
|
him. It's pretty depressing that schools are now so litigation-scared
|
|
that they feel they have to cover their backs and get the police
|
|
involved. This is the effect SPA et al are having. I can't see it
|
|
being for the greater good myself. It ups the stakes and means that
|
|
any other sys admin in charge of a University site will now be obliged
|
|
to call LE in, or risk being charged as conspirators themselves.
|
|
|
|
(At least, I *presume* it was fear that led to the law enforcement
|
|
agencies because MIT wasn't to make sure their hands were clean.
|
|
|
|
......
|
|
|
|
Also, I'd like to know *who* drew up the indictment against David -
|
|
who it was that thought using pgp and anonymous remailers was something
|
|
worth mentioning. This *isn't* the sort of stuff I'd expect the Boston
|
|
DA to know about. Either someone at MIT is deliberately shit-stirring
|
|
or the DA got help from <outside agencies>... my personal suspicion
|
|
is that that little gem came from MIT and young David is caught up in
|
|
something larger than his FSP warez server problems... Does anyone
|
|
have a way of finding out who was responsible for that part? Is it
|
|
FOIA-able? Or can David's lawyer's expect to be told as part of his
|
|
defence?
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 04 Apr 94 01:10:18 -0700
|
|
From: John Labovitz <johnl@ORA.COM>
|
|
Subject: File 3--New Edition of E-Zine-List available
|
|
|
|
This is to announce a New Edition of my E-Zine-List, a guide to
|
|
zines on the net.
|
|
|
|
The newest edition of the list can be obtained in the following ways:
|
|
|
|
anonymous FTP:
|
|
ftp.netcom.com: /pub/johnl/zines/e-zine-list (ASCII text version)
|
|
e-zine-list.html (HTML version)
|
|
|
|
World Wide Web:
|
|
ftp://ftp.netcom.com/pub/johnl/zines/e-zine-list.html
|
|
|
|
FTP-mail
|
|
send the message "help" to ftpmail@decwrl.dec.com for more information
|
|
|
|
email:
|
|
johnl@ora.com
|
|
|
|
A few notes:
|
|
|
|
* I'm changing my email contact address from johnl@netcom.com to
|
|
johnl@ora.com. Any further correspondence should be addressed to me here.
|
|
I will eventually be changing the FTP site (and hopefully getting it
|
|
on a real WWW sever); I'll let you know when that happens.
|
|
|
|
* At one point I had started a list of people who wanted to receive the
|
|
full version of an edition of the list when it came out. I've realized
|
|
that this is simply too timeconsuming for me to implement. If you are
|
|
one of those people who'd like the list by email, I'd recommend using
|
|
the above FTP-mail server to get the list. At last resort, I'll send
|
|
out copies manually, but I'd rather not do it too much.
|
|
|
|
* And lastly, sorry for the delay between editions. I've been trying
|
|
to issue a New Edition every month, but it hasn't been working out quite
|
|
that often.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 5 Apr 1994 02:22:11 -0500 (EDT)
|
|
From: "Ofer Inbar" <cos@CS.BRANDEIS.EDU>
|
|
Subject: File 4--Ratings Bandwidth
|
|
|
|
I'm a little behind on my CuDs, and I just got through reading some
|
|
of the articles from several months ago about a Usenet ratings system.
|
|
A few people mentioned bandwidth as a possible concern, so I looked up
|
|
the most recent NSFnet per-port usage stats. Here are the top ten
|
|
services, ordered by packet count:
|
|
|
|
NSFNET Backbone Traffic Distribution by Service
|
|
February 1994
|
|
|
|
Packet Total: 59,978,894,650
|
|
Byte Total: 11,415,444,417,600
|
|
|
|
Service Name Port Packet Count % Pkts Byte Count % Byts
|
|
============ ==== ============ ====== ============= ======
|
|
ftp-data 20 12374824000 20.632 4482332174350 39.266
|
|
(other_tcp/udp_ports) -999 11411443650 19.026 1436332023900 12.582
|
|
telnet 23 8808333200 14.686 647239528300 5.670
|
|
nntp 119 5071822850 8.456 1113129303700 9.751
|
|
smtp 25 4826063100 8.046 766131455150 6.711
|
|
domain 53 3521902850 5.872 327470529450 2.869
|
|
icmp -1 2366466900 3.945 204080814350 1.788
|
|
ip -4 2079238450 3.467 635027078800 5.563
|
|
irc 6667 1539952250 2.567 165244146650 1.448
|
|
gopher 70 1472386850 2.455 396066059800 3.470
|
|
|
|
We can see that NNTP, the protocol used for transporting Usenet news
|
|
over the Internet, is high on the list, accounting for about 10% of
|
|
the data traversing the NSFnet. We can also see that about four times
|
|
as much bandwidth is being used to transport files by ftp. This is
|
|
assuming that NSFnet statistics are a good barometer for the rest of
|
|
the Internet, but I don't think that's such a bad assumption.
|
|
It seems to me the real growth is in ftp and similar services, such
|
|
as gopher and web/mosaic. NNTP is a very efficient way to distribute
|
|
information, where everything is locally cached. (Efficient for the
|
|
network, that is, not for your disks!). The popularity of graphics
|
|
files, for instance, increases ftp traffic much more than news
|
|
traffic. And when full motion video and audio become more common, as
|
|
will undoubtedly happen not too long from now, this will be even more
|
|
pronounced.
|
|
People speculating about Usenet ratings have suggested that there
|
|
may be as many rating messages floating about as there are "real"
|
|
postings. However, even if NNTP traffic doubled, that's still half as
|
|
much as ftp. Personally, I wouldn't be surprised if rating
|
|
information became more common than "real" information, since it's
|
|
actually more useful, or makes the "real" information more useful,
|
|
depending on how you look at it. But even if NNTP traffic were to
|
|
triple due to ratings, it would be worth it. One poster mentioned
|
|
128-byte PGP signatures as a potential problem. But in the days of
|
|
video delivered by net, PGP signatures will be among the least of our
|
|
worries.
|
|
|
|
OK, so now for the real question:
|
|
The ratings idea is one that has been floating about the net in
|
|
various forms for a while now, and it's clearly a great idea. But, is
|
|
anyone actually working on programming it?
|
|
BTW, one potential of ratings that I don't remember seeing mentioned
|
|
here yet is its commercial potential. A good "editor" or similar
|
|
business could make money selling subscriptions to their private
|
|
ratings service. This is a good model for letting information
|
|
continue to flow freely, while still allowing for people to make money
|
|
off the information economy.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 5 Apr 1994 01:05:57 -0400 (EDT)
|
|
From: ktark%src4src@IMAGEEK.YORK.CUNY.EDU(Karl Tarhk)
|
|
Subject: File 5--"I Have Seen the Future" (Satire)
|
|
|
|
I HAVE SEEN THE FUTURE
|
|
Satire by ktark@src4src.linet.org
|
|
|
|
(Sing along with your favorite blues song)
|
|
|
|
I want to be a rebel
|
|
I want to fit in
|
|
in the new-tech revolution
|
|
in the new scheme of things
|
|
|
|
I will read Mondo-2000
|
|
and Wired magazines,
|
|
I will join a hacker group
|
|
and be into that scene
|
|
|
|
CHORUS:
|
|
|
|
I have seen the future
|
|
It is computers and french fries,
|
|
CD-ROMS, 3DO and cryptography
|
|
with a little mustard on the side
|
|
|
|
Crypto-hacker, Compu-rebel
|
|
Cyberpunk, yes, those are my names!
|
|
I am so bad..
|
|
I just can't believe myself
|
|
|
|
I am such a rebel
|
|
I write an electronic magazine..
|
|
I'll become so famous and quoted,
|
|
you're not gonna believe
|
|
|
|
CHORUS:
|
|
|
|
I have seen the future
|
|
It is computers and french fries,
|
|
Virtual Reality, 500 channels
|
|
with a little ketchup on the fly
|
|
|
|
I am so self assured,
|
|
well read and full of grace
|
|
that I have the need to wave
|
|
my degrees in your face!
|
|
|
|
I am such an anarchist
|
|
the government is after me..
|
|
for opposing Clipper
|
|
and drinking Chinese tea
|
|
|
|
CHORUS:
|
|
|
|
I have seen the future
|
|
It is Computers and french fries,
|
|
MUDS, Raves and Cyber-Sex
|
|
with a little KY-jelly on the side
|
|
|
|
A philantropist, a writer,
|
|
glorified and interviewed
|
|
worship me now, before
|
|
Uncle Sam gets you fooled
|
|
|
|
And when I retire
|
|
I'll start a consulting firm
|
|
In a month I'll make more bucks
|
|
than you'll ever earn!
|
|
|
|
CHORUS:
|
|
|
|
I have seen the future
|
|
It is Computers and french fries,
|
|
Interactive TV and desktop video
|
|
with a some mayo on the fly
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 6 Apr 94 23:16 WET DST
|
|
From: jwtlai@IO.ORG(GrimJim)
|
|
Subject: File 6--Badgering LambdaMOO
|
|
|
|
In response to "Mr. Badger" (CuD #6.29):
|
|
|
|
>To attempt to impart special significance to fantasies on-line does nothing
|
|
>but debase the truth concerning actual acts of aggression.
|
|
|
|
Agreed. The degree of aggression here is more on the order of a prank
|
|
phone call. Maybe harassment at the most. Of course, merely being an
|
|
ass isn't illegal.
|
|
|
|
>Do I think [t]he MUDers took things too seriously? Of course!
|
|
>Boot the offender off the system and have done with it. If
|
|
>push comes to shove, grab your marbles and go play elsewhere.
|
|
>Heck, for all I care, argue about it on-line until your phone
|
|
>line melts. Just don't try and draw shoddy parallels to real
|
|
>life that only serve to weaken judgment in both realms.
|
|
|
|
Interesting that I was mentioned in the subject line yet my arguments
|
|
were at most only vaguely referred to at the end of Mr. Badger's
|
|
response, if not downright ignored. Just what was "shoddy" about my
|
|
analogy between Usenet article forgery and MUD character fakery save
|
|
for the scale of the impact? If my parallels are indeed "weak",
|
|
please do point any flaws out, but spare me any rhetorical handwaving.
|
|
|
|
My basic proposition is simple: by playing on MUDs, the players
|
|
engaged the expression of intellectual property via the computerized
|
|
medium of interactive text. The financial repercussions were
|
|
negligible in this case, but it's human nature to be protective of
|
|
something in which one has invested time and effort.
|
|
|
|
My proposition does not conflate fantasy and reality. For instance, a
|
|
character, being an expression of intellectual property and not an
|
|
actual person, cannot be libeled or defamed.
|
|
|
|
Confusion may occur when people slip between reality (sometimes
|
|
referred to as OOC, or "out of context") and fantasy mode (IC, or "in
|
|
context"). An attack made IC, or on the character, may be
|
|
misinterpreted as being OOC, or on the person. This is
|
|
miscommunication, however.
|
|
|
|
This potential for miscommunication is interesting, though it hardly
|
|
justifies wild philosophical ramblings of the type in the cited
|
|
Village Voice article.
|
|
|
|
Since most people on Usenet post as themselves (OOC), there is usually
|
|
no fantasy (IC) to confuse the matter. On Usenet, attacks on others
|
|
are attacks, plain and simple. But there is nothing innately
|
|
different between the media of MUD, IRC, and Usenet in their ability
|
|
to distinguish between IC and OOC behavior; it is merely a matter of
|
|
social convention (or rules, or etiquette). Thus, my parallel between
|
|
Usenet message forgery and MUD character fakery. It appears to me
|
|
that there is a lack of a uniform social convention on MUDs; as a
|
|
result, miscommunication is all too common.
|
|
|
|
People arguably take things too seriously in the "real" world, judging
|
|
from the number of spurious lawsuits and torts. I can only hope that
|
|
my proposition would provide a down-to-earth framework, allowing
|
|
"virtual" situations to be dealt with rationally, level-headedly, and
|
|
in a consistent manner.
|
|
|
|
GrimJim
|
|
(Jim W. Lai in reality)
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 11 Apr 94 11:51:34 EDT
|
|
From: shadow@VORTEX.ITHACA.NY.US(bruce edwards)
|
|
Subject: File 7--Edwards to Lopez
|
|
|
|
I'd like to address one point Andy Lopez -- Mr.Badger -- makes in his
|
|
response to my critique of his review of Dibbell's Voice article.
|
|
(Whew!) [Cu Digest, #6.21;6.26;6.29]
|
|
|
|
I had written:
|
|
|
|
[...] I have seen an RL event unfold much like the one Mr.
|
|
Bungle reportedly perpetrated on LamdaMOO. The
|
|
perpetrator's actions there (child abuse) were not verbal,
|
|
but physical. This real life Bungle, too, had reasons why
|
|
the community ought not "toad" him, though the toading would
|
|
have been of the banishing, not the annihilating sort (the
|
|
legal processes were already complete). The community
|
|
involved agonized in much the same way the members of
|
|
LamdaMOO did. In the end, there was no Wizard to act, and
|
|
there was little resolution, but there was experience to be
|
|
archived. Had these people the previous experience of the
|
|
players on the MOO at adjudicating communal threat, I
|
|
believe that they would have been able to relate with
|
|
greater precision to their real life dilemma. This is the
|
|
value of simulation, is it not?
|
|
|
|
Lopez responds:
|
|
|
|
[...] I also find it ridiculous that Edwards believes
|
|
experience in role playing would help a jury decide on
|
|
whether or not a child molester ought to be punished or not.
|
|
Any weakening of the fundamental difference between
|
|
fantasy/reality or words/actions is exactly what leads to
|
|
the vagaries of the modern justice system. A person can
|
|
fantasize about whatever they wish, but those who commit
|
|
rape and child abuse deserve to be punished. To attempt to
|
|
impart special significance to fantasies on-line does
|
|
nothing but debase the truth concerning actual acts of
|
|
aggression. True, the use of words can be potent. Witness
|
|
libel. But Edwards should realize that libel has also been
|
|
difficult to prosecute, precisely because the claimant must
|
|
prove actual damages.
|
|
|
|
I was perhaps not clear enough above when I parenthesized that, "the
|
|
legal processes were already complete." This molester had been tried,
|
|
convicted, and sentenced (not to jail, though). The problem was
|
|
whether -- and if so, how -- to re-context him within his
|
|
(sub)community following the crime, or to banish him. Like the
|
|
quandary on LamdaMOO, the folks meeting (and meeting, and meeting)
|
|
here found no general agreement. The only accord reached was that he
|
|
be watched around children (no kidding).
|
|
|
|
It was to a peripheral member, absurd. Abuse of children (in
|
|
particular) is right out. I won't go into their deliberations,
|
|
besides noting the sentiments and dynamics were *very* much those of
|
|
the MOOers. I believe that some of this mush could have been avoided
|
|
if those involved had only the experience of the MOOers. The
|
|
situation on the MOO may have been virtual, but the principles were
|
|
heartfelt and needed genuine (not virtual) involvement to resolve.
|
|
|
|
My argument (here) was that VR experience can prepare one to handle
|
|
RL situations. It was not about a fundamental difference between
|
|
fantasy/reality or words/actions.
|
|
|
|
------------------------------
|
|
|
|
Date: 7 Apr 1994 13:42:26 -0500
|
|
From: abacard@well.sf.ca.us (Andre Bacard)
|
|
Subject: File 8--Gilmore Files Clipper FOIA
|
|
|
|
************************************************************
|
|
The following news item appeared in the March 1994 issue of the
|
|
CPSR/Portland Newsletter with Editor Erik Nilsson & Copy Editor
|
|
Andrea Rodakowski at <erikn@cpsr.org>.
|
|
************************************************************
|
|
|
|
GILMORE FILES FOIA FOR CLIPPER KEY DATABASE
|
|
|
|
Prominent Cypherpunk and CPSR member John Gilmore has filed a
|
|
Freedom Of Information Act (FOIA) request with the Clipper key
|
|
"escrow agents" for the database of Clipper key components.
|
|
Releasing the information would effectively give anyone the ability
|
|
to decrypt Clipper-encrypted communications.
|
|
|
|
The escrow agents are the Treasury Department and the National
|
|
Institute of Standards and Technology. While the escrow agents
|
|
will be highly motivated to deny Mr. Gilmore's request, Mr. Gilmore
|
|
believes that they will have meager grounds to do so, stating on
|
|
the Cypherpunks mailing list that,
|
|
|
|
There appears to be no FOIA exemption that would
|
|
justify withholding the key escrow databases which
|
|
Treasury and NIST are building. (The keys are not
|
|
tied to any individual, so individual privacy
|
|
isn't a valid exemption. The database isn't
|
|
classified. Etc.)
|
|
|
|
If the escrow agents claim that the keys are classified, "... they
|
|
can't give them out to cops," Gilmore stated.
|
|
|
|
Possibly, the escrow agents will claim that the keys are
|
|
proprietary commercial information of the holder of the Clipper
|
|
device. Or, they might claim that the keys are classified, but law
|
|
enforcement agents are able to use the keys in a way that doesn't
|
|
give them access to classified information.
|
|
|
|
However, Mr. Gilmore has doubtless given Clipper proponents a
|
|
puzzler.
|
|
|
|
Thanks to SurfPunk for some of this info.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 31 Mar 1994 17:53:28 GMT
|
|
From: Pat Cain <patrick@sideways.welly.gen.nz>
|
|
Subject: File 9--Arrests of Juvenils in New Zealand for Bomb-making llegal
|
|
|
|
Here's an interesting article from last Sunday's paper about some kids
|
|
who made bombs from the old `how to make a bomb' files. One MP is
|
|
about to introduce a bill to make possession of these files (which
|
|
would cover historically significant documents such as Phrack)
|
|
illegal.
|
|
|
|
This group of (15-17yo) boys ran a bulletin board that was closed down
|
|
last year after the police raided them. I gather that after that the
|
|
boys created another BBS, but it was a private one. They started
|
|
experimenting with making bombs.
|
|
|
|
I think this article, like many other media articles on bulletin
|
|
boards, preys on the mainstream fear of technology -- ``the
|
|
information could be accessed through school computers''. So what? I
|
|
can ring a drug dealer or prostitute with a school telephone.
|
|
Obviously the modem at school is not managed very well. Making
|
|
possession illegal isn't going to help, it's just going to make such
|
|
files more of a novelty. More kids will know about them, more will
|
|
want to have them. And it will still be just as easy to obtain them
|
|
through the Internet, or by calling systems
|
|
overseas. I can only see it forcing local systems underground.
|
|
|
|
===========================
|
|
|
|
Headline: Computers give pupils access to bomb recipes
|
|
Writer: Claire Guyan
|
|
|
|
YOUNGSTERS are using school computers to get access to lethal bombmaking
|
|
recipes.
|
|
|
|
The revelation follows the court apearance last week of two Wellington
|
|
teenagers who built a bomb using information from computer bulletin
|
|
boards and imported books.
|
|
|
|
Police said the pair constructed the bomb using a fire estinguisher case
|
|
and when it explded, fragments scattered 150m, damaging a school and
|
|
church.
|
|
|
|
No one was hurt in the early morning explosion, but police said the bomb
|
|
had the capacity to do a great deal of damage.
|
|
|
|
The pair have been granted interim name suppression and were recommended
|
|
for diversion [community service w/o receiving a criminal record] when
|
|
they appeared in the Wellington District Court on Friday. It was
|
|
understood they stumbled on the detailed recipes while flicking through
|
|
bulletin board information on their home computers. The boards can be
|
|
accessed simply by using a personal computer with a modem, technology
|
|
available to most schools.
|
|
|
|
Thousands of bulletin boards operated in New Zealand and police said it
|
|
was difficult to monitor what information was put on them. Much of the
|
|
offensive material, including DIY bomb instructions and pornography,
|
|
came from overseas.
|
|
|
|
Howick MP Trevor Rogers has a private member's bill before the House
|
|
which he hoped would stamp out this kind of problem. ``Some of this
|
|
stuff is unbelievable garbage, how to make bombs, atomic bombs, how to
|
|
trash your school ... it's mind-boggling stuff.'' Mr Rogers said the
|
|
information could be accessed through school computers. ``Yes, it's
|
|
happening.''
|
|
|
|
He was confident his Technology and Crimes Reform Bill would halt the
|
|
flow of obscene material by making it an offence to possess it. It
|
|
would allow bulletin boards carrying the information to be disconnected.
|
|
|
|
He expected the bill to have a first reading in May.
|
|
|
|
Christchurch Papanui High School teacher Craig Seagar said he was sure
|
|
students were accessing offensive material through school computers.
|
|
|
|
``I've heard some of the boys talking. That's wat their interested in.
|
|
It's the challenge of getting it from the computer. You can guarantee
|
|
pupils will try to get into these bulletin boards.''
|
|
|
|
|
|
Reprinted from Sunday Star-Times, 27-Mar-1994, w/o permission.
|
|
|
|
------------------------------
|
|
|
|
Date: 5 Apr 94 20:37:22 GMT
|
|
From: dbatterson@ATTMAIL.COM(David Batterson)
|
|
Subject: File 10--PRODIGY Forges Ahead With New Features
|
|
|
|
PRODIGY Forges Ahead With New Features
|
|
by David Batterson
|
|
|
|
I've tried PRODIGY off and on since it began, and recently got a
|
|
comp account so I could take a look at the latest incarnation--the
|
|
Windows software version. The interface looks better than ever, and
|
|
PRODIGY staffers are now working on a newer Win version.
|
|
|
|
One feature I like about the Win version is the ability to view
|
|
news photos online. These become available quickly online; for
|
|
example, users could view photos of the Los Angeles earthquake, and
|
|
the Winter Olympics. The Win version offers sound capability too.
|
|
|
|
I'm an American Online (AOL) user, and occasionally there are
|
|
problems with network access to AOL. PRODIGY uses a different
|
|
approach--a national distributed network--so it never has any
|
|
problems with overloading, even though it has almost three times the
|
|
number of users as AOL.
|
|
|
|
PRODIGY's network can be expanded to serve tens of millions of
|
|
members, according to the company. Now underway is a test program
|
|
for cable delivery of PRODIGY, to permit faster information flow and
|
|
a new array of enhancements such as video images.
|
|
|
|
There were no chat boards on PRODIGY when I was on, but this is
|
|
in the works from what I heard. There is a larger range of bulletin
|
|
boards than ever, though, including travel, food, computer, careers,
|
|
pets, seniors, medical, money talk, foreign languages, arts, music
|
|
and TV.
|
|
|
|
Upcoming on PRODIGY this year is an Online Yellow Pages section,
|
|
from NYNEX. This will incorporate advertising into NYNEX's online
|
|
database of 1.7 million listings in New York and New England. More
|
|
daily newspapers are coming on board too, including The Los Angeles
|
|
Times, The Atlanta Journal-Constitution, Newsday, and The Tampa
|
|
Tribune.
|
|
|
|
Other PRODIGY features include online greeting cards, headline
|
|
news, QUOTE TRACK investment information, Mobil Travel Guides, Zagat
|
|
Guide for restaurants, visits by celebrities (such as Jerry Seinfeld,
|
|
Patrick Stewart, Mayim Bialik and Jay Leno), and Internet e-mail
|
|
access.
|
|
|
|
I was a bit disappointed with the way you have to send/receive
|
|
e-mail via Internet. On AOL, you just click on Compose Mail and type
|
|
in an address [such as dbatterson@attmail.com]. With PRODIGY, you
|
|
have to have a second software application called Mail Manager
|
|
[$4.95]. Mail Manager works fine, but having it built into the
|
|
regular PRODIGY system woudl make more sense to me.
|
|
|
|
A useful utility program for PRODIGY users is PRO-UTIL 6.0 from
|
|
Royston Development. This is a communications manager, similar to
|
|
those used for CompuServe, DELPHI, and so forth. It's easy to use,
|
|
and well worth having if you become a regular PRODIGY user.
|
|
|
|
PRODIGY was launched nationally in September 1990. Since that
|
|
time it has attracted 2,000,000+ users [vs. about 750,000 on AOL].
|
|
The company is still a joint venture of IBM and Sears.
|
|
|
|
You can try out the PRODIGY service with a free membership kit
|
|
and one month's usage ($4.95 shipping & handling fee) by calling
|
|
1-800-PRODIGY. Or for more information, write Prodigy Services
|
|
Company, 445 Hamilton Avenue, White Plains, NY 10601.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 8 Apr 1994 15:55:48 -0400 (EDT)
|
|
From: Stanton McCandlish <mech@EFF.ORG>
|
|
Subject: File 11--NY bill to make govt. info available online - act NOW!
|
|
|
|
Just rec'd this, figured it should go out far and wide. This is
|
|
time-sensitive folks!
|
|
|
|
If anyone can get us the full text of this bill, please do so, and send it
|
|
to SEA, TAP, CPSR and other organizations as well.
|
|
|
|
Don't just talk, DO SOMETHING. I'm aware of at least 2 civil-liberties-
|
|
favoring state bills that have failed just recently, in both cases due to
|
|
lack of public input. Activism got a bill very similar to this one passed
|
|
in CA last year, and it can work in NY too. See ftp.eff.org: /pub/EFF/Issues/
|
|
Activism/* for more info on this type of thing. If the legislation is
|
|
available to us, it will be archived at ftp.eff.org: /pub/EFF/Legislation/
|
|
Foreign_and_local/NY/, so check periodically. Those in the NY area, please
|
|
spread the work on ny.* newsgroups, local BBSs, apropos mailing lists, etc.
|
|
|
|
|
|
Forwarded message:
|
|
From: Reg Neale <neale@ee.rochester.edu>
|
|
Date: Thu, 7 Apr 94 13:50:24 EDT
|
|
|
|
At the suggestion of another activist netter, I am writing to you to alert
|
|
you to new developments in our effort to get New York State's public
|
|
legislative information online. The NY legislature does collect, organize
|
|
and maintain computerized legislative information, including text of bills,
|
|
member's voting records etc. However, this information is not freely available
|
|
to the public. Instead, it is provided to a captive commercial firm which
|
|
sells it to special-interest groups, at prices ordinary citizens cannot
|
|
afford.
|
|
A bill was just introduced in the NY Assembly to make public information
|
|
freely and timely available, via "the most-accessible and least-cost
|
|
public network" i.e., the Internet. Bill A10035 was referred to the Assembly's
|
|
Governmental Operations Committee, where it is certain to die unless there
|
|
is a massive input from concerned citizens. Any New Yorkers reading this
|
|
should call or write their assemblyperson to urge immediate action on this
|
|
bill. It could also be helpful to contact these two individuals:
|
|
|
|
Assemblyman Samuel Colman, Chairman
|
|
Governmental Operations Committee
|
|
Room 731 Legislative Office Building
|
|
Albany NY 12248
|
|
518-455-5118 voice
|
|
518-455-5119 fax
|
|
|
|
David W. Keiper, Commissioner
|
|
Legislative Bill Drafting Commission
|
|
Room 301 Capitol Building
|
|
Albany NY 12247
|
|
518-455-7500
|
|
CIS 71075,2006
|
|
[Internet: 71075.2006@compuserve.com]
|
|
|
|
Voice your support for public access to legislative information. If you
|
|
know of anyone who should be involved in this effort, or if you know of
|
|
another appropriate place to post this message, please contact me.
|
|
|
|
Reginald Neale, Sec'y Citizens for Open Access to Legislation (C.O.A.L.)
|
|
716-263-7864 day 716-924-7481 eve
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.32
|
|
************************************
|
|
|