834 lines
36 KiB
Plaintext
834 lines
36 KiB
Plaintext
|
|
Computer underground Digest Sun Jul 23, 1995 Volume 7 : Issue 62
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
|
|
CONTENTS, #7.62 (Sun, Jul 23, 1995)
|
|
|
|
File 1--Cincinnati BBS Raids Indictment
|
|
File 2--Kyl and Leahy to Introduce Anti-Hacker Bill
|
|
File 3--Computer Porn Conviction: New Thought Control (fwd)
|
|
File 4--"Computer Privacy Handbook" by Bacard
|
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sat, 22 Jul 1995 09:23:01 PDT
|
|
From: Paul J. Ste. Marie <pstemari@well.sf.ca.us>
|
|
Subject: File 1--Cincinnati BBS Raids Indictment
|
|
|
|
((MODERATORS' NOTE: The Cincinnati BBS raids strike us a witch hunts.
|
|
The following document gives us no reason to change our minds. The
|
|
raids seem consistent with the current mood of some prosecutors,
|
|
politicians, and others, to ride the "anti-porn" hysteria).
|
|
|
|
0024573
|
|
Plaintiff
|
|
|
|
|
|
UNITED STATES DISTRICT COURT
|
|
SOUTHERN DISTRICT OF OHIO
|
|
WESTERN DIVISION
|
|
|
|
|
|
BOB EMERSON
|
|
d/b/a, Cincinnati Computer CASE NO.
|
|
Connection,
|
|
4466 Dogwood Drive
|
|
Batavia, Ohio 45103,
|
|
|
|
Plaintiff,
|
|
|
|
vs.
|
|
|
|
|
|
|
|
SIMON L. LEIS, JR.
|
|
Hamilton County Justice Center
|
|
1000 Sycamore
|
|
Cincinnati, Ohio 45202
|
|
|
|
HAMILTON COUNTY SHERIFF'S
|
|
DEPARTMENT COMPLAINT AND
|
|
Hamilton County Justice Center JURY DEMAND
|
|
1000 Sycamore
|
|
Cincinnati, Ohio 45202
|
|
|
|
HAMILTON COUNTY REGIONAL
|
|
COMPUTER CRIMES TASK FORCE
|
|
Hamilton County Justice Center
|
|
1000 Sycamore
|
|
Cincinnati, Ohio 45202
|
|
|
|
UNION TOWNSHIP POLICE
|
|
DEPARTMENT, A Division Of The
|
|
Public Safety Department Of Union
|
|
Township, Ohio
|
|
4312 Gleneste-Withamsville Road
|
|
Cincinnati, Ohio 45245
|
|
|
|
CINCINNATI POLICE
|
|
DEPARTMENT, A Division Of The
|
|
Public Safety Department Of The
|
|
City Of Cincinnati
|
|
c/o Division 5
|
|
1012 Ludlow Avenue
|
|
Cincinnati, Ohio 45202
|
|
|
|
MICHAEL BURNS
|
|
4312 Gleneste-Withamsville Road
|
|
Cincinnati, Ohio 45245
|
|
|
|
MICHAEL SNOWDEN
|
|
c/o Division 5
|
|
1012 Ludlow Avenue
|
|
Cincinnati, Ohio 45202
|
|
|
|
DALE MENKAUS
|
|
Hamilton County Justice Center
|
|
1000 Sycamore
|
|
Cincinnati, Ohio 45202
|
|
|
|
DETECTIVE SWISSHELM
|
|
Hamilton County Justice Center
|
|
1000 Sycamore
|
|
Cincinnati, Ohio 45202
|
|
|
|
JANE/JOHN DOES
|
|
Law Enforcement Officers
|
|
Addresses Currently Unknown
|
|
|
|
Defendants.
|
|
|
|
|
|
|
|
Now comes plaintiff, Bob Emerson, d/b/a Cincinnati Computer
|
|
Connection who for its complaint against defendants, states as
|
|
follows
|
|
|
|
|
|
|
|
PRELIMINARY STATEMENT
|
|
|
|
1. This is an action under the laws and Constitution of
|
|
the United States alleging that state law enforcement officials
|
|
from various jurisdictions in Southwest Ohio and Northern Ken
|
|
tucky acting in concert as part of a "Regional Computer Crimes
|
|
Task Force," unlawfully and unconstitutionally seized computer
|
|
equipment, files, and communications in furtherance of a campaign
|
|
to impose a prior restraint on the computer transmission of non-
|
|
obscene adult oriented forms of expression presumptively
|
|
protected by the First Amendment to the United States
|
|
Constitution.
|
|
|
|
|
|
|
|
JURISDICTION
|
|
|
|
1. Jurisdiction is conferred upon this Court by 18 U.S.C.
|
|
2707, 28 U.S.C. 1331, 28 U.S.C. 1343, 28 U.S.C. 2201, 28
|
|
U.S.C. 2202, 42 U.S.C. 1983, 42 U.S.C. 1985, 42 U.S.C
|
|
1988, and 42 U.S.C. 2000aa.
|
|
|
|
2. This is a suit authorized by law to redress
|
|
deprivations under color of state law of rights, privileges, and
|
|
immunities secured by the First, Fourth and Fourteenth Amendments
|
|
to the United States Constitution, the First Amendment Privacy
|
|
Protection Act, and Title II of the Electronic Communications
|
|
Privacy Act.
|
|
|
|
3. Venue in this Court is appropriate as the various acts
|
|
complained of occurred within the Western Division of the
|
|
Southern District of Ohio.
|
|
|
|
|
|
PARTIES
|
|
|
|
4. Plaintiff Bob Emerson, an individual who resides at
|
|
4466 Dogwood Drive, Batavia, Ohio 45103, owns and operates a for-
|
|
profit electronic computer bulletin board system known as
|
|
Cincinnati Computer Connection (hereinafter "CCC").
|
|
|
|
5. Defendant, Simon L. Leis, Jr., is and was at all times
|
|
referred to herein the Sheriff of Hamilton County, Ohio. He is
|
|
sued in both his personal and official capacities.
|
|
|
|
6. Defendant, Hamilton County Sheriff's Department, is a
|
|
sheriff's department organized under the laws of the State of
|
|
Ohio.
|
|
|
|
7. Defendant, Hamilton County Regional Computer Crimes
|
|
Task Force, is a branch of the Hamilton County Sheriff's
|
|
Department organized under the laws of the State of Ohio to
|
|
utilize special skills and expertise in investigating computer
|
|
crimes.
|
|
|
|
8. Defendant, Union Township Police Department, is a
|
|
division of the Public Safety Department of Union Township Ohio,
|
|
organized under the laws of the State of Ohio.
|
|
|
|
9. Defendant, Cincinnati Police Department, is a division
|
|
of the Public Safety Department of the City of Cincinnati,
|
|
organized under the laws of the State of Ohio.
|
|
|
|
10. Defendant, Michael Burns, is and was at all times
|
|
referred to herein the Acting Chief of the Union Township Police
|
|
Department in Clermont County, Ohio. He is sued in both his
|
|
personal and official capacities.
|
|
|
|
11. Defendant, Michael Snowden, is and was at all times
|
|
referred to herein the Chief of the Cincinnati Police Department.
|
|
He is sued in both his personal and official capacities.
|
|
|
|
12. Defendant, Dale Menkaus, is and was at all times
|
|
referred to herein the Commander of the Regional Computer Crimes
|
|
Task Force. He is sued in both his personal and official
|
|
capacities.
|
|
|
|
13. Defendant, Detective Swisshelm, is and was at all times
|
|
referred to herein a member of the Regional Computer Crimes Task
|
|
Force. He is sued in both his personal and official capacities.
|
|
|
|
14. Jane/John Doe, are individuals from the Regional
|
|
Computer Crimes Task Force and/or other police departments from
|
|
various jurisdictions whose names are currently unknown whom
|
|
plaintiff believes conspired with defendants and participated in
|
|
the acts against plaintiff complained of herein. Such
|
|
individuals are sued in both their personal and official
|
|
capacities.
|
|
|
|
|
|
STATEMENT OF THE CASE
|
|
|
|
15. A computer bulletin board system, like CCC, stores
|
|
information in a central computer and allows subscribers to
|
|
access that information via telephone lines and personal computer
|
|
equipment. By means of a computer bulletin board, subscribers
|
|
can converse, communicate and exchange various types of
|
|
information with each other as well as retrieve information
|
|
stored on the bulletin board itself.
|
|
|
|
16. Plaintiff has been operating CCC since 1982 and has
|
|
developed a list of monthly subscribers numbering in the
|
|
thousands, who pay a set fee for access to the bulletin board.
|
|
CCC offers its subscribers the ability to send and receive
|
|
electronic mail (hereinafter "e-mail"), to participate in on-line
|
|
discussion groups, to utilize and download software, to engage in
|
|
computer games, and to receive newspapers and periodicals of
|
|
general as well as highly specialized interest. Included among
|
|
the various information and service options offered to
|
|
subscribers of CCC is non-obscene adult oriented material. This
|
|
category of material represents approximately three (3) percent
|
|
of the total informational material and resources offered by CCC
|
|
to its subscribers. Access to the non-obscene adult oriented
|
|
material on the CCC bulletin board is restricted to a limited
|
|
number of adult subscribers who requested such access.
|
|
17. Commencing sometime prior to June 16, 1995, defendants,
|
|
under color of state law and pursuant to and in their official
|
|
capacities for and on behalf of their respective jurisdictions,
|
|
conspired together and with others unknown, and therefore not
|
|
named as defendants, to violate plaintiff's rights and privileges
|
|
guaranteed to him by the First, Fourth and Fourteenth Amendments
|
|
of the United States Constitution, the First Amendment Privacy
|
|
Protection Act, and Title II of the Electronic Communications
|
|
Privacy Act by designing and implementing a campaign
|
|
characterized by harassment, express and implied threats of
|
|
criminal prosecution, and mass seizures of computer equipment and
|
|
information. This campaign was initiated by defendants for the
|
|
purpose of causing plaintiff, and others, to cease transmitting
|
|
and/or receiving non-obscene adult oriented material via computer
|
|
technology.
|
|
|
|
18. Sometime on or about June 16, 1995, pursuant to and
|
|
part of this campaign, defendants, under color of state law,
|
|
sought a search warrant authorizing the search of all computer
|
|
equipment and accessories necessary for the operation of CCC and
|
|
authorizing the wholesale and indiscriminate review of all
|
|
computer electronic communications transmitted to and from
|
|
plaintiff and CCC's subscribers including, but not limited to, e-
|
|
mail and personal correspondence that was stored in or exchanged
|
|
in electronic form by means of CCC's equipment and software. At
|
|
the time defendants made application for the aforementioned
|
|
search warrant, defendants knew or should have known that no
|
|
reasonable grounds existed to believe that the contents of the e-
|
|
mail and personal correspondence sought were relevant or material
|
|
to any on-going criminal investigation.
|
|
19. On June 16, 1995, pursuant to and part of this
|
|
campaign, defendants, under color of state law, obtained and
|
|
executed a search warrant providing for the search of plaintiff's
|
|
personal residence for all computer equipment and accessories
|
|
necessary for the operation of CCC as well as for all electronic
|
|
communications transmitted to and from CCC's subscribers
|
|
including, but not limited to, e-mail and personal correspondence
|
|
that was stored in or exchanged in electronic form by means of
|
|
CCC's equipment and software.
|
|
|
|
20. As a further part of this campaign, following the
|
|
execution of the aforementioned search warrant, defendants seized
|
|
and physically removed from plaintiff's residence virtually the
|
|
entire inventory of computer equipment and accessories owned by
|
|
plaintiff and necessary for the operation of CCC. Included among
|
|
the numerous equipment and accessories seized by defendants were
|
|
computer hardware, video display units, printers, software, data
|
|
drives, and internal or external information storage units. As a
|
|
consequence of defendants' actions in removing the aforementioned
|
|
computer equipment and accessories, defendants necessarily seized
|
|
information transmitted to and from CCC and its subscribers,
|
|
including, but not limited to, e-mail and correspondence stored
|
|
or exchanged in electronic form. As a further consequence of
|
|
these actions defendants seized plaintiff's entire inventory of
|
|
non-obscene adult related material as well as all other forms of
|
|
expressive material.
|
|
|
|
21. At the time defendants sought, obtained, and executed
|
|
the aforementioned search warrant and seized all of the computer
|
|
equipment and accessories related to the operation of CCC, as
|
|
well as much of the information provided by CCC to its
|
|
subscribers which was contained in such equipment, defendants
|
|
knew or should have known
|
|
|
|
i. that items seized included work product and
|
|
documentary material containing mental impressions, conclusions
|
|
or theories of individuals who authored or created such materials
|
|
for the purpose of disseminating same to the public;
|
|
|
|
ii. that the information seized included e-mail and
|
|
personal correspondence transmitted to and from plaintiff and
|
|
CCC's subscribers;
|
|
iii. that the information seized included expressive
|
|
material protected under the First and Fourteenth Amendments to
|
|
the United States Constitution that cannot be seized without a
|
|
prior judicial determination of probable obscenity;
|
|
|
|
iv. that the mass seizure of this computer equipment and
|
|
information would have a devastating impact on the plaintiff's
|
|
business;
|
|
|
|
v. that the mass seizure of this computer equipment and
|
|
information would prevent plaintiff from transmitting any
|
|
information, including expressive material protected under the
|
|
First and Fourteenth Amendments to the United States
|
|
Constitution;
|
|
|
|
vi. that the search warrant under which authority
|
|
defendants ostensibly based their actions did not by its terms
|
|
authorize the seizure of any materials or information;
|
|
|
|
vii. that there were less intrusive means of obtaining the
|
|
information defendants sought to inspect for potential violations
|
|
of state law, and that such means, if utilized, would have
|
|
permitted plaintiff to continue to use and derive the economic
|
|
benefit of his computer equipment;
|
|
|
|
viii. that there were less intrusive means of obtaining
|
|
the information defendants sought to inspect for potential
|
|
violations of state law, and that such means, if utilized, would
|
|
have permitted plaintiff to continue to receive and transmit
|
|
constitutionally protected speech;
|
|
|
|
ix. that there were less intrusive means of obtaining the
|
|
information defendants sought to inspect for potential violations
|
|
of state law, and that such means, if utilized, would have
|
|
preserved the privacy interests of plaintiff and his subscribers
|
|
in the e-mail and personal correspondence that was stored in or
|
|
exchanged in electronic form via CCC's equipment and software;
|
|
and
|
|
|
|
x. that it was not necessary to physically seize and
|
|
remove the information sought or any of the computer equipment
|
|
owned by plaintiff because defendants at all times were capable
|
|
of retrieving or "downloading" information exchanged or stored in
|
|
plaintiff's computer equipment and by such means preserving said
|
|
information for any legitimate law enforcement purpose determined
|
|
by defendants.
|
|
22. Defendants' activities were conducted purposefully, in
|
|
bad faith, in conscious and reckless disregard of plaintiff's
|
|
federal and constitutional rights to privacy, to free speech, and
|
|
to be free from unreasonable searches and seizures, and with the
|
|
intention to intimidate plaintiff from his continued exercise of
|
|
free expression and to impose a prior restraint on the
|
|
transmission of presumptively protected forms of expression by
|
|
plaintiff and others by permanently removing from circulation non-
|
|
obscene adult oriented and other forms of expression and by
|
|
physically removing and retaining the computer equipment and
|
|
software by which computer-generated forms of expression are
|
|
transmitted.
|
|
|
|
23. As a direct and proximate result of defendants'
|
|
actions, as previously described, plaintiff has suffered and will
|
|
continue to suffer damage to his business and professional
|
|
reputation in the following regards
|
|
|
|
i. plaintiff has lost the use of computer equipment
|
|
valued at approximately $45,000.00;
|
|
|
|
ii. plaintiff has been forced to replace computer equipment
|
|
at the cost of approximately $45,000.00;
|
|
|
|
iii. plaintiff has lost revenue from subscribers in the
|
|
amount of approximately $28,000.00 per month;
|
|
|
|
iv. plaintiff has suffered a temporary and permanent loss
|
|
of a portion of his subscriber base;
|
|
|
|
v. plaintiff has lost good will associated with the
|
|
operation of a legitimate and lawful computer service; and
|
|
vi. plaintiff has been prevented from transmitting
|
|
presumptively protected material to his subscribers.
|
|
|
|
24. Further, unless defendants are preliminarily and
|
|
permanently enjoined from continuing to engage in a campaign to
|
|
intimidate plaintiff, to chill the exercise of his constitutional
|
|
rights, and to impose a prior restraint upon the distribution of
|
|
presumptively protected forms of expression, plaintiff will
|
|
continue to suffer violations of his constitutional rights,
|
|
thereby incurring irreparable injury for which plaintiff has no
|
|
adequate remedy at law.
|
|
|
|
STATEMENT OF THE CLAIM
|
|
|
|
COUNT ONE
|
|
|
|
25. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
26. The actions of defendants, as described herein,
|
|
deprived plaintiff of his right to free speech secured by the
|
|
First Amendment to the United States Constitution in violation of
|
|
42 U.S.C. 1983.
|
|
|
|
|
|
COUNT TWO
|
|
|
|
27. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
28. The actions of defendants, as described herein,
|
|
deprived plaintiff of his right to be free from unreasonable
|
|
searches and seizures secured by the Fourth Amendment of the
|
|
United States Constitution in violation of 42 U.S.C. 1983.
|
|
|
|
|
|
COUNT THREE
|
|
|
|
29. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
30. The actions of defendants, as described herein,
|
|
deprived plaintiff of his right to privacy secured by the United
|
|
States Constitution in violation of 42 U.S.C. 1983.
|
|
|
|
|
|
COUNT FOUR
|
|
|
|
31. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
32. The actions of defendants, as described herein,
|
|
deprived plaintiff of the right to be free from deprivations of
|
|
property without due process of law as guaranteed by the
|
|
Fourteenth Amendment of the United States Constitution in
|
|
violation of 42 U.S.C. 1983.
|
|
|
|
|
|
COUNT FIVE
|
|
|
|
33. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
34. The actions of defendants, as described herein,
|
|
deprived plaintiff of rights secured by the First Amendment
|
|
Privacy Protection Act, 42 U.S.C. 2000aa.
|
|
|
|
|
|
COUNT SIX
|
|
|
|
35. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
36. The actions of defendants, as described herein,
|
|
deprived plaintiff of rights secured by Title II of the
|
|
Electronic Communications Privacy Act, 18 U.S.C. 2701.
|
|
|
|
|
|
COUNT SEVEN
|
|
|
|
37. Paragraphs one (1) through twenty-six (26) are
|
|
realleged as if fully rewritten.
|
|
|
|
38. The actions of defendants, as described herein,
|
|
constituted an illegal conspiracy to deprive plaintiff of his
|
|
constitutional rights in violation of 42 U.S.C. 1985(3).
|
|
|
|
|
|
PRAYER FOR RELIEF
|
|
|
|
WHEREFORE, Plaintiff Bob Emerson, d/b/a/ Cincinnati Computer
|
|
Connection, hereby demands judgment as follows
|
|
|
|
_ 1. A declaration that the actions of the defendants
|
|
constitute a prior restraint in violation of the First and
|
|
Fourteenth Amendments to the United States Constitution;
|
|
|
|
1. A preliminary and permanent injunction restraining,
|
|
enjoining and prohibiting the defendants from undertaking,
|
|
enforcing, maintaining, or adopting any policies, procedures,
|
|
practices, campaigns, or acts against or towards plaintiff which
|
|
constitute a prior restraint upon plaintiff's transmission of
|
|
protected forms of expressive non-obscene adult oriented
|
|
materials;
|
|
|
|
2. An order requiring defendants to return to plaintiff
|
|
all computer equipment, accessories and material seized from
|
|
plaintiff;
|
|
|
|
3. An order awarding plaintiff compensatory damages for
|
|
his economic injuries in an amount not less than $250,000.00;
|
|
|
|
4. Liquidated damages under 42 U.S.C. 2000aa;
|
|
|
|
5. An award of plaintiff's reasonable attorney fees and
|
|
costs incurred herein pursuant to 42 U.S.C. 1988; and
|
|
|
|
6. An award of such other relief in law and equity that
|
|
this Court deems just and proper in the premises.
|
|
|
|
JURY DEMAND
|
|
|
|
Plaintiff demands the within facts be tried to a jury.
|
|
|
|
|
|
|
|
Respectfully submitted,
|
|
|
|
SIRKIN, PINALES, MEZIBOV & SCHWARTZ
|
|
|
|
|
|
|
|
|
|
|
|
H. LOUIS SIRKIN
|
|
Ohio Bar No. 0024573
|
|
|
|
|
|
|
|
|
|
MARC D. MEZIBOV
|
|
Ohio Bar No. 0019316
|
|
|
|
|
|
|
|
|
|
LAURA A. ABRAMS
|
|
Ohio Bar No. 0056183
|
|
920 Fourth & Race Tower
|
|
105 West Fourth Street
|
|
Cincinnati, Ohio 45202
|
|
Telephone (513) 721-4876
|
|
Telecopier (513) 721-0876
|
|
|
|
Attorneys for Plaintiff
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 21 Jul 1995 09:38:59 -0400 (CDT)
|
|
From: Bob Izenberg <bei@dogface.austin.tx.us>
|
|
Subject: File 2--Kyl and Leahy to Introduce Anti-Hacker Bill
|
|
|
|
This came from volume 15 issue 311 of TELECOM Digest:
|
|
|
|
Date--Thu, 20 Jul 95 07:52:59 MST
|
|
From--John Shaver <shaverj@huachuca-emh17.army.mil>
|
|
|
|
Forwarded to TELECOM Digest, FYI.
|
|
|
|
From--info@kyl.senate.gov at WOODY
|
|
Date--7/11/95 1:41PM
|
|
|
|
FOR IMMEDIATE RELEASE CONTACT: Liz Hickey
|
|
Wednesday, June 21, 1995 (202) 224-4521
|
|
|
|
KYL AND LEAHY TO INTRODUCE ANTI-HACKER BILL
|
|
|
|
|
|
(Washington, D.C.) -- Senator Jon Kyl (R-AZ) and Senator Patrick
|
|
Leahy (D-VT) will introduce a bill next week that responds to the
|
|
rapidly increasing sophistication of computer crime by criminalizing
|
|
and toughening penalties for a host of computer security violations.
|
|
|
|
The bill makes it a felony for a hacker to inflict reckless damage
|
|
on a computer system. It also makes it a felony for an authorized user
|
|
to inflict intentional damage on a computer system. And it criminalizes
|
|
cases where individuals threaten to crash a computer system unless
|
|
access and an account are granted.
|
|
|
|
"Our national infrastructure, the information that bonds all
|
|
Americans, is not adequately protected," Kyl said. "This bill will
|
|
make criminals think twice before illegally gaining access to computer
|
|
files.
|
|
|
|
"We have a national anti-stalking law to protect citizens from
|
|
harrassment, but it doesn't cover the equivalent of stalking on the
|
|
communications network. We should not treat these criminals differently
|
|
simply because they injure us in other ways."
|
|
|
|
Reports demonstrate that computer crime is on the rise. The
|
|
Computer Emergency and Response Team (CERT) at Carnegie-Mellon
|
|
University found computer intrusions have increased from 132 in 1989
|
|
to 2,341 in 1994.
|
|
|
|
A report commissioned last year by the Department of Defense and
|
|
the CIA states "[a]ttacks against information systems are becoming
|
|
more aggressive, not only seeking access to confidential information,
|
|
but also stealing and degrading service and destroying data."
|
|
|
|
Current law punishes only those who trespass AND adversely affect
|
|
the use of a government computer. The bill treats viewing information,
|
|
even when no theft or damage occurs, as a criminal offense. In this
|
|
situation, privacy and security have been breached.
|
|
|
|
"The system administrator in these cases must spend time, money,
|
|
and resources to restore security," Kyl said. "We can no longer accept
|
|
trespassing into computers and viewing information as incidental just
|
|
because the information isn't stolen or damaged."
|
|
|
|
The "Kyl/Leahy National Information Infrastructure Protection Act
|
|
of 1995" adds a statute to allow prosecutors to fight interstate and
|
|
foreign transportation of stolen computer files. And it ensures that
|
|
repeat computer crime offenders are subject to harsher penalties.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 22 Jul 1995 21:49:28 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 3--Computer Porn Conviction: New Thought Control (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
From--bc880@freenet.toronto.on.ca (Marcus Shields)
|
|
Subject--Computer Porn Conviction--New Thought Control
|
|
|
|
Internet users- particularly those in Canada- concerned about government
|
|
attempts to "crack down on Internet perverts" should take careful note of
|
|
the following article exerpted from the Toronto Star newspaper:
|
|
|
|
COMPUTER PORN CONVICTION A FIRST
|
|
|
|
A 20-year old Mississauga man will be sentenced July 20 for
|
|
creating and distributing child pornography on a computer
|
|
bulletin board.
|
|
|
|
It is the first reported conviction under Canada's two-year-old
|
|
kiddie porn law involving computer production and distribution.
|
|
|
|
"The materials are pretty disgusting, _but_at_this_stage_they're_
|
|
_all_his_fantasy,_all_the_workings_of_his_perverted_mind",
|
|
(emphasis added) assistant crown attorney Philip Enright said of
|
|
Joseph Pecchiarich, 20.
|
|
|
|
<snip>
|
|
|
|
..."What he would do is take his scanner and run the scan over a
|
|
totally innocent picture of a child, say a 5-year old girl
|
|
modelling a bathing suit," Enright explained.
|
|
|
|
"Then, when it was transposed on to his screen, with the software
|
|
that he had on his computer he was able to remove the clothing
|
|
and add genitalia and then he would put the child in a sexually
|
|
provocative position."
|
|
|
|
<snip>
|
|
|
|
So, there we have it, fellow Canadian computer users; merely
|
|
harbouring thoughts of having sex with children is now an offense
|
|
that will be zealously tracked down by the police and prosecuted
|
|
to the fullest extent of the law.
|
|
|
|
Now, the fascinating thing about the Pecchiarich case, in eerie
|
|
similarity to the recent Eli Langer "obscene art" prosecution in
|
|
Toronto, is that in both these cases of alleged "child pornography",
|
|
there is one rather minor (pun intended) missing element. To wit,
|
|
CHILDREN. If you will cast your mind back to the situation several
|
|
years ago when the Mulroney government passed the "child pornography"
|
|
law (over the bitter objections of the civil liberties lobby, and
|
|
virtually without serious debate in Parliament, partly because it
|
|
was near the end of the session but mainly because even the NDP had
|
|
been cowed into silence by overwhelmingly conservative public
|
|
opinion), the entire premise upon which this law was passed was, "to
|
|
protect children from sexual abuse".
|
|
|
|
But in both the Peccharich and Langer cases, no children- indeed, no
|
|
living beings of any kind- were involved at any stage of the process.
|
|
What these individuals WERE prosecuted for, is publicly expressing
|
|
thoughts that conservative society abhors- to wit, child sexuality.
|
|
Now, I'm strongly against the PRACTICE of children being involved in
|
|
sexual conduct, too- but, if we accept the idea that merely
|
|
communicating an idea that society doesn't like can be subject to
|
|
criminal prosecution, where do we draw the line? Suppose Peccharich
|
|
had used his computer to retouch a picture of Mila Mulroney so she
|
|
appeared to be in bondage? What if he doctored a picture of Jean
|
|
Chretien or Bill Clinton so it appeared that Bill or Jean had been
|
|
assassinated? Why is it OK for society to punish someone for
|
|
publishing thoughts of deviant sex, but not OK to punish someone for
|
|
imaginary depictions of murder? (Time to pull _True_Lies_ from the
|
|
video store, I guess.)
|
|
|
|
Well, you might want to discuss this issue with your fellow Net
|
|
users.
|
|
|
|
As long as doing so is still legal in the eyes of the police.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 28 Jun 1995 18:23:51 EST
|
|
From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.HQ.DECUS.CA>
|
|
Subject: File 4--"Computer Privacy Handbook" by Bacard
|
|
|
|
BKCMPRHB.RVW 950418
|
|
|
|
%A Andre Bacard abacard@well.com
|
|
%C 2414 6th St., Berkeley, CA 94710
|
|
%D 1995
|
|
%G 1-56609-171-3
|
|
%I Peachpit Press
|
|
%O U$24.95/C$31.95 510-548-4393 fax: 510-548-5991 800-283-9444
|
|
%O trish@peachpit.com gary@peachpit.com
|
|
%P 274
|
|
%T "Computer Privacy Handbook"
|
|
"Computer Privacy Handbook", Andre Bacard, 1995, 1-56609-171-3, U$24.95/C$31.95
|
|
|
|
After the three prior works on PGP and related issues, Bacard's book
|
|
reads like a popular magazine article. Unfortunately, this is not
|
|
necessarily an advantage.
|
|
|
|
Part (chapter?) one is a general overview of privacy as related to
|
|
computers. The examples and arguments used, though, are chosen from
|
|
such a broad spectrum that they actually weaken the position in favour
|
|
of privacy and confidentiality. Most of the anecdotes relayed in the
|
|
book have little to do with computers. The majority have to do with
|
|
governmental or corporate activities over which the individual has no
|
|
say. None bear on the function of PGP (Pretty Good Privacy) -- to
|
|
encrypt local files and, in particular, those sent over public email
|
|
channels.
|
|
|
|
Chapter two discusses encryption in general terms. *Very* general
|
|
terms. There is no attempt to grasp or present any technical material
|
|
here. This prevents Bacard from noting the silliness of statements
|
|
that "high-quality crypto" is "impossible" to break, or that methods
|
|
of attack have not been publicly identified. First, this sounds
|
|
suspiciously like "security by obscurity". Second, an awful lot of
|
|
people *do* know how to break PGP -- and they know exactly how long it
|
|
will take. (By the way, it was Ken Follett, not the Germans, who used
|
|
"Rebecca" as a code key.) The discussion of ITAR (the International
|
|
Traffic in Arms Regulation of the US government) does not provide
|
|
enough detail to explain the difficulties Phil Zimmermann faces, nor
|
|
the problems in getting PGP overseas. The coverage of Clipper,
|
|
however, is excellent.
|
|
|
|
The overview of PGP given in chapter three is a fair enough
|
|
description, but completely avoids touching on Zimmermann's
|
|
difficulties with the US federal government or RSA Data Security. The
|
|
pointers on how to get PGP are useless unless you want to buy
|
|
ViaCrypt's version. The US sites all have limitations, and usually
|
|
some form of authentication before you can access the files. The
|
|
international versions are illegal in the US because of patent issues.
|
|
|
|
Chapter four is documentation for the commercial version of PGP.
|
|
|
|
While the Stallings (cf. BKPRTPRV.RVW), Garfinkel (cf. BKPGPGAR.RVW)
|
|
and Schneier (cf. BKEMLSEC.RVW) works are written by technical experts
|
|
and contain technical background, they are not impossible for the
|
|
layman to understand. This work, therefore, fails in a number of
|
|
respects, and brings little to the subject which has not been said
|
|
before.
|
|
|
|
copyright Robert M. Slade, 1995 BKCMPRHB.RVW 950418
|
|
|
|
======================
|
|
ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
|
|
RSlade@cyberstore.ca The Internet interprets censorship as damage and
|
|
routes around it - J. Gilmore Author "Robert Slade's Guide to Computer
|
|
Viruses" 0-387-94311-0/3-540-94311-0
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.62
|
|
************************************
|
|
|