936 lines
43 KiB
Plaintext
936 lines
43 KiB
Plaintext
|
|
Computer underground Digest Wed Jul 26, 1995 Volume 7 : Issue 63
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
|
|
CONTENTS, #7.63 (Wed, Jul 26, 1995)
|
|
|
|
|
|
File 1--Correction to Cincinnati BBS Document (CuD 7.62)
|
|
File 2--The Case of the Two Cybersex Studies
|
|
File 3--"Imprisonment wihouth Guilt" for "Hacking"
|
|
File 4--[to GovAccess] sample of VTW's *stellar* tech-civlib alerts!
|
|
File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 25 Jul 95 10:56:35 EDT
|
|
From: Lance Rose <72230.2044@COMPUSERVE.COM>
|
|
Subject: File 1--Correction to Cincinnati BBS Document (CuD 7.62)
|
|
|
|
That legal paper you published in 7.62 is not a criminal
|
|
indictment, but a civil complaint. For a few moments, I had the
|
|
bizarre experience of thinking I was seeing a prosecutor trying to put
|
|
his own people in jail <g>.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 24 Jul 1995 09:42:49 -0700 (PDT)
|
|
From: D B McCullagh <declanm@NETCOM.COM>
|
|
Subject: File 2--The Case of the Two Cybersex Studies
|
|
|
|
Distribute Freely
|
|
|
|
|
|
The Case of the Two Cybersex Studies, (c) 1995
|
|
By Declan McCullagh
|
|
declanm@netcom.com
|
|
July 24, 1995
|
|
|
|
|
|
Dr. Michael Mehta's telephone rang.
|
|
"Hi, this is Marty Rimm calling from Carnegie Mellon
|
|
University. I'm the principal investigator of a study on pornography,
|
|
and I'm leading a 15-person interdisciplinary research team. I'd like
|
|
to take a look at the research you presented earlier this month."
|
|
Mehta, then a graduate student at York University in Ontario,
|
|
remembers answering the phone last fall. He never thought then that an
|
|
unexpected phone call from Marty Rimm would bring him to accuse the
|
|
former Carnegie Mellon student of stealing his ideas and his research
|
|
eight months later.
|
|
When he first talked to Rimm, he was flattered to be contacted
|
|
by what he thought was a senior professor at a prestigious university.
|
|
He tried to help the researchers at Carnegie Mellon University.
|
|
"Rimm asked for a copy of my paper that I presented at a
|
|
conference in November. He said Carnegie Mellon was publishing a book,
|
|
and he might include my paper as a chapter if I sent it to him," says
|
|
Mehta.
|
|
Mehta and Dwaine Plaza, also of York University, had studied
|
|
how adult BBS operators were marketing pornography on the information
|
|
superhighway. After the two researchers sent "everything they had" to
|
|
Rimm, they waited hopefully but never heard from him again.
|
|
"I feel like a total fool now," says Mehta. "I was under the
|
|
impression that Rimm was a tenured faculty member. He never corrected
|
|
me when I called him 'professor Rimm.'"
|
|
He didn't know about the controversy Rimm's paper had caused
|
|
until last week, when an associate at the University of Waterloo told
|
|
readers of a cyberlaw mailing list that Mehta and Plaza presented a
|
|
cybersmut paper at a conference last November. Then researchers and
|
|
reporters started calling Canada.
|
|
Mehta is "flabbergasted" by the publicity Rimm's paper has
|
|
generated "down south." His local papers haven't covered Rimm's study,
|
|
so he wasn't aware of the controversy its publication caused. Now a
|
|
post-doctoral fellow at Queen's University, he had given up hope of
|
|
publishing his paper and moved on to researching democratic rights and
|
|
public accountability for technology.
|
|
After learning that Rimm was an undergraduate, Mehta felt
|
|
silly at first. But after he read Brock Meeks' CyberWire Dispatches,
|
|
he became convinced of the "seriousness of this issue" and decided to
|
|
go public with his concerns.
|
|
Rimm reportedly has retained a lawyer and has declined to
|
|
comment.
|
|
"It's funny how a breakdown in trust between people who have
|
|
never met can happen over the wires," Mehta says. "I trusted Rimm, and
|
|
he stole some of our ideas, lied to me, and distorted facts beyond
|
|
belief."
|
|
Looking back, he says Rimm's behavior was peculiar. He
|
|
remembers asking Rimm for a copy of the book he was writing. "Rimm
|
|
said there was an export restriction on it -- his publisher said there
|
|
was an export ban," Mehta says.
|
|
|
|
Studying CyberSmut: Similarities and Differences
|
|
|
|
"I don't think the parallels between the two studies are
|
|
coincidences. There are a lot of similarities that can't be accounted
|
|
for by chance," says Mehta, who's working to document the resemblances.
|
|
Rimm's paper, published in the July issue of the Georgetown
|
|
Law Journal and cited on the front page of Time magazine, never
|
|
mentions Mehta's study.
|
|
Mehta says that Rimm changed the direction of his research
|
|
without giving the York University researchers credit: "Rimm wasn't
|
|
looking at the commercial distribution of BBS pornography until he
|
|
spoke with us in November. We told him that we were looking for adult
|
|
BBS logos and telephone numbers in Usenet images."
|
|
Rimm's study claims that he downloaded and reviewed Usenet
|
|
images in September, but doesn't say when they were analyzed.
|
|
His study also lingers on the salacious details of erotica,
|
|
repeating words like "fuck," "cock," "pedophile," and "paraphilia"
|
|
dozens of times. "We also started off with emotionally laden language.
|
|
But in the end, we cut down those terms," says Mehta. "That's what the
|
|
Journal of Sex Research wanted. You think law journals are tough? Try
|
|
peer review!"
|
|
The Carnegie Mellon study somewhat resembles the Mehta-Plaza
|
|
study, yet it also differs in many ways:
|
|
* Rimm talks about pornography on adult BBSs, the Internet,
|
|
Usenet, and the World Wide Web. The Canadian study only looks at
|
|
images, many from adult BBSs, appearing on a small selection of Usenet
|
|
newsgroups.
|
|
* Rimm reviews descriptions of hundreds of thousands of
|
|
images. The other study looked at the actual images, but only at a
|
|
few hundred.
|
|
* Rimm sorts images into only one category. The York
|
|
University study categorizes each image in 22 different ways.
|
|
* Rimm waxes poetic about how "pornography permeates the
|
|
digital landscape." Plaza and Mehta discuss "a symmetric measure of
|
|
association for 2x2 crosstabulations used when comparing
|
|
non-parametrically distributed variables."
|
|
Some of the Mehta-Plaza study's findings contradict Rimm's.
|
|
Since the Canadian researchers actually looked at the images, they
|
|
found that many "bestiality" images were actually cartoons: "There
|
|
were only a few actual digitized photographs in our sample showing
|
|
such acts."
|
|
Also, where Rimm talks about "the ease of copying and
|
|
disseminating digitized child pornography," the Canadian researchers
|
|
say they found "no actual images showing a sexual act with children or
|
|
adolescents."
|
|
After presenting their paper at the November 1994 "Symposium
|
|
on Free Speech and Privacy in the Information Age," Plaza and Mehta
|
|
tried for months to find a publisher, but were stonewalled by the
|
|
Journal of Sex Research. "They didn't like our findings," says Mehta.
|
|
The journal's editors reportedly also disliked the references to
|
|
anti-porn activist Catherine MacKinnon.
|
|
Ironically, MacKinnon published a commentary on Rimm's research
|
|
in the most recent Georgetown Law Journal, hailing it as a "landmark
|
|
study of pornography in cyberspace."
|
|
While both papers conclude that adult BBS operators are using
|
|
the Internet to market their images, some recent evidence suggests the
|
|
practice may not be widespread. Brian Reid, a network researcher and
|
|
Usenet guru at Digital Equipment Corporation, says adult BBS operators
|
|
become upset when their images appear surreptitiously on Usenet
|
|
newsgroups. When they find out, they demand that the images be
|
|
removed.
|
|
Donna Hoffman, an associate professor of management at
|
|
Vanderbilt University, agrees: "On the supply side, the operators
|
|
realize that such 'leakage' hurts the market. On the demand side, the
|
|
potential customer will say, 'Why should I pay over there when I can
|
|
see it here for free?'"
|
|
Whatever the reality, after all this controversy, there may be
|
|
a happy ending in store for the pair of researchers. Mehta says he was
|
|
ready to give up on publishing their study, but now "our paper will
|
|
help shed a little light on this issue." In the wake of the Rimm
|
|
scandal, he thinks they'll have better luck finding a journal to
|
|
accept it.
|
|
|
|
[Since his paper has not been published, Mehta decided not to put it
|
|
online. He has agreed to answer questions about it and can be reached
|
|
at: mm39@post.queensu.ca]
|
|
|
|
|
|
|
|
A: ABSTRACT
|
|
|
|
"A content analysis of pornographic images on the Internet"
|
|
By Michael D. Mehta and Dwaine E. Plaza
|
|
|
|
This paper examines the nature and content of 150 randomly selected
|
|
pornographic images available through newsgroups located on the
|
|
Internet computer network. Using content analysis, we identify themes
|
|
which appear most frequently, and explore differences in the type of
|
|
material posted by commercial and non-commercial users. Results
|
|
suggest that commercial vendors are more likely to post explicit
|
|
pornographic material in public access newsgroups in order to attract
|
|
new customers to their private, pay-per-use bulletin board services.
|
|
|
|
|
|
|
|
B: PARALLEL CONSTRUCTIONS
|
|
|
|
Following are examples of where the two studies express similar ideas.
|
|
Page numbers are in parentheses. Since both studies talk about similar
|
|
topics, many parallel constructions could be coincidences. Rimm never
|
|
mentions the Mehta-Plaza study in his paper.
|
|
|
|
------------------------------------------------------------------------------
|
|
RIMM STUDY MEHTA/PLAZA STUDY DRAFT
|
|
------------------------------------------------------------------------------
|
|
(1867) 17 of the 32 alt.binaries (7) 17 Usenet newsgroups were
|
|
Usenet newsgroups contained identified that contained sexually-
|
|
pornographic imagery oriented images
|
|
------------------------------------------------------------------------------
|
|
(1865) Images are also posted to (16) Other newsgroups besides
|
|
newsgroups outside the alt.binaries those studied may contain
|
|
hierarchy sexually-explicit images
|
|
------------------------------------------------------------------------------
|
|
(1914) Pornography is widely (13) Pornography on computer
|
|
available through computer networks networks is widely available
|
|
------------------------------------------------------------------------------
|
|
(1852) Pornography is being vigorously (14) Commercial distributors
|
|
marketed in computer environments of pornography use the Internet to
|
|
market it
|
|
------------------------------------------------------------------------------
|
|
(1851,1875) Pornographers are using (14) Commercial distributors of
|
|
Usenet newsgroups to advertise pornography post images to newsgroups
|
|
products and attract customers to attract customers
|
|
------------------------------------------------------------------------------
|
|
(1868) The role of the NSFnet (4) The role of the NSF backbone
|
|
backbone began to change is now changing
|
|
------------------------------------------------------------------------------
|
|
(1862) The Internet is increasingly (3) The Internet has the potential
|
|
being used by pornographers to disseminate pornography
|
|
------------------------------------------------------------------------------
|
|
(1861) One of the largest uses for (4) The distribution of pornography
|
|
computer networks is the distribution is a new use for computer networks
|
|
of sexually explicit imagery
|
|
------------------------------------------------------------------------------
|
|
(1910) Pornographers are using (6) Commercial vendors may see
|
|
newsgroups to advertise at no cost newsgroups as a way to advertise
|
|
freely.
|
|
------------------------------------------------------------------------------
|
|
(1862) Until recently, the primary (4) Until recently, the primary use
|
|
use of the Internet was linking of the Internet was for scientific
|
|
university and government computers research purposes
|
|
for research purposes
|
|
------------------------------------------------------------------------------
|
|
(1868) Multimedia graphics are being (16) There are more advanced types
|
|
developed of image files which simulate
|
|
movement
|
|
------------------------------------------------------------------------------
|
|
(1885) The presentation of kappa (10) Kappa coefficients were
|
|
values was unnecessary because of the calculated and indicated a good
|
|
high level of reliability * degree of inter-coder reliability
|
|
------------------------------------------------------------------------------
|
|
(1916) The study lists 4 boldfaced (22) The study lists 22 categories
|
|
categories and 18 additional ones
|
|
------------------------------------------------------------------------------
|
|
(1852) Consumers enjoy considerable (5) Users download images in
|
|
privacy while downloading images from the privacy of their offices
|
|
computer networks
|
|
------------------------------------------------------------------------------
|
|
(1875) An adult BBS sysop can find (14) Most images come from magazines
|
|
images in magazines or videotapes
|
|
------------------------------------------------------------------------------
|
|
(1912) Raises questions about (17) Says the Internet has the
|
|
community standards in cyberspace potential to undermine local laws
|
|
------------------------------------------------------------------------------
|
|
(1908) Lawmakers are grappling with (18) Content of computer pornography
|
|
digitized pornography and may decide will change with regulation of
|
|
to regulate the Internet the "global village."
|
|
------------------------------------------------------------------------------
|
|
(1853) It may be difficult for (17) It is necessary for others
|
|
researchers to repeat this study to replicate this study
|
|
------------------------------------------------------------------------------
|
|
(1875) Adult BBS operators are more (14) Commercial operators are
|
|
likely to post explicit pornography ** more likely to post explicit
|
|
pornography
|
|
------------------------------------------------------------------------------
|
|
|
|
* = Mehta says: "The kappa coefficient came right from us. He asked how we
|
|
calculated reliability, and we told him. It's in there, but he didn't use it.
|
|
I don't think he knew how."
|
|
|
|
** = Rimm's study says that adult BBS owners post 71% of hardcore
|
|
pornography but just 59% of the combined total of hardcore and
|
|
softcore pornography.
|
|
|
|
|
|
|
|
C: ESTIMATES OF WORD OCCURRENCES (1)
|
|
|
|
Note the highly emotional words Rimm uses in his study. Where
|
|
Mehta-Plaza use the term "commercial vendor," Rimm uses "pornographer."
|
|
|
|
Mehta-Plaza Study Rimm Study (2)
|
|
----------------- ----------
|
|
Paraphilia / Paraphilic 0 82
|
|
Pornographer 0 70
|
|
Child (3) 1 52
|
|
Hard-Core 0 52
|
|
Bestiality 2 45
|
|
Pedophilia / Pedophile / Pedophilic 0 41
|
|
Commercial 42 39
|
|
Dog / Horse 0 23
|
|
Fisting 0 22
|
|
Obscene 0 21
|
|
Cock 0 21
|
|
Fuck 0 21
|
|
Incest 2 17
|
|
Pussy 0 17
|
|
Pain 0 15
|
|
Abuse 0 7
|
|
Torture 0 7
|
|
Penis 7 4
|
|
"She holds the dog cock! Inserts
|
|
it in her daughter's ass!" 0 2
|
|
|
|
(1) Since the counting technique isn't perfect the data shouldn't be
|
|
seen as exact. Also, Rimm's paper is considerably longer so one would
|
|
expect a word to occur more often.
|
|
|
|
(2) To obtain these figures, the Mehta-Plaza paper was saved to a file
|
|
with the references and Table 1 included. The Rimm paper and footnotes
|
|
from http://trfn.pgh.pa.us/guest/mrstudy.html were saved in a single
|
|
file. The following command sequence was used to extract word counts
|
|
from the two files:
|
|
|
|
tr '\040' '\012' < {study} | fgrep -i {word} | wc -l
|
|
|
|
(3) Usually used in the phrase "child pornography." In this case, data
|
|
were reviewed manually for accuracy. The one use of the word "child"
|
|
in the Mehta-Plaza study was: "We never came across an image depicting
|
|
a sexual act between an adult and a child/adolescent or acts between
|
|
children."
|
|
|
|
------------------------------
|
|
|
|
From: Emmanuel Goldstein <emmanuel@2600.COM>
|
|
Subject: File 3--"Imprisonment wihouth Guilt" for "Hacking"
|
|
Date: Tue, 25 Jul 1995 16:20:27 -0400 (EDT)
|
|
|
|
What follows is a letter from Bernie S., who has been in prison for
|
|
over four months, held with no bail for possessing a red box and
|
|
cellular software. Please help get his words to the public. I've
|
|
been trying to get EFF and EPIC people involved in what I believe
|
|
is a milestone case and one which will affect a lot of people in
|
|
the future. I'm utterly disgusted at the lack of response I've
|
|
gotten from them so far.
|
|
|
|
emmanuel@2600.com
|
|
|
|
|
|
--------------------------------------------------------------------
|
|
|
|
THIS IS A COPY OF A LETTER FROM ED CUMMINGS (BERNIE S.)
|
|
WHO IS STILL IN FEDERAL PRISON IN NEW JERSEY. HIS TRIAL
|
|
IS SCHEDULED FOR THE END OF THE MONTH - YOU MAY HAVE
|
|
THE ABILITY TO DO SOMETHING TO HELP WITH HIS CASE. PLEASE
|
|
SPREAD THE WORD AND READ THE NEW LAWS THAT HE CITES -
|
|
THIS IS A CASE THAT WILL AFFECT A GREAT MANY PEOPLE.
|
|
|
|
|
|
|
|
July 10, 1995
|
|
|
|
This week marks four months of imprisonment without having been
|
|
found guilty of any crime.
|
|
|
|
I'm enclosing a copy of the United States Code (U.S.C.) Title 18,
|
|
ss1029. The two statutes I'm charged with are: ss1029(a)(6)(B) (one
|
|
count) for possession of cellular software on the hard drive of my
|
|
laptop, and ss1029(a)(5) (two counts) for possessing a modified
|
|
Telecommunications Instrument (a modified Touch-Tone dialer). These
|
|
two amendments to ss1029 were enacted by Congress on October 21,
|
|
1994 after heavy lobbying by the cellular industry. Any discussion
|
|
of my case without understanding this new legislation is
|
|
unproductive.
|
|
|
|
The statutes are worded as follows:
|
|
|
|
---------------
|
|
|
|
ss1029. Fraud and related activity in connection with access
|
|
devices
|
|
|
|
(a) Whoever -
|
|
|
|
...
|
|
|
|
(5) knowingly and with intent to defraud uses, produces, traffics
|
|
in, has control or custody of, or possesses a telecommunications
|
|
instrument that has been modified or altered to obtain unauthorized
|
|
use of telecommunications services; or
|
|
|
|
(6) knowingly and with intent to defraud uses, produces, traffics
|
|
in, has control or custody of, or possesses -
|
|
|
|
(A) a scanning receiver, or
|
|
|
|
(B) hardware or software used for altering or modifying
|
|
telecommunications instruments to obtain unauthorized access to
|
|
telecommunications services.
|
|
|
|
---------------
|
|
|
|
It's important to note that the government is not alleging that
|
|
I've "acted" illegally. I'm not being charged with "cloning",
|
|
selling, or using any illegally cloned cellular phones, possessing
|
|
fraudulent or stolen Electronic Serial Numbers (ESN's), possessing
|
|
any equipment or software enabling the acquisition of others'
|
|
ESN's, or selling or using any "Red Boxes". The government's
|
|
charges against me are solely that I had the "intent" to use
|
|
software or hardware to violate new federal laws.
|
|
|
|
Until very recently, the federal statutes used to prosecute those
|
|
accused of defrauding telecommunications carriers relied on the
|
|
"access device" definition embodied in ss1029. That definition
|
|
(which was actually worded years ago in an effort to curb
|
|
credit-card fraud) failed to adequately describe certain types of
|
|
fraud involving "ESN/MIN tumbling" cellular phones, blue boxes, red
|
|
boxes, etc. because none of these devices accessed a specific
|
|
person's account. The government was having trouble prosecuting
|
|
these cases because the laws didn't fit the crime. Last October 21,
|
|
at the behest of telecommunications and cellular industry
|
|
lobbyists, Congress quietly enacted two amendments to ss1029 that
|
|
neatly sidestep the long-standing and well-defined phrase "access
|
|
device" by using undefined terminology which can be interpreted so
|
|
broadly it can be applied to just about anything the government
|
|
wants. With the passage of ss1029(a)(5) and (a)(6)(A) and
|
|
(a)(6)(B), it can now be a federal felony to possess, use, sell, or
|
|
lend anything that might enable anyone to obtain "unauthorized use"
|
|
or "unauthorized access" to telecommunications services - neither
|
|
of which the law defines. Other terminology like "altered",
|
|
"modified", and "telecommunications instrument" are also
|
|
conveniently undefined.
|
|
|
|
With regards to the "hardware or software used for altering or
|
|
modifying telecommunications instruments" mentioned in
|
|
ss1029(a)(6)(B), the government is ostensibly trying to prevent
|
|
people from reprogramming the ESN & MIN in cellular phones, as well
|
|
as the identifying information in any future PCS devices that are
|
|
coming out in the future. ESN's are easily and commonly
|
|
reprogrammed to allow one subscriber to have two or more cellular
|
|
phones on the same account - something that cellular carriers would
|
|
rather tell subscribers is impossible and that they have to setup
|
|
separate accounts with different phone numbers and additional
|
|
$20-$40/month "access fees" for each phone. The MIN, or phone
|
|
number, is easily reprogrammed from the keypad of all modern
|
|
cellular phones, and the associated ESN can be reprogrammed by
|
|
using a PC connected to the phone's data port with the proper
|
|
software. Since the government doesn't define "alter" or "modify"
|
|
but clearly intends it to mean changing the contents on data in a
|
|
memory chip, and since it also fails to define "unauthorized use"
|
|
and "unauthorized access", it opens up a Pandora's box of potential
|
|
violations of these new felony statutes.
|
|
|
|
For instance, the practice of storing commonly-called telephone
|
|
numbers in a cellular phone (some have up to 200 memories for this)
|
|
is also, by the same implied definition, "altering" or "modifying"
|
|
that "telecommunications instrument". "Unauthorized use" is not
|
|
defined in the statutes, but could be interpreted to mean calling
|
|
someone who doesn't want to be called. Simply dialing a number on
|
|
a cellular phone "alters" and "modifies" the contents of memory
|
|
addresses in microchips contained in that phone. So does dialing
|
|
someone who doesn't want to be called constitute a felony under
|
|
this statute? FCC regulations prohibit transmission of profanity
|
|
over the airwaves. Cellular telephones are actually computerized
|
|
two-way radios. Does using profane language during a cellular
|
|
telephone conversation then constitute "unauthorized use" under
|
|
s1029(a)(5), making participants felons? As you know, a casual scan
|
|
of the 825-895 Mhz radio spectrum that cellular radiotelephones use
|
|
(which itself is now a federal felony!) would expose a whole lot of
|
|
felons (profanity abounds).
|
|
|
|
There are other problems with these amendments. Title 18
|
|
ss1029(a)(6)(a) makes it a federal felony to possess "a scanning
|
|
receiver". I believe this statute tries to address the users of so
|
|
called "ESN grabbers" that intercept the reverse-channel data
|
|
transmissions of cellular telephones. These data streams can be
|
|
demodulated and contain the ESN/MIN pairs that illegal cellular
|
|
cloners use to program into other cellular phones to charge calls
|
|
to the legitimate customers' accounts without their knowledge.
|
|
Unfortunately, the drafters of this legislation didn't bother to
|
|
consider that "scanning receivers" of many types are sold by the
|
|
tens of millions at stores all over the country for perfectly
|
|
reasonable purposes. Scanning radios are used by enthusiasts
|
|
worldwide to listen to public-service radio traffic (i.e., police,
|
|
fire, ambulance, weather, municipal, etc.), and all modern
|
|
digitally-tuned radios in cars and home stereos utilize "scanning"
|
|
functions for easy tuning. Maybe there was some underlying intent
|
|
to outlaw the millions of radios out there that can easily monitor
|
|
law enforcment frequencies; perhaps the government's paranoia has
|
|
extended this far. In any case, this is clearly a bad law, and I
|
|
could go on and on as to why. The only way to change these
|
|
badly-worded amendments is to lobby (i.e. buy) Senators and
|
|
Congresspersons to propose and pass new legislaton amending these
|
|
bad laws so that they make sense. The cellular industry did just
|
|
that in 1986 with the ECPA (Electronic Communications Privacy Act)
|
|
and in 1994 with these amendments to USC 18 ss1029. Unfortunately,
|
|
those of us who care about changing these bad laws don't have the
|
|
money or the influence to buy legislation.
|
|
|
|
Although I haven't read the several page article about my case in
|
|
the summer issue of 2600, I'm disappointed there was no mention of
|
|
the legislation that made this entire episode possible. To me,
|
|
that's the real story.
|
|
|
|
My trial is scheduled for July 31 at 10:00 AM in coutroom 9-B
|
|
(ninth floor) of the US Federal Courthouse at 601 Market Street in
|
|
Philadelphia. If any of this changes, I'll let you know. There are
|
|
some pending pretrial defense motions but whether the judge decides
|
|
to hear them before July 31 remains to be seen. I'm extremely
|
|
frustrated having been held for over four months in pretrial
|
|
detention because it makes preparing a defense virtually impossible
|
|
given my inaccessibility to normal resources.
|
|
|
|
If you read over the enclosed summary of the BRADY case (which
|
|
involved someone who was allegedly selling "Tumbling MIN/ESN
|
|
celullar phones") you will see that government "expert" witnesses
|
|
are capable of making all kinds of misstatements of facts, either
|
|
out of incompetence or intention. If this occurs during my trial
|
|
(which I believe is entirely possible) I will have to present
|
|
expert witnesses to counter the government's. Is a jury of 12
|
|
technically untrained people going to believe a United States
|
|
Secret Service Agent who specializes in telecommunications and
|
|
computer fraud, or someone I come up with who claims the agent
|
|
doesn't know what he's talking about? It all comes down to
|
|
credibility, not about what's right and wrong.
|
|
|
|
The government has unlimited resources to prosecute this case, and
|
|
I'm broke. I can't even afford to hire any expert witnesses, let
|
|
alone someone of the stature necessary to credibly counter the
|
|
government's experts. Do me a big favor and put word out that I
|
|
need expert witnesses with that kind of credibility. The only thing
|
|
I can offer them is the notoriety and publicity of presenting their
|
|
expertise at a highly publicised trial.
|
|
|
|
This case is legally significant because its outcome will set a
|
|
legal precedent on which future cases of this type are based. The
|
|
two statutes I am charged with are untested - no one has ever been
|
|
convicted of them. This case WILL be in the law books, one way or
|
|
another. Its outcome will affect many people in the future. There
|
|
are also Constitutional issues at stake. Do we really want the
|
|
government to be able to imprison anyone for publishing a computer
|
|
program? Or for possessing readily-available electronic components
|
|
that can be purchased at Radio Shack and other companies
|
|
nationwide? That's what this case amounts to. Again, I'm not even
|
|
being accused of committing any fraud, just possessing software and
|
|
commonly available components that the government says show I had
|
|
the INTENT to commit fraud. The ramifications are frightening - not
|
|
just for me, who could spend years in federal prison, and be
|
|
labeled a federal felon the rest of my life - but for anyone else
|
|
whose curiosity extends to computers, telecommunications, software,
|
|
and electronics. If I am convicted, the government can declare
|
|
open-season on anyone fitting that profile, just as they do now on
|
|
people fitting "drug courier profiles". Hackers, phreaks, and
|
|
computer and electronics hobbyists will all be fair game.
|
|
|
|
Please get the word out on what I'm saying here. Implore people to
|
|
write their legislators to amend these bad laws. It's a long-shot,
|
|
but negative publicity might help to get the government to back
|
|
down.
|
|
|
|
This has been an extremely stressful and depressing ordeal for me.
|
|
It has resulted in the loss of my job (all my clients have had to
|
|
turn elsewhere), my life savings, several months of my life (maybe
|
|
more), it's affected my health (I've repeatedly been denied access
|
|
to the physical therapy that my orthopedic surgeon says is
|
|
necessary for me to regain the use of my arm), and generally been
|
|
a living hell. I don't want anyone else to have to go through this
|
|
nightmare. Please do what you can, and encourage others to do the
|
|
same. It may not make a difference, but then again it might. At the
|
|
risk of sounding grandiose, how this case is decided truly impacts
|
|
out entire community.
|
|
|
|
I hope to see the EFF and/or EPIC actively involved in my case.
|
|
Either organization might have information my attorney can use.
|
|
Anyone who needs to can contact him, Ken Trujillo, at
|
|
ktrujillo@aol.com.
|
|
|
|
Thanks again for all your help on this as it comes down to the
|
|
wire. It's extremely frustrating to have to rely on others to do
|
|
things that I'd be perfectly capable of doing myself if I weren't
|
|
locked up in here. Times like these make you realize who your
|
|
friends really are.
|
|
|
|
Ed Cummings 48919-066
|
|
FCI Fairton
|
|
A-Left
|
|
P.O. Box 420
|
|
Fairton, NJ 08320
|
|
|
|
bernies@2600.com
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 23 Jul 1995 13:52:45 -0700
|
|
From: Jim Warren <jwarren@well.com>
|
|
Subject: File 4--[to GovAccess] sample of VTW's *stellar* tech-civlib alerts!
|
|
|
|
I cannot recommend Voters Telecomm Watch too highly to my GovAccess readers.
|
|
|
|
If you care about the barrage of attacks that naive and/or ignorant and/or
|
|
arrogant and/or flat-out irresponsible, pandering, media-seeking
|
|
politicians are proposing to inflict on traditional civil liberties - using
|
|
the singular excuse that such liberties are aided by computer - I *urge*
|
|
you to subscribe to VTW.
|
|
|
|
Except for its most crucial, time-sensitive action-alerts, I will not be
|
|
duplicating VTW's *excellent* content to GovAccess in the future. Git it
|
|
direct!
|
|
|
|
--jim
|
|
|
|
|
|
&&&&&&&&&&&&&&&&&&&&
|
|
|
|
Date--Sat, 22 Jul 1995 09:20:15 -0400
|
|
From--shabbir@panix.com
|
|
Subject--(Weekly) VTW Billwatch #10
|
|
|
|
============================================================================
|
|
VTW BillWatch: A weekly newsletter tracking US Federal legislation
|
|
affecting civil liberties. BillWatch is published every
|
|
Friday afternoon as long as Congress is in session.
|
|
|
|
Issue #10, Date: Sat Jul 22 00:55:27 EDT 1995
|
|
|
|
Please widely redistribute this document with this banner intact
|
|
Redistribute no more than two weeks after above date
|
|
Reproduce this alert only in relevant forums
|
|
|
|
Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
|
|
|
|
*** Know of someone in NY/NJ with a fax machine but without net ***
|
|
*** access that's interested in VTW's issues? Tell them to ***
|
|
*** call and get on our weekly fax distribution list at ***
|
|
*** (718) 596-2851. ***
|
|
|
|
To get on the distribution list for BillWatch, send mail to
|
|
listproc@vtw.org with
|
|
"subscribe vtw-announce Firstname Lastname"
|
|
in the subject line.
|
|
|
|
Email vtw@vtw.org with "send billwatch" in the subject line
|
|
to receive the latest version of BillWatch
|
|
____________________________________________________________________________
|
|
CONTENTS
|
|
Rumor Central (RC)
|
|
*** Legislative information is unchanged since last week ***
|
|
Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
|
|
(awaiting official presentation in the House, nothing in Senate)
|
|
1995 Communications Decency Act (HR 1004, S 314)
|
|
(passed Senate, fight in the House)
|
|
1995 Protection of Children from Computer Pornography Act
|
|
(HR n.a., S 892, Senate hearing scheduled for July 24th)
|
|
Anti-Electronic Racketeering Act of 1995
|
|
(HR n.a., S 974, not currently moving in the Senate)
|
|
|
|
____________________________________________________________________________
|
|
RUMOR CENTRAL (RC)
|
|
|
|
"The Net: under attack again"
|
|
|
|
Whenever pro-censorship forces attack the Internet, they
|
|
trot out kids who have been "cyber-stalked" or have found
|
|
pornography online. Unfortunately what you never hear about
|
|
is kids using the net in exciting ways because it doesn't make
|
|
good sensationalistic news.
|
|
|
|
Do you know of a young child using the Internet with their
|
|
parent's permission? Their input is needed THIS WEEKEND.
|
|
Please contact VTW at vtw@vtw.org, or by phone at (718) 596-2851.
|
|
The information will be put into the Congressional Record by
|
|
anti-net-censorship legislators to counter the pro-censorship
|
|
hysteria.
|
|
|
|
Remember, please contact us THIS WEEKEND.
|
|
|
|
|
|
"Dole/Grassley hearings Monday"
|
|
|
|
Followers of BillWatch will note that Monday, July 24th, marks
|
|
the Dole/Grassley hearings on S 892 (1995 Protection of
|
|
Children from Computer Pornography Act). When you hear about
|
|
the hearing through the media (we won't be able to get it
|
|
through the Congressional Record) you're going to flip.
|
|
|
|
Expect a large collection of people who claim to be the victims
|
|
of "cyber-stalkers". While violence against children is
|
|
abhorred by all reasonable people, you cannot be harmed through
|
|
your computer. One needs to perform a physical act to commit
|
|
such a crime. Let's severely punish and despise the crime, not
|
|
the speech.
|
|
|
|
If it goes as predicted, the hearing should anger you.
|
|
Remember this the next time you see an alert asking you to call
|
|
Congress. BillWatch looks forward to seeing Brock Meeks'
|
|
review of the hearing.
|
|
|
|
|
|
"The Rimm follies"
|
|
|
|
The text of the Rimm study, and commentary by Anne Wells
|
|
Branscomb, Catherine MacKinnon, and Carlin Meyer can be found
|
|
at:
|
|
URL:http://www.ll.georgetown.edu/rimm.html
|
|
|
|
|
|
Send your interesting rumors (anonymously or not) to vtw@vtw.org.
|
|
All mail headers will be destroyed.
|
|
|
|
____________________________________________________________________________
|
|
Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)
|
|
|
|
Description:
|
|
HR 1978 is an attempt to recognize the unique medium that is
|
|
online systems and avoid legislating censorship. It would:
|
|
-prohibit the FCC from regulating constitutionally-protected
|
|
online speech
|
|
-absolve sysops and services from liability if they take
|
|
good faith measures to screen their content or provide
|
|
parental-screening software
|
|
|
|
See directions below for obtaining analyses from various
|
|
organizations.
|
|
|
|
House of Representatives, citizen action required:
|
|
Take a moment to read and familiarize yourself with the bill.
|
|
It may be the only time you ever see a bill that *prohibits*
|
|
the FCC from regulating the Internet.
|
|
|
|
House sponsors: Cox (R-CA), Wyden (D-OR)
|
|
|
|
House status:
|
|
Currently HR 1978 is being examined by several DC policy groups
|
|
(EPIC, CDT, ACLU, & PFAW) to ensure it won't have any
|
|
undesirable side effects. Therefore, the legislation as
|
|
written may change slightly to correct any problems found.
|
|
|
|
House actions anticipated:
|
|
Representatives Cox and Wyden will propose their bill and
|
|
the Christian Coalition will propose the Communications Decency
|
|
Act. Although Rep. Gingrich's opposition to the Communications
|
|
Decency Act is encouraging, it isn't clear that it will be enough
|
|
to keep the House from passing another clearly unconstitutional
|
|
bill.
|
|
|
|
Where to get more info:
|
|
Email: vtw@vtw.org (with "send hr1978" in the subject line)
|
|
Gopher: gopher -p 1/vtw/exon gopher.panix.com
|
|
WWW: http://www.panix.com/vtw/exon
|
|
|
|
____________________________________________________________________________
|
|
1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004)
|
|
|
|
Description:
|
|
The CDA would criminalize electronic speech currently protected
|
|
in print by the First Amendment.
|
|
|
|
House of Representatives, citizen action required:
|
|
Call the League of Women Voters in your city and find out who
|
|
your representative is and ask them where they stand. Directions
|
|
can be found by sending mail to vtw@vtw.org with "send alert"
|
|
in the subject line.
|
|
|
|
House CDA sponsors: Johnson (D-SD)
|
|
|
|
House status:
|
|
Currently the CDA is unattached to any legislation, however
|
|
it is expected that someone will introduce it as an amendment
|
|
to the Telecomm bill in the next few weeks. In addition,
|
|
three Representatives (Gingrich, Cox, and Wyden) have all taken
|
|
public positions against the Communications Decency Act. Anti-
|
|
censorship legislation (HR 1978) has come out of their objections
|
|
to the CDA.
|
|
|
|
The palatable Leahy alternative has been attached to the
|
|
House Telecomm Reform bill by an amendment sponsored by
|
|
Rep. Ron Klink (D-4-PA).
|
|
|
|
House actions anticipated:
|
|
The House Telecomm Reform bill will go to a floor vote
|
|
in mid to late July. The Christian Coalition will find
|
|
someone to try to amend the Communications Decency Act to
|
|
the Telecomm Reform bill. Reps. Cox and Wyden will propose
|
|
their alternative to the bill.
|
|
|
|
Request the CDA FAQ and familiarize yourself with the issues
|
|
surrounding the bill. Directions below.
|
|
|
|
Senate, citizen action required:
|
|
None. That battle is lost.
|
|
|
|
Senate status:
|
|
The Senate affirmed the Communications Decency Act (84-16)
|
|
as amended to the Telecommunications Reform bill (S 652).
|
|
|
|
Where to get more info:
|
|
WWW: http://www.panix.com/vtw/exon
|
|
http://www.eff.org/
|
|
http://www.cdt.org/
|
|
http://epic.org/free_speech
|
|
Gopher: gopher -p 1/vtw/exon gopher.panix.com
|
|
gopher gopher.eff.org
|
|
Email: vtw@vtw.org (with "send cdafaq" in the subject line)
|
|
cda-status@cdt.org
|
|
cda-info@cdt.org
|
|
|
|
____________________________________________________________________________
|
|
1995 Protection of Children from Computer Pornography Act (S 892)
|
|
|
|
Description:
|
|
Would make Internet Service Providers liable for shielding
|
|
people under 18 from all indecent content on the Internet.
|
|
|
|
Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY),
|
|
Shelby (R-AL), Nickles (R-OK), Hatch (R-UT)
|
|
|
|
Senate status: Currently in the Judiciary committee, scheduled for a
|
|
July 24th hearing. The hearing promises to be a bonanza of
|
|
net porn/stalker hysteria.
|
|
|
|
Senate citizen action required:
|
|
Request bill and analysis below and familiarize yourself with it.
|
|
|
|
House of Representatives status: No House version is known about.
|
|
|
|
Citizen action required:
|
|
None.
|
|
|
|
Where to get more info:
|
|
Email: vtw@vtw.org (with "send s892" in the subject line)
|
|
WWW: URL:http://www.panix.com/vtw/exon
|
|
Gopher: URL:gopher://gopher.panix.com:70/11/vtw/exon
|
|
|
|
____________________________________________________________________________
|
|
Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974)
|
|
|
|
Description:
|
|
S 974 has many effects (not good) on law enforcement's use of
|
|
intercepted communications. It would also make it unlawful for
|
|
any person to publicly disseminate encoding or encrypting
|
|
software including software *currently allowed* to be exported
|
|
unless it contained a "universal decoding device". This
|
|
more than likely means that Clipper-style key escrow systems
|
|
could be disseminated, but not strong, private cryptography.
|
|
|
|
Senate sponsors: Grassley (R-IA)
|
|
|
|
Senate status: Currently not active and probably won't move before the
|
|
August recess.
|
|
|
|
Senate citizen action required:
|
|
Request bill below and familiarize yourself with it. VTW is
|
|
tracking this bill, and will alert you when there is movement.
|
|
There is no Congressional action to take right now; as other
|
|
bills (such as the Communications Decency Act) pose a greater,
|
|
more immediate threat.
|
|
|
|
House of Representatives status: No House version is currently enrolled.
|
|
|
|
Where to get more info:
|
|
Email: vtw@vtw.org (with "send s974" in the subject line)
|
|
Gopher: URL:gopher://gopher.panix.com:70/11/vtw/
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.63
|
|
************************************
|
|
|