808 lines
35 KiB
Plaintext
808 lines
35 KiB
Plaintext
|
|
Computer underground Digest Sun Nov 5, 1995 Volume 7 : Issue 87
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #7.87 (Sun, Nov 5, 1995)
|
|
|
|
File 1--Re: Spam Response (CuD 7.86)
|
|
File 2--CuD as of late
|
|
File 3--Re: Cyberangel FAQ
|
|
File 4--Re: Attention Spammer: The War Has Started
|
|
File 5--Re: Cyberangels (Cu Digest, #7.86)
|
|
File 6--ACLU Cyber-Liberties Update
|
|
File 7--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 2 Nov 1995 08:56:46 -0500
|
|
From: trebor@ANIMEIGO.COM(Robert J. Woodhead (AnimEigo))
|
|
Subject: File 1--Re: Spam Response (CuD 7.86)
|
|
|
|
Barry Gold makes some interesting suggestions for detecting and
|
|
removing SPAM, but the problem with them is that they require
|
|
transactions over the internet in order to verify the veracity of
|
|
messages. Egad, you thought the Web was a bandwidth hog?
|
|
|
|
A better approach would be a cooperative network of sites that sniff
|
|
out the stench of spam, and provide this information to client sites
|
|
who can then delete the offending bits when they appear, and refuse to
|
|
forward them. This would require some extra cpu horsepower but less
|
|
network bandwidth.
|
|
|
|
Needless to say, the spam alert messages ought to be cryptographically
|
|
signed to prevent spoofing. Also, some safeguards to help prevent the
|
|
abuse of the automatic email monitoring that would be necessary will
|
|
have to be considered.
|
|
|
|
Barry's suggestion does have merit for mailing lists, as they act as
|
|
exploders and so the checking overhead per email message generated is
|
|
reasonable.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 2 Nov 1995 09:36:23 -0500
|
|
From: Norman Lyon <nlyon@ECN.PURDUE.EDU>
|
|
Subject: File 2--CuD as of late
|
|
|
|
What has been happening to Computer Underground Digest? It used to be
|
|
a journal that seemed to place online liberties above the ideals of a
|
|
particular sect of morality. Lately, this has included support of
|
|
invasion of privacy against a "spammer" and the backing of a right wing
|
|
vigilante pseudo organization that declares online war on anything its
|
|
members find offensive. Movements now being published in CuD are the
|
|
same sort that you have been attacking since your inception. Yes, some
|
|
of the viewpoints you're supporting, by inclusion in the magazine,
|
|
strike some nerve when standing up for civil liberties. Yet the same
|
|
views do just as much as the Cliper chip and the "online decency act" for
|
|
diminishing rights. You're advocating the removal of freedom of privacy
|
|
and letting your readers believe that a trial by a lawfully appointed
|
|
court is not needed for the online community. You also seem to be
|
|
advocating that the moral right has the authority to dictate what we
|
|
can and can not do online, all in the name of the law. Yet much of
|
|
what this dictation preaches is not the enforcement of laws, but
|
|
enforcement of a particular morality.
|
|
|
|
Will this level of immature journalism continue, or will I be able to
|
|
count on the intelligent, mature, and civil minded magazine that I have
|
|
counted on come back in the near future?
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 02 Nov 1995 11:45:59 +0000
|
|
From: "W. K. (Bill) Gorman" <bj496@CLEVELAND.FREENET.EDU>
|
|
Subject: File 3--Re: Cyberangel FAQ
|
|
|
|
Wonderful. Just what we need - another bunch of kooks running around
|
|
the net acting as self-appointed "saviors" of us all. Their disdain
|
|
for the Constitution and the rule of law is obvious from the tone of
|
|
their FAQ, wherein they relegate Constitutional guarantees to
|
|
"privileges" to be granted or withheld on some fuzzy-minded notion of
|
|
majority concensus. Will we next see them attempting to apply the
|
|
tactics of the CoS? In light of the current political disconfort the
|
|
net's instantaneous access to news and on-scene data is causing the
|
|
power brokers in Washington, D.C., is it reasonable to speculate what
|
|
hidden agenda these self-proclaimed "guardians" may have?
|
|
|
|
Should the net community regard them with the same jaundiced eye with
|
|
which the NYC transit police viewed them? Should netters consider
|
|
"volunteering" as cyber "angel" guard-geeks in order to watch the
|
|
watchers? Should netters even go so far as to stage well-publicized,
|
|
carefully-managed Web sites which are, in reality, merely bait to
|
|
attract and identify the likes of these?
|
|
|
|
While nobody encourages REAL crime, the "guardians" overly-altruistic
|
|
pronouncements smack of nothing so much, in the opinion of this
|
|
writer, as the mouthings of neighborhood bulliy wannabes seeking to
|
|
impose their standards on everyone; to impose their prejudices and
|
|
parochialism on all and sundry by menas of implied threats,
|
|
intimidation and harassment: the very things they CLAIM to oppose.
|
|
These "angel" guard-geeks seem to forget that the net is global in
|
|
nature. Are they blind to the beam in their eye as they seek to rip
|
|
the splinter from ours? Why else use tactics and espouse ideals that
|
|
cast them in the image of bigots or "small town red-necks"? Are they
|
|
and their talk-show "fearless leader" attempting to play into that
|
|
audience for political gain?
|
|
|
|
What practical difference is there between their goals, their
|
|
promotion of some "safesurf" business enterprise (in which they fail
|
|
to disavow any financial interest), their demands for enhanced ID
|
|
screening, and the actions of any fascist state whose goons demand
|
|
"your papers, please" at gunpoint? Will they next advocate stationing
|
|
of armed guards and checkpoints at the entry to print media
|
|
newsstands, or TV receivers?
|
|
|
|
Haven't we got enough problems on the net without these guys?
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 3 Nov 1995 02:02:27 GMT
|
|
From: chip@UNICOM.COM(Chip Rosenthal)
|
|
Subject: File 4--Re: Attention Spammer: The War Has Started
|
|
|
|
>From: Barry Gold <barryg@sparc.SanDiegoCA.ATTGIS.COM>
|
|
>1. Mailing lists: two steps:
|
|
|
|
The proposed rememdy is unsatisfactory. It will reject perfectly
|
|
legitimate messages, and fail to stop (in my experience) the
|
|
most common forms of mailing list attacks.
|
|
|
|
> a) Improve majordomo and listserv to recognize obviously forged
|
|
> headers and dump the messages. This is a simple change.
|
|
|
|
Oh-oh. I get very nervous when people talk about "simple changes"
|
|
to mail and news. Things are seldom simple. If not due to technical
|
|
issues, then due to inertia.
|
|
|
|
> If the supposedly "verified" From: line is non-conforming, trash the
|
|
> message. Some examples include:
|
|
> . more than one "from" address
|
|
> . totally ridiculous site names, especially where the
|
|
> top-level domain (the last one) isn't one of the "standard"
|
|
> three-letter names or a two-letter country code.
|
|
|
|
"non-conforming" with respect to what? RFC-822, the bible for
|
|
email headers, says multiple addresses in From: headers is perfectly
|
|
acceptable. I have seen precisely *one* spam attack with multi-address
|
|
From: headers. On that basis we are going to ban an entire class of
|
|
legitimate (but admittedly infrequent) addresses? I think not.
|
|
|
|
> b) A further improvement involves actually verifying the From:
|
|
> line before sending the message out again. This would be more
|
|
> work, but would make the spammer's job much more difficult. When
|
|
> processing a message, majordomo/listserv should open an SMTP
|
|
> connection to the site shown in the "From:" header.
|
|
|
|
Try to open an SMTP connection to "unicom.com". Surprise! There
|
|
is no computer called "unicom.com".
|
|
|
|
This suggestion also banishes all people who are not directly connected
|
|
to the Internet, but can send and receive Internet email. (Such as
|
|
folks running "uucp" dialup links into an Internet host that forwards
|
|
their mail.)
|
|
|
|
And what happens when the host is down and not responding? sendmail
|
|
(a popular SMTP transport) has a fairly complex method for queueing
|
|
and retrying messages. Are you suggesting that all list administrators
|
|
implement the same measures? Again, I think not.
|
|
|
|
The worst part of this solution is that it will be ineffective. A
|
|
good number of list spammers (I'd guess somewhere around half) *do*
|
|
use legitimate addresses, and would pass all of the checks suggested.
|
|
|
|
The "best current practice" for this problem is to screen submissions,
|
|
and have list agents reject messages that do not correspond to a
|
|
subscriber in the list. This has been reported to be extremely
|
|
effective in stopping list spams.
|
|
|
|
This solution, which is effective and sounds very simple, has significant
|
|
difficulties of its own. What about the user that subscribes as
|
|
"joe@red.acme.com" but submits a message as "joe@blue.acme.com" or
|
|
"Joe_Smith@acme.com"? What about "list exploders" that further
|
|
redistribute messages to multiple people? What about "mail-to-news
|
|
gateways", which post list messages to *local* newsgroups, where the
|
|
Usenet tools make it easier to manage large-volume lists? As I pointed
|
|
out at the top, nothing is "simple" when it comes to email, unless
|
|
you are willing to overlook the details.
|
|
|
|
The moral of the story is that: (1) things are being done (*effective*
|
|
things), and (2) the solutions are not as easy as they might appear.
|
|
|
|
The current state of spam defenses is as follows: (1) thanks to the
|
|
hard work of several volunteers (clewis, snowhare, et al), Usenet spam
|
|
rapidly is becomming ineffective, (2) list managers are looking at
|
|
ways to shore up their defenses, and some have implemented effective
|
|
counter-measures, and (3) personal email is wholly open and unprotected,
|
|
and clearly will be the next frontier for spammers.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 03 Nov 1995 02:11:44 GMT
|
|
From: haldeman@SAS.UPENN.EDU(Gene N. Haldeman)
|
|
Subject: File 5--Re: Cyberangels (Cu Digest, #7.86)
|
|
|
|
I am certain I won't be the only one to respond to this, but I will
|
|
have serious problems living with myself if I do not. The CYBERANGELS
|
|
mean well, and in fact the original Guardian Angels mean well; but
|
|
meaning well doesn't cut it if the actions taken on that
|
|
"well-meaning" turn out to be destructive to the culture that the
|
|
well-meaning think they are protecting.
|
|
|
|
So, I take the CYBERANGELS purpose, as listed by them, point by point
|
|
to try to show the CYBERANGELS that this is misguided, and in a word,
|
|
irrational.
|
|
|
|
>The purpose of the project is
|
|
>a) To promote and protect the idea that the same laws of decency and respect
|
|
>for others that apply in our streets should apply also to the Internet.
|
|
|
|
First, the net is a different culture than the ones we find on the
|
|
streets of our cities. Where in the world is anyone given the option
|
|
to express themselves globally with a few keystrokes? And which laws
|
|
of decency and respect are we discussing here? The laws of decency
|
|
and respect in the USA? As the Guardians are New York City based,
|
|
I'd have to assume that as an arbiter of what's right and wrong,
|
|
they'll disappoint the folks in central Kansas by not going far
|
|
enough, and many of the folks in their own city by going so far as to
|
|
censor conversation easily heard in Washington Square Park.
|
|
|
|
a) WHOSE laws of decency and respect?
|
|
|
|
>b) To protect our children from online abuse.
|
|
|
|
I'm fairly recent to Usenet/Internet; I've only been involved for
|
|
about 6 years now, but I have never heard of any child being abused
|
|
online. I've heard stories of children on certain online services who
|
|
have been picked up by the unscrupulous, and in some cases, molested.
|
|
But in these cases, were these children abused ONLINE? Could this not
|
|
happen by way of the phone lines as well? Are you going to, like the
|
|
FBI begin tapping phones? If what you object to is that a child
|
|
ventures into an adult area and hears some language that he or she is
|
|
not used to, then I ask why the parents are not parenting. If your
|
|
response to this is that parents can't watch everything their child
|
|
does, then my question is will the Guardians be able to watch
|
|
everything the child does? If so, then I think I can probably find
|
|
some babysitting work for your Angels; they're certainly more capable
|
|
than any parent around.
|
|
|
|
b) Clarify what you mean by "online abuse"
|
|
|
|
>c) To pressurize service providers to enforce their Terms of Service.
|
|
|
|
Even if you do this, who is to say I can't start my own online service
|
|
which REQUIRES each member to upload explicit photos? (Note please
|
|
that this is an EXAMPLE of what someone could do -- I wouldn't,
|
|
personally) What if the Terms of Service allow the things *YOU*, as
|
|
Angels, and self-appointed arbiters of right and wrong, disagree with?
|
|
Besides, I see evidence that most providers are adamant about their
|
|
Terms of Service; you see, they have to be, or they will gain a bad
|
|
reputation. They're business people, and as such, they are
|
|
conservative. Violate ToS on AOL, and you will be most likely to be
|
|
booted within the week. Admittedly, there is a problem with
|
|
throwaway accounts, but if AOL can't police that, I guarantee you
|
|
can't.
|
|
|
|
c) How on earth can you pressurize service providers to enforce ToS
|
|
more than they already do, and more than the pressure that has already
|
|
been put upon them?
|
|
|
|
>d) To give advice and assistance to victims of hate mail, harassment and
|
|
>sexual abuse online.
|
|
|
|
Victims of hate mail have many options open to them. The first and
|
|
best method of dealing with it is to delete it. The problem here is
|
|
that that idiot who wrote me a piece of hate mail has every right to
|
|
do so, and I have every right to delete it, or write hate mail back.
|
|
|
|
Harassment, of course, properly documented is a crime which any ISP
|
|
will support a user on. There are a few cases, primarily associated
|
|
with the assault from the Scientology folks where certain ISPs might
|
|
back down. In that case, it should be easy in this age to find
|
|
another provider which will stand tall against such criminal behavior.
|
|
|
|
As far as sexual abuse online is concerned, I'm afraid the Angels are
|
|
going to have to define it a little more clearly (see my response to
|
|
b). Are you talking about the fact that some clueless males send
|
|
"wanna fuck" messages to any woman who happens to be posting on the
|
|
newsgroup, or venturing into IRC? I would suggest that most women
|
|
know how to deal with that..you ignore the jerk, and if harassment
|
|
results, you inform your ISP or the law...no need for Angels here,
|
|
either.
|
|
|
|
d) Advice and assistment, however, is fine; perhaps here is where the
|
|
Angels might shine. If they set up a site where people can go to when
|
|
they have problems that can't be resolved by way of their ISP, I don't
|
|
think too many people would have a problem with that.
|
|
|
|
>e) To watch out for users violating terms of service by committing
|
|
>cybercrimes and to report them to relevant authorities (Sysadmins, or even
|
|
>Police).
|
|
|
|
When they are genuine crimes, fine. But the Angels should be aware
|
|
that a crime in Minneapolis may not be a crime in Istanbul or Tokyo or
|
|
Stockholm. The Angels have traditionally been very close to
|
|
committing crimes themselves; or at least very dangerous examples.
|
|
|
|
e) You'd better be DAMNED sure you're not stepping on someone's
|
|
rights; which means you'd better be aware of what's legal and illegal
|
|
in every country that a given message has passed through; the rights
|
|
of the originator, and the rights of the end receiver of such message,
|
|
whether it be binary or ASCII, and if it's encrypted, you'd better be
|
|
able to decrypt it accurately. If the message is encoded in PGP, I
|
|
wish you luck.
|
|
|
|
>f) To help to make unnecessary Government legislation by showing Government
|
|
>that the World Net Community takes the safety of our children and the well
|
|
>being of all its members seriously.
|
|
|
|
Well, hell, we ALL want that. The question is balancing that need
|
|
against the capabilities. The Internet Guardian Angels are showing
|
|
here a naivete only matched by the most clueless of newbies. The
|
|
problem is that there are problems enough caused by enforcers of law
|
|
who are actually *trained* in enforcing law (CF the news from
|
|
Philadelphia or Los Angeles during the past year).
|
|
|
|
When I hear people who know NOTHING about a communities standards
|
|
mouthing off about how they are going to patrol said community, it
|
|
makes me very nervous. Whose billyclubs will be pounding on your head
|
|
the next time you speak honestly on Usenet? Will they be the
|
|
billyclubs of the so-called CyberAngels?
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 25 Oct 1995 17:01:24 -0400
|
|
From: ACLUNATL@AOL.COM
|
|
Subject: File 6--ACLU Cyber-Liberties Update
|
|
|
|
----------------------------------------------------------------
|
|
October 25, 1995
|
|
ACLU CYBER-LIBERTIES UPDATE
|
|
A bi-weekly e-zine on cyber-liberties cases and controversies at the state
|
|
and federal level.
|
|
----------------------------------------------------------------
|
|
IN THIS ISSUE:
|
|
|
|
* Universities Censor Student Internet Use
|
|
|
|
* Conferees Named for Federal Online Indecency Legislation
|
|
|
|
* Search for Plaintiffs Continues in Suit to Challenge Online
|
|
Indecency Legislation
|
|
|
|
* Effect of Telco Bill on Universal Access
|
|
|
|
* Conferences
|
|
----------------------------------------------------------------
|
|
STATE PAGE (Legislation/Agency/Court Cases/Issues)
|
|
----------------------------------------------------------------
|
|
* Universities Censor Student Internet Use
|
|
|
|
In a knee-jerk reaction to the cyber-porn scare, many universities
|
|
around the country have begun to enact policies
|
|
to regulate student Internet use. The ACLU believes that
|
|
university censorship of student Internet usage is inconsistent
|
|
with the principles of academic freedom. In addition, state
|
|
universities are required as state institutions to uphold the
|
|
free speech guarantees of the First Amendment. The Internet
|
|
flourished for years as primarily an academic -- and uncensored --
|
|
domain. Colleges should not now cave in to the Luddites by
|
|
enacting restrictive computer usage policies.
|
|
|
|
Here are a few examples of university computer usage policies
|
|
that tread on cyber-liberties:
|
|
|
|
* After a year-long battle that made national news, Carnegie
|
|
Mellon University is expected this November to approve a policy
|
|
to censor certain Usenet newsgroups on Andrew, their flagship
|
|
computing system. Their decision to censor is based on fear that
|
|
the university could be held criminally liable under state
|
|
obscenity and harmful to minors laws for providing access to
|
|
newsgroups that "might be" obscene. The administration refused
|
|
to accept the suggestion of both the CMU Faculty Senate and the
|
|
ACLU that the computer network be categorized as a library, which
|
|
would entitle the network to an exemption from the Pennsylvania
|
|
obscenity statute.
|
|
|
|
* The University of Minnesota will not allow students to have
|
|
"offensive" content on their web sites, or even to create links
|
|
to "offensive" content elsewhere on the Internet. They have also
|
|
adopted the double standard of commercial services like America
|
|
Online and Prodigy -- despite U of Minn's explicit content
|
|
control, student web pages must include a disclaimer that the
|
|
university takes "no responsibility" for anything on the pages.
|
|
|
|
* At George Mason University, the "Responsible Use of Computing"
|
|
policy begins with the following statement: "The following rules
|
|
are not complete; just because an action is not explicitly
|
|
proscribed does not necessarily mean that it is acceptable."
|
|
(One could hardly imagine a better example of ambiguity with the
|
|
potential to chill protected speech.) The policy creates a
|
|
Security Review Panel that investigates reports of "offensive"
|
|
computer behavior. As could be predicted, the backlog of cases
|
|
before this panel is already quite long. (The head of the
|
|
Security Review Panel is none other than Dr. Peter Denning,
|
|
husband of Dr. Dorothy Denning, infamous proponent of the Clipper
|
|
Chip.)
|
|
|
|
On the bright side, students and faculty groups continue to hotly
|
|
oppose these policies when they arise, and have been instrumental
|
|
in shaping Internet usage policies to be less inhibitive of free
|
|
speech and privacy rights. The following online resources will
|
|
be useful to students and faculty faced with a draconian Internet
|
|
usage policy:
|
|
|
|
* Report on Computers at Harvard, by the Civil Liberties Union
|
|
of Harvard: _Very_ comprehensive and useful report on students'
|
|
computer usage rights on Harvard's network. Included are five
|
|
general principles for computer use, an application of the
|
|
general principles to specific aspects of computer use, and a
|
|
discussion of areas where Harvard should take immediate action to
|
|
secure students' rights on the network. Available at
|
|
gopher://fas-gopher.harvard.edu:70/00/.studorgs/.cluh/.computer_report
|
|
|
|
* Web Site on CMU Censorship Proposal: Thorough history and
|
|
database of documents on Carnegie Mellon University's battle over
|
|
online censorship. Also includes information on CMU's Coalition
|
|
for Academic Freedom of Expression (CAFE). See
|
|
http://www.cs.cmu.edu/afs/cs/usr/kcf/www/censor/
|
|
|
|
* ACLU letter and legal analysis to CMU: send a message to
|
|
infoaclu@aclu.org with "Letter to CMU" in the subject line.
|
|
|
|
The ACLU will continue to monitor university polices that
|
|
restrict online free speech and privacy rights. The ACLU urges
|
|
all students and faculty to actively work for university computer
|
|
usage policies that protect their rights. To inform the ACLU of
|
|
a computer usage policy at your school that may violate
|
|
cyber-liberties, contact Ann Beeson, ACLU, beeson@aclu.org.
|
|
----------------------------------------------------------------
|
|
FEDERAL PAGE (Congress/Agency/Court Cases)
|
|
----------------------------------------------------------------
|
|
* Conferees Named for Federal Online Indecency Legislation
|
|
|
|
Congress recently named the official conferees to the
|
|
telecommunications bill. The Senate version of the telco bill (S
|
|
652) contains the Exon Amendment, approved 84-16 by the Senate on
|
|
6/14/95. The House version of the telco bill (HR 1555) contains
|
|
the Cox/Wyden Amendment (the Internet Freedom and Family
|
|
Empowerment Act), approved 421-4 on 8/4/95. The House version
|
|
also contains Exon-like amendments to the existing federal
|
|
obscenity statute, which came out of the House Judiciary
|
|
Committee and were adopted as last-minute additions through a
|
|
larger Manager's Amendment on 8/4/95. The conference committee
|
|
is in charge of reconciling the differences between the House and
|
|
Senate versions of the telco bill, including the obviously
|
|
incompatible provisions regarding online content.
|
|
|
|
While more details are offered in the list below, the following
|
|
facts should be highlighted:
|
|
|
|
_Notable Conferees_
|
|
Senator Exon: sponsored the Exon Amendment and launched the
|
|
cyber-porn scare.
|
|
Senator Gorton: original co-sponsor of the CDA.
|
|
Representative Hyde: sponsored the inclusion of indecency
|
|
amendments to the federal obscenity laws in the House telco bill.
|
|
Representatives White, Markey, Goodlatte, Fields, and Barr:
|
|
spoke in favor of Cox/Wyden amendment on the House floor during
|
|
the telco debate.
|
|
|
|
_Some Absent Conferees_
|
|
Members of the Senate Judiciary Committee.
|
|
Senator Leahy: sponsored the study alternative to the CDA in the
|
|
Senate (Senator Leahy is a member of the Senate Judiciary
|
|
Committee).
|
|
Representatives Cox & Wyden: sponsored the Cox/Wyden "Internet
|
|
Freedom and Family Empowerment Act."
|
|
Senators who voted against the CDA.
|
|
|
|
_Other Notable Facts_
|
|
All the Senate conferees voted for the CDA.
|
|
All the House conferees voted for the Cox/Wyden amendment.
|
|
All the House conferees also voted for the Exon-like indecency
|
|
amendments to federal obscenity laws. However, they may not have
|
|
been aware of this vote because it was not a separate vote but
|
|
rather a vote to approve the Manager's amendment, which contained
|
|
many provisions unrelated to the censorship legislation.
|
|
Given the conferees named, it is highly likely that the House
|
|
leadership, including House Speaker Newt Gingrich, will play a
|
|
substantial role in the conference process.
|
|
|
|
THE LIST OF CONFEREES:
|
|
|
|
Conferees from the House were assigned to particular titles of
|
|
the telco bill; Senate conferees have jurisdiction over all
|
|
titles. The list that follows indicates the titles over which
|
|
each conferee has jurisdiction, and the conferee's relevant
|
|
committee status, party, and area of constituency.
|
|
|
|
*Title I: Development of Competitive Telecommunications Markets
|
|
(contains the Cox/Wyden amendment)
|
|
Title II: Cable Communications Competitiveness
|
|
Title III: Broadcast Communications Competitiveness
|
|
*Title IV: Effect on Other Laws
|
|
(contains the Exon Amendment and the Exon-like indecency
|
|
amendments to the federal obscenity statute)
|
|
Title V: Definitions
|
|
Title VI: Small Business Complaint Procedure
|
|
|
|
Representatives from the House:
|
|
|
|
Jurisdiction over Titles I and IV (these conferees may
|
|
participate in discussions to reconcile the conflicting online
|
|
content provisions in the Cox/Wyden Amendment, the Exon
|
|
Amendment, and the Exon-like indecency amendments to the federal
|
|
obscenity statute):
|
|
|
|
Representatives from the House Commerce Committee, in order of
|
|
rank:
|
|
|
|
Republicans:
|
|
|
|
Bliley, Thomas J. (Richmond, Virginia) all titles
|
|
Fields, Jack (Houston, Texas) all titles
|
|
Oxley, Michael G. (northwest Ohio) all titles
|
|
White, Rick (northwest Washington) all titles
|
|
Barton, Joseph (Fort Worth, Texas) I, II, IV, V
|
|
Hastert, J. Dennis (northeast Illinois) I, II, IV, V
|
|
Klug, Scott (Madison, Wisconsin) I, III, IV, V, VI
|
|
|
|
Democrats:
|
|
|
|
Dingell, John D. (southeast Michigan) all titles
|
|
Markey, Edward J. (northeast Massachusetts) all titles
|
|
Boucher, Rick (southwest Virginia) all titles
|
|
Eshoo, Anna G. (San Francisco Bay Area, California) all titles
|
|
Rush, Bobby L. (Chicago, Illinois) all titles
|
|
|
|
Representatives from the House Judiciary Committee, in order of
|
|
rank:
|
|
|
|
Republicans:
|
|
|
|
Hyde, Henry J. (Chicago, Illinois) all titles
|
|
Moorhead, Carlos J. (Los Angeles area, California) all titles
|
|
Goodlatte, Robert W. (Western Virginia) all titles
|
|
Buyer, Steve (northwest Indiana) all titles
|
|
Flanagan, Michael P. (Chicago, Illinois) all titles
|
|
|
|
Democrats:
|
|
|
|
Conyers, John (Detroit, Michigan) all titles
|
|
Schroeder, Patricia (Denver, Colorado) all titles
|
|
Bryant, John (Dallas, Texas) all titles
|
|
|
|
Title I only (these conferees may participate in discussions to
|
|
revise the Cox/Wyden Amendment, but may not participate in
|
|
discussions to reconcile the conflicting online content
|
|
provisions in the Cox/Wyden Amendment, the Exon Amendment, and
|
|
the Exon-like indecency amendments to the federal obscenity
|
|
statute):
|
|
|
|
Representatives from the House Commerce Committee, in order of
|
|
rank:
|
|
|
|
Republicans:
|
|
|
|
Paxon, Bill (western New York) I, III
|
|
Frisa, Dan (New York, New York) I, II
|
|
Stearns, Cliff (northeast Florida) I, III
|
|
|
|
Democrats:
|
|
|
|
Brown, Sherrod (northeast Ohio) I
|
|
Gordon, Bart (central Tennessee) I
|
|
Lincoln, Blanche Lambert (northeast Arkansas) I
|
|
|
|
Representatives from the House Judiciary Committee, in order of
|
|
rank:
|
|
|
|
Republicans:
|
|
|
|
Gallegly, Elton (southern California) I
|
|
Barr, Bob (western Georgia) I
|
|
Hoke, Martin R. (northeast Ohio) I
|
|
|
|
Democrats:
|
|
|
|
Berman, Howard L. (Los Angeles area, California) I
|
|
Scott, Robert C. (Richmond, Virginia) I
|
|
Lee, Sheila Jackson (Houston, Texas) I
|
|
|
|
Conferees from the Senate Commerce Committee, in order of rank
|
|
(the Senate conferees have jurisdiction over all titles):
|
|
|
|
Republicans:
|
|
|
|
Pressler, Larry (South Dakota)
|
|
Stevens, Ted (Alaska)
|
|
McCain, John (Arizona)
|
|
Burns, Conrad (Montana)
|
|
Gorton, Slade (Washington)
|
|
Lott, Trent (Mississippi)
|
|
|
|
Democrats:
|
|
|
|
Hollings, Ernest F. (South Carolina)
|
|
Inouye, Daniel K. (Hawaii)
|
|
Ford, Wendell H. (Kentucky)
|
|
Exon, James J. (Nebraska)
|
|
Rockefeller, John D. (West Virginia)
|
|
|
|
For a copy of the online indecency amendments, send a message to
|
|
infoaclu@aclu.org with "Online Indecency Amendments" in the
|
|
subject line of the message.
|
|
|
|
For more information on the legislation and what you can do to
|
|
fight it, see:
|
|
http://epic.org/free_speech
|
|
http://www.panix.com/vtw/exon
|
|
http://www.eff.org/
|
|
http://www.cdt.org/
|
|
----------------------------------------------------------------
|
|
* Search for Plaintiffs Continues in Suit to Challenge Online
|
|
Indecency Legislation
|
|
|
|
As noted above, the online community should continue to urge the
|
|
conference committee to remove the censorship provisions from the
|
|
telco bill. At the same time, a coalition has formed to organize
|
|
litigation to challenge these provisions if they are signed into
|
|
law.
|
|
|
|
The first step is the selection of plaintiffs. We need
|
|
plaintiffs who use online networks to discuss or distribute works
|
|
or art, literary classics, sex education, gay and lesbian
|
|
literature, human rights reporting, abortion information, rape
|
|
counseling, controversial political speech, or any other material
|
|
that could be deemed "indecent" and therefore illegal under the
|
|
proposed law.
|
|
|
|
We received a tremendous response to our first call for
|
|
plaintiffs, in the last issue of the ACLU Cyber-Liberties Update.
|
|
Thanks to all the organizations who contacted us. We urge other
|
|
groups to join the battle to save free speech in cyberspace.
|
|
|
|
Please contact Ann Beeson at the ACLU if your organization is
|
|
interested in being a plaintiff in this ground-breaking
|
|
litigation that will define First Amendment rights in cyberspace.
|
|
212-944-9800 x788, beeson@aclu.org.
|
|
----------------------------------------------------------------
|
|
* Effect of Telco Bill on Universal Access
|
|
|
|
In addition to the online censorship provisions in the telco
|
|
bill, the ACLU is seriously concerned about the effect of
|
|
other provisions in the bill on universal access.
|
|
|
|
For more information about the effect of the telco bill on
|
|
universal access and other public interest matters, see
|
|
the Ad Hoc Site Against the Telecommunications Bill,
|
|
co-sponsored by Center for Media Education, Computer
|
|
Professionals for Social Responsibility, Consumer
|
|
Federation of America, Electronic Privacy Information
|
|
Center, Media Access Project, People for the American
|
|
Way, and Taxpayer Assets Project, at
|
|
http://www.access.digex.net:80/~cme/bill.html.
|
|
----------------------------------------------------------------
|
|
CONFERENCES
|
|
----------------------------------------------------------------
|
|
Oct 26, 5 pm: "Law in Cyberspace: Free Expression and
|
|
Intellectual Property on the Internet," Georgetown University Law
|
|
Center, 600 New Jersey NW, Gewirz Conference Room, Gewirz Hall.
|
|
Co-sponsored by ACLU-GULC and Student Intellectual Property Law
|
|
Association. Panelists include David Post (GULC Law professor
|
|
and author of column on cyberspace law in American Lawyer); John
|
|
Podesta (GULC professor and former senior policy advisor to
|
|
President Clinton on govt information policy); and David Johnson
|
|
(co-founder of the Cyberspace Law Institute, President of Lexis
|
|
Counsel Connect).
|
|
|
|
Nov 3, 8 pm: John Perry Barlow on "Creating Cyberculture," Kane
|
|
Hall - University of Washington in Seattle. $12 ($10 students).
|
|
The lecture is part of a series, co-sponsored by the ACLU of
|
|
Washington, that explores the impact and implications of the
|
|
technology revolution on art and culture. Other cosponsors include
|
|
911 Media Arts Center, the University of Washington's New Media
|
|
Lab, and the University of Washington Technical Communications
|
|
Department.
|
|
|
|
Nov 16, 5 pm: Nadine Strossen (National President, ACLU) speaks
|
|
on "Defending Pornography: A Feminist Perspective on New
|
|
Technologies and Old-Fashioned Sex," GULC, 600 New Jersey NW,
|
|
12th Floor Ballroom, Gewirz Hall. Co-sponsored by ACLU-GULC and
|
|
the Student Bar Association Speakers Fund.
|
|
----------------------------------------------------------------
|
|
ONLINE RESOURCES FROM THE ACLU
|
|
----------------------------------------------------------------
|
|
Stay tuned for news on the ACLU's world wide web site, under
|
|
construction at http://www.aclu.org. In the meantime, you can
|
|
retrieve ACLU documents via gopher at gopher://aclu.org:6601
|
|
(forgive the less-than-updated state of our gopher -- we've
|
|
devoted all our resources to WWW construction!). If you're on
|
|
America Online, check out the live chats, auditorium events,
|
|
*very* active message boards, and complete news on civil
|
|
liberties, at keyword ACLU.
|
|
----------------------------------------------------------------
|
|
ACLU Cyber-Liberties Update
|
|
Editor: Ann Beeson (beeson@aclu.org)
|
|
American Civil Liberties Union National Office
|
|
132 West 43rd Street
|
|
New York, New York 10036
|
|
|
|
To subscribe to the ACLU Cyber-Liberties Update, send a
|
|
message to infoaclu@aclu.org with "subscribe Cyber-Liberties
|
|
Update" in the subject line of your message. To terminate
|
|
your subscription, send a message to infoaclu@aclu.org with
|
|
"unsubscribe Cyber-Liberties Update" in the subject line.
|
|
|
|
For general information about the ACLU, write to
|
|
infoaclu@aclu.org.
|
|
----------------------------------------------------------------
|
|
**PLEASE REPOST WITH HEADER INTACT**
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 5 Nov 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 5 Nov, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.87
|
|
************************************
|
|
|