985 lines
44 KiB
Plaintext
985 lines
44 KiB
Plaintext
|
|
Computer underground Digest Wed Dec 20, 1998 Volume 7 : Issue 98
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #7.98 (Wed, Dec 20, 1998)
|
|
|
|
File 1--CuD of for Holidays -- Back around January 3
|
|
File 2--REMINDER - CuD is Changing Servers - RESUBS ARE NECESSARY
|
|
File 3--Reconfiguring Power, Challenges for the 21st century
|
|
File 4--DC-ISOC Meeting - 1/18/95
|
|
File 5--AP/WP/NYT: Online Smut and Bogus Net Stats
|
|
File 6--Employees Disciplined for accessing Internet "porn"
|
|
File 7--OPEN LETTER TO NEWT GINGRICH
|
|
File 8--New authorization to put all people in a secret file...
|
|
File 9--PRIVACY WATCHDOG OUTS BIG BROTHER...
|
|
File 10-- Computer, Freedom and Privacy 1996
|
|
File 11--"The Underground Guide to Computer Security" by Alexander
|
|
File 12--SotMESC Information
|
|
File 13--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 20 Dec, 1995 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: 1--CuD of for Holidays -- Back around January 3
|
|
|
|
CuD will be taking two weeks off. We will return about Jan 3 with
|
|
Volume 8.
|
|
|
|
We will continue to read and respond to mail.
|
|
|
|
Happy Holidays, and thanks to everybody who has contributed
|
|
posts, advice, criticisms, and information over the past
|
|
year.
|
|
|
|
Jim Thomas and Gordon Meyer
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 16 Dec, 1995 16:19:32 CST
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: 2--REMINDER - CuD is Changing Servers - RESUBS ARE NECESSARY
|
|
|
|
** CuD IS CHANGING SERVERS **
|
|
|
|
In about mid-January, Cu Digest will be moving to a new server
|
|
at weber.ucsd.edu. We're following the strong consensus of
|
|
readers and requiring that, to continue to receive CuD after
|
|
mid-January, you must RE-SUBSCRIBE.
|
|
|
|
Although the move will not take place for a few weeks, you can enter
|
|
your subscribtion before then, so WE STRONGLY URGE YOU TO SUB NOW.
|
|
|
|
Re-subbing is easy. Just send a message with this in the
|
|
"Subject:" line
|
|
SUBSCRIBE CU-DIGEST
|
|
|
|
send it to:
|
|
|
|
cu-digest-request@weber.ucsd.edu
|
|
|
|
Issues will still be sent out from the older server for a few weeks,
|
|
so the strategy is to collect the resubs first, and then make the
|
|
transition.
|
|
|
|
If you prefer to access CuD from Usenet, use
|
|
comp.society.cu-digest
|
|
|
|
If you prefer archives, you can use the ftp/www site at
|
|
ftp.eff.org (or www.eff.org) or the CuD archives at:
|
|
http://www.soci.niu.edu/~cudigest.
|
|
|
|
We also hope to have a mail archive set up soon as well.
|
|
|
|
You can still contact the moderators at:
|
|
cudigest@sun.soci.niu.edu
|
|
or tk0jut2@mvs.cso.niu.edu
|
|
|
|
Please *DO NOT* send inquiries to the server at UIUC.
|
|
|
|
Jim and Gordon
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 13 Nov 1995 12:08:05 -0800
|
|
From: Gilberto Arriaza <arriaza@UCLINK2.BERKELEY.EDU>
|
|
Subject: 3--Reconfiguring Power, Challenges for the 21st century
|
|
|
|
Dear colleagues: Here is a Call for Papers you might be interested.
|
|
Gilberto Arriaza. School of Education, UC Berkeley
|
|
|
|
|
|
Journal of Social Justice
|
|
|
|
Reconfiguring Power, Challenges for the 21st century
|
|
Recent backlash against immigrants and affirmative action can be seen as
|
|
part of a larger struggle over resources, national identity, and more
|
|
generally (re)configurations of power in the United States in the twenty
|
|
first century. Demographic trends continue to point to greater diversity
|
|
in the U.S. population, however there is growing resistance to the
|
|
adjustments which must be made in society generally, and in the
|
|
workplace and social institutions (i.e. education, the arts, political
|
|
parties) in particular, to accommodate those who have historically and
|
|
who are presently excluded. Already the debates which have emerged over
|
|
these issues differ in several important ways from the manifestations of
|
|
social conflict and polarization that occurred in the latter part of the
|
|
twentieth century.
|
|
|
|
This issue of the Journal of Social Justice is dedicated to exploring the
|
|
contours and substance of these new struggles. In addition to
|
|
documenting how these conflicts are being played out in particular social
|
|
and cultural contexts, contributors will analyze the underlying social
|
|
and cultural forces and interests which influence how issues are viewed,
|
|
and how social action and discourse are affected. Beyond analyzing the
|
|
content and character of those conflicts, contributors are encouraged to
|
|
illuminate possibilities of influencing how they can be resolved such
|
|
that greater social justice is achieved.
|
|
|
|
Topics for this issue may include::
|
|
Issues of immigration, cultural identity and the nation state.
|
|
Dismantling of the welfare state, social implications.
|
|
Schools and the meaning of citizenship, national identity and cultures,
|
|
and the access to power.
|
|
Obstacles to Gay, Lesbian and bisexual rights.
|
|
Crime, violence and social policy.
|
|
Language, language rights and the dynamics of power.
|
|
Gender equity, reproductive rights.
|
|
Local impact of macro level economic and political change.
|
|
Racial and ethnic conflict.
|
|
|
|
Review: Each submission will be read by a committee of two members. In
|
|
case a disagreement among them arises, the editors will call for the
|
|
opinion of a third member..
|
|
|
|
Format: Submit three hard copies of a 12 size font, double spaced of no
|
|
more than thirty 8 X 11.5 pages. This includes references. Each paper
|
|
must have an abstract of no more than one, double space, 8 X 11.5 page.
|
|
On a separate card of 3 X 5 (approximately) include title, your name,
|
|
affiliation, local address, telephone numbers, fax and electronic mail,
|
|
to contact you.
|
|
|
|
Deadline: Submission must be in our office by Monday, May 6th, 1996. No
|
|
contributions will be accepted after this date. The accepted papers will
|
|
be part of a panel for AERA '97.
|
|
|
|
Address: c/o Professor Pedro Noguera
|
|
University of California at Berkeley
|
|
School of Education
|
|
Social and Cultural Studies
|
|
4501 Tolman Hall
|
|
Berkeley, 94720
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 11 Dec 1995 01:26:25 -0500 (EST)
|
|
From: russ@NAVIGATORS.COM(Russ Haynal)
|
|
Subject: 4--DC-ISOC Meeting - 1/18/95
|
|
|
|
The Washington DC Chapter of the Internet Society (DC-ISOC)
|
|
announces its next event, co-sponsored by the Office of the Senior
|
|
Information Officer of the Smithsonian Institution.
|
|
|
|
"New Year, Fresh Look: The Internet and Legislation"
|
|
|
|
When: Thursday, January 18, 1996
|
|
7:00 - 9:00 pm
|
|
|
|
Where: Eugene and Agnes E. Meyer Auditorium
|
|
Freer Gallery of Art
|
|
Independence Ave and 12 St., S.W.
|
|
Washington, D.C.
|
|
|
|
As the title suggests, this meeting will discuss how the Internet and
|
|
Legislation will continue to "Interact" Please mark this date on your
|
|
calendar.
|
|
A follow-up meeting announcement with additional details (speakers, topics,
|
|
etc.) will be made in January.
|
|
|
|
On a related note: As you may have heard, on Wednesday December 6, 1995,
|
|
the House Conference Committee on Telecommunications Reform approved
|
|
legislation which has been a topic of debate throughout the Internet.
|
|
|
|
Several organizations are sponsoring "A NATIONAL INTERNET DAY OF PROTEST"
|
|
on Tuesday, December 12. Rather than re-distribute that announcement in
|
|
this forum, anyone interested in this protest, or the details of the
|
|
legislation can visit several web sites such as:
|
|
|
|
Voters Telecommunications Watch (http://www.vtw.org/)
|
|
Electronic Frontier Foundation (http://www.eff.org/)
|
|
|
|
-------------- Meeting Location Information ---------------------------
|
|
|
|
This event will be held in the Freer Gallery of Art in Washington, D.C., e
|
|
northeast corner of Independence Avenue and 12th St., SW. Use the entrance
|
|
on the Independence Avenue side of the building (there is a street-level
|
|
wheelchair entrance as well).
|
|
|
|
Metro:
|
|
Smithsonian metro stop on the Blue or Orange lines.
|
|
Take the Independence Ave./Holocaust museum exit. The
|
|
Freer Gallery is diagonally across the street.
|
|
|
|
Street parking is available after 6:30 pm on the Mall,
|
|
on Independence Avenue and on l'Enfant Promenade.
|
|
|
|
---------------------- About DC-ISOC ---------------------------
|
|
|
|
DC-ISOC was formed to meet unique needs of Washington, DC-area Internet
|
|
planners, builders, and users, and to help represent the Internet to the
|
|
U.S. government. (For additional information visit:
|
|
http://www.dcisoc.org/about.html)
|
|
|
|
Individuals who are interested in becoming members of DC-ISOC can do so by
|
|
joining the Internet Society. See their web site at http://www.isoc.org
|
|
(or call 703-648-9888) for more information
|
|
|
|
Feel free to forward this announcement to anyone who might be interested.
|
|
If you would like to receive future DC-ISOC announcements directly (i.e.
|
|
this message was forwarded to you), please register with DC-ISOC at
|
|
http://www.dcisoc.org/register.html
|
|
--------------------------------------------------------------------------
|
|
|
|
Our last several meetings have included "door prizes" for attendees.
|
|
Please contact me if your organization would like to donate any
|
|
Internet-related items for the meeting.
|
|
|
|
|
|
|
|
|
|
______________________________________________________________
|
|
Russ Haynal - Internet Consultant, Instructor, Author, Speaker
|
|
"Helping organizations gain the most benefit from the Internet"
|
|
E-Mail: russ@navigators.com Business: 703-729-1757
|
|
http://www.clark.net/pub/rhaynal
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 18 Dec 1995 18:31:01 -0500 (EST)
|
|
From: "Declan B. McCullagh" <declan+@CMU.EDU>
|
|
Subject: 5--AP/WP/NYT: Online Smut and Bogus Net Stats
|
|
|
|
December 15, 1995
|
|
|
|
RICHLAND, Wash. (AP) -- Nearly 100 employees at a federally
|
|
funded laboratory are being disciplined for using their work
|
|
computers to access sexually explicit Internet sites, officials
|
|
said Friday.
|
|
Pacific Northwest National Laboratory suspended the 21 workers
|
|
who used the sites most frequently. Another 77 workers will receive
|
|
written reprimands...
|
|
The usage was discovered when Battelle Memorial Institute, which
|
|
operates the lab, was trying to determine its Internet capacity for
|
|
a new building. The sexually explicit addresses showed up on
|
|
Internet records.
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
December 15, 1995
|
|
|
|
HARTFORD, Conn. (AP) -- A city man has pleaded guilty to a
|
|
federal child pornography charge involving pictures transmitted on
|
|
the American Online service.
|
|
David H. Gillon, 43, pleaded guilty to interstate distribution
|
|
of child pornography in U.S. District Court on Thursday. He
|
|
admitted to transmitting a pornographic picture over America Online
|
|
in August.
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
New York Times [Forwarded]
|
|
December 18, 1995
|
|
|
|
"The prospect of Internet censorship raises troubling
|
|
issues for business." Denise Caruso's column.
|
|
|
|
While most of the outcry has raised valid concerns about
|
|
the First Amendment and civil liberties, little of the
|
|
discussion has focused on how censorship could cripple
|
|
much of the Internet's commercial potential. "This
|
|
proposal will have more than a chilling effect," Ms.
|
|
Fulton said. "It may well mean a cold death for everyone
|
|
except very rich and very cautious media companies."
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
The Washington Post
|
|
December 18, 1995
|
|
Editorial
|
|
|
|
How Many Netheads?
|
|
|
|
IT SOUNDS like a minor statistical dispute, but one whose results take
|
|
on more significance as claims and counterclaims proliferate about the
|
|
Internet and its importance. How many people are actually signing on?
|
|
A survey done for the Nielsen Co. earlier this fall found surprisingly
|
|
high numbers of net and e-mail users -- about 24 million "affluent"
|
|
adult users in the United States and Canada alone. But one of that
|
|
survey's academic advisers says the data were processed wrongly, and
|
|
the number should be more like 10 million. It seems that serious and
|
|
habitual Internet use will remain a difficult activity to track with
|
|
any certainty.
|
|
|
|
Vanderbilt University business Prof. Donna L. Hoffman says the
|
|
surveyors made some statistical miscalls in characterizing the
|
|
technical comfort level of the people who were asked to answer
|
|
questions about their Internet use. Thus, she argued in criticism
|
|
first reported in the New York Times, those less likely to use or own
|
|
computers ended up dropping out of the sample, skewing the attempts to
|
|
generalize to the larger population. But the mathematical arguments
|
|
here are less interesting than the chasm they point to in discussions
|
|
of the Internet generally. The distance between life as it looks to
|
|
users "on-line" and life as it looks elsewhere is hard to measure and
|
|
in some cases hard to see.
|
|
|
|
You could see this gap, for instance, in the efforts Internet users
|
|
have made in recent weeks to express their opposition to the
|
|
restrictive Exon provisions concerning pornography in cyberspace. A
|
|
much-touted "day of protest" on-line could cause a Net denizen to
|
|
believe that the entire sentient world was rocked by storms of
|
|
outrage, while those who don't habitually sign on or don't know how to
|
|
do so -- including, in all likelihood, many lawmakers -- could be
|
|
unaware of the outcry. Reports have multiplied of the initial
|
|
fascination and obsessive focus that the possibilities of on-screen
|
|
contact produce in so-called "newbies," not to mention the tendency of
|
|
some habitual net-users to refer dismissively to everything outside
|
|
the screen as mere "RL," or Real Life.
|
|
|
|
Most predictions of the Internet's usefulness and importance rely on
|
|
the assumption -- again borne out in most accounts -- that this
|
|
initial intensity wanes for most users and that e-mail, the World Wide
|
|
Web and other Internet functions will end up as a broad, everyday tool
|
|
rather than the province of an insular or obsessive subculture. That
|
|
era of wide and ordinary usage, though, may creep up and be hard to
|
|
measure until it has truly arrived.
|
|
|
|
------------------------------
|
|
|
|
From: hsu@VA.PUBNIX.COM(Dave Hsu)
|
|
Date: Tue, 19 Dec 1995 18:26:17 -0500
|
|
Subject: 6--Employees Disciplined for accessing Internet "porn"
|
|
|
|
In Cu-D 7.97, galkin@aol.com notes:
|
|
>Rather than trying to define the right to privacy at this point, it is better
|
|
>to look at some circumstances where such a right might arise:
|
|
...
|
|
>(2) Where government agencies or private entities are lawfully collecting
|
|
>personal data, but more data is collected than is needed to accomplish the
|
|
>purpose of the data collection. The collection of this excess data might
|
|
>amount to an invasion of privacy, even though the data is never misused.
|
|
|
|
Not having seen any mention of this yet in the Digest (and
|
|
understanding the caveat that not all discussions so float up) I bring
|
|
to your attention a story buried in the "A" section of Sunday's
|
|
Washington Post on a recent disciplinary action at Pacific Northwest
|
|
Laboratories taken against several dozen employees accused of using
|
|
government resources to visit "pornographic" sites.
|
|
|
|
As the story was rather brief, I'll sum up to say that Battelle, which
|
|
operates the laboratories, claims to have been measuring Internet
|
|
usage at the facility to estimate new capacity requirements for some
|
|
new space when they found these accesses in their logs. Presumably,
|
|
their investigation was comprehensive, as the Post article mentions
|
|
that the twenty or so biggest users were singled out for additional
|
|
action. Ignoring the ethical question of misappropriating their
|
|
employer's resources, which I believe is not in dispute, I ask if
|
|
anyone has seen a report with more detail about the accounting methods
|
|
used, and the ethical problems with selective these particular
|
|
employees apparently solely on the basis of the _content_ of the sites
|
|
visited.
|
|
|
|
[As I am not a list member, I will watch the Digest for any ensuing
|
|
discussion]
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 17 Dec 1995 20:38:38 -0800
|
|
From: Michael Hollomon, Jr. <mhollomo@ix.netcom.com>
|
|
Subject: 7--OPEN LETTER TO NEWT GINGRICH
|
|
|
|
OPEN LETTER TO NEWT GINGRICH, SPEAKER OF THE HOUSE:
|
|
|
|
Dear Mr. Speaker:
|
|
|
|
I know that congress is currently debating legislation aimed at protecting
|
|
children from pornography on the Internet. I feel it my duty as an American
|
|
to make my views known to someone who is in a position to have an impact on
|
|
this potentially far-reaching issue.
|
|
|
|
First of all I would like to make it clear to you that I am _not_ a
|
|
pornographer. I neither produce nor nor indulge in the use of pornography.
|
|
In fact, if it is relevant to the issue at all, I am a Bible believing
|
|
Christian who feels that pornography is detrimental not only to America's
|
|
children, but also to the men who choose consume it. I think it would be a
|
|
wonderful thing to be able to insure that my children are not exposed to
|
|
obscene or pornographic material, by computer or by any other means.
|
|
|
|
However, I cannot lend support to any of the legislation currently being
|
|
considered by Congress to censor communication on the Internet, obscene or
|
|
otherwise. I will forewarn you that this correspondence is going to be
|
|
rather lengthy, but I beg your indulgence and I hope that you will take time
|
|
from your busy schedule to hear me out.
|
|
|
|
By way of a very brief history, the Internet is the first ever
|
|
communications technology created by "the people" for "the people." It's
|
|
structure and protocols were created and implemented by diverse groups of
|
|
people for the purpose of sharing materials and resources and making
|
|
information freely available to other persons on the inter network. It is
|
|
the result of one of the rare _truly_ democratic dynamics ever encountered
|
|
on such a large scale.
|
|
|
|
There has never been any form of centralized control over the Internet. The
|
|
policing of the Internet has always been carried out by local systems
|
|
administrators ("sysadmins"). However this "police power" was exercised by
|
|
the sysadmin only over her/his own local system. No one sysadmin had the
|
|
authority to monitor content or activity on any system on the Internet, save
|
|
her/his own. Admittedly, the Internet has a rather anarchic structure, but
|
|
it is one that has worked quite well and, in the absence of any centralized
|
|
regulation whatsoever, the Internet has grown to the incredibly useful,
|
|
informative and entertaining concentration of digital information and
|
|
resources that it is today.
|
|
|
|
As is to be expected with any frontier devoid of a central governing and
|
|
police authority, there have arisen some areas on the Internet that are not
|
|
suitable for children. In fact, it could easily be argued that these
|
|
"places" on the 'net are not suitable for responsible _adults_. While
|
|
pornography on the Internet is the topic which gets most of the press, and
|
|
therefore public attention, there are several other types of information
|
|
available on the 'net which many Americans would find offensive. Examples
|
|
include inflammatory speech by members or aficionados of this or that hate
|
|
group, and information of a more palpably dangerous ilk (i.e., how to build
|
|
explosives and other weaponry).
|
|
|
|
Should any of this type of information be accessible to our children? The
|
|
answer is an obvious "no." Should this information be accessed by
|
|
consenting adults? Perhaps not. But then more than a few "reasonable"
|
|
adults would argue, quite persuasively, that they should be entitled to
|
|
access any public information that they choose. My point is simply that I
|
|
heartily agree with anyone who takes the position that our children should
|
|
be shielded from such unsavory material.
|
|
|
|
Why then do I not support the currently proposed legislation to censor this
|
|
type of material on the Internet? My reasons are several:
|
|
|
|
1. NOT EVERYONE ON THE INTERNET IS SUBJECT TO U.S. LAW
|
|
|
|
As you and your colleagues no doubt realize, the Internet is a truly global
|
|
phenomenon. People access the Internet from over a hundred different
|
|
nations and from virtually every continent around the world. U.S.
|
|
legislation to censor the Internet would be equivalent to Canadian
|
|
legislation regulating what I as an American can and cannot say in an
|
|
international telephone call from the U.S. to someone in Canada, or even in
|
|
a telephone call from California to Alaska that happened to use lines which
|
|
cross Canadian territory. Stated simply, there would be a very sticky
|
|
problem of personal jurisdiction in attempting to enforce such legislation
|
|
upon a foreign violator.
|
|
|
|
How can the U.S. prevent someone in Finland from posting a pornographic
|
|
picture to any given Usenet newsgroup? The simple truth is that, no matter
|
|
how repulsive the post may be to our sensibilities, there is simply _no_
|
|
workable way to prevent foreigners from posting offensive material to the
|
|
international Internet. And, once material is posted, wherever from, there
|
|
is nothing to prevent anyone in the U.S., child or adult, who has Internet
|
|
access from accessing that material. It has often been stated that the
|
|
Internet interprets censorship as damage and routes around it. This
|
|
resilience to blockage was intentionally built into the Internet by its
|
|
early U.S. military-backed developers. The idea was to develop a
|
|
communications technology that would be virtually impervious to a large
|
|
scale nuclear strike. This fact may be contemporarily seen as unfortunate,
|
|
but the fact nonetheless remains.
|
|
|
|
2. WIDESPREAD FLOUTING OF UNENFORCEABLE LAW WILL ENGENDER DISRESPECT FOR
|
|
THE LAW
|
|
|
|
Because of the unenforceability of censorship legislation on foreign
|
|
violators, any such legislation will have little or no effect on the type of
|
|
information contained on the Internet. The only real change that such
|
|
legislation might have would be that offensive material would only be, or
|
|
appear to be, posted from foreign sources. Law abiding Americans wouldn't
|
|
post illegal material. But there would be nothing preventing Americans from
|
|
accessing illegal material posted by foreigners.
|
|
|
|
For this reason, any U.S. legislation which attempts to regulate the content
|
|
of the Internet will have an inherent loop-hole in it large enough "to drive
|
|
a truck through." A loop-hole so large, in fact, as to subsume the
|
|
underlying legislation. The routine disobedience (or technical avoidance)
|
|
of such legislation would result in our children being no more shielded from
|
|
harmful material than they would be in the absence of any such legislation.
|
|
This would no doubt lead to the kind of disregard and disrespect for
|
|
legislation (and legislators) which followed the advent of the prohibition
|
|
of alcohol in this country (legislation that ultimately the government had
|
|
to concede was completely unworkable). Do we really need an "information
|
|
prohibition?" If it passes, do you want to be responsible for it?
|
|
|
|
3. UNREASONABLE "CHILL" ON PROTECTED SPEECH
|
|
|
|
Even assuming that it was possible to legislatively control content
|
|
available on the Internet (which I firmly believe it is not), at what cost
|
|
would such control come? For fear of subjecting themselves to criminal
|
|
liability for the offending posts of their members or customers, every
|
|
sysadmin, BBS system operator ("sysop"), online service and Internet service
|
|
provider, would have to become a de facto police agent, thoroughly
|
|
inspecting every piece of email or other electronic correspondence made.
|
|
This would effectively mean the end of any semblance of digital privacy for
|
|
law abiding Americans on the 'net.
|
|
|
|
There are of course myriad ways to avoid such eavesdropping (i.e. strong
|
|
encryption, foreign anonymous remailers and the like), however in order for
|
|
censoring legislation to have any meaning whatsoever I would assume that the
|
|
legislature would outlaw these measures as well. Then only criminals would
|
|
be able to enjoy private electronic communications in America. (The gun
|
|
control slogan comes to mind: "Make it a crime to own a gun and only the
|
|
criminals will have guns.")
|
|
|
|
The Federal courts have routinely struck down laws as unconstitutional where
|
|
the legislation's regulation of unprotected speech affects an unreasonable
|
|
"chill" on constitutionally protected free speech. Knowing that _every_
|
|
electronic communication that I send will be read by any number of
|
|
intervening systems administrators will without doubt make me much more
|
|
circumspect about my electronic communications. No longer would I feel free
|
|
to discuss matters of any personal nature, much less matters concerning
|
|
confidential business information. In fact _every_ electronic communication
|
|
would have to be considered by the sender as an open letter to the public.
|
|
To describe such a scenario as having a chill upon free speech would, I
|
|
think, be a definite understatement.
|
|
|
|
4. THE U.S. MAY WELL FORFEIT ITS ENVIABLE POSITION IN THE FOREFRONT OF
|
|
THE INFORMATION REVOLUTION
|
|
|
|
The Internet was originated in America by Americans. The present Internet
|
|
is a direct legatee of the ARPAnet developed in the U.S. by the Advanced
|
|
Research Projects Agency. *Almost 3/4 of all Internet hosts today are
|
|
located in North America (the _great_ majority of those are certainly in the
|
|
U.S.). Many of the technological and social innovations which make the
|
|
Internet the phenomenal success that it is were implemented by American free
|
|
thinkers who were allowed to think freely with few, if any, constraints upon
|
|
their ideas save the effectiveness of the ideas themselves. The greatest
|
|
financial beneficiaries of the success of the Internet to date have been
|
|
U.S. companies providing Internet access, advertising and/or doing business
|
|
on the Internet.
|
|
|
|
Once Congress starts imposing legislative restrictions on electronic
|
|
information, the only people which will be hindered by those restrictions
|
|
will be citizens of the U.S. This will leave citizens of foreign countries
|
|
in potentially advantageous competitive positions to U.S. citizens. The
|
|
U.S. just might go from being the country to emulate in information
|
|
technology to being the country to surpass. Granted, such results are not
|
|
likely solely from a single piece of obscenity legislation. But one bad
|
|
law, more times than not, leads to another. It may only take a single
|
|
ill-advised law to start our esteemed Congress on such a precarious trend.
|
|
|
|
|
|
Having said all of the foregoing, are there any workable solutions to
|
|
protecting children from offensive material over the Internet? In fact,
|
|
there are. At this point, let me state my position that, among the several
|
|
responsibilities that come with being a parent, is the responsibility to
|
|
monitor the materials and information accessible to your children. The
|
|
information available to children should, without question, be regulated.
|
|
That regulation, however, should be performed by parents and guardians,
|
|
_not_ by Congress. I realize that there are many "computer illiterate"
|
|
parents who have technologically knowledgeable children. However, there is
|
|
help even for these parents in regulating what their children experience online.
|
|
|
|
Most of the major online services have restrictions of some sort on the
|
|
seamier sites available on the internet and/or other safeguards which allow
|
|
parents to control the types of material which their children can access
|
|
online. In addition, there are other resources, apart from the major
|
|
commercial online services, which assist parents in this regard. There are
|
|
software and commercial services which inform parents of unsuitable
|
|
materials available on the Internet and assist parents with Internet
|
|
accounts in restricting unauthorized access to those areas by their children.
|
|
|
|
Of course, there will always be those parents who are intimidated by the
|
|
technology, or simply don't want to take the time to understand it. These
|
|
parents will certainly sleep a little easier knowing that Congress is
|
|
stepping in and attempting to protect their children from obscene material.
|
|
These people, in my opinion, are inexcusably lazy parents who, if they are
|
|
not going to monitor their children's online communications, should _not_
|
|
permit their children to go online.
|
|
|
|
In closing, I would strongly urge that you and the other members of Congress
|
|
look closely into the several available alternative options of regulating
|
|
online materials available to children, as Internet censorship simply will
|
|
not work. Thank you for your time.
|
|
|
|
|
|
|
|
*Wired magazine, issue 3.12, page 70.
|
|
|
|
------------------------------
|
|
|
|
Date: 21 Nov 1995 08:49:06 GMT
|
|
From: JeanBernard Condat <JeanBernard_Condat@eMail.FranceNet.fr>
|
|
Subject: 8--New authorization to put all people in a secret file...
|
|
|
|
New official authorisation to put all people in a secret file...
|
|
|
|
November 16th, 1995: In middle of the strike period in France, the
|
|
Ministry of the Army publish a text dated November 9th giving the
|
|
authorisation to the Army to put all available data in local files
|
|
for future uses. The available data mind political, philosophical,
|
|
religion... opinions of a person called "terrorist" or "victim of a
|
|
terrorist." :-|]
|
|
|
|
After some hard reactions of certain kinds of persons in France, the
|
|
French Governmement announce Decembre 16th the complete suppression
|
|
of this text. Note that the CNIL (Commission Nationale Infortique et
|
|
Libertes) formed to look at abusive use of laws... have given a
|
|
positive authorisation to publish the following text...
|
|
|
|
UNCREDIBLE !
|
|
|
|
> Decret n%95-1211 du 9 novembre 1995 portant application des dispositions
|
|
> de l'article 31 de la loi n%78-17 du 6 janvier 1978 aux fichiers mis en
|
|
oeuvre
|
|
> par la direction generale de la gendarmerie nationale.
|
|
>
|
|
> Le Premier Ministre,
|
|
> Sur le rapport du ministre de la defense,
|
|
>
|
|
> (...)
|
|
>
|
|
> Vu l'avis conforme de la Commission nationale de l'informatique et des
|
|
libertes
|
|
> en date du 25 avril 1995 ;
|
|
> Le Conseil d'Etat (Section des finances) entendu,
|
|
>
|
|
> Decrete :
|
|
>
|
|
> Art. 1er. - Pour l'exercice de sa mission, la gendarmerie nationale est
|
|
autorisee a
|
|
> collecter, conserver et traiter, dans les fichiers regionaux, les
|
|
informations nominatives
|
|
> qui, etant relatives aux personnes majeures enumerees a l'alinea ci-apres,
|
|
> mentionnent les signes physiques particuliers, objectifs et inalterables
|
|
comme
|
|
> elements de signalement, ou font apparaitre, directement ou indirectement,
|
|
les opinions
|
|
> politiques, philosophiques ou religieuses ainsi que les appartenances
|
|
syndicales de ces
|
|
> personnes.
|
|
>
|
|
>La collecte, la conservation et le traitement des informations enoncees a
|
|
l'alinea precedent
|
|
> ne peuvent concerner que :
|
|
>
|
|
> 1-- Les personnes qui peuvent, en raison de leur activite individuelle et
|
|
collective, porter
|
|
> atteinte a la surete de l'Etat ou a la securite publique par le recours ou
|
|
le soutien actif
|
|
> apporte a des actes de terrorisme definis aux articles 421-1 et 421-2 du
|
|
Code Penal ;
|
|
>
|
|
> 2-- Celles qui entretiennent ou sont entretenu avec elles des relations
|
|
durables et non fortuites ;
|
|
>
|
|
> 3-- Les personnes qui sont victimes d'actes de terrorisme ou paraissent
|
|
etre particulierement
|
|
> exposees a de tels actes.
|
|
>
|
|
> (...)
|
|
> Fait a Paris, le 9 novembre 1995
|
|
>
|
|
> Par le Premier Ministre ALAIN JUPPE
|
|
>
|
|
> Le ministre de la defense,
|
|
|
|
> CHARLES MILLON
|
|
|
|
------------------------------
|
|
|
|
Date: 4 Dec 1995 10:33:51 -0500
|
|
From: "Dave Banisar" <banisar@EPIC.ORG>
|
|
Subject: 9--PRIVACY WATCHDOG OUTS BIG BROTHER...
|
|
|
|
MEDIA RELEASE
|
|
|
|
Contact: Simon Davies, Privacy International
|
|
Davies@privint.demon.co.uk
|
|
|
|
PRIVACY WATCHDOG OUTS BIG BROTHER COMPANIES
|
|
|
|
New report uncovers a massive international surveillance trade
|
|
funded by the arms industry and led by the UK
|
|
|
|
On Monday 4 December, Privacy International will publish Big
|
|
Brother Incorporated, a 150 page report which investigates the
|
|
global trade in repressive surveillance technologies. The report, to
|
|
be published on several Web sites on the Internet, shows how
|
|
technology companies in Europe and North America provide the
|
|
surveillance infrastructure for the secret police and military
|
|
authorities in such countries as China, Indonesia, Nigeria, Angola,
|
|
Rwanda and Guatemala
|
|
|
|
The reports primary concern is the flow of sophisticated
|
|
computer-based technology from developed countries to
|
|
developing countries - and particularly to non-democratic regimes.
|
|
The report demonstrates how these companies have strengthened
|
|
the lethal authority of the world's most dangerous regimes.
|
|
|
|
The report lists the companies, their directors, products and exports.
|
|
In each case, source material is meticulously cited.
|
|
Privacy International is publishing the report in digital form in
|
|
several sites on the Internet to ensure its accessability by interested
|
|
parties anywhere in the world.
|
|
|
|
Surveillance technologies are defined as technologies which can
|
|
monitor, track and assess the movements, activities and
|
|
communications of individuals. More than 80 British companies are
|
|
involved, making the UK the world leader in this field. Other
|
|
countries, in order of significance, are the United States, France,
|
|
Israel, the Netherlands and Germany.
|
|
|
|
_Big Brother Incorporated_ is the first investigation ever conducted
|
|
into this trade. Privacy International intends to update the report
|
|
from time to time using trade fair documents and leaked information
|
|
from whistleblowers.
|
|
|
|
The surveillance trade is almost indistinguishable from the arms
|
|
trade. More than seventy per cent of companies manufacturing and
|
|
exporting surveillance technology also export arms, chemical
|
|
weapons, or military hardware. Surveillance is a crucial element
|
|
for the maintenance of any non-democratic infrastructure, and is an
|
|
important activity in the pursuit of intelligence and political control.
|
|
Many countries in transition to democracy also rely heavily on
|
|
surveillance to satisfy the demands of police and military. The
|
|
technology described in the report makes possible mass
|
|
surveillance of populations. In the past, regimes relied on targeted
|
|
surveillance.
|
|
|
|
Much of this technology is used to track the activities of dissidents,
|
|
human rights activists, journalists, student leaders, minorities, trade
|
|
union leaders, and political opponents. It is also useful for
|
|
monitoring larger sectors of the population. With this technology,
|
|
the financial transactions, communications activity and geographic
|
|
movements of millions of people can be captured, analysed and
|
|
transmitted cheaply and efficiently.
|
|
|
|
Western surveillance technology is providing invaluable support to
|
|
military and totalitarian authorities throughout the world. One
|
|
British computer firm provided the technological infrastructure to
|
|
establish the South African automated Passbook system, upon
|
|
which much of the functioning of the Apartheid regime British
|
|
surveillance cameras were used in Tianamen Square against the
|
|
pro-democracy demonstrators. In the 1980s, an Israeli company
|
|
developed and exported the technology for the computerised death
|
|
list used by the Guatemalan police. Two British companies
|
|
routinely provide the Chinese authorities with bugging equipment
|
|
and telephone tapping devices.
|
|
|
|
Privacy International was formed in 1990 as a non-government, non-profit
|
|
organisation. It brings together privacy experts, human rights advocates and
|
|
technology experts in more than 40 countries, and works toward the goal of
|
|
promoting privacy issues worldwide. The organisation acts as an impartial
|
|
watchdog
|
|
on surveillance activities by governments and corporations.
|
|
|
|
For further information or interview, contact Simon
|
|
Davies in London at davies@privint.demon.co.uk. The address of the web
|
|
site is http://www.privacy.org/pi/reports/big_bro/
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 13 Dec 1995 00:32:02 -0600
|
|
From: Stephen Smith <libertas@COMP.UARK.EDU>
|
|
Subject: 10-- Computer, Freedom and Privacy 1996
|
|
|
|
****************************************
|
|
Please redistribute widely
|
|
****************************************
|
|
|
|
The Sixth Conference on Computers, Freedom, and Privacy will take
|
|
place at the Massachusetts Institute of Technology on March 27-30,
|
|
1996. CFP96 is hosted by MIT and by the World Wide Web Consortium.
|
|
|
|
You can register for CFP96 by US Mail, by fax, or via the World Wide
|
|
Web.
|
|
|
|
Conference attendance will be limited. Due to the enormous public
|
|
interest in CFP issues over the past year, we encourage you to
|
|
register early.
|
|
|
|
SPECIAL NOTE TO STUDENTS: There are a limited number of places
|
|
available at a special student rate. These will be allotted on a
|
|
first-come first-served basis, so register as soon as possible.
|
|
|
|
For more information, see the CFP96 Web page at
|
|
|
|
http://web.mit.edu/cfp96
|
|
|
|
or send a blank email message to
|
|
|
|
cfp96-info@mit.edu
|
|
|
|
Since its inception in 1991, the series of CFP conferences has brought
|
|
together experts and advocates from the fields of computer science,
|
|
law, business, public policy, law enforcement, government, and many
|
|
other areas to explore how computer and telecommunications
|
|
technologies are affecting freedom and privacy.
|
|
|
|
Events planned for this year's conference include:
|
|
|
|
- Federal prosecutors square off against civil-liberties lawyers
|
|
in a mock Supreme Court test of the "Cryptography Control Act of
|
|
1996", which criminalizes non-escrowed encryption.
|
|
|
|
- Authors Pat Cadigan, Tom Maddox, Bruce Sterling,
|
|
and Vernor Vinge divine the future of privacy.
|
|
|
|
- College administrators, students, lawyers, and journalists
|
|
role-play scenarios that plumb the limits of on-line expression
|
|
on campus networks.
|
|
|
|
- Panels on international issues in privacy and encryption; on the
|
|
struggle to control controversial content on the Internet; on
|
|
tensions between copyright of digital information and freedom of
|
|
expression; on threats posed by electronic money to law
|
|
enforcement, privacy, and freedom; on mass communication versus
|
|
mass media.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 14 Dec 1995 11:45:36 EST
|
|
From: "Rob Slade, the doting grandpa of Ryan Hoff"
|
|
Subject: 11--"The Underground Guide to Computer Security" by Alexander
|
|
|
|
BKUNCMSC.RVW 951129
|
|
|
|
"The Underground Guide to Computer Security", Michael Alexander, 1996, 0-201-
|
|
48918-X, U$19.95/C$27.00
|
|
%A Michael Alexander
|
|
%C 1 Jacob Way, Reading, MA 01867-9984
|
|
%D 1996
|
|
%G 0-201-48918-X
|
|
%I Addison-Wesley Publishing Co.
|
|
%O U$19.95/C$27.00 416-447-5101 fax: 416-443-0948 markj@aw.com
|
|
%O bkexpress@aw.com 800-822-6339 617-944-3700 Fax: (617) 944-7273
|
|
%P 239
|
|
%T "The Underground Guide to Computer Security"
|
|
|
|
|
|
This book is intended to address the security needs of personal (or
|
|
desktop) computers, and is one of the few that does. The content
|
|
addresses those vulnerabilities which *do* plague workstations, and
|
|
is generally free of "big iron" paranoia and concerns.
|
|
|
|
Alexander's style is a bit flippant, but not at the expense of the
|
|
information being conveyed. The organization is a trifle odd. (The
|
|
first half of the "Safe Desktops and Laptops" chapter deals
|
|
exclusively with passwords, even though few standalone machines use
|
|
them. Password generators and challenge/response systems, however,
|
|
are covered in the chapter on networks.) Technical details and
|
|
specific suggestions do have a number of errors, particularly when
|
|
dealing with MS-DOS. For those in the know, the chapter on viruses
|
|
has some oddities, but nothing that would be dangerous to the user.
|
|
|
|
Data security is a tedious and often confusing field. This book is
|
|
only a start, but could be quite helpful to the non-specialist.
|
|
|
|
copyright Robert M. Slade, 1995 BKUNCMSC.RVW 951129
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 20 Dec 1995 15:30:02 -0600
|
|
From: Frosty <sotmesc@DATASYNC.COM>
|
|
Subject: 12--SotMESC Information
|
|
|
|
The SotMESC is a Non-Profit organization founded in 1989 to
|
|
secure the freedom and privacy of computers and the networks they
|
|
reside upon. We (the SotMESC) publish a monthly newsletter to our
|
|
members detailing information about applications and news occuring
|
|
within our realm and provide educational services to the public for
|
|
free to increase the awareness of the computing realm. We also
|
|
provide a scholarship program to promote understanding of computing
|
|
and the cultures that reside upon them in the hopes of advancing the
|
|
potential of society in education. We provide funding as a legal
|
|
defense for those in need that are taking positions that complement
|
|
our position in the computing fields. In the interest of promoting
|
|
equal technological benefits to those that are poor, we have relocated
|
|
computing systems that were discarded or donated to us into usable
|
|
systems and given to potential business leaders and scholaries of low
|
|
financial livings. We are also the only organization to promote the
|
|
'Hacking for Humanity' award, given each year in various fields to
|
|
those persons displaying exemplary work to promote the computing
|
|
fields and networks in the name of mankind without formal corporate or
|
|
organizational roots.
|
|
|
|
|
|
If there are any details you would like to learn more about,
|
|
please feel free to get in touch and ask us.
|
|
|
|
Frosty, aka R.E.Jones, ilKhan of the SotMESC
|
|
http://www.datasync.com/sotmesc/gcms
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 16 Dec 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: 13--Cu Digest Header Info (unchanged since 16 Dec, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.98
|
|
************************************
|
|
|