838 lines
35 KiB
Plaintext
838 lines
35 KiB
Plaintext
|
|
Computer underground Digest Sun Apr 21, 1996 Volume 8 : Issue 32
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.32 (Sun, Apr 21, 1996)
|
|
|
|
File 1--Golden Key Campaign
|
|
File 2--(Fwd) Congress puts bomb-making material on internet
|
|
File 3--Canadian "criminalization of technology"
|
|
File 4--Re: Cu Digest, #8.29, Apr 11, 1996
|
|
File 5--Re: The Day the Sites Went Out in Georgia?
|
|
File 6--Proposed Swedish law about computer-mediated communication
|
|
File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 23 Apr 1996 21:47:56 -0500
|
|
From: "David Sobel" <sobel@EPIC.ORG>
|
|
Subject: File 1--Golden Key Campaign
|
|
|
|
PRESS RELEASE
|
|
|
|
Wednesday, April 24, 1996
|
|
|
|
URL: http://www.privacy.org/ipc/
|
|
|
|
Contact: Marc Rotenberg, EPIC, 202/544-9240
|
|
Lori Fena, EFF, 415/436-9333
|
|
Barbara Simons, USACM 408/463-5661
|
|
Kurt Stammberger, RSA 415/595-8782
|
|
|
|
------------------------------------------
|
|
|
|
INTERNET PRIVACY COALITION FORMED
|
|
|
|
Golden Key Campaign Launched
|
|
|
|
Groups Urge Good Technology for Privacy and Security
|
|
|
|
Senator Burns to Introduce Legislation
|
|
|
|
------------------------------------------
|
|
|
|
WASHINGTON, DC -- A new coalition today urged support for strong
|
|
technologies to protect privacy and security on the rapidly
|
|
growing Internet. The Internet Privacy Coalition said that new
|
|
technologies were critical to protect private communications and
|
|
on-line commerce, and recommended relaxation of export controls
|
|
that limit the ability of US firms to incorporate encryption in
|
|
commercial products.
|
|
|
|
Phil Zimmermann, author of the popular encryption program Pretty
|
|
Good Privacy, expressed support for the effort of the new
|
|
coalition. "It is time to change crypto policy in the United
|
|
States. I urge those who favor good tools for privacy to back the
|
|
efforts of the Internet Privacy Coalition."
|
|
|
|
GOLDEN KEY CAMPAIGN LAUNCHED
|
|
|
|
The Coalition has asked companies and Internet users to display a
|
|
golden key and envelope to show support for strong encryption
|
|
technology. Copies of the logo are available at the group's web
|
|
page on the Internet.
|
|
|
|
According to Lori Fena, director of the Electronic Frontier
|
|
Foundation, the purpose of the campaign is to educate the public
|
|
about new techniques for privacy protection. "Society's feelings
|
|
about privacy have not changed, only the medium has," said Ms.
|
|
Fena.
|
|
|
|
US industry has pressed the US government to relax export controls
|
|
on encryption as consumer demand for software products has
|
|
increased. They cite the fact that foreign companies have been
|
|
able to sell strong products in overseas markets that are now
|
|
restricted for US firms.
|
|
|
|
Jim Bidzos, President and CEO of RSA Data Security, said that US
|
|
firms continue to face excessive burdens. "Encryption is the key
|
|
to on-line commerce. Government regulations are simply keeping US
|
|
firms out of important markets."
|
|
|
|
The Internet Privacy Coalition is the first net-based effort to
|
|
bring together a broad base of companies, cryptographers and
|
|
public interest organizations around the central goal of promoting
|
|
privacy and security on the Internet andurging relaxation of
|
|
export controls.
|
|
|
|
Dr. Barbara Simons, chair of the public policy committee of the
|
|
Association for Computing said, "The broad support for the Golden
|
|
Key campaign shows that the reform of encryption policy is a
|
|
shared goal for companies, users, and professional associations."
|
|
|
|
SENATOR BURNS TO INTRODUCE LEGISLATION
|
|
|
|
The Internet Privacy Coalition is being established as Congress
|
|
considers new legislation to relax export controls on encryption.
|
|
Senator Conrad Burns (R-MT) today introduced legislation that
|
|
would relax export controls on commercial products containing
|
|
technologies for privacy such as encryption.
|
|
|
|
Marc Rotenberg, director of the Electronic Privacy Information
|
|
Center, said "We believe that Senator Burns has put forward a
|
|
constructive proposal. We look forward to working with him to
|
|
ensure that good tools for privacy and security are widely
|
|
available to Internet users."
|
|
|
|
Hearings on Senator Burns bill are expected to take place in early
|
|
June. The proposal has already gathered support from a bipartisan
|
|
coalition in Congress.
|
|
|
|
For Internet users who are interested in following the debate
|
|
about encryption policy, the IPC has set up a Web page with
|
|
information about encryption regulations, court challenges,
|
|
legislative developments, and organizations and companies involved
|
|
in the campaign.
|
|
|
|
The Internet Privacy Coalition was established by more than a
|
|
dozen of the nation's leading cryptographers, and thirty
|
|
associations, companies, and civil liberties organizations
|
|
committed to strong privacy and security technology for all users
|
|
of the Internet.
|
|
|
|
URL: http://www.privacy.org/ipc/
|
|
|
|
----------------------------------------------
|
|
|
|
|
|
A KEY, AN ENVELOPE -- Both are historic means for communicating
|
|
privately and protecting personal information. Today, encryption
|
|
tools provide this privacy in the electronic world.
|
|
|
|
The Golden Key Campaign is being launched to raise awareness and
|
|
support for the preservation of the right to communicate privately
|
|
and the availability of new techniques which make it possible.
|
|
|
|
Privacy, a fundamental human right, has been affirmed by the US
|
|
Supreme Court, the constitutions and laws of many countries, and
|
|
the United Nations Universal Declaration of Human Rights.
|
|
Privacy must be preserved as we move from paper to electronic
|
|
communications.
|
|
|
|
The Internet Privacy Coalition is urging members of the net
|
|
community to display a Golden Key & Envelope symbol on their Web
|
|
pages to show support for the right of privacy and the freedom to
|
|
use good tools of privacy without government restraints.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 21 Apr 1996 00:46:55 -0400
|
|
From: tallpaul <tallpaul@pipeline.com>
|
|
Subject: File 2--(Fwd) Congress puts bomb-making material on internet
|
|
|
|
Ah, the things one thinks about late at night. The post below is
|
|
self-explanatory and might make a wonderful short piece for _CuD_. I
|
|
personally checked the URL and instructions and Rochkind is correct. The
|
|
good folks in Congress really did post to the internet how to make
|
|
"babyfood bombs" and a nasty detanator for them as well!
|
|
|
|
As "Mr. Roger's Capital Hill Neighborhood" might put it: "the word for
|
|
today Congressmen and Congresswomen is 'clueless.' Can you spell
|
|
C-L-U-E-L-E-S-S?"
|
|
|
|
>----- Forwarded message (jrochkin@cs.oberlin.edu (Jonathan Rochkind))
|
|
|
|
|
|
At 11:45 PM 04/19/96, Rich Graves wrote:
|
|
>Oh yeah, and Biden read the full text of the "Attention All Unabomber
|
|
>Wannabes" and "Babyfood Bombs" documents into the Congressional Record,
|
|
>supposedly to underscore the point that those nasty Republicans are
|
|
>endorsing such nasty nasty stuff. Sort of like Exon's little blue book.
|
|
>
|
|
>So if you want to know how to build a baby-food bomb, simply write your
|
|
>congresscritter.
|
|
|
|
Or access the congressional record on thomas, as Rich gives earlier gives
|
|
us a URL to. Go to http://thomas.loc.gov/r104/r104s17ap6.html, choose the
|
|
second TERRORISM PREVENTION ACT--CONFERENCE REPORT link, choose the first
|
|
BIDEN link.
|
|
|
|
Congress is putting information on how to build babyfood bombs on the
|
|
internet! Clearly, the first thing the FBI would do under the law Biden
|
|
wants is wiretap congress to see who is accessing the congressional record.
|
|
|
|
Wonder what the congressional librarians who run thomas think of that.
|
|
|
|
((MODERATORS' NOTE: For this without access to the original,
|
|
here is the text))
|
|
|
|
++++++++++++++++++++++++++++++++
|
|
|
|
TERRORISM PREVENTION ACT--CONFERENCE REPORT (Senate - April 17, 1996)
|
|
|
|
|
|
|
|
Mr. BIDEN. Mr. President, I yield myself such time as I may use within
|
|
the limit of the time I have.
|
|
|
|
This provision is very straightforward and simple. It is beyond me why
|
|
it was taken out of the Senate version of the language that was sent
|
|
to the House.
|
|
|
|
I have heard many colleagues stand up on the floor here and rail
|
|
against pornography on the Internet, and for good reason. Even when we
|
|
thought we had corrected the language that Senator Exon introduced to
|
|
comport with the first amendment, I still hear in my State, and I hear
|
|
of people writing about how so and so is promoting pornography on the
|
|
Internet because they will not ban pornography on the Internet.
|
|
|
|
Yet, in the bill, we came along--all of us here--and the genesis of
|
|
this came from Senator Feinstein, when it was initially offered. The
|
|
majority leader, Senator Hatch, and I had some concerns with this, and
|
|
we thought the language to ban teaching people how to make bombs on
|
|
the Internet or engage in terrorist activities on the Internet might
|
|
violate the first amendment. Senators Dole, Hatch, and I worked to
|
|
tighten the language and came up with language that was tough and true
|
|
to civil liberties. It was accepted by unanimous consent.
|
|
|
|
We have all heard about the bone-chilling information making its way
|
|
over the Internet, about explicit instructions about how to detonate
|
|
pipe bombs and even, if you can believe it, baby food bombs. Senator
|
|
Feinstein quoted an Internet posting that detailed how to build and
|
|
explode one of these things, which concludes that `If the explosion
|
|
don't get'em, the glass will. If the glass don't get'em, the nails
|
|
will.'
|
|
|
|
I would like to give you a couple of illustrations of the kinds of
|
|
things that come across the Internet. This is one I have in my hand
|
|
which was downloaded. It said, `Baby food bombs by War Master.' And
|
|
this is actually downloaded off the Internet. It says:
|
|
|
|
These simple, powerful bombs are not very well known, even though all
|
|
of the materials can be obtained by anyone (including minors). These
|
|
things are so--
|
|
|
|
I will delete a word because it is an obscenity.
|
|
|
|
powerful that they can destroy a CAR. The explosion can actually twist
|
|
and mangle the frame. They are extremely deadly and can very easily
|
|
kill you and blow the side of a house out if you mess up while
|
|
building it. Here is how they work.
|
|
|
|
This is on the Internet now. It says:
|
|
|
|
Go to Sports Authority or Herman's Sport Shop and buy
|
|
shotgun shells. It is by the hunting section. At the Sports Authority
|
|
that I go to you can actually buy shotgun shells without a parent or
|
|
an adult. They don't keep it behind the glass counter, or anything
|
|
like that. It is $2.96 for 25 shells.
|
|
|
|
And then it says:
|
|
|
|
Now for the hard part. You must cut open the plastic housing of the
|
|
bullet to get to the sweet nectar that is the gun powder. The place
|
|
where you can cut is CRUCIAL. It means a difference between it blowing
|
|
up in your face or not.
|
|
|
|
Then there is a diagram, which is shown as to how to do that on the
|
|
Internet. Then it says:
|
|
|
|
You must not make the cut directly where the gun powder is, or it will
|
|
explode. You cut it where the pellets are.
|
|
|
|
And then it goes through this in detail. And then it gets to the end,
|
|
and it says:
|
|
|
|
Did I mention that this is also highly illegal? Unimportant stuff that
|
|
is cool to know.
|
|
|
|
And then it rates shotgun shells by two numbers, gauge, pellet size,
|
|
and goes into great detail. It is like building an erector set. It
|
|
does it in detail.
|
|
|
|
So what Senators Dole and Hatch and I did, we said you should not be
|
|
able to do this, but we have a first amendment problem, possibly. So
|
|
we added a provision that says that you have to have the intent, when
|
|
you are teaching people how to do this, that the person using it is
|
|
using it for the purpose of doing harm.
|
|
|
|
So it seems to me that this is pretty straightforward. Granted, I want
|
|
to stop pornography on the Internet. I think pornography does harm to
|
|
the minds of the people who observe it, particularly young people. But
|
|
if that does harm, how much harm is done by teaching a 15-year-old
|
|
kid, a 12-year-old kid, or a 20-year-old person, with great detail,
|
|
how to build a baby food bomb, or how to build an automatic particle
|
|
explosion provision, or how to build light bulb bombs.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 8 Apr 1996 10:50:41 -0700 (PDT)
|
|
From: Doc_Holliday@AWWWSOME.COM(M. Steven McClanahan)
|
|
Subject: File 3--Canadian "criminalization of technology"
|
|
|
|
Regarding the following letter reprinted in CuD:
|
|
|
|
>
|
|
> "An Act to amend the Criminal Code and to amend certain other Acts"The
|
|
>new subsection 487(2.1)(a) would provide that a person authorized to
|
|
>search a computer system for data may use any computer system in the
|
|
>building "to search any data contained in or available to the computer
|
|
>system." The quoted language does not distinguish between the two
|
|
>sources of data. However, there is good reason to treat data available to the
|
|
>computer system differently from data contained within it. Data available
|
|
>to the system may be physically located outside of the jurisdiction of
|
|
>the issuer of the warrant, potentially bringing the persons authorizing and
|
|
>conducting the search into conflict with foreign law. A similar concern
|
|
>is identified and addressed in the existing subsection 487(2), which
|
|
>provides for modified search warrants in circumstances where the subject of the
|
|
>search "is believed to be in any other territorial division" within
|
|
>Canada. In the context of the search of a computer system, it is quite probable
|
|
>that the data available to the computer system includes data located in
|
|
>jurisdictions outside of Canada. The international nature of the
|
|
>difficulty calls for a solution beyond that offered by subsection 487(2).
|
|
>It is necessary to have two distinct sets of provisions, one of which
|
|
>governs
|
|
>the search of data "contained in" a computer system and another specifically
|
|
>designed to address the difficulty of searching data "available to" a
|
|
>computer system. The words "or available to" should be removed from the
|
|
>proposed amendment to both subsections 487(2.1)(a) and 487(2.2)(a).
|
|
|
|
This sets dangerous precedent, as it seeks to make criminal the possession
|
|
of hardware, software and/or knowledge to configure systems so as to access
|
|
information the ruling junta may find objectionable. If you've configured
|
|
your system to automatically log onto another system that is connected to
|
|
something the government has defined as "criminal," then you are subject
|
|
criminal liability for information gained in a broad search as authorized
|
|
by this law. If you are a "newbie," even though your system might be
|
|
capable of accessing such information, because you could not configure it
|
|
to do so, then you are not subject to criminal liability. This would make
|
|
the same hardware, software and Internet connections criminal in one
|
|
situation and not in another, based solely on the level of expertise of the
|
|
user!
|
|
|
|
>Finally, we are concerned about the potential for self-incriminatory
|
|
>activity by the person whose property is the subject of a search.
|
|
>Subsection 487(2.1) would authorize the person conducting the search to
|
|
>use the computer system in order to search, reproduce, and seize data.
|
|
>Subsection 487(2.2), while similar, would add that the person whose
|
|
>property is being searched "shall, on presentation of the warrant, permit the
|
|
>person carrying out the search" to use the computer system. It is unclear from
|
|
>this language whether the person whose property is being searched is
|
|
>required to take positive steps to assist the person carrying out the
|
|
>search. Our concern is that the inherent vagueness of the proposed
|
|
>provision allows for such an interpretation. If the computer system is
|
|
>accessible only by first supplying a password, the person may have to
|
|
>supply it. If the data being searched is encrypted, the person may have to
|
|
>provide the decryption key. This would amount to being compelled to assist in
|
|
>the discovery of evidence against oneself, which is inconsistent with the
|
|
>most fundamental principles of criminal law. The proposed amendment should
|
|
>be rewritten to remedy its potentially dangerous vagueness.
|
|
|
|
The obvious solution to the above is to suffer "cyber-amnesia" when the
|
|
cops come busting down your door. Possession of encryption software should
|
|
not be illegal in any jurisdiction, however, realistically, most cops
|
|
assume, if it's encrypted it must be illegal - why else would you encrypt
|
|
it? It's a catch 22 situation and one in which you lose either way.
|
|
|
|
Speaking as one who had a Power Macintosh with a 2 gigabyte hard disk drive
|
|
and all my backups subpeonaed in a civil case, I can tell you that the
|
|
other side is not likely to want or accept your help in determining what is
|
|
on your mass storage devices and/or in learning how your systems work. I
|
|
had to stand by while the attorney corrupted all the data on my hard drive
|
|
trying to beat my PGP encryption. Then he did the same thing to my back
|
|
ups. Despite my protests I would have GIVEN them the key to decrypt the
|
|
data - he didn't trust me. This is in a CIVIL case, imagine how they would
|
|
feel in a CRIMINAL matter.
|
|
|
|
They spent days trying to get past PGP and could not. Even if they had, all
|
|
they would have gotten was copies of email between my wife and I. The
|
|
downside was it took me two weeks to reconstruct my hard drive, time which
|
|
the courts refused to order the attorney that started all this to pay me
|
|
for. (They did sanction him after he threatened to punch me during a
|
|
deposition for refusing to reveal my sources - which were protected by
|
|
attorney-client privilege - which I thought was interesting; apparently he
|
|
could waste all my time, but he couldn't hit me.) The court decided my data
|
|
had no value and that having to rebuild my hard drive was a "minor
|
|
inconveneince" compared to the "interests of justice."
|
|
|
|
Since it is a no win situation, extending cooperation is problematic. It
|
|
probably won't do any good. My experience told me most people in law
|
|
enforcement have not advanced, technologically, past the level of an Atari
|
|
2600 and are completely baffled by complex systems. Based on what they did
|
|
with a Mac system, I doubt they would even be able to access anything now
|
|
that I use a SPARCstation 4.
|
|
|
|
An attitude seems to have developed in the prosecution of computer crime
|
|
that "the ends justifies the means." As the voters have gone along like
|
|
sheep and surrendered many civil rights in the prosecution of drug related
|
|
crimes, they are similarly doing in the prosecution of computer crimes
|
|
having to do with the Internet and claims of "child porn." This is
|
|
extremely dangerous as. If you look long and hard enough on any system,and
|
|
systems accessible to it, you can, eventually, find something that will
|
|
offend someone. Therefore, applying the rule that "the ends justifies the
|
|
means," everyone who connects to a computer network is thereby
|
|
"criminalized."
|
|
|
|
The frigthening part is that, whether or not the innocent victim is doing
|
|
anything illegal, the reams of good press such actions bring for
|
|
prosecutors and police just encourages them. After it is all through and
|
|
nothing illegal is found, law enforcement still looks good in the press,
|
|
(because the public has been whipped up into such a frenzy they preceive
|
|
any action as "good"). The victims of such harassment are always "guilty"
|
|
in the eyes of the public, simply because the government took any action.
|
|
|
|
------------------------------
|
|
|
|
From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
|
|
Subject: File 4--Re: Cu Digest, #8.29, Apr 11, 1996
|
|
Date: Mon, 15 Apr 96 13:01:07 MDT
|
|
|
|
|Olsen concocted this scheme that he calls L18, for "Less than 18."
|
|
|Under it, every net-user must label every USENET post, email message,
|
|
|FTP site file, web page, chat room, IRC channel...
|
|
|
|
Wow. That's quite a bit.
|
|
|
|
Well, here's a thought. They can't possibly fine people for *NOT*
|
|
labeling non-offensive material as being L18 (non-offensive). Even
|
|
if they did, you could always add some four-letter exon somewhere in
|
|
the post to make sure that it was no longer L18.
|
|
|
|
So what's the point?
|
|
|
|
Well - the point is that most of the content on the net is provided
|
|
by us 'adults.' So it would be amazingly easy to boycott the L18 label.
|
|
|
|
What will be the effect? Well - one unfortunate effect is that anyone
|
|
who is pegged as under 18 will (for a hopefully short time) be unable
|
|
to access much of anything the net. In the long run this would make
|
|
the L18 plan so infeasible that it would become valueless, and hopefully
|
|
would be dropped.
|
|
|
|
One way to protect the kids from the nasty adult's ideas is by censoring
|
|
any such ideas. Another way is to keep the kids out. I don't prefer
|
|
either, but the latter is better than censorship.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 19 Apr 1996 07:16:20 -0700 (PDT)
|
|
From: Declan McCullagh <declan@EFF.ORG>
|
|
Subject: File 5--Re: The Day the Sites Went Out in Georgia?
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Fri, 19 Apr 1996 03:59:06 -0400
|
|
From--Mike Godwin <mnemonic@well.com>
|
|
|
|
|
|
Georgia Legislative Information
|
|
|
|
|
|
HB 1630 Computer or telephone network; transmitting misleading
|
|
data (3.7K)
|
|
|
|
*** BILL STATUS *** 04/18/96
|
|
|
|
HB 1630
|
|
|
|
Computer or telephone network;
|
|
transmitting misleading data
|
|
|
|
1. Parsons 40th 2. Scoggins 24th 3. Coker 31st
|
|
|
|
House Comm: Ind / Senate Comm: ST&I /
|
|
House Vote: Yeas 142 Nays 26 Senate Vote: Yeas 48 Nays 0
|
|
----------------------------------------
|
|
House Action Senate
|
|
----------------------------------------
|
|
2/8/96 Read 1st Time 3/5/96
|
|
2/9/96 Read 2nd Time 3/13/96
|
|
2/26/96 Favorably Reported 3/13/96
|
|
Sub Committee Amend/Sub Am
|
|
2/29/96 Read 3rd Time 3/14/96
|
|
2/29/96 Passed/Adopted 3/14/96
|
|
FSFA Comm/Floor Amend/Sub CAFA
|
|
3/15/96 Amend/Sub Disagreed To
|
|
Recedes 3/18/96
|
|
4/3/96 Sent to Governor
|
|
4/18/96 Signed by Governor
|
|
1029 Act/Veto Number
|
|
7/1/96 Effective Date
|
|
----------------------------------------
|
|
|
|
Code Sections amended: 16-9-93.1
|
|
*** FIRST READER *** 02/07/96
|
|
|
|
HB 1630
|
|
|
|
A BILL to amend Article 6 of Chapter 9 of Title 16 of the Official
|
|
Code of Georgia Annotated, known as the "Georgia Computer Systems
|
|
Protection Act," so as to provide that it shall be unlawful for any
|
|
person or organization knowingly to transmit certain misleading data
|
|
through a computer or telephone network for the purpose of setting up,
|
|
maintaining, operating, or exchanging data with an electronic mailbox,
|
|
home page, or any other electronic information storage bank; and for
|
|
other purposes.
|
|
*** FULL TEXT *** 02/29/96
|
|
|
|
HB 1630 HB 1630/FSFA
|
|
|
|
H. B. No. 1630 (FLOOR SUBSTITUTE)(AM)
|
|
By: Representative Parsons of the 40th
|
|
|
|
|
|
|
|
A BILL TO BE ENTITLED
|
|
AN ACT
|
|
|
|
|
|
To amend Article 6 of Chapter 9 of Title 16 of the Official
|
|
Code of Georgia Annotated, known as the "Georgia Computer
|
|
Systems Protection Act," so as to provide that it shall be
|
|
unlawful for any person or organization knowingly to
|
|
transmit certain misleading data through a computer or
|
|
telephone network for the purpose of setting up,
|
|
maintaining, operating, or exchanging data with an
|
|
electronic mailbox, home page, or any other electronic
|
|
information storage bank; to provide for a penalty; to
|
|
provide that civil actions are allowed; to repeal
|
|
conflicting laws; and for other purposes.
|
|
|
|
BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:
|
|
|
|
SECTION 1.
|
|
|
|
Article 6 of Chapter 9 of Title 16 of the Official Code of
|
|
Georgia Annotated, known as the "Georgia Computer Systems
|
|
Protection Act," is amended by adding, following Code
|
|
Section 16-9-93, a new Code Section 16-9-93.1 to read as
|
|
follows:
|
|
|
|
"16-9-93.1.
|
|
|
|
(a) It shall be unlawful for any person, any organization,
|
|
or any representative of any organization knowingly to
|
|
transmit any data through a computer network or over the
|
|
transmission facilities or through the network facilities
|
|
of a local telephone network for the purpose of setting
|
|
up, maintaining, operating, or exchanging data with an
|
|
electronic mailbox, home page, or any other electronic
|
|
information storage bank or point of access to electronic
|
|
information if such data uses any individual name, trade
|
|
name, registered trademark, logo, legal or official seal,
|
|
or copyrighted symbol to falsely identify the person,
|
|
organization, or representative transmitting such data or
|
|
which would falsely state or imply that such person,
|
|
organization, or representative has permission or is
|
|
legally authorized to use such trade name, registered
|
|
|
|
|
|
H. B. No. 1630 (SUB)
|
|
-1-
|
|
|
|
HB 1630/FSFA
|
|
|
|
trademark, logo, legal or official seal, or copyrighted
|
|
symbol for such purpose when such permission or
|
|
authorization has not been obtained; provided, however,
|
|
that no telecommunications company or Internet access
|
|
provider shall violate this Code section solely as a
|
|
result of carrying or transmitting such data for its
|
|
customers.
|
|
|
|
(b) Any person violating subsection (a) of this Code
|
|
section shall be guilty of a misdemeanor.
|
|
|
|
(c) Nothing in this Code section shall be construed to
|
|
limit an aggrieved party's right to pursue a civil action
|
|
for equitable or monetary relief, or both, for actions
|
|
which violate this Code section."
|
|
|
|
SECTION 2.
|
|
|
|
Nothing contained herein shall prohibit a member of the
|
|
General Assembly from using the state seal or the Georgia
|
|
flag which contains the state seal on a home page that is
|
|
clearly identified with the name of the member as the home
|
|
page of that member.
|
|
|
|
SECTION 3.
|
|
|
|
All laws and parts of laws in conflict with this Act are
|
|
repealed.
|
|
|
|
H. B. No. 1630 (SUB)
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 12 Apr 1996 09:36:07 -0700 (PDT)
|
|
From: Olle Jarnefors <ojarnef@ADMIN.KTH.SE>
|
|
Subject: File 6--Proposed Swedish law about computer-mediated communication
|
|
|
|
It might be interesting to readers of the CU Digest to know how
|
|
the problems of freedom of expression on the Internet are
|
|
tackled in Sweden. Professor Jacob Palme at Stockholm
|
|
University and the Royal Institute of Technology has arranged
|
|
for publication of the English summary of the recent proposal
|
|
from a Swedish government committee, at
|
|
|
|
< http://www.dsv.su.se/~jpalme/SOU-1996-40-eng.html >
|
|
|
|
Professor Palme's introduction and the full text of the proposed
|
|
law follows here.
|
|
|
|
--
|
|
Olle Jarnefors, Royal Institute of Technology (KTH) <ojarnef@admin.kth.se>
|
|
|
|
-----
|
|
|
|
(This initial text was written by Jacob Palme.)
|
|
|
|
A Swedish government committee has put forward a proposal
|
|
covering partly the same issues as the famous U.S.
|
|
"Communications Decency Act".
|
|
|
|
The committee does not propose that anything is unlawful in
|
|
BBSes and the Internet except what would be unlawful according
|
|
to other Swedish laws (for example copyright laws, libel laws,
|
|
child pornography laws). The main issue for the proposal is
|
|
which responsibility the provider of a data base (WWW data base,
|
|
BBS, news server, etc.) has on the content. According to the law
|
|
proposal, sysop must remove illegal items, but only under two
|
|
conditions:
|
|
|
|
1. The item was obviously illegal. I.e. on borderline cases, the
|
|
sysop does not have to remove the item.
|
|
|
|
2. The sysop was aware of the existence of the item. I.e. the
|
|
sysop is not forced to pre-censor information, but if the
|
|
sysop is informed of the occurrence of illegal items in the
|
|
data base, these must be removed.
|
|
|
|
A sysop which does not follow these rules, can be punished by
|
|
fines or a maximum of 2 years prison.
|
|
|
|
The next step is that the Swedish government will send the
|
|
proposal to organizations who are allowed to comment on it. In
|
|
this stage, anyone can send their views on the proposal to the
|
|
government. After that, the government may prepare a (possibly
|
|
modified) proposal to the Swedish parliament, and the parliament
|
|
may turn it into a law.
|
|
|
|
-----
|
|
|
|
ELECTRONIC MEDIATION SERVICES BILL
|
|
|
|
|
|
_Areas of application_
|
|
|
|
ARTICLE 1. This law applies to services that are intended for the
|
|
electronic mediation of messages.
|
|
|
|
The law does not apply to:
|
|
|
|
1. the provision alone of a network or other connections for the
|
|
transmission of messages,
|
|
|
|
2. mediation of messages within an agency or between agencies or
|
|
within an enterprise or a legal group of enterprises, and
|
|
|
|
3. such services that are covered by the regulations in the
|
|
Freedom of the Press Act [this is the pride of Swedish
|
|
legislation, a constitutional law originally adopted in 1766,
|
|
pertaining to printed media /OJ] or the Fundamental Law on
|
|
Freedom of Expression [this constitutional law regulates radio
|
|
and television /OJ].
|
|
|
|
In the law, "messages" means text, images, sounds and other
|
|
information being transmitted in electronic form.
|
|
|
|
|
|
_Exceptions from the Data Act_
|
|
|
|
ARTICLE 2. The provisions in Sections 1-20 and 22-25 of the Data
|
|
Act (1973:289) shall not be applied to personal registers
|
|
[i.e. any computer file holding data about identifyable natural
|
|
persons /OJ] that are maintained by a service according to this
|
|
law, to the extent that
|
|
|
|
1. the registers contain only regular running text and
|
|
information about messages and users of the service, and
|
|
|
|
2. the register is maintained for the purpose of enabling users
|
|
to deposit or collect information with a view to free exchange
|
|
of opinions, free and comprehensive information and freedom of
|
|
artistic creation.
|
|
|
|
In the law, "regular running text" means information that has
|
|
not been structured to facilitate the acquisition of personal
|
|
information.
|
|
|
|
|
|
_An overview of the service_
|
|
|
|
ARTICLE 3. The service supplier shall have supervision over the
|
|
service to the degree necessary with regards to the scope and
|
|
aim of the operation.
|
|
|
|
|
|
_Information to the user_
|
|
|
|
ARTICLE 4. The service supplier shall, as soon as possible,
|
|
inform each person who wishes to use the service about
|
|
|
|
1. who is supplying the service,
|
|
|
|
2. that the users are responsible for the content of the
|
|
messages that they post, and
|
|
|
|
3. to what extent incoming messages become available to other
|
|
users.
|
|
|
|
If an agency supplies the service it should also mention that
|
|
messages which are mediated may become public documents.
|
|
|
|
|
|
_The hindrance of continued distribution_
|
|
|
|
ARTICLE 5. If it is obvious that a user, by posting a message,
|
|
has made himself guilty of a crime or infringement of copyright
|
|
or that the contents of the message are liable to be used in
|
|
crime, the service supplier shall hinder further distribution of
|
|
the message. The same applies to any person who supervises the
|
|
service on behalf of the service supplier.
|
|
|
|
The first paragraph is not in effect if the message is intended
|
|
to be received only by one or more designated recipients
|
|
(electronic mail).
|
|
|
|
|
|
_Penalties_
|
|
|
|
ARTICLE 6. A person who intentionally or through negligence
|
|
violates article 4 or who intentionally violates article 5 shall
|
|
be sentenced to pay a fine or to imprisonment for at most six
|
|
months, or, if the crime is serious, to imprisonment for at most
|
|
two years. If the offence is of only a minor nature the offender
|
|
shall not be sentenced.
|
|
|
|
The first paragraph is not applied if the offence is punishable
|
|
under the Penal Code.
|
|
|
|
|
|
_Forfeiture_
|
|
|
|
ARTICLE 7. Computers and other equipment that have been used in
|
|
a crime under this law may be declared forfeited, if this is
|
|
called for in order to prevent crime or for other special
|
|
reasons.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.32
|
|
************************************
|
|
|