757 lines
33 KiB
Plaintext
757 lines
33 KiB
Plaintext
|
|
Computer underground Digest Sun Oct 12, 1997 Volume 9 : Issue 73
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.73 (Sun, Oct 12, 1997)
|
|
|
|
File 1--"Net Law: How Lawyers Use the Internet" by Jacobsen
|
|
File 2--Markup of H.R. 695 (SAFE) ACT
|
|
File 3--Secret FBI Files Web Site
|
|
File 4--Things to Do on the Web When You're Dead
|
|
File 5--Agent Steal in Gray Areas
|
|
File 6--Export Controls and Scare Tactics
|
|
File 7--Netly News special report: "The Privacy Snatchers"
|
|
File 8--Spam Analysis
|
|
File 9--THE X-STOP FILES: The Truth Isn't Out There
|
|
File 10--Mitnick Trial Date Set
|
|
File 11--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 01 Oct 1997 11:25:25 EST
|
|
From: "Rob Slade, doting grandpa of Ryan & Trevor"
|
|
Subject: File 1--"Net Law: How Lawyers Use the Internet" by Jacobsen
|
|
|
|
BKNLHLUI.RVW 970221
|
|
|
|
"New Law: How Lawyers Use the Internet", Paul Jacobsen, 1997, 1-56592-258-1,
|
|
U$29.95
|
|
%A Paul Jacobsen jacobsen@brainerd.net
|
|
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
|
|
%D 1997
|
|
%G 1-56592-258-1
|
|
%I O'Reilly & Associates, Inc.
|
|
%O U$29.95/C$42.95 800-998-9938 707-829-0515 fax: 707-829-0104 nuts@ora.com
|
|
%P 254
|
|
%T "New Law: How Lawyers Use the Internet"
|
|
|
|
Come on. You give it a title like that *and* stick in an AOL disk and still
|
|
expect me to refrain from joking?
|
|
|
|
Well then, this is a realistic and reasonable overview of net uses and
|
|
usefulness for lawyers. Not usage; per se; the coverage of actual Internet
|
|
applications is fairly brief. The content is more of a sales pitch, in line
|
|
with other Songline titles, studded with personal testimonials and examples.
|
|
(The book does, though, properly note that law offices will probably want a
|
|
direct, dedicated link to the net, rather than the dialup arrangement most
|
|
other books push.)
|
|
|
|
Along the way there are numerous, helpful resources recommended. A large
|
|
proportion of these do, as expected, deal with US law, but overall the book is
|
|
less US-centric than others of its ilk, given that the practice of law must be
|
|
similar anywhere.
|
|
|
|
"Netlaw" (cf. BKNETLAW.RVW) is for people; "Net Law" is for lawyers.
|
|
|
|
copyright Robert M. Slade, 1997 BKNLHLUI.RVW 970221
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 26 Sep 1997 17:05:57 -0500
|
|
From: cudigest@SUN.SOCI.NIU.EDU(Computer underground Digest)
|
|
Subject: File 2--Markup of H.R. 695 (SAFE) ACT
|
|
|
|
Source - http://www.house.gov/commerce/full/092497/markup.htm
|
|
|
|
Full Committee Markup
|
|
September 24, 1997
|
|
2123 Rayburn House Office Building
|
|
|
|
PDF Versions of Committee Print and Amendments will be available by
|
|
11:00 AM EDT [IMAGE] Some of the the documents below have been created
|
|
using Adobe Acrobat. To view these documents, you will need the Adobe
|
|
PDF Viewer
|
|
|
|
H.R. 695 SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT, was
|
|
ordered reported, amended, by a roll call vote of 44 yeas to 6 nays
|
|
(Roll Call Vote #42).
|
|
|
|
A unanimous consent request by Mr. Bliley to discharge the
|
|
Subcommittee on Telecommunications, Trade, and Consumer Protection
|
|
from further consideration and proceed to the immediate consideration
|
|
of H.R. 695, as reported to the House by the Committee on the
|
|
Judiciary, was agreed to without objection.
|
|
|
|
The following amendments were offered.
|
|
|
|
An Amendment in the Nature of a Substitute by Mr. Tauzin, #1, was
|
|
AGREED TO, amended, by a voice vote. (A unanimous consent request by
|
|
Mr. Tauzin to have the Amendment in the Nature of a Substitute
|
|
considered as base text for purposes of amendment was agreed to
|
|
without objection.)
|
|
|
|
An amendment to the Tauzin Amendment in the Nature of a Substitute
|
|
by Mr. Markey, #1A, was AGREED TO by a roll call vote of 40 yeas to
|
|
11 nays (Roll Call Vote #41).
|
|
|
|
An amendment by Mr. Oxley to the Markey Amendment to the Tauzin
|
|
Amendment in the Nature of a Substitute, #1A(1), was NOT AGREED TO
|
|
by a roll call vote of 16 yeas to 35 nays (Roll Call Vote #40).
|
|
|
|
An amendment to the Tauzin Amendment in the Nature of a Substitute
|
|
by Mr. Tauzin, #1B, was AGREED TO by a voice vote.
|
|
|
|
THE COMMITTEE ADJOURNED SUBJECT TO THE CALL OF THE CHAIR
|
|
|
|
|
|
U.S. House Seal The Committee on Commerce
|
|
2125 Rayburn House Office Building
|
|
Washington, DC 20515
|
|
(202) 225-2927
|
|
Commerce@mail.house.gov
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 6 Oct 1997 16:42:27 -0500 (CDT)
|
|
From: Michael Ravnitzky <mikerav@IX.NETCOM.COM>
|
|
Subject: File 3--Secret FBI Files Web Site
|
|
|
|
Please pardon any interruption, but I believe that you may be interested in
|
|
the Secret FBI Files Website at
|
|
|
|
http://www.crunch.com/01secret/01secret.htm
|
|
|
|
This free site has been carefully compiled from FBI records and lists
|
|
thousands of important and interesting FBI Files that you can get very
|
|
easily from the government simply by asking.
|
|
|
|
This material has never, repeat never been published before anywhere. If
|
|
you are interested in FBI files, this is a wonderful resource.
|
|
|
|
Sorry again for any interruption, and I won't send you any other
|
|
correspondence, but I hope you can provide me with some feedback on my
|
|
website, which is real a labor of love. And if you like it, tell a friend.
|
|
|
|
Michael Ravnitzky
|
|
Second Year Law Student
|
|
MikeRav@ix.netcom.com
|
|
http://www.crunch.com/01secret/01secret.htm
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 3 Oct 97 09:01:28 -0700
|
|
From: "Gordon R. Meyer" <grmeyer@ricochet.net>
|
|
Subject: File 4--Things to Do on the Web When You're Dead
|
|
|
|
Moderators' Note: Okay, the last thing we "need" is another
|
|
Internet-based newsletter. Nonetheless, "NetBits" has arrived on the
|
|
scene and it's fresh, interesting, and helpful. If you're interested in a
|
|
nice mix of articles on technology, society, and news -- all with a 'net
|
|
focus -- give NetBits a try. The article below is from their second issue.
|
|
|
|
To subscribe to NetBITS, send email to <netbits-on@netbits.net>.
|
|
Visit the NetBITS Web site at <http://www.netbits.net/>.
|
|
|
|
|
|
Things to Do on the Web When You're Dead
|
|
----------------------------------------
|
|
by David Blatner <david@afterlife.org>
|
|
|
|
Perhaps it speaks to my Western-based culture that I was so
|
|
surprised when a friend of mine [not our friend and colleague Cary
|
|
Lu, who had no desire to build a Web site before he passed away,
|
|
as mentioned in TidBITS-399_. -Adam] asked me some time ago if I
|
|
would host his Web site after he died. I had simply not given any
|
|
thought to the problem of what happens to a site after someone
|
|
passes away or can no longer support it for health reasons.
|
|
|
|
This man had put several years of work into his Web site, and it
|
|
had become an archive of his life's musings and beliefs. He felt
|
|
(and feels) strongly that this material should remain available to
|
|
people after he is no longer around to share it, and there is no
|
|
reason why this shouldn't be possible. The site takes up little
|
|
space, requires no real maintenance, and holds a treasure-trove of
|
|
wonderful writing that will probably never see its way into print.
|
|
|
|
I don't know how many elderly people or people with terminal
|
|
illnesses are currently building Web pages, but I can only assume
|
|
that the number is increasing and that within the next few years
|
|
the "passing on" question will become one of significance. There
|
|
are many important and emotional issues at stake here, as people's
|
|
personal Web sites become repositories and reflections of who they
|
|
are and what they feel is important to share with others.
|
|
|
|
I believe this situation calls for an international not-for-profit
|
|
organization. People could bequest their Web sites to this
|
|
organization with the knowledge that the site will be available
|
|
indefinitely to their loved ones and other interested parties.
|
|
Some small commercial startups already offer this kind of service,
|
|
but I'm more concerned about people who won't be able to afford an
|
|
expensive solution that requires trust funds or other
|
|
sophisticated financing.
|
|
|
|
|
|
**Enter the AfterLife** -- AfterLife is just such an organization.
|
|
Over the past few months, several volunteers have been working
|
|
together to address the concerns and issues of archiving Web sites
|
|
after their authors die. The effort is still very much in its
|
|
developmental stage, and more volunteers are needed. Currently,
|
|
AfterLife has been donated server space and bandwidth, and the
|
|
organization is applying for tax-exempt status in the United
|
|
States.
|
|
|
|
I was honored that my friend asked me to protect something so
|
|
precious to him, and I willingly agreed. But I wonder how many
|
|
people's sites are simply being "turned off" when they no longer
|
|
have a voice (or a checkbook) to sustain them? I keep thinking: if
|
|
my grandparents had built a Web site, wouldn't I want it archived
|
|
and available online in the years to come for my grandchildren?
|
|
|
|
Of course, no one knows what the online world will look like in my
|
|
grandchildren's time. There's no question that the Web will evolve
|
|
during the intervening years, and AfterLife will be exploring
|
|
issues surrounding the conversion of Web pages into other formats
|
|
for the continuance of access when that becomes necessary. Since
|
|
HTML is relatively simple and HTML files are pure text, Web pages
|
|
stand a much better chance of surviving into an unknown technical
|
|
future than content that requires specific hardware or operating
|
|
systems. CD-ROMs, for instance, may physically last for many
|
|
years, but that's no help if there aren't any CD-ROM drives to
|
|
read them or applications that understand the file formats used.
|
|
|
|
You can find more information about AfterLife at the Web site
|
|
below or by sending email to <info@afterlife.org>. If you are
|
|
interested in either participating as a volunteer or bequeathing
|
|
your Web site to AfterLife, drop us a line. Although AfterLife is
|
|
still at an early stage, we want to encourage people to start
|
|
thinking about the issues involved as the Web, along with the rest
|
|
of us, continues to age.
|
|
|
|
<http://www.afterlife.org/>
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 4 Oct 1997 17:55:31 -0400
|
|
From: grayarea <grayarea@openix.com>
|
|
Subject: File 5--Agent Steal in Gray Areas
|
|
|
|
((MODERATORS NOTE: Netta Gilboa, editor of Gray Areas,
|
|
sent the following information over to us. Gray Areas is a
|
|
nifty magazine that's been around for a few years, and mixes
|
|
rock, cyberculture, counterculture, and generally fringe news
|
|
unavailable elsewhere. It's well checking out)).
|
|
|
|
Two articles by Justin Petersen, a.k.a. Agent Steal, were just
|
|
published by Gray Areas Magazine. The first is called "Hackers
|
|
In Chains" and details some encounters Justin had with other
|
|
notorious computer hackers while in federal prison. The second
|
|
piece is called "Everything A Hacker Needs To Know About Getting
|
|
Busted By The Feds. The articles are available on the Gray Areas
|
|
Magazine Home Page at: http://www.grayarea.com/gray2.htm
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 29 Sep 97 10:48:22 MDT
|
|
From: Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
|
|
Subject: File 6--Export Controls and Scare Tactics
|
|
|
|
|Which would you rather have export controls on, technology used
|
|
|for encryption or technology used in the development of nuclear
|
|
|weaponry? The answer is obvious to most people.
|
|
|
|
Is it? Let's not shoot ourselves in the foot - if you make strong
|
|
encryption technology available, then you let *any* technology that
|
|
can be sent through encryption channels available.
|
|
|
|
|Here's the conundrum: The mandarins of law enforcement say that ...
|
|
|machines employed in the engineering of modern thermonuclear bombs can
|
|
|be sold to Russian scientists in the former Soviet Union's most famous
|
|
|nuclear weapons shop.
|
|
|
|
No - the law doesn't say that at all. SGI broke export regulations by
|
|
selling those computers, your article even admits that later:
|
|
|
|
|Around the same time the Department of Commerce, along with the
|
|
|Department of Justice, began a criminal investigation of the case.
|
|
|
|
It seems that the 'mandarins of law enforcement' don't like strong
|
|
encryption *or* export of computing technology that can create
|
|
nuclear weaponry.
|
|
|
|
|This is similar to the arguments fielded by concerned Netizens
|
|
|against control of encryption, with one small exception: The first U.S
|
|
|hydrogen bomb blew a crater one mile wide in the Pacific atoll of
|
|
|Eniwetok.
|
|
|
|
And the plans for that bomb could have been sent using encryption. There
|
|
you go shooting your other foot, that must hurt. All you're doing is
|
|
using the same scare tactics that the 'law' is using to stop
|
|
encryption. Encryption in itself is not dangerous, but it admittedly
|
|
can transmit dangerous information. Workstations by themselves are
|
|
not dangerous, but they can create dangerous things, such as nuclear
|
|
weaponry. If you use scare tactics to focus on the dangerous
|
|
possibilities of technology, you might as well hand it all in now.
|
|
|
|
|The four machines, for which Silicon Graphics was paid
|
|
|$200,000, aren't really supercomputers, argued Thompson. At Silicon
|
|
|Graphics, he said, they're thought of as "desktop servers," capable of
|
|
|
|
Well - that's what they are. Admittedly the lines between PCs, workstations,
|
|
servers and supercomputers is no longer clear, I think most of the
|
|
industry would consider such machines as servers, not supercomputers.
|
|
|
|
|supercomputers made by Cray Research. Conversely, a 486 PC -- what
|
|
|this article is being written on -- is capable of approximately 12.5
|
|
|million operations per second. Compared to it, the SGI machines in
|
|
|question are, relatively speaking, Crays.
|
|
|
|
Now you're just being silly. Conversely, say, an Altair 8800 -- what
|
|
this reply is being written on -- is capable of a couple of operations
|
|
per second. Compared to it, the 486 PC in your house is, relatively
|
|
speaking, the most powerful computer ever made. Please destroy it
|
|
immediately - don't let it fall into the hands of the Russkies.
|
|
|
|
|Thus, since Silicon Graphics insisted it was unaware of
|
|
|Chelyabinsk-70's true nature, there was no need to review the sale.
|
|
|
|
You are absolutely correct. I won't defend SGI because the made a
|
|
mistake and they broke the law. In fact, they're direct competitors
|
|
with the company I work for, so I don't really want to discuss SGI at
|
|
all. But I don't see what this has to do with the *government* selling
|
|
supercomputers to Russia (which they didn't), or with strong encryption,
|
|
or ... heck, with anything except maybe the discussion of export controls,
|
|
which didn't seem to be the point of your article.
|
|
|
|
So, what exactly is your point, George?
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 3 Oct 1997 13:48:12 -0400
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: File 7--Netly News special report: "The Privacy Snatchers"
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
Recently the FBI has started to demand a creepy new anti-privacy
|
|
law. It requires that all future technologies -- from cell
|
|
phones to WordPerfect -- include a kind of electronic peephole
|
|
to let law enforcement agents snoop through your private files
|
|
and communications without your knowledge or permission. One
|
|
House committee has already approved the FBI's bill.
|
|
|
|
Such easy access is the fantasy of every unethical policeman and
|
|
corrupt bureaucrat. Now, the police say they'll never peek
|
|
through this peephole without a judge's approval. But history
|
|
reveals that time and again, the FBI, the military and other law
|
|
enforcement organizations have ignored the law and spied on
|
|
Americans illegally, without court authorization. Government
|
|
agencies have subjected hundreds of thousands of law-abiding
|
|
Americans to unjust surveillance, illegal wiretaps and
|
|
warrantless searches. Eleanor Roosevelt, Martin Luther King,
|
|
feminists, gay rights leaders and Catholic priests were spied on.
|
|
Even Supreme Court justices were monitored. Can we trust the FBI?
|
|
|
|
Visit the Netly News for a special report on The Privacy Snatchers:
|
|
|
|
http://cgi.pathfinder.com/netly/opinion/0,1042,1466,00.html
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 30 Sep 1997 09:03:21 -0400 (EDT)
|
|
From: editor@TELECOM-DIGEST.ORG
|
|
Subject: File 8--Spam Analysis
|
|
|
|
((MODERATORS' NOTE: For those not familiar with Pat Townson's
|
|
TELECOM DIGEST, it's an exceptional resource. From the header
|
|
of TcD:
|
|
"TELECOM Digest is an electronic journal devoted mostly but
|
|
not exclusively to telecommunications topics. It is
|
|
circulated anywhere there is email, in addition to various
|
|
telecom forums on a variety of public service systems and
|
|
networks including Compuserve and America On Line. It is also
|
|
gatewayed to Usenet where it appears as the moderated
|
|
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
|
|
qualified organizations and individual readers. Write and tell
|
|
us how you qualify:
|
|
* ptownson@massis.lcs.mit.edu * ======" ))
|
|
==================
|
|
|
|
|
|
|
|
Source - TELECOM Digest Tue, 30 Sep 97 Volume 17 : Issue 265
|
|
|
|
Date: Sun, 28 Sep 1997 19:02:54 -0400
|
|
From--The Old Bear <oldbear@arctos.com>
|
|
Subject--Spam Analysis
|
|
|
|
|
|
Pat:
|
|
|
|
The following is something I did about two months ago to get a better
|
|
understanding of the kind of "unsolicitied commercial email" that
|
|
is being spewed into my mailbox. Readers of TELECOM Digest may
|
|
find it of interest, particularly the observations about:
|
|
|
|
1. the *size* of the typical spam email message versus
|
|
the that of the typical legitimate individual message;
|
|
|
|
2. the volume of spam compared with legitimate messages
|
|
(other than subscribed mailing lists and other solicited
|
|
bulk mail);
|
|
|
|
3. the apparent evolution of a subset of standard English
|
|
punctuation which might be called 'spammese'.
|
|
|
|
|
|
From--oldbear@arctos.com (The Old Bear)
|
|
Subject--the case of the telltale exclamation point !
|
|
Date--Fri, 1 Aug 1997 18:48:18 -0400
|
|
|
|
Since the beginning of the year, rather than deleting email SPAM, I
|
|
have been filtering it off into a file called "SPAM" for purposes of
|
|
intellectual curiosity.
|
|
|
|
Well, it being a slow Friday afternoon, I decided to do some analysis.
|
|
|
|
First, let me say that I already filter the 'from:' field to sort
|
|
mail from subscribed lists and newsletters into appropriate folders.
|
|
That reduces the mail volume in my general in-box considerably.
|
|
|
|
I also filter mail from about ten individuals from whom I regularly
|
|
expect to receive mail into a priority folder.
|
|
|
|
That left 2,195 messages as "general" in-box material, or for the 213
|
|
days, an average of 10.3 unclassified messages per day.
|
|
|
|
Of these 2,195 messages, I had manually sorted out 715 "spam" messages,
|
|
or roughly 32% of the total unclassified message traffic.
|
|
|
|
It should be noted that on a 'number of bytes' basis, the percentage
|
|
of "spam" is much larger, totally 3,385KB of 6,809KB, or 50%. This
|
|
means that the average "spam" email is 4.74KB compared with the
|
|
average "real" e-mail being only 2.31KB including headers. A very
|
|
scary statistic.
|
|
|
|
Having noticed that spammers are not only verbose, but have a propensity
|
|
to use needless exclamation points in the subject line, I decided to
|
|
see what would happen if I filtered out any email message from the
|
|
unclassified message traffic which contained a "!" in the subject line.
|
|
|
|
Of 715 spams, 262 messages were selected -- a detection rate of 37%.
|
|
|
|
Of 1480 "real" messages, 75 were selected -- a false positive rate of
|
|
only 5%.
|
|
|
|
A further examination of the "false positives" showed that 22 of
|
|
them related to the contact management software "ACT!" made by
|
|
Symantec and about which I had been in correspondence with several
|
|
other users at one point earlier in the year. Obviously, an
|
|
unfortunate choice of product name.
|
|
|
|
Another 20 messages were replies to subject lines containing "!"
|
|
which I foolishly had originated myself, such as "Happy birthday!"
|
|
and "thanks!" -- something I pledge never to do again.
|
|
|
|
That brings random "false positives" to 33, or 2% which may or may not
|
|
be an acceptable level to any particular email user.
|
|
|
|
In summary, based upon my sample (your mileage may vary), just
|
|
filtering for exclamation points intercepts 37% of incoming "spam"
|
|
while erroneously intercepting only 2% of bona fide message traffic.
|
|
|
|
Personally, manually trashing ten messages per day is not so onerous
|
|
that I would risk losing 2% of my valid unclassified email. But it
|
|
does provide some indication of how "intelligent" filtering might be
|
|
possible under current circumstances.
|
|
|
|
Unfortuantely, 'professional' spammers eventually will figure out the
|
|
filtering algorithms much like professional tax advisors have figured
|
|
out what provokes an electronic IRS audit flag, or how shrewd job
|
|
applicants have figured out what will get their resumes flagged by
|
|
personnel departments which use electronic scanning.
|
|
|
|
Even so, most of the annoying amateur multi-level marketing and chain
|
|
letter garbage is so stupidly constructed that taking it out of the
|
|
mailstream should be relatively easy -- even though doing it at the
|
|
end point remains a tremendously inefficient use of resources.
|
|
|
|
|
|
Cheers,
|
|
|
|
The Old Bear
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 09 Oct 1997 09:01:18 -0700
|
|
From: Jonathan Wallace <jw@bway.net>
|
|
Subject: File 9--THE X-STOP FILES: The Truth Isn't Out There
|
|
|
|
SLAC Bulletin, October 9, 1997
|
|
-----------------------------
|
|
|
|
The SLAC bulletin is a periodic mailer on Internet freedom of
|
|
speech issues from the authors of Sex, Laws and Cyberspace (Henry
|
|
Holt 1996). For more information, contact Jonathan Wallace,
|
|
jw@bway.net, or visit our Web pages at
|
|
http://www.spectacle.org/freespch/.
|
|
|
|
THE X-STOP FILES: The Truth Isn't Out There
|
|
|
|
by Seth Finkelstein
|
|
|
|
So another censorware product has been found to secretly been
|
|
blacklisting gay and lesbian material, anti-censorship sites, feminist
|
|
resources and an incomprehensible scattershot collection of totally
|
|
innocuous organizations. We can treat this as yet another "bad apple" in
|
|
the endless search for the magic anti-porn program. Or we can use it as
|
|
a basis for examining why such a program won't ever exist.
|
|
|
|
A censorware blacklist seems to enjoy the enviable status of
|
|
being assumed perfect until exposed as otherwise. Even though
|
|
CyberSitter and NetNanny were caught banning the National Organization
|
|
for Women, and CyberPatrol stigmatizes feminist discussion and
|
|
electronic newspaper articles about gays as "Sexual Acts", every new
|
|
expose of this type seems to follow a pattern. First, it is greeted with
|
|
great surprise (and denial) by too many people. Then the company's
|
|
public relations staff issues a weasel-worded press release of
|
|
excuses. Finally, later, we are told that that particular program may
|
|
have problems, but there's another one which is better, and the cycle
|
|
begins anew.
|
|
|
|
The X-stop case is notable not for what it was exposed to be
|
|
banning in secret - that had a heavy helping of the usual suspects who
|
|
fare badly under any sort of blacklisting. But the significance lies in
|
|
that the claims it made were such an egregious example of statements
|
|
which were dubious to ludicrous, yet were frequently uncritically
|
|
repeated in debate. Journalists would not dream of, say, gullibly
|
|
accepting a politician's claim that no campaign actions violated
|
|
controlling legal authority even though all records are secret and
|
|
would not be disclosed, but the outlandish propaganda of
|
|
censorware-touters is too often parroted without the slightest
|
|
skepticism (this isn't restricted to X-Stop, others such as BESS,
|
|
Websense, etc. have received similar build-ups, and are now starting
|
|
along the cycle of exposure described above).
|
|
|
|
Just to start, X-stop's marketers made a prominent assertion
|
|
that their censorware had a blacklist which contained only entries for
|
|
material which is obscene according to the _Miller_ standard (a
|
|
definition set out by the Supreme Court). Note this is not a vague
|
|
claim about "pornography", which is a broad and hard to pin down term,
|
|
but a very strong statement about a legal standard. Obscenity is a
|
|
legal terms of art. A complex test must be met, and it is a difficult
|
|
judicial determination. All material is initially presumed non-obscene
|
|
until such a ruling. Moreover, obscenity is not a constant, not an
|
|
intrinsic property, but a geographic variable. It varies from place to
|
|
place, that is the "community standards" part of the _Miller_ test
|
|
(note this prong is typically greatly overemphasized by people trying
|
|
to suppress material, it's just one aspect of a highly involved
|
|
determination).
|
|
|
|
Just from this, it should be obvious that either X-Stop was
|
|
lying, or it was a *very* small list. No great knowledge is required,
|
|
just basic understanding of the meaning of the terms in the claim. And
|
|
such a list would be unlikely to please many censorware advocates. For
|
|
example, explicit safer-sex educational information, a frequent
|
|
subject of controversy, wouldn't be obscene.
|
|
|
|
Perhaps someone wants to be generous, and rewrite X-Stop's claim
|
|
into something such as "likely to be obscene somewhere in the country".
|
|
This would still be a near-impossible task to list with any significant
|
|
coverage of the net. There are so many sites on the Internet, all
|
|
changing so rapidly, that it would require an army of censors to even
|
|
try to keep up in evaluating them. And people who have some knowledge of
|
|
how to make a legal determination typically aren't working for minimum
|
|
wage.
|
|
|
|
X-Stop's answer to the above barrier was the "Mudcrawler"
|
|
searching program. However, for a computer program to have any sort of
|
|
ability to apply a complex legal standard would be an
|
|
artificial-intelligence breakthrough of Nobel Prize magnitude. It hardly
|
|
will be the technology of a little company making blacklists. While
|
|
this perhaps isn't obvious to the general public, it should be clear to
|
|
anyone with the most minimal familiarity with technical issues.
|
|
|
|
Yet with all of this pointing to the near-impossibility of
|
|
X-Stop's claims, they passed very much unchallenged. The lesson here
|
|
isn't "another bad blocker". It is rather how easy it is for even the
|
|
most absurd censorware public-relations fluff to be taken seriously,
|
|
while the truth is far different. And that whenever censor-minded people
|
|
are given free reign to ban with secret blacklists, no matter what they
|
|
say in public, in reality they also target their traditional enemies -
|
|
feminists, gays and lesbians, anti-censorship sites, and so on.
|
|
|
|
----------------------------------------------------
|
|
Seth Finkelstein is a software developer who takes a
|
|
particular interest in censorware and ratings systems.
|
|
His Web pages on the subject are at
|
|
http://www.mit.edu/activities/safe/labeling/summary.html.
|
|
|
|
|
|
---------------------------------------
|
|
Jonathan Wallace
|
|
The Ethical Spectacle http://www.spectacle.org
|
|
Co-author, Sex, Laws and Cyberspace http://www.spectacle.org/freespch/
|
|
|
|
"We must be the change we wish to see in the world."--Gandhi
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 09 Oct 1997 20:31:49 -0400
|
|
From: "Evian S. Sim" <evian@escape.com>
|
|
Subject: File 10--Mitnick Trial Date Set
|
|
|
|
October 8, 1997
|
|
|
|
By DAVID HOUSTON
|
|
City News Service
|
|
|
|
LOS ANGELES (CNS) - A federal judge today seemed to back away
|
|
from her earlier promise not to let famed hacker Kevin Mitnick
|
|
anywhere near a computer to prepare for his trial.
|
|
|
|
Mitnick attorney Donald Randolph told U.S. District Judge Mariana
|
|
Pfaelzer there are potentially millions of documents on databases
|
|
that could take hundreds of hours to inspect and read.
|
|
|
|
Assistant U.S. Attorney David Schindler said if all the documents
|
|
were printed it would fill up a larger space than the courtroom.
|
|
|
|
Reluctantly, the judge seemed to warm to the idea of allowing the
|
|
defendant to use a computer. She told Randolph to confer with
|
|
prosecutors to find the best way for Mitnick to view evidence
|
|
against him.
|
|
|
|
But Pfaelzer warned: "I'm not going to have a whole succession
|
|
of unfortunate events to take place because while he was
|
|
incarcerated we gave him access to a computer."
|
|
|
|
Randolph wants Mitnick to be allowed to use a laptop computer,
|
|
under supervision, at the federal Metropolitan Detention Center.
|
|
He promised the computer would be modem-less, to prevent Mitnick
|
|
from wreaking the kind of havoc he has done in the past.
|
|
|
|
Mitnick was on parole for other computer-related offenses when he
|
|
and co-defendant Lewis DePayne went on a 1992-95 hacking spree.
|
|
|
|
According to a 25-count federal indictment, Mitnick and DePayne
|
|
stole millions of dollars in software from high-tech companies,
|
|
damaged USC computers and used stolen computer passwords.
|
|
|
|
DePayne, who is not in custody, did not show up in court today.
|
|
Attorney Richard Sherman said his client was in San Francisco.
|
|
Pfaelzer's comments came during a trial date-setting status
|
|
conference.
|
|
|
|
The judge tentatively set trial for April 14. But Randolph
|
|
warned that it might have to be pushed back if it takes longer
|
|
than expected to view the computer-held evidence.
|
|
|
|
"I'm told it could take more than 200 hours to look at all the
|
|
stuff that is there," he said.
|
|
|
|
Earlier this year, Pfaelzer told Randolph "no way, no how" would
|
|
she allow the habitual hacker access to another computer.
|
|
|
|
Pfaelzer has good reason to be leery of Mitnick.
|
|
|
|
He has been before her several times for different,
|
|
computer-related offenses. In June, she gave him 22 months
|
|
behind bars for violating his parole and breaking into Pacific
|
|
Bell's computers.
|
|
|
|
The judge also chastised Randolph for the amount of bills he has
|
|
submitted to the court for Mitnick's defense---particularly for
|
|
computer experts. Mitnick has no money and the government is
|
|
paying the legal bills.
|
|
|
|
"I've rarely ever seen bills that high. I'm absolutely stunned
|
|
at what those bills look like," she said. "If you think you're
|
|
going to have an unlimited budget, you're wrong."
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 11--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.73
|
|
************************************
|
|
|