806 lines
36 KiB
Plaintext
806 lines
36 KiB
Plaintext
|
||
Computer underground Digest Sun Jan 25, 1998 Volume 10 : Issue 06
|
||
ISSN 1004-042X
|
||
|
||
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
Archivist: Brendan Kehoe
|
||
Shadow Master: Stanton McCandlish
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Field Agent Extraordinaire: David Smith
|
||
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
||
CONTENTS, #10.06 (Sun, Jan 25, 1998)
|
||
|
||
File 1--Update on '96 student who "threatened" Calif Senator
|
||
File 2--Cyber-Liberties Update, January 17, 1998
|
||
File 3--Suit Filed in Navy/AOL Privacy Case; Discharge Delayed
|
||
File 4--AOL Targets Online Habits
|
||
File 5--AOL/Steve Case response to "Privacy" criticisms
|
||
File 6--Fwd: Virtual Intellectual Property newsletter
|
||
File 7--Re: Cu Digest, #10.04 - More on Microsoft
|
||
File 8--Calif Spam Bill Raises Commercial Speech, Commerce Concerns
|
||
File 9--press release from CYBERsitter on "suicide sites"
|
||
File 10--German Parliament Approves Bugging Bill
|
||
File 11--New Encryption Rules Could Relax Export Criminalization
|
||
File 12--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
Date: Tue, 20 Jan 1998 21:55:08 -0700
|
||
From: Jose Saavedra <guru69@prodigy.net>
|
||
Subject: File 1--Update on '96 student who "threatened" Calif Senator
|
||
|
||
Dear Mr. Thomas
|
||
|
||
About 2 years ago in May of 1996, you posted a article about a student from
|
||
El Paso, TX being arrested for "threatening" a Senator from California. I
|
||
happen to be that student and let me give you an update of what happened.
|
||
In September of 1996, the real culprit came forward and said he was that
|
||
person who said those awful things about Sen. Leslie. He talked to my
|
||
lawyer at the time and my lawyer said that I took the blame and that person
|
||
got upset and called me foolish and immature. My charge was reduced down
|
||
to a Class A Misdemeanor and eventually was dropped. Now I am a very
|
||
successful student at University of Texas at El Paso majoring in Music
|
||
Education with a minor in Music Technology. I want to thank you because
|
||
that article did not say anything bad about me.
|
||
|
||
Sincerely,
|
||
|
||
Jose Saavedra
|
||
jsaavedr@mail.utep.edu
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 17 Jan 1998 20:26:30 -0500 (EST)
|
||
From: owner-cyber-liberties@aclu.org
|
||
Subject: File 2--Cyber-Liberties Update, January 17, 1998
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Navy Officer Discharged After AOL Disclosure of Private Information
|
||
|
||
The Navy announced that it will delay its plans to formally discharge a
|
||
highly decorated officer from service until January 21 for allegedly
|
||
violating the militarys "Dont ask, dont tell" policy by listing his
|
||
marital status as "gay" on an Internet user profile.
|
||
|
||
The announcement came after Senior Chief Petty Officer Timothy R.
|
||
McVeigh (no relation to the Okla. City bomber) filed suit against Naval
|
||
investigators Jan. 15 for obtaining confidential information about him
|
||
illegally from his Internet Service Provider, America Online (AOL).
|
||
|
||
The Electronic Communications Privacy Act, ("ECPA") prohibits online
|
||
service providers, such as AOL, from releasing subscriber information to
|
||
the government without a court order stating that the information is
|
||
pertinent to a criminal investigation or without the consent of the
|
||
subscriber. No such order or permission was obtained by the Navy in
|
||
this case.
|
||
|
||
"Neither the military nor AOL appear to have any respect for online
|
||
privacy rights manifested under federal law. It is sad to learn that the
|
||
government is violating the rights of the very people who pledge their
|
||
lives to defend our democratic liberties," ACLU Staff Attorney Ann
|
||
Beeson said.
|
||
|
||
The discharge hearings against McVeigh began after a Navy civilian
|
||
received a message from an AOL address and looked up the senders
|
||
profile. The profile identified the sender as a Navy officer named "Tim"
|
||
and listed his marital status as "gay." However, the profile did not
|
||
include the senders full name. The Navy civilian forwarded this
|
||
information to Naval investigators.
|
||
|
||
During the discharge hearing held against McVeigh last November, a Naval
|
||
Investigator testified that he spoke with an AOL representative to
|
||
obtain the full name of the account holder whose user profile was
|
||
obtained by the civilian. He was given the identification information
|
||
without a court order as mandated by law. The information from
|
||
McVeighs AOL profile is the only evidence that was presented by the
|
||
Navy to show that McVeigh violated the "Dont ask, Dont tell" policy.
|
||
|
||
AOL has denied any wrongdoing. AOL has a privacy policy that states
|
||
that personally identifiable information will remain strictly
|
||
confidential unless it receives express permission, an emergency order
|
||
or court order. The policy states:
|
||
|
||
Because protecting your privacy is very important to America
|
||
Online...[w]e will NOT disclose any Individual Information except in
|
||
limited circumstances..."
|
||
|
||
It is our policy not to disclose to third parties Member Identity
|
||
information that links a Members screen name(s) with a Members actual
|
||
name, unless required to do so by law or legal process served on AOL
|
||
Inc. (e.g., subpoena). AOL Inc. reserves the right to make exceptions to
|
||
this policy in exceptional circumstances (such as a bomb or suicide
|
||
threat, or instances of suspected illegal activity) on a case-by-case
|
||
basis and at AOL Inc's sole discretion.
|
||
|
||
AOL Inc. intends to abide by applicable laws governing the disclosure to
|
||
governmental entities of Members Individual Information and other
|
||
records. When responding to legal process served on AOL Inc. by
|
||
non-government entities, unless otherwise ordered, AOL Inc's current
|
||
policy is to make reasonable efforts to notify affected Member(s) in
|
||
advance of releasing the information in order to provide Member(s) an
|
||
opportunity to pursue any available legal protection.
|
||
|
||
"What this case highlights is just how easy it is to obtain and abuse
|
||
personal information and the need for Congress to enact strong privacy
|
||
legislation. The public also needs to be aware of how their personal
|
||
information can be given away without their knowledge or consent," the
|
||
ACLU said.
|
||
|
||
The ACLU recently launched a campaign called Take Back Your Data to
|
||
inform the public about data collection and abuses and plans to present
|
||
the Congress with a model bill to safeguard online privacy this
|
||
session.
|
||
|
||
Information about McVeighs case can be found online at:
|
||
<http://www.geocities.com/Pentagon/9241/INFO.HTML>
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 15 Jan 1998 15:10:06 -0500
|
||
From: Electronic Privacy Info Center <info@epic.org>
|
||
Subject: File 3--Suit Filed in Navy/AOL Privacy Case; Discharge Delayed
|
||
|
||
ELECTRONIC PRIVACY INFORMATION CENTER
|
||
http://www.epic.org
|
||
|
||
P R E S S R E L E A S E
|
||
|
||
|
||
For Immediate Release Contact:
|
||
Thursday, January 15, 1998 David L. Sobel
|
||
EPIC Legal Counsel
|
||
(202) 544-9240
|
||
|
||
|
||
SAILOR SUES NAVY FOR ONLINE PRIVACY VIOLATION;
|
||
GOVERNMENT AGREES TO DELAY PENDING DISCHARGE
|
||
|
||
Washington, DC -- A highly decorated Navy Senior Chief Petty
|
||
Officer today filed suit challenging a pending discharge based
|
||
upon information the Navy illegally obtained from America Online.
|
||
The lawsuit, filed in U.S. District Court in Washington, charges
|
||
that Naval investigators violated the federal Electronic
|
||
Communications Privacy Act (ECPA) when they requested and
|
||
received confidential subscriber information from AOL, the
|
||
nation's largest online service.
|
||
|
||
In response to the lawsuit, Government attorneys have agreed
|
||
to delay the pending discharge until next Wednesday, January 21,
|
||
to allow time for judicial consideration of McVeigh's claims.
|
||
|
||
Navy officials had ordered the discharge of the sailor,
|
||
Timothy R. McVeigh (no relation to the convicted Oklahoma City
|
||
bomber), effective tomorrow morning (Eastern time) on the ground
|
||
that McVeigh violated the military's "Don't Ask, Don't Tell"
|
||
policy on homosexuality. The Navy's proposed action is based
|
||
entirely upon information obtained from AOL linking the sailor to
|
||
a "screen name" on the system in which the user's marital status
|
||
was listed as "gay."
|
||
|
||
The information was received from AOL in clear violation of
|
||
ECPA, which prohibits the government from obtaining "information
|
||
pertaining to a subscriber" without a court order or subpoena.
|
||
In addition to the privacy protections contained in ECPA, AOL's
|
||
contractual "Terms of Service" prohibit the company from
|
||
disclosing such information to *any* third party "unless
|
||
required to do so by law or legal process."
|
||
|
||
According to EPIC Legal Counsel David L. Sobel, McVeigh's
|
||
lawsuit is the first case to challenge governmental access to
|
||
sensitive subscriber information maintained by an online service.
|
||
"This case is an important test of federal privacy law," Sobel
|
||
said. "It will determine whether government agents can violate
|
||
the law with impunity, or whether they will be held accountable
|
||
for illegal conduct in cyberspace." He noted that the incident
|
||
also raises serious questions concerning the adequacy of
|
||
contractual privacy protections like those contained in the AOL
|
||
subscriber agreement.
|
||
|
||
In a letter sent to Navy Secretary John Dalton yesterday,
|
||
the Electronic Privacy Information Center urged a postponement
|
||
of McVeigh's discharge pending an investigation of the Navy's
|
||
conduct. EPIC noted that, "Any other result would make a
|
||
mockery of federal privacy law and subject the American people
|
||
to intrusive and unlawful governmental surveillance."
|
||
|
||
Senior Chief McVeigh is being represented by the Washington
|
||
law firm of Proskauer Rose LLP.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Jan 1998 13:19:31 -0800 (PST)
|
||
From: "Brock N. Meeks" <brock@well.com>
|
||
Subject: File 4--AOL Targets Online Habits
|
||
|
||
Source - fight-censorship@vorlon.mit.edu
|
||
|
||
In light of the flap over the sailor's name being released by AOL to
|
||
Naval investigators, the following story may be of interest, as well:
|
||
|
||
|
||
AOL Targets Online Habits for Profit
|
||
by Brock N. Meeks
|
||
MSNBC
|
||
|
||
WASHINGTON-America Online plans to target its subscribers with
|
||
advertisements based on the areas they visit while connected to the
|
||
system, MSNBC has learned. The move is a dramatic shift away from how
|
||
AOL has traditionally used so-called "navigational" data that the company
|
||
routinely collects on its subscribers. Previously, navigational data has
|
||
only been used for system enhancements; now it becomes a powerful
|
||
marketing tool.
|
||
|
||
[snip]
|
||
|
||
According to the memo obtained by MSNBC, key changes include a new
|
||
marketing scheme called "personalization," and a time limit for marketing
|
||
preferences to be maintained by AOL.
|
||
|
||
The "personalization" preference "refers to targeting and promoting
|
||
offers to Members based on the areas they visit online," according to the
|
||
memo. As an example, AOL says that if someone checks up on a particular
|
||
sports team every day, "he could be shown a special sports promotion or
|
||
receive an offer to buy an NFL jersey determined by his past usage of the
|
||
sports area." Users will have the ability to not be targeted, based on
|
||
their online usage, the memo says.
|
||
|
||
[snip]
|
||
|
||
The targeted ad campaign is troublesome for David Banisar, a policy
|
||
analyst for the Electronic Information Privacy Center in Washington,
|
||
D.C. "What's now happening is that we're seeing a rather substantive
|
||
increase in the collection of personal information about individuals
|
||
that's then going to be used to target them for what ever purposes,"
|
||
Banisar said. "AOL has a fairly bad record going back several years now
|
||
of not even being able to adequately control the data they collect."
|
||
|
||
The full story can be found at:
|
||
|
||
http://www.msnbc.com/news/136984.asp
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 25 Jan 1998 13:34:09 -0600
|
||
From: jthomas@VENUS.SOCI.NIU.EDU(Jim Thomas)
|
||
Subject: File 5--AOL/Steve Case response to "Privacy" criticisms
|
||
|
||
Dear Members,
|
||
|
||
For more than a decade, we have been working hard to build an
|
||
interactive medium we can all be proud of. We have always
|
||
recognized that privacy was an absolutely central building block
|
||
for this medium, so from day one we've taken steps to build a
|
||
secure environment that our members can trust.
|
||
|
||
We handle over one million calls each week in our customer
|
||
service centers, and we protect the privacy of our members with
|
||
great care and with stringent rules.
|
||
Our member services representatives understand the importance
|
||
of not disclosing any account information to anyone who is not
|
||
the verified account holder. The verification process is
|
||
sophisticated, and our policies are effective, clear and well
|
||
communicated to all of our employees.
|
||
|
||
So it is with regret that we recently learned about an incident
|
||
that compromised the privacy of one of our members, a Navy
|
||
sailor. A member services representative received a call from
|
||
somebody who later turned out to be a Navy investigator but
|
||
called himself a friend of the member. The caller asked us to
|
||
confirm that a screen name that was on something he had received
|
||
was the AOL member's. Our employee should have refused to do
|
||
this. Unfortunately, he did confirm the member's identity to
|
||
the caller.
|
||
|
||
As we've said publicly, this should not have happened, and we
|
||
deeply regret it.
|
||
|
||
After a thorough review, we've confirmed this was a matter of
|
||
human error. Our representative understood our privacy policies
|
||
and procedures, but made a mistake -- a mistake for which we
|
||
take complete responsibility.
|
||
|
||
In light of this incident, we are taking additional steps to
|
||
protect the privacy of our members. First, we are reinforcing
|
||
the existing policies and procedures with additional employee
|
||
training, including the use of case studies to highlight unusual
|
||
facts and circumstances that member services representatives
|
||
should know how to respond to. Second, we'll test our employees
|
||
on their understanding of these policies and procedures. Third,
|
||
we have communicated to our member services representatives the
|
||
importance of not "confirming" a member's personal account
|
||
information, even to that member's friends and family. Fourth,
|
||
all representatives will be required to acknowledge in writing
|
||
that they understand AOL's privacy policies on a regular basis.
|
||
Finally, we will do everything possible to ensure that
|
||
government agencies follow the law in seeking information about
|
||
our members.
|
||
|
||
AOL's commitment to protecting the privacy of our members is
|
||
stronger than ever. We will keep working to make AOL a service
|
||
you can rely on, and this medium
|
||
something we can, indeed, all be proud of.
|
||
|
||
Regards,
|
||
|
||
Steve Case
|
||
|
||
------------------------------
|
||
|
||
Date: 01/10 4:14 AM
|
||
From: Charles C. Mann, ccm@crocker.com
|
||
Subject: File 6--Fwd: Virtual Intellectual Property newsletter
|
||
|
||
This is part of a posting to the cni-copyright list. It has enough
|
||
distressing implications that I thought you might be interested.
|
||
Charles C. Mann
|
||
|
||
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
|
||
V.I.P. (Virtual Intellectual Property) Newsletter U.S.
|
||
Intellectual Property & New Media Law Update Monday, December 29,
|
||
1997 Volume I, Issue XXXIII Bazerman & Drangel, P.C.
|
||
|
||
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
|
||
(C) Bazerman & Drangel, P.C. 1997
|
||
|
||
*********************************************
|
||
|
||
<table of contents snipped out>
|
||
|
||
*********************************************
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
NEW YORK'S LIBRARY PRIVILEGE -
|
||
FREEDOM OF INFORMATION ACT AND
|
||
EMPLOYEES' INTERNET USE
|
||
|
||
Quad/Graphics Inc. v. Southern Adirondack Library System (N.Y. Sup.
|
||
Ct. - Decided- September 30, 1997)
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
This is a rather interesting case of first impression. Petitioner is
|
||
a major national commercial printing house headquartered in Wisconsin.
|
||
It has a thousand employees and uses computers extensively in its
|
||
business. High long distance bills led Petitioner to suspect that its
|
||
computers were being misused. Defendant, Southern Adirondack Library
|
||
Systems, is a cooperative system consisting of 30 member libraries
|
||
located in four upstate New York counties which, among other things
|
||
operates an electronic information service known as "Library Without
|
||
Walls." ("LWW") Once one obtains a valid library card and a personal
|
||
identification number, access is free for 30 minute periods.
|
||
|
||
Petitioner's employees are prohibited from using company computers for
|
||
personal purposes. Although these computers do not normally have the
|
||
capability of directly accessing outside lines, a knowledgeable user
|
||
can do so through a network connection with the company's mainframe
|
||
computer. Internet access for personal use from April 1995 to December
|
||
1996 cost Petitioner over $23,000 in long distance telephone charges
|
||
and some 1,770 employee man hours.
|
||
|
||
Petitioner feels a little put upon and, accordingly, desired to sue
|
||
its web-searching employees but couldn't figure out who they were.
|
||
Petitioner has been able to decipher nine 13 digit identification
|
||
numbers which were used to access the LWW from its computer system. In
|
||
an effort to learn the identities behind the nine identification
|
||
numbers, it made a New York Freedom Of Information request to the
|
||
Library. Since the library system is a quasi-municipal agency,
|
||
Petitioner argues that it is bound by the Freedom Of Information law.
|
||
This was rejected by the library, which considered such information as
|
||
confidential and not to be voluntarily disclosed. Plaintiff
|
||
petitioned to compel pre-litigation disclosure of the names of certain
|
||
of the employees using the located numbers. The Library, maintained
|
||
that under New York Civil Procedure Law and Rules Sec. 4509 the
|
||
identities are required to be kept confidential, since they are
|
||
library records which contain names of personal identity, and details
|
||
regarding the users of a library. The Court found that this New York
|
||
State statute provided protection against the requested disclosure,
|
||
noting that "for the application to be granted, the door would be open
|
||
to other similar requests made, for example, by a parent who wishes to
|
||
learn what a child is reading or viewing on the Internet via LWW or by
|
||
a spouse to learn what type of information his or her mate is
|
||
reviewing in the public library."
|
||
|
||
The decision may be seen at:
|
||
|
||
http://www.lcp.com/products/NY/slipops/pay/misc/F9757370.htm
|
||
|
||
VIP is put out by:
|
||
Bazerman & Drangel, P.C.
|
||
Intellectual Property and New Media Attorneys
|
||
60 East 42nd Street
|
||
Suite 1158
|
||
New York, NY 10165
|
||
tel: 212 292 5390
|
||
fax: 212 292 5391
|
||
e-mail: bdpc@ipcounselors.com
|
||
The complete set of newsletters can now be viewed at:
|
||
http://www.ipcounselors.com/
|
||
To subscribe, send a message to bdpc@ipcounselors.com with
|
||
"subscribe update" in the body of the message.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 21 Jan 1998 14:22:32 -0700
|
||
From: Doc Holliday <Doc_Holliday@AWWWSOME.COM>
|
||
Subject: File 7--Re: Cu Digest, #10.04 - More on Microsoft
|
||
|
||
<CuD snip>
|
||
|
||
>begs an obvious question: Do the Ends justify the Means?
|
||
>
|
||
>Sure, Microsoft has definately made some major contributions to the
|
||
>computing industry, albiet it can be argued that those contributions are
|
||
>wholly self-serving in the end. But despite this, there are numerous
|
||
>documented incidents where Microsoft overstepped its bounds and gained a
|
||
>competitve advantage in an unethical and possibly illegal fashion. Yes,
|
||
>we're all fully aware that Microsoft didn't create the trend, but we're
|
||
>also not going to go jumping off bridges because everyone else is doing it
|
||
>too.
|
||
|
||
Yes, Microsoft was not the first to use unethical and, possibly,
|
||
illegal means to advances its interests. However, that doesn't
|
||
mean it is acceptable.
|
||
|
||
Prior to WWII German signed a pact referred to as the London
|
||
Submarine Pact of 1936. The pact said, basically, the signatories
|
||
would not sink merchant ships until the crew and the ships papers
|
||
were in a safe place. The United States signed this pact, too.
|
||
|
||
During their trial by the International Military Tribunal in
|
||
Nuremburg, Admirals Raeder and Doenitz asked for statements of US
|
||
Policy on sinking Japanese merchant traffic in the Pacific. Adm.
|
||
Nimitz said that, essentially, he did not comply with the London
|
||
Submarine Pact of 1936.
|
||
|
||
Defendants Doenitz and Raeder attempted to use this admission as
|
||
a "tu quoque" defense to the allegations German U-Boats sank
|
||
allied merchant traffic in the Atlantic without warning. "tu
|
||
quoque" essentially is an assertion by one party that they are
|
||
not guilty of anything, if the accusing party or others have done
|
||
the same thing without being prosecuted.
|
||
|
||
The International Military Tribunal did not accept the admirals
|
||
"tu quoque" defense. Raeder was sentenced to life in prison and
|
||
Doenitz to 10 years in prison.
|
||
|
||
I doubt a "tu quoque" defense presented by Microsoft would be any
|
||
more favorably received than was Raeder and Doenitz's.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 17 Jan 1998 20:26:30 -0500 (EST)
|
||
From: owner-cyber-liberties@aclu.org
|
||
Subject: File 8--Calif Spam Bill Raises Commercial Speech, Commerce Concerns
|
||
|
||
Source - Cyber-Liberties Update, January 17, 1998
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
California Spam Bill Raises Commercial Speech, Commerce Concerns
|
||
|
||
Unsolicited e-mail advertisement, or "spam," has few fans on the net.
|
||
Court battles have been waged between service providers, such as AOL and
|
||
Compuserve, and spam advertisers, including Cyber Promotions, over
|
||
whether the thousands of messages sent to user e-mails can be blocked.
|
||
|
||
During the last session of the Congress several bills to ban or prohibit
|
||
"spamming" were introduced, but many were fraught with First Amendment
|
||
problems because they ban commercial speech altogether or are content
|
||
specific. Now, many states have entered the debate, raising even more
|
||
constitutional concerns over potential commerce clause violations.
|
||
|
||
California Assemblyman Gary Miller recently introduced a state anti-spam
|
||
bill (AB 1629) similar to the "Netizen Protection Act," introduced last
|
||
year in Congress by Rep. Christopher Smith. The bill would prohibit
|
||
businesses from sending unsolicited commercial e-mail to California
|
||
residents unless that person has a preexisting business or personal
|
||
relationship with the recipient, or the recipient has provided express
|
||
consent to the sender.
|
||
|
||
The bill would also authorize the recipient of unwanted mail received in
|
||
violation of the statute to bring suit against the sender to enjoin
|
||
future solicitations and to recover damages and attorneys fees.
|
||
|
||
"This bill may face serious constitutional obstacles given last years
|
||
decision in ALA v. Pataki, which held that state control or regulation
|
||
of Internet communications violates the Commerce Clause of the
|
||
Constitution," said Cassidy Sehgal, ACLU William J. Brennan First
|
||
Amendment Fellow. "Moreover, commercial speech is entitled to full
|
||
First Amendment protection and it is unclear that the bill may place an
|
||
outright ban on commercial messages."
|
||
|
||
In the decision in ALA v. Pataki, which involved a challenge by the ACLU
|
||
to a New York Internet decency law, federal district Judge Loretta
|
||
Preska declared that states are prohibited from regulating an interstate
|
||
communication which merely passes through their borders. Judge Preska
|
||
warned of the extreme danger that state regulation would pose to the
|
||
Internet, rejecting the state's argument that the statute would even be
|
||
effective in preventing so-called "indecency" from reaching minors.
|
||
Hence, state spam bills will probably not withstand constitutional
|
||
challenges. The decision in ALA v. Pataki is
|
||
available at <http://www.aclu.org/court/nycdadec.html>
|
||
|
||
Traditionally, commercial speech restrictions on telemarketing calls and
|
||
unsolicited fax advertisements have passed First Amendment challenges
|
||
but direct mail and door-to-door solicitations enjoy much greater
|
||
protection. Given the Supreme Court decision in ACLU v. Reno, on-line
|
||
messages should receive the same First Amendment protection given
|
||
traditional print media, which includes commercial mailings. Thus, while
|
||
netizens may laud efforts to curb spam, it is unclear whether
|
||
unsolicited commercial e-mail bills can pass constitutional muster.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 14 Jan 1998 11:53:31 -0600 (CST)
|
||
From: Bennett Haselton <bennett@peacefire.org>
|
||
Subject: File 9--press release from CYBERsitter on "suicide sites"
|
||
|
||
Source -- fight-censorship@vorlon.mit.edu
|
||
|
||
On Sunday, a California teenager killed himself by throwing himself in front
|
||
of a train.
|
||
|
||
A reporter called me about it and my exact words were, I swear, "In the next
|
||
couple of days there will probably be a press release from one of the
|
||
blocking software companies talking about how their program could have
|
||
prevented this." Solid Oak Software's press release from this morning is below.
|
||
|
||
The exact same thing happened with the Heaven's Gate cult -- Solid Oak
|
||
Software sent out the same kind of press release, but Declan confirmed that
|
||
CYBERsitter had not been blocking the Heaven's Gate site before the suicides
|
||
took place.
|
||
|
||
The suicide FAQ is at:
|
||
http://www.duke.edu/~economak/suicide.html
|
||
|
||
-Bennett
|
||
|
||
>
|
||
> SANTA BARBARA, Calif.--(BUSINESS WIRE)--Jan. 14, 1998--CYBERsitter, the
|
||
>leading Internet filter from Solid Oak Software Inc., blocks Internet sites
|
||
>providing information on methods of committing suicide.
|
||
> In light of a recent tragedy involving a teenager's suicide, it is
|
||
>increasingly important that parents monitor their children's Internet
|
||
>activity, said Marc Kanter of
|
||
>Solid Oak Software. A California teenager was found possessing 20 pages of
|
||
>information on "How to Commit Suicide" that was reportedly retrieved from the
|
||
>Internet.
|
||
> Access to any information, whether appropriate for children or not, is
|
||
>a mouse-click away without filtering software installed on the home computer.
|
||
> CYBERsitter works by monitoring Internet activity and restricting
|
||
>access to adult-oriented material and sites not suitable for children. The
|
||
>fact that CYBERsitter
|
||
>can maintain a history of all Internet activity for later review especially
|
||
>provides parents the peace of mind that their children aren't accessing
|
||
>these sites in the first
|
||
>place.
|
||
> This feature has placed CYBERsitter as the filter of choice among
|
||
>parents, since the leading competition does not offer this option.
|
||
> CYBERsitter is best known for blocking access to the pornography found
|
||
>online. The other categories that CYBERsitter filters are also as
|
||
>important, such as
|
||
>advocating illegal/radical activities and advocating hate/intolerance.
|
||
> Parents must take an active role in their children's computer activity
|
||
>when it involves the Internet. Just as children need to be overseen in
|
||
>daily life, the same holds
|
||
>true on the Internet. With a few simple precautions, the use of filtering
|
||
>software and general good parenting, the Internet can be a safe and
|
||
>educational environment.
|
||
> Free trial versions of CYBERsitter are available for download from
|
||
>Solid Oak Software's Web site at www.cybersitter.com .
|
||
> CYBERsitter sells for $39.95, offers free filter file updates and is
|
||
>available directly from Solid Oak Software's Web site. It can be ordered by
|
||
>calling
|
||
>800/388-2761 or 805/884-8201. A network version, site licenses and
|
||
>educational discounts are available.
|
||
>===============================================
|
||
>Brian S. McWilliams
|
||
>News Radio editor, PC World Online
|
||
>http://www.pcworld.com/newsradio
|
||
>Voice: (603) 868-2949 Sound Off! (415) 267-4544
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 16 Jan 1998 09:56:24 -0800
|
||
From: "(--Todd Lappin-->)" <telstar@wired.com>
|
||
Subject: File 10--German Parliament Approves Bugging Bill
|
||
|
||
Source - fight-censorship@vorlon.mit.edu
|
||
|
||
Friday January 16 11:55 AM EST
|
||
|
||
German Parliament Approves Bugging Bill
|
||
|
||
By Mark John
|
||
|
||
BONN (Reuters) - The German parliament Friday narrowly passed a
|
||
controversial bill allowing police to bug suspected criminals for
|
||
the first time in post-World War Two Germany, despite protests from civil
|
||
liberty groups.
|
||
|
||
The vote followed approval by parliament's legal committee this week of a
|
||
compromise between Chancellor Helmut Kohl's government
|
||
and the opposition Social Democrats (SPD) to restore eavesdropping powers
|
||
banned since the Nazi era.
|
||
|
||
In a much tighter vote than expected, the Bundestag, parliament's lower
|
||
house, passed the measure by 452 votes to 184, thus securing
|
||
by four votes the two-thirds majority needed for laws which require
|
||
amendments to the German constitution.
|
||
|
||
Interior Minister Manfred Kanther played down suggestions the bill amounted
|
||
to a watering down of the strong guarantees of civil
|
||
liberties and privacy that West Germany set up in reaction to the abuses of
|
||
Hitler's Gestapo secret police.
|
||
|
||
"This is not a key issue for a constitutional state. It is a measure that
|
||
will only be used rarely to combat crime," Kanther told parliament.
|
||
|
||
But Manfred Such, a deputy for the environmentalist Greens who opposed the
|
||
bill, said it was a "black Friday" for Germany's
|
||
constitution.
|
||
|
||
The bill, if approved by the upper house of parliament, will allow police
|
||
to eavesdrop over an extended period of time on private homes
|
||
using high-tech surveillance devices such as directional microphones linked
|
||
to transmitters.
|
||
|
||
Electronic surveillance is currently only allowed in Germany if there is an
|
||
overwhelming suspicion that a crime is on the verge of being
|
||
committed.
|
||
|
||
Police say they need the powers to fight a surge in organized crime, but
|
||
lawyers, journalists and doctors have condemned the bill,
|
||
saying it will violate the confidentiality between them and their clients
|
||
or contacts.
|
||
|
||
"This is a dismal event for the constitution," said human rights group
|
||
Humanistiche Union in a statement.
|
||
|
||
"We demand that the regional state governments...do their duty to defend
|
||
the constitution and deny this legal contraption the two-thirds
|
||
majority it needs in the Bundesrat (upper house of parliament)," it added.
|
||
|
||
Opposition from civil liberties and church groups to the bill led earlier
|
||
this week to parliament's legal committee exempting church
|
||
confessionals from surveillance.
|
||
|
||
At least one regional state, Rhineland-Palatinate, has said it is
|
||
considering opposing the bill when it moves to the upper house unless
|
||
conversations between criminal suspects and doctors, journalists or lawyers
|
||
are also exempted.
|
||
|
||
A defeat in the Bundesrat would then send the bill to a mediation committee
|
||
for amendment.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 17 Jan 1998 20:26:30 -0500 (EST)
|
||
From: owner-cyber-liberties@aclu.org
|
||
Subject: File 11--New Encryption Rules Could Relax Export Criminalization
|
||
|
||
Source - Cyber-Liberties Update, January 17, 1998
|
||
|
||
New Encryption Rules Could Relax Clinton Administration Export
|
||
Criminalization
|
||
|
||
The Bureau of Export Administration published a notice of rulemaking
|
||
this week on encryption export that may relax the current Clinton
|
||
Administration restrictions which criminalize export of programs from
|
||
the United States.
|
||
|
||
The "Implementation of the Wassenaar Arrangement List of Dual-Use Items:
|
||
Revisions to the Commerce Control List and Reporting Under the Wassenaar
|
||
Arrangement," was published in the January 15 Federal Register. Comments
|
||
on this rule must be received on or before February 17, 1998.
|
||
|
||
Representatives of thirty-three countries gave final approval July
|
||
12-13, 1996 in Vienna, Austria to establish the Wassenaar Arrangement on
|
||
Export Controls for Conventional Arms and Dual-Use Goods and
|
||
Technologies. The thirty-three countries agreed to control all items in
|
||
the List of Dual-Use Goods and Technologies with the objective of
|
||
preventing unauthorized transfers. They further agreed on a target date
|
||
of November 1, 1996, for implementation of the Wassenaar Lists.
|
||
|
||
The purpose of this interim rule is to make the changes to the current
|
||
U.S. commerce controls that are necessary to implement the Wassenaar
|
||
List. However, the interim rule imposes new reporting requirements on
|
||
persons that export certain items controlled under the Wassenaar
|
||
Arrangement to non-member countries.
|
||
|
||
Encryption programs scramble information so that it can only be read
|
||
with a "key" -- a code the recipient uses to unlock the scrambled
|
||
electronic data. Currently, there are no laws that prohibit using as
|
||
strong encryption as possible inside the United States. But, unless keys
|
||
are made available to the government, the Clinton Administration bans
|
||
export of encryption equipment and software, treating the products as
|
||
"munitions."
|
||
|
||
The ACLU, Electronic Privacy Information Center (EPIC) and Electronic
|
||
Frontier Foundation (EFF) will be participating in this process and we
|
||
will update you in the coming weeks. The text of the rules are available
|
||
online at:
|
||
|
||
<http://jya.com/bxa-wa-rule.txt (354K)>
|
||
<http://jya.com/bxa-wa-rule2.txt (373K)>
|
||
<http://jya.com/bxa-wa-rule3.txt (32K)>
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 7 May 1997 22:51:01 CST
|
||
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
Subject: File 12--Cu Digest Header Info (unchanged since 7 May, 1997)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically.
|
||
|
||
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
||
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
||
SUBSCRIBE CU-DIGEST
|
||
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
||
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
||
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115, USA.
|
||
|
||
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
CuD is also available via Fidonet File Request from
|
||
1:11/70; unlisted nodes and points welcome.
|
||
|
||
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
||
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
||
Web-accessible from: http://www.etext.org/CuD/CuD/
|
||
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
||
|
||
The most recent issues of CuD can be obtained from the
|
||
Cu Digest WWW site at:
|
||
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #10.06
|
||
************************************
|
||
|