1003 lines
46 KiB
Plaintext
1003 lines
46 KiB
Plaintext
|
||
ZDDDDDDDDDDDDDDDDDD? IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM; ZDDDDDDDDDDDDDDDDDD?
|
||
3 Founded By: 3 : Network Information Access : 3 Other World BBS 3
|
||
3 Guardian Of Time CD6 09OCT90 :D4 Txt Files Only! 3
|
||
3 Judge Dredd 3 : Guardian Of Time : 3 See EOF If Any ? 3
|
||
@DDDDDDDDBDDDDDDDDDY : File 57 : @DDDDDDDDDBDDDDDDDDY
|
||
3 HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM< 3
|
||
3 IMMMMMMMMMMMMMMMMMMMMMMMMMMM; 3
|
||
@DDDDDDDDDDDDDD6The Network Thought Machine:DDDDDDDDDDDDY
|
||
HMMMMMMMMMMMMMMMMMMMMMMMMMMM<
|
||
|
||
These past few months have been interesting with everything dealing from our
|
||
own deficit down to the meeting of NIA's Creators. Well during this great
|
||
time, I've been collecting some files. I had planned on making a series,
|
||
but I figured that I better get something out, since it has been sometime.
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Ethical Standards By Louis Howell"
|
||
|
||
The lack of a consensus on ethical standards among computer users is
|
||
serious, but even if one existed I'm not sure how much effect it would
|
||
have on law enforcement, the media, and the public in general, who
|
||
wouldn't know what we were talking about. The destructive hackers would
|
||
continue to get all the attention and thus color people's opinions of
|
||
the whole community. All the agreement in the world won't help if the
|
||
regulations are being written by outsiders who don't know what they are
|
||
doing.
|
||
|
||
For example, our society still has not come up with any consistent way
|
||
to put a value on information. Copyright and patent laws have been
|
||
tailored to the corporate arena, where typical infractions are large
|
||
enough to merit serious penalties, the legal costs are minor compared
|
||
to the other sums involved, and no lives are ruined in the process.
|
||
Attempts to apply this legal system to individuals and small software
|
||
sweatshops appears to be the moral equivalent of correcting a wayward
|
||
child by swatting him over the head with a 2-by-4.
|
||
|
||
In the recent Bell South fiasco, the company apparently put a value on
|
||
the stolen 911 document roughly equivalent to the entire cost of
|
||
producing it. This strikes me as completely absurd, since only a copy
|
||
was made---Bell South did not lose the use of the document or suffer
|
||
any other financial loss as a result of the incident. If you go by
|
||
some kind of "fair market value" criterion, the value would be closer
|
||
to that of a paperback book. Even if trade secrets were involved, as
|
||
was originally thought, it still seems unfair to charge a thief with
|
||
the cost of the entire development project. Some kind of lost revenue
|
||
standard seems more reasonable, but computing it could be a legal
|
||
nightmare.
|
||
|
||
For an item that is on the market, even valuing the information at
|
||
market value may not be appropriate. To be specific, suppose some
|
||
software company spends about $100,000 to write a great C compiler.
|
||
They put it on the market for $1000, and it sells. Now suppose some
|
||
high school hacker manages to snarf a copy of this compiler for his
|
||
own personal use. He gets caught, and is charged with stealing it.
|
||
What now is the value of the object he has stolen (which can make a
|
||
big difference in court)? To say $100,000 is absurd, since the
|
||
company still has the compiler. Even $1000 may be too high, though.
|
||
The company has not lost $1000 in revenue because there is no way
|
||
the kid could have afforded to buy the program. If he couldn't
|
||
steal it, he still wouldn't have bought it, so the effect on the
|
||
company is the same as if he had done nothing at all! If the company
|
||
loses nothing, is it not better that the kid have the use of the
|
||
best tools for his work?
|
||
|
||
This argument won't work for any tangible object. If a crook steals
|
||
a diamond ring, it is silly to argue that he would not have otherwise
|
||
bought it, since there is still a real diamond ring missing. With
|
||
information theft, though, it's hard to say that anyone really loses.
|
||
|
||
I'm not seriously suggesting that this type of software theft should
|
||
be legal, since then there would be no way for the company to recoup
|
||
its investment. There is no practical way to implement a socialist
|
||
"welfare distribution" system, since even those who could pay would
|
||
find it easy to obtain free copies of anything. The trouble is in
|
||
trying to couple an economy of tangible goods that are expensive to
|
||
reproduce with one of intangible goods that can be reproduced for
|
||
almost nothing. It's a tough problem, and I don't claim to have a
|
||
pat answer.
|
||
|
||
On the other hand, in my example the fact does remain that no one was
|
||
hurt. The offense strikes me as more comparable to a minor case of
|
||
shoplifting than to the theft of a tangible $1000 object. I certainly
|
||
wouldn't call it a felony, and seriously damaging the career of such
|
||
a talented kid would probably be a net harm to society. I propose that
|
||
the appropriate penalty be just enough to "teach the kid a lesson",
|
||
but no more.
|
||
|
||
Any thoughts? Just how much SHOULD information be worth?
|
||
--
|
||
Louis Howell
|
||
|
||
"A few sums!" retorted Martens, with a trace of his old spirit. "A major
|
||
navigational change, like the one needed to break us away from the comet
|
||
and put us on an orbit to Earth, involves about a hundred thousand separate
|
||
calculations. Even the computer needs several minutes for the job."
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"BBS's And The Law By John McCarthy
|
||
|
||
In my opinion, electronic bulletin boards will be classed as
|
||
publications entitled to First Amendment protection. I think
|
||
the courts will do it even if Congress and states make laws
|
||
to the contrary. However, it won't be really effective until
|
||
there is a major court case. I hope CPSR will use their
|
||
grant to mount such a case as soon as a suitable case can
|
||
be found.
|
||
|
||
I base this opinion on the Stanford University case of rec.humor.funny.
|
||
Early in 1989, Robert Street, Vice-President for Information and
|
||
Professor of Civil Engineering, decided to delete r.h.f from
|
||
the computers under his jurisdiction. He had his underlings
|
||
take responsibility. The story is long and perhaps interesting,
|
||
but I'll condense. There were petitions, and the President, Donald
|
||
Kennedy, referred the matter to the Academic Senate which
|
||
referred it to its Steering Committee to come up with a
|
||
recommendation.
|
||
|
||
Now here's the point relevant to my opinion in the first paragraph.
|
||
When I visited President Kennedy, he supposed the Senate Steering
|
||
Committee would refer the matter to the Committee on Research, and
|
||
said he didn't accept my "metaphor" of the newsgroup files as a
|
||
library. I think most of the world's officials are in the same state
|
||
Kennedy was. Electronic bulletin boards and newsgroups are vague
|
||
hitech things rather than publications.
|
||
|
||
This caused me to think, and I decided to make the point that
|
||
"library" wasn't a metaphor but a fact. The Steering Committee
|
||
accepted that idea and referred the issue to the Committee on
|
||
Libraries. At that point the battle was essentially won.
|
||
|
||
The Committee on Libraries opined that the same principles
|
||
applied to electronic libraries as to paper libraries -
|
||
universality tempered only by budget. The Steering Committee
|
||
accepted the recommendation and asked the Vice-President for
|
||
Information whether preferred to back down or have a Senate
|
||
discussion. He backed down, and we haven't had trouble since.
|
||
|
||
Note that the whole matter was fought out in the absence of
|
||
specific complaints about jokes in r.h.f and ignoring the
|
||
fact that there are plenty of newsgroups with material far
|
||
more likely to offend than anything Brad Templeton lets by.
|
||
|
||
In short before you can get a good decision, you have to get
|
||
them to pay attention, and "them" is the courts, and a lawsuit
|
||
is required.
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Best Evidence"
|
||
|
||
As far as I can see, no-one actually answered Gene Spafford's question
|
||
about whether the law sees a difference between the New York Times
|
||
and a basement produced sheet. I have never heard of such a difference
|
||
being argued in a censorship case. The legal movement has been in
|
||
the direction off erasing differences. For example, advertisements
|
||
have been granted First Amendment protection to some extent.
|
||
|
||
Concerning "best evidence". There obviously needs to be some
|
||
compromise here between keeping evidence and letting someone
|
||
get on with his work. There are several possibilities.
|
||
|
||
1. A person's disk could be printed and he could stipulate via
|
||
his lawyer that the printout was correct. Then he could have
|
||
his disk back. When facts are stipulated by the prosecution
|
||
and defense, judges permit reneging on the stipulation only
|
||
in exceptional cases.
|
||
|
||
2. He could have a right to a copy of the confiscated files.
|
||
|
||
3. If his computer was an IBM PC XT, this could be stipulated,
|
||
and he could get his computer back. Any PC XT or the documentation
|
||
of the PC XT would be acceptable evidence if he should destroy
|
||
the one he got back.
|
||
|
||
I believe courts would support such compromises on the grounds
|
||
that refusal by prosecutors to make them would constitute
|
||
"unreasonable search and seizure".
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Laws And Possible Ideas By Mike"
|
||
|
||
>
|
||
>Mike, how can the contents of a hard disk be printed in a way that meets
|
||
>this definition? I'm not thinking of ASCII files, which obviously
|
||
>present no problem. I suppose dBASE files and spreadsheet commands can
|
||
>be printed using their internal print commands. But what about .EXE
|
||
>files and similar binary stuff?
|
||
|
||
Well, let me note first of all that in most of the seizures I know
|
||
about, it's been the text files that have been of primary interest to
|
||
law-enforcement folks.
|
||
|
||
But let's say they want to prove software piracy. Since the rules
|
||
of evidence allow some kinds of duplicates to be considered, in
|
||
effect, originals, and other kinds of duplicates to be just as
|
||
admissible as originals, the logical thing to do, it seems to me,
|
||
would be to have the government witness download binary files from
|
||
the system in question, then run it on her own system or on the
|
||
government's. That should be testimony sufficient to persuade a
|
||
jury that software theft was going on.
|
||
|
||
The problem is, neither the issues nor the procedures have been
|
||
hammered out yet. There may be cases we haven't anticipated, and
|
||
the procedures err on the side of inclusiveness precisely because
|
||
the law-enforcement establishment is so hazy on what the legal
|
||
and social issues are.
|
||
|
||
>Does this definition include ordinary photocopies as duplicates?
|
||
|
||
Yes.
|
||
|
||
>I understand handwritten copies are not "duplicates" as defined above,
|
||
>but are they completely invalid or valid only when nothing better is
|
||
>available?
|
||
|
||
The latter.
|
||
|
||
>> Rule 1003. Admissibility of Duplicates.
|
||
>> [This is the rule Spafford hasn't heard of.]
|
||
>> A duplicate is admissible to the same extent as an original unless
|
||
>> (1) a genuine question is raised
|
||
>
|
||
>Presumably as opposed to a frivolous question, just to delay things?
|
||
|
||
Right. Judges know when the challenge is frivolous.
|
||
|
||
>> as to the authenticity of the original
|
||
> ^^^^^^^^
|
||
>Shouldn't that be duplicate?
|
||
|
||
No. This clause applies, I think, to cases in which it is not the document's
|
||
contents but the document's authenticity that is in question. (E.g., the
|
||
Howard Hughes will that left money to Melvin Dummar.)
|
||
|
||
>> or (2) in the circumstances it would be unfair to admit the duplicate
|
||
>> in lieu of the original.
|
||
>
|
||
>I'm curious--couldd you give an example of (2)?
|
||
|
||
Not offhand. It may be that the drafters had no particular example in mind,
|
||
but wanted to leave an out in the event that an obvious unfairness came
|
||
along.
|
||
|
||
>> It is also believed that any pressure brought to bear on the defendant
|
||
>> provides additional motivation for plea bargains.
|
||
>
|
||
>Seems like one of the many unfair parts of RICO, that it
|
||
>institutionalizes seizure onm indictment. And the seizure itself may
|
||
>work irretrievable harm, even if the defendant is found innocent and the
|
||
>property ultimately restored.
|
||
|
||
You'll find no disagreement here on that score.
|
||
|
||
-Mike
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
GUBERNATORIAL CANDIDATE SUPPORTS ELECTRONIC FREEDOM & PRIVACY
|
||
|
||
Folks, we have a good chance of having a **State Governor** who
|
||
(a) understands and favors technology, and -- more important --
|
||
(b) has signed and released the following statement (he just faxUed
|
||
a signed copy to me; IUll fax it to anyone who requests it).
|
||
-- Jim Warren, 9/16/90 [jwarren@well.sf.ca.us, or 415-851-7075/voice]
|
||
|
||
STATEMENT BY JIM GALLAWAY, CANDIDATE FOR GOVERNOR OF NEVADA
|
||
|
||
I am the Republican candidate for Governor of the State of
|
||
Nevada. I have been in the private telecomm industry for most of
|
||
20 years, and have been a principal in several telecomm and
|
||
computer start-ups. I understand, support, and have practiced
|
||
technological innovation.
|
||
My wife and I have known Jim Warren for well over a decade. He
|
||
has outlined some of the current issues about which owners and
|
||
users of systems for e-mail, BBS, teleconferencing, electronic
|
||
publishing and personal computing are deeply concerned.
|
||
|
||
These are my positions, relative to some of the recent law
|
||
enforcement practices by some government agents:
|
||
1. Government responses to alleged misdemeanors and crimes must
|
||
be no more than comparable to the seriousness of the wrong-doings.
|
||
2. Simple electronic trespass without harm must be treated as
|
||
any other simple trespass. It does not justify armed raids on teenagers,
|
||
forced entry of private homes, nor seizure of telephone
|
||
handsets, answering machines, computer printers, published
|
||
documentation, audio tapes and the like.
|
||
3. The notion that equipment can be RarrestedS and held
|
||
inaccessible to its owner, without promptly charging the owner with
|
||
a crime, is absolutely unacceptable. The practice of holding
|
||
seized equipment and data for months or years is a serious penalty
|
||
that must be imposed only by a court of law and only after a fair
|
||
and public hearing and judicial finding of guilt.
|
||
4. Teleconferencing and BBS systems must have the same
|
||
protections against suppression, prior restraint, search or seizure
|
||
as do newspapers, printing presses and public meeting places.
|
||
5. The contents of electronic-mail and of confidential or
|
||
closed teleconferencing exchanges must have the same protections
|
||
against surveillance or seizure as does First Class Mail in a U.S.
|
||
Post Office, and private discussions among a group in a home or boardroom.
|
||
|
||
As Governor of the State of Nevada I will vigorously support all
|
||
of these positions -- both statewide and nationally.
|
||
/s/ Jim Gallaway, candidate for the Governor of Nevada
|
||
|
||
[Please post & circulate]
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Nelson's Canons: A Bill Of Information Rights"
|
||
|
||
|
||
Amelia's news system is totally trashed for a while. Back to eos.
|
||
You might notice that rule #6 is missing. I went back to the copy of
|
||
Computer Lib/Dream Machines and that rule is missing there. [Obvious
|
||
references to the Monty-Python philosophers sketech, noted.] Here is
|
||
Nelson's Canon as promise to the net and Ted himself.
|
||
--enm
|
||
-----
|
||
|
||
1. EASY AND ARBITRARY FRONT ENDS.
|
||
2. SMOOTH AND RAPID DATA ACCESS.
|
||
3. RICH DATA FACILITIES.
|
||
4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
|
||
5. "FREEDOM FROM SPYING AND SABOTAGE"
|
||
7. COPYRIGHT.
|
||
|
||
1. EASY AND ARBITRARY FRONT ENDS.
|
||
THE TEN-MINUTE RULE
|
||
TEXT MUST MOVE.
|
||
|
||
2. SMOOTH AND RAPID DATA ACCESS.
|
||
FREEDOM OF ROVING.
|
||
|
||
3. RICH DATA FACILITIES.
|
||
4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
|
||
A. ANTHOLOGICAL FREEDOM.
|
||
B. STEP-OUT WINDOWING.
|
||
C. DISANTHOLOGIAL FREEDOM.
|
||
|
||
5. "FREEDOM FROM SPYING AND SABOTAGE."
|
||
FREEDOM FROM BEING MONITORED.
|
||
FIDUCIAL SYSTEM FOR TELLING WHICH VERSION IS AUTHENTIC.
|
||
|
||
7. COPYRIGHT.
|
||
|
||
It is essential to state these firmly and publically, because you are
|
||
going to see a lot of systems in the near future that proport to be
|
||
the last-word cat's-pajama systems to bring you "all the information
|
||
you need any time, anywhere." Unless you thought about it you may be
|
||
snowed by systems which are inherently and deeply limiting. Here are
|
||
some of the things which I think we all want. (The salesman for the
|
||
other system will say they are impossible, or "We don't know how to do
|
||
that yet." the standard put down. But these things are possible, if we
|
||
design them in from the bottom up, and there are many different valid
|
||
approaches which could bring these thing into being.)
|
||
|
||
These are rules, derived from common sense and uncommon concern, about
|
||
what people can and should have in general screen systems, systems to
|
||
read from.
|
||
|
||
1. EASY AND ARBITRARY FRONT ENDS.
|
||
|
||
The "front-end" of a system -- that is, the program that creates the
|
||
presentations for the user and interacts with him -- must be clear and
|
||
simple to use and understand.
|
||
|
||
THE TEN-MINUTE RULE. Any system which cannot be well taught to a
|
||
laymen in ten minutes, by a tutor in their presence of a responding
|
||
setup, is too complicated. This may sound far too stringent; I think
|
||
not. Rich and powerful systems maybe given front ends which are
|
||
nonetheless ridiculously clear; this is a design problem of the
|
||
foremost importance.
|
||
|
||
TEXT MUST MOVE, that is, slide on the screen when the user moves
|
||
forward or backward within the text he is reading. The alternative,
|
||
to clear the screen and lay out a new presentation, is baffling to the
|
||
eye and thoroughly disorienting, even with practice.
|
||
|
||
Many computer people do not yet understand the necessity of this. The
|
||
problem is that if the screen is cleared, and something new then
|
||
appears on it, there is no visual way to tell when their new thing
|
||
came from: sequence and structure become baffling. Having it slide
|
||
on the screen allows you to understand where you've been and where you
|
||
are going; a feeling you also get from turning pages of a book. (Some
|
||
close substitutes may be possible on some types of screen.
|
||
|
||
On front ends supplied to normal users, there must be no explicit
|
||
computer languages requiring input control strings, no visible
|
||
esoteric symbols. Graphical control structures having clarity and
|
||
safety, or very clear task oriented keyboards, are among the prime
|
||
alternatives.
|
||
|
||
All operations must be fail-safe.
|
||
|
||
Arbitrary front ends must be attachable: since we are talking about
|
||
from text, or text-and-picture complexes, stores on a large data
|
||
system, the presentation front end must be separatable from the data
|
||
services provided further down in the system, so the user may attach
|
||
his own front-end system, his own styles of operation and his own
|
||
private conveniences for roving, editing and other forms of work or
|
||
play at the screen.
|
||
|
||
2. SMOOTH AND RAPID DATA ACCESS.
|
||
|
||
The system must be built to make possible fast and arbitrary access to
|
||
a potentially huge data base, allowing extremely large files (at least
|
||
into the billions of characters). However, the system should be
|
||
contrived to allow you to read forward, back, or across links without
|
||
substantial hesitation. Such access must be implicit, not requiring
|
||
knowledge of where things are physically stored or what the interest
|
||
file names may happen to be. File divisions must be invisible to the
|
||
user in all his roving operations (FREEDOM OF ROVING): boundaries must
|
||
be invisible in the final presentations, and the user must not need to
|
||
know about them.
|
||
|
||
3. RICH DATA FACILITIES.
|
||
|
||
Arbitrary linkages must be possible between portions of text, or text
|
||
and pictures; annotation of anything must be provided for;
|
||
collateration should be a standard facility, between any pair of
|
||
well-defined objects: PLACEMARK facilities must be allowed to drop
|
||
anchor at, or in anything. These features imply private annotations
|
||
to publicity-accessible materials as a standard automatic service
|
||
mode.
|
||
|
||
4. RICH DATA SERVICES BASED ON THESE STRUCTURES.
|
||
|
||
The user must be allowed multiple rovers (movable placemarks at
|
||
points of current activity); making possible, especially, multiple
|
||
windows (to the location of each rover) with displays of collateral
|
||
links.
|
||
|
||
The system should also have provision for high-level mooting and the
|
||
automatic keeping of historical trails.
|
||
|
||
Then, a complex of certain very necessary and very powerful facilities
|
||
based on these things, viz.:
|
||
|
||
A. ANTHOLOGICAL FREEDOM: the user must be able to combine easily
|
||
anything he finds into an "anthology," a rovable collection of these
|
||
materials having the structure he wants. The linkage information for
|
||
such anthologies must be separately transportable and passable between
|
||
users.
|
||
|
||
B. STEP-OUT WINDOWING: from a place in such an anthology, the user
|
||
must be able to step out of the anthology and into the previous
|
||
context of the material. For instance, if he has just read a
|
||
quotation, he should be able to have the present anthological context
|
||
dissolve around the quotation (while it stays on the screen), and the
|
||
original context reappear around it. The need for this in a
|
||
scholarship should be obvious.
|
||
|
||
C. DISANTHOLOGIAL FREEDOM: the user must be able to step out of an
|
||
anthology in such a way and not return if he chooses. (This has
|
||
important implications for what must also really be happening in the
|
||
file structure.)
|
||
|
||
Earlier versions of public documents must be retained, as users will
|
||
have linked to them.
|
||
|
||
However, where possible, linkages must also be able to survive
|
||
revisions of one or both objects.
|
||
|
||
5. "FREEDOM FROM SPYING AND SABOTAGE."
|
||
The assumption must be made at the outset of a wicked and malevolent
|
||
governmental authority . If such a situation does not develop, well
|
||
and good; if it does, the system will have a few minimal safeguards
|
||
built in.
|
||
|
||
FREEDOM FROM BEING MONITORED. The use of pseudonyms and dummy
|
||
accounts by individuals, as well as the omission of certain
|
||
record-keeping by the system program, are necessary here. File
|
||
retention under dummy accounts is also required.
|
||
|
||
Because of the danger of file sabotage, and the private at-home
|
||
retention by individuals of files that also exist on public systems,
|
||
it is necessary to have FIDUCIAL SYSTEM FOR TELLING WHICH VERSION IS
|
||
AUTHENTIC. The doctoring of on-line documents, the rewriting of
|
||
history--cf. both Winston Smith's continuous revision of the
|
||
encyclopedia in Nineteen Eighty-Four and "The White House"-- is a
|
||
constant danger. Thus our systems must have a number of complex
|
||
provisions for verification of falsification, especially the creation
|
||
of multilevel fiducials (parity systems), and their storage must be
|
||
localizible and separate to small parts of files.
|
||
|
||
7. COPYRIGHT.
|
||
|
||
Copyright must of course be retained, but a universal flexible rule
|
||
has to be worked out, permitting material to be transmitted and copied
|
||
under specific circumstances for the payment of a royality fee,
|
||
surcharges on top of your other expenses in using the system.
|
||
|
||
For any individual section of material, such a royality should have a
|
||
maximum: i.e., " by now you've bought it."
|
||
|
||
Varying royalty rates, however, should be the arbitrary choice of the
|
||
copyright holder: except that royalities should not varying sharply
|
||
locally within a tissue of material. On public screens, moving
|
||
between areas of different royalties cost must be sharply marked.
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Sex And Networks By Jef"
|
||
|
||
>Remember the Abernathy article in the Houston Chronicle?
|
||
>
|
||
>I think the after-effects have hit home! I just received notice that
|
||
>all non-academic news-feeds (that's me) can no longer receive
|
||
>alt.sex.anything. In order to "justify" this policy, the facilities
|
||
>director decided to cut ALL alt.whatever from outside users of usenet
|
||
>here at IU.
|
||
>
|
||
>reason than to buy time before their local thought police overstep
|
||
>their bounds!
|
||
>
|
||
|
||
Well at PSUVM they also cut all alt.sex.*. Thier justifcation was as I
|
||
understand it 'Interstate transportation of pornographic material.'
|
||
|
||
- Jef
|
||
|
||
'Freedom is irrelevant. Self-determination is irrelevant...Death is irrelevant."
|
||
- The Borg
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Secret Service By John Moore"
|
||
|
||
]I've been informed that there's some text missing from this story;
|
||
]the following is a corrected version.
|
||
|
||
I have a number of reactions to Len Rose's story.
|
||
|
||
The first is that the SS is really over-reacting to this situation.
|
||
Len was treated just as badly as a mugger or rapist, and yet was
|
||
at most (if he is to be believed) guilty of bad judgement and
|
||
some property ownership violations best settled with civil
|
||
law. It's a shame that the lords of the 1st amendment (the
|
||
mass media) are collaborators in this brutal assault on the
|
||
first amendment rights of computer users.
|
||
|
||
The second is if you have proprietary source code, you cannot complain
|
||
if you get hassled in some way (although the SS police state tactics
|
||
were way out of line). It is just not smart, in this day of computer
|
||
"crime" hysteria, to have anything you shouldn't have. On the other hand,
|
||
when I was young (and enough years ago - 20 - that the statute of limitations
|
||
has LONG past), a group of us did some university hacking and ourselves
|
||
had proprietary source of an OS (now defunct), so I understand the
|
||
urge. In fact, at the time it was the only way of learning about OS
|
||
construction. That is no longer true.
|
||
|
||
The third is that Len was really naive about how to act when accosted
|
||
by the law. Even if one is COMPLETELY innocent, the best thing to do is
|
||
to shut up and say nothing until your attorney is present. Len really blew
|
||
it by trying to be cooperative. The people behind this jihad are just
|
||
going to take advantage of such cooperation.
|
||
|
||
The fourth is that we are going to have to get some sanity into this whole
|
||
issue. If someone vandalizes a computer, they should be treated like
|
||
vandals, not murderers (and I hope they go to jail for that vandalism!).
|
||
If they trespass in a computer, they should be treated like trespassers.
|
||
If data is "stolen," its owners shouldn't claim that the "thief"
|
||
took away from them whatever it cost to make the data. After all, the
|
||
owners still have it, and unless the data is used competitively against
|
||
them, they really suffered no dollar cost at all. I hold AT&T to blame
|
||
for some of this mess! Their allegations, in various cases, of huge
|
||
thefts just serve to inflame the situation. I would be ashamed to
|
||
work for AT&T as a software engineer! Yes - one shouldn't steal AT&T
|
||
source code or marketing documents. But, a computer hacker who grabbed
|
||
a source of Unix for his own use didn't steal $20,000,000,000 as was
|
||
alleged in one case - he stole $1000 or so (unless he distributes that
|
||
source code). It is more akin to theft of service (a 'la cable TV fame)
|
||
than theft of property.
|
||
--
|
||
John Moore
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Secret Service By Dr. Roger Rabbit"
|
||
|
||
In article <3108@mindlink.UUCP> a80@mindlink.UUCP (Greg Goss) writes:
|
||
<EFBFBD>> rabbit@hyprion.ddmi.com writes:
|
||
<EFBFBD>>
|
||
<EFBFBD>> In article <11608@medusa.cs.purdue.edu> spaf@cs.purdue.edu (Gene You know - I
|
||
<EFBFBD>> wonder why the SS just doesn't get a computer expert to
|
||
<EFBFBD>> come with them to the site of the raid and duplicate the hard drive
|
||
<EFBFBD>> contents? Why do they need to take someone's machine?? ... And, I DON'T
|
||
<EFBFBD>>
|
||
<EFBFBD>
|
||
<EFBFBD>There are too many "tricks" to hide information.
|
||
<EFBFBD>
|
||
<EFBFBD>You mentioned Poland. One of the solidarity tricks was to circulate a floppy
|
||
<EFBFBD>with some report on tractor production or something boring on it. Then you
|
||
<EFBFBD>take Norton and unerase a file with some innocuous name and read the
|
||
<EFBFBD>newsletter. Then you erase it again and pass it on.
|
||
<EFBFBD>
|
||
[Other tricks mentioned]
|
||
|
||
Thats why I said that they should send someone in to look at the machine.
|
||
Give the owner of the machine a choice: "Either you let this expert take
|
||
as much time looking at your machine as he deems neccessary, or we take
|
||
it away." That would seem to me to be the more reasonable approach to take
|
||
in an "innocent until proven guilty" system.
|
||
|
||
I personaly beleive that the SS confiscations are an attempt to bypass
|
||
Due Process in order to punish those that they think are guilty. Perhaps
|
||
they don't have enough evidence for an indictment, perhaps they don't want
|
||
to spend the $$$ for a trial - whatever. In any event, the government is
|
||
pissing on The Constitution and I don't like it a bit. (Yes - I have
|
||
already written lengthy letters to my US Reps and Senators about this.)
|
||
|
||
By the way - could someone E-MAIL me the address of the EFF so that I
|
||
can get more involved in their organization. We had better take back our
|
||
rights before it becomes neccessary to use guns to do so.
|
||
|
||
--
|
||
>>> BAN: Nuclear Power, US Intervention in South America, Toxic Waste
|
||
>>> (Including dip) Trash Incinerators, Nuclear Weapons, Poverty,
|
||
>>> Racism, Sexism, Specieism, etc... Write to: Toons for a Better World,
|
||
>>> 2001 Yatza St., Toontown, CA 90128 E-MAIL: rabbit@hyprion.ddmi.com
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"SS And YOU By Mike"
|
||
|
||
Brian Yamauchi writes:
|
||
|
||
>Perhaps some net.legal.expert can answer a question -- can Steve Jackson
|
||
>(and other victims) sue the SS (and other agencies) for his losses? If
|
||
>he does, what are his chances (assuming he and his employees are not
|
||
>charged/convicted)?
|
||
|
||
Based on what we currently know about the warrant, the chances are
|
||
not very good. In general, the Federal Tort Claims Act bars actions
|
||
against law-enforcement agents and agencies that cause harm to individuals
|
||
while executing a lawful warrant. For a cause of action to accrue
|
||
against, say, the Secret Service, it would have to be shown that the
|
||
SS went beyond the authorization of the search warrant when they sought
|
||
and seized all that property and paper and Steve Jackson Games.
|
||
|
||
Now, the warrant was sealed, which means that few people have had
|
||
access to the warrant itself and therefore few can say whether the
|
||
language of the warrant has been overstepped. But since very broad
|
||
search warrants have been held to be lawful in the past, I think the
|
||
odds are fairly poor that Steve Jackson Games will recover in tort
|
||
against the federal government.
|
||
|
||
It's still possible, however, that we may all be surprised on that
|
||
issue.
|
||
|
||
--Mike
|
||
|
||
Mike Godwin, UT Law School |"If the doors of perception were cleansed
|
||
mnemonic@ccwf.cc.utexas.edu | every thing would appear to man as it is,
|
||
(512) 346-4190 | infinite."
|
||
| --Blake
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"TO TRACE OR NOT TO TRACE"
|
||
|
||
Take apart the phone and look for any devices that might be home-made or
|
||
contain their own batteries etc etc,
|
||
Contact the CuD and ask for plans for an Icon box, make it yourself
|
||
Call the phone company and tell them to stop tracing your line.
|
||
Check the back of Radio Electronics magazine, look for small adds from
|
||
FBN companies, there is usually something there.
|
||
|
||
If none of these work, then you are probably better off not knowing if
|
||
your line is being traced or not.
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"To Trace Or Not To Trace II By Tim Maroney"
|
||
|
||
>Take apart the phone and look for any devices that might be home-made or
|
||
>contain their own batteries etc etc,
|
||
|
||
More likely is that anything like a universal bug would be attached to
|
||
the wall near the home phone switching board, probably in a separate
|
||
plastic box labelled "phone company property -- do not open" or
|
||
something similar. A universal bug is a particularly nasty little toy
|
||
that allows the phone microphone to be used as a general-purpose sonic
|
||
bug when the phone is on hook.
|
||
--
|
||
Tim Maroney, Mac Software Consultant, sun!hoptoad!tim, tim@toad.com
|
||
|
||
FROM THE FOOL FILE:
|
||
"Yet another piece of evidence that it's a Communist society which is being
|
||
presented as good, but which we probably would not want to live in."
|
||
-- Ken Arromdee on rec.arts.startrek, on the Federation's Red Menace
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Drug Of The Government By Dr. Roger Rabbit"
|
||
|
||
<EFBFBD>
|
||
<EFBFBD> If the (relatively few) criminals manage to create
|
||
<EFBFBD> an atmosphere of fear and cause basic rights and our
|
||
<EFBFBD> ability to do business to be under attack THEN THE
|
||
<EFBFBD> CRIMINALS HAVE ALSO WON!
|
||
<EFBFBD>
|
||
|
||
RIGHT!
|
||
|
||
<EFBFBD>
|
||
<EFBFBD>In the former case, we can take care and learn how to protect
|
||
<EFBFBD>ourselves from, what we hope remains, a small minority of
|
||
<EFBFBD>irresponsible or malicious people, random chance.
|
||
<EFBFBD>
|
||
|
||
Like I've always said - government is a drug which people use as a
|
||
(perceived) easy way out of some predicament. Some criminals start
|
||
harming people and we immediatly cry to the government to solve the
|
||
problem instead of taking care of the matter ourselves (ie: tightening
|
||
up our system security, etc).
|
||
|
||
Just like drugs, government never really solves any problems but (at
|
||
best) provides some temporary solution or the *ILLUSION* of a solution
|
||
(ie: the rhetoric that the SS is putting out about "taking a substantial
|
||
bite out of computer crime).
|
||
|
||
One day the "drug" addict wakes up and finds that he has more problems
|
||
than he can handle. His life is totally out of control and he can do
|
||
nothing for himself. He is addicted to the "drug" of government.
|
||
|
||
What price is he paying? 1> He now lacks any will or ability to solve
|
||
problems for himself. 2> He has signed away all of his Constitutional
|
||
Rights to the government.
|
||
|
||
This is one of the basic problems that I see in society today - the
|
||
lack of community initiative in solving problems at the grass roots
|
||
level. In the "olden days" (ie: before FDR), people solved problems
|
||
on their own in communities - they did not ask for a hulking, inhumane
|
||
bureaucracy to do it for them. They picked up valuable skills which
|
||
made them better people. This is what is wrong with today's society-
|
||
people are too lazy or scared to take the initiative and the government
|
||
is all too eager to "help" out, while in the process, slowly dismatling
|
||
the Constitution.
|
||
|
||
<EFBFBD>In the latter case, we are all under attack and the govt is acting as
|
||
<EFBFBD>a pervasive agent in all our lives, we can't defend against that by
|
||
<EFBFBD>putting "bars on the windows" etc., when the govt knocks to take our
|
||
<EFBFBD>systems we have to let them in the front door.
|
||
<EFBFBD>
|
||
|
||
Thats why I said in one of my previous postings that I would rather
|
||
deal with the threat of some hacker busting into my system than to
|
||
feel "safe" with the government "protecting" me.
|
||
|
||
<EFBFBD>
|
||
<EFBFBD>Even being exonerated in the end would be an almost useless outcome,
|
||
<EFBFBD>swell, they destroyed my business and my career but I should be
|
||
<EFBFBD>thankful they didn't send me to jail?
|
||
<EFBFBD>
|
||
<EFBFBD> THE CURRENT ATMOSPHERE OF FEAR MUST BE STOPPED!!!
|
||
<EFBFBD>
|
||
Yes - but the problem is that there are very few people who 1> Are
|
||
smart/interested enough to really care and 2> would be willing to
|
||
risk their neck in the fight. I really don't see a solution to this
|
||
"constitution-bashing", although I won't give up.
|
||
|
||
<EFBFBD>Consider this a cry of anguish, pain and anxiety from a fellow
|
||
<EFBFBD>citizen.
|
||
<EFBFBD>
|
||
|
||
Add my voice to that cry of anguish and pain. I really wonder what this
|
||
country will be like in, say the year 2020. I don't want to think about
|
||
it.
|
||
|
||
Dr. Rabbit says "THINK - JUST DO IT"
|
||
|
||
--
|
||
>>> BAN: Nuclear Power, US Intervention in South America, Toxic Waste
|
||
>>> (Including dip) Trash Incinerators, Nuclear Weapons, Poverty,
|
||
>>> Racism, Sexism, Specieism, etc... Write to: Toons for a Better World,
|
||
>>> 2001 Yatza St., Toontown, CA 90128 E-MAIL: rabbit@hyprion.ddmi.com
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Screaming First Or Sundevil? By ICEMAN"
|
||
|
||
Perhaps someone can help clarify to me what the SS hopes to
|
||
achieve with Operation "Screaming Fist" (oops, that was Gibson;
|
||
I guess I mean "SunDevil", or maybe :-) "Poorly lubricated Fist")
|
||
|
||
a) The secret service must surely know that the main threat of computer
|
||
crime does not come from the 18-year-olds but from the professional
|
||
crackers who get paid loads of money to raid corporate information
|
||
systems, just like the majority of "normal" crime is not the 12-year
|
||
olds who do doorbell-ditching.
|
||
|
||
b) However, I have not yet heard of a case where a professional cracker
|
||
(ie, someone who is directly making money from cracking) has been
|
||
convicted or even accussed of doing so. (If anyone knows of any,
|
||
please correct me.)
|
||
|
||
Given these two things, it seems that the SS is either trying to "clear
|
||
the field" of the petty offenders (by making the punishments so extreme
|
||
that no one dare crack casually) so as to better pursue the professionals;
|
||
and/or is trying stop the amateur hackers before they get a chance to go
|
||
pro. Now, I am not going to argue legality or constitutionality, since
|
||
I know little about either, but it would seem that the SS is destined
|
||
to fail for strictly practical reasons.
|
||
|
||
First off, if they do intend to go after the professional crackers
|
||
at some point, it would seem they are ill-equipped to do so. We have
|
||
already witnessed the stunning ability of their experts. If I were
|
||
a professional, I wouldn't be too scared. Even if they do get people
|
||
who can actually insert a floppy right-side-up, I do not think they
|
||
will ever get people of the same caliber of professional crackers.
|
||
And even if they did, information space is not like physical space,
|
||
where you will always leave behind evidence. Even the most perfect
|
||
robbery can be noticed by the fact that SOMETHING IS GONE. An excellent
|
||
cracker could get into a system, rob it blind, and leave no clues.
|
||
Any evidence of his visit is only electronic, and can thus be
|
||
manipulated or erased. Note that I am not arguing that computer
|
||
information theft is inevitable; I am merely arguing that typical police
|
||
procedures work at finding a criminal after a crime, and in computer
|
||
crime that is not always possible. Thus, the crime MUST be stopped by
|
||
making systems more secure, something which the SysOp, and not the
|
||
SS, must do.
|
||
|
||
Secondly, if the SS is trying to discourage casual crackers, it is
|
||
doing a *REALLY* lousy job of it. By choosing to pursue the associates
|
||
of the crackers instead of the crackers themselves, they are only going
|
||
to make the crackers less likely to expose themselves to non-crackers.
|
||
I would think this would result in crackers more quickly becoming
|
||
professionals (ie, only cracking when it is worth their while).
|
||
|
||
I welcome comments.
|
||
|
||
-ice
|
||
|
||
=============
|
||
"Those who understand are master to those who use, but do not undertand."
|
||
- a noted 1st century Roman historian
|
||
=============
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"Cybertoon By CAT-TALK"
|
||
|
||
In article <26353@cs.yale.edu> evans-ron@cs.yale.edu (Ron Warren Evans) writes:
|
||
<EFBFBD>What is "CyberToon"? Does it exist, or is this just a put-on?
|
||
<EFBFBD>It sounds very interesting.
|
||
|
||
Cybertoon" is a book about a group of scientist who formed a consortium
|
||
back in the 1850's to carry our experiments in genetic engineering. They
|
||
hid their research from the rest of the world because 1> People would
|
||
probably hurt them for messing with "nature" and 2> Mankind would probably
|
||
take the results of their research and use it for no good (as usual).
|
||
|
||
They ended up engineering about 3 dozen species. The common features of
|
||
these beings were that they were quite resiliant to adverse environmental
|
||
events (their super immune system prevented almost all deseases from
|
||
affecting them and causing death and they could take a lot of physical
|
||
abuse without much adverse affects [Ie: having anvils and piano's dropped
|
||
on their heads without injury]). These beings were also immortal.
|
||
|
||
Some of the species engineered were quasi-bipedal cats, rabbits, mice,
|
||
dogs and ducks. These beings were called "toons".
|
||
|
||
Basically, this book gives a history of how "toons" came into being. No -
|
||
they aren't animated figures, they are real beings.
|
||
|
||
This book is not published by any big publisher and is only available
|
||
from the author. About 1500 copies have been distributed so far. One
|
||
of the problems is that the book is 149 chapters (about 4100 pages)
|
||
separated into five volumes.
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
"TO THE TROOPS IN THE MIDDLE EAST"
|
||
|
||
A MESSAGE FROM VETERANS TO THE TROOPS AT FORT SAUDI ARABIA
|
||
----------------------------------------------------------
|
||
|
||
The US government is dressing you up in poison gas suits to
|
||
play rambo for them in the Persian Gulf. You are sitting out in the
|
||
middle of the desert with your ass on the line, wondering what's going
|
||
to happen next. We suspect you are a decoy to draw the gas attack which
|
||
would be used as an excuse for a US invasion of Kuwait and Iraq.
|
||
|
||
We know what you are going through, because we spent some time
|
||
in the shooting gallery too. As veterans we want to say straight up:
|
||
you have no more interest in fighting in the war the US is preparing for
|
||
today, than we did in the war they were waging in the 60's. Vietnam era
|
||
GIs were told that we were bringing Asian people democracy. We wound
|
||
up killing 2.5 million of those people in a war of genocide. You are
|
||
in the Middle East supposedly to protect "our" oil. You could wind up
|
||
killing hundreds of thousands. AND FOR WHAT? So that the pentagon can
|
||
finally establish Fort Saudi Arabia, like they have been wanting to for
|
||
so long? So that the US can control the oil resources of that region that
|
||
don't belong to us in the first place? So they, by extension, can control
|
||
their main economic competitors like Japan and in Europe who depend on that
|
||
oil? The bottom line seems to be expanding the US empire as the motive and
|
||
hair trigger politics and massive troop deployments as the method.
|
||
|
||
The situation is volatile. When the orders come to Rambo out, your
|
||
response will profoundly impact the lives of millions of people in the
|
||
Middle East and have unknown effects on world history. The politicians
|
||
stuck you in a situation where you can't now see the end result of your
|
||
actions. But you, like us, will have to live with those results forever.
|
||
|
||
The brass want you to obey, we want you to think. We feel that our
|
||
experience may have an effect on your decisions. Those of us who sat in the
|
||
jungles of Vietnam learned that we could see no bravery in "Search and
|
||
Destroy" missions in which we directed massive firepower to slaughter
|
||
anything that moved. We could find no glory in destroying the village to
|
||
save it. Similarly, many Beirut vets speak of the rude awakening when they
|
||
realized that the people they were sent to "protect" hated them and that every
|
||
US GI was a sitting duck. (Remember the Marine barracks?) Those of us who
|
||
are vets of the US invasion of Panama ask where is the honor in house-to-house
|
||
terror, or in pushing back the Panamanian families who had come to mass grave
|
||
sites seeking to identify and reclaim their loved ones. You undoubtedly will
|
||
have many of the same experiences we did. Ghosts march through our dreams
|
||
every night. Your nightmares have yet to begin.
|
||
|
||
CHECK OUT THESE FACTS:
|
||
|
||
* Its one thing to kill,die or get maimed for a worthy cause. But once the
|
||
smoke clears and the shooting is over, as history has shown time and again,
|
||
we shouldn't have been in there.
|
||
|
||
* When you are choking in a poisoned atmosphere, remember that you are facing
|
||
chemical and other weapons sold to Iraq by Western powers only too happy to
|
||
make a buck off the deal.
|
||
|
||
And ask any veteran who suffers from Agent Orange exposure what help you
|
||
cant expect if you survive. Remember that the US is still operating massive
|
||
defoliation programs in Central and South America under the phony excuse of
|
||
the war on drugs.
|
||
|
||
* Remember too, that for 8 years the US government cheered on Iraq while it
|
||
gassed Iran and its own Kurdish people.
|
||
|
||
* Bush says you are there to stop naked aggression. That hypocrite has no right
|
||
to speak on this question, having just finished invading Panama.
|
||
|
||
* Saddam Hussein is a reactionary ruler who invaded Kuwait in his own
|
||
interests. But while the US media calls him a fascist madman, the US
|
||
government is busily trying to keep you from being able to but unapproved
|
||
record albums. In the US, racism and police attacks are on the rise. There
|
||
are major efforts to stifle political protests, and women are fighting their
|
||
own government to protect their reproductive rights.
|
||
|
||
Meanwhile you sweat it out on a lie and a humbug. Sure, there are those
|
||
Rambozoids who can hardly wait for the order to charge. Well, let those who
|
||
proudly wear the "KILL THEM ALL AND LET GOD SORT THEM OUT" shirts pay the price.
|
||
But to those of you who question blindly going along with the program, we have
|
||
something to say.
|
||
|
||
You should know that while you are carrying out your orders there are
|
||
veterans from previous wars and military actions leading demonstrations agaisnt
|
||
your presence in the Middle East. We will welcome you back to join our ranks.
|
||
Like you, we were ordered to do our duty. Take Vietnam (which some of us tried
|
||
to do). Fooled at first, we began to question the lies and the hypocrisy that
|
||
put us there. Many of us were sickened by what we were ordered to do. Others
|
||
were inspired by the heroic resistance of the Vietnamese. We began to resist.
|
||
Thousands of us in Vietnam (and in the U.S.) refused to carry out orders.
|
||
Whole companies and naval units mutinied and refused to fight. A half million
|
||
US troops deserted. GI resistance took every form, from the fragging of
|
||
officers, to a number of troops that actually joined and fought for the other
|
||
side. Out of all that we learned to question what the hell is going on. All
|
||
the government learned was to tell bigger lies. Welcome to Fort Saudi Arabia.
|
||
|
||
As veterans we came to understand that our duty was to the people of
|
||
the world and to the future, not to the Empire. We resisted and rebelled.
|
||
WHAT ARE YOU GOING TO DO?
|
||
|
||
|
||
US TROOPS OUT OF THE MIDDLE EAST!!!
|
||
|
||
Vietnam Veterns Agaisnt the War Anti-Imperialist
|
||
4710 University Way NE #1612
|
||
Seattle, WA 98105
|
||
(206) 292-1624
|
||
|
||
----NIA----NIA----NIA----NIA----
|
||
|
||
|
||
Guardian Of Time
|
||
Judge Dredd
|
||
Ignorance, Theres No Excuse.
|
||
For questions or comments write to:
|
||
Internet: elisem@nuchat.sccsi.com
|
||
..!uunet!nuchat!elisem
|
||
Fidonet: 1:106/69.0
|
||
or
|
||
NIA FeedBack
|
||
Post Office Box 299
|
||
Santa Fe, Tx 77517-0299
|
||
[OTHER WORLD BBS]
|
||
|
||
|
||
|
||
|