home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.comp.acad-freedom.talk
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!eff!eff-gate!usenet
- From: kadie@cs.uiuc.edu (Carl M. Kadie)
- Subject: [alt.censorship] Searching for computer porn at UBC
- Message-ID: <9208212318.AA03203@herodotus.cs.uiuc.edu>
- Originator: daemon@eff.org
- Sender: kadie@cs.uiuc.edu
- Nntp-Posting-Host: eff.org
- Organization: EFF mail-news gateway
- Date: Fri, 21 Aug 1992 13:18:51 GMT
- Approved: usenet@eff.org
- Lines: 47
-
-
- Newsgroups: alt.censorship
- From: advax@reg.triumf.ca (A.Daviel)
- Subject: Searching for computer porn at UBC
- Message-ID: <21AUG199215492898@reg.triumf.ca>
- Date: Fri, 21 Aug 1992 22:49:00 GMT
-
- I read recently in UBC Reports that the UBC President has "asked all UBC
- units to ensure that university property is not being used to gain access to,
- create, or store (such) pornographic material on university computing
- equipment".
-
- I am disturbed by the possibilities in this. Not so much that I think it is
- OK to store 10Gbytes of sexually explicit GIF files on univerity disks (or
- 10Gb of pictures of sports cars, for that matter), but that such a thing
- (ensuring ...) may be possible, at least for ASCII files.
-
- Computer users on a big system (VMS, Unix, etc.) are prevented from reading
- each others mail by default, and may optionally protect any other files
- against unauthorised access. But they enjoy no such protection from
- privileged users, such as system managers. We rely on the personal integrity
- of privileged users, and hope that they are far too busy to have time to
- ferret around in users files.
-
- Users could encrypt data, but I do not believe this is common practice.
- Systems such as Sun that come with DES software in the USA are prevented from
- doing so outside the US.
-
- Given operator privileges, it would be easy to write programs that
- would scan users files and mailboxes for keywords, according to some
- particular scheme of sexual or political censorship. Admittedly machine
- inspection of picture and sound files would not currently be possible, if the
- files were hidden in 'innocent' directories with innocuous filenames, though
- a program could produce a list of all picture files for subsequent visual
- inspection.
-
- Regardless of the legal and technical facts (for instance, that bitnet
- mail may be logged, that store-and-forward mail may be backed up on tape,
- etc.), users have come to believe that electronic mail has the same
- confidentiality as letter mail or telephone converstions.
-
- I believe that the possibilities for abuse of privacy are numerous, if system
- operators are effectively directed to search their systems for 'offensive
- material'.
-
-
- A.Daviel, Vancouver BC
-