home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Fri, Feb 28, 1992 Volume 4 : Issue 09
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Associate Editor: Etaion Shrdlu
-
- CONTENTS, #4.09 (Feb 28, 1992)
- File 1: Message related to craig's problem (RE to CuD 4.08)
- File 2: Legal Costs, Attys, and why $60 doesn't go far
- File 3: Response to Craig Neidorf's Legal Expenditures
- File 4: TV station and BBS registration
- File 5: Review of INTERTEK MAGAZINE (Newsbytes Reprint)
- File 6: Bury Usenet (Intertek Reprint)
- File 7: Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)
- File 8: A Comment on Amateur Action BBS
- File 9: 'Michelangelo' Scare (Washington Post abstract)
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
- chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
- NOTE: THE WIDENER SITE IS TEMPORARILY RE-ORGANIZING AND IS CURRENTLY
- DIFFICULT TO ACCESS. FTP-ERS SHOULD USE THE ALTERNATE FTP SITES UNTIL
- FURTHER NOTICE.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Mon, 17 Feb 92 22:25:07 -0500
- From: an288@CLEVELAND.FREENET.EDU(Mark Hittinger)
- Subject: File 1--Message related to craig's problem (RE to CuD 4.08)
-
- A poster in CuD 4.08 wrote:
-
- >Craig needs our help in defraying the costs of a battle from which we
- >all benefited. Even $5 would help. Just a 29 cent stamp and a $5
- >check.
-
- Mine is on its way. Thanks to the CuD guys for making us aware of
- this. Those of us that can (and would) help can't unless we are made
- aware of the need. Many of us are older and draw good incomes from
- the cyberchaos. Lets not call it cyberspace yet!
-
- Debates over issues and principles are fine but they need to occur
- after the practical matters of life are dealt with. In our less than
- ideal world we still need to get the rent paid (and even the lawyers'
- fees *DAMN*). I have been somewhat disillusioned by the activities of
- various new frontier organizations. Lets fix the practical matters
- first in real time and then debate the principles later in virtual
- time.
-
- > ... Ironically, if the
- >principle of honor were not so important, Craig arguably would have
- >been better off to plead guilty rather than defend his honor. It would
- >have saved him time, money, and bother. When the costs of pleading
- >guilty to crimes of which one is innocent becomes the best way of
- >avoiding devastating consequences, we cannot agree that the system
- >"works."
-
- Lets not forget than Len Rose caved in and took the plea bargain
- route. We can argue about what he did or didn't do, but he still
- needs to get his rent paid, feed his kids, and rebuild his life when
- he gets out (soon).
-
- I'm sure that there will be similar needs in the upcoming cases that
- have been discussed in recent CuD articles. I wish that it was as
- easy to send a $5 check as it is to argue - but I know that it is not.
-
- ------------------------------
-
- Date: Thu, 20 Feb 1992 11:25:31 -0500
- From: Craig Neidorf <knight@EFF.ORG>
- Subject: File 2--Legal Costs, Attys, and why $60 doesn't go far
-
- The readers should remember that my case was one of first instance.
- In most court cases, the law or precedent is much more clear and
- understood. Usually cases that go to court deal a lot with
- determining the facts instead of determining the law.
-
- Katten, Muchin, & Zavis bills Sheldon Zenner's time at $210/hour. In
- addition to Zenner, they had Ken Kliebard (an associate) and two law
- students working on my case over a 7 month period.
-
- There were multiple court appearances including two arraignments and
- the submission of all sorts of motions (for discovery, for release of
- beneficial evidence, for all sorts of things).
-
- There were all sorts of meetings -- with the government and with our
- witnesses. There were flights to Atlanta to have meetings with Robert
- Riggs and to St. Louis to meet with me (for a while I was not allowed
- to leave the State other than for court appearances). There was a lot
- of time spent in finding experts, interviewing them, and then learning
- from what they had to say.
-
- There was a vast abundance of evidence that had to be read, cataloged,
- and understood (stacks of email printouts, Phrack issues, other
- similar publications, and magazines about the telephone industry). My
- attorneys had to learn about computers and Unix systems).
-
- The fact that they first indicted me on one set of charges and then
- turned around and re-indicted me on another set of charges added a lot
- more time and money to my expenses. Every item of evidence that the
- government photocopied for us cost tons of money (since they bill
- photocopies at a very high rate (like $.15 per copy) and there were
- thousands of pages.
-
- The main problem was that the government had brought me up on charges
- that had never been used before in a computer case like this one.
- That meant there had to be a lot more research than perhaps would have
- been ordinarily needed.
-
- Finally there was the actual five full days of trial. This does not
- imply the hours of 9 to 5, it was more like 5 am to 11pm. Hours like
- these were not uncommon for Zenner during the entire 7 month period.
-
- The bottom line here is that I am a bit outraged by the questions
- posed by Mr. Moore of where the money was spent. I happen to know
- that certain steps were taken to keep my bill a lot lower than it
- might have been. I have learned for example that by referring a lot
- of the work to the summer associates, KMZ was able to bill those hours
- at a considerably lower rate. Furthermore, experts like John Nagle
- and Dorothy Denning refused to accept payment for their testimony.
- Ordinarially, expert witnesses like them would receive several
- thousand dollars each + expenses in return for their testimony.
-
- Don't you think my family and I scrutinized the bill ourselves to find
- some errors that would bring the total down?
-
- Finally, I feel that I received the absolute finest representation and
- counseling from Sheldon Zenner. The legal expenses were checked and
- re-checked by us and by him. I consider him a true friend and I trust
- him without any hesitation or doubts whatsoever.
-
- I'd rather checks be sent to Zenner because:
-
- A. I don't want the money being sent to my name because I don't want a
- stream of deposits in my bank accounts to irk IRS or anybody else.
-
- B. I'd rather not net-broadcast my home address.
-
- C. I tend to move around a lot since I live in rented housing and the
- US Post Office is not the greatest at forwarding mail. The KMZ
- address is the most reliable.
-
- Mr. Moore writes that "The high price of legal help is arguably as
- much of the problem as the reckless disregard for law and due process
- demonstrated by the government." I don't disagree, but don't make me
- responsible for the flaws in the system. Letters like yours victimize
- me all over again.
-
- Craig Neidorf
-
-
- ps- The net total of donations based on my most recent public notice
- stands at $60. $10 from one person, $20 from one person, and $30 from
- one person. All of whom were people I generally knew before and were
- not really among the 26,000 readers of CUD. People talk a good game,
- but the money is not where their mouths are. The grand total of
- donations received overall since day one (and excluding Kapor)
- doesn't even hit the $1,000 mark.
-
- ------------------------------
-
- Date: Mon, 24 Feb 1992 16:47:38 -0500
- From: Mike Godwin <mnemonic@EFF.ORG>
- Subject: File 3--Response to Craig Neidorf's Legal Expenditures
-
- In article <1992Feb21.083926.16788@chinacat.unicom.com> Keith Moore
- writes:
-
- >I have read repeated pleas on various networked discussion groups for
- >readers to help defray Craig's legal expenses. While I sympathize
- >with his position and am in fact willing to help, I'm sure many of the
- >readers would like to know what all of that money was spent for. I
- >want to help Craig, but I don't like the idea of giving over money to
- >lawyers. The high price of legal help is arguably as much of the
- >problem as the reckless disregard for law and due process demonstrated
- >by the government.
-
- Most of the cost of Craig's defense is attributed to preparation for
- trial. This means researching the law relevant to the charges,
- understanding the evidence, and finding out what the government's
- witnesses are likely to say as well as preparing your own witnesses.
-
- I cannot dispute that legal help is costly. But it seems to me that a
- failure to help Craig because legal help is costly promotes any
- lowering of the cost of legal help. It does, however, increase the
- personal burden on Craig.
-
- It is a fact that when one sets out to fight the federal government in
- court, legal expenses tend to skyrocket. But this is not Craig's
- fault.
-
- >Also, why are we asked to send money directly to the law firm that
- >defended Craig, and not to Craig himself?
-
- Because that's where the money is owed. If the money were solicited
- for Craig himself, countless net.critics would be calling it a scam on
- Craig's part, and they'd be demanding guarantees that the money go to
- his legal bills. One of the things that becomes apparent when you
- spend enough time on the Net is that some people will be critical of
- you no matter what you do.
-
- >Perhaps the computer underground, realizing how
- >much we are at the mercy of both lawyers and the government, would
- >find it in its interest to act to curtail their powers.
-
- It is certainly in everybody's interest to lower the cost of legal
- representation. It is unclear to me how failing to help Craig Neidorf
- does this. Do you really suppose that defense lawyers will watch Craig
- go bankrupt and conclude "Ah, well, guess we set our fees too high"?
- Isn't it asking a lot of Craig that he go bankrupt in order to
- articulate your criticism of the legal system?
-
- I believe there are plenty of reasons to be critical of the system,
- but it seems heartless to me to ask Craig to bear the burden while we
- sit back and pontificate about it. That's why I contributed money to
- Craig's legal expenses, and I hope you do too.
-
- ------------------------------
-
- Date: Thu, 30 Jan 92 3:32:05 CST
- From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
- Subject: File 4--TV station and BBS registration
-
- Here's something that you might find interesting... from
- misc.legal.computing. I've enclosed (most of) my reply to the
- article's author.
-
- Bob
-
- [ start ]
-
- A local television reporter did a report on the 10pm news about
- teenagers getting access to adult .gif files on computer bulletin
- boards.
-
- He explains how many sites with adult gifs require proof-of-age (e.g.,
- copies of driver's license) for registration, but some merely print a
- "you must be over 21 to register" message before on-line registration.
-
- No problem, except he then claims you can lie and still become
- registered -- which he proceeds to do on camera.
-
- Isn't this a violation of Federal law regarding computer access? The
- sysop of the BBS clearly requested identifying information, as is his
- right before granting system access, which the reporter deliberately
- refused to provide yet accepted system access?
-
- This TV station is getting a bad reputation for overzealous reporters--
- a few years ago one star reporter actually paid for pit-bull fights
- that she subsequently reported on. She was ultimately fired from the
- station and charged with a felony.
-
- I don't expect things to go this far in this situation -- but neither
- do I want to sit by as the TV station implies it's okay to lie during
- on-line registration for BBSes.
-
- Any comments or suggestions?
-
- BTW, the reporter was Jim Benemann of KCNC in Denver. I can post the
- Station Manager's name if other people wish to contact the station.
-
- Bear Giles
- bear@fsl.noaa.gov
-
- [ and my reply: ]
-
- >To: bear@spike.ucar.edu
- >Subject: Re: Stupid TV reporter tricks
-
- In article <15091@ncar.ucar.edu> you write:
-
- >Any comments or suggestions?
-
- Work with the station on producing an editorial. Ask them what
- criteria they use to authenticate news sources, and what their policy
- is on providing air time to an individual who is immediately or
- eventually proven to have faked their identity. Mention that access
- rules for on-line systems, large or small, are often more strict than
- those legally required of adult magazines: A signed statement that
- you're over a certain age. The system's owner was complying with a
- tradition of law that applies to similar adult-oriented media. The
- question of whether the reporter's misrepresentation of their
- identity, which treads close to the phone company's definition of
- fraud, was justified is one that the station's news management is
- invited to discuss publicly. After all, they were presented with a
- policy for authentication that matches legal proof employed by related
- media, and they bypassed it. If the station's position is that people
- must be honest for a system of age-oriented access restriction to
- work, they're right. If the station insists on providing a clear
- example of how to defeat the owner's intent to comply with the law, it
- is hardly the system owner that is in the wrong. Take the editorial
- to competing stations if you need to. Of course, this is a lot of
- swimming upstream for people to do, and there may be a better way that
- I haven't thought of... In any case, I'm interested in hearing what,
- if anything, comes of this.
-
- ------------------------------
-
- From: John F. McMullen (mcmullen@well.sf.ca.us)
- Date: Mon, 17 Feb 1992 10:39:11 PST
- Subject: File 5--Review of INTERTEK MAGAZINE (Newsbytes Reprint)
-
- REVIEW OF: Intertek
-
- From: Intertek, 325 Elwood Beach #3, Goleta, CA 93117; Telephone:
- 805 685-6557; Online - steve@cs.ucsb.edu
-
- Price: Current issue (Volume 3.3) ---- $4.00; Back issues (Volumes
- 3.1 & 3.2) - $5.00 ea; Subscription (4 issues) - $14,00
-
- PUMA Rating 3.6 on a scale 1=lowest to 4=highest
-
- Reviewed by Newsbytes by Barbara E. McMullen & John F. McMullen
-
- Summary: Intertek is a semi-annual magazine that explores the social,
- legal, ethical and technological issues confronting those in the on-line
- community..
-
- ======
-
- REVIEW
-
- ======
-
- Intertek is a surprisingly professional semi-annual glossy magazine
- dealing with issues relating to telecommunications, computer crime
- and first amendment concerns. We say "surprisingly professional"
- because the editor and publisher, Steve Steinberg, is still an
- undergraduate at the University of California, Santa Barbara. The
- current issue, Volume 3.3 - Winter 1992, is, in our judgement, of a
- quality that one would expect to find in a more commercial
- publication.
-
- While the publication has developed a following among those lucky
- enough to know of its existence (generally those who have already
- been actively interested in the issues dealt with by Intertek), it
- does not have the widespread newsstand distribution that it deserves
- --although Steinberg informed us that it is distributed in Europe and
- should be appearing domestically in Tower Books locations. The only
- way, however, at this time to be sure of obtaining a copy is to
- subscribe ($14 for 2 years - 4 issues).
-
- After reading every available Intertek (Volumes 3.1, 3.2, & 3.3), we
- think that Steinberg has hit on a extremely good pattern in his
- production of the publication:
- - each issue is narrowly focused on a specific topic (3.1 - "The Hacker
- Issue"; 3.2 - "The Ethics Issue"; 3.3 - "Virtual Communities").
- - Steinberg has attracted a well-known group of experts who also have
- a fine command of language and style top either write specifically
- for Intertek or to allow republication of previously material that is
- germane to the topic under discussion. The three issues mentioned
- include pieces by (or interviews with) John Perry Barlow, Bruce
- Sterling, Brenda Laurel, Mitch Kapor, Peter Denning, Katie Hafner,
- John Quarterman, Gail Thackeray, John Markoff, and Gordon Meyer. Each
- of these writers bring a perspective to the topic that is both well
- thought out and well presented.
- - Steinberg himself writes well. He is also skillful enough as an
- editor to put together pieces on provocative topics with responses
- from knowledgeable individuals on the same topic -- a superior
- method in our judgement than publishing the piece in one issue and
- the responses in subsequent one, particular when speaking of a
- semi-annual publication. An example of this technique is found in
- the current issue where Steinberg has written a piece entitled "Bury
- Usenet" and packaged it with responses from Mitch Kapor, Electronic
- Frontier Foundation co-founder; John S. Quarterman, author of The
- Matrix (Digital Press) and publisher of the Matrix News; Peter J.
- Denning, computer science chair at George Mason University and
- former president of the ACM; and Bruce Sterling, journalist author.
-
- Other articles in the Winter 1992 issue include "Electropolis:
- Communication and Community on Internet Relay Chat" by Elizabeth
- M. Reid; "Social Organization of the Computer Underground" by
- Gordon R. Meyer; "Real World Kerberos: Authentication and Privacy
- on a Physically Insecure Network"; and "Mudding: Social Phenomena
- in Text-Based Virtual Realities" by Pavel Curtis.
- There is also a 3 page section entitled "Newsflash" that does, despite
- the difficulties of providing real news in a semi-annual publication,
- contain some interesting items that we had not seen elsewhere.
-
- The centerfold of the publication presents a snapshot of both stock
- prices in the technology industries and prices of hardware, new and
- used. Although the information is dated (almost 2 months old when
- we got it), it is presented nicely with graphs and charts and is
- accompanied by a short piece by New York Times technology writer
- John Markoff. While this two-page section presents nothing that is
- really new, Markoff's piece is well-done, the display is attractive and
- there are certainly worse things that can be put in a centerfold.
-
- If you have any interest in acquiring a greater understanding of the
- issues surrounding global telecommunications (and, in our
- judgement, everyone should have such interest - particularly
- Newsbytes readers!), Intertek is worth your investment. It is lively,
- informative, and well-written. In short, buy the magazine!
- ============
-
- PUMA RATINGS
-
- ============
-
- PERFORMANCE/PRICE: 4. Intertek sets out to fill a niche not found in
- other publications relating to on-line life. Not as folksy as Boardwatch or
- as "techie" as 2600, Intertek deals with issues normally only discussed at
- conferences like CFP-1 or on an on-line service such as the WELL. In our
- judgement, it fulfills its mission well. At $14, for people with these
- interests, it's a bargain.
-
- USEFULNESS: 4. In an informal survey that we did with a number of
- readers, the only complaints that we heard were that it should have more
- pages or come out more often. That seems to be heady praise from a
- demanding group.
-
- MANUAL: N/A
-
- AVAILABILITY: 3. Tough to get if you don't subscribe. You won't find
- Intertek in your local B. Dalton or Walden sitting next to Computer
- Shopper or Byte. Although the problem is easy to solve by subscribing,
- many won't because they haven't actually seen a copy .. and they'll be
- missing out on a good thing.
-
- (Barbara E. McMullen & John F. McMullen/19920218)
-
- ------------------------------
-
- Date: Sat, 15 Feb 92 17:33:29 PST
- From: G.Steinberg <steve@CS.UCSB.EDU>
- Subject: File 6--Bury Usenet (Intertek Reprint)
-
- (Reprinted from _Intertek_, Winter (Vol 3.3), Winter, 1992. Pp 1-3.)
-
- Bury USENET by Steve Steinberg
-
- The concept of USENET, a global electronic bulletin board on which any
- person can post messages on topics ranging from nanotechnology to
- weightlifting and reach other interested people, sounds terrific. It
- seems like a step towards the magical future which we are all brought
- up to believe is right around the corner; the future of Hugo Gernsback
- in which the entire bustling globe is united in productivity and
- prosperity. But, just as genetic engineering and nuclear power have
- turned out to cause more problems than they solve, we now see that
- USENET improves productivity and our quality of life about as much as
- TV does. True, there are thousands of people who enjoy reading
- USENET, just as there are millions who enjoy watching TV; however this
- is not proof of the quaility of the medium but instead is indicative
- of the lack of alternatives. It is therefore important to understand
- why USENET fails as a medium so that we can avoid further blunders in
- this direction.
-
- The three general uses that a medium such as USENET should facilitate
- are: directed information seeking, browsing, and collaboration.
- Directed information seeking is when someone is trying to find out a
- specific piece of information. Browsing is an exploratory
- information-seeking strategy that is used when the problem is
- ill-defined or when the user simply wants to become more familiar with
- an area of knowledge. Lastly, collaboration, for the purposes of this
- paper, refers to a group of people sharing what they know and posing
- questions to each other about a particular subject so as to increase
- the knowledge and ability of everyone involved.
-
- USENET fails at all of these uses, and we can lump the reasons for the
- failures into three main categories: USENET's asynchronous nature, its
- small bandwidth, and the large amount of noise.
-
- By asynchronous nature I simply mean that communications on USENET is
- not in real time as it is with a telephone but instead is more like
- conventional mail. Being asynchronous is not a problem with mail
- because we communicate with relatively few people, so there are only a
- small number of letters we need to remember and keep track of.
- However, when we read hundreds of different messages by different
- people on different subjects, we quickly get lost and forget what the
- status is of all the various topic threads. A technique people use on
- USENET to minimize the drawbacks of asynchronous communications is to
- begin each message with the relevant portion of the message to which
- they are replying. This repetition helps to some degree however each
- message will still only contain some subset of the previous messages
- (depending on which earlier messages caught the current writer's
- attention) and so does not give a complete picture of what has been
- determined on a particular topic. The asynchronous nature of USENET
- makes collaboration very difficult. A topic will often start with a
- question and then receive several messages in reply, each of which in
- turn will spawn several replies. The topic will then quickly
- degenerate into discussions of trivial points and multiple digressions
- leaving the poster of the original question, and other readers, more
- confused than helped. It is the sheer size of USENET, where a topic
- thread can last for thousands of messages and many months, that makes
- this problem so intractable.
-
- In these post-MTV proto-multimedia days the idea of people writing to
- each other seems almost quaint. Indeed one often hears professional
- writers lament that the death of writing has occurred now that the
- telephone has supplanted the letter. Hence, it might seem at first
- blush that USENET is a good thing and will cause the rebirth of the
- written letter. Unfortunately, as someone who has waded through tens
- of thousands of USENET messages, I can say with some certitude that
- this rebirth has not occurred, nor does it appear likely. To write
- clearly and concisely requires skill as well as time. Because most
- people lack one or the other of these requirements, messages posted to
- USENET are usually confusingly worded, difficult to read, and prone to
- misinterpretation. This is what I was referring to when I said in the
- beginning that one of the fundamental problems with USENET is its
- small bandwidth. When we express our feelings on a subject or explain
- a detailed technical matter, we usually use many cues and tools in
- order to make ourselves understood. These include tone of voice, body
- language, and pictures or diagrams. When we try instead to compress
- our thoughts into 80-column ASCII, we leave behind many of the
- nuances. This makes any use of USENET--whether it be searching or
- collaborating--difficult since we often do not understand what a
- message is really trying to say.
-
- One solution to the problem of small bandwidth that seems likely to
- catch on in a big way soon (it already has to some degree) is to allow
- graphics to be viewed over USENET. This would allow a user to include
- a drawn or digitized picture inside the message he or she posts.
- Multimedia messages seem like a good idea, and you can easily imagine
- the good uses possible such as diagrams to clearly indicate how
- something works. However, I have no doubts, based on how people have
- used USENET so far, that the main results would be an outbreak of
- pornography and a rash of garish signatures.
-
- Reading USENET is like drinking from a firehose, you'll get very wet
- but you probably will still be thirsty. The problem is that there are
- thousands of messages posted each day, but only a few of these will be
- of interest to any one reader. Searching through this haystack of
- messages is a tedious and laborious task with no sure method of
- success. Many people end up spending (some would say wasting) several
- hours a day reading USENET in order to find the few items of interest
- and importance to them. What further complicates the task of searching
- for information, making it near impossible as well as unpleasant, is
- the huge amount of noise -- lengthy messages which say nothing useful,
- messages that are personal attacks on someone, and messages that are
- plain wrong.
-
- Anyone with access to a UNIX machine that has a USENET feed can post a
- message on any subject, no matter how unqualified the author may be.
- The result is usually chaotic and unenlightening. Even when the poster
- is humble enough to prefix his or her message with "I'm no lawyer
- /scientist /doctor but...", a clear signal that we may save time and
- skip this message, we only continue on to ten more messages by other
- unqualified people berating the first poster for inaccuracies. The
- dichotomy which is being exposed here is between a medium which
- informs and a medium for general discussion. If we think USENET should
- be the former, then there is no place for messages by unqualified
- people. If USENET should be for discussion, then indeed anyone should
- be allowed to offer their opinion. Unfortunately USENET isn't very
- good at this either due to the phenomena known as "flaming" in which
- users attack other persons' views far more quickly and violently than
- would occur with any other medium. Because users are safely hidden
- behind their terminal, and can not see who they are talking to,
- standard social customs concerning conversation do not seem to apply.
- The result is that even the most innocent comment can provoke typed
- vitriol from someone who feels offended. Flaming is undoubtedly the
- most virulent form of noise, and there is nothing more unpleasant than
- having to wade through messages of infantile bickering. So, although
- USENET tries to be both a medium for informing as well as discussion,
- it succeeds at neither.
-
- The concept of a moderated newsgroup is a simple solution to the noise
- problem, but it leads to a problem of a different kind. In a
- moderated newsgroup a user sends messages to the person in charge of
- the newsgroup, and this moderator then picks only the messages he or
- she feels are relevant. Sometimes this works well as in the often
- cited example of Peter Neumann's RISK digest. However, there is the
- insidious danger of moderator bias. The specter of this problem has
- risen in conjunction with the TELECOM digest which is moderated by the
- rather opinionated Patrick Townsend. Whether Townsend actually censors
- messages he disagrees with is not important. The perception--and the
- possibility--are there.
-
- To summarize, USENET's asynchronous nature makes collaboration
- difficult, its small bandwidth makes messages difficult to understand
- and easy to misinterpret, and the high amount of noise makes searching
- for interesting messages time consuming and unpleasant.
-
- I wish I could end by presenting five easy steps to improve USENET.
- Unfortunately, the only ones which seem feasible, such as news readers
- which use artificial intelligence techniques to filter out noise, are
- merely stopgap measures which do not address all of the fundamental
- problems. Before we can fix USENET we must first understand how we
- learn and how groups work together. Until this has been determined our
- tools are as likely to hinder our productivity as they are to help us.
- As has been amply demonstrated by television over the last fifty
- years, some mediums, no matter how much of a good idea they may seem,
- just don't work. I hope we quickly learn to see USENET as a noble but
- failed experiment so that we can research other directions in order to
- find new mediums that really do enhance our communications and our
- quality of life.
-
- ------------------------------
-
- Date: Sat, 15 Feb 92 17:33:29 PST
- From: Mitch Kapor <mkapor@well.sf.ca.us>
- Subject: File 7--Mitch Kapor Response to "Bury Usenet" (Intertek Reprint)
-
- Somewhere between the intimacy of island universe conferencing systems
- like the WELL (an electronic bulletin board in California) and the
- anarchic ocean of USENET lies the future of computer conferencing.
- USENET's problems are legion and unlikely to go away. What may succeed
- are new generations of software and conferencing systems built upon
- the lessons and experience, both positive and negative, of a
- multiplicity of existing systems.
-
- The WELL works much better than USENET as a source of informed
- discourse for several reasons:
-
- o It's hosted on a single system, avoiding the lag of distributed
- systems.
- o People pay to be there. This weeds out the single largest source
- of noise.
- o Conferences are all hosted, which acts as a loose control
- mechanism.
- o The management of the system realizes it's running a digital
- gathering place.
-
- The WELL has problems too. It's insular, its user interface is nothing
- to be proud of and its telecommunications access cost is excessive if
- you don't live in the Bay Area.
-
- If these problems were addressed, there's no reason in principle why
- the example of the WELL couldn't be more widely applied. It wouldn't
- be USENET, but maybe that's OK.
-
- I envision a system which is on the Internet and thus reachable from
- anywhere on the Internet, a system which has a graphical user
- interface (in addition to whatever the hardcore users want), whose
- conferences are hosted, and which charges a nominal--say a dollar an
- hour--usage charge. This software may have many separate
- instantiations, in different locations, serving different needs and
- interests.
-
- In fact, this is a brief sketch of a design idea for a development
- project we hope to begin within the Electronic Frontier Foundation
- (EFF) in 1992.
-
- Mitch Kapor
- EFF co-founder
-
- ------------------------------
-
- Date: Mon, 24 Feb 1992 11:31:22 PST
- From: Ann O'Nonymous <baybridg@vesuvios.edu>
- Subject: File 8--A Comment on Amateur Action BBS
-
- Bob Thomas has been having trouble with his kids. They are
- experiencing emotional and behavior problems they've never had before.
- The police officers they had learned in school to trust came to their
- house one morning and unceremoniously took away their computer. The
- police were rude. They offered no explanation for why they took the
- kids' games and schoolwork. The half-dozen plain-clothes cops were not
- related to Officer Friendly, and the children were confused,
- frightened, and hurt. These police weren't THEIR friends!
-
- So was Bob Thomas. He ran AMATEUR ACTION BBS in San Jose, Calif.,
- which specialized in adult gif files. Local police (no federal agents)
- burst in at 7:30 a.m. on Monday, January 20 with a search warrant
- alleging grand theft, trafficking in obscene material, and child
- pornography. Bob doesn't recall if the officers had their guns drawn.
- The affidavit supporting the warrant is sealed, so the justification
- for the raid may never be known. Bob was stunned by the accusations,
- and he and his family watched in horror as the police carted away his
- 486, three 386s, videos, and all the tools he needed to run his two
- electronics businesses and BBS business. The police also took all
- hardcopy business records and other materials.
-
- The raid resulted in seizure of over $30,000 worth of equipment. Bob
- estimated that he also lost over $15,000 in lost business revenue and
- legal fees. He also missed a major trade show. His children lost
- their innocence. Society lost another round in the battle to maintain
- a semblance of civil liberties in cyberspace.
-
- Bob's attorney communicated with EFF and the officers were made aware
- of federal and other laws relating to seizure. No charges have been
- filed, and there is no indication that any will be. When I spoke with
- Bob on February 24, he was expecting the return of most, hopefully
- all, of the equipment by that evening, or within a day or two. He has
- no explanation for why the police raided him, but suspected it might
- be connected to the problems of America Online, which faced a similar
- investigation.
-
- Amateur Action (408-263-3393) specialized in adult gif files (over
- 4,600) using amateur rather than commercial models. Bob also used it
- to distribute adult videos. There were no action or other files. It
- was simply an adult BBS with a modest message base. Bob has
- established a reputation for aggressively attempting to keep children
- off his adult BBS, and we have neither heard nor seen any evidence
- that his board contained child pornography. The different levels of
- access cost from $29 to $69 a year.
-
- Amateur Action is back up, running Wildcat. The $69 annual rate will
- earn you a meg-a-day download privilege with no upload obligation.
- A Visa/Mastercard sub gives immediate access.
-
- Unless evidence appears to the contrary, this is another instance of
- police mishandling a seizure, confiscating first and asking questions
- later, and not being quite sure of what they're doing. What do Steve
- Jackson, Bob Thomas, and deja vous have in common?
-
- ------------------------------
-
- Date: Tue, 18 Feb 92 15:36:33 EST
- From: "garbled header" <eaten.by.our@program>
- Subject: File 9--'Michelangelo' Scare (Washington Post abstract)
-
- "'Michelangelo' Scare Stirs Fears About Computer Viruses"
- Author: John Burgess
- Source: Washington Post, Feb 17, 1992, p. A1
-
- A new and unusually destructive type of computer "virus" -- a
- software program that enters a computer surreptitiously and destroys
- data there en masse -- has reignited concern over these electronic
- saboteurs.
-
- Security experts have dubbed the virus "Michelangelo," because after
- entering a computer it lies dormant until March 6, the Italian
- Renaissance artist's birthday. Then it springs to life and wipes out
- data stored on the computer's memory disk.
-
- In November, a copy of Michelangelo turned up at the Gaithersburg
- offices of the National Institute of Standards and Technology, hiding
- on the data disk of a computer that had been returned after being on
- loan to another federal agency.
-
- Using special software, institute technicians found the virus and
- removed it after receiving a tip from the other agency. That agency
- had found the virus on its computers and warned the institute to
- make sure its computers hadn't been infected too.
-
- Michelangelo got national attention last month after Leading Edge
- Products Inc., a manufacturer of personal computers compatible with
- those of International Business Machines Corp., confirmed that it had
- shipped about 500 machines that contained the virus. The manufacturer
- sent customers special software designed to neutralize it.
-
- Because the triggering date lies in the future, no one is known to
- have lost data due to the virus, which was created by an unknown
- programmer and has spread from computer to computer through the
- exchange of infected floppy disks.
-
- But security experts, using special software that scans computer
- disks to detect viruses, have been finding copies of Michelangelo
- since last summer and removing them before they activate.
-
- It remains unclear whether large numbers of computers contain
- undetected copies of the virus, though estimates of millions of
- machines have been published in the news media. Michelangelo affects
- only IBM-compatible personal computers, but there are about 60
- million of these in existence.
-
- Past scares about viruses often have proven to be overblown. But due
- to Michelangelo's unusually destructive nature, as well as the
- potential presence of other viruses, some computer experts are
- suggesting that personal computer users take no chances over getting
- caught by a virus.
-
- "When it hits, it's dramatic," said Lance Hoffman, a professor of
- computer science at George Washington University.
-
- Computer users can protect themselves by making additional electronic
- copies of information they cannot afford to lose, by reducing the
- exchange of floppy disks and the transmission of software over phone
- lines, and by obtaining special software that detects viruses.
-
- Viruses are a surprise byproduct of the computer age. Complex sets
- of computer instructions, they are usually written by anonymous
- programmers as pranks, or in the case of Michelangelo, in a deliberate
- effort to destroy the information of people the programmer has never
- met.
-
- Fighting the virus writers is a coalition of software companies,
- academics, researchers and users of personal computers. The two play
- a constant cat-and-mouse game -- virus writers sometimes send their
- creations to the experts as a challenge.
-
- If an infected floppy disk is put into a computer, the virus orders
- the machine to copy it onto any other disk that the computer
- contains, generally without the operator knowing that this is taking
- place. Or a virus may enter a computer when its operator receives
- infected software programs from a computer "bulletin board" reached
- by phone.
-
- Many viruses are considered benign, doing little more than flashing
- whimsical messages on the screen or playing a tune. But others, like
- Michelangelo, are engineered to seek out stored data and destroy it,
- sometimes on a specific date.
-
- That can be devastating. Companies might lose all of their account
- records, for instance, or an author using a home computer might lose
- the entire manuscript of a novel.
-
- To dissect Michelangelo and find out how it works, security experts
- have deliberately introduced the virus into test computers and
- advanced their internal clocks to March 6 to trigger the virus.
-
- Michelangelo-infected machines that are not functioning on March 6
- will not activate the virus, according to experts. By the same
- token, the virus can be kept dormant by shifting the clock on the
- machine so that it never reads March 6.
-
- Computer experts agree that getting hit by a virus -- more than
- 1,000 types have been identified over the years -- can be devastating
- as society progressively puts more and more reliance on computers.
- But there is continuing debate as to how prevalent the programs really
- are.
-
- "I'm finding virus catastrophes everywhere," said Martin Tibor, a
- data recovery consultant in San Rafael, Calif., whose repeated calls
- to the media after the Leading Edge incident helped publicize
- Michelangelo. "These things are replicating like crazy."
-
- David Stang, director of research at the National Computer Security
- Association, offers a more conservative assessment. While stressing
- the danger of viruses, he puts the probability of a virus residing in
- a given computer at a large company at about 1 in 1,000.
- Michelangelo constitutes a tiny fraction of those viruses, he said.
-
- The National Institute of Standards and Technology has 5,000 personal
- computers and has detected about one to three viruses a month since
- last summer.
-
- In contrast, Total Control Inc., an Alexandria computer security
- firm, said that about 70 percent of the 300 personal computers at one
- unnamed federal agency have been found to have Michelangelo.
-
- San Jose research firm Dataquest Inc. surveyed 600 large U.S.
- companies late last year and found that 63 percent had found a virus
- on at least one company computer. However, it noted that these
- companies often operated hundreds of computers.
-
- Antiviral software has created a thriving new niche for the personal
- computer software industry. Such products can be purchased in
- software stores or obtained for free or at a nominal cost through
- on-line computer networks.
-
- Antiviral software is not foolproof, however. "You can't write a
- generic program that detects every virus, " said Hoffman, noting that
- new strains are always appearing.
-
- Some computer users suggest that the antiviral software companies
- want to stoke fear to build a market for their products.
-
- Consultant Tibor conceded that the calls he made to the media about
- Michelangelo were in part motivated by hopes of bringing business his
- way -- it in fact brought in only one client, he said. But his main
- motivation, Tibor said, was to get the word out about a serious
- computer danger.
-
- "I see the victims of viruses all the time," he said. He calls viruses
- "the digital equivalent of germ warfare."
-
- ------------------------------
-
-
- ------------------------------
-
- End of Computer Underground Digest #4.09
- ************************************
-